Electronic Warfare Research Papers - Academia.edu (original) (raw)

The legacy of Blitzkrieg as deployed by the Wehrmacht during World War II cannot be denied due to its lethality, speed and surprise which completely out-manoeuvred the enemy. While employing its basic tenets, the Indian Army announced a... more

The legacy of Blitzkrieg as deployed by the Wehrmacht during World War II cannot be denied due to its lethality, speed and surprise which completely out-manoeuvred the enemy. While employing its basic tenets, the Indian Army announced a doctrine known as the Cold Start Doctrine (CSD) in 2004. Germany used Blitzkrieg as an operational level doctrine, but India wants to bring into play the same tactics on a strategic level. The effectiveness of this German battle plan makes it critical for Pakistan to analyse the repercussions of CSD in case of an armed conflict with India. This article is an effort to look for ways in which the Pakistan Armed Forces (PAF) can deter, repel and respond to an attack by employing conventional forces, while remaining strictly below the nuclear threshold.

Outer space in Pakistan is a trivial notion, and the idea has become less concerning for the authorities let alone the general masses. For decades, this field has been void of any particularly outstanding and significant development in... more

Outer space in Pakistan is a trivial notion, and the idea has become less concerning for the authorities let alone the general masses. For decades, this field has been void of any particularly outstanding and significant development in the country with only a handful of satellites launched in outer space. Where the world has progressed in space technology utilizing it for exploring, exploiting, and now even racing to dominate the global common, that is the outer space, Pakistan"s space program has been lagging and misses the opportunities that a robust outer space program provides, all the while ignoring the threats that arise from a weak space program. The significance of outer space has increased over the years in both civilian and military domains, where militarization outer space is now being transformed into a weaponization phenomenon. The space race that began in the Asian region with the Soviet Union inspired periphery states such as Pakistan to join space faring. Pakistan was the third country in Asia to establish its space agency; however, over time, it has lost its acclaimed position. Over time, it has grown weak with minimal research and development (R&D) in the field. Pakistan"s space program lacks a place in the literature, and academic discussions and this study aims at filling that gap by analyzing the strengths, weaknesses, threats, and opportunities for the space program of Pakistan.

This article analyses the current Gulf crisis that started in May 2017 by posing the following question. Did an information war unfold or did the crisis events that took place merely illustrate yet another round of propaganda and... more

This article analyses the current Gulf crisis that started in May 2017 by posing the following question. Did an information war unfold or did the crisis events that took place merely illustrate yet another round of propaganda and disinformation contests among Gulf participants and their backers? Accordingly, I will focus on five central themes. First, the theoretical underpinning and key concepts concerning Information Warfare (and related notions like Hacktivism and Cyber War) will be discussed in relation to information space and the media sphere. The second theme explores the historical, strategic, and geopolitical dynamics that led to the crisis and looks closely at the rivalries taking place in the region, with a particular focus on the proxy war between Iran and Saudi Arabia. Against a backdrop of geopolitical tensions and cyber threats, the third theme reviews some of the most notorious cyber attacks that occurred in the Gulf region up until the Trump Presidency. The fourth t...

Cyberspace is among the four global commons of the human race including, high seas, outer-space and Antarctica. The weaponization of the cyber domain is relatively a new phenomenon in war and warfare. Due to the pivotal need of... more

Cyberspace is among the four global commons of the human race including, high seas, outer-space and Antarctica. The weaponization of the cyber domain is relatively a new phenomenon in war and warfare. Due to the pivotal need of connectivity and reliance on computers, computer components and internet to transmit, disseminate and communicate data – the cyberspace is used by almost every military force. This dependence on computers and internet has resulted in the vulnerability of certain weapon systems, fire control mechanisms and
command and control platforms to cyber-attacks in the form of hacking, malware, spyware and disruptive and destructive viruses. North Korea is among those countries in the world that possesses a considerable capability to launch, disrupt, paralyze and render temporary or permanent loss of such platforms which assist in command and control of military forces. This article is a concentrated effort to analyse the cyber and electronic warfare strategy of North Korea and their possible use against United States Forces Korea (USFK) and United States Indo-Pacific Command (USINDOPACOM).

