Professional Documents
Culture Documents
GULF WAR
AN ANALYSIS OF THE FIRST INFORMATION WARFARE
INTRODUCTION
1. On August 02, 1990 the world witnessed one of the most shocking spectacles
of the twentieth century. Iraq’s invasion of Kuwait initiated one of the most important
international conflicts since the Second World War. Yet it is also one of the least well
understood in terms of causes, its immediate outcome and its likely long-term effects
on the technological development of warfare. Gulf war was the breeding ground to
test all modern war machines and technologies what so ever developed after
Second World War. Extensive use of media, electronic warfare, command and
control warfare, psychological warfare, cyber warfare and other passive war fighting
tools marked it as the ‘Revolution in Military Affair (RMA)’.
2. The Iraqi ruler occupied neighbouring Kuwait when the world community,
especially the Arab world was busy recovering from the worries of bloody Gulf War.
The lengthy Iran – Iraq war that lasted until 1988 is also believed to have set the
stage for Iraq’s invasion of Kuwait. Iraq’s emergence as a much stronger military
power than its arch rival, idle and restless huge standing army, external debt,
disagreement on a number of issues with Kuwait and historical mistakes in border
demarcation were few of many reasons that prompted Saddam Hussein to take this
venture. The far-reaching dangers implicit in this grave development and many
reasons somewhat understandable left the USA no option other than to lead an
information intensive war.
4. Never before in history have so many books been written analysing the role of
media and information technology in one particular war. Gulf war experiences
showed the nature of present and future warfare. It also shows how information
and communication is a vital tool to defeat the enemy in and out of the battlefield. A
newer concept in strategic studies, that is RMA is gaining currency where IW is a
very important component and the Gulf War contributed significantly to it. The Gulf
War was the ‘precursor war’, which showed how the new communication
1
RESTRICTED
RESTRICTED
6. In view of the aforesaid, this paper will attempt to study the Gulf War in brief
and the IW in the backdrop of Gulf War. A further attempt will be made to highlight
the application of IW tools in Gulf War and analyse the prospect of IW in future
conflicts. At the end, efforts will be made to identify options open for Bangladesh to
survive the changed environment and reap benefits introduced by IW.
AIM
7. The aim of this paper is to study the Information Warfare as applied in Gulf
War with a view to identifying options open for Bangladesh.
8. Kuwait shares its border with KSA on south- west and Republic of Iraq on the
north and west. Within the framework of Ottoman Empire it became independent in
1913. In 1932, Iraq accepted the borderline with reservations. Despite the
agreement Iraq continued to claim Kuwait to be the integral part of their country on
the plea that Kuwait had belonged to the Ottoman Empire along with Iraq and was
governed under the same province of Basra. On 19 June 1961, the British
government announced Kuwait’s full independence but Iraq did not agree to it.
9. Kuwait poured billions of dollars into Iraq’s war chest during Iraq-Iran War.
After the war Kuwait took Iraq to be a grateful friend. Btu in July 1990, Saddam
charged for producing more oil than its OPEC quota thus pulling the price down.
Accusation also made that Kuwait had been slant drilling and stealing Iraqi oil from
Rumaylah oil field. More over, Iraq demanded a favourable lease for Warba and
Bubiyan Island. Arabs diplomatic effort could not break the iceberg and ultimately
these events culminated in annexation of Kuwait by Iraq in August 1990.
2
RESTRICTED
RESTRICTED
10. Coalition Goals. The coalition, formed by the US and other countries
under the umbrella of the UN wanted to free Kuwait and restore the ruling family to
power and see the international law was respected. It aimed to maintain the social,
political, economical and if possible, territorial status in the Gulf region. Militarily, Iraq
had become a source of widespread concern and not only to its neighbours.
Therefore the coalition wanted to end Baghdad’s nuclear and chemical ambitions
and if possible, destroy its weapons research and production facilities.
