Cover image for Electronic warfare for the digitized battlefield
Title:
Electronic warfare for the digitized battlefield
Personal Author:
Series:
The Artech House information warfare library
Publication Information:
Boston, MA : Artech House, 2001
ISBN:
9781580532716

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000004887935 UG485 F73 2001 Open Access Book Book
Searching...

On Order

Summary

Summary

This authoritative new resource explores the communications aspect of electronic warfare and presents the major technical issues that drive the practice of land EW to help practitioners with their work in the field. The book offers a detailed understanding of the structure of tactical communications electronic warfare systems, the relationship between these systems and their targets, and the likely future development path of land electronic warfare. Written in a clear, easy-to-understand style, with accessible descriptions of tactical communications EW techniques, the book is a useful reference for technical and non-technical professionals alike.


Author Notes

Michael Ryan received his Masters of Engineering Science and his Ph.D. in electrical engineering from the University of New South Wales.

Mr. Ryan is a senior lecturer at the University of New South Wales in Australia.

050


Table of Contents

Prefacep. xiii
1 The Digitized Battlefieldp. 1
1.1 The Operational Environmentp. 1
1.2 Command and Controlp. 6
1.2.1 The C2 Cyclep. 7
1.2.2 Command Systemsp. 9
1.3 Information Warfarep. 11
1.4 Electronic Warfarep. 12
1.4.1 Communications and Noncommunications EWp. 14
1.4.2 EW Subdivisionsp. 15
1.4.3 Other Categories of EWp. 16
1.5 Summaryp. 16
Endnotesp. 18
2 Tactical Communications Systemsp. 21
2.1 Introductionp. 21
2.2 Architectural Driversp. 21
2.3 Current Tactical Communications Architecturep. 25
2.4 A Suitable Tactical Communications Architecture for Future Land Warfarep. 27
2.5 Trunk Communications Subsystemp. 30
2.5.1 Fourth-Generation Trunk Networksp. 32
2.5.2 Trunk Nodesp. 32
2.5.3 Bearersp. 35
2.5.4 Access Nodesp. 36
2.5.5 Mobile Trunk Accessp. 37
2.5.6 Combat Net Radio Interface (CNRI)p. 38
2.5.7 Interfaces to the Tactical Trunk Subsystemp. 39
2.6 CNR Subsystemp. 40
2.6.1 Key Architectural Issues for CNRp. 40
2.6.2 Range of Communicationsp. 44
2.6.3 Modern CNR Solutionsp. 45
2.7 Tactical Data Distribution Subsystemp. 47
2.8 Tactical Airborne Subsystemp. 49
2.8.1 Additional Communications Servicesp. 51
2.9 Potential Targets for Tactical Communications EWp. 53
2.10 Summaryp. 54
Endnotesp. 54
3 Electronic Protectionp. 57
3.1 Introductionp. 57
3.2 Passive Electronic Protectionp. 57
3.2.1 Identical Equipmentp. 58
3.2.2 Shieldingp. 58
3.2.3 Emission Controlp. 59
3.2.4 Directional Antennasp. 59
3.2.5 Frequency Managementp. 60
3.2.6 Alternate Meansp. 60
3.2.7 Sitingp. 60
3.3 Active Electronic Protectionp. 61
3.3.1 Encryptionp. 63
3.3.2 Spread-Spectrum Communicationsp. 70
3.3.3 Error-Protection Codingp. 84
3.3.4 Burst Transmissionp. 87
3.3.5 Narrowband Excisionp. 88
3.3.6 Diversityp. 89
3.4 Use of EP Techniques in Communications Systemsp. 89
3.4.1 CNRp. 89
3.4.2 Military Radio Relayp. 90
3.4.3 TADIL-J (Link-16)p. 90
3.4.4 Enhanced Position Locating and Reporting System (EPLRS)p. 92
3.4.5 Near-Term Digital Radio (NTDR)p. 93
3.4.6 IS-95p. 93
3.4.7 GSMp. 95
Endnotesp. 96
4 Electronic Supportp. 99
4.1 Introductionp. 99
4.2 Searchp. 100
4.2.1 Narrowband Receiversp. 101
4.2.2 Wideband Receiversp. 103
4.2.3 Search and the Tactical Communications Systemp. 107
4.3 Intercept (Monitoring)p. 112
4.3.1 Characteristics of Intercept Receiversp. 113
4.3.2 Intercept Receiversp. 114
