Professional Documents
Culture Documents
FULL CONTENT EPM - Checked
FULL CONTENT EPM - Checked
INTRODUCTION
2. New technologies give commanders better options on how to employ that capability.
That is an inevitability and an absolute positive for the Army, with greater capabilities and
technologies empowering us to accomplish our goals. The force today is drastically different
from what it was 10 years ago. Advances in EW enable a commander to make decisions he
never had 50 years ago. In the past, a commander may have had no choice but to allow an
adversary to use a specific asset or to destroy that asset. EW gives that commander other
options, such as degrading or disabling an asset for a period of times.
RESTRICTED
RESTRICTED
transmitted on the same frequency with sufficient signal strength. Nevertheless, radio systems
offered the ability for naval forces to communicate with warships at sea.
5. The first recorded use of jamming occurred during the Russo-Japanese war (1904-05).
A Russian radio operator accidentally discovered the radio frequency used by Japanese artillery-
spotting ships, to pass adjust gun-aiming adjustments. By continually transmitting on this
frequency, the Russian effectively blocked out Japanese radio transmissions and the gunfire
repeatedly missed the targets.
6. The First World War also saw the introduction and impact of radio detection finding
(DF). The British Navy used coastal radio direction finders (deployed in 1914), to detect the
movement of German warships and submarines. This enabled the British to maintain an
effective naval blockade and to avoid the threat from German submarines.
2 Weapons and Systems Engineering Department, United States Naval Academy - Chapter 11, Countermeasure
<https://fas.org/man/dod-101/navy/docs/fun/part11.htm>
RESTRICTED
RESTRICTED
9. Many EPM features are incorporate in the radar design. Thus, EPM is mostly
concerned with the discussion of various radar design principles that have been developed on
the basis of various ECM threats which a particular radar system can possibly encounter.
Most of the EPM techniques are based on the characteristics of transmitted radar pulse, which
in turn, depends upon the radar parameters like power, frequency, PRF, pulse length, antenna
gain, antenna polarisation, antenna scan, receiver's probability of intercept, etc. Today, a wide
range of EPM techniques are employed and divide by three categories which are Spatial
EPM, Spectral EPM and Temporal EPM. Some of the important techniques, I will show in
the next sub topic below.
10. Scope. The scope of this paper work covers the EW threats nowadays and the best
EPM to be implement by signal corps in ensuring secured communications.
AIM
11. The aim of this research is to discuss about the EW threats and provide a solution and
an understanding on the EPM techniques that can be use by our Signal Corps in order to
encounter the national EW threats. (provide understanding then only propose a solution –
rearrange)
EW THREATS
12. Electronic warfare systems – whether on land or aboard ships and aircraft – tap the
electromagnetic spectrum to sense, protect, and communicate but, when necessary, these
same system can be turned against adversaries to deny their ability to disrupt or use radio,
infrared, or radar signals. Today’s EW systems tend to rely on databases of known threats
with predefined countermeasures, which can limit their ability to quickly adapt and respond
to new advanced threats. Soon, these systems may increasingly be task with isolating
unknown hostile radar signals within dense electromagnetic environments and responding
quickly with effective electronic countermeasures.
RESTRICTED
RESTRICTED
the civilian equivalent is the adversary. Adversary always take chances on the weakness of our
armed forces especially on the technology of our equipment and weapons. Malaysian Armed
Forces (MAF) now regards the defence of national interests as fundamental to its sovereignty
and independence. In line with that the principal objective of the National Defence policy is
the protection and defence of Malaysia’s interests and territories from domestic and external
threats.3
14. For 2019, the nation of Malaysia is rank 41 (of 137) out of the countries currently
considered for the annual Global Firepower review. Malaysia holds a Power Index rating of
0.6523 (0.0000 being perfect).4 Each nation is assess on individual and collective values.
Therefore, due to the review, MAF must have more efforts to make sure all the capabilities in
our defence security enhanced and well controlled. There are so many threats that we have to
overcome including terrorist threats, cyber security threats and electronic warfare threats. All
these threats have a devastating effect if not handled properly and there are no attempt to
prevent or overcome ourselves from becoming a target country.
15. Communications have always been the heart of command and control. On today's
highly sophisticated battlefield, the Army places even greater dependence on communications
and other battlefield electronic systems. The enemy knows that both sides to an extent not
known in the past will use Electronic Warfare (EW). How vulnerable we are to enemy EW
depends very much on the communicator.
