tag:blogger.com,1999:blog-79659276335813674492024-03-14T01:54:19.343+05:30C4ISR - DEFENCE AND INTELLIGENCE Defence and Intelligence goes hand in hand. This site gives an in depth view into specific aspects of major defence forces, their procurement and functioning of their Intelligence agencies.
Sidharth K Menonhttp://www.blogger.com/profile/11412252277913740873noreply@blogger.comBlogger39125tag:blogger.com,1999:blog-7965927633581367449.post-35341619565353611762017-06-10T10:34:00.001+05:302017-06-10T11:28:05.129+05:30Chinese 'ONE BELT - ONE ROAD' One headache.<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">What is One Belt - One Road?</span><br />
<span style="background-color: black;"><span style="color: #f3f3f3; font-family: "trebuchet ms" , sans-serif; font-size: xx-small;"><span style="background-color: #eeeeee; color: #666666;"><br /></span>
</span></span><br />
<div class="separator" style="clear: both; text-align: center;">
<span style="color: #f3f3f3; font-family: "trebuchet ms" , sans-serif; font-size: xx-small;"><a href="https://4.bp.blogspot.com/-MKwUv2Kr5Ck/WTt9t5AkakI/AAAAAAAAAvM/rAXyP8W29OAKL4v8q71BLjQ1wrRKcL4KgCLcB/s1600/Fig1Kai.jpg" imageanchor="1" style="background-color: black; clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" data-original-height="353" data-original-width="614" height="366" src="https://4.bp.blogspot.com/-MKwUv2Kr5Ck/WTt9t5AkakI/AAAAAAAAAvM/rAXyP8W29OAKL4v8q71BLjQ1wrRKcL4KgCLcB/s640/Fig1Kai.jpg" width="640" /></a></span></div>
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;"><span style="background-color: black;"><span style="color: #666666;"><br /></span></span>
<span style="background-color: black;"><span style="color: #666666;"><span style="color: #666666; font-family: "georgia" , "times new roman" , serif;"><br /></span>
</span></span></span><br />
<div style="margin-bottom: 10px; margin-top: 5px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">China substantiated its integrated blueprint of the Silk Road Economic Belt (SREB) and the 21st-Century Maritime Silk Road (MSR)—the twin initiatives covered by the conceptual umbrella of the “One Belt One Road”. China’s soaring vision envisages that the Silk Roads, once completed, would impact 4.4 billion people and, within a decade, generate trade above a jaw-dropping $2.5 trillion. Projects like these were the real reasons for backing the resurgence of Eurasia, marking a real paradigm shift in the global economy under President Xi.</span></div>
<div style="margin-bottom: 10px; margin-top: 5px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">A vision document jointly prepared by a composite team from the Ministries of Commerce, Foreign Affairs and the National Development and Reform Commission (NDRC)—a top organisation that steers the Chinese economy—has, with precision, revealed the vast geographic parameters of China’s “One Belt One Road” initiative.</span></div>
<div style="margin-bottom: 10px; margin-top: 5px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">The “belt and road” run through the continents of Asia, Europe and Africa, connecting the vibrant East Asian economic circle at one end with the developed European economic circle at the other, says the government report. Specifically, the SREB focusses on bringing together China, Central Asia, Russia and Europe (the Baltic); linking China with the Persian Gulf and the Mediterranean Sea through Central Asia and West Asia; and connecting China with South-East Asia, South Asia and the Indian Ocean. The 21st-Century MSR, in turn, is designed to go from China’s coast to Europe through the South China Sea and the Indian Ocean in one route, and from China’s coast through the South China Sea to the South Pacific in the other.</span></div>
<div style="margin-bottom: 10px; margin-top: 5px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">On land, the initiative will focus on jointly building a new Eurasian Land Bridge and developing China-Mongolia-Russia, China-Central Asia-West Asia and China-Indochina Peninsula economic corridors.</span></div>
<div style="margin-bottom: 10px; margin-top: 5px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">The document identifies specific gateways that will connect China with other Silk Road economies. Xinjiang province in the west will be the connecting hub for Central, South and West Asian countries. It would be one of the terminals of the Pakistan-China economic corridor.</span></div>
<div style="margin-bottom: 10px; margin-top: 5px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">Similarly, China’s province of Heilongjiang will become the gateway for Mongolia and Russia’s Far East. The area would be central for the development of the Eurasian high-speed transport corridor linking Beijing with Moscow.</span></div>
<div style="margin-bottom: 10px; margin-top: 5px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">China wishes to leverage Tibet’s geographic location to extend a Silk Road node to Nepal. It wants to connect with Nepal and South Asia through an extension of the Qinghai-Tibet railway.</span></div>
<div style="margin-bottom: 10px; margin-top: 5px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">The rail line from Lhasa has already been extended to Shigatse, Tibet’s second largest city. The Chinese plan to build two lines from Shigatse. One would lead to Kerung, the nearest Chinese town from Nepal, from where it would be extended to Rasuwagadhi in Nepal. The other line would head to Yadong on the India-Bhutan border.</span></div>
<div style="margin-bottom: 10px; margin-top: 5px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">The website ekantipur.com of Nepal has reported that Chinese Foreign Minister Wang Yi has urged Nepal to conduct a feasibility study so that the railway could be extended to Kathmandu and beyond.</span></div>
<div style="margin-bottom: 10px; margin-top: 5px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">Observers say that both sides visualise the extension of the line from the Nepalese capital to Lumbini, the starting point of a Buddhism tourist circuit.</span></div>
<div style="margin-bottom: 10px; margin-top: 5px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">Two areas in south-west China—Guangxi Zhuang Autonomous Region and the Yunnan province—will establish links with the Association of Southeast Asian Nations (ASEAN). Yunnan, which borders Vietnam, Laos and Myanmar, is ideal for connecting with the Greater Mekong Sub-region, and serve as a pivot to link China with South and South-East Asia. Yunnan’s provincial capital, Kunming, is the end point of the proposed Bangladesh-China-India-Myanmar (BCIM) economic corridor, which starts in Kolkata.</span></div>
<div style="margin-bottom: 10px; margin-top: 5px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">China has plans to integrate and globalise its inland economies around specific, strategically located hubs, which will be located along the cross-border international Silk Road transportation network. Thus, Chongqing would be developed as “an important pivot” to open up the hinterland in the country’s western region.</span></div>
<div style="margin-bottom: 10px; margin-top: 5px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">A similar role is assigned to cities such as Chengdu and Wuhan, to open up and enmesh other inland areas with the belt and road economies.</span></div>
<div style="margin-bottom: 10px; margin-top: 5px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">The “belt and road” would be serviced by a network of ro</span></div>
<div class="separator" style="clear: both; text-align: center;">
<span style="color: #f3f3f3; font-family: "trebuchet ms" , sans-serif; font-size: xx-small;"><a href="https://3.bp.blogspot.com/-sO12LO9SWIQ/WTt9Ts_Sv2I/AAAAAAAAAvE/BBMxR5fcM-wPQThvcmg86nilOGC8NNYRACLcB/s1600/1_51_silk_road.png" imageanchor="1" style="background-color: black; clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" data-original-height="733" data-original-width="965" height="486" src="https://3.bp.blogspot.com/-sO12LO9SWIQ/WTt9Ts_Sv2I/AAAAAAAAAvE/BBMxR5fcM-wPQThvcmg86nilOGC8NNYRACLcB/s640/1_51_silk_road.png" width="640" /></a></span></div>
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">ads, high-speed railways, fibre-optic lines, transcontinental submarine optical cable projects, and satellite information passageways.</span><br />
<div style="margin-bottom: 10px; margin-top: 5px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;"><br /></span></div>
<div style="margin-bottom: 10px; margin-top: 5px; padding: 0px;">
<span style="color: #f3f3f3; font-family: "trebuchet ms" , sans-serif; font-size: xx-small;"><b><u style="background-color: black;">Another prespective - A military angle.</u></b></span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">Geography matters. Geography has always mattered.</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">Technology can shape how military forces interact with geography to define the battlespace. Planes can fly over tall mountains, ships can cross great oceans, intercontinental missiles can do both.</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">But technology notwithstanding, the geographic reality remains the same. The mountains are still tall, the oceans still broad.</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">On Jan. 18, a train loaded with containers pulled into the Deutsche Bahn (DB) Cargo UK's London Eurohub terminal in Barking. It was one of dozens of freight trains that pulled into the Eurohub terminal that day. This particular train, however, had originated in Yiwu in the eastern Chinese province of Zhejiang. The train, loaded with textiles and consumer goods, had traveled the 7,200-mile route in 18 days -- half the time it takes to ship containers by sea via the Suez Canal.</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">The train was operated by InterRail Group, a Switzerland-based, multinational transport operator, on behalf of China Railway. Along the way, various railroad companies handled the shipment. DB oversaw the shipment from its terminal at Duisburg to London via the channel tunnel. The containers had to be unloaded and reloaded multiple times on railcars due to the incompatibility of the railroad gauges along the route.</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">The shipment, the first to reach London, was the latest example of Beijing's "One Belt-One Road" initiative to develop multiple transport corridors from China's coastal cities to Western Europe.</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">To date, trains have been dispatched to Hamburg, Madrid, Kabul and Riga. Trains have also traveled from Hamburg to the Chinese province of Hefei.</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">It is dubbed a 21st-century "Silk Road" in reference to the complex trade routes that connected East Asia with the Middle East and Black Sea during antiquity and the Middle Age.</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">In 2016, about 40,000 containers were shipped by rail from China to Europe. That number is expected to increase to 100,000 by 2020. By comparison, in 2014, China shipped 5.75 million containers to Europe by sea.</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">The "One Belt-One Road" initiative is a trade, investment and policy framework proposed by Chinese Prime Minister Xi Jinping in September 2013. It is designed to create efficient transportation channels between China's coastal cities and the rest of Eurasia.</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">The program has two separate components: a broad, land-based transportation infrastructure program consisting of pipelines, roads and high speed rail links across Asia connecting the Pacific coast with Europe's already extensive transportation infrastructure. Dubbed the "Silk Road Economic Belt," it is paralleled by an equally extensive oceangoing "Maritime Silk Road," which is anchored by extensive new port development and expansion of existing ports throughout the Indian Ocean.</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">The "Silk Road Economic Belt" in turn would consist of three distinct prongs. A northern belt runs through Central Asia, Russia to Europe. The central belt runs across Central and West Asia to the Persian Gulf and the Mediterranean. The southern belt runs through Southeast and South Asia to the Indian Ocean.</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">The region covered by the two initiatives ranges from East Africa to Central, South and East Asia, and encompasses the northern Indian Ocean basin. There are around 60 countries that would be involved in the "One Belt-One Road" program. Beijing has estimated that the initiative would require between $4 trillion and $8 trillion of investment to bring to fruition.</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">In the Indian Ocean and South Asia, Chinese investment is financing the development of high-speed rail links from China's coastal cities through Myanmar to the Indian Ocean. In the meantime, Beijing is heavily involved in the development or expansion of port facilities throughout the region.</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">In Sri Lanka for example, China has supplied more than $5 billion in development aid and loans, and has pledged another $10 billion in investment over the next three years. China Merchants Port Holdings has acquired an 80 percent interest in Sri Lanka's port of Hambantota and leased for 99 years an additional 15,000 acres surrounding the port. China has also invested an additional $1.4 billion in developing infrastructure in Colombo's port -- Sri Lanka's capital city and main port facility.</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">Additional Chinese investment includes $45 billion in various investments in Pakistan, the lion's share of which is devoted to the development of a new Indian Ocean port at Gwadar. China has also leased a small island in the Maldives for 50 years in return for a $4 million payment. More important, Beijing is building its first overseas base in Djibouti, East Africa, at the juncture of the Red Sea with the Indian Ocean.</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">The initiative would integrate the Eurasian and Indian Ocean region into a cohesive economic zone by combining an extensive program of transportation infrastructure, resource development, cultural and political exchanges with expanded trade.</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">Many of the countries in Central and Southeast Asia are already investors in the Chinese organized Asian Infrastructure Investment Bank. The success of the Chinese initiative would pose far-ranging implications for the geopolitics of Eurasia and the Indian Ocean, and represent a significant shift in the economic balance of power in the world, with immediate consequences to the political and eventually military balance as well.</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">China's "One Belt-One Road" initiative shows intriguing similarities to a geopolitical strategy first articulated by the British geographer and politician Sir Halford John Mackinder in 1904. Called the "Geographical Pivot of History" or the "Heartland Theory," Mackinder argued that the world's geography could be divided into a "world island" that consisted of the interlinked continents of Europe, Asia and Africa;" the "offshore islands" of Great Britain and Japan; and the "outlying islands," comprised of the island continents of Australia, North America and South America.</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">The World-Island contained the bulk of the world's population and resources. It was the largest region and theoretically the richest. At the center of the World-Island was the Heartland, an area stretching from the Volga to the Yangtze and from the Himalayas to the Arctic Ocean. Per Mackinder, the development of railroads had made it possible, for the first time in history, for a single power to dominate the Heartland and, given the Heartland's resources and central position, dominate the World-Island. And by doing so, become the world's pre-eminent power.</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">Mackinder believed that Eastern Europe was the key to controlling the Heartland. He summed up his strategic vision thus:</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">"Who rules East Europe commands the Heartland;"</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">"Who rules the Heartland commands the World-Island;"</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">"Who rules the World-Island commands the world."</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">The Heartland was impervious to sea power. Arctic ice in the north, mountains and deserts in the south shielded it. Prior to the development of railroads, the vastness of the Heartland had made it impossible for a single land power to dominate it. Throughout history, great empires had tried, the Persians under Cyrus and his sons, Greeks under Alexander, Arabs under the Abbasids and later dynasties, and the Mongols. For much of the 19th century, the Russian and British Empires sparred for control of this region in what historians have called the Great Game.</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">Mackinder's geo-strategic theory was deeply rooted in the late 19th century's view of global politics. It was, in a sense, the "domino theory" of his time.</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">Control of the Heartland would in time pave the way for global domination. The rising power of the new world was not yet manifest and still counted for little in global affairs.</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">In Mackinder's view, Russia, or whomever controlled the Heartland, posed the greatest threat to the British Empire. Against such a formidable land power, British sea power would be insufficient to create a countervailing force. Continued Russian expansion across Asia would inevitably bring Russian control of the entire Eurasian continent. At the time, Mackinder saw three possible actors that could potentially dominate the Heartland. These were:</span></div>
<ol style="margin: 10px 0px 10px 20px; padding: 0px;">
<li style="box-sizing: border-box; line-height: 1.2; margin: 0px; padding: 0px 0px 10px 10px; width: 580px;"><span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">Germany, by successfully first dominating Eastern Europe, the gateway to the Heartland, and by then conquering the Russian Empire.</span></li>
<li style="box-sizing: border-box; line-height: 1.2; margin: 0px; padding: 0px 0px 10px 10px; width: 580px;"><span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">A German-Russian alliance. Historically this was not unprecedented. Catherine II (The Great) and Frederick of Prussia had, their personal animosities notwithstanding, forged an alliance and successfully dismembered the Polish-Lithuanian kingdom; in the process dividing between themselves most of Eastern Europe.</span></li>
<li style="box-sizing: border-box; line-height: 1.2; margin: 0px; padding: 0px 0px 10px 10px; width: 580px;"><span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">A Sino-Japanese Empire that would expand westward, absorbing the Russian Empire in the process.</span></li>
</ol>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">Mackinder's thesis was in one sense obsolete from the beginning. The year after he published his theory, Great Britain and Russia signed the Anglo-Russian Convention, putting aside their differences to form, with France, an anti-German alliance. Nonetheless, Mackinder's theories enjoyed wide acceptance and influence for the next half-century.</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">During the Second World War, Frank Capra's Oscar-winning documentary series "Why We Fight," which he produced for the U.S. government, drew heavily on Mackinder's theories to explain to U.S. GIs why the U.S. had entered the war against Germany, as well as why American aid to the Soviet Union was crucial to the war effort.</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">Capra, using the exact vocabulary that Mackinder had used, explained how Nazi control of the Heartland was a threat to the United States and would lead to Berlin's control of the World-Island, and eventually global hegemony.</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">Mackinder's theory, although it was never explicitly stated as such, was also part of the intellectual underpinnings of George Kennan's "Long Telegram," where he set out the strategy of "containment" of Soviet expansionism.</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">The parallels between Mackinder's theory and China's "One Belt-One Road" initiative can be overdrawn. It's not as if Beijing has suddenly drawn inspiration from a long dead British geopolitical strategist.</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">China's economic and diplomatic initiative is grounded in the need for Beijing to ensure its access to vital raw materials, as well as its access to foreign markets for its manufacturing output. The "Silk Road Economic Belt" and the "Maritime Silk Road" is a parallel, redundant strategy to ensure the success of that initiative.</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">No, China is not looking to control or even dominate the World-Island, but the economic success of the "One Belt-One Road" strategy will likely presuppose a degree of political and diplomatic influence that China has not had in this region since the heyday of the Mongol Empire.</span></div>
<div style="line-height: 1.5; margin-bottom: 17px; padding: 0px;">
<span style="background-color: black; color: #f3f3f3; font-family: "trebuchet ms" , sans-serif;">It is a strategy that is incompatible with Russian interests and one that would pose, in time, a strategic threat to the U.S. as well. It also underscores the fact that, even now, a century later, notwithstanding successive technological revolutions and a complete reshuffling of the world's major powers -- geography still matters.</span></div>
Sidharth K Menonhttp://www.blogger.com/profile/11412252277913740873noreply@blogger.comtag:blogger.com,1999:blog-7965927633581367449.post-24093205181706374992016-01-21T13:17:00.000+05:302016-01-22T08:25:26.388+05:30POST PATHANKOT - AN ANALYSIS<div class="gmail_default" style="font-family: 'trebuchet ms', sans-serif; font-size: 12.8px;">
<a href="http://1.bp.blogspot.com/-3IP62ROBnfo/VqCPKCY-qSI/AAAAAAAAAuE/wqLWfFH3Cgg/s1600/quest47.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="133" src="http://1.bp.blogspot.com/-3IP62ROBnfo/VqCPKCY-qSI/AAAAAAAAAuE/wqLWfFH3Cgg/s200/quest47.png" width="200" /></a><span style="background-color: black;"><span style="color: #cccccc;"></span></span><br />
<span style="background-color: black;"><span style="color: #cccccc;"><span style="background-color: black;"><span style="color: #cccccc;">POST PATHANKOT AND MAZAR E SHARIF</span></span></span></span><br />
<span style="background-color: black;"><span style="color: #cccccc;"><span style="background-color: black;"><span style="color: #cccccc;"><br /></span></span></span></span>
<span style="background-color: black;"><span style="color: #cccccc;"> 6 terrorists from Pakistan on the 2nd January 2016 made us realize that there are elements within the Pakistani political - military establishment that dont agree with both Prime Minister Narendra Modi and his Pakistani counterpart Nawaz Sherrif. It is a well known fact that the political parties of Pakistan and the Army [even though it has a general handpicked by the Prime Minister], does not always be on the same page. It was evident from the attach a week after the Indian Prime Minister's surprise stop over on his way back from Afghanistan. </span></span></div>
<div class="gmail_default" style="font-family: 'trebuchet ms', sans-serif; font-size: 12.8px;">
<span style="background-color: black;"><span style="color: #cccccc;"><br /></span></span></div>
<div class="gmail_default" style="font-family: 'trebuchet ms', sans-serif; font-size: 12.8px;">
<span style="background-color: black;"><span style="color: #cccccc;"> For a common person who sees white as white and black as black in a Picasso painting, it was an attack that says no matter how much India reaches out to Pakistan, they would still follow the age old practice of trying to kill India with a thousand wounds. Now let us look a bit more closely on the attack. The attackers were not some suicide loving petty jobless crooks. The attackers were well trained commandos. They knew the basics of fire fight - rather than firing aimlessly in fully automatic, they reserved their ammo with single shot selective rounds. This was evident from the previous attacks weather it be in Mumbai of in the attack on the police station and the army camp in Samba. The army has a well built security grid in place in J&K and hence the number of attacks has come down. Their attack on Pathankot had a new twist, They booby trapped a dead terrorist's body. As an analyst I know of the same practice followed by the NE militants and the Maoists. The presence of mind of the terrorist while undertaking the action under fire shows the planning and experience he had. There is no doubt they had exercises prior to the attack. Also the attack shows the intelligence they had on the locations inside and outside the airbase. It may be even possible that the arrest of an airman [Sunil Kumar] who was an ISI mole accelerated the attack before the SOP's or the security check points moved or increased at the airbase. Training of this kind cannot be imparted without the knowledge of the security forces - in a country like Pakistan. There is cementing evidence of the role of the Pakistan army and the Intelligence agencies. </span></span></div>
<div class="gmail_default" style="font-family: 'trebuchet ms', sans-serif; font-size: 12.8px;">
<span style="background-color: black;"><span style="color: #cccccc;"><br /></span></span></div>
<div class="gmail_default" style="font-family: 'trebuchet ms', sans-serif; font-size: 12.8px;">
<span style="background-color: black;"><span style="color: #cccccc;">THE TIMING AND THE MESSAGE</span></span></div>
<div class="gmail_default" style="font-family: 'trebuchet ms', sans-serif; font-size: 12.8px;">
<span style="background-color: black;"><span style="color: #cccccc;"><br /></span></span></div>
<div class="gmail_default" style="font-family: 'trebuchet ms', sans-serif; font-size: 12.8px;">
<span style="background-color: black;"><span style="color: #cccccc;"> If you would ask me December 25th [2015], 2nd January and 3rd January 2016, are all connected and has to be read in sequence. PM Modi on his way back from Afghanistan after inaugurating the newly Indian built parliament building stopped over in Pakistan. This represents two things the personal bond between PM Nawaz Sherrif and PM Modi, and No.2 - India's commitment to the people of Afghanistan. 'Democracy' is a term not known to much countries in the area. Pakistan Army and ISI does not want to loose a puppet, that stands as a buffer for Pakistan. For a decade after the Soviet withdrawal, Afghanistan had been a base for Pakistan, to practice the Pakistan army's version of foreign policy. There was a country ruled by extremists and a legally recognized country. Remenber IC 814 episode? The plane was allowed to land in Afghanistan because no Indian commando operation was going to be allowed by the Taliban. Proxy control over Taliban has only been a boon for Pakistan. Loosing Afghanistan to a democratic rule is something the ISI and Army see as next to loosing Bangladesh. The power holders in Afghanistan is a mix of Neutral and previous Northern Alliance commanders. </span></span></div>
<div class="gmail_default" style="font-family: 'trebuchet ms', sans-serif; font-size: 12.8px;">
<span style="background-color: black;"><span style="color: #cccccc;">History shows that India and Russia has been their supporters during the Taliban Rule. Pakistan still try to broker peace between Afghan Government and the Taliban. The new political map of Afghanistan shows a new entry. Islamic State has been gaining ground and a lot of supporters of the Taliban has switched sides. Though they both harbor Sunni views, the allegiance are towards different sides. Monitary benifits is the key reason for the swith over. IS operative receives twice what a Taliban foot soldier makes. IS is not going to heed Pakistan. Indian presence in between the power struggle is what Pakistan wants to end. Afghans prefer Indians compared to the shady Pakistan. </span></span><br />
<span style="background-color: black;"><span style="color: #cccccc;"><br /></span></span>
<span style="background-color: black;"><span style="color: #cccccc;">The attack on Mazar E Sharif proves this point. It is a clear message. The sequence of events leads to this one point. The Indian establishment must invest more in Afganistan and cement out a foot there. A democratic Afghanistan is mutually benificaial.</span></span></div>
<div class="gmail_default" style="font-family: 'trebuchet ms', sans-serif; font-size: 12.8px;">
<span style="background-color: black;"><span style="color: #cccccc;"><br /></span></span></div>
<div class="gmail_default" style="font-family: 'trebuchet ms', sans-serif; font-size: 12.8px;">
<span style="background-color: black;"><span style="color: #cccccc;"> India is playing the right cards in Afghanistan, but elsewhere it is a different scene. Nepal is going north, literally. The accords signed and the pacts secured have been lost, though one would not say it publicly. Nepal and the new government is starting to see China as a better ally. Indian government has to play the game right. Years of bond should not be lost. The largest democracy must see to it that the country does not in future be a staging area for anti India elements in the future. ISI has been using Nepal as a staging area and a point for flushing india with their counterfeit notes. Sri Lanka has been turning for their defense needs to China and more recently to Pakistan. The latest news of SLAF opting for the eight Chinese/Pak made, JF 17's Thunder fighter jets is a not a surprise if you keep tab on the area. More port calls, by both Pakistan and Chinese Navy is not to be seen by India as a trivial matter. Sri Lanka too aspires to be a blue water Navy, to be a protector of the sea lanes in the Indian Ocean. The deal for the aircraft's has been limbo as if now due to Indian concerns. Myanmar too is interested in the Thunders. It is more so as though Pakistan is creating a secondary string of Pearls apart from that of China. </span></span></div>
<div class="gmail_default" style="font-family: 'trebuchet ms', sans-serif; font-size: 12.8px;">
<span style="background-color: black;"><span style="color: #cccccc;"><br /></span></span></div>
<div class="gmail_default" style="font-family: 'trebuchet ms', sans-serif; font-size: 12.8px;">
<span style="background-color: black;"><span style="color: #cccccc;">PM Modi, NSA Doval and Foreign Secretry Jai Shankar, will have to sit down and plan a path to navigate through the muddle history has made. Active and Passive measures have to be made to make sure that none of our neighbor is going to turn against India.</span></span></div>
<div class="gmail_default" style="font-family: 'trebuchet ms', sans-serif; font-size: 12.8px;">
<span style="background-color: black;"><span style="color: #cccccc;"><br /></span></span></div>
<div class="gmail_default" style="font-family: 'trebuchet ms', sans-serif; font-size: 12.8px;">
<span style="background-color: black;"><span style="color: #cccccc;"> The views are my own and you can write to me at quest47c4isr@gmail.com</span></span></div>
<div class="gmail_default" style="font-family: 'trebuchet ms', sans-serif; font-size: 12.8px;">
<span style="background-color: black;"><span style="color: #cccccc;"> K.S Menon</span></span></div>
Sidharth K Menonhttp://www.blogger.com/profile/11412252277913740873noreply@blogger.comtag:blogger.com,1999:blog-7965927633581367449.post-57347507395944045042015-10-20T16:28:00.002+05:302015-10-23T11:38:20.117+05:30RUSSIA'S QUICK EMERGENCE - STUNNED WESTERN POWERS<span style="background-color: black; color: #eeeeee; font-size: large;"> A NEW COLD WAR IS ON - WHO IS ON WHO'S SIDE?</span><br />
<span style="background-color: black;"><span style="color: #eeeeee;"><br /></span></span>
<br />
<div style="line-height: 20px; margin-bottom: 1em;">
<span style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><span style="background-color: black;"><span style="color: #eeeeee;"><img border="0" height="133" src="http://3.bp.blogspot.com/-mmzjau3IrYE/ViYc7SnaZbI/AAAAAAAAAsY/dPdtRvAi4HA/s200/quest47.blogspot.com%2B-%2Brussia%2527s%2Bemergence%2B%25281%2529.png" width="200" /></span></span></span><span style="clear: right; float: right; font-family: Trebuchet MS, sans-serif; margin-bottom: 1em; margin-left: 1em;"><br /></span></div>
<div style="line-height: 20px; margin-bottom: 1em;">
<span style="background-color: black; color: #eeeeee; font-family: Trebuchet MS, sans-serif;">The Russian military’s tactical and operational weaknesses became most blatantly apparent to the Kremlin during the 2008 Russo-Georgian War, when the U.S.-trained Georgian forces proved a much more agile and motivated adversary than expected.</span></div>
<div style="line-height: 20px; margin-bottom: 1em;">
<span style="background-color: black; color: #eeeeee; font-family: Trebuchet MS, sans-serif;">As a consequence, Russia initiated the most far-reaching military (the “new look”) reforms since the 1930s divided up into three distinct phases, according to the ECFR study:</span></div>
<blockquote style="line-height: 20px;">
<div style="margin-bottom: 1em;">
<i><span style="background-color: black; color: #eeeeee; font-family: Trebuchet MS, sans-serif;">First, increasing professionalism by overhauling the education of personnel and cutting the number of conscripts; second, improving combat-readiness with a streamlined command structure and additional training exercises; and third, rearming and updating equipment.</span></i></div>
</blockquote>
<div style="line-height: 20px; margin-bottom: 1em;">
<span style="background-color: black; color: #eeeeee; font-family: Trebuchet MS, sans-serif;">The United States and Europe primarily focused on the third and still mostly incomplete aspect of these reforms, neglecting the substantial progress that was made in the first and second phases.</span></div>
<div style="line-height: 20px; margin-bottom: 1em;">
<span style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><span style="background-color: black;"><span style="color: #eeeeee;"><img border="0" height="211" src="http://4.bp.blogspot.com/-A4mZ_1FDOZ8/ViYbIOPMWeI/AAAAAAAAAsI/9FyzwBXCcNE/s320/Russian_Air_Force_Sukhoi_Su-34_Beltyukov-1.jpg" width="320" /></span></span></span><span style="clear: right; float: right; font-family: Trebuchet MS, sans-serif; margin-bottom: 1em; margin-left: 1em;"><span style="background-color: black;"><span style="color: #eeeeee;">Almost unnoticed by observers, the Russian military addressed one of the biggest organizational weaknesses dating back to the Soviet and Czarist eras and introduced a new professionally trained non-commissioned officers (NCOs) corps dissolving the existing warrant officers system.</span></span></span></div>
<div style="line-height: 20px; margin-bottom: 1em;">
<span style="background-color: black; color: #eeeeee; font-family: Trebuchet MS, sans-serif;">“For the first time, the Russian army had a pyramid structure, with few decision-makers at the top and more officers servicing the troops,” the study reads. Furthermore, officer salaries were increased five-fold and more modern management methods introduced. These reforms also resulted in substantial savings which were used to increase the percentage of professional soldiers within the Russian Armed Forces:</span></div>
<blockquote style="line-height: 20px;">
<div style="margin-bottom: 1em;">
<i><span style="background-color: black; color: #eeeeee; font-family: Trebuchet MS, sans-serif;">This allowed the troops to use more high-tech equipment (conscripts serve too short a period to be effectively trained on complex weapons systems) and increased the combat-readiness of elite forces (paratroopers, naval infantry, and special forces).</span></i></div>
</blockquote>
<div style="line-height: 20px; margin-bottom: 1em;">
<span style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><span style="background-color: black;"><span style="color: #eeeeee;"></span></span></span><span style="clear: right; float: right; font-family: Trebuchet MS, sans-serif; margin-bottom: 1em; margin-left: 1em;"><span style="background-color: black; color: orange;">T</span></span></div>
<div style="line-height: 20px; margin-bottom: 1em;">
<span style="background-color: black;"><span style="color: #eeeeee;"><span style="font-family: Trebuchet MS, sans-serif;">The second part of the reforms dealt with streamlining command structures and re-organizing the Russian Armed Forces into smaller more agile units by reducing the nominal size of the military by 43 percent—out of 23 old divisions 40 “new look” brigades were formed.</span> </span></span></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<span style="background-color: black;"><span style="color: #eeeeee;"> <span style="font-family: 'Trebuchet MS', sans-serif; line-height: 20px;">The old Soviet-era practice of mobilization—calling up reservists to achieve combat strengths—was abolished and unnecessary administrative commands scrapped. “The [new] military districts were transformed into joint forces commands, and their number was reduced. This cut the levels of hierarchy as the military districts now have access to all land, air, and naval forces in their zone,” according to the ECFR paper.</span></span></span><br />
<div style="line-height: 20px; margin-bottom: 1em;">
<span style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><span style="background-color: black;"><span style="color: #eeeeee;"></span></span></span><br /></div>
<div class="separator" style="clear: both; text-align: center;">
<span style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><span style="background-color: black;"><span style="color: #eeeeee;"></span></span></span></div>
<div style="line-height: 20px; margin-bottom: 1em;">
<span style="background-color: black; color: #eeeeee; font-family: Trebuchet MS, sans-serif;">“While such high readiness levels have not yet been achieved, one has to bear in mind that before the reforms some Russian divisions needed about a year of preparation before deploying to Chechnya,” the study notes.</span></div>
<div style="line-height: 20px; margin-bottom: 1em;">
<span style="background-color: black; color: #eeeeee; font-family: Trebuchet MS, sans-serif;">The result of these reforms was that Russia was capable of maintaining a force of 40,000 and 150,000 men in full combat-ready formations along the Russian-Ukrainian border for months, while conducting military drills involving around 80,000 troops in other parts of the country.</span></div>
<div style="line-height: 20px; margin-bottom: 1em;">
<a href="https://3.bp.blogspot.com/-k5l85ztMSRs/ViYc-d6_kBI/AAAAAAAAAso/2p4k8MYRuGg/s1600/quest47.blogspot.com%2B-%2Brussia%2527s%2Bemergence%2B%25284%2529.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="263" src="http://3.bp.blogspot.com/-k5l85ztMSRs/ViYc-d6_kBI/AAAAAAAAAso/2p4k8MYRuGg/s320/quest47.blogspot.com%2B-%2Brussia%2527s%2Bemergence%2B%25284%2529.jpg" width="320" /></a><span style="background-color: black; color: #eeeeee; font-family: Trebuchet MS, sans-serif;"><br /></span>
<span style="background-color: black; color: #eeeeee; font-family: Trebuchet MS, sans-serif;">The report does not note that the three phases of the grand military reform are far from complete—in particular the last phase dealing with the introduction of new equipment.</span></div>
<div style="line-height: 20px; margin-bottom: 1em;">
<span style="background-color: black; color: #eeeeee; font-family: Trebuchet MS, sans-serif;">It is when analyzing the last phase that Western observes made the mistake of overemphasizing the difficulties of the Russian defense industry in delivering new military hardware and inferring a general failure of the reforms. “However, this is a misunderstanding of the nature of the reforms. The initial stages were not designed to create a new army in terms of equipment, but to ensure that existing equipment was ready to use, and to make the organization that uses it more effective and professional,” according to the ECFR paper.</span></div>
<div style="line-height: 20px; margin-bottom: 1em;">
<span style="background-color: black; color: #eeeeee; font-family: Trebuchet MS, sans-serif;">This led to Western military analysts underestimating Russian military capabilities and neglecting new operational concepts such as Russia’s unique approach of merging conventional with unconventional warfighting methods, among other things.</span></div>
<div style="line-height: 20px; margin-bottom: 1em;">
<span style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><span style="background-color: black;"><span style="color: #eeeeee;"></span></span></span><span style="clear: right; float: right; font-family: Trebuchet MS, sans-serif; margin-bottom: 1em; margin-left: 1em;"></span><br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<span style="clear: right; float: right; font-family: Trebuchet MS, sans-serif; margin-bottom: 1em; margin-left: 1em;"><span style="background-color: black;"><span style="color: #eeeeee;">Discussing Vladimir Putin’s military adventure in Syria, the report notes that it does not “not draw on the core strengths of the armed forces, or on Moscow’s military vision.” The report furthermore states that due to the limited logistical capabilities of the Russian military outside Europe and the post-Soviet periphery, operations –particularly those involving heavy Russian land platforms–would be fairly limited and cannot be sustained for a prolonged amount of time.</span></span></span><span style="clear: right; float: right; font-family: Trebuchet MS, sans-serif; margin-bottom: 1em; margin-left: 1em;"><span style="background-color: black;"><span style="color: #eeeeee;"><br /></span></span></span><span style="clear: right; float: right; font-family: Trebuchet MS, sans-serif; margin-bottom: 1em; margin-left: 1em;"><span style="background-color: black;"><span style="color: #eeeeee;"><br /></span></span></span><span style="clear: right; float: right; font-family: Trebuchet MS, sans-serif; margin-bottom: 1em; margin-left: 1em;"><span style="background-color: black;"><span style="color: #eeeeee;"><br /></span></span></span><span style="clear: right; float: right; font-family: Trebuchet MS, sans-serif; margin-bottom: 1em; margin-left: 1em;"><span style="background-color: black;"><span style="color: #eeeeee;"><br /></span></span></span><span style="clear: right; float: right; font-family: Trebuchet MS, sans-serif; margin-bottom: 1em; margin-left: 1em;"><span style="background-color: black;"><span style="color: #eeeeee;"><br /></span></span></span><span style="clear: right; float: right; font-family: Trebuchet MS, sans-serif; margin-bottom: 1em; margin-left: 1em;"><span style="background-color: black;"><span style="color: #eeeeee;"><br /></span></span></span><span style="clear: right; float: right; font-family: Trebuchet MS, sans-serif; margin-bottom: 1em; margin-left: 1em;"><span style="background-color: black;"><span style="color: #eeeeee;"><br /></span></span></span><span style="clear: right; float: right; font-family: Trebuchet MS, sans-serif; margin-bottom: 1em; margin-left: 1em;"><span style="background-color: black;"><span style="color: #eeeeee;"><br /></span></span></span><span style="clear: right; float: right; font-family: Trebuchet MS, sans-serif; margin-bottom: 1em; margin-left: 1em;"><span style="background-color: black;"><span style="color: #eeeeee;"><br /></span></span></span><span style="clear: right; float: right; font-family: Trebuchet MS, sans-serif; margin-bottom: 1em; margin-left: 1em;"><span style="background-color: black;"><span style="color: #eeeeee;"><br /></span></span></span><br />
<span style="font-family: Verdana, sans-serif; font-size: x-small;"><b><br /></b></span>
<span style="font-family: Verdana, sans-serif; font-size: x-small;"><b><br /></b></span>
<span style="font-family: Verdana, sans-serif; font-size: x-small;"><b><br /></b></span>
<span style="font-family: Verdana, sans-serif; font-size: x-small;"><b><br /></b></span>
<span style="font-family: Verdana, sans-serif; font-size: x-small;"><b><br /></b></span>
<span style="font-family: Verdana, sans-serif; font-size: x-small;"><b>quest47c4isr@gmail.com</b></span></div>
<div style="line-height: 20px; margin-bottom: 1em;">
<span style="background-color: black; color: orange; font-family: 'Trebuchet MS', sans-serif;">Russia’s military reforms have been misunderstood and its capabilities underestimated by the United States and Europe. That’s the conclusion of a new report by the European Council on Foreign Relations (ECFR). </span><span style="background-color: black; color: orange; font-family: 'Trebuchet MS', sans-serif;">The military education system was also reformed – partially based on the systems of Switzerland and Austria—with the aim of introducing “state of-the-art (Western) leadership techniques.” Moreover, new uniforms and personal equipment were introduced boosting overall moral and confidence. </span><span style="background-color: black; color: orange; font-family: 'Trebuchet MS', sans-serif;">Furthermore, the number of military drills was substantially increased and large-scale “snatch exercises” conducted continuously, testing the combat-readiness of airborne units and “new look” brigades. (New units should be able to deploy within 24 hours.)</span></div>
<div style="line-height: 20px; margin-bottom: 1em;">
<a name='more'></a></div>
Sidharth K Menonhttp://www.blogger.com/profile/11412252277913740873noreply@blogger.comtag:blogger.com,1999:blog-7965927633581367449.post-80445026870244799382015-04-30T09:54:00.001+05:302015-10-20T17:32:26.909+05:308 CHINESE SSK'S FOR PAKISTAN - 50 CHINESE MADE JF- 17 TOO.<div class="MsoNormal">
<span style="background: black; border: 1pt none windowtext; font-size: 11.5pt; line-height: 115%; padding: 0cm;"><span style="color: #cccccc; font-family: Trebuchet MS, sans-serif;"><br /></span></span></div>
<div class="MsoNormal" style="text-align: center;">
<span style="color: #cccccc;"><br /></span>
<span style="color: #cccccc;"><span style="font-size: large;"><br /></span>
<span style="background-color: black; line-height: 17.6333332061768px;"><span style="font-family: Trebuchet MS, sans-serif; font-size: large;">POSSIBLY QING CLASS SSK's [TYPE 032]</span></span></span></div>
<div class="MsoNormal" style="text-align: center;">
<span style="background-color: black; line-height: 17.6333332061768px;"><span style="color: #cccccc; font-family: Trebuchet MS, sans-serif;"><br /></span></span></div>
<div class="MsoNormal">
<span style="color: #cccccc;"><br /></span>
<a href="http://1.bp.blogspot.com/-lo6_TXtZDLM/VUGy234pQzI/AAAAAAAAAqc/_BOxorIBD2c/s1600/flag.GIF" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><span style="color: #cccccc;"><img border="0" height="131" src="http://1.bp.blogspot.com/-lo6_TXtZDLM/VUGy234pQzI/AAAAAAAAAqc/_BOxorIBD2c/s1600/flag.GIF" width="200" /></span></a><a href="http://4.bp.blogspot.com/-ohkFXITqx9E/VUGy4SPx-iI/AAAAAAAAAqs/kjOl4Gp4P8k/s1600/CHINESE%2BSUBS.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><span style="color: #cccccc;"><br /></span></a><a href="http://4.bp.blogspot.com/-ohkFXITqx9E/VUGy4SPx-iI/AAAAAAAAAqs/kjOl4Gp4P8k/s1600/CHINESE%2BSUBS.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><span style="color: #cccccc;"><br /></span></a><a href="https://3.bp.blogspot.com/-yIdHrCDoZro/VUGy3rkN9qI/AAAAAAAAAqk/sCQLMsw7Hfw/s1600/download.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><span style="color: #cccccc;"><img border="0" height="133" src="http://3.bp.blogspot.com/-yIdHrCDoZro/VUGy3rkN9qI/AAAAAAAAAqk/sCQLMsw7Hfw/s1600/download.png" width="200" /></span></a><a href="http://4.bp.blogspot.com/-ohkFXITqx9E/VUGy4SPx-iI/AAAAAAAAAqs/kjOl4Gp4P8k/s1600/CHINESE%2BSUBS.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><span style="color: #cccccc;"><br /></span></a><span style="color: #cccccc;"><span style="font-family: Trebuchet MS, sans-serif;"><span style="background: black; border: 1pt none windowtext; font-size: 11.5pt; line-height: 115%; padding: 0cm;">Pakistan's
Defence forces , specially<span class="apple-converted-space"> </span><b style="-webkit-transition: all 0.5s ease; background-position-x: 0px; background-position-y: 0px; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;">Pakistan's
Navy</b><span class="apple-converted-space"> </span>has been quite vocal of
arrival of<span class="apple-converted-space"> </span><b style="-webkit-transition: all 0.5s ease; background-position-x: 0px; background-position-y: 0px; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;">Russian Nuclear powered
submarine</b><span class="apple-converted-space"> </span>to Indian shore.
Pakistan Navy chief has already told US Defence Magazine that arrival of
Russian Nuclear powered submarine and India’s own Indigenous development ,will
have adverse effect on its operational capability in Indian ocean . and also
mentioned that Pakistani navy is already working on plans to counter this
latest threat put forward by Indian Navy .</span><span style="background: black; border: 1pt none windowtext; font-size: 11.5pt; line-height: 115%; padding: 0cm;"><br style="-webkit-transition: all 0.5s ease; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;" />
<br style="-webkit-transition: all 0.5s ease; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;" />
</span><span style="background: black; border: 1pt none windowtext; font-size: 11.5pt; line-height: 115%; padding: 0cm;"><span style="-webkit-transition: all 0.5s ease; background-position-x: 0px; background-position-y: 0px; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;">Indian
Defence Experts believe that Pakistan is already working on a counter plans and
might just surprise Indian pretty soon in future by producing or acquiring a
Nuclear powered submarine . Pakistan always has a quieter way of weapons
acquisition and even managed to keep many defence project low key affair .</span></span><span style="background: black; border: 1pt none windowtext; font-size: 11.5pt; line-height: 115%; padding: 0cm;"><br style="-webkit-transition: all 0.5s ease; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;" />
<br style="-webkit-transition: all 0.5s ease; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;" />
</span></span><span style="font-family: Trebuchet MS, sans-serif;"><span style="background: black; border: 1pt none windowtext; font-size: 11.5pt; line-height: 115%; padding: 0cm;"><span style="-webkit-transition: all 0.5s ease; background-position-x: 0px; background-position-y: 0px; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;">Rakesh
Sharma Indian Defence Expert told that “General Musharraf way back in 2006 had
mentioned to a Pak daily that technology for development of a<span class="apple-converted-space"> </span><b style="-webkit-transition: all 0.5s ease; background-position-x: 0px; background-position-y: 0px; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;">Nuclear Submarine</b><span class="apple-converted-space"> </span>existed in Pakistan”, but its seems
help will come from its tried and tested friend china .</span></span><span style="background: black; border: 1pt none windowtext; font-size: 11.5pt; line-height: 115%; padding: 0cm;"><br style="-webkit-transition: all 0.5s ease; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;" />
<br style="-webkit-transition: all 0.5s ease; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;" />
</span><span style="background: black; border: 1pt none windowtext; font-size: 11.5pt; line-height: 115%; padding: 0cm;"><span style="-webkit-transition: all 0.5s ease; background-position-x: 0px; background-position-y: 0px; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;">China
has per media will be supplying 6 conventional attack submarine of Qing class ,
which will be equipped with a Stirling-cycle AIP system and will be able to
carry up to three nuclear warhead-carrying CJ-10K LACMs each. The double-hulled
Qing-class SSK, with a submerged displacement close to 3,600 tonnes, bears a
close resemblance to the Russian Type 636M SSK, and features hull-retractable
foreplanes and hydrodynamically streamlined sail.</span></span><span style="background: black; border: 1pt none windowtext; font-size: 11.5pt; line-height: 115%; padding: 0cm;"><br style="-webkit-transition: all 0.5s ease; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;" />
<br style="-webkit-transition: all 0.5s ease; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;" />
</span></span><a href="http://4.bp.blogspot.com/-ohkFXITqx9E/VUGy4SPx-iI/AAAAAAAAAqs/kjOl4Gp4P8k/s1600/CHINESE%2BSUBS.png" imageanchor="1" style="clear: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="320" src="http://4.bp.blogspot.com/-ohkFXITqx9E/VUGy4SPx-iI/AAAAAAAAAqs/kjOl4Gp4P8k/s1600/CHINESE%2BSUBS.png" width="193" /></a><span style="font-family: Trebuchet MS, sans-serif;"><span style="background: black; border: 1pt none windowtext; font-size: 11.5pt; line-height: 115%; padding: 0cm;"><span style="-webkit-transition: all 0.5s ease; background-position-x: 0px; background-position-y: 0px; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;">Experts
suggests that Pakistan’s nuclear submarine is likely to be based on the<span class="apple-converted-space"> </span><b style="-webkit-transition: all 0.5s ease; background-position-x: 0px; background-position-y: 0px; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;">Qing Class Chinese SSK</b>. highly advanced electric
propulsion system of Qing Class Chinese SSK will able Pakistan to replace
diesel engine power generation with a nuclear power plant.</span></span><span style="background: black; border: 1pt none windowtext; font-size: 11.5pt; line-height: 115%; padding: 0cm;"><br style="-webkit-transition: all 0.5s ease; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;" />
<br style="-webkit-transition: all 0.5s ease; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;" />
</span><span style="background: black; border: 1pt none windowtext; font-size: 11.5pt; line-height: 115%; padding: 0cm;"><span style="-webkit-transition: all 0.5s ease; background-position-x: 0px; background-position-y: 0px; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;">Pakistan
also has the expertise of submarine construction , with potential help may have
been the transfer of technology from France with the<span class="apple-converted-space"> </span><b style="-webkit-transition: all 0.5s ease; background-position-x: 0px; background-position-y: 0px; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;">Agosta 90B submarine</b><span class="apple-converted-space"> </span>purchase. A number of key technologies
were transferred including design and development skills and tools. Building of
hulls and experience with Western subsystems, many of which are used in the
French nuclear submarines would help the<span class="apple-converted-space"> </span><b style="-webkit-transition: all 0.5s ease; background-position-x: 0px; background-position-y: 0px; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;">Pakistani
SSN</b><span class="apple-converted-space"> </span>/<span class="apple-converted-space"> </span><b style="-webkit-transition: all 0.5s ease; background-position-x: 0px; background-position-y: 0px; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;">SSBN</b>.</span></span><span style="background-attachment: initial; background-clip: initial; background-color: black; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; line-height: 115%;"><br style="-webkit-transition: all 0.5s ease; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;" />
</span><a href="https://www.blogger.com/null" name="more" style="-webkit-transition: all 0.5s ease; background-position: 0px 0px; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;"></a><span style="background: black; border: 1pt none windowtext; font-size: 11.5pt; line-height: 115%; padding: 0cm;"><br style="-webkit-transition: all 0.5s ease; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;" />
<span style="background-position: 0px 0px; box-sizing: border-box; outline: 0px;"><br style="-webkit-transition: all 0.5s ease; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;" />
</span><span style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 1pt none windowtext; font-size: 11.5pt; line-height: 115%; padding: 0cm;"><span style="background-position: 0px 0px; box-sizing: border-box; outline: 0px;">Pakistan
with expertise and transfers of technology from China , will be able to field
their first nuclear submarine in next 5 to 8 years and brand it “Indigenous “.
