Saturday, September 19, 2020

Force Preservation in the Online Social Domain – A Digital Camouflage

In this age of Digital Socialisation, the digital realm is increasingly becoming an important dimension of the contemporary battle-space. Much has been said and done about cyber-threats, however extremely limited or no attention is paid to the challenges that arise from the malicious use of openly available digital information on and around military organisations.

 Today, The adversary does not need significant resources or advanced cyber capabilities. To pose a threat, social media and connected technologies are easily accessible and they provide information and infrastructure that can be exploited by anyone with access to an internet-enabled computer.

 Social Media is a mix of human psychology (read social behaviour) with the internet of things. This is correct except that the human angle appears to be 70% and the network, the balance 30%. The personal internet was available even in the early 90s, but it was then the synthesis of the human urge to communicate with a person (a face) vis an IP address that brought the explosive growth of social media platforms. The arrival of the smartphone, the handheld connected computer, brought the world into our palms. The benefits of this convergence are many. That said, phones to watches, everything is becoming a computer. It may be surely an achievement to rejoice, but if everything is becoming a computer, then it is to be understood that everything is also becoming a potential surveillance device.

 The survival of any military force is a principal consideration in strategic planning and decision-making. It has implications that extend well beyond military operations and into issues such as public support and political cohesion. It is evident every day how the nation’s military protects it’s members. Recently media highlighted the steps taken by the Army for safeguarding soldiers against the coronavirus, over and above the measures constituted by the government. We have also seen how the security of various bases & ports, to guard these vital assets is a military function. Similar to such physical security, digital security is also an aspect that keeps the military planners on their toes.

 We have heard measures like app ban, smartphone ban, wearable devices ban etc highlighted in various reports coming out from the military. I won't deny that they are effective, but there is no silver bullet solution here. Being such pervasive technology, apps like Facebook and devices like smartphones & smartwatches are virtually adsorbed onto our daily lives. Their functionality is today a necessity with e-banking, e-commerce and even crucial contact tracing platforms being inescapable requirements. Thus, such a non-implementable total digital isolation, as a protective measure, is of limited value, to say the least.

 Separating mobile phones from defence personnel in official areas or during exercises and operations may be critical for operational security in many contexts, but it does not remedy the complex threats in the digital domain. An individual’s digital footprint is created over a period. The allied data-points get collected over years of internet activity, is processed through machine learning & artificial intelligence-based computational processes, creating an online profile. Leaving the smartphone outside a particular office, 5 days a week is a simple indicator that you work inside that office. Subroutines transmitting such location data from your device are even embedded in basic map applications and one does not need covert surveillance infrastructure to extract the same. Similar results can be concluded from analyzing any other interfaced app. Flightradar24 gives info on even Airforce C-17 flights, geotagged selfies have been known to reveal even isolated border locations and it does not matter if the photo is shared on Facebook or Whatsapp or even just emailed, the location metadata is embedded in the pic and has nothing to do with the app.

 The military may isolate the individual, but crowd-sourced open information has become a simpler way of getting critical inputs. Recently, a twitter handle posted an old photograph having officers of an elite unit. While many of those may have retired, the comments to the tweet by people having the urge to participate in a discussion, showcase their awareness and naturally seek acknowledgement, gave away the identities of many in the photograph. Cases of people identifying areas and commenting on the military significance of the same are routine and unfortunately can’t be wished away. Information about military capabilities, such as personnel and equipment numbers, can even be obtained from civilian and commercial sensors, such as footage from publicly available or misconfigured traffic and CCTV cameras. It is not that one event is detrimental to the security, but it is the long-term information matrix that can be webbed from such data points that creates the concern.

 The defeat of an adversary, by whatever mechanism, is a cognitive outcome. It is the accumulated stresses of combat and perceptions of a situation that leads to fear, flight, or surrender. A military can be made to perceive the enemy’s relative advantages as a battle unfolds and conclude (through cognition) that the cost of continuing will exceed the possible benefits. Trained for kinetic warfare, military leaders struggle to engage with the complete spectrum of the cyber domain, especially the open domain espionage. The adversary is so distributed that conventional thought of carpet-bombing or armoured punch-through can’t be employed and force-wide digital isolation is not a realistic long-term possibility.

This is where active, adaptive digital camouflage can appear as an option.

 Camouflage, as a concept, is many times confused with concealment. To camouflage is to merge with the surroundings to make you indiscernible to the observer whereas to conceal is to protect from view. Digital camouflage works on enmeshing military digital information with other ‘noise data’ thereby denying the enemy the ability to zero in on the information and process it into intelligence. But this has to be pre-emptive and adaptive. Pre-emptive measures that create systemic resilience against the malicious use of digital information are critical. Raising awareness about adversarial risks related to the social media information environment is a critical first step, but this general awareness needs augmentation with specific education activities, internal communication measures, evolving regulations etc. This countermeasure is likely to be preferred by militaries as it is based on fundamental deception operations. The measures should protect critical information in one or more of the following ways: minimizing predictable patterns of online behaviour & camouflaging indicators when they can’t be avoided by pairing them with meaningless changes giving out an alternative interpretation for the indicators. Once military commanders adapt these aspects in their mission plan, technical specialists can be tasked for implementation.

 

Extracting information from the open internet, especially with an overdose of social media posts, is an abundance of low-hanging fruit, where a small investment can pay large dividends. One can counter the adversary only by proactively keeping him occupied in the OODA loop. A distributed denial of opportunities, planned into the operational philosophy is the future on our doorstep. Camouflage is useful for concealment, but it is not a replacement for offensive capabilities. Force preservation in the digital domain needs to be integral in our strategic communication plan.

