Command and Control Vulnerabilities to Jamming

By Ronald C. Wilgenbusch and Alan Heisig

f the United States ever has to face a peer adversary in a no-holds-barred fight, we will encounter a serious operational obstacle. The way we our forces is highly vulnerable to disastrous disruption. Modern operations have become dependent I on high-capacity communications, and this vulnerability could cause our forces to sustain a serious mauling or, perhaps, not to prevail. Why is this? The ability to provide the information required for successful high-impact/ low-committed asset warfare has developed an overwhelming reliance on unprotected com- munications satellites. There is an increasing public awareness of these vulnerabilities and the relative ease by which jamming can foil our methods of highly effective warfare. In this article, jamming is defined as electronically rendering a circuit or network unusable by disrupting it so it cannot be effectively used as a means of for purposes of command and control. Such an attack could be directed against any portion of the communications system and be of extended duration or else just long enough to lose crypto synchronization. Jamming is at the discretion of the enemy. It does not have to be constant or dependent on large fixed sites. It is often difficult to immediately distinguish jamming from other information flow disruptions caused by systemic disturbances such as cryptographic resets, system management changes, and natural phenomena.

U.S. Air Force maintenance technicians conduct pre-flight checks on RQ-4 Global Hawk unmanned aerial vehicle

DOD (Andy M. Kim)