But experts have difference of opinion on usage of this submarine in both
forces , While Nuclear Submarine in Indian navy will complete Nuclear 2nd
strike option for India , but Pakistani nuclear submarine might be built to
attack prized Indian Aircraft carriers in case of conflict . India who will
have 3 or more fleet of aircraft carriers in near future will always be
Pakistani navies prime target , even in 1971 Indo-Pak war , Indian aircraft
carrier was always a prize target for them .</span></span></span></span><span style="color: white; mso-themecolor: background1;"><o:p></o:p></span></span><br />
<span style="color: #cccccc;"><span style="font-family: Trebuchet MS, sans-serif;"><span style="background: black; border: 1pt none windowtext; font-size: 11.5pt; line-height: 115%; padding: 0cm;"><span style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 1pt none windowtext; font-size: 11.5pt; line-height: 115%; padding: 0cm;"><span style="background-position: 0px 0px; box-sizing: border-box; outline: 0px;"><br /></span></span></span></span>
</span><br />
<div style="text-align: center;">
<span style="color: #cccccc; font-family: Trebuchet MS, sans-serif; font-size: large;">JF 17 - THUNDER STORY</span><br />
<div style="text-align: left;">
<span style="color: #cccccc; font-family: Trebuchet MS, sans-serif; font-size: large;"><br /></span></div>
<div class="MsoListParagraph" style="margin: 0cm 0cm 0.0001pt; text-align: left;">
<span style="color: #cccccc;"><span style="font-family: "Trebuchet MS","sans-serif"; line-height: 107%; mso-bidi-font-size: 13.5pt;">Pakistan will
acquire 110 latest JF-17 Thunder fighter jets from China as the two
countries forge closer economic and defence cooperation following President Xi
Jinping's visit here earlier this week, a media report said today. Radio
Pakistan reported that China will deliver the first batch of 50 jets over a
period of three years.The Head of Chinese Aircraft Industry told a
Chinese daily that under the contract signed between the two countries,
Pakistan will receive a total of 110 JF-17 Thunder fighter aircraft from China.
It is not clear when the delivery of the remaining 60 jets will be completed.
The JF-17 Thunder is also built in Pakistan as China has already transferred
its technology. But Pakistan needs more fighter jets at faster pace due to its
fight against Taliban militants. Xi also launched a $46 billion economic corridor
to link China's western region to Pakistan's Gwadar port on the Arabian Sea.
During Xi's visit, a fleet of eight JF-17 jets escorted the special
aircraft of the Chinese president when it entered Pakistan's airspace. The two
countries signed 51 agreements to boost economic cooperation during Xi's trip.</span><span style="font-family: "Trebuchet MS","sans-serif"; line-height: 107%; mso-bidi-font-family: Arial; mso-bidi-font-size: 13.5pt;">Earlier, reports said China would provide eight
latest submarines to Pakistan, more than doubling its fleet, in a deal worth
$4-5 billion.</span></span><br />
<span style="color: #cccccc; font-family: "Trebuchet MS","sans-serif"; line-height: 107%; mso-bidi-font-family: Arial; mso-bidi-font-size: 13.5pt;"><br /></span></div>
</div>
<div class="MsoNormal">
<span style="color: #cccccc; font-family: Trebuchet MS, sans-serif;"><span style="background: black; border: none windowtext 1.0pt; color: white; font-family: "Trebuchet MS","sans-serif"; mso-border-alt: none windowtext 0cm; mso-highlight: black; mso-shading: white; mso-themecolor: background1; padding: 0cm;">Pakistan has witnessed new defense acquisitions in this
decade than any other, and in the center of it all is the new fighter which was
designed by China with partial funding from Pakistan. It is formally known as
JF-17 Thunder. When the fighter was in development, Pakistani online
communities were jumping with excitement comparing it with its arch rival
India’s modern combatants Su-30MKI, Mig-29S & Mirage-2000H. There were claims
of it featuring western Radars and long range missiles, & Chinese ordering
some due to its superior capabilities. But the reality is far from it.<br style="-webkit-transition: all 0.5s ease; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;" />
<a href="http://1.bp.blogspot.com/-3DYPFB0effM/VUHEg1dlQII/AAAAAAAAAq8/1OP94aIq1uA/s1600/jf-17_0.jpg" imageanchor="1" style="clear: right; margin-bottom: 1em; margin-left: 1em; text-align: center;"><img border="0" height="272" src="http://1.bp.blogspot.com/-3DYPFB0effM/VUHEg1dlQII/AAAAAAAAAq8/1OP94aIq1uA/s1600/jf-17_0.jpg" width="400" /></a><br style="-webkit-transition: all 0.5s ease; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;" />
China having spent significant amount of money into a fighter which it is never
going to use, most probably forced Pakistan to accept its avionics to offset
some its development costs. Chinese who are known for their self reliance first
and quality next, are further downgrading JF-17s capabilities with their poorly
copy-pirated avionics. Along with their dubious weapons, any chance of JF-17
maintaining BVR edge over its adversary’s front-line combatants, for the most
part, is unlikely.<br style="-webkit-transition: all 0.5s ease; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;" />
<br style="-webkit-transition: all 0.5s ease; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;" />
Even in close combat JF-17 lacks what it takes to win the fight. Its spine,
& wings bearing resemblance(in wing twist & wing area) to a fighter
which china knows inside out, the J-7, doesn’t have wing twist nor does it have
enough area to provide a low wing loading. Its performance during low speeds
and high alphas would be very dangerous for the pilot indeed. It has a Maximum
G loading of only 8, as claimed by PAC. Its thrust to weight ratio is another
negative point. When its arch rival, the Indian Air Force(IAF), was overtly
critical of Tejas for having a low Thrust to Weight ratio, maybe they should
have compared it with JF-17 which has even less, even with Emergency Thrust.
Pakistan Aeronautical Complex(PAC) proudly displays the RD-93’s “Combat thrust
with afterburner” as 19,200lbf, while the whole defense community knows RD-93’s
thrust is 18,300lbf and the only real thrust increase was achieved with its new
re-designed Sea Wasp RD-33MK engines- which has been explicitly stated by
Klimov. However, Klimov’s RD-33 series 3(or series 2?), whose avatar is RD-93
with re-positioned Gear boxes, has a provision for emergency thrust which
Klimov says can produce 8700kgf(~19200lbf) in their officially released
document. They further state that as “Take-off emergency mode”. So the
mentioned thrust can only be used during take-off where the Air is denser, and
also only during emergency situations since it would seriously lower the
engine’s lifespan. This is a far cry from PAC's “Combat thrust” claim. Why this
is being stated is because, the engines(bought by the Chinese after
pressurizing the Russians) are the only non-Chinese & non-Pakistani component,
and even there they have lied about its capabilities. Hence the true, lower
than published, specifications of Chinese and Pakistani components are open to
any one’s guesses. In any case, the close combat capabilities of JF-17 is below
average or average at best.<br style="-webkit-transition: all 0.5s ease; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;" />
<br style="-webkit-transition: all 0.5s ease; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;" />
The next Achilles heal is JF-17’s speed. For a good interception, speed is an
important criteria. However JF-17’s max speed is Mach 1.6 which is claimed by
PAC. This indicates that JF-17 is draggier. When compared, their F-7s(Reverse
engineered Mig-21s) have higher speed of mach 2+ with a lower thrust engine.
The IAF fighters which it is going to face, all have speeds greater than the
Thunder.<br style="-webkit-transition: all 0.5s ease; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;" />
<br style="-webkit-transition: all 0.5s ease; box-sizing: border-box; outline: 0px; transition: all 0.5s ease;" />
So why is Pakistan still inducting more and more of this fighter, which its
critics increasingly call it Junk Fighter – 17 ? The answer may lie with
Pakistan’s recent trauma & its psyche. Having sanctioned by the U.S, the
star of their airforce, the F-16s were severally hit by lack of spares and most
of the time grounded. The other 2 sources to procure modern Aircraft- Russia,
have been sealed off due to the legacy of Soviet era friendship, current market
in India & India’s pressure- and the other source, the European Union, for
their extremely high costs. The third source, the Chinese, at that time were
still flying their reverse engineered Mig-21s. In those circumstances, “Never
again” was the motto of PAF and it instantly jumped into the project of further
reversing the reverse engineered Mig-21, known as Super-7(a.k.a Super F-7) to
obtain self reliance. The result of that project is the JF-17. So the decision
was appropriate at that time, in those situations. However now with China
having developed the J-10, and going by the recent reports of offering
ToT(Transfer of Technology) to Pakistan, one wonders why are the Pakistanis
still ordering 250 planes. Is the trauma of F-16 sanctions so high that they
don’t even trust the Chinese? This can't be the case because they still need
the Chinese to procure the RD-93 engines for them, even after the Chinese
transfer all their associated JF-17 tech to PAC. So why...? The answer lies
with their ego/psyche rather than the trauma. Unlike J-10, Pakistan shares
copyright to JF-17 and that, for some weird reason, gives them something to
celebrate about. This is strange for the reason, war machines are for fighting
wars and achieving tactical & strategic objectives, not for gloating about
who holds the copyrights. When JF-17 comes face to face with MKI or SMT, there
won’t be much to celebrate about it, or the few millions if at all it earns
though exports. In the end, it’s all about defending ones homeland from the
enemy, and not copyrights.</span><span style="color: white; font-family: "Trebuchet MS","sans-serif"; mso-themecolor: background1;"><o:p></o:p></span></span></div>
<span style="font-family: Trebuchet MS, sans-serif;"><span style="background: black; border: 1pt none windowtext; font-size: 11.5pt; line-height: 115%; padding: 0cm;"><span style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 1pt none windowtext; font-size: 11.5pt; line-height: 115%; padding: 0cm;"><span style="background-position: 0px 0px; box-sizing: border-box; color: #cccccc; outline: 0px;"><br /></span></span></span></span>
<span style="font-family: Trebuchet MS, sans-serif;"><span style="background: black; border: 1pt none windowtext; font-size: 11.5pt; line-height: 115%; padding: 0cm;"><span style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 1pt none windowtext; font-size: 11.5pt; line-height: 115%; padding: 0cm;"><span style="background-position: 0px 0px; box-sizing: border-box; outline: 0px;"><br /></span></span></span></span></div>
<!-- Blogger automated replacement: "https://images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=http%3A%2F%2F3.bp.blogspot.com%2F-yIdHrCDoZro%2FVUGy3rkN9qI%2FAAAAAAAAAqk%2FsCQLMsw7Hfw%2Fs1600%2Fdownload.png&container=blogger&gadget=a&rewriteMime=image%2F*" with "https://3.bp.blogspot.com/-yIdHrCDoZro/VUGy3rkN9qI/AAAAAAAAAqk/sCQLMsw7Hfw/s1600/download.png" --><!-- Blogger automated replacement: "https://3.bp.blogspot.com/-yIdHrCDoZro/VUGy3rkN9qI/AAAAAAAAAqk/sCQLMsw7Hfw/s1600/download.png" with "https://3.bp.blogspot.com/-yIdHrCDoZro/VUGy3rkN9qI/AAAAAAAAAqk/sCQLMsw7Hfw/s1600/download.png" -->Sidharth K Menonhttp://www.blogger.com/profile/11412252277913740873noreply@blogger.comtag:blogger.com,1999:blog-7965927633581367449.post-37266490243067638322015-03-21T14:23:00.000+05:302015-04-25T11:35:01.683+05:30INDIAN JOINT SPECIAL FORCES COMMAND<div style="text-align: center;">
<a href="http://4.bp.blogspot.com/-R4BhsKgqEMw/VQ0xPQfjH2I/AAAAAAAAApo/DbyU2V3vr8A/s1600/b48f23d20bdc6540b3cdbca09ddefb83.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://4.bp.blogspot.com/-R4BhsKgqEMw/VQ0xPQfjH2I/AAAAAAAAApo/DbyU2V3vr8A/s1600/b48f23d20bdc6540b3cdbca09ddefb83.jpg" height="133" width="200" /></a><span style="background-color: black; color: white; font-family: Trebuchet MS, sans-serif; font-size: large;">J-SOC UPDATES</span></div>
<span style="font-family: Trebuchet MS, sans-serif;"><span style="background-color: white; color: #444444; font-size: x-small;"><br /></span>
<span style="background-color: black;"><span style="color: #444444;">T</span>he newly announced, Joint Special Operations Command (J-SOC) should not take ‘more than five years’ to take real shape. Slated to be under the Integrated Defence Services headquarters, the joint command will include the existing special forces of the Indian army, navy and air force. This was stated by a senior military official of the IDS HQ to the Millennium Post recently.</span></span><br />
<span style="background-color: black;"><span style="font-family: Trebuchet MS, sans-serif;"><br /></span>
<span style="font-family: Trebuchet MS, sans-serif;">The tasks in this interregnum are developing the ‘overall operations philosophy, ‘operational command structure,’ and the mechanics of creating a ‘joint command’ intermingling the three services.</span></span><br />
<a href="http://1.bp.blogspot.com/-jhtg5OB085Y/VQ0w0TMZRHI/AAAAAAAAApY/X1hZWNWfvj4/s1600/super-hercules.jpg" imageanchor="1" style="background-color: black; clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://1.bp.blogspot.com/-jhtg5OB085Y/VQ0w0TMZRHI/AAAAAAAAApY/X1hZWNWfvj4/s1600/super-hercules.jpg" height="213" width="320" /></a><span style="background-color: black;"><span style="font-family: Trebuchet MS, sans-serif;"><br /></span>
<span style="font-family: Trebuchet MS, sans-serif;">‘It needs the required focus and the required resources,’ the officer said. But he debunks the thought that it will need the central government to allocate ‘fresh funds.’ Saying that the joint command will be dominated by the army, the main resources that are readily deployed by the force for use of their special commandos, primarily the para commandos, will be transferred to the joint SFC.</span></span><br />
<span style="background-color: black;"><span style="font-family: Trebuchet MS, sans-serif;"><br /></span>
<span style="font-family: Trebuchet MS, sans-serif;">For example, the new C-130J aircraft's </span></span><span style="background-color: black; font-family: 'Trebuchet MS', sans-serif;">, which is now under the Indian Air Force, will have to be transferred to the J-SOC, the official said.</span><br />
<span style="background-color: black;"><span style="font-family: Trebuchet MS, sans-serif;"><br /></span>
<span style="font-family: Trebuchet MS, sans-serif;">Also the new inductions of the more specialized equipment's will be sourced by the army. The basic structure of the command will be evolved out of the command framework of the army. The forces will use the existing training establishments of the special forces. But if a need is felt, new institutions will be established.</span></span><br />
<span style="background-color: black;"><span style="font-family: Trebuchet MS, sans-serif;"><br /></span>
<span style="font-family: Trebuchet MS, sans-serif;">The preliminary work for developing papers on these parameters has begun at the IDS HQ. These documents will be circulated amongst the individual service headquarters and their opinions sought.</span></span><br />
<span style="background-color: black;"><span style="font-family: Trebuchet MS, sans-serif;"><br /></span>
</span><a href="http://1.bp.blogspot.com/-PC54jBKrwG8/VQ0w2Uecm1I/AAAAAAAAApg/N4au9Ulh_Qw/s1600/C-130J_Super_Hercules_India-formation.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><span style="background-color: black; color: black;"></span></a><span style="background-color: black; font-family: Trebuchet MS, sans-serif;">Considering that these services will have to eventually cede control over men and materiel, the task of creating a consensus will not be easy. The force structure of the J-SOC will include, besides the Paras, and Para Special Forces, the Marine Commandos of the navy and the Garud commandos of the air force. The ‘Ghatak’ special forces of the infantry battalions of the army will also be assimilated within the J-SOC. The long overdue Command, will have a major role to play in the non-conventional and fourth generation warfare.</span><br />
<span style="background-color: black;"><span style="font-family: Trebuchet MS, sans-serif;"><br /></span>
<span style="font-family: Trebuchet MS, sans-serif;">The three new joint commands were announced in October last: the other two are aerospace and cyber security commands. With the addition of these three, the total number of commands under IDS HQ has risen to five.</span></span><br />
<span style="background-color: black;"><span style="font-family: Trebuchet MS, sans-serif;"><br /></span>
<span style="font-family: Trebuchet MS, sans-serif;">The other two existing joint commands are of the Special Forces, who are tasked to wage nuclear and missile warfare, and the Andaman and Nicobar command that oversees the operations in the Indian Ocean. Both these commands being very secretive and very little are known about the various activities that include, intelligence, surveillance and reconnaissance.</span></span><br />
<span style="background-color: black;"><span style="font-family: Trebuchet MS, sans-serif;"><br /></span>
</span><br />
<div style="line-height: 20px;">
<span style="background-color: black; font-family: Trebuchet MS, sans-serif;"> Indian armed forces are now finally mulling the creation of three new unified commands to effectively tackle the rapidly expanding security threats and challenges in the fields of space, cyberspace and special operations.</span></div>
<div style="line-height: 20px;">
<span style="background-color: black; font-family: Trebuchet MS, sans-serif;"><br /></span></div>
<div style="line-height: 20px;">
<a href="https://1.bp.blogspot.com/-PC54jBKrwG8/VQ0w2Uecm1I/AAAAAAAAApg/N4au9Ulh_Qw/s1600/C-130J_Super_Hercules_India-formation.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://1.bp.blogspot.com/-PC54jBKrwG8/VQ0w2Uecm1I/AAAAAAAAApg/N4au9Ulh_Qw/s1600/C-130J_Super_Hercules_India-formation.jpg" height="175" width="320" /></a><span style="background-color: black; font-family: Trebuchet MS, sans-serif;">The brass of Army, Navy and IAF are "informally'' discussing the "contours'' of the cyber, aerospace and special operations commands, which will synergize efforts and assets of the three services in these "critical areas'', sources said.</span></div>
<div style="line-height: 20px;">
<span style="background-color: black; font-family: Trebuchet MS, sans-serif;"><br /></span></div>
<div style="line-height: 20px;">
<span style="background-color: black; font-family: Trebuchet MS, sans-serif;">Once the "formal joint proposal'' of the three Services is finalized, IAF chief Air Chief Marshal N A K Browne will take it up with the government in his capacity as the chairman of the chiefs of staff committee. In fact, the "urgent need'' for the three new commands is likely to come up during the Combined Commanders' Conference to be addressed by the Prime Minister on October 19.</span></div>
<div style="line-height: 20px;">
<span style="background-color: black; font-family: Trebuchet MS, sans-serif;"><br /></span></div>
<div style="line-height: 20px;">
<span style="background-color: black; font-family: Trebuchet MS, sans-serif;">The prevalent view is that a three-star Army officer (Lt General) should head the Special Operations Command, while an equivalent rank from IAF (Air Marshal) can steer the Aerospace Command. The Cyber Command, in turn, will be headed by a Vice-Admiral from the Navy.</span></div>
<div style="line-height: 20px;">
<span style="background-color: black; font-family: Trebuchet MS, sans-serif;"><br /></span></div>
<div style="line-height: 20px;">
<span style="background-color: black; font-family: Trebuchet MS, sans-serif;">This means the commanders-in-chief of the three new commands will "not be rotated'' among the Army, Navy and IAF. India's two existing tri-Service commands - the Strategic Forces Command and the Andaman & Nicobar Command - as well as the integrated defence staff follow a "rotational'' policy at present.</span></div>
<div style="line-height: 20px;">
<span style="background-color: black; font-family: Trebuchet MS, sans-serif;"><br /></span></div>
<div style="line-height: 20px;">
<span style="background-color: black; font-family: Trebuchet MS, sans-serif;">"It will ensure the new command in question can be 'mothered' by a single Service on a continuous basis. The Army, after all, has domain expertise in special operations, IAF in aerospace and Navy in cyber and information technology. The commands will draw elements, assets and manpower from all the three services as well as the government below the three-stars,'' said a source.</span></div>
<div style="line-height: 20px;">
<span style="background-color: black; font-family: Trebuchet MS, sans-serif;"><br /></span></div>
<div style="line-height: 20px;">
<span style="background-color: black; font-family: Trebuchet MS, sans-serif;">The Indian defence establishment certainly needs to be geared for battles in space and cyberspace after the first three military domains of land, air and sea. It also needs to bring together the disparate special forces in Army, Navy, IAF and other forces under a unified command and control structure to execute strategic operations in tune with national security objectives.</span><br />
<span style="background-color: black; font-family: Trebuchet MS, sans-serif;"><br /></span></div>
<div style="line-height: 20px;">
<span style="background-color: black; font-family: Trebuchet MS, sans-serif;">China, for instance, is taking huge strides on the space and cyberspace fronts.</span></div>
<div style="line-height: 20px;">
<span style="background-color: black; font-family: Trebuchet MS, sans-serif;">Cyber warfare, too, is a frontline military priority for China, with its "hacker brigades'' regularly breaking into computer networks of countries like India, US, the UK and Germany.</span></div>
<!-- Blogger automated replacement: "https://images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=http%3A%2F%2F1.bp.blogspot.com%2F-PC54jBKrwG8%2FVQ0w2Uecm1I%2FAAAAAAAAApg%2FN4au9Ulh_Qw%2Fs1600%2FC-130J_Super_Hercules_India-formation.jpg&container=blogger&gadget=a&rewriteMime=image%2F*" with "https://1.bp.blogspot.com/-PC54jBKrwG8/VQ0w2Uecm1I/AAAAAAAAApg/N4au9Ulh_Qw/s1600/C-130J_Super_Hercules_India-formation.jpg" --><!-- Blogger automated replacement: "https://1.bp.blogspot.com/-PC54jBKrwG8/VQ0w2Uecm1I/AAAAAAAAApg/N4au9Ulh_Qw/s1600/C-130J_Super_Hercules_India-formation.jpg" with "https://1.bp.blogspot.com/-PC54jBKrwG8/VQ0w2Uecm1I/AAAAAAAAApg/N4au9Ulh_Qw/s1600/C-130J_Super_Hercules_India-formation.jpg" -->Sidharth K Menonhttp://www.blogger.com/profile/11412252277913740873noreply@blogger.comtag:blogger.com,1999:blog-7965927633581367449.post-49964967001622665782014-11-19T21:05:00.000+05:302015-03-29T17:03:21.631+05:30ANOTHER REPOST FROM A K DOVAL [FMR IB DIRECTOR]<div align="center" class="MsoNormal" style="margin: 0in 0in 10pt; text-align: center;">
<span style="font-family: "Trebuchet MS",sans-serif;"><b style="mso-bidi-font-weight: normal;"><span style="font-family: 'Times New Roman','serif'; font-size: xx-small; line-height: 115%; mso-bidi-font-size: 15.0pt;">"INDIAN INTELLIGENCE - THOUGHTS ON NEW APPROACH TO CHANGE"</span></b></span></div>
<div align="center" class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt; text-align: center;">
<span style="font-family: "Trebuchet MS",sans-serif;"><span style="font-family: 'Times New Roman','serif'; font-size: xx-small; line-height: 150%; mso-bidi-font-size: 15.0pt;">Shri Ajit Doval </span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt; text-align: justify; text-indent: 31.2pt;">
<span style="font-family: "Trebuchet MS",sans-serif;"><a href="http://3.bp.blogspot.com/-ocU4HjeoEQQ/VGy4s_MOE_I/AAAAAAAAAo0/4KBnKk00oIs/s1600/INDIAN%2BFLAG.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://3.bp.blogspot.com/-ocU4HjeoEQQ/VGy4s_MOE_I/AAAAAAAAAo0/4KBnKk00oIs/s1600/INDIAN%2BFLAG.jpg" height="133" width="200" /></a><span style="line-height: 150%;">In
constant race against time and ever searching for new ideas to defeat
ingenuity of their adversaries, for intelligence agencies to change is
not an option but a compulsive necessity. Regrettably, those who change
only when they have to, pay an un-affordably high price. Worse, it is
often preceded by a nation bruised if not bled. Imaginative changes,
innovation in tools of intelligence generation and analysis and constant
up-gradation of capacities only can keep them a step ahead of their
adversaries. The paper analyses the dynamics of change in the Indian
context and some of the new realities that Indian intelligence need to
factor in for designing its strategy for change. </span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt; text-align: justify; text-indent: 31.2pt;">
<a href="http://3.bp.blogspot.com/-Z13RX2E9-qc/VGy4cSR2qGI/AAAAAAAAAos/LHa1_QaV6zs/s1600/A%2BK%2BDOVAL.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/-Z13RX2E9-qc/VGy4cSR2qGI/AAAAAAAAAos/LHa1_QaV6zs/s1600/A%2BK%2BDOVAL.jpg" height="200" width="176" /></a><span style="font-family: "Trebuchet MS",sans-serif;"><span style="line-height: 150%;">Intelligence
agencies, consciously or otherwise, pursue three discernable patterns
of change. First is the evolutionary pattern. Accounting for most of the
changes, these are slow, routine and continuing in nature.<span style="mso-spacerun: yes;"> </span>They
are mostly triggered by contemporaneous developments leading to
resetting of priorities, leadership changes in organizational
hierarchies and evolving pressures within the organizations to address
professional, structural or administrative problems. Though mostly going
un-noticed, these changes are vital as they keep intelligence agencies
progressive, time consistent and forward looking through constant course
correction and problem solving. <span style="mso-spacerun: yes;"> </span>Most
of these changes are effected within the organization and do not impact
on working arrangements with other organs of the government or involve
change in law or government’s Rules of Business. Though known to few,
the score board of Indian Intelligence, particularly the Intelligence
Bureau, on this count has been outstanding. Even in the absence of
additional resources, new empowerments and living with security
insensitive, if not illiterate, culture of governance, it has been able
to bring about changes in real time to face new problems of
insurgencies, terrorism, espionage, border intrusions, socio-political
conflicts etc. even in remotest parts of the country. Decisional
autonomy enjoyed by the Director Intelligence Bureau (DIB), his
proximity to political leadership, a strong culture of loyalty and
esprit de corps within the organization besides quality leadership at
various levels have made this possible. However, the great contribution
of evolutionary changes notwithstanding, it needs to be underlined that
the phenomenon operates within a limited band-width and cannot address
fundamental infirmities. It is unfit to bring about changes that have a
long gestation period, involve high expenditure, require major
technological or structural changes or have legal implications. It also
cannot alter basic approaches towards security management of which
intelligence is only one component, particularly in a ruckus democracy
like India. One down side of such in-house innovations and
improvisations is that it makes the governments complacent mistaking the
success of fire fighting efforts as a solution to the cause of fire.
Quite often, the fore warnings and ignored pleas for action to offset
the impending threats in India go unaccounted and <span style="mso-spacerun: yes;"> </span>unpunished, making systemic failures revisit with vengeance. </span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt; text-align: justify; text-indent: 31.2pt;">
<span style="font-family: "Trebuchet MS",sans-serif;"><span style="line-height: 150%;">The
second set of changes may be called ‘reformist’. They are triggered by
some major reverses or failures forcing the governments, either on their
own volition or under pressure of public opinion, to bring about
fundamental changes. Changes following the attack on Pearl Harbor and
post war emergence of Communist threat to the US, India’s 1962 Chinese
debacle, post 9/11 threat of jehadi terrorism etc. fall in this
category. Often the governments appoint inquiry commissions or experts
committees to study the failures, analyze the causes and recommend
reforms. Warren Commission on the assassination of President Kennedy,
Senate Committee on the Watergate Scandal, Shah Commission on the role
of intelligence during emergency in India etc. are illustrative. They
examine not only the internal workings of the organization but also
functional relativity with organizations and systems outside the
intelligence community. Public committees serve a very useful purpose as
they are able to examine and evaluate the functioning of intelligence
agencies in the broader context of political environment, systems of
governance and legalo-constitutional framework. However, at times, meant
only to serve political purpose or silence mounting public criticism,
these committees are less than objective and swayed by
extra-professional considerations. <span style="mso-spacerun: yes;"> </span>They
also often get over influenced by populist perceptions of the causes
and remedies which are not always correct. Consequently, their findings
and recommendations do not always lead to improvements in the efficiency
and effectiveness of intelligence agencies. The Shah Commission’s
findings and recommendations are a case in point. On the contrary,
committees on reforms that are led by the professionals are able to come
out with more specific, incisive and doable recommendations. The
Shankar Nair Committee report, despite its limited mandate on
intelligence reforms, came out with some highly commendable
recommendations. </span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt; text-align: justify; text-indent: 31.2pt;">
<span style="font-family: "Trebuchet MS",sans-serif;"><span style="line-height: 150%;">The
third category comprise of changes that are brought about by
intelligence agencies on their own or in conjunction with the larger
security set up of the country envisioning futuristic threats and
challenges. Transformational in character, they involve constructing
future scenarios, assessing the environment in which intelligence
agencies will have to operate and calculating gaps between existing
capacities and these required to meet emerging threats. <span style="mso-spacerun: yes;"> </span>This
exercise necessitates intensive study of futuristic trends, their
implications for national security, analyzing policy options and
formulating strategy for change. Forecasting intelligence needs of the
country, it should attempt to architect new doctrines, suggest
structural changes, aim at optimization of resources and examine
administrative<span style="mso-spacerun: yes;"> </span>and legislative
changes required for empowerment of intelligence agencies. While
intelligence agencies in developed countries frequently attempt this
exercise, the Indian intelligence has rarely made a conscious effort in
this direction. One such exercise was carried out in the late eighties
in the Intelligence Bureau on the initiative of Shri M. K. Narayanan,
just before he was tipped to take over as the chief.</span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt; text-align: justify; text-indent: 31.2pt;">
<span style="font-family: "Trebuchet MS",sans-serif;"><span style="line-height: 150%;"><span style="mso-spacerun: yes;"> </span>At
national level, the Report of the Group of Ministers on National
Security in 2001, was the first macro level attempt in this direction.
Though it came as an aftermath of Subramaniam Committee report on
Kargil, it was an integrated futuristic attempt to restructure national
security under four categories namely, defence, intelligence, internal
security and border management. It came with some outstanding
recommendations but unfortunately with the change in regime the momentum
of change could not be sustained. One of the major recommendations,
that was lost sight of, pertained to the review of the national security
by a high powered Groups of Ministers every five years. If implemented,
there would have been perspective action plans for intelligence and
other reforms in 2006 and 2011. For this category of changes to be
really effective, a political will is necessary, that requires serious
and enthusiastic involvement of the senior political leadership of the
country. Unfortunately, in India, national security is a low agenda item
for the politicians except when the nation finds itself in the midst of
a serious security crisis. Unfortunately, that is the most ineffective
setting for change. In an ideal situation, the government should develop
a long term bi-partisan consensus for these transformational changes. </span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt; text-align: justify; text-indent: 31.2pt;">
<span style="font-family: "Trebuchet MS",sans-serif;"><span style="line-height: 150%;">It
needs to be emphasized that both the evolutionary and reformist
approaches to change though important by themselves are inadequate to
meet threats of the future. These approaches to change are premised on
the assumption that if shortcomings of the past were redressed the
future would be safe. They allow us to analyse the causes of failure,
examine existing systems and processes, and suggest their readjustment
to prevent their recurrence. The broader legal, administrative and
security frameworks are taken for granted; presuming that intelligence
would be able to deliver the moon only through changes within – every
time everywhere. Unfortunately, this is an erroneous premise. At best,
they equip the country to win the war that is already over.</span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt; text-align: justify; text-indent: 31.2pt;">
<span style="font-family: "Trebuchet MS",sans-serif;"><span style="line-height: 150%;">Reforms
exclusively based on experience of the past suffer from another
infirmity. It fails to factor in the innovations and transformations
that the adversaries keep on bringing about in their capacities,
resources, strategies, collaborative network, technology, equipment,
targets, modus operandi etc. As former US Secretary of Defence, Donald
Rumsfeld, reflecting on the 21<sup>st</sup> century threats observed
that the changes will have to be fast and constant to “defend against
the unknown, the uncertain, the unseen and the unexpected”. These sets
of changes though more valid in operational areas of intelligence
generation like trade craft, surveillance, penetration, technology
improvisation etc. also have relevance in tools of analysis. </span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt; mso-margin-top-alt: auto; text-align: justify; text-indent: 31.2pt;">
<span style="font-family: "Trebuchet MS",sans-serif;"><span style="line-height: 150%;">Indian
intelligence in next ten years should press into action an integrated
strategy for change incorporating a judicious mix of all the three sets
of changes namely evolutionary, reformist and transformational. In
working out this strategy for change, in addition to its long
conventional experience it may be necessary to factor in some new
emerging realities. <span style="mso-spacerun: yes;"> </span>Following are few such factors that may impact intelligence work in years ahead. </span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt; mso-margin-top-alt: auto; text-align: justify; text-indent: 31.2pt;">
<span style="font-family: "Trebuchet MS",sans-serif;"><span style="line-height: 150%;">Indian Intelligence in times ahead will have to operate under greater public gaze, media scrutiny and accountability regimen<b style="mso-bidi-font-weight: normal;">. </b>It will have to develop capability to operate in a translucent, if not transparent environment.<b style="mso-bidi-font-weight: normal;"> </b>One
of the conventional strengths of the intelligence organizations have
been their ability to operate in a relatively opaque and insulated
environment. It<b style="mso-bidi-font-weight: normal;"> </b>was an
accepted norm that in the larger security interests of the state and
safety of its people, intelligence agencies be allowed to operate
outside the public gaze. Even outside the government, there was a tacit
acceptance of this reality and the media, courts, scholars and analysts
etc.<span style="mso-spacerun: yes;"> </span>implicitly respected this
privilege and were careful not to draw them into public controversies or
expose their activities that might undermine national or public
interest. Criticism was mostly confined to intelligence production when
it was felt that intelligence agencies failed to alert or forewarn the
governments. Except the interested political groups who occasionally
leveled charges of use of intelligence for political purposes, the
intelligence processes by and large remained under a veil of secrecy.
This provided the requisite deniability to the intelligence
professionals even when they had no legal cover to carry out their
secretive functions. </span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt; mso-margin-top-alt: auto; text-align: justify; text-indent: 31.2pt;">
<span style="font-family: "Trebuchet MS",sans-serif;"><span style="line-height: 150%;">The
voluntary restraint exercised was not so much to protect the
intelligence agencies or the governments but more to deny undue
advantage to the enemies of the state, who stood to gain by such
exposures. Today, one of the main sources of intelligence for the
terrorists, spies and saboteurs is media reports. They learn about the
thinking and policies of the government, movements and plans of the
security agencies, details about arrests of their gang members and<span style="mso-spacerun: yes;"> </span>disclosures
made by them, the people and places on the radar of intelligence
agencies etc. through open sources. In addition, media provides wide and
prominent coverage to violent groups and their depredations which
enables them to get wide publicity and achieve the objective of
terrorizing the people. It also enables them to discredit and demoralize
the governments in power - the political objective of perpetrating <span style="mso-spacerun: yes;"> </span>terrorist
actions. The live coverage of Mumbai 26/11 terrorist attack that was
being monitored by mentors of the terrorist group in Karachi, and <span style="mso-spacerun: yes;"> </span>who in turn were directing tactical movements of the terrorists, is a case in point. </span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt; mso-margin-top-alt: auto; text-align: justify; text-indent: 31.2pt;">
<span style="font-family: "Trebuchet MS",sans-serif;"><span style="line-height: 150%;">In times ahead, this problem is going to get further deepened and accentuated.<span style="mso-spacerun: yes;"> </span>Soft
states with open democracies, like India, will find themselves
particularly vulnerable. For political reasons, legal restraints or
advisories to the media will neither be enforceable nor advisable.
Frequency and intensity of front organizations supporting the cause of
anti-national forces, masquerading as human right groups, to put
pressure on the intelligence and security agencies will show a marked
increase. Even, demands for inclusion of intelligence agencies, or at
least part of their activities, covered under Right to Information Act
may find political support. </span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt; mso-margin-top-alt: auto; text-align: justify; text-indent: 31.2pt;">
<span style="font-family: "Trebuchet MS",sans-serif;"><span style="color: black; line-height: 150%;">Unlike in the past when it was not a tabooed subject, intelligence has entered the arena of public discourse. <span style="mso-spacerun: yes;"> </span>We
have to accept the reality as it is and not as we wish it to be. Not
only the intelligence production -- which can be a legitimate matter of
public concern -- but even the processes, structures and systems will
increasingly come under public scrutiny. </span><span style="line-height: 150%;">Demands
for parliamentary oversight, intervention in internal administrative
matters, resistance to legal empowerment, like in the case of National
Counter Terrorism Centre (NCTC), etc. are indicative of the changing
environment. It will be desirable for the Indian intelligence agencies
to start revisiting their systems and making preparations for change
compatible to the future realities without undermining vital national
interest. </span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt; mso-margin-top-alt: auto; text-align: justify; text-indent: 31.2pt;">
<span style="font-family: "Trebuchet MS",sans-serif;"><span style="line-height: 150%;">The
Intelligence agencies should start deliberating on a public interface
mechanism which, in the long run, may even include a media and public
relation exercise. In the way Indian democracy is evolving, it will be
in the national interest to educate the media and have working relation
with it rather than allow it to go haywire for want of knowledge and
authentic information. A well thought out action plan on this count may
take two to three years before it is made operational.</span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt; mso-margin-top-alt: auto; text-align: justify; text-indent: 31.2pt;">
<span style="font-family: "Trebuchet MS",sans-serif;"><span style="line-height: 150%;">Secondly,
it will be desirable to have a group of experienced officers examine
the entire working of the IB and R&AW and re-visit its security
needs through VED-analysis. Through a calibrated strategy it can secure
vital secrets that may impinge on national security while allowing
controlled oversight by parliamentary or other bodies where it will not
hurt the vitals. Besides changes in tradecraft doctrines and practices,<span style="mso-spacerun: yes;"> </span>the
changes will involve whole new regimen of security re-classification,
change in documentation and filing systems, communications, maintenance
of records, weeding out of files etc. Intelligence agencies should be
able to bring about this change in next three to four years. </span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt; mso-margin-top-alt: auto; text-align: justify; text-indent: 31.2pt;">
<span style="font-family: "Trebuchet MS",sans-serif;"><span style="line-height: 150%;">Technology
will have to be another focus area for transformational change. This
has two distinct dimensions in intelligence. First is neutralizing
efforts of the adversaries to acquire and operationalise technologies to
undermine our national security. The second, pertains to up-gradation
and integration of state of art technologies by us to enhance our own
defensive and offensive capacities.</span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt; mso-margin-top-alt: auto; text-align: justify; text-indent: 31.2pt;">
<span style="font-family: "Trebuchet MS",sans-serif;"><span style="line-height: 150%;">The
rate at which terrorists, spies, saboteurs and hostile intelligence
agencies are acquiring new technologies pose a serious threat. These
include a whole ambit of weapon systems, explosives, communication
equipments, defeat systems against conventional intelligence tradecraft <span style="mso-spacerun: yes;"> </span>etc.
Recently, the use of social media for creating lawlessness and inciting
people to violence has underlined scope of technology driven threats.
Incessant efforts being made by the jehadi terrorists to acquire<span style="mso-spacerun: yes;"> </span>radioactive
explosive devices (dirty bombs) is a matter of serious concern. With
the conditions of instability in Af-Pak region getting accentuated after
2014 drawdown, ideologically motivated Islamists taking charge of
senior positions in Pakistan Army and intelligence setups, deepening
collaborative linkages of ISI with home grown radical groups like Indian
Mujahedeen in India the intelligence challenges will get compounded
manifold. Terrorist groups are also fast acquiring capabilities of safe
communication which will render the task of interception quite
difficult. In the area of defence, fast technological up-gradation
through heavy investments being made by hostile intelligence agencies
like ISI of Pakistan, MSS of China etc. in electronic warfare, offensive
cyber capabilities, space surveillance, maritime encirclement of India
etc. will have to be factored in for developing counter capabilities.</span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt; mso-margin-top-alt: auto; text-align: justify; text-indent: 31.2pt;">
<span style="font-family: "Trebuchet MS",sans-serif;"><span style="line-height: 150%;">Another
aspect of technology in intelligence work relates to acquisition,
improvisation and integration of new technologies. Though its necessity
is disputed by none, the intricacies are understood by few. India’s
strategic partnership with the US and greater security cooperation with
the West notwithstanding, no developed country will share real state of
the art intelligence technologies with India, particularly as a total
system. Even where the second rung technologies are made available they
are fraught with danger as the suppliers will insist on not transferring
the codes or allowing us to change them without their involvement.
Secrecy of our systems in this dispensation is seriously undermined.
India will do well to take advantage of the offset clause in acquisition
of defence equipment and use part of it for indigenous production of
intelligence equipment. With India purchasing over $100 billion worth of
defence equipments in the next seven to eight years, 30% of it under
the offset clause provides us<span style="mso-spacerun: yes;"> </span>a
huge investment opportunity for this. Development of internal Research
and Development capabilities are extremely expensive and time consuming.
Unfortunately, even in areas where such initiatives were viable, we
were not able to exploit them due to <span style="mso-spacerun: yes;"> </span>paucity of funds and lack of futuristic vision in organizational leadership. <span style="mso-spacerun: yes;"> </span>Coming
up of the National Technical Research Organisation (NTRO) is a welcome
move but its functioning so far does not inspire confidence. Its focus
should be more on developing intelligence technological capabilities
rather than getting involved in intelligence production for which it is
least qualified. </span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt; mso-margin-top-alt: auto; text-align: justify; text-indent: 31.2pt;">
<span style="font-family: "Trebuchet MS",sans-serif;"><span style="line-height: 150%;">Revolution
in informatics and emerging cyber threats will constitute another area
of challenge for security agencies. The task of handling massive open
data emanating from diverse sources, both secret and classified, will
make the task of analysis quite difficult. Deliberate efforts to use the
information highways for disinformation, propaganda and subversion will
compound the problem. Of late many youth in different parts of the
world are being sucked into the vortex <span style="mso-spacerun: yes;"> </span>of
radicalism without any physical contact. Concurrently, terrorist and
other anti-national forces are acquiring capabilities to wage cyber wars
targeting critical infrastructure, intrusion in classified domains,
damaging vital national data etc. The challenge is compounded by the
fact that the perpetrators are able to operate from unknown destinations
using inaccessible platforms, thousands of miles away from Indian soil.</span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt; mso-margin-top-alt: auto; text-align: justify; text-indent: 31.2pt;">
<span style="font-family: "Trebuchet MS",sans-serif;"><span style="line-height: 150%;">Another
futuristic challenge against which Indian intelligence will have to
brace itself will be the capacity and resilience to cope with challenges
of Covert Action (CA) and the Fourth Generation Warfare (4GW). The
traditional use of military power to further a nation’s strategic,
political or economic interests has been undergoing a change since the
late eighties. This trend is going to further consolidate in times
ahead.</span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt; mso-margin-top-alt: auto; text-align: justify; text-indent: 31.2pt;">
<span style="font-family: "Trebuchet MS",sans-serif;"><span style="line-height: 150%;">With
wars increasingly becoming cost-ineffective ventures of unpredictable
consequences, Covert Action will increasingly be used as a new variant
of ‘war through other means’ to achieve strategic and political
objectives. Covert Action, is a deliberate state policy directed against
the target state manifesting itself in various forms like engineering
political instability, causing social disruption, retarding economic
progress, accentuating disaffection and unrest in civil society and
manipulating media. In violent forms, it includes promoting terrorism
and insurgencies, political assassinations, social disruption, sabotage,
subversion etc. It is a low cost sustainable offensive with high
deniability aimed to bleed the enemy to submission. Moral pretensions,
and international laws notwithstanding, this option has been equally
used by developed countries, <span style="mso-spacerun: yes;"> </span>like
USA in Afghanistan against the Soviets and poor countries like Pakistan
against India in Kashmir, Punjab etc. Unfortunately, the doctrine of
‘protecting supreme national interests through all means’ has bypassed
India; though it has been its worst victim with nearly 75,000 civilians
and 10,000 security personnel killed as its consequence. </span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt; mso-margin-top-alt: auto; text-align: justify; text-indent: 31.2pt;">
<span style="font-family: "Trebuchet MS",sans-serif;"><span style="line-height: 150%;">Conventionally,
the causes, instrumentalities, resources and consequences of internal
threats are domestic as against the external threats in which they are
of external origin. However, in the new dispensation, internal security
has become highly vulnerable to external manipulations. Hostile powers
target it to achieve their politico-strategic objectives by internally
bleeding the adversary, exploiting its internal faultlines. In Covert
Action (CA) the planning, motivation, finances and often manpower is of
the sponsoring country and so is the strategic objective it is aimed to
achieve. Today, in India, while conventional internal threats involving
violence are steadily on the decline, threats from externally sponsored
covert action has gone up several notches. Though beleaguered for nearly
two decades, India has failed to develop capabilities and a viable
national response to the CA threats, both at the strategic and tactical
levels. Response has been episodal with short memories, often with time
consistency not lasting beyond the next election. CA is a threat against
which Indian intelligence will have to develop capabilities both in
defensive and offensive-defense modes. Their role will assume added
importance since in this war intelligence agencies would be primary, if
not the sole, players. Besides collection of intelligence, the new role
will necessitate<span style="mso-spacerun: yes;"> </span>proactive and
interventionist operational actions requiring adequate legal
empowerment. Seen in this perspective, opposition to the National
Counter Terrorism Centre (NCTC) in India was ill-advised.</span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt; mso-margin-top-alt: auto; text-align: justify; text-indent: 31.2pt;">
<span style="font-family: "Trebuchet MS",sans-serif;"><span style="line-height: 150%;">Thus
both the internal and external adversaries will try to achieve their
political objectives by coercing the government through internal
violence and destabilisation. <span style="mso-spacerun: yes;"> </span>This
will increasingly take the world to what is known as Fourth Generation
Warfare (4GW), conflicts in which the civil society will play primordial
<span style="mso-spacerun: yes;"> </span>role. The subversive and
violent groups disguise themselves as crusaders of disaffected or
alienated sections of the society and indulge in violence and other
unlawful activities. This will be a war against the invisible enemy
hiding within the civil society, stunning to silence the majority
through violence, fear and terror and making the governance impossible
for its inability to protect them. Inability of the governments to
protect their civil societies and redress their genuine grievances make
them highly vulnerable to the mechanizations of hostile intelligence
agencies.</span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt; mso-margin-top-alt: auto; text-align: justify; text-indent: 31.2pt;">
<span style="font-family: "Trebuchet MS",sans-serif;"><span style="line-height: 150%;">The
future pattern of conflicts would increasingly be more civil society
centric. This fight against an invisible enemy, conceptualised as Fourth
Generation Warfare (4GW), will aim at collapsing the enemy internally
rather than physically destroying him through military might. As
observed by William <span style="mso-spacerun: yes;"> </span>Lind,
“Distinction between war and peace will be blurred to the vanishing
point.” In this nonlinear war against the invisible enemy there will no
defined battle fields and the difference between civil and military
targets would get obliterated. The disaffected and alienated sections of
the society will be targeted by the enemies, both within and outside,
to provide cause and the cover for subversive and violent actions. State
security apparatus with high fire power, mobility, technology and
logistic base will find themselves at a loss to fight this battle where
there is no defined territory to be dominated and visible enemy to be
destroyed. Propaganda, skillful use of media and information
intervention may be extensively used by the adversaries to discredit and
delegitimise lawfully established governments. Actions taken by the
government to protect law abiding citizens or to enforce rule of law
will be portrayed as persecution and oppression further eroding
government’s legitimacy. American war in Vietnam and Soviet Union’s
fight in Afghanistan are illustrative. Intelligence will be the primary
instrumentality through which these wars would be fought. To fight these
futuristic conflicts,<span style="mso-spacerun: yes;"> </span>the
intelligence agencies will have to build an extensive network of agents
of information and influence among potentially vulnerable sections of
the society. Psy-war capabilities integrating modern state-of-art
technologies will have to be adopted. A US study paper on ‘The Changing
Face of War: Into the Fourth Generation’ has rightly asserted that
“Fourth generation adversaries will be adept at manipulating the media
to alter domestic and world opinion to the point where skillful use of
psychological operations will sometimes preclude the commitment of
combat forces. Television news may become a more powerful operational
weapon than armored divisions.” India with its social fault lines,
economic inequalities and fragmented polity is highly vulnerable to
civil society conflicts that can lead to instability. The external
factor in the form of activities of hostile intelligence agencies,
foreign NGOs with a political agenda, trans-border ideological influence
of some radical or extremist groups etc. can exploit alienated groups
to their advantage. Though these threats have existed for quite some
time but with revolution in informatics, accessibility to new
technologies and collaborative networking among anti-national forces
these may become more extensive and acute in future. <span style="mso-spacerun: yes;"> </span>Indian intelligence will have to develop new capabilities to meet these threats. </span></span></div>
<span style="font-family: "Trebuchet MS",sans-serif;"><span style="line-height: 150%;">The challenges that<span style="mso-spacerun: yes;"> </span>Indian
intelligence is going to face in years ahead will be much more serious
and complex. India’s emergence as a major power centre provides it an
opportunity as also adds to its vulnerability. There is a need to work
out a long term strategy for transformational changes on one hand and
internal reforms on the other. Under a time bound programme a plan of
action should be prepared and pressed into action with full earnestness.
