B FM 34-1 IULY 1987 INTELLIGENCE and ELECTRONIC WARFARE

Total Page:16

File Type:pdf, Size:1020Kb

B FM 34-1 IULY 1987 INTELLIGENCE and ELECTRONIC WARFARE b FM 34-1 IULY 1987 INTELLIGENCE AND ELECTRONIC WARFARE OPERATIO HEADQUARTERS, DEPARTMENT OF THE ARMY DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited Panfcagon Library (ANR-FÙ ATnt Military Documanw^SectiOSt Room 1A518, Pentagon VVas^ingion, DC 20310-€050\ O-pvb FIELD MANUAL *FI\/I 34-1 NO. 34-1 HEADQUARTERS DEPARTMENT OF THE ARMY Washington, DC, 2 July 1987 INTELLIGENCE AND ELECTRONIC WARFARE OPERATIONS Table of Contents Page Preface iv Chapter 1 — The Mission 1-1 Situation and Target Development A. 1-1 Electronic Warfare 1-3 Counterintelligence \ 1-4 Chapter 2 —The Intelligence and Electronic Warfare System . \ 2-1 Functional Structure 2-1 Coordination Structure 2-4 System Elements 2-20 Echelon Architecture 2-21 Chapters — Situation and Target Development 3-1 Intelligence Preparation of the Battlefield 3-3 Collection Management 3-20 Processing 3-38 Dissemination 3-60 Chapter 4 — Counterintelligence 4-1 Support to Operations Security 4-1 Support to Rear Operations 4-10 Support to Deception 4-13 Support to Command, Control, and Communications Counter- measures 4-15 Chapter 5 — Electronic Warfare 5-1 Electronic Warfare Section 5-1 Electronic Countermeasures 5-2 Electronic Warfare Targets 5-7 Electronic Warfare Principles 5-9 Distribution Restriction: Approved for public release; distribution is unlimited. *This publication supersedes FM 34-1, 31 August 1984. ^ 20310-605q Electronic Warfare Planning 5-10 Electronic Warfare Tasking 5-14 Electronic Warfare Assessment 5-14 Chapter 6 — Organization for Combat 6-0 Command and Support Relationships 6-0 Principles of Organization 6-1 Task Organization 6-1 Communications 6-4 Chapter 7 — Offensive Operations 7-0 IEW Principles 7-0 Support to Offensive 7-1 River Crossing 7-7 Chapter 8 — Defensive Operations 8-0 IEW Principles 8-0 Deep Operations 8-2 Covering Force 8-3 Support to the Main Battle 8-7 Chapter 9 — Retrograde Operations 9-0 IEW Principles 9-0 Delaying 9-1 Withdrawal 9-4 River Crossings 9-6 Chapter 10 — Defense and Breakout of Encircled Forces 10-0 Defense 10-0 Breakout 10-2 Chapter 11 —Rear Operations 11-1 Air-Land Battle Tenets 11-1 Objectives 11-2 Threat 11-2 Command and Control 11-6 Intelligence Mission 11-14 Intelligence and Electronic Warfare Support 11-17 Chapter 12 — Special Operations and Environments 12-0 Special Operations 12-0 Special Environments 12-7 Chapter 13 — Joint and Combined Operations 13-0 Joint Operations 13-0 Contingency Operations 13-6 Combined Operations 13-6 Chapter 14 — Logistics 14-1 Supply 14-1 Maintenance, Repair, and Recovery 14-7 Ml Unit Maintenance 14-11 Replacement 14-11 ii Chapter 15 — NBC Survival and Reconstitution 15-0 Effects 15-0 Vulnerabilities 15-1 Survival 15-2 Reconstitution 15-4 Appendix A - The Analysis of the Battlefield Área A-1 Appendix B - The Intelligence Estimate B-1 Appendix C - The Intelligence Annex C-1 Appendix D - The Electronic Warfare Estimate D-1 Appendix E - The Electronic Warfare Annex E-1 Appendix F - Electronic Warfare Targeting Formats F-0 Appendix G - Dissemination Devices G-1 Appendix H - The Collection Plan H-1 Appendix I - Tactical Special Security Operations I-1 Glossary Glossary-0 References References-0 Index lndex-1 iii Preface Intelligence and electronic warfare (IEW) is critical to the US Army's fundamental mission of winning air-land battles. During peacetime, the IEW system provides the intelligence and counterintelligence (CI) and defensive electronic warfare (EW) support essential to deterring war through vigilance and preparedness. During war, these mission areas and the addition of offensive EW, focus on supporting the winning of battles and campaigns. This IEW keystone manual expands doctrine contained in FM 100-5, and establishes the doctrinal foundation for IEW operations. It delineates the IEW mission on the modern battle- field, the IEW role in maximizing the combat power of the combined arms team, the princi- ples which govern tactical IEW operations, and the importance of sustaining IEW capabili- ties. The doctrine in this manual orients on principles and general procedures and is based on applicable Army of Excellence (AOE) tables of organization and equipment (TOE). More specific operational procedures are provided in doctrinal field manuals. This manual is designed for use by commanders, staffs, and trainers at all echelons. It is the foundation for Army service school IEW instruction and serves as the basis for IEW doc- trinal, training, and combat developments. Provisions of this manual are subject to international standardization agreements (STANAGs) 2008, 2014, 2022, and 3377. STANAG 2014 (Edition Five) is implemented by Appendixes C and E to this field manual. When amendment, revision, or cancellation of this publication affects or violates the international agreements concerned, the preparing agency will take appropriate reconciliation action through international standardization