Table of
Contents

Previous
Section

Next
Section

Doc Info &
Download

CHAPTER 4 (FM 24-33)

Chapter 4

Meaconing, Intrusion, Jamming, and Interference Reporting

4-1. Introduction

a. Meaconing, intrusion, and jamming are deliberate actions intended to deny an enemy the effective use of the electromagnetic spectrum. Interference is the unintentional disruption of the effective use of the electromagnetic spectrum by friendly, enemy, or atmospheric sources. Collectively, meaconing, intrusion, jamming, and interference incidents are referred to as MIJI incidents.

b. MIJI reports document all disruptions of--

Disruptions caused by equipment malfunctions or destruction are exceptions. The MIJI report serves two purposes. First, it provides information to the tactical commander allowing timely decisions to be made to overcome the MIJI problem. Second, it provides a historical record of MIJI incidents from which appropriate ECCM techniques and measures can be developed. This helps us to counter future attempts by the enemy to deny us the effective use of the electromagnetic spectrum.

c. This chapter gives instructions for completing MIJI reports for communications and noncommunications emitters. To fulfill the two purposes stated above, there are two kinds of MIJI reports. The MIJIFEEDER voice template message is a brief report of a MIJI incident. It serves as a decision-making tool for the command. The MIJIFEEDER record message is a complete report of a MIJI incident. This provides a historical record from which appropriate ECCM techniques and measures can be developed. DA Pam 25-7 gives instructions for completing the MIJI reports.

4-2. Terms

a. Meaconing. Meaconing is a system of receiving radio beacon signals from NAVAIDs and rebroadcasting them on the same frequency to confuse navigation. The enemy conducts meaconing operations against us to prevent our aircraft and ships from arriving at their intended targets or destinations. Successful enemy meaconing causes--

b. Intrusion. Intrusion is intentionally inserting electromagnetic energy into transmission paths in any manner. The object is to deceive equipment operators or cause confusion. The enemy conducts intrusion operations against us by inserting false information into our receiver paths. This false information may consist of voice instructions, ghost targets, coordinates for fire missions, or even rebroadcasting of prerecorded data transmissions.

c. Jamming. Jamming is deliberately radiating, reradiating, or reflecting electromagnetic energy to impair the use of electronic devices, equipment, or systems. The enemy conducts jamming operations against us to prevent us from effectively employing our radios, radars, NAVAIDs, satellites, and electro-optics.

d. Interference. Interference is any electrical disturbance that causes undesirable responses in electronic equipment. As a MIJI term, interference refers to the unintentional disruption of the use of radios, radars, NAVAIDs, satellites, and electro-optics. This interference may be of friendly, enemy, or atmospheric origin. For example, a civilian radio broadcast may interfere with military communications.

4-3. MIJIFEEDER Voice Template

a. Purpose and use. The MIJIFEEDER voice template has only the information needed to adequately inform the tactical commander of the incident in a timely manner. It is used to make evaluation of enemy actions or intentions easier and to provide data to implement appropriate counter-countermeasures.

b. Reporting procedure.

(1) The MIJIFEEDER voice template is forwarded through the chain of command to the unit operations center by the equipment operator experiencing the MIJI incident. The report should be forwarded using the most expeditious secure communications means available.

(2) Upon receiving the MIJIFEEDER voice template, the signal officer--

(a) Coordinates the unit response to the MIJI incident with the unit operations officer, intelligence officer, fire support officer, and unit commander(s), as applicable and appropriate.

(b) Consolidates the voice templates referring to the same MIJI incident.

(c) Forwards one MIJIFEEDER voice template report for each MIJI incident through operations channels to the corps operations center or as appropriate.

This report should be accompanied by any requests for support the command needs to overcome the MIJI problem.

(d) Initiates staff action to complete the MIJIFEEDER record message as quickly as possible. (Coordination will not delay reporting the incident within 24 hours.)

(3) Upon receiving the MIJIFEEDER voice template, in the process of forwarding it through operations channels, the signal officer at each operations center takes the following actions:

(a) Provides support as requested by the unit submitting the voice template report, if possible and deemed appropriate by the command.

