Operation Orchard
Operation Orchard
Operation Orchard
3. In all matters of preemption, relevant international law warrants serious attention. During
the attack on Osiraq in 1981, Israeli fighter-bombers destroyed Iraq's nuclear reactor before
it was ready to go on line. Immediately following the attack, the general global community
reaction was hostile. Under the long-standing customary right of anticipatory self-defense,
every state is entitled to strike first whenever the danger posed is "instant, overwhelming,
leaving no choice of means and no moment for deliberation." If anything, this standard,
which dates back to 1837 (in a naval incident known formally as "The Caroline"), is
compelling in the nuclear age.
4. Regarding the 2007 Israeli Operation Orchard, then Israeli Prime Minister Ehud Olmert,
consciously reasserted the 1981 "Begin Doctrine," this time referencing the Deir ez-Zor
region of Syria. Several years later, in April 2011, the U.N.'s International Atomic Energy
Agency authoritatively confirmed that the bombed Syrian site had indeed been the start of
a substantial nuclear reactor. Indisputably, Olmert's decision, like Begin's earlier one, turned
out to be right.
5. "Defensive warfare does not consist of waiting idly for things to happen," counsels Carl von
Clausewitz in his classic, "On War." "We must wait only if it brings us visible and decisive
advantages." Israel chose not to wait in 1981 and 2007. As a welcome result, the world tody
does not have the same nuclear fears for Syria and Iraq that it harbors for North Korea and
Pakistan.
B. The Milestones
B.1. The Proof
a. The Syrian nuclear reactor was referred to as the Al Kibar site. The nuclear
reactor was produced with the help of North Korea. Assad conducted the
nuclear project in great secrecy. The contacts with North Korea were
coordinated by the head of the Atomic Energy Commission, Othman, and Gen.
Muhammad Suleiman, the regime’s person for dark ops, who also oversaw
military relations with Iran and Hezbollah. This small and secret coterie headed
by Suleiman was directly subordinate to the President. In Israel it was called
“the shadow army.”
3 | Page
thermal system that the bombs had hit the structure. The facility was totally
destroyed. Upon hitting the target, the leading F-16 broadcasted the word
“Arizona” on long-range radio back to Tel Aviv. On hearing the codeword
“Arizona”, everyone was jumping up and down in the operation room. It was
12:25 AM, Israel time, on Friday, 6th September.
d. Then the jets started to fly back, in accordance with the planning, at a low
altitude. On the way back, in order to reduce weight and save fuel, one of the
planes jettisoned an empty fuel container which landed on the Turkish side of
the Syrian-Turkish border. The commandos were extracted. All Israeli aircrafts
landed at the base safely at 1:30 AM.
e. After the attack, MI chief Yadlin went to the Turkish chief of staff to explain the
considerations and circumstances and to reassure him that there had been
absolutely no violation of Turkish sovereignty during the operation. The Turks
were not happy, but they decided not to make an issue of it.
f. Shortly after the arrival of the planes, Olmert phoned American President, who
was on a visit to Australia and informed him about the attack. The following
afternoon, the Syrian news agency issued a laconic statement to the effect
that during the night its air defense system had chased away Israeli planes
that had penetrated Syria’s air space.
g. The Syrian regime completed the destruction of the bombed building and
buried the ruins in sand. When the IAEA wanted to visit the site, the Syrians
claimed there was nothing to see because there had been nothing there. Yet
in 2008, IAEA inspectors found traces of radioactive substances there, and
the agency said there was a high probability that a nuclear reactor had been
in operation at the site.
4 | Page
causing tangible physical damage to the equipment the adversary uses to
collect, process and disseminate its battlefield knowledge.
b. Since the Bekaa Valley engagements in 1982, Israel has used unmanned
drones to provoke Syrian surface-to-air missile (SAM) systems into ‘lighting
up’ and thus revealing their emissions signatures to lurking sensor platforms,
such as Rivet Joint.
c. Prior to the main attack, the strike force attacked a Syrian air defence facility
at Tall al-Abyad, near the Turkish border. The site, which comprised of two
radar systems and probably a mix of SAMs, was damaged and disabled with
a mix of electronic attack and conventional PGMs. The penetration of the
Syrian ADS network involved corrupting the radar application and hijacking of
the broader system through viral propagation across the computer network.