channels. The proponent of this publication is the United States Army Intelligence Center and School. Submit changes for improving this publication on DA Form 2028 (Recommended Changes to Publications and Blank Forms) and forward to Commander, US Army Intelli- gence Center and School, ATTN: ATSI-TD-PAL, Fort Huachuca, AZ 85613-7000. iv CHAPTER 1 The Mission Armies that maintain coherence and con- SITUATION AND TARGET fidence and can concentrate superior com- DEVELOPMENT bat power at decisive times and places are the winners of battles and campaigns. Situation development is the basic pro- While there are no simple formulas for win- cess by which intelligence is developed. ning, there are certain key factors for suc- Information is collected, then integrated cess on the air-land battlefield. One key fac- into an all-source product to provide an tor is the support provided to the combined estimate of the situation and a projection of arms team through IEW operations. enemy intentions in sufficient time to per- IEW operations, in both peace and war, mit the commander to select the most effec- support the winning of battles and tive friendly course of action. Situation campaigns—the focus of tactical doctrine development provides— described in FM 100-5. The mission of IEW □ Knowledge of the weather and terrain operations is to provide the maneuver throughout the areas of operations and commander with three key forms of sup- interest. port: intelligence, EW, and CI. □ Knowledge of the enemy to include History is full of examples of the vital role enemy organization, equipment, and intelligence plays in combat operations. tactics—how the enemy fights; the There have been many instances in which strengths and weaknesses of enemy forces with superior intelligence have been dispositions; the capabilities, limita- victorious over much larger opposing tions, and patterns of particular enemy armies. Commanders who have possessed units; the enemy's operational, techni- detailed knowledge of the enemy, weather, cal, and human weaknesses and per- and terrain and used that knowledge in sonalities; the enemy's intentions; and their application of fire and maneuver have the enemy's probable reactions. usually been the victors. General Washing- Weather and terrain have more impact on ton's surprise attack on Trenton and the 1942 American victory at Midway, the turn- the battle than any other physical factor, including weapons, equipment, or supplies. ing point in the battle for the Pacific, are shining examples of the value of accurate The terrain on which battles are fought presents opportunities to both sides. Most intelligence. More recent history has dem- battles have been won by the side that used onstrated the advantages of using EW and terrain to protect itself and to reinforce fires CI. EW, especially its use in the 1973 Arab- to destroy the enemy. Commanders must Israeli war, and in 1982 in the Bekaa Val- understand the nature, uses, and reinforce- ley, has proven itself a credible weapon for ment of terrain to be effective. both offensive and defensive purposes. The need for CI and its value as a principal con- IEW operations assist commanders in tributor to the security of the combat force selecting and understanding the battlefields were proven during Korea, Vietnam, and on which they choose to fight. Intelligence the intervening years of peace. These sup- preparation of the battlefield (IPB), a sys- port functions will be of equal or greater tematic approach to the analysis of enemy, value in the air-land battle of today. Suc- weather, and terrain, is the principal tool cessful execution of the IEW mission will be used. It clearly portrays what enemy forces critical on the air-land battlefield. can and cannot do on the battlefield and the probability of the adoption of a specific The combined application of these forms course of action. It also is used to clearly of support, the IEW mission, translates into show the effects of weather and terrain on four major tasks: situation development, target development, EW, and CI. 1-1 friendly forces and courses of action. IPB is provides the commander with timely and begun long before the battle and is updated accurate locations of enemy weapons sys- continually. tems, units, and activities which may impact on current or projected operations. To succeed in battle, commanders must Targeting data must be sufficiently timely avoid enemy strengths and exploit weak- and accurate to support effective attack by nesses. They must surprise enemy forces, fire, maneuver, or electronic means. catching them at a disadvantage as often as possible. IPB provides the basis for the Situation and target development provide situation and target development tasks commanders with the intelligence they need which make this possible. Situation devel- to fight the air-land battle. Both are distinct opment reduces battlefield uncertainty and tasks, yet they must be integrated totally to provides the confidence to generate superior provide an accurate picture of the battle- combat power.
