Saturday, June 7, 2025
Advertise with us
Support us
Write for us
No Result
View All Result
claws
  • Home
  • About Us
    • Director General
    • Additional Director General
    • Jottings by Director General Emiritus
    • CLAWS Membership
    • Faculty
  • Publication
    • Web Articles
    • Issue Briefs
    • Manekshaw Papers
    • Newsletter
    • CLAWS Journal
    • Scholar Warrior
    • Books
    • Essay
    • Intern Articles
    • External Publications
  • Research Areas
    • Global & Regional Security
      • China
      • Pakistan
      • Afghanistan
      • South Asia
      • Indo Pacific
      • US, EU & Russia
      • MENA
      • CAR
    • National Security
      • National Security Strategy
      • Nuclear Deterrence
      • Non Traditional Threats
      • Intelligence
      • Terrorism & Internal Security
      • Grey Z & IW
      • Security Laws
    • Military Studies
      • Military Doctrine
      • Military Strategy
      • Peace Keeping Ops
      • Military History
      • Military Logistics
      • Out of Area Contingency Ops
      • Leadership
    • Military Technology & Defence Acquisition
      • Military Technology
      • Defence Acqn
      • Budgets & Finance
      • Defence Infrastructure
      • Human Resources
    • Multi Domain Studies
      • Jointmanship & Integration
      • Space
      • Cyber
      • Spl Operations
      • Energy & Environment
      • Defence Eco System
      • Defence Diplomacy
      • HADR
  • Web Archive
  • Events
    • Seminars
    • Webinars/RTD
  • PROMEX
  • University Cell
    • About The Initiative
    • Admission: Eligibility and Procedure
    • Important Information
    • Administration
    • Guides | Supervisors
  • Careers
  • Contact
  • Home
  • About Us
    • Director General
    • Additional Director General
    • Jottings by Director General Emiritus
    • CLAWS Membership
    • Faculty
  • Publication
    • Web Articles
    • Issue Briefs
    • Manekshaw Papers
    • Newsletter
    • CLAWS Journal
    • Scholar Warrior
    • Books
    • Essay
    • Intern Articles
    • External Publications
  • Research Areas
    • Global & Regional Security
      • China
      • Pakistan
      • Afghanistan
      • South Asia
      • Indo Pacific
      • US, EU & Russia
      • MENA
      • CAR
    • National Security
      • National Security Strategy
      • Nuclear Deterrence
      • Non Traditional Threats
      • Intelligence
      • Terrorism & Internal Security
      • Grey Z & IW
      • Security Laws
    • Military Studies
      • Military Doctrine
      • Military Strategy
      • Peace Keeping Ops
      • Military History
      • Military Logistics
      • Out of Area Contingency Ops
      • Leadership
    • Military Technology & Defence Acquisition
      • Military Technology
      • Defence Acqn
      • Budgets & Finance
      • Defence Infrastructure
      • Human Resources
    • Multi Domain Studies
      • Jointmanship & Integration
      • Space
      • Cyber
      • Spl Operations
      • Energy & Environment
      • Defence Eco System
      • Defence Diplomacy
      • HADR
  • Web Archive
  • Events
    • Seminars
    • Webinars/RTD
  • PROMEX
  • University Cell
    • About The Initiative
    • Admission: Eligibility and Procedure
    • Important Information
    • Administration
    • Guides | Supervisors
  • Careers
  • Contact
No Result
View All Result
CLAWS
No Result
View All Result
Home Articles

Clausewitz, pagers, and the evolving art of supply chain attacks

Lt Gen (Dr) Sanjay Sethi, AVSM, VSMbyLt Gen (Dr) Sanjay Sethi, AVSM, VSM
November 28, 2024
in Articles
A A
0
Post Views: 35

Clausewitz defined war as a duel on an extensive scale, an act of violence intended to compel the opponent to submission. Violence, the use of physical force, was the means to achieve the terminal objective. War, according to Clausewitz, was nothing but the application of military force, and all other activities, including those related to the maintenance of the military, were subservient to it. [1] Jomini, a contemporary of Clausewitz, proposed an alternate theory of war, which stated that the art of war consisted of five principal parts – strategy, grand tactics, logistics, tactics of different arms, and art of the engineer. [2] The relevance and importance attached to logistics has slowly grown ever since the word was used by Jomini in the context of the military.

