Battlespace technologies : network-enabled information dominance /

The era of mechanized warfare is rapidly giving way to the battle for information superiority - enabled by electronic technologies that provide data for detailed analysis of enemy forces and capabilities. Supported with over 400 four-color photographs and illustrations, this new book is written and...

Full description

Bibliographic Details
Main Author: Deakin, Richard S. (Author)
Format: Book
Language:English
Published: Boston : Artech House, ©2010
Edition:1st ed
Series:Artech House intelligence and information operations series
Subjects:
Table of Contents:
  • Battlespace Technologies: Network-Enabled Information Dominance; Contents; Acknowledgments; Chapter 1: Introduction; The changing pace of warfare; Increasingly diverse challenges and threats in the information age; The strategic context; Information and influence: the new weapons of war; The role of electronic combat systems in supporting information operations; From data to decision: the role of sensors in networked decision making; Networked warfare: myth and reality; Adapting to networked warfare; References; Endnote; Chapter 2: Principles and Evolution of Network-Enabled Warfare
  • List of Acronyms and AbbreviationsAbout the Author; Index
  • Networked communications, broadcast systems, and data linksData link principles; Tactical data links; Instant messaging and chat systems; Collaborative networks; Network broadcast systems; References; Endnotes; Chapter 5: Future Trends in Network-Enabled Capabilities; Data collection and sensing; Data transportation and networking; Data analysis and interpretation; Networked decision making and C2; Effects systems; Platforms and hardware; Doctrinal aspects; References; Appendix A: Western Coalitions; European Union (EU); Western Economic Union (WEU); Euro-Atlantic Partnership Council
  • Organization on Security and Cooperation in Europe (OSCE)North Atlantic Treaty Organization (NATO); United Nations (UN); Other international alliance organizations; Appendix B: Link-16 Network Message Sets and Network Participation Groups; Link-16 network participation groups; Appendix C: Modulation Techniques; Analog modulation; Amplitude modulation (AM); Frequency modulation (FM); Phase modulation (PM); Digital modulation; Appendix D: Frequency Classifications; Radio Society of Great Britain; Appendix E: The Kill Chain; References; Appendix F: The Defend Chain; Endnote
  • Setting the scene for network-enabled capabilitiesThe utility of network-enabled capability; Intelligence, surveillance, and reconnaissance (ISR); Intelligence, surveillance, target acquisition, and reconnaissance(ISTAR); The impact of NEC on military doctrine and capabilities; References; Endnotes; Chapter 3: NEC Concepts; Core NEC themes; NEC vulnerability; References; Endnotes; Chapter4: NEC Techniques and Technologies; Data fusion; Applications of data and information fusion; Radio communications; Underwater data links and communications; Software-defined radios