How vulnerable are C3I networks?
How Vulnerable Are [C.sup.3]I Networks?
The Western intelligence community was bewildered to learn from East German secret services sources recently that West German PTT (1) (Postal, Telegraph & Telephone) The governmental agency responsible for combined postal, telegraph and telephone services in many European countries.
(2) See push-to-talk.
PTT - Post, Telephone and Telegraph administration telephone and data traffic microwave links had been "tapped" regularly. The West also discovered that, weather permitting, virtually all radio communications in the Federal Republic could be intercepted from East Germany East Germany: see Germany. .
So far, the Western world, which has had the technical capability of intercepting East Bloc radio traffic for some time, assumed that the East did not have the know-how required for such operations. Export restrictions on "sensitive" goods to COCOM COCOM Coordinating Committee for Multilateral Export Controls
COCOM Coordinating Committee
COCOM Combatant Commander
COCOM Corporate Communications
COCOM combatant command (command authority) (US DoD) nations were not only aimed at preventing them from playing this game, but also at ensuring that the West would be the only players, hence the United States' objections to the export of fiber-optic systems, for example (data transmitted by fiber optics fiber optics, transmission of digitized messages or information by light pulses along hair-thin glass fibers. Each fiber is surrounded by a cladding having a high index of refractance so that the light is internally reflected and travels the length of the fiber being almost 100 percent immune to interception without a direct physical attack on the cable).
From the military standpoint, the preference for jamming or interception has altered with time, technological progress and circumstances. In the past it was considered more rewarding to intercept and decypher the enemy's communications than to disrupt or jam his sources. With the advent of frequency-hopping, encryption and burst transmissions in the form of digital data streams, the chances of decrypting his communications diminished considerably and became possible only with bulky, sophisticated, computerized equipment, ill-suited for use in the combat zone. In those circumstances, the only solution is to disable the oponent's [c.sup.3]I network. At first sight, this may seem to be a simple matter. All that are required are several high-powered jamming transmitter operating continuously on all commonly used military bands. However, this leaves out of account the large number of enemy units which operate independently with wire networks e.g. missile batteries linked by cable to their command post. Granted, early warning messages from other sources would not reach them, but they could fight all air threats within their range. The same applies to smaller infantry units. Armored units and artillery, which depend on radio communications, would also be in trouble. However, total jamming would also greatly impair own communications and possibly even blank them out in places, so it is a two-edged weapon of doubtful value.
Blanket jamming is useful only during the first hours of a surprise attack, so as to prevent the enemy from organising his defenses - an initial advantage for the attacker which should not be underestimated. It does, however, mean that for a laid-down period of time, coinciding with the jamming, the attacking forces must follow their orders to the letter to prevent tangling with each other. Fighting blind is a dangerous gamble.
Selective jamming Noun 1. selective jamming - electronic jamming of a specific channel or frequency
electronic jamming, jamming, jam - deliberate radiation or reflection of electromagnetic energy for the purpose of disrupting enemy use of electronic devices or , combined if possible with physical attacks on identified command centers, is currently considered as the most practical means of impairing an opponent's [C.sup.3]I capability. The jamming or deception of radars on the other hand must be left to the platform being illuminated. In other words Adv. 1. in other words - otherwise stated; "in other words, we are broke"
put differently , all naval vessels and combat aircraft have to carry their own ECM (1) (Enterprise Change Management) See version control and configuration management.
(2) (Error Correcting Mode) A Group 3 fax capability that can test for errors within a row of pixels and request retransmission. equipment to deal with radar threats.