4.3.3 Intercept and the Tactical Communications Systemp. 117
4.4 Direction Findingp. 119
4.4.1 Sources of Errorp. 122
4.4.2 Rotating Directional Antennap. 123
4.4.3 Watson-Watt DFp. 124
4.4.4 Wullenweber DFp. 128
4.4.5 Doppler DFp. 128
4.4.6 The DF Baselinep. 130
4.4.7 DF and the Tactical Communications Systemp. 132
4.5 Analysisp. 135
4.5.1 Traffic Analysisp. 135
4.5.2 Cryptanalysisp. 136
4.5.3 The Analysis Function and the Tactical Communications Systemp. 136
4.6 ES Platformsp. 138
4.6.1 Ground Platformsp. 138
4.6.2 Air Platformsp. 139
Endnotesp. 140
5 Electronic Attackp. 143
5.1 Introductionp. 143
5.2 Jammingp. 144
5.2.1 Jamming-to-Signal Ratiop. 145
5.2.2 Jamming Signalsp. 146
5.2.3 Types of Communications Jammingp. 147
5.2.4 Operational Factorsp. 153
5.2.5 Standoff Versus Unattended Jammersp. 153
5.2.6 Jamming and the Tactical Communications Systemp. 155
5.2.7 Jamming Platformsp. 157
5.3 Electronic Deceptionp. 159
5.3.1 Manipulative Electronic Deceptionp. 160
5.3.2 Simulative Electronic Deceptionp. 161
5.3.3 Imitative Electronic Deceptionp. 161
5.3.4 Example Electronic Deception Techniquesp. 162
5.3.5 Received Powerp. 163
5.4 Neutralizationp. 164
5.4.1 Laser Weaponsp. 164
5.4.2 High-Power RF Weaponsp. 166
Endnotesp. 166
6 Land EW Command and Controlp. 169
6.1 Introductionp. 169
6.2 EW Unit Organizationp. 171
6.2.1 Electronic Attackp. 174
6.2.2 Electronic Supportp. 175
6.2.3 EW Command and Controlp. 176
6.3 The Tactical Planning Processp. 177
6.4 The EW Targeting Processp. 179
6.4.1 Decisionp. 180
6.4.2 Detectionp. 184
6.4.3 Deliveryp. 185
6.4.4 Assessmentp. 185
6.4.5 Siting Considerations for Jamming Facilitiesp. 186
6.4.6 Deception Planningp. 187
6.5 Collection Managementp. 188
6.5.1 The Collection Management Processp. 188
6.5.2 Siting Considerations for Search Facilitiesp. 189
6.5.3 Siting Considerations for Intercept Facilitiesp. 189
6.5.4 Siting Considerations for DF Facilitiesp. 190
6.5.5 Siting Considerations for Analysis Facilitiesp. 191
Endnotesp. 192
7 Radio Frequency Directed Energy Weaponsp. 193
7.1 Introductionp. 193
7.2 Characteristics of RF DEWp. 196
7.2.1 Continuous Wave and Pulsed RF DEWp. 196
7.2.2 Explosive and Nonexplosive RF DEWp. 196
7.3 Target Effect Mechanismsp. 198
7.3.1 Front-Door Damagep. 198
7.3.2 Back-Door Damagep. 199
7.3.3 Damage Mechanisms Employed by RF DEWp. 200
7.3.4 Propagation Effectsp. 200
7.4 Platform Protectionp. 202
7.4.1 Avoidance of Illuminationp. 202
7.4.2 Hardening Techniquesp. 202
7.4.3 Issues Associated with the Protection Provisionp. 204
7.5 Analysis: Offensive RF DEWp. 205
7.5.1 Delivery Factorsp. 206
7.5.2 Range of RF DEWp. 207
7.5.3 Delivery Platformsp. 208
7.5.4 Target Effectsp. 210
7.6 Analysis: Defense Against RF DEWp. 211
7.6.1 Land Vehicles and Sheltersp. 212
7.6.2 Aircraftp. 213
7.6.3 Safety and Arming Systemsp. 214
7.6.4 Personnelp. 214
7.6.5 Support Equipmentp. 215
7.6.6 Command Postsp. 215
7.6.7 Logistics Installationsp. 216
7.7 Summaryp. 216
Endnotesp. 216
8 Electronic Warfare and Digitizationp. 219
8.1 Introductionp. 219
8.2 Network Issuesp. 220
8.2.1 Seamless Integrationp. 220
8.2.2 Mobile Networksp. 222
8.2.3 Ad Hoc Networksp. 223
8.2.4 Implications for EWp. 225
8.3 UWB Radiop. 229
8.3.1 Implications for EWp. 231
8.4 HF Radiop. 233
8.4.1 High-Speed HF Modem Technologyp. 233
8.4.2 HF Automatic Link Establishmentp. 233
8.4.3 Implications for EWp. 234
8.5 Software Radiop. 236
8.5.1 Key Software Radio Technologiesp. 237
8.5.2 Implications for EWp. 238
8.6 Quantum Computing and Quantum Cryptographyp. 239
8.6.1 Quantum Computingp. 239
8.6.2 Quantum Cryptographyp. 239
8.6.3 Implications for EWp. 241
Endnotesp. 242
List of Acronymsp. 245
About the Authorsp. 249
Indexp. 251