11. Operation Desert Shield. Before the coalition offensive, a massive scale
logistic build-up continued for about six months. The operation was code named
“Operation Desert Shield”. It was even comparable to some of the largest logistics
build up witnessed the Second World War. The allied forces in the theatre
concentrated 585,000 troops, 2,950 tanks, 2,650 APCs, 1,079 artillery pieces and
1,925 helicopters. At the sea four carrier task forces were deployed in the gulf.
12. Operation Desert Storm. After necessary log build-up, the coalition began
actual combat code named “Operation Desert Storm”. After the UN dead line of 15
January 1991, the offensive began and was completed in four phases, each with a
clearly defined objective.
13. Operation Hail Mary. The plan for the coalition ground campaign for the
eviction of the Iraqi forces from Kuwait was formulated in November 1990 and was
code-named ‘Operation Hail Mary’. The main features of the plan were:
3
RESTRICTED
RESTRICTED
frontal attack was to divert Iraqi attention from the main thrust in the form of a
double envelopment plan.
c. The US VII Corps Attack. The US VII Corps with 150,000 men,
43,000 wheeled and 7,000 tracked vehicles was to advance north through the
Saudi – Iraqi border and then swing east into Kuwait to engage the Iraqi
Armoured reserve before it could intervene the fighting in the south.
d. The US XVIII Air Borne Corps. Further west the US XVIII Air Borne
Corps of some 118,000 troops was to advance quickly to establish a blocking
position in the Euphrates valley trapping Saddam’s Army in Kuwait.
14. Final Victory. The Coalition ground campaign began on 24 February 1991
and by 28 February, in just 100 hours of actual combat, the Iraqi army was thrown
out of Kuwait and educed to remnants. The coalition force suffered only 200
casualties against 25,000 to 100,000 Iraqis estimated dead. Due to the sustained air
campaign the morale of the Iraqi troops and the command, control and
communication facilities of the Iraqi Army got completely destroyed. As such they
failed to detect the movement of coalition forces and were completely surprised.
16. Concept of IW. In recent days the concept of IW is widely accepted to the
military requirements as part of RMA. This is because of its outstanding
performance in the field of national strategy and military establishment. People
may be able to destroy their enemy’s will to fight through IW, primarily dealing
with command, control, communication and intelligence (C3I). Information and
war have intermittent meaning. Information mostly gives away the enemy
intention, his strength, moral and in general the situation in which the battle is to
be fought.
17. Forms of IW. There are seven forms of warfare or conflicts that involve the
protection, manipulation, degradation and denial of information. The characteristics
of the forms of IW as identified by Martin Libicki are:
4
RESTRICTED
RESTRICTED
18. Basic Features of IW. There are few defining features of IW. These are
discussed below:
5
RESTRICTED
RESTRICTED
19. Tools and Means of IW. Viruses, Worms, Trapdoors, Trojan Horses, Nano
machines, High Energy Radio Frequency guns, Logic bombs, Electronic Jamming
and Chipping are few of the computer related weapons which can be effectively
employed to destroy adversaries information systems. Surveillance satellites over-fly
enemy territory without the fear of being shot down can be used to gather
information on enemy. Electronic Intelligence (ELINT) satellites in low orbit permit
picking up electronic signals from various emitters. Media plays an important role in
the modern day warfare. The “CNN factor” during Gulf War and Kosovo crisis needs
no amplification. With the proliferation of IT, defence reporting has become more
challenging as correspondents find it hard to discern and distinguish between facts
and misinformation.
21. The Gulf War was the first time information was used both as a target and as
a weapon. Command and control nodes, communication facilities, TV and radio
stations were the first to be struck with missiles and bombs. Information Warfare as
a concept has fast gained acceptance after the Gulf War, though the understanding
of the concept trails far behind. Gulf War applied all possible tools of information
war. It witnessed unprecedented use of media, psychological operations and other
related means. Never before in history have so many books written analysing media
and information’s role in one particular war. According to Bill Gates:
“A victory for technology. That’s how people remember the Gulf War of 1991.
