Open access peer-reviewed chapter

Some Aspects of Electronic Warfare in the Fight against Terrorism

Written By

Miroslav Terzić

Submitted: 23 October 2023 Reviewed: 26 October 2023 Published: 21 December 2023

DOI: 10.5772/intechopen.1003744

From the Edited Volume

Global War on Terrorism - Revisited

Mohd Mizan Aslam and Rohan Gunaratna

Chapter metrics overview

38 Chapter Downloads

View Full Metrics

Abstract

Terrorism as a phenomenon especially comes to the fore at the end of the twentieth century and the beginning of the twenty-first century when, most often, non-state subjects (various terrorist groups and individuals) using different types of weapons and military equipment, plan, organize and carry out terrorist operations, creating great effects (deadly effects, psychological effects, etc.) in the attacking object. The targets of attacks by terrorist groups (terrorist organizations) are numerous, ranging from state institutions to ordinary citizens. The evolution of terrorism conditioned the development of new methods of fighting terrorists, but also the improvement of existing methods of fighting terrorism. One of the ways of fighting terrorism includes the use of electronic warfare systems as part of the operational and combat support in the anti-terrorist operation. Earlier use of electronic warfare systems in the fight against terrorism included the individual use of electronic support assets. The reasons for such use of electronic warfare systems are in the fact that weapons, organization of terrorist cells and planning of terrorist acts were at such a level that it was not necessary to use army units and more complex systems for electronic warfare. The activities of terrorist organizations since the end of the twentieth century and the beginning of the twenty-first century can be characterized as terrorist operations with military features. Terrorist operations with military features have influenced the use of military units in the fight against terrorists, in addition to the use of police units. The use of army units and police units in the fight against terrorists is unified through the process of preparing and executing a counter-terrorist operation. When planning an anti-terrorist operation using army and police forces, it is necessary, among other things, to plan adequate systems for electronic warfare that would provide operational and combat support to army and police forces. That is why it is very important to analyze certain electronic warfare systems that can provide operational and combat support in a counter-terrorist operation that has military characteristics. The contribution of this research is in the improvement of the conceptual approach to the use of electronic warfare systems in the fight against terrorism. Further research should be focused on creating a model of electronic warfare in a counter-terrorist operation.

Keywords

  • terrorism
  • combat
  • counter-terrorist operation
  • electronic warfare
  • military

1. Introduction

The civil war in Syria presented a favorable situation for the terrorist organization Islamic State—ISIL to occupy parts of the Syrian Arab Republic by applying appropriate combat tactics with the help of military weapons and equipment. The combat activities of ISIL in the territory of Syria, taking into account that a civil war was taking place in that area, are considered by some theorists as modern insurgency [1] because it is possible to show that a part of the population rebelled against their own state. In this case, the terrorist organization ISIL mobilized part of the population to fight against the official regime of the Syrian Arab Republic. The fight of ISIL in Syria manifested military characteristics through the organization of forces, the use of military weapons and equipment, the application of military tactics for the conquest of the city of Al Raqqa, etc.

Since the end of the twentieth century, terrorists have massively used modern communications, cyber proctors, explosive devices that can be activated remotely with the help of mobile phones, various types of drones and the like.

Modern communications, modern weaponry and improvised explosive devices used by terrorists for combat operations and operations in multiple domains represent a major challenge for counter-terrorist operation planning. In order to effectively respond to that challenge, in addition to the use of military and police combat teams, it is necessary to dimension forces for electronic warfare that would provide operational and combat support to other forces in the operation by acting in the electromagnetic spectrum.

In the study: “terrorist and insurgent unmanned aerial vehicles: use, potentials, and military implications” [2] describes various aspects of the use of drones by terrorist and insurgent forces. Three potential scenarios were analyzed and possible military implications and political responses were predicted based on those analyses. The military is required to develop capabilities that can adequately respond to a terrorist or insurgent threat. Military units should develop capabilities for combat operations and operations in the electromagnetic spectrum to respond to the terrorist use of drones.

Electronic warfare forces in a counter-terrorist operation in order to provide operational and combat support can carry out the following tasks: gathering intelligence about terrorists by monitoring open sources of information, discovering the intention of terrorist forces by monitoring their direct communications, discovering the location of terrorist forces by goniometering their communication devices, jamming their communications, by jamming improvised explosive devices, jamming their drones, etc.

The importance of this topic, from the theoretical aspect, is in the description of certain electronic warfare systems and the determination of the cause-and-effect relationship (causal relationship) between modern weapons and equipment used by terrorists and the development of electronic warfare systems. The importance of this topic, from a practical aspect, is in the selection of an adequate system for electronic warfare that would be used in a counter-terrorist operation.

