Electronic Warfare For The Digitized Battlefield PDF
Electronic Warfare For The Digitized Battlefield PDF
Electronic Warfare For The Digitized Battlefield PDF
Electronic Warfare
for the Digitized Battlefield
Michael R. Frater
Michael Ryan
Artech House
Boston London
v.;ww.artechhouse.com
Electronic warfare for the digitized battlefield I Michael R. Frater, Michael Ryan.
p. em. - (Arrech House information warfare library)
Includes bibliographical references and index.
ISBN
I -58053-27 I -3
(aile paper)
3. I nform ation
warf;ue.
II. Tirle.
Ill. Series.
623'.043-dc21
Elcnronlc \\'arf:ue
ldmr)
I'm
the
lh!,!itlt.ctl
!. T1tk
(}23'.0,1.1
All right,
rol'J'\'ct l .
ma: he reproduced
Ill
or
.til\'
witho u t
to
hec l l appropriately Ctpit:di;.ed. Artech llouc L.tllllOt .lttl't to the accuracy or this inl(mnation.
:IS : d
or service marl\.
lnrcrnation:d
St:lndard
Bouk
Numher:
1-51-!05.1-271-3
Tecting the
IOH7(,5!J321
Contents
Preface
XIII
1.1
1.2
1.2.1
The C2 Cycle
1.2.2
Command Systems
1.3
Information Warfare
11
1.4
Electronic Warfare
12
1.4.1
14
1.4.2
EW Subdivisions
15
1.4.3
Other Categories of EW
16
1.5
Summary
16
Endnotes
18
21
2.1
Introduction
21
21
25
VI
27
2.5
30
2.5.1
32
2.5.2
Trunk Nodes
32
2.5.3
Bearers
35
2.5.4
Access Nodes
36
2.5.5
37
2.5.6
38
2.5.7
39
2.6
CNR Subsystem
40
2.6.1
40
2.6.2
Range of Communications
44
2.6.3
45
2.7
47
2.8
49
2.8.1
51
2.9
53
Summary
54
Endnotes
54
Electronic Protection
57
3.1
Introduction
3.2
3.2.1
Identical Equipment
3.2.2
Shielding
3.2.3
Emission Control
3.2.4
Directional Antennas
3.2.5
Frequency Management
3.2.6
Alternate Means
3.2.7
Siting
2.4
2.10
Contents
'/...
vii
3.3
61
3.3. 1
Encryption
63
3.3.2
Spread-Spectrum Communications
70
3.3.3
Error-Protection Coding
84
3.3.4
Burst Transmission
87
3.3.5
Narrowband Excision
88
3.3.6
Diversity
89
3.4
89
3.4. 1
CNR
89
3.4. 2
90
3.4.3
90
3.4.4
92
3.4.5
93
3.4.6
IS-95
93
3.4.7
GSM
95
Endnotes
96
Electronic Suort
99
4. 1
Introduction
99
4.2
Search
1 00
4.2. 1
Narrowband Receivers
101
4.2.2
Wideband Receivers
1 03
4.2.3
1 07
4.3
Intercept (Monitoring)
1 12
4.3 . 1
1 13
4.3.2
Intercept Receivers
1 14
1 17
viii
4.4
Direction Finding
1 19
4.4. 1
Sources of Error
1 22
4.4.2
1 23
4.4.3
Warson-Watt DF
124
4.4.4
Wullenweber DF
1 28
4.4.5
Doppler DF
1 28
The D F Baseline
1 30
4.4. 7
1 32
4.5
Analysis
1 35
4.5. 1
Traffic Analysis
1 35
4.5.2
Cryptanalysis
1 36
4.5.3
1 36
4.6
ES Platforms
1 38
4.6. 1
Ground Platforms
138
4.6.2
Air Platforms
1 39
Endnotes
1 40
Electronic Attack
1 43
5.1
Introduction
1 43
5.2
Jamming
1 44
5.2. 1
Jamming-to-Signal Ratio
145
5.2.2
Jamming Signals
1 46
5.2.3
1 47
5.2.4
Operational Factors
1 53
5.2.5
1 53
5 .2.6
1 55
v4.4.6
5.2.7
Jamming Platforms
5.3
Electronic Deception
5.3. 1
5.3.2
Contents
ix
5.3.3
161
5 .3.4
1 62
5.3.5
Received Power
1 63
5.4
N eurralization
1 64
5.4 . 1
Laser Weapons
164
5.4 .2
High-Power RF Weapons
1 66
Endnotes
1 66
1 69
6. 1
Introduction
1 69
6.2
EW Unit Organization
171
6.2 . 1
Electronic Attack
174
6.2.2
Electronic Support
175
6.2.3
1 76
6.3
1 77
6.4
1 79
6.4. 1
Decision
1 80
6.4.2
Detection
1 84
6.4.3
Delivery
185
6.4.4
Assessment
185
6.4.5
1 86
6.4.6
Deception Planning
1 87
6.5
Collection Management
1 88
6.5 . 1
1 88
6.5.2
1 89
6.5 .3
1 89
6.5.4
1 90
6.5.5
191
Endnotes
1 92
1 93
7. 1
Introduction
1 93
7.2
Characteristics of RF DEW
196
7.2.1
1 96
7.2.2
196
7.3
198
7.3 . 1
Front-Door Damage
198
7.3.2
Back-Door Damage
199
7.3.3
200
7.3.4
Propagation Effects
200
7.4
Platform Protection
202
7.4. 1
Avoidance of Illumination
202
7.4.2
Hardening Techniques
202
7.4.3
204
7.5
Analysis: Offensive
205
7. 5 . 1
Delivery Factors
206
7.5.2
Range of RF DEW
207
7.5.3
Delivery Platforms
208
7.5.4
Target Effects
210
7.6
7.6. 1
2 12
7.6.2
Aircraft
213
7.6.3
214
7.6.4
Personnel
214
7.6.5
Support Equipment
2 15
7.6.6
Command Posts
215
7.6.7
Logistics Installations
216
7.7
Summary
216
RF
DEW
RF
Endnotes
8
8.1
Introduction
DEW
211
Contents
xi
8.2
Network Issues
220
8.2. 1
Seamless Integration
220
8.2.2
Mobile Networks
222
8.2.3
Ad Hoc Networks
223
8.2.4
Implications for EW
225
8.3
UWB Radio
229
8.3. 1
Implications for EW
23 1
8.4
HF Radio
233
8.4. 1
233
8.4.2
233
8.4.3
Implications for EW
234
8.5
Software Radio
236
8.5. 1
237
8.5.2
Implications for EW
238
8.6
239
8.6. 1
Quantum Computing
239
8 .6.2
Quantum Cryptography
239
8.6.3
Implications for EW
241
Endnotes
242
List of Acronyms
245
249
Index
251
Preface
Modern land commanders are increasingly dependent on Information Age
systems comprising communications and information systems, networks,
and sensors. While these systems have the potential to produce significant
changes in the conduct and character of war, their reliance on the electromag
netic spectrum also has the potential to increase their vulnerability to interdic
tion by electronic warfare systems.
There have been many books and articles describing noncommunications
electronic waifare, that is, electronic warfare in the context of electronic sensor
systems, particularly radar. In this book we address the critical issues related
to the effect of electronic warfare on the business of command and control on
the digitized battlefield. More specifically, we address the effect of electronic
warfare on the battlefield communications systems that support the command
and control process. This aspect of electronic combat is called communications
electronic waifare. Moreover, we focus on the components and techniques
employed at the tactical level of land warfare, that is, at division and below.
The engineering principles, technology, doctrine, and procedures contained
in this book are drawn from open sources readily available in the public
domain.
Chapter 1 describes the operational environment of the digitized battle
field and examines the process of command and control that is the core
business of the tactical commander. The concept of network-centric warfare
is discussed as an example of a doctrine that is emerging to harness the
power of the information revolution for application to land warfare. This
doctrine is then examined in the context of the heavy reliance that networked
forms of warfare have on the use of the electromagnetic spectrum. The
xiii
xiv
Preface
XV
1
The Digitized Battlefield
1 .1 The Operational Envi ronment
Throughout history, technological, political, and social advances have caused
profound shifts in military doctrine, organization, strategy, and tactics. In
recent history, six revolutions in military affairs have radically altered the
conduct and character of war. The first five were the institution of universal
military obligation (the French Revolution of 1789) , the Industrial Revolu
tion of the midnineteenth century, the managerial revolution of the late
nineteenth century, the mechanized revolution occurring between 1 9 1 91 939, and the scientific revolution that followed shortly afterwards, culminat
ing in the production of the atomic bomb. Then, in the early 1 970s, the
introduction of precision-strike weapons and computers produced the latest
revolution-an information revolution centered on the concept that the
dominant factor in war is the ability to collect, analyze, disseminate, and
act upon battlefield information [ 1 ] .
These advances i n technology have produced an environment o n the
modern battlefield that is characterized by continuous, 24-hour action;
increased volume, lethality, range, and precision of fire; smaller, more effective
units due to better integration of technology; a disjunction between greater
dispersion of more mobile, faster units and an increased tendency for combat
in built-up areas with congestion of forces in short ranges; and a further
dichotomy between greater invisibility, due to dispersion and speed, and
increased risk of detection, due to larger numbers of more capable battlefield
sensors.
before. [4]
There are many books and anicles that addres the issue of warfare in
the Information Age [5] . However, we will focus on the framework articulated
by the U.S. Joint Vision 2020 (JV2020) [6], which provides a useful back
ground for our consideration of electronic warfare on the digitized battlefield.
JV2020 builds upon the conceptual template established in Joint Viion
2010, and has the goal of transforming U.S. forces to create a power that
is dominant across the full spectrum of military operations. Modern armed
forces must be able to defeat adversaries across a wide range of operations
such as conventional warflghting, peace enforcement, peacekeeping, coun
terterrorism, humanitarian assistance, and civil support. In this book, the term
"battlefield" is used to refer generically to operations across the spectrum.
A key component of full-spectrum dominance is hiformation superior
ity-the capability to collect, process, and disseminate an uninterrupted flow
of information while exploiting or denying an adversary's ability ro do the
same. Information superiority can therefore be defined as "that degree of
dominance in the information domain which permits the conduct of opera
tions without effective opposition" [7]. Superior information is to be con
verted ro superior knowledge which, when combined with organizational
and doctrinal adaptation, relevant training and experience, and proper com
mand and control mechanisms and tools, is to achieve decision superiority.
JV2020 proposes that current capabilities for maneuver, strike, logistics,
and protection will become dominant maneuver, precision engagement,
focused logistics, and full-dimensional protection. The following descriptiom
of these terms are taken from the definitions provided in JV2020.
to
Focused logistics. This is the ability to provide the joint force the
right personnel, equipment, and supplies in the right place, at the
right time, and in the right quantity, across the full range of military
operations. This will be made possible through real-time, networked
information systems providing total asset visibility as part of a com
mon relevant operational picture, effectively linking the operator
and logistician across service and support agencies. Through transfor
mational innovations to organizations and processes, focused logistics
will provide the joint warfighter with support for all functions.
Full-dimensional protection. This is the ability of the joint force to
protect its personnel and other assets required to decisively execute
assigned tasks. Full-dimensional protection is achieved through the
tailored selection and application of multilayered active and passive
measures, within the domains o f air, land, sea, and space, and
information across the range of military operations with an acceptable
level of risk. The dimensions of protection range from forward
deployed forces, through supporting logistics, to home commands
and supporting space surveillance and communications systems. One
dimension of protection, for example, is the protection of forces at
garrisons and military bases. Asymmetric terrorist attacks pose a
threat that must be countered by layers of defense including active
human intelligence (HUMINT) on terrorist activities, passive moni
toring of traffic around the base, alert conditions and procedures
for tightening perimeter security, covert intrusion detection sensors,
facility decoys, and levels of physical security access.
: r-
---,ntion---
..
Objects
Information
---------I
I
I
I
I
I
I 1
I
1
II
Control
I
1
I 1
I
I
I I
I
I
I
II
._f!!2s grid_
I
I
Information
1 objects
I
------------------------
I
I
Engagem.:_n:_grid
I
L
__ __
_________
many texts that cover the field [ 1 0] . For our purposes, we do no dwell on
the detail but settle for the following working descriptions.
Command is perhaps best described as the authority vested in an
individual for the direction, coordination, and control of military forces.
Control is the means by which command is exercised. In a simple organiza
tion, the commander does most of the controlling; in a more complex
organization, most of the control functions are delegated to supporting
staff who form a headquarters supporting the commander. Control involves
analysis of requirements, allocation of resources, integration of effort, direc
tion, coordination, and monitoring.
The two terms command and control are inextricably linked-com
mand is hollow without an ability to control; control is toothless without
the authority of command. Therefore, the business of a commander is most
often referred to as command and control (C2), which can be described as
the p rocess of and means for the exercise of authority of a commander over
assigned forces in the accomplishment of the commander's mission. U.S.
doctrine adds that command and control functions are performed through
an arrangement of personnel, equipment, communications, facilities, and
procedures employed by a commander in planning, directing, coordina
ting, and controlling forces and operations in the accomplishment of the
mission [7].
1 .2.1
The C2 Cycle
Information
processing
Surveillance and
target acquisition
Communications
C2
CYCLE
Communications
Decision
making
Action
Communications
Figure 1 .2
The C2 cycle
It is here that the information revolution offers the greatest promise for
improvement, albeit with a corresponding increase in vulnerability. We will
return to that point shortly, but for the moment, we should note the
heavy reliance that the C2 cycle has on technologies that require use of the
electromagnetic spectrum.
The term battlefield digitization has been adopted to refer to the automa
tion, through digital networks and processes, of command and control opera
tions across the full breadth of the battle space. This integration of ground,
air, and space nodes (sensors, communications, command, and weapons
nodes) into a seamless digital network requires the fully compatible digital
exchange of data and common operating pictures to all nodes. Security, '
compatibility, and interoperability factors dominate the drive toward full
d igitization across the entire battle space;
1 .2.2
Command Systems
While the term C2 remains in common use to refer to the processes and .
means for the exercise of authority, the field has spawned many variations
in terminology, for example: command, control, and communications (C3);
communications and information systems (CIS); command, control, com
munications, and intelligence (C3I) ; command; control, communications,
computers, and intelligence (C41); or command, control, communications,
computers, intelligence, surveillance, and reconnaissance (C4ISR). Each of
these terms can be justified by its emphasis on particular vital elements of
the command and control process. For example, without surveillance and
reconnaissance, commanders are blind; without communications they are
isolated, and so on. In the interest of brevity, we will simply consider the
C2 cycle and bring together all of the systems that support it into the generic
term of command systems.
To be successful on the modern battlefield, a commander and staff
must be able to move through the C2 cycle faster than any adversary. Success
in modern warfare depends on tempo, lethality, and survivability. Command
systems must therefore be agile and responsi e to changes in threat and must
be ab le to cope with the influx of huge amounts of information from
intelligence and surveillance systems, both tactical and stategic. In recent
conflicts, this has overloaded tactical communications systems as well as
the labor-intensive intelligence process, making it extremely difficult for the
commander to process and analyze information in a timely manner. The
implementation of automated battlefield information systems offers the only
10
11
1 .3 Information Warfare
While the Information Age has produced a revolution in military operations
that provides a great promise of decisive advantage on the modern battlefield
to the commander who can gather and exploit information most effectively,
there is a significant dark side to the information revolution. As communica
tions and information systems become vital to military and civilian society,
they can become major targets in war and can also serve as a major means
for conducting offensive operations. Consequently, the military adoption of
information technology creates a new vulnerability-the same information
technology that provides the fuel for the networks that support modern
commanders also provides one of the major means for their destruction. An
increased reliance on communications and information systems increases this
vulnerability. So, while automated command systems increase commanders'
situational awareness, they can also be turned against them and used to
contribute to their uncertainty.
It is evident from the preceding discussion that movement through
the C2 cycle on the modern battlefield depends heavily on the use of the
electromagnetic spectrum, whether for surveillance and target acquisition,
passage of information, processing of information, or destruction of adversary
forces. This reliance is a vulnerability that must be exploited in attacking
adversary command systems, while being,. protected in own-force systems.
Operations to counter the C2 cycle are generically termed infonnation waJfare
(IW) , which is a term that recognizes a range of actions taken during conflict
to achieve information superiority over an adversary, and may be defined
as [ 1 4] :
Actions taken to achieve information superiority by affecting adversary
information, information-based processes, information systens, and
computer-based networks while defending one's own information, infor
mation-based processes, information systems, and computer-based
networks.
12
1 .4 Electronic Warfare
Domination of the electromagnetic spectrum is a crucial component of most
modern military operations. There are few battlefield elements that do not
rely on communications and information systems . .A5 discussed earlier, the
C2 cycle depends very heavily on the electromagnetic spectrum to maximize
the effectiveness of surveillance and target acquisition, communications, and
13
Surveillance and
target acquisition
Infor mation
processing
Communications
Communications
Action
Decision
making
Communications
14
give warning of adversary intentions, deceive and disrupt sensors and com
mand and control processes, and safeguard friendly use of the electromagnetic
spectrum.
Although EW is targeted against the tecrynology, the ultimate effect is
on a commander's ability to move through the C2 cycle. The human element
of the command system is both the strongest and weakest link and can fairly
rapidly be enshrouded in the fog of war if supporting communications and
information systems are disrupted, degraded, or deceived.
EW activities are applicable across the whole spectrum of military
operations and are not c<;>nfined to warfare, conventional or otherwise. In
peacetime, armies attempt to intercept, locate, and identify the source of a
potential adversary's electronic emissions. Analysis may then reveal details
of capabilities as well as vulnerabilities that can be used to gain an advantage
in times of conflict.
EW is an area of considerable innovation. Inevitably, and often very
rapidly, advantages gained by technological or procedural change are met
with equally effective countermeasures. In order to maintain the edge in any
future conflict, information on friendly methods of electronic protection
and attack must be safeguarded. Therefore, much of the parametric data
associated with EW capabilities is highly classified. However, the underlying
techniques and relationships can readily be obtained from open source
publications.