56 JFQ / issue 69, 2 nd quarter 2013 ndupress.ndu.edu WILGENBUSCH and HEISIG

While we have placed an appropri- Defense. The guidance states, “we will con- dependencies on protected communications. ate emphasis on cyber warfare, we have tinue to invest in the capabilities critical to The protection of information and ability to neglected the less sophisticated threat of future success, including intelligence, sur- maintain freedom of maneuver in space is jamming. At some point prior to or during veillance, and reconnaissance [ISR]; coun- essential to Army success;6 the highly mobile combat, an adversary might decide spoofing, terterrorism; countering of mass Army of the future requires communications intrusion, and exploitation of our networks destruction; operating in anti-access [and on the move with networked operations. are insufficient. The adversary could try to area-denial (A2/AD)2] environments; and It depends on the availability of high- shut our networks down. prevailing in all domains, including cyber.”3 bandwidth, reliable, protected satellite com- By Ronald C. Wilgenbusch and Alan Heisig Then what? If our networks are We have taken great strides along these lines, munications to achieve this goal.7 The Air jammed, commanders in the field, at sea, but are we fully prepared? Force is hotly debating the methodologies to and in the air would not be able to employ The space-enabled communications ensure space capabilities, including protected their forces adequately. Our warfighters are systems used by the U.S. are the communications, at a balanced cost and risk.8 dependent on these links to coordinate joint most omnipresent information infrastructure The Navy has reorganized its entire infor- information, make reports, request supplies, to deployed forces. The military depends mation apparatus to focus on information coordinate land, sea, and air operations, and largely on commercial broadcast satellite dominance as a key element of its future. The evacuate wounded. Clever application of systems architectures. In some cases, it leases Joint has reestablished its J6 Command, jamming might go undiagnosed for a long capacity from the same operators of satellite Control, Communications, and Comput- period. Most likely, initial attribution would systems that commercial organizations use. ers/Cyber Directorate due to the increased be to equipment malfunction, crypto prob- These systems are virtually unprotected importance of and dependence on assured lems, or operator error. This dependency is a against jamming, which is probably the information technology and networks. significant vulnerability—one that can only cheapest, most readily available, and most The dependence on information flows get worse unless action is taken soon to direct likely form of denying or degrading the reli- (communications) of all kinds has produced our communication paths toward more pro- ability of information flow. superior combat efficiencies and effective- tected communications systems. Communications networks are deci- ness. Today’s Army uses significantly smaller In 2010, Loren Thompson of the sive in all aspects of U.S. global military and dispersed units to operationally control Lexington Institute published an article responsibilities. Commander of U.S. Pacific battlespace areas than in prior warfight- pointing out this gap in future warfighting Command, Admiral Samuel Locklear, high- ing constructs. The shift to strategic small capability.1 He stated that 80 to 90 percent of lighted this issue: “we still have to be able to units is possible, in part, because of the all military transmission travels on vulner- operate the networks that allow us to produce significantly increased lethality of smaller able commercial satellite communications combat power . . . so one of my priority jobs units enabled by the use of ISR and precision channels and that only 1 percent of defense is to ensure those [command] networks will weapons. This precision, however, depends communications is protected against even survive when they have to survive.”4 largely on reliable communications. This modest jamming. He asserts that the “only overall change in operational concepts has satellite constellation the military is currently Why So Critical? become a fundamental shift in military building that can provide protection against Since the 1980s, the U.S. military’s thinking. The Army is starting to build the full array of potential communications approach to conventional operations has around the platoon level and the Marine threats is the Advanced Extremely High become more dependent on access to space- Corps around the squad. Special operations Frequency (AEHF) system. . . . The feasible, based systems—particularly long-haul forces build around the team. This shift affordable answer is not to begin a new satellite communications and the precision exponentially expands the need for high program, but to start incrementally evolving navigation and timing information provided bandwidth information, particularly ISR. AEHF towards a more robust capability.” His by the Global Positioning System (GPS) The ability to provide the required assessment recognizes the persistent historic constellation. For this reason, the military voluminous information has so far devel- demand for greater capacity through satellite has invested heavily in developing battle oped a strong reliance on unprotected satel- communications links. networks to detect, identify, and track targets lites including the ability to use unmanned In January 2012, the Department with sufficient timely precision to enable aerial vehicles (UAVs) and beyond-line- of Defense (DOD) released its Strategic them to be struck. Intelligence, surveillance, of-sight capabilities for over-the-horizon Defense Guidance entitled Sustaining U.S. and reconnaissance systems reflect how control and real-time communication. This Global Leadership: Priorities for 21st Century dependent U.S. forces have become on access has led to an increasingly widespread public to the orbital and cyber dimensions of the discussion of the vulnerabilities of using global commons.5 unprotected satellite communications.9 The Rear Admiral Ronald C. Wilgenbusch, USN (Ret.), is a Consultant in Command, Control, In concert with the move toward preci- ubiquitous use of unprotected commercial Communications, Computers, and Intelligence sion munitions, U.S. warfighting doctrine wideband satellite communications leads (C4I). During his career, he served as an Electronic has become inseparably joint at all levels of to a false sense of comfort and assurance of Technician, Surface Warfare Officer, and Acquisition the Services. Joint coordination between availability, which is deceptively dangerous. Professional. Captain Alan Heisig, USN (Ret.), is widely dispersed forces is only possible by Jamming is the enemy’s side of asymmetric also a Consultant in C4I. He commanded several assured information flows. Moreover, all Ser- information warfare. surface ships and amphibious squadrons. vices have an increasing realization of their

ndupress.ndu.edu issue 69, 2 nd quarter 2013 / JFQ 57 COMMENTARY | Vulnerabilities to Communications Jamming

