Professional Documents
Culture Documents
Electronic Warfare
Ref: Moir & Seabridge 2006, Chapter 6 Dr Ron Smith
Outline
1.
2. 3.
4.
5. 6. 7.
Introduction Signals Intelligence (SIGINT) Electronic Support Measures (ESM) Electronic Countermeasures (ECM) Defensive Aids Jam resistant radar design Exercises
EEE381B Electronic Warfare - 2
Winter 2009
1. Introduction
Winter 2009
EEE381B
Electronic Warfare - 3
Electronic warfare (EW) plays both a strategic and tactical role in any modern military operation. Assets are employed in supportive, protective and offensive measures. Specific capabilities and equipment specifications are usually highly classified.
Winter 2009
EEE381B
Electronic Warfare - 4
Winter 2009
EEE381B
Electronic Warfare - 5
The picture below depicts the typical, continuous cycle of intelligence gathering and application.
Winter 2009
EEE381B
Electronic Warfare - 6
1.4 EW elements
Winter 2009
EEE381B
Electronic Warfare - 7
intelligence (HUMINT) image intelligence (IMINT) photographic intelligence (PHOTINT) signals intelligence (SIGINT)
Winter 2009
EEE381B
Electronic Warfare - 8
2.1 COMINT
Winter 2009
EEE381B
Electronic Warfare - 9
2.2 ELINT
Electronic intelligence operations involve the collection of the source and direction of arrival (DOA) of a broad range of radar emitters. Signals are analyzed for such things as:
frequency, pulse and PRF, signal strength, modulation schemes, scan parameters, and usage patterns.
Winter 2009
EEE381B
Electronic Warfare - 10
A typical airborne intelligence operation involves highflying specialized aircraft gathering emissions data on long patrol flights along national borders and outside missile engagement range.
In the 1980s and 1990s Canada employed CE144 Challengers in a national ELINT role
one specially equipped aircraft commonly referred to as the Manitou was operated by the CF.
Winter 2009
EEE381B
Electronic Warfare - 11
Winter 2009
EEE381B
Electronic Warfare - 12
Similar to an ELINT system, an Electronic Support Meausres (ESM) systems role is to detect and classify received radar emitters. The difference being that an ESM is generally employed tactically (for use against immediate threats). An effective ESM will identify the location, type of transmitter, mode of operation (search, track, engaged) and level of threat of each emitter. Real-time signal analysis is performed against received signals, comparing them with known emitter characteristics stored in its threat library
Winter 2009
Electronic support measures may be employed in formation support role aircraft such as that of an AWACs or a coastal patrol aircraft. Alternatively, it may be employed tactically in a radar warning mode such as in an attack aircraft. Canadas CP140 Aurora Incremental Modernization Program (AIMP) includes the fitment of the AN/ALQ-217 ESM suite in block 3 of the program. This suite will be used in both formation support and self-defence roles. ~$50M (US) for 24 systems
Winter 2009
EEE381B
Electronic Warfare - 14
4. Electronic Countermeasures
Electronic countermeasures (ECM) involve taking actions to interfere with or deceive the enemys radar system. Electronic counter-countermeasures (ECCM) involve taking actions to interfere with or deceive the countermeasures so as to restore radar use.
and
Winter 2009
EEE381B
Electronic Warfare - 15
Active noise jamming involves the transmission of high power white noise directed at the enemy radar with the intent of interference. Effectiveness is based upon such parameters as:
Winter 2009
EEE381B
Electronic Warfare - 16
4.1.1
Winter 2009
EEE381B
Electronic Warfare - 17
4.1.1.1
Winter 2009
EEE381B
Electronic Warfare - 18
4.1.2
Burnthrough range
With any noise jamming technique there is some range at which the strength of the radar echo becomes stringer than the jamming noise, this is known as the burnthrough range.
The range of the radar return is a function of 1/R4, whereas the range of the jamming signal is a function 1/R2. Therefore the closer the jammer gets to the radar, the more likely it is that the radar breaks through the noise signal; this is depicted on the graph in the next slide. A radar with low gain and poor sidelobes is susceptible to jamming, conversely a high power noise jammer becomes a target and is susceptible to home-on-jamming attacks.
EEE381B Electronic Warfare - 19
Winter 2009
Winter 2009
EEE381B
Electronic Warfare - 20
Radar deception techniques are more sophisticated and can often be achieved without the radar (operator) knowing that jamming is being used. Typical techniques include:
false
target generation range gate stealing velocity gate stealing angle track breaking
Winter 2009
EEE381B
Electronic Warfare - 21
By knowing the radar pulse parameters, false targets can be injected into a radar by replicating or repeating well timed pulses so as to appear as spurious random targets. Range gate stealing (RGS) is a similar deception jamming technique that begins by transmitting a strong enough signal to mask the true radar return. Once this is achieved the pulse is walked off the echo range until the radar loses accurate range information. Jamming may then stop and repeat the process making it difficult for the radar to gain lock.
