tag:theconversation.com,2011:/africa/topics/electronic-warfare-21329/articleselectronic warfare – The Conversation2022-03-01T13:44:30Ztag:theconversation.com,2011:article/1778992022-03-01T13:44:30Z2022-03-01T13:44:30ZIntelligence, information warfare, cyber warfare, electronic warfare – what they are and how Russia is using them in Ukraine<figure><img src="https://images.theconversation.com/files/449004/original/file-20220228-25-46ugq6.jpg?ixlib=rb-1.1.0&rect=3%2C0%2C1990%2C1448&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">Russian forces have the capability to jam signals from satellites, affecting communications and navigation.</span> <span class="attribution"><a class="source" href="https://en.wikipedia.org/wiki/File:MAKS2015part6-51.jpg">Vitaly V. Kuzmin/Wikimedia</a>, <a class="license" href="http://creativecommons.org/licenses/by-nc-sa/4.0/">CC BY-NC-SA</a></span></figcaption></figure><p>Russia has one of the most capable and <a href="https://www.c4isrnet.com/artificial-intelligence/2021/05/24/a-warning-to-dod-russia-advances-quicker-than-expected-on-ai-battlefield-tech/">technological militaries</a> on the planet. They have advanced intelligence, information warfare, cyber warfare and electronic warfare capabilities. </p>
<p>Russia has used these technologies in recent years in combat <a href="https://www.thedefensepost.com/2018/05/01/russia-syria-electronic-warfare/">in Syria</a> and <a href="https://www.uawire.org/russia-tests-orbital-jamming-system-in-donbas">the Donbas region</a> in eastern Ukraine, and is using them in its current invasion of Ukraine.</p>
<p>The terms “intelligence,” “information,” “cyber” and “electronic” denote distinct but overlapping fields. As a <a href="https://scholar.google.com/citations?user=nNlgxmMAAAAJ&hl=en">cybersecurity professor of practice</a>, I can explain what they are and how Russia is using them in Ukraine.</p>
<h2>Intelligence and counterintelligence in the information age</h2>
<p>The role of intelligence is to gain insight about the enemy’s activity. The role of counterintelligence is to blind the enemy or distort his view. Automation in intelligence surveillance and reconnaissance – key functions of intelligence in warfare – has become a <a href="https://autoisr.dsigroup.org/">common practice for modern militaries</a>. </p>
<p>Intelligence services collect vast amounts of data from <a href="https://theconversation.com/technology-is-revolutionizing-how-intelligence-is-gathered-and-analyzed-and-opening-a-window-onto-russian-military-activity-around-ukraine-176446">open-source intelligence</a> (OSINT) – information collected from news, social media and other publicly available sources – as well as secret sources, and <a href="https://www.afcea.org/content/battling-malign-influence-open">use artificial intelligence to analyze the information</a>.</p>
<p>Russia has reportedly progressed <a href="https://www.c4isrnet.com/artificial-intelligence/2021/05/24/a-warning-to-dod-russia-advances-quicker-than-expected-on-ai-battlefield-tech/">faster at integrating AI in intelligence systems than the U.S. expected</a> them to. It’s impossible to know what information Russia has collected, but its access to OSINT, spy satellites, operatives in Ukraine, powerful computers and experienced analysts makes it likely that Russia has extensive intelligence about Ukraine’s military and political situation.</p>
<h2>Information and disinformation</h2>
<p>Information warfare is the battle waged in the news media and on social media to bolster popular support; persuade and induce the sympathy of potential allies; and simultaneously spread confusion, uncertainty and distrust in the enemy’s population.</p>
<p>Russia has used and is likely to continue to use cyber operations to subvert the Ukrainian government. For example, in the weeks leading up to both the 2014 and 2022 invasions, Ukrainian soldiers were <a href="https://www.politico.com/news/magazine/2022/02/15/10-days-inside-putins-invisible-war-with-ukraine-00008529">targeted with disinformation</a> designed to sow confusion and disorder in the event of an attack. </p>
<p>Russian messaging about <a href="https://www.reuters.com/world/europe/russia-says-it-prevented-border-breach-ukraine-kyiv-calls-it-fake-news-2022-02-21/">“liberating” portions of Ukraine</a> is the disinformation most likely aimed at an international audience, and I expect attempts to legitimize Russia’s actions will continue. </p>
<p>There is an ongoing contest to control the narrative about what is happening in Ukraine. Russia is <a href="https://www.politico.com/news/2022/02/24/social-media-platforms-russia-ukraine-disinformation-00011559">running an active disinformation campaign</a> and I expect it is using AI to find and generate content at a rapid rate. </p>
<p>Some information circulating on social media, like this video <a href="https://gizmodo.com/10-photos-and-videos-from-russias-invasion-of-ukraine-t-1848586587">purporting to show Russian bombers over Ukraine</a>, has been <a href="https://www.wwltv.com/article/news/verify/world-verify/fact-checking-more-viral-videos-from-russia-air-invasion-of-ukraine/536-1c1239bc-a5f9-4d01-9973-f589ebaea63f">proven to be fake</a>. This underscores <a href="https://apnews.com/article/russia-ukraine-technology-europe-media-social-media-123c7975a879b89b85c06877f1f12908">how difficult it is to be certain of the truth</a> with a high volume of fast-changing information in an emotionally charged, high-stakes situation like warfare.</p>
<h2>Cyber warfare</h2>
<p>Cyber warfare entails infiltrating and disrupting the enemy’s computer systems. This includes generating denial of service attacks to block access to websites, breaking into computer systems to steal or destroy data, and taking control of computer systems to disrupt critical infrastructure like power grids.</p>
