Chapter 16 Electronic and Information Warfare. Basics Electronic Attack Deception Soft Kill/Hard Kill Electronic protection Electronic Support.

Slides:



Advertisements
Similar presentations
Air Force Doctrine Document 2-5.1: Electronic Warfare
Advertisements

SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
Physical Attack IW-140 College of Aerospace Doctrine, Research, and Education.
Beyond Keyword Filtering for Message and Conversation Detection David Skillicorn School of Computing, Queen’s University Math and CS, Royal Military College.
Topic 10 Intro to IO Enabling Objectives 10.1 STATE the definition of Information Operations (IO) LIST five (5) Core Information Operations capabilities.
Chapter 2 Digital Terrorism.
Chapter 1 Introduction to EW Scenarios
Force XXI Battle Command Brigade and Below (FBCB2) Communications System
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
A Soldier’s GPS Battlefield Benefits and Applications of the Global Positioning System Michael Short Past, Present, and Future.
Electronic Warfare Counter-measures
Computer Communication & Networks Lecture # 06 Physical Layer: Analog Transmission Nadeem Majeed Choudhary
Countering Contraband Cell Phone Use in Prisons A Technical Explanation of Available Technologies.
Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS.
Web Servers Security: What You Should Know. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with.
William Stallings Data and Computer Communications 7th Edition
Wireless Security.
The Power of VPN Virtual Professional Network: a Virtual Field Trip Caroline Park RN, PhD.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Background Accessibility Popularity of GPS and INS –Cell phones Apple iPhone, Blackberry, Android platform –Nintendo Wii Wii Remote, MotionPlus.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Wireless Sensor Network Security Anuj Nagar CS 590.
Defence spectrum use Changing technologies and applications CAPT Paul Scott, RAN Chief Information Officer Group Department of Defence.
Introduction (Pendahuluan)  Information Security.
New Technologies Are Surfacing Everyday. l Some will have a dramatic affect on the business environment. l Others will totally change the way you live.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
MILITARY AIR VEHICLE, AS A SYSTEM György Seres DSc
Patrick Caldwell Chris Kellar. Overview  Basic Concepts  History  Structure  Applications  Communication  Typical Sources of Error.
Jamming and Anti-Jamming in IEEE based WLANs Ravi Teja C 4/9/2009 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
Moon Messages The Liquids. To communicate we use radio waves headsets to interact As radiowaves can travel through a vaccume HOW DO WE COMMUNICATE?
Combat Support Air Operations
 fiber optics cable and free space optics (FSO). Like fiber optics cable, FSO uses lasers to transmit data, but instead of enclosing the data stream.
Mirror Mirror on the Ceiling: Flexible Wireless Links for Data Centers Presenter: Lu Gong.
Mobile Phone Networks Dr. Hassan Nojumi1 MOBLIE PHONE NETWORKS Dr. Hassan Nojumi.
INFORMATION WARFARE. What is Information Warfare? “All actions taken to defend the military’s information-based processes, information systems and communications.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
INTRODUCTION. TITLE OF PROJECT SIMULATION OF FREQUENCY HOPPING SPREAD SPECTRUM IN MATLAB TITLE OF PROJECT SIMULATION OF FREQUENCY HOPPING SPREAD SPECTRUM.
Computer Architecture Lecture 30 Fasih ur Rehman.
Content: The deployment of modern, high precision weapon systems and their effectiveness depend to a large degree on a timely and accurate identification.
Radio Transmission Music and words are sent to your radio by radio waves. The metal antenna of your radio detects radio waves. As the electromagnetic.
Chapter 13 Sound. Section 1 ► ► Electromagnetic waves   made by vibrating electric charges and can travel through space. ► ► Electric and magnetic.
Csci5233 Computer Security1 Bishop: Chapter 11 An Overview of Cipher Techniques (in the context of networks) ( )
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
I n t e g r i t y - S e r v i c e - E x c e l l e n c e 1 GPS Operations Past, Present, Future Colonel John E. Hyten Commander, 50th Space Wing 29 Mar.
 RADAR which stands for RAdio Detection And Ranging was developed by Britain in the late 1930’s, during WW2  Before the war, Radars were used to detect.
ELECTRONIC WARFARE AIAA Team 5 Robert Speer Craig Searles.
C4ISR and Information Warfare Naval Weapons Systems.
1 Security for distributed wireless sensor nodes Ingrid Verbauwhede Department of Electrical Engineering University of California Los Angeles
Ad Hoc Network.
PART I: DIGITAL COMMUNICATION SYSTEMS Chapter 3: Transmission Media.
Wireless Security. Traditional method A computer with network card a cable connecting network card and the network.
UNCLASSIFIED//FOR OFFICIAL USE ONLY National Reconnaissance Office Overview UNCLASSIFIED//FOR OFFICIAL USE ONLY.
Radio Systems for Machine Control. Contents 1.What are we trying to do and Why. 2.Physical Constraints of Mine Sites. 3.Data Flow Requirements. 4.Existing.
CIS 325: Data Communications1 Chapter Seventeen Network Security.
TEMPEST AND ECHELON BY – Y.SRUTHI.  TEMPEST and ECHELON are the method of spying in a sophisticated manner.  Both technologies are a part of secret.
Communications security
U.S. ARMY 4632A21 Information Operations and Public Affairs 1 3/1/2007 BNCOC PA Supervisor Course Information Operations.
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
1 Thrust 5: Secure Wireless Networking Technologies For future generation wireless packet networks, two most important aspects need to be addressed: QoS.
science/internet-intro
Wireless Communications Outline Introduction History System Overview Signals and Propagation Noise and Fading Modulation Multiple Access Design of Cellular.
Rajani Muraleedharan and Lisa Ann Osadciw By: Mai Ali Sayed Ahmed.
Electromagnetic Waves Chapter 12. What is an Electromagnetic Wave? Electromagnetic wave – is made by vibrating electric charges and can travel through.
E-BOMB A WEAPON OF ELECTRICAL MASS DESTRUCTION
Layer One challenge Biró László Miklós HA5YAR
FLTLT Matthew Murphy Growler Transition Office – Air Force Headquarters UNCLASSIFIED.
Panel Discussion: C4I Solutions for Combating
Electronic Warfare.
Presentation transcript:

Chapter 16 Electronic and Information Warfare

Basics Electronic Attack Deception Soft Kill/Hard Kill Electronic protection Electronic Support

Communication Systems Radio Systems Point to point and broadcast Fixed sites, HQ to political leadership Covert assets, agents in field Tactical communications Control and telemetry messages

Signals Intelligence techniques Mapped enemies network RDF Radio Direction Finding Traffic analysis Identify “interesting” messages Signal collection Echelon

Attacks on Communications Easier to steal key material than crack encryption Content access not always the goal Jamming can be effective also Active deception Disruption of capabilities Hard kill Soft kill

Protection techniques Dedicated lines optical fiber Highly directional transmission links Low probability of intercept (LPI) Low probability of position fix (LPPF) Frequency hoppers, direct spread spectrum, burst transmission, Meteor scatter

Interaction Military Civilian GPS Military initially limited accuracy During Gulf war lack of military units required use of civilian units and hence had to turn off limiting FAA found ways around limited availability 2000 turned off limited capability Mobile phones

Skipped Radar IFF systems

Directed Energy Weapons Will address in article (DEW) Information Warfare Desert Storm Cruise missiles Jammers Special forces Hacking attacks on computers and networks

Other notions Many comparisons between Military and civilian issues Pages E-war versus I-War Pages

Articles Meteor scatter uses Current use of Directed Energy Weapons