3 MINDEF, Malaysia’s National Defence Policy, Official Portal Ministry of Defence, Malaysia, nd, viewed 5
June 2016, <http://www.mod.gov.my/phocadownload/DASAR-PERTAHANAN/ndp.pdf>
4 <https://www.globalfirepower.com/country-military-strength-detail.asp?country_id=malaysia>
RESTRICTED
RESTRICTED
17. Electronic Support Measures (ESM) are essentially the passive activity of listening to
an enemy's transmissions. ESM combined with firepower, jamming and deception can
provide a powerful means of attacking an enemy's command and control system. A COMINT
system as shown in Figure 1 would pose a considerable threat to friendly communication
systems.
18. ESM with its components of Search and Intercept, Monitoring, Direction Finding and
Analysis has the two-fold aim of acquiring operational or combat intelligence, and steerage
information for offensive EW. Communications Intelligence (COMINT) produces
intelligence of immediate tactical value such as orders of battle, the location and identity of
enemy HQs and units, movement information, indicators of enemy intentions and
information on enemy electronic and cryptographic systems. It gives a commander a long
range, 24 hour, surveillance capability. The ESM system requires a high accurate, high speed
and instantaneous controller to acquire updated information every moment.5 ESM thus
provides most of the information on which EW operations depend and as such is the
fundamental component of any EW system. Figure 2 shows a communication link and a
second link from the transmitter to an intercept receiver. Note that the transmit antenna gain
to the desired receiver and to the intercept receiver may be different.
RESTRICTED
RESTRICTED
19. The enemy uses Radio Electronic Combat (REC) measures to collect intelligence data
against our systems. This is what intercept provides. The enemy then decides what REC
would be appropriate from the data gained through intercept. The enemy will use selected
reconnaissance assets to detect and locate terminals, links, and relays. The enemy will
attempt to those communications, which he considers are priority targets. Figure 3 depicts the
enemy's REC cycle. The goal of REC is to disrupt friendly use of the electromagnetic
spectrum through destruction, deception, or jamming. The enemy will coordinate all three in
an attempt to deprive us of command and control.
20. The first thing that the enemy must do is intercept our radio signal. All they need to do
is a radio receiver that operates in the same mode and on the same frequency that you are
using to transmit. The mere fact that you are operating gives the enemy valuable information.
It tells him that you are in the area and by the number of stations operating on the same
frequency; he can estimate the size of the unit. If your net is operating in the clear, his
language specialists can understand exactly what is the communication is about for
even more information. When he analyses the traffic pattern, he can figure out which station
is the net control station (NCS) and identify the headquarters. By further traffic analysis, he
RESTRICTED
RESTRICTED
can determine changes in the level of activity that could mean a movement or upcoming
operation.
21. It is difficult for the enemy to fix on a satellite terminal. However, the radios used for
command and control are highly vulnerable to REC. Through an alert enemy signals
intelligence effort, it's risks disclosing our capabilities and operations. The enemy monitors
intercepted signals and performs traffic analysis to provide a variety of information, which
can be exploit, such as:
a. Supported CP identification.
b. Location of TACSAT terminals.
c. Tracking of unit movements.
d. Relative importance of TACSAT to command and control.
e. Weaknesses in our command and control systems--poor operating procedures,
poor COMSEC, lack of redundant or alternate systems, and overloaded networks.
6 M. Frater and M. Ryan, ‘Vulnerability of Digitized Platforms to Modern RF Electromagnetic Weapons’, SPIE
Aerosense 2000 conference, Orlando, 18–20 April 2001.
RESTRICTED
RESTRICTED
24. Threat forces employ a large number of RDF sets and communications intelligence
(COMINT) analysts to exploit friendly use of the electromagnetic spectrum. The enemy's
goal is to locate and destroy as many commands, fire support, special weapons, and
intelligence sites as possible during the first critical phase of the battle. He will continue to
locate and destroy whenever possible; and when he locates sites that he cannot or does not
want to destroy, these become his prime jamming targets. Jamming is an effective way to
RESTRICTED
RESTRICTED
disrupt control of the battle. All it takes is a transmitter, tuned to your frequency, with the
same type of modulation and with enough power output to override the signal at your
receiver.
Human Error
25. A failure on the part of the human to perform a prescribed act or task within specified
limits of accuracy, sequence, or time which could result in damage to equipment and property
and disruption of scheduled operations or have no consequences at all. Most of the human
errors occur because humans are capable of doing so many different things in many diverse
ways. Human error is commonly define as a failure of a planned action to achieve a desired
outcome.7 A human or radio operator error can be defined as an act or set of act which results
in communication interruption, communication failure and can cause the equipment failure
due to the carelessness from human. List below shows us a few of human error descriptions:
26. “You are your own worst enemy”. In EW that is true because the less we do to
protect our self, the more the enemy can hurt. The human error can be the most dangerous
threat that can be happen in both side of forces.