1 .4.1
15
EW Subdivisions
Electronic
attack (EA)
Ele ctron ic
protection (EP)
16
1 .4.3
1 .5 Summary
Although the promise of command and control in the Information Age may
stop short of completely dissipating the fog of war, it has the potential to
turn night into day, to achieve spans of control that can be measured in
global terms, and to mass collective combat power without massing forces
[ 1 9] . The enduring lesson from recent conflicts since the Gulf War is that
what can be seen can be hit, and what can be hit can be killed. The function
of "seeing" is now much more sophisticated and entails electronic, optical,
17
Electronic warfare
Passive
Active
Passive
Search
Intercept
Direction finding
Analysis
Jamming
Deception
Neutralization
Active
Siting
Encryption
LPI/LPD
Shielding
Antijam
EMCON
Alternate means
D irectional antennas
Frequency management
Identical equipment
and acoustic sensors that can have global coverage. These sensors can be
linked -in real time to computer-controlled weapon systems with unparalleled
accuracy and lethality. However, this is not enough. The decisive advantage
on the modern battlefield will go to the commander who can gather and
exploit information most effectively. While this is greatly assisted by the
technologies associated with the information revolution, the human element
is arguably the most significant. For example, if computers and communica
tions systems are used to reinforce hierarchical information flows-and there
fore perpetuate the information overloads and bottlenecks-it is the fault
of humans, not technology [20] .
Commanders of the past have adopted most of their practices because
the technology available simply did not allow them to do more. The informa
tion revolution will change that. Commanders can have unparalleled informa
tion available to them; they can "see" the full extent of the battlefield, even
if it spans the globe. Careful thought must now be given to what practices
are the most efficient. Just because it can be done, does not mean that it
should.
Commanders will not have it all their own way, however. Future
command and control systems will heavily rely on communications and
information systems that cannot operate if access to the electromagnetic
spectrum is denied. So, while the information revolution promises to deliver
an enormous improvement in capability to commanders, it also creates
the potential for new vulnerabilities. These new vulnerabilities offer new
opportunities for the application of electronic warfare on the digitized
battlefield.
18
Endnotes
[1]
Reimer, D., "Foreword," i n R. Pfaltzgraff and R. Shultz, (eds.), War in the Information
Age: New Challenges for U S. Security Polley, Washington, D.C.: B rassey's, 1 997.
[2 ]
Toffler, A., and H. Toffler, War and Antt- War: Survival at the Dawn of the 21st
[3 ]
Sproull, L., and S. Kiesler, Connectzons: New Ways of Working in the Networked
[4]
Arquilla, J., and D. Ronfeldt, Cyberwar Is Coming! Santa Monica, CA: Rand, 1 992,
PP
[5]
3-4 .
19
"Joint Vision 2020," Director of Strategic Plans and Policy, J5 Strategic Division,
Washington, D.C.: U.S. Government Printing Office, June 2000.
[7]
[8]
Alberrs, D., J. Garrska, and F. Stein, Network Centric Waifare, CCRP Publication
Series, Washington, D.C.: U.S. Department of Defense, 1 999.
[9]
Cebrowski, A., and J. Garstka, "Network-Centric Warfare: Its Origins and Future,"
[1 1]
For a good description o f the Boyd cycle see: Lind, W., The Maneuver Waifare
Handbook, London, U.K.: Westview, 1 9 8 5 , p. 5 .
[ 1 2]
Builder, C., "Are We Looking in the Wrong Places?" in K. Thomas, (ed.), The
Revolution m Mditay Affairs: Wafare in the Info1mation Age, Canberra, Australia:
Australian Defence Studies Centre, 1 997, p. 7.
[ 1 3]
Van Creveld, M . , Command in War, Cambridge MA: Harvard University Press, 1 985,
p. 23 1 .
[ 1 4]
[ 1 5]
20
[ 1 6]
[ 1 7]
[ 1 8]
[ 1 9]
Allard, C., Command, Control, and the Common Defense, New Haven, CT: Yale
U niversity Press, 1 990, pp. 263-264.
2
Tactical Com m unications Systems
2.1
Introduction
22
23
Seamless Connectivity
Since its organic communications will invariably be limited, the tactical force
must be able to make use of other battle space and strategic communications
systems when available. While essential force requirements are supplied by
organic communications, additional capacity, redundancy, and reliability
can be provided by using overlaid communications systems such as the
commrcial telephone network, satellite communications, theater broadcast,
and so on. These systems must be seamlessly integrated with the tactical
commumcanons system.
.
Scalable Communications
Within all available assets, the tactical force must have the ability to provide
scalable communications. That is, a small advance party must be able to
deploy, taking with it sufficient communications for its task. As the force
builds, the communications system must be able to grow to accommodate
the size of the force.
Range
The tactical communications system must be able to support the force when
it is deployed in any one of its roles. In the extreme, the communications
24
25
that may conflict with LPI requirements include increased power, strong
error coding, jamming-resistant modulation, and adaptive antennas with
steerable nulls.
These drivers are used as a framework in the following sections for the
consideration of the development of architectures' tactical communications
systems. Some issues such as LPI and jamming' resistance are covered in
more detail in Chapter 3.
CNR
subsystem
Trunk
subsystem
Communications
------------- Chain of command
26
2.4
27
28
29
Q)
en
>.
en
en
c
0
()
c:
:::::l
E
E
0
()
()
c;,
Q)
SUPPORTED SYSTEMS
Command elements
Maneuver elements
Logistics elements
Sensors
Weapons platforms
Information systems
Information services
Network management
(j)
30
31
32
2.5.1
Trunk Nodes
__
XXX Cor ps
XX Division
X Brigade
Trunk bearer
33
Access node
Chain of command
34
Figure
to the small, mobile headquarters at battalion and below. While high capacity
access is desirable at all levels, the mobility and tactical movement of low
level headquarters will tend to militate against the provision of large, vehicle
mounted equipment within the headquarters. At these levels, however, mobile
access can be provided without restricting the tactical movement of
commanders.
Fourth-generation networks provide great flexibility to a deployed force.
Nodes can be deployed and redeployed to account for tactical movement
by the force, and the network density can be adjusted according to force
composition and distribution. Figure 2.5 illustrates the basic components
of a trunk node.
The switch is the heart . of the node providing a processor-controlled
digital switch, which until recently has generally been based on an automatic
circuit switch that has an embedded packet switch. However, most networks
are investigating the incorporation of asynchronous transfer mode (ATM)
switches or IP routers to accommodate traffic with varying quality of service
requirements.
The node will also contain an operator interface to assist in engineering
the switch's role in the network, manage the trunk encryption equipment,
and allow some patching. This node operation center (NOC) can either be
To another
trunk node
m-__,
35
----z.....__
To another
trunk node
N etwork management
facility
Figure 2.5 The basic compon ents of a typical trunk node.
Bearers
36
I
I
2.5.4
Access N odes
(a )
37
(b)
Figure 2.6 Range extension u sing ( a ) satellite internodal links and ( b ) the tactical ai rborne
s ubsystem.
headquarters and large access nodes for divisional and higher level headquar
ter) Some networks provide access nodes to lower levels-at least to regimen
tal or battalion command posts. In most networks, however, access to these
levels is provided through the mobile access systems described next.
Access nodes are normally connected to the trunk network through
radio relay bearers. However, in most networks, nodes can also be connected
to overlaid systems such as commercial carriers and satellite or troposcatter
bearers. Large access nodes generally have two connections to the network;
small access nodes have one operational link and one engineered in standby
in case of failure. Small access nodes normally provide for approximately 2 5
subscribers, while large access nodes connect about 1 50 subscribers. Figure
2.7 shows a generic configuration of an access node.
2.5.5
Mobile remote access is required for trunk network subscribers. This func
tionality should include full duplex voice telephony as well as substantial
data connectivity. In most major trunk networks this access is called single
channel radio access (SCRA). It is normaUy provided by radio access points
(RAP) that are connected to trunk nodes, as illustrated in Figure 2.8. i
Mobile subscribers have secure duplex VHF radio access to the RAP and
have voice, data, telegraph, and facsimile facilities similar to those available to
static subscribers of an access network. The RAP can accept approximately
50 mobile subscribers affiliated within a 1 5-km radius. However, only approx
imately one quarter of these can make a simultaneous call. RAPs are deployed
to provide overlapping coverage of the battlefield, in a manner similar to
38
--z..__
To a
trunk node
Radio relay
vehicle
--z..__
To another
trunk node
\
\
Access node
To approximately
25 or 1 50 subscribers
Figure 2.7 Generic layout of an ac cess node.
To trunk node
Mobile subscribers
Figure 2.8 Configuration of the RAP for mobile s u b scribers.
2.5.6
39
able to use their CNR to gain temporary (albeit limited) access to the trunk
network. A CNRI vehicle provides semiautomatic access for several VHF
and HF users. The users tune their CNR to the CNRI hailing frequency
and arrange with the operator to have a call placed to a trunk subscriber.
Calls made from the network are automatic and do not need operator
assistance. As CNR nets are single-frequency and half-duplex, CNRI only
provides rudimentary access to network facilities. In most current trunk
networks, CNRI provides the only direct interface between the trunk and
CNR subsystems. A much more sophisticated and ubiquitous interface is
required if the CNR and trunk communications subsystems are to be seam
lessly integrated.
2.5.7
The current limited interface provided by CNRI is not sufficient. The tactical
trunk subsystem is required to interface to other components of the tactical
communications system as well as to the strategic communications system and
to overlaid communications systems. These generic interfaces are illustrated in
Figure 2.9.
Mobile trunk
40
2.6
CNR
Subsystem
Some of the key architectural issues for CNR include the following.
Command and Control on the Move
41
Despite the need for voice remaining for the foreseeable future, the require
ment to be able to send data will increase dramatically in the next few years.
Both voice and data communications are required, therefore, although not
necessarily at the same time or using the same equipment. Ideally, voice and
data communications should be seamlessly integrated, using a single piece
of equipment. A major disadvantage of separate equipment for voice and
data may be additional weight.
Multiple Access
The spectrum available for military use is not likely to expand, while the
number of systems that make use of the electromagnetic spectrum increases
constantly. Sharing of the electromagnetic spectrum between users is re
quired. Possible multiple access techniques [4] include frequency division
multiple access (FDMA), synchronous time-division multiple access
(TDMA), carrier-sense multiple access (CSMA) , and code-division multiple
access (CDMA)-see Table 2 . 1 . Multiple access may be provided using a
combination of these basic techniques. In current systems, multiple access
is achieved by grouping stations into nets. Each net operates in a single
frequency, half-duplex mode, with different nets being assigned different
frequencies. For conventional CNR, each net operates on a single frequency,
with FDMA being used to share the electromagnetic spectrum between nets.
Within a net, a form of CSMA is used to share the channel capaci J, between
stations on the net. For voice networks, CSMA takes the form of voice
procedure, RATEL.
Multicast Capability
42
Table 2.1
M u ltiple Access Techniq ues
Technique
Description
FDMA
TDMA
43
Description
CSMA
C O MA
and, in fact, may be feasible only for data. Typically, the interface to the
trunk subsystem would be part of that subsystem.
Security
44
1s
req u i red
p.1sive EP,
active E P ,
Capacity
In currenr systems, !:.eparare capaciry is allocated for each CNR ncr. The
minimum capaciry is one voice channel per net, which may be rime-division
mulri plexed, for example, using CSMA berween a number of terminals.
Furure requiremems will not reduce the need fpr voice capaciry for command
and control, but may impose an additional requirement for data, some of
which will replace certain voice traffic.
2.6.2
Range of Communications
45
D ata-Capable C N R
Data modems have been available for CNR for more than 20 years. A single
HF CNR channel can carry up to approximately 2,400 bps, while a VHF
or UHF CNR channel can carry 1 6 Kbps with a channel bandwidth of
25 kHz. CSMA is used to control multiple access. Where automatic control is
provided, an operator can prepare a message and have this message transmitted .
asynchronously.
Voice and data can be supported with a single equipment. This is
common for VHF CNR, althoJgh a separate modem is often required for
carrying data on HF CNR. A net can operate in either a data mode or voice
mode. A data net may drop back to voice operation when an operator presses
the pressel switch. Switching or routing of data requires external equipment
in addition to the data-capable CNR.
2.6.3.2
Packet Radio C N R
The major disadvantage of data transfer over CN& is that there is no support
for automatic rebroadcast of data in fragmented nets. This can be overcome,
at the expense of added complexity, by the use of packet radio. Both voice
and data communications can be supported by means of a digital internetted
radio. Examples of military use of this technology include the BOWMAN
[6] HF and VHF radios currently being procured for U.K. land forces and
the U.S. SINCGARS ASIP.
46
The data mode is the default mode of operation. In this mode, internet
bridges allow automatic delivery of messages addressed outside a net. These
bridges may be located at any point, but could be expected to be located
in headquarters where stations currently exist on two adjacent nets. This is
illustrated in Figure 2 . 1 0.
In the data mode, messages are auto rh atically relayed if a net becomes
fragmented. This process is known as intranet rebroadcast. In reality, internet
rebroadcast may be limited to two or three hops. The routing/multiple access
problems of such a fragmented net have yet to be addressed in detail in new
systems such as the British BOWMAN neft\Vork.
The secure-voice mode has priority over the data mode, and is entered
immediately when an operator depresses the pressel switch. In the voice
mode, operation of nets is identical to that of conventional secure-voice
radio nets. The data mode is resumed immediately when transmission of
voice ceases. Voice operations in fragmented nets are similar to that of
conventional CNR nets.
Advantages of the tactical internet are that data can be passed automati
cally between any two locations on the battlefield, without manual retransmis
sion at net boundaries; the support of external netwo rk devices is not required;
and messages can be routed around failed parts of the network, because the
transmission path is not fixed. Disadvantages of the tactical internet are that,
because of the low data rates available ( 1 -3 Kbps), the network can easily
become congested; and it is probably necessary to limit the number of
47
48
49
50
20 k m (-65,000 ft)
- 500 km
' \
51
Figure 2.13 I mproved battle space communrcatrons usmg the a r rborne communrcatrons
platform.
52
ever, even if a base station is not included in the platform payload, the
airborne platform has the potential to support the connection back to a base
station on the ground.
The airborne platform also offers two opportunities with regard to
theater broadcast:
53
54
such systems. The following chapters therefore also consider the issues associ
ated with the attack of overlaid systems.
2.1 0 S ummary
This chapter has described the tactical communications systems that are
the target of tactical EW systems. The focus of the chapter has been on
understanding the current structure of tactical communications systems as
the basis for our discussion in subsequent chapte rs of methods of attack by
tactical communications EW systems. The architecture developed illustrates
the interrelationship of systems required to provide the battlefield network
that supports operational concepts such as network-cen tric: warfare. Current
tactical trunk communications, combat net radio, tactical data distribution,
and tactical airborne subsystems have been described in sufficient detail to
allow an analysis of their strengths and weaknesses from an EW point of view.
Chapter 8 discusses the future directions in which tactical communications
systems are being developed.
Chapters 3, 4, and 5 now consider the EW functional areas of EP,
ES, and EA as they apply to the tactical communications systems described
here.
Endnotes
[1)
[2]
Ryan, M., and M. Frarer, "An Archirccrural Framework for Modern Tacrical Communi
carions Sysrems," IEEE Milltfll ]' Communications Conference (MILCOM 2000), Los
Angeles, CA, Ocrobcr 23-25, 2000.
[3]
[4]
Sklar, B., Digital Communicatwns: Fundamentals and Applications, Upper Saddle River,
NJ: Prenrice Hall, 200 1 .
[5]
[6]
Win, M., "Brirain's BOWMAN: Back ro rhc Begi nning," Milirary Technology, Decem
ber 2000, pp. 64-68.
55
[7]
[8]
3
Electronic Protection
3.1
Introduction
58
Electronic warfare
Passive
Active
Encryption
Siting
LPI/LPD
Shielding
Antijam
EMCON
Alternate means
Directional antennas
Frequency management
Identical equipment
Figure 3.1 EW arc hitecture.
3.2.1
Sh ielding
Electronic Protection
59
Emission Control
Directional Antennas
60
Frequency Management
Alternate Means
Siting
Planning for the siting of communications systems takes into account propa
gation of radio waves between chosen sites. This planning should also seek
to minimize an adversary's potential use of EA and ES.
One means of doing this is to use terrain shielding (or terrain screening) ,
as illustrated in Figures 3.2 and 3.3. In Figure 3.2, where transmitters are
located on the tops of hills, reception is possible at a potential site for an
adversary's ES or EA assets. However, by moving the transmitters down
from the tops of the hills as illustrated in Figure 3.3, communication is
maintained while denying coverage at the adversary's location .
Terrain shielding is most effective at VHF and higher frequencies
where most tactical CNR radios operate. At these frequencies, propagation
is essentially line-of-sight, and therefore tends to be terrain-limited rather
than power-limited.
Electronic Protection
61
Transmitter
Transmitter
Recei
62
Electronic Protection
63
3.3.1
Encryption
--
Message
Transmission
--
channel
Secret
information
"'
Secret
information
Truste<l
third
party
64
Electronic Protection
65
66
Keystream
generator
Keystream
generator
Key
Key
Ciphertext
Pia i n text
message
.I Encrypt I
I
I
Transmission
channel
J Decrypt I
I
I
Figure 3.6 Structure of a sec ret-key sec ure communi cations system.
Plai ntext
m e ssage
Electronic Protection
67
68
initially classified, but has since been released publicly. The basic GSM A5
[5] is a stream encryption system that employs a 64-bit key. Because the
keystream generator is restarted every 228 bits, however, it is effectively used
as a block cipher.
The most commonly used public-key encryption systems are the Rivest
Shamir-Adleman (RSA) algorithm [6] , and the Key Exchange Algorithm
(KEA) [7] .
3.3. 1 .3
8
Figure 3.7 Use of the PKA.
Electronic Protection
69
creates certificates, which are encrypted messages containing the user's public
key, the user's identification, and a time stamp.
The user then distributes this certificate with the time stamp. The
authenticity of the certificate can be assured if the CA's public key is known.
Furthermore, if the CA has suitable controls for the issuing of certificates,
a certificate can authenticate the holder of the certificate.
3.3.1 .4
Level of Security
70
-------
1 03 .--------.---------.------ -.-- - - i- - - - - - -
- - - - - -
..:><:
'Q)
D..
Q)
. .. .. . .. .. .. ..
........
10
....
....
....
2::
Q)
N
>
cti
.8
Q)
E
i=
.. - - -
2
1 0 -------4---+--
. .. . ..
