Chapter 16 Electronic and Information Warfare
Basics Electronic Attack Deception Soft Kill/Hard Kill Electronic protection Electronic Support
Communication Systems Radio Systems Point to point and broadcast Fixed sites, HQ to political leadership Covert assets, agents in field Tactical communications Control and telemetry messages
Signals Intelligence techniques Mapped enemies network RDF Radio Direction Finding Traffic analysis Identify “interesting” messages Signal collection Echelon
Attacks on Communications Easier to steal key material than crack encryption Content access not always the goal Jamming can be effective also Active deception Disruption of capabilities Hard kill Soft kill
Protection techniques Dedicated lines optical fiber Highly directional transmission links Low probability of intercept (LPI) Low probability of position fix (LPPF) Frequency hoppers, direct spread spectrum, burst transmission, Meteor scatter
Interaction Military Civilian GPS Military initially limited accuracy During Gulf war lack of military units required use of civilian units and hence had to turn off limiting FAA found ways around limited availability 2000 turned off limited capability Mobile phones
Skipped Radar IFF systems
Directed Energy Weapons Will address in article (DEW) Information Warfare Desert Storm Cruise missiles Jammers Special forces Hacking attacks on computers and networks
Other notions Many comparisons between Military and civilian issues Pages E-war versus I-War Pages
Articles Meteor scatter uses Current use of Directed Energy Weapons