Recommended publications
  • The Erosion of Strategic Stability and the Future of Arms Control in Europe
    Études de l’Ifri Proliferation Papers 60 THE EROSION OF STRATEGIC STABILITY AND THE FUTURE OF ARMS COntrOL IN EUROPE Corentin BRUSTLEIN November 2018 Security Studies Center The Institut français des relations internationales (Ifri) is a research center and a forum for debate on major international political and economic issues. Headed by Thierry de Montbrial since its founding in 1979, Ifri is a non- governmental, non-profit organization. As an independent think tank, Ifri sets its own research agenda, publishing its findings regularly for a global audience. Taking an interdisciplinary approach, Ifri brings together political and economic decision-makers, researchers and internationally renowned experts to animate its debate and research activities. The opinions expressed in this text are the responsibility of the author alone. ISBN: 978-2-36567-932-9 © All rights reserved, Ifri, 2018 How to quote this document: Corentin Brustlein, “The Erosion of Strategic Stability and the Future of Arms Control in Europe”, Proliferation Papers, No. 60, November 2018. Ifri 27 rue de la Procession 75740 Paris Cedex 15 – FRANCE Tel.: +33 (0)1 40 61 60 00 – Fax: +33 (0)1 40 61 60 60 Email: [email protected] Website: Ifri.org Author Dr. Corentin Brustlein is the Director of the Security Studies Center at the French Institute of International Relations. His work focuses on nuclear and conventional deterrence, arms control, military balances, and U.S. and French defense policies. Before assuming his current position, he had been a research fellow at Ifri since 2008 and the head of Ifri’s Deterrence and Proliferation Program since 2010.
    [Show full text]
  • Overhead Surveillance
    Confrontation or Collaboration? Congress and the Intelligence Community Overhead Surveillance Eric Rosenbach and Aki J. Peritz Overhead Surveillance One of the primary methods the U.S. uses to gather vital national security information is through air- and space-based platforms, collectively known as “overhead surveillance.” This memorandum provides an overview of overhead surveillance systems, the agencies involved in gathering and analyzing overhead surveillance, and the costs and benefits of this form of intelligence collection. What is Overhead Surveillance? “Overhead surveillance” describes a means to gather information about people and places from above the Earth’s surface. These collection systems gather imagery intelligence (IMINT), signals intelligence (SIGINT) and measurement and signature intelligence (MASINT). Today, overhead surveillance includes: • Space-based systems, such as satellites. • Aerial collection platforms that range from large manned aircraft to small unmanned aerial vehicles (UAVs). A Brief History of Overhead Surveillance Intelligence, surveillance and reconnaissance platforms, collectively known as ISR, date back to the 1790s when the French military used observation balloons to oversee battlefields and gain tactical advantage over their adversaries. Almost all WWI and WWII belligerents used aerial surveillance to gain intelligence on enemy lines, fortifications and troop movements. Following WWII, the U.S. further refined airborne and space-based reconnaissance platforms for use against the Soviet Union. Manned reconnaissance missions, however, were risky and could lead to potentially embarrassing outcomes; the 1960 U-2 incident was perhaps the most widely publicized case of the risks associated with this form of airborne surveillance. Since the end of the Cold War, overhead surveillance technology has evolved significantly, greatly expanding the amount of information that the policymaker and the warfighter can use to make critical, time-sensitive decisions.