There is a world of difference between the jamming of radars and communications network The transmission channels interconnecting all client and server stations as well as all supporting hardware and software. . In a radar set transmitter and receiver are usually in the same place. The radar beam is reflected from the target and received by the same antenna, thereby opening an electromagnetic channel from target to receiver through which deception messages or jamming signals can be sent. On the other hand selective jamming or deception of a communications system In telecommunication, a communications system is a collection of individual communications networks, transmission systems, relay stations, tributary stations, and data terminal equipment (DTE) usually capable of interconnection and interoperation to form an integrated whole. is vastly more difficult, since unlike the transmitter, the receivers cannot be localized easily. Even if both locations are eventually identified, modern encryption techniques will make the insertion of deception material into a [C.sup.3]I network very difficult. The solution to the problem is not unlike that adopted for radar ECM: if the transmitter cannot be fooled, it has to be jammed.
Electronic Warfare Noun 1. electronic warfare - military action involving the use of electromagnetic energy to determine or exploit or reduce or prevent hostile use of the electromagnetic spectrum
military action, action - a military engagement; "he saw action in Korea" is subdivided into ESM (1) (Enterprise Storage Management) Managing the online, nearline and offline storage within a large organization. It includes analysis of storage requirements as well as making routine copies of files and databases for backup, archiving, disaster recovery, , ECM and ECCM Noun 1. ECCM - electronic warfare undertaken to insure effective friendly use of the electromagnetic spectrum in spite of the enemy's use of electronic warfare
electronic counter-countermeasures . ESM consists in detecting all activities in the electromagnetic spectrum electromagnetic spectrum
Total range of frequencies or wavelengths of electromagnetic radiation. The spectrum ranges from waves of long wavelength (low frequency) to those of short wavelength (high frequency); it comprises, in order of increasing frequency (or decreasing on a round-the-clock basis. Its tasks are to establish the signal characteristics and exact location of each intercepted emission and by analysis to establish its purpose in the opponent's C3 net so that the appropriate counter-measures can be taken. The options range from intercepting and decyphering the messages (Comint), inserting fake messages in the traffic (deception), selective jamming or even calling down artillery fire to destroy selected transmitters.
These ESM tasks seem simple: in fact they border on the impossible. The confusion when listening into a short-wave band on one's wireless set is nothing compared to what occurs in the high-density electronic environment of the battlefield. Both sides will use every band from VLF (Very Low Frequency) See low radiation. to UHF (Ultra High Frequency) The range of electromagnetic frequencies from 300 MHz to 3 GHz. In the U.S., analog television has used UHF channels 52 to 69 in the 700 MHz band. , possibly even the millimeter and infrared spectra. The task of detecting and classifying signals, localizing transmitters and extracting meaningful intelligence from the intercepts is monumental. The job can only be done by computers and sophisticated software, operating with a vast data-base containing thousands of characteristics typical of friendly, hostile and neutral transmitters. This implies, of course, that the "signatures" of all equipment capable of transmitting in war has to be registered in peacetime.
For effective countermeasures against transmitter the more important factors to be considered are: transmitter location, operating frequencies, spread-spectrum and frequency-hopping procedures used, transmitting power, antenna pattern and modulation methods, data format and above all, general weather conditions (which greatly influence interception). The next thing to establish is what function the transmitter serves: this may make it possible to come to a rough conclusion about the network's layout. One has to probe where are the network's weak points and how they can be selectively jammed or exploited for interception or deception. Spread-spectrum and burst transmission greatly reduce the options.
Clearly, an effective ESM equipment suite is not only highly complex but calls for highly trained operators.
A typical ESM equipment is the Rohde & Schwarz ESP (1) (Enhanced Service Provider) An organization that adds value to basic telephone service by offering such features as call-forwarding, call-detailing and protocol conversion. receiver which scans the frequency spectrum from 10 KHz to 1 300 MHz (MegaHertZ) One million cycles per second. It is used to measure the transmission speed of electronic devices, including channels, buses and the computer's internal clock. A one-megahertz clock (1 MHz) means some number of bits (16, 32, 64, etc. at the rate of more than 1 000 channels per second. The ESP is the core of an ESM system consisting of special antennae, direction-finders, monitoring receivers, computer print-out facilities and other peripheral equipment. From the same company is the ESM-500 VHF/UHF receiver, which can be driven by a computer running a software specifically designed for this purpose. Close relatives are the ESM-508K, ESM-571 K and ESM-540K hand-off receivers which permit the monitoring of a large number of single frequencies in selected bands. They can operate in a network of up to 120 receivers linked by a computer-controlled IEC (International Electrotechnical Commission, Geneva, Switzerland, www.iec.ch) An organization that sets international electrical and electronics standards founded in 1906. It is made up of national committees from over 60 countries.
