22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

72 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

<strong>and</strong> problems in ensuring effective work of radio-frequency (RF) jammer. Moreover<br />

description of designed RCIED jamming system conception was presented.<br />

II. IED technology<br />

An IED is a homemade bomb, constructed <strong>and</strong> deployed in improvised manner<br />

incorporating destructive, lethal, noxious, pyrotechnic or incendiary chemicals<br />

<strong>and</strong> designed to destroy or incapacitate personnel or vehicles. In principle, any<br />

explosive weapon not originated from an industrial production line may be classified<br />

as an IED [1][5].<br />

Historically, there is nothing new about IEDs which have been used in terrorist<br />

actions for a long time or in unconventional warfare by guerrillas during World<br />

War II. Recently wide use of IEDs is a main threat for Coalition Forces in Afghanistan.<br />

IEDs are extremely diverse in design, <strong>and</strong> may contain many types of initiators,<br />

detonators, penetrators, <strong>and</strong> explosive loads. This kind of devices is very effective<br />

as they are made of elements that are easily available at low cost. Generally IED<br />

consists of five components: a switch/trigger (activator), an initiator (fuse), container<br />

(body), charge (explosive filler), <strong>and</strong> a power source (battery) if applicable. IEDs<br />

can be produced in different sizes, functioning methods, containers, <strong>and</strong> delivery<br />

methods. IEDs can utilize commercial or military explosives, homemade explosives,<br />

or ordnance components. IEDs are triggered by various methods, including<br />

radio remote control, infra-red or magnetic triggers, pressure-sensitive bars or trip<br />

wires [3]. However, now there is a shift to more sophisticated detonation devices,<br />

such as high-powered cordless phones or GSM h<strong>and</strong>sets.<br />

IEDs can be divided into three main categories, depending on the explosion<br />

initiation:<br />

• Victim Operated Devices – triggered by victims movement or pressure;<br />

• Timed – triggered with the use of different kinds of timers;<br />

• Comm<strong>and</strong> Operated – triggered by pulling out a safety pin using gossamerlike<br />

wires/ropes, by generating an electric pulse over comm<strong>and</strong> wire or by<br />

sending a trigger comm<strong>and</strong> over radio transmitter.<br />

RCIED are classified to the Comm<strong>and</strong> Operated group, where the trigger<br />

comm<strong>and</strong> is send by a radio transmitter to a hidden bomb attached to a receiver<br />

linked to an electrical firing circuit. For this purpose, as radio transmitter can be<br />

used a broad range of equipment from household gadget like a key fob car alarm<br />

switch, remote controlled toys or a wireless doorbell buzzer to more sophisticated<br />

pagers, CBs, cellular phones, modified HF/VHF/UHF transceivers <strong>and</strong> satellite<br />

phones. Frequency range used by these devices is very diverse. RCIED triggers use<br />

mainly commercial frequency b<strong>and</strong>s listed in [1].<br />

The simplest method that can prevent the activation of RCIED is disrupting RC<br />

triggers by blocking the radio signal. For this purpose jamming techniques are<br />

used. Effective jamming of the whole frequency range used by RCIED is practically

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!