    [Show full text]
  • National Reconnaissance Office Review and Redaction Guide
    NRO Approved for Release 16 Dec 2010 —Tep-nm.T7ymqtmthitmemf- (u) National Reconnaissance Office Review and Redaction Guide For Automatic Declassification Of 25-Year-Old Information Version 1.0 2008 Edition Approved: Scott F. Large Director DECL ON: 25x1, 20590201 DRV FROM: NRO Classification Guide 6.0, 20 May 2005 NRO Approved for Release 16 Dec 2010 (U) Table of Contents (U) Preface (U) Background 1 (U) General Methodology 2 (U) File Series Exemptions 4 (U) Continued Exemption from Declassification 4 1. (U) Reveal Information that Involves the Application of Intelligence Sources and Methods (25X1) 6 1.1 (U) Document Administration 7 1.2 (U) About the National Reconnaissance Program (NRP) 10 1.2.1 (U) Fact of Satellite Reconnaissance 10 1.2.2 (U) National Reconnaissance Program Information 12 1.2.3 (U) Organizational Relationships 16 1.2.3.1. (U) SAF/SS 16 1.2.3.2. (U) SAF/SP (Program A) 18 1.2.3.3. (U) CIA (Program B) 18 1.2.3.4. (U) Navy (Program C) 19 1.2.3.5. (U) CIA/Air Force (Program D) 19 1.2.3.6. (U) Defense Recon Support Program (DRSP/DSRP) 19 1.3 (U) Satellite Imagery (IMINT) Systems 21 1.3.1 (U) Imagery System Information 21 1.3.2 (U) Non-Operational IMINT Systems 25 1.3.3 (U) Current and Future IMINT Operational Systems 32 1.3.4 (U) Meteorological Forecasting 33 1.3.5 (U) IMINT System Ground Operations 34 1.4 (U) Signals Intelligence (SIGINT) Systems 36 1.4.1 (U) Signals Intelligence System Information 36 1.4.2 (U) Non-Operational SIGINT Systems 38 1.4.3 (U) Current and Future SIGINT Operational Systems 40 1.4.4 (U) SIGINT
    [Show full text]
  • Ground Electronic Warfare: Background and Issues for Congress
    Ground Electronic Warfare: Background and Issues for Congress September 17, 2019 Congressional Research Service https://crsreports.congress.gov R45919 SUMMARY R45919 Ground Electronic Warfare: Background and September 17, 2019 Issues for Congress John R. Hoehn Ground electronic warfare (EW) is a group of programs directed by the Army and Marine Corp Analyst in Military which are designed to effect ground forces use of the electromagnetic spectrum. The U.S. Capabilities and Programs military has several ground EW programs that are used for different missions. These programs can broadly be categorized into counter-improvised explosive device (C-IED) systems, counter- unmanned aerial systems (C-UAS), and communications and radar jammers. Over the past several years, senior leaders in the Army and Marine Corps have testified about the need to improve EW capabilities. Role of EW in Ground Operations EW is a component of modern warfare, particularly in response to threats posed by potential adversaries such as Russia and China. EW refers to operations that use the electromagnetic spectrum (i.e., the “airwaves”) to detect, listen to, jam, and deceive (or “spoof”) enemy radars, radio communication systems, data links, and other electronic systems. EW also refers to operations that defend against enemy attempts to do the same. Ground EW programs have gained importance in an era of “great power competition.” Countries like Russia and China have developed so-called anti-access/area denial (A2/AD) systems, some of which are designed to prevent U.S. military access to radio and satellite communications, and to deny the use of radars for artillery and air defense operations.