</span></span>Sidharth K Menonhttp://www.blogger.com/profile/11412252277913740873noreply@blogger.comtag:blogger.com,1999:blog-7965927633581367449.post-42915900038911169122014-11-19T20:09:00.000+05:302015-03-29T17:04:21.503+05:30CHINA - WHATS THEIR MOTIVE?<span style="font-size: xx-small;"><span style="font-family: "Trebuchet MS",sans-serif;"><br /></span>
</span><br />
<div style="text-align: center;">
<span style="font-family: "Trebuchet MS",sans-serif; font-size: large;"> CHINESE SUBS IN THE INDIAN OCEAN</span></div>
<div style="text-align: center;">
<span style="font-family: "Trebuchet MS",sans-serif; font-size: xx-small;"><br /></span></div>
<span style="font-family: "Trebuchet MS",sans-serif;"><a href="http://4.bp.blogspot.com/-u_kBINpT_Hw/VGysKSTP5nI/AAAAAAAAAnw/8zllqM00OHU/s1600/CHINESE%2BFLAG.png" imageanchor="1" style="clear: right; float: right; font-size: x-small; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://4.bp.blogspot.com/-u_kBINpT_Hw/VGysKSTP5nI/AAAAAAAAAnw/8zllqM00OHU/s1600/CHINESE%2BFLAG.png" height="133" width="200" /></a>China’s submarine fleet made its first known trip into the Indian Ocean, according to a report by the <a href="http://online.wsj.com/articles/chinas-submarine-fleet-adds-nuclear-strike-capability-altering-strategic-balance-undersea-1414164738">Wall Street Journal</a>.
A Chinese attack submarine passed through the Straits of Malacca
between Malaysia and Indonesia with sightings near Sri Lanka and the
Persian Gulf.</span><br />
<span style="font-family: "Trebuchet MS",sans-serif;"><br /></span>
<span style="font-family: "Trebuchet MS",sans-serif;">It’s the latest report of the significant steps
forward the Chinese navy has taken in advancing its submarine fleet.
Earlier this year, a U.S. Navy report estimated that the Chinese navy
has nuclear-armed ballistic missile submarines able to launch strikes
against the United States from the middle of the Pacific Ocean.</span><br />
<span style="font-family: "Trebuchet MS",sans-serif;">The
Chinese navy has ambitious plans over the next 15 years to rapidly
advance its fleet of surface ships and submarines as well as maritime
weapons and sensors, according to a report by the Office of Naval
Intelligence.</span><br />
<span style="font-family: "Trebuchet MS",sans-serif;"><br /></span>
<span style="font-family: "Trebuchet MS",sans-serif;">Earlier this year, ONI
issued an assessment on the Chinese navy as part of testimony to the
U.S. China Economic and Security Review. ONI leaders found that China’s
navy has evolved from a littoral force to one that is capable of meeting
a wide range of missions to include being “increasingly capable of
striking targets hundreds of miles from the Chinese mainland.”</span><br />
<span style="font-family: "Trebuchet MS",sans-serif;"><a href="http://1.bp.blogspot.com/-lkjaUf5xmg4/VGyvbHbjljI/AAAAAAAAAoc/lMvI9f-J_HQ/s1600/cHINESE%2BSUBS.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://1.bp.blogspot.com/-lkjaUf5xmg4/VGyvbHbjljI/AAAAAAAAAoc/lMvI9f-J_HQ/s1600/cHINESE%2BSUBS.jpg" height="194" width="320" /></a></span><br />
<span style="font-family: "Trebuchet MS",sans-serif;">The
Chinese navy has 77 surface combatants, more than 60 submarines, 55
amphibious ships and about 85 missile-equipped small ships, according to
the report first published by the U.S. Naval Institute.</span><br />
<span style="font-family: "Trebuchet MS",sans-serif;">ONI
raised concerns about China’s fast-growing submarine force, to include
the Jin-class ballistic nuclear submarines, which were expected to
commence deterrent patrols in 2014. The expected operational deployment
of the Jin “would mark China’s first credible at-sea-second-strike
nuclear capability,” the report states.</span><br />
<span style="font-family: "Trebuchet MS",sans-serif;"><br /></span>
<span style="font-family: "Trebuchet MS",sans-serif;">The submarine could fire
the JL-2 submarine launched ballistic missile, which has a range of
4,000 nautical miles and would “enable the Jin to strike Hawaii, Alaska
and possibly western portions of CONUS [continental United States] from
East Asian waters,” ONI assessed.</span><br />
<span style="font-family: "Trebuchet MS",sans-serif;"><br /></span>
<span style="font-family: "Trebuchet MS",sans-serif;">In addition, a 2014 Pentagon
Annual Report to Congress on military and security developments said the
Chinese have three operational Jin-class SSBNs (ballistic missile
submarines) and up to five may enter service before the Chinese proceeds
toward a next-generation SSBN.</span><br />
<span style="font-family: "Trebuchet MS",sans-serif;"><br /></span>
<span style="font-family: "Trebuchet MS",sans-serif;"><a href="http://2.bp.blogspot.com/-Wu4-MjVlCBc/VGyvY_uKFMI/AAAAAAAAAoM/9E5-rpdftIA/s1600/CHINESE%2B094%2BNUCLEAR%2BSUB.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://2.bp.blogspot.com/-Wu4-MjVlCBc/VGyvY_uKFMI/AAAAAAAAAoM/9E5-rpdftIA/s1600/CHINESE%2B094%2BNUCLEAR%2BSUB.jpg" height="161" width="320" /></a>The ONI report says the
Chinese currently have five nuclear attack submarines, four nuclear
ballistic missile submarines and 53 diesel attack submarines. Overall,
China’s fleet of submarines has quickly increased in offensive weapons
technology over the last 10 years. A decade ago, only a few Chinese
submarines could fire modern anti-ship cruise missiles (ASCMs). Now,
more than half of the conventional attack submarines are configured to
fire ASCMs, the ONI report states.</span><br />
<span style="font-family: "Trebuchet MS",sans-serif;"><br /></span>
<span style="font-family: "Trebuchet MS",sans-serif;">“The type-095 guided missile
attack submarine, which China will likely construct over the next
decade, may be equipped with a land-attack capability,” the assessment
explains. This could enable Chinese submarines with an enhanced ability
to strike U.S. bases throughout the region, the report adds.The
Pentagon’s China report affirms that the expected deployment of
nuclear-armed JL-2s will, for the first time, give China an at-sea
nuclear deterrent capability.</span><br />
<span style="font-family: "Trebuchet MS",sans-serif;"><br /></span>
<span style="font-family: "Trebuchet MS",sans-serif;"><a href="http://3.bp.blogspot.com/-MtfJoM6G3Eg/VGyvZ35OMkI/AAAAAAAAAoQ/6xaUFqP2Pdc/s1600/chinese%2Bsubmarines.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/-MtfJoM6G3Eg/VGyvZ35OMkI/AAAAAAAAAoQ/6xaUFqP2Pdc/s1600/chinese%2Bsubmarines.jpg" height="110" width="200" /></a><a href="http://3.bp.blogspot.com/-Jw0VWAS1xv0/VGyvYV3Bc4I/AAAAAAAAAoA/hkkZt-9BX6I/s1600/SHINESE%2BSUBS%2BCLASSES.gif" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://3.bp.blogspot.com/-Jw0VWAS1xv0/VGyvYV3Bc4I/AAAAAAAAAoA/hkkZt-9BX6I/s1600/SHINESE%2BSUBS%2BCLASSES.gif" height="320" width="307" /></a>One analyst said the Chinese appear
to be trying to position themselves as a nuclear global super power able
to both assert regional dominance and project power around the world.”China
clearly appears to be pursuing a great power nuclear-deterrence
strategy. They are making progress but it is not fast paced. It is kind
of appropriate for a military that has two missions, guaranteed
deterrence and an interest in showing its ability as a superpower,” said
Daniel Goure, vice president of the Lexington Institute, a Va.-based
think tank.</span><br />
<span style="font-family: "Trebuchet MS",sans-serif;">In recent decades, the Chinese military has had more
of a regional focus instead of ICMBs, something which may now be
changing in light of growing ambitions, continued rapid technological
expansion and military modernization, Goure explained.</span><br />
<span style="font-family: "Trebuchet MS",sans-serif;"><br /></span>
<span style="font-family: "Trebuchet MS",sans-serif;">“We know
from watching the Soviets how hard it is for these countries to build
western-equivalent militaries and nuclear enterprises. The Russians
almost broke trying to build a Navy that would out do us,” he added.</span><br />
<span style="font-family: "Trebuchet MS",sans-serif;">However,
Goure added that the Chinese navy has a long way to go before it could
emerge as a credible competitor to the U.S. Navy.</span><br />
<span style="font-family: "Trebuchet MS",sans-serif;"><br /></span>
<span style="font-family: "Trebuchet MS",sans-serif;">“Are they really
going to go the route of building their own kind of competitor to the
U.S. Navy? That is expensive and difficult – at a time when their
economy is slowing down,” Goure said.</span><br />
<span style="font-family: "Trebuchet MS",sans-serif;">The Navy’s Atlantic Fleet submarine commander recently voiced concern about China’s submarine modernization efforts.</span><br />
<span style="font-family: "Trebuchet MS",sans-serif;"><br /></span>
<span style="font-family: "Trebuchet MS",sans-serif;">“The
world has become multi-polar and we have competition for global
influence and power from a rising China – which is very much on our
mind. The Chinese have had ballistic missile submarines in some form for
a while. Their pace has accelerated and they have several nuclear
ballistic missile submarines and are continuing to build more,” said
Vice Adm. Michael Connor.</span><br />
<div style="background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;">
<br /></div>
Sidharth K Menonhttp://www.blogger.com/profile/11412252277913740873noreply@blogger.comtag:blogger.com,1999:blog-7965927633581367449.post-45679227110987161462014-11-18T20:26:00.003+05:302015-03-21T13:53:23.842+05:30A RE- POST WORTH READING - A K DOVAL [FMR. IB CHIEF]<div align="center" class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: center;">
<span style="font-size: small;"><b><span style="color: white;"><span lang="EN-IN" style="font-size: 18.0pt; line-height: 150%; mso-bidi-font-size: 11.0pt;">Chinese
Intelligence: From a Party Outfit to Cyber Warriors</span></span></b></span></div>
<span style="font-size: small;"><b><span style="color: white;">
</span></b></span>
<span style="font-size: small;"><b><span style="color: white;">
</span></b></span>
<br />
<div align="center" class="MsoNoSpacing" style="text-align: center;">
<span style="font-size: small;"><b><span style="color: white;"><br /></span></b></span></div>
<span style="font-size: small;"><b><span style="color: white;">
</span></b></span>
<br />
<div align="center" class="MsoNoSpacing" style="text-align: center;">
<span style="font-size: small;"><b><span style="color: white;"><span lang="EN-IN">Shri
Ajit Doval</span></span></b></span></div>
<span style="font-size: small;"><b><span style="color: white;">
</span></b></span>
<br />
<div align="center" class="MsoNoSpacing" style="text-align: center;">
<b><span style="color: white;"><span lang="EN-IN" style="font-size: xx-small;"><br /></span></span></b></div>
<b><span style="color: white; font-size: xx-small;">
</span></b><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;"><a href="http://2.bp.blogspot.com/-iw2Bdy0Hln4/VGtdnP8NDHI/AAAAAAAAAk0/Qb3XhmJvC1Q/s1600/INDIAN%2BFLAG.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://2.bp.blogspot.com/-iw2Bdy0Hln4/VGtdnP8NDHI/AAAAAAAAAk0/Qb3XhmJvC1Q/s1600/INDIAN%2BFLAG.jpg" height="133" width="200" /></a><span lang="EN-IN"> Whatever
yardstick we choose to apply – size of the economy and its rate of growth,
military hardware and pace of modernisation, stability of the polity and the
government; size, population and
geo-political setting – China qualifies for a major power status. If we decide
to be more candid than correct in making a hard headed assessment, its rise is
not an assured peaceful rise. Its military build up, maritime ambitions,
territorial claims, assertions in the cyber world and space etc have definite
security ramifications both for the region and the world at large. The
direction, intensity and <a href="http://4.bp.blogspot.com/-WYDb3JuRGnA/VGtc54mv2HI/AAAAAAAAAko/bJEK3fAb2uI/s1600/A%2BK%2BDOVAL.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://4.bp.blogspot.com/-WYDb3JuRGnA/VGtc54mv2HI/AAAAAAAAAko/bJEK3fAb2uI/s1600/A%2BK%2BDOVAL.jpg" height="200" width="176" /></a><br />
form of these assertions among other things will be
determined by China’s self view of its interests, capacities and limitations on
one hand and assessment of global response to its actions on the other. In
making these policy choices, the intelligence capability of the Chinese state
will play a seminal role. </span></span></b></div>
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;"><a href="http://2.bp.blogspot.com/-ektR_sVifPw/VGtdnIfF2YI/AAAAAAAAAkw/TF1H0DpPL4c/s1600/CHINESE%2BFLAG.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://2.bp.blogspot.com/-ektR_sVifPw/VGtdnIfF2YI/AAAAAAAAAkw/TF1H0DpPL4c/s1600/CHINESE%2BFLAG.png" height="133" width="200" /></a><span lang="EN-IN"> No one has
internalised, more than the Chinese, the fact that strategic strength of a nation is directly proportionate
to its knowledge dominance. Three millennium back, they believed in Sun Tzu’s
dictum, ‘Know thy self, know thy enemy - a thousand battles, a thousand
victories’, and they continue to believe it till date. While advances made by
China in its economy, military modernisation, defence production and technology
acquisition have been intensely studied and analysed, not much is known or
written about its intelligence apparatus, its capabilities and vulnerabilities,
role in policy making, systems and structures
etc. Though China, compared to the past, has opened up in certain fields, its
intelligence apparatus, not much understood by intelligence experts and
scholars, remains a dark area. It assumes special import in the wake of its
acquiring major power status on one hand, and expanding scope of clausewitzian doctrine of “War
through other means” like cyber war on the other. It becomes all the more relevant in the
Chinese context, as espionage has been integral to its strategic tradition and
state craft. </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white;"><u><span lang="EN-IN" style="font-size: xx-small;">EVOLUTION:</span></u></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> The
history of Chinese intelligence is as old as that of the early warring kingdoms
of ancient China. In terms of its
antiquity, it can be compared only with the history of Indian intelligence that
dates back to about 700 BC, perfected by Chanakya during the Mauryan Empire
(322 to 185 BC); the only difference being that while the Indians proclaimed
‘resorting to secret craft by the state’ as unethical and immoral after the
Gupta period (320 AD to 600 AD), it remained an uninterrupted part of Chinese
state craft. Intelligence played a seminal role in the efforts of successive
Chinese dynasties to deal with their external enemies – primarily the warring
nomadic tribes- as also tackling internal threats. </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> In recent
history, Sun Yat-sen and Chiang Kai-shek extensively used their spy networks to
gather information about the Manchus that led to fall of the Qing dynasty.
Intelligence also played an important role during the Sino-Japanese war and
later the Civil War that led to the victory of the Chinese Communist Party
(CCP) over the Kuomintang. Mao, during this extended civil war, heavily relied
on CCP’s secret apparatus and covert actions to subdue his political opponents.
It is significant that one of the first resolutions adopted by the Politburo of
the Chinese Communist Party (CCP), after the creation of People’s Republic of
China (PRC) in 1949, pertained to the crucial role played by the
intelligence. </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white;"><span lang="EN-IN" style="font-size: xx-small; line-height: 150%; mso-bidi-font-size: 11.0pt;">Establishment of Communist Rule to
Cultural Revolution:</span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> On
assuming power, three factors defined CCP’s approach towards national security
and concurrently the intelligence build up. First was a strong belief that all
those who were opposed to the Communist ideology were counter revolutionaries
and thus enemies of the Chinese state and the people. Second was an inherent
distrust of all foreigners and foreign powers, particularly the Western
democracies, who were perceived to be conspiring to undo the socialist
revolution. Taiwan and Hong Kong were considered to be bases of their covert
activity. Third was a fierce undercurrent of Chinese nationalism that
emphasised on avenging ‘wrongs of history’ and transforming China into a State
with high Comprehensive National Power (CNP). </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> In terms
of action points, at the intelligence
front, this approach, inter alia,
manifested into (i) Creation of a strong security state- policing its citizens,
identifying ideological enemies and their neutralisation; (ii) denying access
to suspected foreign agents; (iii) penetration into claimed areas of Chinese
territory not fully under its control like Tibet, Taiwan, Hong Kong etc. (often
referred as homeland territory by the Chinese); (iv) accessing scientific and
technical information, mainly from Western sources, to build indigenous
military and civilian capacities and (v) leveraging Chinese diasporas abroad
for intelligence and counter-intelligence activities, including coverage of
activities of anti-communist elements abroad. As the CCP was envisaged to play
the central role in this secret activity, intelligence apparatus continued to
be controlled by it, albeit with some structural changes. The erstwhile
intelligence outfit, Public Security Department (PSD), was re-organised. Its
internal security tasks were partly entrusted to the Central Ministry of Public
Security (MPS) headed by Gen Luo Ruiqing, foreign intelligence was brought
under Liaison Department headed by Li Kenong and some sections were transferred
to People Liberation Army’s (PLA’s) Central General Office and the General
Staff Department. Li Kenong was also designated by Mao as Secretary of the
Central Committee’s Intelligence Commission, Director of the Central Military
Commission, Intelligence Department, as also as the country’s Deputy Foreign
Minister. Central Investigation Department, a field intelligence outfit, worked
under Li Kenong. </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> At this
stage, Chinese intelligence had limited exposure to the outside world,
confronted problems of access and language and faced a generally hostile
anti-communist environment internationally. These factors, abetted by
ideological proximity to the USSR made the intelligence apparatus considerably
dependent on the Soviets, particularly for external intelligence. KGB, in those
days, worked closely with Gen Luo Ruiqing and helped him develop intelligence
systems, doctrines, trade craft, training etc., whose footprints can be
observed even today. Russians also helped the Chinese develop liaison
arrangements with fraternal communist parties through ‘International Liaison of
the Chinese Communist Party’. The intelligence bonhomie with Soviets, however,
started cooling off in the mid fifties and by 1960 the operational cooperation
almost ceased to exist. </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> During the
1950s, almost every Chinese embassy had an Investigation and Research Office –
a cover name for intelligence staff belonging to the Central Investigation
Department. These were the field units for intelligence collection which were
low in trade craft, highly secretive in their functioning and comprised of
ideologically committed members. One of their major pre-occupation was to keep
close watch on other members of the mission. They often remained present during
the meetings with their diplomatic counterparts. In the headquarters, the
analytical task was carried out by Central Investigation Department’s Eighth
Bureau, publicly known since 1978 as the "Institute of Contemporary
International Relations." </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<i><span lang="EN-IN"> </span></i><span lang="EN-IN">In 1962, just before
the Cultural Revolution, Li Kenong died and was succeeded by Luo Qingchang. The
legendary Kang Sheng, a confidant of Mao who for long years had headed the
Central Department of Social Affairs and in 60s was a member of the Politburo,
was entrusted with the overarching responsibility of ‘guiding’ the country’s intelligence apparatus. The
infamous Kang Sheng played a vital role during Cultural Revolution in
suppressing and neutralising Mao’s political enemies. The political confusion
that prevailed during Cultural Revolution created serious fissures with the
intelligence community also. Reportedly, on the initiative of Lin Biao, the
Central Investigation Department was abolished, most of its senior officers
shunted to the countryside for re-education and its operators and human assets,
both within and outside the country, deputed to the PLA General Staff Second
Department. It is suspected that there was an internal conspiracy, in which
some intelligence operators of the dissolved Central Investigation Department
were used, that led to mysterious death of Lin Biao in 1971 in a plane crash in
Mongolia. Following his death, the department was re-established and its representatives
sent to missions abroad. </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;"><br /></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white;"><span lang="EN-IN" style="font-size: xx-small; line-height: 150%; mso-bidi-font-size: 11.0pt;">Cultural Revolution:</span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> The role
of intelligence in the internal polity of China during the Cultural Revolution
(1966-1976), that witnessed millions of killings, deserves a special mention.
The revolution created conditions of anarchy and uncertainty, and saw sharp
degradation of civil society and violation of human rights. There was extensive
abuse of secret police and intelligence services that were responsible for
large number of killings of political opponents. The secret apparatus became
not only the perpetrator of atrocities but also a victim of it. In April 1967,
Secretary General of the Central Investigation Department, Zou Dapeng,
committed suicide along with his wife, who herself was a senior intelligence
officer. A large number of intelligence operatives were dubbed as renegades or
traitors and punished - often for their suspected pre 1949 roles or
proclivities. Ironically, these persecutions were spearheaded by none other than
the intelligence Tzar, Kang Sheng, who himself was head of the CCP’s
Intelligence and secret apparatus from 1939-1946. In those turbulent years,
Kang, the hatchet man of Mao Zedong, headed the Central Case Examination Group
(CCEG) that dealt exclusively in secret coercive practices and dirty tricks to
bring about ‘cultural’ cleansing. At one point of time, at his behest, 88
members/alternate members of the party Central Committee were under
investigation for suspected ‘treachery’, ‘spying’ or ‘collusion with the
enemy’. Kang Sheng used his infamous
apparatus to crush Mao’s ideological opponents dubbing them as enemies of the
revolution. The powerful role of Kang and his security services in China’s
internal power play can be gauged by the fact that Kang Sheng was directed by
Mao to </span><span lang="EN-IN" style="font-size: 14.0pt; line-height: 150%; mso-bidi-font-size: 11.0pt;">supervise drafting of the new Party Constitution, which was
adopted at the Ninth Congress in April 1969. He was also ‘elected’ as one of
the five members of the Politburo Standing Committee, along with Mao, Lin Biao,
Zhou Enlai and </span><span lang="EN-IN"><a href="http://en.wikipedia.org/wiki/Chen_Boda" title="Chen Boda"><span style="font-size: 14.0pt; line-height: 150%; mso-bidi-font-size: 11.0pt;">Chen Boda</span></a></span><span lang="EN-IN" style="font-size: 14.0pt; line-height: 150%; mso-bidi-font-size: 11.0pt;">.
</span><span lang="EN-IN"> </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white;"><span lang="EN-IN" style="font-size: xx-small; line-height: 150%; mso-bidi-font-size: 11.0pt;">Ministry of Social Security (MSS):</span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> The political
developments in China consequent to the death of Mao Zedong (1976), fall of the
Gang of Four (1976) and rise of Den Xiaoping heralded a new era in Chinese
politics. Following the Third Plenum of the 11th Central Committee Congress,
Deng Xiaoping emerged as the most powerful leader and gave a new fillip to the
pace of modernisation and structural reforms. Himself a victim of political
misuse of intelligence during Cultural Revolution, he wanted to re-structure
the intelligence apparatus making it less susceptible to political vagaries. He
resurrected the Chinese traditional concepts of Shishi Qiushi (seeking truth
from facts), ‘Xianzhi’ (foreknowledge) and ‘</span><span lang="EN-GB">Hide Your Strength, Bide Your Time’ as some of
the guiding doctrines to</span><span lang="EN-IN"> reform the country’s
intelligence set-up. He wanted Chinese intelligence to be transformed into a
modern professional outfit – in tandem with China’s four modernisation
programmes - having high technical capabilities and insulated from day to day
party control. Deng Xiaoping was also not in favour of intelligence officers
using legal cover as diplomats and wanted them to operate under illegal covers
like media persons, representatives of business firms, scientists and
researchers in universities etc.</span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> Many piecemeal
reforms were brought about during 1976 to 1982 that eventually culminated in
the formation of the Ministry of Social Security (MSS) in 1983. It was
envisaged to be the country’s apex intelligence outfit, a position that it
continues to hold till today. A formal proposal was initiated by Liu Fuzhi, who
at that time headed the Ministry of Public Security (MPS) and was approved by
the Political Bureau of the CCP Central Committee. The new outfit that defined
its charter as “the security of the state through effective measures against
enemy agents, spies and counter-revolutionary activities designed to sabotage
or overthrow China’s socialist system”<a href="https://www.blogger.com/null" name="_ednref1" title=""><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 13.0pt; mso-ansi-language: EN-IN; mso-bidi-font-size: 11.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[1]</span></span></span></a>
was made answerable to the Premier and the State Council. The above charter
defined by Liu Fuzhi, however, hid more than it revealed. Unstated, the primary
functions of the MSS included collection of foreign intelligence and
undertaking covert intelligence operations both within and outside the country.
It had a major internal intelligence charter as well. Ling
Yun was appointed its first Chief, who on assuming office proclaimed that
intelligence would no longer be used to settle ideological differences or allow
party barons to use the service to settle factional fights. It was, however,
nothing more than a pious wish and propaganda ploy. </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> Major segments of
the intelligence and counter-intelligence activities of the Ministry of Public
Security (MPS) and remnants of the Chinese Communist Party’s Investigation
Division under <a href="http://en.wikipedia.org/wiki/Central_Department_of_Social_Affairs" title="Central Department of Social Affairs">Central Department of Social
Affairs</a> (CDSA) were merged into the new outfit. For the first time, foreign
intelligence was collected, collated and analysed in a systematic manner on modern
lines. As MSS did not have a body of experienced analysts to interpret the
data, China Institute of Contemporary International Relations (CICIR), which
had existed since 1980 and had a professional research staff, was brought under
its control. The organisation, though has an open profile, is a feeder outfit
that provides MSS with intelligence assessments based on inputs received from
all sources including open sources and interaction with foreign think-tanks. It
is a conglomerate of eleven institutes and two research divisions specialising
in diverse areas of international interest to China. According to some press
reports, “the<i> </i><a href="http://www.washingtontimes.com/topics/vladimirescu-arad/">CICIR</a></span> has provided intelligence
collection support to the <span lang="EN-IN"><a href="http://www.washingtontimes.com/topics/ministry-of-state-security/">MSS</a></span> and the <span lang="EN-IN"><a href="http://www.washingtontimes.com/topics/foreign-affairs-leading-group/">Foreign Affairs Leading
Group</a></span> (<span lang="EN-IN"><a href="http://www.washingtontimes.com/topics/foreign-affairs-leading-group/">FALG</a></span>), the Communist Party of China’s top foreign-policy body.<a href="https://www.blogger.com/null" name="_ednref2" title=""><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"><span style="font-family: "Times New Roman","serif"; font-size: 13.0pt; mso-ansi-language: EN-US; mso-bidi-font-size: 11.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[2]</span></span></span></a>”
</span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-indent: .5in;">
<b><span style="color: white;"><span lang="EN-IN" style="font-size: xx-small;">The MSS over the years has emerged as China’s largest and most
effective intelligence organisation, working under the state council with its
headquarters in Beijing. Under Article 4 of the Chinese Criminal Procedure Law,
it enjoys police powers to arrest and initiate prosecution in cases involving
national security. It has different wings covering foreign intelligence,
internal intelligence, counter-espionage and counter-intelligence. There is a
certain degree of overlap with the Second Department of the People’s Liberation
Army (PLA) in respect of foreign intelligence and Ministry of Public Security
(MPS) in the field of domestic intelligence. </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white;"><span lang="EN-IN" style="font-size: xx-small; line-height: 150%; mso-bidi-font-size: 11.0pt;">Ministry of Public Security (MPS):</span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> Though
essentially a national security agency, the Ministry of Public Security (MPS)
has a wide intelligence network. Enjoying overriding powers over the police and
law enforcing agencies, huge resources and proximity to the CCP makes it a
powerful security cum intelligence outfit. </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> In its
intelligence gathering and operational role, it keeps a close watch on internal
political developments and concurrently reports to the State Council (executive
component of the state) and Central Political and Legislative Affairs Committee
(party apparatus). Besides collection of intelligence through police
organisation at provincial and local levels, MPS performs its intelligence
functions using ‘working units’ of the ‘Chinese citizens’. MPS is empowered to
draft any citizen to spy over fellow citizens or foreigners living in their
area. Surveillance over visiting foreigners is an important function of the MPS
which it performs through local law enforcement units besides its dedicated
intelligence units. However, deficient in skills, experience and equipment, its
trade craft is primitive and crude and easily detectable. </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> While the
intricate network of MPS informers allows the system to keep a close watch on
its citizenry, it often leads to erroneous or disproportionate police actions
on account of perfunctory reporting, informers settling personal scores through
false reporting and intervention by party bosses. Some of the problems
encountered by MPS include managing the unwieldy data generated by diverse
working groups spread throughout the country, validation and analysis of data,
delayed real time flow of information among the provinces and from provinces to
the MPS headquarters in Beijing and lack of coordinated decision making process
due to two parallel masters - the state executive and the party apparatus. Intervention by the Central Political and
Legislative Affairs Committee, that is supposed to deal with coordination
problems, often proves to be delayed and non-workable. </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> As
custodian of ideological security, the MPS also performs an important political
role of monitoring political opinions of the people, logging people’s
grievances and collecting information about rivalries among the party
cadres/leaders. To assist its political role, it maintains a massive national
database covering personal information from national to local levels. The
inputs are derived from police reports, inputs of working groups, local level
party sources, interception of e-mails
and telephonic communications, employment records, data available with banks
and industrial concerns, prosecution and
immigration records etc. This data is integrated and aggregated to identify
‘persons of interest’ which in turn are sent to police stations for stipulated
action. </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> Internally,
China has created intelligence capacities for a panoptic state where it can
identify, monitor, control, intervene and, when required, coerce citizens to
submission for furthering perceived national interests. This trend got further
strengthened after the Tiananmen Square massacre in 1989, that badly shook
China and whose after effects continue to haunt it. Growing unrest in Tibet and
Xianjiang and the spate of suicides in
Tibet have further unnerved China. The declining face of economic growth,
unemployment and exponential rise in agitations and protests have further
compounded the internal security landscape. </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> In 2011,
Zhou Yongkang, China’s senior party
leader in charge of security and stability, emphasised the need of integrating
MPS intelligence system for “social management” that would include monitoring
political views, moulding public opinion and propaganda to shape people’s
decision. In furtherance of this policy in December 2011, MPS directed units
under it to visit villages and houses to win over their hearts and minds on the
one hand and monitor their opinions on the other. This is illustrative of the Chinese
management of state affairs intricately intertwining security, development,
political and civil society controls. Though it has not drawn the attention of
strategic analysts abroad, in last one decade, both the size and influence of
MPS has increased substantially. However, to what degree the MPS influences
political decision making process and policy formulation needs further
investigation. </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> </span><span style="font-size: 14.0pt; line-height: 150%; mso-ansi-language: EN-US; mso-bidi-font-size: 11.0pt;">Military Intelligence - </span><span style="font-size: 14.0pt; line-height: 150%; mso-ansi-language: EN-US; mso-bidi-font-size: 11.0pt;">2<sup>nd</sup> General Staff Department (2<sup>nd</sup> GSD):</span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
The
powerful Chinese military apparatus has dedicated intelligence apparatus of its
own under the General Staff Department (GSD) of the PLA. Second Intelligence
Department (2<sup>nd</sup> GSD) is one of the most important departments of the
military intelligence setup. It is headed by a Director who is assisted by two
Deputy Directors and a Political Commissioner. The Director and Political
Commissar are equivalent to a Group Army Commander.<sup> <a href="https://www.blogger.com/null" name="_ednref3" title=""><sup><span style="font-family: "Times New Roman","serif"; font-size: 13.0pt; mso-ansi-language: EN-US; mso-bidi-font-size: 11.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[3]</span></sup></a></sup> As it works directly under
the General Staff, political control over it is lesser than in the case of MPS
and MSS. STRATFOR, a leading intelligence research organization, avers that
border intelligence is one of the primary responsibilities of the MID in which
it is assisted by the PLA’s reconnaissance units.<sup> <a href="https://www.blogger.com/null" name="_ednref4" title=""><sup><span style="font-family: "Times New Roman","serif"; font-size: 13.0pt; mso-ansi-language: EN-US; mso-bidi-font-size: 11.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[4]</span></sup></a></sup> Specializing in tactical intelligence, it
keeps tab of the order of battle (ORBAT) of foreign armies, their doctrines,
strategies, location, identity of field formations and profiles of their
commanders etc. Its responsibilities include terrain assessment of target areas
of military interest, identification of military command and control centres,
plotting vulnerable Areas/Points (VA/VPs), equipment profile,
counter-intelligence tasks, etc. It also monitors the activities of foreign armies
operating in the Asian continent.<a href="https://www.blogger.com/null" name="_ednref5" title=""><sup><sup><span style="font-family: "Times New Roman","serif"; font-size: 13.0pt; mso-ansi-language: EN-US; mso-bidi-font-size: 11.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[5]</span></sup></sup></a> </span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
Some
of the important wings of the 2<sup>nd</sup> GSD include (i) ‘Department 2’
collecting information through human assets (HUMINT) with seven bureaus working under it, (ii)
‘Department 3’ collecting intelligence through communication interceptions
(SIGINT) located in seven of its military
regions and (iii) Department 4 specializing in battle field Electronic
Intelligence. Electronic intelligence is sourced through Electronic Warfare
(EW) Regiment/Reconnaissance Units functioning at the Group Army (GA) level.
Other departments deal with administration, logistics, training etc. </span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
The
2<sup>nd</sup> GSD’s field formations have Military Reconnaissance Units (MRs)
in border areas, Intelligence Analysis Centre at the Divisional level and
Intelligence Peace Units at Company levels. During war time, the Intelligence
Analysis Centers function at the Battalion Headquarter level also with a
limited remit. It also monitors the activities of foreign armies operating in
the Asian continent. Earlier the 2<sup>nd</sup> GSD primarily focused on human
intelligence and traditional military intelligence activities but has recently
expanded the range of its activities to cover scientific and technological
information.<a href="https://www.blogger.com/null" name="_ednref6" title=""><sup><sup><span style="font-family: "Times New Roman","serif"; font-size: 13.0pt; mso-ansi-language: EN-US; mso-bidi-font-size: 11.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[6]</span></sup></sup></a> <a href="https://www.blogger.com/null" name="_ednref7" title=""><sup><sup><span style="font-family: "Times New Roman","serif"; font-size: 13.0pt; mso-ansi-language: EN-US; mso-bidi-font-size: 11.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[7]</span></sup></sup></a></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
The
2<sup>nd</sup> Department is further sub-divided in functional bureaus such
as Military Intelligence Bureau,
Tactical Reconnaissance Bureau, Political Bureau, Confidential Bureau,
Comprehensive Bureau and Confidential File Bureau. <a href="https://www.blogger.com/null" name="_ednref8" title=""><sup><sup><span style="font-family: "Times New Roman","serif"; font-size: 13.0pt; mso-ansi-language: EN-US; mso-bidi-font-size: 11.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[8]</span></sup></sup></a> Military Intelligence Bureau
focuses mainly on Taiwan, Macau and Hong Kong; collects technical intelligence
to improve and develop military hardware for the PLA and establishes contact
with potential clients for weapons exports concealing PLA’s direct involvement
in arms trade. The Tactical Reconnaissance Bureau streamlines the information
flow from specialized units at the MR level.
The 3rd Bureau (Military Attaché Bureau) screens and debriefs military
attaches who are deputed to foreign missions abroad. The 4th Bureau’s
responsibility is Intelligence analysis for Russia, former Soviet republics,
and other East European countries. The 5<sup>th</sup>Bureau is also known as
the Foreign Affairs Bureau. Its responsibilities include organizing foreign
visits of PLA officers, military exchanges and receiving foreign military
visitors. It, at times, works under the cover name of “the Ministry of National
Defence Foreign Affairs Office”. It has its work divided on territorial lines
like America & Canada Bureau, Europe & Asia Bureau, etc. It is learnt
that the Press Bureau, known as "Ministry of National Defence Press
Affairs Office", also works in conjunction with 2<sup>nd</sup> GSD. Several
PLA Universities and Command colleges are directly subordinate to the Foreign
Affairs Bureau.<a href="https://www.blogger.com/null" name="_ednref9" title=""><sup><sup><span style="font-family: "Times New Roman","serif"; font-size: 13.0pt; mso-ansi-language: EN-US; mso-bidi-font-size: 11.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[9]</span></sup></sup></a> The 6th Bureau focuses on analysis of
Intelligence pertaining to the neighbouring Asian countries. The 7th Bureau
(Technology and Equipment Bureau) plans and carries out cyber espionage operations
through six governmental research institutions and two computer centers. It
also enlists the services of individual civilian hackers and uses companies
that produce electronic equipment for carrying out its activities. In addition, the 2<sup>nd</sup> GSD oversees
working of the Arms Control Bureau, Space Reconnaissance Bureau, Computer
Institute, PLA College of International Relations. </span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white;"><u><span style="font-size: xx-small; line-height: 150%; mso-ansi-language: EN-US; mso-bidi-font-size: 12.0pt;">3<sup>rd</sup>
General Staff Department:</span></u></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<span style="font-size: xx-small;"><b><span style="color: white;">
The
3<sup>rd</sup> GSD or the Technical Department primarily focuses on signal
intelligence (SIGINT) operations of the PLA. In the American jargon, the
quintessential SIGINT task is to carry out cyber surveillance or Computer
Network Exploitation (CNE). Computer network operations (CNO) in China are often
referred to as ― “Network Attack and Defense”, based on the premise that
–“without understanding how to attack, one will not know how to defend”. The 3<sup>rd</sup>
Department’s SIGINT targets are diplomatic missions, military activities,
economic entities, public education institutions, and individuals of
interest. There may also be bureaus
operating at the Military Districts for conducting network defense and attack,
technical reconnaissance, and psychological operations. Bureau Directors and
Political Commissars are equivalent in rank to an Army Major-General.<a href="https://www.blogger.com/null" name="_ednref10" title=""><sup><sup><span style="font-family: "Times New Roman","serif"; font-size: 13.0pt; mso-ansi-language: EN-US; mso-bidi-font-size: 11.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[10]</span></sup></sup></a></span></b> </span></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white;"><u><span style="font-size: xx-small; line-height: 150%; mso-ansi-language: EN-US; mso-bidi-font-size: 11.0pt;">4<sup>th</sup>
General Staff Department: </span></u></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
The
Electronic Countermeasures (ECM) and Radar Department, also known as the 4th
GSD Department, is responsible for developing equipments, doctrines, and
tactics for electronic warfare and information. Established in 1990, it
maintains a data base of electronic and radar signatures of foreign armies. The
department is headed by a Director and two Deputy Directors and has at least, four
bureaus, one brigade, and two regiments. It is widely believed that an ECM
Brigade is headquartered at Langfang in Hebei Province with subordinate
battalion-level entities located in Anhui, Jiangxi and Shandong. Two units,
including one with operational or experimental satellite jamming
responsibilities, are located at Hainan Islands with the purpose of jamming US
satellites. All PLA, PLAAF and PLAN Military Regions have one ECM Regiment. The
3<sup>rd</sup> and 4<sup>th</sup> General Staff Departments also operate a
joint centre dedicated for network attack/ defense training system. </span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white;"><u><span style="font-size: xx-small; line-height: 150%; mso-ansi-language: EN-US; mso-bidi-font-size: 11.0pt;">General
Political Department (GPD):</span></u></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
The
GPD functions directly under the Central Military Commission (CMC). It oversees
the discipline, political education and indoctrination of PLA personnel. It has
an organisation called the China Association for International Friendly
Contacts which infiltrates foreign armies in order to subvert loyalty of their
personnel and propagate Chinese ideology among them to further their aim. The
Political or the Liaison Department also conducts counter-espionage activities
in foreign countries to keep a watch on its own intelligence operatives. The
GPD maintains Liaison Departments at the Military Region (MR) level. The
Department also oversees the <span lang="EN-IN"><a href="http://en.wikipedia.org/wiki/Military_Museum_of_the_Chinese_People%27s_Revolution" title="Military Museum of the Chinese People's Revolution">Military Museum of the Chinese
People's Revolution</a></span>, <span lang="EN-IN"><a href="http://en.wikipedia.org/wiki/PLA_Daily" title="PLA Daily">Liberation Army Daily</a></span>, the PLA Literature and Art Press (Kunlun Press),
PLA Pictorial, and PLA Press.</span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 182.05pt center 225.65pt; text-align: justify;">
<b><span style="color: white;"><span lang="EN-IN" style="font-size: xx-small; line-height: 150%; mso-bidi-font-size: 11.0pt;">Human Intelligence:</span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> The modus operandi of
the Chinese intelligence is uniquely Chinese in its application characterised
by Chinese cultural traits. As only few cases of Chinese intelligence
operations are available for detailed study and analysis, it is generally
presumed that Chinese intelligence trade craft is primitive and low in its
reach. The famous case of Larry Wu-Tai Chin is indicative that even before
People’s Republic of China (PRC) came into existence, the CCP’s intelligence
setup had started recruiting deep penetration sources in target areas. Chin
passed on classified information to China while working for the US intelligence
community for over 35 years. He supplied a stream of high grade intelligence
till his retirement in 1981. He was detected only in 1985 when his cover was
blown by a defector leading to his suicide before being brought to trial. The
trade craft used for intelligence collection, contacts between the source and
handling officers, communications, briefing and debriefing etc. show a high
degree of sophistication. The fact that Chin was able to operate undetected for
35 years also indicates high level of secrecy standards in protecting source
identity. </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> The technique and
methodology adopted by the Chinese operatives in respect of raising and
handling human assets (intelligence sources) is slightly different from those
employed by other modern intelligence agencies. Even after the initial ‘ice
breaking exercises’, the handler remains vague and circumspect in specifying
his needs and considerations in return. Emphasis is more on personal and
friendly relations. Quite often, even when
a human asset starts passing on information, he is not consciously aware of
working as an intelligence agent. The trade craft used is elementary and the
relationship between the handler and the source is nebulous and ill-defined. It
is only after considerable period of time that the handler discloses his real
intentions, requirements and identity; asking the agent to follow more rigorous
trade craft for collection of classified information, fixing of RVs,
communications etc. Despite the fact that during its formative years the
Chinese intelligence operatives were trained by the KGB, who make a fetish of
traditional trade craft, their cultural trait of being circumspect and
employing symbols to communicate is
discernible in their intelligence practices. Nigel Inkstar, in his ‘Chinese
Intelligence in the Cyber Age’ however, feels that “when the need arises, or
when they are sure of their ground, Chinese intelligence officers can be very
direct and explicit and capable of deploying sophisticated tradecraft”. </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> Chinese are also
known to effectively provide cover identities to its human assets using forged
documents. The case of Liu Kang-Sheng, a
MSS operative, who was caught using forged Thai and Singaporean passports is
illustrative. Though passports of these countries have high security features,
it was found that the forged documents were almost perfect in incorporating
these features. It is obvious that Chinese intelligence has well developed
facilities for forging documents. </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> Among the Chinese
intelligence officers, there is a marked preference for people of Chinese
ethnicity and those seen as friends of China for cultivation as human assets.
However, this phenomenon is gradually undergoing a change. Valentin Danilov, a
Russian physicist who headed the Thermo-Physics Centre at <a href="http://en.wikipedia.org/wiki/Krasnoyarsk" title="Krasnoyarsk">Krasnoyarsk</a>
State Technical University (KTSU) and had researched on effects of solar
activity on space satellites is a case in point. In 2004, he was sentenced to
14 years imprisonment for passing on classified information to the Chinese.
Similarly, Swedes uncovered diplomats in the Chinese embassy in Stockholm who
recruited a Uyghur émigré to monitor the activities of Uyghurs in Europe. The
case of US nationals Noshir Gowadia and Glenn Duffy Shriver are also
illustrative of Chinese intelligence recruiting foreign nationals for
espionage. Shriver was arrested for spying in June 2010 while flying to China.
He pleaded guilty of unlawful communication of national defence information
after a polygraph test and was imprisoned for four years. He had met his
Chinese handlers about 20 times and received $70,000 for the services rendered.
Gertz Bill reported in Washington Times
on March 25, 2013 that “<a href="http://www.washingtontimes.com/topics/glenn-duffie-shriver/"><span lang="EN-US">Shriver</span></a></span> is not the first spy for the Chinese to target
the <span lang="EN-IN"><a href="http://www.washingtontimes.com/topics/united-states-central-intelligence-agency/"><span lang="EN-US">CIA</span></a></span>. <span lang="EN-IN"><a href="http://www.washingtontimes.com/topics/us-intelligence/"><span lang="EN-US">U.S. intelligence</span></a></span> sources have said at least three <span lang="EN-IN"><a href="http://www.washingtontimes.com/topics/united-states-central-intelligence-agency/"><span lang="EN-US">CIA</span></a></span> officers who reported to Director <span lang="EN-IN"><a href="http://www.washingtontimes.com/topics/george-j-tenet/"><span lang="EN-US">George J. Tenet</span></a></span> in 1999 as having spied for <span lang="EN-IN"><a href="http://www.washingtontimes.com/topics/china/"><span lang="EN-US">China</span></a></span>, but were never caught. One of the agents was
paid $60,000 by Beijing”. </span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> Chinese
intelligence pursues its defined operational missions, once defined and
approved, most doggedly unmindful of its
cost-benefit ratio. Chinese efforts to go for outright purchase of a Stealth
aircraft parts manufacturing company for obtaining the in-flight refuelling
capability for its Air Force is a case in point. The attempt was foiled at the
last moment. It resorts to all means, including most unethical practices to
achieve its operational missions. The case of Da Chuang Zheng, a Chinese
intelligence agent, who was caught while attempting to steal advanced radar and
electronic surveillance technology to China is one among many such cases of
heist. </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> The Chinese have
mastered the technique of amalgamating disparate micro intelligence accessed
from incongruous sources with no comparable gradations in respect of their
authenticity and reliability. This technique of ‘Thousand Grains’ entails
collecting small bits of information and then piecing them together to make intelligence sense.
