Electronic Warfare For The Digitized Battlefield

Electronic Warfare For The Digitized Battlefield

by Michael Frater, Michael Ryan
     
 

ISBN-10: 1580532713

ISBN-13: 9781580532716

Pub. Date: 09/30/2001

Publisher: Artech House, Incorporated

Frater and Ryan (both electrical engineering, Australian Defence Force Academy) examine the issues related to the effect of electronic warfare on the business of command and control on the modern digitized battlefield. Their focus is on the components and techniques employed at the tactical level of ground warfare. Coverage includes, for example, network- centric

Overview

Frater and Ryan (both electrical engineering, Australian Defence Force Academy) examine the issues related to the effect of electronic warfare on the business of command and control on the modern digitized battlefield. Their focus is on the components and techniques employed at the tactical level of ground warfare. Coverage includes, for example, network- centric warfare, tactical trunk communications, electronic protection, and directed-energy weapons.

Annotation c. Book News, Inc., Portland, OR (booknews.com)

Product Details

ISBN-13:
9781580532716
Publisher:
Artech House, Incorporated
Publication date:
09/30/2001
Series:
Artech House Information Warfare Library Series
Pages:
284
Product dimensions:
6.14(w) x 9.21(h) x 0.69(d)

Table of Contents

Prefacexiii
1The Digitized Battlefield1
1.1The Operational Environment1
1.2Command and Control6
1.2.1The C2 Cycle7
1.2.2Command Systems9
1.3Information Warfare11
1.4Electronic Warfare12
1.4.1Communications and Noncommunications EW14
1.4.2EW Subdivisions15
1.4.3Other Categories of EW16
1.5Summary16
Endnotes18
2Tactical Communications Systems21
2.1Introduction21
2.2Architectural Drivers21
2.3Current Tactical Communications Architecture25
2.4A Suitable Tactical Communications Architecture for Future Land Warfare27
2.5Trunk Communications Subsystem30
2.5.1Fourth-Generation Trunk Networks32
2.5.2Trunk Nodes32
2.5.3Bearers35
2.5.4Access Nodes36
2.5.5Mobile Trunk Access37
2.5.6Combat Net Radio Interface (CNRI)38
2.5.7Interfaces to the Tactical Trunk Subsystem39
2.6CNR Subsystem40
2.6.1Key Architectural Issues for CNR40
2.6.2Range of Communications44
2.6.3Modern CNR Solutions45
2.7Tactical Data Distribution Subsystem47
2.8Tactical Airborne Subsystem49
2.8.1Additional Communications Services51
2.9Potential Targets for Tactical Communications EW53
2.10Summary54
Endnotes54
3Electronic Protection57
3.1Introduction57
3.2Passive Electronic Protection57
3.2.1Identical Equipment58
3.2.2Shielding58
3.2.3Emission Control59
3.2.4Directional Antennas59
3.2.5Frequency Management60
3.2.6Alternate Means60
3.2.7Siting60
3.3Active Electronic Protection61
3.3.1Encryption63
3.3.2Spread-Spectrum Communications70
3.3.3Error-Protection Coding84
3.3.4Burst Transmission87
3.3.5Narrowband Excision88
3.3.6Diversity89
3.4Use of EP Techniques in Communications Systems89
3.4.1CNR89
3.4.2Military Radio Relay90
3.4.3TADIL-J (Link-16)90
3.4.4Enhanced Position Locating and Reporting System (EPLRS)92
3.4.5Near-Term Digital Radio (NTDR)93
3.4.6IS-9593
3.4.7GSM95
Endnotes96
4Electronic Support99
4.1Introduction99
4.2Search100
4.2.1Narrowband Receivers101
4.2.2Wideband Receivers103
4.2.3Search and the Tactical Communications System107
4.3Intercept (Monitoring)112
4.3.1Characteristics of Intercept Receivers113