reality. The omnipresent capability by widely divergent players almost guarantees that jamming source attribution will be a problem even after detection is accomplished. In February 2012, the United Nations International Union hosted the World Radiocommunications U.S. Air Force (Raymond McKoy) U.S. Air Force Conference in Geneva. In recognition of the upswing of satellite jamming in 2011, the union issued a change to its regulations and a call to all nations to stop international inter- ference with satellite telecommunications.14 Moreover, recent incidents illustrating the need for action were the jamming of satel- lite operators EUTELSAT, NILESAT, and ARABSAT.15 Jamming has occurred from a variety of locations recently across the globe. Interference with satellite television broad- casting has come from Indonesia,16 Cuba,17 18 19 20 Air Force cadets defend their network during National Security Agency’s Cyber Defense Exercise at U.S. Ethiopia, Libya, and Syria. Addition- Air Force Academy, Colorado Springs ally, in the case of Libya, the use of tactical jamming of satellite telephones was reported during the course of combat operations.21 Potential adversaries have a variety of ties would play a significant part in any A2/ The proliferation of jamming does not options to accomplish disruption including AD campaign. have to depend on land-based fixed or mobile physical destruction of satellites and ground The ability to counter area-denial facilities. China is not tied to castoff Soviet stations, cyber, and jamming. Jamming is an activities depends in many ways on reliable naval designs. The People’s Liberation Army important element of any communications- satellite communications capabilities. Such Navy (PLAN) has small, fast, and capable denial plan. It is cheap to obtain and simple capabilities exist today in China11 and, by craft with good seakeeping capabilities such to operate. It can effectively be used surgi- extension, any surrogate or client regimes as the Houbei missile attack craft. Even a cally or in broadly based attacks. The absence with area-denial agendas. U.S. forces must be cursory look at the craft’s superstructure of planning and programmatic actions to able to operate in this challenging environ- shows that attention is paid to shipboard protect against a jamming threat is worri- ment. The obvious counter to jamming is electronics. The superstructure could be some given the likelihood of its use. to protect communications for operational equipped with powerful jammers and oper- forces. The necessity for protected communi- ated collaboratively far from U.S. forces. This Jamming and Antiaccess/Area Denial cations is not limited to A2/AD scenarios. A could seriously complicate U.S. naval or air A principal priority of the Strategic striking example is the strong reliance by the power projection. The PLAN continues to Defense Guidance is to project power Intelligence Community on UAVs for tacti- field these state-of-the-art, ocean-capable, despite A2/AD challenges.10 The recent cally relevant information supporting ground wave-piercing aluminum hull SWATH craft. conflicts in Iraq and Afghanistan do not troops. These vehicles require wideband sat- According to in-country open sources, by provide experience against an adversary ellite communications systems for over-the- February of 2011, the PLAN had fielded over employing significant communications- horizon control and real-time information 80 type 22 Houbei-class fast attack craft, and denial methods. Information access dissemination. Future tactical forces will rely the number is growing.22 The question is no was assured in those conflicts. Potential on robust and reliable information systems. longer who has jamming capabilities but, adversaries in other areas of the world have They are at huge risk to jammers. rather, have we prepared to operate effectively studied U.S. force enablers for two decades. China and Russia have well-docu- when it happens. At present, the answer is a They realize how dependent we are on mented satellite jamming capabilities. Some resounding no. assured communications. They understand versions of militarily effective jammers are that the best way to confront U.S. military even commercially available.12 The prolifera- Causes and Actions power is to prevent it from deploying. tion of jamming technology has led to an Historically, protected communications China, for example, has sent clear signals increasing utilization of strategic and tactical were viewed as the realm of strategic exis- of its intent through a variety of activi- jamming.13 Satellite jamming, in particular, tential threats to the Nation. The underlying ties including a naval buildup, submarine is proliferating. Military jamming equipment principle of U.S. protected communications deployments, ballistic missiles capable of can be purchased on the Internet by anyone, continued to have its raison d’être linked to targeting aircraft carriers, cyber activities, including nonstate actors. The attraction of nuclear communications survivability and and an antisatellite demonstration. There this economical, highly effective capability to essential, highest-level command and control. can be no question that jamming capabili- disrupt vastly superior forces is an ominous The approach was heavily focused on getting