....
....
....
'
.... ....
101
10
,,
...
,'
10' 6
10
1 09
..
"'
'
,,
'
'
'
'
'
,,
- - - - - - -
- 40-bit key
..
''
,,
'
'
'
'
'
'
'
'
64-bit key
--
1 28-bit key
256-bit key
'
12
10
10
15
10
16
Electronic Protection
71
chirping. Chirping is used to provide EP for radar systems, but is not com
monly used in communications systems, and is not considered further here.
3.3.2.1
Bit period = T
Bit period =
T
f,
72
Where errors have been introduced into the chip stream, a voting
procedure that maps each group of three chips to the closest-valued bit is
used.
000
001
010
01 1
1 00
101
110
111
0
1
0
0
1
1
0
1
Signal
t5
Q)
0..
(f)
Original signal
c
u;
c
Q)
"0
1-r
Spreading
c
u;
c
Q)
"0
t5
Q)
0..
(f)
Signal
Transmitted signal
Code
Signal
t5
Q)
0..
(f)
Received signal
Demodulated signal
Figure 3.10 DSSS.
Despreading
Electronic Protection
73
stream before transmission. The receiver must also synchronize itself with
the transmitter. This may involve knowing (at least implicitly) how many
bits have been sent in the current transmission and the location in the
PN sequence at which the transmission started. This can be achieved by
transmitting a synchronization preamble at the beginning of each transmis
sion, and possibly inserting resynchronization information at regular intervals
during the transmission; or using an accurate time reference known to both
transmitter and receiver.
Interference from other DSSS signals is covered in this section. Interfer
ence caused by single DSSS transmission to other types of signals will have
similar effects to a small increase in channel noise, leading to a reduction
in the signal-to-noise ratio at the input to the receiver. Where multiple DSSS
transmissions take place in a particular part of the spectrum, this noise level
will rise significantly and may preclude operation of other systems in the
frequency band used.
Resistance to Jamming and Interference
t5
(!)
o._
(/)
.2;
u;
c
(!)
"0
t5
Spreading
Original signal
Signal
Interference
.2;
u;
c
(!)
"0
Signal
-r
Transmitted signal
Code
t5
g_ Interference
(/)
Received signal
Despreading
Demodulated signal
Figure 3.11 D SSS in the presence of na rrowband interfe rence.
74
result, a spot jammer has significantly less impact on the spread signal than
on a conventional signal. Additionally, the DSSS signal can occupy the
same bandwidth as a number of single channel radios without significant
interference.
Figure 3 . 1 2 shows that spread-spectrum transmission also provides
protection against wideband interference, such as that caused by a barrage
jammer or by other spread-spectrum transmissions that use different spread
ing sequences. Again, any signal not originally spread by the transmitter will
not be despread at the receiver, but will be spread to reduce its impact on
the wanted signal.
The observations in Figure 3. 1 1 and Figure 3. 1 2 give rise to the concept
of spreading gain. A signal with original bandwidth fo that is spread using
DSSS to a bandwidth of Is is said to have a spreading gain gs:
i?:'
u;
c
Signal
i?:'
u;
c
<1>
"0
<1>
"0
t5
<1>
o_
Cl)
Original signal
i?:'
u;
t5
Spreading
Signal
-r
Interference
Transmitted signal
Code
c
<1>
"0
t5
U)
Interference
Received signal
Despreading
Demodulated signal
Figure 3.12 DSSS in the presence of broa d b a n d interfe rence.
Electronic Protection
75
--7
--7
--7
001 , 1
01 1 , 1
111, 1
--7
--7
--7
110
1 00
000
76
If these three sequences are transmitted onto the same channel at the
same power, and the three transmissions arrive synchronized at the receiver,
the received chip stream is found to be 00000 1 1 1 00 1 0 by selecting the value
of a chip as 0 if two or more of the individual channel chips are 0 and 1
otherwise. In practical systems, this voting process occurs when the three
modulated signals are combined in the receiver's antenna. Even though the
chip timing of the transmissions is synchronized, the carriers of these modu
lated signals may not be synchronized, causing the received power level to
be lowered by destructive interference between the received signals.
The decoding of one channel can be carried out by taking the XOR
of the received chip stream with the chip sequence associated with the value
0 for that channel, and applying the same voting procedure as described
previously.
For the example above:
Rec eiver 1 : 000001 1 1 00 1 0 -7 0010001 1 001 1 -7 001 1
Receiver 2: 00000 1 1 1 00 1 0 -7 01 1 01 0 1 0 1 001 -7 1 0 1 0
Receiver 3: 00000 1 1 1 00 1 0 -7 1 1 1 1 1 0001 1 01 -7 1 10 1
Electronic Protection
77
than the other two, it would have a greater weight in determining the value
of each chip on the channel.
The proportion of the total channel capacity allocated to a stream can
be controlled by adjusting its spreading factor and transmit power.
Where OSSS is used as a multiple access technique, a jammer still
needs to deliver g5 times as much power to a receiver as would be required
for a conventional signal. However, g5 is also the maximum number of
signals that can be orthogonally multiplexed. When COMA is used to full
capacity, the difficulty of jamming all these signals is the same as jamming
the same set of signals using conventional modulation. The difference is that
the jammer does not have the option of concentrating power into one (high
priority) signal; it is forced to jam all signals or none. This effectively prevents
a jammer from obtaining the benefits of spot jamming.
Impact of Overloading
Unlike FOMA and TDMA, COMA allows (at least theoretically) over
allocation of channel capacity. COMA can support an essentially arbitrary
number of streams, so long as each stream is allocated a different spreading
sequence. There is, however, a strict limit on the number of streams that
can be carried without mutual interference. The spreading gain g5 , which
is equal to the maximum number of orthogonal PN sequences, provides an
upper bound on this number of streams. In the absence of external interfer
ence or jamming, this limit is equal to g5 In the presence of external
interference, the number of streams that can be carried without error is less
than g5
Frequency Management
78
power so that all receivers receive the same power from each transmitter.
This requirement for power balancing has two key implications. First, such
power balancing is not possible where there are multiple transmitters and
multiple receivers. This makes CDMA unsuitable as a multiple access tech
nique for net-oriented communications, such as CNR. This effect is known
as the near-far effect. Second, successful implementation requires continuous
monitoring of received power levels by receivers. The measured levels are
sent to transmitters on a signaling channel.
Power balancing is used in CMDA cellular telephone systems to over
come the near-far effect. This is only possible because all communications
are either to or from a base station; there is no direct mobile-mobile communi
cations.
The power balancing problem is illustrated in Figure 3 . 1 3 . If stations
1 and 3 set their transmit power so that same power is received at station
2 , then station 1 cannot adjust its power to achieve the same received power
at station 3 as station 2. The only solutions to this problem are to accept
a loss in efficiency or to structure the system so that all CDMA operates
with a single transmitter or a single receiver. This can be achieved in systems
that require all communications to pass through a base station, such as in
mobile telephone networks. However, it cannot be achieved satisfactorily in
CNR nets.
Protection Against ES
As shown above, the use of DSSS spreads the power of a transmitted signal
over a large band. This spreading increases the difficulty of detecting the
signal. Typically, a DSSS signal cannot be detected by a narrowband search
receiver. Detection by a wideband search receiver can sometimes be achieved
by measurement of power levels across a wide band of frequencies.
I
Figure 3.13 The power-balancing pro b l e m to overcome the nea r-far effe ct.
Electronic Protection
79
Freq u e n cy Hopping
80
Time O
Time 1
Time 2
Time 3
t
t
t
t
(\
(\
(\
(\
The terms slow and fast hopping are sometimes used. Fast FH refers
either to a hop rate that is higher than the bit rate or to a hop rate significantly
faster than 1 00 hops per second for VHF and UHF transmissions, and 1 0
hops per second for H F transmissions. Slow FH refers to slower hop rates.
In most FH systems, there is a guard interval during which no informa
tion is transmitted while the transmitter changes frequency. This is required
because the transmitter's power amplifier cannot instantaneously change
frequency. In order to avoid sweeping its power across the band and causing
widespread interference, the transmitter stops transmitting during the period
of the frequency change.
One of the advantages of FH is that it is possible to choose the hop
set from an arbitrary list of channels. Unlike DSSS, there is usually no
requirement for these channels to be adjacent.
FH may also be combined with other EP techniques, including DSSS
and the use of error-correcting codes and interleaving to reduce the impact
of errors caused by clashes with other transmissions.
Electronic Protection
81
tpropagation
Rx
distance Tx- Rx
3 X 1 O8
25
1 00
500
1 ,000
1 0,000
992
1 92
92
2
996
1 96
96
6
998
1 98
98
8
1 ,000
200
100
10
82
that the receiver is close to the transmitter, the length of the guard interval
is zero, all delay is due to propagation and the detection time of the receiver
(i.e., the jammer power-up delay is zero) , and the jamming is effective if
one-third of the hop time is jammed.
From Table 3. 1 , it is clear that even for a rate of 1 00 hops per second
(a dwell time of 10 ms), the use of satellite jammers is unlikely to be possible.
Standoff airborne or ground-based platforms, however, are likely to be within
this range limit. At 1 0,000 hops per second, standoff airborne platforms
(e.g., high altitude UAVs) are also infeasible. Jammers, such as UAJ, capable
of close-in deployment are the only systems likely to be effective against
such high-speed hoppers.
Provision of Multiple Access
Electronic Protection
83
Frequency Management
84
The advantages of DSSS are that it hinders adversary ES, making transmis
sions hard to detect above the noise floor; hinders adversary EA; provides
graceful degradation in the presence of jamming and other types of interfer
ence; provides multiple access, known as code division multiple access
(CDMA); and allows mutual interference to be managed more easily than
in FH.
The disadvantages of DSSS are that the near-far effect makes power
management of multiple access in multinet environment difficult; mutual
interference contributes to total jamming power; DSSS provides less efficient
multiple access than TDMA or FDMA; and spreading usually occurs over
contiguous band (i.e., most practical systems do not allow spreading over an
arbitrary collection of channels) . In-band spread spectrum has the additional
disadvantage of providing only very low data rates.
The advantages of FH are that it hinders adversary ES/EA; the hopping
frequencies can be chosen from arbitrary set; the channels used do not need
to be contiguous; and it can be used as a multiple-access technique.
The disadvantages of FH are that hopping nets will usually share some
or all of the frequencies in their hop set, resulting in mutual interference
between hopping nets interference with nonhopping nets whose frequencies
are included in the hop set of a hopping net; and ES techniques, based on
using multichannel receivers and directional antennas, and EA. techniques,
based on follower-jammers, exist that can overcome the EP provided by
slow-hopping transmitters, especially when used in isolation.
3.3.3
Error-Protection Coding
Electronic Protection
85
86
There are two types of FEC: block coding and convolutional coding. In
block coding, source data is partitioned into blocks of k bits, converted by
the encoder into blocks of n (>k) bits with enough checks to enable the
decoder to correct errors of the more probable kinds. Error-correcting codes
have more redundancy than error-detecting codes, and the decoding algo
rithms are much more complex. The most common types of block codes
[9] are cyclic redundancy check (CRC) codes, which provide only error
detection; Golay codes; Bose-Chadhuri-Hocquenghem (BCH) codes; and
Reed-Solomon (RS) codes. For a convolutional code, the encoder operates
not on disjoint blocks, but on a running block of bits held in a shift register,
generating a sequence of higher rate. This procedure is normally used for
FEC, but the correcting capabilities are not so clear-cut as with block codes.
Probabilistic decoding, approximating the maximum likelihood, is generally
used.
Block codes are used when information is naturally structured in blocks,
when channel capacity is relatively low and we do not want to waste it
further with unnecessarily low code rates, and when quick efficient decoding
is required because of the limited processing time available.
When long streams of relatively unstructured data are transmitted
on high-capacity channels (e.g., satellite 1 0 Mbps channels) and when the
complexity of the decoder represents a relatively small proportion of the
total cost of the receiving equipment (e.g., a satellite receiver), convolutional
codes can offer the best error-correcting solutions.
Interleaving
Error-correcting codes can be used to detect and correct random bit errors.
The codes are effective as long as the number of errors close together remains
small. In many types of channels, especially radio channels, however, the
channel errors occur in bursts of many errors followed by long periods with
almost no errors.
The problem of bursty channel errors can be overcome by interleaving
the transmitted data. This is achieved by rearranging the coded data at the
transmitter in a predefined pseudorandom order. This means that a burst
of errors will be randomized at the receiver when the bits are placed back
in their original order.
Concatenated Codes
Concatenated codes use two levels of coding-an inner code and an outer
code-to achieve the desired error performance. k illustrated in Figure
Electronic Protection
87
3. 1 5 , the inner code is configured to correct most channel errors; the outer
code reduces the probability of error to an acceptable level.
One of the most popular systems uses a convolutional inner code and
a Reed-Solomon outer code. The Reed-Solomon coder is chosen because it
can operate on symbols that consist of a number of bits. Like other FEC,
it operates best on isolated symbol errors. Because the symbols may consist
of a number of bits, the Reed-Solomon coder is quite effective at correcting
bursts of bit errors.
3.3.4
Burst Transmission
data
Outer
encoder
lnterleaver
Inner
encoder
Modulator
To channel
88
A jammer may sometimes transmit in only a portion of the band being used
for communications. This is most likely to happen in higher capacity cha9nels, such as those used for radio relay or DSSS signals. This is illustrated
in Figure 3 . 1 6. Such jamming can be effective against conventional receivers.
Even for a DSSS receiver, the power of the jamming signal is turned into
noise in the demodulation process.
In a receiver employing narrowband excision, narrowband jamming is
detected and removed from the signal before it is passed to the demodulator
as illustrated in Figure 3 . 1 7. While this also removes any information in the
excised band, the overall effect is beneficial because the jammer power is
prevented from having any impact on the demodulation process. Because
the loss of some portion of the received signal is a necessary side effect of
narrowband excision, some means for correcting the resulting errors are
usually required.
'(ij
c
Cl>
"0
Jamming
"
t5
(f)
Signal
Received signal
'(ij
c
Cl>
"0
"
t5
a.
(f)
Signal
Electronic Protection
3.3.6
89
Diversity
CNR
90
near-far effect prevents the effective use of CDMA in CNR to improve the
efficiency of use of the electromagnetic spectrum.
Encryption is commonly provided either using in-built systems or an
applique. Traditionally, such encryption has been used at battalion and
higher levels, leaving lower-level transmissions open to intercept. Increasingly,
encryption is being pushed down to the lowest levels.
Because the encryption used in CNR is message-based, the synchroniz
ing preambles of these transmissions are particularly vulnerable to jamming.
Adversary EA may deliberately jam preambles to force nets to operate in
plaintext, allowing their transmissions to be intercepted.
Error protection is not commonly used for voice transmissions in CNR.
The digital voice coding algorithms used tend to provide very high levels
of robustness against transmission errors, operating satisfactorily with bit
error rates as high as 10%. However, some form of error protection may
be provided for data.
3.4.2
Military radio relay systems operate in the VHF and UHF bands above
200 MHz. A network is formed from a number of point-to-point links that
interconnect nodes that perform switching. Traditionally, these systems have
provided circuit-switched voice and data services.
Because they are based on point-to-point links, radio relay systems
almost always use directional antennas. The gain of these antennas is typically
around 1 0 dB. These directional antennas provide a high level of protection
against adversary EA and ES.
Encryption in radio-relay networks is based on bulk encryption of
the point-to-point links, with switching occurring on plaintext data, which
protects against vulnerabilities associated with the restarting of cryptographic
algorithms in message-based encryption. FH and DSSS transmission are
also sometimes employed in these systems to provide additional protection.
Additionally, many radio-relay systems, especially those that provide for the
carriage of data as well as voice, provide some form of error protection,
which is commonly based on a half-rate convolutional code.
3.4.3
Electronic Protection
91
Guard interval
92
Table 3.2
TADI L-J O p e rating Modes
Guard Interval
(ms)
Guard Interval
Range limit
(nm)
Throughput After
Error Correction
(Kbps)
Hops per
Second
Stan d a rd f u l l
slot
4.4585
700
30
33,000
P a c ked-2 full
slot
4.4585
700
59
33,000
2.0405
300
119
57,000
Mode
Electronic Protection
93
IS-95
94
Data on the forward channel is grouped into 20-ms frames. This data
is convolutionally encoded, repeated if necessary to increase the data rate to
1 9.2 kilosamples per second (ksps) and interleaved, as illustrated in Figure
3 . 1 9. The signal is randomized with a long PN sequence and spread with
a Walsh code to produce a 1 .2288 megachips per second (Mcps) signal.
Power control information is inserted every 1 .25 ms by puncturing.
Mobile terminal transmit power is adjusted in 1 -dB steps. This high-rate,
fine adjustment or transmit power is required to provide power balancing
between mobile stations and to maximize the bandwidth efficiency of the
system.
Quadrature modulation is performed as shown in Figure 3.20, with
in-phase and quadrature components having an orthogonal covering applied
1 .2288 Mcps
to modulator
Walsh code cover
( 1 .2288 Mcps)
Long-code
1 9.2 kcps
-.{
.-
Data
Frame
& CRC
1 .2
2.4
4.8
9.6
1 /2 rate
convolutional
encoder
Kbps
Kbps
Kbps
Kbps
Repeat
2.4 ksps
4.8 ksps
9 . 6 ksps
1 9 .2 ksps
Block
interleave
1 9.2 ksps
sin(w t )
Baseband
filter
Baseband
filter
cos(wt )
Figure 3.20 Downlink modulation for IS-95.
Electronic Protection
95
GSM
The GSM digital cellular telephone system provides multiple access using
a combination ofFDMA and TDMA. Eight TMDA channels are multiplexed
onto a carrier with a channel bandwidth of 200 kHz. Each time slot contains
1 14 bits of user data [ 1 4] .
GSM provides an optional FH mode. This mode does not provide an
LPI or antijam capability, because the specification for the hop sequence is
published in the GSM standards, and the hop sequence can therefore be
deduced from the signals transmitted by a base station.
FH in GSM does, however, provide frequency diversity. This diversity
is intended to minimize the impact of multipath propagation, which may
lead to much higher losses in some channels than in others. Because GSM
was not designed for military use, no extra benefit was perceived for LPI or
antijam capabilities.
