Use of Communications EW in a NCW Environment
Transcription
Use of Communications EW in a NCW Environment
Use of Communications EW in a Network Centric Warfare Environment TTCP EWS AG5 Brief to the 2008 AOC International Exhibition and Symposium Ian Coat EWRD, DSTO Release and Distribution This document contains Information authorised under the auspices of The Technical Cooperation Program (TTCP) for unlimited release and distribution. The Technical Cooperation Program is defined under a Memorandum of Understanding among the Minister of Defence on behalf of the Department of Defence of Australia, the Department of National Defence of Canada, the New Zealand Defence Force, the Secretary of State for Defence of the United Kingdom of Great Britain and Northern Ireland, and the Secretary of Defense on behalf of the Department of Defense of the United States of America. © © © © © Her Majesty the Queen as represented by the Minister of National Defence, Canada, 2007. Defence Science and Technology Laboratory (Dstl), United Kingdom, 2007. Defence Science and Technology Organisation (DSTO), Australia, 2007. Air Force Research Laboratory (AFRL), United States of America, 2007. Research Development and Engineering Command (RDECOM), United States of America, 2007. 2 Outline Overview of TTCP, EWS, AG5 Role for CEW in Network Protection CEW Functions and Capabilities Radio Spectrum Awareness The Emitter Map Concepts for CEW in a Network Centric Warfare Environment TTCP Workshop on the Robustness and Vulnerability of NCW The Technical Cooperation Program (TTCP) The Technical Cooperation Program (TTCP) is an international organisation that collaborates in defence scientific and technical information exchange; program harmonisation and alignment; and shared research activities for the five nations (Australia , Canada, New Zealand, the United Kingdom, and the United States). Public Website: http://www.dtic.mil/ttcp/ Groups within TTCP AER Aerospace Systems Group C3I Command, Control, Communications and Information Systems Group CBD Chemical, Biological, and Radiological Defence Group EWS Electronic Warfare Systems Group HUM Human Resources and Performance Group JSA LND MAR Joint Systems and Analysis Group MAT Materials and Processing Technology Group SEN Sensors Group WPN Conventional Weapons Technology Group Land Systems Group Maritime Systems Group Each Group is comprised of several Technical Panels and Action Groups. TTCP EWS AG5 The Electronic Warfare Systems (EWS) group is responsible for science and technology collaboration in EW. Action Group 5 (AG5) is tasked with studying new concepts for Electronic Warfare and Network Centric Operations. Part of the AG5 study is to investigate how Communication Electronic Warfare (CEW) can assist in protecting the radio-link portion of communications networks in a Network Centric Warfare (NCW) force. The Role of CEW in Network Protection In the 20th century, radar and Radar Electronic Warfare evolved to provide situational awareness and platform protection. In the 21st century, Communication EW will evolve to provide radio spectrum awareness and network protection for the Network Centric Warfare force. Communications Electronic Warfare CEW is comprised of three related disciplines: Communication Electronic Support (signal interception, emitter locating, analysis) Communication Electronic Attack (jamming, deception) Communication Electronic Protection (anti-jam radios) Communication Electronic Support (CES) provides: Surveillance of the radio spectrum Identification of radio signals and spectrum usage Recovery of message content Geolocation and tracking of emitters Radio Spectrum Monitoring by a CEW sensor Detect all signals in range of sensor Identify signal types and spectral usage Direction-Find and geo-locate emitters Intercept signals of interest The CEW Emitter Map Associate radio signals to emitters over time for area of interest CES CES Geo-location and tracking of emitters Classify emitters Identify network structure of emitters CES CES Detect usage of the radio spectrum, locate emitters, determine identity, track which sets of emitters are using what parts of the radio spectrum, by region, over time. Radio Frequency Shared Radio Spectrum Awareness for NCW - the RF Common Operating Picture Ar e Unknown Hostile ao f in te re Neutral st Friendly Detection of Network Jamming CES systems may locate the source of interference using network information and spectral surveillance Hostile Jammer Jamming disrupts RF Link between forces Shared RF COP Network Management Radio Spectrum Awareness Need Input from the “network” Blue Force Tracking (who, where, when) Wireless networks and spectrum usage Reports of outages and interference of wireless links Need to know the RF environment Map local, civilian use of the spectrum Model radio propagation environment Detect and track changes in spectrum usage Need sufficient CES capability Quantity of sensors required to cover area of interest Continuous frequency coverage over all comms bands Ability to identify all types of radio signals Geo-location of emitters TTCP Workshop on the Robustness and Vulnerability of Network Centric Warfare Workshop Objectives: Identify vulnerabilities of NCW systems to attack; Identify means to defend NCW systems from attack; Identify the technology and procedural gaps that may present vulnerabilities to NCW systems, including those unique to coalition operations; and Identify future research activities to address the vulnerabilities of NCW systems. Hosted by DRDC Ottawa in May 2007 Involved 33 scientists from US, UK, AUS, and CA. Contained 26 presentations on vulnerabilities, robustness and research in NCW systems. Coalition Networks Theatre Command National Command Dismounted Soldiers UAV Tactical HQ Urban Littoral Different protocols Rural Network Centric Warfare Systems The following are examples of Network Centric Warfare Systems and capabilities that could be targeted by hostile actions against the network: • HQ Command, Control and Communications (C3) • Situation Awareness (SA) • Intelligence, Reconnaissance, and Surveillance • Air Defence, Artillery, and Network-Controlled Weapons • Logistics and Supply • Vehicle and Dismounted Infantry C3/SA NCW Vulnerabilities Considered Electronic Warfare Networks and Communications Network-Enabled Systems Human Factors NCW Workshop Summary There are potential vulnerabilities to Network Centric Warfare and network-enabled systems. Detailed understanding of all potential vulnerabilities, including technological, organisational, and human-related, is essential to developing and operating NCW systems that are robust, reliable, and effective. This is particularly important to address asymmetric attacks against the network. Significant research is required to properly investigate the vulnerabilities of NCW systems and assess levels of robustness. Questions?