ELSO (elektroninen sodankäynti) radiotaajuuksilla: radiotiedustelu, taajuushäirintä, EMP etc

vlad

Ylipäällikkö
Lahjoittaja
Laitetaan jakoon Roger N McDermott'in:

"Russia’s Evolving Electronic Warfare Capability: Unlocking Asymmetric Potential

Since first initiating the reforms of the Russian Armed Forces in the fall of 2008, Moscow has developed a number of complimentary niche capabilities..."

https://www.icds.ee/blog/article/ru...re-capability-unlocking-asymmetric-potential/

Johon Verkkouutiset tarttui lyhyelti:

"Venäjän asevoimissa on toteutettu syksyllä 2008 käydyn Georgian sodan kokemusten pohjalta mittavia uudistuksia. Runsaasti huomiota on kiinnitetty muun muassa tiedustelu-, valvonta ja johtamisjärjestelmien kehittämiseen ja yhteensovittamiseen.

Lännessä ei ole jäänyt havaitsematta, että merkittävään rooliin niiden rinnalla on noussut myös elektronisen sodankäynnin (ELSO) valmiuksien kehittäminen
...".

https://www.verkkouutiset.fi/venaja-satsaa-yha-enemman-elektroniseen-sodankayntiin/
 

Talvela

Ylipäällikkö
Laitetaan jakoon Roger N McDermott'in:

"Russia’s Evolving Electronic Warfare Capability: Unlocking Asymmetric Potential

Since first initiating the reforms of the Russian Armed Forces in the fall of 2008, Moscow has developed a number of complimentary niche capabilities..."

https://www.icds.ee/blog/article/ru...re-capability-unlocking-asymmetric-potential/

Johon Verkkouutiset tarttui lyhyelti:

"Venäjän asevoimissa on toteutettu syksyllä 2008 käydyn Georgian sodan kokemusten pohjalta mittavia uudistuksia. Runsaasti huomiota on kiinnitetty muun muassa tiedustelu-, valvonta ja johtamisjärjestelmien kehittämiseen ja yhteensovittamiseen.

Lännessä ei ole jäänyt havaitsematta, että merkittävään rooliin niiden rinnalla on noussut myös elektronisen sodankäynnin (ELSO) valmiuksien kehittäminen...".

https://www.verkkouutiset.fi/venaja-satsaa-yha-enemman-elektroniseen-sodankayntiin/
Tuo voimakas uuden puolustushaaran perustamisen ajaminen ja roolin kasvattaminen kertoo siitä strategisesta ja operatiivisesta roolista mikä nykyisellä aselajilla nähdään.
Venäläisen sotatieteen teoreetikoissa on kyllä historiallisesti ollut ihan suuriakin ajattelijoita ja eivät ne nytkään ainakaan teorian tasolla taida olla ELSO:ssa jäljessä.
Kiinasta on myös mahdollista hankkia komponentteja ja tehdä muuta materiaalista yhteistyötä.
 
Swedut härnäämässä Venäläisiä:
Ruotsi ottaa roolia Syyrian lähialueella – Nuuskinut Välimerellä venäläisten signaaleita tiedustelukoneellaan jo viisi päivää
https://yle.fi/uutiset/3-10192890
 
Sardaukar- kirjoitti Harvinaisia ja erikoisia sotakuvia -viestiketjussa näin:
Tuo japanilainen on Hiroshii Ito (muistaakseni). Tiedustelumies (ja niin nuo pääesikunnan heput). Koordinoi Suomen radiotiedustelun ja Japanin yhteistoimintaa.


Mieleeni tuli, että onkohan nyky Suomella ja Japanilla yhteistä tiedustelutietojen vaihtoa? Kummankin naapurina kun on Venäjä. Saattaisi olla etenkin Venäjän meri- ja ilmavoimiin liittyvää tiedustelutietoa jota voisi vaihdella puolin ja toisin.
 

ctg

Ylipäällikkö
The U.S. Army’s new electronic warfare capability, developed by the service’s Rapid Capabilities Office, was challenged in a recent Eastern European exercise.

The 2nd Cavalry Regiment conducted an active electronic attack — or jamming — within a European country for the first time since the Cold War this month during Saber Strike in Latvia, Lithuania, Estonia and Poland. The event shows the Army is making headway on refining a rapid electronic warfare capability it put into the field in Europe just one year ago.