    [Show full text]
  • Defense Primer: Electronic Warfare
    Updated October 29, 2020 Defense Primer: Electronic Warfare Electronic warfare (EW), as defined by the Department of Electronic protection involves actions to protect access Defense (DOD), are military activities that use to the spectrum for friendly military assets. electromagnetic energy to control the electromagnetic Electronic attack uses electromagnetic energy to spectrum (“the spectrum”) and attack an enemy. The degrade or deny an enemy’s use of the spectrum. spectrum is a range of frequencies for electromagnetic EW support identifies and catalogues emissions of energy. EW supports command and control (C2) by friendly or enemy forces to either protect U.S. forces or allowing military commanders’ access to the spectrum to develop a plan to deny an enemy’s access to the communicate with forces, while preventing potential spectrum. adversaries from accessing the spectrum to develop an These subsets of EW often mutually support each other in operational picture and communicate with their forces. operations. EW support uses equipment to assess both Some have argued that EW is a component of anti- friendly and adversary electronic emissions. This access/area denial (A2/AD) campaigns. information can then be used to develop a protection plan to maintain access to the spectrum or an attack plan to deny Role of EW in Military Operations adversaries vital access. Radar jamming (electronic attack) Since the introduction of two-way radios, militaries have can serve a protection function for friendly forces to become dependent on the spectrum. This reliance has penetrate defended airspace, and it prevents an adversary expanded over the past century to include nearly every from having a complete operating picture.
    [Show full text]
  • Protecting US Security by Minimizing the Role of Nuclear Weapons
    Blechman and Rumbaugh Protecting US Security by Minimizing the Role of Nuclear Weapons: A NEW US NUCLEAR POLICY Barry Blechman and Russell Rumbaugh MAY 2015 STIMSON | 1 Protecting US Security by Minimizing the Role of Nuclear Weapons: a New US Nuclear Policy This paper was prepared in September 2014 and commissioned by the Center for Strategic and International Studies (CSIS). It will be published in “Project Atom: A Competitive Strategies Approach to Defining U.S. Nuclear Strategy and Posture for 2025- 2050” (Washington, DC: CSIS, 2015.) 2 | APRIL 2015 CONTENTS Introduction . 5 US Conventional Military Dominance . 5 The Limited Role of Nuclear Weapons . 8 Minimizing the Roles of Nuclear Weapons in US Policies and Those of Other Nations . 12 Contingencies . 19 Conclusion . 23 “After seventy years of indulging fantasies of what nuclear weapons can do, it is high time to acknowledge that they do very little and adapt US nuclear policy, strategy, and forces to those facts.” Blechman and Rumbaugh INTRODUCTION Nuclear weapons remain the most potent destructive force known to humanity . Yet, US nuclear policies and doctrines remain encumbered by Cold War beliefs in the potential utility of nuclear weapons, even though the United States enjoys a dominant geopolitical position in the world, un- derpinned by a conventional military superiority greater than any ever known before . These false hopes that nuclear weapons can play a range of political and military roles in US security policy cause the United States to mistakenly pursue a nuclear strategy that is costly — not only in material terms, but also in geopolitical terms . In the worst case scenarios, this strategy could be catastroph- ic in terms of human lives and the nation’s future .
    [Show full text]
  • Preserving Ukraine's Independence, Resisting Russian Aggression
    Preserving Ukraine’s Independence, Resisting Russian Aggression: What the United States and NATO Must Do Ivo Daalder, Michele Flournoy, John Herbst, Jan Lodal, Steven Pifer, James Stavridis, Strobe Talbott and Charles Wald © 2015 The Atlantic Council of the United States. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means without permission in writing from the Atlantic Council, except in the case of brief quotations in news articles, critical articles, or reviews. Please direct inquiries to: Atlantic Council 1030 15th Street, NW, 12th Floor Washington, DC 20005 ISBN: 978-1-61977-471-1 Publication design: Krystal Ferguson; Cover photo credit: Reuters/David Mdzinarishvili This report is written and published in accordance with the Atlantic Council Policy on Intellectual Independence. The authors are solely responsible for its analysis and recommendations. The Atlantic Council, the Brookings Institution, and the Chicago Council on Global Affairs, and their funders do not determine, nor do they necessarily endorse or advocate for, any of this report’s conclusions. February 2015 PREFACE This report is the result of collaboration among the Donbas provinces of Donetsk and Luhansk. scholars and former practitioners from the A stronger Ukrainian military, with enhanced Atlantic Council, the Brookings Institution, the defensive capabilities, will increase the pros- Center for a New American Security, and the pects for negotiation of a peaceful settlement. Chicago Council on Global Affairs. It is informed When combined with continued robust Western by and reflects mid-January discussions with economic sanctions, significant military assis- senior NATO and U.S.