4.3.2Intercept Receivers114
4.3.3Intercept and the Tactical Communications System117
4.4Direction Finding119
4.4.1Sources of Error122
4.4.2Rotating Directional Antenna123
4.4.3Watson-Watt DF124
4.4.4Wullenweber DF128
4.4.5Doppler DF128
4.4.6The DF Baseline130
4.4.7DF and the Tactical Communications System132
4.5Analysis135
4.5.1Traffic Analysis135
4.5.2Cryptanalysis136
4.5.3The Analysis Function and the Tactical Communications System136
4.6ES Platforms138
4.6.1Ground Platforms138
4.6.2Air Platforms139
Endnotes140
5Electronic Attack143
5.1Introduction143
5.2Jamming144
5.2.1Jamming-to-Signal Ratio145
5.2.2Jamming Signals146
5.2.3Types of Communications Jamming147
5.2.4Operational Factors153
5.2.5Standoff Versus Unattended Jammers153
5.2.6Jamming and the Tactical Communications System155
5.2.7Jamming Platforms157
5.3Electronic Deception159
5.3.1Manipulative Electronic Deception160
5.3.2Simulative Electronic Deception161
5.3.3Imitative Electronic Deception161
5.3.4Example Electronic Deception Techniques162
5.3.5Received Power163
5.4Neutralization164
5.4.1Laser Weapons164
5.4.2High-Power RF Weapons166
Endnotes166
6Land EW Command and Control169
6.1Introduction169
6.2EW Unit Organization171
6.2.1Electronic Attack174
6.2.2Electronic Support175
6.2.3EW Command and Control176
6.3The Tactical Planning Process177
6.4The EW Targeting Process179
6.4.1Decision180
6.4.2Detection184
6.4.3Delivery185
6.4.4Assessment185
6.4.5Siting Considerations for Jamming Facilities186
6.4.6Deception Planning187
6.5Collection Management188
6.5.1The Collection Management Process188
6.5.2Siting Considerations for Search Facilities189
6.5.3Siting Considerations for Intercept Facilities189
6.5.4Siting Considerations for DF Facilities190
6.5.5Siting Considerations for Analysis Facilities191
Endnotes192
7Radio Frequency Directed Energy Weapons193
7.1Introduction193
7.2Characteristics of RF DEW196
7.2.1Continuous Wave and Pulsed RF DEW196
7.2.2Explosive and Nonexplosive RF DEW196
7.3Target Effect Mechanisms198
7.3.1Front-Door Damage198
7.3.2Back-Door Damage199
7.3.3Damage Mechanisms Employed by RF DEW200
7.3.4Propagation Effects200
7.4Platform Protection202
7.4.1Avoidance of Illumination202
7.4.2Hardening Techniques202
7.4.3Issues Associated with the Protection Provision204
7.5Analysis: Offensive RF DEW205
7.5.1Delivery Factors206
7.5.2Range of RF DEW207
7.5.3Delivery Platforms208
7.5.4Target Effects210
7.6Analysis: Defense Against RF DEW211
7.6.1Land Vehicles and Shelters212
7.6.2Aircraft213
7.6.3Safety and Arming Systems214
7.6.4Personnel214
7.6.5Support Equipment215
7.6.6Command Posts215
7.6.7Logistics Installations216
7.7Summary216
Endnotes216
8Electronic Warfare and Digitization219
8.1Introduction219
8.2Network Issues220
8.2.1Seamless Integration220
8.2.2Mobile Networks222
8.2.3Ad Hoc Networks223
8.2.4Implications for EW225
8.3UWB Radio229
8.3.1Implications for EW231
8.4HF Radio233
8.4.1High-Speed HF Modem Technology233
8.4.2HF Automatic Link Establishment233
8.4.3Implications for EW234
8.5Software Radio236
8.5.1Key Software Radio Technologies237
8.5.2Implications for EW238
8.6Quantum Computing and Quantum Cryptography239
8.6.1Quantum Computing239
8.6.2Quantum Cryptography239
8.6.3Implications for EW241
Endnotes242
List of Acronyms245
About the Authors249
Index251

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >