7/29/2019 Final EW 1
1/15
ELECRONIC WARFARE
ABSTRACT
The paper gives the information about the military organizations.In present-day
operational scenarios, it is becoming increasingly important for armed forces to establish
information-gathering superiority. Electronic warfare (EW) refers to any action involvingthe use of the electromagnetic spectrum (EMS) or directed energy (DE) to control the
EMS or to attack the enemy.The goal of electronic warfare is to control the
electromagnetic spectrum.
EW includes three major subdivisions:
Electronic Warfare Support (ES)
Electronic Attack (EA)
Electronic Protect (EP)
Electronic Attack: Use of electromagnetic energy, directed energy, or anti radiationweapons to attack personnel, facilities, or equipment with the intent of degrading,
neutralizing, or destroying enemy combat capability and is considered a form of fires.
Electronic Protect: Actions taken to protect personnel, facilities, and equipment from anyeffects of friendly or enemy use of electromagnetic spectrum that degrade, neutralize, or
destroy friendly combat capability.
Electronic Warfare Support: Actions tasked by, or under direct control of, anoperational commander to search for, intercept, identify, and locate or localize sources of
intentional and unintentional radiated electromagnetic energy for the purpose of immediate
threat recognition, targeting, planning, and conduct of future operations.
Electronic warfare is much more developed than most other areas of information security.
There are many lessons to be learned, from the technical level up through the tactical levelto matters of planning and strategy.
The applications of electronic warfare includes:
In support of leadership
In support of information tasks and capabilities
In support of the war fighting functions.
1
7/29/2019 Final EW 1
2/15
Index
Chapter 1 Introduction to Electronic Warfare
1.1 What is Electronic Warfare?
1.2 Need of Electronic Warfare
1.3 Highlighting features
1.4 Main divisions of Electronic Warfare
Chapter 2 Electronic Attack
2.1 Active Electronic Attack
2.2 Passive Electronic Attack
Chapter 3 Introduction to Jamming
3.1 RADAR Jamming
3.1.1 Mechanical Jamming
3.1.2 Electronic Jamming
Chapter 4 Introduction to Stealth Technology
4.1 What is Stealth technology?
4.2 What is Stealth?
4.3 How does stealth work?
4.3.1 RAS
4.3.2 RAM
Chapter 5 Effects of Electronic Warfare5.1 Advantages
5.2 Disadvantages
Chapter 6 Conclusion
6.1 Enlighting future
2
7/29/2019 Final EW 1
3/15
Chapter 1
Air and space power and technology have always been tightly
bound together throughout the history of air and space
operations.Electronic Warfare, provides a basis for
understanding, planning, and executing this portion of air and
space warfare.
Introduction
What is Electronic
Warfare?
Electronic warfare (EW)
refers to any action
involving the use of the
electromagnetic spectrum
(EMS) or directed energy
(DE) to control the EMS or
to attack the enemy.
The purpose of EW is to
deny the opponent an
advantage in the EMS and
ensure friendly unimpeded
access to the EM spectrum
portion of the information
environment. EW can be
applied from air, sea, land,
and space by manned and
unmanned systems.
Need of Electronic
Warfare
Increased reliance
on radar and OTH
targeting.
Increased use of
Communications
and Tactical Data
Systems (TDS).
Increased speed of
missiles and
weapons systems
requires high-speed
detection and
tracking.
Active-homing or
passive-hominglong-range missiles
give little warning.
3
7/29/2019 Final EW 1
4/15
Some of the
highlighting features
of Electronic Warfare:
Electronic warfare
(EW) is one of thefive core
capabilities.
EW is waged to
secure and maintain
the freedom of
action in the
electromagnetic
spectrum.
EWs relationship to
information
operations (IO).
Intelligence and
electronic warfare
support.
The main divisions of
electronic warfare:
There are three main
divisions of Electronic
Warfare,
Electronic Attack
Electronic
Protection
Electronic Warfare
Support
1] Electronic Attack:
Use of electromagneticenergy, directed energy, or
anti radiation weapons to
attack personnel, facilities,
or equipment with the intent
of degrading, neutralizing,
or destroying enemy
combat capability and is
considered a form of fires.