Error protection in GSM takes 240 bit blocks of data, and codes them
with a half-rate punctured convolutional code to produce 456 bits that are
interleaved across four 1 14-bit TDMA frames. This interleaving spreads
burst errors (that are caused largely by channel fading) over a longer period,
reducing the reduce peak bit error rate, and allows the channel -coding to
correct the now-randomly spaced bit errors.
Encryption in GSM is based on a proprietary, stream-cipher algorithm,
known as A5 . A5 comes in two variants: A5/ 1 is used in European systems
and A5/2 (which is known to provide a significantly lower level of security)
is used in export systems. A5 is a stream cipher whose state is reinitialized
at the beginning of every TDMA time slot. Its vulnerabilities [5] include
the fact that in most deployed versions of GSM, the 10 least significant bits
of the key are set to zero, reducing the effective length of the key to 54 bits;
the keystream is frequently reinitialized, permitting attacks based on a known
initial state; while the state transition function ofA5 is not uniquely invertible,
96
Endnotes
[1]
U.S. doctrine for EP is contained in U.S. Army Field Manual FM 24-33, "Communica
tions Techniques: Electronic Counter-Countermeasures," July 1 990.
[2]
Elecf7omagJ7cttc Pulse (EMP) and TEMPEST Protection for Facilities, Engineering and
Design Pamphlet EP
I l l 0-3-2,
[3 ]
[4 ]
[5]
[6]
Stallings, S., Networlt and lntemefluorlt Smmty, 2nd Edition, Englewood Cliffs, NJ:
Prentice Hall, 1 995.
[7)
SKiPJA CK and
[8]
KEA
May 1998.
Sec, for example, Simon, M. I<., Spread Spec1m111 Connnumcatiow, Rockville, MD:
Computer Science Press, 1 985; o r Nicholson, D. L. , Spread Spectm111 Signal DestgJI:
LPE & A} Systems, Rockville, MD: Computer Science P ress, 1 9 88.
[9]
See, for example, Sklar, B., Dtgital Commrmicatiom, Englewood Cliffs, NJ: Prentice
Hall, 1988; and Pro:kis, J. G . , D1glfal Co111municatiom, 2nd Edition, New York:
McGraw-Hill, 1 989.
[ I 0]
Sec, for example, Gibilisco, S., Handboolt ofRadio and Wireless Teclmolog], New York:
McGraw Hi ll, 1 999, pp. 252-253.
ITU-R, Recommendation F. 1 06-2, 1 999.
[I I)
MIL-STD- 1 88-203- 1 A "I nrcropcrabiliry and Performance Smndards for Tactical Digi
tal I n formation Link, (TADIL) A," January 1 988.
Electronic Protection
97
[ 1 2]
[ 1 3]
U.S. Army Field Manual FM 24-4 1 , "Tactics, Techniques, and Procedures for the
Enhanced Position Location Reporting System (EPLRS)," Final Draft, July 1 999.
[ 14]
Mouly, M . , and M. Pautet, The GSM Systems for Mobile Communications, Palaiseau:
Cell and Sys, 1 992.
4
E lectronic S u p port
4.1
Introduction
1 00
Electronic warfare
Passive
Search
I ntercept
Direction finding
Analysis
Figure 4.1 EW a rc hitecture.
possible the integration of two or more processes into a single receiver. The
discussion below deals separately with each process so as to highlight its
special characteristics and because, even if implemented in one equipment
or detachment, there are still four distinct processes involved.
ES may target adversary communications systems, adversary EA. systems,
or adversary electronics. The electromagnetic emissions of communications
systems of adversary communications systems are the primary traditional
targets for ES, obtaining information for use in targeting and intelligence
and supporting friendly EA. EA systems, like communications systems, emit
electromagnetic radiation that can be exploited by ES. The targeting of
adversary electronics other than communications systems is possible with
specialized forms of ES equipment, although only over very short ranges.
As a result of the short range, this type of target is accessible only on rare
occasiOns.
ES functions, as collectors and processors of tactical inform,ation about
an adversary, are closely related to other intelligence functions : This relation
ship is discussed in Chapter 6. In many cases, ES makes up the bulk (as
high as 60-80%) of tactical information obtained about an adversary.
4.2 Search
Search involves reconnaissance ofthe electronic activity in the electromagnetic
spectrum to classify the transmissions occurring within it. Search receivers
must be placed within the coverage of the adversary systems to be detected
and operated at a time during which transmissions are being made. In this
Electronic Support
101
sense, the search function can be seen as occurring in space, time, and
frequency. The results of the search process provide the inputs for other
EW functions. Searching can be conducted in general terms, or it can be
made more specific by looking for particular call signs, types of modulation,
or other signal or traffic characteristics. Sensitive, wideband receivers can be
used to provide an indication of emitter characteristics.
The frequency range of interest can be searched by two main types of
receivers: narrowband (or scanning) and wideband [2] . It is common for
search receivers to be capable of operating across a wide range of frequencies.
Operating frequencies stretching from below the HF band (around 1 MHz)
to the middle of the UHF band (around 1 GHz) are not uncommon.
The theoretical minimum time required for a search receiver to detect
an incoming signal is equal to the reciprocal of the receiver's bandwidth.
Most practical receivers, however, require detection times much longer than
this.
The search process is most commonly applied to the intended emissions
of communications equipment. Under some circumstances, and at very short
ranges, it is also possible to detect the operation of electronic equipment
from unintentional radiation [3] . Protection against such detection is often
referred to as TEMPEST [4] , which is a form of EP.
The following sections describe the operation of major implementations
of narrowband and wideband search receivers.
4.2.1
Narrowband Receivers
1 02
Fixed I F
filter/amp
Alerting
system
Electronic Support
1 03
the gain of the RF stage; and detection criteria, which may be power level
or a particular type of modulation.
The detection time, which is the minimum time in which the scanning
search receiver can detect a signal, is limited to the reciprocal of the channel
bandwidth. The scan rate, therefore, can be no more than the channel
bandwidth. In practice, scanning receivers do not achieve this limit. One
reason for this is that a large number of false detections would occur as the
scan rate approached this limit. Practical systems commonly achieve scan
rates on the order of 20 channels per second.
4.2.2
Wideband Receivers
4.2.2. 1
As
1 04
Ale rting
system
Electronic Support
1 05
Fixed IF
filter/amp
Sweep
generator
Compressive
filter/amp
oscillator
Alerting
system
Receiver
front end
Tuning
control
AID
converter
Signal-processing
system
Alerting
system
1 06
of the output signal from the receiver front end to prevent aliasing. The
linearity of the analog-to-digital converter is critical to the performance of
the whole system: . any nonlinearity introduced during conversion will result
in intermodulation distortion between received signals, potentially allowing
a strong signal to obscure weaker signals.
The signal-processing system is responsible for the detection of incom
ing signals. A variety of algorithms may be used, but it is most likely that
the processing will involve conversion to the frequency domain.
The required computational capacity required of the signal-processing
system depends on the number of channels that are to be searched; whether
or not it is necessary to continuously monitor these channels, or it is permissi
ble to scan between them; the bandwidth of the individual channels to be
searched; the sampling rate of the analog-to-digital converter; and the search
algorithm that is used.
For a system where the processing is conducted using the fast Fourier
transform (FFT), the channels are to be continuously monitored, and the
sampling rate of the analog-to-digital converter is the minimum required to
prevent aliasing, the required processing capacity expressed in operations per
second can be calculated as follows.
If n channels are required, a 2n -point FFT will be required. Each
2n -point FFT requires 4n log2(2n) operations. With a sampling rate of fs ,
the total number of operations per second ( C) is then given by:
4Bn log2 2n
Electronic Support
1 07
Number of
Channels
Channel
Bandwidth
c
(Operations
per Second)
Search VH F band
30-88 M Hz
1 20 M H z
2,320
25 kHz
Search H F band
3-30 M H z
56 M H z
9,000
3 kH z
1 .5
10
Search H F band
in banks of
1 0 channels
56 M H z
900
30 kHz
1 .2
10
Application
9
10
9
9
108
Table 4.2
The Search Function and the Tactical Communicatio n s System
Tactical
Communications
S ubsystem
Vulnerabilities
Protection
Trun k
CNR
Omnidirectional a ntennas,
short distan c e between
transmitter and s e a r c h
faci lity, tra nsmission only
when messages s e nt.
Tactical d ata
distribution
Omnidirectional a ntennas,
s h o rt dista nce between
tra nsmitter and s e a rc h
facility.
Extensive E P .
Airborne
H eight, omnidirectional
antennas.
On ly downlinks likely to be
detected by tacti c a l EW
assets.
/
e<::::::> -
Trun k nodes
- c::::::>e
ES receives only
far station
transmitter. A search facility that is aligned with the axis of the link (labeled
"2") may be able to detect transmissions, but only from one end of the link.
The difficulty of using search against terrestrial radio relay links in the
trunk subsystem is exacerbated by the greater distance that is likely between
the search receivers and the trunk subsystem than is the case for CNR. This
difficulty is greatest for ground-based search facilities, particularly when
Electronic Support
1 09
combined with the impact of terrain at VHF and higher frequencies. This
is especially true for an on-axis search facility, such as the one labeled "2"
in Figure 4.6. The impact of terrain may be reduced by the use of an airborne
platform. However, it is unlikely to be possible to place an airborne search
platform in a position from which it can intercept communications in both
directions over a terrestrial radio relay link. The difficulty of detection of
radio relay links is increased where additional EP techniques such as FH are
employed.
The detection of an SHF down-the-hill link within a trunk node or
command post poses similar difficulties to terrestrial radio relay. The difficulty
is increased by the use of highly directional antennas and low transmission
powers, especially for ground-based search facilities. Because of thei natural
protection due to position, SHF down-the-hill links are less likely to be
protected by active EP than terrestrial radio relay links, which may reduce
the difficulty of detection by an airborne search facility.
SCRA and CNRI are characterized by the use of line-of-sight frequen
cies, medium transmission powers, and omnidirectional antennas. The base
stations for such systems are likely to be collocated with trunk nodes, meaning
that they are also protected against detection by ground-based search facilities
by distance and terrain. Mobile stations may be anywhere in the AO, often
forward of the base station, and are therefore more vulnerable to detection
than the base stations. This vulnerability is offset to some extent by the low
height of antennas on mobile stations above the ground. Because the multiple
channels supported by an SCRA base station tend to be separated from
adjacent channels either by TDMA or FDMA, the detection of one transmis
sion is likely to provide operating frequencies for all channels associated with
that base station . In the past, SCRA base stations have not tended to employ
EP for protection against detection , although future systems may reduce
their signature by employment of measures such as FH.
Transmissions from trunk HF radio employ surface-wave communica
tions where possible (e.g., on links between command posts within the AO)
and sky wave otherwise (e.g., on rear links) . Detection of surface-wave
transmissions from trunk HF radio is possible anywhere within the coverage
of the transmitter. For omnidirectional antennas, such as a vertical monopole
or dipole, the area of coverage will be roughly a circle, the size of which
depends on the permittivity and conductivity of ground and the transmitter
power. Detection of sky-wve transmissions from trunk HF radio requires
that the search facility be located in the footprint of the transmitter, as
illustrated in Figure 4.7. It is unlikely that it would be possible to site a
ground-based search facility within the AO capable of detecting transmissions
110
'
.
'
Coverage of 1
Coverage of 2
Overlapping
coverage
C N R S u b system
VHF and UHF CNR employ mostly omnidirectional antennas and can be
readily detected by search assets located within radio line-of-sight. HF CNR,
like trunk HF communications, uses mostly surface-wave communications,
and can be detected beyond radio line-of-sight, over an approximately circular
area of coverage that depends on transmitter power and the type of ground.
EP, mostly in the form of FH, may be employed to reduce the vulnerability
to detection, especially by narrowband search receivers. The range over which
VHF/UHF CNR can be detected depends critically on the height of the
transmit antenna. Transmissions from higher-level headquarters, where
Electronic Support
111
Airborne Subsystem
rES
facility
112
which case it will be able to detect both uplinks and downlinks; or above
it ("2"), in which case it may only be able to detect uplinks. A ground
based search facility ("3") is likely to detect only the downlinks, unless it
is placed close to one of the ground terminals. Some systems that convention
ally use directional antennas, such as radio relay, may use omnidirectional
antennas when mounted on the airborne platform, trading off their vulnera
bility to detection against the difficulty of maintaining communications from
a moving platform.
Electronic Support
113
1 14
4.3.2
RF gain.
The most commonly employed types of intercept receiver are the superhetero
dyne intercept receiver and the digital intercept receiver. This section describes
the characteristics of these receivers, highlighting the likely differences from
the employment of similar architectures as search receivers.
115
Electronic Support
4.3.2.1
116
Receiver
front end
AID
converter
r---+
Signal-processing
system
Tuning
control
Recording
system
Electromc Support
1 17
1 18
Table 4.3
The I ntercept FunctiOn and the Tact1 c a l Commun i cat i ons System
Tactical
Communications
Subsystem
Vulnerabilities
Protection
Trunk
CNR
Omnidirecti o n a l a ntennas,
short d i stance between
transmitter and mtercept
facility, tra nsmission only
when messages sent.
Tacti c a l d ata
distribution
Omnidirectional a ntennas,
short dista nce between
tra nsmitter a nd interce pt
facility.
Airborne
H eight, omnidirectional
antennas.
4.3.3.2
C N R S ubsystem
Electronic Support
1 19
Airborne Subsystem
1 20
DF3
Figure 4. 1 1 OF baseline and bearings taken on an emitter.
Electronic Support
1
0.8
.....
0
.....
.....
Q)
Q)
>
0.6
:.;::;
Cil
Q)
a:
0.4
0.2
i
i
i
i
i
i
i
:
I
i
i
i
i
i
i
1 21
20
-----
40
60
\\
\'\ -:------
1-
'
1'--.
30
. ... _
.........._,____ ,...
-:.--""---.:----
-----
60
90
1 22
4.4.1
Sources of Error
A djacent-Channel Interference
1 23
Electronic Support
4.4.2
(a )
{b)
Figure 4.13 Radiation patte rns of directio n a l antennas suitable for OF in which the bearing
to a transmitter would be determined by a (a) maximum and a (b) mm1mum
in received power.
1 24
to false bearings to phantom transmitters; and for weak signals, the sensitivity
of the receiver.
Many antennas, such as the dipole, have radiation patterns that change
markedly with frequency. This can affect both the relative gain and width
of the lobes, and even the presence of the lobes and nulls in the radiation
pattern. Ideally, the radiation pattern of the antenna should be constant
across the frequency band of interest. In practice, some variation will always
occur. For an antenna to be suitable for DF, it is necessary that the feature
on which the bearing is based is present across the frequency band of interest
and that the size of other features remains small enough that they do not
interfere.
The advan tages of a rotating directional antenna for DF are that it
can distinguish between multiple transmitters on the same frequency, as
long as the bearings to the transmitters are not too close together; and very
small, hand-held, DF units can be constructed if the rotation is performed
physically by the operator.
The use of a rotating directional antenna for DF has a number of
disadvantages. Short-term transmissions, such as those from an FH transmit
ter, may not be reliably detected. The accuracy is limited by the width of
the lobe or null of the antenna's radiation pattern on which bearings are
based. Mechanical rotation is likely to be infeasible on many platforms,
including aircraft and land vehicles on the move. Moving parts are likely to
have high maintenance requirements. Antenna side lobes can lead to false
peaks and nulls in power, although this can be minimized with careful
antenna selection and construction.
4.4.3 Watson-Watt OF
Electronic Support
1 25
Crossed-loop
antenna
ES receiver
channel
-<I>
<I>
(.)
<I>
'Cf)
w
-
Display
c:
c:
ctl
..c:
U
O F system.
OF-bearing
processor
DF antennas
Figure 4.15 Watson-Watt OF system block diagram.
OF-bearing
display
1 26
Crossed-Loop Antenna
East-West loop
Figure 4.16 Crossed-loop ante n n a .
Electronic Support
1 27
Ad c o c k Antenna
The Adcock antenna is the most commonly used antenna for modern Watson
Watt DF systems. Figure 4 . 17(a) shows a plan view of two elements of an
Adcock antenna; Figure 4.1 7(b) shows its radiation pattern. The two antennas
may be implemented as monopoles or dipoles, as long as the two antennas
are matched. Signals arriving from the left are inverted at the output of the
summer; signals arriving from the right are passed through without being
inverted.
The simplest practical Adcock antenna consists of four monopoles
placed at the corners of a square. Larger numbers of elements of varying
lengths may be used to increase the bandwidth. This system has the advantage
that it can look in all directions simultaneously. With conventional pro
cessing, however, it can only operate in environments in which there is not
significant cochannel interference.
An n -element Adcock is formed by placing a number of Adcock pairs
around the dashed circle shown in Figure 4 . 1 7. The maximum diameter of
this circle is half the wavelength of the highest frequency signal to be received.
With four or more elements, a bearing to a transmitter with arbitrary azimuth
can be determined. The bearing output of an n-element Adcock antenna,
however, still contains an ambiguity of 1 80. This can be resolved by
(a)
(b)
Figure 4.17 Operation of the Adcock antenna, showing ( a ) a plan view of the a ntennas
and signal processing, and (b) the resulting radiation pattern.
1 28
comparing the phase of the output signals from the Adcock antenna with
the phase of the output of an omnidirectional sense antenna. The sense
signal will be in-phase for signals arriving from the right in Figure 4 . 1 7,
and out-of-phase for signals arriving from the left. The sense signal can be
obtained either by a separate antenna element placed at the center of the
Adcock antenna or by summing the outputs of all n antennas.
The spacing between Adcock pairs is limited to half the wavelength
of the highest frequency signal to be received. The length of the antennas
is also limited by the highest frequency: half the wavelength for a dipole
and a quarter of the wavelength for a monopole. These constraints limit the
aperture of the Adcock antenna and its ability to suppress site error.
The major advantages of the Adcock antenna over the crossed-loop
antenna are that it can discriminate between horizontally and vertically
polarized signals, and it is less susceptible than other types of antenna to
cochannel interference due to mixed surface-wave and sky-wave propagation.
4.4.4
Wullenweber OF
Doppler OF
Electronic Support
1 29
To receiver and
output indicator
Rotating capacity
coupled goniometer
Difference
Sum antenna
antenna pattern
pattern
Patterns on CRT display
130
The DF Baseline
earing
Figure 4. 1 9 Sta n d a lone OF operati on.
