Pakistan shuns US for Chinese high-tech weapons In sign of shifting balance of power, Islamabad buying advanced military equipment from Beijing Share on Twitter (opens new window) Share on Facebook (opens new window) Share on LinkedIn (opens new window) Save Save to myFT Kiran Stacey in Islamabad 13 HOURS AGO Print this page92 In the last few months of the Obama administration, the US state department made an announcement which caused a new breach in Washington’s tumultuous relationship with Pakistan. John Kirby, then the department’s spokesman, said Congress had decided to approve the sale of eight fighter aircraft to Pakistan.
20 April 2018
Pakistan’s Growing Dependency on China
By Shirin Naseer
Pakistan’s Western Frontiers Restive: The Pakhtun Awakening
By Dr Subhash Kapila
Pakistan’s Western Frontiers comprising Balochistan, Khyber Pakhtunwa Province and Federally Administered Tribal Areas (FATA), have been restive for decades but recent Pakhtuns widespread protests in Islamabad and in rest of Pakistan has been described by Pakistani columnists as “The Awakening” and the “Pakhtuns Spring”. That this new phenomenon emerging on Pakistan’s domestic politics milieu is worrisome can be judged from a virtual blackout imposed on Pakistani media, obviously on orders of the Establishment. Easily dismissed as a limited occurrence but surely, it cannot be wished away when it is kept in mind that this discontent is seething for decades.
Mainstreaming Pakistan’s Federally Administered Tribal Areas
Source Link
Pakistan’s government has recently approved mainstreaming of the Federally Administered Tribal Areas (FATA) in an effort to bring the FATA region within the legal and governance structures of the rest of Pakistan and place it on a footing of parity. The mainstreaming should aid the FATA people economically and reduce militancy in the region, which would contribute greatly to Pakistan’s peace and security. Despite government approval and repeated assurances by the country’s top leadership that changes in the FATA governance system is a must and the status quo must end, the process has been stalled, as there are differences in opinion on the future status of FATA. Still, many tribesmen are hopeful the government will go ahead with the approved plan of mainstreaming FATA and their agony will end.
Asia Pacific pivots beyond a Trump-led America
Pradumna B Rana and Xianbai Ji, RSIS
US President Donald Trump has taken a radically protectionist approach to trade. Trump has launched a series of unilateral moves including increasing tariffs on steel and aluminium imports on national security grounds and announcing plans to impose tariffs on US$60 billion of Chinese imports. Uncertainties regarding continued access to the US market have forced Asia Pacific countries, for whom trade is an economic lifeline, to pivot beyond Trump-led America by adopting a three-pronged policy response: the acceleration of mega free trade agreements (FTAs), the enhancement of regional connectivity and the deepening of interregional economic cooperation.
One Belt, One Road, One Happy Chinese Navy
BY KEITH JOHNSON, DAN DE LUCE
Chinese leaders tout their trillion-dollar Belt and Road project, especially in the Indian Ocean, as a win-win commercial proposition meant to bring modern infrastructure and prosperity to an underdeveloped part of the world. In reality, Beijing’s acquisition of more than a dozen ports across the Indian Ocean is a state-directed effort to bolster Chinese political influence and extend its military reach from Indonesia to East Africa, according to a detailed new study released Can China Realize Africa’s Dream of an East-West Transport Link?
By: Cobus van Staden
African development hinges on a maddening paradox: its greatest asset—the sheer size and diversity of its landscape—is also the greatest barrier to its development. Landlocked countries are cut off from ports, and the difficulty of moving goods from country to country weighs down intra-continental trade (only 15% of African trade is within Africa. (African Development Bank, 2017) African consumers bear the brunt of these difficulties. [1]. Costs are driven up by a host of factors: tariffs, border delays, corruption. But the biggest challenge is that no streamlined transport route exists between West and East Africa – only a decaying and underdeveloped road and rail system which pushes up costs and drags down efficiency.
