197 research outputs found

    COMB JAMMING AS A STRATEGY FOR RCIED ACTIVATION PREVENTION

    Get PDF
    The main objective of this paper is the analysis of comb jamming as a technique for RCIED activation prevention. Presentation of three strategies for comb signal generation follows after comprehensive survey of various jamming techniques in the introduction. There are two paper original contributions. The first one is quantitative comparison for three signal generation techniques of their emission power in relation to barrage jamming under the condition of equal BER value. The second contribution is determination of exact BER value as a function of emission power in the case of barrage jamming. Until now we have made different analyses and comparisons starting from estimated emission power. The analysis procedure is performed for QPSK modulated RCIED activation signal. Power saving is evident for all three methods of jamming signal generation. It is proved that additional 2.5dB of power saving is achieved by equalization of frequency components level in comb signal. The analysis in this paper shows that comb jamming allows the same effects as barrage jamming, but with lower emission power

    RELIABILITY ANALYSIS OF DIFFERENT RCIED ACTIVATION SIGNAL RESPONSIVE JAMMING TECHNIQUES AND THEIR COMPARISON TO ACTIVE JAMMING

    Get PDF
    In this paper we compared the time required for the successful jamming of remote controlled improvised explosive devices activation using active and responsive jamming methods. As a representative of active jamming method we analyzed jamming signal generation using frequency sweep. For the analysis of the possible activating signal presence based on responsive jamming procedures we first supposed Fast Fourier Transform (FFT) implementation and compared its analysis rate to the rate of sweep jamming. Taking into account the current technology state, it is proved that the time required to achieve the successful jamming relied on FFT analysis may be less than in the case of active sweep jamming. After that we considered pros and cons for energy detector and matched filter detector implementation in responsive jamming. For these two detector types it is shown how to determine the number of analysis blocks to achieve approximately the same number of collected samples as in the case of FFT implementation, starting from the probabilities of false detection and miss of detection

    Successful Sweep Jamming Rate Determination of MPSK Modulated RCIED Activation Message Signals

    Get PDF
    This paper presents the development of the method for accurate successful jamming rate calculation when MPSK modulated RCIED activation message is jammed using sweep signal. Opposite to classical methods of error modelling where it is taken that only one bit in a symbol may be altered, it is supposed in this paper that any number of bits in a symbol is the subject of eventual modification. The derived formulas are achieved for QPSK, 8PSK and 16PSK modulated signals jamming. The results calculated by these formulas are verified and obtained by our originally developed simulation method. The results of calculation and simulation agree very well and the maximum difference between calculated and simulated successful jamming rate for any of three analyzed jamming methods and any level ratio between activation message signal and jamming signal does not overcome 1.1%. It is proved that successful jamming rate tends to maximum value 0.5 when jamming signal power increases and that only 20% lower successful jamming rate value is obtained for less than 7dB higher jamming signal level than it is the level of RCIED activation signal. These results point out that it is not necessary to apply too high emission power to achieve acceptable jamming effect. As a consequence, jammer practical implementation is easier and its dimensions are smaller

    ANALYSIS OF JAMMING SUCCESSFULNESS AGAINST RCIED ACTIVATION WITH THE EMPHASIS ON SWEEP JAMMING

    Get PDF
    In this paper we first briefly compare the performances of active jamming remote controlled improvised explosive devices activation using wide-band noise and frequency sweep signal. Frequency sweep is the most widely used technique intended for active jamming and we analyze its characteristics: 1) sweep speed, 2) conditions for certainly successful jamming, 3) successful jamming probability if jamming is not certainly successful, and 4) step of frequency change when frequency sweep is applied. The separate paper section is devoted to the successful jamming probability calculation in general. The attention is also paid to jamming probability determination when starting and ending sweep signal frequencies are varied. The initial research has been upgraded and extended. The presented results refer to jamming equipment development in IRITEL, but it is important to add that they are also applicable to the other similar jamming systems realizations

