54
Reconnaissance and Surveillance Leader Course Electronic Warfare THE THREAT THE THREAT “Subjugating the enemy's army without fighting is the true pinnacle of excellence” -Sun Tsu, The Art of WAR

Electronic Warfare THE THREAT

Embed Size (px)

DESCRIPTION

During the 7 day Yom Kippur War in 1973, Egyptian and Syrian forces, using Soviet EW equipment and doctrine, located and destroyed Israeli command and control centers within 10 to 15 minutes. The loss of command and control, in the early stages of the conflict, added significantly to the confusion on the battlefields, and was responsible for early Egyptian and Syrian gains. Also, during the conflict, over 1700 tanks were destroyed on both sides due to electronic capabilities.

Citation preview

Page 1: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

Electronic Warfare

THE THREATTHE THREAT

“Subjugating the enemy's army without fighting is the true pinnacle of excellence”

-Sun Tsu, The Art of WAR

Page 2: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

During the 7 day Yom Kippur War in 1973, Egyptian and Syrian forces, using Soviet EW equipment and doctrine, located and destroyed Israeli command and control centers within 10 to 15 minutes. The loss of command and control, in the early stages of the conflict, added significantly to the confusion on the battlefields, and was responsible for early Egyptian and Syrian gains. Also, during the conflict, over 1700 tanks were destroyed on both sides due to electronic capabilities.

Page 3: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

Terminal Learning Objective

Action: Identify the LRS Communications Procedures

Condition: Denied the use of references

Standard: Answer 35 questions correctly out of 50 question multiple choice exam

Page 4: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

During this period of instruction, you will be introduced to electronic warfare and how it pertains to High Frequency communications. The information you learn today will help you be successful in you LRS mission.

Electronic Warfare

Page 5: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

Administrative

Safety: In an emergency, please exit through the exit doors and get a headcount outside in the parking lot

RiskAssessment: Low

EnvironmentalConsiderations: If you brought it in, take it with you!Note: Do not be afraid to ask questions or

participate in discussion, just raise your hand before speaking.

Page 6: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

Evaluation

• You will be evaluated on this subject on Friday and during the STX/FTX

• You will be given a 50 question test

• You must correctly answer 35 out of 50 to receive a go

Page 7: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

Enabling Learning Objective A

Action: Identify the categories of Electronic Warfare

Condition: Denied the use of references

Standard: Answer 35 questions correctly out of 50 question multiple choice exam

Page 8: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

Electronic Warfare

Q: What do you think some of the Israel’s communications shortcomings were?

Improper Use Of The SOI

Excessive Use Of Radios

Improper Use Of Antennas

Improper Power Output

Page 9: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

Electromagnetic Spectrum

The range of frequencies of electromagneticRadiation from zero to infinity

Electronic Warfare

Page 10: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

To attack the enemy by using any military action which involves the use of electromagnetic and directed energy to control the electromagnetic spectrum

Electronic Warfare

Page 11: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

Major Subdivisions Of EW

Electronic Warfare

Electronic Warfare Support (ES)

Electronic Attack (EA)

Electronic Protection (EP)

Page 12: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

These are the most recent update to the old subdivisions:

OLD NEW

ESM ES

ECM EA

ECCM EP

Electronic Warfare

Page 13: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

Electronic Warfare Support (ES)

Provides information required for decisions involvingEW operations and other tactical actions such as:

O Threat AvoidanceO TargetingO Homing

ES data can be used to produce:

O Signals Intelligence (SIGINT)O Communications Intelligence (COMINT)O Electronic Intelligence (ELINT)

Page 14: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

Electronic Warfare Support(ES)

InterceptionO Tells The Enemy You Are In The Area

O Number Of Stations Tell Enemy Size Of Unit

O Can Determine The NCS

O Detect Movement Or Upcoming Operation

O Unencrypted Messages Can Tell The EnemyEverything About Your Unit

Page 15: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

Electronic Warfare Support(ES)