The U.S. Army is studying ways to apply its cyber power and is reconsidering doctrinally defined areas that are integral to cyberspace operations. An examination of network operations, information operations, and several other, more... more

The U.S. Army is studying ways to apply its cyber power and is reconsidering doctrinally defined areas that are integral to cyberspace operations. An examination of network operations, information operations, and several other, more focused areas across the U.S. military found significant overlap and potential boundary progression that could inform the development of future Army doctrine.

La Cuarta Revolución Industrial promete grandes cambios sociales. Tal cual indica Klaus Schwab, esta revolución tecnológica alterará por completo los productos que elaboramos, cómo los elaboramos, cómo interactuamos y, sobre todo, quiénes... more

La Cuarta Revolución Industrial promete grandes cambios sociales. Tal cual indica Klaus Schwab, esta revolución tecnológica alterará por completo los productos que elaboramos, cómo los elaboramos, cómo interactuamos y, sobre todo, quiénes somos. Como era de esperarse, aquel potencial caracterizado por la promesa de la automatización y la interconexión de los ecosistemas físicos con los digitales (Internet de las cosas, implantes neurales, prótesis inteligentes, etc.) no solo ofrecerían beneficios, sino que, consecuentemente, también supondrían peligros. La guerra también experimentará cambios. En este escenario el biohacking, las Smart Cities, los Deep Fakes y las nanotecnologías, podrían alterar por completo lo que entendemos por conflicto bélico.

Electronic warfare (EW) is a broad category of technical capabilities focused on the strategic use of the electromagnetic spectrum against an enemy in a military conflict. Electronic warfare is a rapidly evolving field that is steadily... more

Electronic warfare (EW) is a broad category of technical capabilities focused on the strategic use of the electromagnetic spectrum against an enemy in a military conflict. Electronic warfare is a rapidly evolving field that is steadily increasing in prominence as nation’s look to gain the edge in the next generation of conflict technology. Tonex offers Electronic Warfare Training.

The Fifth Dimension of Conflictuality: The Rise of Cyberspace and Its Effects on In- ternational Politics Cyberspace has become a crucial element for political, social, financial and individual activities. The Information and... more

The Fifth Dimension of Conflictuality: The Rise of Cyberspace and Its Effects on In- ternational Politics
Cyberspace has become a crucial element for political, social, financial and individual activities. The Information and Communication Technologies (ICT) have enhanced the human interactions and have contributed to “reinvent” classical concepts such as political participation, political debate, decision-making. However, their all-encom- passing, ubiquitous nature and their growing use for political and military purposes poses significant risks to international peace, stability and security. The low barrier of access to ICT capabilities, the speed of technological advances and the complexity of the cyberspace environment with regard to traditional legal definitions of borders have presented new challenges to States (the main actors of international relations) such as the inherent complexity of accurately attributing cyber-attacks. It is both this complexity and the frequent insistence of parties to attribute cyber-attacks and incidents “beyond a reasonable doubt” that gives one the ability to deny responsibility and frustrate attempts to build trust and political rapport in cyberspace. The purpose of this research is to analyze how cyberspace affects the international politics. The nature of the topic dictates the use of qualitative analysis of primary and secondary sources such as official reports, declarations and policy documents, and academic analysis, in order to understand effects and dynamics carried out by the cyber domain on classical concepts such as war, peace and international relations. The main idea of this research is that the development of Information and Communication Technolo- gies (ICTs) and the related (r)evolution of warfare have produced relevant effects on the dynamics of the contemporary international system highlighting, at the same time, how the militarization of the cyber domain has posed consequences on interna- tional security, peace and stability. However, the lack of specific research related to “cyberspace’s effects on international politics” highlights the need to devote more attention on this topic bearing in mind that, more extensive and enduring analysis on cyberspace’s dynamics might allowed policy makers the opportunity to improve
awareness related to cyber threats in order to governing challenges emerging from the digital sphere.