Advertisement

2. Terrorist actions and operations

Terrorism is a phenomenon (phenomenon), which is often associated with irregular forces, whose main goal is the realization of political interests. Terrorist acts demonstrate the intent to cause significant psychological and/or physical effects on the relevant population through the use or threat of violence. Terrorist strategies are usually a long-term commitment to degrade the enemy’s resilience in order to extract concessions from the enemy with whom the terrorists are in conflict [3].

The evolution of terrorism is followed by the following trends:

  • Terrorism is becoming more extensive and stronger in intensity.

  • Terrorists have developed new financial means, so they are less dependent on state sponsors.

  • Terrorists innovate; exploit new technology, improvise commercial technology for military use;

  • Terrorists analyze experiences and learn from each other;

  • develop and practice successful tactics;

  • create instruction manuals based on experience;

  • terrorists do not respect the international law of war;

  • terrorists justify their actions with doctrines and theories;

  • For terrorists, the most important technology is direct communication with their multiple polika.

Larger terrorist organizations when planning larger operations have a functional organizational structure. In that structure, there are specialists for certain functions: recruitment, training, intelligence security, reconnaissance, planning of terrorist actions and operations, informational and psychological-propaganda action, logistics, finance, and social service.

Terrorist operations are usually planned in great detail with the goals of minimizing risk, achieving the highest probability of success, and achieving the widest possible publicity for their actions. Terrorists tend to avoid their adversary’s strengths and concentrate on their weaknesses.

The planning of terrorist operations, in principle, can include the following phases: - selection of targets (choice of objects of action), − collection of intelligence data and monitoring of targets, − selection of a specific target (most often the object of action is selected, the destruction of which achieves the strongest effect), − determination (planning) target attack variants, target attack practice, target action, draw after target action, and success exploitation.

Terrorist operations are unique in that each is planned for a specific goal and effect. Terrorists usually reveal only as much of their resources and people as is absolutely necessary to accomplish the mission in order to avoid capture or destruction [4].

To act on the target, terrorists use specific equipment and various tactics. Some terrorist tactics are carried out as independent actions and some terrorist tactics are undertaken as part of other coordinated activities. Common types of terrorist tactics are: attack or ambush, capture, assassination, activation of weapons of mass destruction, hostage taking, sabotage, bombing, kidnapping, destruction of critical infrastructure facilities, etc.

At the end of the twentieth century and since the beginning of the twenty-first century, terrorists have massively used the Internet and other types of communication throughout the process of planning operations and to display terrorist tactics, and they can also project disinformation and propaganda to justify their goal.

On the Internet, terrorist violence, carried out on camera, can be broadcast directly over the Internet and without editing. The Internet also enables direct communication between the terrorist’s public affairs department and various constituencies: recruiters, sympathizers, the wider Iraqi body, enemy states, and citizens who may disagree with their own government’s policies. The bombing is broadcast directly to a wider audience with the help of cameras on drones (commercial and military) and weapons. Today’s terrorists have websites, publish online magazines, explain their causes, discuss doctrine, and provide instructions for making explosives. They may use the same channels to secretly communicate with operatives through coded messages or, according to some reports, steganography [5, 6].

Advertisement

3. Electronic warfare in a counter-terrorist operation

In response to the preparation and execution of terrorist actions and terrorist operations with military features, police units and army units prepare and execute a counter-terrorist operation. Police units and army units that are planning a counter-terrorist operation, among other things, have electronic warfare capabilities. Electronic warfare capabilities in a counter-terrorist operation can be organized within an electronic warfare unit.

The principles of conducting an anti-terrorist operation include:

  • continuous control and exploitation of the electromagnetic spectrum (dominance in the electromagnetic spectrum),

  • the organization of continuous reconnaissance of the actions and actions of terrorist forces,

  • monitoring the composition of terrorist forces, their strength and the changes that occur in this regard, once established contact with a terrorist group must not be interrupted under any circumstances,

  • creation and provision of conditions for quick maneuver and movement of units participating in the anti-terrorist operation,

  • perform actions quickly and suddenly by applying various tricks in the paint without repeating actions and procedures,

  • ensure safe and stable multi-channel telecommunications with all participants in the operation,

  • choose the most suitable time and place of action, and carry out the attack from a circular base.

The combat organization of units that carry out an anti-terrorist operation, in principle, includes:

  • command forces,

  • forces for carrying out counter-terrorist operations,

  • forces for general combat operations,

  • fire support forces,

  • forces in reserve,

  • anti-terrorist security forces,

  • forces for logistic support.

The execution of anti-terrorist actions, in principle, implies the following:

  • bringing forces to the counter-terrorist operation zone,

  • blockade of areas where terrorist forces are located,

  • search of areas where terrorist forces are located,

  • environment of terrorist forces,

  • breaking up and destroying terrorist forces,

  • securing the area of the performed actions,

  • territory control,

  • disengagement [7]

During the preparation and execution of the anti-terrorist operation, the electronic warfare unit would be organizationally connected to the command planning the counter-terrorist operation, and functionally it would be connected to the command and to other units in the counter-terrorist operation zone.

The electronic warfare unit is intended to provide operational support, combat support and protection to commands and units conducting counter-terrorist operations. Operational support is achieved by continuous search and monitoring of the electromagnetic spectrum, which detects, analyzes and monitors terrorist activities, and based on this, data processing is carried out and certain information about terrorists is obtained. Combat support is achieved by electronic jamming of command and control systems used by terrorist forces, at critical moments of counter-terrorist operations. The electronic warfare unit has the ability to jam remotely controlled exposure devices and unmanned aerial vehicles to protect forces conducting a counter-terrorist operation. Accordingly, an electronic warfare unit participating in a counter-terrorist operation consists of three functionally distinct components of electronic warfare assets.

The first component consists of means intended for determining the direction and direction of signal arrival (radio goniometers). Using COMINT/C-ESM booths, which are placed at a greater distance, it is possible to determine the macro location of the emitter. The COMINT/C-ESM cabins are interconnected in a radio reconnaissance system, which allows the approximate locations of currently active radio emitters to be displayed in each set, on a digital map, in real time. Figure 1 shows the COMINT/C-ESM cabin manufactured by Rohde & Schwarz.

Figure 1.

Cabin for electronic reconnaissance [8].

COMINT/C-ESM systems are customized solutions for radio monitoring and radio location in the 10 kHz to 40 GHz frequency range. The systems are suitable for land-based, naval and airborne applications. Configurations range from small portable single-operator, mobile applications to complex semi-mobile or fixed monitoring stations with dedicated operator positions. These can be supported by remote subsystems through various kinds of wired or wireless communications [8].

In addition to the above, in the radio reconnaissance system operators have voice communication with each other. In addition to the radio reconnaissance kit, the R&S®MP007 Portable direction finding system, which is intended for determining the micro location of the radio transmitter, is also imported into the radio reconnaissance system. Determining the micro-location of the emitter is the determination of the exact location of the transmitting device, with very little possibility of error. Portable radio goniometers are connected to the radio reconnaissance system, so the exact location of the transmitter at the time of transmission can be seen on the digital map of each of the devices in that system. Figure 2 shows the R&S®MP007 Portable direction finding system, and Figure 3 shows the location of the signal source, which is the result of the use of three goniometers.

Figure 2.

R&S®MP007 portable direction finding system [9].

Figure 3.

The result of using three portable direction finding system on a digital map.

Portable goniometers, with an operator, are part of the units that destroy terrorist groups. An operator with a portable goniometer would move near the commander of the unit, enabling him to see the current state of active emitters, their location, as well as the change in position, thus providing combat support.

The second component consists of means intended for listening in on radio communications used by terrorists. In the counter-terrorist operation zone, terrorists may use mobile phones, commercial telecommunications devices, and military telecommunications and navigation devices. In the area of the anti-terrorist operation, it is possible to temporarily evacuate a large part of the population and turn off the mobile phone signal. By shutting down cell phone signals, terrorists are forced to use commercial and military telecommunications devices. Then their monitoring and wiretapping of telecommunications was made easier.

By using COMINT systems, the complete radio communications of terrorist forces are intercepted, and in this way, important intelligence data can be obtained on the strength of terrorist forces, the distribution of their members within the group, as well as intentions to move or plans for action. The collected data is sent to the command that plans the counter-terrorist operation and thereby provides operational support.

The third component consists of means intended for jamming radio communications, jamming data transmission links, and jamming radio-controlled improvised explosive devices. High-output electronic jamming systems are used to jam terrorist communications from long distances, which are functionally linked to COMINT/C-ESM systems. They can only be used in the critical phases of the counter-terrorist operation and then provide combat support.