U.S., Britain Issue Warnings Over Chinese Telecom Equipment Maker ZTE
By Jason Douglas and Robert Wall
“Made in China 2025” is Beijing’s industrial plan to dominate high-tech industries including robotics, aerospace and computer chips. The Trump administration argues China is using the plan to give its tech companies unfair advantage over foreign rivals. But what is it exactly? U.S. and British officials struck separate blows at telecommunications-equipment giant ZTE Corp., ratcheting up national-security scrutiny of a big Chinese company amid broader
“Made in China 2025” is Beijing’s industrial plan to dominate high-tech industries including robotics, aerospace and computer chips. The Trump administration argues China is using the plan to give its tech companies unfair advantage over foreign rivals. But what is it exactly? U.S. and British officials struck separate blows at telecommunications-equipment giant ZTE Corp., ratcheting up national-security scrutiny of a big Chinese company amid broaderCompeting in Africa: China, the European Union, and the United States
Witney Schneidman and Joel Wiegert
Given recent developments in the global economy, especially Brexit and the Trump administration’s “America First” policy, it is worth assessing how Africa’s three largest commercial partners—China, the European Union, and the United States—are likely to impact the region in the near future as it relates to trade and investment trend. The China-in-Africa story may be increasingly familiar, but its complexity cannot be overstated. As China’s domestic growth began to surge at the end of the last century, demand for natural resources and job creation forced China to look for markets abroad. Africa was a willing partner, due to its abundance of commodities and need for infrastructure development.
How Chinese People View the US-China Trade War
By Mu Chunshan
Close observers can glean clues about Chinese government policy based on the degree of censorship on discussions of certain topics. For example, I have been following the North Korean issue closely. After the conclusion of the annual sessions of the National People’s Congress and Chinese People’s Political Consultative Conference on March 20, many articles related to North Korea on my WeChat public account were deleted by the network management department, even including those posted back in 2015. At that moment, I predicted that there would soon be some changes in Chinese policy toward North Korea because I criticized North Korea in many of my articles. It turned out that Kim Jong-un visited Beijing shortly after that.Systems Confrontation and System Destruction Warfare
by Jeffrey Engstrom
How the Chinese People's Liberation Army Seeks to Wage Modern Warfare
Research Questions
What is the concept of systems confrontation and system destruction warfare in PLA writings? What is the template of the PLA's operational system? What are some examples of task-organized operation system of systems?
This report reflects an attempt to understand current thinking in the Chinese People's Liberation Army (PLA) regarding system of systems and systems warfare, as well as current methods of warfighting. It also serves as a guidebook to the already substantial number of systems and systems-related concepts that abound in PLA sources. By examining numerous Chinese-language materials, this report (1) explores how the PLA understands systems confrontation and comprehends prosecuting system destruction warfare, (2) identifies the components of the PLA's own operational system by looking at the various potential subsystem components and how they are connected, and (3) examines selected PLA operational systems identified in PLA literature and envisioned by the PLA to prosecute its campaigns, such as the firepower warfare operational system. This report should be of interest to military analysts and scholars of the PLA, policymakers, and anyone else who seeks insight into how the PLA conceptualizes and seeks to wage modern warfare.
What Iran Really Wants
Paul R. Pillar
Clash of the Strategists
Dov S. Zakheim
The Land, Space, and Cyberspace Nexus: Evolution of the Oldest Military Operations in the Newest Military Domains
Over the last century, the domains of air, space, and cyberspace have joined the traditional warfighting domains of land and sea. While the doctrine for land operations is relatively mature, the doctrine for space and cyberspace continue to evolve, often in an unstructured manner. This monograph examines the relationships among these domains and how they apply to U.S. Army and joint warfighting. It concentrates on the central question: How are U.S. military operations in the newest domains of space and cyberspace being integrated with operations in the traditional domain of land? This inquiry is divided into three major sections:
• Existing Doctrine: This section presents an overview of the current state of joint and U.S. Army doctrinal development for each of the domains of land, space, and cyberspace.
Is Russia on the Doorstep of the Seventh Military Revolution?
By Sergey Sukhankin
Army General Valery Gerasimov, the chief of the General Staff of the Russian Armed Forces, presented his reflections on future conflicts, on March 24. Notably, he argued that “the enemy’s economy and command-and-control system (C2) will be priority targets [for potential Russian attacks].” And aside from traditional warfighting domains, Russian forces will increasingly operate in the information sphere and outer space (Tvzvezda.ru, RIA Novosti, March 24; see EDM, April 3). Gerasimov outlined five practical steps Russia needs to take to be ready for future wars (TASS, March 24): Develop an inter-service automated reconnaissance system. This should profoundly reduce the time cycle for completing fire missions (by 2–2.5 times) and increase the accuracy of targeting (by 1.5–2 times).