<p>U.S. and U.K. intelligence agencies reported on Feb. 23, 2022 that hackers based in Russia had <a href="https://www.theguardian.com/world/2022/feb/23/russia-hacking-malware-cyberattack-virus-ukraine">unleashed a powerful new type of malware</a> against targets in Ukraine. The attacks appear to have been <a href="https://www.bloomberg.com/news/articles/2022-02-26/hackers-destroyed-data-at-key-ukraine-agency-before-invasion">targeted at Ukrainian government and telecommunications facilities</a>, including the Ministry of Internal Affairs, and involve the theft and destruction of data.</p>
<p>Russia’s invasion of Ukraine was preceded by <a href="https://www.npr.org/2022/01/19/1074172805/more-than-70-ukrainian-government-websites-have-been-defaced-in-cyber-attacks">several weeks of cyberattacks</a>, including <a href="https://www.microsoft.com/security/blog/2022/01/15/destructive-malware-targeting-ukrainian-organizations/">an attack that posted a fake ransomware note and then destroyed data</a>. These attacks were part of a multi-year <a href="https://theconversation.com/russia-has-been-at-war-with-ukraine-for-years-in-cyberspace-176221">campaign of cyber warfare against Ukraine</a>, which included attacks on <a href="https://www.wired.com/story/russia-ukraine-cyberattack-power-grid-blackout-destruction/">portions of the country’s power grid</a>. </p>
<figure>
<iframe width="440" height="260" src="https://www.youtube.com/embed/Bc5mxd4O1SI?wmode=transparent&start=0" frameborder="0" allowfullscreen=""></iframe>
<figcaption><span class="caption">Chris Krebs, former director of the U.S. Cybersecurity and Infrastructure Security Agency, discusses Russian cyberattacks against Ukraine.</span></figcaption>
</figure>
<p>A rapid response team of cybersecurity experts in the European Union has <a href="https://www.bbc.com/news/technology-60484979">mobilized to assist Ukraine</a> in defending against cyberattacks by detecting when attacks are occurring. The Ukrainian government has also <a href="https://www.usnews.com/news/world/articles/2022-02-24/exclusive-ukraine-calls-on-hacker-underground-to-defend-against-russia">called on the Ukrainian hacker community</a> to help defend the country, by protecting computer systems that control critical infrastructure like the power grid.</p>
<h2>Electronic warfare</h2>
<p>Electronic warfare describes efforts to disrupt or misdirect the enemy’s electronic systems like radar and communications networks. It can include blocking radio signals, <a href="https://theconversation.com/experts-suggest-us-embassies-were-hit-with-high-power-microwaves-heres-how-the-weapons-work-151730">remotely destroying computer circuits</a> and <a href="https://www.thedrive.com/the-war-zone/13549/russia-may-be-testing-its-gps-spoofing-capabilities-around-the-black-sea">spoofing GPS signals</a> to disrupt navigation.</p>
<p>Russia has a long history of controlling the electromagnetic spectrum. Because of Russia’s <a href="https://defensionem.com/russian-electronic-warfare-systems/">advanced electronic warfare capabilities</a>, its force may be able to take down the internet and cell towers using a range of techniques. </p>
<p>Russia has used systems that <a href="https://www.uawire.org/russia-tests-orbital-jamming-system-in-donbas">interfere with the signal reception from satellites</a> in eastern Ukraine. These systems can be used to block communications and disrupt control of drones.</p>
<h2>Mastering new technologies</h2>
<p>The old game of spycraft has taken on new technologies, but I think it is useful to remember that the ability to win wars during revolutions in military affairs is generally determined by the <a href="https://doi.org/10.1017/CBO9780511817335">ability to integrate new technologies</a> into a country’s military and intelligence operations. </p>
<p>Though the Russian military has shown some interesting technological innovations in recent years, it’s not clear whether it has mastered this new way of conducting warfare.</p>
<p>[<em>Like what you’ve read? Want more?</em> <a href="https://memberservices.theconversation.com/newsletters/?source=inline-likethis">Sign up for The Conversation’s daily newsletter</a>.]</p><img src="https://counter.theconversation.com/content/177899/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>I am a Reservist in the U.S. Army.</span></em></p>From jamming satellite signals to spreading disinformation, Russia’s military has sophisticated technologies it’s bringing to the battlefield in Ukraine.Justin Pelletier, Professor of Practice of Computing Security, Rochester Institute of TechnologyLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/512182015-11-26T16:35:55Z2015-11-26T16:35:55ZThe next war will be an information war, and we’re not ready for it<figure><img src="https://images.theconversation.com/files/103325/original/image-20151126-28284-146ghxe.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">
</span> <span class="attribution"><a class="source" href="https://commons.wikimedia.org/wiki/File:Interior_of_an_EC-130J_Commando_Solo_Mar_2003.jpg">Aaron Ansarov</a></span></figcaption></figure><p>In the 21st century the familiar form of warfare in which physical damage is meted out against the opponent’s military forces and infrastructure has become only one form of attack. Instead, states are increasingly launching non-lethal attacks against an enemy’s information systems – this is the rise of information warfare.</p>
<p>Dan Kuehl of the National Defence University <a href="https://books.google.co.uk/books?id=cBTYWOnmFbIC&pg=PR15&lpg=PR15&dq=%22conflict+or+struggle+between+two+or+more+groups+in+the+information+environment%22&source=bl&ots=6aAcUmPyX0&sig=-HCTZFx8DWhCIRNypFsx8Syv13s&hl=en&sa=X&ved=0ahUKEwioxeSa7avJAhWCeQ8KHfIRD4EQ6AEIIDAA#v=onepage&q=%22conflict%20or%20struggle%20between%20two%20or%20more%20groups%20in%20the%20information%20environment%22&f=false">defined information warfare</a> as the “conflict or struggle between two or more groups in the information environment”. You might say that just sounds like a fancier way of describing hacking. In fact it’s a lot more sinister and a lot more dangerous than its somewhat tame name implies. </p>