5 | Page
Syrian Radar started showing Multiple Aerial Targets
e. This was no mean feat considering that Syria had the densest and most
comprehensive air defence system (ADS) in the region. How did the non-
stealthy F-15s and F-16s penetrate the Syrian ADS perimeter without being
detected?
C.2. Syrian Air Defence
a. With nearly 200 active surface-to-air missile (SAM) batteries and early warning
(EW) complexes, Syria had the largest integrated air defence system (IADS)
in the Middle East. Long-range S-200 was received by Syria in 1984. Syria's
EW network had 27 EW complexes that relied primarily on the PantsyrS1E
system. The Pantsyr-S1E system combined command-guided missiles with
twin 30 mm guns. It could shoot down incoming precision-guided munitions
and is useful for defending key installations or weapon systems. Syria also
had two state-of-the art radar systems from Russia, reckoned to be Tor-M1
launchers that carry a payload of eight missiles, as well as two Pachora-2A
systems.
b. There were numerous deficiencies in the Syrian IADS that could be exploited
by adversaries. Terrain was the most significant one. The mountains of
western and southern Syria produced blind zones and limited the
effectiveness of SAM engagement radars to identify targets, particularly at
lower altitudes. Hostile aircraft could use 'terrain masking' where they put high
ground between themselves and a SAM battery's radar systems.
6 | Page
c. Although the Syrian ADS was extensive in all respects, the quality of the
systems deployed was uneven. The ADS network was centralised and
communicated on dedicated frequencies.
d. The network has been improved by the incorporation of the S-300P-series
system. Modern Chinese radar systems inducted, are designed to limit the
effectiveness of any network-centric warfare attempts to degrade it. Israel
claims that it possessed indigenously developed countermeasures that were
designed to defeat S-300 series systems.
e. A series of Israeli air strikes that were carried out in 2013, involved weapons
launched from outside Syrian territory. This was in contrast to the long-range
deep penetration that Israeli aircraft carried out in September 2007, indicating
the improved Syrian capabilities.
C.3. Network Centric Collaborative Targeting (NCCT) Program
a. The USAF has pursued a highly classified initiative called the “Big Safari”. Big
Safari emphasizes integration of ISR (intelligence, surveillance and
reconnaissance), space and information operations to defeat threats of special
concern. Israel used a similar system for the Operation Orchard.
b. The program has two modules, Suter and Network Centric Collaborative
Targeting (NCCT). The Suter program (named after its creator Colonel
Richard ‘Moody’ Suter) focuses on invading communications networks and
taking over as systems administrator. The prime contractor for Senior Suter
was BAE Systems. NCCT enables a network of sensors to collaborate in
determining the location of a target with minimal human intervention. The
prime contractor for NCCT was L-3 Communications.
c. The Suter program first emerged in 2002. Pentagon modified the capabilities
of the EC-130H Compass Call aircraft to support Operation Iraqi Freedom.
Subsequently, US forces in Iraq used the "Compass Call" to prematurely set
off insurgent IEDs along convoy routes. NCCT and Suter were also tested in
a limited way operationally in Iraq and Afghanistan against insurgent
communication networks.
d. NCCT mimics the way the human central nervous system instantaneously
focuses the eyes on the potential source of a threatening sound. When an
enemy asset communicates or moves, a sensor platform will get a line of
bearing on it. It will further alert the other sensors to focus on the enemy asset
and provide corroborating evidence of the enemy’s identity and location. The
sensors can pick up even relatively weak signals such as those from cell
phones and can detect other C2 components that produce electromagnetic
signatures.
e. Once two other sensors detect the asset, the NCCT system automatically
calculates the location of the asset to within a few hundred feet. NCCT reduces
the time needed to locate a target from hours or minutes down to seconds.
f. The NCCT then compares the signals to dynamic databases of previously
collected signals to ascertain, even the individual identity of the emitting
enemy unit using radio finger printing technology.