Following are the
applications of EA:
1.Standoff Jamming
2.High-speedAntiradiation Missile
(HARM)
3.Chaff
4.Flare
5.Self-defense Jamming
6.Directed Energy
2] Electronic Protection:
Actions taken to protect
personnel, facilities, and
equipment from any effects
of friendly or enemy use of
electromagnetic spectrum
that degrade, neutralize, or
4
7/29/2019 Final EW 1
5/15
destroy friendly combat
capability.
Following are the
applications of EP:
1.Frequency agility in a
radio
2.Change pulse repetition
frequency (PRF) on a
radar set
3.Electronic and material
shielding for systems
4.Processes to counter
meaconing, interference,
jamming, and intrusion
3] Electronic Warfare
Support:
Actions tasked by, or under
direct control of, an
operational commander to
search for, intercept,
identify, and locate or
localize sources of
intentional and
unintentional radiated
electromagnetic energy for
the purpose of immediate
threat recognition,
targeting, planning, and
conduct of future
operations.
Following are the
applications of EWS:
1.Radar Warning
Receivers2.Communication
Intelligence
3.Electronics Intelligence
Now we will see in detail
the contents of Electronic
Attack ;
Chapter 2
Electronic Attack
Electronic attack includes
Actions taken to
prevent or reduce an
enemys effective
use of the
electromagnetic
spectrum, such as
jamming and
electromagnetic
deception.
Employment of
weapons that use
either
electromagnetic or
5
7/29/2019 Final EW 1
6/15
directed energy as
their primary
destructive
mechanism.
Offensive and
defensive activities
including
countermeasures.
Common types of
electronic attack include
spot, barrage, and sweep
electromagnetic jamming.
Electronic attack actions
also include various
electromagnetic deception
techniques such as false
target or duplicate target
generation.
There are mainly two types
of electronic attack:
1} Active
2} Passive
1} Active Electronic
Attack: Jamming:
Limit the effectiveness of
enemy communications and
detection systems
Deception:
Convey misleading
information or deny valid
information the enemy
Active
Cancellation:
Theoretical system
involves sampling radar
signal, analyzing, and
returning out of phase.
EMP:
Electromagnetic radiation
from a nuclear explosion or
an electromagnetic bomb
producing intense magnetic
fluctuations.
2} Passive electronic
Attack
Chaff:
Thin bits of aluminum or
plastic
Towed Decoys:
Act as preferential targets
Radar Reflectors:
Concentrate the energy sent
back the radar
Stealth:
Make less visible to
radar/detection
6
7/29/2019 Final EW 1
7/15
Chapter 3
Introduction to
Jamming as an Active
component
Jamming mean:
Techniques to limit the
effectiveness of an
opponent's communications
and/or detection equipment.
For many years, jamming has
been called electromagneticcountermeasures (ECM), but it
is now referred to in mostliterature as electronic attack
(EA). EA also includes the use
of high levels of radiatedpower or directed energy to
physically damage enemy
assets. Jamming is
sometimes called "soft kill"because it temporarily makes
an enemy asset ineffectivebut does not destroy it.
Radar jamming is theintentional emission of radio
frequency signals to interferewith the operation of a radar
by saturating its receiver with
false information.
There are two types of radar
jamming:
Mechanical
Electronic jamming.
1] Mechanical Jamming:
Devices, which reflect, cause
mechanical jamming or re-reflect radar energy back to the
radar to produce false target
returns on the operator's scope.
Mechanical jamming devicesinclude chaff, corner reflectors,
and decoys.
Chaffismade of
different
lengthmetallic
strips, which
reflectdifferent
frequencies,
so as tocreate a large
area of false
returns in
which a realcontact
would be
difficult todetect. Chaff
is often
aluminum
for weightpurposes and
is usually
coated withsomething
such as a
plastic tomake it more
slick and less
likely to bindup in large
clumps.
Corner
reflectors
have the
same effect
as chaff butare
physically
7
7/29/2019 Final EW 1
8/15
very
different.
Corner
reflectors aremultiple-
sided objects
that re-radiate radar
energy. An
aircraft can'tcarry as many
corner
reflectors as it
can chaff.
Decoys are
maneuverable flying objects
that are intended to deceive
a radar operator into
believing that they are
actually aircraft. They areespecially dangerous because
they can clutter up radar with
false targets making it easier foran attacker to get within
weapons range and neutralize
the radar. Corner reflectors canbe fitted on decoys to make
them appear larger then they
are thus furthering the illusion
that a decoy is an actualaircraft. Some decoys have the
capability to perform electronic
jamming or drop chaff.