Cruise missiles hugged the terrain over hundreds of miles to hit heavily
fortified targets, and radar evading stealth fighters dropped smart bombs on
communication centers and bridges. For thirty-eight days during Operation
Desert Storm, the US, military and its allies controlled the air. Flying 2500
sorties a day with minimal losses, the Allied air forces set up the ‘left hook’
6
RESTRICTED
RESTRICTED
ground assault that drove Iraq from Kuwait and ended the war after just 100
hours of ground operations.”
22. Weapon System of the Allies. The primitive, less sophisticated Iraqi
weapon systems were no match for the “intrinsically superior systems” of the
western powers during the Gulf War. The Coalition weapon systems were so
designed that they could destroy without being destroyed themselves.
23. Command and Communication. During the Gulf War, the US and its
allies depended on powerful command and control systems for effective
communication. Overall, at the height of operations, the US communication system
supported more than 700,000 phone calls and 1,52,000 messages per day, relying
on 130 satellite terminals, 60 voice and 20 message switches.
25. Fighter Aircraft. The Coalition planes were equipped with highly effective
infrared or radar-guided air-to-air missiles. Guided by the AWACS these fighter
aircraft had a significant technological superiority over Iraqi fighters. The western
powers quickly attained total aerial surveillance of the Coalition troops movements.
26. Electronic Warfare Aircraft. The Coalition made extensive use of the
EA-6 prowler, EC-130 Hercules and F-4 Phantom to detect and suppress the Iraqi
radar-controlled air defence systems. Jammers were used to disturb the functioning
of enemy radar. Other anti-radar measures such as HARM missiles were also put to
use. Other sophisticated weapons used were radar decoys, usually remotely piloted
gliders.
27. Bombers. The allied forces possessed F-17 Nighthawk bomber which
used “stealth” technology to reduce its detect ability by radar and make it an
intrinsically superior weapon system. Other bomber such as the A-6 Intruder, A-7,
AV-8 Harrier, Jaguar and Tornado were usually equipped with television-guided and
laser-guided precision munitions.
28. Guided Missiles. The long-ranged Tomahawk missiles used in the war had
a pre-programmed map, of the terrain over which it flew, fed in its computer. A total
of 288 Tomahawk Land Attack Missiles were fired with a success rate of over 85
percent.
29. Satellites. A wide range of optical and radar satellites were used to obtain
information on the disposition of the Iraqi forces. Another interesting use of modern
7
RESTRICTED
RESTRICTED
technology was the Global Positioning Systems (GPS), which provided navigational
aid to aircraft and land forces.
30. Ground Attack Aircraft. The A-10 airplane (Thunderbolt or Warthog) and
the AH-64 Apache and AH-1 Cobra helicopters of the Coalition were equipped with
laser-guided munitions, representing weapon systems not available to the Iraqis.
The anti-aircraft defences of the Iraqi tanks were powerless against these aircraft.
31. Gulf war saw revolution media could bring during such a conflict to achieve
nation aims. Learning from mistakes made in the Vietnam War, President Bush’s
administration decided that the Persian Gulf War’s publicity would be conducted
differently.
32. During the Gulf War, the administration was able to convince the media to
adhere to certain guidelines. The journalists were to accompany military units in
special combat “pools”. The pools represented newspapers, wire services,
television, radio and newsmagazines. All information provided outside the censored
pool reports were from official military briefings.
33. The media was manipulated by the Coalition. A report early in the war that 60
Iraqi tanks had surrendered to Egyptian forces was later proven to be planned
falsely by the CIA in an attempt to lure more Iraqi defections.
34. In the Gulf War the allies devoted considerable resources to communication
and control. Overall US military employed 10% of its enlisted personnel in
communications and intelligence roles. U.S. forces demonstrated mastery by
destroying many physical manifestations of Iraq's command-and-control structure.
