<style>
@import url('https://fonts.googleapis.com/css2?family=Inter:wght@400;500;600;700;800&display=swap');
body { font-family: 'Inter', sans-serif; }
h1 { color:#1e3a5f; font-weight:800; letter-spacing:-0.01em; }
h1::after { content:''; display:block; width:2.5em; height:4px; background-color:#1f6098; border-radius:2px; margin-top:0.4em; margin-bottom:0.5em; }
</style>

# Lesson 36 Flashcards

Click a question to reveal the answer.

<details>
<summary><strong>1. What is an Integrated Air Defense System (IADS)?</strong></summary>
<div class="card-answer">

An IADS is a **networked system of systems** — it combines detection sensors, communications, command and control (C2) nodes, and weapon systems so they all work together toward a single goal: detect, track, and destroy airborne threats.

The key word is *integrated*. A lone radar or missile battery is far less dangerous than one that's sharing data with a dozen other sensors and a C2 node that's coordinating everything in real time. Think of it like the difference between one security guard and a full camera-and-dispatch network.

</div>
</details>

<details>
<summary><strong>2. Why is it harder to defeat an IADS than a single radar?</strong></summary>
<div class="card-answer">

Because defeating one component doesn't defeat the system.

Imagine you fly a route that keeps you below the radar horizon of one early warning radar — great. But that same route might put you in clear view of a second radar operating on a different frequency band, which passes your track to a C2 node, which hands you off to a missile battery. You never saw that connection coming.

This is why survivability planning has to treat the IADS as a *system*, not as a collection of individual threats.

</div>
</details>

<details>
<summary><strong>3. What are the major components of an IADS?</strong></summary>
<div class="card-answer">

Think of it in four layers:

- **Sensors** — early warning radars (long range), acquisition radars (refine the picture), tracking radars (engagement-quality accuracy), and passive sensors that don't emit at all
- **Communications links** — fiber, tactical data links, commercial wireless; this is the nervous system that connects everything
- **C2 nodes** — the brain; they fuse data from multiple sensors and direct the response
- **Weapon systems** — SAMs, AAA, airborne interceptors; these are the end of the kill chain

Remove any one of these and the system degrades. Remove the C2 node and the whole thing may fall apart.

</div>
</details>

<details>
<summary><strong>4. What is the IADS kill chain, and why should you memorize it?</strong></summary>
<div class="card-answer">

The kill chain is the sequence of steps that must all succeed for an engagement to happen:

**Detect → Identify → Track → Correlate/Fuse → Decide → Assign → Guide → Assess**

You should know this because every survivability technique you'll learn maps to breaking one of these steps. Low observability targets Step 1. Jamming targets Steps 1, 3, and 7. Cyber operations can target Steps 4 and 5. Knowing the chain tells you *where* your tools apply.

</div>
</details>

<details>
<summary><strong>5. Why is breaking the kill chain early so much better than breaking it late?</strong></summary>
<div class="card-answer">

If you break the chain at **Step 1 (Detect)**, the IADS never knows you exist. Steps 2 through 8 simply don't happen.

If you break the chain at **Step 7 (Guide)**, the system has already detected you, identified you, built a track, fused data from multiple sensors, made a decision to engage, assigned a weapon to you, and launched it. You're now surviving an active missile engagement — which is a much worse place to be.

The earlier you break the chain, the less the enemy knows about you and the fewer resources they commit to killing you.

</div>
</details>

<details>
<summary><strong>6. What is Acceptable Level of Detection (ALD)?</strong></summary>
<div class="card-answer">

ALD answers the question: **how much can the enemy see us and still have the mission succeed?**

For some missions, any detection is unacceptable — an ISR platform that gets detected may lose its intelligence value entirely because the adversary changes behavior. For others, detection is fine as long as the platform survives and completes the objective.

ALD is set by the mission planner and can be expressed as a detection probability threshold, an RCS limit, a time-detected limit, or a detection range. The level (LOW / MEDIUM / HIGH) doesn't describe safety — it describes tolerance. A HIGH ALD mission isn't safe; it just means the commander is willing to accept more detection to get the job done.

</div>
</details>

<details>
<summary><strong>7. What is Acceptable Level of Risk (ALR)?</strong></summary>
<div class="card-answer">

ALR answers the question: **how much can we afford to lose?**

This is the commander's predefined threshold for loss or mission degradation. A LOW ALR means aircraft losses are not acceptable — you need to suppress or degrade serious threats before going in. A HIGH ALR means the mission is important enough that the commander will accept up to 50% probability of loss to get it done.

ALR is a deliberate decision, not an accident. It forces planners to be honest about the risk they're asking aircrews to accept.