(b) Informs the operations officer and intelligence officer of the details of the MIJI incident.

c. Report format and contents. The MIJIFEEDER voice template has been developed for use under the JINTACCS program. It is designed to ensure interoperability on the battlefield during combined, joint, and intra-Army operations. The standardized, simple format permits the expeditious notification of appropriate action elements in time-critical situations. Only the completed and underlined areas (as appropriate) of the format are transmitted. As shown in Figure 4-1, MIJIFEEDER voice templates are self-explanatory and contain ten items of information. When the message is transmitted over nonsecure means, each line number is stated and the completed information must be encrypted. When a secure means is used, the title of each line is transmitted along with the completed information. The operator of the affected system fills out the MIJIFEEDER voice template as shown below.

Figure 4-2 is an example of a completed voice template. The circled numbers to the right of each line in Figure 4-2 correspond to extracts of the MIJIFEEDER record message format in Annex 81, DA Pam 25-7.

Figure 4-1. MIJIFEEDER voice template.

Figure 4-2. Completed MIJIFEEDER voice template.

4-4. MIJIFEEDER Record Message Report

a. Purpose and use. The MIJIFEEDER record message is a complete report of a MIJI incident. It provides a basis for developing appropriate counteraction measures to be implemented at proper command levels. AR 105-3 and DA Pam 25-7 establish the information to be included in this report. The Joint Electronic Warfare Center (JEWC) is the action agency for this report. All MIJIFEEDER record message reports initially evaluated as nonexercise should be forwarded as soon as possible to the JEWC. The JEWC uses these reports to develop trends and to evaluate foreign ECM operations. They are also used by the JEWC to recommend operational methods and equipment changes that will reduce MIJI vulnerability of our:

b. Reporting procedures.

(1) The MIJIFEEDER record message is forwarded by the signal officer of the affected unit to the JEWC SAN ANTONIO TX//OPM//through operations channels to the corps operations center. All MIJIFEEDER reports are forwarded via secure means within 24 hours of the MIJI incident.

(2) Items such as photographs, diagrams, and tape recordings, that cannot be included in the message are forwarded by other means (for example, US mail) to the JEWC/OPM, San Antonio, TX 78243-5000, as soon as possible.

(3) Each operations center receiving this report should check the contents for information that may be of use to the entire command.

c. Report format and contents. Excerpts from a joint message form and DA Pam 25-7 at Figure 4-3 illustrate the proper MIJIFEEDER record message format. The circled numbers on the joint message form correspond with the explanation in Annex 81, DA Pam 25-7. Entry lists 11, 97, and 98, referenced in the explanation column, are Appendices A, B, and C of this manual.

Figure 4-3. Sample MIJIFEEDER record message format.

Figure 4-3. Sample MIJIFEEDER record message format (continued).

Figure 4-3. Sample MIJIFEEDER record message format (continued).

Figure 4-3. Sample MIJIFEEDER record message format (continued).

Figure 4-3. Sample MIJIFEEDER record message format (continued).

Figure 4-3. Sample MIJIFEEDER record message format (continued).

Figure 4-3. Sample MIJIFEEDER record message format (continued).

Figure 4-3. Sample MIJIFEEDER record message format (continued).

Figure 4-3. Sample MIJIFEEDER record message format (continued).

Figure 4-3. Sample MIJIFEEDER record message format (continued).

4-5. Meaconing, Intrusion, Jamming, and Interference Security Classification Guide

Security classification of MIJI incidents or MIJI evaluation reports is determined principally by intent and location of the implied or stated source of the problem. Stations in combat areas or having a sensitive military mission ordinarily classify all MIJI reports.

Information Revealing:                                     Classification

a. The specific identification of an S; OADR unfriendly platform or location by country or coordinates as the source of meaconing, intrusion, or jamming incident.

b. The term meaconing, intrusion, jamming and U interference; the acronym MIJI; and that MIJI analysis is a function of the JEWC.

c. That an organization submits MIJI incident U reports.

d. Broadly stated objectives of the MIJI U program, including explanation of each of the terms that comprise the acronym MIJI.

e. Suspected meaconing, intrusion, or jamming, C; OADR but sources cannot be identified.

f. Interference when source is clearly U identified as US or friendly nation electromagnetic emitters.

g. Interference to US or friendly country C; OADR electromagnetic equipment caused by ECM exercise in unfriendly nations.

h. Interference from unfriendly radio C; OADR broadcast stations, meteorological stations, and other such fixed stations.

i. Parametric data of classified US Classify electromagnetic equipment. Refer to correspondence classification guide for the equipment equal to the security category assigned to the equipment affected.

j. Specific or general susceptibility or S; OADR vulnerability of US electronic system to foreign exploitation.