RADIO DIRECTION FINDER (RDF)

RDF Operator Needs Three Bearings ToPinpoint Your Location:

1. Direction

2. Distance

3. General Location

LRS

Page 16: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

Electronic Warfare Support(ES)

Communications Analyst

• Consolidates Info Obtained By Intercept

• Breaks Codes

• Analyzes Information

Page 17: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

Electronic Warfare Support(ES)

Communications Site Commander

• CHOOSES ONE OF THREE OPTIONS:

1. Get More Information

2. Have Radio Site Destroyed

3. Implement Electronic Attack

Page 18: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

Electronic Attack (EA)

Actions taken to reduce or prevent effective use of the electromagnetic spectrum to include:

• Electronic Jamming

• Electronic Deception

Page 19: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

Electronic Attack(EA)

1. Spot Jamming

2. Sweep Jamming

3. Barrage Jamming

Q: Who can tell us what the three types of jamming are, and the difference between the three?

Jamming on one freq

Move up and down the spectrum

Portion or entire spectrum

Page 20: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

Electronic Attack(EA)

Types Of Electronic Deception

O Meaconing: Insertion Of False Nav SignalsIn Order To To Confuse Aircraft And Ships

O Intrusion: The Intentional Insertion OfFalse Transmissions In Order To Deceive OrConfuse Friendly Operations

Page 21: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

Electromagnetic Interference

ANY UNWANTED RADIATION OF ELECTRICALENERGY RECEIVED ON YOUR FREQUENCY OR

FREQUENCY SPECTRUM

Page 22: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

Electromagnetic Interference

Two Categories Of EMI:

O Natural

O Man-made

Page 23: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

Electromagnetic Interference

Purpose Of Enemy EMI

O Irritate You

O Confuse You

O Completely Disrupt Or Stop Your Operation

Page 24: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

Effects Of EMI

O Blocks Part Or All Communications

O May Make Operators Tired And Careless

O May Force Operators To Use AlternateProcedures, Slowing Communications

Electromagnetic Interference

Page 25: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

Electronic Protection (EP)

• Actions Taken To Retain The Use Of The Electromagnetic Spectrum

• Our Only Defense Against EA

Page 26: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

Electronic Protection(EP)

EP MethodsO Put Distance And Terrain Between You And Enemy

O Use Directional Antennas

O Remote Radios

O Implement Proper RTO Procedures

O Move More Frequently

O When Secure, Stay Secure

Page 27: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

O Our Only Defense Against EA

O Recognize

O Identify

Electronic Protection(EP)

Page 28: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

Recognize The Source

O Disconnect Antenna From Radio

O Internal If Noise Continues

O External If Noise Ceases Or GetsConsiderably Weaker

Electronic Protection(EP)

Page 29: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

Identification

O Friendly: Interference From Self Or Allied Forces

O Enemy: Jamming Or Deception

Electronic Protection(EP)

Page 30: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

ProceduresO Remain Calm

O Continue To Operate On Same Frequency

O Fine Tune Radio

O Utilize Proper RTO Procedures

O Increase Power

O Reorient Or Change Antenna

O Speak Slower And Shorten Transmissions

Electronic Protection(EP)

Page 31: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

MIJI-1 REPORT

• Item 1 - Type Of Report (MIJI-1)

• Item 2 - Type Of Incident (Meaconing, Intrusion, Etc)

• Item 3 - Type Of Equipment Affected (Radio,radar, Etc)

• Item 4 - Frequency Affected

• Item 5 - Affected Station’s Call Sign

• Item 6 - Affected Station’s Coordinates (Encrypted)

Electronic Protection(EP)