2] Electronic Jamming:Electronic jamming is a
form of Electronic Attackwhere jammers radiate
interfering signals toward an
enemy's radar, blocking the
receiver with highlyconcentrated energy signals.
The two main electronictechnique styles
Noise techniques
Repeater techniques.
1} Noise technique:
The three types of noise
jamming are spot, sweep, and
barrage.
Spot jammingoccurs
when a jammer focuses allof its power on a single
frequency. While this would
severely degrade the ability totrack on the jammed
frequency, frequency agile
radar would hardly be affected
because the jammer can only
jam one frequency. Whilemultiple jammers could
possibly jam a range of
frequencies, this would
consume a great deal ofresources to have any effect on
frequency-agile radar, andwould probably still beineffective.
Sweep jammingis when
a jammer's full power is
shifted from one frequency to
another. While this has the
advantage of being able to jam
multiple frequencies in quick
succession, it does not affect
them all at the same time, andthus limits the effectiveness of
this type of jamming.
Barrage jammingis thejamming of multiple
frequencies at once by a
single jammer. Barragejamming may be
8
7/29/2019 Final EW 1
9/15
accomplished by presetting
multiple jammers on adjacent
frequencies or by using a
single wideband transmitter.Barrage jamming makes it
possible to jam emit ters
on different frequenciessimultaneously and reduces the
need for operator assistance or
complex control equipment
The advantage is that
multiple frequencies can
be jammed simultaneously;
however, the jamming effectcan be limited because this
requires the jammer to spread
its full power between thesefrequencies. So the more
frequencies being jammed, the
less effectively each is jammed.
Chapter 4
Introduction to Stealth technology as Passive
component
What is Stealth
technology?
Stealth or low observability
(as it is scientifically
known) is one of the most
misunderstood and
misinterpreted concepts in
military aviation by the
common man. Stealth
aircraft are
considered
as invisible
aircraft,
which
dominate
the skies.
Though,
the debate still continues on
whether stealth technology
9
7/29/2019 Final EW 1
10/15
can make an aircraft
invincible it was found that
stealth aircraft are
detectable by radar.
The motive behindincorporating stealth
technology in an aircraft is
not just to avoid missiles
being fired at is but also to
give total deniability to
covert operations. This is
very much useful to strike
targets where it is
impossible to reach. Thus
we can clearly say that the
job of a stealth aircraft pilot
is not to let others know
that he was ever there.
What is Stealth?
In simple terms, stealth
technology allows an
aircraft to be partially
invisible to Radar or anyother means of detection.
This doesn't allow the
aircraft to be fully invisible
on radar. Stealth technology
cannot make the aircraft
invisible to enemy or
friendly radar. All it can do
is to reduce the detection
range or an aircraft. This is
similar to the camouflage
tactics used by soldiers in
jungle warfare. Unless the
soldier comes near you, you
can't see him. Though this
gives a clear and safe
striking distance for the
aircraft, there is still a threat
from radar systems, which
can detect stealth aircraft.
How does Stealth
technology work?
The concept behind the
stealth technology is very
simple. As a matter of fact
it is totally the principle ofreflection and absorption
that makes aircraft
"stealthy". Deflecting the
incoming radar waves into
another direction and thus
reducing the number of
waves does this, which
returns to the radar.
Another concept that is
followed is to absorb the
incoming radar waves
totally and to redirect the
absorbed electromagnetic
energy in another direction.
What ever may be the
method used, the level of
stealth an aircraft can
achieve depends totally on
the design and thesubstance with which it is
made of.
10
7/29/2019 Final EW 1
11/15
Types of Stealth
technology:
1] RAS (Radar absorbent
surface )
2] RAM ( Radar absorbent
material )
RAS (Radar absorbent
surface ) are the surfaces
on the aircraft, which can
deflect the incoming radar
waves and reduce the
detection range. RAS works
due to the angles at which
the structures on the
aircraft's fuselage or the
fuselage itself are placed.
These structures can be
anything from wings to a
refueling boom on the
aircraft..
Where
From above equation we
can see that . So as
the Radar cross section
decreases so power
transmitting factor also
decreases and Radar does
not receive sufficient EM
waves and it is misguided.
Thus is the main advantage
of Stealth Technology dueto which aircraft is not
detected by RADAR.