58 JFQ / issue 69, 2 nd quarter 2013 ndupress.ndu.edu WILGENBUSCH and HEISIG DOD

Arleigh Burke–class guided missile destroyer USS Hopper (DDG 70), equipped with Aegis integrated weapons system, launches RIM-161 Standard Missile through a small number of human-to-human Desert Storm also highlighted the much more expensive alternative. Moreover, messages on which dispersed forces could inadequacy of the existing satellite commu- commercial communications satellites retain execute preplanned objectives. This focused nications architecture. The starkest reality their inherent jamming vulnerabilities. view kept protected communications capabil- was the inability to transmit large data files ity development geared toward the “Arma- to tactical forces. The air tasking order (a Realization and Acceptance of the geddon” context and did not significantly daily compilation of all joint and coalition Requirement influence tactical requirements. aircraft planning and execution) was unable The paucity of protected communica- During Operation Desert Storm in to reach the significant airpower resident tions below the highest levels of requirements 1991, laser-guided bombs, Tomahawk land- on Navy carriers. The reprogramming of of nuclear command and control is starting attack missiles (TLAMs), and the GPS-aided TLAMs, laser-guided bombs, joint direct to wend its way into the thinking of military conventional air-launched cruise missiles attack munition, and other precision muni- leadership. A 2010 Defense Intelligence demonstrated that U.S. forces had the capa- tions took exceedingly long times to transmit Agency (DIA)–sponsored wargame, with bility to hit almost any target whose location and overwhelmed the beyond-line-of-sight over 60 Active-duty troops and civilian rep- could be pinpointed. For this reason, the U.S. systems of the day. resentatives from each of the Services, tried military has invested heavily in developing The vulnerability of unprotected broad- to grapple specifically with the loss of assured battle networks to detect, identify, and track band communications went unchallenged in satellite communications. The players made targets with sufficient timely precision to the last two decades. Recent conflicts have several key comments as they became aware enable target strikes. ISR systems such as the not been fought against major adversaries of the impact of threats to existing warfight- RQ-4 Global Hawk, GPS constellation, and with comparable capabilities.24 The U.S. mili- ing doctrine. The consensus among partici- photoreconnaissance satellites reflect how tary was able to accomplish its ends cheaply pants was that “significant risk” to mission dependent U.S. forces have become on access by taking advantage of a commercial over- success occurred when protected beyond- to the orbital and cyber dimensions of the building of satellite communications capacity line-of-sight communications were limited to global commons.23 The preplanned targeting in the late part of the last century and the existing capabilities. In the presence of even initially envisioned for these types of preci- early years of this one. That convenient modest jamming capability, participant reac- sion weapons incrementally has given way to resource is no longer available. Market devel- tion was to revert to Cold War–era doctrine a need for real-time responsiveness. opments have made commercial leasing a and tactics. ndupress.ndu.edu issue 69, 2 nd quarter 2013 / JFQ 59 COMMENTARY | Vulnerabilities to Communications Jamming

U.S. Soldiers set up tactical satellite communication system in Shekhabad Valley, Wardak Province, Afghanistan

U.S. Army (Russell Gilchrest)

