Command integration
Integration – between national militaries and across the domains – is a key objective for all eFP battlegroups on along NATO’s North Eastern flank. Recognition by Alliance members that adding massively to the forces that are already deployed in Eastern Europe is not viable has led to a defence posture that will increasingly rely on highly integrated forces, some of which have a forward presence and others that can be moved rapidly when needed.
“Interoperability makes us greater than the sum of our parts and it sits at the heart of reinforcement,” says Commander Dai Bevan. “We invest in interoperability daily and there are three sides to it: Human, procedural and technical. It involves understanding of how we work together. It involves assets that move. It involves transferring voice and data communications as quickly as possible in a secure fashion,” he says.
“NATO is a defensive alliance and the first moves would be made by the adversary,” says Brigadier-General Jaak Tarien who commanded the Estonian Air Force for six years and was Director of the CCDCOE before leaving for the reserves in 2022. “They would choose the weak points to attack. That tells us we need to be proficient in every domain so we can prevail in a conflict. We shouldn’t look vulnerable in any domain.”
At Estonia’s MoD, cyber expert Anett Numa agrees and emphasises the role of cyber.
“Interoperability is very important between the five commands. Whether it is land, air, sea or space – cyber just goes through them all. I wouldn’t like to rank the commands in terms of importance but I would encourage everybody to consider the impact of cyber warfare in the future.”
EW and cyber
Electronic Warfare has long been an integral part of waging war. Increasingly, digital technologies are enhancing EW capabilities, extending them and creating new ways to produce the disruptive effects previously confined to the use of the electromagnetic spectrum.
“The demarcation between EW and cyber has not been fully thrashed out in doctrine,” says an electronic warfare specialist. “For example, most radio systems are digital, so is it cyber to target a particular piece of radio equipment? More and more, we think of cyber as referring to efforts that have a secondary effect, meaning that anything more nuanced than a simple jam would be cyber.”
As battlefield use of cyber evolves, so does the use of cyber in the wider Information Environment (IE). There, both militaries and society at large depend on cyber-reliant infrastructure companies to keep homes warm in winter, the water running, electricity on and the phones connected. In that environment everyone has a mobile phone, most people use social media and at least the older generation watches traditional television.
Cyber expert Dr. Adrian Venables, Senior Researcher at the Tallinn University of Technology, argues that western governments – and militaries – need to focus on the information environment, because they are vulnerable there.
“We can build more tanks and more advanced aircraft,” he says. “But in the information environment, we are more vulnerable than our adversaries because of our open societies and democratic culture.”
Examples abound.
Troops, most of whom are young and internet-savvy, use connected mobile phones, making them vulnerable to cyber-espionage and targeting.
NATO militaries rely on civilian infrastructure and any disruption can seriously affect battle-effectiveness. Profit-driven companies may not have the same incentives to pay the costs involved in eliminating, rather than minimising, potential disruption.
As European societies move to 5G technology, including to facilitate shipment of goods and automate road transport, NATO needs to keep pace to ensure rapid transport of equipment across countries and modes of transportation.
Closed information societies can easily restrict channels of information and overwhelm media content with propaganda. Western democracies, however, are loath to restrict the free flow of information or to resort to disinformation.
“For NATO countries, the defenders are the heroes,” says Venables. “They have to be 100% secure all the time; the attackers only have to be successful once.”
Cyber and the law
Cyber warfare can have deeply consequential legal implications. A wartime attack against civilian infrastructure would in most instances violate the Geneva Conventions, which form the bulk of International Humanitarian Law (IHL). Outside of war, there is a huge grey area where even destructive cyber-attacks may not be thought to amount to a declaration of war.
In one way, cyber has an advantage for the attacker in that attribution can be difficult or next to impossible.
“When you have a tank burning or aircraft shot down or person captured, it is clear physical evidence,” says Tarien. “If you tell the public that we have 92 percent confidence that a virus was launched by a particular unit and the Russians say no, then our own people are not convinced. There is that difficulty of intangibility so people may dismiss it in their minds.”
This “intangibility” of cyber operations has enabled attackers to cause enormous harm, yet avoid culpability. For NATO, this can create uncertainty in terms of Article 5 of NATO’s founding treaty, the crucial declaration that an attack on one is an attack on all.
The MoD’s Numa says Estonia would like more clarity as to what amounts to an attack covered by the Article.
“We need to articulate better what is within scope of Article 5,” she says. “It is now up to every member of NATO to decide the level of the incidents and their impact to determine whether the Article should be applied.”
The old-fashioned way
Back in the Tapa training area, the British Sergeant isn’t happy with the information he gets from the drone or through electronic detection. The Danes appear to have covered their tracks well and they are adept at hiding without reverting to use of communications technology to coordinate their movements. Even their 30-tonne Piranha 5s seem to be invisible.
The sergeant makes up his mind. He turns around, muttering “Let me go have a look, the old-fashioned way.” Then he mounts a rugged, camouflaged four-wheeler and disappears into the woods.