    Testing of ISM band at remotes for unlocking vehicles

    Get PDF
    ArticleEvery modern car has a remote control for wireless unlocking. Wireless drivers for unlocking the vehicle using frequency in the ISM bands. ISM bands are unlicensed bands. They are usually used for industrial, medical and scientific purposes. The question is whether wireless transmission parameters are sufficient and do not violate defined range of ISM band. Another important aspect is the security of the wireless transmissions and any other signal interference. The problem of interference plays an important role in ensuring the quality and safety of wireless communications, especially when wireless networks can be found everywhere. The issues of remote control vehicles is very important due to the resulting security of a guarded vehicle. One of the major risks that may occur are data transmission that the signal is blocked by another signal and the end user does not notice. In this case, does not lock the vehicle nor ensuring its securing security system. Tests which were performed accurately determined the bandwidth of broadcast remote control for each vehicle. Vehicles for which the tests were conducted are standard vehicles used to frequent occurrence. These are the following types: Alfa Romeo, Hyundai, Mercedes, Škoda and Toyota. Subsequently, the analysis was performed of transmission compared with standard broadcast of jammers. All test drivers worked in the band ISM433. These tests clearly demonstrated that not every manufacturer strictly observes ranges of ISM band. This may affect traffic on surrounding licensed bands

    OPENING THE APERTURE: HOLISTIC MITIGATION OPTIONS IN RESPONSE TO UAS THREATS

    Get PDF
    A synchronized collection of intelligence and investigative capacities, such as would be required to holistically mitigate the emerging threat from unmanned aircraft systems, does not currently exist within the United States government. Furthermore, the entities that do possess the authority, knowledge, and experience to respond are working within largely independent environments. This thesis seeks to identify the best method to collectivize individual agency strengths, unifying intelligence and investigative capacities into one juggernaut-level response against UAS threats. To address this, working groups, task forces, and single agency designation were chosen as potential options specifically for their historical precedence and likelihood of success. Each was compared according to their ability to embrace two defining characteristics: collaboration and commitment. The outcome of the analysis determined that the task force model was ultimately the most effective means to address UAS threats holistically. It mitigates the challenges associated with current technology and legal restrictions by utilizing intelligence and investigative operational capabilities to properly address each of the six steps within the UAS kill chain, all within an environment of high collaboration and commitment. The conclusions and accompanying recommendations outlined in this thesis provide a definitive direction as well as a rational plan of implementation.Civilian, Federal Bureau of InvestigationApproved for public release. Distribution is unlimited

    Strategic Culture as the Basis for Military Adaptive Capacity: Overcoming battlefield technological surprises

    Get PDF
    The ability of a military to respond to environmental changes rather than rigidly adhere to previously defined concepts of operation is paramount to overcoming unforeseen battlefield technological challenges. A force with the greater capacity for learning and adaptation will possess significant advantages in overcoming unforeseen challenges. However, it is unclear as to what determines the flexibility or adaptive capacity of a military during military engagements. To address this issue, this study focuses on intra- war adaptation as a product of a military’s strategic culture in overcoming enemy technological surprises. The work demonstrates the symbiotic relationship between strategic culture and adaptability that ultimately determines how effectively a force will respond to unforeseen battlefield challenges. For this reason, strategic culture is indispensable in explaining why militaries may continue to act in ways that are incongruous with prevailing operational circumstances while others are adept at responding to Clausewitzian fog and friction

