110 likes | 264 Views
Chapter 16. Electronic and Information Warfare. Basics. Electronic Attack Deception Soft Kill/Hard Kill Electronic protection Electronic Support. Communication Systems. Radio Systems Point to point and broadcast Fixed sites, HQ to political leadership Covert assets, agents in field
E N D
Chapter 16 Electronic and Information Warfare
Basics • Electronic Attack • Deception • Soft Kill/Hard Kill • Electronic protection • Electronic Support
Communication Systems • Radio Systems • Point to point and broadcast • Fixed sites, HQ to political leadership • Covert assets, agents in field • Tactical communications • Control and telemetry messages
Signals Intelligence techniques • Mapped enemies network • RDF Radio Direction Finding • Traffic analysis • Identify “interesting” messages • Signal collection • Echelon
Attacks on Communications • Easier to steal key material than crack encryption • Content access not always the goal • Jamming can be effective also • Active deception • Disruption of capabilities • Hard kill • Soft kill
Protection techniques • Dedicated lines optical fiber • Highly directional transmission links • Low probability of intercept (LPI) • Low probability of position fix (LPPF) • Frequency hoppers, direct spread spectrum, burst transmission, Meteor scatter
Interaction Military Civilian • GPS • Military initially limited accuracy • During Gulf war lack of military units required use of civilian units and hence had to turn off limiting • FAA found ways around limited availability • 2000 turned off limited capability • Mobile phones
Skipped • Radar • IFF systems
Directed Energy Weapons • Will address in article (DEW) • Information Warfare • Desert Storm • Cruise missiles • Jammers • Special forces • Hacking attacks on computers and networks
Other notions • Many comparisons between Military and civilian issues • Pages 342-343 • E-war versus I-War • Pages 343-344
Articles • Meteor scatter uses • Current use of Directed Energy Weapons