A review of military literature from over the last two centuries would make it apparent that two principal Clausewitzian ideas have dominated almost all militaries. First, that the primary function of the soldier is to use the tools of war in combat, and not to fashion them or provide them; and second, that the material forces have not yet diminished the classic and decisive role of courage, leadership, and the arts of command. [3]

The recent pager attack in Lebanon, in some manner, has significantly challenged the above stated ideas. The act of maintenance of the forces, previously deemed subservient, has been converted into a primary tool of war and has produced violence of an unprecedented nature and scale. The pager attack has been classified in media as a supply chain attack; but since it doesn’t have a historical parallel, it is essential to dwell on its definition before proceeding further.

The supply chain is a set of firms that move material forward, or a set of organisations linked by upstream or downstream movement of materials or/ and services, information and finances; all between a source and a customer. Management of these firms, which are linked to form a supply chain, is defined as supply chain management, a concept which took shape in eighties and has seen increasing prominence since the mid-nineties. Globalisation, focus of the industry on developing core competencies, aspiration to achieve specialisation, initiatives to enhance supply chain collaboration, growth of electronic data interfaces, and ready to use enterprise applications have fuelled the growth of supply chains to achieve competitive advantage. All of this has enhanced global inter-dependencies, which often provide a source of turbulence in the supply chain. A supply chain attack essentially involves the discrete exploitation of a weak link in the set of firms that form a supply chain, with the purpose of achieving one’s own objectives with respect to the end users of the supply chain’s products.

The objectives of supply chain attacks in the past have been the stealing of information, causing a disruption in operations of the target company, stealing money, or causing damage to an organisation’s reputation. Such attacks were caused by injecting malicious code in open-source software or even commercial software, import of foreign products with malicious code, by compromising of hardware or firmware at the manufacturing stage, and by third party vendors or suppliers who are part of the supply chain and have access to networks or products.

A recent and one of the classic supply chain attacks is that of Solar Winds, a company providing SaaS solutions for IT Infrastructure, supply management, and network administration. The company offered a product called Orion for IT performance management, which was used worldwide. Orion, on account of its role, had access to performance logs and customer data, making it an extremely lucrative target. Malicious actors made a supply chain attack by targeting third-party resources to insert malicious code into the Orion framework, and created a backdoor to access system files and hide their tracks by blending into Orion activity. The attack is estimated to have infected more than 18,000 systems worldwide, causing irreparable damage worth billions of dollars to both government and corporate organisations. [4]

The deadly attack that caused thousands of pagers to explode in Lebanon also fits into the category of supply chain attack, but is distinctly different in scale and intended effect on the target. It is the first supply chain attack which has had a violent dimension, causing loss of human life and property. The intervention in supply chain here was not limited to software code and circuit boards, but also included the insertion of explosives and a detonation mechanism, both of which remained safe in transit and use. The product’s design features were also carefully chosen by the attacker, like ruggedness, being waterproof, and a long battery life with an heavy over-sized battery that could facilitate the insertion of lethal explosives. The two-step message decryption process ensured that the user was in close proximity of the product when it was triggered.

The attacker obviously exploited a weak link in the commercial electronics supply chains or impersonated one. Thus, apart from the damage and destruction it has caused, the attack has also exposed the vulnerability of commercial supply chains to physical interference, primarily on account of their complexities and inter-dependencies.
More importantly, the detection of such interference with products as they move downstream to the end users is not easy. It has also brought to fore the potential of ordinary electronic devices to cause physical damage to a targeted community.

The attack on Hezbollah marks a significant shift in the trends of supply chain attacks, as it has substantially enhanced the value of risk associated with the common user electronics supply chain. From the industry perspective, the method of establishing trust between supply chain partners is now an even bigger problem, especially when such partners are in foreign countries. Supply chains would also view dependence on oversees manufactures as a grave risk, which may lead to alteration in the existing supply chain designs. Also, the attack would prompt original equipment manufacturers (OEM) to build in additional inspections which will lead to penalties in terms of cost and time. The governments would in all probability consider imposing additional customs checks to safeguard themselves from such attacks, adding to supply chain delays. There would also be a requirement for enhancing the physical security of common electronics goods as they move within the supply chain to prevent interference in transit.