IEC - International Electrotechnical Commission bus. Without appropriate direction-finding (DF) equipment the analysis of receivers remains incomplete. In some modern EW equipment the DF and receiver/analysing functions are integrated in a single box. An example is the Rohde & Schwarz Tacloc PA 1100 designed for operation in the VHF/UHF bands. The receiver section weighs only 7.5 kg. the antenna 6 kg. The equipment is therefore man-portable and can be used as a peripheral for extended ESM networks.
For airborne use there is the Magnavox ARR-81 digital Comint system. Its three receivers cover the frequency range of 1 kHz to 2 000 MHz, maximum tuning time being only 5 microseconds.
The AEG AEG Aeger (Latin: Sick)
AEG Allgemeine Elektrizitäts-Gesellschaft (Common Electricity Company)
AEG Aircraft Evaluation Group
AEG Association of Engineering Geologists
AEG Air Expeditionary Group EP1650 modular Comint system consists of three or more direction-finding stations and a central mobile station. It uses a computer-controlled scanning receiver suite providing rapid detection and analysis of radio communications. It scans the selected bands rapidly, automatically adding the characteristics and location of any new transmitters to a computer library.
In Racal's modular System 3000, the basic unit consists of two receivers, a display unit and recorders, antennae and antenna selectors, processor and audio switching units, plus peripheral equipment. Several units joined together can form an ESM center to which a direction-finder network can be attached. A single unit can be housed in a transportable shelter or in an armored vehicle.
Thomson-CSF, another leader in this field, produces a series of Comint receivers and associated peripherals. Best known are the TRC-298 and TRC-243 family of receivers which operate with the TRC-195 and other suitable direction-finders. Fully automatic and modular, the systems enable other capabilities to be added for specific operational requirements (programming) operational requirements - Qualitative and quantitative parameters that specify the desired capabilities of a system and serve as a basis for determining the operational effectiveness and suitability of a system prior to deployment. .
A very comprehensive stationary Sigint/Comint suite is Hollandse Signaal's Spectra for use by signals and cypher See cipher. analysts. The Spectra can be used to compile the transmitter libraries so essential to tactical ESM. Designed to cover the HF bands from 100 kHz to 30 MHz, it can be extended by modules to cover the lower MF and higher VHF/UHF bands. Of modular design In the context of systems engineering, modular design — or "modularity in design" — is an approach aiming to subdivide a system into smaller parts (modules) that can be independently created and then used in different systems to drive multiple functionalities. , Spectra stations can be included in an electronic warfare system comprising an Elint subsystem.
Siemens offers a new modular, stationary or mobile receiver - yet unnamed - for radio and radio relay emission intercepts in the VHF/UHF bands. The system can automatically or manually detect and analyze all analog and digital, single- or multi-channel transmitter between 20 and 1 000 MHz. It can thus intercept combat net radio transmissions in VHF (Very High Frequency) The range of electromagnetic frequencies from 30 MHz to 300 MHz. as well as radio-to-relay link, multi-channel systems, satellite and scatter links in the upper UHF bands. Among its unusual features it can receive and demodulate To isolate a data signal from a carrier wave. The demodulation circuit uses the unmodulated carrier as a reference signal and compares it to the received signal. See modulation and carrier.
demodulate - demodulation AM, FM, CW, SSB SSB Statistisk Sentralbyrå (Statistics Norway)
SSB Super Smash Bros (video game)
SSB Space Studies Board
SSB Single Side Band
SSB Single Stranded DNA-Binding Protein
SSB Salomon Smith Barney , PPM and PKS PKS Penalty Kicks Saved (soccer; goalie save)
PKS Partai Keadilan Sejahtera (Indonesia)
PKS Phi Kappa Sigma (international male fraternity)
PKS Pallister-Killian Syndrome transmissions. The processing is performed at 16 kbit/sec to 4 Mbit/sec and it can de-multiplex multi-channel systems. The system is suitable for the intercept of tactically vital UHF radio links used for transmitting digital data streams.
