Transcript Chapter 16
Chapter 16
Electronic and Information Warfare
Basics
Electronic Attack
Deception
Soft Kill/Hard Kill
Electronic protection
Electronic Support
Communication Systems
Radio Systems
Point to point and broadcast
Fixed sites, HQ to political leadership
Covert assets, agents in field
Tactical communications
Control and telemetry messages
Signals Intelligence techniques
Mapped enemies network
RDF Radio Direction Finding
Traffic analysis
Identify “interesting” messages
Signal collection
Echelon
Attacks on Communications
Easier to steal key material than crack
encryption
Content access not always the goal
Jamming can be effective also
Active deception
Disruption of capabilities
Hard kill
Soft kill
Protection techniques
Dedicated lines optical fiber
Highly directional transmission links
Low probability of intercept (LPI)
Low probability of position fix (LPPF)
Frequency hoppers, direct spread spectrum,
burst transmission, Meteor scatter
Interaction Military Civilian
GPS
Military initially limited accuracy
During Gulf war lack of military units
required use of civilian units and hence had
to turn off limiting
FAA found ways around limited availability
2000 turned off limited capability
Mobile phones
Skipped
Radar
IFF systems
Directed Energy Weapons
Will address in article (DEW)
Information Warfare
Desert Storm
Cruise missiles
Jammers
Special forces
Hacking attacks on computers and networks
Other notions
Many comparisons between Military and
civilian issues
Pages 342-343
E-war versus I-War
Pages 343-344
Articles
Meteor scatter uses
Current use of Directed Energy
Weapons