Page 26 - Williams Foundation Future of Electronic Warfare Seminar
P. 26

A New Approach and Attitude to Electronic Warfare in Australia

            I make this point to address a common fallacy; that somehow low-observable technology is being made redundant
            by the proliferation of counter-stealth technologies in our region. There is no doubt low observable technology will
            be subject to the same counter and counter-counter cycle as other forms of electronic warfare, but there is also no
            doubt that low observable technology combined with specialist operational tactics makes stealth aircraft far easier
            to hide in the electromagnetic spectrum using on-board or off-board jammers than conventional aircraft. They are
            more survivable and better equipped to penetrate contested airspace in order to achieve an operational objective.
            Stealth is not just viable, it’s becoming increasingly vital.

            For Air Commodore Chipman, the force design issue, which is crucial here is signature management.

            Clearly, the F-35 is part of the low signature focus which the RAAF is pursuing, but there is a broader issue – how
            do you reduce your overall radar signature profile and enhance the adversaries vulnerabilities in the same
            domain?

            Signature management is certainly not unique to the air domain. Our Army is now consciously minimising their
            electronic signature during Brigade manoeuvre exercises. And our submariners have long been masters in masking
            their signature, and making very deliberate vulnerability assessments before exposing themselves to the risk of
            detection. As the battle for supremacy of the electromagnetic spectrum intensifies, we will all need to rise to their
            level of skill and expertise.

            This includes signature management at the force level. The networks used to achieve force integration must be
            secure, resilient and persistent – but they should also be designed and operated cognisant of their electromagnetic
            signature. We will need to make compromises that balance the operational advantages of joint force integration
            through networking, and the imperative to minimise our vulnerability through effective signature management.
            And we’ll continue to employ force level electronic attack in its historical supporting role, to mask a force that is
            no longer able to hide below an adversary’s detection threshold.

            He then went on to describe way ahead in terms of Boyd’s OODA loop as he suggested he would in the
            remarks in our discussion prior to the conference.

            Boyd himself identified the orient phase as quote “the most important part of the OODA loop since it shapes the
            way we observe, the way we decide, the way we act”. I’m at risk of over-simplifying this stage by suggesting the
            task is to take observed data and generate meaning. This involves accurately identifying and locating specific
            emitters in the electromagnetic spectrum. In this way, we create a tactical operating picture, which provides
            essential situational awareness across the joint force.

            Identification is heuristic – we observe specific characteristics of a signal in the environment and compare those
            characteristics with a database of previously observed signals in order to establish the identity of that emitter. We
            improve the accuracy of identification by correlating different characteristics the threat system’s emissions
            collected by different sensors.

            Locating emitters in the environment is largely achieved through triangulation. This is one of the great advantages
            of networking: if a single signal is received by two geographically separated receivers, the task of accurately
            locating the source of that signal becomes relatively simple. However, both receivers must interpret the signal the
            same way and cooperate constructively to identify and locate it, otherwise they create ambiguity and confusion.

            This is why intelligence mission data is so important. It is the heuristic frame of reference we use to orientate
            ourselves in the electromagnetic spectrum. Developing joint force concepts for emitter identification and
            geolocation will require all contributing systems operate to a compatible frame of reference.


            Second Line of Defense


                                                                                                         Page 25
   21   22   23   24   25   26   27   28   29   30   31