Forces intended to destroy terrorist groups are exposed to the effects of improvised explosive devices and reconnaissance and action from unmanned aerial vehicles. Therefore, vehicles with jammers would move with the units intended for the destruction of the terrorist group and be in functional connection with the goniometers. The operator on the jammer communicates with the operator on the portable goniometer, who in the event of a perceived threat (registration and goniometry of the signal that activates the explosive device or the registration of the signal that is controlled by the unmanned aerial vehicle or the signal that sends the image from the unmanned aerial vehicle), and after the approval of the supervisor of the radio reconnaissance system, requires the inclusion of a jammer. The inclusion of a jammer prevents terrorists from using radio communications, using data transmission links, using remotely controlled improvised explosive devices, and using remotely controlled drones.

Elements for electronic jamming of improvised explosive devices fulfil the function of protecting the forces of the units (combat teams) to which they were added [10]. Implementing electronic jamming of improvised explosive devices for the protection of forces that destroy a terrorist group is a very complex task because the effectiveness and efficiency of electronic jamming depends on several variables.

Theory and practice indicate the possibility of multiple types and concepts of jamming radio signals, from narrowband jamming to sweep jamming with different jamming signals. Three jamming techniques can be used to protect forces in a counter-terrorist operation, based on how the signal is generated:

  • active,

  • reactive,

  • combined.

In active jamming, jamming sequences of a certain output power are generated at fixed frequencies and are continuously emitted over time in certain frequency ranges. This causes a relatively high energy consumption and the operating time is limited and highly dependent on the capacity of the energy source. This way of working is efficient but not always effective, because it is necessary to know in advance the frequency of the signal that activates the RCIED. Figure 4 shows the method of protecting a column of motor vehicles with an active jammer.

Figure 4.

Active type radio jammer [11].

With this type of jamming, it is necessary to synchronize the electromagnetic activities in order to protect the jamming of one’s own communications. Synchronization of electromagnetic activities is very important during the implementation of tasks in the phase of destroying a terrorist group.

In reactive jamming, the jammer generates and emits jamming signals only on frequencies that are assumed to be misused to activate the RCIED. Figure 5 shows a reactive type radio jammer.

Figure 5.

Reactive type radio jammer [11].

In the reactive jamming technique, jammers search the frequency spectrum, analyze it and, based on a defined detection threshold, generate jamming signals and with them jam possible threat signals (signals that activate the RCIED). From the aspect of energy saving and jammer operation time, this is a good solution, but there are a couple of drawbacks that should be paid attention to. Disadvantages are related to the use of decoys (false frequencies), interference response speed, frequency spectrum width, etc. Terrorists, for example, can deliberately use signals that have a higher power (false frequencies - decoy) so that the radio jammer will respond to them, while at the same time transmitting signals with reduced power that represent the real radio signal that activates the RCIED. That radio signal will not be detectable by the jammer. To cover a larger range of RCIED signal jamming, a larger number of jammers are used because they are, most often, narrowband.

Drone jamming elements can be part of the forces that are intended to destroy the terrorist group and the forces that provide fire support to the forces that destroy the terrorist group. For jamming drones, it is possible to use the advanced automatic RF tracking and observation solution (AARTOS), which is intended for the detection, tracking, identification and jamming of drones.

Advanced automatic RF tracking and observation solution (AARTOS) is one of the typical systems that was purposely developed and intended for combating drones in the electromagnetic spectrum [12]. The system consists of three parts: the antenna system, the processor part and the jamming part. This system can be stationary or mobile. The system itself is designed modularly so that modules such as optoelectronic part, radar, etc. can be upgraded. Figure 6 shows the AARTOS anti-drone system.

Figure 6.

Anti drone system AARTOS [13].

Three parts of the AARTOS system can be seen in the picture: command post (processor part, in the middle), antenna array for detection and tracking (left), and antenna array for jamming (right). It can identify the type of drones it has detected, such as the DJI Phantom 4 and the like, which can be seen in Figure 7.

Figure 7.

Anti-drone system AARTOS - identification of the type of drone [13].

The jammer can be an independent part of the system or an integral part of the system. Figure 8 shows the mobile/portable and transportable AARTOS CMS (Counter-Measure Solutions) jammers.

Figure 8.

AARTOS CMS jammers [13].

The mobile jammer has two antennas (omnidirectional and directional). It covers five frequency sub-bands and a total output power of 120 W. The effective jamming range is up to 2.5 km.

A large number of electronic warfare systems with different purposes are available for the fight against terrorism that has military characteristics at the tactical and operational level (anti-terrorist actions and anti-terrorist operations). Some electronic warfare systems are part of the police force (mobile phone monitoring systems, anti-drone systems) and some systems are part of the army. It is of great importance to know the functioning of electronic warfare systems in different combat situations for the effective use of electronic warfare units.