35. The Gulf War brought a whole new meaning to the use of multimedia in
psychological operations. Radio and TV broadcasts, leaflets, and loudspeakers used
the themes of Arab brotherhood, allied air power and Iraqi isolation to induce large
numbers of enemy soldiers to desert.
36. Allied PSYOPS included combined use of ‘black radio stations’ and leaflet
propaganda. Psychological warfare radio stations presumably transmitting from
Saudi Arabia, such as the allegedly CIA-run Voice of Free Iraq and Radio Free Iraq,
called upon the Kurdish and Shi Iraqis to rise up against ‘Saddam Hussein gang’.
According to International Red Cross, nearly 87,000 Iraqi soldiers surrendered to
coalition forces, most of them clutching the leaflets or hiding them in the clothing.
8
RESTRICTED
RESTRICTED
37. Electronic warfare and computer simulation was extensively used to take
advantage of information. Professional hackers were employed to destroy, degrade,
exploit or compromise information systems by means of hacker techniques.
38. The Gulf War has changed the military strategy as far as the future of warfare
is concerned. A new concept, called Revolution in Military Affairs, is gaining
increased currency. Central to the RMA argument is the role of Information. It
involves vastly improved means of real-time information, surveillance and target
acquisition to improve accuracy of precision weapons and minimal collateral
damage. This type of warfare is characterised by manoeuvre rather than attrition,
where destruction of enemy’s means of command and control is the prime canon of
military doctrine.
39. Vision on Future War. The world is moving fast towards the economic
restructuring, where fighting a war is a lower priority task. Any future conflict is likely
to be characterised by the following characteristics:
a. Any future war is likely to be fought in five dimensions, the space being
the fifth dimension. Information warfare will be the focal point in any such
conflict.
b. Mere evil intention of any invading nation will not be enough to cause a
war. Rather a group of nation is more likely to involve them in a coalition to
fight against a common enemy.
c. World opinion will be invaluable to support such war effort and use of
media and other electronic means will integrate the world opinion.
b. Fog of War. Although the fog of war will never be totally eliminated,
relative advantages can be achieved by reducing it a ‘mist of war’ where the
enemy remains fog bound. Correlating the space pictures with information
gathered from across the electromagnetic spectrum by air, land and sea
sensors will provide operational level situational awareness.
10
RESTRICTED
RESTRICTED
11
RESTRICTED
RESTRICTED
IW – Bangladesh Scenario
42. Since liberation war in 1971, Bangladesh is mostly committed in low intensity
conflicts like counter insurgency operations and counter terrorism. It is anticipated
that tomorrow’s terrorist may be an information terrorist. The target for future
conflicts will be information system or computer network in the field of military and
public infrastructures.
43. Our dependence on computer and cybernetics is growing very fast. There is
no room for complacency with the present trends. It is expected that by 2020,
activities involving the operation and control of essential physical and functional
infrastructures, like, power grid, traffic control, telecommunication, transportation and
others will be shifted from mechanical/electrical control to electronic/software control.
Any future threat is likely to be on our information systems. This growing threat on
IW warrants a contemplated IW Defence, which should start immediately although in
a limited scale.
44. In Bangladesh, economy and economic threat should be placed higher on the
list of threat perception. We might find that poverty, unawareness and lawlessness
as greater impediments for us to fight against possible IW threat.
45. The concept of IW is two folds: defensive and offensive IW. Bangladesh
adopts the policy of friendship with all, which dictates all it’s foreign policy. Hence
our prime focus should be on developing IW Defence potentials.
46. Our most potential adversary is capable of initiating any kind of surprise. In
this commercially driven web served world. They are the technology providers to the
world. Thereby they might use this warfare as a ploy to gain some geo-political
advantages. More so IW has no front line. Potential battlefields are anywhere and
everywhere. Network also allows the access of any body and every body. Therefore
it is essential to comprehend the nature and characteristics of IW that Bangladesh
are likely to face in future.
48. In future battlefields, war will seek victory through concentration of effects
rather than concentration of force. Electronic attack will be the predominant method
of defeating enemy command and control system, firepower assets, intelligence
gathering and dissemination means. The war will be politically and militarily complex
and will involve synergistic application of all the elements of national and military
power.