This has particularly been used for acquiring mid level technologies using
inputs both from human and technical sources. Widely spread Chinese diasporas
working in research and academic establishments, high technology using
manufacturing concerns, business houses etc. are often utilised for the
purpose. Potential targets are, at times, recruited during their visits to
China. Another variation is collecting micro intelligence bits during participation
in scientific cooperation programmes, seminars and conferences in foreign
countries and visits of scientists under scholar overseas exchange programmes.
FBI investigations in 1988 had revealed that the technology for neutron bomb
detonated by China was not indigenously developed but acquired from Lawrence
Livermore National Laboratories in California. Various Chinese delegations
comprising ostensibly of scientists, but actually MSS intelligence operatives,
visited the facility and were able to collect the required information in bits
and pieces over a prolonged period of time. </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> Chinese
intelligence closely monitors activities of political dissidents and groups
both within and outside China, suspected foreign agents, visitors and scholars
visiting China and members of diplomatic missions. Human assets are often
placed in vantage positions to cover their activities. In June 1989, Shou
Huaqiang, a delegate to the Chinese Alliance for Democracy Convention in
California, an anti-China dissident group, publically declared that he was an
MSS agent sent to spy on the activities of the Alliance. He alleged that he was
forced for the job by MSS officers who made him sign an agreement with
instructions to disrupt its work. </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt 132.0pt; text-align: justify;">
<b><span style="color: white;"><u><span lang="EN-IN" style="font-size: xx-small; line-height: 150%; mso-bidi-font-size: 11.0pt;">Cyber Intelligence:</span></u></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt 132.0pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN">When the rest of the world was busy celebrating the great strides in
Information and Communication Technology (ICT) in the late eighties, the
Chinese Strategic Community was busy evaluating its security implications. They
realised that they could not allow the revolution in ICT bypass it, lest their
modernisation programme come to a naught. At the same time, if allowed free
access, it could not escape its concomitant adverse fallouts. The American
military successes during the Gulf War during 1990s shook them and made them
realise formidable capabilities of war machine supported by the informatics.
Internally, in the wake of people’s uprising culminating in Tiananmen Square
massacre in 1989, there were apprehensions about internal security if people
were allowed unchecked access to the outside world through internet. By 1996,
the number of internet users in China had touched the figure of 2 million,
which was fraught with danger. The ‘bourgeoisie’ influence through the internet
posed a threat to the Chinese Communist Party’s ongoing Patriotic Education
Campaign launched in early nineties. These developments led China to embark on
an ambitious programme of acquiring cyber dominance, both in offensive and
defensive modes. It became evident by 2008 that Chinese intelligence had made
remarkable strides in this direction on both fronts. </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> While
there is no direct evidence to prove culpability of Chinese intelligence
undertaking covert cyber intelligence operations abroad, there is ample
circumstantial evidence to infer that. Besides reliable intelligence inputs,
tracing large number of cyber attacks to servers in China, technological
sophistication of cyber attacks, resources required to carry out the operations
at global scale, selection of targets, type of information accessed and long
history of Chinese intelligence for science and technology thefts strongly
point towards state involvement.<a href="https://www.blogger.com/null" name="_ednref11" title=""><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 13.0pt; mso-ansi-language: EN-IN; mso-bidi-font-size: 11.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[11]</span></span></span></a>
Many instances of cyber attacks on countries like the US, Canada, Japan and
India have been tracked to China. There are strong pointers to infer that China
is indulging in large scale cyber espionage using an army of hackers, drawn
from military, intelligence, cyber professionals etc. As an intelligence
activity, it has enabled China to penetrate classified domains of target countries
to extract technological and systems information and collect military and
security related information about programmes and activities of the countries
on its intelligence radar. On the internal security front, it is being used to
contain and counter liberal and democratic ideas of political dissidents.
However, there is little information to assess China’s ability to validate and
analyse the colossal data collected by it both internally and externally.</span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> The Gulf
War, in addition to highlighting the potential of information and communication
technology (ICT), also made the Chinese aware of the heavy dependence of
Western military systems on these state of the art technologies and attendant
vulnerabilities. They saw in it an opportunity of developing asymmetric
capabilities which could defeat advanced technical capabilities through
counter-electronic systems. </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> Col Ling
Qiu and Col Wang Xiangusi in 1998 in their book ‘Unrestricted Warfare’
conceptualised how huge US combat superiority emanating from its IT edge could
be transformed into their vulnerability. It was a doctrinal shift for preparing
People’s Liberation Army (PLA) to fight under informationised conditions.
According to Nigel Inkster, “the PLA is pursuing a highly ambitious
cyber-warfare agenda that aims to link all service branches via a common ICT
platform capable of being accessed at multiple levels of command and has
created three new departments of Informatisation, Strategic Planning and
Training to bring this agenda into being.”<a href="https://www.blogger.com/null" name="_ednref12" title=""><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 13.0pt; mso-ansi-language: EN-IN; mso-bidi-font-size: 11.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[12]</span></span></span></a></span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<span style="font-size: xx-small;"><b><span style="color: white;">
<span lang="EN-IN"> Though
late to enter the internet domain, China took giant strides, both in
development of hardware and software on one hand and training people on the
other, that made up for the lost time. The first indications of Chinese
capabilities started trickling in the early years of the last decade when
hackers broke into US official networks to steal sensitive information which US
investigators code-named as ‘Titan Rain’. </span>Nathan Thornburgh writing in the Time Magazine<span lang="EN-IN">
said that the targets included US military establishments, NASA, the World
Bank, etc</span> Similar attempts were
reported from United Kingdom, Germany and New Zealand during 2006-07 detailing
cyber attacks that had emanated from China. Mandiant, an American firm dealing
with information security, reported that PLA Unit 61398, one amongst many such
units, was responsible for the cyber attacks on more than 140 companies the
world over since 2006. In 2009, University of Toronto’s Information Warfare
Monitor Citizen came out with its so-called ‘Ghost Net” report detailing
intrusion by Chinese hackers into the network system of Indian security
establishment and offices of Dalai Lama’s secretariat.<a href="https://www.blogger.com/null" name="_ednref13" title=""><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"><span style="font-family: "Times New Roman","serif"; font-size: 13.0pt; mso-ansi-language: EN-US; mso-bidi-font-size: 11.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[13]</span></span></span></a>
Though rejected by the Chinese, it was a well researched and accessed
professional report which concluded that the cyber operations were being
conducted by the “2nd Bureau of the People’s Liberation Army (PLA) General
Staff Department’s (GSD) 3rd Department”.<a href="https://www.blogger.com/null" name="_ednref14" title=""><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"><span style="font-family: "Times New Roman","serif"; font-size: 13.0pt; mso-ansi-language: EN-US; mso-bidi-font-size: 11.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[14]</span></span></span></a></span></b>
</span></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<span style="font-size: xx-small;"><b><span style="color: white;">
The
Chinese have been systematically recruiting and training a pool of cyber
professionals to undertake these tasks. In 2005, hacker competitions were held at the regional and provincial levels in China
for hiring computer network operators. In 2007-08, the Ministry of Public
Security (MPS), internal intelligence cum security outfit advertised job
vacancies for hackers under the cover name of computer operators. According to
a report in Asia Times of Feb 9, 2010, Chinese embassies were contacting
Chinese IT graduates in different foreign universities purportedly for jobs in
public security departments but essentially for computer network operations.<a href="https://www.blogger.com/null" name="_ednref15" title=""><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"><span style="font-family: "Times New Roman","serif"; font-size: 13.0pt; mso-ansi-language: EN-US; mso-bidi-font-size: 11.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[15]</span></span></span></a></span></b>
</span></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<span style="font-size: xx-small;"><b><span style="color: white;">
China’s
cyber capabilities are not only confined to military combat needs, espionage
and internal security. Economic and Technical intelligence, that have figured
high in its national priorities, are also being served through cyber warfare.
In target countries, computer networks containing classified data pertaining to
trade secrets or denied technologies are being accessed. According to a report
of the Office of National Counter Intelligence Executive submitted to US
Congress in 2011, US networks were facing Chinese onslaught for trade
information, communication technology, data pertaining to scarce natural
resources and civilian technologies in energy and health sectors.<a href="https://www.blogger.com/null" name="_ednref16" title=""><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"><span style="font-family: "Times New Roman","serif"; font-size: 13.0pt; mso-ansi-language: EN-US; mso-bidi-font-size: 11.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[16]</span></span></span></a>
Accessing critical defence technologies is more alarming. A recent report
published in the Washington Post points out that Chinese hackers have broken
into several defence production firms involved in the manufacturing of critical
military hardware including the Patriot missile system, the Terminal High
Altitude Area Defense, or THAAD, as also vital combat aircraft and ships like
the F/A-18 fighter jet, the V-22 Osprey, the Black Hawk helicopter and the
Navy’s new Littoral Combat Ship. The report submitted to the Pentagon by the
Defense Science Board underlines the enormity of the Chinese cyber-espionage
activities and investment of effort to overcome the US military advantage.<a href="https://www.blogger.com/null" name="_ednref17" title=""><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"><span style="font-family: "Times New Roman","serif"; font-size: 13.0pt; mso-ansi-language: EN-US; mso-bidi-font-size: 11.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[17]</span></span></span></a> One illustrative case is of US company AMSC,
specializing in wind turbine manufacturing, having lost its centre software
code to the Chinese hackers. This theft led to the company losing 80 % of its
revenues. Similar was the experience of Nortel, Canadian Telecommunication
giant that went into bankruptcy. Brian, its former security adviser in an
interview to CBC on October 11, 2012 said that, “Huawei spent years hacking
into Nortel’s system and stealing information so it could compete with Nortel
on world markets and added that, “These kind of things are not done just by
average hackers. I believe these are nation state activities”.<a href="https://www.blogger.com/null" name="_ednref18" title=""><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"><span style="font-family: "Times New Roman","serif"; font-size: 13.0pt; mso-ansi-language: EN-US; mso-bidi-font-size: 11.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[18]</span></span></span></a><i> </i>A disclosure was made by <i>Daily Mail</i> in March 2012 that Chinese
hackers were able to find “full access” to NASA computers containing
information about 13 spacecrafts. It is believed by experts that it helped the
Chinese in their quest for outer space utilization programme. Similar evidence
of Chinese efforts to beef up its cyber warfare capabilities came to light in
2011 when McAfee, an American cyber security company brought out its White
Paper, code named ‘Operation Shady Rat’. McAfee reported about the attacks,
some of them raging for as long as five years targeting 70 government and
private agencies in different parts of the world. Forty nine of these were US
based networks while others were located in Taiwan, India, UK, South Korea,
etc. Through these digital storms, the Chinese have also been undertaking
‘Spear-Phishing’ operations that involves sending innocuous e mails to targeted
individuals, websites etc and to extract stored data from the computers.
Through a detailed and carefully researched trade craft, high potential targets
are selected, artificial identities created, and malware messages routed
through multiple destinations that are often difficult to trace. A report
brought out by the Northrop Grumman in 2009 geographically detailed the modus
operandi used first to breach and then to ‘exploit’ <a href="https://www.blogger.com/null" name="_ednref19" title=""><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"><span style="font-family: "Times New Roman","serif"; font-size: 13.0pt; mso-ansi-language: EN-US; mso-bidi-font-size: 11.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[19]</span></span></span></a></span></b>
</span></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
Information
about what is the cyber intelligence infrastructure, who controls it, how the
key intelligence needs are identified, what is the co-ordination mechanism, how
the data is validated and integrated to convert information into usable
intelligence are still grey, if not black, areas. Going by the scale of
activity and swathe of their operational targets, it presents a highly
confusing picture. It is believed that 3/PLA has the highest technological
capabilities at least to gain covert entry into targeted domains and access the
data. However, except for information of military value, its capability to
process other inputs are seriously doubted. The co-ordination mechanism
available with the MSS also appears to be inadequate and while the relationship
between MSS and MPS, uncomfortable though, is known to some extent, the working
mechanism of 3/PLA with other intelligence outfits is a matter of speculation. </span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white;"><span lang="EN-IN" style="font-size: xx-small; line-height: 150%; mso-bidi-font-size: 11.0pt;">Intelligence in Internal Security: </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<i><span lang="EN-IN"> </span></i><span lang="EN-IN">To make a
holistic assessment of what the Chinese call Comprehensive National Power
(CNP), it is essential to evaluate its internal stability and political
dynamics and the role intelligence services play in this arena. It assumes
special import as with the opening of China and its modernisation programme,
the Chinese are finding it increasingly difficult to keep a lid over internal
dissidence. Murray Scot Tanner in his ‘Cracks in the Wall: China’s Eroding Coercive
State’ as back as 2001, observed that, “Beijing’s control over the coercive
system, as well as that system’s capacity to maintain social control appears to
be slipping”. Since then, the internal security landscape has further
deteriorated. There have been well over one hundred thousand incidents of mass
protests and agitations in 2012. Large scale visits of Chinese, particularly
the students abroad, access to internet and mobile phones, activities of
pro-democracy groups and economic affluence have raised the threshold of
political awareness. The situation in Tibet has become precarious, particularly
after the Olympic Games in 2008. Besides, a large number of protests and
agitations, there have been over a hundred cases of self immolation by Tibetans
since the Olympics. The rise of Islamic radicalism and violence in Xinjiang is
another cause of serious concern. The Tiananmen Square massacre still looms
large on the psyche of the people and have accentuated Chinese fears of
internal destabilisation which they attribute to conspiratorial
counter-revolutionary forces propped up by external enemies. The anxiety was
discernible when in the year 2011, the then Chinese Premier Wen Jiabao, in a
public address, stated that <i>“</i>We have
not yet fundamentally solved a number of issues that the masses feel strongly
about<i>”. </i>The Jasmine Revolution in
2011 further shook the Chinese administration and they hiked their budget for
internal security, reportedly, to $95 billion in 2011 and $111 billion in 2012.
It is significant that notwithstanding China’s massive military modernisation
programme, the internal security budget ranks above the defence budget. </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt 186.0pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> China’s
internal intelligence apparatus is much more complex and multilayered; with
both the party and state having overlapping roles. Department one of MSS, the
premier national intelligence agency, handles ‘homeland security’ while its
department six and nine deal with ‘counter espionage’ and ‘counter defection
and counter surveillance’ respectively.</span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;"><span style="font-size: 15.0pt; line-height: 150%; mso-ansi-language: EN-US; mso-bidi-font-size: 11.0pt;">The Indian Experience</span><span lang="EN-IN" style="font-size: 12.0pt; line-height: 150%; mso-bidi-font-size: 11.0pt;">:</span><span lang="EN-IN"> </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt 186.0pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> The Indian
experience of Chinese intelligence dates back to early fifties when its
intelligence apparatus started operating in Tibet. It assisted both the CCP and
the PLA in degrading Dalai Lama’s regime and consolidating its position in
Tibet, politically and militarily. Dalai Lama was eventually coerced to sign
the 1951 agreement. Extensive reconnaissance of the areas bordering India was
done and construction of national highway 219 was undertaken through Aksai Chin
connecting Lhasa in Tibet to Xinjiang. The Indian intelligence, though
reporting about Chinese activities in Tibet for quite many years to a
government that was not listening, had physical confrontation with the Chinese,
when on November 21, 1959, Karam Singh, a Deputy Central Intelligence Officer (DCIO) of the Intelligence Bureau was
killed at Kongka La (Hot Springs) in Ladakh.<a href="https://www.blogger.com/null" name="_ednref20" title=""><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 13.0pt; mso-ansi-language: EN-IN; mso-bidi-font-size: 11.0pt; mso-bidi-font-weight: bold; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[20]</span></span></span></a> The
years that followed saw intensified Chinese intelligence activities mainly
undertaken by the PLA and party apparatus in Tibet. </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt 186.0pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> Following
the exodus of over 80,000 Tibetans, led by the Dalai Lama, in 1959 to India and
a deep sense of fear that, his influence over the Tibetans created in Chinese
minds, coverage of Dalai Lama and Tibetan refugees in India became a high
priority item for Chinese intelligence. Ethnic Tibetans are regularly recruited
and infiltrated into India, mostly through Nepal, to cover the activities of
the Dalai Lama. Arrest of Pema Tsering, a former PLA combatant, on May 23, 2013
from Dharamshala in Himachal Pradesh for spying is one of the recently reported
cases. He infiltrated into India a few years back, acquired an Indian voter ID
card in 2011 and was masquerading as a Tibetan refugee.<a href="https://www.blogger.com/null" name="_ednref21" title=""><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 13.0pt; mso-ansi-language: EN-IN; mso-bidi-font-size: 11.0pt; mso-bidi-font-weight: bold; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[21]</span></span></span></a> </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt 186.0pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> Intelligence
coverage through diplomatic staff has remained in vogue all through and got
intensified particularly after 1959. Even during Den Xiaoping’s regime when
this practice was discouraged, use of legal cover for intelligence operations
in India remained unabated. In some instances, Chinese nationals from mainland
China with illegal cover are sent to India for coverage of political
intelligence, establishing contact with the insurgent and extremist groups and
collecting defence related intelligence. One of the illustrative case is of
Wang Qing, a young Chinese lady who operated in India using different covers
before she was arrested in Dimapur (Nagaland) on January 18, 2011. She flew to
Kolkata from Kunming on a tourist visa as an executive of a Chinese timber
company, and visited Nagaland where she held a four hour long secret meeting
with Naga insurgent leader T Muivah. She was deported and a protest note was
sent by the Indian government to the Chinese embassy. </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt 186.0pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> Chinese
intelligence has also been active in supporting North-eastern insurgent groups
and providing them with weapons, training and financial support. Coinciding
with the Cultural Revolution at home, the first group of Naga insurgents,
comprising 300 strong Naga rebels, led by Muivah and Isak Swu were imparted
military and ideological training in Yunan in 1966 and sent to India with a
consignment of arms. This trend continues till today with Chinese assisting the
Assamese, Manipuri and other rebels besides Left-Wing extremists.<a href="https://www.blogger.com/null" name="_ednref22" title=""><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 13.0pt; mso-ansi-language: EN-IN; mso-bidi-font-size: 11.0pt; mso-bidi-font-weight: bold; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[22]</span></span></span></a> One
of the recent cases of Chinese support to Indian insurgents was revealed during
questioning of Anthony Shimray, who after his return from China in 2010 was
arrested in Nepal. He was assured supply of 1,800 pieces of arms that included
AK series rifles, M 16 rifles, machine guns, sniper rifles, and rocket
launchers. The shipment was to be loaded from a port in Beihei in China and
sent to Cox’s Bazar in Bangladesh via a shipping agent based in Bangkok.<a href="https://www.blogger.com/null" name="_ednref23" title=""><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 13.0pt; mso-ansi-language: EN-IN; mso-bidi-font-size: 11.0pt; mso-bidi-font-weight: bold; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[23]</span></span></span></a> </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt 186.0pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> One
of the marked features of China’s intelligence activity in India is its close
relationship with Pakistan’s ISI.</span><span lang="EN-IN"> Besides, their close
strategic relationship, the advantages enjoyed by Pakistanis in respect of
language, appearance, well entrenched local networks account for the special
relationship. This cooperation started way back in mid sixties with Dhaka as
the operational hub where Chinese and Pakistani intelligence officers first
established contacts with the North Eastern insurgents together. With the
deepening of this relationship, it got extended to other areas of common
interest. Daily Mail (UK) in its report dated September 30, 2012 observed that,
“Chinese agencies are financing and providing assistance to Pakistan’s ISI to
keep insurgent groups active in the North East.<a href="https://www.blogger.com/null" name="_ednref24" title=""><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 13.0pt; mso-ansi-language: EN-IN; mso-bidi-font-size: 11.0pt; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[24]</span></span></span></a>
However, with Chinese intelligence coming of age, there are indications that it
is now launching independent operations. </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt 186.0pt; text-align: justify;">
<b><span style="color: white;"><span lang="EN-IN" style="font-size: xx-small; line-height: 150%; mso-bidi-font-size: 11.0pt;">Conclusion: </span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal" style="line-height: 150%; tab-stops: 63.85pt 132.0pt; text-align: justify;">
<b><span style="color: white; font-size: xx-small;">
<span lang="EN-IN"> In last
six decades, starting from a primitive party apparatus, Chinese intelligence
has attained new heights and capabilities. Its intelligence apparatus is highly
complex and intricately intertwined between party and the government, internal
and external, civilian and military et al with parallel roots of command,
control and reporting etc. All this has led to large degrees of duplication and
redundancy. Though over the years, governmental machinery has taken control of
large segments of intelligence activity, the party apparatus continues to reign
supreme. Deeply concerned about internal security, all its intelligence
agencies have a marked internal intelligence or counter-intelligence role. The
PLA, over the years, has upgraded its intelligence capabilities at tactical,
technological and strategic levels, particularly in Asia Pacific Region, South
Asia and Central Asia. </span>It has
built an extensive technical and signal intelligence infrastructure, and its
electronic intelligence capabilities have been considerably augmented by
cyberspace and space based platforms. The MSS has evolved itself as the premier
foreign intelligence agency and besides diplomatic intelligence, it has been
aggressively hunting for technological data and systems information to augment
national economic and military capabilities. It continues to bank heavily on
Chinese global diaspora that provides it a vast catchment area for human assets
for intelligence gathering and espionage. To widen its catchment area, it is
expanding its illegal cover for intelligence gathering by using commercial
companies and business houses, media agencies, Chinese banks etc. Establishment
of nearly 380 Confucius Institutes in 180 countries, Chinese language
institutes etc. also are part of its foreign intelligence activities. China
envisions for itself a big power role and, silently but steadily, is building
up its intelligence capabilities commensurate to that vision. </span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoNormal">
<b><span style="color: white; font-size: xx-small;"><br /></span></b></div>
<b><span style="color: white; font-size: xx-small;">
<br />
<br clear="all" />
</span></b><br />
<hr align="left" size="1" width="33%" />
<b><span style="color: white; font-size: xx-small;">
</span></b><br />
<div id="edn1">
<div class="MsoEndnoteText">
<b><span style="color: white; font-size: xx-small;"><a href="https://www.blogger.com/null" name="_edn1" title=""><span class="MsoEndnoteReference"><span lang="EN-IN"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 10.0pt; mso-ansi-language: EN-IN; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[1]</span></span></span></span></a><span lang="EN-IN"> Ministry of State Security, Intelligence Resource Program,
Federation of American Scientists, accessed online at <span style="color: white;"><a href="http://www.fas.org/irp/world/china/mss/history.htm">http://www.fas.org/irp/world/china/mss/history.htm</a></span></span></span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div class="MsoEndnoteText">
<b><span style="color: white; font-size: xx-small;"><br /></span></b></div>
<b><span style="color: white; font-size: xx-small;">
</span></b></div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div id="edn2">
<div class="MsoEndnoteText" style="margin-top: 0in;">
<b><span style="color: white; font-size: xx-small;"><a href="https://www.blogger.com/null" name="_edn2" title=""><span class="MsoEndnoteReference"><span lang="EN-IN"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 10.0pt; mso-ansi-language: EN-IN; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[2]</span></span></span></span></a><span lang="EN-IN"> Bill Gertz, Inside the Ring: Terrorists’ Antics, The Washington
Times, May 16, 2012, accesed at <a href="http://www.washingtontimes.com/news/2012/may/16/inside-the-ring-terrorists-antics/?page=all">http://www.washingtontimes.com/news/2012/may/16/inside-the-ring-terrorists-antics/?page=all</a></span></span></b></div>
</div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div id="edn3">
<div class="MsoEndnoteText">
<b><span style="color: white; font-size: xx-small;"><a href="https://www.blogger.com/null" name="_edn3" title=""><span class="MsoEndnoteReference"><span lang="EN-IN"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 10.0pt; mso-ansi-language: EN-IN; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[3]</span></span></span></span></a><span lang="EN-IN"> Ibid (3) above</span></span></b></div>
</div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div id="edn4">
<div class="MsoEndnoteText">
<b><span style="color: white; font-size: xx-small;"><a href="https://www.blogger.com/null" name="_edn4" title=""><span class="MsoEndnoteReference"><span lang="EN-IN"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 10.0pt; mso-ansi-language: EN-IN; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[4]</span></span></span></span></a><span lang="EN-IN"> sinodefence.com, accessed at <a href="http://www.sinodefence.com/overview/organisation/gsd.asp">http://www.sinodefence.com/overview/organisation/gsd.asp</a></span></span></b></div>
</div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div id="edn5">
<div class="MsoEndnoteText">
<b><span style="color: white; font-size: xx-small;"><a href="https://www.blogger.com/null" name="_edn5" title=""><span class="MsoEndnoteReference"><span lang="EN-IN"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 10.0pt; mso-ansi-language: EN-IN; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[5]</span></span></span></span></a><span lang="EN-IN"> sinodefence.com, accessed at <a href="http://www.sinodefence.com/overview/organisation/gsd.asp">http://www.sinodefence.com/overview/organisation/gsd.asp</a></span></span></b></div>
</div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div id="edn6">
<b><span style="color: white; font-size: xx-small;">
</span></b><br />
<div class="MsoEndnoteText">
<b><span style="color: white; font-size: xx-small;"><a href="https://www.blogger.com/null" name="_edn6" title=""><span class="MsoEndnoteReference"><span lang="EN-IN"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 10.0pt; mso-ansi-language: EN-IN; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[6]</span></span></span></span></a><span lang="EN-IN"> Ibid (5) above </span></span></b></div>
</div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div id="edn7">
<div class="MsoEndnoteText">
<b><span style="color: white; font-size: xx-small;"><a href="https://www.blogger.com/null" name="_edn7" title=""><span class="MsoEndnoteReference"><span lang="EN-IN"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 10.0pt; mso-ansi-language: EN-IN; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[7]</span></span></span></span></a><span lang="EN-IN"> Nicholas Eftimiade, Chinese Intelligence Operations, 1994.</span></span></b></div>
</div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div id="edn8">
<div class="MsoEndnoteText">
<b><span style="color: white; font-size: xx-small;"><a href="https://www.blogger.com/null" name="_edn8" title=""><span class="MsoEndnoteReference"><span lang="EN-IN"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 10.0pt; mso-ansi-language: EN-IN; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[8]</span></span></span></span></a><span lang="EN-IN"> <a href="http://www.worldsecuritynetwork.com/Europe-Asia-United-States/Dumitrescu-Octavian/Considerations-about-the-Chinese-Intelligence-Services-II">ibid</a>
(8) above </span></span></b></div>
</div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div id="edn9">
<div class="MsoEndnoteText">
<b><span style="color: white; font-size: xx-small;"><a href="https://www.blogger.com/null" name="_edn9" title=""><span class="MsoEndnoteReference"><span lang="EN-IN"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 10.0pt; mso-ansi-language: EN-IN; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[9]</span></span></span></span></a><span lang="EN-IN"> Ibid (8) above</span></span></b></div>
</div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div id="edn10">
<div class="MsoEndnoteText">
<b><span style="color: white; font-size: xx-small;"><a href="https://www.blogger.com/null" name="_edn10" title=""><span class="MsoEndnoteReference"><span lang="EN-IN"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 10.0pt; mso-ansi-language: EN-IN; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[10]</span></span></span></span></a><span lang="EN-IN"> Mark A. Stokes, Jenny Lin and L.C. Russell Hsiao, The Chinese
People’s </span></span></b></div>
<div class="MsoEndnoteText">
<b><span style="color: white;"><span lang="EN-IN" style="font-size: xx-small;">Liberation Army Signals Intelligence
and Cyber Reconnaissance Infrastructure, Project 2049 Institute, November 11,
2011</span></span></b></div>
</div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div id="edn11">
<div class="MsoEndnoteText">
<b><span style="color: white; font-size: xx-small;"><a href="https://www.blogger.com/null" name="_edn11" title=""><span class="MsoEndnoteReference"><span lang="EN-IN"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 10.0pt; mso-ansi-language: EN-IN; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[11]</span></span></span></span></a><span lang="EN-IN"> </span>Many instances of
cyber attacks on countries like the US, Canada, Japan and India have been
tracked to China. On the internal security front it is being used to contain
and counter liberal and democratic ideas of political dissidents. </span></b></div>
</div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div id="edn12">
<div class="MsoEndnoteText">
<b><span style="color: white; font-size: xx-small;"><a href="https://www.blogger.com/null" name="_edn12" title=""><span class="MsoEndnoteReference"><span lang="EN-IN"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 10.0pt; mso-ansi-language: EN-IN; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[12]</span></span></span></span></a><span lang="EN-IN"> </span>Nigel Inkster (2010):
China in Cyberspace, Survival: Global Politics and Strategy, 52:4, 55-56, IISS</span></b></div>
</div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div id="edn13">
<div class="MsoEndnoteText">
<b><span style="color: white; font-size: xx-small;"><a href="https://www.blogger.com/null" name="_edn13" title=""><span class="MsoEndnoteReference"><span lang="EN-IN"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 10.0pt; mso-ansi-language: EN-IN; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[13]</span></span></span></span></a><span lang="EN-IN"> </span>Tracking Ghost net:
Investigating a cyber espionage network, Information Warfare Monitor,
March 29, 2009. accessed at <span lang="EN-IN"><a href="http://www.infowar.monitor.net/ghostnet"><span lang="EN-US">http://www.infowar.monitor.net/ghostnet</span></a></span><span lang="EN-IN"> </span></span></b></div>
</div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div id="edn14">
<div class="MsoEndnoteText">
<b><span style="color: white; font-size: xx-small;"><a href="https://www.blogger.com/null" name="_edn14" title=""><span class="MsoEndnoteReference"><span lang="EN-IN"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 10.0pt; mso-ansi-language: EN-IN; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[14]</span></span></span></span></a><span lang="EN-IN"> </span>Mandiant report,
accessed at <span lang="EN-IN"><a href="http://intelreport.mandiant.com/"><span lang="EN-US">http://intelreport.mandiant.com/</span></a></span><span lang="EN-IN"> </span></span></b></div>
</div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div id="edn15">
<div class="MsoEndnoteText">
<b><span style="color: white; font-size: xx-small;"><a href="https://www.blogger.com/null" name="_edn15" title=""><span class="MsoEndnoteReference"><span lang="EN-IN"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 10.0pt; mso-ansi-language: EN-IN; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[15]</span></span></span></span></a><span lang="EN-IN"> </span>Willy Lamb, “Beijing
beefs up Cyber Warfare capacity”, Asia Times, Feb 9, 2010</span></b></div>
</div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div id="edn16">
<div class="MsoEndnoteText">
<b><span style="color: white; font-size: xx-small;"><a href="https://www.blogger.com/null" name="_edn16" title=""><span class="MsoEndnoteReference"><span lang="EN-IN"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 10.0pt; mso-ansi-language: EN-IN; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[16]</span></span></span></span></a><span lang="EN-IN"> Foreign spies stealing US economic secrets in cyberspace – Report
submitted to Office of the National Counterintelligence Executive, accessed at
http:// <a href="http://www.ncix.gov/publication/reports/fecie_all/">www.ncix.gov/publication/reports/fecie_all/</a></span></span></b></div>
<div class="MsoEndnoteText">
<b><span style="color: white; font-size: xx-small;"><br /></span></b></div>
</div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div id="edn17">
<div class="MsoEndnoteText" style="margin-top: 0in;">
<b><span style="color: white; font-size: xx-small;"><a href="https://www.blogger.com/null" name="_edn17" title=""><span class="MsoEndnoteReference"><span lang="EN-IN"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 10.0pt; mso-ansi-language: EN-IN; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[17]</span></span></span></span></a><span lang="EN-IN"> </span>Ellen Nakashima,
‘Confidential report lists US weapons system designs compromised by Chinese cyberspies.
The Washington Post, May 28, 2013, accessed at</span></b></div>
<div class="MsoEndnoteText" style="margin-top: 0in;">
<b><span style="color: white;"><span lang="EN-IN" style="font-size: xx-small;"><a href="http://articles.washingtonpost.com/2013-05-27/world/39554997_1_u-s-missile-defenses-weapons-combat-aircraft">http://articles.washingtonpost.com/2013-05-27/world/39554997_1_u-s-missile-defenses-weapons-combat-aircraft</a></span></span></b></div>
<div class="MsoEndnoteText" style="margin-top: 0in;">
<b><span style="color: white; font-size: xx-small;"><br /></span></b></div>
</div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div id="edn18">
<div class="MsoEndnoteText" style="margin-top: 0in;">
<b><span style="color: white; font-size: xx-small;"><a href="https://www.blogger.com/null" name="_edn18" title=""><span class="MsoEndnoteReference"><span lang="EN-IN"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 10.0pt; mso-ansi-language: EN-IN; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[18]</span></span></span></span></a><span lang="EN-IN"> </span>CBC News, Oct 11,
2012, ‘Former Nortel executive warms against working with Huawei’, accessed at</span></b></div>
<div class="MsoEndnoteText" style="margin-top: 0in;">
<b><span style="color: white;"><span lang="EN-IN" style="font-size: xx-small;"><a href="http://www.cbc.ca/news/business/story/2012/10/11/pol-huawei-nortel-experience.html">http://www.cbc.ca/news/business/story/2012/10/11/pol-huawei-nortel-experience.html</a></span></span></b></div>
</div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div id="edn19">
<div class="MsoEndnoteText">
<b><span style="color: white; font-size: xx-small;"><a href="https://www.blogger.com/null" name="_edn19" title=""><span class="MsoEndnoteReference"><span lang="EN-IN"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 10.0pt; mso-ansi-language: EN-IN; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[19]</span></span></span></span></a><span lang="EN-IN"> Ibid (13) above.</span></span></b></div>
</div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div id="edn20">
<div class="MsoEndnoteText">
<b><span style="color: white; font-size: xx-small;"><a href="https://www.blogger.com/null" name="_edn20" title=""><span class="MsoEndnoteReference"><span lang="EN-IN"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 10.0pt; mso-ansi-language: EN-IN; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[20]</span></span></span></span></a><span lang="EN-IN"> Ram Pradhan, Debacle to revival: Y.B. Chavan as Defence Minister,
1962-65.</span></span></b></div>
</div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div id="edn21">
<div class="MsoEndnoteText">
<b><span style="color: white; font-size: xx-small;"><a href="https://www.blogger.com/null" name="_edn21" title=""><span class="MsoEndnoteReference"><span lang="EN-IN"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 10.0pt; mso-ansi-language: EN-IN; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[21]</span></span></span></span></a><span lang="EN-IN"> </span>The Indian Express,
May 24, 2013, accessed at <span lang="EN-IN"><a href="http://www.indianexpress.com/news/suspected-chinese-spy-arrested-from-dharamsala/1119797/">http://www.indianexpress.com/news/suspected-chinese-spy-arrested-from-dharamsala/1119797/</a></span></span></b></div>
</div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div id="edn22">
<div class="MsoEndnoteText">
<b><span style="color: white; font-size: xx-small;"><a href="https://www.blogger.com/null" name="_edn22" title=""><span class="MsoEndnoteReference"><span lang="EN-IN"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 10.0pt; mso-ansi-language: EN-IN; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[22]</span></span></span></span></a><span lang="EN-IN"> N Manoharan, </span><span style="font-family: "Calibri","sans-serif"; mso-ansi-language: EN-US; mso-bidi-font-family: Calibri;">China’s Involvement in
India’s Internal Security Threats: An Analytical Appraisal, Vivekanda
International Foundation, 2012, accessed at </span></span></b></div>
</div>
<span style="font-size: xx-small;"><b><span style="color: white;">
</span></b>
</span><br />
<div id="edn23">
<div class="MsoEndnoteText">
<b><span style="color: white; font-size: xx-small;"><a href="https://www.blogger.com/null" name="_edn23" title=""><span class="MsoEndnoteReference"><span lang="EN-IN"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 10.0pt; mso-ansi-language: EN-IN; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[23]</span></span></span></span></a><span lang="EN-IN"> Is China backing Indian Insurgents, The Diplomat, January 22, 2011,
accessed at <a href="http://thediplomat.com/2011/03/22/is-china-backing-indian-insurgents/">http://thediplomat.com/2011/03/22/is-china-backing-indian-insurgents/</a></span></span></b></div>
</div>
<b><span style="color: white; font-size: xx-small;">
<a href="https://www.blogger.com/null" name="_edn24" title=""><span class="MsoEndnoteReference"><span lang="EN-IN"><span class="MsoEndnoteReference"><span lang="EN-IN" style="font-family: "Times New Roman","serif"; font-size: 10.0pt; mso-ansi-language: EN-IN; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US;">[24]</span></span></span></span></a><span lang="EN-IN"> </span>Abhishek Bhalla, Daily
Mail (UK), September 30, 2012, accessed at <span lang="EN-IN"><a href="http://www.dailymail.co.uk/indiahome/indianews/article-2210988/China-inter-services-intelligence-touch-RAW-nerve-Northeast.html">http://www.dailymail.co.uk/indiahome/indianews/article-2210988/China-inter-services-intelligence-touch-RAW-nerve-Northeast.html</a></span></span></b>Sidharth K Menonhttp://www.blogger.com/profile/11412252277913740873noreply@blogger.comtag:blogger.com,1999:blog-7965927633581367449.post-35180579408070143202014-11-18T17:00:00.001+05:302015-03-21T13:53:59.541+05:30RUSSIAN MILITARY INTELLIGENCE AND UKRAINE - LONG TERM VISION PAID OFF<div style="text-align: center;">
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:DontVertAlignCellWithSp/>
<w:DontBreakConstrainedForcedTables/>
<w:DontVertAlignInTxbx/>
<w:Word11KerningPairs/>
<w:CachedColBalance/>
</w:Compatibility>
<w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><b>GRU IN UKRAINE</b></div>
<span style="font-size: xx-small;"><b><br /></b>
</span><br />
<div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">
<span style="background-color: black;"><b><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-family: "Arial","sans-serif"; font-size: xx-small;">As many
as one hundred Russian military intelligence officers and special forces troops
are leading the seizures of towns and local governments in Ukraine's Donetsk
province, the Ukrainian intelligence chief said today in his first public
account of the crisis.</span></b></span><br />
<a href="http://4.bp.blogspot.com/-S7UZ_Yuso9E/VGsr-mM1LcI/AAAAAAAAAkI/TMrdtjBkF6s/s1600/RUSSIAN%2BFLAG.gif" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><span style="font-size: xx-small;"><img border="0" src="http://4.bp.blogspot.com/-S7UZ_Yuso9E/VGsr-mM1LcI/AAAAAAAAAkI/TMrdtjBkF6s/s1600/RUSSIAN%2BFLAG.gif" height="133" width="200" /></span></a><span style="background-color: black; font-size: xx-small;"><b><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-family: "Arial","sans-serif";"> </span><span style="font-family: "Arial","sans-serif";"><br />
<span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto;">Russia’s military intelligence agency, the GRU,
has spent years building covert networks that its officers now are using to
help seize cities such as Slaviansk and Kramatorsk in the north of Donetsk,
said Valentyn Nalyvaichenko, the head of Ukraine’s State Security Service (the</span></span><span style="font-family: "Arial","sans-serif";"> </span><i><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-family: "Arial","sans-serif";">Sluzhba Bezpeky Ukrainy</span></i><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-family: "Arial","sans-serif";">, or SBU). Nalyvaichenko,
a career diplomat and security official, gave one of the broadest descriptions
of the conflict by a Ukrainian official during an online discussion hosted by
the Atlantic Council.</span></b></span><br />
<a href="http://1.bp.blogspot.com/-oQ3Aia9xZYg/VGsr_8JEpRI/AAAAAAAAAkQ/ULPs4UvAflA/s1600/UKRAINE%2BFLAG.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><span style="font-size: xx-small;"><img border="0" src="http://1.bp.blogspot.com/-oQ3Aia9xZYg/VGsr_8JEpRI/AAAAAAAAAkQ/ULPs4UvAflA/s1600/UKRAINE%2BFLAG.png" height="133" width="200" /></span></a><span style="background-color: black; font-size: xx-small;"><b><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-family: "Arial","sans-serif";"> </span><span style="font-family: "Arial","sans-serif";"><br />
<span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto;">As many as thirty special forces troops or
officers of Russia’s military intelligence service, the GRU, are working in the
Slaviansk region, Nalyvaichenko said. Slaviansk and the adjacent district of
Kramatorsk are the strongest point of the Russian operation, he said. Ukraine
is seeking in particular to arrest two other GRU officers who are coordinating
“the most dangerous and hostile activity” in that region, Nalyvaichenko said.
The SBU has named one of those as Colonel Igor Strelkov, who it says also coordinated
preparations for Russia’s seizure of Crimea.</span></span></b></span><br />
<span style="background-color: black; font-size: xx-small;"><b><span style="font-family: "Arial","sans-serif";"><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto;"> </span><br />
<span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto;">The SBU has arrested three GRU officers whom it
is interrogating in Kyiv, and twenty-one members of the GRU’s network,
Nalyvaichenko said.</span></span><span style="font-family: "Arial","sans-serif";"> </span><span style="font-family: "Arial","sans-serif";"><br />
<span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto;">Russian-organized gunmen hit a Ukrainian
military aircraft flying over Slaviansk today and detained an American
journalist for the website Vice News, Nalyvaichenko confirmed during the
discussion, in which he answered questions submitted by reporters. While
pro-Russian separatists have seized government buildings and organized public
demonstrations in other parts of eastern Ukraine, notably Luhansk province,
they are “not so hostile, they are not terrorizing, at least, the local
community, and they are not conducting crimes or taking hostages every day like
is happening currently in … Slaviansk,” Nalyvaichenko said.</span></span></b></span><br />
<span style="background-color: black;"><b><span style="font-family: "Arial","sans-serif"; font-size: xx-small;"><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto;"> </span><br />
<span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto;">During the conversation, moderated by Atlantic
Council Executive Vice President Damon Wilson, Nalyvaichenko spoke on these
points:</span></span></b></span><br />
<b><span style="font-size: xx-small;"><span style="font-family: "Arial","sans-serif";"><span style="background: none repeat scroll 0% 0% white;"> </span><br />
ON RUSSIA’S CONSTRUCTION OF A SUBVERSIVE NETWORK.</span><span style="font-family: "Arial","sans-serif";"> </span><span style="font-family: "Arial","sans-serif";">“For the last – we now understand -- two or
three years,” officers of Russia’s GRU “have created very covert but
well-structurized networks with agents, with pro-Russian organizations,
involving in such illegal activity many Ukrainians,” he said. Those networks
are most developed in Crimea, which Russia seized and annexed in March, and in
eastern Ukraine, Nalyvaichenko said. “Russian military officers … are the main
provocateurs and main organizers” of the uprisings in the east, recruiting sympathizers
and paying local criminal gangs to help attack local governments. “We for sure
know now who are they, I mean those Russian officers,” Nalyvaichenko said.
“They are very dangerous, well armed, [and] for years before prepared to do
what they are doing now.”</span></span></b></div>
<b><span style="font-size: xx-small;">
</span></b><br />
<div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">
<b><span style="font-size: xx-small;"><span style="font-family: "Arial","sans-serif";"><br />
ON THE ROLE OF POVERTY AND PROPAGANDA.</span><span style="font-family: "Arial","sans-serif";"> </span><span style="font-family: "Arial","sans-serif";">In Donetsk and Luhansk provinces, in farthest southeast Ukraine,
“up to 30 percent of the population is very pro-Russia,” notably following
twenty years of heavy Russian propaganda through Moscow-dominated TV channels
and radio networks that broadcast to the area. The two provinces, which rely on
inefficient and struggling Soviet-era heavy industry and mining, “are very poor
… with a high level of unemployment,” Nalyvaichenko said. “There are many
people, that’s true – hundreds, sometimes even thousands – who are very easy to
engage” in secessionist, pro-Russia demonstrations and other activism, he
said. The Russian military officers are “paying money in cash” to draw
people to demonstrations in support of the Moscow -backed demands for Ukraine
to become a federalized state with a weak central government, or for eastern
Ukraine to secede and perhaps join Russia.</span></span></b></div>
<b><span style="font-size: xx-small;">
</span></b><br />
<div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">
<b><span style="font-size: xx-small;"><span style="font-family: "Arial","sans-serif";"><br />
ON UKRAINE’S DIFFICULTIES IN RESPONDING.</span><span style="font-family: "Arial","sans-serif";"> </span><span style="font-family: "Arial","sans-serif";">Ukraine’s government cannot easily conduct forcible operations to
remove the separatists who have seized government buildings in eastern cities
because of the presence of civilians in and around them. “Many civilians are
truly on the scene; some of them again are paid for , some of them are not. But
local communities – especially Slaviansk and Kramatorsk -- are with those
criminals and Russian military officers” who are organizing the uprisings, he
said. Kyiv’s best option -- “the main tool to calm down the
situation” in the east – will be for the central government to provide more
funding, “more support to maintain normal life” to local authorities,
“especially in Donetsk and Lugansk oblasts.” Kyiv hopes to do so “as soon as
there will be more [financial] resources in the central government.”</span></span></b></div>
<b><span style="font-size: xx-small;">
</span></b><br />
<div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-eeZYgk_8rkA/VGssBxdAsII/AAAAAAAAAkY/5FJAADHKv0c/s1600/GTY_pro_russian_militants_mar_140602_16x9_992.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><span style="font-size: xx-small;"><img border="0" src="http://1.bp.blogspot.com/-eeZYgk_8rkA/VGssBxdAsII/AAAAAAAAAkY/5FJAADHKv0c/s1600/GTY_pro_russian_militants_mar_140602_16x9_992.jpg" height="180" width="320" /></span></a></div>
<b><span style="font-family: "Arial","sans-serif"; font-size: xx-small;"><br />
ON UKRAINE’S HOPES FOR HELP FROM INTERNATIONAL MONITORS.Ukraine’s
government is in contact with separatist groups, including in the hardline
cities of Slaviansk and Kramatorsk, trying to persuade them to disarm and end
their seizures of those cities. But it is hoping that international civilian
mediators from the Organization for Security and Cooperation in Europe. “We’re
relying on OSCE to help persuade them to stand down,” Nalyvaichenko said.