Russia Hacks Its Way to “the High Ground of the Internet”
LEVI MAXEY
On Monday, the U.S. and UK jointly blamed Moscow for cyber intrusions into the backbone of the internet – the routers and switches that are the gateway for internet access in major corporations and your home office. “Since 2015, the U.S. government received information from multiple sources – including private and public sector cybersecurity research organizations and allies – that cyber actors are exploiting large numbers of enterprise-class and SOHO/residential routers and switches worldwide,” said the technical alert published by the U.S. Department of Homeland Security. “The U.S. government assesses that cyber actors supported by the Russian government carried out this worldwide campaign. These operations enable espionage and intellectual property that supports the Russian Federation’s national security and economic goals,” it continued.
On Monday, the U.S. and UK jointly blamed Moscow for cyber intrusions into the backbone of the internet – the routers and switches that are the gateway for internet access in major corporations and your home office. “Since 2015, the U.S. government received information from multiple sources – including private and public sector cybersecurity research organizations and allies – that cyber actors are exploiting large numbers of enterprise-class and SOHO/residential routers and switches worldwide,” said the technical alert published by the U.S. Department of Homeland Security. “The U.S. government assesses that cyber actors supported by the Russian government carried out this worldwide campaign. These operations enable espionage and intellectual property that supports the Russian Federation’s national security and economic goals,” it continued.The Russian "Firehose of Falsehood" Propaganda Model
by Christopher Paul, Miriam Matthews
DOWNLOAD FREE ELECTRONIC DOCUMENT
Full Document
Since its 2008 incursion into Georgia (if not before), there has been a remarkable evolution in Russia's approach to propaganda. The country has effectively employed new dissemination channels and messages in support of its 2014 annexation of the Crimean peninsula, its ongoing involvement in the conflicts in Ukraine and Syria, and its antagonism of NATO allies. The Russian propaganda model is high-volume and multichannel, and it disseminates messages without regard for the truth. It is also rapid, continuous, and repetitive, and it lacks commitment to consistency. Although these techniques would seem to run counter to the received wisdom for successful information campaigns, research in psychology supports many of the most successful aspects of the model. Furthermore, the very factors that make the firehose of falsehood effective also make it difficult to counter. Traditional counterpropaganda approaches will likely be inadequate in this context. More effective solutions can be found in the same psychology literature that explains the surprising success of the Russian propaganda model and its messages.
Russian Social Media Influence Understanding Russian Propaganda in Eastern Europe
by Todd C. Helmus, Elizabeth Bodine-Baron, Andrew Radin, Madeline Magnuson, Joshua Mendelsohn, William Marcellino, Andriy Bega, Zev Winkelman
A RAND Corporation study examined Russian-language content on social media and the broader propaganda threat posed to the region of former Soviet states that include Estonia, Latvia, Lithuania, Ukraine, and, to a lesser extent, Moldova and Belarus. In addition to employing a state-funded multilingual television network, operating various Kremlin-supporting news websites, and working through several constellations of Russia-backed "civil society" organizations, Russia employs a sophisticated social media campaign that includes news tweets, nonattributed comments on web pages, troll and bot social media accounts, and fake hashtag and Twitter campaigns. Nowhere is this threat more tangible than in Ukraine, which has been an active propaganda battleground since the 2014 Ukrainian revolution. Other countries in the region look at Russia's actions and annexation of Crimea and recognize the need to pay careful attention to Russia's propaganda campaign.
AIR, INTEL & CYBER ‘A Computer That Happens To Fly’: USAF, RAF Chiefs On Multi-Domain Future
“I grew up flying fighters,” says Gen. David Goldfein, the Air Force Chief of Staff, "and I will tell you, when I see the F-35, I don’t see a fighter. I see a computer that happens to fly."
F-35 cockpit
ARLINGTON: “I grew up flying fighters,” says Gen. David Goldfein, the Air Force Chief of Staff, “and I will tell you, when I see the F-35, I don’t see a fighter. I see a computer that happens to fly.” It’s not just the F-35, Goldfein told a Mitchell Institute audience this morning: “You also have to think about an Aegis cruiser in a different way. You’ve got to think about a Brigade Combat Team in a different way.” “I’m so adamant that, if we start thinking about these systems as not the planes or ships or what have you but as computers we need to connect….it gives you new insight,” Goldfein elaborated to reporters after his public remarks.The “Known Unknowns” of Russian Cyber Signaling
Source Link
Russian President Vladimir Putin toasts with Defence Minister Sergei Shoigu after a state awards ceremony for military personnel who served in Syria, at the Kremlin in December 2017. Recent Russian cyber intrusions in U.S. critical infrastructure have been interpreted as a signal that Moscow "could disrupt the West's critical facilities in the event of a conflict." But is that the signal the Kremlin meant to send? Erica D. Borghard is a research fellow at the Army Cyber Institute at the U.S. Military Academy at West Point. The views expressed here are personal and do not reflect the policy or position of the U.S. government. You can follow her @eborghard.