Page 32: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

MESSAGE FORMATS

Page 33: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

Enabling Learning Objective B

Action: Identify the 6 LRS Message Formats

Condition: Denied the use of references

Standard: Answer 35 questions correctly out of 50 question multiple choice exam

Page 34: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

10DE11 MSG01 ANGUS SOUPY AAA GL123456 BBB RTO

BROKE RIGHT LEG MEDEVAC REQUIRED CCC CACHE

RECOVERED ACK EOM RKB

ADDRESS MSG NUMBER PROWORD DURESS MSG BODY

ACKNOWLEDGMENT REQUESTED END OF MSG CODENAME

RSLC MESSAGE FORMAT SOP

Page 35: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

INITIAL ENTRY REPORT

ANGUS

• SUBMITTED TO BASE STATION AFTER INSERTION AS PER UNIT SOP (USUALLY WITHIN 4 HOURS)

• REFLECTS TO THE BASE STATION THE SUCCESS OF INSERTION

• STATUS OF TEAM AND TEAM’S INITIAL SITUATION

Page 36: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

ANGUS Initial Entry Report Format

AAA- LOCATION TO THE NEAREST 1000 METERS

BBB- CASUALTIES AND THEIR STATUS

CCC- ANY ADDITIONAL INFORMATION

10DE11 MSG01 ANGUS ***** AAA GL1234 BBB RTO BROKE RIGHT LEG MEDEVAC REQUIRED CCC CACHE RECOVEREDACK EOM RKB

IF THERE IS NO INFO FOR A PARTICULAR LINE, OMITTHAT LINE

Page 37: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

BORIS

• SPOT INTELLIGENCE REPORT

• USED TO SEND SOR TO BASE STATION

• SENT IN THE SALUTER FORMAT

• SENT IMMEDIATELY UPON OBSERVING SOR

SALUTER Report

Page 38: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

BORIS REPORT FORMATAAA- SIZE

BBB- ACTIVITY

CCC- LOCATION

DDD- UNIT/TYPE

EEE- DATE TIME GROUP

FFF- EQUIPMENT

GGG- REMARKS

SALUTER Report

Page 39: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

BORIS REPORT FORMAT

10DE11 MSG02 BORIS ***** AAA 10 SOLDIERS, 3 VECH,

1 TRAILER, 1 ARTY BBB MOVING W THRU NAI 3 35 MPH

ARTY CENTER CCC GL12345678 DDD UNK/ARTY

EEE 250800FEB03 FFF 3 BDRM2, 1 D30, 4 AK47, 4 US LBE,

DCU’S, 4 HELMETS GGG TRAILER HALF FULL W/AMMO

BOXES, HELMETS HAVE BLUE CENTER FRONT ACK

EOM RKB

SALUTER Report

Page 40: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

SIZE: -NUMBER OF PERSONNEL

-NUMBER OF VEHICLES-NUMBER OF A/C-NUMBER OF ARTY PIECES-NUMBER OF ADA PIECES

ACTIVITY:-ATTACKING (DISTRIBUTION/DIRECTION)-DEFENDING (DISTRIBUTION)-MOVING (DIRECTION/SPEED/DISTRIBUTION)-STATIONARY (DISTRIBUTION/ACTIVITY)

SALUTER Report

Page 41: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

LOCATION:-AT LEAST AN EIGHT DIGIT GRID-MAIN REFERENCE POINT (CITY, ROAD

-INTERSECTION, ETC)

UNIT/TYPE:-TYPE (IN, AR, ADA, RECON, EN, ARTY, NAVY, AF ETC)-ORIGIN (SPECIFIC UNIT IF KNOWN)

TIME:-DTG USING SPECIFIED TIME ZONE

SALUTER Report

Page 42: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

EQUIPMENT:-VEHICLES (ID)-AIRCRAFT (ID)-ARTILLERY (ID)-AIR DEFENSE ARTILLERY (ID)-SMALL ARMS (ID)

REMARKS (MORALE, SPECIFICS, UNIT UPDATE)

A GOOD SALUTER REPORT IS ACCURATE, DETAILED,TIMELY AND UNDERSTANDABLE!