“We’re ready to extend their mandate in Donetsk and Slaviansk,” and “to provide
all evidence we are collecting every day” about the uprisings.</span></b></div>
<b><span style="font-size: xx-small;">
</span></b><br />
<div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">
<b><span style="font-family: "Arial","sans-serif"; font-size: xx-small;"><br />
ON U.S. INTELLIGENCE SHARING WITH UKRAINE. “Information and
intelligence sharing and even cooperation with our colleagues from the United
States are really well organized,” Nalyvaichenko said. “ We’re satisfied with
the level of cooperation. It is very intensive. It is very professional.” </span></b></div>
<b><span style="font-size: xx-small;">
</span></b><br />
<div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">
<b><span style="font-family: "Arial","sans-serif"; font-size: xx-small;"><br />
ON RUSSIAN TROOPS THREATENING UKRAINE’S BORDERS. Nalyvaichenko
confirmed estimates released by NATO of the Russian forces deployed near
Ukraine’s eastern borders. He said these include about 40,000 troops, 700
armored vehicles and 250 aircraft. They are deployed in three groups: one near
the Russian city of Belgorod, directed toward Ukraine’s second-largest city,
Kharkiv; a second grouped near the southern Russian city of Rostov and directed
toward Donetsk; and a third further south. He estimated that an additional
10,000 Russian troops are in Crimea.</span></b></div>
<b><span style="font-size: xx-small;">
</span></b><br />
<div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">
<b><span style="font-size: xx-small;"><br /></span></b></div>
<b><span style="font-size: xx-small;">
</span></b><br />
<div class="MsoNormal" style="background: none repeat scroll 0% 0% white; line-height: normal;">
<b><span style="font-size: xx-small;"><span style="font-family: "Arial","sans-serif";">ON THE UKRAINIAN
GOVERNMENT’S ‘SLEEPLESS NIGHTS.</span><span style="font-family: "Arial","sans-serif";">’</span><span style="font-family: "Arial","sans-serif";"> </span><span style="font-family: "Arial","sans-serif";"> In “the past month and a half” there have been “many, many
sleepless nights for me” because Russia has been constantly simulating and
feinting full-scale invasions of Ukraine. “Every night and every day,” Russia
has been conducting the “moving of troops, alarms, alerts, radio
communications, [and] provocations at the border.” They are “using
all possible … tools and methods” to intimid Ukraine’s government.</span></span></b></div>
<b><span style="font-size: xx-small;">
</span></b><br />
<div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">
<b><br /></b></div>
<b><span style="font-size: small;">
</span></b><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-qformat:yes;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin-top:0in;
mso-para-margin-right:0in;
mso-para-margin-bottom:10.0pt;
mso-para-margin-left:0in;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;}
</style>
<![endif]-->Sidharth K Menonhttp://www.blogger.com/profile/11412252277913740873noreply@blogger.comtag:blogger.com,1999:blog-7965927633581367449.post-12635882153908263452013-07-29T11:31:00.002+05:302013-07-29T11:34:35.792+05:30Latest on Chinese 'String of Pearls' (A different angle)<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-GoWJMR11uq4/UfYD4xJmLvI/AAAAAAAAAfY/LXwRtnF96E0/s1600/bth_Flag.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><span style="background-color: black;"><span style="color: white;"><img border="0" height="150" src="http://4.bp.blogspot.com/-GoWJMR11uq4/UfYD4xJmLvI/AAAAAAAAAfY/LXwRtnF96E0/s200/bth_Flag.jpg" width="200" /></span></span></a></div>
<a href="http://1.bp.blogspot.com/-owEr3kP97k8/UfYD7Hj0-5I/AAAAAAAAAfg/26dxcwK4wZI/s1600/chinese+flag.GIF" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><span style="background-color: black;"><span style="color: white;"><img border="0" height="131" src="http://1.bp.blogspot.com/-owEr3kP97k8/UfYD7Hj0-5I/AAAAAAAAAfg/26dxcwK4wZI/s200/chinese+flag.GIF" width="200" /></span></span></a><span style="background-color: black; color: yellow;"><span style="font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 18.90625px;">By Maj Gen Sheru Thapliyal</span><span style="font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 18.90625px;"> </span></span><br />
<a href="http://www.indiandefencereview.com/news/chinese-goal-indias-isolation-and-encirclement/" style="background-color: black; font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 18.90625px;"><span style="color: white;">http://www.indiandefencereview.com/news/chinese-goal-indias-isolation-and-encirclement/</span></a><br />
<span style="background-color: black; color: white;"><br /></span>
<span style="background-color: black; color: yellow;">This is a re-post from the above link solely with the intention of mass awareness. K.S.Menon</span><br />
<span style="background-color: black;"><span style="color: white;"><br /></span></span>
<b style="background-color: black;"><span style="color: white;">Our Neighbours - Slipping away???</span></b><br />
<span style="background-color: black;"><span style="color: white;"><br /></span></span>
<span style="background-color: black; color: white; font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 18.90625px;">Recorded history shows that India and China have loomed large in each other’s consciousness from well before the first millennium. As both nations became independent almost at the same time, it was inevitable that both will compete for domination in Asia. While China has gone about achieving this goal in a most systematic manner, our China policy is confused, timid and lacks focus and will laid out goals. The result is that Chinese have hemmed us in South Asia and it is ensuring that we are not able to break out from this stranglehold.</span><br />
<span style="background-color: black;"><span style="color: white;"><br style="font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 18.90625px;" /></span></span>
<span style="background-color: black; color: white; font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 18.90625px;">A hostile and nuclear armed Pakistan in the West, a sullen Nepal in the Centre, a bullied and frightened Bhutan in the North East and inimical Bangla Desh and Mynamar in the East.</span><br />
<span style="background-color: black;"><span style="color: white;"><br style="font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 18.90625px;" /></span></span>
<span style="background-color: black; color: white; font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 18.90625px;">In order to achieve this aim, the Chinese have employed a two pronged strategy. Overland, she is cultivating India’s neighbours – and has managed to put </span><br />
<span style="background-color: black;"><span style="color: white;"><br /></span></span>
<span style="background-color: black;"><span style="color: white;">a ring of hostile/inimical states around us. A hostile and nuclear armed Pakistan in the West, a sullen Nepal in the Centre, a bullied and frightened Bhutan in the North East and inimical Bangla Desh and Mynamar in the East. This is amounting to strategic encirclement of India. In the Indian Ocean, the Chinese strategy is better known as string of pearls strategy. The aim is to acquire port facilities starting from Gwader and Karachi in Pakistan, pressurising Maldives and Sri Lanka to grant berthing and refuelling facilities and naval base in Coca Islands in Northern Andamans.</span></span><br />
<span style="background-color: black;"><span style="color: white;"><br style="font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 18.90625px;" /></span></span>
<span style="background-color: black; color: white; font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 18.90625px;">The crucial difference between India and China’s standing in the South Asian Region is one of image. All South Asian nations fear China and in order not to annoy her, try and placate her by acceding to her demands. Whereas in the case of India, these very same nations hold us in contempt – our claim of India being in the race for Asian domination notwithstanding. They see India as a soft power unable to evolve a coherent policy in the neighbourhood and beset with a vast array of internal problems. Our neighbours see us appeasing China at every step and opportunity and feel it may be safer to follow the suit. Coming to our relations with our neighbours. Pakistan is openly hostile, pursuing its aim of balkanization of India with great focus and elan. Our response is patchy, confused and one of helplessness. With every terrorist attack, we run to USA asking her to restrain Pakistan. This is not helping our image in the neighbourhood. No self respecting nation should be whinnying before the super power but should take measures to counter an adversary. As far as Nepal is concerned, despite our bending over backwards to its needs, we have failed to stop it from falling into the Chinese arms.</span><br />
<span style="background-color: black;"><span style="color: white;"><br style="font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 18.90625px;" /></span></span>
<span style="background-color: black; color: white; font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 18.90625px;">Bhutan has more or less abrogated the India-Bhutan Treaty of 1950 which requires her to be guided by India in her foreign relations. Not only is she helpless to stop increasing Chinese intrusions into Western Bhutan but negotiating with China independent of India. Chinese want Bhutan to establish diplomatic relations with it which will happen sooner than later. Bangla Desh’s relations with India depend on which Begham is in power but irrespective of the regime, Bangla Desh can be expected to do the Chinese bidding. Chinese support to the Military junta in Myanamar is an open secret. They are grateful to China who is not treating them as untouchables like India. Apart from giving them the permission to establish a naval base of Coco Islands in North Andamans, talks of Stillwell Highway being resurrected are doing the rounds. So Mynamar is firmly in the Chinese camp.</span><br />
<span style="background-color: black;"><span style="color: white;"><br style="font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 18.90625px;" /></span></span>
<span style="background-color: black;"><span style="color: white;"><br style="font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 18.90625px;" /></span></span>
<span style="background-color: black; color: white; font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 18.90625px;">Now the string of pearls strategy. Pakistan has already accorded berthing and refuelling facilities to Chinese navy at Gwader and Karachi. Chinese are now pressurizing Maldivas and Sri Lanka to do likewise. It should not come as a surprise to anyone if that happens. China helped Sri Lanka during its war against LTTE while we squirmed due to the pressure from DMK and other South Indian political parties. Maldives apparently has forgotten that we saved the govt of President Gayoom in 1987 from Muslim predators. It may well grant refueling rights to Chinese navy.</span><br />
<span style="background-color: black;"><span style="color: white;"><br style="font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 18.90625px;" /></span></span>
<span style="background-color: black;"><span style="color: white;"><span style="font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 18.90625px;">In view of the focused and well thought out strategy of the Chinese if we think we are going to give the Chinese a run for their money in Asia, we need to refocus on the region instead of cosying upto the super power who is treating us with barely concealed ‘ contempt. Pakistan’s proxy war needs a strong response including punitive air strikes to take out the known terrorist camps in POK. </span><b style="font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 18.90625px;">Chinese intrusions must not be treated with the famous oriental calm. We must ask China to vacate our area in Aksai Chin – something we have never done so far</b><span style="font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 18.90625px;">. </span><b style="font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 18.90625px;">Concurrently infrastructural development in border areas must be taken up in right earnest. Nepal needs to be firmly told to be sensitive to Indian interest and not play footie with Pak lSI and Chinese failing which a blockade can bring her to her senses. Indo-Bhutan Treaty needs to be renegotiated and Bhutan must be given all help including military to counter the Chinese aggression.</b></span></span><br />
<span style="background-color: black;"><span style="color: white;"><br style="font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 18.90625px;" /></span></span>
<span style="background-color: black; color: white; font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 18.90625px;">Bangladesh must be firmly brought in line. Fencing must be completed and even cross border raids can be launched to destroy camps of ULFA and other militant groups on its soil. Mynamar junta must not be treated as untouchables. You have to do business with whoever is in power.</span><br />
<span style="background-color: black;"><span style="color: white;"><br style="font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 18.90625px;" /></span></span>
<span style="background-color: black; color: white; font-family: Verdana, Geneva, sans-serif; font-size: 13px; line-height: 18.90625px;">Relations with Sri Lanka and Maldives need to be energized. In short stop taking our neighbours for granted. This has been the greatest failure of India’s foreign policy in six decades and has allowed China to keep us unbalanced, unhinged and confined to South Asia.</span>Sidharth K Menonhttp://www.blogger.com/profile/11412252277913740873noreply@blogger.comtag:blogger.com,1999:blog-7965927633581367449.post-2983866496343796712013-06-24T11:00:00.002+05:302013-06-24T11:01:20.537+05:30X-47, THE FUTURE IS HERE.<h4>
<a href="http://2.bp.blogspot.com/-IN1ObgCYuDQ/UcfY5MFYq2I/AAAAAAAAAes/LgEsUvQ2S6I/s1600/images.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="105" src="http://2.bp.blogspot.com/-IN1ObgCYuDQ/UcfY5MFYq2I/AAAAAAAAAes/LgEsUvQ2S6I/s200/images.jpg" width="200" /></a>Northrop Grumman's answer. </h4>
<br />
<br />
<br />
<br />
The Pegasus unmanned air vehicle was initially developed under
private funding by the integrated systems sector of Northrop Grumman at
El Segundo in California. Pegasus received its X-47A designation in June
2001.<br />
The X-47A provided a proof of concept for the Defense Advanced
Research Projects Agency (DARPA) and the US Navy UCAV-N programme, and
is spiral 0 in the spiral development programme targeted towards US Navy
requirements. A similar programme managed by DARPA and the US Air Force
covered the development of the Boeing X-45 targeted towards US Air
Force requirement.<br />
DARPA announced the joint unmanned combat air vehicle (J-UCAS) programme to meet both the air force and naval requirements.<br />
<b><u><span style="font-size: small;">Pegasus X-47A and X-47B UCAV development</span></u></b><br />
<div class="leftpullquote">
<a href="http://1.bp.blogspot.com/-Q93nLHh0Oyc/UcfY8mWFKoI/AAAAAAAAAe8/uem5C_7AIyo/s1600/x-47pegasus_2.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="120" src="http://1.bp.blogspot.com/-Q93nLHh0Oyc/UcfY8mWFKoI/AAAAAAAAAe8/uem5C_7AIyo/s200/x-47pegasus_2.jpg" width="200" /></a>"The X-47 Pegasus is a<br />
US Navy unmanned combat air vehicle with a stealthy planform design."</div>
The roll out ceremony of the proof-of-concept X-47A vehicle was held
in July 2001 and the first flight was successfully completed in February
2003.<br />
The X-47B is a larger naval variant of the X-47A. In August 2004,
DARPA awarded the contract to Northrop Grumman for three X-47B
demonstrator UCAVs and an operational assessment phase to last from
2007–2009. Construction of the X-47B began in June 2005.<br />
In October 2005, DARPA handed the programme over to a joint USN and
USAF office. The spiral 1 development phase under the J-UCAS programme
included the design of the improved demonstrator air vehicles, X-45C and
the X-47B.<br />
In February 2006, the J-UCAS programme was cancelled by the US
Department of Defense and the USAF and USN were to follow separate UAV
programmes. Northrop Grumman halted work on the X-47B due to the
termination of J-UCAS programme.<br />
<br />
<b><u>Unmanned combat air system demonstrator (UCAS-D) programme</u></b><br />
<a href="http://2.bp.blogspot.com/-_kZxlhdL3Hw/UcfY7Q1ljdI/AAAAAAAAAe0/htK81e_JXA0/s1600/x-47pegasus_1.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="140" src="http://2.bp.blogspot.com/-_kZxlhdL3Hw/UcfY7Q1ljdI/AAAAAAAAAe0/htK81e_JXA0/s200/x-47pegasus_1.jpg" width="200" /></a><u> </u><br />
In August 2007, Northrop Grumman was selected by the US Navy for the
unmanned combat air system demonstrator (UCAS-D) with a version of the
X-47B with Pratt & Whitney F100-PW-229 engine. The programme is to
demonstrate the suitability of an autonomous UAV for aircraft carrier
operations and identify critical technologies.<br />
Two X-47B demonstrator air vehicles are being built under the UCAS-D
programme. The first demonstrator air vehicle (AV-1) was rolled out in
December 2008 and was completed in October 2009. Its structural proof
testing was carried out in July 2009.<br />
AV-1 was moved to Edwards Air Force Base (AFB) in July 2010. The
second demonstrator air vehicle (AV-2) completed its structural proof
testing in January 2011. It was transferred to Edwards AFB in March
2011.<br />
The first flight testing of AV-1 was scheduled to begin in late 2009,
but the programme fell behind schedule. It took off on its first flight
test in February 2011 and performed carrier landings in July 2011.<br />
The first carrier launches and recoveries of the X-47B are planned
for demonstration in 2013 with autonomous aerial refuelling in 2014.<br />
<a href="http://3.bp.blogspot.com/-crKBfgkjt_c/UcfY9Egme8I/AAAAAAAAAfE/ZWEj5zltASw/s1600/x-47pegasus_3.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="125" src="http://3.bp.blogspot.com/-crKBfgkjt_c/UcfY9Egme8I/AAAAAAAAAfE/ZWEj5zltASw/s200/x-47pegasus_3.jpg" width="200" /></a><br />
<b><u>X-47 Pegasus air vehicle</u></b><br />
<br />
The airframe is a stealthy planform design. It is diamond-kite shaped
with a 55° backward sweep on the leading edge and a 35° forward sweep
on the trailing edge. The X-47A has a wingspan of 8.47m and is 8.5m
long.<br />
Scaled Composites Inc of Mohave, California, were contracted to
manufacture the all-carbon composite airframe. The air vehicle has no
tail or vertical fin. Instead of a traditional rudder for yaw control,
the upper and lower surfaces are each fitted with two sections of moving
surfaces. A large elevon is clearly visible at the mid-section of each
trailing edge.<br />
The vehicle is robustly built for carrier take-off and landings and
uses a conventional wheeled take-off and landing with an arrestor hook.
The retractable tricycle-type landing gear consists of a single nose
wheel, twin wheel main landing gear and a fully retractable arrestor
hook. Smiths Aerospace is providing the landing gear for the X-47B.<br />
<div class="rightpullquote">
"In April 2007, Northrop Grumman submitted a bid to the US Navy for the unmanned combat air system demonstrator (UCAS-D)."</div>
<div class="rightpullquote">
</div>
<b><span style="font-size: small;"><u><span style="font-weight: normal;">Pegasus avionics</span></u></span></b><br />
<b><u><span style="font-weight: normal;"><br /></span></u></b>
The Pegasus is equipped with an avionics suite supplied by BAE
Systems Platform Solutions of Johnson City, New York. The avionics and
vehicle management computer performs flight control processing,
autopilot control, engine control processing, mission command and
control, navigation and other functions.<br />
The computer features an embedded, open-architecture CsLEOS real-time
operating system which uses 'brick-wall' time and memory partitioning
to allow multiple applications to run on the same system without
interfering with each other.<br />
The system also provides multiple scheduling modes, allowing users to switch between different schedule profiles in real time.<br />
The navigation systems include the US Navy shipboard relative global positioning system (SRGPS) automatic landing system.<br />
<br />
<u><b><span style="font-size: small;"><span style="font-weight: normal;">Turbofan engines</span></span></b></u><br />
<br />
The Pegasus is powered by a single Pratt & Whitney Canada
JT15D-5C turbofan engine rated at 14,19kN. The air vehicle carries 472kg
of fuel but has a maximum capacity of 717kg of fuel for long-range
operations or for increased loiter times.<br />
<br />
The end to the dream of manned fighter platforms.<br />
K.S. Menon <br />
<br />Sidharth K Menonhttp://www.blogger.com/profile/11412252277913740873noreply@blogger.comtag:blogger.com,1999:blog-7965927633581367449.post-3619319657123339572011-10-08T11:32:00.006+05:302011-10-08T11:42:02.569+05:30KAMIKAZE DRONES for the US Ground forces<span style="font-size: large;"><b>Switchblades - The future </b></span><br />
<br />
<div style="color: black;"></div><div style="color: black;"></div><div style="color: black;"><a href="http://2.bp.blogspot.com/-FKUFw5Np9Go/To_j9VQngFI/AAAAAAAAAdg/wQN1pbrAjcA/s1600/us-flag.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="120" src="http://2.bp.blogspot.com/-FKUFw5Np9Go/To_j9VQngFI/AAAAAAAAAdg/wQN1pbrAjcA/s200/us-flag.jpg" width="200" /></a>In late June 2011, the US Army’s Close Combat Weapons Systems (CCWS), PEO MS <a href="http://www.avinc.com/resources/press_release/u.s._army_awards_av_4.9_million_contract_for_switchblade_agile_munition_sys"></a>gave Aerovironment a $4.9 million contract to provide engineering support and operational Switchblade UAVs for rapid fielding with the US Army. Aerovironment’s new tube-launched, man-portable UAV has surveillance functions, and transmits live color video. It also functions as a kamikaze missile, however, which can be armed and locked on target by operator control. This makes it extremely useful against dug-in or fortified infantry positions, enemy missile teams, mortars, etc. The prototype system received Safety Confirmation and underwent Military Utility Assessment with the U.S. Army in the fall of 2010; this is the corresponding contract for initial fielding.</div><div style="color: black;"></div>Soldiers who fly hand-launched drone scouts to spot enemies on the battlefield may soon get a deadly robotic device capable of also delivering a knockout blow. The U.S. Army has ordered its first batch of small suicide drones that are capable of launching from a small tube, loitering in the sky and then diving at a target upon command.<br />
<br />
The backpack-size "Switchblade" drone and its launch tube give individual soldiers a new level of precise control over an <a href="http://www.innovationnewsdaily.com/xm25-grenade-launcher-1871/">explosive weapon</a>. Rather than calling in supporting artillery fire or airstrikes, soldiers can simply launch the Switchblade from out of sight, confirm a target on a live video feed from the drone, and then command the robotic device to arm itself and fly into the target at high speed.<br />
<br />
<span style="color: black;"> </span><br />
<div style="color: black;"><div class="separator" style="clear: both; text-align: center;"><a href="http://2.bp.blogspot.com/-mJLZOKM_TUM/To_lf-h8wBI/AAAAAAAAAdw/M3pUjt4hzuA/s1600/av_switchblade.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="299" src="http://2.bp.blogspot.com/-mJLZOKM_TUM/To_lf-h8wBI/AAAAAAAAAdw/M3pUjt4hzuA/s640/av_switchblade.jpg" width="640" /></a></div>The US Army’s interest is understandable. One of the keylessons of Israels 2006 war in Lebanon involved infantry use of guided anti-tank weapons as immediately-available precision artillery fire. Iran’s Hezbollah legionnaires frequently used Russia’s 1960s era 9K11/AT-3 missile designs for this purpose, while Israeli forces used the higher-tech Spike. Similar trends have been observed among American and British forces in Afghanistan, who use expensive Javelin missiles. With Switchblade, the US military has taken a step toward fielding a lower cost platoon level surveillance/strike weapon. The economics involved means that they’re unlikely to be alone.</div>"The unique capabilities provided by the Switchblade agile munition for standoff engagement, accuracy and controlled effects make it an ideal weapon for today's fight and for U.S. military forces of the future," said Bill Nichols, deputy product director at the Army's Close Combat Weapons Systems project office.<br />
Operators can even call off strikes at the last second after arming the Switchblade. That kind of control allows soldiers to retarget in case an enemy moves out of sight, or avoid collateral damage if a civilian wanders too close.<br />
<br />
The drone, created by AeroVironment, is able to fly in both autonomous robot mode or as a remotely-piloted air vehicle. Either way, its small size and quiet electric motor allow it to approach targets without warning. It can even switch off its motor and glide in for a stealthy attack.<br />
"Just as our small unmanned aircraft systems provide game-changing reconnaissance capabilities to ground forces, Switchblade provides a revolutionary rapid strike capability to protect our troops and give them a valuable new advantage on the battlefield," said Tom Herring, AeroVironment senior vice president and general manager of Unmanned Aircraft Systems.<br />
<a href="http://2.bp.blogspot.com/-sx2mNPd8EJE/To_i9NaHrqI/AAAAAAAAAdU/vwi4BMyrdWQ/s1600/AIR_UAV_Switchblade_Launch_AV_lg.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="320" src="http://2.bp.blogspot.com/-sx2mNPd8EJE/To_i9NaHrqI/AAAAAAAAAdU/vwi4BMyrdWQ/s320/AIR_UAV_Switchblade_Launch_AV_lg.jpg" width="214" /></a><br />
<a href="http://4.bp.blogspot.com/-RjKtHc_M-6A/To_lhi5WKgI/AAAAAAAAAd0/Ru2-hgatrRw/s1600/switchblade.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="252" src="http://4.bp.blogspot.com/-RjKtHc_M-6A/To_lhi5WKgI/AAAAAAAAAd0/Ru2-hgatrRw/s320/switchblade.jpg" width="320" /></a><br />
<div style="color: black;"><br />
</div><div style="color: black;"><br />
</div><div style="color: black;"><br />
</div><div style="color: black;"><br />
</div><div style="color: black;"><br />
</div><div style="color: black;"><br />
</div><div style="color: black;"><br />
</div><div style="color: black;"><br />
</div>Sidharth K Menonhttp://www.blogger.com/profile/11412252277913740873noreply@blogger.comtag:blogger.com,1999:blog-7965927633581367449.post-54591927932608357412011-08-31T13:52:00.001+05:302011-08-31T14:19:25.419+05:30NEW STRIKE CORPS FOR THE NORTH EAST<span style="font-size: large;">Chinese oriented Strike Corps.</span><br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://1.bp.blogspot.com/-zcgH0kZrtyU/Tl3qlLnOaKI/AAAAAAAAAck/aRrzJYh9vKw/s1600/indian_flag.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="132" src="http://1.bp.blogspot.com/-zcgH0kZrtyU/Tl3qlLnOaKI/AAAAAAAAAck/aRrzJYh9vKw/s200/indian_flag.png" width="200" /></a><a href="http://2.bp.blogspot.com/-leeilW2k3FU/Tl3rRcN-iFI/AAAAAAAAAco/UbaLQjIEkNc/s1600/China+flag.gif" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="133" src="http://2.bp.blogspot.com/-leeilW2k3FU/Tl3rRcN-iFI/AAAAAAAAAco/UbaLQjIEkNc/s200/China+flag.gif" width="200" /></a></div> In 2009, New Delhi acted decisively in sanctioning two new army divisions, about 35,000 troops, to strengthen Indian defences in Arunachal, which China claims as a part of Tibet. It can now be revealed that New Delhi has also sanctioned a new mountain strike corps, consisting of an additional 40,000 soldiers, which will be permanently located in bases in northeast India. The new corps will retaliate against any major Chinese ingress into India by launching an offensive into Tibet.<br />
For decades after India’s humiliation at the hands of China in 1962, New Delhi shrank from a robust defence posture on the Sino-Indian Line of Actual Control (LAC), fearing that it might provoke China. <br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://1.bp.blogspot.com/-I4ROP08pYYM/Tl3tFjsuhJI/AAAAAAAAAcw/7mQSD9QNcIw/s1600/india-china-border.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="166" src="http://1.bp.blogspot.com/-I4ROP08pYYM/Tl3tFjsuhJI/AAAAAAAAAcw/7mQSD9QNcIw/s200/india-china-border.jpg" width="200" /></a></div><div style="text-align: justify;"><a href="http://2.bp.blogspot.com/-BUBFr1rxEt0/Tl3s_-nBuiI/AAAAAAAAAcs/e_kKEe6w0Tc/s1600/china_india_border_88.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"></a>In the aftermath of 1962, through the 1960s and 1970s, the Indian Army stayed away from the border, remaining behind a self-imposed “Limit of Patrolling (LoP)”. In the 1980s, the army returned to the LAC, but remained entirely defensive in outlook. The sanctioning of a strike corps, therefore, signals a dramatic new assertiveness in New Delhi.</div><div style="text-align: justify;"><br />
Business Standard has been aware of this development since 2009, but has refrained from reporting on it after requests from top-level MoD officials. Now, with the outlines of this development emerging in the media, Business Standard no longer feels bound by confidentiality.</div><div style="text-align: justify;"><a href="http://1.bp.blogspot.com/-c7qWc1J1yuQ/Tl3umf7yDMI/AAAAAAAAAc8/O5jBTN_5gm4/s1600/china_india_border_88.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="320" src="http://1.bp.blogspot.com/-c7qWc1J1yuQ/Tl3umf7yDMI/AAAAAAAAAc8/O5jBTN_5gm4/s320/china_india_border_88.jpg" width="261" /></a><br />
The new mountain strike corps will control two divisions that are specially trained and equipped for an attack into Tibet. If China’s People’s Liberation Army (PLA) captures any Indian territory, by quickly concentrating an attacking force over Tibet’s impressive road network, the Indian Army would not be forced into bloody, Kargil-style counterattacks to recapture that territory. Instead, the new strike corps would launch its own riposte, advancing into Tibet and capturing a vulnerable chunk of Chinese territory, e.g. the Chumbi Valley that projects into Sikkim and Bhutan. Several such objectives would be identified in advance and detailed preparations made for the offensives.</div><div style="text-align: justify;"><br />
The new strike corps will have its own mountain artillery, combat engineers, anti-aircraft guns and radio equipment. It would also be supported by Indian Air Force (IAF) fighters, operating from newly renovated bases in northeastern India. On 26th July, the then IAF chief confirmed that Sukhoi-30 fighters have already been deployed to air bases at Tezpur and Chhabua. On 25th June, he told NDTV that Jorhat, Guwahati, Mohanbari, Bagdogra and Hashimara were also being developed as air bases. The IAF is also modernising eight ALGs (Advanced Landing Grounds), which would be essential for quickly building up and resupplying a strike corps. These air bases would also be crucial for airborne operations, especially heli-lifting forces to key objectives behind the enemy frontlines.</div><div style="text-align: justify;"><br />
The proposal to raise two additional divisions for the defence of Arunachal Pradesh as well as a strike corps dates back to 2007. It began as a decision of the China Study Group, a secretive government body that considers all strategic issues relating to China. Thereafter, the army’s Directorate General of Military Operations (DGMO) prepared a cabinet note. The decision to raise the additional divisions was taken by the Cabinet Committee on Security (CCS) on 14th May 2009. This was the last major decision taken by the UPA government before the elections of 2009. It was rushed through because top UPA leaders felt that, if the UPA were not re-elected, the new government would begin the decision-making process afresh, losing another two years.</div><div style="text-align: justify;"><br />
To manage the expenses, it was decided that the two defensive mountain divisions would first be raised during the 11th army plan (2007-2012). Next, the strike corps, including its two mountain divisions, would be raised during the 12th Defence Plan (2012-2017). The cost of raising a new Indian Army mountain division is estimated to be Rs 700 crore.</div><div style="text-align: justify;"><br />
The 4057-kilometre LAC consists of three sectors. In the western sector in Ladakh, which India’s 14 Corps defends, the PLA already controls most of the area that China claims. The central sector, at the UP-Tibet border, which India’s 6 Mountain Division defends, is relatively insignificant. The most contentious sector is the eastern sector, which includes Sikkim and Arunachal Pradesh, where China claims 90,000 square kilometres of territory that India occupies. It is here, driven by fear of Chinese aggression, that India is strengthening its capabilities by raising new formations.<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right; margin-left: 1em; text-align: right;"><tbody>
<tr><td style="text-align: center;"><a href="http://3.bp.blogspot.com/-WYtBJGS3Utk/Tl3tHuL2ChI/AAAAAAAAAc0/JUPsW7WSIjk/s1600/Su30_mki_India_IAF.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="216" src="http://3.bp.blogspot.com/-WYtBJGS3Utk/Tl3tHuL2ChI/AAAAAAAAAc0/JUPsW7WSIjk/s320/Su30_mki_India_IAF.jpg" width="320" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Sukhoi 30MKI</td></tr>
</tbody></table><br />
A mountain strike corps will provide India with strategic capabilities that were badly missed when Mao Tse-tung marched the PLA into Tibet in 1950. While considering its responses, the Indian government asked the army chief of that time, General (later Field Marshal) KM Cariappa, what resources he had to intervene on behalf of Tibet. Cariappa could spare just one battalion (800 soldiers). And so New Delhi watched as Tibet was subjugated and the China border advanced all the way to the Himalayas. </div><div style="text-align: justify;"></div><div style="text-align: justify;"></div><div style="text-align: justify;">Sidharth K Menon</div><div style="text-align: justify;">(courtesy - India Defence)</div><div style="text-align: justify;"></div>Sidharth K Menonhttp://www.blogger.com/profile/11412252277913740873noreply@blogger.comtag:blogger.com,1999:blog-7965927633581367449.post-53627095659502725852011-06-06T17:35:00.001+05:302011-06-06T17:36:07.439+05:30Chinese Naval Prowess<div style="color: #eeeeee;"><a href="http://4.bp.blogspot.com/-_rUUIhUbwX4/TezA0-cYDVI/AAAAAAAAAcE/o0P7h7MgDVU/s1600/china-flag.gif" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="132" src="http://4.bp.blogspot.com/-_rUUIhUbwX4/TezA0-cYDVI/AAAAAAAAAcE/o0P7h7MgDVU/s200/china-flag.gif" width="200" /></a><u><span style="font-size: large;"><b>Chinese Naval Growth </b></span></u></div><div style="color: #eeeeee;"><br />
</div><div style="color: #eeeeee;">Often discussed in the same breath as the country’s economic rise, China’s military modernization is nothing new. However, the specific issue of the country’s naval development has gained critical currency only in the last few years. Last year alone saw a flurry of media reports and <a class="liexternal external external_icon" href="http://www.foreignaffairs.com/articles/67007/raul-pedrozo/beijings-coastal-real-estate?page=show" rel="nofollow">discussion</a> <a class="liexternal external external_icon" href="http://www.foreignaffairs.com/articles/66752/seth-cropsey/keeping-the-pacific-pacific?page=show" rel="nofollow">pieces</a> on the subject. A recent <a class="liexternal external external_icon" href="http://www.nytimes.com/2011/01/02/opinion/02sun2.html?src=twrhp" rel="nofollow">editorial</a>in <i>The New York Times</i> highlighted what it saw as China’s intention to challenge US naval supremacy in the Western Pacific, its aggressive pursuit of the disputed offshore islands in the East and South China Seas and how “Washington must respond, carefully but firmly.”</div><div style="color: #eeeeee;"><br />
</div><div style="color: #eeeeee;">Should we be really concerned? The short answer is <i>yes</i> – and not because China seeks to become a belligerent power. There is currently no evidence to suggest that China seeks to exercise the kind of global hegemonic ambitions often depicted by hawks and the far-right in American, Indian and Japanese political circles. Yet, China’s naval power merits concern because the maritime realm is the most probable dimension in which a Chinese-related military conflict will be triggered and fought. There are several reasons for this.</div><div style="color: #eeeeee;"><br />
</div><div style="color: #eeeeee;"><br />
</div><div style="color: #eeeeee;"><b>Securing economic, geopolitical aims</b></div><div style="color: #eeeeee;">One reason has to do with China’s rapid economic growth. History tells us that a country’s naval power tends to be directly linked with its economic strength, and <a class="lipdf external external_icon" href="http://www.ndu.edu/inss/docUploaded/PLAN_Cole_Remarks.pdf">China, in recent times, is no exception</a>. To be sure, China has been slow to shift away from its deeply entrenched continental mindset. After all, 14 land powers share territorial frontiers with China, while only six maritime countries surround the Chinese coast. However, now that China has settled 12 out of 14 land border disputes with its neighbors, the sea is the final frontier that Beijing feels compelled to secure.</div><div style="color: #eeeeee;">There is some urgency in this quest. The bulk of global trade is only possible by sea-borne freight. Beijing feels it must protect the sea lanes that make both the movement of goods (about 90 percent of its import and exports) and the importation of resources and energy possible, without which China’s economy would come to a standstill. The Chinese leadership also feels that it must protect what they perceive to be its maritime territorial sovereignty. As a matter of “coastal defense”, the Chinese Navy is compelled to secure its 18,000-kilometer shoreline.</div><div style="color: #eeeeee;"><br />
</div><div style="color: #eeeeee;">Now, the Chinese Navy is attempting to secure the country’s claim to an exclusive economic zone (EEZ) of 200 nautical miles from the country’s continental shelf. The legitimacy of the zone is disputed by Japan, and non-combatant US naval vessels have made excursions into these waters in the past. Chinese officials would also like to claim about three million out of nearly five million square kilometers of “coastal real estate” in the East and South China Seas and the Yellow Sea that contain a wealth of oceanic natural resources. Beijing is simply striving to establish better naval control of these areas than its regional neighbors, propelling the Chinese Navy toward the concept of “offshore defense” – a venture that increases the chances of a naval skirmish.</div><div style="color: #eeeeee;"><br />
</div><div style="color: #eeeeee;">Not only economic interests but also geopolitical ones are fueling China’s naval prowess, particularly in the Taiwan Straits – the most likely naval flashpoint. Beijing’s option to unify Taiwan with the mainland by military force if necessary is no longer fuelled by ideology but geopolitics. As a <a class="lipdf external external_icon" href="http://www.fas.org/nuke/guide/china/ISAB2008.pdf" rel="nofollow">2008 US government report</a> correctly put it, Taiwan is regarded as the focal point from which China can ‘break out’ from its centuries-long containment along the Pacific littoral” and secure its immediate security environment within the Asia-Pacific region. This ‘line of containment’ is also known as the oft-mentioned “first-island chain” running south from the Japanese archipelago to the Philippines, which naturally denies the mainland from having unfettered access to the oceanic thoroughfare. The possession of Taiwan would permanently break China’s geographical curse. As a result, the Taiwan Straits – as well as the South China Sea and the Yellow Sea – have become pressing geopolitical priorities that drive China’s expansive military planning and procurement.</div><div style="color: #eeeeee;"><br />
</div><div style="color: #eeeeee;"><br />
</div><div style="color: #eeeeee;"><a href="http://4.bp.blogspot.com/-DOTjdYwW9d4/TezBXbUmKYI/AAAAAAAAAcI/V7YnnhTmJ3I/s1600/chinese-aircraft-carrier.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://4.bp.blogspot.com/-DOTjdYwW9d4/TezBXbUmKYI/AAAAAAAAAcI/V7YnnhTmJ3I/s1600/chinese-aircraft-carrier.jpg" /></a><b>Naval prowess – only one head of the hydra</b></div><div style="color: #eeeeee;">Moreover, it must be said that China’s growing ‘naval power’ is not only about an expanding fleet of <a class="liexternal external external_icon" href="http://www.sinodefence.com/navy/vessel.asp" rel="nofollow">ships and submarines</a>. All militaries advancing towards greater sophistication seek to integrate their sea, air, land and space capabilities in order to increase overall lethality, efficiency and effectiveness. The Chinese Navy is but one head of the country’s military hydra. In a larger sense, the Chinese Navy should be regarded as a placeholder for the sea, air, land, and space-related capabilities that China will bring to bear against an adversary in the maritime realm of conflict.</div><div style="color: #eeeeee;">US strategic planners have been increasingly concerned with China’s recent development and impending deployment of certain air, land, and space-related capabilities, which affect Taiwan’s ability to impede a Chinese naval advance toward its shores and also the US Navy’s capacity to project its military power in the Straits. Some of these developments include an aircraft carrier, anti-ship ballistic missiles, stealth fighter-aircraft and anti-satellite missiles.</div><div style="color: #eeeeee;"><br />
</div><div style="color: #eeeeee;">In January, the Chinese media published a video of <a class="liexternal external external_icon" href="http://news.oneindia.in/2011/01/29/chinaprovides-video-glimpses-of-its-first-aircraftcarrier-aid0126.html" rel="nofollow">China’s first aircraft carrier</a>Papua New Guinea.</div><div style="color: #eeeeee;">China’s fledgling anti-ship missile capability threatens US aircraft carriers. In early January, the US Navy’s intelligence director <a class="liexternal external external_icon" href="http://www.navytimes.com/news/2011/01/navy-intelligence-chief-chinese-missile-is-effective-010511w/" rel="nofollow">acknowledged</a> that China’s anti-ship ballistic missile, the <a class="liexternal external external_icon" href="http://www.sinodefence.com/strategic/missile/df21.asp" rel="nofollow">DF-21D</a>, had finally reached its initial operating capability, leaving US carriers open to attack. Previously, US observers were sceptical that Chinese engineers could master the complicated science of hitting a manoeuvrable target such as a moving aircraft carrier. With the impending deployment of the DF-21D, its immediate role would be to deter the US Seventh Fleet from approaching the Taiwan Strait. The key target would be the <i>USS George Washington</i>, the aircraft carrier assigned to this fleet which carries the US Navy’s best strike aircraft capable of attacking Chinese sea, air and land targets and destroying vital Chinese radar systems. These carried-launched aircraft have a range of less than 1,000 kilometers. Therefore, the DF-21D, which shares a similar range, is intended to keep the aircraft belonging to the George Washington out of lethal range.</div><div style="color: #eeeeee;"><br />
</div><div style="color: #eeeeee;">The US and Taiwanese airborn-early-warning aircraft that support their respective navies are also not immune from attack. It was reported in early January that the Chinese military successfully test flew their own indigenously-built fifth-generation stealth fighter aircraft known as the J-20 “Black Eagle”, designed to creep up and destroy those aircraft that would otherwise provide real-time intelligence and surveillance of a Chinese naval attack. Until recently, US officials have played down China’s ability to make advances on its J-20 program launched in the 1990s. In fact, the American defence community <a class="liexternal external external_icon" href="http://www.time.com/time/world/article/0,8599,2041755,00.html" rel="nofollow">previously estimated</a> that the J-20 would be operational only around 2020 when it is more likely to be ready in about three years from now.</div><div style="color: #eeeeee;">Lastly, the Chinese military is very close to fielding an anti-satellite missile capability that stands to cripple the network of satellites that the US military depends upon to marshal and coordinate its air, land and naval forces effectively. Chinese military planners realize that the US military satellite and communications network is both its greatest strength and greatest weakness. While it makes the US military more effective and efficient, it is also reduced to fighting ‘blind, deaf and dumb’ without it. In January 2007, Beijing <a class="lipdf external external_icon" href="http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA517485&Location=U2&doc=GetTRDoc.pdf" rel="nofollow">successfully destroyed</a> one of its own weather satellites with a direct ascent anti-satellite missile, based on the same missile airframe used for the DF-21D, hence proving that it could obliterate US satellites in low earth orbit.</div><div style="color: #eeeeee;"><br />
</div><div style="color: #eeeeee;">These developments bolster the Chinese military’s confidence in achieving what it views to be its national security imperatives. Whether or not China does possess hegemonic aspirations, it is becoming clear that Beijing is removing the shackles that previously placed limits on its strategic reach. In particular, as a <a class="liexternal external external_icon" href="http://www.google.co.uk/url?sa=t&source=web&cd=1&ved=0CBkQFjAA&url=http%3A%2F%2Fwww.fas.org%2Firp%2Fagency%2Foni%2Fchinanavy2007.pdf&rct=j&q=China%27s%20Navy%202007&ei=9tBFTZquA8644AbhwN1P&usg=AFQjCNHB-NKlFY-43qhyVAiqqfe9G7xgKg&sig2=WrWJ4qpo5n_AnhV-HTWCQg&" rel="nofollow">recent US Office of Naval Intelligence report </a>has noted, the Chinese Navy has begun removing the geographical limits to its ‘offshore defense’ thinking. It appears to have been given the mandate to venture “as far as [its] capabilities will allow it to operate task forces out at sea with the requisite amount of support and security.” The <a class="liexternal external external_icon" href="http://www.defensenews.com/story.php?i=3888897" rel="nofollow">deployment of a Chinese naval convoy to the Gulf of Aden</a> to protect the country’s shipping from Somali pirates in early January is instructive. The question that should now be asked is how much maritime security is really enough for Beijing. The answer determines how far Beijing will ask its navy to go.</div><div style="color: #eeeeee;"><br />
</div><div style="color: #eeeeee;"> Researched by:</div><div style="color: #eeeeee;">Graham Ong-Webb, Sidharth K Menon</div><div style="color: #eeeeee;"><br />
</div><div style="color: #eeeeee;"><br />