Electronic Support
131
1 32
Electronic Support
1 33
The use ofDF against the tactical trunk subsystem suffers from the difficulties
associated with search. Terrestrial radio relay links, SHF down-the-hill links,
and satellite links are all protected by the use of directional antennas, transmis
sion frequencies providing line-of-sight operation, and the long distances
that will usually exist between transmitters and DF facilities. Even if a
network of DF systems locates one or more nodes in the trunk network,
this does not automatically lead to a picture of the network structure.
The use of DF on transmissions from SCRA base stations that are
collocated with a trunk node may provide an indirect means of locating
such a node, even though its main equipment (terrestrial radio relay and
SHF down-the-hill links) may not be detectable. Used against SCRA mobile
terminals, DF has the potential to reveal the locations of important personnel
Table 4.4
The O F Function a n d the Tactical Communications System
Tactical
Communications
Subsystem
Vulnerabilities
Protection
Trunk
Omnidirectional antennas in
SCRA.
CNR
Omnidirectional antennas,
short distance between
transmitter and search
facility, transmission only
when messages sent.
Tactical data
distribution
Omnidirectional a ntennas,
short distance between
transmitter and search
facility.
Airborne
1 34
C N R S u b system
The application of DF against the CNR subsystem has perhaps the greatest
potential to reveal an adversary's EOB, regardless of whether VHF or HF
CNR is used. The use of omnidirectional antennas and the short distances
between transmitter and DF facility hinders the use of terrain screening,
while the use of net structures tied to command arrangements eases the
analysis task.
Short-term and rapidly changing signals (such as burst transmission
and FH, which are becoming more commonly used as a means of EP in
the CNR subsystem) provided a particular challenge to DF. Effective DF
requires that the target is detected and passed to the DF system and the
line-of-bearing is acquired all within the time during which transmission
occurs in a single channel. To be effective against such signals, it is necessary
to have a high level of automation and integration between search and DF,
since the involvement of a human operator in the process will lead to response
times that are far too long. One possible approach is to have a number of
integrated search/DF facilities that store a line-of-bearing, reception time,
and frequency for each detected signal. This data can then be passed to
an analysis facility that combines lines-of-bearing associated with the same
frequency and reception time to locate the transmitter.
4.4.7.3
Electronic Support
1 35
Airborne Su bsystem
D F applied to the airborne subsystem is most likely to reveal only the location
of the airborne platform, unless the DF system can also be targeted against
the associated ground terminals. DF may, however, be useful in identifying
the source of transmissions as an airborne platform because of the high
concentration of emissions that are likely.
Traffic Analysis
In EW, traffic analysis deals with the study of the external characteristics of
radio communications for the purpose of obtaining information on the
organization and operation of the communications system. This information
is then used to construct an EOB, which shows the disposition and command
structure of the adversary's forces. In some circumstances it may also be
possible to identify the adversary commander's intentions, even without
being able to read the contents of transmissions [9] .
Traffic analysis uses three basic types of data. Intercept data is the
contents of the messages transmitted. This is sometimes subdivided to
1 36
Crypta n a lys i s
ou rces to p ro v i de .1
cha rac tc ri !> tics of r h e
an adversary. The
communications system are
cloely related to rhe types of i n fo r m ,u i o n t h u
, can be o b t a i n e d . Table 4 . 5
s h ow a s u m m a ry o f t h e i n tera c t i o n between O F a n d t h e subsystems o f the
h i gher l evel o f i n fo r m :u i o n about
T a b l e 4.5
Ta ctical
Com m u n i cations
S ubsystem
Trunk
V u l n e ra b i l ities
Protection
B u l k e n c rypt1on p revents
mferred.
traffic a n a lysis.
Traff1c a n a lys i s .
( Possibly) FH.
T a c t 1 c a l d ata
L a r g e n u m b e r of transm ittmg
T D M A prevents traffic
d 1stn but1on
stat1 o n s .
a n a lysis.
CNR
A1rborne
T r a n s m 1 s s 1 o n s o p e n e d u p to
O n ly d o w n l i n ks l i kely to be
traffic a n a lysis.
av a i l a b l e for a n a lysis by
t a c ti c a l EW assets.
Electronic Support
4.5.3.1
1 37
Analysis of ES data obtained from the tactical trunk subsystem may be used
to build up a picture of the structure of a terrestrial radio relay network.
This network structure may reveal weak points at which the network may
be easily attacked. It may also be possible to infer the approximate locations
of command posts from the network structure. The use of bulk encryption
and continuous transmission in the trunk subsystem, however, reduces the
external characteristics of the transmissions to the point that they convey
little or no information about the structure of the traffic being carried.
4.5.3.2
C N R S u bsystem
1 38
nets, and the structure of the force. Examples include using call signs that
were based on abbreviations of the names of units (as was done by the British
for a period during World War I), using the same call sign for a station on
more than one net, using the same call sign for a station on both primary
and alternate frequencies on the same net, basing the selection of call signs
on a theme (such as the names of flowers) that can be identified with a
particular unit or formation, and utilizing the same frequencies and call signs
for a net for long periods of time.
4.5.3.3
Airborne Subsystem
The concentration of transmirters in the airborne subsystem and its use for
range extemion remove any terrain screening that might have been obtained
by the siting of ground-based transmitters. For CNR, this has the potential
to open up to traffic analysis nets that might not otherwise have been
intercepted.
4.6 ES P l atforms
ES can be conducted from ground-based or airborne platforms. Airborne .
ES may complement or provide an alternative to ground-based systems.
Aircraft have several advantages, including increased intercept range; a shorter
reaction time, allowing critical information to be passed to tactical users in
real time; greater mobility and flexibility, perm irting deployment over any
terrain in response to urgent requirements; and enhanced survivability by
operating in a standoff role.
4.6.1
Ground Pl atforms
G ro u n d V e h i c l e s
Electronic Support
1 39
M a n - Po rta b l e ES
Air Platforms
1 40
Endnotes
Ill
U S d o U r i n e o n 1-.\
U.S.
,\rm:
1\
L< >Vernl 1 1 1 :
.1'1- 1 .
S e p t e m be r 1 ')') /j ,
U . \ . 1\ rm:
h e l d 1\!.mu.tl F M
U . . A rm :
) /j - 2 ,
jlj-,)(,,
1 ') ') 1 .
U . S . i\ r my
121
l 11 1 e l l igcnce .1nd
held M .u t u .tl F.'vt 3ft-/j0-'J " D 1 reuion F i n d i n g Oper.H i o n s , " August 1 9 ') 1 .
1 99.1.
13]
( Ei\C)
1\'lmj;m 111
\\'lmj:m
Sec.:, f(>r e x a m p l e . Wn gh t , D . .
Nt'l'l'l/11'1'
!;j)'I'(I/I'!Jrr,
\)'J/t'/1/J,
R 1 c h m o n d , VA: W i l l i a m H e i n e m a n n , 1 9 87.
Electronic Support
[4)
141
Electromagnetic Pulse (EMP) and TEMPEST Protectzon for Facdzties, Engineering and
Design Pamphlet EP 1 1 1 0-3-2, U.S. Army Corps of Engineers, December 1 990. A
number of other publications have recently been declassified, including:
NACSIM 5000, "TEMPEST Fundamentals," National Security Agency, February
1 982.
NACSEM 5 1 1 2 (RP-4), "NONSTOP Evaluation Techniques," National Security
Agency, April 1 975.
NSTISSI No. 7000, "Tempest Countermeasures for Facilities," National Security
Agency, September 1993.
NSTISSAM TEMPEST/2-9 5, "Red/Black Installation Guidance," National Security
Agency, December 1 995.
[5)
The characteristics or intercept receivers are discussed i n , for example, Rohde, U. L.,
and T. T. N. Bucher, Communicatwns Recewers: Prmczples and Deszgn, New York:
McGraw Hill, 1 976.
[6)
See, for example, Sklar, B., Dzgital Commumcatwns, Englewood Cliffs, NJ: Prentice
Hall, 1 988; or Proalcis, ]. G., Digztal Commumcations, 2nd Edition, New York:
McGraw-Hill, 1 989.
[7)
[8)
[9)
[ 1 0)
5
Electronic Attack
5.1
Introduction
1 44
Electronic warfare
Active
Jamming
Deception
N eutralization
Figure 5.1 EW a rc hitectu re.
5.2
Jamming
ELectronic Attack
1 45
Jamming-to-Signal Ratio
The performance of a jammer depends on the relative signal levels from the
jammer and the communications .transmitter at the input of a receiver being
jammed. It is therefore a receiver that is jammed, not a transmitter.
The power received by the receiver's antenna from the transmitter
depends on the power generated by the transmitter's power amplifier P T,
the loss in the feeder system to the transmit antenna L T' the gain of the
transmit antenna in the direction of the receiver G TR > the propagation loss
due to the path between the transmitter and receiver L TR > and the gain of
the receiver's antenna in the direction of the transmitter G RT With the
losses and gains expressed as power ratios, the power received from the
transmitter P RT can be expressed as:
The power received by the receiver's antenna from the jammer depends
on the power generated by the jammer's power amplifier, which lies within
the bandwidth of the receiver P1; the loss in the feeder system to the jammer's
transmit antenna L] ; the gain of the jammer's transmit antenna in the
direction of the receiver G]R ; the propagation loss due to the path between
the jammer and receiver L]R ; and the gain of the receiver's antenna in the
direction of the jammer G Rj . With the losses and gains expressed as power
ratios, the power received from the jammer P R] can be expressed as:
Two further factors are involved in the transfer of power into the
receiver, but both of these impact equally on signals from transmitter and
1 46
GTR
ft_
PT
Transmitter
Figure 5.2 Factors impacting on power received from jammer and tra nsmitter.
jammer: losses in the feeder system from the receiver's antenna to the receiver,
and the receiver sensitivity.
For j amming to be effective, two conditions must be met: the power
received from the jammer must be greater than the sensitivity of the receiver,
and the JSR must be sufficiently large.
The value of JSR required to achieve a particular effect depends on
the type of modulation used. A rule of thumb for FM voice and for data
systems not protected by spread-spectrum EP techniques is that a JSR of 1
will lead to significant degradation of performance and a JSR greater than
2 will lead to an almost total loss of performance.
5.2.2
Jamming Signals
Electronic Attack
1 47
5.2.3
Swept
Spot
Wide coverage
Concentrated power
High fratricide
More efficient
Single frequency
Minimum fratricide
High power
Inefficient
Comb
Multiple frequencies
Medium power
Defined targets
Efficient
Barrage
Wideband
Reduced power
High fratricide
Inefficient
Responsive
Single frequency
High power
Look-through required
Efficient
1 48
5.2.3.1
S p ot J a m m i n g
\I
Narrowband
jamming signal
generator
Modulator
Jamming signal
control
Tuning
control
Power
amplifier
1--
Electronic Attack
149
Barrage Jamming
\V
Variable bandwidth
..
jammin g sign al generator
Jamming signal
bandwidth control
Wideband
m odu l ator
Tuning
control
f----.
Power
amplifier
1 50
Swept J a m m i n g
\V
Narrowband
jamming signal
generator
Jamming signal
control
Modulator
Swept tuning
control
Power
amplifier
,.
Electronic Attack
5.2.3.4
1 51
Comb Jamming
Respo nsive J a m m i n g
\V
Narrowband
jamming signal
generator
Modulator
Jamming signal
control
Comb
generator
Powe r
amplifier
t--
1 52
Directional
antenna
\I
Narrowband
jamming signal
generator
Jamming
signal
control
Power
amplifier
Modulator
Tuning
control
Power
co nt rol
Controller
\V
Search
receiver
specified period. Periodically, the control unit will turn off the jamming for
a short look-through period, during which the search receiver will determine
whether the transmitter is still active. If the transmitter is still active, the
j amming will be recommenced. The look-through period may be of the
order of 40 ms.
The antenna used by a responsive jammer may be directional, where
the location of the receiver being jammed is both fixed and known, or
omnidirectional.
A responsive jammer has all of the advantages of a spot jammer. It has
the additional advantage of flexibility since its control unit can often be
programmed with a number of frequencies to be jammed. By only transmit
ting when there is a signal to be jammed, the responsive jammer reduces its
power consumption, reducing the weight of batteries required in portable
applications; and reduces its electromagnetic signature, increasing the diffi
culty for an adversary to find and neutralize the jammer.
A responsive jammer may include facilities that allow it to operate as
part of an automatic network of jammers in which only one jammer will
be active on a particular channel at a time. This further reduces the signature
of individual jammers.
A typical, modern, responsive jammer will allow a prioritized list of
target frequencies to be entered. The jammer will then scan these frequencies,
starting with the highest priority, until a transmission is detected. This
transmission will then be jammed for a period. During a short period of
Electronic Attack
1 53
look-through, the jammer will rescan its prioritized frequency list. If a higher
priority transmission is detected, jamming will switch to this channel.
5.2.4
Operational Factors
5.2.5
1 54
a low-powered jammer close to a radio receiver will be able to jam far more
effectively than a high-powered jammer farther away. In the example shown
in Figure 5.9, a 1 0-W FM-voice transmitter (Tx) is 5 km away from its
intended receiver (Rx). There is a UAJ about 1 km from the receiver and
a standoff jammer (SOJ) 1 0 km away. To achieve a jamming power equal
to the signal power, the UAJ is required to transmit at 400 m W, while the
SOJ is required to transmit at 40W.
In addition, it is possible that at a distance of 1 0 km, the receiver may
be screened from the SOJ, thus reducing the effect even further. A UAJ,
however, is more likely to have line-of-sight to the victim receiver. In order
to be effective, UAJs must be located close to the victim radio. Therefore,
deployment plays a key role in the utilization of these types of devices. There
are a number of ways in which UAJs can be deployed: withdrawing forces,
special forces, rocket/shell, aircraft, or UAV.
UAJs deployed by withdrawing troops could be used to form an elec
tronic minefield. An area seeded with UAJs would effectively jam the commu
nications of advancing units, thereby creating confusion and delay. Employed
in conjunction with conventional obstacles, such an electronic minefield
might be used to prevent an adversary force encountering the obstacle from
reportmg Its presence. Furthermore, unlike conventional antipersonnel
400 mW
fsoJ
40 W
Figure 5.9 The efficiency of UAJ versus SOJ.
ELectronic Attack
1 55
mines, UAJs do not injure civilians and can therefore be used in peacekeeping
or peace support operations. The use of responsive jammers in this applica
tion, possibly also capable of remote control, would optimize both the
jamming characteristics of the UAJ and its power utilization. UAJs operating
as an electronic minefield would usually operate as a network so that only
one jammer transmits on a channel at a time. This conserves power and
reduces the signature of individual UAJs, making them harder for an adversary
to locate and neutralize.
5.2.6
Jamming of the trunk subsystem is more difficult than for the CNR subsystem
because the elements of the trunk network are typically not deployed as far
Table 5.1
J a mming of the Tactical Communications System
Tactical
Communications
Subsystem
Vulnerabilities
Protection
Trunk
High antennas.
CNR
Omnidirectional antennas,
short distance.
FH (sometimesL terrain
screening.
Tactical data
distrib ution
Omnidirectional antennas,
short distance between
receiver and jammer.
Airborne
1 56
C N R S u b system
Airborne Subsystem
Electronic Attack
1 57
Jamming Platforms
Ground Vehicle
1 58
receiver will operate over at least the frequency range of the jammer's transmit
ter and may be a narrowband receiver (scanner) or a wideband receiver. If
the jammer is capable oflook-through, it would be normal for the ES receiver
to be able to determine the status of adversary transmissions during this
nme.
5.2.7.2
M a n- P o rta b l e
Airborne
Electronic Attack
1 59
as long as the aircraft remains airborne. The system will almost certainly be
capable of jamming multiple channels simultaneously.
A jammer carried by a small, tactical UAV is likely to have similar
properties to a man-portable jammer. Its capability is significantly enhanced
by its greater operating height. It is unlikely that a UAV-mounted jammer
will take its power from the aircraft, relying instead on batteries.
Jammers carried by other types of aircraft are likely to have intermediate
capabilities. The major limitation in smaller aircraft is likely to be weight,
which limits the output power of the jammer.
An airborne platform is likely to house both EA and ES assets, facilitat
ing coordination between the different EW subdivisions. The in-built ES
would normally be able to provide steerage for jammers carried by the
platform.
5.7.2.4
Artillery-Delivered
6
Land EW Command and Control
6.1
Introduction
1 70
Electronic warfare
Jamming
: Deception :
II Neutralization j
Search
I ntercept
: Direction finding
i
Analysis
Passive
Active
Encryption
Siting
LPI/LPD
Shielding
!
Antijam
EM CON
j
Alternate means
Directional antennas
Frequency management
Identical equipment
'
Security The use of an electronic asset always tends to gives away informa
171
172
1 73
the force being supported, and arguably more mobile if they are to be in
position ahead of the force to support operations.
Command and Control Like any other part of the force it supports, EW
supply, and mutual interference may limit the number of EW assets that
can be located on a given platform. This is likely to be a particular constraint
on small air platforms, such as tactical UAVs.
For best results, ES should support EA. Minimizing
communications requirements and providing similar coverage suggest collo
cation, but mutual interference suggests remote location. Additionally, sup
port of EA is a secondary task for ES assets, which will normally be deployed
for optimal coverage to achieve intelligence collection. EA assets may there
fore be forced to rely on their look-through capability to assess jamming
effectiveness.
As equipment becomes more integrated, providing complete ES/EA
systems in one unit, the issues for collocation of assets are becoming less
relevant to planning.
Support Requirements
174
6.2.1
t\
E lectronic Attaclc
m i n un u m
.1!
of one t r.t n <> m i ner is req uired fo r EA. h>r ground '>;.''>tem.
1 m i n i m u m of
.and
p la tform
and h igher frequencie. although this will depend on the terrain in \'.'hich
the same way that artillery uses a forward observer to adjust fire. This
supporting ES may be integral to EA systems, or provided by separate
[2] . An
additional rhree
numbers will be greater for ground platforms than for airborne platforms.
175
Electronic Support
1 76
--...