C.4. Suter Program
a. Once NCCT localizes and identifies the target, Suter goes to work. The Suter
technology enables USAF operators to invade enemy communications and
7 | Page
computer networks, particularly those associated with integrated air defence
systems, while preventing enemy operators from understanding or
counteracting the exact nature of the invasion. Suter reduces the target zone
initially calculated by NCCT by at least an order of magnitude, which implies
tens of feet. After pinpointing the target antennas, Suter beams electronic
pulses into the antennas that effectively corrupt, the processing systems that
present the enemy operators with their physical picture of the battlefield. It is
widely speculated that Digital Radio Frequency Memory (DRFM) technology
was used to feed misleading information to the Syrian air defence radar
system. The data streams insert customized signals, including specialized
algorithms and malware, into the vulnerable processing nodes.
b. Corruption of an ADS network results in fabrication of phantom targets and
fake messages. Suter operators then take over control of enemy radars. By
steering the enemy sensors away from friendly aircraft, Suter operators can
figuratively put blinders on the enemy operators. Consequently, friendly
aircraft don’t have to be stealthy. Even if the operators know they’re being
hijacked, regaining control of the system is not easy.
c. Suter has two generic parts: one for inserting input and one for monitoring
output. Block one encompasses the second task, ie monitoring the infected
system. Technology from this block allows friendly operators to monitor what
enemy radars see. The main platform for this collection task is the RC-135
Rivet Joint electronic surveillance aircraft. Rivet Joint is based on the
venerable KC-135 strategic tanker airframe, designed for high altitudes, fast
subsonic speeds, and long ranges or loiter times. The platform can carry aloft
for extended periods large quantities of gear necessary to perform passive
monitoring.
d. Block two encompasses the input insertion task. This allows friendly operators
to inject a malware and seize control of enemy networks and physically
manipulate enemy sensors. This involves control over the electromagnetic
vectoring of radar beam produced by the non-rotating SAR (synthetic aperture
radar). It also involves mechanical shifting of the array panels away from
bearings that would point towards friendly aircrafts.
C.5. Platforms Used
a. The main platform for this insertion task is the EC-130 Compass Call electronic
attack aircraft. Compass Call is based on the C-130 Hercules tactical cargo
transport. Relative to Rivet Joint, Compass Call flies lower, slower, and
shorter, but this profile maximises the aiming precision of it’s signal beams.
Israel replicated the system architecture of blocks 1 and 2 when it deployed
its two new Gulfstream G550 special mission aircraft, equipped with the IAI
Elta EL/W-2085 radar system. The intelligence version monitors hostile
signals traffic, while the surveillance version pumps out invasive data streams
from onboard phased-array radars.
8 | Page
EC-130 Compass Call aircraft
b. More recently, the Suter programme added a block 3, which focuses
specifically on penetrating networks controlling time-critical and tactically
elusive targets, such mobile missile launchers. Block 3 does not add new
tasks, but rather refines Suter technology to meet more stringent mission
requirements.
c. Although not part of the NCCT or Suter programs as such, the USAF network
attack package also includes the F-16CJ, which focuses on suppressing
enemy air defences using traditional weapons. Should the Suter electronic
attack fail, the F-16CJ can electronically jam or destroy enemy radar and
communications assets the old-fashioned way, using anti-radiation missiles or
other PGMs. Compass Call can jam enemy radar too.
d. In executing the 6 September raid, the IAF apparently used many of the
offensive options mentioned above. According to US observers, the strike
force used some traditional jamming, which is still an important means of
defeating air defence systems.
D. Conclusion
1. There had been indications that the Syrian government had been interested in acquiring
nuclear weapons for decades, dating back to the regime of Hafez Al Assad. The big break
came in 2007, when Israeli agents obtained actual photographs of the reactor under
construction inside the building and what appeared to be North Korean specialists working
at the site.
2. Operation Orchard showed the capabilities of the Israeli Air Force. The capabilities were
later used to carry out an air strike on a weapons convoy and military complex near
Damascus, at the beginning of 2013. As done in 2007, on the night between 29th and 30th
January 2013, Israeli bombers entered and egressed the Syrian airspace almost completely
undetected by the Syrian air defenses: a sign that Syrian radars can do nothing against
9 | Page
Israel’s Electronic Warfare systems, most probably further improved to embed the capability
to inject malware from F-16s into enemy networks.
3. The strategy of not jamming radar signals and using a more sophisticated approach of
"hacking" into enemy defences is new. The process involves locating enemy emitters with
great precision and then directing data streams into them that can include false targets and
misleading message algorithms. This signals the beginning of a new era in Electronic
Warfare.
10 | Page