<p>Western leaders are investing billions to develop capabilities matching those of China and Russia, establishing military commands for attacking, defending and exploiting the vulnerabilities of electronic communications networks. Information warfare combines electronic warfare, cyberwarfare and <a href="http://www.iwar.org.uk/psyops/">psy-ops</a> (psychological operations) into a single fighting organisation, and this will be central to all warfare in the future.</p>
<h2>The anatomy of information warfare</h2>
<p>The free flow of information within and between nation states is essential to business, international relations and social cohesion, as much as information is essential to a military force’s ability to fight. Communications today lean heavily on the internet, or via communications using various parts of the electromagnetic spectrum (such as radio or microwaves) through terrestrial communications networks or satellite networks in space. We live in a highly connected world, but it doesn’t take much to tip over into instability or even chaos. </p>
<p>Electronic warfare is used to disrupt or neutralise these electromagnetic transmissions. These might be <a href="https://theconversation.com/how-syria-is-becoming-a-test-bed-for-high-tech-weapons-of-electronic-warfare-48779">electronic counter measures and jamming</a> used to cripple military communications or weapons guidance systems. Or it can include civil uses, for example the <a href="https://www.faa.gov/nextgen/programs/adsb">ADS-B</a> air traffic control system used by aircraft to avoid in-flight collisions, or the recently adopted European Rail Traffic Management System (<a href="http://www.ertms.net/">ERTMS</a>) that replaces railway trackside signalling and provides full control of trains. Jamming or degrading either of these would cause chaos.</p>
<p>We have become familiar with cyber-attacks launched through the internet against digital networks, which can make it impossible for businesses to operate. Enormous damage can follow, in cost and reputation, as seen from attacks on <a href="http://www.engadget.com/2014/12/10/sony-pictures-hack-the-whole-story/">Sony Pictures</a> and <a href="http://www.theweek.co.uk/66178/talktalk-hack-to-cost-35m-but-wont-dent-profits">TalkTalk</a>. Bringing down a stock exchange could cause massive financial losses. Cyber-attacks can also be directed at industrial control systems used in manufacturing plants or in power, water and gas utilities. With the capacity to affect such a wide range of national infrastructure lives would be put at risk.</p>
<p>Psy-ops are aimed more at degrading the morale and well-being of a nation’s citizens. This might include spreading false information, rumour and fear through social media and news outlets. The great level of connectedness that populations have today is a strength, but being instantly connected means that misinformation and fear can also spread rapidly, resulting in panic. </p>
<p>Information warfare, then, is the integration of electronic warfare, cyberwarfare and psychological operations, for both attack and defence.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/103326/original/image-20151126-28263-t0dsnc.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/103326/original/image-20151126-28263-t0dsnc.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/103326/original/image-20151126-28263-t0dsnc.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=389&fit=crop&dpr=1 600w, https://images.theconversation.com/files/103326/original/image-20151126-28263-t0dsnc.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=389&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/103326/original/image-20151126-28263-t0dsnc.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=389&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/103326/original/image-20151126-28263-t0dsnc.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=489&fit=crop&dpr=1 754w, https://images.theconversation.com/files/103326/original/image-20151126-28263-t0dsnc.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=489&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/103326/original/image-20151126-28263-t0dsnc.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=489&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">The joined-up approach to the many aspects of information warfare.</span>
<span class="attribution"><a class="source" href="https://en.wikipedia.org/wiki/File:IO_Integration_into_Joint_Operations_-_Notional.jpg">US DoD</a></span>
</figcaption>
</figure>
<h2>Information war has already broken out</h2>
<p>It’s suspected that Russia has launched increasingly sophisticated non-lethal attacks on its neighbours, for example against <a href="http://www.economist.com/node/9163598">Estonia</a>, <a href="http://www.telegraph.co.uk/news/worldnews/europe/georgia/2539157/Georgia-Russia-conducting-cyber-war.html">Georgia</a> and <a href="http://foreignpolicy.com/2015/10/21/russia-winning-the-electronic-war/">Ukraine</a>, which experienced an integrated onslaught of electronic, cyber-attacks and psychological operations. </p>
<p>There is <a href="https://ics.sans.org/media/Media-report-of-the-BTC-pipeline-Cyber-Attack.pdf">convincing circumstantial evidence</a> that the Baku-Tbilisi-Ceyhan gas pipeline in Georgia was targeted using a sophisticated computer virus which caused an uncontrolled pressure build-up that led to an explosion. Even the so-called Islamic State has shown it has a good understanding of how to use and manipulate social media for use in psychological warfare. IS is reportedly building greater cyberwar and electronic warfare capabilities, as it recognises that winning the information war is key. </p>