12
RESTRICTED
RESTRICTED
49. General. In view of the growing trends of the IW threat, we should integrate
our whole IT effort as a single entity. Besides we should put considerable effort in
the form of IW defence. Following options are suggested for Bangladesh to
implement effective IW defence.
13
RESTRICTED
RESTRICTED
56. Staff for Success. A cadre of trained professionals with recognized career
paths is an essential ingredient for defending present and future information
systems. This step should include:
57. Resolve the Legal Issue. Legal parameters and awareness is unclear
against an information attack. To lessen the confusion we should resolve the legal
matters and issue a rules of engagement regarding appropriate defensive action.
Areas to examine include:
14
RESTRICTED
RESTRICTED
CONCLUSION
58. Kuwait shares its border with KSA and Iraq. Under Ottoman Empire Kuwait
became independent in 1913 but Iraq accepted the borderline with reservations.
Iraqi claim on Kuwait based on the fact that Kuwait was governed under the same
province of Basra along with Iraq. In April 1973, following an Arab mediation Iraq
withdrew its claim. During Iraq-Iran war, Kuwait helped Iraq. But in mid 1990,
Saddam put forward number of demands to Kuwait including the reduction of oil
production, a favourable lease for Warba and Bubiyan and writing off the loan. Arabs
diplomatic efforts failed to solve the debacle and ultimately Iraq annexed Kuwait in
August 1990. The USA led coalition aimed to free Kuwait and restore the ruling
family to power. They also wanted to maintain the social, political and regional status
in Middle East ensuring stable oil supply. For the first six months logistic build up
and IW went on simultaneously. From 15 January 1991, the allied stormed Iraqi air
space. The allied brought parity in terms of ground force and out numbered in terms
of air power. The 40 days of gulf war, which finally ended in a 100 hours ground
assault, has added a new dimension in the annals of world history. (Paragraph 8-
14).
59. IW is the offensive and defensive use of information and information systems
to safeguard own interest and deny the same to an adversary. The concept of IW is
widely accepted to the military requirements because of its outstanding performance
in the field of national strategy and military establishment. There are several forms of
IW that involve C2W, IBW, EW, Economic IW, Cyber Warfare, Psychological
Warfare and Hacker Warfare. All these forms cover a wide spectrum of activities
from decapitating the enemy’s command structure through physical destruction to
the use of information against the human mind. Information is used against the
national will, opposing commanders and troops, and their culture. (Paragraph 15 –
17).
60. Features of IW made it attractive and easy to apply. Unlike traditional weapon
technologies, development of information-based techniques does not require
sizeable financial resources or state sponsorship. Tools of IW include Viruses,
Trapdoors, Logic Bombs, Electronic Jamming and Chipping that are mainly
computer related. Surveillance satellites over-fly enemy territory without the fear of
being shot down can be used to gather information on enemy. Besides, media plays
an important role in the modern day warfare to form world opinion. Effective counter
measures against IW include both deterrence and system defensive measures.
15
RESTRICTED
RESTRICTED
Improved design, hardening and protective measures, and security training can be
helpful as defensive measures. (Paragraph 18 – 20).
61. Information Warfare as a concept has fast gained acceptance after the Gulf
War, though the understanding of the concept trails far behind. Gulf War applied all
possible tools of information war. It witnessed unprecedented use of media,
psychological operations and other related means. The primitive less sophisticated
Iraqi weapon systems were no match for the “intrinsically superior systems” of the
western powers during the Gulf War. The western allies made use of modern
computerised surveillance system to detect Iraqi aircraft and to control the Coalition.
Two experimental JSTARS ground surveillance aircraft for detecting mass vehicle
movement also assisted the Coalition. The Coalition planes were equipped with
highly effective infrared or radar-guided air-to-air missiles. Guided by the AWACS
these fighter aircraft had a significant technological superiority over Iraqi fighters.
