Final EW 1

download Final EW 1

of 15

Transcript of Final EW 1

  • 7/29/2019 Final EW 1

    1/15

    ELECRONIC WARFARE

    ABSTRACT

    The paper gives the information about the military organizations.In present-day

    operational scenarios, it is becoming increasingly important for armed forces to establish

    information-gathering superiority. Electronic warfare (EW) refers to any action involvingthe use of the electromagnetic spectrum (EMS) or directed energy (DE) to control the

    EMS or to attack the enemy.The goal of electronic warfare is to control the

    electromagnetic spectrum.

    EW includes three major subdivisions:

    Electronic Warfare Support (ES)

    Electronic Attack (EA)

    Electronic Protect (EP)

    Electronic Attack: Use of electromagnetic energy, directed energy, or anti radiationweapons to attack personnel, facilities, or equipment with the intent of degrading,

    neutralizing, or destroying enemy combat capability and is considered a form of fires.

    Electronic Protect: Actions taken to protect personnel, facilities, and equipment from anyeffects of friendly or enemy use of electromagnetic spectrum that degrade, neutralize, or

    destroy friendly combat capability.

    Electronic Warfare Support: Actions tasked by, or under direct control of, anoperational commander to search for, intercept, identify, and locate or localize sources of

    intentional and unintentional radiated electromagnetic energy for the purpose of immediate

    threat recognition, targeting, planning, and conduct of future operations.

    Electronic warfare is much more developed than most other areas of information security.

    There are many lessons to be learned, from the technical level up through the tactical levelto matters of planning and strategy.

    The applications of electronic warfare includes:

    In support of leadership

    In support of information tasks and capabilities

    In support of the war fighting functions.

    1

  • 7/29/2019 Final EW 1

    2/15

    Index

    Chapter 1 Introduction to Electronic Warfare

    1.1 What is Electronic Warfare?

    1.2 Need of Electronic Warfare

    1.3 Highlighting features

    1.4 Main divisions of Electronic Warfare

    Chapter 2 Electronic Attack

    2.1 Active Electronic Attack

    2.2 Passive Electronic Attack

    Chapter 3 Introduction to Jamming

    3.1 RADAR Jamming

    3.1.1 Mechanical Jamming

    3.1.2 Electronic Jamming

    Chapter 4 Introduction to Stealth Technology

    4.1 What is Stealth technology?

    4.2 What is Stealth?

    4.3 How does stealth work?

    4.3.1 RAS

    4.3.2 RAM

    Chapter 5 Effects of Electronic Warfare5.1 Advantages

    5.2 Disadvantages

    Chapter 6 Conclusion

    6.1 Enlighting future

    2

  • 7/29/2019 Final EW 1

    3/15

    Chapter 1

    Air and space power and technology have always been tightly

    bound together throughout the history of air and space

    operations.Electronic Warfare, provides a basis for

    understanding, planning, and executing this portion of air and

    space warfare.

    Introduction

    What is Electronic

    Warfare?

    Electronic warfare (EW)

    refers to any action

    involving the use of the

    electromagnetic spectrum

    (EMS) or directed energy

    (DE) to control the EMS or

    to attack the enemy.

    The purpose of EW is to

    deny the opponent an

    advantage in the EMS and

    ensure friendly unimpeded

    access to the EM spectrum

    portion of the information

    environment. EW can be

    applied from air, sea, land,

    and space by manned and

    unmanned systems.

    Need of Electronic

    Warfare

    Increased reliance

    on radar and OTH

    targeting.

    Increased use of

    Communications

    and Tactical Data

    Systems (TDS).

    Increased speed of

    missiles and

    weapons systems

    requires high-speed

    detection and

    tracking.

    Active-homing or

    passive-hominglong-range missiles

    give little warning.

    3

  • 7/29/2019 Final EW 1

    4/15

    Some of the

    highlighting features

    of Electronic Warfare:

    Electronic warfare

    (EW) is one of thefive core

    capabilities.