The Army’s RCO — which was officially created in August 2016 — is designed to hone in on the service’s largest requirements with the intent to deliver capabilities within a one- to five-year horizon.

At its launch, the RCO prioritized electronic warfare; position, navigation and timing; and cyber that were neglected in the counterinsurgency operations of the past 15 years. Now that the Army anticipates battling more near-peer adversaries in contested environments, it is refocusing on ensuring its capability overmatch against those possible enemies.

The RCO developed an electronic warfare prototype and sent it to Europe to help soldiers view the EW picture in the spring of 2017, which was then tested out in the Army’s major exercise Saber Guardian in Romania, Bulgaria and Hungary in July. Subsequent versions were sent over in in the summer and fall of last year.

The EW system was also extensively tested at Fort Bliss, Texas, last summer.
https://www.c4isrnet.com/land/2018/...ties-challenged-in-eastern-european-exercise/
 

ctg

Ylipäällikkö


Soldiers from the Army's 1st Infantry Division recently got the chance to attack another unit with the service's first electronic warfare (EW) prototype equipment during a force-on-force exercise at the National Training Center at Fort Irwin, California.

The 1st ID's 1st Brigade Combat Team at Fort Riley, Kansas, is the first stateside unit to receive the same EW prototypes that went to forward-based units in Europe in February.

After receiving the assortment of electronic sensing and jamming equipment in March, the unit's electronic warfare officers put it into action as part of the opposing force at NTC, "locating the 'blue' or friendly forces on the battlefield, passing that information to the OPFOR commander and even applying some jamming effects against the friendly forces," according to a recent Army press release.

"This was our initial test of the equipment away from home station in a realistic operational environment," Sgt. 1st Class Gregory Robinson, electronic warfare non-commissioned officer in charge with the 1st BCT, said in the release. "When our brigade goes to the NTC later this year, we'll be able to integrate the equipment within our organic brigade, using the equipment in the same environment, but this time against the OPFOR."
https://www.military.com/defensetec...foes-training-new-electronic-warfare-kit.html

"Recognizing this is a prototype system, it is still a step in the right direction," Warrant Officer 1 Christopher Mizer, an electronic warfare technician with the 1st BCT at Riley, said in the release.

"We haven't had a system within the electronic warfare community that looks at the electromagnetic spectrum and forces soldiers to think through what they are seeing, how that affects their commander's mission, and how they can affect the spectrum to enable the commander," he added.

The EW systems are helping the soldiers at Riley and in Europe learn how to fight with this type of technology on the battlefield, the release states.

"If we did nothing electronic warfare-wise until we actually field a program of record EW system, we would be significantly farther behind," Mizer said in the release. "We wouldn't know how to integrate them, operate them, maintain them or fight those systems when we get them.

"This is really informing that process. It's forcing our EW soldiers to look at the intellectual problem of determining how you fight an EW system. That's something the Army hasn't really done in almost three decades," he added.
 

ctg

Ylipäällikkö

Academics say they've mounted a successful GPS spoofing attack against road navigation systems that can trick humans into driving to incorrect locations.

The research is of note because previous GPS spoofing attacks have been unable to trick humans, who, in past experiments, often received malicious driving instructions that didn't make sense or were not in sync with the road infrastructure —for example taking a left on a straight highway.

But a research team formed from academics from Virginia Tech and the University of Electronic Science and Technology of China, along with experts from Microsoft Research, have come with an improved method of carrying out GPS spoofing attacks that take into account the road layout.

To perform the attack researchers developed an algorithm that works in near real-time, along with a portable GPS-spoofing device that costs about $223, which can be easily attached to a car or put on a vehicle tailing the target's car at distances of up to 50 meters.
https://www.bleepingcomputer.com/ne...ofing-attack-against-road-navigation-systems/

"38 out of 40 participants (95%) follow the navigation to all the wrong destinations," researchers explained in a paper titled "All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems."

The research team says their attacks are possible against any GPS-enabled road navigation system, such as those deployed normal cars, users' phones, couriers, or taxi sharing platforms. The attack is also successful against self-driving cars, for which the risk is even higher, as users are often more trustworthy in these types of vehicles than normal cars.