Since it is well-known that communications security See COMSEC. is threatened by modern ECM, protective measures have been devised, such as spread spectrum methods, frequency-hopping, burst transmissions and special encryption procedures. Largely ignored is an interesting counter-measure for protecting the security of data-links between higher headquarters. As highly directional antennae are used for such links and relays, the side lobe In antenna engineering, side lobes are the lobes of the radiation pattern that are not the main beam. The power density in the side lobes is generally much less than that in the main beam. signal is usually very weak. For added protection strong transmitters are used which operate on the same frequency as the link but with their antenna's beam directed towards the suspected listening posts listening posts,
n.pl in craniosacral therapy, the places on the body from which the therapist can perceive the flow of cerebrospinal fluid or energy in the patient. The ankles or the occiput (i.e., the base of the skull) are the standard listening posts. of the opponent. In most cases this blanks out the side lobe signal, thus providing a high level of security.
To be effective, ESM must be conducted on a 24-hour basis, both in peace and war. However, the data derived are subject to constant changes which have to be carefully "mapped" for maintaining an up-to-date picture of enemy communications procedures, tactics and equipment. Once a reasonably clear picture has been formed and the location of primary transmitters is known, ECM can be applied in an intelligent way. This, of course, excludes blanket jamming of the complete electromagnetic spectrum as this will hurt own forces as much as the enemy's. Thus, jamming has to be "intelligent" i.e. taking out the enemy's frontline radio where an attack is to be launched, at just the right time.
Eliminating selected transmitters is easier said than done. In anticipation, the enemy has probably established a fake network (which may include large sections of the real net) for transmitting pre-recorded fake messages and data on several channels. Friendly intercept stations will have great difficulty in determining which part of the intercepted message flow is genuine: this takes considerable skill and tactical training. Once phony signals are detected any near real-time exploitation of intercepted data can be forgotten.
As for ESM equipment, intelligent jamming requires a large computerized library of up to a couple of thousand hostile and friendly transmitter signatures to enable the jamming system to compose the correct countermeasure. With modern computer technology this library can be extended almost at will. Of great value is the identification of a specific signature for each transmitter encountered, instead of listing only the signatures of specific types of transmitters. Most of those located at the command and relay nodes of a C3 network will probably be powered by engine-driven generators. This creates a low frequency hum in the transmission signal which can be listed as a typical signature for each generator. (The hum can be isolated by the ESM receiver, enabling the movement of individual transmitters to be mapped.) This diminishes, but does not eliminate, the problem caused by phony C3 networks, since their transmitters would remain for the most part stationary. Numerous other problems have to be solved before intelligent jamming or interception of single transmitters is possible. It is doubtful whether this will ever be practicable since as soon as a new electronic warfare threat becomes known, a counter-defense is developed, leading to ever more advanced-and costly-state-of-the-art high-tech.
Almost all modern Comint systems are either integrated or interfaced with appropriate jamming transmitters. GTE GTE General Telephone & Electronics
GTE Génie Thermique et Énergie (French)
GTE Gas Turbine Engine
GTE Global Tropospheric Experiment
GTE Geothermal Energy
GTE Gas Turbine Efficiency plc (Sweden & USA) Sylvania produces the MLQ-34 Tacjam VHF jammer. This operates with the passive TSQ-112 Tacelis Sigint equipment consisting of the ULK-17 intercept receiver A receiver designed to detect and provide visual and/or aural indication of electromagnetic emissions occurring within the particular portion of the electromagnetic spectrum to which it is tuned. and a UYK-19 computer. It uses psychoacoustic deceptive techniques in its jamming modulation and features a look-through-jam facility permitting the continued operation of the TSQ-112. The Tacjam, with a power output of 4 kW, is being introduced as standard equipment in the US Army.
