"In the famous "Suter" series of electronic attach experiments as Nellis AFB Nev. a data stream was fired into an integrated air defense network's antenna's by an EC-130 Compass Call electronic attack aircraft. " So saith Aviation Week.
Cool. Couple of years ago Aviation Week reported that the Israeli's used this technique in the air strike on the Syrian nuclear reactor.
Couple of things to wonder at. How do radio frequency data streams get inside the "integrated air defense network"? The network antennas are radar antennas which are mostly analog, mixed with Identification Friend or Foe (IFF) system. Transmitting analog signals can confuse the radar, but the process is called jamming and has been around since WWII. Sending phony IFF digital signals is called spoofing, and has been around just about as long. Neither process would be called "firing a data stream" by any one in USAF.
"Firing a data stream into network antenna's" implies the airborne attackers are getting into the digital data links between the radar sites and the fighter/missile direction centers and inserting false targets, or erasing real targets, or doing other kinds of mischief. It's a neat trick, but the counter measure is simple, use land lines or optical fiber for the data links. Don't use radio data links. No way can radio frequency energy emitted by aircraft get into plain old telephone wires or optical fibers.
I dare say some air defense systems use radio data links 'cause you just have to aim the antennas and switch on the power and your data is linking, out for maybe 50 miles. Might take a week to string wire or fiber that far. But was I in charge, I'd order the boys out to string the wire or fiber the day I arrived in theater, and after a week, I would have secure data links. And I would no longer be transmitting "here I am, come bomb me" over the air. For a radar site the extra emissions probably don't matter, but a fighter/missile direction center, fighter base or missile site could maintain radio silence and become harder to find.