The Pentagon’s Electronic Warfare Program: Maximum Control of the Entire Electro-Magnetic Spectrum

"Information Operation Roadmap "

In 2003, then Secretary of Defence Donald Rumsfeld signed a document called the Information Operation Roadmap which outlined, among other things, the Pentagon’s desire to dominate the entire electromagnetic spectrum.

If you are unfamiliar with this document, more detail can be found in a previous article here.

Dominate

From the Information Operation Roadmap:

“We Must Improve Network and Electro-Magnetic Attack Capability. To prevail in an information-centric fight, it is increasingly important that our forces dominate the electromagnetic spectrum with attack capabilities.” [emphasis mine] – 6

“Cover the full range of EW [Electronic Warfare] missions and capabilities, including navigation warfare, offensive counterspace, control of adversary radio frequency systems that provide location and identification of friend and foe, etc.” – 61

“Provide a future EW capability sufficient to provide maximum control of the entire electromagnetic spectrum, denying, degrading, disrupting, or destroying the full spectrum of globally emerging communication systems, sensors, and weapons systems dependant on the electromagnetic spectrum.” [emphasis mine] – 61

“DPG [Defense Planning Guidance] 04 tasked USD(AT&L) [Under Secretary of Defense for Acquisition, Technology and Logistics], in coordination with the CJCS [Chairman of the Joint Chiefs of Staff] and Services, to develop recommendations to transform and extend EW capabilities, … to detect, locate and attack the full spectrum of globally emerging telecommunications equipment, situation awareness sensors and weapons engagement technologies operating within the electromagnetic spectrum.” [emphasis mine] – 59

Stealthy Platforms Above Your House

“Develop a coherent and comprehensive EW [Electronic Warfare] investment strategy for the architecture that… Pay particular attention to:

– (U) Projecting electronic attack into denied areas by means of stealthy platforms… As a matter of priority, accelerates joint development of modular EW payloads for the Unmanned Combat Aerial Vehicle.” [emphasis mine] – 62

It is interesting to see the mention of stealthy platforms like unmanned aerial vehicles (UAVs) because they are now patrolling both the Canadian and Mexican borders of the United States and will soon be patrolling the arctic. With funding supplied by Homeland Security, US police departments are also using UAVs to spy on the citizens below. A couple of examples are Sacramento, California and…

“one North Carolina county is using a UAV equipped with low-light and infrared cameras to keep watch on its citizens. The aircraft has been dispatched to monitor gatherings of motorcycle riders at the Gaston County fairgrounds from just a few hundred feet in the air–close enough to identify faces–and many more uses, such as the aerial detection of marijuana fields, are planned.”

The Electronic Battlespace

“The ACTD [Advanced Concept Technology Demonstration] should examine a range of technologies including a network of unmanned aerial vehicles and miniaturized, scatterable public address systems for satellite rebroadcast in denied areas. It should also consider various message delivery systems, to include satellite radio and television, cellular phones and other wireless devices and the Internet.” [emphasis mine] – 65

“Exploits other transformational EW initiatives, including use of the E-Space Analysis Center to correlate and fuse all available data that creates a real time electronic battlespace picture.” [emphasis mine] – 62

How exactly do you create a real time electronic battlespace picture? And where exactly is the battlespace? A very similar statement was made in the Project for a New American Century document Rebuilding America’s Defenses published in September of 2000 (more about this document here and here.)

“New classes of sensors – commercial and military; on land, on and under sea, in the air and in space – will be linked together in dense networks that can be rapidly configured and reconfigured to provide future commanders with an unprecedented understanding of the battlefield.” – pg 59

An article written by Mark Baard from Parallelnormal.com sheds some light on this subject.

“Philadelphia, San Francisco, Houston, and Providence, R.I. are among the cities partnering with private companies and the federal government to set up public broadband internet access. Providence used Homeland Security funds to construct a network for police, which may be made available to the public at a later date…”

“But even if the cities fail to complete their Wi-Fi projects, the military will be able to set up wireless networks within hours, perhaps even faster.”

“The DOD [Department of Defense], which is in the middle of joint urban war-games with Homeland Security and Canadian, Israeli and other international forces, is experimenting with Wi-Fi networks it can set up on the fly.”

“According to a recent DOD announcement for contractors, soldiers will be able to drop robots, called LANdroids… when they arrive in a city. The robots will then scurry off to position themselves, becoming nodes for a wireless communications network. (Click here to download a PDF of the DOD announcement.)”

“The Wi-Fi antennae dotting the urban landscape will serve not only as communications relays, but as transponders that can pinpoint the exact positions of of individual computers and mobile phones – a scenario I described in the Boston Globe last year.”

“In other words, where GPS loses site of a device (and its owner), Wi-Fi will pick up the trail.”

“The antennae will also relay orders to the brain-chipped masses, members of the British Ministry of Defense and the DOD believe.”

Conclusion

My next article will examine the Pentagon’s desire to “fight the net” as outlined in the Information Operation Roadmap. Also, I will examine the use of psychological operations or PSYOP and highlight the complete lack of limits to the use of all these information operations, be it on domestic American or foreign audiences.


Articles by: Brent Jessop

Disclaimer: The contents of this article are of sole responsibility of the author(s). The Centre for Research on Globalization will not be responsible for any inaccurate or incorrect statement in this article. The Centre of Research on Globalization grants permission to cross-post Global Research articles on community internet sites as long the source and copyright are acknowledged together with a hyperlink to the original Global Research article. For publication of Global Research articles in print or other forms including commercial internet sites, contact: [email protected]

www.globalresearch.ca contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to our readers under the provisions of "fair use" in an effort to advance a better understanding of political, economic and social issues. The material on this site is distributed without profit to those who have expressed a prior interest in receiving it for research and educational purposes. If you wish to use copyrighted material for purposes other than "fair use" you must request permission from the copyright owner.

For media inquiries: [email protected]