EEE381B Electronic Warfare - 22
Winter 2009
Winter 2009
EEE381B
Electronic Warfare - 23
Winter 2009
EEE381B
Electronic Warfare - 24
Winter 2009
EEE381B
Electronic Warfare - 25
Velocity gate stealing (VGS) works much the same as range gate stealing except that the transmitted jamming signal contains false Doppler frequency shifts causing errors in the radars velocity calculations. Angle track breaking requires knowledge of the radar tracking method and scan parameters (perhaps from an on-board ESM, or previous intelligence). Angle track can then be affected by appropriate signal modulation (as the case of conscan). Other techniques include terrain bouncing, cross-polarization, and sidelobe jamming.
EEE381B Electronic Warfare - 26
Winter 2009
Airborne jammers (and their platforms) are generally employed in one of two common modes:
Self-screening mode is provided by on-board jammer(s) as protection suites. These systems are generally highly integrated into the mission suite. Escort and stand-off mode is provided by support aircraft, with stand-off aircraft usually operating outside harms way. These systems are generally stand-alone and often more powerful and capable than self-screen ones.
EEE381B
The EA-6B Prowler is being replaced with the EA-18G Growler (escort / stand-off role)
Winter 2009
Electronic Warfare - 27
Winter 2009
EEE381B
Electronic Warfare - 28
5. Defensive Aids
When operating in a hostile environment an aircraft must be equipped with appropriate selfdefence measures.
In
Canada these are collectively referred a defensive electronic warfare (DEW) suite
arms fire Radar guided anti-aircraft missiles (AAA) Shoulder-launched surface-to-air missiles (SAM) SAM from ground sites, vehicles or ships
Winter 2009 EEE381B Electronic Warfare - 29
The goal of an RWR is to detect the presence of a hostile radar prior to the radar detecting you. A typical architecture includes 4 sensors located at the wing tips with each providing up to 90 conical coverage. A typical antenna would be a spiral with ~75 beamwidth and ~10 dB gain.
Winter 2009
EEE381B
Electronic Warfare - 30
Winter 2009
EEE381B
Electronic Warfare - 31
A missile warning receiver (MWR) is designed to detect the infrared (IR) or ultraviolet (UV) emissions of a missile.
This
system may employ up to 6 sensors, each with 110 of coverage (providing front and rear protection.
Similarly a laser warning receiver (LWR) provides detection against missiles that emit signals in the laser band.
Winter 2009
EEE381B
Electronic Warfare - 32
While warning receivers are designed to detect the presence of a threat, countermeasure dispensers offer a defence against an imminent (launched) attack. Typical dispensers include:
Chaff Flares Towed
Decoys
Winter 2009
EEE381B
Electronic Warfare - 33
5.3.1
Chaff
Chaff is the oldest form of radar EW, dating back to WWII, then known as window. Chaff consists of tiny pieces of reflective metal foil or plastic. It is cut into wavelength strips and dispensed in cloud bursts behind the aircraft, thus forming a brief but large RCS so as to break the lock of an incoming missile. Usually used in conjunction with evasive manoeuvres.
EEE381B Electronic Warfare - 34
Winter 2009
5.3.1.1
Chaff
Winter 2009
EEE381B
Electronic Warfare - 35
5.3.2
Flares
Winter 2009
EEE381B
Electronic Warfare - 36
5.3.3
Towed decoys
Winter 2009
EEE381B
Electronic Warfare - 37
Winter 2009
EEE381B
Electronic Warfare - 38
Winter 2009
EEE381B
Electronic Warfare - 39
Modern radar designs include features which make them less vulnerable to traditional EW techniques including:
Low
antenna sidelobes Sidelobe blanking Wide dynamic range with fast automatic gain control Constant false alarm rate (CFAR) reduction
Winter 2009
EEE381B
Electronic Warfare - 40
Modern radars also include low probability of detection techniques in order to prevent being detected (before any EW can begin). Typical techniques include:
A
purposeful reduction in peak power Frequency agility along with an increase in receiver bandwidth (with advanced low loss, low noise floor receivers) Very high gain antennas 55dB above the first sidelobe
Winter 2009
EEE381B
Electronic Warfare - 41
7. In-class exercises
Winter 2009
EEE381B
Electronic Warfare - 42
noise jamming mode will the jammer have to resort to and at what cost?
Winter 2009
EEE381B
Electronic Warfare - 43
Range gate pull-off (RGPO) injects false targets at ranges beyond that of the jammer. How could false targets be injected between the jammer and the radar?
Winter 2009
EEE381B
Electronic Warfare - 44
How could knowledge of a radars scan pattern and antenna characteristics be used to effectively jam the radar?
Winter 2009
EEE381B
Electronic Warfare - 45
References
1) 2) 3) 4) 5)
Moir & Seabridge, Military Avionics Systems, American Institute of Aeronautics & Astronautics, 2006. [Sections 2.6 & 2.7] Radar in an Active Target Environment, student laboratory manual, 38542-00, Lab-Volt (Quebec) Ltd, 2006. David Adamy, EW101 - A First Course in Electronic Warfare, Artech House, 2000. [Chapters 3,4 & 6] George W. Stimson, Introduction to Airborne Radar, Second Edition, SciTch Publishing, 1998. Mark A. Hicks, "Clip art licensed from the Clip Art Gallery on DiscoverySchool.com"
Winter 2009
EEE381B
Electronic Warfare - 46