Accession Number:

ADA617481

Title:

Command and Control Vulnerabilities to Communications Jamming

Descriptive Note:

Journal article

Corporate Author:

NATIONAL DEFENSE UNIV FORT MCNAIR DC

Personal Author(s):

Report Date:

2013-01-01

Pagination or Media Count:

9.0

Abstract:

If the United States ever has to face a peer adversary in a no-holds-barred fight, we will encounter a serious operational obstacle. The way we command and control our forces is highly vulnerable to disastrous disruption. Modern operations have become dependent on high-capacity communications, and this vulnerability could cause our forces to sustain a serious mauling or, perhaps, not to prevail. Why is this The ability to provide the information required for successful high-impact low-committed asset warfare has developed an overwhelming reliance on unprotected communications satellites. There is an increasing public awareness of these vulnerabilities and the relative ease by which jamming can foil our methods of highly effective warfare. In this article, jamming is defined as electronically rendering a circuit or network unusable by disrupting it so it cannot be effectively used as a means of communication for purposes of command and control. Such an attack could be directed against any portion of the communications system and be of extended duration or else just long enough to lose crypto synchronization. Jamming is at the discretion of the enemy. It does not have to be constant or dependent on large fixed sites. It is often difficult to immediately distinguish jamming from other information flow disruptions caused by systemic disturbances such as cryptographic resets, system management changes, and natural phenomena.

Subject Categories:

  • Command, Control and Communications Systems

Distribution Statement:

APPROVED FOR PUBLIC RELEASE