.,
mmand,' ,
,, dissemination
,,
,' / / : I I \ \ \
.-',
# I I I I \ \
# 1 1 1 1 \ \ \\
,
\
/
I I I I \ \
,
I I I
\
#
I \ \
,,
\
\
/
,
; : : \
,/
'
\
1
1
'
,
.----..:;._
' ...,
.-.-.&.--,
\
/
1
'\
'\
,
Bde
,'
\
I
#
I
\
\
\
+
I
I
\
.-<tI
I
'
EWLO'
,
\
\
,
"
#
I
I
,
\
I
I
#
\
I
I
\
/
.!::,
,'\
I EI
I E!I i ii
\@J
\ \
/ 1
rEI' \
\\
@]
'
\
1 77
1 78
Course-of-action analysis
Course-of-action comparison
Course-of-action approval
179
Decision. The first part of the targeting process provides its focus,
a targeting plan, and input to the intelligence collection management
process, including guidance on the prioritization of targets.
Detection. Targets identified by the decision process must be detected
through the use of a combination of ES and intelligence assets.
Functions of detection may include finding operating frequencies
or mapping network structures to identify a critical node or link
for EA.
Delivery. EA assets are llsed to attack targets identified by the decision
process, using information provided by the detection process.
1 80
Decision
Figure 6.4 Sequence of a ctivities in the targeting process and the se ctions in which they
are discussed.
181
including target lists and taskings for the EW assets employed. While EA
assets would usually be tasked to support a specific operation, ES assets will
have continuous tasking to provide information on the adversary electronic
order of battle. The decision process is also continuous, therefore, and cannot
be simply turned on at the beginning of an operation.
The decision process can be broken up into a number of parts. These
are illustrated in Figure 6.5.
The decision process runs parallel to the planning process described
previously. Most of the elements of the decision process form part of the
course-of-action development and course-of-action analysis processes.
6.4. 1 . 1
I n itial Plan
The target development process takes information on targets from the initial
plan, and coordinates targets and effects to achieve the mission. It is primarily
associated with the course-of-action development, analysis, and comparison
phases of the planning process. An important part of this process is the
identification of high-payoff targets, where the payoff is evaluated in the
context of the mission. High payoff may be due to a positive impact on
I nformation
requirements
management
l Mission l
---+ management
Targ et
development
Initial
plan
r -- -----,
I
I
..__
_
_
_
__, '
Asset
Miss ion
Asset
1
1---+1 management 1
i
( ES)
:
(ES)
I
I . .) -
r-- -- --. -!
L__ (-
_
_ . . . -
_.1
1 82
1 83
I nformation Requirements M a n a g e m e nt
M ission M anagement
Mission management tasks EA assets (for targeting) and ES assets (for the
collection of information or to support the delivery of EA). Mission manage
ment is concerned primarily with the course-of-action approval and orders
production phases of the planning process. For ES, mission management
defines how the information requirements generated by the information
requirements-development p rocess are to be collected. The input to mission
management is the information requests in a form that can be directly
1 84
collected. For EA, mission management translates the combat effect specified
in the target development into a direct effect of an EA system.
Mission management takes the input tasks and assigns them to collec
tion assets. In the case of ES, these assets are search, intercept, and DF
systems. Mission management chooses the most suitable asset. This may
involve choosing between a ground and airborne ES system. Mission manage
ment verifies the coverage of the system and chooses details such as the
location from which collection will take place. These details can then be
coordinated with the operation of other systems.
In tasking EA assets, the mission-management process provides a mis
sion that specifies both the task and a commander's intent. Such a task may
be to jam a specified CNR net in order to force the operators to switch
from encrypted traffic to plaintext. Both the task and the intent at this level
are oriented toward the immediate impact of EA on the target system.
6.4. 1 .5
Asset M a n a g e m e nt
Detection
1 85
6.4.3
Delivery
6.4.4
Assessment
1 86
6.4.5
6.4.6
1 87
1 88
Information
Mission
Asset
requirements _.
management -+ management
management
1 89
6.5.3
1 90
6.5.4
6.5.5
1 91
1 92
Endnotes
[1)
[2)
U.S. Army Field Manual FM 6-20- 1 0 , "Tactics, Techniques, and Procedures for the
Targeting Process, " Appendix B, May 1 996.
[3)
7
Radio Freq uency Directed Energy
Weapons
7.1
Introduction
1 94
1 95
volume less than 1 0 cu ft and peak power greater than 50 GW; development
of explosively driven, pulsed-power sources; systems integration into existing
military platforms, including aircraft, land vehicles and ships; and radiation
hardening of existing assets.
Funding for development of RF DEW in the United States includes
$ 1 9.8 million in 1 996 for high power microwave technology, with a further
$63 million planned over the following seven years [ 1 O] ; $7 1 . 5 million
between 1 997 and 2003 for "High-Power Microwave C2W/IWTechnology"
to "disrupt, degrade, and destroy electronics in communication and infor
mation systems to support command and control/information warfare
(C2W/IW) and suppression of enemy air defense (SEAD) missions" [ 1 1 ) ;
$ 1 8. 5 million i n 1 996 with $88.5 million projected between 1 997 and 2001
for HPM/LASER aircraft self protect missile countermeasures [ 1 2] ; and a
$6.6 million contract let to Hughes Missile Systems for demonstration
of "the high power microwave suppression of enemy air defense (SEAD)
technology" [ 1 3] .
There have been a number of reports of U.S. RF DEW capabilities.
The U.S. Air Force is reported to have modified cruise missiles to take what
is surmised to be an RF DEW [ 1 4] . In 1 999, the Los Alamos National
Laboratory was reported to have developed a high-power microwave weapon
capable of being carried in a laser-guided bomb or cruise missile [ 1 5] . This
device was reported to have a power output of "tens of terrawatts," and a
range of up to 50m. A further indicator of the importance placed on RF
DEW by the United States is the explicit inclusion in 1 982 of monitoring
of nonnuclear electromagnetic pulse (EMP) sources in the functions of the
SIGINT committee [ 1 6] .
Interest in RF weapons has also been evident in The Netherlands,
where the Royal Netherlands Navy has examined the potential impact of
these weapons on future ship design, from both offensive and defensive
perspectives [ 1 7] . The United Kingdom and France are reported to have
significant RF source development efforts [5], with the United Kingdom
also studying a variety of RF weapons [7] . Lesser efforts have been noted
in Germany, Switzerland, China, Japan, Sweden, Israel, and Australia [5] .
The aim of this chapter is to examine the potential impact of RF
DEW, and in particular nonnuclear RF DEW, against land forces. It begins
with a brief discussion of the properties ofRF DEW, followed by an examina
tion of possible platform protection mechanisms and their likely effectiveness.
The power levels required to achieve particular target effects are then analyzed,
and the maximum ranges at which these effects can be achieved. Delivery
mechanisms are then discussed, leading to an analysis of the threat posed
1 96
7 .2 Characteristics of RF D EW
RF DEW operate by projecting electromagnetic energy from a transmitter
onto a target at a sufficient power that electronic systems are damaged or
their operation disturbed. Damage is caused to a wide range of electronic
equipment because components, wires and apertures act as antennas to couple
the weapon's energy into the target. RF DEW, therefore, have the potential
to affect almost all electronic equipment, not j ust communications receivers
that might happen to be tuned to the RF DEW transmission.
7.2.1
1 97
some predefined repetition rime. Such weapons require a large platform due
to rhe weight and space requirements of rhe power generator. In the discussion
below, we will use rhe example of a single RF DEW with a peak power of
10 GW, a pulse length of 1 J.LS and a repetition time of 1 s.
As shown in Figure 7. 1 , rhe nonexplosive RF DEW consists of the
following components: a continuous power generator, a pulse generator, an
RF converter, and an antenna. Some form of cooling is also usually required.
Contin uous Power Generator A source of continuous power is required for
o p eration of rhe RF DEW. This may take rhe form of a battery bank, a
diesel generator or be derived from a vehicle's internal power. The average
power supplied must be greater than the average power required by rhe pulse
generator to allow for losses in the system. For our example 1 0-GW system,
an average power of 1 0 kW is required. In practice, it is unlikely that the
system will be more than 1 0% efficient, so 1 00 kW are probably required.
Pulse Generator A pulse generator stores energy produced by the continuous
power generator and outputs this energy in short pulses. For our example
system, a volume of approximately 0.1 m3 may be required with weight up
to 1 00 kg. In order to minimize losses, rhe pulse generator should be located
as close to the RF converter as possible.
RF Converter The RF converter rakes the output from rhe pulse generator
and produces the signal to be transmitted via the antenna. In a nonexplosive
RF DEW, such as a high power microwave device, rhe RF converter could
be a magnetron that modulates the pulse to shift its frequency into rhe
microwave band. A practical weapon system might have a volume of approx
imately 2 X 1 o-3 m3 and a weight of approximately 40 kg.
Antenna
Antenna
Continuous
power
generator
..
...
Pulse
generator
....
RF converter
""'/
1 98
7.3
Front-Door Damage
1 99
the RF DEW signal and focuses it into the target's own receiving subsystems.
Therefore, from-door damage has much in common with jamming, since
its performance relies on power being coupled into a receiver through a
commumcartons antenna.
7.3.2
Back-Door Damage
200
7.3.3
Propagation Effects
Once the RF DEW energy has been launched from the antenna, it must
propagate to the target. The amount of energy incident on a target is limited
by three factors: radio line-of-sight, atmospheric dielectric breakdown, and
atmospheric absorption.
Radio Line-of-Sight When a radio wave travels through the atmosphere, it
is affected by the refractive index of the atmosphere, which tends to bend
the wave towards the Earth. Lower frequencies are more affected than higher
frequencies, and VHF and low UHF frequencies tend to follow the curvature
of Earth and can therefore travel further than the optical horizon. At higher
frequencies (> 1 GHz) , the radio waves are unaffected by the refractive index
profile and tend to travel in a straight line. In that case, the range of
transmission will be limited by the horizon due to the curvature of the Earth.
This range is called the optical horizon, which would be approximately
1 0 km over a flat surface for an RF DEW mounted 1 0m above the ground,
aimed at a target placed on the ground.
201
1 05
1 07
Least
susceptible
1 o
1 06
1 06
1 03
1 05
1 05
Power SCRs
Power diodes
Relays
1 02
1 o
1 01
1 03
1 02
101
TTL logic
DTL logic
MOS logic
1 01
Transformers
Ind uctors
Relays
Wire-wound
resistors
EMI filters
Carbon
resistors
High power
transistors
Zeners
Vacum tubes
Medium power
transistors
JFETs, SCRs, UJTs
High voltage
rectifiers
Low power
transistors
DTL logic, ECL logic
Signal diodes
1 o
Paper/polyester
film capacitors
1 03
Film resistors
Ceramic/mylar
capacitors
1 02
Tantalum
capacitors
1 01
Low power
switching diodes
TTL logic, MOS logic
1 0"2
Most
susceptible
Motors
Linear ICs
1 0-3
Upset threshold
(W @ 1 1-l-S)
1 0"1
Microwave mixer
diodes
Damage threshold
(W @ 1 !lS)
[19].
spheric dielectric breakdown, which occurs when the high field strength of
the RF DEW electromagnetic signal leads to atmospheric ionization. The
field strength at which breakdown occurs depends on signal frequency and
pulse length as well as on the air pressure [20] . This limit on the power
output (approximately 10 GW) provides a practical limit on the range of a
nonnuclear RF weapon, and is a major reason why RF DEW cannot be
used to cause structural damage at any useful range.
Atmospheric Absorption Atmospheric constituents at particular frequencies
202
203
tolerant devices, and shielding and grounding of cables, subsystems, and full
systems.
MIL-STD- 1 88-125 [2 1 ] gives general requirements for the integration
of EMP hardening with other electromagnetic interference (EMI)/electro
magnetic compatibility (EMC), lightning protection, and TEMPEST design
requirements [22] .
MIL-STD-464 [23] is utilized as the standard to establish the electro
magnetic environmental effects interface requirements and verification crite
ria for all land, air, and sea systems, including associated ordnance. Among
other things, the standard describes the maximum levels of electrical field
allowable in the environments into which systems are to be deployed. These
levels are used in this chapter as the threshold that would have to be exceeded
by the RF DEW to cause any ill effects or damage to target systems.
Platform hardening can be approached at one or more of three layers
or levels: the platform level, the system level, and the equipment interface/
circuit level [24] .
Platform-Level Hardening (Layer 1)
204
rive devices on interface lines, circuit boards, or chips, and selecting harder
circuit components to assure that the equipment can withstand any residual
RF DEW energy. Protective devices need to be individually designed for
each system or circuit to be protected. An example of integrated overvolrage
protection for an HF receiver is shown in Figure 7.3, incorporating spark
gap devices for coarse protection and a varistor and diodes for fine protection.
7.4.3
I
I
I
1 5 kV
600 V
I
I
90 V
5V
I
I
! -=:::::
: Coarse protection
l
I
I
I
:
:
L_ Varistor
I
I
I
.
I
I
--
-=:
.
:::;:=-=
Fine protection
i
I
L _ _ Diodes
(25].
205
206
7.5.1
7.5.2
207
208
Maximum Range
1 00m
1 km
8 km
25 km
209
with the delivery by each of these means. The related issues of protection
against each means of delivery are discussed in Section 7.6.
The details of the size and weight of RF DEW generators are not
available in the public domain. The minimum weight of nonexplosive
RF-DEW capable of generating long pulse trains is likely to be in the range
from 200 to 300 kg, although generators capable of only a single pulse could
be built smaller.
Kopp [29] surmises that explosive generators would be small enough
to fit into a missile or a bomb, and provides some details on how such
weapons might be deployed from existing platforms.
Ground Vehicle A ground vehicle could be used to carry either explosive or
nonexplosive RF DEW. In the case of the explosive generator, the vehicle
itself may not survive activation of the weapon. In the case of the nonexplosive
weapon, the vehicle may require special hardening to enable it to continue
operating after the RF DEW has been activated. Given the impact of terrain
on RF propagation, it will most likely be necessary to provide a means for
increasing the elevation of the RF DEW, either by use of high ground or
by means of a mast. In the case of a single-use RF DEW, a mechanism
similar to that used in a jumping-jack mine might be suitable for small
weapons.
210
system because it operates well above the terrain . However, because of the
range limitations discussed previously, it is unlikely that an airborne RF
DEW would be effective against a hardened target. Furthermore, the carriage
of the required generator capacity on board a fighter aircraft is not thought
to be feasible, but a purpose-built RF "gunship" could be implemented if
the issues of self-damage could be overcome. Such an aircraft may have the
advantage of being able to stand off from a target more than a conventional
ground attack aircraft. This delivery method may be used to provide suppres
sion of enemy air defense (SEAD) prior to launching a conventional attack
to destroy the target.
Missile-Borne RF DEW A missile-borne weapon is thought to be practical
where the RF energy is generated as a result of an explosion. Indeed, there
is evidence that cruise missiles have been modified to enable them to carry
RF DEW [ 1 5 ] . At the extreme, if the power generated was 1 0 GW, the
missile might be able to explode as much as 1 0 km from the target (assuming
line-of-sight between the weapon and the target) and still achieve a significant
impact. Missiles have a similar advantage to aircraft in that they elevate the
RF DEW, and are therefore less affected by terrain than ground-based
systems. Realistically, it is more likely that such devices would only be
effective exploding at ranges of hundreds rather than thousands of meters.
Given that the likely weight of an RF DEW is around 200 kg, it is unlikely
that it will be possible in the near future to use either short-range or medium
range anti-armor weapons (SRAAW or MRAAW) as a launch platform.
Missile-based RF DEW are therefore likely to be launched from larger
ground-based or airborne platforms.
7.5.4
Target Effects
211
7.6
In this section, the characteristics of RF DEW are examined from the point
of view of defense. The potential range is considered first, followed by aspects
specific to the delivery platforms suggested previously.
In Section 7.4, the range of RF DEW was analyzed from the point of
view of having confidence that sufficient power would reach the target to
achieve the desired effect. In this section, however, the issues are examined
from the point of view of being confident that the operation of systems will
not be compromised as long as adversary RF DEW are not activated within
a certain range of the asset being protected.
In Section 7.4, conservative estimates of range were made by assuming
that 1 0-dB loss occurred in the receiving system. In this section, we assume
that there is no loss in the receiving system, making the estimates conservative
with respect to defense. The maximum ranges over which an enemy RF
DEW might be effective, based on the same assumptions made in Section
7.4, are then for equipment protected in accordance with MIL-STD-464:
300m for frequencies less than 1 0 MHz, 3 km for higher frequencies;
destruction of an unprotected transistor attached to a receive antenna:
25 km; and interference with the operation of an unshielded computer:
80 km.
21 2
These figures assume that the only source of loss is free-space loss.
However, additional loss will usually occur due to terrain shielding, diffrac
tion, and reflection. In situations in which there is not a large volume of
air ionized around the RF DEW, these additional losses can be taken into
account by methods similar to those employed for communications planning.
Further confidence in the safety of systems could be obtained by assuming
that the resilience of equipment was degraded (e.g., by 10 dB), compared
to that specified in MIL-STD-464.
These maximum ranges suggest that systems must be protected to the
standards specified in MIL-STD-464. Furthermore, they suggest that unless
terrain shielding is used in an effective manner, headquarters as high as
brigade may be within range of ground-based RF DEW operating from
within enemy-controlled areas. Indeed, hindering illumination by enemy RF
DEW may be considered one of the advantages of a reverse-slope defense.
Another issue worthy of consideration is the identification of the loca
tion of enemy RF DEW. This problem is related to the function performed
by artillery locating units and also to DF in EW. The process of locating
enemy RF DEW may be significantly easier for very high power weapons
that cause significant ionization of the air.
The basis for defense against RF DEW is the establishment of an
exclusion zone around assets to be protected. The key issue in developing
defensive strategies against the various RF DEW delivery platforms is to
identify how the use of the RF DEW changes the capability of the platform
compared to its more conventional weapons systems. In this section, the
defense of vehicles, aircraft, safety and arming systems, personnel, support
equipment command posts, and logistics facilities will be examined.
7.6.1
213
Aircraft
214
reach several thousand amperes. These induced currents are much greater
than aircraft interior wiring currents, which typically range from less than
1A to 1 OA or more [30] .
A high level of RF energy has the potential to damage or destroy
most of electronic-based systems identified earlier: radar, communications
equipment, electrical power generators and engine controls, navigational
aids, electronic flight controls, and weapon fuses.