ELECTRONIC PROTECTIVE MEASURE (EPM)
27. In order to overcome the threats, a protective action must be taken so that the leaking
of information does not happen. Reliable radio communication links are essential for any
successful military operation protecting such communications is a very most important part
of modern warfare. The communications method used in a military environment must
guarantee secure command and control despite the use of electronic countermeasures (ECM)
by an enemy.
RESTRICTED
RESTRICTED
29. EPM involves Active and Passive action taken to protect personnel, facilities and
equipment from the effects of enemy or indeed friendly EW actions. They prevent the enemy
from gaining intelligence from friendly transmissions and safeguard C3 systems and active
sensor use.
One important way in which EPM differs from the other EW subdivisions is that all tactical
units should practise it, not just by specialist EW units.8 Unlike other aspects of EW, EPM is
directly associated with the tactical communications system. Its techniques relate to the
employment of the tactical communications system or to specific features of the equipment
that makes up the tactical communications system. To minimise an enemy’s opportunity for
successful ESM and ECM operations, the following measures are recommend to us:
30. The history of radio in the military is long and complex. Radio waves are used to
communicate and send important messages with orders, locations and critical information.
During wartime, these transmissions become especially important. During World War II,
coded transmissions sent over radio became increasingly sensitive as opposing forces worked
to intercept and decode the messages. The radio waves were the most reliable forms of
communication, and ceasing communication through radio was not an option. This led to
entire divisions dedicated to encrypting messages over the radio. Ultimately, members of the
Navajo Nation were deployed by the United States to speak in their native language. Japan
8 C ommunications Electronic Warfare and the D igitised Battlefield by Michael Frater and Michael
Ryan Oct 2001 p 19.
10
RESTRICTED
RESTRICTED
could not decrypt the language, and the language was a major factor in successful radio
communications during World War II.
31. Radio was not only important as a tool during the war for military use, it also served
as an outlet for communicating progress to the masses. Radio transmissions were used to
update listeners on military movements and battles. It also worked for propaganda and drove
unity in the war effort. It has since continued to play an important role in communicating, but
the channels have turned into more segmented, opinion-based programming.
32. In the early decades of radio, governments either seized exclusive control over
broadcasting or acquired control of the spectrum through licensing of stations and users of
shortwave. Controls over broadcasting have become such a familiar feature of daily life that
they are seldom question. Yet a different scenario can be imagine, in which the goal was
empowering a multitude of grassroots voices, with accountability to communities rather than
governments, station owners and advertisers. Imagining an alternative evolution of radio, as a
technology for peace, can alert us to the importance of shaping and using today’s
technologies for peace rather than war.
33. Modern militaries rely on communications equipment that uses broad portions of the
spectrum to conduct military operations. This allows forces to talk, transmit data, provide
navigation and timing information, and to command and control forces all over the world. They
also rely on this to know where adversaries are, what adversaries are doing, where friendly
forces are, and what effects weapons achieve. As a result, modern militaries attempt to dominate
the spectrum through electronic warfare.9
34. The second major military use of radiated electromagnetic energy is communications
sending of messages from one element of force to another. The radio communication bands
that are most commonly used by the military are - HF band (3-30 MHz), VHF band (112-135
MHz) and UHF band (225-400 MHz). The relationship of electronic warfare to
communications is more complex than to other uses of electromagnetic radiations, because
both the presence of message and its contents are required to be protected during its
11
RESTRICTED
RESTRICTED
transmission until it reaches its intended user. Determining the presence of enemy message is
the goal of Communication Intelligence (COMINT), whereas providing protection to the
contents of message during transmission is the goal of Communication Security (COMSEC).
Communication Security again has two parts.
35. The first is Operating Methods, which deny the enemy access to the friendly messages
and friendly communication channels, and the second is Cryptologic Methods, which deny-
the understanding of the contents of friendly messages to the enemy even if he does get
possession of them. The Operating Methods are mainly concerned with common sense. For
example, if the location of a particular aircraft in flight must be conceal then 'radio silence' is
impose. Normally, 'call signs' (to conceal the identity of the stations), frequency changes and
operating time changes (to conceal the identity of operations), passwords or authentication (to
maintain the genuineness or identities of the sender and receiver), etc. are used for
communication security.
