Você está na página 1de 23

ELECTRONIC WARFARE

Theres more than meets the eye

OUTLINE
1. 2. 3. 4. 5. 6. 7.

Introduction Signals Intelligence (SIGINT) Electronic Support measures (ESM) Electronic Countermeasures (ECM) Defensive Aids Jamming resistant radar design References

1. Introduction

1.2 The EW Spectrum

1.3 The Intelligence Cycle


The picture below depicts the typical, continuous cycle of intelligence gathering and application.

1.4 EW Elements

2. Signals Intelligence
Military intelligence typically involves the following sources:
human intelligence (HUMINT) image intelligence (IMINT) photographic intelligence (PHOTINT) signals intelligence (SIGINT)

SIGINT is further broken down into:


communications intelligence (COMINT) electronic intelligence (ELINT)

2.1 Typical COMINT/ELINT Architechture

3. Electric Support Measures


Similar to an ELINT system, an Electronic Support Meausres (ESM) systems role is to detect and classify received radar emitters. The difference being that an ESM is generally employed tactically (for use against immediate threats). An effective ESM will identify the location, type of transmitter, mode of operation (search, track, engaged) and level of threat of each emitter. Real-time signal analysis is performed against received signals, comparing them with known emitter characteristics stored in its threat library

4. Electronic Countermeasures (ECM)


Electronic countermeasures (ECM) involve taking actions to interfere with or deceive the enemys radar system.

The LANTIRN or the Low Altitude Navigation and Targeting Infrared with Night vision project

4.1 Noise Jamming


Active noise jamming involves the transmission of high power white noise directed at the enemy radar with the intent of interference. Effectiveness is based upon such parameters as:

jammer power antenna gain transmitter bandwidth barrage jamming swept-spot jamming multiple-spot jamming

Typical types of noise jamming techniques include:

4.1.1 Effects Of Noise Jamming

4.1.2 Burnthrough Range


With any noise jamming technique there is some range at which the strength of the radar echo becomes stringer than the jamming noise, this is known as the burnthrough range.

The range of the radar return is a function of 1/R4, whereas the range of the jamming signal is a function 1/R2.

4.2 Deception Jamming


Radar deception techniques are more sophisticated and can often be achieved without the radar (operator) knowing that jamming is being used. Typical techniques include:
false target generation range gate stealing velocity gate stealing angle track breaking

4.3 Airborne Jamming Platforms


Airborne jammers (and their platforms) are generally employed in one of two common modes:

Self-screening mode is provided by on-board jammer(s) as protection suites. These systems are generally highly integrated into the mission suite. Escort and stand-off mode is provided by support aircraft, with standoff aircraft usually operating outside harms way. These systems are generally stand-alone and often more powerful and capable than selfscreen ones.

4.3.1 Airborne Jamming Techniques

5. Defensive Aids
When operating in a hostile environment an aircraft must be equipped with appropriate self-defence measures.

In Canada these are collectively referred a defensive electronic warfare (DEW) suite

Common threats faced by aircraft include:


Small arms fire Radar guided anti-aircraft missiles (AAA) Shoulder-launched surface-to-air missiles (SAM) SAM from ground sites, vehicles or ships

5.1.1 A Typical RWR Architecture


The goal of an RWR is to detect the presence of a hostile radar prior to the radar detecting you. A typical architecture includes 4 sensors located at the wing tips with each providing up to 90 conical coverage.

5.2 Countermeasure Dispensers


While warning receivers are designed to detect the presence of a threat, countermeasure dispensers offer a defence against an imminent (launched) attack. Typical dispensers include:

Chaff Flares Towed Decoys

5.3 F/A-18E/F Defensive EW

5.4 Modern Active Decoys


ALE-50 Towed Decoy After the interception of the incoming victim radar signal, the appropriate countermeasures are applied and the RF is converted to light energy for transmission down the fibre cable to the decoy. The light energy is converted to RF energy and amplified by the travelling wave tube (TWT) transmitter. The resulting jamming signal is transmitted to the target radar.

6. Jam Resistant Radar Design


Modern radar designs include features which make them less vulnerable to traditional EW techniques including:
Low antenna sidelobes Sidelobe blanking Wide dynamic range with fast automatic gain control Constant false alarm rate (CFAR) reduction

7.
1)

References
Moir & Seabridge, Military Avionics Systems, American Institute of Aeronautics & Astronautics, 2006. [Sections 2.6 & 2.7] Radar in an Active Target Environment, student laboratory manual, 38542-00, Lab-Volt (Quebec) Ltd, 2006. David Adamy, EW101 - A First Course in Electronic Warfare, Artech House, 2000. [Chapters 3,4 & 6] George W. Stimson, Introduction to Airborne Radar, Second Edition, SciTch Publishing, 1998. Mark A. Hicks, "Clip art licensed from the Clip Art Gallery on DiscoverySchool.com"

2)

3)

4) 5)

Você também pode gostar