Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000004887935 | UG485 F73 2001 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
This authoritative new resource explores the communications aspect of electronic warfare and presents the major technical issues that drive the practice of land EW to help practitioners with their work in the field. The book offers a detailed understanding of the structure of tactical communications electronic warfare systems, the relationship between these systems and their targets, and the likely future development path of land electronic warfare. Written in a clear, easy-to-understand style, with accessible descriptions of tactical communications EW techniques, the book is a useful reference for technical and non-technical professionals alike.
Author Notes
Michael Ryan received his Masters of Engineering Science and his Ph.D. in electrical engineering from the University of New South Wales.
Mr. Ryan is a senior lecturer at the University of New South Wales in Australia.
050
Table of Contents
Preface | p. xiii |
1 The Digitized Battlefield | p. 1 |
1.1 The Operational Environment | p. 1 |
1.2 Command and Control | p. 6 |
1.2.1 The C2 Cycle | p. 7 |
1.2.2 Command Systems | p. 9 |
1.3 Information Warfare | p. 11 |
1.4 Electronic Warfare | p. 12 |
1.4.1 Communications and Noncommunications EW | p. 14 |
1.4.2 EW Subdivisions | p. 15 |
1.4.3 Other Categories of EW | p. 16 |
1.5 Summary | p. 16 |
Endnotes | p. 18 |
2 Tactical Communications Systems | p. 21 |
2.1 Introduction | p. 21 |
2.2 Architectural Drivers | p. 21 |
2.3 Current Tactical Communications Architecture | p. 25 |
2.4 A Suitable Tactical Communications Architecture for Future Land Warfare | p. 27 |
2.5 Trunk Communications Subsystem | p. 30 |
2.5.1 Fourth-Generation Trunk Networks | p. 32 |
2.5.2 Trunk Nodes | p. 32 |
2.5.3 Bearers | p. 35 |
2.5.4 Access Nodes | p. 36 |
2.5.5 Mobile Trunk Access | p. 37 |
2.5.6 Combat Net Radio Interface (CNRI) | p. 38 |
2.5.7 Interfaces to the Tactical Trunk Subsystem | p. 39 |
2.6 CNR Subsystem | p. 40 |
2.6.1 Key Architectural Issues for CNR | p. 40 |
2.6.2 Range of Communications | p. 44 |
2.6.3 Modern CNR Solutions | p. 45 |
2.7 Tactical Data Distribution Subsystem | p. 47 |
2.8 Tactical Airborne Subsystem | p. 49 |
2.8.1 Additional Communications Services | p. 51 |
2.9 Potential Targets for Tactical Communications EW | p. 53 |
2.10 Summary | p. 54 |
Endnotes | p. 54 |
3 Electronic Protection | p. 57 |
3.1 Introduction | p. 57 |
3.2 Passive Electronic Protection | p. 57 |
3.2.1 Identical Equipment | p. 58 |
3.2.2 Shielding | p. 58 |
3.2.3 Emission Control | p. 59 |
3.2.4 Directional Antennas | p. 59 |
3.2.5 Frequency Management | p. 60 |
3.2.6 Alternate Means | p. 60 |
3.2.7 Siting | p. 60 |
3.3 Active Electronic Protection | p. 61 |
3.3.1 Encryption | p. 63 |
3.3.2 Spread-Spectrum Communications | p. 70 |
3.3.3 Error-Protection Coding | p. 84 |
3.3.4 Burst Transmission | p. 87 |
3.3.5 Narrowband Excision | p. 88 |
3.3.6 Diversity | p. 89 |
3.4 Use of EP Techniques in Communications Systems | p. 89 |
3.4.1 CNR | p. 89 |
3.4.2 Military Radio Relay | p. 90 |
3.4.3 TADIL-J (Link-16) | p. 90 |
3.4.4 Enhanced Position Locating and Reporting System (EPLRS) | p. 92 |
3.4.5 Near-Term Digital Radio (NTDR) | p. 93 |
3.4.6 IS-95 | p. 93 |
3.4.7 GSM | p. 95 |
Endnotes | p. 96 |
4 Electronic Support | p. 99 |
4.1 Introduction | p. 99 |
4.2 Search | p. 100 |
4.2.1 Narrowband Receivers | p. 101 |
4.2.2 Wideband Receivers | p. 103 |
4.2.3 Search and the Tactical Communications System | p. 107 |
4.3 Intercept (Monitoring) | p. 112 |
4.3.1 Characteristics of Intercept Receivers | p. 113 |
4.3.2 Intercept Receivers | p. 114 |
4.3.3 Intercept and the Tactical Communications System | p. 117 |
4.4 Direction Finding | p. 119 |
4.4.1 Sources of Error | p. 122 |
4.4.2 Rotating Directional Antenna | p. 123 |
4.4.3 Watson-Watt DF | p. 124 |
4.4.4 Wullenweber DF | p. 128 |
4.4.5 Doppler DF | p. 128 |