Friday, September 4, 2020

Agile Military

 In the study of considerations of various military operations the phrase “Flexibility” comes up often. The word assumes greater importance as it is a critical feature when we discuss offensive or defensive operations, counter insurgency or logistics & administration. In execution of any of these, the key is flexibility for a favorable result. The limitations in warfare are multifold complex and, in some ways, complicated when compared to writing concepts, even logical ones. People involved in defense force know that in hierarchical organisations like the services, flow of info, orders and authority is linear. Most documents and execution follow the waterfall concept where steps are sequential and quantified.

 

One would expect military organisations to be nimble and adaptive, for the simple reason that they plan for variable situations including the one which is least likely as a contingency. In the execution phase, these ‘set plans’ bring in a realm of order enabling ‘control’ and ‘predictability’ of successive phases. This attribute of planning actually changes the ‘design flexibility’ to a ‘constrained flexibility’.

 

We continue to evolve our concepts of operations by reeling in perspectives from the Age of Information. The ever-evolving technology in this age and its applications, plus connectivity, have evolved from the limited access to cross-linked information-based decision support systems.

 

The challenges of the 21st Century like HADR, Non-State Actors, Nationless Corporations, Asymmetric Warfare & even Rogue States, are problems beyond the ability of any single actor or even a small set of very capable actors. For a successful handling of these challenges, the solution must involve a large, heterogeneous collective of entities working together. This collective is itself, complex and dynamic.

 

A more reasonable label for today’s world is the ‘Age of Interactions’. The Compounding technologies that layer above the framework of networks have given us unimaginable real-time interactions. Resultantly, events that may once have had isolated consequences, now generate consequences that have ripple effects and can quickly spin out of control. The viral nature of today’s interactions requires changes considering uncertainties and risks associated with complex endeavors. They cannot be reduced to manageable modules. What is needed is, both, a new mindset and problem-solving strategy. The most promising approach is to increase Agility. While agility is going to be an existential capability in the Age of Interactions, it is not an end unto itself and thus not a capability that should be maximized. Reasonable agility that can be sustainably scaled is the balance point between agile and traditional approaches.

 

Militaries seek hybrid structures and yet constrain the evolution with ‘command & control’. The word "control" does not describe it best because it indicates the philosophy that complex situations can be controlled; a sort of checklist giving options & actions to counter any emerging situations. This is a dangerous oversimplification. In the emerging multi-dimensional battlefield, the best that one can do is to create a set of conditions that improve the probability that a desirable outcome will occur and to change the condition when what is expected is not occurring. “Control” therefore is an emergent property, not an option to be selected.

 

Mapping from Scrum values, it appears that Focus & Convergence are more reasonable versions of Command and Control. They capture the essential aspects of command and control. They can also easily be understood by individuals without any prior knowledge of, or experience in the same. It appears more reasonable in situations of rapid grouping / regrouping of modular combat entities in maneuver warfare or any other entity that will be self-organizing as the operations progress.  These words do not carry any preconceived notions of how to achieve objectives. The focus hints directly at what is to be accomplished while being independent to the existence of someone in charge. Similarly, convergence denotes what the phrase “control” is meant to achieve without asserting the sequence / path.  

 

Incorporating agility cannot be a task. Change for change’s sake is not Agility. Agility implies effectiveness. An entity’s capabilities and behaviors cannot be agile unless they enable the entity to maintain or improve it’s measures of value. Being agile requires responsiveness. In order to be responsive, an entity must be able to recognize, in a timely manner, potentially significant changes in the external macro and microenvironment (read an adversary, or to itself). It should be able to recognize what would be a proportionate response. An appropriate response would include timely acting. In the context of military, agility will always be uniquely defined as per the threats & the capacities or the enablers & impediments exclusive to us. Given this, within the framework, how do we ingrain agility?

 

The first key to agility is “People”. To have an agile force, scrumming needs to be done on this resource, to etch agile practices. The upgrade to an agile manpower to the military is a complex problem.  HR teams will need to continuously deliver on this. It’s a military force; there can be no down time to process the changes.  It might be easy to change the way people work but extremely difficult to change the way people think. Militaries are virtually living microcosms drilled in battle procedures, which are exact opposite of agile. There are existing aspects that can be leveraged for easing in agility, for example hierarchy. In making organizational level changes, like theaterisation & joint commands, frameworks like Scrum (a modified version customized for target teams focused on envisaged desired structures) can be gradually incorporated in the hierarchy. This could be done on manageable collectives to eventually cover the entire services. This would be beneficial as these hierarchies are grouped to train, operate & deliver as units.

 

We are a successful military with sound principles. Why do we need to incorporate organisation-wide changes that are so radical to our fundamentals?

 

This is not a call for change. It is a case for adapting, improving and getting prepared to avoid a ‘future shock’. It may appear to be a conceptual journey across the landscape. It comprises of Complexity with variables of people, networks and the nature of command & control. In the end no structural or functional change in a military organisation can be called sustainable if it is not agile enough for mitigating continuous change. The exchequer would prefer Adaptive Organisations for Effect Based Operations. These aren’t possible while using world war constructs and yet this is not something out of the blue. Special Forces are the ready examples of an agile outfit. They place Individuals and interactions over processes, mission success over milestones, resource collaboration beyond designated tasks & responding to change over following a plan.

 

That’s an agile military manifesto.

Different take on Kashmir

     A very broad understanding of Relativity is that Point of View depends on Point of Viewing. It is more complicated than that, but it do...