    EW is waged to

    secure and maintain

    the freedom of

    action in the

    electromagnetic

    spectrum.

    EWs relationship to

    information

    operations (IO).

    Intelligence and

    electronic warfare

    support.

    The main divisions of

    electronic warfare:

    There are three main

    divisions of Electronic

    Warfare,

    Electronic Attack

    Electronic

    Protection

    Electronic Warfare

    Support

    1] Electronic Attack:

    Use of electromagneticenergy, directed energy, or

    anti radiation weapons to

    attack personnel, facilities,

    or equipment with the intent

    of degrading, neutralizing,

    or destroying enemy

    combat capability and is

    considered a form of fires.

    Following are the

    applications of EA:

    1.Standoff Jamming

    2.High-speedAntiradiation Missile

    (HARM)

    3.Chaff

    4.Flare

    5.Self-defense Jamming

    6.Directed Energy

    2] Electronic Protection:

    Actions taken to protect

    personnel, facilities, and

    equipment from any effects

    of friendly or enemy use of

    electromagnetic spectrum

    that degrade, neutralize, or

    4

  • 7/29/2019 Final EW 1

    5/15

    destroy friendly combat

    capability.

    Following are the

    applications of EP:

    1.Frequency agility in a

    radio

    2.Change pulse repetition

    frequency (PRF) on a

    radar set

    3.Electronic and material

    shielding for systems

    4.Processes to counter

    meaconing, interference,

    jamming, and intrusion

    3] Electronic Warfare

    Support:

    Actions tasked by, or under

    direct control of, an

    operational commander to

    search for, intercept,

    identify, and locate or

    localize sources of

    intentional and

    unintentional radiated

    electromagnetic energy for

    the purpose of immediate

    threat recognition,

    targeting, planning, and

    conduct of future

    operations.

    Following are the

    applications of EWS:

    1.Radar Warning

    Receivers2.Communication

    Intelligence

    3.Electronics Intelligence

    Now we will see in detail

    the contents of Electronic

    Attack ;

    Chapter 2

    Electronic Attack

    Electronic attack includes

    Actions taken to

    prevent or reduce an

    enemys effective

    use of the

    electromagnetic

    spectrum, such as

    jamming and

    electromagnetic

    deception.

    Employment of

    weapons that use

    either

    electromagnetic or

    5

  • 7/29/2019 Final EW 1

    6/15

    directed energy as

    their primary

    destructive

    mechanism.

    Offensive and

    defensive activities

    including

    countermeasures.

    Common types of

    electronic attack include

    spot, barrage, and sweep

    electromagnetic jamming.

    Electronic attack actions

    also include various

    electromagnetic deception

    techniques such as false

    target or duplicate target

    generation.

    There are mainly two types

    of electronic attack:

    1} Active

    2} Passive

    1} Active Electronic

    Attack: Jamming:

    Limit the effectiveness of

    enemy communications and

    detection systems

    Deception:

    Convey misleading

    information or deny valid

    information the enemy

    Active

    Cancellation:

    Theoretical system

    involves sampling radar

    signal, analyzing, and

    returning out of phase.

    EMP:

    Electromagnetic radiation

    from a nuclear explosion or

    an electromagnetic bomb

    producing intense magnetic

    fluctuations.

    2} Passive electronic

    Attack

    Chaff:

    Thin bits of aluminum or

    plastic

    Towed Decoys:

    Act as preferential targets

    Radar Reflectors:

    Concentrate the energy sent

    back the radar

    Stealth:

    Make less visible to

    radar/detection

    6

  • 7/29/2019 Final EW 1

    7/15

    Chapter 3

    Introduction to

    Jamming as an Active

    component

    Jamming mean:

    Techniques to limit the

    effectiveness of an

    opponent's communications

    and/or detection equipment.