Advertisement

4. Conclusions

The development of modern weapons and techniques that can easily be used by terrorists for military purposes requires the improvement of tactics, techniques and procedures in the fight against terrorists. The fight against terrorists is multifaceted and includes the national security system and cooperation at the regional and global level.

Army units and police units can be used to fight terrorism that has military characteristics. Army units and anti-terrorist police units plan an anti-terrorist operation so that all units are used effectively, efficiently and effectively.

Electronic warfare in the fight against terrorism is viewed through the use of an electronic warfare unit in a counter-terrorist operation. The Electronic Warfare Unit provides operational support, combat support and protection to forces conducting a counter-terrorism operation [14, 15].

In a counter-terrorist operation, it is possible to form an electronic warfare unit that would contain three functionally different components:

  • component for radio-goniometry,

  • component for electronic reconnaissance,

  • component for electronic jamming.

The development of communication technology, the development of improvised explosive devices, the development of drones and readily available weapons that can be used by terrorists, represent a major challenge for electronic warfare in the fight against terrorism.

The development of artificial intelligence that can be used in communications (social networks, etc.), that can be used to control drones can represent a multiplier of combat power for terrorists and an even greater challenge for electronic warfare.

References

  1. 1. Kuzmanović B, Terzić M, Inđić D. Moderno pobunjeništvo – Islamska država. Vojnodelo. 2016;2:277-289. DOI: 10.5937/vojdelo1602277К
  2. 2. Robert J. Bunker: Terrorist and insurgent unmanned aerial vehicles: Use, potentials, and military implications. Strategic Studies Institute and U.S. Army War College Press; Aug 2015
  3. 3. TC 7-100.4, Hybrid Threat Force Structure Organization Guide, Headquarters Department of the Army Washington, DC, 4 June 2015
  4. 4. Joint Publication 3-26, Counterterrorism, Doctrine for the Armed Forces of the. United States, 24. Oktober 2014
  5. 5. Jenkins BM. The new age of terrorism. 2023. Available from: https://www.rand.org/content/dam/rand/pubs/reprints/2006/RAND_RP1215.pdf [Accessed October 20, 2023]
  6. 6. Counter-Terrorism Committee Executive Directorate (CTED). Information and communication technologies. 2023. Available from: https://www.un.org/securitycouncil/ctc/content/information-and-communications-technologies [Accessed: August 20, 2023]
  7. 7. Pravilo Specijalna brigada – privremeno, Ministarstvo odbrane Republike Srbije. 2014
  8. 8. Turnkey COMINT/C-ESM systems. 2023. Available from: https://www.rohde-schwarz.com/ae/solutions/aerospace-defense-security/defense/signal-intelligence-electronic-warfare/strategic-sigint/wide-area-reconnaissance-comint-/wide-area-reconnaissance-comint-overview_233130.html [Accessed: August 20, 2023]
  9. 9. R&S®MP007. Portable direction finding system. 2023. Available from: https://www.rohde-schwarz.com/ae/products/aerospace-defense-security/outdoor/rs-mp007-portable-direction-finding-system_63493-59457.html [Accessed: October 20, 2023]
  10. 10. Terzić M, Đekić D, Stanojević B. Contribution to the improvement of protection of military units from radio-controlled improvised explosive devices in multinational operations. In: 23rd DQM International Conference ICDQM-2020; June 25-26, 2020, Prijevor, Serbia. 2020. pp. 381-390
  11. 11. JFC NAPLES/CIED, CIED_DtD_Jammers.pptx, DoP 5-7 Jun 2018, slide 7, 8
  12. 12. AARTOS Drone Detection System. 2023. Available from: https://www.radiansa.com/en/security/AARTOS-drone-detection-system.htm [Accessed October 10, 2023]
  13. 13. Aaronia AARTOS DDS. 2023. Available from: http://crd.yerphi.am/files/Aaronia_AARTOS-Drone-Detection-System_broshure.pdf [Accessed: October 10, 2023]
  14. 14. Corporate report Counter- Terrorism and Security. 29 Nov 2023. Available from: https://www.gov.uk/government/publications/dstls-divisions/counter-terrorism-and-security [Accessed: December 10, 2023]
  15. 15. Countering terrorism. 05 Dec 2023. Available from: https://www.nato.int/cps/ru/natohq/topics_77646.html [Accessed: December 10, 2023]

Written By

Miroslav Terzić

Submitted: 23 October 2023 Reviewed: 26 October 2023 Published: 21 December 2023