</div>Sidharth K Menonhttp://www.blogger.com/profile/11412252277913740873noreply@blogger.comtag:blogger.com,1999:blog-7965927633581367449.post-38920529958914107362010-12-22T17:00:00.006+05:302010-12-22T17:11:39.248+05:30Indian Nuke<div><div><div><br /><div>Indias's Bomb <a href="http://3.bp.blogspot.com/_H2SGxn7sGYA/TRHiPk5pExI/AAAAAAAAAao/UsuBvW7qNiA/s1600/India-flag.png"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 182px; FLOAT: right; HEIGHT: 116px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5553468572755890962" border="0" alt="" src="http://3.bp.blogspot.com/_H2SGxn7sGYA/TRHiPk5pExI/AAAAAAAAAao/UsuBvW7qNiA/s320/India-flag.png" /></a></div><div><br /> </div><div>Background<br /><br />India's nuclear weapons program was started at the Bhabha Atomic Research Center in Trombay. In the mid-1950s India acquired dual-use technologies under the "Atoms for Peace" non-proliferation program, which aimed to encourage the civil use of nuclear technologies in exchange for assurances that they would not be used for military purposes. There was little evidence in the 1950s that India had any interest in a nuclear weapons program, according to Joseph Cirincione of the Carnegie Endowment for <a href="http://4.bp.blogspot.com/_H2SGxn7sGYA/TRHiQJBMeRI/AAAAAAAAAbA/eiWolDkHevU/s1600/pok_test_crater1-m%2B1998.jpg"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 16px; FLOAT: right; HEIGHT: 15px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5553468582451247378" border="0" alt="" src="http://4.bp.blogspot.com/_H2SGxn7sGYA/TRHiQJBMeRI/AAAAAAAAAbA/eiWolDkHevU/s320/pok_test_crater1-m%2B1998.jpg" /></a>International Peace (1). Under the "Atoms for Peace" program, India acquired a Cirus 40 MWt heavy-water-moderated research reactor from Canada and purchased from the U.S. the heavy water required for its operation. In 1964, India commissioned a reprocessing facility at Trombay, which was used to separate out the plutonium produced by the Cirus research reactor. This plutonium was used in India's first nuclear test on May 18, 1974, described by the Indian government as a "peaceful nuclear explosion."<br /><br />According to the Bulletin of Atomic Scientists, India began work on a thermonuclear weapon in the 1980s. In 1989, William H. Webster, director of the CIA, testified before the Senate Governmental Affairs Committee that "indicators that tell us India is interested in thermonuclear weapons capability." India was purifying lithium, producing tritium and separating lithium isotopes. India had also obtained pure beryllium metal from West Germany<br /><br />Testing<a href="http://3.bp.blogspot.com/_H2SGxn7sGYA/TRHiP4vQ4ZI/AAAAAAAAAaw/oKX37z4-368/s1600/1998.jpg"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 230px; FLOAT: right; HEIGHT: 138px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5553468578081071506" border="0" alt="" src="http://3.bp.blogspot.com/_H2SGxn7sGYA/TRHiP4vQ4ZI/AAAAAAAAAaw/oKX37z4-368/s320/1998.jpg" /></a></div><div><br />After 24 years without testing India resumed nuclear testing with a series of nuclear explosions known as "Operation Shatki." Prime Minister Vajpayee authorized the tests on April 8, 1998, two days after the Ghauri missile test-firing in Pakistan.<br /><br />On May 11, 1998, India tested three devices at the Pokhran underground testing site, followed by two more tests on May 13, 1998. The nuclear tests carried out at 3:45 pm on May 11th were claimed by the Indian government to be a simultaneous detonation of three different devices - a fission device with a yield of about 12 kilotons (KT), a thermonuclear device with a yield of about 43 KT, and a sub-kiloton device. The two tests carried out at 12:21 pm on May 13th were also detonated simultaneously with reported yields in the range of 0.2 to 0.6 KT.<br /><a href="http://4.bp.blogspot.com/_H2SGxn7sGYA/TRHiQJBMeRI/AAAAAAAAAbA/eiWolDkHevU/s1600/pok_test_crater1-m%2B1998.jpg"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 224px; FLOAT: right; HEIGHT: 203px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5553468582451247378" border="0" alt="" src="http://4.bp.blogspot.com/_H2SGxn7sGYA/TRHiQJBMeRI/AAAAAAAAAbA/eiWolDkHevU/s320/pok_test_crater1-m%2B1998.jpg" /></a><br />However, there is some controversy about these claims. Based on seismic data, U.S. government sources and independent experts estimated the yield of the so-called thermonuclear test in the range of 12-25 kilotons, as opposed to the 43-60 kiloton yield claimed by India. This lower yield raised skepticism about India's claims to have detonated a thermonuclear device.<br /><br />Observers initially suggested that the test could have been a boosted fission device, rather than a true multi-stage thermonuclear device. By late 1998 analysts at Lawrence Livermore National Laboratory had concluded that the India had attempted to detonate a thermonuclear device, but that the second stage of the two-stage bomb failed to ignite as planned.<br /><br />TEST DEVICE DATE YIELD<br /></div><div>claimed YIELD<br />reported<br />Fission device 18 May 1974 12-15 kiloton 4-6 kiloton<br />Shakti 1 Thermonuclear device 11 May 1998 43-60 kiloton 12-25 kiloton<br />Shakti 2 Fission device 11 May 1998 12 kiloton ??<br />Shakti 3 Low-yield device 11 May 1998 0.2 kiloton low<br />Shakti 4 Low-yield device 13 May 1998 0.5 kiloton low<br />Shakti 5 Low-yield device 13 May 1998 0.3 kiloton low<br /><br />India's Nuclear Arsenal</div><div><br />Though India has not made any official statements about the size of it nuclear arsenal, the NRDC estimates that India has a stockpile of approximately 30-35 nuclear warheads and claims that India is producing additional nuclear materials. Joseph Cirincione at the Carnegie Endowment for International Peace (3) estimates that India has produced enough weapons-grade plutonium for 50-90 nuclear weapons and a smaller but unknown quantity of weapons-grade uranium. Weapons-grade plutonium production takes place at the Bhabha Atomic Research Center, which is home to the Cirus reactor acquired from Canada, to the indigenous Dhruva reactor, and to a plutonium separation facility.<br /><br />According to a Jan. 2001 Department of Defense report, "India probably has a small stockpile of nuclear weapon components and could assemble and deploy a few nuclear weapons within a few days to a week." A 2001 RAND study by Ashley Tellis asserts that India does not have or seek to deploy a ready nuclear arsenal.<br /><br />According to a report in Jane's Intelligence Review (4), India's objective is to have a nuclear arsenal that is "strategically active but operationally dormant", which would allow India to maintain its retaliatory capability "within a matter of hours to weeks, while simultaneously exhibiting restraint." However, the report also maintains that, in the future, India may face increasing institutional pressure to shift its nuclear arsenal to a fully deployed status.<br /><br />Doctrine<br /></div><div>India has a declared nuclear no-first-use policy and is in the process of developing a nuclear doctrine based on "credible minimum deterrence." In August 1999, the Indian government released a draft of the doctrine which asserts that nuclear weapons are solely for deterrence and that India will pursue a policy of "retaliation only." The document also maintains that India "will not be the first to initiate a nuclear first strike, but will respond with punitive retaliation should deterrence fail" and that decisions to authorize the use of nuclear weapons would be made by the Prime Minister or his 'designated successor(s).'"<br /><br />According to the NRDC, despite the escalation of tensions between India and Pakistan in 2001-2002, India remains committed to its nuclear no-first-use policy. But an Indian foreign ministry official told Defense News in 2000 that a "'no-first-strike' policy does not mean India will not have a first-strike capability."<br /><br />India has not signed the Comprehensive Test Ban Treaty (CTBT) or the Non-Proliferation Treaty (NPT). India is a member of the International Atomic Energy Agency (IAEA), and four of its 13 nuclear reactors are subject to IAEA safeguards.<br /><br />Despite promoting a test ban treaty for decades, India voted against the UN General Assembly resolution endorsing the CTBT, which was adopted on September 10, 1996. India objected to the lack of provision for universal nuclear disarmament "within a time-bound framework." India also demanded that the treaty ban laboratory simulations. In addition, India opposed the provision in Article XIV of the CTBT that requires India's ratification for the treaty to enter into force, which India argued was a violation of its sovereign right to choose whether it would sign the treaty. In early February 1997, Foreign Minister Gujral reiterated India's opposition to the treaty, saying that "India favors any step aimed at destroying nuclear weapons, but considers that the treaty in its current form is not c<a href="http://3.bp.blogspot.com/_H2SGxn7sGYA/TRHiP8vIS5I/AAAAAAAAAa4/KhHFTMkT4K0/s1600/p1205984.jpg"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 203px; FLOAT: right; HEIGHT: 173px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5553468579154250642" border="0" alt="" src="http://3.bp.blogspot.com/_H2SGxn7sGYA/TRHiP8vIS5I/AAAAAAAAAa4/KhHFTMkT4K0/s320/p1205984.jpg" /></a>omprehensive and bans only certain types of tests."<br /><br /><br />Images from the tests conducted in 1974</div><div></div><div><br /><a href="http://2.bp.blogspot.com/_H2SGxn7sGYA/TRHiQZAduUI/AAAAAAAAAbI/fpdFqnrmuxQ/s1600/p1205985.jpg"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 211px; FLOAT: right; HEIGHT: 151px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5553468586743150914" border="0" alt="" src="http://2.bp.blogspot.com/_H2SGxn7sGYA/TRHiQZAduUI/AAAAAAAAAbI/fpdFqnrmuxQ/s320/p1205985.jpg" /></a></div><div></div><div></div><div></div><div></div><div></div><div></div><div></div><div></div><div></div><div></div><div></div><div>K.S. Menon</div><div>FAS - WMD</div></div></div></div>Sidharth K Menonhttp://www.blogger.com/profile/11412252277913740873noreply@blogger.comtag:blogger.com,1999:blog-7965927633581367449.post-88301089528720260242010-12-22T16:39:00.004+05:302010-12-22T16:55:53.947+05:30Pakistani Deception - Project A/B<a href="http://1.bp.blogspot.com/_H2SGxn7sGYA/TRHeaERZTCI/AAAAAAAAAag/nt6xV-h__8w/s1600/pakistan-flag.gif"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 138px; FLOAT: right; HEIGHT: 102px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5553464354929200162" border="0" alt="" src="http://1.bp.blogspot.com/_H2SGxn7sGYA/TRHeaERZTCI/AAAAAAAAAag/nt6xV-h__8w/s320/pakistan-flag.gif" /></a><br /><div><strong><span style="font-size:130%;">Pakistan Nuclear Weapons - A Chronology</span></strong><br /><br /></div><div><br />1965: Pakistani nuclear research reactor at Parr, Rawalpindi, starts functioning. </div><div><br />1968: Nonproliferation Treaty completed. Pakistan refuse to sign. </div><div><br /></div><div><br />1974: India tests a device of up to 15 kilotons and calls the test a ``peaceful nuclear explosion.'' Pakistani Prime minister Zulfikar Ali Bhutto tells meeting of Pakistan's top scientists of intention to develop nuclear arms. </div><div><br />1974 -- Pakistan proposed to India the establishment of a nuclear weapons free zone in south Asia </div><div><br />1978 -- Pakistan proposed to India a joint Indo-Pakistan declaration renouncing the acquisition and manufacture of nuclear weapons </div><div> </div><div> </div><div>K.S.Menon</div><div>FAS, WMD</div><div><br />1979 -- The United States cut off aid to Pakistan under section 669 of the Foreign Assistance Act of 1961 FAA) after it was learned that Pakistan had secretly begun construction of a uranium enrichment facility. </div><div><br />1979 -- Pakistan proposed to India mutual inspections by India and Pakistan of nuclear facilities </div><div><br />1979 -- Pakistan proposed to India simultaneous adherence to the NPT by India and Pakistan</div><div><br />1979 -- Pakistan proposed to India simultaneous acceptance of full-scope IAEA safeguards </div><div><br />1980s<br /></div><div>Early 1980's--Multiple reports that Pakistan obtained a pre-tested, atomic bomb design from China. </div><div><br />Early 1980's--Multiple reports that Pakistan obtained bomb-grade enriched uranium from China. </div><div><br />1980 </div><div><br />1980--U.S. Nuclear Export Control Violation: Reexport via Canada (components of inverters used in gas centrifuge enrichment activities). </div><div><br />1981--U.S. Nuclear Export Control Violation: New York, zirconium (nuclear fuel cladding material).<br /></div><div>1981--AP story cites contents of reported US State Department cable stating `We have strong reason to believe that Pakistan is seeking to develop a nuclear explosives capability * * * Pakistan is conducting a program for the design and development of a triggering package for nuclear explosive devices.' </div><div><br />1981--Publication of book, Islamic Bomb, citing recent Pakistani efforts to construct a nuclear test site. </div><div><br />1982/3--Several European press reports indicate that Pakistan was using Middle Eastern intermediaries to acquire bomb parts (13-inch `steel spheres' and `steel petal shapes'). </div><div><br />1983--Declassified US government assessment concludes that `There is unambiguous evidence that Pakistan is actively pursuing a nuclear weapons development program * * * We believe the ultimate application of the enriched uranium produced at Kahuta, which is unsafeguarded, is clearly nuclear weapons.' </div><div><br />1984--President Zia states that Pakistan has acquired a `very modest' uranium enrichment capability for `nothing but peaceful purposes.' </div><div><br />1984--President Reagan reportedly warns Pakistan of `grave consequences' if it enriches uranium above 5%. </div><div><br />1985--ABC News reports that US believes Pakistan has `successfully tested' a `firing mechanism' of an atomic bomb by means of a non-nuclear explosion, and that US krytrons `have been acquired' by Pakistan. </div><div><br />1985--U.S. Nuclear Export Control Violation: Texas, krytrons (nuclear weapon triggers).<br /></div><div>1985--U.S. Nuclear Export Control Violation: US cancelled license for export of flash x-ray camera to Pakistan (nuclear weapon diagnostic uses) because of proliferation concerns. </div><div><br />1985/6--Media cites production of highly enriched, bomb-grade uranium in violation of a commitment to the US.<br /></div><div>1985 -- Pressler Amendment [section 620E(e) of the Foreign Assistance Act] requires a total cut-off of U.S. aid to Islamabad unless the president can certify that Pakistan does not possess a nuclear weapon, and that continued US aid will significantly decrease the probability of its developing one in the future. </div><div><br />1986--Bob Woodward article in Washington Post cites alleged DIA report saying Pakistan `detonated a high explosive test device between Sept. 18 and Sept. 21 as part of its continuing efforts to build an implosion-type nuclear weapon;' says Pakistan has produced uranium enriched to a 93.5% level. </div><div><br />1986--Press reports cite U.S. `Special National Intelligence Estimate' concluding that Pakistan had produced weapons-grade material.<br /></div><div>1986--Commenting on Pakistan's nuclear capability, General Zia tells interviewer, `It is our right to obtain the technology. And when we acquire this technology, the Islamic world will possess it with us.' </div><div><br />1986--Declassified memo to then-Secretary of State Henry Kissinger states, `Despite strong U.S. concern, Pakistan continues to pursue a nuclear explosive capability * * * If operated at its nominal capacity, the Kahuta uranium enrichment plant could produce enough weapons-grade material to build several nuclear devices per year.' </div><div><br /><br />1987 -- Pakistan proposed to India an agreement on a bilateral or regional nuclear test ban treaty </div><div><br />1987--U.S. Nuclear Export Control Violation: Pennsylvania, maraging steel & beryllium (used in centrifuge manufacture and bomb components). </div><div><br />1987--London Financial Times reports US spy satellites have observed construction of second uranium enrichment plant in Pakistan. </div><div><br />1987--Pakistan's leading nuclear scientist Abdul Qadeer Khan states in published interview that `what the CIA has been saying about our possessing the bomb is correct.'<br /></div><div>1987--West German official confirms that nuclear equipment recently seized on way to Pakistan was suitable for `at least 93% enrichment' of uranium; blueprints of uranium enrichment plant also seized in Switzerland. </div><div><br />1987--U.S. Nuclear Export Control Violation: California, oscilloscopes, computer equipment (useful in nuclear weapon R&D). </div><div><br />1987--According to photocopy of a reported German foreign ministry memo published in Paris in 1990, UK government official tells German counterpart on European nonproliferation working group that he was `convinced that Pakistan had `a few small' nuclear weapons.' </div><div><br />1987 -- China concluded a deal with Pakistan to sell M-11 missiles and launchers.</div><div></div><div>1988--President Reagan waives an aid cutoff for Pakistan due to an export control violation; in his formal certification, he confirmed that `material, equipment, or technology covered by that provision was to be used by Pakistan in the manufacture of a nuclear explosive device.'</div><div><br />1988--Hedrick Smith article in New York Times reports US government sources believe Pakistan has produced enough highly enriched uranium for 4-6 bombs. </div><div><br />1988--President Zia tells Carnegie Endowment delegation in interview that Pakistan has attained a nuclear capability `that is good enough to create an impression of deterrence.'<br /><br />1989--Multiple reports of Pakistan modifying US-supplied F-16 aircraft for nuclear delivery purposes; wind tunnel tests cited in document reportedly from West German intelligence service. </div><div><br />1989--Test launch of Hatf-2 missile: Payload (500 kilograms) and range (300 kilometers) meets `nuclear-capable' standard under Missile Technology Control Regime.<br /></div><div>1989--CIA Director Webster tells Senate Governmental Affairs Committee hearing that `Clearly Pakistan is engaged in developing a nuclear capability.'<br /></div><div>1989--Media claims that Pakistan acquired tritium gas and tritium facility from West Germany in mid-1980's.</div><div><br />1989--ACDA unclassified report cites Chinese assistance to missile program in Pakistan.</div><div><br />1989--UK press cites nuclear cooperation between Pakistan and Iraq.<br /></div><div>1989--Article in Nuclear Fuel states that the United States has issued `about 100 specific communiques to the West German Government related to planned exports to the Pakistan Atomic Energy Commission and its affiliated organizations;' exports reportedly included tritium and a tritium recovery facility. </div><div><br />1989--Article in Defense & Foreign Affairs Weekly states `sources close to the Pakistani nuclear program have revealed that Pakistani scientists have now perfected detonation mechanisms for a nuclear device.'<br /></div><div>1989--Reporting on a recent customs investigation, West German magazine Stern reports, `since the beginning of the eighties over 70 [West German] enterprises have supplied sensitive goods to enterprises which for years have been buying equipment for Pakistan's ambitious nuclear weapons program.'<br /></div><div>1989--Gerard Smith, former US diplomat and senior arms control authority, claims US has turned a `blind eye' to proliferation developments Pakistan in and Israel. </div><div><br />1989--Senator Glenn delivers two lengthy statements addressing Pakistan's violations of its uranium enrichment commitment to the United States and the lack of progress on nonproliferation issues from Prime Minister Bhutto's democratically elected government after a year in office; Glenn concluded, `There simply must be a cost to non-compliance--when a solemn nuclear pledge is violated, the solution surely does not lie in voiding the pledge.'<br /></div><div>1990 </div><div><br />1989-1990--reports of secret construction of unsafeguard nuclear research reactor; components from Europe. </div><div><br />Spring 1990 -- Pakistan reportedly reacted to Indian Army war game maneuvers near its border by preparing to drop one of seven weapons from a specially configured C-130 cargo plane. [02 December 1992 NBC News report]<br /></div><div>1990--US News cites `western intelligence sources' claiming Pakistan recently `cold-tested' a nuclear device and is now building a plutonium production reactor; article says Pakistan is engaged in nuclear cooperation with Iran. </div><div><br />1990--French magazine publishes photo of West German government document citing claim by UK official that British government believes Pakistan already possesses `a few small' nuclear weapons; cites Ambassador Richard Kennedy claim to UK diplomat that Pakistan has broken its pledge to the US not to enrich uranium over 5%. </div><div><br />1990--London Sunday Times cites growing U.S. and Soviet concerns about Pakistani nuclear program; paper claims F-16 aircraft are being modified for nuclear delivery purposes; claims US spy satellites have observed `heavily armed convoys' leaving Pakistan uranium enrichment complex at Kahuta and heading for military airfields. </div><div><br />1990--Pakistani biography of top nuclear scientist (Dr. Abdul Qadeer Khan and the Islamic Bomb), claims US showed `model' of Pakistani bomb to visiting Pakistani diplomat as part of unsuccessful nonproliferation effort. </div><div><br />1990--Defense & Foreign Affairs Weekly reports `US officials now believe that Pakistan has quite sufficient computing power in country to run all the modeling necessary to adequately verify the viability of the country's nuclear weapons technology.' </div><div><br />1990--Dr. A.Q. Khan, father of Pakistan's bomb, receives `Man of the Nation Award.'<br /></div><div>1990--Washington Post documents 3 recent efforts by Pakistan to acquire special arc-melting furnaces with nuclear and missile applications.</div><div><br />October 1990 -- President Bush announced that he could no longer provide Congress with Pressler Amendment certification that Pakistan does not possess a nuclear weapon. Economic and military aid was duly terminated, though the Bush administration continued to permit a limited number of commercial military sales to Pakistan. Pakistan handled the cutoff with little public rancor and committed itself to freezing the nuclear program in an attempt to placate the United States. </div><div><br />1991 -- Pakistan proposed to India commencement of a multilateral conference on the nuclear proliferation in south Asia </div><div><br />1991--Wall Street Journal says Pakistan is buying nuclear-capable M-11 missile from China.</div><div><br />1991--Sen. Moynihan says in television interview, `Last July [1990] the Pakistanis machined 6 nuclear Pakistan warheads. And they've still got them.'<br /></div><div>1991--Time quotes businessman, `BCCI is functioning as the owners' representative for Pakistan's nuclear-bomb project.'<br /></div><div>1991--India and Pakistan enter agreement prohibiting attacks on each other's nuclear installations. </div><div><br />July 1991 - Reliable reports from Islamabad confirm that Pakistan had frozen production of HEU and halted the manufacturing of nuclear weapons components.<br /></div><div><br />1992--Pakistani foreign secretary publicly discusses Pakistan's possession of `cores' of nuclear devices. </div><div><br />Late 1992 -- The US Government determines that China had transferred items controlled under the international Missile Technology Control Regime to Pakistan.<br /></div><div>December 1992 -- The US Government asked Pakistan to return eight US Navy frigates and a supply ship that had been leased to the Pakistan Navy, which accounted for more than half of Pakistan's major surface combatants. </div><div><br />01 December 1992 -- Senator Larry Pressler reportedly stated in a press interview that he had been told by the Central Intelligence Agency (CIA) that Pakistan had assembled seven weapons and could air drop one in a matter of hours [Dec. 1, 1992 NBC News broadcast]. </div><div><br />1993 -- Pakistan proposed to India creation of a missile-free zone in south Asia<br /></div><div>25 August 1993 -- The United States imposed "Category Two" sanctions against certain Chinese and Pakistani entities that were involved in an M-11 missile-related transfer, which is prohibited under US law.<br /></div><div>Late 1993 -- The Clinton Administration, citing what it considered to be asymmetrical treatment accorded to Pakistan and India over their respective nuclear programs, proposed revising the Pressler Amendment and certain "country-specific" sections of the Foreign Assistance Act. The administration argued that by the time nuclear nonproliferation provisions had been added to the Foreign Assistance Act, India had already acquired the capability to build nuclear weapons and thus Pakistan had borne the brunt of most United States sanctions.</div><div><br /><br />Early 1994 -- The Clinton Administration withdrew its proposal to revise the amendment because of strong criticism from a number of influential members of Congress, including Senator Pressler himself. </div><div><br />April 1994 - Deputy Secretary of State Strobe Talbott visits Islamabad to propose a one-time sale of F-16 fighter aircraft to Pakistan. Delivery of the planes would be contingent on specific commitments from Pakistan regarding its nuclear program, including a verifiable cap on the production of fissile materials. Talbott states that there is "broad agreement" between the United States and Pakistan on the goal of "first capping, then reducing, and eventually eliminating weapons of mass destruction and ballistic missiles from South Asia."<br /><br />April 1995 -- Prime Minister Bhutto visits Washington. </div><div><br />September 1995 -- The Clinton Administration proposes revisions to the Pressler Amendment, citing the Amendment's roadblocks to cooperation with Pakistan's Government in areas such as combatting terrorism and furthering US commercial interests in Pakistan. Under the Brown Amendment, the US would not deliver the controversial F-16 aircraft or resume an official military supply relationship with Pakistan, but the President decided to sell the F-16 aircraft to other countries and return the proceeds to Pakistan. </div><br /><div>1996 </div><div><br />01 January 1996 -- India and Pakistan exchange lists of atomic installations which each side has pledged not to attack under an over seven-year-old confidence-building agreement. </div><br /><div>January 1996 -- The Brown amendment was signed into law to relieve some of the pressures created by the Pressler sanctions, which had crippled parts of the Pakistani military, particularly the Air Force. The Brown amendment allowed nearly $370 million of previously embargoed arms and spare parts to be delivered to Pakistan. It also permited limited military assistance for the purposes of counter-terrorism, peacekeeping, anti-narcotics efforts, and some military training. </div><div><br />March 1996 -- Pakistan commissioned an unsafeguarded nuclear reactor, expected to become fully operational in the late 1990s, that will provide it with a capability to produce weapons-grade plutonium. </div><div><br />Late 1996 -- Pakistan's main nuclear weapons laboratory, the A.Q. Khan Laboratory in Kahuta, purchased 5,000 ring magnets from China. The ring magnets would allow Pakistan to effectively double its capacity to enrich uranium for nuclear weapons production. </div><div><br />03 October 1996 -- Pakistani Prime Minister Benazir Bhutto called for the convening of a South Asia security conference that would deal with, among other things, Kashmir and the nuclear arms issue. </div><br /><div></div><br /><div><br />04 July 1997 -- Pakistan confirms test-firing of new indigenous Hatf missile. </div><br /><div><br />06 September 1997 -- Pakistani Prime Minister Nawaz Sharif claims Pakistan possesses nuclear weapons, saying that: "Pakistan's nuclear capability is now an established fact. Whatever we have, we have a right to keep it...." </div><br /><div><br />1998<br />28 May 1998: Pakistan detonates five nuclear devices. Pakistan claimed that the five nuclear tests measured up to 5.0 on the Richter scale, with a reported yield of up to 40 KT (equivalent TNT). </div><br /><div><br />30 May 1998 Pakistan tested one more nuclear warheads, with a yield of 12 kilotons, bringing the total number of claimed tests to six. </div><br /><br />04 July 1997 -- Pakistan confirms test-firing of new indigenous Hatf missile.<br /><br />06 September 1997 -- Pakistani Prime Minister Nawaz Sharif claims Pakistan possesses nuclear weapons, saying that: "Pakistan's nuclear capability is now an established fact. Whatever we have, we have a right to keep it...."<br /><br /><br />28 May 1998: Pakistan detonates five nuclear devices. Pakistan claimed that the five nuclear tests measured up to 5.0 on the Richter scale, with a reported yield of up to 40 KT (equivalent TNT).<br /><br />30 May 1998 Pakistan tested one more nuclear warheads, with a yield of 12 kilotons, bringing the total number of claimed tests to six.Sidharth K Menonhttp://www.blogger.com/profile/11412252277913740873noreply@blogger.comtag:blogger.com,1999:blog-7965927633581367449.post-9851669348114740942010-08-02T13:58:00.005+05:302010-08-02T14:08:31.020+05:30Pinaka Multi Barrel Rocket Launcher<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_H2SGxn7sGYA/TFaDdvduw7I/AAAAAAAAAaQ/lR1Lm1F5X9E/s1600/indian_flag.png"><img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 199px; height: 133px;" src="http://1.bp.blogspot.com/_H2SGxn7sGYA/TFaDdvduw7I/AAAAAAAAAaQ/lR1Lm1F5X9E/s320/indian_flag.png" alt="" id="BLOGGER_PHOTO_ID_5500728541860250546" border="0" /></a><br /><span style="font-weight: bold;">Pinaka MBRL</span><br /><br />The Pinaka <strong style="font-weight: normal;">Multi</strong> <strong style="font-weight: normal;">Barrel</strong> <strong style="font-weight: normal;">Rocket</strong> <strong style="font-weight: normal;">Launcher</strong> System, is a state of the art weapon for destroying/neutralising enemy troop concentration areas, communication centres air terminal complexes, gun/<strong style="font-weight: normal;">rocket</strong> locations and for laying mines by firing rockets with several warheads from <strong style="font-weight: normal;">launcher</strong> vehicle. High operational mobility, flexibility and accuracy are the major characteristics, which give <strong style="font-weight: normal;">Multi</strong> <strong style="font-weight: normal;">Barrel</strong> <strong style="font-weight: normal;">Rocket</strong> <strong style="font-weight: normal;">Launcher</strong> System an edge in modern artillery warfare. <p>Pinaka saw service during the Kargil War, where it was successful in neutralizing enemy positions on the mountain tops. It has since been inducted into the Indian Army in large numbers.</p> <h3>Development <hr /> </h3> <p>The Indian Army operates the Russian <span class="mw-redirect">BM-21</span> 'Grad' Launchers. In 1981, in response to the Indian Army's need to a long range artillery system, the Indian Ministry of Defence sanctioned two competence building projects. In July 1983, the Army formulated their General Staff Qualitative Requirement (GSQR) for the system, with planned induction of one Regiment per year from 1994 onwards. This system would eventually replace the Grads.<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_H2SGxn7sGYA/TFaC_ImMHBI/AAAAAAAAAZ4/-7NdalEzGJE/s1600/img_58_16775_5.jpeg"><img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 320px; height: 228px;" src="http://1.bp.blogspot.com/_H2SGxn7sGYA/TFaC_ImMHBI/AAAAAAAAAZ4/-7NdalEzGJE/s320/img_58_16775_5.jpeg" alt="" id="BLOGGER_PHOTO_ID_5500728016030669842" border="0" /></a></p> <p>Development began in December 1986, with a sanctioned budget of Rs 26.47 crore. The development was to be completed in December 1992. Pune-based <span class="mw-redirect">DRDO</span> laboratory, Armament Research and Development Establishment was the lead laboratory for the development of the system.</p> <p>The indigenously built Pinaka <strong>multi</strong>-<strong>barrel</strong> <strong>rocket</strong> <strong>launcher</strong> Weapon Area System can fire rockets with a range of 39-40 km, in a salvo of 12 rockets with 1.2 tons of high explosives within 40 seconds. The complete system comprises a launch vehicle, a loader / replenishment vehicle, and a command post vehicle with a battery of six launchers, replenishment vehicle (RV), DIGICORA MET radar, and <strong>rocket</strong> system with various warheads and fuses.. Pinaka can neutralise a target area of 350 square kilometres, and is meant as a supplement to the existing artillery system at a range beyond 30 km. It can be fitted with a variety of warheads ranging from blast-cum-pre-fragmented high explosives to anti-tank mines. This indigenously designed MLRS is far cheaper than the international competition, costing just Rs 23 milli</p> <p>on per system. By comparison the American M270 MLRS costs Rs 195 million, and the 9P140 URAGAN of Russia and the ASTROS-II of Brazil each cost Rs 38 million.</p> <p>The Indian Army felt the need for a weapon system which could soften or defeat targets between a certain range. The Ministry sanctioned two competence build up projects in 1981 for Rs 1.94 crore. Army formulated their General Staff Qualitative Requirement for the system in July 1983. They planned to induct certain number of regiments into service at the rate of one regiment per annum, equipped with the system, from 1994 onwards so that the existing system which had range limitation of 20 km could be replaced with the latest state of the art system. The Ministry issued sanction in December 1986 to develop the system at Rs 26.47 crore excluding cost of manpower. The development was to be completed in December 1992.</p> <p>The General Staff Qualitative Requirement prescribed that the system should attain a certain maximum range and th</p><h3><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://3.bp.blogspot.com/_H2SGxn7sGYA/TFaC_ssgg4I/AAAAAAAAAaA/vMjL6VQxce8/s1600/images-domain-b_Pinaka_MBRLS.jpg"><img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 250px; height: 202px;" src="http://3.bp.blogspot.com/_H2SGxn7sGYA/TFaC_ssgg4I/AAAAAAAAAaA/vMjL6VQxce8/s320/images-domain-b_Pinaka_MBRLS.jpg" alt="" id="BLOGGER_PHOTO_ID_5500728025720849282" border="0" /></a></h3> <p>e circular error probability should not exceed 1 to 2 per cent of range. The system was to incorporate a twelve tube cluster configuration capable of firing a salvo in five to six seconds and neutralise the specified area by a salvo from six launchers. The entire operation of loading of one salvo from the replenishment vehicle to the <strong>launcher</strong> was required to be completed within four to five minutes. Eight types of warhead for different target effects were to be developed. The fabrication and delivery of different components of the system were to match User Trials to be conducted in two phases to be concluded by December 1993.</p> <p>The Pune-based Armament Research and Development Establishment has successfully produced the 'Pinaka' <strong>Multi</strong> <strong>Barrel</strong> <strong>Rocket</strong> <strong>Launcher</strong> System for the Indian armed forces, to give it concentrated high volume firepower to destroy enemy targets as demanded by the top brass of the Indian army. The Pinaka system was tested at the interim test range (ITR) Chandipur-on-sea, and had undergone several tests since 1995. It has been subjected to user's trials by the Army, which was not entirely satisfied with the system, and additional tests were conducted in response to suggestions to improve its capability further. In March 1999 the system was tested in the run-up to the country's largest ever air force exercise over the site of India's 1998 underground nuclear blasts, at the eastern Indian missile launch site of Balasore. Pinaka was finally put into field testing for assessing its capability during the Kargil conflict. Pinaka reportedly proved very successful during field testing in the high altitude conflict in Kargil.</p> <p>In mid-1998 it was reported that production is on at various ordnance factories, and four public sector undertakings would meet the December 1998 delivery deadline. But in May 1999 the Comptroller and Auditor General criticized the Defence Research and development Organisation (DRDO) for its failure to develop critical components of Pinaka, which led to a six-year delay in the induction of the system. Far from reaching the production stage, the DRDO has yet to develop various critical components of the system despite an expenditure of Rs 42.45 crore. The Defence Ministry in 1981 had planned to induct “Pinaka” into Indian Army regiments by 1994, and the project was originally given a Rs 26.47 crore budget. The expected date of completion of development is late 2000 at a cost of around Rs 80 crore.</p> <p>The <strong>rocket</strong> developed by Armament Research and Development Establishment could achieve only 82 per cent in terms of range. For achieving the desired range the configuration of <strong>rocket</strong> will have to be changed from 214 mm calibre to 240 mm. The Army had stipulated that the calibre of <strong>rocket</strong> could be anywhere between 210 and 250 mm. Armament Research and Development Establishment erred in the decision to design the system around 214 mm calibre. The Army agreed to accept the system by reducing the range to ensure early availability of the system. Armament Research and Development Establishment, however, could not deliver the system even with the reduced range as of December 1998. With a lower range, the survivability of the system would be lowered and targets in depth would be beyond reach.</p> <p>The Armament Research and Development Establishment (ARDE) has also developed a high performance artillery <strong>rocket</strong> system which can fire within a range between 70 km to 100 km. This is a highly sophisticated "shoot-and-scoot" high mobility system capable of firing a salvo of 12 rockets, each with a payload of 100 kg within a time span of 30 seconds. This new artillery <strong>rocket</strong> system comprises of an advanced family of warheads including terminally guided submunitions with autonomous target search and engagement capability besides remotely delivered intelligent bomblets and minelets with self-neutralising capability.</p> <p>In the trials conducted in June 1996 the users found that it did not meet the baseline requirements, such as ability to replenish two salvos within 4 to 5 minutes. Loader-cum-Replenishment Vehicle could carry only one salvo and the loading time extended up to 40 minutes due to the low lifting capacity of the crane, which was attributable to change in the weight of the <strong>rocket</strong> pod from 2.5 tonne to 2.8 tonne. The Army agreed to a proposal made by Armament Research and Development Establishment in September 1996 to develop a loader vehicle with 3.5 tonne crane capable of carrying two pods and another replenishment vehicle with four pods as against a single loader-cum-replenishment vehicle which can carry four pods.</p> <p>Vehicle Research Development Establishment designed the new vehicle and fabricated two loader vehicles in September 1997 at a cost of Rs 61.59 lakh on Tatra chassis procured in December 1996 at a cost of Rs 41 lakh. The suitability of the newly fabricated loader vehicle was yet to be proved. Thus, one of the most important components of the system remained to be developed even as of June 1998.</p> <p>The General Staff Qualitative Requirement stipulated requirement of a command post vehicle of equal mobility as the <strong>launcher</strong> with good cross country performance including sandy terrain for providing logistic support. The Project Management Committee selected Tata 4 ton chassis in August 1989. The Tata chassis was procured in October 1994 at a cost of Rs 5.77 lakh by the Vehicle Research and Development Establishment and superstructure fabricated on it at a cost of Rs 3.59 lakh in April 1996. It, however, failed to achieve equal mobility with the <strong>launcher</strong> vehicle configured on Tatra chassis and it was therefore decided in September 1996 to develop another command post vehicle on a Tatra chassis.</p> <p>In late April 2005, India test-fired multiple rounds of the Pinaka <strong>multi</strong>-<strong>barrel</strong> <strong>rocket</strong> system at Chandipur. The tests were reported to be aimed at improving the entire system and sub-system of rockets.</p> <h3><span id="Details" class="mw-headline">Details </span><span id="Details" class="mw-headline"><hr /> </span></h3> <p><strong>Pinaka</strong> is a complete MBRL system, each Pinaka battery consists of six <strong>launcher</strong> vehicles, each with 12 rockets, six loader cum replenishment vehicles, three replenishment vehicles, a Command Post vehicle with a Fire Control computer and the DIGICORA MET radar. A battery of six launchers can neutralize an area of 1000 m x 800 m.</p> <p>The Army generally deploys a battery that has a total of 72 rockets. All the 72 rockets can be fired in 44 seconds, </p><h3><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://3.bp.blogspot.com/_H2SGxn7sGYA/TFaC_xyjWCI/AAAAAAAAAaI/Hr2hnnbOLSY/s1600/im8r3a.jpg"><img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 252px; height: 189px;" src="http://3.bp.blogspot.com/_H2SGxn7sGYA/TFaC_xyjWCI/AAAAAAAAAaI/Hr2hnnbOLSY/s320/im8r3a.jpg" alt="" id="BLOGGER_PHOTO_ID_5500728027088377890" border="0" /></a></h3><p>taking out an area of 1 sq km. Each <strong>launcher</strong> can fire in a different direction too. The system has the flexibility to fire all the rockets in one go or only a few.</p> <p>This is made possible with a fire control computer. There is a command post linking together all the six launchers in a battery. Each <strong>launcher</strong> has an individual computer, which enables it to function autonomously in case it gets separated from the other five vehicles in a war.</p> <p>K.J. Daniel, Project Director, Pinaka, calls it “a system” and explains how massive each system is. A Pinaka battery has six launchers, six loader vehicles, six replenishment vehicles, two vehicles for ferrying the command post and a vehicle for carrying the meteorological radar, which will provide data on winds. “Today, we have orders for two regiments. In the future, we will have orders for 12 regiments,” said Daniel.</p> <h4><span id="Modes_of_operation" class="mw-headline">Modes of operation</span></h4> <p>The <strong>launcher</strong> can operate in the following modes:</p> <p><strong>Autonomous mode.</strong> The <strong>launcher</strong> is fully controlled by a fire control computer (FCC). The microprocessor on the <strong>launcher</strong> automatically executes the commands received from the FCC, giving the operator the status of the system on displays and indicators.</p> <p><strong>Stand-alone mode:</strong> In this mode, the <strong>launcher</strong> is not linked to the FCC operator, and the operator at the console enters all the commands for laying of the <strong>launcher</strong> system and selection of firing parameters.</p> <p><strong>Remote mode:</strong> In this mode, a remote control unit carried outside the cabin up to a distance of about 200 m can be used to control the <strong>launcher</strong> system, the <strong>launcher</strong> site and to unload the fired <strong>rocket</strong> pods from the <strong>launcher</strong>.</p> <p><strong>Manual mode:</strong> All <strong>launcher</strong> operations including laying of the system and firing are manually controlled. This mode is envisaged in the situations where the microprocessor fails or where there is no power to activate the microprocessor-based operator’s console.</p> <p>The Pinaka was tested in the Kargil conflict and proved its effectiveness. Since then it has been inducted into the Indian Army and series production has been ordered. The Pinaka MBRL is stated to be cheaper than other systems. It costs Rs 23 million per system compared to the M270 which costs Rs 195 million.</p> <dl><dt><strong>Salient features</strong></dt></dl> <ul><li>Use of state-of-the-art technologies for improved combat performance</li><li>Total operational time optimised for shoot & scoot capability</li><li>Cabin pressurisation for crew protection in addition to blast shields</li><li>Microprocessor-based fully automatic positioning and fire control console</li><li>Night vision devices for driver and crew</li><li>Neutralisation/destruction of the exposed troop concentrations, ‘B’ vehicles and other such soft targets</li><li>Neutralisation of enemy guns/<strong>rocket</strong> locations</li><li>Laying of antipersonnel and antitank mines at a short notice.</li><li>Possesses a family of optimised warheads for high lethality</li><li>Rugged fire control computer for comprehensive control of firing through secure wireless data link</li><li>Automated laying of launchers by powerful microprocessor-based servo drive</li><li>Automatic gun alignment and positioning system (AGAPS) integrated with each <strong>launcher</strong> for land navigation and <strong>launcher</strong> orientation</li><li>No separate survey team required for positioning and orientation, making the <strong>launcher</strong> autonomous</li><li>Fire-direction radar for fire adjustment and enhanced accuracy</li><li>Shoot and scoot capability enables <strong>launcher</strong> to escape counter battery</li><li>Automated features to enable fast response to call for fire</li><li>Matching mobility and logistics commonality: Common chassis for the family of vehicles constituting the Pinaka weapon system.<br /><br /></li></ul> <h3>Orders <hr /> </h3> <p>The Pinaka project has been a significant success for the DRDO and its development partners in developing and delivering a state of the art, high value project to the Indian Army's demanding specifications. Whilst DRDO was responsible for the overall design and development, its partners played a significant role in developing important subsystems and components. They include TATA Power Co. Ltd. Strategic Electronic Division (Tata Power SED)and Larsen & Toubro Ltd. to state owned Ordnance Factory Board, for the rockets as well as other private and public firms.</p> <p>The first Pinaka regiment was raised on February 2000. Each regiment consists of three batteries of six Pinakas each, plus reserves. On <span class="mw-formatted-date" title="2006-03-29"><span class="mw-formatted-date" title="03-29">March 29</span>, 2006</span>, the Indian Army awarded Tata Power SED and Larsen & Toubro's Heavy Engineering Division a contract worth Rs 200 crore (US $45 million), to produce 40 Pinaka MBRLs each. Tata Power SED declared that it would be delivering the first units within six months. The Indian Army has placed an indent for Pinaka Weapon System worth Rs 1300 crores.</p> <h3>Deployment <hr /> </h3> <p>The Pinaka will be operated in conjunction with the Indian Army's Firefinder radars and indigenously developed BEL Weapon Locating Radar of which 28 are on order. The Indian Army is networking all its artillery units together with the DRDO's Artillery Command & Control System (ACCS), which acts as a force multiplier. The ACCS is now in series production. The Pinaka units will also be able to make use of the Indian Army's SATA (Surveillance & Target Acquisition) Units which have been beefed up substantially throughout the late 90's, with the induction of the Searcher-1, Searcher-2 and IAI Heron UAVs into the Indian Army, as well as the purchase of a large number of both Israeli made and Indian made <span class="mw-redirect">Battle Field Surveillance radars</span>. These have also been coupled with purchases of the Israeli LORROS (Long Range Observation and Sighting System) which is a combination of <span class="mw-redirect">FLIR</span>/CCD system for long range day/night surveillance.</p> <p>Presently, three regiments of Pinaka have now been inducted by the Army. The Indian Army will induct an additional number of regiments of the Pinaka during its next planning period (2012-2017) as the older Grad MLRS regiments are retired.</p> <h3><span id="Future_plans" class="mw-headline">Future plans <hr /> </span></h3> <p>The Pinaka is in the process of further improvement. Israel Military Industries teamed up with <span class="mw-redirect">DRDO</span> to implement its Trajectory Correction System (TCS) on the Pinaka, for further improvement of its CEP. This has been trialled and has shown excellent results. The rockets can also be guided by <span class="mw-redirect">GPS</span> to improve their accuracy. A wraparound microstrip antenna has been developed by <span class="mw-redirect">DRDO</span> for this system.</p> <p>While the Pinaka will not be developed further into a larger system, its success and the experience gained from the program has led the ARDE and its partner organizations, to launch a project to develop a long range MBRL in the class of the <span class="mw-redirect">Smerch MBRL</span>. A 7.2-metre <strong>rocket</strong> for the Pinaka MBRL, which can reach a distance of 120 km and carry a 250 kg payload. These new rockets can be fired in 44 seconds, have a maximum speed of mach 4.7, rise to an altitude of 40 km before hitting its target at mach 1.8 and can destroy an area of 3.9 sq km. Integrating UAV with the Pinaka is also in the pipeline, as <span class="mw-redirect">DRDO</span> intends to install guidance systems on these rockets to increase their accuracy. Development and trials will continue and the <strong>rocket</strong> is expected to enter user trial by 2012.</p> <h3><span id="Specifications" class="mw-headline">Specifications <hr /> </span></h3> <ul><li><strong>Range:</strong> 7 km - 40 km (4.4 - 26 mi)</li><li><strong><strong>Rocket</strong> Diameter:</strong> 214 mm (8.42 in)</li><li><strong>Length</strong>: 4.95 m (16.24 ft)</li><li><strong>Warhead weight:</strong> 100 kg (220 lbs)</li><li><strong>Total weight:</strong> 276kg (608 lbs)</li></ul> <p><strong>Warheads:</strong></p> <ul><li>Fragmentation high explosive</li><li>Incendiary</li><li>Anti-Tank and Anti-Personnel minelettes</li><li>Anti-Tank bomblettes</li></ul> <p>To neutralise different types of targets, monolithic (preformed fragments and incendiary) and submunition (antitank bomblets, antitank and antipersonnel minelets) warheads have been developed. Preformed fragment warheads provide dual-purpose blast-cum-fragmentation effects. These warheads incorporate tungsten balls, which on initiation travel at high speed and cause lethal damage over a large area. The design has been perfected by choice of optimum C/M ratio ensuring higher density of fragments. Incendiary warheads with zirconium-based incendiary compositions spread burning chunks over an area of about 100 m radius with a burning time of 3-4 min. These warheads are effective against POL dumps and other inflammable targets. Antitank bomblets and antitank minelets with capability of penetrating 90 mm and 150 mm armour plates, respectively are in an advanced stage of development.</p> <p><strong>Fuses</strong><br /><img src="http://farm3.static.flickr.com/2552/4076997203_85d85cdd7a_o.jpg" width="92" border="0" height="146" />The following fuses have been developed for Pinaka:<br />Proximity fuse with set to height of burst equal to 10 m + 2 m and electronic countermeasure feature like anti-jamming frequency hopping; and ET fuse with fuse time settings in steps of 0.1 s, data retention of minimum 2 h, multiple mechanical/electronic safety, and FCC/<strong>launcher</strong>/manual fuse settings have been developed. Advance controlled variable time (CVT) fuses with anti-jamming features in the form of pseudo random phase modulation technique are in an advanced stage of development.</p> <p><strong><strong>Rocket</strong></strong></p> <p>The Pinaka propulsion system consists of flow-formed motor tubes fabricated from high strength special steel and lined with silica phenolic material. High energy composite propellant grain has been specially developed to achieve high thrust and specific impulse. A modified six degrees of freedom (DOFs) trajectory model has been developed and validated over a number of flight trials.</p> <p>Rockets are loaded into pods making stowage, transport, loading, and unloading easy. The pods are open-frame structures made of special lightweight high-strength aluminium alloy capable of holding six rockets in separate FRP launch tubes.</p> <p><strong>AGAPS</strong></p> <p>Automatic Gun Alignment and Positioning System (AGAPS) integrated with Pinaka <strong>launcher</strong> is a state-of-the-art technology supplied by SAGEM, France. The AGAPS uses a ring laser gyro coupled with accelerometers to form a strap-down inertial sensor. It has one mil accuracy in orientation, fast reaction time, and high-precision fire with improved fire safety. The system is coupled with a global positioning system to provide hybrid land navigation to the <strong>launcher</strong>. The crew does not need any external help to manage its navigation in the field and to engage targets. It thus obviates the need for pre survey and a separate survey team. It incorporates functions to manage mission preparation through waypoints and itinerary for convenient navigation.</p> <p><strong>Fire Control Computer (FCC)</strong><br />The Pinaka FCC in its current configuration operates in essentially stand-alone mode. However, the FCC software code and command structure have been developed to ensure seamless integration with the future digitised battlefield scenarios. Its special features are:</p> <ul><li>Trajectory computation using modified six DOFs trajectory computation code</li><li>Separate voice and data radio communication with fire units</li><li>Radio link with DIGICORA for online meteorological data for trajectory computations</li><li>Capability for interface with FDR</li><li>User-friendly man-machine interface</li><li>Computes laying angles and other parameters by deliberating <strong>launcher</strong> coordinates, target</li><li>coordinates, meteorological data, and <strong>rocket</strong> data</li><li>Communicates and controls up to eight launchers</li><li>Comprehensive <strong>launcher</strong> control with capability to stop <strong>launcher</strong> operations at any time.</li></ul> <p> </p> <p><strong><strong>Launcher</strong></strong></p> <p>The Pinaka <strong>launcher</strong> is a mobile system with capability of laying and launching 12 rockets individually or in programmed ripple-fire mode. The system also has onboard automatic gun alignment and positioning system (AGAPS) to provide navigation and orientation capabilities to the <strong>launcher</strong>.<strong><br /></strong></p> <ul><li>Based on a Kolos <span class="mw-redirect">Tatra</span> truck for high mobility. The truck is license manufactured by BEML.</li><li>The truck features a central type regulation system; the driver can adjust the tire pressure to suit the terrain for optimum mobility.</li><li>Two <strong>rocket</strong> pods per <strong>launcher</strong>, with a total of twelve rockets between them.</li><li>A total of six launchers per battery.</li><li>Launchers are NBC protected, have their own computerized fire control system, and automatic positioning system.</li><li>The Pinaka system and the launchers are designed for shoot and scoot fire missions thanks to the use of an inertial navigation system <span class="mw-redirect">SIGMA 30</span></li><li>A battery of six launchers can neutralize an area of roughly 1000 * 800 meters at 40 km range.</li><li>The <strong>launcher</strong> assembly has electromagnetic elevation and traverse, with traverse being 90º left and right of the centerline and elevation up to 55º</li></ul> <p><strong>GPS Antenna</strong><br /><img class="caption" src="http://docs.google.com/File?id=dhnb2fr7_137c88zcfc2_b" alt="Quadrifilar Helix Antenna" width="161" border="0" height="138" />Increased application of Global Positioning Systems (GPS) for navigational aids, necessitated the development of low profile antennas. Two types of low profile antennas, viz., Wraparound Microstrip Antenna for Pinaka <strong>Rocket</strong> and Quadrifilar Helix Antenna for manpack GPS have been developed by DRDO. The development of GPS antenna for Pinaka, along with its feed network, is a challenging task as it requires antenna to be conformal with the cylindrical body of the <strong>rocket</strong>. Quadrifilar Helix Antenna is one of the preferred antennas for GPS application owing to its smaller size and cardioid pattern.<strong><br /></strong></p> <p><strong>Rate of Fire</strong> for a complete salvo from a <strong>launcher</strong>:</p> <ul><li>Approximately 44 seconds.</li></ul> <p><strong>Salvo Reload time</strong></p> <ul><li>4 minutes.</li></ul> <p><strong>CEP</strong></p> <ul><li>1-2% of range</li><li>Improved substantially when Trajectory Correction System was incorporated.</li></ul>Sidharth K Menonhttp://www.blogger.com/profile/11412252277913740873noreply@blogger.comtag:blogger.com,1999:blog-7965927633581367449.post-81380650631802338662010-06-24T13:09:00.012+05:302011-08-31T14:24:04.575+05:30Littoral Combat Ship<div style="text-align: center;"><span style="font-size: 180%; font-weight: bold;">Littoral Combat Ship (LCS) High-Speed Surface Ship</span></div><h1 style="font-weight: bold;"><span style="font-size: 130%;"><a href="http://1.bp.blogspot.com/_H2SGxn7sGYA/TCMOldm-Y-I/AAAAAAAAAZg/TnqX7olt6oA/s1600/US+Flag.gif"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5486244807833445346" src="http://1.bp.blogspot.com/_H2SGxn7sGYA/TCMOldm-Y-I/AAAAAAAAAZg/TnqX7olt6oA/s320/US+Flag.gif" style="cursor: pointer; float: right; height: 90px; margin: 0pt 0pt 10px 10px; width: 148px;" /></a></span></h1><div style="float: left; padding-left: 5px; padding-top: 13px; vertical-align: top; width: 400px;"><div><span class="coloured_hyperlink" style="font-size: 85%;"><span style="font-size: 130%;"><span style="font-weight: bold;">Key Data</span></span><br />