60 JFQ / issue 69, 2 nd quarter 2013 ndupress.ndu.edu WILGENBUSCH and HEISIG

Those reactions were immediately frus- of the past when our military was left ill- enemy-controlled territory, it would still trated by a lack of available older systems; prepared for the future.” be a tough target. The jammer could stand the infrastructure to accomplish those out in the open just long enough to disrupt doctrines and tactics no longer exists. The Are There Options? the crypto set on the link/network. Then it combat functions of planning, command Optimists would say that the picture is could go silent, move to another location, or and control, movement and maneuver, not so grim—that there are options. So what focus on another satellite link. As mentioned, intelligence, fires, force protection, logistics/ might these options be if or when we encoun- operators frequently confuse jamming personnel support, and special operations ter an enemy who wishes to shut down our with equipment problems or a self-imposed were all significantly or critically degraded. communications? How quickly can we turn mistake. At best, locating and shooting the Additionally, there were issues with force options into operational capabilities? Are jammer is a difficult targeting problem that structure, organization, training, and equip- these really viable options that will keep our would certainly tax the intelligence and strike ment. Essentially, the entire spectrum of forces fighting as they have trained? assets assigned to other high-value targets. warfighting capability beyond preplanned The most frequently discussed option A third option is that we would attempt initial insertion and organic logistics was is that we would “go old school.” Participants to reconstitute the satellite constellations by significantly adversely affected. These risks in the previously mentioned DIA-sponsored rapidly replacing capability on orbit. This translated into longer engagement timelines, wargame suggested that they could still usually implies a set of smaller satellites increased casualties, and the need for a larger accomplish their warfighting missions already in storage. It also means the avail- force structure for each mission and reduced by using old-school techniques such as ability of a nearly immediate launch period multimission capability.25 high-frequency (HF) links. But, on acceptable for military operations. However, The wargame specifically focused on examination, they came to realize that this replacing one disrupted satellite with another satellite jamming as the most mature and is not viable. The worldwide system of fixed equally vulnerable to jamming hardly seems economically available means to deny satel- HF transmitters and antennas that was once to solve the problem. Furthermore, none of lite capability. The issue of physical destruc- the mainstay of our HF communications the smaller satellites that have been proposed tion of orbital assets was not addressed as it systems is gone. Even if it was still in place, has the capability to replace the types of satel- had several military/political elements that the skilled HF operators needed aboard ships lites used today. At present, there are simply were deemed too expensive or carried a sig- and ashore have been cashing retirement not enough launch vehicles or launch sites nificantly disproportionate geopolitical risk. checks for years. available to support such an alternative. The same denial effect is achieved by spot There is a more basic issue. Our satel- A fourth option might be to design an jamming without the protagonist having to lite links have enabled completely different entirely new satellite system with new fea- develop physical methods of interfering with types of operational communications and tures. This is theoretically feasible. However, space-related infrastructure. tactics and procedures that cannot be sup- it is hard to envision what this solution Pinpointing the source of jamming is ported on HF. This includes high bandwidth additionally offers in the sense of timeliness, not easy. Jammers can appear innocuous and machine-to-machine data exchanges, video cost reduction, and operational improvement can be quite mobile. They can be intermittent teleconference, Web sites, chat, email, and over expanding the constellation of existing in operation. A jammer can physically appear other mechanisms that in a large context protected communications satellites such as as some sort of commercial system, such allow decisionmaking to be viable at low advanced extremely high frequency (AEHF) as a news uplink vehicle or normal receive levels in the chain of command. That is the ones. The current and evolving technology antenna on a fixed site. fundamental capability that enables quick, is understood and carries known program- We have many lessons to draw on that adaptive, and effective warfighting that matic risk. We can certainly improve and point to a future where a large component of exponentially multiplies smaller force capa- expand the AEHF constellation much faster beyond-the-horizon communications must bilities. Yet going old school, reverting to than engage in multiple new technology be protected. Given the huge advantages that HF, was exactly the alternative a senior Navy program starts. space communications provide, it makes officer suggested as the course of action in A fifth option is centered on redun- sense to protect the capability against the trying to overcome a potential jamming dancy. In this alternative, even though most inexpensive and ubiquitous development of threat at the 2012 Navy Information Tech- communications links are not protected, disruptive capability by potential adversaries. nology Day briefing. there are many of them. It is hard to imagine The risk of not protecting it is an exponential A second knee-jerk option is that we an adversary who could take the entire infra- rise in force structure and cost coupled with would “shoot the jammer.” This is a non- structure down simultaneously. High-level the plummeting warfighting effectiveness starter. Almost everyone has seen the massed DOD officials have suggested that an enemy of existing forces. Accordingly, DOD will army of television trucks/vans wherever might be able to mount a jamming attack continue to work with domestic partners and and whenever some sensational news event that would leave operational forces with only international allies and invest in advanced occurs. Imagine downtown Baghdad or about 60 percent of our present capability. capabilities to defend its networks, opera- Kabul with the same number of trucks. Any But when was the last time we were using tional capability, and resiliency in cyberspace one of them could be a jammer. Which one only 60 percent of our satellite communica- and space.26 In the President’s words, “Going should be shot, and how long would it take tions capacity? forward, we will also remember the lessons to sort them out? Even if the jammer was We must further assume that an intel- of history and avoid repeating the mistakes working in the middle of an open desert in ligent enemy would have at least determined ndupress.ndu.edu issue 69, 2 nd quarter 2013 / JFQ 61 COMMENTARY | Vulnerabilities to Communications Jamming