    [Show full text]
  • SPRING 2015 - Volume 62, Number 1 Call for Papers Violent Skies: the Air War Over Vietnam a Symposium Proposed for October 2015
    SPRING 2015 - Volume 62, Number 1 WWW.AFHISTORICALFOUNDATION.ORG Call For Papers Violent Skies: The Air War Over Vietnam A Symposium Proposed for October 2015 Four military service historical foundations—the Air Force Historical Foundation, the Army Historical Foundation, the Marine Corps Heritage Foundation, and the Naval Historical Foundation—recognize that a half century has passed since the United States became militarily engaged in Southeast Asia, and hope to sponsor a series of conferences involving scholars and veterans, aimed at exploring aspects and conse- quences of what once was known as America’s Longest War. For the first conference in the series, since all military services employed their combat aircraft capabilities in that conflict, the leaders of the four nonprofit organizations agree that the air war over Southeast Asia offers a compelling joint topic for reflective examination and discus- sion. The intent is to host a symposium on this subject in the national capital region on Thurs- day and Friday, October 15 and 16, 2015, potentially extending into Saturday, October 17. Other stakeholder organizations will be approached to join as co-sponsors of this event. The organizers of the symposium envision plenary and concurrent sessions to accommodate a wide va- riety of topics and issues. Panel participants will be allotted 20 minutes to present their research or discuss their experiences. A panel chair will be assigned to provide commentary and moderate discussion. Com- menters from academia, veterans, Vietnamese émigrés, and scholars from the region may be invited to pro- vide additional insights. Panel/Paper proposals may employ both chronological and topical approaches: Examples of chronological subjects can include: U.S.
    [Show full text]
  • The Physics of Space
    THIS MATERIAL IS BEING PROVIDED PRE-RELEASE SOLELY FOR THE USE OF GEN. JAMES DICKINSON, AND IS NOT APPROVED FOR RELEASE TO ANY OTHER PERSON OR ORGANIZATION WITHOUT THE EXPRESS PERMISSION OF THE AEROSPACE CORPORATION. DR. REBECCA REESMAN Dr. Rebecca Reesman is a project engineer in The Aerospace Corporation’s Defense Systems Group, where she supports the headquarters’ Air Force Studies, Analyses, and Assessment directorate, which provides analyses to major budgetary and policy decisionmaking. Before joining Aerospace in 2017, she was an American Institute of Physics Congressional Fellow, handling space, cybersecurity, and other technical issues for a member of Congress. Prior to the fellowship, she was a research scientist at the Center for Naval Analysis, providing technical and analytical support to the Department of Defense, with a focus on developing and executing wargames. Reesman received her Ph.D. in physics from The Ohio State University and a bachelor’s degree from Carnegie Mellon University. JAMES R. WILSON James R. Wilson is a member of the Astrodynamics Department at The Aerospace Corporation, where he specializes in orbit analysis, constellation design, space operations planning, and utilization of highly elliptical orbits. Wilson supports several government customers, including civil and defense agencies in areas of space protection, mission performance assessment, and concept design development. Prior to joining Aerospace in 2014, Wilson received his bachelor’s and master’s degrees in mechanical and aerospace engineering from Utah State University. ABOUT THE CENTER FOR SPACE POLICY AND STRATEGY The Center for Space Policy and Strategy is dedicated to shaping the future by providing nonpartisan research and strategic analysis to decisionmakers.
    [Show full text]
  • Method for Effectiveness Assessment of Electronic Warfare Systems In
    S S symmetry Article Method for Effectiveness Assessment of Electronic Warfare Systems in Cyberspace Seungcheol Choi 1, Oh-Jin Kwon 1,* , Haengrok Oh 2 and Dongkyoo Shin 3 1 Department of Electrical Engineering, Sejong University, 209 Neungdong-ro, Gwangjin-gu, Seoul 05006, Korea; [email protected] 2 Agency for Defense Development (ADD), Seoul 05771, Korea; [email protected] 3 Department of Computer Engineering, Sejong University, 209 Neungdong-ro, Gwangjin-gu, Seoul 05006, Korea; [email protected] * Correspondence: [email protected] Received: 27 November 2020; Accepted: 16 December 2020; Published: 18 December 2020 Abstract: Current electronic warfare (EW) systems, along with the rapid development of information and communication technology, are essential elements in the modern battlefield associated with cyberspace. In this study, an efficient evaluation framework is proposed to assess the effectiveness of various types of EW systems that operate in cyberspace, which is recognized as an indispensable factor affecting modern military operations. The proposed method classifies EW systems into primary and sub-categories according to EWs’ types and identifies items for the measurement of the effectiveness of each EW system by considering the characteristics of cyberspace for evaluating the damage caused by cyberattacks. A scenario with an integrated EW system incorporating two or more different types of EW equipment is appropriately provided to confirm the effectiveness of the proposed framework in cyber electromagnetic warfare. The scenario explicates an example of assessing the effectiveness of EW systems under cyberattacks. Finally, the proposed method is demonstrated sufficiently by assessing the effectiveness of the EW systems using the scenario.