<span style="font-size: 100%;"><br />
</span></span></div><div><div class="items_box_content"><div style="clear: both; padding-bottom: 2px; padding-left: 10px; width: 460px;"><div style="clear: both; float: left; width: 150px;"><span style="font-size: 100%;">Hull Service Life</span></div><div style="float: right; width: 300px;"><span style="font-size: 100%;">30 years</span></div></div><div style="clear: both; padding-bottom: 2px; padding-left: 10px; width: 460px;"><div style="clear: both; float: left; width: 150px;"><span style="font-size: 100%;">Draft at Full Load Displacement</span></div><div style="float: right; width: 300px;"><span style="font-size: 100%;">10ft</span></div></div><div style="clear: both; padding-bottom: 2px; padding-left: 10px; width: 460px;"><div style="clear: both; float: left; width: 150px;"><span style="font-size: 100%;">Sprint Speed in Sea State 3</span></div><div style="float: right; width: 300px;"><span style="font-size: 100%;">50</span><span style="font-size: 100%;">kt</span></div></div><div style="clear: both; padding-bottom: 2px; padding-left: 10px; width: 460px;"><div style="clear: both; float: left; width: 150px;"><span style="font-size: 100%;">Range at Sprint Speed with Full Payload</span></div><div style="float: right; width: 300px;"><span style="font-size: 100%;">1,500nm</span></div></div><div style="clear: both; padding-bottom: 2px; padding-left: 10px; width: 460px;"><div style="clear: both; float: left; width: 150px;"><span style="font-size: 100%;">Range at Economical Speed</span></div><div style="float: right; width: 300px;"><span style="font-size: 100%;">4,300nm</span></div></div><div style="clear: both; padding-bottom: 2px; padding-left: 10px; width: 460px;"><div style="clear: both; float: left; width: 150px;"><span style="font-size: 100%;">Economical Speed</span></div><div style="float: right; width: 300px;"><span style="font-size: 100%;">>20kt</span></div></div><div style="clear: both; padding-bottom: 2px; padding-left: 10px; width: 460px;"><div style="clear: both; float: left; width: 150px;"><span style="font-size: 100%;">Crew Size</span></div><div style="float: right; width: 300px;"><span style="font-size: 100%;">15 to 50 core crew</span></div></div><div style="clear: both; padding-bottom: 2px; padding-left: 10px; width: 460px;"><div style="clear: both; float: left; width: 150px;"><span style="font-size: 100%;">Accommodation for Core and Mission Crew</span></div><div style="float: right; width: 300px;"><span style="font-size: 100%;">75</span> </div></div><div style="clear: both; padding-bottom: 2px; padding-left: 10px; width: 460px;"><div style="clear: both; float: left; width: 150px;"><span style="font-size: 100%;">Operational Availability</span></div><div style="float: right; width: 300px;"><span style="font-size: 100%;">95%</span></div></div><div style="float: left; font-weight: bold; padding-left: 10px; padding-top: 15px; width: 100%;"><h2><span style="font-size: 100%;">Aviation Facilities:</span></h2></div><div style="clear: both; padding-bottom: 2px; padding-left: 10px; width: 460px;"><div style="clear: both; float: left; width: 150px;"><span style="font-size: 100%;">Embark and Hangar</span></div><div style="float: right; width: 300px;"><span style="font-size: 100%;">1 x MH-60R/S and VTUAVs</span> </div></div><div style="clear: both; padding-bottom: 2px; padding-left: 10px; width: 460px;"><div style="clear: both; float: left; width: 150px;"><span style="font-size: 100%;">Flight Deck</span></div><div style="float: right; width: 300px;"><span style="font-size: 100%;">MH60R/S, UAVs, NTUAVs</span></div></div><div style="clear: both; padding-bottom: 2px; padding-left: 10px; width: 460px;"><div style="clear: both; float: left; width: 150px;"><span style="font-size: 100%;">Aircraft Launch and Recovery<br />
</span></div><div style="float: right; width: 300px;"><span style="font-size: 100%;">Up to Sea State 5</span></div></div><div style="clear: both; padding-bottom: 2px; padding-left: 10px; width: 460px;"><div style="clear: both; float: left; width: 150px;"><span style="font-size: 100%;">Watercraft Launch and Recovery</span></div><div style="float: right; width: 300px;"><span style="font-size: 100%;">Sea State 4, in 15 minutes</span></div></div><div style="clear: both; padding-bottom: 2px; padding-left: 10px; width: 460px;"><div style="clear: both; float: left; width: 150px;"><span style="font-size: 100%;">Watercraft Mission Packages</span></div><div style="float: right; width: 300px;"><span style="font-size: 100%;">11m RHIB, 40ft high-speed boats</span></div></div><div style="clear: both; padding-bottom: 2px; padding-left: 10px; width: 460px;"><div style="clear: both; float: left; width: 150px;"><span style="font-size: 100%;">Time for Change of Mission Packages</span></div><div style="float: right; width: 300px;"><span style="font-size: 100%;">One day</span></div></div><div style="clear: both; padding-bottom: 2px; padding-left: 10px; width: 460px;"><div style="clear: both; float: left; width: 150px;"><span style="font-size: 100%;">Ship and Crew Provisions</span></div><div style="float: right; width: 300px;"><span style="font-size: 100%;">21 days (336 hours)</span></div></div><div style="clear: both; padding-bottom: 2px; padding-left: 10px; width: 460px;"><div style="clear: both; float: left; width: 150px;"><span style="font-size: 100%;">Underway Replenishment</span></div><div style="float: right; width: 300px;"><span style="font-size: 100%;">180t including 105t mission packages and 75t mission package fuel</span></div></div></div><div class="items_box_content" style="padding-left: 10px; padding-top: 15px;"><span style="font-size: 100%;"><br />
</span><span style="font-size: 100%;"><br />
</span></div></div></div><div style="clear: both;"><hr class="dotted" style="height: 3px;" /></div><div id="project_details"><span style="font-size: 100%;">The littoral combat ship (LCS) is the first of a new family of surface ships for the US N</span><span style="font-size: 100%;">avy. The LCS is a fast, highly manoeuverable, networked surface combat ship, which is a specialised variant of the family of US future surface combat ships known as DD(X). LCS is designed to satisfy the urgent requirement for shallow draft vessels to operate in the littoral (coastal waters) to counter growing potential 'asymmetric' threats of coastal mines, quiet diesel submarines and the potential to carry explosives and terrorists on small, fast, armed boats. </span><br />
In May 2004, the United States Department of Defense and the US Navy announced the selection of two separate defense contracting teams led by Lockheed Martin and General Dynamics to each carry out system design and options for the detailed design and construction of two flight 0, or first-generation, LCS ships.<br />
<br />
<a href="http://3.bp.blogspot.com/_H2SGxn7sGYA/TCMNB85euyI/AAAAAAAAAZY/aWY9AacNRYg/s1600/004-1.jpg" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5486243098245643042" src="http://3.bp.blogspot.com/_H2SGxn7sGYA/TCMNB85euyI/AAAAAAAAAZY/aWY9AacNRYg/s320/004-1.jpg" style="float: right; height: 320px; margin: 0pt 0pt 10px 10px; width: 202px;" /></a>Lockheed Martin received a contract for the first ship, LCS 1, in December 2004. The keel for LCS 1, to be called USS Freedom, was laid in June 2005 at the Marinette Marine shipyard in Wisconsin. It was launched in September 2006.<br />
<span style="font-size: 100%;">General Dynamics was awarded the contract for USS Independence, LCS 2, in October 2005. The keel was laid in January 2006 at the Austal USA shipyard in Mobile, Alabama. It was launched in April 2008 and christened in October 2008. The ship completed the builder's sea trials in October<br />
</span><br />
<h1><span style="font-size: 100%;"></span></h1><span style="font-size: 100%;">2009 and was delivered to the USN in December 2009. It was commissioned in January 2010. Lockheed Martin was also to build LCS 3, USS Courage, to commission in 2</span><span style="font-size: 100%;">009. The contract was awarded in June 2006 and the vessel was to begin construction in early 2007. However, in January 2007, the USN ordered Lockheed Martin to stop work on LCS 3. The USN wished to review the progra</span><span style="font-size: 100%;">m because of concerns over cost increases incurred in the construction of USS Freedom. In April 2007, the USN terminated the contract for LCS 3. General Dynamics was also awarded the contract to build LCS 4, USS Liberty in December 2006. In October 2007, the US Navy also terminated the contract for this vessel.</span><br />
<span style="font-size: 100%;">In April 2008, the US Navy issued a request for proposals to the two companies for three LCS ships. It had previously been planned that orders would be placed for nine flight 1 (second-generation) LCS ships during 2008 and 2009, for ship commissioning during the period 2010 to 2012. The contract for the Coronado, LCS 4, was awarded to General Dynamics in April 2009. The keel was laid in December 2009. It is scheduled for delivery in June 2012. The numbers of LCS ships is not finalised but there has been speculation of 56 or up to 60 LCS ships, within a total US naval fleet of 375 ships.</span><span style="font-size: 100%;"><a href="http://1.bp.blogspot.com/_H2SGxn7sGYA/TCMNAYxiTII/AAAAAAAAAZI/dLLayZhdbTU/s1600/007.jpg"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5486243071368776834" src="http://1.bp.blogspot.com/_H2SGxn7sGYA/TCMNAYxiTII/AAAAAAAAAZI/dLLayZhdbTU/s320/007.jpg" style="cursor: pointer; float: right; height: 214px; margin: 0pt 0pt 10px 10px; width: 320px;" /></a></span><br />
<span style="font-size: 100%;">The contract option awarded to Lockheed Martin is managed by Lockheed Martin's maritime systems and sensorsdivision in Moorestown, New Jersey. The Lockheed Martin team includes: Marinette Marine shipyard, Bollinger Shipyards, Gibbs and Cox naval architects, Izar of Spain and Blohm & Voss naval shipbuilders. The contract option awarded to General Dynamics is managed by Bath Iron Works at Bath, Maine.</span><br />
<span style="font-size: 100%;">The major members of General Dynamics tea</span><span style="font-size: 100%;">m are: Austal USA, based in Mobile, Alabama (a subsidiary of Austal Ships of Australia); BAE Systems, Rockville, Maryland; Maritime Applied Physics Corporation, Baltimore, Maryland; CAE Marine Systems, Leesburg, Virginia; Northrop Grumman Electronic Systems, Baltimore, Maryland; General Dynamics Armament and Technical Products, Burlington, Vermont; General Dynamics Electric Boat, Gorton, Connecticut; General Dynamics Advanced Information Systems, Washington, DC; and General Dynamics Canada, Ottawa, Ontario. </span><br />
<span style="font-size: 100%;">In April 2005, the US Navy awarded a foreign military sales contract to Lockheed Martin to conduct a nine-month feasibility study to examine possible modifications to the Lockheed Martin LCS design to meet the requirements of the Israeli Navy. The study concentrated on hull, mechanical and electrical system compatibility. The Israeli Navy requirement includes the mk41 vertical-launch system for B</span><span style="font-size: 100%;">arak missiles. The contract was extended in November 2007 to include technical specification and costs for the combat system. In July 2008, Israel requested the foreign military sale (FMS) of up to four vessels of the LCS 1 variant.</span><br />
<h2><span style="font-size: 100%;">Littoral combat ship design</span></h2><span style="font-size: 100%;">The two designs are quite different, although both satisfy the top-level pe</span><br />
<h2><span style="font-size: 100%;"><a href="http://1.bp.blogspot.com/_H2SGxn7sGYA/TCMNA1FUzJI/AAAAAAAAAZQ/d1u7-dYQacY/s1600/008.jpg"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5486243078967970962" src="http://1.bp.blogspot.com/_H2SGxn7sGYA/TCMNA1FUzJI/AAAAAAAAAZQ/d1u7-dYQacY/s320/008.jpg" style="cursor: pointer; float: right; height: 214px; margin: 0pt 0pt 10px 10px; width: 320px;" /></a></span></h2><span style="font-size: 100%;">rformance requirements and technical requirements of the LCS programme. Both achieve sprint speeds of over 40kt and long-range transit distances of over 3,500 miles. The Lockheed Martin design is a high-speed semi-planing monohull. The General Dynamics design is a trimaran with a slender stabilised monohull. </span><br />
<span style="font-size: 100%;">The sea frames of both designs accommodate the equipment and crew for core LCS missions and special missions. They are both capable of the effective launch, control and recovery of vehicles for extended periods, however the strategy for launch and recovery for waterborne craft and for aircraft are different in the two designs. The two designs also use very different approaches for incorporating reconfigurable internal volume. </span><br />
<span style="font-size: 100%;">The design approach for the second-generation LCS, flight 1, ship acquisition is flexible and will take into consideration the experience gained in the flight 0 designs. In both designs, the sprint speed of 40kt to 50kt results in the body of the hull being lifted out of the water as much as possible. The Lockheed Martin design of the monohull lifts the body of the hull. The General Dynamics trimaran design, with the slender stabilised monohull, uses two outriggers which move the displacement upwards and reduce the wetted surface. The shaping of the hull in both design strategies gives signature reduction. The designs of both ships continue to evolve with changes in the design proposals. </span><br />
<h2><span style="font-size: 100%;">Core capabilities of the littoral combat ship</span></h2><h1><a href="http://3.bp.blogspot.com/_H2SGxn7sGYA/TCMbUL9RTSI/AAAAAAAAAZo/UGJfb948Lm4/s1600/url.gif"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5486258804688506146" src="http://3.bp.blogspot.com/_H2SGxn7sGYA/TCMbUL9RTSI/AAAAAAAAAZo/UGJfb948Lm4/s320/url.gif" style="cursor: pointer; float: right; height: 320px; margin: 0pt 0pt 10px 10px; width: 296px;" /></a></h1><span style="font-size: 100%;">A full load displacement draft of 10ft allows the ships to access very shallow waters. The ships will have a top speed of about 50kt and the range at sprint speed is 1,500nm. At an economical speed of 20kt, the range is 4,300nm. </span><br />
<span style="font-size: 100%;">The ships are configured with a helicopter deck and hangar. The deck is capable of the launch and recovery of the MH-60R/S helicopter and a tactical unmanned air vehicle. The ships can carry out aircraft launch and recovery in conditions up to sea state 5, i.e. in winds up to 27kt and average wave heights between 6.4ft and 9.6ft. The ships will be capable of launching and recovering watercraft, for example 40ft high-speed boats, within 15 minutes in conditions of sea state 4, i.e. waves up to 5ft and winds up to 21kt. </span><br />
<span style="font-size: 100%;">General Dynamics Robot Systems was awarded a US Navy contract to develop the common launch and recovery system (CLRS) of unmanned and other watercraft for the LCS in July 2008. The ships will carry provisions for 21 days before replenishments and will also be able to replenish underway. The crew size will be between 15 and 50 and accommodation is provided for up to 75 ship and special mission crew. The operational availability will be 95%. A core capability will be the deployment of Fire Scout unmanned air vehicle and the unmanned ribbed boat, Spartan unmanned surface vehicle, equipped with a basic payload of navigation radar, infrared camera and video camera. </span><br />
<h2><span style="font-size: 100%;">Littoral combat ship mission modules</span></h2><span style="font-size: 100%;">The mission modules will have the capability to be changed, tested and working within24h. Northrop Grumman has been appointed as mission package integrator. The mission packages will be: mine warfare (MIW), anti-submarine warfare (ASW) and anti-surface warfare (SUW). The mission modules may be integrated into standard-sized containers that can be installed in the ship and other systems will be transferred onto the ship on pallets. The mission systems will be connected to the ship's network and communicate with the other ship systems and other surface ships and aircraft. </span><br />
<span style="font-size: 100%;">The MIW module includes: the AN/WLD-1 remote minehunting system, AN/AQS-20A sonar mine detecting set, organic airborne surface influence sweep, airborne laser mine detection system and airborne mine neutralisation system. The ASW module includes the Sea TALON (tactical littoral ocean network) undersea surveillance system, being developed by Lockheed Martin Maritime Systems & Sensors, which integrates a range of acoustic sensors with semi-submersible vehicles and network-centric communications.</span><br />
<span style="font-size: 100%;">Passive sensors include the advanced deployable system (ADS), a rapidly deployable bottom array acoustic surveillance system. The semi-submersible, the AN/WLD-1 with an ASW mission system, tows a remote towed active source (RTAS), a multiband transducer with a remote towed array multi-function sonar. The ASW module also includes systems to be deployed from the MH-60R helicopter (mk54 torpedoes, sonobuoys, Raytheon AN/AQS-22 airborne low-frequency sonar) and unmanned surface vehicles, USVs (dipping sonar, multi-static active sonar and ULITE ultra-lightweight towed array). General Dynamics Robotics was awarded a contract for four USVs for the ASW module in October 2006.</span><br />
<h1 style="font-weight: bold;"><span style="font-size: 100%;"><a href="http://2.bp.blogspot.com/_H2SGxn7sGYA/TCMM_jKWEJI/AAAAAAAAAY4/H_HTG9KUmNU/s1600/006.jpg"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5486243056977318034" src="http://2.bp.blogspot.com/_H2SGxn7sGYA/TCMM_jKWEJI/AAAAAAAAAY4/H_HTG9KUmNU/s320/006.jpg" style="cursor: pointer; float: right; height: 257px; margin: 0pt 0pt 10px 10px; width: 213px;" /></a></span></h1><span style="font-size: 100%;">The 11m Fleet Class USV weighs about 7.7t, has a payload of about 2,270kg, speed of35kt and is capable of operating continuously for over 24h. The SUW module includes a General Dynamics mk46 30mm cannon (also used in the rapid airborne mine clearance system and the US Marine Corps expeditionary fighting vehicle), which fires at up to 200 rounds a minute, and a version of the US Army's non-line of sight - precision attack munition missile system. The NLOS launch system and precision attack missile are being jointly developed by Lockheed Martin and Raytheon. The direct attack missile has a dual-mode uncooled infrared and semi-active laser seeker, multimode warhead and range up to 40km. The MH-60R is armed with guns and Hellfire missiles.</span><br />
<span style="font-size: 100%;"><b>Littoral combat ship gun</b></span><br />
<span style="font-size: 100%;">Both General Dynamics and Lockheed Martin vessels are armed with BAE Systems Land and Armaments (formerly United Defense) mk110 57mm naval gun system. The mk110 fires mk295 ammunition at a rate of 220 rounds a minute to a range of 14km (nine miles).</span><br />
<h2><span style="font-size: 100%;">General Dynamics trimaran</span></h2><span style="font-size: 100%;">The slender stabilised trimaran monohull proposed by the GeneralDynamics team has an overall length of 127.8m, maximum beam of 28.4m and full load displacement of 2,637t. The seaframe is based on Austal's design for the Benchijigua Express passenger / car ferry. </span><br />
<span style="font-size: 100%;">A naval forward looking infrared is fitted above the bridge. The Raytheon SeaRAM anti-ship missile defence system is installed on the hangar roof. SeaRAM combines the sensors of the Phalanx 1B close-in weapon system but replaces the 20mm gun with an 11-missile launcher for the rolling airframe missile (RAM). 50-calibre machine gun mounts are installed port and starboard on the walkway on either side of the hangar and at the stern just below the level of the stern helicopter deck. The decoy systems include three Super RBOCs and two Nulka decoy launchers. The countermeasures suite will include ES 3601 tactical radar electronic support measures (ESM) from EDO Corp. The towed sonar and towed decoys </span><br />
<span style="font-size: 100%;">are launched from the stern of the ship. Northrop Grumman Electronic Systems will provide the integrated combat management system (ICMS), BAE Systems Electronic Systems will provide the radio communications system and CAE Marine Systems will supply the automated ship control system. The main mast carries the Link 16, Link 1, CEC, and the Saab Microwave Systems (formerly Ericsson) Sea Giraffe radar.</span><br />
<h2><span style="font-size: 100%;">Lockheed Martin semi-planing monohull</span></h2><h2><span style="font-size: 100%;"><a href="http://2.bp.blogspot.com/_H2SGxn7sGYA/TCMM_77x_GI/AAAAAAAAAZA/kVkdM-iNeJo/s1600/005.jpg"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5486243063627119714" src="http://2.bp.blogspot.com/_H2SGxn7sGYA/TCMM_77x_GI/AAAAAAAAAZA/kVkdM-iNeJo/s320/005.jpg" style="cursor: pointer; float: right; height: 320px; margin: 0pt 0pt 10px 10px; width: 239px;" /></a></span></h2><span style="font-size: 100%;">Lockheed Martin's advanced semi-planing seaframe is based on technologies introduced by Italian shipbuilder Fincantieri on the 1,000t Destrier commercial vessel, which holds the transatlantic speed record, and the 3,000t Jupiter class.</span><br />
<span style="font-size: 100%;">The ship has a steel hull with aluminium superstructure and will be powered by two Rolls-Royce MT30 36MW gas turbines and two Fairbanks Morse Colt-Pielstick 16</span><br />
<span style="font-size: 100%;">PA6B STC diesel engines driving four large, acoustically optimised Rolls-Royce waterjets. Four Isotta Fraschini Model V1708 ship service diesel generator sets provide auxiliary power. Fincantieri Marine Systems North America Inc is supplying the ride control system.The ship's maximum speed is 45kt. The overall length is 115.5m. The maximum beam width is 13.1m and the draft is 3.7m.The vessel has automated stern doors, stern ramp, side launch doors and overheadcrane for the launch and recovery of manned and unmanned vessels.</span><br />
<span style="font-size: 100%;">The combat management system is the Lockheed Martin COMBATSS-21, based on open architecture. The ships will be equipped with EADS TRS-3D C-band radar for air and surface surveillance and weapon assignment and the soft-kill weapon system (SKWS) decoy launcher from Terma A/S of Denmark. </span></div>Sidharth K Menonhttp://www.blogger.com/profile/11412252277913740873noreply@blogger.comtag:blogger.com,1999:blog-7965927633581367449.post-56826484702519275992010-02-17T13:12:00.008+05:302010-02-17T13:40:57.165+05:30Indian Army and US Artillery<strong><span style="font-size:180%;"><span style="color:#ff0000;">US Marine M777 for the Indian Army</span> <a href="http://2.bp.blogspot.com/_H2SGxn7sGYA/S3uirv5q_aI/AAAAAAAAAYw/10jHvEpJChs/s1600-h/quest47.blogspot.com+m777+project+(4).jpg"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 130px; FLOAT: right; HEIGHT: 78px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5439119847456439714" border="0" alt="" src="http://2.bp.blogspot.com/_H2SGxn7sGYA/S3uirv5q_aI/AAAAAAAAAYw/10jHvEpJChs/s320/quest47.blogspot.com+m777+project+(4).jpg" /></a><a href="http://3.bp.blogspot.com/_H2SGxn7sGYA/S3ugiMv5sSI/AAAAAAAAAYo/jZ0FKLYdpmU/s1600-h/quest47.blogspot.com+m777+project+(7).jpg"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 135px; FLOAT: right; HEIGHT: 76px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5439117484378140962" border="0" alt="" src="http://3.bp.blogspot.com/_H2SGxn7sGYA/S3ugiMv5sSI/AAAAAAAAAYo/jZ0FKLYdpmU/s320/quest47.blogspot.com+m777+project+(7).jpg" /></a><br /><br /></span></strong><strong><span style="font-size:180%;"></span></strong><br />Since India is trying to maximize the use of its defence budget before the end of this fiscal year, The Indian Army will soon acquire 145 ultra-light howitzers from the US. The Indian Defence Acquisitions Committee (DAC) has taken a decision to pursue the foreign military sales (FMS) route and the deal is expected to be to the tune of $647 million. <a href="http://4.bp.blogspot.com/_H2SGxn7sGYA/S3ugZTCtPAI/AAAAAAAAAYA/M4bTgLdV9nI/s1600-h/quest47.blogspot.com+m777+project+(3).jpg"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 320px; FLOAT: right; HEIGHT: 240px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5439117331448806402" border="0" alt="" src="http://4.bp.blogspot.com/_H2SGxn7sGYA/S3ugZTCtPAI/AAAAAAAAAYA/M4bTgLdV9nI/s320/quest47.blogspot.com+m777+project+(3).jpg" /></a><br /><br />As for the US Pentagon, the possible sale of 145 state-of-the-art lightweight towed Howitzers to India has been notified to the US Congress. For the US, this proposed sale will contribute to the foreign policy and enhance the US-India strategic relationship. India intends to use the howitzers to modernise its armed forces and enhance its ability to operate in hazardous conditions.<br />The Indian Army will get the M777 145 ultra-light howitzers, whose main contractors will be US-based BAE of Hattiesburg and Mississippi. This procurement will be part of the first phase of the field artillery rationalisation plan. This plan is part of the programme to upgrade Indian Army’s artillery divisions. The Indian Army aims to buy 145 ultra-light howitzers, 158 towed and wheeled, 100 tracked, and 180 wheeled and armoured guns as a part of this entire phase of the plan. <a href="http://1.bp.blogspot.com/_H2SGxn7sGYA/S3ugYQgS1NI/AAAAAAAAAXo/npZQAo67cR8/s1600-h/quest47.blogspot.com+m777+project.jpg"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 242px; FLOAT: right; HEIGHT: 193px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5439117313587729618" border="0" alt="" src="http://1.bp.blogspot.com/_H2SGxn7sGYA/S3ugYQgS1NI/AAAAAAAAAXo/npZQAo67cR8/s320/quest47.blogspot.com+m777+project.jpg" /></a><br /><br />According to BAE officials, M777 is, by some considerable margin, the lightest 155 mm howitzer in the world and the only system proven in battle. The M777 meets the requirement for the Indian Army’s Ultra Lightweight howitzer programme and the only one in full production. A significant amount of work share would be completed in India by the Mahindra and BAE Systems joint venture Company, officials added.<br />In the beginning, there was another ultra-light howitzer in competition for the Indian Army’s artillery modernisation programme which was the ‘Pegasus’ by Singapore-based ST Kinetics. Since ST Kinetics was blacklisted last year, the DAC decided to go the FMS route which is a US programme of government-to-government sales of military hardware, avoiding delays of competitive bidding.<br /><br /><ul><li><span style="font-size:130%;"><strong><span style="color:#ff0000;">M 777 Key Data</span></strong><br /></span>Crew - Normally 7 (can be a reduced detatchment of 5)<br />Overall Length, Towing Mode -9,275mm<br />Overall Length, Firing Mode - 10,210mm<br />Overall Width, Towing Mode<a href="http://2.bp.blogspot.com/_H2SGxn7sGYA/S3ugZCiYMuI/AAAAAAAAAX4/AbjmgLw3XtY/s1600-h/quest47.blogspot.com+m777+project+(2).jpg"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 289px; FLOAT: right; HEIGHT: 320px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5439117327018242786" border="0" alt="" src="http://2.bp.blogspot.com/_H2SGxn7sGYA/S3ugZCiYMuI/AAAAAAAAAX4/AbjmgLw3XtY/s320/quest47.blogspot.com+m777+project+(2).jpg" /></a> - 2,770mm<br />Overall Width, Firing Mode - 3,720mm<br />Overall Height, Towing Mode - 2,260mm<br />Trunnion Height, Firing - 650mm</li></ul><p><br /><a style="COLOR: black" href="http://www.blogger.com/projects/ufh/specs.html"><strong><span style="font-size:130%;color:#ff0000;">Full specifications</span></strong></a><strong><span style="color:#ff0000;"> </span></strong></p><strong><p><br /></strong>The Ultralightweight Field Howitzer (UFH), designated M777 in the USA, was selected in 1997 by a joint US Army / Marine Corps initiative to replace the existing inventory of M198 155mm towed howitzers. The first of five EMD systems was delivered in June 2000. The US Marine Corps is to procure 380 systems and the US Army 273 systems. A low-rate initial production (LRIP) contract for 94 systems was awarded in November 2002.<br /></p><p>Operational testing with the USMC, during which nearly 12,000 artillery rounds were fired by four production systems, was completed in December 2004. A contract for full-rate production of 495 systems was awarded to BAE Systems in April 2005. In May 2005, the USMC began fielding the M777 with the 11th Marines unit at Twentynine Palms in California.<br /><a href="http://www.vertadnet.com/display/www/delivery/ck.php?oaparams=2__bannerid=2797__zoneid=526__cb=ceb22a3118__oadest=http%3A%2F%2Fscripts.affiliatefuture.com%2FAFClick.asp%3FaffiliateID%3D208669%26merchantID%3D3320%26programmeID%3D8573%26mediaID%3D82847%26tracking%3D%26url%3D" target="_blank"></a><a href="http://2.bp.blogspot.com/_H2SGxn7sGYA/S3ughrDORgI/AAAAAAAAAYg/G6X4gOg2Xo8/s1600-h/quest47.blogspot.com+m777+project+(6).jpg"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 320px; FLOAT: right; HEIGHT: 203px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5439117475332376066" border="0" alt="" src="http://2.bp.blogspot.com/_H2SGxn7sGYA/S3ughrDORgI/AAAAAAAAAYg/G6X4gOg2Xo8/s320/quest47.blogspot.com+m777+project+(6).jpg" /></a><br />The first 18 systems were delivered to the US Army's 2nd Battalion, 11th Field Artillery in Hawaii in October 2006.<br /><br />The M777 will be the artillery system for the Stryker Brigade Combat Teams (SBCT). The systems fitted with the digital fire control system are designated M777A1, and those with the software update which allows the firing of the Excalibur projectile, M777A2. M777A2 received full material release in July 2007, clearing the upgrade for fielding. All M777A1 systems will be upgraded to the A2 standard.<br /></p><p>The M777 was deployed by the US Army and Marine Corps to Afghanistan in December 2007 and to Iraq in 2008.<br />The Excalibur projectile was first deployed in Afghanistan in March 2008.<br />By August 2008, over 400 systems had been delivered to the US Army and USMC.<br />In April 2008, BAE Systems received an order for an additional 87 M777 systems for the US Army and USMC. Deliveries are scheduled from 2010. In August 2008, a further 43 systems were ordered.<br /></p><p>In December 2005, the first four of six M777 systems were supplied by the USMC to the Canadian Army, under a foreign military sales (FMS) contract. The systems were deployed to Afghanistan in February 2006. A further six systems have been ordered and are in service. In June 2008, Canada requested a further 25 systems, a total of 37. <a href="http://2.bp.blogspot.com/_H2SGxn7sGYA/S3ughWejodI/AAAAAAAAAYY/iCU_fmvck-4/s1600-h/quest47.blogspot.com+m777+project+(5).jpg"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 334px; FLOAT: right; HEIGHT: 237px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5439117469809877458" border="0" alt="" src="http://2.bp.blogspot.com/_H2SGxn7sGYA/S3ughWejodI/AAAAAAAAAYY/iCU_fmvck-4/s320/quest47.blogspot.com+m777+project+(5).jpg" /></a></p><p><br />In July 2008, Australia requested the foreign military sale of 57 M77 howitzers.<br />BAE Systems has developed a mobile version, the M777 Portee, which is mounted on a purpose-built 8x6 Supacat vehicle. The vehicle was first shown at Eurosatory in June 2006.<br />"The construction of the M777 makes extensive use of titanium and titanium castings."<br />The M777 has been developed by BAE Systems Land Systems (RO Defence, formerly the Armaments Group of Vickers Shipbuilding and Engineering Ltd) at Barrow-in-Furness. United Defense LP of Pascagoula, Mississippi is responsible for final assembly, test and delivery of production systems for the US. </p><p><br />In July 2004, the M777 successfully completed a series of airlift tests with the US Marine Corps MV-22 Osprey tiltrotor aircraft. The M777 was carried as an external load for a distance of 69nm. </p><p><br />The M777 is normally operated by a crew of eight men but can be operated with a reduced detachment of five. </p><p><br /><span style="font-size:130%;"><strong>Design</strong> </span><br />The construction of the M777 makes extensive use of titanium and titanium castings, enabling a weight reduction of 3,175kg (7,000lb) compared to the M198 howitzer which it replaces in the US Army and USMC inventory. The titanium is supplied by RTI International metals of Niles, Ohio. </p><p><br /><span style="font-size:130%;"><strong>Armament</strong> </span><br />The M777 matches the firepower of current generation 155mm towed systems at less than half the weight. The Howitzer is equipped with a 39-calibre barrel. The muzzle velocity (at Charge 8 super) is 827m/s.<br />The maximum firing range is 24.7km with unassisted rounds and 30km with rocket-assisted rounds. The M777A2 will fire the Raytheon / Bofors XM982 Excalibur GPS / Inertial Navigation-guided extended-range 155mm projectiles using the Modular Artillery Charge Systems (MACS). Excalibur has a maximum range of 40km and accuracy of 10m.<br />First firing trials of the M777A1 with Excalibur took place in August 2003. First production rounds were delivered in September 2006. Excalibur successfully completed limited user test in March 2007. It was first fielded in Iraq in May 2007 and in Afghanistan in February 2008.<br />The M777 is able to deliver up to five rounds a minute under intense firing conditions and is able to provide a sustained rate of fire of two rounds a minute. </p><p><br /><strong><span style="font-size:130%;">Fire control</span></strong><br />The LRIP systems employ an optical sighting system for direct and indirect firing by day or night. Full production systems will be fitted with the General Dynamics Armament Systems Towed Artillery Digitisation (TAD) system. LRIP systems will be retrofitted with TAD.<a href="http://2.bp.blogspot.com/_H2SGxn7sGYA/S3ugY1wdMwI/AAAAAAAAAXw/kclU9luCcMU/s1600-h/quest47.blogspot.com+m777+project+(1).jpg"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 209px; FLOAT: right; HEIGHT: 320px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5439117323587629826" border="0" alt="" src="http://2.bp.blogspot.com/_H2SGxn7sGYA/S3ugY1wdMwI/AAAAAAAAAXw/kclU9luCcMU/s320/quest47.blogspot.com+m777+project+(1).jpg" /></a><br />"The M777 is able to deliver up to five rounds a minute."<br />The TAD digital fire control system provides onboard ballistic computation, navigation, pointing and self-location, providing greater accuracy and faster reaction times. The TAD system also includes a laser ignition system, electric drives for the howitzer's traverse and elevation and a powered projectile rammer. </p><p><br /><span style="font-size:130%;"><strong>Mobility</strong> </span><br />The M777 has a production weight of 3,745kg and can be transported by helicopter, transporter aircraft and ship. The howitzer can be towed by an air-braked 4x4 vehicle greater than 2.5t. </p><p><br />The hydrostrut suspension system is provided by Horstman Defence Systems of the UK. The maximum towed road speed is 88km per hour and the towed cross-country speed is 50km per hour. The load on the towing eye is rated at 60kg. The towing ground clearance is up to 660mm.</p><br /><p></p><br /><p></p><br /><p></p><br /><p>Sidharth K Menon</p>Sidharth K Menonhttp://www.blogger.com/profile/11412252277913740873noreply@blogger.comtag:blogger.com,1999:blog-7965927633581367449.post-41071378766605459092009-11-25T16:46:00.006+05:302009-11-26T12:11:09.271+05:30GLOBEMASTERS FOR INDIA<span style="color:#ff0000;"><strong><span style="font-size:180%;">C 17 Globemaster 3</span></strong><a href="http://4.bp.blogspot.com/_H2SGxn7sGYA/Sw0WSLpU2ZI/AAAAAAAAAWM/eB_6nh8kbgI/s1600/Usa_flag[1].gif"><strong><span style="font-size:180%;"><img id="BLOGGER_PHOTO_ID_5408003229161413010" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 132px; CURSOR: hand; HEIGHT: 74px" alt="" src="http://4.bp.blogspot.com/_H2SGxn7sGYA/Sw0WSLpU2ZI/AAAAAAAAAWM/eB_6nh8kbgI/s320/Usa_flag%5B1%5D.gif" border="0" /></span></strong></a><a href="http://4.bp.blogspot.com/_H2SGxn7sGYA/Sw0WRh8S_JI/AAAAAAAAAWE/4MoL3RJlcR4/s1600/indian_flag.jpg"><strong><span style="font-size:180%;"><img id="BLOGGER_PHOTO_ID_5408003217966693522" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 131px; CURSOR: hand; HEIGHT: 74px" alt="" src="http://4.bp.blogspot.com/_H2SGxn7sGYA/Sw0WRh8S_JI/AAAAAAAAAWE/4MoL3RJlcR4/s320/indian_flag.jpg" border="0" /></span></strong></a></span><br /><br />India wants to buy ten U.S. C-17 aircraft, to fill a need for strategic air transports. The main competition was the Russian Il-76, which mainly competed on price, at about $50 million each. The C-17, which costs at least three times as much, is also able to carry up to 86 tons. What the C-17 is best at is carrying about half that weight, half way around the world, non-stop. The C-17 is also easier to fly, and can also operate from short, primitive, air strips. <a href="http://2.bp.blogspot.com/_H2SGxn7sGYA/Sw0WSkcYfLI/AAAAAAAAAWU/km92poHFLQ4/s1600/fleet_C-17[1].jpg"><img id="BLOGGER_PHOTO_ID_5408003235818011826" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 225px; CURSOR: hand; HEIGHT: 171px" alt="" src="http://2.bp.blogspot.com/_H2SGxn7sGYA/Sw0WSkcYfLI/AAAAAAAAAWU/km92poHFLQ4/s320/fleet_C-17%5B1%5D.jpg" border="0" /></a><br /><br />The C-17 is also easier to maintain, and more reliable. But a fuel-efficient Il-76, that can be refueled in the air, has a price that's tough to beat. The latest version, the Il-76MF, has a payload of 60 tons, and a cargo compartment that is 50 percent larger than earlier models. With a full load, the aircraft can fly 4,200 kilometers. Carrying 20 tons, it can go 8,500 kilometers.<br /><br />The Indians have 41 Il-76s, and were apparently looking to step up. The C-17 has a good track record, several satisfied foreign customers, and is a follow on to the American contemporary of the Il-76, the C-141 (which is now retired.) The Indians are also getting tired of unreliable prices and maintenance policies typical of Russian equipment. As India buys more Western systems, they note that the total (lifecycle) cost of more expensive Western gear tends to be less, or nearly the same, as with comparable Russian models. Plus, the Western gear is more effective, which is very important for a weapons system.<br /><p><span style="font-size:130%;color:#666666;"><strong>Key Data</strong></span></p><strong><span style="font-size:130%;color:#666666;"></span></strong><p><br />Permanently Installed Sidewall Seating 54 seats, 27 each side, width 18in, spacing 24in c<a href="http://4.bp.blogspot.com/_H2SGxn7sGYA/Sw0Y0UT7hZI/AAAAAAAAAXc/pPWE0UIgrWE/s1600/c-17_globemaster-iii_1057251[1].jpg"><img id="BLOGGER_PHOTO_ID_5408006014626399634" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 208px; CURSOR: hand; HEIGHT: 157px" alt="" src="http://4.bp.blogspot.com/_H2SGxn7sGYA/Sw0Y0UT7hZI/AAAAAAAAAXc/pPWE0UIgrWE/s320/c-17_globemaster-iii_1057251%5B1%5D.jpg" border="0" /></a>entre to centre Centerline Seats, Stored On-Board 48 seats, eight sets of six back-to-back<br />Palletised, Ten-Passenger Pallets 80 seats on eight pallets, plus 54 passengers on sidewall seats Litter (Medical Stretchers) Stations On-Board.<br />Three stations, three litters (stretchers) each Litter Stations, Additional Kit<br />Nine additional stations Total Capability, Contingency<br />36 litters, 54 ambulatory </p><p>Flight Crew Two </p><p><a style="COLOR: black" href="http://www.airforce-technology.com/projects/c17/specs.html"><strong>Full specifications</strong></a></p><p><br />The Boeing C-17 Globemaster III military airlift aircraft is a high-wing, four-engine, T-tailed military transport vehicle capable of carrying payloads up to 169,000lb. It has an international range and the ability to land on small airfields. A fully integrated electronic cockpit and advanced cargo systems allow a crew of three; the pilot, co-pilot and loadmaster, to operate all systems on any type of mission.</p><p>Since it entered service in January 1995, 187 aircraft have been delivered to the US Air Force. In February 2009, a $2.95bn contract for the 15 additional C-17s will took the tally to 205 C-17s destined for the US Air Force by August 2010.<br /><a href="http://www.vertadnet.com/display/www/delivery/ck.php?n=ae8816b4&cb={random}" target="_blank"></a><br />The UK Royal Air Force has six C-17s, which have, between them, flown more than 22 million nautical miles (25 million miles or 41 million kilometres) in their eight years of operations.<br />"The Boeing C-17 Globemaster III military airlift aircraft is capable of carrying payloads up to 169,000lb."<a href="http://3.bp.blogspot.com/_H2SGxn7sGYA/Sw0YzQEyG-I/AAAAAAAAAXE/0sjF30dt3ZU/s1600/C17_DF-SD-06-03299[1].jpg"><img id="BLOGGER_PHOTO_ID_5408005996309257186" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 227px; CURSOR: hand; HEIGHT: 183px" alt="" src="http://3.bp.blogspot.com/_H2SGxn7sGYA/Sw0YzQEyG-I/AAAAAAAAAXE/0sjF30dt3ZU/s320/C17_DF-SD-06-03299%5B1%5D.jpg" border="0" /></a></p><p>In August 2006, a fifth aircraft (delivered in April 2008) was ordered and the purchase of the first four aircraft in 2008 was confirmed. In December 2007, the UK purchased a sixth aircraft, aircraft which was delivered in June 2008.</p><p>In March 2006, Australia selected the C-17, with a requirement for four aircraft. The first aircraft was delivered in December 2006, the second in May 2007, the third in February 2008 and the final aircraft in March 2008.</p><p>In July 2006, Canada announced the selection of the C-17 with a requirement for four aircraft. The contract was signed in February 2007. Deliveries began in August 2007 and concluded in April 2008.</p><p><br />In September 2006, Nato announced its intention to buy an initial three or four C-17 aircraft. In June 2007, an international consortium, consisting of fifteen Nato countries plus two partner countries (Finland and Sweden), agreed to set up the strategic airlift capability (SAC) which will be based at Papa Air Base in Hungary.</p><p>A new Nato Airlift Management Organisation (NAMO) will purchase, own, and manage the aircraft. A multinational military unit, the heavy airlift wing (HAW), will conduct airlift operations. In May 2008, SAC requested the foreign military sale of the first two C-17 aircraft. Deliveries are planned to begin in spring 2009 and all three aircraft are to be delivered by the end of 2009. The SAC1 C-17's first flight is scheduled in June 2009,<br />In March 2007, Boeing announced that C-17 production would conclude in 2009, when current orders have been fulfilled. However the purchase of 15 additional aircraft for the USAF was approved in 2008.<a href="http://2.bp.blogspot.com/_H2SGxn7sGYA/Sw0WTVRN3qI/AAAAAAAAAWk/QfGZeUpV-ag/s1600/c17_04[1].jpg"><img id="BLOGGER_PHOTO_ID_5408003248924516002" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 233px; CURSOR: hand; HEIGHT: 162px" alt="" src="http://2.bp.blogspot.com/_H2SGxn7sGYA/Sw0WTVRN3qI/AAAAAAAAAWk/QfGZeUpV-ag/s320/c17_04%5B1%5D.jpg" border="0" /></a></p><p>In July 2008, Qatar placed an order for two C-17, to be delivered from mid-2009. The United Arab Emirates announced on 24 February 2009 that it will acquire four C-17s. There are currently 198 C-17s in service.</p><p>Flight-testing of the C-17 using a blend of synthetic fuel and JP-8 began in October 2007, as part of a USAF process to develop more-efficient fuel for its fleet, with less reliance on imported petrol. Certification for the aircraft powered by synthetic fuel was completed in February 2008.<br />Boeing has 687 suppliers in 43 states. Current orders will carry C-17 production till January 2011. Then it would need the support of the air force for any initial fielding of the advanced C-17 that is planned for 2015.<a href="http://1.bp.blogspot.com/_H2SGxn7sGYA/Sw0WS7sSzOI/AAAAAAAAAWc/kOIjtYekoR4/s1600/c-17[1].jpg"><img id="BLOGGER_PHOTO_ID_5408003242058763490" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 224px; CURSOR: hand; HEIGHT: 141px" alt="" src="http://1.bp.blogspot.com/_H2SGxn7sGYA/Sw0WS7sSzOI/AAAAAAAAAWc/kOIjtYekoR4/s320/c-17%5B1%5D.jpg" border="0" /></a></p><p><span style="font-size:130%;color:#000000;">C-17 design</span></p><span style="font-size:130%;"></span><p><br />A propulsive lift system allows the C-17 to achieve safe landings on short runways. The C-17 is capable of landing a full payload in less than 3,000ft. The propulsive lift system uses engine exhaust to generate lift: the engine exhaust is directed onto large flaps, which extend into the exhaust stream, allowing the aircraft to fly a steep approach at a relatively low landing speed.<br />The aircraft is capable of turning in a small radius and can complete a 180° star turn in 80ft. The aircraft can also carry out routine backing. A fully loaded aircraft is capable of backing up a 2% gradient slope using the directed flow thrust reversers.</p><p><br /><strong>Cockpit</strong></p><p>The C-17 cockpit accommodates pilot, co-pilot and two observer positions. The digital avionics system has four Honeywell multi-function cathode-ray tube displays, two full-capability HUDs head-up displays) plus cargo systems.</p><p>The quadruple-redundant electronic flight control system also has a mechanically-actuated backup system.There are two Lockheed Martin central processing computers, one Hamilton Sundstrand data management computer and two Honeywell air data computers.<br />A program to upgrade the C-17A avionics includes new mission computers and displays, new software for the warning and caution system, being provided by Northrop Grumman Navigation Systems. The automatic flight control system will be upgraded with BAE Systems Controls CsLEOS real-time operating system and will be certified for GATM (global air traffic management) system requirements.</p><p><strong><span style="color:#000000;">Cargo systems</span></strong><a href="http://2.bp.blogspot.com/_H2SGxn7sGYA/Sw0Yz6afIQI/AAAAAAAAAXM/CsgcjjMJo6Q/s1600/C-17large[1].jpg"><strong><span style="color:#000000;"><img id="BLOGGER_PHOTO_ID_5408006007674577154" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 228px; CURSOR: hand; HEIGHT: 222px" alt="" src="http://2.bp.blogspot.com/_H2SGxn7sGYA/Sw0Yz6afIQI/AAAAAAAAAXM/CsgcjjMJo6Q/s320/C-17large%5B1%5D.jpg" border="0" /></span></strong></a></p><p>The design of the cargo compartment allows the C-17 to carry a wide range of vehicles, palleted cargo, paratroops, air-drop loads and aeromedical evacuees.The cargo compartment has a sufficiently large cross-section to transport large wheeled and tracked vehicles, tanks, helicopters (such as the AH-64 Apache), artillery, and weapons such as the Patriot missile system. Three Bradley armoured vehicles comprise one deployment load on the C-17. The US Army M1A1 main battle tank can be carried with other vehicles.