Defining Critical Technologies For Special Operations by Major Lawrence W. McLaughlin
Author:Major Lawrence W. McLaughlin [McLaughlin, Major Lawrence W.]
Language: eng
Format: epub
ISBN: 9781782899822
Barnesnoble:
Publisher: Tannenberg Publishing
Published: 2015-11-06T00:00:00+00:00
Figure 3.2 GPS Calculations From Ref. Alterman, 1995, p. 54.
GPS signals are vulnerable and becoming more vulnerable as companies such as Aviaconversia and others develop cheaper and smaller jammers. As we have just seen, these current jammers can be defeated, but is SOF effectively using these techniques to minimize their exposure to intentional interference of the GPS signals? The following paragraphs hope to answer this question.
As previously noted, GPS vulnerability can be reduced through the proper use of encryption which permits use of the P(Y) code which not only increases accuracy, but is harder to jam once the P(Y) code is acquired. By sampling SF, STS, SEAL, and SOF aviation units, I have found that all the units surveyed have access to and use GPS units designed for military use, therefore, have the ability to receive the P(Y) code. There are individuals who carry commercial GPS units as part of their personal gear, but I found no indication that the commercial units were being used as a primary navigation aid; they are only carried for personal use in an emergency or survival situation. Although SOF units have access to military GPS units capable of encryption, are the operators taking advantage of this added capability?
Overall, SOF units are taking advantage of the added capability of encryption to receive the P (Y) code. Most of the operators interviewed stated that the units used in the field are usually keyed. Although it appears that the GPS units are generally keyed, there is no indication that this is required in accordance with standard operating procedures or regulations. In addition, the operators are not fully aware of the importance of obtaining and maintaining the P-code during operations. Most operators were aware of increased accuracy, but most were not aware of the increased anti-jam capabilities that the P-code provided. By not realizing the full advantage of the encrypted GPS signal, less emphasis may be placed on proper encryption, possibly undermining the mission should jamming become a factor.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
| Africa | Americas |
| Arctic & Antarctica | Asia |
| Australia & Oceania | Europe |
| Middle East | Russia |
| United States | World |
| Ancient Civilizations | Military |
| Historical Study & Educational Resources |
Machine Learning at Scale with H2O by Gregory Keys | David Whiting(4183)
Never by Ken Follett(3793)
Fairy Tale by Stephen King(3220)
The Man Who Died Twice by Richard Osman(2997)
Oathbringer (The Stormlight Archive, Book 3) by Brandon Sanderson(2881)
Will by Will Smith(2793)
Rationality by Steven Pinker(2291)
The Dark Hours by Michael Connelly(2243)
Can't Hurt Me: Master Your Mind and Defy the Odds - Clean Edition by David Goggins(2228)
The Dawn of Everything: A New History of Humanity by David Graeber & David Wengrow(2122)
Friends, Lovers, and the Big Terrible Thing by Matthew Perry(2119)
Principles for Dealing With the Changing World Order: Why Nations Succeed and Fail by Ray Dalio(1974)
HBR's 10 Must Reads 2022 by Harvard Business Review(1777)
A Short History of War by Jeremy Black(1762)
Go Tell the Bees That I Am Gone by Diana Gabaldon(1687)
515945210 by Unknown(1599)
A Game of Thrones (The Illustrated Edition) by George R. R. Martin(1589)
Kingdom of Ash by Maas Sarah J(1526)
443319537 by Unknown(1470)