    [Show full text]
  • AFDD 2-3.1 Foreign Internal Defense
    FOREIGN INTERNAL DEFENSE Air Force Doctrine Document 3-22 15 September 2007 Interim Change 2 (Last Review), 1 November 2011 This document complements related discussion found in Joint Publication 3-22, Foreign Internal Defense. BY ORDER OF THE AIR FORCE DOCTRINE DOCUMENT 3-22 SECRETARY OF THE AIR FORCE 15 SEPTEMBER 2007 INCORPORATING INTERIM CHANGE 2, 1 NOVEMBER 2011 SUMMARY OF CHANGES The Air Force Doctrine Working Group has reviewed this document and recommended that it remains valid and will again be reviewed no later than September 2012. AFDD numbering has also been changed to correspond with the joint doctrine publication numbering architecture. AFDD titles and content remain unchanged until updated in the next full revision. A margin bar indicates newly revised material. Old Number New Number Title AFDD 2-1 changed to AFDD 3-1 Air Warfare AFDD 2-1.1 changed to AFDD 3-01 Counterair Operations AFDD 2-1.2 changed to AFDD 3-70 Strategic Attack AFDD 2-1.3 changed to AFDD 3-03 Counterland Operations AFDD 2-1.4 changed to AFDD 3-04 Countersea Operations AFDD 2-1.6 changed to AFDD 3-50 Personnel Recovery Operations AFDD 2-1.7 changed to AFDD 3-52 Airspace Control AFDD 2-1.8 changed to AFDD 3-40 Counter-CBRN AFDD 2-1.9 changed to AFDD 3-60 Targeting AFDD 2-10 changed to AFDD 3-27 Homeland Operations AFDD 2-12 changed to AFDD 3-72 Nuclear Operations AFDD 2-2 changed to AFDD 3-14 Space Operations AFDD 2-2.1 changed to AFDD 3-14.1 Counterspace Operations AFDD 2-3 changed to AFDD 3-24 Irregular Warfare AFDD 2-3.1 changed to AFDD 3-22 Foreign
    [Show full text]
  • Electronic Warfare Engineer Programs
    THE REQUIREMENTS WHO CAN ENROLL IN THIS PROGRAM? • Government civilians, DOD contractor employees, and uniformed officers with a CONTACT INFORMATION technical background may apply. For customer/sponsor level WHAT ARE THE ENTRANCE REQUIREMENTS? questions, contact: • Recent graduates with a degree in a Prof. Roberto Cristi related field of science or engineering with ECE DL Program Manager appropriate on-the-job experience (831) 656-2223 [email protected] • Background in basic circuits, Fourier transforms and undergraduate electromagnetics For student level questions, contact: • Command or company endorsement Prof. David Jenn Program Academic Associate • Refresher material may be available to assist (831) 656-2254 students prior to entry. [email protected] IS THERE A SERVICE COMMITMENT? Per OPNAVINST 1520.23C, a Naval Officer will incur: For more information on the a) When enrolled in the Master’s Degree Program, ECE department, go to: either 1) a 3-year service obligation when the education is received in a part-time status, or 2) www.nps.edu/ece a 2-year service obligation when the education is received in off-duty status. ELECTRONIC For more information on other b) When enrolled in a Certificate Program, a NPS DL programs, go to: 1-year service obligation. www.nps.edu/dl WARFAREMASTER OF ENGINEERING Service obligation starts upon completion or withdrawal from the Program and is served A DISTRIBUTED LEARNING PROGRAM concurrently with any other service obligation. For EW ENGINEERS All students must submit a signed Participation Agreement prior
    [Show full text]