Transcript Chapter 16

Chapter 16
Electronic and Information Warfare
Basics

Electronic Attack
Deception
 Soft Kill/Hard Kill

Electronic protection
 Electronic Support

Communication Systems

Radio Systems

Point to point and broadcast
Fixed sites, HQ to political leadership
 Covert assets, agents in field
 Tactical communications
 Control and telemetry messages

Signals Intelligence techniques
Mapped enemies network
 RDF Radio Direction Finding
 Traffic analysis



Identify “interesting” messages
Signal collection

Echelon
Attacks on Communications
Easier to steal key material than crack
encryption
 Content access not always the goal

Jamming can be effective also
 Active deception


Disruption of capabilities
Hard kill
 Soft kill

Protection techniques
Dedicated lines optical fiber
 Highly directional transmission links
 Low probability of intercept (LPI)
 Low probability of position fix (LPPF)


Frequency hoppers, direct spread spectrum,
burst transmission, Meteor scatter
Interaction Military Civilian

GPS
Military initially limited accuracy
 During Gulf war lack of military units
required use of civilian units and hence had
to turn off limiting
 FAA found ways around limited availability
 2000 turned off limited capability


Mobile phones
Skipped
Radar
 IFF systems

Directed Energy Weapons
Will address in article (DEW)
 Information Warfare


Desert Storm
Cruise missiles
 Jammers
 Special forces
 Hacking attacks on computers and networks

Other notions

Many comparisons between Military and
civilian issues


Pages 342-343
E-war versus I-War

Pages 343-344
Articles
Meteor scatter uses
 Current use of Directed Energy
Weapons