RAM ( Radar absorbent
material )
11
7/29/2019 Final EW 1
12/15
Radar absorbent surfaces
absorb the incoming radar
waves rather than deflecting
it in another direction. RAS
totally depends on the
material with which the
surface of the aircraft is
made. Though the
composition of this material
is a top secret. The RAS is
believed to be silicon based
inorganic compound
.
Examples of aircrafts using stealth technology:
12
7/29/2019 Final EW 1
13/15
Chapter 5
Effects of Electronic
warfare:
1]Detection: In the context of
EW, detection is the active and
passive monitoring of theoperational environment for radio
frequency, electro-optic, laser,
infrared, and ultraviolet
electromagnetic threats. Detectionis the first step in EW for
exploitation, targeting, and
defensive planning. Friendly
forces maintain the capability todetect and characterize
interference as hostile jamming orunintentional electromagnetic
interference.
2]Denial: In the context of EW,
denial is controlling the
information an enemy receives viathe electromagnetic spectrum and
preventing the acquisition of
accurate information about
friendly forces. Degradation usestraditional jamming techniques,
expendable countermeasures,
destructive measures, or networkapplications. These range from
limited effects up to complete
denial of usage.
3]Disruption and degradation: In
the context of EW, disruption anddegradation techniques interfere
with the enemys use of theelectromagnetic spectrum to limit
enemy combat capabilities. This isachieved with electronic jamming,
electronic deception, and
electronic intrusion. Theseenhance attacks on hostile forces
and act as force multipliers by
increasing enemy uncertainty,
while reducing uncertainty for
friendly forces.
4]Destruction: Destruction, in the
context of EW, is the elimination
of targeted enemy systems.Sensors and command and control
nodes are lucrative targets because
their destruction stronglyinfluences the enemys
perceptions and ability to
coordinate actions. Various
weapons and techniques ranging
from conventional munitions anddirected energy weapons to
network attacks can destroyenemy systems that use the
electromagnetic spectrum.
Advantages and
Disadvantages of Electronic
Attack:
Advantages:
We can protect our aircraft
from detection ofRADAR.
We can misguide the
RADAR and can attackthe opponents and destroy
them.
Missile Guiding System.
Useful in battlefield fordifferent tactics and
operations.
Disadvantages:
7/29/2019 Final EW 1
14/15
Aircraft using stealth
technology has less speed,cant carry more weapons.
It is expensive technology.
Jammer are ineffective to
Doppler RADARs.
Frequency hopping, pulse
compression, radiationhomming technologies are
used against jamming
techniques.
Chapter 6
Enlighting Future:
Electronic warfare
through effective useof detection, denial,
deception, disruption,
and destruction
provides timely
intelligence, enhances
combat power by
disrupting the enemys
use of the
electromagneticspectrum at critical
times, and ensures
continued friendly use
of the electromagnetic
spectrum.
The synergistic effects
of various EW
techniques can
significantly disrupt an
IADS, sensors,
communication links,
weapon systems, and
C2. Jamming, chaff,and decoys degrade the
enemys ability to find,
fix, track, target,
engage, and assess.
Radar-guided weapon
systems that survive
destruction attempts
lose some
effectiveness in an EWenvironment. In short,
the probability of
success is greatly
increased when EW is
properly employed.
Electronic warfare is a
key element in the
successful employment
of air and space forces.
Bibliography:
http://www.powerpoint-search.com/electronic-warfare-ppt-
4.html
http://stealth.htm
http://www.powerpoint-search.com/electronic-warfare-ppt-4.htmlhttp://www.powerpoint-search.com/electronic-warfare-ppt-4.htmlhttp://stealth.htm/http://www.powerpoint-search.com/electronic-warfare-ppt-4.htmlhttp://www.powerpoint-search.com/electronic-warfare-ppt-4.htmlhttp://stealth.htm/7/29/2019 Final EW 1
15/15
http://www.pdf-search-engine.com/electronic-warfare-
pdf.html
http://www.radartutorial.eu/02.basics/rp08.en.html
http://www.pdf-search-engine.com/electronic-warfare-pdf.htmlhttp://www.pdf-search-engine.com/electronic-warfare-pdf.htmlhttp://www.radartutorial.eu/02.basics/rp08.en.htmlhttp://www.pdf-search-engine.com/electronic-warfare-pdf.htmlhttp://www.pdf-search-engine.com/electronic-warfare-pdf.htmlhttp://www.radartutorial.eu/02.basics/rp08.en.htmlTop Related