Beruflich Dokumente
Kultur Dokumente
By
Introduction
1. It has been rightly commented that the saga of wars has been a narrative of human
ingenuity and resilience amidst all adversities. The tales of valour epitomizes the ‘never
say die’ attitude of the soldier. The Corps can be justifiably proud of its alacrity and
professionalism of the highest order rubbing shoulders with their brethren from the
combat forces. In the words of one of the former SO-in-C’s, the Saga of the Corps has
been “a story of enterprise and endeavor, of accomplishment, and of courage and
consistency. The methods of signaling used in the yester years may appear very primitive
today, and one can only marvel at their ingenuity and determination.” The tasks on hand
for the Corps have been unenviable, given the thirst for signal communications and
keeping them ‘through’ always and every time. The accolades won testify the dexterity
and technical acumen punctuated with combat skills exhibited by all ranks of the Corps.
Some invaluable major pioneering efforts have been the “Area Grid Systems’, the
‘ASCON’, ‘Enterprise Wide Messaging Network’ and ‘Cellular Communications’.
book titled “Sky is the Limit” is a first hand account of the ‘SIGNALS’ in Operation
Pawan, highlighting some very defining and inspiring acts of valor , dedication and
commitment our Corps personnel.
3. As we draw inspiration from the performance of the Corps in the years gone by, it is
also a good time to reflect on the future especially the challenges that lie ahead and how
we view the ‘the core competencies’ of the Corps in the coming years.. We should
logically arrive at a strategic perspective paving the way for what needs to be done
internally to culminate into a well thought out strategy for execution and as a long term
orientation of the Corps against the backdrop of warfare of the future. There is yet
another factor we have to contend with namely the influence of ‘technology’. It is tough
to make predictions especially of technology, but we do have some idea as to what are
likely in the years ahead. The speed and convergence of scientific and engineering
disciplines promise to fundamentally change the nature of deployment and redeployment,
and prolonged sustainement of forces. Discovery and innovative breakthroughs in
scientific areas related to high density- energy sources, superior material reliability, and
information and knowledge fusion across the operational, intelligence, and logistics
domain will vastly increase the combat readiness and operational effectives of the Armed
Forces. The Revolution in Military Affairs (RMA) has become a reality and has
brought in significant changes in military doctrines at one level and in hardware at the
other. Military technologies are changing rapidly and their procurement and induction
demand a proper understanding of the wide array of the technology spectrum. We need
to factor all these aspects in the strategic perspective of the Corps
4. Warfare over the past fifty years or so, and especially in the last decade, has undergone
dramatic changes. RMA has led to increasing battlefield transparency for commanders
down to soldiers, in the form of a digitized battlefield. It has changed the entire context of
surveillance, intelligence gathering, engagement of targets and decision support systems.
NCW is the requirement of the future as it brings Information superiority to the
forefront as an effective force multiplier. Metcalf Law states that the power of a network
increases as the square of the number of nodes in the network. Timely and accurate
availability of information increases its value manifold and results in sound decision
making. While powerful weapons platforms are obviously necessary for military
domination and deterrence, supremacy in the battles of the 21st century will hinge on
sophisticated command, control and communications systems that link the ‘shooters’ and
‘sensors’ together to achieve synergy through network centricity and effects-based
operations. The Battlefield Management System (BMS) is meant for communications
from the battalion headquarters forward to the companies and platoons. It will enable the
Commanding Officer to enhance his situational awareness and command his battalion
through a secure communications network with built-in redundancy. BMS involves big
numbers and will be fielded both in the plains and the mountains. Tactical
Communication System (TCS) for offensive operations -a mobile system that can
3
'leapfrog' forward as the operation progresses into enemy territory will hopefully see the
light of the day soon.
6. Against the backdrop of what has been stressed in the preceding paragraphs of the
operational template, the following would emerge as the core competencies/thrust areas
of the Corps in the future. These by no means relegates many other competencies which
we have identified in the past and grouped under the general rubric of “Signalmanship”
and enhancing ‘professionalism’ of the Corps personnel. These revised core
competencies/ thrust areas are by no means exhaustive but surely are prime areas for
attention if we are carry out our assigned tasks in NCW scenario as ‘Information
Warriors’ which we all take great pride to be :-
4
• Network management
• Information Ascendency/Dominence.