The Coalition made extensive use of bombers using “stealth” technology, long-
ranged Tomahawk missiles, a wide range of optical and radar satellites, Apache and
Cobra helicopters equipped with laser-guided munitions. (Paragraph 21 – 30).
62. Gulf war saw revolution media could bring during such a conflict to achieve
nation aims. The journalists were to accompany military units in special combat
“pools”. The pools represented newspapers, wire services, television, radio and
news magazines. All information provided outside the censored pool reports were
from official military briefings. In the Gulf War the allies devoted considerable
resources to communication and control. It brought a whole new meaning to the use
of multimedia in psychological operations. Electronic warfare and computer
simulation was extensively used to take advantage of information. A new concept,
called Revolution in Military Affairs is gaining increased currency. Central to the
RMA argument is the role of Information. It involves vastly improved means of real-
time information, surveillance and target acquisition to improve accuracy of precision
weapons and minimal collateral damage. (Paragraph 31 – 38).
63. Any future war is likely to be fought in five dimensions, the space being the
fifth dimension. Information warfare will be the focal point in any such conflict. Mere
evil intention of any invading nation will not be enough to cause a war. World opinion
will be invaluable to support such war effort and use of media and other electronic
means will integrate the world opinion. In today’s world the developed nations are
most inclined towards the concept of “Non Offensive Defence”, where the nations
are more inclined to maintaining a sizeable defence forces with all modern
equipment and armaments to safeguard the territorial sovereignty and integrity
rather than waging a war. IW brought in the new concept of “Revolution in Military
Affairs (RMA)”. RMA is the sixth generation of warfare. Space, the ultimate high
ground provides numerous advantages for placing sensors. Sixth generation global
command and control systems will provide commanders with the planning,
optimisation and assignment capability needed to wage high tempo wars.
(Paragraph 39-40).
64. The increasing flow of information, the evolution of the global economy, and
the creation of the INTERNET are all factors in creating the modern global village. In
16
RESTRICTED
RESTRICTED
RECOMMENDATIONS
68.
17
RESTRICTED
RESTRICTED
Distribution:
BIBLIOGRAPHY
Books.
2. Bruce W. Watson, Bruce George, MP, Peter Tsouras and B.L. Cry, “Military
Lessons of the Gulf War” Green Hill Books, London (1991).
3. Mahmood Hassan, “Gulf War- Third World and the Euro American Society”,
Academic Publishers, Dhaka (1992).
4. Rep. Les Aspin and Rep. William Dickinson. “Defence for a New Era- lessons
of the Persian Gulf War”, Brasseys (US) Inc, New York (1992).
5. Michael R Gordon and General Bernard E. Trainor, “ The General War- The
Inside story of the Conflict in the gulf”, Little Brown and Company, New York (1995).
6. Aharon Levran, “Israeli Strategy after Desert Storm- Lessons of the Second
Gulf War”, Frank Cass, London (1997).
7. Alberto Bin, Richard Hill and Archer Jones, “Desert Storm- A Forgotten War”,
Pager Publishers, London (1998).
18
RESTRICTED
RESTRICTED
Journals
10. The Gulf War: A Critical Analysis, Armed Forces Day Journal 1998, P 66-71.
Precis
11. Information Warfare, Defence Services Command and Staff College, Mirpur,
Dhaka, Bangladesh.
12. Media Study, Defence Services Command and Staff College, Mirpur, Dhaka,
Bangladesh.
Internet
13. John R Mac Arthur, “Censorship and Propaganda in the Gulf War: How
Government Can Mould Public Opinion”, October 7, 1993.
14. John Stockwell, “The CIA and the Gulf War”, A Speech delivered on 20
February 1991 at the Louden Nelson Community Center, Santa Cruise California.
JOBS PENDING
1. Cover Page
2. Spiral
3. Abstract
4. Table of contents
5. Recommendations
6. Foot note
7. Photocopy
19
RESTRICTED