For naval use Electronica This article or section needs copy editing for grammar, style, cohesion, tone and/or spelling.
You can assist by [ editing it] now. SpA produces the very sophisticated C-News Comint system featuring interfaces with appropriate jamming transmitters. A modular system, its basic configuration can be expanded with equipment such as analysis and monitoring receivers, audio and digital recorders and jammers. Originally designed for the VHF/UHF range, modules can be added to cover the HF bands.
The British Army The British Army is the land armed forces branch of the British Armed Forces. It came into being with unification of the governments and armed forces of England and Scotland into the United Kingdom of Great Britain in 1707. has lately introduced a Racal electronic warfare suite consisting of the RS3153 intercept receiver, the D-F type RTS (Request To Send) An RS-232 signal sent from the transmitting station to the receiving station requesting permission to transmit. Contrast with CTS.
1. (operating system) RTS - run-time system.
2. 1470 and the RJS RJS Remote Job Service
RJS Raymond James Stadium (Tampa, FL)
RJS Smooth Skate (FAO fish species code)
RJS Real Jukebox System 3100 jammer. The equipment is air-transportable.
Built for high-power stand-off jamming in the HF bands is the Italian Telettra Rhino equipment. It has been designed to operate as part of a sophisticated ESM/ECM ESM/ECM Electronics Support Measures/Electronic Countermeasures system but has adequate ESM facilities to work as an autonomous unit. The shelterized system can conduct search and intercept operations, automatic or manually steered jamming and can be used as an HF communications station.
Though the above examples of high-powered jamming equipment are transportable they cannot be called lightweight. Excellent mobility is offered, however, by the Israeli Elisra AT-4910 combat jamming and communications support system. Mounted on a jeep-type vehicle, it is operated by one man and is fully self-supporting. Frequency coverage ranges normally from 20 to 400 MHz but can be extended to include further bands. The system operates in three modes: communications jamming In telecommunication, the term communications jamming (COMJAM) has the following meanings:
A most unusual but highly practical and extremely lightweight jammer is Racal's Jamcat. The size of a telephone book, it can be connected between a combat radio's handset and the transceiver and acts as an ECM unit capable of generating a wide variety of jamming signals. Internally generated white noise, single tones, rapidly changing multiple tones, etc. can be used to modulate most transmitters regardless of power output, transforming normal communications equipment into a jammer.
An unusual ESM/ECM system is the ALQ-149 suite designed by ITT ITT Initial Teacher Training (UK)
ITT I Think That
ITT Invitation To Tender
ITT Individual Time Trial (professional cycling)
ITT In This Thread (forums) and Sanders for airborne use in the US Navy Grumman EA-6B. It combines radar and communication countermeasures equipment. The receivers are fitted inside the aircraft while the jamming transmitters are carried in underwing pods. The receiver subsystem incorporates separate communications and radar intercept and processing elements. These are coordinated with the analysis subsystem which is fed the intercepted signals and defines the appropriate jamming responses. The threat library is an integral part of the central processor, an AYK-14 computer. This high-speed device passes the appropriate jamming information to the transmitters. The largely automated system requires only supervisory functions from its two operators.
The US Air Force operates two different aircraft for the two jamming functions - the General Dynamics General Dynamics Corporation (NYSE: GD) is a defense conglomerate formed by mergers and divestitures, and as of 2006 it is the sixth largest defense contractor in the world. The company has changed markedly in the post-Cold War era of defense consolidation. EF-111A for radar and the Lockheed EC-130E Hercules for communications. In the latter, the Compass Call system is said to be able to jam communications in virtually all bands from MF to EHF EHF
extremely high frequency
Noun 1. EHF - 30 to 300 gigahertz
extremely high frequency
radio frequency - an electromagnetic wave frequency between audio and infrared .