• Electro-Magnetic Spectrum Operations.
• Cyber Security Measures.
• Computer Network Defense;
• Formulation of a Corps Doctrine
Network Management
7. Network management refers to the activities, methods, procedures, and tools that
pertain to the operation, administration, maintenance, and provisioning of networked
systems. Very briefly these functions entail:-
• Operation deals with keeping the network (and the services that the network
provides) up and running smoothly. It includes monitoring the network to spot
problems as soon as possible, ideally before users are affected.
• Administration deals with keeping track of resources in the network and how
they are assigned. It includes all the "housekeeping" that is necessary to keep the
network under control.
• Maintenance is concerned with performing repairs and upgrades—for example,
when equipment must be replaced, when a router needs a patch for an operating
system image, when a new switch is added to a network. Maintenance also
involves corrective and preventive measures to make the managed network run
"better", such as adjusting device configuration parameters.
• Provisioning is concerned with configuring resources in the network to support a
given service. For example, this might include setting up the network so that a
new customer can receive voice service.
for such tasks can be tailor made based on the requirement of the theatre. If suitably
constituted integrated theatre commands and functional (non-territorial) commands for
the Armed Forces as a whole come into being as a part of a greater transformation of the
Armed Forces at some future date, such organizations already in place would greatly
facilitate such a restructuring.
9. From the host of activities listed above it would be clear that our personnel
would have to be put through a very structured approach and training
schedule to fully comprehend the nature of tasks involved. This would have to
be followed by a very well monitored programme at the implementation level
overseen by specially trained personnel. The Corps has to give these aspects a
serious attention in the coming days. The Training Syllabi would need to
suitably incorporate these issues at both at the MCTE and our Training
Centers. A separate wing /faculty to be set-up at the MCTE and Training
Centres would be a step in the right direction to impart training on Network
Management related issues. Any adhocism in this regard will result in serious
voids in carrying out these exclusive functions. It is also for consideration for
an introduction of a new trade category to be called ‘Operator-Networks
‘ONW’. If for some reason new trade category is not accepted or delayed, it is
for consideration if any trade closest to this proficiency be re-designated and
oriented to Network Management Discipline. Such a discipline is essential for
a sound foundational knowledge of networks and systems. We need to
seriously introspect whether we are addressing all these issues holistically.
11. Technology has changed the playing field in this regard as commanders no longer
have to rely purely only on intuition; they may still use it, but they don’t have to rely on it
absolutely. Through technology, a commander’s grasp of the battlefield can now be
exacted via electronic means available to him and can be applied at all levels from the
infantry platoon to the Joint Force Commander. Information Technologies (IT) can
overlay the relevant friendly and enemy pictures against the setting of the operational
environment. While it must also admitted that IT will never afford fool proof and
absolute visibility of the battlefield; but it will be possible to establish periodic
dominance by focusing resources at a particular time and place. Effective communications
over longer distances has always been the mainstay of quick reacting and quick responding
modern armies. Improvements in Battle Command can be made through the following: the
ability to command on the move inside the Network(s); combat identification to help prevent
fratricide; target identification and discrimination to reduce collateral damage; links to more
sensors and shooters; and communications relays to extend ranges for operations over more
complex terrain. The greater the decentralized nature of deployed combat units, their physical
dispersion, and the more complex the terrain, the more it is that units must rely on solid,
dependable, and reliable communications. One of the most important technological
necessities for the Soldier is advanced communications systems capable of delivering digital
voice and images over larger communications links. Multiple feeds from intelligence sensors
also empower Soldiers and give them access to the common operating picture. Advanced
networks will overcome poor intelligence and command and control limitations. The Corps
has a very important and vital role to play in providing such an integrated communication
infrastructure. Merely putting a logo “Information Warriors” on unit sign boards and DO pad
letters won’t get us far.
12. Information dominance must be fought for and won through a well planned and
practiced process, synchronized with other elements of the operation on hand.