<h2>A response to unconventional warfare</h2>
<p>In response to the threat of information war the British Army has established two new formations: the <a href="http://www.bbc.co.uk/news/uk-31070114">77th Brigade</a> for dealing with psychological operations, and the <a href="http://www.army.mod.uk/intelligence/35393.aspx">1st Intelligence, Surveillance and Reconnaissance Brigade</a> which combines electronic warfare and intelligence. Hundreds of computer experts will be recruited as reservists, trained with the help of GCHQ’s <a href="http://www.theguardian.com/uk-news/defence-and-security-blog/2013/sep/30/cyber-gchq-defence">Joint Cyber Unit</a>. </p>
<p>These are moves in the right direction, but the approach is too piecemeal. A recent <a href="https://www.rand.org/content/dam/rand/pubs/monograph_reports/MR1314/MR1314.ch6.pdf">RAND Corporation report</a> argued for a highly integrated approach to all aspects of information warfare in order to present an effective defence force. In the US, Admiral Michael S. Rogers released a <a href="http://www.defense.gov/News-Article-View/Article/616512/us-cyber-command-chief-details-plans-to-meet-cyberspace-threats">Cyber Command vision statement</a>, describing how it would defend Department of Defence networks, systems and information against cyber attacks and provide support to military and contingency operations. The US approach is more integrated but this is only the case within the military – from a national perspective both countries lack an overall integrated approach with a common command structure that includes threats to civilian infrastructure. </p>
<p>So while the concept of information war appears to be well understood the aspects of it are not being addressed together, and such siloed thinking could lead to gaps in our security. Western governments have failed to fully grasp the vulnerability of electronic communications and the enormous risks this poses to critical infrastructure, transport, and the safety of civilians.</p>
<p>The US director of intelligence has emphasised <a href="http://www.nationalsecurity.news/2015-09-14-u-s-intelligence-director-says-online-threats-growing-as-more-nations-dedicate-resources-to-cyber-warfare.html">the enormity of the cyber-threat facing the US</a>, while British General Sir Nicholas Houghton in a <a href="https://www.chathamhouse.org/event/building-british-military-fit-future-challenges-rather-past-conflicts">speech at Chatham House</a> observed that most acts of physical war today incorporate an online aspect, where social networks are exploited to manipulate opinion and perception. He also acknowledged that the tactics employed by Russia combine aspects of information war and also counter-intelligence, espionage, economic warfare and the sponsoring of proxies. </p>
<p>We need to better understand the full scope of information warfare as it evolves, identify where we are most vulnerable, and then establish a single point of responsibility to implement defence mechanisms. Because those adversaries that are unconstrained by western policies, or by ethical or legal codes, can and will exploit our vulnerabilities.</p><img src="https://counter.theconversation.com/content/51218/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>David Stupples does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.</span></em></p>Warfare is changing, and our approach to dealing with our adversaries must change too.David Stupples, Professor of Electrical and Electronic Engineering and Director of Electronic Warfare Research, City, University of LondonLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/498572015-10-29T05:33:21Z2015-10-29T05:33:21ZUS fears a Russian attack on undersea internet cables that could plunge world into chaos<p>It may sound far-fetched at first, but there’s a growing fear of the damage a newly aggressive Russia might inflict in a time of tension or conflict <a href="http://www.nytimes.com/2015/10/26/world/europe/russian-presence-near-undersea-cables-concerns-us.html?_r=0">simply by damaging or cutting the undersea cables</a> that carry almost all of the West’s internet traffic. </p>
<p>The New York Times reported that Russian submarines and spy ships were aggressively operating near the vital undersea cables. Could they be preparing for a new form of warfare? </p>
<p>The perfect global cyber attack could involve severing the fibre-optic cables at some of their hardest-to-access locations in order to halt the instant communications on which the West’s governments, military, economies and citizens have grown dependent. Effectively this would cripple world commerce and communications, destabilise government business and introduce uncertainty into military operations. A significant volume of military data is routed via this internet backbone.</p>
<p>The fibre-optic cables that carry the majority of the globe’s internet traffic <a href="http://www.bbc.co.uk/news/technology-34639148">follow designated paths under the oceans</a>. To cause world chaos, all that is needed is some “wire cutters” (realistically a submarine with a depth charge would do). This is not rocket science and there will be no need for clever hackers.</p>
<figure class="align-center ">
<img alt="" src="https://images.theconversation.com/files/99968/original/image-20151028-21125-1w46812.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/99968/original/image-20151028-21125-1w46812.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=432&fit=crop&dpr=1 600w, https://images.theconversation.com/files/99968/original/image-20151028-21125-1w46812.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=432&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/99968/original/image-20151028-21125-1w46812.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=432&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/99968/original/image-20151028-21125-1w46812.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=543&fit=crop&dpr=1 754w, https://images.theconversation.com/files/99968/original/image-20151028-21125-1w46812.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=543&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/99968/original/image-20151028-21125-1w46812.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=543&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption">Internet global traffic 2010.</span>