Russian President Vladimir Putin toasts with Defence Minister Sergei Shoigu after a state awards ceremony for military personnel who served in Syria, at the Kremlin in December 2017. Recent Russian cyber intrusions in U.S. critical infrastructure have been interpreted as a signal that Moscow "could disrupt the West's critical facilities in the event of a conflict." But is that the signal the Kremlin meant to send? Erica D. Borghard is a research fellow at the Army Cyber Institute at the U.S. Military Academy at West Point. The views expressed here are personal and do not reflect the policy or position of the U.S. government. You can follow her @eborghard.CTIIC’s Role in Keeping America Safe in Cyber
SUZANNE KELLY
One day last May, employees of Britain’s health service logged on to their computers to find a startling discovery: their data had been encrypted, rendering it inaccessible until and unless they paid a ransom to have their data unscrambled and their access to it, returned.They were the first known victims of the WannaCry attack and in the days that followed, the virus spread rapidly, infecting more than 200,000 computers in more than 150 countries, creating a global crisis. As the threat rapidly spread from Europe to Russia to China, a U.S. government team that sits within the Cyber Threat Intelligence Integration Center (more affectionately known in acronym-loving circles as CTIIC) brought the concerning developments to the attention of their director, Tonya Ugoretz. As with all significant threats, she remembers the details well.
Defence Against the ‘Drone’ Arts: Surviving the swarm & an eleventh principle of war
by Greg Rowlands
Scenario 1: A light infantry platoon advances cautiously without tank support[1] along a narrow rubble strewn street in a regional town, recently occupied by an extremist group.[2] Then with no warning a swarm of flying attack drones appears 100 meters forward of the lead rifle section. Each semi-autonomous quad-copter[3] carries a nanoexplosive device, which when detonated acts as an anti-personnel grenade. As two-dozen+ ‘flying nano-grenades’ hurtle towards the rifle platoon, a prescient Section Commander does not hesitate in ordering the rifle section to open fire. The drones are too close to call for indirect fire support, but accurate rifle and machine-gun fire destroys most of them.
Scenario 1: A light infantry platoon advances cautiously without tank support[1] along a narrow rubble strewn street in a regional town, recently occupied by an extremist group.[2] Then with no warning a swarm of flying attack drones appears 100 meters forward of the lead rifle section. Each semi-autonomous quad-copter[3] carries a nanoexplosive device, which when detonated acts as an anti-personnel grenade. As two-dozen+ ‘flying nano-grenades’ hurtle towards the rifle platoon, a prescient Section Commander does not hesitate in ordering the rifle section to open fire. The drones are too close to call for indirect fire support, but accurate rifle and machine-gun fire destroys most of them. Innovation and the Challenger Mentality
By Kareen Hart
WHEN AT THE LEADING EDGE OF TECHNOLOGY AND PLOUGHING NEW GROUND…IF YOU DO NOT HAVE FAILURE EVERY NOW AND THEN, YOU ARE NOT TAKING ENOUGH RISKS.
—GENERAL BERNARD SCHRIEVER
An inherent tension exists in U.S. military culture. Intellectually, military members recognize the need to embrace technological innovation and change to survive in a complex and adaptive environment, yet the military organizational structure favors slow and deliberate development. Bureaucracies prefer stability, because innovative ideas are inherently risky and can create losses if they fail. The safer strategy is to embrace tried and true approaches, which are both easier to defend from an investment standpoint, and comfortable and familiar.[1] Therefore, particularly in an age of fiscal limitations, the military is more apt to invest in proven technologies and to find efficiencies that it is to experiment with innovations. It is hard to accept risk when you are in the lead. So how do strategic innovators resolve this paradox? The answer lies in changing the military mentality.