What does the supply attacks mean for the military? Are they also vulnerable? The obvious answer is that the military also needs to protect itself from such supply chain attacks. The extended military supply chains are highly complex and their dependencies are fairly large on account of the use of critical and scarce technologies. Both the indigenous and imported goods that reach the military users are manufactured by OEMs who have dependencies on hundreds of suppliers, and in case of bigger platforms, it may go up to thousands of vendors and third party suppliers. In most cases, the OEMs don’t even share with the buyer details of backend participants in their supply chain for purely commercial reasons. It is only a corollary to all of the above arguments that in the near future, supply chain intelligence will become of increasing importance, not only for the corporates who were already practicing it in some form, but also for the military.

The pager attack should be seen as a note of caution by all military supply chains, and should lead to institution of stricter final acceptance inspection standards for all inbound deliveries. Also, it calls for a systemic review of procurement manuals and acquisition procedures with a view to make them safe from effects of a supply chain attacks. While that may take time, future requests for proposal should be modified to include provisions that help in ensuring traceability of components provided by third party vendors, and also include a process to establish credentials of such vendors.

The pager attack has revealed the potential of causing targeted violence on a large scale by exploiting supply chain vulnerabilities. The attack will bring a paradigm shift in supply chain management, both for the military and corporates. Achieving competitive advantage will now become subject to supply chain security. More importantly, complete atmanirbharta will become increasingly important, not only for India but for all nations.

Bibliography

[1]      C. v. Clausewitz, On War, New Delhi: Natraj Publishers, 2013.

[2]      B. D. Jomini, Art of War, New Delhi: Kaveri Books, 2012.

[3]      C. R. Shrader, United States Army Logistics 1175-1992, Honolulu, Hawaii: University Press of Pacific.

[4]      Baivab Kumar Jena, “SolarWinds Attack And All The Details You Need To Know About It,” 13 Aug 2024. [Online]. Available: https://www.simplilearn.com/tutorials/cryptography-tutorial/all-about-solarwinds-attack. [Accessed 3 Oct 2024].

Previous Post

Evolving Paradigm in Tibet with Civil-Military Dual-Use Integrated Approach: Options for India to Transform Geostrategic Deterrence into Compellence

Next Post

Manoeuvre Warfare in Counter Insurgency/ Counter Terrorism Operations

Lt Gen (Dr) Sanjay Sethi, AVSM, VSM

Lt Gen (Dr) Sanjay Sethi, AVSM, VSM

Next Post
Manoeuvre Warfare in Counter Insurgency/ Counter Terrorism Operations

Manoeuvre Warfare in Counter Insurgency/ Counter Terrorism Operations

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Support Us Donate Now

Web Updates

List of Shortlisted Officers / Candidates: PhD Batch – 7

Field Marshal Manekshaw Essay Competiton 2025

Guidelines to Publish with CLAWS

Summer Internship Capsule 2025

Application Form – Study Mtrl for DSSC 2025

[NEW] Application Form for membership for PROMEX (PART B or D)

  • Trending
  • Comments
  • Latest

Summer Internship Capsule 2025

April 8, 2025
Pahalgam Response: Why India Must Fight Smart?

Pahalgam Response: Why India Must Fight Smart?

May 2, 2025
Results | Field Marshal Manekshaw Essay Competition – 2024

Results | Field Marshal Manekshaw Essay Competition – 2024

April 2, 2025
Op Sindoor 2.0: Why & How India Must Prepare for the Next Round?

Op Sindoor 2.0: Why & How India Must Prepare for the Next Round?

May 21, 2025

Front Organisations: The Valley’s Homegrown ‘Resistance’ or Pakistan’s Evolving Terrorism Tactics?