Solutions require focus on equipment layer hardening. Additionally,
wiring should be replaced with fiber optics, and wiring, housings, plugs and
airframe materials should be effectively earthed and grounded. The cost of
the onboard electronics represents a substantial proportion of an aircraft's
total cost and the cost of maintaining significant holdings of spare parts may
be prohibitive [3 1 ] .
7.6.3
Personnel
215
Support Equipment
Land forces also employ a wide range of support equipment such as ground
based radar, generators, laser-range finders, water purifiers, and kitchens.
Any of this equipment that relies on electronic devices will be vulnerable to
RF DEW. Platform hardening may be difficult and could affect the operation
of the equipment. The best defense measure against RF DEW may be terrain
screen mg.
7.6.6
Command Posts
216
7.6.7
Major logistics installations are likely to be out of the range of artillery and
tank guns. Considerations for the defense of smaller installations such as a
brigade maintenance area will be similar to those applying to a command
post. However, additional difficulty will be experienced in the exclusion of
potential threats from the installation due to the volume of traffic entering
and leaving the facility and the likely need to employ local civilian staff.
The establishment of an exclusion zone may be particularly difficult
in situations in which large numbers of personnel (including possibly civilians
of questionable loyalty) and civilian vehicles are working in close proximity
to, or within, the facility to be protected. This problem is likely to arise in
urban terrain, rear logistics areas, and U.N. operations.
7.7
Summary
Endnotes
[1]
'The Technology That Won the War," Reinventing the Wheel, BBC Radio 4. Available
at: Imp:/ / www . bbc.co. uk/ education/archive/wheel/war.htm.
[2]
O'Neill, ] . ] , Prodzgal Genius: The Life of Nikola Tesla, New York: Ives Washburn,
I 944, p. 239.
[3]
I 987.
217
[4]
"Russia Leads in 'Pulse' Weapons," jane 's Deftnce Weekly, Vol. 18, No. 1 5 , October
1 0, 1 992.
[5]
[6]
Fowler, C., et a!., "Production of Very High Magnetic Fields by Implosion," journal
ofAppiled Physw, Vol. 3, No. 3, 1 960, pp. 588-594.
[7]
"Weapons Systems," jane 's Defence Weekly, Vol. 1 9, No. 24, June 12, 1 993.
[8]
Pasternak, D., "Weapons: The Pentagon's Quest for Non-Lethal Arms Is Amazing.
Bur Is It Smart?" US News and World Report, 1 997, pp. 38-46.
[9 ]
FY 1 997 Defense Technology Area Plan for Weapons, 3.9, U.S. Department of
Defense, 1 996.
[10]
[11]
FY 1 997 Defense Technology Area Plan for Weapons, WE.22.09, U.S. Department
of Defense, 1 996.
[ 1 2]
Joint Science and Technology Master Plan, WE. 1 9.08, U.S. Department of Defense,
1 996.
[ 1 3]
[ 1 4]
[15]
[ 1 6]
[ 1 7]
"Signals, TNO-PML Studies Pulse Weapon I n tegration for Future Frigates," jane's
[ 1 9]
Trippe, A., 'The Threat of Electromagnetic Pulse," National Deftnse, 1984, pp. 22-27.
[20]
Sutton, P., "RF Directed Energy Weapons (DEWs)," RMCS AnnJ' Staff Course Notes,
1 995.
[2 1 ]
Electromagnetic Pulse (EMP) and TEMPEST Protection for Facilities, Engineering and
Design Pamphlet EP 1 1 1 0-3-2, U.S. Army Corps of Engineers, December 1 990.
[23]
218
[24]
[25]
[26]
While generators with power output greater than 1 0 GW are theoretically possible,
they pose a number of practical problems that make them unlikely. The atmospheric
ionization resulting from the use of such powers results in high power losses and poses
a significant threat to the delivery platform that may be unacceptable for nonexplosive
RF DEW.
[28]
[29]
[30]
Soper, G . , and K. Casey, "Understanding the EMP Threat," Defense Elemonics, 1 987,
pp. 1 56- 169.
[3 1 ]
Kopp, C., "A Doctrine for the Use of Electromagnetic Pulse Bomb," Fairbairn ACT:
Air Power Studies Centre, Australia, July 1 993.
[32]
[33]
[34 ]
[35]
[36]
[37]
See, for example, Moore, W., Biological Aspects ofMicrowave Radiation: A Review of
Hazards, U.S. Department of Health, Education and Welfare, Public Health Service,
National Center for Radiological Health, July 1 968; Leary, F., "Researching Microwave
Health Hazards," Electronics, 1 959, p. 49; and Weiss, M . , and W. Mumford, "Micro
wave Radiation Hazards," Health Physic, Vol. 5 , June 1 96 1 , pp. 1 60-1 68.
[38]
Solait, 0., and H. Schwan, "Techniques for Relative Absorption Cross Section Deter
minations," i n 3rdAnnual Tri-Service Conference on B{o-Efficts ofMicrowave Radiating
Equipments, RADC- TR-59-140, 1 959. Sec also Mumford, W., "Some Technical
Aspects of Microwave Radiation Hazards," Proc. IRE, Vol. 49, February 1 96 1 ,
pp. 427-447.
8
Electronic Warfare and Digitization
8.1
Introduction
220
221
has also evolved to carry data as well as voice. Another example is the Internet,
whose terminals are connected by a range of interfaces, including high
performance local area networks (LANs) providing capacities of 1 0 Mbps
or more, cable modems (approximately 0.5 Mbps) , dial-up modems (up to
56 Kbps), and mobile dial-up connections (up to approximately 1 0 Kbps) .
The practical implementation of a single logical network requires the
use of common protocols, especially at the network layer and higher layers,
the use of suitable link-specific protocols at the physical layer and data-link
layer, and ubiquitous encryption to provide security for the network. Given
the current commercial technology, it is most likely that the majority of
information-processing equipment that will use future tactical communica
tions systems will be based on ruggedized computers using the same TCPIIP
protocol used in the Internet.
An outline view of a typical modern network is illustrated in Figure
8. 1 . It is based on a hierarchical structure. Each terminal is connected to a
local network. Each local network is connected to one or more other networks
via a router, denoted "R" in Figure 8 . 1 . The purpose of the router is to
route data between the various local networks. A group of networks and
routers forms an autonomous system (AS) . In a tactical network, a local
network may be the internal network of a headquarters, while an autonomous
system may consist of all the networks and routers in a formation.
One of the advantages of the hierarchical structure shown in Figure
8. 1 is that it minimizes the requirement for network terminals to understand
222
the structure of the network. Terminals only needs two pieces of knowledge
about the network: the identities of the other terminals attached to their
local network (to whom they can therefore transmit data directly) and the
address of the router to which all other traffic should be sent. Routers require
knowledge of the next hop to route data between terminals with their local
AS and the identity of the router that handles traffic destined for outside
the AS. Only these boundary routers require explicit knowledge of the outside
network, and even here the knowledge required relates only to the first hop
outside the AS.
Seamless integration will provide the network for network-centric war
fare, underwritten by a variety of technologies, including those associated with
evolutions of cellular mobile telephone systems (especially third-generation
systems) , satellite technology, network protocols, and miniaturization of
electronics. The move to network-centric warfare will lead to a proliferation
in transmitters, each of which is a potential target for ES, and even EA.
This organic, tactical network will be supported by a range of overlaid
communications systems, including operational and strategic-level military
systems. The U.S. global information grid (GIG) is one such concept, aiming
to provide seamless integration throughout a reliable, assured, cost-effective,
global network. An important means for providing this level of connectivity
will be the incorporation of multiple layers of airborne rebroadcast using
aircraft, UAVs, and satellites [ 1 ] .
8.2.2
Mobile Networks
(a )
223
(b)
Figure 8.2 Mobile networking. Station B is ( a ) in its home network, and ( b ) roaming in a
different network.
or to provide mobile users keys for use in different parts of the network,
imposing difficulty in guaranteeing the security of such widely distributed
keys. The use of wired network connections may reduce difficulties with
security by allowing individual stations to connect to the network without
the use of encryption systems.
In areas exposed to an adversary EA threat, it is likely that the capacity
of wide-area, fully mobile, tactical wireless communications systems, such
as CNR or developments on it, will remain limited. Nonetheless, there is
the potential for local-area communications systems, based on technologies
such as Bluetooth [2] , to offer high-capacity, truly mobile communications.
These systems may offer ranges of no more than tens of meters, operate in
parts of the electromagnetic spectrum that are not regulated (overcoming
the need to take spectrum away from other tactical uses), and offer data
rates up to 2 Mbps. They are likely to employ a range of EP techniques,
including FH [3] , to reduce their susceptibility to both natural and man
made interference. The combination of short range and the use of EP will
enable communications with very low transmit powers, maximizing battery
life [4] .
The provision of such a local-area communications system will enable
the networking of the sensors, weapons, and communications systems carried
by an individual soldier without the weight and inflexibility of connecting
cables. It will also enable the networking of small groups of soldiers, providing
a "section LAN " on which data from sensors and weapons can be shared.
8.2.3
Ad Hoc Networks
224
Figure 8.3
225
lntracluster communications
-+-
l ntercluster backbone
8.2.4
Implications for EW
The advent of the battlefield network will bring with it a number of character
istics already found in commercial networks. One of the most important of
these in the context of EW is the concept of security services [6]. These are
a generalization of the use of encryption to protect information against
unauthorized access. The security services are confidentiality, authentication,
integrity, nonrepudiation, access control, and availability.
Confidentiality Information transmitted through the network should be
226
227
be rvveen the types of attack and the security services used ro protect ::tgai nst
them.
The division of EW into ES, EA, and EP still makes sense in the
context of the network. However, they should be seen in the context of t h e
security services that they are aiming to degrade or provide, rather than
purel y in terms of their relationship ro the electromagnetic spectrum. ES is
the means of exploiting an adversary's use of the elecrromagnetic spectrum
using only passive systems (i.e., receivers). In the language of security services,
ES is about interception, that is, an attack on confidentiality (in the broad
sense defined previously). EA is the means of exploiting an adversary's
use of the electromagnetic spectrum using active means (i.e., transmitters).
Defined in terms of the desired outcome on the adversary's network, these
attacks may take the form of modification, fabrication, or interruption. \XIhen
applied to communications and information systems, EP is the provision of
security services to protect friendly capabilities from the effects of friendly
EA, and adversary ES and EA.
The traditional subdivision of ES into search, intercept, OF, and analysis
remains valid. Derails of the equipment will change to enable, for example,
an intercept receiver ro monitor digital network traffic. ES is primarily used
.
as an attack on confidentiality, wh ether of the contents of a message, the
external characteristics of a message, or the location from which it is trans
mitted.
Similarly, even though the aims of EP may be reframed in terms of
nenvork security services, the basic techniques for providing LPI and resis
tance to jamming will not change.
The application of EA in the context of securiry services and rhe
associated attacks can be understood in terms of the mission given ro an EA
asset. This mission will include a task (e.g., to jam the adversary com m a n d
net) and a required outcome (to deny communications.) The outcome speci
fied here is interruption. An outcome "in order ro force the net to operate
in plain" specifics an interruption arrack, leaving the adversary vulncrahk
to a later interception attack. EA can be used ro prmide modiflcnion.
fabrication, and in rcrru prion atracks. Jamming a n d n c u t ra l i za r i o n a rc excl u
sively associated with inrcrruption; electronic d e ce p ti o n m a y h e assoc i a t ed
w i t h all t h ree.
The usc o f wi reless n etwo rk i n g p rotoco l s creates new nd n cr a h i l i t i e .
m a kin g i n t erru p t i o n poss i b l e by j a m m i ng a n d d ece p t i o n . Tra ns m i t t i n g i g
n a l s rhar i m i rat C t h e tra n s m i s s i o n s of a n aJnrsan-'s d a t a com m u n i c:H i o m
(CSi'vl!\ ) . m ;l\
'
,\
228
229
-+
0.1 - 1 .5
J\
1:_
1
-r;
ns
fjl:-.
;
fj-t
:
7;.1
7; .2
..
230
------- -------
Poss1ble clash
1\
AI\ .
Jj J\
0+-;,_,. 1
0-<'--i..__._ 1
'
'
'
'
!J.
!J.
Transmitter 1
Fi g u re 8.6
Transmitter 2
not prim arily due to overtransmissio n , but arise where the receiver receives
two impulses indicating conflicting values for that symbol. The near-far
effect prevents the design of a multiple-transmitter, multiple-receiver
UWB
25%
of the center
frequency of the signal. The relationship between pulse length and the
8.7. The
transmis
[1 0] .
45
dB
(30,000)
have
5,
fro n t end. These receivers have the potential of having a much lower cost
than traditio nal receivers based on FDMA.
1\
(a)
1/T
(b)
Figure 8.7 The relationship between ( a ) p u lse le ngth and (b) frequency content.
231
Implications for EW
The use of UWB radio will make detection, intercept, and DF impossible
using most conventional ES equipment. Narrowband receivers will see the
UWB transmissions as low-power noise, while wideband systems will see
these transmissions as very short pulses, which they are not designed to
recetve.
The task of a search receiver for UWB radio is of a similar level of
difficulty to other spread-spectrum transmissions. The difficulty is increased,
however, by the very high spreading gains, which can be in excess of 40 dB.
232
233
8.4 H F Radio
In many armies, the use of satellite communications systems has led to a
reduced emphasis on HF radio as a beyond-line-of-sight means of communi
cations. While satellite infrastructure is expensive, it enables the principal
limitations of conventional HF systems (i.e., capacity and reliability) to be
overcome. In conventional HF systems, raw data capacity has been limited
to approximately 2.4 Kbps for a 3-kHz channel. Reliability is limited by
the requirement to use sky-wave propagation to achieve long distances,
which imposes a requirement for a high level of operator expertise, with a
requirement for ongoing training.
Recent advances in HF radio technology, leading to improved data
rates and reliability, have given new life to HF communications, reinforcing
the need for complementary EW systems. Applications include providing
an alternate means to satellite for long-distance communications and long
range, special-forces communications.
8.4.1
234
operators can have great difficulty working with short-term variations in the
characteristics of the channel.
Automatic link establishment (ALE) describes a set of automatic proce
dures that can be used to establish and maintain HF sky-wave communica
tions. It is usual that a station initiating a transfer of data will have available
a number of channels. The connection begins by the initiating station sending
a short message to permit receiving stations to measure link quality. This
process is known as sounding. The receiving stations may measure link quality
by means of the bit error rate or the channel signal-to-noise ratio. Information
on channel quality is returned to the initiating station. The initiating station
may then proceed to the transfer of data if the link quality is acceptable.
Otherwise, it may return to sounding, using another channel. The time
taken for link establishment depends on the number of channels that must
be tried before one with acceptable quality is found, but is usually on the
order of 5 to 20s.
Stations may carry out sounding to maintain current information on
the quality of the available channels, even when they have no data to send.
ALE may be used for voice or data communications, and a number
of standards have been developed [ 1 3] . Some data communications systems
limit the maximum length of message that can be transferred to approximately
one minute. This maximizes the ability of the system to take advantage of
short-term variations in the channel to achieve high data rates, and reduces
the likelihood of the channel quality becoming unacceptable during message
transfer. In a hub-spoke network, limiting the maximum transmit time may
also be useful as a means of providing fair access the channel.
The use of ALE makes possible long-range, reliable H F sky-wave com
munications without the use of skilled operators. However, ALE does impose
overheads, which are necessary for evaluating channel quality and exchanging
this information between stations.
8.4.3
Implications for EW
235
Earth
Ionosphere
Figure 8.8 Areas may not exist where receiving of two communicating HF transmitters
is possible.
236
Digital-toDigital
Power
U p- analog :--+
1-
processing
amplifier
converter
converter
\I
-
RF
amplifier
Analog-toBandDigital
digital ---.
limiting
processing
converter
237
238
8.5.2
Implications for EW
239
Quantum Computing
240
A
Generates random key.
Encodes bit values in the
polarization of single photons,
and transmits.
Optical
channel
Public
channel
Transmits indices of
correctly received bits.
241
Implications for EW
242
Endnotes
[1]
[2 ]
[3]
[4]
[5]
Johnson, D. B., and D. A. Maltz, "Protocols for Adaptive Wireless and Mobile
Networking," IEEE Personal Commumcat1ons, Vol. 3 , No. 1 , February 1 996.
[6]
See, for example, Stallings, S., Network and Internetwork Security, 2nd Edition, Engle
wood Cliffs, NJ: Prentice Hall, 1 99 5 .
[7)
This definition of confidentiality goes further than would usually be the case for a
fixed network. It is required to encompass protection against traffic analysis.
[8]
[9]
See, for example, Scholtz, R. A., "Multiple Access with Time-Hopping Impulse
Modulation," in Proc. M!LCOM, October 1 993; or Win, M. Z., and R. A. Scholtz,
"Impulse Radio: How It Works," IEEE Commumcations Letters, Vol. 2, No. 1 , January
1 998, pp. 1 0- 1 2.
[ 1 0]
Multiple Access Communications Ltd, "An Investigation into the Potential Impact
of Ultra-Wideband Transmission Systems," U.K. Radiocom munications Agency,
RA0699/TDOC/99/002, February 2000.
[ 1 1]
[ 1 2]
A waiver for limited use o f UWB radio by fire and police departments in the United
States was granted by the FCC on June 29, 1 999. This waiver is subject to the use
of UWB radio not interfering with other services.
[ 1 3]
It
243
FED-STD 1 0491 1 "Telecom mun ications: HF Radio A uromat1c L111 k Estab l i shment
i n Stressed Environments, Section I: Linking Protection," July 1 9 93.
[ 1 4]
[ 1 5]
M i rola, J., 'Technical Chall enges i n t h e Globalization of Software Rad io,' IEEE
Comnmmcat1ons Magazmc, Vol. 37, No. 2 , February 1 999, pp. 86-98.
[ I 6]
[ 1 7]
Shor, P. W., "Polynomial-Time Algori thms for Prime Facrorization and D iscrete
Logarithms on a Quantum Computer," SIAM journal of Computmg, Vol. 26, 1 997,
pp. 1 4 8 4 - 1 509.
[ 1 8]
S i ngh, S . , "Quantum Con fi dential," New 5CJei71!St, Vol . I64 , Ocrober 2, 1 999,
pp. 28-33.