4.4.6 The DF Baseline | p. 130 |
4.4.7 DF and the Tactical Communications System | p. 132 |
4.5 Analysis | p. 135 |
4.5.1 Traffic Analysis | p. 135 |
4.5.2 Cryptanalysis | p. 136 |
4.5.3 The Analysis Function and the Tactical Communications System | p. 136 |
4.6 ES Platforms | p. 138 |
4.6.1 Ground Platforms | p. 138 |
4.6.2 Air Platforms | p. 139 |
Endnotes | p. 140 |
5 Electronic Attack | p. 143 |
5.1 Introduction | p. 143 |
5.2 Jamming | p. 144 |
5.2.1 Jamming-to-Signal Ratio | p. 145 |
5.2.2 Jamming Signals | p. 146 |
5.2.3 Types of Communications Jamming | p. 147 |
5.2.4 Operational Factors | p. 153 |
5.2.5 Standoff Versus Unattended Jammers | p. 153 |
5.2.6 Jamming and the Tactical Communications System | p. 155 |
5.2.7 Jamming Platforms | p. 157 |
5.3 Electronic Deception | p. 159 |
5.3.1 Manipulative Electronic Deception | p. 160 |
5.3.2 Simulative Electronic Deception | p. 161 |
5.3.3 Imitative Electronic Deception | p. 161 |
5.3.4 Example Electronic Deception Techniques | p. 162 |
5.3.5 Received Power | p. 163 |
5.4 Neutralization | p. 164 |
5.4.1 Laser Weapons | p. 164 |
5.4.2 High-Power RF Weapons | p. 166 |
Endnotes | p. 166 |
6 Land EW Command and Control | p. 169 |
6.1 Introduction | p. 169 |
6.2 EW Unit Organization | p. 171 |
6.2.1 Electronic Attack | p. 174 |
6.2.2 Electronic Support | p. 175 |
6.2.3 EW Command and Control | p. 176 |
6.3 The Tactical Planning Process | p. 177 |
6.4 The EW Targeting Process | p. 179 |
6.4.1 Decision | p. 180 |
6.4.2 Detection | p. 184 |
6.4.3 Delivery | p. 185 |
6.4.4 Assessment | p. 185 |
6.4.5 Siting Considerations for Jamming Facilities | p. 186 |
6.4.6 Deception Planning | p. 187 |
6.5 Collection Management | p. 188 |
6.5.1 The Collection Management Process | p. 188 |
6.5.2 Siting Considerations for Search Facilities | p. 189 |
6.5.3 Siting Considerations for Intercept Facilities | p. 189 |
6.5.4 Siting Considerations for DF Facilities | p. 190 |
6.5.5 Siting Considerations for Analysis Facilities | p. 191 |
Endnotes | p. 192 |
7 Radio Frequency Directed Energy Weapons | p. 193 |
7.1 Introduction | p. 193 |
7.2 Characteristics of RF DEW | p. 196 |
7.2.1 Continuous Wave and Pulsed RF DEW | p. 196 |
7.2.2 Explosive and Nonexplosive RF DEW | p. 196 |
7.3 Target Effect Mechanisms | p. 198 |
7.3.1 Front-Door Damage | p. 198 |
7.3.2 Back-Door Damage | p. 199 |
7.3.3 Damage Mechanisms Employed by RF DEW | p. 200 |
7.3.4 Propagation Effects | p. 200 |
7.4 Platform Protection | p. 202 |
7.4.1 Avoidance of Illumination | p. 202 |
7.4.2 Hardening Techniques | p. 202 |
7.4.3 Issues Associated with the Protection Provision | p. 204 |
7.5 Analysis: Offensive RF DEW | p. 205 |
7.5.1 Delivery Factors | p. 206 |
7.5.2 Range of RF DEW | p. 207 |
7.5.3 Delivery Platforms | p. 208 |
7.5.4 Target Effects | p. 210 |
7.6 Analysis: Defense Against RF DEW | p. 211 |
7.6.1 Land Vehicles and Shelters | p. 212 |
7.6.2 Aircraft | p. 213 |
7.6.3 Safety and Arming Systems | p. 214 |
7.6.4 Personnel | p. 214 |
7.6.5 Support Equipment | p. 215 |
7.6.6 Command Posts | p. 215 |
7.6.7 Logistics Installations | p. 216 |
7.7 Summary | p. 216 |
Endnotes | p. 216 |
8 Electronic Warfare and Digitization | p. 219 |
8.1 Introduction | p. 219 |
8.2 Network Issues | p. 220 |
8.2.1 Seamless Integration | p. 220 |
8.2.2 Mobile Networks | p. 222 |
8.2.3 Ad Hoc Networks | p. 223 |
8.2.4 Implications for EW | p. 225 |
8.3 UWB Radio | p. 229 |
8.3.1 Implications for EW | p. 231 |
8.4 HF Radio | p. 233 |
8.4.1 High-Speed HF Modem Technology | p. 233 |
8.4.2 HF Automatic Link Establishment | p. 233 |
8.4.3 Implications for EW | p. 234 |
8.5 Software Radio | p. 236 |
8.5.1 Key Software Radio Technologies | p. 237 |
8.5.2 Implications for EW | p. 238 |
8.6 Quantum Computing and Quantum Cryptography | p. 239 |
8.6.1 Quantum Computing | p. 239 |
8.6.2 Quantum Cryptography | p. 239 |
8.6.3 Implications for EW | p. 241 |
Endnotes | p. 242 |
List of Acronyms | p. 245 |
About the Authors | p. 249 |
Index | p. 251 |