<span class="attribution"><span class="source">Telegeography</span>, <span class="license">Author provided</span></span>
</figcaption>
</figure>
<p>While there is no evidence yet of any “cable snipping”, there is concern among senior US and allied military and intelligence officials over the accelerated activity by Russian armed forces around the globe. At the same time, the internal debate in Washington illustrates how the US is viewing Russian moves with distrust. Surveillance activity shows a significant increase in Russian activity along the known routes of the cables and <a href="http://www.ibtimes.co.uk/us-fears-russian-submarines-cutting-undersea-internet-cables-1525685">more than a dozen officials confirmed in broad terms</a> that it had become the source of significant attention in the Pentagon.</p>
<h2>Information warfare</h2>
<p>Talking to the BBC’s Gordon Corera, the deputy director of the US National Security Agency (NSA), Richard Ledgett, <a href="http://www.bbc.co.uk/news/world-us-canada-34641382">warned of the increasing danger of destructive cyber-attacks</a> by nation states in addition to criminal organisations. A concerted cyber-attack against another nation state can result in the breaking down of society and the loss in ability to defend itself. Information warfare (IW) is an extension of electronic warfare, but importantly it embraces cyber warfare.</p>
<p>More than 50% of effort in future conflicts will be in both cyberspace and electromagnetically in the ether – this will be known as “information warfare”. It will disrupt radio communications, radar and intelligence surveillance, military command and control, weapon systems control, aircraft navigation, national infrastructures, emergency services, and all internet communication. Severing internet backbone networks will cause major worldwide disruption causing widespread suffering without firing a single shot in anger.</p>
<p>In March 2003, allied forces led by the US began <a href="http://edition.cnn.com/2013/10/30/world/meast/operation-iraqi-freedom-and-operation-new-dawn-fast-facts/">Operation Iraqi Freedom</a>. In the first few days of that conflict an <a href="https://www.fas.org/sgp/crs/natsec/RL31787.pdf">information war took place</a> that completely neutralised the ability of Iraq to use the electromagnetic spectrum and the internet. Its armed forces and its civilian infrastructure was virtually paralysed. The conflict lasted just 43 days and Iraq had a formidable and well equipped military.</p>
<p>Russia has long realised that this “soft” warfare, is the equal partner to the familiar hard-weapons side and <a href="http://index.heritage.org/military/2015/chapter/threats/europe/">is planning to spend billions</a> perfecting techniques required. Cyberwarfare has <a href="https://www.academia.edu/9689387/Cyber_Warfare_Assess_of_Russia">become an important weapon</a> in the military arsenal.</p>
<h2>Attack on Estonia</h2>
<figure class="align-left ">
<img alt="" src="https://images.theconversation.com/files/99961/original/image-20151028-21084-fqw5n6.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=237&fit=clip" srcset="https://images.theconversation.com/files/99961/original/image-20151028-21084-fqw5n6.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=900&fit=crop&dpr=1 600w, https://images.theconversation.com/files/99961/original/image-20151028-21084-fqw5n6.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=900&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/99961/original/image-20151028-21084-fqw5n6.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=900&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/99961/original/image-20151028-21084-fqw5n6.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=1131&fit=crop&dpr=1 754w, https://images.theconversation.com/files/99961/original/image-20151028-21084-fqw5n6.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=1131&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/99961/original/image-20151028-21084-fqw5n6.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=1131&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption">Bronze statue of soldier in Tallin.</span>
<span class="attribution"><span class="source">David Stupples</span>, <span class="license">Author provided</span></span>
</figcaption>
</figure>
<p>In April 2007, denial of service (DoS) attacks <a href="http://www.economist.com/node/9163598">targeted Estonian websites</a> including the Estonian parliament, banks, ministries, newspapers and broadcasters, amid the country’s disagreement with Russia on the relocation of the Bronze Soldier of Tallinn (a Soviet war grave monument) together with Soviet war graves in Tallinn. </p>
<p>Cyber analysts concluded that the cyber-attack on Estonia <a href="http://www.iar-gwu.org/node/65">was well planned</a> and sophisticated with no precedent. Although Russia vehemently denied involvement the foundations for future IW were becoming established. Military strategists worldwide study the attack to for its inclusion into an order of battle, and to develop mitigating measures.</p>
<h2>Georgia was next</h2>