    For many years, jamming has

    been called electromagneticcountermeasures (ECM), but it

    is now referred to in mostliterature as electronic attack

    (EA). EA also includes the use

    of high levels of radiatedpower or directed energy to

    physically damage enemy

    assets. Jamming is

    sometimes called "soft kill"because it temporarily makes

    an enemy asset ineffectivebut does not destroy it.

    Radar jamming is theintentional emission of radio

    frequency signals to interferewith the operation of a radar

    by saturating its receiver with

    false information.

    There are two types of radar

    jamming:

    Mechanical

    Electronic jamming.

    1] Mechanical Jamming:

    Devices, which reflect, cause

    mechanical jamming or re-reflect radar energy back to the

    radar to produce false target

    returns on the operator's scope.

    Mechanical jamming devicesinclude chaff, corner reflectors,

    and decoys.

    Chaffismade of

    different

    lengthmetallic

    strips, which

    reflectdifferent

    frequencies,

    so as tocreate a large

    area of false

    returns in

    which a realcontact

    would be

    difficult todetect. Chaff

    is often

    aluminum

    for weightpurposes and

    is usually

    coated withsomething

    such as a

    plastic tomake it more

    slick and less

    likely to bindup in large

    clumps.

    Corner

    reflectors

    have the

    same effect

    as chaff butare

    physically

    7

  • 7/29/2019 Final EW 1

    8/15

    very

    different.

    Corner

    reflectors aremultiple-

    sided objects

    that re-radiate radar

    energy. An

    aircraft can'tcarry as many

    corner

    reflectors as it

    can chaff.

    Decoys are

    maneuverable flying objects

    that are intended to deceive

    a radar operator into

    believing that they are

    actually aircraft. They areespecially dangerous because

    they can clutter up radar with

    false targets making it easier foran attacker to get within

    weapons range and neutralize

    the radar. Corner reflectors canbe fitted on decoys to make

    them appear larger then they

    are thus furthering the illusion

    that a decoy is an actualaircraft. Some decoys have the

    capability to perform electronic

    jamming or drop chaff.

    2] Electronic Jamming:Electronic jamming is a

    form of Electronic Attackwhere jammers radiate

    interfering signals toward an

    enemy's radar, blocking the

    receiver with highlyconcentrated energy signals.

    The two main electronictechnique styles

    Noise techniques

    Repeater techniques.

    1} Noise technique:

    The three types of noise

    jamming are spot, sweep, and

    barrage.

    Spot jammingoccurs

    when a jammer focuses allof its power on a single

    frequency. While this would

    severely degrade the ability totrack on the jammed

    frequency, frequency agile

    radar would hardly be affected

    because the jammer can only

    jam one frequency. Whilemultiple jammers could

    possibly jam a range of

    frequencies, this would

    consume a great deal ofresources to have any effect on

    frequency-agile radar, andwould probably still beineffective.

    Sweep jammingis when

    a jammer's full power is

    shifted from one frequency to

    another. While this has the

    advantage of being able to jam

    multiple frequencies in quick

    succession, it does not affect

    them all at the same time, andthus limits the effectiveness of

    this type of jamming.

    Barrage jammingis thejamming of multiple

    frequencies at once by a

    single jammer. Barragejamming may be

    8

  • 7/29/2019 Final EW 1

    9/15

    accomplished by presetting

    multiple jammers on adjacent

    frequencies or by using a

    single wideband transmitter.Barrage jamming makes it

    possible to jam emit ters

    on different frequenciessimultaneously and reduces the

    need for operator assistance or

    complex control equipment

    The advantage is that

    multiple frequencies can

    be jammed simultaneously;

    however, the jamming effectcan be limited because this

    requires the jammer to spread

    its full power between thesefrequencies. So the more

    frequencies being jammed, the

    less effectively each is jammed.

    Chapter 4

    Introduction to Stealth technology as Passive

    component

    What is Stealth

    technology?