Likelihood of Occurrence for Types of Communications Attack

Unsophisticated and Cheap

Orbital Kinetic

Cyber

Jamming

Sophisticated User Requirement and Costly

Harder and Time Easier and Quickly Ease of Tactical Employment Consuming Adaptable

our most critical links to operations in would offer the same capability at a reduced the jamming capability or we do not. So we progress. Those are likely to be the first to deployed cost. In order to make a disag- have to be prepared to defeat the most likely go. More concerning is the fact that a swept gregated satellite constellation acceptable jamming threats. tone jammer could take out all our links, or from a cost standpoint, it would have to be One alternative put forth that seems to certainly more than DOD officials estimate. supported by math to show that it is less offer potential is to supplement the existing The 60 percent figure appears unsupported expensive than the evolving current highly satellite system through the development of by analysis. effective and efficient systems. Second, the Aerial Layer Network (ALN). However, In any event, forces experiencing it is suggested that disaggregation would like an entirely new satellite system, it is not jamming without prior training and a reduce vulnerability, but in fact no amount fully defined and has yet to be built. ALN is management plan would create operational of disaggregation could offer protection a solution that might be able to take existing chaos. Managing heavy jamming attacks in against effective jamming or ASAT attack. satellite technology, scaled down in size but this environment becomes an effort to plan Furthermore, simple logic would tell us that, not in capability, and have it ready for rapid for gradual degradation of communications. if it is known that an attack on our strategic deployment to enable our forces to operate in Operational concepts must be modified on antijam main asset, AEHF, is tantamount to some scenarios in the face of jamming. This the fly as individual circuits are lost. Training an act of war, extending the use of that same involves engineering developments that carry must also be conducted both to recognize asset to provide secure coverage for both all the risks of any new start. By its nature, it and counter jamming as it occurs. These tactical and strategic forces would make the is best used in a permissive environment or actions should be pursued. It appears at tactical support more secure simply by being one with airspace dominance. This concept present that little progress has been made on the same strategic asset. On the other seems ripe for use as a pseudosatellite aug- in this direction. The reality is that many hand, disaggregating the two missions on mentation to support a land area of opera- important circuits have no backup. For different satellites would seem, from a logic tions or a battlegroup maneuvering at sea. example, many UAVs have only one form of standpoint, to make the disaggregated tacti- Dr. Thompson’s thesis of incrementally over-the-horizon communication available. cal asset more vulnerable to attack. After all, expanding the capability of AEHF is not It would not be difficult for an adversary to would jamming one of many tactical assets sufficient; it should be matched with a real- learn where to target his jamming efforts for be considered an act of war? Additionally, ization that the EHF spectrum also contains the greatest effect against UAVs. a disaggregated architecture presents ques- the capability to accommodate a wide variety It has been suggested that the present tions of technical risk and complexities not of high bandwidth requirements. This could military satellite communications system yet answered. provide ground, maritime, and atmospheric is composed of too many and too large Of course, there are other alternatives, forces with the protected wideband capabili- satellites that are overly vulnerable, overly such as adding antijam capability to unpro- ties that complement the mobile, highly inte- complex, and unnecessarily costly. The tected wideband systems. The properties of grated forces the U.S. military fields today proposed solution is to develop and deploy transmission physics dictate that an increase and will field tomorrow. disaggregated system architecture to replace in antijam capability implies modifications present architectures. to the waveform that would, of necessity, Conclusion There are two obvious problems with cause a reduction of the data rate. There are Jamming is a highly effective technique this suggestion. First, it presupposes that no halfway measures. There is no point in that could cripple U.S. military operations, there is a disaggregated architecture that adding just a “little antijam.” We either defeat and our potential adversaries know it and