New Challenges in Cross-Domain Deterrence
by King Mallory
This Perspective places deterrence within the broader spectrum of influence strategies available to international actors. It focuses on the domains of space and cyberspace and on two subareas of the land domain of warfare: hybrid warfare and terrorism. Potential in-domain and cross-domain strategies of deterrence by denial or by threat of punishment are suggested for each focus area. The author concludes that establishing effective deterrence against attacks in space and against the use of hybrid warfare tactics are the two most urgent priorities. Legislative action, demonstrative exercises, collective security agreements, retaliatory strikes against opponent systems, and creating a visible ability to hold adversary systems of political control at risk are recommended as remedial steps in the space domain. Enhanced abilities to interdict "troll armies," conduct information operations, identify the national origin of combatants, respond collectively, and deploy military quick reaction forces to neighboring states by prior agreement with them are suggested as remedial steps for hybrid warfare. The Perspective outlines criteria by which to prioritize between strategies of deterrence: denial over punishment, nonescalatory strategies over escalatory ones, and reversible strategies over irreversible ones. Even when limited to deterring terrorism and war with China and Russia, implementing a doctrine of cross-domain deterrence would be complex and would have significant resource implications. Political capital would need to be spent to achieve allied consensus and international political support for the strategy, and agencies stood down at the end of the Cold War might need to be reestablished.
Improving the Understanding of Special Operations
by Linda Robinson, Austin Long, Kimberly Jackson, Rebeca Orrie
How has successful change previously occurred in the U.S. Army, Joint, and U.S. Department of Defense policy regarding SOF? How can these observations inform future development of options for policymakers and to articulate ways in which the varied Army Special Operations Forces capabilities can help to meet U.S. national security objectives? How can future planning and execution by the Army Special Operations Forces, the Army, and the joint operations community be informed by an analysis of past decisions?
19 April 2018
China’s stealth wars in the Himalayas
Brahma Chellaney
Beijing’s military advance into Bhutan-claimed territory leaves New Delhi floundering, raising concern over India’s own borders. Operating in the threshold between peace and war, China has pushed its borders far out into international waters in the South China Sea in a way no other power has done elsewhere. Less known is that China is using a similar strategy in the Himalayas to alter facts on the ground — meter by meter — without firing a single shot.The violently peaceful struggle for Tibet
Dr. Andrea Galli
Many years later, as he faced how the Dalai Lama became a political inconvenience for an increasing number of world leaders, the former emissary of the Dalai Lama, Gelek Rinpoche was to remember those distant afternoons when the poet Allen Ginsberg, the composer Philip Glass, the author Robert Thurman and the actor Richard Gere jointly planned fully-booked glamorous events for his Buddhist Jewel Heart organizations based in Ann Arbor, Chicago, and New York. At that time, the end of the Cold War was so recent that many notions lacked names, and in order to describe them, it was necessary to invent.India’s grand illusion of a ‘reset’ with China
The power corridors in New Delhi are abuzz with the prospects of a “reset” of India-China ties. It started with a missive from foreign secretary Vijay Gokhale on 22 February discouraging government functionaries from attending events organized by the Tibetan government in exile. A number of high-level visits have since taken place. Chinese foreign minister Wang Yi came to India in early March and Indian national security adviser Ajit Doval visited China last week. And there have been reports suggesting that India did not intervene in the Maldives despite grave provocation from the Abdulla Yameen government in deference to Chinese sensitivities.America’s Pakistan Problem
Brahma Chellaney
Debt-ridden Pakistan is very vulnerable to Western sanctions, yet it is unclear whether US President Donald Trump’s administration is willing to squeeze it financially in a way that could help reform its behaviour. Washington also seems reluctant to strip Pakistan of its status as a Major Non-NATO Ally (MNNA) or target its military for rearing transnational terrorists. The main driver of Pakistan’s nexus with terrorists is its powerful military, whose generals hold decisive power and dictate terms to a largely impotent government. With the military’s rogue Inter-Services Intelligence (ISI) rearing terrorists, Pakistan has long played a double game, pretending to be America’s ally while aiding its most deadly foes that have killed or maimed thousands of US soldiers in Afghanistan. Pakistani forces only target terrorists that fall out of line or threaten Pakistan itself.The West Is Wrong About China’s President
KEYU JIN
In the West, government accountability is closely identified with democratic elections. In China, it is a function of how – and how well – the government responds to and protects the needs and interests of the people. BEIJING – China’s recent constitutional amendment eliminating the term limits for the president and vice president has left much of the West aghast. Critics fear the emergence of a new and unaccountable dictatorship, with President Xi Jinping becoming “Chairman Mao 2.0.” This response is more than a little inappropriate.