In fact, this was one of the reasons behind the research, to warn users and vendors that GPS spoofing should be taken seriously for road-based navigational systems.
 

ctg

Ylipäällikkö
Sen. Ron Wyden has sent a letter to the U.S. Department of Justice concerning disruptions to 911 emergency services caused by law enforcement’s use of cell-site simulators (CSS, also known as IMSI catchers or Stingrays). In the letter, Sen. Wyden states that:

Senior officials from the Harris Corporation—the manufacturer of the cell-site simulators used most frequently by U.S. law enforcement agencies—have confirmed to my office that Harris’ cell-site simulators completely disrupt the communications of targeted phones for as long as the surveillance is ongoing. According to Harris, targeted phones cannot make or receive calls, send or receive text messages, or send or receive any data over the Internet. Moreover, while the company claims its cell-site simulators include a feature that detects and permits the delivery of emergency calls to 9-1-1, its officials admitted to my office that this feature has not been independently tested as part of the Federal Communication Commission’s certification process, nor were they able to confirm this feature is capable of detecting and passing-through 9-1-1 emergency communications made by people who are deaf, hard of hearing, or speech disabled using Real-Time Text technology.​
https://eff.org/files/2018/08/27/wyden-stingray-jamming-letter-to-doj.pdf

Researchers of CSS technology have long suspected that using such technologies, even professionally designed and marketed CSS’s, would have a detrimental effect on emergency services, and now—for the first time—we have confirmation.

It is striking, but unfortunately not surprising, that law enforcement has been allowed to use these technologies and has continued to use them despite the significant and undisclosed risk to public safety posed by disabling 911 service, not to mention the myriad privacy concerns related to CSS use. What’s more, a cell-site simulator wouldn’t just disrupt service for the specific person or persons being tracked but would likely disrupt service for every mobile device in the area as it tricks every phone in the area into connecting to the fake base station in search of the target phone. This could be especially dangerous during a natural disaster when IMSI catchers are being used to locate missing persons in damaged buildings or other infrastructure, cutting off 911 service at a time like that could be a grave danger to others trapped in dangerous situations.
 

PekkaSavo

Ylipäällikkö
Millähän tavoin nämä tekniikat kehittyvät? Kuinka kaukaa esim. 5 vuoden kuluttua kyetään paikantamaan "tietyt päätelaitteet" ilman ilmassa liikkuvia apuvälineitäkin?

https://www.auto.tuwien.ac.at/bib/pdf_TR/TR0186.pdf
The first attempt to detect mobile phone users did not meet the initial expectations.
However, applying a few modifications to the software it should be possible to, at least,
detect MSs in dedicated mode. When a mobile enters dedicated mode by making or
receiving a call, it becomes highly active.

Over time new possibilities to detect mobile phone emissions emerged as these devices
were progressively making use of more telecommunication standards. However, using
GSM signals for human detection is not really common, as other technologies such as...

********************

https://breakingdefense.com/2017/10/russian-robots-fear-jammers-not-terminators/
.. but in the Donbass, the Russians shut Ukrainian military communications down so thoroughly that troops often resorted to their personal cellphones to communicate. Even in the advanced US military, troops routinely bring their personal phones into the field, unwittingly creating a way for a savvy adversary to track them and send them disinformation: The Wall Street Journal reported yesterday that Russian hackers attacked NATO soldiers’ cellphones, using drones to eavesdrop on insecure wireless devices. What’s more, Bendett argues, as the Russians buy more and longer-ranged drones, they could dramatically expand the reach of their jamming.

2016, Turn Off That iPhone, Commandant Tells Marines
https://breakingdefense.com/2016/08/turn-off-that-iphone-commandant-tells-marines/
Marines, turn off your iPhone and dig yourself a foxhole. That’s the Commandant’s message to young troops, based on embarrassing experiences in recent exercises. As cheap drones and other surveillance technologies spread worldwide, said Gen. Robert Neller, US forces must re-learn how to hide — both physically and electronically — from increasingly tech-savvy adversaries.

“We’ve got to change the way we’re thinking….An adversary can see us just as we see them,” said Gen. Neller. “If you can be seen, you will be attacked.”
 
Viimeksi muokattu:
Top