36. There are also a number of cryptologic methods or encryption techniques to conceal
the contents of the message from the enemy, even if he does get hold of them. To counter an
ECM, in the order of priority or requirement, the communications EPM equipment must
adopt the following four doctrines or guidelines:
a. First priority. Prevent the transmissions from being observe by the enemy at
all imperceptibility (also referred to as low probability of intercept, LPI).
b. Second priority. Minimise the possibility of extracting intelligence from such
transmissions as may be detect - inscrutability.
c. Third priority. Maximise the chance of survival of the communications
facility against the threat of physical attack-physical invulnerability.
d. Fourth priority. Maximise the chance of survival of communications facility
against jamming--electromagnetic invulnerability.
37. There are a number of EPM communication techniques to meet the above-mentioned
priorities or requirements. Some of the important ones are mention here.
12
RESTRICTED
RESTRICTED
protects the message only for relatively short intervals, it is of great value in a tactical
environment.
c. Frequency Hoppers. Slow and fast frequency hoppers are the current EPM
'fashion goods'. They are relatively invulnerable to standoff jamming, are less
detectable and possess low probability of intercept, but they are vulnerable to modern
direction finders.
13
RESTRICTED
RESTRICTED
Electromagnetic (EM) attack can be a disaster, but steerable notch filters can combat
EM attack by line spectra.
k. Meteor Scatter. This technique uses the ionised gas trail produced by very
small meteors entering the atmosphere to reflect VHF transmissions. Such long range
transmissions (say 1000 km and above) are difficult to jam or intercept.
l. Source Coding. Digital source coding, which involves irregular 'burst' data
transmissions of short duration but relatively high data rate provides low probability
of intercept. The battle of electronic warfare-EPM against ECM-thus continues and
every day, new and more sophisticated technology is being called into use. The
management and integration of large amount of data, increasingly of disparate origin
and type, will be one of the major challenges for battlefield communications in the
1990s and beyond. The battle of electronic warfare-EPM against ECM-thus continues
and every day, new and more sophisticated technology is being called into use. The
management and integration of large amount of data, increasingly of disparate origin
and type, will be one of the major challenges for battlefield communications in the
1990s and beyond.
14
RESTRICTED
RESTRICTED
requirements must be met by the use of generators, and high-gain antennas must be deployed
on guyed masts to provide reasonable ranges. This variation in requirements has led to the
traditional (and ongoing) subdivision of the tactical communications system into combat net
radio (CNR and trunk subsystems.
39. In my research, I will focused the EPM techniques due to Malaysian Armed Forces
asset in communication. However, I will still tell in general about all the EPM techniques so
that everyone aware about the important of EPM in EW threats. According to Sapura Thales
Electronics presentation, our CNR 10 is the latest types of radio FastNet that supplied and
used by Malaysian Armed Forces. The security system that embedded inside the radio is as
Figure 6 below:
15
RESTRICTED
RESTRICTED
16
RESTRICTED
RESTRICTED
c. Crypto Security. Crypto security deals with codes, key lists, and
communications security devices. This is the third line of defence for the radio
operator. The need for emission control and transmission security still exists--
probably more because, if the enemy cannot get information, he might attempt to
destroy or jam our station. In addition, it is very important for all radio
operators to use only authorized codes and to realize that using homemade codes is
dangerous. Homemade codes offer no protection at all. Their use is not authorize and
it is a serious violation of security. If critical information must be transmit, it should
be encrypt or sent by secure means.
17
RESTRICTED
RESTRICTED
d. Physical Security. Physical security is the fourth line of defence for the radio
operator. Physical security means using common sense measures to protect your
radio and related material, such as CEOIs and key lists, from unauthorized use and
abuse. A radio is an important item of equipment and only well-trained and fully
briefed personnel should use it.
41. (MUST RECOMMEND THE BEST EPM TECHNIQUES FROM WHAT HAVE
BEEN DISCUSSED EARLIER, IF ALL, RECOMMEND ALL WHICH MUST BE
SUPPORTED WITH IMPORTANT SKILLS TO BE ACQUIRED BY ALL
COMMUNICATORS AS FOLLOWS: )
18
RESTRICTED
RESTRICTED
Listening
Microphone Techniques
42. Even something as simple as using your microphone correctly can make a big
difference in intelligibility. For optimum performance, hold the mic close to your cheek, and
just off to the side of your mouth. Talk across, rather than into, the microphone. This will
reduce breath noises and “popping” sounds that can mask your speech.