    Stealth or low observability

    (as it is scientifically

    known) is one of the most

    misunderstood and

    misinterpreted concepts in

    military aviation by the

    common man. Stealth

    aircraft are

    considered

    as invisible

    aircraft,

    which

    dominate

    the skies.

    Though,

    the debate still continues on

    whether stealth technology

    9

  • 7/29/2019 Final EW 1

    10/15

    can make an aircraft

    invincible it was found that

    stealth aircraft are

    detectable by radar.

    The motive behindincorporating stealth

    technology in an aircraft is

    not just to avoid missiles

    being fired at is but also to

    give total deniability to

    covert operations. This is

    very much useful to strike

    targets where it is

    impossible to reach. Thus

    we can clearly say that the

    job of a stealth aircraft pilot

    is not to let others know

    that he was ever there.

    What is Stealth?

    In simple terms, stealth

    technology allows an

    aircraft to be partially

    invisible to Radar or anyother means of detection.

    This doesn't allow the

    aircraft to be fully invisible

    on radar. Stealth technology

    cannot make the aircraft

    invisible to enemy or

    friendly radar. All it can do

    is to reduce the detection

    range or an aircraft. This is

    similar to the camouflage

    tactics used by soldiers in

    jungle warfare. Unless the

    soldier comes near you, you

    can't see him. Though this

    gives a clear and safe

    striking distance for the

    aircraft, there is still a threat

    from radar systems, which

    can detect stealth aircraft.

    How does Stealth

    technology work?

    The concept behind the

    stealth technology is very

    simple. As a matter of fact

    it is totally the principle ofreflection and absorption

    that makes aircraft

    "stealthy". Deflecting the

    incoming radar waves into

    another direction and thus

    reducing the number of

    waves does this, which

    returns to the radar.

    Another concept that is

    followed is to absorb the

    incoming radar waves

    totally and to redirect the

    absorbed electromagnetic

    energy in another direction.

    What ever may be the

    method used, the level of

    stealth an aircraft can

    achieve depends totally on

    the design and thesubstance with which it is

    made of.

    10

  • 7/29/2019 Final EW 1

    11/15

    Types of Stealth

    technology:

    1] RAS (Radar absorbent

    surface )

    2] RAM ( Radar absorbent

    material )

    RAS (Radar absorbent

    surface ) are the surfaces

    on the aircraft, which can

    deflect the incoming radar

    waves and reduce the

    detection range. RAS works

    due to the angles at which

    the structures on the

    aircraft's fuselage or the

    fuselage itself are placed.

    These structures can be

    anything from wings to a

    refueling boom on the

    aircraft..

    Where

    From above equation we

    can see that . So as

    the Radar cross section

    decreases so power

    transmitting factor also

    decreases and Radar does

    not receive sufficient EM

    waves and it is misguided.

    Thus is the main advantage

    of Stealth Technology dueto which aircraft is not

    detected by RADAR.

    RAM ( Radar absorbent

    material )

    11

  • 7/29/2019 Final EW 1

    12/15

    Radar absorbent surfaces

    absorb the incoming radar

    waves rather than deflecting

    it in another direction. RAS

    totally depends on the

    material with which the

    surface of the aircraft is

    made. Though the

    composition of this material

    is a top secret. The RAS is

    believed to be silicon based

    inorganic compound

    .

    Examples of aircrafts using stealth technology:

    12

  • 7/29/2019 Final EW 1

    13/15

    Chapter 5

    Effects of Electronic

    warfare:

    1]Detection: In the context of

    EW, detection is the active and

    passive monitoring of theoperational environment for radio

    frequency, electro-optic, laser,

    infrared, and ultraviolet

    electromagnetic threats. Detectionis the first step in EW for

    exploitation, targeting, and

    defensive planning. Friendly

    forces maintain the capability todetect and characterize

    interference as hostile jamming orunintentional electromagnetic

    interference.