Applications of artificial intelligence in cyber warfare have been mainly postulated and studied in the context of defensive operations. This paper provides an introductory overview of the use of autonomous agents in offensive cyber... more

Applications of artificial intelligence in cyber warfare have been mainly postulated and studied in the context of defensive operations. This paper provides an introductory overview of the use of autonomous agents in offensive cyber warfare, drawing on available open literature. The study supplies an introduction to the taxonomy and science underlying intelligent agents and their strengths and weaknesses: the technological elements that autonomous agents should include are explained, as well as the economics involved. The paper also aims to explore possible legal implications of the use of autonomous agents and shows how they could fit into the legal context of warfare. The conclusion of the study is that the use of AI technologies will be an important part of cyber offensive operations, from both the technological and the economical aspects; however, the legal and doctrinal landscape is still uncertain and proper frameworks are still to be developed.

: High Power Electromagnetic Pulse generation techniques and High Power Microwave technology have matured to the point where practical E-bombs (Electromagnetic bombs) are becoming technically feasible, with new applications in both... more

: High Power Electromagnetic Pulse generation techniques and High Power Microwave technology have matured to the point where practical E-bombs (Electromagnetic bombs) are becoming technically feasible, with new applications in both Strategic and Tactical Information Warfare. The development of conventional E-bomb devices allows their use in non-nuclear confrontations. This paper discusses aspects of the technology base, weapon delivery techniques and proposes a doctrinal foundation for the use of such devices in warhead and bomb applications.

The Air Force Electronic Warfare Evaluation Simulator (AFEWES) Infrared Countermeasures (IRCM) test facility currently has the ability to simulate a complete IRCM test environment, including IR missiles in flight, aircraft in flight, and... more

The Air Force Electronic Warfare Evaluation Simulator (AFEWES) Infrared Countermeasures (IRCM) test facility currently has the ability to simulate a complete IRCM test environment, including IR missiles in flight, aircraft in flight, and various IR countermeasures including maneuvers, point-source flares and lamp- and LASER-based jammer systems. The simulations of IR missiles in flight include missile seeker hardware mounted on a six degree-of-freedom flight simulation table. This paper will focus on recent developments and upgrades to the AFEWES IR capability.

Electronic Warfare is defined as the set of actions that: a) Use electromagnetic energy to destroy, neutralize or reduce enemy combat capability; b) Seek to take advantage of the use of the electromagnetic spectrum by the opponent;... more

Electronic Warfare is defined as the set of actions that:
a) Use electromagnetic energy to destroy, neutralize or reduce enemy combat capability;
b) Seek to take advantage of the use of the electromagnetic spectrum by the opponent; and
(c) aim to ensure the efficient use of own electromagnetic emissions.
Electronic Warfare can be divided, according to its objectives, into three broad groups: Electronic Warfare Support Measures, Electronic Attack Measures and Electronic Protection Measures.
Electronic Warfare Support Measures aims to obtain data and information from the electromagnetic emissions of interest used by the opponent.
Electronic Warfare Support Measures are characterized by the intentional irradiation, re-radiation, reflection, alteration or absorption of electromagnetic energy for the purpose of destroying, neutralizing or degrading enemy combat capability.
Electronic Warfare Support Measures seek to ensure the effective (active and passive) use of the electromagnetic spectrum, despite Electronic Warfare actions taken by the opponent, friendly forces or other unintentional interference.

The primary focus of this four-part series is to suggest Information Warfare for the Indian Armed Forces which are effective enough to match up to the challenges of 21st Century warfare. This analysis takes cognizance of the fact that... more

The primary focus of this four-part series is to suggest Information Warfare for the Indian Armed Forces which are effective enough to match up to the challenges of 21st Century warfare. This analysis takes cognizance of the fact that there is deep resistance to change within any military hierarchy, despite the radical changes taking place in modern warfare concepts. Therefore, a transformational – as opposed to a (preferred) revolutionary – approach is adopted towards achieving the desired capabilities. In this first part, an attempt is made to dwell upon and clarify the terminologies, concepts and doctrines which are taken as the basis for proposing effective and viable IW structures for the Indian Armed Forces.