43. Speak in a normal, clear, calm voice. Raising your voice or shouting can result in
over-modulation and distortion, and you will not be heard any louder at the receiving end.
Speak at a normal pace. Rushing your words can result in slurred and unintelligible speech.
Pronounce words carefully, making sure to enunciate each syllable and sound. The golden
rule in emergency situations is “the worse it gets, the more you have to slow down and stay
calm!”
Transmitting a Message
44. Speak slowly when transmitting a message. Remember, the radio operator receiving
your message must write it down on a Message Handling Form so that it can be delivered to
the intended recipient. Most of us talk much faster than a receiving operator can write.
Consequently, the receiving operator will have to ask you to repeat portions of the message
that he did not get. He may repeatedly ask you to repeat section after section as he
laboriously tries to copy down your message. This common problem wastes enormous
amounts of net time, preventing others from getting their messages transmitted.
45. Each communication should consist of only the information necessary to get the
message across clearly and accurately. Extraneous information can distract the recipient and
lead to misinterpretation and confusion. If you are the message author and can leave a word
out without changing the meaning of a message, leave it out. Avoid using contractions within
19
RESTRICTED
RESTRICTED
your messages. Words like “don’t” and “isn’t” are easily confused. If someone else has
drafted the message, work with the author to make it more concise.
46. Be sure to say exactly what you mean. Use specific words to ensure that your precise
meaning is conveyed. Do not say, “that place we were talking about’” when “Libbey Park” is
what you mean. Using non-specific language can lead to misunderstandings and confusion.
Plain Language
47. As hams, try to use a great deal of “jargon” (technical slang) and specialized
terminology in your daily conversations. Most of us understand each other when we do, and
if we do not on occasion it usually makes little difference. In an emergency, however, the
results can be much different. A misunderstood message could interrupt our mission.
Phonetics
48. Certain words in a message may not be immediately understood. This might be the
case with an unusual place, such as “Franconia” or an unusual last name, like “Smythe.” The
best way to be sure it is understood correctly is to spell it. The trouble is, if you just spell the
word using letters, it might still be misunderstood, since many letters sound alike. “Z” and
“C” are two good examples. For that reason, radio communicators often use “phonetics.”
These are specific words that begin with the letter being sent. For instance, “ARRL” might
be spoken as “alpha romeo romeo lima.”
49. Tactical call signs identify the station’s location or its purpose during an event,
regardless of who is operating the station. This is an important concept. The tactical call sign
allows you to contact a station without knowing our friend call sign of the operator. It
virtually eliminates confusion at shift changes or at stations with multiple operators.
20
RESTRICTED
RESTRICTED
CONCLUSION
51. As a conclusion, radio is also one of the equipment that belongs to EPM. Accurate
and thorough use of radio can have a great impact on the success of an operation where
accurate and effective messages can be deliver perfectly. As a radio communicator, they
should know the important factors in raising their awareness when using radio so that the
enemy should not intercept the conversation or message to be deliver.
52. The enduring lesson from recent conflicts since the Gulf War is that what can be seen
can be hit, and what can be hit can be killed. The function of ‘seeing’ is now much more
sophisticated and entails electronic, optical and acoustic sensors that can have up to global
coverage. These sensors can be linked in real time to computer-controlled weapon systems
with unparalleled accuracy and lethality. However, such qualities are not enough. The
decisive advantage on the modern battlefield will go to the commander who can gather and
exploit information most effectively.
53. While this is greatly assist by the technologies associated with the information
revolution, the human element is arguably the most significant. As a result of the information
revolution, future commanders can have unparalleled information available to them; they will
be able to ‘see’ the full extent of the battlefield even if it spans the globe. Commanders will
not have it all their own way, however. Future command-and-control systems will be heavily
reliant on communications and information systems that cannot operate if access to the
electromagnetic spectrum is denied. So, while the information revolution promises to deliver
an enormous improvement in capability to commanders, it also creates the potential for new
vulnerabilities. These new vulnerabilities offer new opportunities for the application of
electronic warfare on the digitised battlefield. Greater investment is therefore required in
offensive and defensive EW equipment, personnel and training.
21
RESTRICTED
RESTRICTED
54. As armies expend large sums of money seeking to attain the advantages of
digitisation, consideration must be given to the flipside of the information revolution—the
increased role of electronic warfare on the modern digitised battlefield. Arguably, for every
ringgit that is spend on battlefield communications and information systems, few ringgit
should be spend on the EW capabilities required to protect these systems and to target an
adversary’s systems.
22
RESTRICTED