<p>Military and government strategists did not have to wait long for another example of information warfare. On July 20 2008, just prior to the Russian military invasion of Georgia to support the self-proclaimed republics of South Ossetia and Abkhazia, a <a href="http://www.telegraph.co.uk/news/worldnews/europe/georgia/2539157/Georgia-Russia-conducting-cyber-war.html">massive Russian-based internet DoS attack against Georgia</a> began. Targets for the DDOS attack included websites of the Georgian president, Mikheil Saakashvili, the OSInform news agency and OS radio station. It was also reported that key sections of Georgia’s internet traffic <a href="http://www.computerworld.com/article/2532289/cybercrime-hacking/cyberattacks-knock-out-georgia-s-internet-presence.html">had been rerouted</a> through servers based in Russia and Turkey, where the traffic was either blocked or diverted – effectively closing the internet in Georgia for the duration of hostilities. </p>
<p>There was also circumstantial evidence that the Baku–Tbilisi–Ceyhan pipeline control system <a href="https://ics.sans.org/media/Media-report-of-the-BTC-pipeline-Cyber-Attack.pdf">was targeted</a> by a sophisticated computer virus similar to Stuxnet which led to an uncontrolled pressure incident. The Russian government again distanced itself from any cyber involvement and <a href="http://www.nytimes.com/2008/08/13/technology/13cyber.html">blamed the Russian criminal fraternity</a>. However, <a href="https://www.academia.edu/1110559/The_2008_Russian_Cyber_Campaign_Against_Georgia">observers have acknowledged</a> that the resources needed for this level of attack point to a nation state involvement.</p>
<h2>Ukraine as electronic war lab</h2>
<p>The escalating military conflict in Ukraine <a href="http://www.telegraph.co.uk/news/worldnews/europe/ukraine/10860920/Ukraine-cyber-war-escalates-alongside-violence.html">has featured a mirrored cyberwar</a> between the two sides with DDOS and malware attacks against public websites, banks, radio and television channels and public utilities. At the same time Ukrainian forces have grappled with <a href="https://theconversation.com/how-syria-is-becoming-a-test-bed-for-high-tech-weapons-of-electronic-warfare-48779">formidable Russian electronic warfare capabilities</a>. </p>
<figure class="align-right ">
<img alt="" src="https://images.theconversation.com/files/99969/original/image-20151028-21130-1sm848i.png?ixlib=rb-1.1.0&q=45&auto=format&w=237&fit=clip" srcset="https://images.theconversation.com/files/99969/original/image-20151028-21130-1sm848i.png?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=400&fit=crop&dpr=1 600w, https://images.theconversation.com/files/99969/original/image-20151028-21130-1sm848i.png?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=400&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/99969/original/image-20151028-21130-1sm848i.png?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=400&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/99969/original/image-20151028-21130-1sm848i.png?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=503&fit=crop&dpr=1 754w, https://images.theconversation.com/files/99969/original/image-20151028-21130-1sm848i.png?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=503&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/99969/original/image-20151028-21130-1sm848i.png?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=503&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption">Russia’s Krasukha-4 mobile (EW) unit.</span>
<span class="attribution"><span class="source">David Stupples</span>, <span class="license">Author provided</span></span>
</figcaption>
</figure>
<p>Russia has deployed its new multi-functional Krasukha-4 electronic warfare systems to support Ukrainian separatists and “volunteer” Russian combat troops. It is the Krasukha-4 that has been deployed to Syria. Russia has again denied any involvement in the Cyber-attack and blames criminal organisations. But this is the first time a fully integrated IW has been witnessed. </p>
<p>Lieutenant-General Ben Hodges, the commander of the US army in Europe, has described the Russian capability as “<a href="http://foreignpolicy.com/2015/10/21/russia-winning-the-electronic-war/">eye watering</a>” and confirmed that US army personnel from NATO are working alongside their counterparts in the Ukrainian army to gain first-hand experience of information warfare from a state-based adversary.</p>
<p>Is Russia is developing the capability to repeat Operation Iraqi Freedom on a global scale? If its investment in information warfare is any measure we should be concerned – this investment in information warfare is not being matched by the US and Europe combined. </p>
<p>Western leaders should be made aware that we need to accelerate our development of information warfare capability and train more people to deal with it, but above all we should stop isolating Russia in the world and putting it in a position where it feels the need to cash in on this investment.</p><img src="https://counter.theconversation.com/content/49857/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>David Stupples does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.</span></em></p>Increased submarine activity is fuelling concerns at Russia’s capability to wage information warfare on the West.David Stupples, Professor of Electrical and Electronic Engineering and Director of Electronic Warfare, City, University of LondonLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/487792015-10-08T14:55:30Z2015-10-08T14:55:30ZHow Syria is becoming a test bed for high-tech weapons of electronic warfare<figure><img src="https://images.theconversation.com/files/97765/original/image-20151008-9655-iihcyd.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption"></span> <span class="attribution"><span class="license">Author provided</span></span></figcaption></figure><p>The relationship between Russia and the West is <a href="https://theconversation.com/just-how-dangerous-are-the-skies-over-syria-48456">becoming increasingly dangerous</a> with potential flashpoints developing in both eastern Europe and Syria. After repeated incursions into Turkish airspace by Russian warplanes on bombing raids over Syria, NATO’s secretary general Jens Stoltenberg warned Moscow that it stands ready to “defend all allies”. Meanwhile Britain announced it would send troops to Baltic states to defend NATO’s eastern boundaries against possible Russian aggression beyond Ukraine.</p>