It is not expected that a formation can ‘own’ the electromagnetic spectrum
throughout the battlefield, if only because, during contact, there are too many
claims on the available frequencies and means. But it is reasonable for the
commander to expect to dominate the Electromagnetic Spectrum within a
specified arena, if he is willing to allocate the resources. This brings into focus
another important core competency of the Corps i.e. ‘Conduct of
Electromagnetic Spectrum Operations (EMSO)’.
13. Electromagnetic spectrum operations (EMSO) provide the resource necessary for
the implementation of the wireless portion of NCW. Understanding the operational process
in planning, managing, and employing this resource is critical to the conduct of all war
fighting functions. It consists of planning, operating and coordinating the use of the
7
14. The Corps of Signals under its aegis carries out this very important function of
Spectrum Management. Its proficiency in carrying out this task would include among
other things:-
• Identifying the user’s spectrum service requirements (what, when, and where).
• Identifying which communications networks and spectrum dependent systems
require frequency
• Allocations to meet the user’s needs.
• Ensuring the availability of, and access to, the spectrum to meet the user’s
requirements.
• Protecting spectrum resources from misuse by stringently adhering to national,
international and Army policies.
operations. Spectrum managers must have the ability to manage and monitor the
spectrum for both communications systems and non-communications systems. This
includes radars, sensors, and robots to name a few. This must also encompass all
dimensions of the operational environment including airborne platforms such as surrogate
satellites, unmanned aerial platforms, space platforms and subterranean systems. Corps of
Signals personnel entrusted with this important function must appreciate the enormity of
the management functions comprising the three interacting and continuous functions of:
Planning, Coordinating, and Operating. During full spectrum operations these functions
occur concurrently. My interaction with some officers who have recently come out of
MCTE (after SODE course)doesn’t give me an assurance that we are paying sufficient
attention to this vital aspect.
17. The Corps has been tasked to oversee the implementation of Cyber Security policies
laid down from time to time. A major initiative has been taken at the Army Headquarters-
to set up an Army Cyber Security Establishment (ACSE) with similar Cyber Security
cells being formed at all Headquarters right up to Divisional levels. Apart from creating
9
18. Computer Network Defense (CND), includes actions taken via computer networks
to protect, monitor, analyze, detect and respond to network attacks, intrusions, disruptions
or other unauthorized actions that would compromise or cripple defense information
systems and networks. The networks that result from open systems architectures are
generally referred to as ‘information grids’. They allow the users to gain access, process,
and transport information in near real time to anyone else on the network on the demand
of the user; they support local and area network operations. They are also the basic
components of larger grid networks that, when interconnected, support regional, theater,
and ultimately a global grid that is also referred to as the ‘infosphere’. Computers control
connectivity so quickly that wasteful and inefficient permanent or full period connectivity
is no longer required; an example could be cellular telephone networks where mobile
users maintain continuous virtual connectivity even though they are connected through
numerous links and nodal switching centers as they move during the course of a single
call. This allows a full range of user service to be distributed across vast areas—hence
these distributed grid networks are also extremely redundant; individual users have
10
hundreds of computer selectable paths available vice one or two, making their service
many times more reliable.
19. Emerging open systems architectures offer significant improvements in the flow and
processing of information; however, their vulnerability to attack is increased. It must be
ensured that both passive and active command and control-protect operations are
conducted continuously to preserve the integrity and security of networks and nodal C4
systems from hostile attack. For example, powerful encryption and key management
systems provide passive protection of data while active protection may include
technical personnel monitoring systems to detect and locate unauthorized network
intrusion or attacking an enemy jammer with anti-radiation missiles.
