Featured Post

[Book Review] Jasmine Builds on Shifting Sands: A Self-help Fiction

  I recently bought this book copy for a read and review. Name: [Book Review] Jasmine Builds on Shifting Sands: A Self-help Fiction Auth...

Saturday, June 13, 2009

Indian Army’s Computerisation


I heard recently that Indian army is setting up a Computerised Command & Control System for an Indian Artillery deployment. I felt proud to know that Indian Army is taking the first step towards acquiring network-centric warfare capabilities. This it is doing by inducting a computerised command and control system which will integrate its artillery weapon operations.


It is named as Project Sakthi – Artillery Combat Command and Control System (ACCCS).


As per an Army officer, “The role of ACCCS is to automate and integrate all artillery operational functions and provide decision support at all levels of artillery command from the corps level down to the battery or guns level in a networked environment".

In lay man’s term it means that Shakti, would give the troops the capability to concentrate artillery fire power at operational and tactical levels in a reduced time-frame and deliver a decisive blow to the enemy at the desired place.


It is developed by Army's Directorate General of Information Systems. Also, the Sakthi's three main electronic devices -- Enhanced Tactical Computer, Gun Display Unit and Hand Held Computer -- are produced by the defence public sector undertaking Bharat Electronics Limited.


All this looks hunky dory. I want to stand corrected, if I’m wrong. All these means that controls are being transferred to computers and most of these computers are networked for pure number crunching and decision making and latter to authorize a attack. Does all this not sound like lines from a sci-fi movie? It does and yes, technology is taking us closer to what we once used to call as science fiction.


The point of writing all this is to express my apprehensiveness about the ability of Indian Army in general and Indian Defense forces in particular to withstand computer hacking attacks. There has been increasing news of high quality hacking attacks targeted at defense networks. I’m not a cynic, but, I’m just playing the role of a critic who wants the best to come out. What will come if highly talented hackers from Pakistan, Russia, Ukraine, America, etc. get a foothold onto this system and crumble it completely or worse they direct the systems to attack India and India defense forces? What then?


I don’t have an answer to these questions. But, I sincerely hope that Indian Defense Forces have not one, but several answers to all these questions. Amen!

3 comments:

  1. Well, a very informative piece of writing indeed. Also, its nice to see that our Army is finally coming at par with the other sophisticated armed forces of the developed countries. Its nice to know that we are now in much more efficient hands, who alongwith their valor, also are up-to-dated with the latest in technologies. But, as rightly pointed out by you, with technology comes its drawbacks........Till now we have been reading about the security breaches in the pentagon, white house et al, all because of their high dependency on technology. Thus, by opting for these new technologies, we sure are exposing ourselves to new threats of hackers, virus attacks etc. With our arch-rival being the first developer of a virus, we sure need to brace ourselves for the potential cyber attacks. Hope that our mighty army is able to take care of it.

    Finally, thank you for this informative read, hope to see some more good stuff coming from your side.

    ReplyDelete
  2. Laghu,

    Just a few quick clarifications. Firstly, such a system, with the existing technology threshold, acts as an aid to decision making and implementation, and does not replace the human decision maker. The authorisation remains with the man behind the machine.
    Yes, there hacking / other forms of Information warfare are realtime threats. But remember, such systems are not connected to the internet or other networks. Therefore, the point of access would require physical compromise - which, in any case would jeopardise even a conventional system.
    Cheers
    Aggi
    http://jottingsofmine.blogspot.com

    ReplyDelete
  3. Hey keep posting such good and meaningful articles.

    ReplyDelete