<p>Russia’s military presence in Syria has been steadily increasing over the past few months. Its warplanes are carrying out regular bombing raids against both Islamic State position and, reportedly, other rebel groups opposed to the regime of Bashar al-Assad. Its warships are <a href="http://www.bbc.co.uk/news/world-middle-east-34465425">launching cruise missiles</a> against the same targets. But the latest reports are that Russia has also deployed its most modern electronic warfare system to Syria – the <a href="http://foreignpolicy.com/2015/10/06/spy-planes-signal-jammers-and-putins-high-tech-war-in-syria/">Krasukha-4</a> (or Belladonna) mobile electronic warfare (EW) unit.</p>
<p>The Krasukha-4 is a broad-band multifunctional jamming system designed to neutralise <a href="http://www.space.com/11771-military-space-army-tiny-spy-satellites.html">Low-Earth Orbit (LEO) spy satellites</a> such as the <a href="http://www.globalsecurity.org/space/systems/lacrosse.htm">US Lacrosse/Onyx series</a>, airborne surveillance radars and radar-guided ordinance at ranges between 150km to 300km. The system is reported to be able to cause damage to the enemy’s EW systems and communications. The Krasukha-4 system works by creating powerful jamming at the fundamental radar frequencies and other radio-emitting sources. </p>
<p>Lt General Hodges, the commander of US Army Forces Europe, commented that Russia had <a href="http://www.defensenews.com/story/defense/policy-budget/leaders/interviews/2015/03/27/lt-gen-ben-hodges/70573420/">demonstrated a high level of offensive EW proficiency</a> against Ukrainian forces in Donbas using a first foreign deployment of the Krasukha-4 system.</p>
<h2>Hi tech hostilities</h2>
<p>Electronic warfare (EW) was first developed in World War II by the UK to defend against Axis bomber attacks and to defend Allied bombers from enemy surveillance systems. From that time there have been major technological breakthroughs and EW is now acknowledged to be a major fighting element of armed forces worldwide. The US, Russia and Europe invest billions of dollars each year in research and development in order to be the best at this essential military art, while Asian countries, led by China, also view EW as ta vital area for research and development. </p>
<figure class="align-center ">
<img alt="" src="https://images.theconversation.com/files/97776/original/image-20151008-9675-1erq4z6.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/97776/original/image-20151008-9675-1erq4z6.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=400&fit=crop&dpr=1 600w, https://images.theconversation.com/files/97776/original/image-20151008-9675-1erq4z6.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=400&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/97776/original/image-20151008-9675-1erq4z6.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=400&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/97776/original/image-20151008-9675-1erq4z6.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=503&fit=crop&dpr=1 754w, https://images.theconversation.com/files/97776/original/image-20151008-9675-1erq4z6.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=503&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/97776/original/image-20151008-9675-1erq4z6.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=503&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption">E3 Sentry – NATO’s ‘eyes in the sky’.</span>
<span class="attribution"><span class="license">Author provided</span></span>
</figcaption>
</figure>
<p>EW is considered to include electronic attack/support, electronic intelligence and signals intelligence. In conflicts since World war II, EW has played an increasingly important role in major including Korea, Vietnam, Arab/Israeli, Balkans, Desert Storm/Enduring Freedom, Afghanistan, and Ukraine. EW is effectively employed before the hard fighting begins to deny an opponent intelligence and the use of weapon systems.</p>
<p>Since the beginning of the Arab Spring, NATO countries led by the US and directly supported by the UK have been actively gathering intelligence from countries employing EW assets including low-orbit surveillance satellites (<a href="http://www.globalsecurity.org/space/systems/lacrosse.htm">Lacrosse/Onyx</a> series), reconnaissance aircraft (NATO E3 Sentry (AWACS), <a href="http://www.raf.mod.uk/equipment/rc135wrivetjoint.cfm">USAF RC135-Rivet Joint</a>, <a href="http://www.raf.mod.uk/currentoperations/intelligence.cfm">RAF’s Sentinel R1 and Reaper drones</a>), and sharing intelligence information with the side being supported in the conflict.</p>
<p>Since the land grab by the self-proclaimed Islamic State (IS) in both Iraq and Syria, NATO’s EW assets have been targeting IS rebel fighting units, gathering intelligence to provide tactical target information and to actively engage IS by denying rebel units radio communication and surveillance information – thus electronically blinding them. Sanitised intelligence information is shared with friendly forces including the rebel forces opposed to Syrian president Bashar al-Assad.</p>
<p>Until September 2015, Russia has been supporting Assad by supplying arms and training to Syrian forces. Bolstered by what it sees as Western indecisiveness on a Syria solution and by the West’s inaction on Russia’s military intervention in the Ukraine, Russia has decided to provide direct military air support to Syria. However, Assad’s enemies comprise all rebel groups opposing his rule – not just IS.</p>