SALUTER Report

Page 43: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

CYRIL

• SUBMITTED TO THE BASE STATION ON A SCHEDULE APPROVED BY THE COMMANDER (WINDOWS)

• USED TO REPORT ALL OTHER INFORMATION

SITREP Report

Page 44: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

CYRIL REPORT FORMAT

AAA- LOCATION TO THE NEAREST 100 METERS IF DIFFERENT FROM ORIGINALREPORT

BBB- ACTIVITY

CCC- ANY ADDITIONAL INFO

10DE11 MSG03 CYRIL ***** AAA GL123456 BBB INCREASED CONVOY TRAFFIC CCC LOW ON RATIONS ACK EOM RKB

MESSAGE FORMATS

Page 45: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

UNDER AAA- TYPE OF CACHE (CONCEALMENT, BURIAL, SUBMERSION)

BBB- CONTENTS (ID TYPE & AMOUNT OF ITEMS IN CACHE)

CCC- NUMBER OF CONTAINERS

DDD-REFERENCE POINT

EEE-LOCATION (AZIMUTH & DISTANCE FROM REFERENCE POINT WITH DETAILED DESCRIPTION IF NECESSARY)

FFF-DEPTH CACHE IS PLACED

GGG-ANY ADDITIONAL INFORMATION

CACHE Report

Page 46: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

UNDER REPORT

10DE11 MSG04 UNDER ***** AA BURIAL BB 6 MRE’S,2 GAL H2O CC 2 DD BM433 EE 240 DEG FOR 250 METERSUNDER AN ABANDONED TREE STAND W/SQUARE ORANGE MARKER FF 2 FT ACK EOM RKB

MESSAGE FORMATS

Page 47: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

CRACK

o USED TO REPORT BDA

o TEAMS ASSESS BATLE DAMAGE AND REPORT TO OPERATIONS BASE

MESSAGE FORMATS

Page 48: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

CRACK REPORT FORMATAAA -DTG OF DETONATION

BBB- LOCATION (6 DIGIT) OR TARGET NUMBER

CCC- TARGET DESCRIPTION AND DAMAGE

DDD- CONFIRMED, PROBABLE, POSSIBLE

EEE- ADDITIONAL INFO

BDA Report

Page 49: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

CRACK REPORT

10DE11 MSG05 CRACK *** AAA 071200FEB03 BBB GL123456

CCC 1 T-72 DESTROYED (CATASTROPHIC) 1 BTR-60

DAMAGED (MOBILITY KILL) 15 TROOPS KILLED DDD

CONFIRMED EEE. ENEMY WITHDRAWING, TEAM MOVING TO

EXTRACTION POINT ACK EOM RKB

MESSAGE FORMATS

Page 50: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

CLEAR

MISCELLANEOUS MESSAGE

USED TO SEND MESSAGES THAT DO NOT FIT INTO THE OTHER FORMATS (ACKNOWLEDGMENTS,

REQUEST FOR INFORMATION, ETC)

Remarks Report

Page 51: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

CLEAR REPORT FORMAT

AAA- REMARKS

Remarks Report

10DE11 MSG06 CLEAR ***** AAA MSG08 RECEIVED EOM RKB

Page 52: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

Review

Q: How many sub-categories fall under EW?

Q: What are the two types of EMI?

Electronic Warfare Support (ES)

Electronic Attack (EA)

Electronic Attack (EA)

Natural

Man Made

Page 53: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

Q: What are the basic message formats that LRSU’s utilize?

Q: When would you submit an ANGUS report?

ANGUS

BORIS

CYRIL

UNDER

Initial entry report-submitted after Insertion

Review

CLEAR

CRACK

Page 54: Electronic Warfare THE THREAT

Reconnaissance and Surveillance Leader Course

Q: What format does the BORIS report use?

Review

Sent In The SALUTER Format