Long tenures are not exactly unheard of in the West. For example, German Chancellor Angela Merkel has just begun her fourth four-year term – a development that the rest of Europe has largely welcomed rather than criticized.
The billion-dollar, Alibaba-backed AI company that’s quietly watching people in China
Josh Horwitz
If a person goes shopping at Suning, one of China’s largest electronics retailers, it’s possible that a camera in the store is tracking her behavior using SenseTime’s software. Later, if she opens Rong360, a peer-to-peer lending app, she’ll be asked to login using facial recognition—powered by SenseTime. She might send a video of herself to her friends on SNOW, a Snapchat-esque chat app, donning animated sunglasses built by SenseTime. And if she finds herself approached by police officers in the subway, it’s possible SenseTime helped identify her.
If a person goes shopping at Suning, one of China’s largest electronics retailers, it’s possible that a camera in the store is tracking her behavior using SenseTime’s software. Later, if she opens Rong360, a peer-to-peer lending app, she’ll be asked to login using facial recognition—powered by SenseTime. She might send a video of herself to her friends on SNOW, a Snapchat-esque chat app, donning animated sunglasses built by SenseTime. And if she finds herself approached by police officers in the subway, it’s possible SenseTime helped identify her.U.S. bans American companies from selling to Chinese phone maker ZTE
Steve Stecklow, Karen Freifeld
LONDON/NEW YORK (Reuters) - The U.S. Department of Commerce has banned American companies from selling components to Chinese telecom equipment maker ZTE Corp for seven years after breaking an agreement reached after it was caught illegally shipping goods to Iran, U.S. officials said on Monday. The U.S. action, first reported by Reuters (reut.rs/2H3p0Vl), could be devastating to ZTE since American companies are estimated to provide 25 percent to 30 percent of the components used in ZTE’s equipment, which includes smartphones and gear to build telecommunications networks. The ban is the result of ZTE’s failure to comply with an agreement with the U.S. government after it pleaded guilty last year in federal court in Texas to conspiring to violate U.S. sanctions by illegally shipping U.S. goods and technology to Iran, the Commerce Department said.
The Real Next War in Syria: Iran vs. Israel
By Thomas L. Friedman
SYRIA-ISRAEL BORDER, Golan Heights — Stop me if you’ve heard this one before: Syria is going to explode. I know, you have heard that one before, but this time I mean really explode. Because the U.S., British and French attack on Syria to punish its regime for its vile use of chemical weapons — and Russia’s vow to respond — is actually just the second-most dangerous confrontation unfolding in that country. Even more dangerous is that Israel and Iran, at the exact same time, seem to be heading for a High Noon shootout in Syria over Iran’s attempts to turn Syria into a forward air base against Israel, something Israel is vowing to never let happen. This is not mere speculation. In the past few weeks — for the first time ever — Israel and Iran have begun quietly trading blows directly, not through proxies, in Syria.U.S. Seeks Arab Force and Funding for Syria
Michael R. Gordon
John Bolton, President Donald Trump’s new national security adviser, recently called Abbas Kamel, Egypt’s acting intelligence chief, to see if Cairo would contribute to the effort, officials said.
The initiative comes as the administration has asked Saudi Arabia, Qatar and the United Arab Emirates to contribute billions of dollars to help restore northern Syria. It wants Arab nations to send troops as well, officials said.
Russian military capabilities in event of Western strike on Syria
MOSCOW (Reuters) - Russia has said it will target U.S. missiles and the ships or planes that fire them if an attack on Syria threatens the lives of its own military personnel based there. Here’s what we know about Russian military capabilities in Syria:
MISSILES
‘TRIUMPH’ S-400 SURFACE-TO-AIR MISSILES
An advanced truck-mounted system that Russia is known to have deployed to protect its Hmeymim air base in Syria’s Latakia Province and its Tartus naval facility on the coast. Its mobile nature means it can easily and quickly be deployed elsewhere. Designed to shoot down military aircraft, missiles and drones, its radar can detect targets up to 600 kms (375 miles) away. Each truck carries four missiles of varying range. Can track multiple targets simultaneously. Taken seriously by NATO, the S-400s have not been combat tested however. Capable of intercepting U.S. Tomahawk cruise missiles, there are question marks over whether Moscow has enough interceptor missiles deployed to Syria to handle a large swarm of missiles. In such a situation it might be able to shoot down some, but not all incoming missiles. Russia also has an older version of the same missiles - S-300s - deployed in Syria.
Subscribe to:
Posts (Atom)