Blunting Excalibur’s edge
...
A general rule of thumb regarding GPS is that the faster the bit-per-second rate of the signal, the more precise the GPS receiver will be in determining position. C/A-code has a sequence of 1,023 bits-per-second transmitted at a rate of 1,230,000 bits-per-second meaning the C/A-code’s sequence repeats each millisecond. P-code is transmitted on the L1 and L2 signals but a key difference between P-code and C/A-code is that the former is transmitted at a rate of 12,300,000 bits-per-second; ten times faster than the latter. The higher bit-per-second rate gives more precise timelag measurement, translating into a more precise range measurement, and since the P-code is transmitted on both L1 and L2, it allows the time delay of the ionosphere to be removed. For example, C/A-code may give about 4 m of accuracy, says Douglas Loverro, President of Loverro Consulting and former Deputy Assistant Secretary of Defence for space policy in the US Department of Defense (DOD). According to Loverro, who was a key architect of the GPS system, “The P-code lets you get down to under three metres (ten feet) of accuracy.”
P-code is secured using encryption to avoid it being spoofed or jammed with the encrypted signal known as P(Y)-code. “P(Y)-code was designed with encryption to avoid the signal being spoofed and to avoid other people using the P signal who should not be,” Loverro explained.
Two things need to happen to allow a GPS receiver to use P(Y)-code. The moment a receiver is switched on, it must first acquire the C/A-code. Once this is done, it can then begin to receive the P(Y)-code. This can be a potential disadvantage if C/A-code signals are being jammed locally, Loverro
noted. Any GPS receiver in range of the jamming will simply be unable to receive the C/A-code, let alone the P(Y)-code. It is noteworthy that some GPS receivers currently do have the ability to receive P(Y)-code without obtaining the C/A-code first.
To use the encrypted P(Y) code, users need to have a decryption key they can load into their GPS receivers, Loverro added. The key decrypts the incoming P(Y)-code allowing the receiver to use that signal. The US DOD provides the authorisation for users to receive the P(Y) keys and to load
them into their devices. Given the jamming that the Ukrainian military has suffered when it has used GPS-guided weaponry, it is unclear if they were provided with a P(Y)-code capability in these weapons’ GPS receivers. This is perhaps not surprising. Access to P(Y)-code is reserved for the US’s NATO Allies on a case-by-case basis, according to Loverro.
The DOD is understandably concerned about the security aspects of sharing P(Y) codes with Ukraine lest decryption keys fall into Russian hands P(Y)-code shortcomings are being addressed with the advent of M-Code, which is yet to enter service, but could prove to be a potent enhancement.
Firstly, M-Code is transmitted using L1 and L2 signals. The signal will be transmitted with more power to provide added resistance to jamming. It also does not need to connect with C/A-code before being used. M-Code also ‘plays nice’ with the existing C/A- and P(Y)-codes and, like P(Y)-code, M-Code is encrypted.
The good news is that US and allied militaries are now embracing M-Code. The bad news is the Ukrainian military is unlikely to be gain access for similar reasons to the P(Y)-code quandary. Nonetheless, Russian EW cadres may soon find out that switching on their GPS jammers maybe akin to signing their own death warrants. The Defence Post reported in May that Scientific Applications and Research Associates (SARA) received a contract worth USD23.6 million for a JDAM Home-On Jam (HOJ) capability. Specifically, this will be an augmentation to the GPS receivers used by the GBU-62 JDAM-ER (extended range) variant of the guidance kit.
Details on how the HOJ capability will work are scant, but it is possible that the GPS receiver will be programmed to recognise an abnormal GPS signal. As noted above, GPS jamming typically relies on using a much stronger fake PNT signal to wash out the relatively weak true signal.
Should the receiver detect a jamming transmission, it will ascertain the signal’s bearing. The munition will guide itself along the bearing until it reaches the signal’s point of origin, announcing its arrival with a bang. This tactic is akin to that used against hostile ground-based air surveillance and fire control/ground-controlled interception radars by anti-radiation missiles.
While Kyiv is unlikely to receive P(Y)-code keys, or even access to M-Code any time soon, Ukraine’s military has been supplied with JDAM-ER weapons. Reports regarding the HOJ capability say this will be made available to Ukraine, with the work being completed by October 2025. While this date appears some time away, it may be possible that upgraded JDAM-ERs will be drip-fed as built into the Ukrainian military. Looking further ahead, perhaps similar improvements may be added to HIMARS and Excalibur in the future. Either way, such improved weapons will give Russian EW cadres a Hobson’s choice: to switch on their jammers to protect their troops and assets against GPS-guided weapons? Or switch off their jammers and save themselves but possibly doom your comrades? How Russian forces will resolve this dilemma remains to be seen.
https://euro-sd.com/wp-content/uploads/ ... 7_2024.pdf