20. Though these would fall within the overall ambit of ‘Network Management”, CND
would require accurate, custom rules with dedicated and qualified specialists who would
be manning the various monitoring systems for effective intrusion detection. No doubt
specific Firewall and Intrusion Detection Systems (IDS) can help control access even if
an attacker has gained access inside the Network perimeter, personnel engaged on such
tasks would require an understanding of the network protocol including the valid
structures and value ranges. It is in these aspects that we need to train our corps personnel
engaged in such tasks. Though it may be a specialized job but the fact, the Corps has
been assigned the role of a watchdog on Cyber Security; it is incumbent that we address
all aspects of Network Security in a holistic manner. A defence in depth approach to
secure our critical Infostructure including identifying and remediating existing
vulnerabilities in our current network architecture is the need of the hour. It is for
consideration that we create a separate Faculty in the MCTE, Mhow to address all issues
related to Network management and its various facets including Network Security. The
proposed Faculty should be also tasked to conduct capsular courses on “Cyber Audit”
Such audits can be considered as infrastructure review, best practices review and review
of existing cyber security policies in conjunction with ACSE. By both manually as well
as using software tools we should be able review both hardware and software
configurations with respect to routers, firewalls, servers and desktop and other
networking devices to ensure that they match the organizational policies and
requirements. The proposed “Network and Security Laboratory” to be set-up at the
MCTE would be a very useful training and testing facility. It can also be used to validate
all our policies pertaining to Physical, Perimeter, LAN, Host, Application and Data
Security related issues. Similar training facilities should also be created in our Training
Centres.
21. Put most simply, doctrine is “that which is taught”. Doctrine provides a common
frame of reference across the military. It helps to standardize operations, facilitating
readiness by establishing common ways of accomplishing military tasks. Doctrine links
theory, history, experimentation, and practice. Its objective is to foster initiative and
creative thinking. Doctrine provides the military an authoritative body of statements on
how military forces conduct operations and provides a common lexicon for use by
11
military planners and leaders. It has been rightly described as “as a common vehicle for
expression and a common plane of thought” (Sir Julian Corbett-A Maritime historian
and strategist-1854-1922) Flowing from the central Army doctrine should emerge the
Corps Doctrine. It should ideally be descriptive rather than prescriptive, requiring
judgment in application. It does not establish dogma or provide a checklist of procedures,
but is rather an authoritative guide, describing how The Corps would go about meeting its
commitments and tasks, As such it should be definitive enough to guide our Corps
activities, yet versatile enough to accommodate a wide variety of situations. Evolving in
response to changes in the strategic and technological background, in the light of
experience, it influences the way in which our communication philosophies and plans
have been developed, units are organized and trained and equipment procured. It is for
consideration if one such attempt be made to formulate a concise Corps Doctrine which
could guide all the corps members as to what is expected in carrying out variety of tasks
undertaken by the Corps. Knowledge and understanding of the Corps Doctrine, and its
application would aid in clarity of thought and unity of effort in the chaos of crisis and
war. The Corps doctrine should aim in providing a common approach and a way of
thinking, which is not bound by prescriptive rules. This will lead through training to
consistent behavior, mutual confidence and properly orchestrated collective action,
without constraining individual initiative. It is for considerations that a select body of
acknowledged professionals of Corps headed preferably by the Commandant of MCTE
could be assigned to draft the Corps Doctrine .The draft Doctrine so formulated could be
presented at the CSO’s/Commandant’s conference and put out on the Signals website
for inviting comments before finalizing it .
22. Our approach to Doctrine now needs to adapt to the challenges the Indian Army is
envisaging in the Transformation and Modernization processes it is undertaking. It is an
opportunity for the Corps to develop a process to match changing technology and
changing concepts of warfare. We need to take care not to discard what has been
validated through practice without a complete examination. Conversely it will not be
possible to implement new processes without adequate testing. This will entail
experimentation and analysis not just with current equipment and lessons learnt but
crucial to our doctrine’s long term success will be the inclusion of new and emerging
technologies. The process should centre on activities such as: development and testing
through simulation of new and modified doctrinal concepts, testing through exercises of
simulation proven concepts ideally with a well developed electronic opposition and
finally the introduction into service of the Doctrine. However, this is only the beginning.
Throughout the process and after the Doctrine has been introduced into service, feedback
will continue to drive the doctrine process.MCTE can play a very crucial role to play to
provide a sound foundation for the development of a dynamic doctrinal process which
has a rapid connection between concept and implementation. This important relationship
is seen at Figure 1. In an attempt to meet this challenge it is recommended that, MCTE
should establish a ‘Development Wing’. The ‘Development Wing, (Figure 2) is to
consist of three cells of expertise: Training Development, Doctrine and Innovation.