The Russian intervention in Syria, as well as the associated deployment of electronic warfare systems, generated alarm among NATO members linked to the possibility that a strengthening of electronic warfare capabilities by Russia could... more

The Russian intervention in Syria, as well as the associated deployment of electronic warfare systems, generated alarm among NATO members linked to the possibility that a strengthening of electronic warfare capabilities by Russia could reduce the current technological asymmetry in favor of NATO. Such reduction would come from the use of electronic warfare systems to hamper the command and control capacity of attack and defense systems. This paper analyses the Russian intervention in Syria in order to define whether it can be understood that there is an increasing risk to Euro-Atlantic security stemming from Russian advances in electronic warfare.

A case study analysis of Russia's employment of Information Operations against Georgia during the 2008 war. Categories examined include Computer Network Operations, Electronic Warfare, Psychological Warfare, military deception, and... more

A case study analysis of Russia's employment of Information Operations against Georgia during the 2008 war. Categories examined include Computer Network Operations, Electronic Warfare, Psychological Warfare, military deception, and operational security. Authors: Kenneth Fermaint, Matthew D. Neff, and Daniel Barker

In November 2015, the Central Military Commission of the Communist Party of China announced reforms at the reform work conference. In January 2016, the Central Military Commission was gradually implemented, and the Second Artillery Corps... more

In November 2015, the Central Military Commission of the Communist Party of China announced reforms at the reform work conference. In January 2016, the Central Military Commission was gradually implemented, and the Second Artillery Corps was renamed the Rocket Army and a new strategic support force was established. With the release of the news, the reforms of the War Zone and the Military Commission have emerged, but the narrative of the "Strategic Support Force" is quite limited. The information released by the CCP revealed that the strategic support force is responsible for the unified management of intelligence, space, electric warfare, and

The first article of this four part series dwelt upon and clarified the terminologies, concepts and doctrines which would underpin the evolution of effective and viable IW structures for any armed forces. In this second article, the areas... more

The first article of this four part series dwelt upon and clarified the terminologies, concepts and doctrines which would underpin the evolution of effective and viable IW structures for any armed forces. In this second article, the areas of convergence as well as differences amongst CO, EW and Psy W components of IW are first brought out. Thereafter, some considerations which determine the manner in which these capabilities are operationally deployed in an integrated manner are discussed.

NATO defines Electronic Warfare (EW) as a military action that exploits electromagnetic energy, both actively and passively, to provide situational awareness and create offensive and defensive effects. Learn more in an Electronic Warfare... more

NATO defines Electronic Warfare (EW) as a military action that exploits electromagnetic energy, both actively and passively, to provide situational awareness and create offensive and defensive effects. Learn more in an Electronic Warfare Training course by Tonex.

The risks of military unmanned aerial vehicles (UAVs) being subjected to electronic attack are well recognised, especially following high-profile incidents such as the interception of unencrypted video feeds from UAVs in Iraq and Israel,... more

The risks of military unmanned aerial vehicles (UAVs) being subjected to electronic attack are well recognised, especially following high-profile incidents such as the interception of unencrypted video feeds from UAVs in Iraq and Israel, or the diversion and downing of a UAV in Iran. Protection of military UAV assets rightly focuses on defence against sophisticated cyber penetration or electronic attack, including data link intercepts and navigational spoofing. Offensive activity to counter adversary drone operations presumes a requirement for high-end electronic attack systems. However, combat operations in eastern Ukraine in 2014-16 have introduced an entirely new dimension to UAV and counter-UAV operations. In addition to drones with military-grade standards of electronic defence and encryption, a large number of civilian or amateur UAVs are in operation in the conflict. This presents both opportunities and challenges to future operations combating hybrid threats. Actual operations in eastern Ukraine, in combination with studies of potential criminal or terrorist use of UAV technologies, provide indicators for a range of aspects of UAV use in future conflict. However, apart from the direct link to military usage, UAVs are rapidly approaching ubiquity with a wide range of applications reaching from entertainment purposes to border patrol, surveillance, and research, which imposes an indirect security and safety threat. Issues associated with the unguarded use of drones by the general public range from potentially highly dangerous situations such as failing to avoid controlled airspace, to privacy violations. Specific questions include attribution of UAV activities to the individuals actually directing the drone; technical countermeasures against hacking, interception or electronic attack; and options for controlling and directing adversary UAVs. Lack of attribution and security measures protecting civilian UAVs against electronic attack, hacking or hijacking, with the consequent likelihood of unauthorised use or interception, greatly increases the complication of each of these concerns.