</div>
</details>

<details>
<summary><strong>8. What's the difference between ALD and ALR, and why does it matter?</strong></summary>
<div class="card-answer">

They sound similar but measure completely different things:

- **ALD** — how much *detection* can we tolerate?
- **ALR** — how much *loss or mission failure* can we tolerate?

A large strike package might have a MEDIUM ALD (detection is okay, we have jamming and escorts) but a LOW ALR (losing aircraft is politically unacceptable). Conflating the two leads to bad planning — "we're willing to be detected" does not mean "we're willing to lose jets."

Always ask both questions separately.

</div>
</details>

<details>
<summary><strong>9. Why do IADS designers use radars across multiple frequency bands?</strong></summary>
<div class="card-answer">

Because no single band is best at everything, and no single technique defeats all bands.

Lower frequencies (VHF, UHF) have long wavelengths that are harder to defeat with shaping-based low-observability designs. Higher frequencies (X, Ku) give finer resolution for precise tracking and weapons guidance. By mixing bands, the IADS designer makes it extremely difficult for any one platform or technique to go undetected by *all* sensors simultaneously.

Think of it like a filter bank — each bandpass catches what the others miss.

</div>
</details>

<details>
<summary><strong>10. What is SWaP, and how does it drive jammer planning?</strong></summary>
<div class="card-answer">

SWaP stands for **Size, Weight, and Power** — the physical constraints on any airborne system.

A jammer can't be infinitely large, heavy, or power-hungry. That means it can't cover every frequency band at full power against every threat simultaneously. The planner has to choose: which threats get jammed, and which don't?

This is why prioritization matters. A jammer spread thin across every possible emitter may be ineffective against the ones that actually matter most.

</div>
</details>

<details>
<summary><strong>11. What is Pareto analysis, and how does it apply to jammer planning?</strong></summary>
<div class="card-answer">

Pareto's principle — the 80/20 rule — says that a small number of inputs typically drive the majority of outcomes. In jammer planning: **a small number of threat emitters will drive the majority of your detection and engagement risk.**

Rather than spreading jammer resources thinly against every radar on the threat board, Pareto thinking says: find the two or three emitters that are most dangerous to your mission and concentrate your capability there. Ask which threats most strongly drive your ALD. Ask which ones most strongly drive your ALR. Those are your targets.

</div>
</details>

<details>
<summary><strong>12. What are the three primary ways an attacker gains cyber access?</strong></summary>
<div class="card-answer">

- **Network hacking** — exploiting vulnerabilities in internet-connected or network-accessible systems; once in, the attacker moves laterally, escalates privileges, and establishes persistence
- **Physical access** — inserting malicious media or hardware directly on-site; this bypasses all network-layer defenses entirely (see: Stuxnet)
- **Supply chain compromise** — malicious hardware or software introduced during manufacturing, transport, or maintenance, often remaining dormant until triggered

The key takeaway: "air-gapped" doesn't mean safe, and firewalls only address one of these three vectors.

</div>
</details>

<details>
<summary><strong>13. What is the CIA Triad, and why does every property matter?</strong></summary>
<div class="card-answer">

The CIA Triad is the foundation of cybersecurity design:

- **Confidentiality** — only authorized users can access the information
- **Integrity** — the information can't be modified without authorization
- **Availability** — the information is accessible when the right person needs it

All three matter because losing any one of them is a problem. A perfectly confidential, perfectly intact system that goes offline in combat is useless. A perfectly available system whose data has been silently corrupted by an adversary may be *worse* than useless — you're now making decisions based on bad information and don't know it.

The hardest part of real design is balancing all three under cost and operational constraints.

</div>
</details>

<details>
<summary><strong>14. What is the difference between authentication and authorization?</strong></summary>
<div class="card-answer">

These are two separate security steps that often get confused:

- **Authentication** answers "who are you?" — inserting your CAC and entering your PIN proves your identity
- **Authorization** answers "what are you allowed to do?" — the system checks your role and grants you read-only access to one database and nothing else

Authentication has to happen first. But passing authentication doesn't mean you can do anything — authorization is the second gate. Both are required for a secure system, and they provide complementary protections.

</div>
</details>

<details>
<summary><strong>15. Why is a single RCS value insufficient for mission planning?</strong></summary>
<div class="card-answer">

Because RCS is not a fixed number — it changes dramatically with aspect angle.

A platform might have an extremely small RCS head-on (nose to radar) but a much larger RCS from the beam (side-on). The "fuzzball" RCS — an average across all angles — can look great on paper while hiding the fact that a specific segment of your route exposes a vulnerable aspect to an active fire-control radar at exactly the wrong moment.

Mission planning has to account for aspect angle relative to every significant threat emitter along the entire ingress and egress. The geometry of each specific encounter is what determines survivability, not the average.

</div>
</details>