[ 1 9]
list of Acronyms
ALE
AM
ARQ
ASK
C2
C2W
C3
CA
CCD
CDMA
CIS
CNR
CNRI
COMSEC
COTS
CP
CRC
CSMA
cw
DES
DEW
DF
DSB
DSSS
246
EA
EOB
ECCM
ECM
EM CON
EMI
EMP
EM SEC
EP
EPLRS
ES
ESM
EW
EWLO
FDMA
FEC
FFT
FH
FM
FSK
GIG
GPS
GSM
HELW
HF
HPM
HPRF
IDEA
IF
IFM
IO
IP
IPB
IW
JTRS
KEA
LPD
LPI
Electronic attack
Electronic order of battle
Electronic counter-countermeasures
Electronic countermeasures
Emission control
Electromagnetic interference
Electromagnetic pulse
Emission security
Electronic protection
Enhanced position locating and reporting system
Electronic support
Electronic support measures
Electronic warfare
Electronic warfare liaison officer
Frequency-division multiple access
Forward error correction
Fast Fourier transform
Frequency hopping
Frequency modulation
Frequency shift keying
Global information grid
Global positioning system
Global system for mobile communication
High-energy laser weapon
High frequency
High-power microwave
High power radio frequency
International data encryption algorithm
Intermediate frequency
Instantaneous frequency measurement
Information operations
Internet protocol
Intelligence preparation of the battlefield
Information warfare
Joint tactical radio system
Key exchange algorithm
Low probability of detection
Low probability of intercept
List ofAcronJ'n1S
LSB
MLRS
MRAAW
NATO
NBC
NCS
NCW
N-EMP
NTDR
PCS
PKA
PN
PSK
QAM
QKD
QPSK
RF
RS
RSA
SCRA
SEAD
SHF
SINCGARS
SO]
SRAAW
SSB
TCP
TDMA
UAV
UHF
USB
UWB
VHF
VSB
Lower sideband
Multiple-launch rocket system
Medium-range anti-armor weapon
North Atlantic Treaty Organization
Nuclear, biological, and chemical
Net control station
Network-centric warfare
Nuclear electromagnetic pulse
Near-term digital radio
Personal communications systems
Public key authority
Pseudonoise
Phase shift keying
Quadrature amplitude modulation
Quantum key distribution
Quadrature phase shift keying
Radio frequency
Reed-Solomon
Rivest-Shamir-Adleman
Single-channel radio access
Suppression of enemy air defense
Super-high frequency
Single channel ground and air radio system
Standoff jammer
Short-range anti-armor weapon
Single sideband
Transmission control protocol
Time-division multiple access
Uninhabited aerial vehicle
Ultra high frequency
Upper sideband
Ultra wide band
Very high frequency
Vestigial side band
247
250
I n d ex
i n tegration with wider network, 225
connections, 37
defined, 32
subsystem
Airborne platform
ES , 139-40
RF DEW, 2 1 0
defined, 57, 6 1
diversity, 62, 89
encryption, 62, 63-70
subsystem
Amplitude d i fference, 1 20
70-84
techniques, 6 1 -63
cryptanalysis, I 36
defi ned, 99, 1 3 5
1 36-38
advantages, 1 28
defined, 1 27
11-elemenr, 1 27
and,
138
opera tio n o f, 1 27
spacing, 1 28
traffic, 1 3 5-36
Sec also Electro n i c support (ES)
d e fi n e d ,
j a m m i ng,
RF D EW,
224
251
1 59
209
252
Assessment, 1 80, 1 8 5
Asset management, 1 84
Atmospheric absorption, 20 1-2
Atmospheric dielectric breakdown,
200-2 0 1
Auromatic link establishment (ALE),
233-34, 235
Auromatic repeat request (ARQ), 8 5
Auronomous system (AS) , 2 2 1
Barrage jamming, 1 49-50
Banlefield digirizarion. See Digitized
banlefield
Bearers, 35-36, 37
Block cipher, 65-66
Boyd cycle. See C2 cycle
B ragg cell receiver, 1 03
Broadcast relay, 52
Bulk encryption, 64
Burst errors, 85
Burst transmissions, 62, 87-88
defined, 87
effectiveness, 87-88
C2 cycle, 7-9
defined, 7
EW impact o n , 1 3
illustrated, 8
movement through, 1 1
use of, 8
Carrier-sense multiple access (CSMA), 4 1 ,
43
Certificate authorities (CAs), 68-69
Channel coding, 85
Channelized search receiver, 1 03-4
defined, 1 03
illustrated, 1 04
searches, 1 04
Chirping, 70-71
Code-division multiple access (COMA),
4 1 , 43, 75
net-oriented communications and, 78
overallocarion of channel capaciry, 77
Collection management, 1 8 8-9 1
defined, 1 8 8
process illusrrarion, 1 88
Index
Commercial off-the-shelf (COTS)
equipment, 228-29
Communication and information systems
(CIS), 1 69, 1 7 1
Communications electronic warfare, xiii,
14
Compressive search receiver, 1 04-5
defined, 1 04
illustrated, I 05
search rate, 1 0 5
Concatenated codes, 86-87
Concave OF baseline, I 30, I 3 1
Continuous wave (CW), 1 96
Convex OF baseline, 1 30, I 3 1
Crossed-loop antenna, 1 26-27
defined, 1 26
disadvantages, I 27
illustrated, 1 26
See also Watson-Watt OF
Cryptanalysis, 69, I36
Crystal video receiver, 1 03
Data-capable CNR, 45
Data Encryption Standard (DES), 67
Deception planning, 187-88
Decision, I 80-84
asset management, I84
defined, I 79, 1 80
information requirements management,
1 83
initial plan, 1 8 I
key outputs, 1 8 0
miSSion management, I 83-84
process illustration, I 8 1
superiority, 3
target development, I 8 I-83
See also EW targeting process
Decision cycle. See C2 cycle
Defense RF DEW, 2 I I - I 6
aircraft, 2 13-1 4
basis, 2 1 2
command posts, 2 1 5
land vehicles and shelters, 2 1 2-I3
logistics installations, 2 I 6
personnel, 2 1 4- 1 5
safety and arming system, 2 1 4
253
support equipment, 2 1 5
254
Index
architecture illustration, 58, 1 00, 144,
170
communications, xiii, 1 4
defined, 1 3
digitization and, 2 1 9-4 1
HF radio implications for, 234-36
impact on C2 cycle, 1 3
innovation, 1 4
land command and control, 1 69-9 1
network implications for, 225-29
noncommunications, 1 4
overall view of, 17
planning, 1 69
quantum cryptography implications
for, 24 1
software radio implications for, 238
subdivisions, 1 5- 1 6
system illustration, 1 76
i n tactical land environment, 1 5
techniques, 1 6
UWB radio implications for, 23 1-33
See also EW targeting process; EW
units
Emission control, 59
Encryption, 62, 63-70
bulk, 64
certificate authorities (CAs), 68-69
computationally
. secure, 69
defined, 62
forms, 64
level of security, 69-70
message, 64
message-content, 64
private-key, 66-68
public-key, 66-68
public-key authorities (PKAs), 68
randomness, 64-65
secret-key, 66
stream and block ciphers, 65-66
systematic weaknesses, 69-70
unconditionally secure, 69
Enhanced Position Locating and
Reponing System (EPLRS)
radio, 4 8 , 92-93
continuity of operations, 48-49
defined, 48, 92
net conrrol station (NCS), 48, 49
255
network, 93
support, 92
Error-protection coding, 62, 84-87
ARQ, 85
concatenated codes, 86-87
FEC, 85-86
interleaving, 86
use of, 62
EW liaison officers (EWLO), 1 77
EW targeting process, 1 79-88
assessment, 180, 1 85
deception planning, 1 87-88
decision, 1 79, 1 80-84
delivery, 1 79, 1 85
detection, 1 79, 1 84-85
parts, 1 79-80
EW units
area coverage required, 172
capacity, 1 72
command and control, 1 73, 176-77
EA and, 174
economy, 1 73
electronic signature, 1 72
ES and, 1 75-76
minimum levels of operation, 1 7 1
operation on-the-move, 1 72
organization, 1 7 1 -77
platform capacity, 173
platform mobility, 1 72-73
quality, 1 72
redundancy, 1 72
requirement for similar/same coverage,
1 73
support requirements, 173
See also Electronic warfare (EW)
Explosive RF DEW, 196-98
Fast frequency hopping, 80
Field-programmable gate arrays (FPGA),
237-38
Fingerprinting, 1 1 2
Focused logistics, 4
Forward error correction ( F EC), 85-86
Fourth-generation trunk nerworks, 32, Yl
Free-channel search, 62-63
Frequency di\'ersiry, 89
256
Index
digital, 1 1 6- 1 7
granularity o f tuning, 1 1 4
modulation, 1 1 4
multichannel, 1 1 4
noise performance, 1 1 3
range of tuning, 1 1 3- 1 4
RF gain, 1 1 4
sensitivity, 1 1 3
superheterodyne, 1 1 5-1 6
Interconnections, 30
Interfaces, trunk communications
subsystem, 39
Interleaving, 86
International Data Encryption Algorithm
(IDEA), 67
In-theater broadcast, 52
Intranet rebroadcast, 46
IS-95, 93-95
defined, 93
downlink modulation, 94
downlink processing, 94
DSSS in, 95
Jammers
airborne, 1 58-59
artillery-delivered, 1 59
barrage, 1 49-50
comb, 1 5 1
ground vehicle, 1 57-58
man-porta.ble, 1 58
responsive, 1 5 1 -53
spot, 148-49
standoff (SOJs), 1 53-55
swept, 1 50
unattended (UAJs), 1 53-55
Jamming, 1 44-59
airborne platform, 1 5 8-59
airborne subsystem and, 1 56-57
artillery-delivered platform, 1 59
barrage, 1 49-50
CNR subsystem and, 1 56
comb, 1 5 1
communications, types of, 1 47-53
effectiveness conditions, 146
with ES support, 144
ground vehicle platform, 1 57-58
man-portable platform, 1 58
257
operational factors, 1 53
platforms, 1 5 7-59
resistance, 24-25
responsive, 1 5 1 -53
signals, 146-47
siting for facilities, 1 86-87
spot, 148-49
swept, 1 50
tactical communications system and,
1 55-57
tactical data distribution subsystem
and, 1 56
tactical trunk subsystems and, 1 55-56
use of, 144-45
UWB transmission, 232
See aLso Electronic attack (EA)
Jamming-to-signal ratio, 1 45-46
Joint Tactical Information Distribution
System (JTIDS), 90-91
Joint Tactical Radio System (JTRS), 238
Joint Vision 2020 (JV2020), 3--4
defined, 3
definitions, 3--4
information operations emphasis, 4
Key Exchange Algorithm (KEA), 68
Land EW command and control, 1 69-91
collection management, 1 88-9 1
EW targeting process, 179-88
EW unit organization, 1 71-77
introductio n to, 1 69-7 1
tactical planning process, 1 77-79
See also Command and control
Laser weapons, 1 64-66
conventional, 1 65
higher-energy (HELWs) , 165-66
Lazy-W DF baseline, 130-32
Local subsystem, 29
Low probability of interception (LPI), 24
as active EP goal, 6 1
requirements, 25
.techniques, '24
Manipulative electronic deception, I()()_() I
M.iln-porrable platform
ES, 1 39
jamming, 1 58
258
Message-content encryption, 64
Message encryption, 64
Military radio relay, 90
MIL-STD-464, 207, 2 1 2, 2 14, 2 1 6 , 228
Mission management, 1 83-84
Mobile networks, 222-23
Mobile trunk access, 37-38
Monitoring. See Intercept
Multiple access, 4 1
COMA, 4 1 , 4 3 , 7 5 , 77, 78
CSMA, 4 1 , 43
FDMA, 4 I , 42
TDMA, 4 I , 42, 48, 9 1
techniques, 4 1 , 42-43
Multirole multiband radio-advanced
demonstrator model
(MMR-ADM), 238
Narrowband excision, 62, 88
Narrowband receivers, I 0 I -3
detection time, I 03
scanning, I O I -2
superheterodyne se,lrch, I 02
Near-far effect
DSSS, 77-78
frequency hopping (FH), 83
Near-term digital radio (NTDR), 93
Nwvork-centric warfare (NCW) , 4-6
defined, 5
grid arrangement, 6
interlocking grids, 5
Network management facility (NMF), 35
Networks
ad hoc, 223-25
autonomous system (AS), 22I
digitized battlefield orientation, 2 I 9
issues, 220-29
mobile, 222-23
seamless integration, 220-22
TCP/IP, 22I
Neutralization, I 64-66
defined, I 64
EMP, 1 64
high-power RF weapons, I 66
laser weapons, I 64-66
Node operation center (NOC) , 34-35
Index
atmospheric dielectric breakdown,
200-201
radio line-of-sight, 200
Public-key authorities (PKAs), 68
Public-key encryption, 66-68
Quality of service (QoS), 24
Quantum computing, 239
Quantum cryptography, 239-4 1
defined, 239
implications for EW, 241
key exchange process, 240
Quantum key distribution (QKD), 239
Radio access points (RAP), 37-38
configuration for mobile subscribers,
38
defined, 37
Radio frequency directed energy weapons.
See RF DEW
Radio relay, 36, 90
Radio silence, 59
Responsive jamming, 1 5 1-53
Retransmission, appropriate use of, 63
RF DEW, 1 93-2 1 6
airborne, 2 1 0
antenna, 197-98
backdoor damage, 1 99
continuous power generator, 1 97
continuous wave, 1 96
cooling, 198
damage mechanisms employed by, 200
defensive, 2 1 1 - 1 6
defined, 1 93
delivery factors, 206-7
delivery platforms, 208- 1 0
existence of, 1 94, 1 95
explosive, 1 96-98
front-door damage, 1 98-99
funding for, 195
generators, 209
location identification, 2 1 2
missile-borne, 2 1 0
nonexplosive, 1 96-98
offensive, 205-l l
platform protection, 202-5
potential impact of, 1 95-96
propagation effects, 200-202
259
pulsed, 1 96
pulse generator, 1 97
range of, 207-8, 2 1 1-12
research in, 1 94
RF converter, 1 97
summary, 2 1 6
target effect mechanisms, 198-202
target effects, 2 1 0-1 1
rhrear, 1 93
Rivesr-Shamir-Adleman (RSA) algorithm,
68
Rotating directional antenna, 1 20, 1 23-24
advantages, 1 24
disadvantages, 1 24
radiation patterns, 1 23
Scanning receivers, 1 0 1-2
Search, 99, 1 00- 1 1 2
CNR subsystem and, 1 1 0-l l
defined, 99, 1 00
narrowband receivers, 10 1-3
process, 1 0 1
receivers, 1 00, l 0 1
siring for facilities, 1 89
tactical airborne subsystem and,
1 1 1-12
tactical communications system and,
1 07-1 2
tactical data distribution subsystem
and, I l l
trunk communications subsystem and,
1 07-1 0
wideband receivers, 1 03-7
See also Electronic support (ES)
Secret-key encryption, 66
Security, 43, 1 70
communications system structure, 63
encryption, 69-70
Security services, 225-29
access control, 226
attacks against, 226-27
authentication, 226
availability, 226
confidentiality, 225
defined, 225
EA application and, 227
integrity, 226
nonrepudiation, 226
260
Shielding, 58-59
Signal dispatch service (SDS), 30
Signals intelligence (SIGINT) , 1 4
Simulative electronic deception, 1 6 1
Single channel radio access (SCRA), 37
Siring, 60-61
for analysis facilities, 1 9 1
for deception facilities, 1 87-88
for DF facilities, 1 90-9 1
for intercept facilities, 1 8 9-90
for jamming facili ties, 1 86-87
for search facilities, 189
Sky-wave communications, 44
defined, 44
footprint of, I I 0
Slow frequency hopping, 80
Software radio, 236-38
implications for EW, 238
receiver architecture, 236
technologies, 237-38
transmitter architecture, 236
use of, 236-37
Sounding, 234
Space diversity, 89
Special forces, RF DEW delivery, 209
Spot jamming, 1 48-49
Spreading gain, 7 1 , 74
defined, 7 1
measurement, 74
Spread-spectrum communications, 62,
70-84
chirping, 70-7 1
defined, 62
direct-seq uence (DSSS), 7 1 -79
frequency hopping, 79-84
technique comparison, 84
techniques, 70-71
Standalone DF basel ine, 1 30
Standoff jammers (SOJs), 1 53-55
Stream cipher, 65-66
Superheterodyne in tercept receiver,
1 1 5- 1 6
S uperheterodyne search receivers, I 02
S urface-wave propagation, 44
Surveillance and target acquisition (STA), 7
Swept jamming, 1 50
Synthetic aperture radar (SAR) sensors, 53
Index
intercept and, 1 1 7- 1 9
introduction to, 2 1
jamming and, 1 5 5-57
search and, 1 07-1 2
summary, 5 4
support, 30
tactical airborne subsystem, 49-53
tactical data distribution subsystem,
47-49
trunk communications subsystem,
30-39
See also Tactical communications
design drivers
Tactical data distribution subsystem,
28-29, 47-49
analysis and, 1 3 8
defined, 29
DF and, 1 34-35
EPLRS radio, 48-49
i ntercept and, 1 1 9
jamming and, 1 56
search and, 1 1 1
See also Tactical communications
system
Tactical internet, 46-47
Tactical planning process, 1 77-79
TADIL-J, 48, 90-92
defined, 90
operating modes, 92
operation, 9 1
time-slot structure, 9 1
Target development, 1 8 1-83
defined, 1 82
EA effects, 1 82
elements, 1 82
information requirements generation,
1 83
Target effect mechanisms, 1 98-202
back-door damage, 1 9 9
front-door damage, 1 98-99
propagation effects, 200-202
See also RF DEW
TCP/IP network, 2 2 1
TEMPEST, 59, 228
Terrain shielding
defined, 60
illustrated, 6 1
261
262
Artech H o use
46 G i l l i ng h a m Street
Norwood, MA 02062
Lo n d o n SW 1 V 1 A H U K
Phone: 7 8 1 -769-9750
P h o n e : +44 (0)20-7596-8750
Fax: 7 8 1 -769-6334
e-ma i l : a rtech-uk@artechhouse.com