Advertisement

Electronic Warfare. Category : Secondary School Level

Electronic Warfare.

Category : Secondary School Level

For decades, electronic warfare has been a separate subject from computer security, even though they have some common technologies (such as cryptography). This is starting to change as elements of the two disciplines fuse to form the new subject of information warfare. The military's embrace of information warfare as a slogan over the last years of the twentieth century has established its importance—even if its concepts, theory, and doctrine are still underdeveloped.


There are other reasons why knowledge of electronic warfare is important to the security professional. Many technologies originally developed for the warrior have been adapted for commercial use, and there are many instructive parallels. In addition, the struggle for control of the electromagnetic spectrum has consumed so many clever people and so many tens of billions of dollars that we find deception strategies and tactics of a unique depth and subtlety. It is the one area of electronic security to have experienced a lengthy period of co evolution of attack and defense involving capable motivated opponents.


Electronic warfare is also our main teacher when it comes to service denial attacks, a topic that computer security people have largely ignored, but that is now center stage thanks to distributed denial-of-service attacks on commercial Web sites. As I develop this discussion I'll try to draw out the parallels. Military communications were dominated by physical dispatch until about 1860, then by the telegraph until 1915, and then by the telephone until recently. Nowadays a typical command and control structure is made up of various tactical and strategic radio networks that support data, voice, and images, and operate over point-to-point links and broadcast. Without situational awareness and the means to direct forces, the commander is likely to be ineffective. But the need to secure communications is much more pervasive than one might at first realize, and the threats are much more diverse.


One obvious type of traffic is the communications between fixed sites such as army headquarters and the political leadership. The main threat here is that the cipher security might be penetrated, and the orders, situation reports and so on compromised. This might result from cryptanalysis or—more likely—equipment sabotage, subversion of personnel, or theft of key material.


The insertion of deceptive messages may also be a threat in some circumstances. But cipher security will often include protection against traffic analysis (such as by link encryption) as well as of the transmitted message confidentiality and authenticity. The secondary threat is that the link might be disrupted, such as by destruction of cables or relay stations. There are more stringent requirements for communications with covert assets such as agents in the field. Here, in addition to cipher security issues, location security is important. The agent will have to take steps to minimize the risk of being caught as a result of communications monitoring. If she sends messages using a medium that the enemy can monitor, such as the public telephone network or radio, then much of her effort may go into frustrating traffic analysis and radio direction finding.


Attack also generally requires a combination of techniques, even where the objective is not analysis or direction finding but simply denial of service. Owen Lewis summed it up succinctly: according to Soviet doctrine, a comprehensive and successful attack on a military communications infrastructure would involve destroying one third of it physically, denying effective use of a second third through techniques such as jamming, trojans or deception, and then allowing one's adversary to disable the remaining third in attempting to pass all his traffic over a third of the installed capacity.


This applies even in guerilla wars: in Malaya, Kenya, and Cyprus, the rebels managed to degrade the telephone system enough to force the police to set up radio nets. In the 1980s, NATO developed a comparable doctrine, called Counter-Command, Control and Communications operations (C-C3, pronounced C cubed). It achieved its first flowering in the Gulf War; the command and control systems were used. Before communications can be attacked, the enemy's network must be mapped. The most expensive and critical task in signals intelligence is identifying and extracting the interesting material from the cacophony of radio signals and the huge mass of traffic on systems such as the telephone network and the Internet. The technologies in use are extensive and largely classified, but some aspects are public. In the case of radio signals, communications intelligence agencies use receiving equipment, that can recognize a huge variety of signal types, to maintain extensive databases of signals—which stations or services use which frequencies. In many cases, it is possible to identify individual equipment by signal analysis. The clues can include any unintentional frequency modulation, the shape of the transmitter turn-on transient, the precise center frequency, and the final-stage amplifier harmonics. This RF fingerprinting technology was declassified in the mid-1990s for use in identifying cloned cellular telephones, where its makers claim a 95% success rate. It is the direct descendant of the World War II technique of recognizing a wireless operator by his fist—the way he sent Morse code.


Radio direction finding (RDF) is also critical. In the old days, this involved triangulating the signal of interest using directional antennas at two monitoring stations.


Spies might have at most a few minutes to send a message home before having to move. Modem monitoring stations use time difference of arrival (TDOA) to locate a suspect signal rapidly, accurately, and automatically by comparing the phase of the signals received at two sites. Nowadays, anything more than a second or so of transmission can be a giveaway.


Traffic analysis—looking at the number of messages by source and destination—can also give very valuable information, not just about imminent attacks (which were signaled in World War I by a greatly increased volume of radio messages) but also about unit movements and other routine matters. However, traffic analysis really comes into its own when sifting through traffic on public networks, where its importance (both for national intelligence and police purposes) is difficult to overstate.