It is the increasing complexity of the modern warfighting arena which has prompted the replacement of the traditionally used term “battlefield” by the term “battlespace” in doctrinal literature, as the former tends to implicitly highlight... more

It is the increasing complexity of the modern warfighting arena which has prompted the replacement of the traditionally used term “battlefield” by the term “battlespace” in doctrinal literature, as the former tends to implicitly highlight the pre-dominance of land based operations over others, while “battlespace” as a term has a neutral flavour with respect to the nature of the arena. In recent years, several modern armies have adopted the five-dimensional model, comprising of the land, sea, air, space and cyberspace warfighting domains, in their military doctrines to define this battlespace. In this write-up this model, together with Cebrowski’s Domains of Conflict construct, is reviewed and analysed.

◊ Artificial intelligence (AI) since the early 2010s has witnessed a series of technical breakthroughs due to the increase in computing power, the amount of data generated and the application of machine learning techniques. ◊ Artificial... more

◊ Artificial intelligence (AI) since the early 2010s has
witnessed a series of technical breakthroughs due to
the increase in computing power, the amount of data
generated and the application of machine learning
techniques.
◊ Artificial intelligence will have major economic
impacts by increasing productivity worldwide.
However, many jobs, both blue- and white-collar
workers, are at risk of being automated. This implies
that important efforts in terms of education and
training will have to be undertaken to keep these
people on the job market.
◊ Artificial intelligence will also have major impacts on
international and national security. It will rebalance
the international balance of power, empower
individuals and shift the global strategic balance
towards those states that have a strong AI industrial
base and heavy investment, both public and private,
in AI research and development.
◊ The Arab Gulf countries will also be faced by the
economic and security implications of AI. It has the
potential to profoundly change the economic structure
of Gulf societies. Expats will be the hardest hit by
automation, but AI is also expected to profoundly
affect governmental jobs. This implies that Gulf
countries governments have to massively invest in
education to best prepare future generations for this
transformation. Continuing education programmes
also have to be put in place to provide national
workers with re- and upskilling opportunities.
◊ In terms of military and security consequences, selforganised
collective decision-making in swarms of
autonomous agents will likely become a defining
feature of future battlefields. The impact of swarming
strategies has the potential to upset the offensedefence
balance and impact strategic stability both
regionally and globally accordingly. It will also act
as a force multiplier for non-state actors that could
directly impact the Gulf countries’ military forces
operating in Middle Eastern theatres of operations.
◊ The cyber domain will be very conducive for the
development and engagement of fully autonomous
weapons as surrogates. Given the Gulf region’s past
record with regard to cyber-attacks, one cannot
exclude that AI will magnify instability in the region.
◊ The use of artificial intelligence for massive
manipulations through the forgery of images, films
or voices is already a reality. Its use by malicious
actors has the potential to magnify the tensions in
the Gulf region and increase its instability.
◊ The broadening of the scope of threats, vulnerabilities
and potential mis- and malicious uses of AI, but also
of other emerging technologies, calls for a rethinking
of global governance mechanisms so that they can
better deal with dual-use technologies.

La revuelta de los proeuropeos y nacionalistas en Kiev llamada Euromaidán desató la respuesta rusa, que occidente define como Guerra Hibrida. Sin embargo, el análisis de la secuencia de acciones y las herramientas puestas en juego hace... more

La revuelta de los proeuropeos y nacionalistas en Kiev llamada Euromaidán desató la respuesta rusa, que occidente define como Guerra Hibrida. Sin embargo, el análisis de la secuencia de acciones y las herramientas puestas en juego hace posible comprender la Estrategia de Moscú de manera holística sin extrapolar conocimientos. Los acontecimientos descriptos, además de concluir en la adhesión de Crimea y la creación de un foco de inestabilidad en el este de Ucrania dejan en claro que esta Guerra de Nueva Generación de Rusia es la forma más evolucionada de dirimir conflictos.