</p><p><br />The maximum payload is 170,900lb (77,519kg) with 18 pallet positions, including four on the ramp. Airdrop capabilities include: single load of up to 60,000lb (27,216kg), sequential loads of up to 110,000lb (49,895kg), Container Delivery System (CDS) airdrop up to 40 containers, 2,350lb (1,066kg) each; up to 102 paratroops.</p><p>The aircraft is equipped for LAPES (low-altitude parachute extraction system) drops. For Medevac, the C-17 can transport up to 36 litter and 54 ambulatory patients and attendants. C-17s can take off from a 7,600ft airfield, fly 2,400nm and refuel while in flight. It can land in 3,500ft (1,064m) and 90ft-wide (27.4m) airstrip.</p><p><strong>Countermeasures</strong><a href="http://3.bp.blogspot.com/_H2SGxn7sGYA/Sw0Y0Jg7c9I/AAAAAAAAAXU/I_f_WtZQ9no/s1600/C-17_Globemaster_flare[1].jpg"><strong><img id="BLOGGER_PHOTO_ID_5408006011728131026" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 210px; CURSOR: hand; HEIGHT: 165px" alt="" src="http://3.bp.blogspot.com/_H2SGxn7sGYA/Sw0Y0Jg7c9I/AAAAAAAAAXU/I_f_WtZQ9no/s320/C-17_Globemaster_flare%5B1%5D.jpg" border="0" /></strong></a></p><p>The C-17 is equipped with BAE Systems Integrated Defense Solutions (formerly Tracor) AN/ALE-47 countermeasure flare dispensers and the ATK AN/AAR-47 missile warning system.<br />AN/AAR-47 has a suite of surface-mounted thermal sensors around the aircraft, which detect the thermal signature of the missile exhaust plume. Frequency selection and signal processing techniques are used to minimise the false alarm rate. The system provides a warning to the crew via the cockpit indicator unit of the presence and direction of the missile threat. A signal is automatically sent to the ALE-47 dispenser. </p><p>AN/ALE-47 is capable of carrying a mix of expendable countermeasures, including jammers. The system interfaces to the C-17 aircraft's sensors. The aircrew can select the mode of operation of the dispenser for fully automatic, semi-automatic or manual operation.<br />The cockpit control unit can be used to input mission data, together with the numbers and types of expendable countermeasures systems loaded into the ALE-47. The cockpit controller updates and displays the status of the dispenser and the numbers and types of countermeasures remaining.</p><p>The ALE-47 is capable of dispensing the new-generation active expendable decoys, POET and GEN-X, in addition to the conventional chaff and flare decoys that are compatible with the previous-generation ALE-40 and ALE-39 dispensers."The C-17 has an international range and the ability to land on small airfields."56 USAF C-17 aircraft are being equipped with the Northrop Grumman large aircraft infrared countermeasures (LAIRCM) system.LAIRCM is based on the AN/AAQ-24(V) NEMESIS. It entered low-rate initial production in August 2002 and completed initial operational test and evaluation in July 2004. 25 upgraded aircraft have been delivered. The system is scheduled to enter service in 2007. The four aircraft leased by the UK RAF are fitted with LAIRCM. </p><p><strong>Turbofan engines</strong></p><p>The four Pratt & Whitney PW2040 (military designation-F117-PW-100) turbofan engines with 40,440lb thrust each are integrated in the wings. Engine thrust reversers, which are operable in flight, and speedbrakes enable the aircraft to carry out rapid deceleration and descent manoeuvres.The cruise speed is between Mach 0.74 and 0.77. The range without in-flight refuelling, and with a payload of 160,000lb, is 2,400nm. Aerial refuelling provides an intercontinental non-stop range.</p><p></p><p align="left"> </p><p align="left"> </p><p align="left"> </p><p align="left">Sidharth K Menon.[Defence and Intelligence Analyst]<br /><br /></p>Sidharth K Menonhttp://www.blogger.com/profile/11412252277913740873noreply@blogger.comtag:blogger.com,1999:blog-7965927633581367449.post-60231261985783556332009-11-17T17:26:00.013+05:302009-11-24T13:07:16.700+05:30SPYDER FOR INDIA [SAM]<a href="http://theasiandefence.blogspot.com/2009/08/indian-army-chooses-spyder-surface-to.html"><span style="font-size:130%;color:#ff0000;"><strong>Indian Army chooses Spyder surface-to-air missile system</strong></span></a><strong><span style="font-size:130%;"> <a href="http://3.bp.blogspot.com/_H2SGxn7sGYA/SwN7ktE_4RI/AAAAAAAAAV8/h7F1oxTFNyA/s1600/untitled.bmp"><img id="BLOGGER_PHOTO_ID_5405299848280793362" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 119px; CURSOR: hand; HEIGHT: 76px" alt="" src="http://3.bp.blogspot.com/_H2SGxn7sGYA/SwN7ktE_4RI/AAAAAAAAAV8/h7F1oxTFNyA/s320/untitled.bmp" border="0" /></a><a href="http://3.bp.blogspot.com/_H2SGxn7sGYA/SwN7ka3QuTI/AAAAAAAAAV0/vUSAAbs_Xxo/s1600/indian_flag.jpg"><img id="BLOGGER_PHOTO_ID_5405299843391338802" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 120px; CURSOR: hand; HEIGHT: 76px" alt="" src="http://3.bp.blogspot.com/_H2SGxn7sGYA/SwN7ka3QuTI/AAAAAAAAAV0/vUSAAbs_Xxo/s320/indian_flag.jpg" border="0" /></a><br /></span></strong><a href="http://1.bp.blogspot.com/_htvjsmtPrmc/Soux0qi9o9I/AAAAAAAACck/yx80U-oDrh8/s1600-h/LAND_SAM_SPYDER_MR-SR_CONOPS_Comparison_lg.jpg"></a><br />Armys long-pending case <a href="http://4.bp.blogspot.com/_H2SGxn7sGYA/SwKRFWT2HuI/AAAAAAAAAVM/QGGcV5Urx-Y/s1600/LAND_SAM_SPYDER_MR-SR_CONOPS_Comparison_lg.jpg"><img id="BLOGGER_PHOTO_ID_5405042023872208610" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 246px; CURSOR: hand; HEIGHT: 320px" alt="" src="http://4.bp.blogspot.com/_H2SGxn7sGYA/SwKRFWT2HuI/AAAAAAAAAVM/QGGcV5Urx-Y/s320/LAND_SAM_SPYDER_MR-SR_CONOPS_Comparison_lg.jpg" border="0" /></a>for new air defence weapons to protect its tanks and troops as well as vital areas and installations from aerial threats has finally got a boost, with the the defence ministry giving the green signal for the various projects.With the indigenous Akash and Trishul air defence projects not meeting its user-requirements, the Army for instance is now on course to procure three regiments of quick-reaction surface-to-air missile (QR-SAM) systems from Israel for around Rs 4,000 crore.<br /><br />The Defence Acquisitions Council, chaired by defence minister A K Antony, discussed the entire matter on Monday. Though there was no official word, sources said the Israeli SpyDer QR-SAM systems had been selected for the project. IAF, incidentally, is already well on its way to induct 18 SpyDer systems, at a cost over Rs 1,800 crore, to plug gaps in its own air defence capabilities.The projects were in a limbo for quite some time now, with one of the main reasons being the naming of Israeli Aerospace Industries (IAI) and Rafael in the Rs 1,160-crore Barak-I deal kickbacks case by the CBI.The government, however, was reluctant to blacklist these Israeli armament firms because it held that it would prove counter-productive since there were several crucial defence projects underway with them. <a href="http://3.bp.blogspot.com/_H2SGxn7sGYA/SwKRGV3RBgI/AAAAAAAAAVs/g01taQqn0dI/s1600/spyder__3.jpg"><img id="BLOGGER_PHOTO_ID_5405042040932206082" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 73px; CURSOR: hand; HEIGHT: 176px" alt="" src="http://3.bp.blogspot.com/_H2SGxn7sGYA/SwKRGV3RBgI/AAAAAAAAAVs/g01taQqn0dI/s320/spyder__3.jpg" border="0" /></a><br /><br />India has signed a contract with Rafael, Israel for the supply of the SPYDER MR. Under this agreement Rafael would supply of 18 SPYDER systems to Indian airforce, with deliveries running through early 2011 to August 2012. SPYDER is a low-level, quick-reaction, surface-to-air missile (LLQRM) system capable of engaging aircraft, helicopters, unmanned air vehicles, drones and precision-guided munitions. The system provides air defence for fixed assets and for point and area defence for mobile forces in combat areas.<br /><br />The SPYDER-MR system has 360° engagement capability and the missiles can be launched from the full-readiness state in less than five seconds post target confirmation and within 2 seconds of the target being declared hostile by the system. . LLQRM will be used as part of the india's attempt to upgrade its outdated anti-aircraft and missile defences, which still rely on antiquated Soviet era OSA-AKM [SA-8 Gecko] and ZRK-BD Strela-10M [SA-13 Gopher] SAM systems.The SPYDER-MR system is a Medium Range Air Defense Missile System (MRADMS) designed to engage and destroy a wide spectrum of threats, such as attack aircraft bombers, curise missiles, UAVs, UCAVs and stand-off weapons.The SPYDER-MR Air Defense System (ADS) ensures protection of high value assets as well as maneuvering combat forces. The system is an all-weather, network-centric, self-propelled, multi-launch, quick-reaction ADS.<br /><br />SPYDER-MR ADS incorporates RAFAEL's most advanced missiles – the Derby, an active radar Beyond Visual Range (BVR) missile and the Python 5, a sophisticated dual band Imaging Infra Red (IIR) missile. Both missiles are equipped with a booster. Engages and destroys a wide spectrum of hostile targets<br /><br /><strong><span style="color:#cccccc;">The Fatures include</span></strong><br /><br />Maximum intercept range is over 35 km and an altitude of 16 km<br />Protects a large area<br />Quick response and High lethality<br />Flexible deployment and operation<br />Survivability, High reliability and Mobility<br />Simple and continuous operation<br />Interoperability with SPYDER-SR or other ADS<br /><br /><a href="http://3.bp.blogspot.com/_H2SGxn7sGYA/SwKRF8z_C-I/AAAAAAAAAVc/DhvN1EYffHw/s1600/a3.jpg"></a>.<a href="http://3.bp.blogspot.com/_H2SGxn7sGYA/SwKRF8z_C-I/AAAAAAAAAVc/DhvN1EYffHw/s1600/a3.jpg"><img id="BLOGGER_PHOTO_ID_5405042034207558626" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 162px; CURSOR: hand; HEIGHT: 186px" alt="" src="http://3.bp.blogspot.com/_H2SGxn7sGYA/SwKRF8z_C-I/AAAAAAAAAVc/DhvN1EYffHw/s320/a3.jpg" border="0" /></a><a href="http://4.bp.blogspot.com/_H2SGxn7sGYA/SwKRFgwVMPI/AAAAAAAAAVU/N66D_dPjJvE/s1600/a.jpg"><img id="BLOGGER_PHOTO_ID_5405042026676039922" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 179px; CURSOR: hand; HEIGHT: 183px" alt="" src="http://4.bp.blogspot.com/_H2SGxn7sGYA/SwKRFgwVMPI/AAAAAAAAAVU/N66D_dPjJvE/s320/a.jpg" border="0" /></a><a href="http://4.bp.blogspot.com/_H2SGxn7sGYA/SwKRGO9HxUI/AAAAAAAAAVk/DIgrN06QTHg/s1600/a333.jpg"><img id="BLOGGER_PHOTO_ID_5405042039077717314" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 147px; CURSOR: hand; HEIGHT: 239px" alt="" src="http://4.bp.blogspot.com/_H2SGxn7sGYA/SwKRGO9HxUI/AAAAAAAAAVk/DIgrN06QTHg/s320/a333.jpg" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Sidharth K Menon<br />[Defence and Intelligence Analyst]Sidharth K Menonhttp://www.blogger.com/profile/11412252277913740873noreply@blogger.comtag:blogger.com,1999:blog-7965927633581367449.post-34486838235017343382009-11-07T10:51:00.008+05:302011-06-06T17:45:07.565+05:30Fennic.. The Winner?? Here we go again for another tender.<span style="color: red; font-size: 180%;">Indias 197 Helicopters for Army Aviation Corps and Indian Air Force.</span> <a href="http://4.bp.blogspot.com/_H2SGxn7sGYA/SvUGiucOmSI/AAAAAAAAAUc/Hm0TQ5KXylM/s1600-h/indian_flag.jpg"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5401230521752525090" src="http://4.bp.blogspot.com/_H2SGxn7sGYA/SvUGiucOmSI/AAAAAAAAAUc/Hm0TQ5KXylM/s320/indian_flag.jpg" style="float: right; height: 78px; margin: 0px 0px 10px 10px; width: 140px;" /></a> <br />
<div><div><div><div></div><div></div><div>India will soon sign a deal with Europe's aerospace and defence major EADS for purchase of 197 'Fennec' helicopters for use of Army, particularly in high altitude regions like Siachen. </div><div><br />
An agreement for supply of the AS 550 Fennec helicopters for Indian Navy may follow as the latter has expressed interest in acquiring these, officials of the company said here. </div><div><br />
"We are in final phase of having a deal to supply 197 (Fennec) light helicopters for the Indian Army. The contract is expected to be signed by the end of the year," EADS Senior Vice President for South Asia, Allain Letanoux, told a group of Indian journalists here. The deal will involve <a href="http://4.bp.blogspot.com/_H2SGxn7sGYA/SvUGjcvjzlI/AAAAAAAAAUs/J6rB2D7ZXOE/s1600-h/Fennec_01.jpg"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5401230534181637714" src="http://4.bp.blogspot.com/_H2SGxn7sGYA/SvUGjcvjzlI/AAAAAAAAAUs/J6rB2D7ZXOE/s320/Fennec_01.jpg" style="float: right; height: 320px; margin: 0px 0px 10px 10px; width: 214px;" /></a>transfer of technology, he said.<br />
Though Letanoux did not specify the monetary volume of the contract, the deal is believed to be worth 600 million dollars. </div><div><br />
Under the understanding between the two sides, 67 helicopters manufactured in France will be purchased outright while the rest will be built jointly with the Hindustan Aeronautics Limited (HAL).<br />
The Fennec helicopter holds a record in flying in mountainous regions and was the only of its kind to successfully land on top of Mount Everest recently, EADS officials say. </div><div></div><div><br />
</div><div><span style="color: #cccccc; font-size: 180%;">AS 550 Fennec - Single-Engined Light Military Helicopter</span><br />
<br />
</div><div><span style="color: #999999;">Key Data</span></div><div><br />
Crew - 1 pilot<br />
Passenger Capacity - 5 equipped troops<br />
Rotor Diameter- -10.69m<br />
Tail Rotor Diameter - 1.86m<br />
Overall Length With Rotors Turning 12.94m <br />
Fuselage Length - 12.94m<br />
Width With Blades Folded - 2.53m</div><div><br />
<a href="http://www.army-technology.com/projects/as550_fennec/specs.html" style="color: black;">Full specifications</a></div><div><br />
The Eurocopter AS 550 Fennec single-engine helicopter is operational with the Singapore armed forces, the <a href="http://1.bp.blogspot.com/_H2SGxn7sGYA/SvUGj--aWII/AAAAAAAAAU8/AbyOcN7_LEE/s1600-h/Fennic.gif"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5401230543370737794" src="http://1.bp.blogspot.com/_H2SGxn7sGYA/SvUGj--aWII/AAAAAAAAAU8/AbyOcN7_LEE/s320/Fennic.gif" style="float: right; height: 174px; margin: 0px 0px 10px 10px; width: 320px;" /></a>Royal Australian Army, the Brazilian Army and Air Force, the Danish Army, the French Army and the United Arab Emirates Army.</div><div><br />
The Fennec belongs to the Ecureuil / Fennec family of helicopters which includes: the single-engine military AS 550 Fennec and civil AS 350 Ecureuil; twin-engine naval AS 555 Fennec and civil AS 355 Ecureuil; and the civil EC 130 single-engine helicopter. Over 3,150 helicopters of the family have been ordered, of which 2,500 have been delivered and are operational in over 70 countries.<br />
<br />
The army of Pakistan has ordered a number of AS 550 helicopters, to be delivered from the end of 2008.<br />
The AS550 Fennec can be fitted for anti-tank, air-to-air combat, ground support and training missions and it is also used in the utility transportation role. The combat version is called the AS 550C3.</div><div><br />
The helicopters are in production at Eurocopter's engineering and production facilities at Marignane in France, and they are also built under licensed production agreements in Brazil and in China.<br />
The maximum speed is 287km/h and the service ceiling is 5,280m. With maximum fuel the helicopter achieves a range of 666km. A proposed order of 197 Fennec helicopters by India was cancelled in December 2007.</div><div><span style="color: #999999;"></span></div><div><span style="color: #999999;">AS 550 Fennec design<a href="http://1.bp.blogspot.com/_H2SGxn7sGYA/SvUGixV-EUI/AAAAAAAAAUk/PuTtxepA8u0/s1600-h/Fennec3H131COAN.jpg"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5401230522531582274" src="http://1.bp.blogspot.com/_H2SGxn7sGYA/SvUGixV-EUI/AAAAAAAAAUk/PuTtxepA8u0/s320/Fennec3H131COAN.jpg" style="float: right; height: 240px; margin: 0px 0px 10px 10px; width: 320px;" /></a></span></div><div><br />
The AS 550 is of light construction based on a reinforced high-strength glass fibre and aramid airframe. The Starflex main rotor head and blades are also of composite materials for added strength and weight reduction. The engine cowlings are armoured for protection.</div><div><br />
The helicopter is fitted with armoured seats and can carry the pilot and up to five troops. The cabin can also be configured for medical evacuation with capacity for one stretcher patient and two doctors. For cargo carrying, the cabin can take a 3m³ load.</div><div>The combat version of theAS 550 Fennec is called the AS 550C3. The military AS 550 is fitted with sliding doors on each side rather than the hinged door fitted on the civil AS 350 variant. The 1m³ baggage compartment is installed behind the main cabin and is accessed via a door on the starboard side.<br />
A cargo sling, rated at 1,160kg, and a 204kg hoist can be used.</div><div></div><div><span style="color: #999999;">AS 550 cockpit systems</span> </div><div><br />
The cockpit is equipped with single controls and is night-vision compatible. The navigation suite includes a global positioning system, a VHF Omnidirectional Radio Ranger and Instrument Landing System (VOR/ILS), an automatic direction finder, distance measuring equipment and a marker beacon transponder. The secure communications systems are fitted according to the customer country's specification. The pilot has a vehicle and engine multifunction display which allows shows the main vehicle and engine parameters on a dual LCD screen.<a href="http://3.bp.blogspot.com/_H2SGxn7sGYA/SvUGjhWpO-I/AAAAAAAAAU0/6n7aGhzEmlo/s1600-h/Fennec_7stor.jpg"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5401230535419313122" src="http://3.bp.blogspot.com/_H2SGxn7sGYA/SvUGjhWpO-I/AAAAAAAAAU0/6n7aGhzEmlo/s320/Fennec_7stor.jpg" style="float: right; height: 206px; margin: 0px 0px 10px 10px; width: 320px;" /></a></div><div><br />
<span style="color: #999999;">Fennec weapons systems</span></div><div><br />
The helicopter is fitted with a wide range of weapon systems to suit the operational requirements of the country's forces. Weapon fits include anti-tank missiles, rockets or guns. The Danish Army AS 550C2 helicopters are armed with the Systems & Electronics (formerly ESCO) HeliTOW sighting system and TOW anti-tank missiles. The HeliTOW sight is roof-mounted and contains direct view optics, day and/or night sight and laser rangefinder.</div><div><br />
The AS 550 can be fitted with two Forges de Zeebrugge rocket launchers which carry seven 2.75in rockets each, or two Thales Brandt 68mm launchers with 12 rockets each. The helicopter has been fitted with the Giat 20mm gun type M621, and the FN Hershal twin 7.62mm and 12.7mm machine gun pod. </div><div><br />
The surveillance and observation systems include a forward-looking infrared, optical cameras and Spectrolab SX 16 searchlights. Thales Detexis EWR-99 radar warning receiver and Alkan ELIPS countermeasures dispenser can be fitted.</div><div><br />
<span style="color: #999999;">Engines</span></div><div><span style="color: #999999;"></span><br />
The single Turbomeca Arril 2B engine provides 632kW take-off power. The engine is fitted with Full Authority Digital Engine Control (FADEC). The main gearbox has a 45-minute dry run capability.<br />
The self-sealing plastic fuel tank has a capacity of 540l. An auxiliary fuel tank can be installed in the cabin to provide an additional 475l of fuel for extended-range operations. Landing gear. The helicopter has steel tube skid-type landing gear. Emergency flotation gear is fitted for operation over water.</div></div><div></div><div></div><div>Sidharth K Menon</div><div>Defence and Intelligence Analyst.</div><div></div></div></div>Sidharth K Menonhttp://www.blogger.com/profile/11412252277913740873noreply@blogger.comtag:blogger.com,1999:blog-7965927633581367449.post-61702988049816814022009-11-02T14:40:00.008+05:302009-11-02T17:19:03.939+05:30Indo Israeli Relations<span style="font-size:180%;color:#ff0000;">RAW and Mossad</span><a href="http://4.bp.blogspot.com/_H2SGxn7sGYA/Su6jpetajVI/AAAAAAAAATk/ypzfvXF5Bbc/s1600-h/Israel-Flag.png"><span style="font-size:180%;color:#ff0000;"><img id="BLOGGER_PHOTO_ID_5399432936277314898" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 150px; CURSOR: hand; HEIGHT: 84px" alt="" src="http://4.bp.blogspot.com/_H2SGxn7sGYA/Su6jpetajVI/AAAAAAAAATk/ypzfvXF5Bbc/s320/Israel-Flag.png" border="0" /></span></a><a href="http://3.bp.blogspot.com/_H2SGxn7sGYA/Su6jphbEFYI/AAAAAAAAATs/2jC5w5xZ3kM/s1600-h/indian_flag.jpg"><span style="font-size:180%;color:#ff0000;"><img id="BLOGGER_PHOTO_ID_5399432937005651330" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 158px; CURSOR: hand; HEIGHT: 85px" alt="" src="http://3.bp.blogspot.com/_H2SGxn7sGYA/Su6jphbEFYI/AAAAAAAAATs/2jC5w5xZ3kM/s320/indian_flag.jpg" border="0" /></span></a><br /><br /><br />Thirty-five years ago, in September 1968, when the Research and Analysis Wing was founded with Rameshwar Nath Kao at its helm, then prime minister Indira Gandhi asked him to cultivate Israel's Mossad. She believed relations between the two intelligence agencies was necessary to monitor developments that could threaten India and Israel. <a href="http://2.bp.blogspot.com/_H2SGxn7sGYA/Su6ljBCR9zI/AAAAAAAAAT8/N7buoPaxXfY/s1600-h/22_rameshwar840-to.jpg"><img id="BLOGGER_PHOTO_ID_5399435024255809330" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 320px; CURSOR: hand; HEIGHT: 249px" alt="" src="http://2.bp.blogspot.com/_H2SGxn7sGYA/Su6ljBCR9zI/AAAAAAAAAT8/N7buoPaxXfY/s320/22_rameshwar840-to.jpg" border="0" /></a><br /><br />The efficient spymaster he was, Kao established a clandestine relationship with Mossad. In the 1950s, New Delhi had permitted Tel Aviv to establish a consulate in Mumbai . But full-fledged diplomatic relations with Israel were discouraged because India supported the Palestinian cause; having an Israeli embassy in New Delhi, various governments believed, would rupture its relations with the Arab world.<br /><br />This was where the RAW-Mossad liaison came in. Among the threats the two external intelligence agencies identified were the military relationship between Pakistan and China and North Korea, especially after then Pakistan foreign minister Zulfiqar Ali Bhutto visited Pyongyang in 1971 to establish a military relationship with North Korea.<br /><br />Again, Israel was worried by reports that Pakistani army officers were training Libyans and Iranians to handle Chinese and North Korean military equipment.<br /><br />RAW-Mossad relations were a secret till Morarji Desai became prime minister in 1977. RAW officials had alerted him about the Zia-ul Haq regime's plans to acquire nuclear capability. While French assistance to Pakistan for a plutonium reprocessing plant was well known, the uranium enrichment plant at Kahuta was a secret. After the French stopped helping Islamabad under pressure from the Carter administration, Pakistan was determined to keep the Kahuta plant a secret. Islamabad did not want Washington to prevent its commissioning. <a href="http://1.bp.blogspot.com/_H2SGxn7sGYA/Su6jp-t1Y_I/AAAAAAAAAT0/z_e7O-Y-DPo/s1600-h/a978_kahuta_research_labs_2050081722-20148.jpg"><img id="BLOGGER_PHOTO_ID_5399432944869008370" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 155px; CURSOR: hand; HEIGHT: 142px" alt="" src="http://1.bp.blogspot.com/_H2SGxn7sGYA/Su6jp-t1Y_I/AAAAAAAAAT0/z_e7O-Y-DPo/s320/a978_kahuta_research_labs_2050081722-20148.jpg" border="0" /></a><br /><br />RAW agents were shocked when Desai called Zia and told the Pakistani military dictator: 'General, I know what you are up to in Kahuta. RAW has got me all the details.' The prime minister's indiscretion threatened to expose RAW sources.<br />The unfortunate revelation came about the same time that General Moshe Dayan, hero of the 1967 Arab-Israeli war, was secretly visiting Kathmandu for a meeting with Indian representatives. Islamabad believed Dayan's visit was connected with a joint operation by Indian and Israeli intelligence agencies to end Pakistan's nuclear programme.<br /><br />Apprehensive about an Indo-Israeli air strike on Kahuta, surface-to-air missiles were mounted around the uranium enrichment plant. These fears grew after the Israeli bombardment of Iraq's Osirak nuclear reactor in 1981. <a href="http://1.bp.blogspot.com/_H2SGxn7sGYA/Su6jpL7I-VI/AAAAAAAAATc/t4YRhe-OOMs/s1600-h/israeli_army_idf_chief_staff_moshe_dayan_1953.jpg"><img id="BLOGGER_PHOTO_ID_5399432931234609490" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 149px; CURSOR: hand; HEIGHT: 223px" alt="" src="http://1.bp.blogspot.com/_H2SGxn7sGYA/Su6jpL7I-VI/AAAAAAAAATc/t4YRhe-OOMs/s320/israeli_army_idf_chief_staff_moshe_dayan_1953.jpg" border="0" /></a><br /><br />Zia decided Islamabad needed to reassure Israel that it had nothing to fear from Pakistan's nuclear plans. Intermediaries -- Americans close to Israel -- established the initial contacts between Islamabad and Tel Aviv. Israel was confidant the US would not allow Pakistan's nuclear capability to threaten Israel. That is why Israeli experts do not mention the threat from Pakistan when they refer to the need for pre-emptive strikes against Iraq, Iran and Libya's nuclear schemes.<br /><br />By the early 1980s, the US had discovered Pakistan's Kahuta project. By then northwest Pakistan was the staging ground for mujahideen attacks against Soviet troops in Afghanistan and Zia no longer feared US objections to his nuclear agenda. But Pakistani concerns over Israel persisted, hence Zia decided to establish a clandestine relationship between Inter-Services Intelligence and Mossad via officers of the two services posted at their embassies in Washington, DC.<br /><br />The ISI knew Mossad would be interested in information about the Libyan, Syrian, Jordanian and Saudi Arabian military. Pakistani army officers were often posted on deputation in the Arab world -- in these very countries -- and had access to valuable information, which the ISI offered Mossad.<br /><br />When young Israeli tourists began visiting the Kashmir valley in the early nineties Pakistan suspected they were Israeli army officers in disguise to help Indian security forces with counter-terrorism operations. The ISI propaganda inspired a series of terrorist attacks on the unsuspecting Israeli tourists. One was slain, another kidnapped. <a href="http://2.bp.blogspot.com/_H2SGxn7sGYA/Su6jpIK5VMI/AAAAAAAAATU/AgXEF8cR4cY/s1600-h/1977_Zia_ul-Haq.jpg"><img id="BLOGGER_PHOTO_ID_5399432930226951362" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 175px; CURSOR: hand; HEIGHT: 223px" alt="" src="http://2.bp.blogspot.com/_H2SGxn7sGYA/Su6jpIK5VMI/AAAAAAAAATU/AgXEF8cR4cY/s320/1977_Zia_ul-Haq.jpg" border="0" /></a><br /><br />The Kashmiri Muslim Diaspora in the US feared the attacks would alienate the influential Jewish community who, they felt, could lobby the US government and turn it against Kashmiri organisations clamouring for independence. Soon after, presumably caving into pressure, the terrorists released the kidnapped Israeli. During negotiations for his release, Israeli government officials, including senior intelligence operatives, arrived in Delhi.<br /><br />The ensuing interaction with Indian officials led to India establishing embassy-level relations with Israel in 1992. The decision was taken by a Congress prime minister -- P V Narasimha Rao -- whose government also began pressing the American Jewish lobby for support in getting the US to declare Pakistan a sponsor of terrorism. The lobbying bore some results.<br /><br />The US State Department put Pakistan on a 'watch-list' for six months in 1993. The Clinton administration 'persuaded' then Pakistan prime minister Nawaz Sharif to dismiss Lieutenant General Javed Nasir, then director general of the ISI. The Americans were livid that the ISI refused to play ball with the CIA who wanted to buy unused Stinger missiles from the Afghan mujahideen, then in power in Kabul.<br />After she returned to power towards the end of 1993, Benazir Bhutto intensified the ISI's liaison with Mossad. She too began to cultivate the American Jewish lobby. Benazir is said to have a secret meeting in New York with a senior Israeli emissary, who flew to the US during her visit to Washington, DC in 1995 for talks with Clinton.<br /><br />From his days as Bhutto's , Pervez Musharraf has been a keen advocate of Pakistan establishing diplomatic relations with the state of Israel. The new defence relationship between India and Israel -- where the Jewish State has become the second-biggest seller of weapons to India, after Russia -- bother Musharraf no end. Like another military dictator before him, the Pakistan president is also wary that the fear of terrorists gaining control over Islamabad's nuclear arsenal could lead to an Israel-led pre-emptive strike against his country.<br />Musharraf is the first Pakistani leader to speak publicly about diplomatic relations with Israel. His pragmatic corps commanders share his view that India's defence relationship with Israel need to be countered and are unlikely to oppose such a move. But the generals are wary of the backlash from the streets. Recognising Israel and establishing an Israeli embassy in Islamabad would be unacceptable to the increasingly powerful mullahs who see the United States, Israel and India as enemies of Pakistan and Islam.<br /><br /><br /><br />Sidharth K Menon<br />Defence and Intelligence Analyst.Sidharth K Menonhttp://www.blogger.com/profile/11412252277913740873noreply@blogger.comtag:blogger.com,1999:blog-7965927633581367449.post-87557558529130476322009-10-31T15:39:00.007+05:302009-10-31T16:06:30.221+05:30Comparison of Asian Powers<strong><span style="font-size:180%;color:#ff0000;">China, India and Pakistan. Nuclear Asians.<a href="http://3.bp.blogspot.com/_H2SGxn7sGYA/SuwO0cO7xhI/AAAAAAAAAS8/CSPRKhh6Vqw/s1600-h/PakistanFlag.gif"><img id="BLOGGER_PHOTO_ID_5398706347405198866" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 148px; CURSOR: hand; HEIGHT: 103px" alt="" src="http://3.bp.blogspot.com/_H2SGxn7sGYA/SuwO0cO7xhI/AAAAAAAAAS8/CSPRKhh6Vqw/s320/PakistanFlag.gif" border="0" /></a><a href="http://4.bp.blogspot.com/_H2SGxn7sGYA/SuwO0qo75lI/AAAAAAAAATE/kmKvlJ_Q1LY/s1600-h/chinese%20flag%203.gif"><img id="BLOGGER_PHOTO_ID_5398706351272355410" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 154px; CURSOR: hand; HEIGHT: 103px" alt="" src="http://4.bp.blogspot.com/_H2SGxn7sGYA/SuwO0qo75lI/AAAAAAAAATE/kmKvlJ_Q1LY/s320/chinese%2520flag%25203.gif" border="0" /></a><a href="http://4.bp.blogspot.com/_H2SGxn7sGYA/SuwO0MVlMHI/AAAAAAAAAS0/13Vkk-_mwMw/s1600-h/indian_flag.jpg"><img id="BLOGGER_PHOTO_ID_5398706343138111602" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 153px; CURSOR: hand; HEIGHT: 103px" alt="" src="http://4.bp.blogspot.com/_H2SGxn7sGYA/SuwO0MVlMHI/AAAAAAAAAS0/13Vkk-_mwMw/s320/indian_flag.jpg" border="0" /></a></span></strong><br /><br /><br />Currently, there is an increased frenzy about China’s incursions, referred to by some of the seasoned analysts as “war hysteria”. China, from 1962, never deviated from its path of an aggressive posture. While India is being blamed for its 1962 syndrome, China is equally guilty of freezing its 1962 mindset on India.<br />But India is itself to blame for the present situation.. While China, slowly and steadily was on the military build-up, Indian leadership has continuously followed an ostrich like approach towards the implications. It pains to accept the China’s description of India as a ‘paper tiger’. By this, I don’t refer to the capability of our armed forces but to the timidity of our Indian leadership. Many articles, have already been written on the timidity of Indian leadership and the ineptitude towards strategic and military doctrines. Hence, this article mainly tries to draw a comparison of the nuclear forces by these countries to assess where India stands, at present.<br /><br /><strong><span style="font-size:130%;">Nuclear Forces by 2006-2007</span></strong><br /><br />The data for the countries were not available at the same timeline hence, the closest available data were used. According to the Nuclear Notebook published in the Bulletin of Atomic Scientists, China’s nuclear arsenal comprised of around 130 nuclear warheads deployed in missiles and aircraft and 70 more is predicted to be in storage. According to the report around 80 warheads are deployed in the ballistic missiles of DF-3, DF-4, DF-5 and DF-21. China is retiring some of its liquid fueled DF-3 missiles with a range of about 3100Km but has slowed down the retirement of the missiles, apparently, due to delay in the deployment of modified DF-21 and DF-21A missiles with a range of around 2100Km.<br /><br />China has deployed around 22 two-stage DF-4 missiles with a range over 5500Km, the targets for some of these missiles is expected to be in Russia, India and Guam. While the number of Chinese ICBM, DF-5, is unclear Chinese military power 2005 claims to have deployed 20 of them in 20 launchers. These missiles are capable of targeting the entire continental US. China, undergoing military modernization, for quite sometime is also developing a new 3-stage, solid-fueled, mobile ICBM, DF-31 with a range of about 7200-8000Km and a circular error probable of 300 to 600 meters. The targets for these missiles are expected to be in India and Russia from the range of the missiles. Another version of DF-31, DF-31A, is expected to have range of about 12000Km. Reportedly, China have had the capability for Multiple Reentry Vehicles and Multiple Independently Targetable Reentry vehicles. China is also developing new nuclear powered submarine capable of carrying 16 modified versions of DF-31 missiles which is expected to be deployed in 2008-2010 or later. China also has a stock of nuclear payload to be delivered through aircraft, whose combat radius is around 3100 Km.<br /><br />In 2007, Pakistan was credited with a nuclear arsenal of 60 and it is busy in increasing its capability rapidly. From 2005-2007, Pakistan has deployed two nuclear capable missiles and developments are underway for the third. According to the reports, Pakistan, which declared a moratorium in 1991 on the production of highly enriched uranium (HEU) soon resumed its production of the weapon grade uranium and has setup a 40-50MW heavy water Khushab plutonium production reactor completed in 1998 and work were under way for the second reactor which will double its production capability. In this venture Pakistan is being helped totally by china. No one appears to blame China which is the root cause of proliferation by Pakistan.<br />Pakistani nuclear devises are expected to have a yield in between 5 – 10 kilotons. Pakistan was developing a nuclear capable cruise missile with a range of around 500 Km.<br /><br />By 2007, India has produced enough plutonium for around 100 payloads but is estimated to possess only 50-60 warheads by the time. According to the report, India’s nuclear deterrent is predominantly aircraft-based. While, after the repeated announcements of Indian officials, US Air force in 2006 reported that India has not deployed Agni I and Agni II. While Agni III, Dhanush and Sagarika are underdevelopment, a cloud of uncertainty surrounds the Indian missile based nuclear deterrent capability. While technical capability exists in India for developing and deploying missiles, the reports questions on the number of missile currently deployed.<br /><br /><strong><span style="font-size:130%;">Nuclear Forces by 2008-2009</span></strong><br /><br />In 2009, Bulletin of Atomic scientists has estimated the Pakistan’s nuclear arsenal to include 70-90 warheads and that it is busily enhancing its nuclear capabilities. In 2009, Pakistan was readying a new nuclear capable ballistic missile and two cruise missiles for deployment. Pakistan is believed to have produced around 2000kg of HEU and 90 Kg of plutonium sufficient to build 80-130 Kg. But based on several factors, the report suggests that Pakistan has not yet crossed 100 warheads. Reportedly, all of Pakistan’s missiles and aircrafts are of dual purpose. Pakistan is also expanding its nuclear processing facilities. Hilary Clinton, in her address to Congress have said that Pakistan’s Nuclear arsenal are spread across the country and not in a single central location. The aircrafts deployed for nuclear mission are predominantly F-16s given by the US by waiving the Pressler Amendment. The cruise missile of Pakistan, Babar, is similar to that of the Chinese DH-10 air launched cruise missile and has a range of about 320Km, according to US intelligence agencies, as opposed to the media that suggests it to have a range of 500-700Km. The design of the missile also suggests that Pakistan scientists to have made progress in warhead miniaturization. The other cruise missile Ra’ad is expected to have stealth and standoff capability at sea and land.<br /><br />In report on Chinese nuclear forces in 2008, it is believed that China is expanding its nuclear arsenal boosting its number by 25 percent since 2005. In 2008, China also deployed DF-31, DF-31A and DH-10 missiles. By 2008, China is also reported to be building 4 new ballistic missile submarines. By 2008, China is estimated to possess around 176 nuclear arsenals deployed by missiles and aircrafts. Another 65 warheads is expected to be in storage. The nuclear arsenals are expected to have a yield of 10Kilotons to 3 Megatons. The Pentagon projects that by 2010 Chinese nuclear forces would include DF-4s, DF-5As, DF-31, DF-31As and upto 5 Jin class submarines carrying between 10 and 12 Jl-2 SLBMs.<br /><br />According to report on Indian nuclear capability in 2008, India is reported to be struggling to develop a complete nuclear triad and currently only its fighter bombers constitute the fully operational leg. All Indian nuclear delivery systems are dual-capable but their operational status are ambiguous. The report estimates, India to have assembled around 70 warheads but only 50 is expected to be operational. Currently, out of the four land based missile systems, only Prithivi has been fully deployed but how many of them are deployed with nuclear warheads is uncertain. Of the variants of Prithivi, only the army version is identified by CIA to have a nuclear role. The report is skeptical about India acquiring multiple warhead capability any time soon. Another subsonic cruise missile is also reported to be under development.<br /><br /><strong><span style="font-size:130%;">Conclusion</span></strong><br /><br />Compared with Pakistan and China, India scores low with respect to its military modernization and preparedness. Much of the India’s long range missiles were not fully operational. It is also alarming to note that Pakistan as well as China are expanding their nuclear arsenal rapidly creating a huge gap between the numbers with India. Indian leadership is yet to shed its timidity and ineptitude to come up with a strong military doctrine. It is also worth noting that, apparently the current government's diplomacy and the so-called US relationship seems to have no say in the expansion of the nuclear capability of Pakistan. Pakistan’s Babur cruise missile, which is believed to be based on DH-10 of China also asserts beyond doubt the proliferation of missile technology by China, which is a member of security council and it is be noted that none of the superpowers have done anything to put a tab on China.<br /><br />In this scenario, India still is unlikely go down the 1962 scenario. But this time, India has to remember that Pakistan’s interest in India is not just Kashmir. It is also foolish to believe that China’s interest is limited to Arunachal Pradesh. In practice, India should build up to be fully capable of deterring Chinese incursions. It has to expect a two multi-point war as China has covered India on all sides and with a strong ally in the west. India’s missile systems are not fully developed and/or deployed restricting its capability. India is also continuously failing to take advantage of its technically developed workforce, much of which moves to other nations for better education, and opportunities. Indian establishment is yet to take steps to bring in the Indian minds from abroad. To be eligible for an NRI to be considered for DRDO, he has to have a PhD and at least 3 years of experience abroad. Most of the people by the time would have settled and it is practically not possible for them to return even if they wish to. ISRO, has not even an option for an NRI. Corruption and the lethargic unchecked bureaucracy is continuing to be another checkpoint for India to develop.<br /><br />It is also to be noted that Pakistan’s ISI is having a significant presence in India but not the other way around. Indian RAW is considered to be one of the most bureaucratic organizations and Mr. Gujral’s misplaced trust has fully left India vulnerable. Taking into consideration the Chinese publication to split India into many parts it could be expected by Pakistan to up its shadow war against India with China acting as a pressure point for any retaliation by India. India lost its covert capability long ago and will the political leadership allow the organization to renew it?<br /><br />If Indian governments timidity and lack of foresight continues then Indians should brace themselves for another 1962 embarrassment .<br /><br />*The source on Nuclear arsenals were taken from Bulletin of Atomic Scientists.<br />Sidharth K Menon<br />Defence and Intelligence AnalystSidharth K Menonhttp://www.blogger.com/profile/11412252277913740873noreply@blogger.comtag:blogger.com,1999:blog-7965927633581367449.post-23896674800536895602009-10-31T15:24:00.006+05:302009-10-31T15:37:32.176+05:30India,China and 62<span style="font-size:180%;color:#ff0000;">Looking Back at 1962</span> <a href="http://1.bp.blogspot.com/_H2SGxn7sGYA/SuwLYuDEjmI/AAAAAAAAASk/iO62pLeAlFs/s1600-h/chinese%20flag%203.gif"><img id="BLOGGER_PHOTO_ID_5398702572616060514" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 168px; CURSOR: hand; HEIGHT: 87px" alt="" src="http://1.bp.blogspot.com/_H2SGxn7sGYA/SuwLYuDEjmI/AAAAAAAAASk/iO62pLeAlFs/s320/chinese%2520flag%25203.gif" border="0" /></a><a href="http://2.bp.blogspot.com/_H2SGxn7sGYA/SuwLYxb4yxI/AAAAAAAAASs/RtF0VwdLxbQ/s1600-h/indian_flag.jpg"><img id="BLOGGER_PHOTO_ID_5398702573525453586" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 155px; CURSOR: hand; HEIGHT: 87px" alt="" src="http://2.bp.blogspot.com/_H2SGxn7sGYA/SuwLYxb4yxI/AAAAAAAAASs/RtF0VwdLxbQ/s320/indian_flag.jpg" border="0" /></a><br /><br />The Sino-Indian war of 1962 had the following lessons for India:<br /><ul><br /><br /></ul><p><strong>1. </strong>While we had a good capability for the collection of tactical and topographical intelligence about Tibet, we lacked a similar capability relating to Yunnan. </p><ul><li><br />Our threat perceptions were largely, if not exclusively, focussed northwards towards Tibet and likely Chinese threats from Yunnan in the East through North Myanmar, by taking advantage of the lack of control and presence of the Yangon Government over vast areas of the Kachin State of Myanmar, were not adequately anticipated. Consequently, a disturbing increase in Chinese intelligence operations directed at India's North-East mounted from Yunnan and clandestine intrusions and movements of Chinese troops from Yunnan through Myanmarese territory to the North of Putao in the Kachin State remained either unnoticed or ill-assessed, if noticed. After the war, there were valid grounds for suspecting that some of the Chinese troops, which took the Indian Army by surprise in the North-East, had moved unnoticed by the Indian intelligence from Yunnan through unadministered Kachin territory. </li><li><br />While we had a certain capability for the collection of human intelligence (HUMINT) from Tibet, our capability for the collection of technical intelligence (TECHINT) was woefully inadequate. So was our capability for the collection of strategic intelligence indicating Chinese intentions, mindset, perceptions, medium and long-term planning etc. Our capability for the collection of strategic intelligence was badly affected by the failure of the intelligence community since India's independence in 1947 to build up a high-level of knowledge of the Chinese language and by the difficulties faced by all countries in interacting with Chinese leaders and officials at policy-making levels in Beijing. The rigorous restrictions imposed by Beijing on their citizens, whether in the Government or outside, interacting with foreigners drastically reduced opportunities for strategic intelligence collection. While Chinese officials posted in New Delhi were freely able to interact with Indian leaders, officials and non-governmental analysts and collect strategic intelligence by picking their brains and other means, Indian officials found themselves denied similar opportunities in Beijing.<br /></li><li>Even though arrangements for the sharing of China-related intelligence between India and the US existed in a rudimentary form even before October,1962, the US intelligence chose not to share with India its knowledge of the Chinese military-build up in Tibet and the goings-on in Yunnan. The John F.Kennedy Administration in Washington DC, though well-disposed towards India, had apparently calculated that an Indian set-back at the hands of the Chinese would make New Delhi more amenable to US influence in strategic policy-making. (A similar failure to alert New Delhi about the movement of Pakistani troops to occupy the Kargil heights was discernible before the Indo-Pakistan Kargil military conflict of 1999. Again, the US calculatioin apparently was that an Indian surprise at the hands of Pakistan, even if temporary, would serve the USA's long-term policy interests).<br /></li><li>Our capability for a meaningful analysis and assessment of even the available intelligence, open as well as secret, was very poor. Consequently, policy-making was based more on wishful-thinking and personal hunches than on well-analysed and assessed likely scenarios.<br /></li><li>We had failed to foresee the likelihood of a military confrontation with China resulting in the occupation of some of our territory by the Chinese. As a result, we had not developed a stay-behind capability for the continued collection of intelligence and covert harassing operations against the Chiese troops in our territory occupied by them. Once the Chinese occupied portions of our territory, we hardly knew what was happening there and watched helplessly. </li></ul><p><strong>2</strong>. The painful experience of 1962 led New Delhi, for the first time since 1947, to have a comprehensive look at our intelligence collection, analysis and assessment and stay-behind operational capabilities with regard to China. Certain long-neglected measures were taken such as:<br />Giving priority to the collection of intelligence about North Myanmar and Yunnan. </p><p>Improving our HUMINT capability in Tibet. </p><p>Strengthening our TECHINT capability. </p>Improving the knowledge of the Chinese language in the intelligence community as well as outside.<br /><br />Creating a stay-behind intelligence collection and operational capability in our territory claimed by the Chinese so that if the Chinese again occupied it in future, we would not be as helpless as we were in 1962.<br /><br />Improving arrangements for intelligence and assessment barter with countries sharing India's concerns relating to China, while not developing a dependence on them to meet our needs.<br /><br />Improving our analysis and assessment capability through the Joint Intelligence Community (JIC) at the Governmental level (since converted into the National Security Council Secretariat (NSCS) in 1998) and the Institute for Defence Studies And Analyses (IDSA) at the non-governmental level. The creation of the National Security Advisory Board (NSAB) in 1998 was meant to further strengthen the assessment capability at the non-governmental level.<br /><br /><strong>3.</strong> The benign face of the post-1978 Chinese policy-making as illustrated by Beijing's discontinuance of its assistance to insurgent groups in India's North-East since 1979 and its keenness for the improvement of bilateral relations at various levels without letting them become a hostage to the long-pending border dispute have led to a certain complacency in policy-making in matters relating to National Security Management (NSM) and China. India continues to have serious concerns over the modernisation of China's Armed Forces, its nuclear and missile capability, its military assistance to Pakistan in the nuclear as well as conventional fields, its intentions in Myanmar, Bangladesh and Nepal etc. Despite these concerns, Indian attitude towards China seems to be more relaxed and more trusting than in the past. This is evident from the following:<br /><ul><li>The gradual erosion of our stay-behind intelligence collection and operational capabilities. </li><li><br />The almost exclusive focus of the Special Task Force on the revamping of the intelligence apparatus set up by the Government in 2000 on strengthening our capabilities vis-a-vis Pakistan without a similar exercise relating to China. </li></ul><p><strong>4.</strong> This relaxed attitude was also evident during the Asian Security Conference with a focus on China organised by the IDSA at New Delhi from January 27 to 29, 2003. Though well-organised with a large participation from abroad, its focus was too dispersed and too diffused to enable any meaningful assessment. There was hardly any participation of Indian experts with insights, knowledge and the painful experience of dealing with China before and after 1962, who have already started fading away and will do so completely in another few years. Foreign perceptions-- particularly American, Israeli and Taiwanese--- received greater prominence and attention than Indian. One got the impression that the emphasis was more on quantity (so many foreign participants, so many papers, so many pages etc) than on quality. </p><p><br /><strong>5</strong>. This was reflective of the lack of attention to details and the superficiality, which have again come to mark our China analysis and assessment. It is important that we continue to move forward in improving our relations with China, but our keenness to move forward should not make us forget the painful lessons of the past. We cannot afford another traumatic experience in our relations with China. </p><br /><br />Sidharth K Menon<br />Defence and Intelligence Analyst<br /><span style="color:#666666;">Thanks,</span><br /><span style="color:#666666;">South Asia Analysis Group.</span><br /><span style="color:#666666;">B.R.Raman</span>Sidharth K Menonhttp://www.blogger.com/profile/11412252277913740873noreply@blogger.com