This is not as easy as it sounds. Electronic warfare is much more developed than most other areas of information security. There are many lessons to be learned, from the technical level up through the tactical level to matters of planning and strategy. We can expect that, as information warfare evolves from a fashionable concept to established doctrine, these lessons will become important for practitioners.


School Essay for Students.

PDF FILE TO YOUR EMAIL IMMEDIATELY PURCHASE NOTES & PAPER SOLUTION. @ Rs. 50/- each (GST extra)

SUBJECTS

HINDI ENTIRE PAPER SOLUTION

MARATHI PAPER SOLUTION

SSC MATHS I PAPER SOLUTION

SSC MATHS II PAPER SOLUTION

SSC SCIENCE I PAPER SOLUTION

SSC SCIENCE II PAPER SOLUTION

SSC ENGLISH PAPER SOLUTION

SSC & HSC ENGLISH WRITING SKILL

HSC ACCOUNTS NOTES

HSC OCM NOTES

HSC ECONOMICS NOTES

HSC SECRETARIAL PRACTICE NOTES

2019 Board Paper Solution

HSC ENGLISH SET A 2019 21st February, 2019

HSC ENGLISH SET B 2019 21st February, 2019

HSC ENGLISH SET C 2019 21st February, 2019

HSC ENGLISH SET D 2019 21st February, 2019

SECRETARIAL PRACTICE (S.P) 2019 25th February, 2019

HSC XII PHYSICS 2019 25th February, 2019

CHEMISTRY XII HSC SOLUTION 27th, February, 2019

OCM PAPER SOLUTION 2019 27th, February, 2019

HSC MATHS PAPER SOLUTION COMMERCE, 2nd March, 2019

HSC MATHS PAPER SOLUTION SCIENCE 2nd, March, 2019

SSC ENGLISH STD 10 5TH MARCH, 2019.

HSC XII ACCOUNTS 2019 6th March, 2019

HSC XII BIOLOGY 2019 6TH March, 2019

HSC XII ECONOMICS 9Th March 2019

SSC Maths I March 2019 Solution 10th Standard11th, March, 2019

SSC MATHS II MARCH 2019 SOLUTION 10TH STD.13th March, 2019

SSC SCIENCE I MARCH 2019 SOLUTION 10TH STD. 15th March, 2019.

SSC SCIENCE II MARCH 2019 SOLUTION 10TH STD. 18th March, 2019.

SSC SOCIAL SCIENCE I MARCH 2019 SOLUTION20th March, 2019

SSC SOCIAL SCIENCE II MARCH 2019 SOLUTION, 22nd March, 2019

XII CBSE - BOARD - MARCH - 2019 ENGLISH - QP + SOLUTIONS, 2nd March, 2019

HSC Maharashtra Board Papers 2020

(Std 12th English Medium)

HSC ECONOMICS MARCH 2020

HSC OCM MARCH 2020

HSC ACCOUNTS MARCH 2020

HSC S.P. MARCH 2020

HSC ENGLISH MARCH 2020

HSC HINDI MARCH 2020

HSC MARATHI MARCH 2020

HSC MATHS MARCH 2020


SSC Maharashtra Board Papers 2020

(Std 10th English Medium)

English MARCH 2020

HindI MARCH 2020

Hindi (Composite) MARCH 2020

Marathi MARCH 2020

Mathematics (Paper 1) MARCH 2020

Mathematics (Paper 2) MARCH 2020

Sanskrit MARCH 2020

Sanskrit (Composite) MARCH 2020

Science (Paper 1) MARCH 2020

Science (Paper 2)

Geography Model Set 1 2020-2021


MUST REMEMBER THINGS on the day of Exam

Are you prepared? for English Grammar in Board Exam.

Paper Presentation In Board Exam

How to Score Good Marks in SSC Board Exams

Tips To Score More Than 90% Marks In 12th Board Exam

How to write English exams?

How to prepare for board exam when less time is left

How to memorise what you learn for board exam

No. 1 Simple Hack, you can try out, in preparing for Board Exam

How to Study for CBSE Class 10 Board Exams Subject Wise Tips?

JEE Main 2020 Registration Process – Exam Pattern & Important Dates


NEET UG 2020 Registration Process Exam Pattern & Important Dates

How can One Prepare for two Competitive Exams at the same time?

8 Proven Tips to Handle Anxiety before Exams!

BUY FROM PLAY STORE

DOWNLOAD OUR APP

HOW TO PURCHASE OUR NOTES?

S.P. Important Questions For Board Exam 2022

O.C.M. Important Questions for Board Exam. 2022

Economics Important Questions for Board Exam 2022

Chemistry Important Question Bank for board exam 2022

Physics – Section I- Important Question Bank for Maharashtra Board HSC Examination

Physics – Section II – Science- Important Question Bank for Maharashtra Board HSC 2022 Examination

Important-formula



THANKS