    REDESIGNING THE COUNTER UNMANNED SYSTEMS ARCHITECTURE

    Get PDF
    Includes supplementary material. Please contact [email protected] for access.When the Islamic State used Unmanned Aerial Vehicles (UAV) to target coalition forces in 2014, the use of UAVs rapidly expanded, giving weak states and non-state actors an asymmetric advantage over their technologically superior foes. This asymmetry led the Department of Defense (DOD) and the Department of Homeland Security (DHS) to spend vast sums of money on counter-unmanned aircraft systems (C-UAS). Despite the market density, many C-UAS technologies use expensive, bulky, and high-power-consuming electronic attack methods for ground-to-air interdiction. This thesis outlines the current technology used for C-UAS and proposes a defense-in-depth framework using airborne C-UAS patrols outfitted with cyber-attack capabilities. Using aerial interdiction, this thesis develops a novel C-UAS device called the Detachable Drone Hijacker—a low-size, weight, and power C-UAS device designed to deliver cyber-attacks against commercial UAVs using the IEEE 802.11 wireless communication specification. The experimentation results show that the Detachable Drone Hijacker, which weighs 400 grams, consumes one Watt of power, and costs $250, can interdict adversarial UAVs with no unintended collateral damage. This thesis recommends that the DOD and DHS incorporates aerial interdiction to support its C-UAS defense-in-depth, using technologies similar to the Detachable Drone Hijacker.DASN-OE, Washington DC, 20310Captain, United States Marine CorpsApproved for public release. Distribution is unlimited

    Counter Unmanned Aircraft Systems Technologies and Operations

    Get PDF
    As the quarter-century mark in the 21st Century nears, new aviation-related equipment has come to the forefront, both to help us and to haunt us. (Coutu, 2020) This is particularly the case with unmanned aerial vehicles (UAVs). These vehicles have grown in popularity and accessible to everyone. Of different shapes and sizes, they are widely available for purchase at relatively low prices. They have moved from the backyard recreation status to important tools for the military, intelligence agencies, and corporate organizations. New practical applications such as military equipment and weaponry are announced on a regular basis – globally. (Coutu, 2020) Every country seems to be announcing steps forward in this bludgeoning field. In our successful 2nd edition of Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets (Nichols, et al., 2019), the authors addressed three factors influencing UAS phenomena. First, unmanned aircraft technology has seen an economic explosion in production, sales, testing, specialized designs, and friendly / hostile usages of deployed UAS / UAVs / Drones. There is a huge global growing market and entrepreneurs know it. Second, hostile use of UAS is on the forefront of DoD defense and offensive planners. They are especially concerned with SWARM behavior. Movies like “Angel has Fallen,” where drones in a SWARM use facial recognition technology to kill USSS agents protecting POTUS, have built the lore of UAS and brought the problem forefront to DHS. Third, UAS technology was exploding. UAS and Counter- UAS developments in navigation, weapons, surveillance, data transfer, fuel cells, stealth, weight distribution, tactics, GPS / GNSS elements, SCADA protections, privacy invasions, terrorist uses, specialized software, and security protocols has exploded. (Nichols, et al., 2019) Our team has followed / tracked joint ventures between military and corporate entities and specialized labs to build UAS countermeasures. As authors, we felt compelled to address at least the edge of some of the new C-UAS developments. It was clear that we would be lucky if we could cover a few of – the more interesting and priority technology updates – all in the UNCLASSIFIED and OPEN sphere. Counter Unmanned Aircraft Systems: Technologies and Operations is the companion textbook to our 2nd edition. The civilian market is interesting and entrepreneurial, but the military and intelligence markets are of concern because the US does NOT lead the pack in C-UAS technologies. China does. China continues to execute its UAS proliferation along the New Silk Road Sea / Land routes (NSRL). It has maintained a 7% growth in military spending each year to support its buildup. (Nichols, et al., 2019) [Chapter 21]. They continue to innovate and have recently improved a solution for UAS flight endurance issues with the development of advanced hydrogen fuel cell. (Nichols, et al., 2019) Reed and Trubetskoy presented a terrifying map of countries in the Middle East with armed drones and their manufacturing origin. Guess who? China. (A.B. Tabriski & Justin, 2018, December) Our C-UAS textbook has as its primary mission to educate and train resources who will enter the UAS / C-UAS field and trust it will act as a call to arms for military and DHS planners.https://newprairiepress.org/ebooks/1031/thumbnail.jp
    corecore