The aim of this Wing is to compress the current cycle between these elements. But
Innovation will lead. Ideas from all sources will be drawn together and validated within
the Innovation Cell using the existing and some newly proposed Labs in the MCTE as a
12
23. A common refrain that one hears is that the general shortage of officers in the Trg
establishment does not permit pooling officers from trg faculties/wings for such tasks
outside their instructional duties. With the formal approval of re-employment now being
open to ‘Brigadiers’, it may well be an option open, to seek out those who otherwise are
very experienced and with sufficient seniority and for some reason, due to lack of
vacancies available or victims of the “quantification’ system now in vogue for
promotions, could be chosen to head such set-ups and assist the Corps, to be usefully
engaged and contribute in such tasks. It will be appreciated that such tasks also demand
experience and expertise and we could identify such officer’s as they retire, to opt for
reemployment avenues. Many of our retiring/retired Brigadiers would eminently be
suited to pursue such intellectually motivating assignments. Also working under the Dy
Comdt of MCTE should pose no problem of inter-se seniority etc. I also notice few of our
very senior veterans settled at MHOW whose guidance can also be sought informally.
Such an institunalized set up will provide a coherent and all inclusive framework in
Doctrine development. Temporary attachments of officers from the Faculty/Wings for
this purpose are NOT being recommended for obvious reasons as they also bring in ad-
hocism and lack of continuity. Hard scale authorizations of officers in the MCTE are
already in vogue and hence any further reduction in the availability of officers for
instructional duties will seriously affect the functioning of MCTE.
13
CONCEPTS/
INNOVATION
DOCTRINE TRAINING
DEV
WING
DOCTRINE INNOVATION
TRG DEV
Conclusion
24. We are passing through very interesting times and are at the threshold of a revolution
in communication and information infrastructure. Improvement of communication
infrastructure in the forward combat zone is also underway. The new systems will bestow
on all Corps members much bigger responsibilities in all the spheres including training,
project implementation, equipment procurement and maintenance. Information has been
acknowledged as the present currency of power. Unlike in the past where the elements of
power only included military, economic and diplomatic factors, in the 21st century,
information is rapidly assuming a place of primacy in the conduct of foreign policy. It is
a force multiplier, a decision –tool, a central theme for an offensive campaign and so
much more. But to be useful we need to have its assurance and to be used correctly. The
underlying technologies of networked computer hardware and software are not problem
free. They are susceptible to massive failure. But unlike physical networks that can be
engineered to be robust against natural events, random failures and even local sabotage,
information systems are particularly vulnerable to malicious acts. Attacks can exploit the
connections that are a major virtue and failures in one part of the system can propagate
widely. The number of attacks on information systems is increasing, as is the severity of
14
their impact. The exploitation of these vulnerabilities can result in new strategic threats to
national security. To fight and win tomorrow’s wars, we must prepare now by improving
our ability to detect, investigate and respond to cyber attacks and by exploring more
effective ways of fostering grater security of networks so that they are less vulnerable to
attack.
26. We in the Signals Corps must continue to strive hard in developing the trust,
teamwork and confidence necessary to establish a truly doctrinal process to match the
dynamic nature of technology and the modern battlefield based on Net centricity. The
battlefield and particularly the area of operations must be considered as a multi-
dimensional space which includes its length, depth, breadth, the dimension of time and
now Electromagnetic Spectrum. As a consequence of the increased impact of the
Spectrum on combat, EMSO has risen in prominence. This prominence is not only
because they provide an integral element of reconnaissance through signal
intelligence/electronic support and the provision of ‘information grid’ to deliver the
information upon which decisions can be made, but now the strike/fire element can be
satisfied through electromagnetic and directed energy weapons. We have entered a new
and challenging era of a true electronic combat capability. We must support this potential
with the teamwork and trust necessary to achieve it. The catch cry across the Corps must
be ‘Achieving Excellence through teamwork’
TEEVRA CHAUKAS.