    2]Denial: In the context of EW,

    denial is controlling the

    information an enemy receives viathe electromagnetic spectrum and

    preventing the acquisition of

    accurate information about

    friendly forces. Degradation usestraditional jamming techniques,

    expendable countermeasures,

    destructive measures, or networkapplications. These range from

    limited effects up to complete

    denial of usage.

    3]Disruption and degradation: In

    the context of EW, disruption anddegradation techniques interfere

    with the enemys use of theelectromagnetic spectrum to limit

    enemy combat capabilities. This isachieved with electronic jamming,

    electronic deception, and

    electronic intrusion. Theseenhance attacks on hostile forces

    and act as force multipliers by

    increasing enemy uncertainty,

    while reducing uncertainty for

    friendly forces.

    4]Destruction: Destruction, in the

    context of EW, is the elimination

    of targeted enemy systems.Sensors and command and control

    nodes are lucrative targets because

    their destruction stronglyinfluences the enemys

    perceptions and ability to

    coordinate actions. Various

    weapons and techniques ranging

    from conventional munitions anddirected energy weapons to

    network attacks can destroyenemy systems that use the

    electromagnetic spectrum.

    Advantages and

    Disadvantages of Electronic

    Attack:

    Advantages:

    We can protect our aircraft

    from detection ofRADAR.

    We can misguide the

    RADAR and can attackthe opponents and destroy

    them.

    Missile Guiding System.

    Useful in battlefield fordifferent tactics and

    operations.

    Disadvantages:

  • 7/29/2019 Final EW 1

    14/15

    Aircraft using stealth

    technology has less speed,cant carry more weapons.

    It is expensive technology.

    Jammer are ineffective to

    Doppler RADARs.

    Frequency hopping, pulse

    compression, radiationhomming technologies are

    used against jamming

    techniques.

    Chapter 6

    Enlighting Future:

    Electronic warfare

    through effective useof detection, denial,

    deception, disruption,

    and destruction

    provides timely

    intelligence, enhances

    combat power by

    disrupting the enemys

    use of the

    electromagneticspectrum at critical

    times, and ensures

    continued friendly use

    of the electromagnetic

    spectrum.

    The synergistic effects

    of various EW

    techniques can

    significantly disrupt an

    IADS, sensors,

    communication links,

    weapon systems, and

    C2. Jamming, chaff,and decoys degrade the

    enemys ability to find,

    fix, track, target,

    engage, and assess.

    Radar-guided weapon

    systems that survive

    destruction attempts

    lose some

    effectiveness in an EWenvironment. In short,

    the probability of

    success is greatly

    increased when EW is

    properly employed.

    Electronic warfare is a

    key element in the

    successful employment

    of air and space forces.

    Bibliography:

    http://www.powerpoint-search.com/electronic-warfare-ppt-

    4.html

    http://stealth.htm

    http://www.powerpoint-search.com/electronic-warfare-ppt-4.htmlhttp://www.powerpoint-search.com/electronic-warfare-ppt-4.htmlhttp://stealth.htm/http://www.powerpoint-search.com/electronic-warfare-ppt-4.htmlhttp://www.powerpoint-search.com/electronic-warfare-ppt-4.htmlhttp://stealth.htm/
  • 7/29/2019 Final EW 1

    15/15

    http://www.pdf-search-engine.com/electronic-warfare-

    pdf.html

    http://www.radartutorial.eu/02.basics/rp08.en.html

    http://www.pdf-search-engine.com/electronic-warfare-pdf.htmlhttp://www.pdf-search-engine.com/electronic-warfare-pdf.htmlhttp://www.radartutorial.eu/02.basics/rp08.en.htmlhttp://www.pdf-search-engine.com/electronic-warfare-pdf.htmlhttp://www.pdf-search-engine.com/electronic-warfare-pdf.htmlhttp://www.radartutorial.eu/02.basics/rp08.en.html