Among the expendable communications jammers, Racal produces the low-power RJS3140 barrage communications jammer for remote and unattended deployment against transmitters in the 20 to 90 MHz range. Powered by a small battery and triggered by a timer, it radiates a 10 W wideband signal for more than two hours. The jammer receives its operating parameters from a programming unit which remains with the signals unit. It is used by special forces to jam hostile transmitters on a purely local level over short periods. When placed close to the enemy transmitter, the lightweight and easily concealed RJS3140 is effective against frequency-hoppers.
Another unattended communications jammer from Fairchild Wesson Systems for use in UAVs can be triggered by timer or remote command. To obtain maximum effect in the temporary disruption of widely scattereds C3 networks, the UAVs can be launched in swarms.
Even tactical satellite-to-ground communications are prone to interception. Marconi Defense Systems has been working jointly with the Royal Signals and Radar Establishment The Royal Signals and Radar Establishment (RSRE) was a scientific research establishment within the Ministry of Defence's Defence Procurement Agency of the United Kingdom, located primarily at Malvern in Worcestershire. on the development of optimum anti-jam techniques for satellite communications to increase Low Probability of Exploitation (LPE LPE Liquid Phase Epitaxy
LPE Linear Polyethylene
LPE Low Probability (of) Exploitation
LPE Layout Parameter Extraction (semiconductor circuit design and simulation)
LPE Lymphocytic-Plasmacytic Enteritis ). (This is a new term which joins the older LP1 [Low Probability of Intercept A low probabililty of intercept radar (LPIR) is designed to be difficult to detect by passive radar detection equipment (such as a radar warning receiver - RWR) while it is searching for or tracking a target. ] in electronic warfare jargon.)
"Exploitation" means taking advantage of the weaknesses in the enemy network. C3 networks - in fact all modern communications systems - depend for their faultless fault·less
Being without fault. See Synonyms at perfect.
faultless·ly adv. operation on digital computers, for which a vast amount of software is required (among the Western powers, the ADA Ada, city, United States
Ada (ā`ə), city (1990 pop. 15,820), seat of Pontotoc co., S central Okla.; inc. 1904. It is a large cattle market and the center of a rich oil and ranch area. language is standard).
Beware of the Virus
ADA's structure is no secret and it is no problem to write a lethal virus program for insertion into an ADA-based C3 network (see ARMADA No. 5/89).
Insertion of the virus poses no problem to a technically well-versed enemy. For example the virus can be added by the enemy to a standard position message forwarded into the opponent's C3 net via a recently captured artillery computer. The virus will then circulate with each message sent and spread the infection. Another way is to hide a virus in a deception signal beamed at a hostile radar. Initially it will only infect its extractor software but eventually it is bound to spread via data-link into the air defence network. Theoretically it is also possible to direct a message containing the virus to a defense communication satellite, thereby guaranteeing even faster dissemination. In essence there is no 100% protection against a virus (or several) entering and infecting a C3 network. Isolating a complicated virus would take days a it would almost certainly be a sophisticated type, unlike those used by hackers. In the critical opening days of a war this could be fatal.
When the Electronic Battlefield The Electronic Battlefield was a concept of synergizing popular series of computer simulation games with the effect of letting players of different games oppose each other in online play. concepts based on [C.sup.3]I were formulated in the USA during the late 1960s, nobody could then imagine that [C.sup.3]I equipment would eventually become vulnerable to enemy action. There is now growing evidence that the infatuation with centralised [C.sup.3]I is waning - not only because of its vulnerability, (which could be overcome by spending more money on R & D) but also because it deprives local commanders of a certain latitude at tactically opportune moments which might escape headquarters' attention. There is no doubt that [C.sup.3]I will continue to exist as an essential communication facility, but the all-embracing Electronic Battlefield concept has been overtaken by the EW techniques now available.