2
RISING TENSIONS IN KATHUA

RISING TENSIONS IN KATHUA

1
The Art of Negotitations Three Day Capsule Course | 07th – 09th May

The Art of Negotitations Three Day Capsule Course | 07th – 09th May

1
Condolences, Condemnations and Silence: India’s neighborhood reacts to Pahalgam (South East Asia)

Condolences, Condemnations and Silence: India’s neighborhood reacts to Pahalgam (South East Asia)

1
Pakistan-Occupied Kashmir: The Strategic Centre of Gravity in South Asia

Pakistan-Occupied Kashmir: The Strategic Centre of Gravity in South Asia

June 4, 2025
Echoes Across the Line: PoJK post Op Sindoor

Echoes Across the Line: PoJK post Op Sindoor

June 2, 2025
Russia-Ukraine War: Lessons from an Electronic Warfare (EW) Perspective

Russia-Ukraine War: Lessons from an Electronic Warfare (EW) Perspective

May 31, 2025
Military Diplomacy or Strategic Coercion? China’s Defence Engagement with Pakistan: Consequences for India

Military Diplomacy or Strategic Coercion? China’s Defence Engagement with Pakistan: Consequences for India

May 31, 2025

Popular Stories

  • Summer Internship Capsule 2025

    0 shares
    Share 0 Tweet 0
  • Pahalgam Response: Why India Must Fight Smart?

    0 shares
    Share 0 Tweet 0
  • Results | Field Marshal Manekshaw Essay Competition – 2024

    0 shares
    Share 0 Tweet 0
  • Op Sindoor 2.0: Why & How India Must Prepare for the Next Round?

    0 shares
    Share 0 Tweet 0
  • Field Marshal Manekshaw Essay Competiton 2025

    0 shares
    Share 0 Tweet 0

About us

CLAWS

The Centre for Land Warfare Studies (CLAWS), New Delhi, India is an independent think tank on strategic studies and land warfare. The mandate of CLAWS covers national security issues, conventional military operations and sub-conventional warfare.

Follow Us

Browse by Category

  • Articles
  • Autumn 2019
  • Autumn 2020
  • Books
  • CLAWS Focus
  • CLAWS Journal
  • Essay
  • Events
  • External Publications
  • FMMEC
  • Intern Articles
  • Issue Briefs
  • Jottings by Director General Emiritus
  • Manekshaw Papers
  • Newsletter
  • Round Tables
  • Scholar Warrior
  • Seminars
  • Uncategorized
  • Web Updates
  • Winter 2019
  • YouTube Podcast

Recent News

Pakistan-Occupied Kashmir: The Strategic Centre of Gravity in South Asia

Pakistan-Occupied Kashmir: The Strategic Centre of Gravity in South Asia

June 4, 2025
Echoes Across the Line: PoJK post Op Sindoor

Echoes Across the Line: PoJK post Op Sindoor

June 2, 2025
  • Site Map
  • Tenders
  • Advertise With Us
  • Terms of use
  • Privacy Policy
  • Other Think Tanks

© 2008-2024 Centre for Land Warfare Studies (CLAWS).

No Result
View All Result
  • Home
  • About Us
    • Director General
    • Additional Director General
    • Jottings by Director General Emiritus
    • CLAWS Membership
    • Faculty
  • Publication
    • Web Articles
    • Issue Briefs
    • Manekshaw Papers
    • Newsletter
    • CLAWS Journal
    • Scholar Warrior
    • Books
    • Essay
    • Intern Articles
    • External Publications
  • Research Areas
    • Global & Regional Security
      • China
      • Pakistan
      • Afghanistan
      • South Asia
      • Indo Pacific
      • US, EU & Russia
      • MENA
      • CAR
    • National Security
      • National Security Strategy
      • Nuclear Deterrence
      • Non Traditional Threats
      • Intelligence
      • Terrorism & Internal Security
      • Grey Z & IW
      • Security Laws
    • Military Studies
      • Military Doctrine
      • Military Strategy
      • Peace Keeping Ops
      • Military History
      • Military Logistics
      • Out of Area Contingency Ops
      • Leadership
    • Military Technology & Defence Acquisition
      • Military Technology
      • Defence Acqn
      • Budgets & Finance
      • Defence Infrastructure
      • Human Resources
    • Multi Domain Studies
      • Jointmanship & Integration
      • Space
      • Cyber
      • Spl Operations
      • Energy & Environment
      • Defence Eco System
      • Defence Diplomacy
      • HADR
  • Web Archive
  • Events
    • Seminars
    • Webinars/RTD
  • PROMEX
  • University Cell
    • About The Initiative
    • Admission: Eligibility and Procedure
    • Important Information
    • Administration
    • Guides | Supervisors
  • Careers
  • Contact

© 2008-2024 Centre for Land Warfare Studies (CLAWS).