This paper presents an assessment of e-waste with respect to rate of generation, composition, risk and recycling potential. Data were extracted from published works and further analysed to provide insight into these aspects of e-waste... more

This paper presents an assessment of e-waste with respect to rate of generation, composition, risk and recycling potential. Data were extracted from published works and further analysed to provide insight into these aspects of e-waste management. Results showed that Nigeria has one of the highest per capita rate of e-waste generation (7kg/capita/year) as a result of heavy reliance on used electrical and electronic equipment as well as export of e-waste by developed countries. Television sets and personal computers constitute 55% of the total ewaste generated. Lead and copper present very high risk because of their wide application in printed circuit boards (PCB) which are used in virtually all electrical and electronic equipment and cathode ray tubes of television sets and personal computer monitors. Other metals found in e-waste include mercury, cadmium and arsenic have been implicated in severe health problems such as cancer, lung disease, renal failure and brain damage. This paper further revealed that the risk associated with improper disposal of e-waste can be reduced by recycling and re-use. E-waste from mobile phone alone has an economic potential of ₤186,000,000 or N89,000,000,000 which is equivalent to 4,886,550 barrels of crude oil. Gold component of mobile phone account for 68% of this potential revenue.

The US and NATO define Electronic Warfare as “a military action that exploits electromagnetic energy, both actively and passively, to provide situational awareness and create offensive and defensive effects.” The Alliance views EW... more

The US and NATO define Electronic Warfare as “a military action that exploits electromagnetic energy, both actively and passively, to provide situational awareness and create offensive and defensive effects.” The Alliance views EW operations in three categories: Electronic Attack (EA), Electronic Defense (ED) and Electronic Surveillance (ES).Information superiority is vital to modern war. He who controls the Electromagnetic Spectrum, wins the war. Until recently, the US and NATO have enjoyed information dominance. When that dominance is contested, as we have seen in operations in Syria, the surprise comes to us as a terrific shock. During the first two decades of the 21st Century, US and NATO military forces expected information dominance as a normal condition of combat and became complacent with regard to the invisible weapons of EW. The Russians are working tirelessly to create the possibility of employing EW as a vital combat multiplier.

Attaining and maintaining operations security remains the primary objective of armed forces on modern battlefields. Due to their flexibility in employment, conventional weapons are the true weapons of war and warfare, and in turn,... more

Attaining and maintaining operations security remains the primary objective of armed forces on modern battlefields. Due to their flexibility in employment, conventional weapons are the true weapons of war and warfare, and in turn, significantly affect the operational environment based on their offensive as well as defensive capabilities. South Asia being a nuclear flashpoint is still characterized by conventional weapons. This paper intends to investigate the traditional weapon modernization undertaken by India and the likely impact of systems such as the Russian-built T-90S Main Battle Tank and S-400 Missile System, French-built Rafale Omni-role aircraft, and the Indian Navy aircraft carrier INS Vikramaditya on the Armed Forces of Pakistan. The paper aspires to examine how and why these weapons and their acquisitions and deployments are likely to affect the operations security of both rival armed forces and recommend several conventional responses to enhance it, with special regard to Pakistan

The state of conflict is a natural state of affairs, either between the individuals or between sovereign states. In any kind of conflict, power matters. Just like the one with a weapon is more likely to prevail over the unarmed, the... more

The state of conflict is a natural state of affairs, either between the individuals or between sovereign states. In any kind of conflict, power matters. Just like the one with a weapon is more likely to prevail over the unarmed, the military superpower is more likely to destroy the military dwarf. However, it is not impossible for the inferiors to prevail. The history of military confrontations is not lacking the examples when the inherently inferior forces managed to achieve victory over the superior. This happened regardless of the fact that the handicap of power between adversaries was assessed as 5:1. In this regard, the aim of this dissertation is to understand the logics behind the unexpected losses of the military superpowers when confronted with the deficient powers. Such losses are scrutinized through the prism of the asymmetric wars. The latter envisages analysis of the existing theories which intend to explain frequently ambiguous outcomes of the asymmetric wars. This thesis also aims to examine the modern notion of warfare and connect it to the existing theories of asymmetric conflicts. In the end, a suggestion on the essence of contemporary asymmetric wars has been made. The overall victory is predefined by a series of spatial victories in social psychological confrontation, where the support of people becomes the strategic resource.