62 JFQ / issue 69, 2 nd quarter 2013 ndupress.ndu.edu WILGENBUSCH and HEISIG have the capability to employ it. We should 4 Admiral Samuel J. Locklear, USN, U.S. Project Ploughshares, August 2007), available at not underestimate what they might do. Real- Pacific Command change of command address, . 14 izing our current operational dependency on March 2012. “International Broadcasters Call for End of 5 Barry D. Watts, The Maturing Revolution Satellite Jamming,” Broadcasting Board of Gov- reliable high data rate communications, and in Military Affairs (Washington, DC: Center for ernors, January 24, 2012, available at . have only two choices. The first is to reduce Command (USTRADOC), The United States 15 See David Klinger, “Satellite-jamming our dependency on communications—an Army Operating Concept, TRADOC Pamphlet becoming a big problem in the Middle East and unlikely alternative for obvious reasons. 525-3-1 (Fort Monroe, VA: Headquarters Depart- North Africa,” March 28, 2012, Arstechnica.com, Doing so would reduce operational effective- ment of the Army, August 19, 2010), available at available at . problem-in-the-middle-east.ars>. 7 16 be obvious that the way we have learned to Warfighter Information Network–Tactical Recent examples of satellite jamming fight over recent years simply will not allow a Commanders Handbook, Version 1.6. include Indonesia jamming a transponder on a 8 C. Robert Kehler, “Implementing the Chinese-owned satellite and Iran and Turkey reduction in the amount of communications National Security Space Strategy,” Strategic jamming satellite television broadcasts of dissi- capacity we will need. Studies Quarterly (Spring 2012), 18–26, available dents. See “Space, today and the future,” available The second choice is to ensure that our at . at . communications infrastructure is sufficiently 9 “Protecting [unmanned aerial vehicle] 17 Broadcasting Board of Governors, Washing- resilient to withstand the type of attack dis- satellite communications links also will be an ton, DC, July 15, 2003. cussed herein. As one unnamed senior officer important challenge in the future,” stated Stuart 18 “Ethiopia Jamming Eritrean Television, put it, in our present situation and failing Linsky, vice president of communications systems Knock out own Satellite channel,” available to add more protected communications, we at Northrop Grumman. “Where it once took an at . 19 day of battle.” This is clearly not where we munications, new ubiquitous technologies now Peter B. de Selding, “Libya Accused of ought to be. Increasing the capacity of pro- expose unmanned systems to jamming and cyber- Jamming Satellite Signals,” Space.com, March 1, attacks. ‘The ease with which the bad guys can do tected communications is an essential part of 2011, available at . “New satellite capabilities target UAV needs: 20 The Obama administration asserts that the Failure to address the predictable Waveforms and spacecraft help support warfighter Syrian government, with Iran’s help, is actively jamming threat could (will) lead to mission mission requirements,” DefenseSystems.com, jamming private communications and satellite degradation or failure. The time to act is now. March 15, 2012, available at . ers from the outside. See “Officials: Obama 10 Sustaining U.S. Global Leadership. ramps up aid to Syrian opposition,” Associ- Notes 11 Andrew Erickson, “China Testing Ballistic ated Press, April 13, 2012, available at . Satellite Communications Could Mean Defeat for gerroom/2010/03/asbm_graphic_admiralwillard- 21 “Thuraya Accuses Libya of Jamming Joint Force in Future War,” Lexington Institute testimony_chinese-article.png>. Satellite Signals,” SpaceNews.com, February 25, Early Warning Blog, April 14, 2010, available at 12 Available at . joint-force-in-future-war>. Backpack-Blockers.html>. 22 David Lague, “Insight: From a ferry, 2 Antiaccess/area denial is defined thusly: 13 Electronic and information warfare a Chinese fast-attack boat,” Reuters, May “anti-access capabilities [are] ones that slow techniques including hacking into computer 31, 2012, available at . over longer distances than they would like. Area- and nonstate actors. A number of incidents of 23 Watts. denial efforts are those that reduce friendly forces’ electronically jammed media broadcasts have been 24 Ibid. freedom of action in the more narrow confines reported in recent years, including interruptions to 25 Verbal assessment comments from Pro- of the area under the enemy’s direct control.” U.S. broadcasts to Iran, Kurdish news broadcasts, tected Communications Wargame Outbrief, May See Phillip Dupree and Jordan Thomas, “Air-Sea and Chinese television (allegedly by the Falun 26–27, 2010. Battle: Clearing the Fog,” Armed Forces Journal Gong). Iraq’s acquisition of Global Positioning 26 Sustaining U.S. Global Leadership. (June 2012), available at . U.S. GPS-guided munitions during Operation 3 Sustaining U.S. Global Leadership: Priori- Iraqi Freedom in 2003 suggests that jamming ties for 21st Century Defense (Washington, DC: capabilities are proliferating; the equipment was Department of Defense, January 2012). reportedly acquired commercially from a Russian company. See Space Security 2007 (Waterloo, ON:

ndupress.ndu.edu issue 69, 2 nd quarter 2013 / JFQ 63