<figure class="align-center ">
<img alt="" src="https://images.theconversation.com/files/97777/original/image-20151008-9664-11mm5za.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/97777/original/image-20151008-9664-11mm5za.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=391&fit=crop&dpr=1 600w, https://images.theconversation.com/files/97777/original/image-20151008-9664-11mm5za.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=391&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/97777/original/image-20151008-9664-11mm5za.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=391&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/97777/original/image-20151008-9664-11mm5za.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=491&fit=crop&dpr=1 754w, https://images.theconversation.com/files/97777/original/image-20151008-9664-11mm5za.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=491&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/97777/original/image-20151008-9664-11mm5za.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=491&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption">RAF Sentinel 1: the UK’s eyes and ears on the battlefield.</span>
<span class="attribution"><span class="license">Author provided</span></span>
</figcaption>
</figure>
<p>Russia is aware that NATO surveillance assets are able to monitor all Syrian-based Russian military aircraft activity including the rebel groups it is targeting, locations and weapons used. Some of these rebel groups are directly supported by the US and its allies which may result in Russia becoming in direct political conflict with NATO. To avoid being spied on, Russia needs to blind the eyes and silence the ears of NATO reconnaissance and intelligence-gathering assets so its actions are not open to close scrutiny.</p>
<h2>Cat and mouse conflict</h2>
<p>So how can the Krasukha-4 be used to cloak Russia’s operations in Syria? In words – partially effectively. Its surveillance systems will not only be able to monitor NATO aircraft movement over Syria but also the types, and from its intelligence it will know the frequencies used and signal characteristics present – Lacrosse satellites and AWACS operate in S-band, Sentinel (and similar) in X-band, and drones in J-band. Lacrosse/Onyx satellite positions are continually tracked by Russia. With this intelligence detail the Krasukha-4 can be programmed to engage in order to deny or disrupt NATO intelligence gathering. </p>
<figure class="align-center ">
<img alt="" src="https://images.theconversation.com/files/97779/original/image-20151008-9637-1ja43a.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/97779/original/image-20151008-9637-1ja43a.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=399&fit=crop&dpr=1 600w, https://images.theconversation.com/files/97779/original/image-20151008-9637-1ja43a.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=399&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/97779/original/image-20151008-9637-1ja43a.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=399&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/97779/original/image-20151008-9637-1ja43a.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=501&fit=crop&dpr=1 754w, https://images.theconversation.com/files/97779/original/image-20151008-9637-1ja43a.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=501&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/97779/original/image-20151008-9637-1ja43a.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=501&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption">The EQ9 Reaper drone: high tech target for Krasukha-4.</span>
<span class="attribution"><span class="license">Author provided</span></span>
</figcaption>
</figure>
<p>But it is not all one way – US and NATO intelligence gatherers will have “<a href="http://www.radartutorial.eu/16.eccm/ja08.en.html">electronic counter counter measures</a>” (ECCM) to combat Russian EW interference – and so the cat and mouse game of the Cold War is repeated. Intelligence gathering and radar-guided munitions will suffer some disruption and mistakes may be made but operations will continue.</p>
<p>ECCM may include being frequency agile and dodging the jamming signal or pointing the receive antenna away slightly from the jamming source. There are also many tricks that can be played with signal processing that will mitigate the effects of jamming. Of course, it would also be possible for NATO to jam the Russian surveillance radar, denying them of identification and positioning of NATO aircraft – but this would really ramp up the war of words with Vladimir Putin. We must also accept that the Krasukha-4 EW system is an essential part of the defence of Russian forces at the Latakia airfield in Syria and this must not be denied them.</p>
<p>Russian military has long appreciated that “radio-electronic combat” is integral to modern warfare and accordingly that it offers a set of relatively inexpensive weapons that can potentially cripple an opponent’s ability to sense, communicate and exercise command and control within a battlespace. </p>
<p>Russia will now be able to test its new EW systems in live combat but avoiding direct conflict with NATO – it will enhance overseas sales prospects of the Krasukha-4 system. NATO will be able test its ECCM against another EW system, presumably with similar ends in mind.</p><img src="https://counter.theconversation.com/content/48779/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>David Stupples does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.</span></em></p>The face-off between Russia and the West in Syria is giving both sides a chance to try out their new high-tech weaponry.David Stupples, Professor of Electrical and Electronic Engineering and Director of Electronic Warfare, City, University of LondonLicensed as Creative Commons – attribution, no derivatives.