Vous êtes sur la page 1sur 15

ELECRONIC WARFARE

ABSTRACT
The paper gives the information about the military organizations. In present-day operational scenarios, it is becoming increasingly important for armed forces to establish information-gathering superiority. Electronic warfare (EW) refers to any action involving the use of the electromagnetic spectrum (EMS) or directed energy (DE) to control the EMS or to attack the enemy. The goal of electronic warfare is to control the electromagnetic spectrum. EW includes three major subdivisions:
Electronic Warfare Support (ES)

Electronic Attack (EA)


Electronic Protect (EP)

Electronic Attack: Use of electromagnetic energy, directed energy, or anti radiation weapons to attack personnel, facilities, or equipment with the intent of degrading, neutralizing, or destroying enemy combat capability and is considered a form of fires. Electronic Protect: Actions taken to protect personnel, facilities, and equipment from any effects of friendly or enemy use of electromagnetic spectrum that degrade, neutralize, or destroy friendly combat capability. Electronic Warfare Support: Actions tasked by, or under direct control of, an operational commander to search for, intercept, identify, and locate or localize sources of intentional and unintentional radiated electromagnetic energy for the purpose of immediate threat recognition, targeting, planning, and conduct of future operations. Electronic warfare is much more developed than most other areas of information security. There are many lessons to be learned, from the technical level up through the tactical level to matters of planning and strategy. The applications of electronic warfare includes: In support of leadership In support of information tasks and capabilities
In support of the war fighting functions. 1

Index
Chapter 1 Introduction to Electronic Warfare 1.1 What is Electronic Warfare? 1.2 Need of Electronic Warfare 1.3 Highlighting features 1.4 Main divisions of Electronic Warfare Chapter 2 Electronic Attack 2.1 Active Electronic Attack 2.2 Passive Electronic Attack Chapter 3 Introduction to Jamming 3.1 RADAR Jamming 3.1.1 Mechanical Jamming 3.1.2 Electronic Jamming Chapter 4 Introduction to Stealth Technology 4.1 What is Stealth technology? 4.2 What is Stealth? 4.3 How does stealth work? 4.3.1 RAS 4.3.2 RAM Chapter 5 Effects of Electronic Warfare 5.1 Advantages 5.2 Disadvantages Chapter 6 Conclusion 6.1 Enlighting future
2

Chapter 1

Air and space power and technology have always been tightly bound together throughout the history of air and space operations. Electronic Warfare, provides a basis for understanding, planning, and executing this portion of air and space warfare.
Introduction What is Electronic Warfare?
Electronic warfare (EW) refers to any action involving the use of the electromagnetic spectrum (EMS) or directed energy (DE) to control the EMS or to attack the enemy. The purpose of EW is to deny the opponent an advantage in the EMS and ensure friendly unimpeded access to the EM spectrum portion of the information environment. EW can be applied from air, sea, land, and space by manned and unmanned systems.

Need of Electronic Warfare


Increased reliance on radar and OTH targeting. Increased use of Communications and Tactical Data Systems (TDS). Increased speed of missiles and weapons systems requires high-speed detection and tracking. Active-homing or passive-homing long-range missiles give little warning.

Some of the highlighting features of Electronic Warfare:


Electronic warfare (EW) is one of the five core capabilities. EW is waged to secure and maintain

the freedom of action in the electromagnetic spectrum. EWs relationship to information operations (IO). Intelligence and electronic warfare support.

The main divisions of electronic warfare:


There are three main divisions of Electronic Warfare, Electronic Attack Electronic Protection Electronic Warfare Support

combat capability and is considered a form of fires. Following are the applications of EA: 1.Standoff Jamming 2.High-speed Antiradiation Missile (HARM) 3.Chaff 4.Flare 5.Self-defense Jamming 6.Directed Energy

1] Electronic Attack:
Use of electromagnetic energy, directed energy, or anti radiation weapons to attack personnel, facilities, or equipment with the intent of degrading, neutralizing, or destroying enemy
4

2] Electronic Protection:
Actions taken to protect personnel, facilities, and equipment from any effects of friendly or enemy use of electromagnetic spectrum that degrade, neutralize, or

destroy friendly combat capability. Following are the applications of EP: 1.Frequency agility in a radio 2.Change pulse repetition frequency (PRF) on a radar set 3.Electronic and material shielding for systems 4.Processes to counter meaconing, interference, jamming, and intrusion

search for, intercept, identify, and locate or localize sources of intentional and unintentional radiated electromagnetic energy for the purpose of immediate threat recognition, targeting, planning, and conduct of future operations. Following are the applications of EWS: 1.Radar Warning Receivers 2.Communication Intelligence 3.Electronics Intelligence Now we will see in detail the contents of Electronic Attack ;

3] Electronic Warfare Support:


Actions tasked by, or under direct control of, an operational commander to

Chapter 2
Electronic Attack
Electronic attack includes Actions taken to prevent or reduce an enemys effective use of the electromagnetic
5

spectrum, such as jamming and electromagnetic deception. Employment of weapons that use either electromagnetic or

directed energy as their primary destructive mechanism. Offensive and defensive activities including countermeasures. Common types of electronic attack include spot, barrage, and sweep electromagnetic jamming. Electronic attack actions also include various electromagnetic deception techniques such as false target or duplicate target generation. There are mainly two types of electronic attack: 1} Active 2} Passive 1} Active Electronic Attack: Jamming: Limit the effectiveness of enemy communications and detection systems Deception:

Convey misleading information or deny valid information the enemy Active Cancellation: Theoretical system involves sampling radar signal, analyzing, and returning out of phase. EMP: Electromagnetic radiation from a nuclear explosion or an electromagnetic bomb producing intense magnetic fluctuations.

2} Passive electronic Attack Chaff: Thin bits of aluminum or plastic Towed Decoys: Act as preferential targets Radar Reflectors: Concentrate the energy sent back the radar Stealth: Make less visible to radar/detection

Chapter 3
Introduction to Jamming as an Active component
Jamming mean:
Techniques to limit the

effectiveness of an opponent's communications and/or detection equipment. For many years, jamming has been called electromagnetic countermeasures (ECM), but it is now referred to in most literature as electronic attack (EA). EA also includes the use of high levels of radiated power or directed energy to physically damage enemy assets. Jamming is sometimes called "soft kill" because it temporarily makes an enemy asset ineffective but does not destroy it.

Radar jamming is the


intentional emission of radio frequency signals to interfere with the operation of a radar by saturating its receiver with false information. There are two types of radar jamming: Mechanical Electronic jamming. 1] Mechanical Jamming: Devices, which reflect, cause mechanical jamming or rereflect radar energy back to the
7

radar to produce false target returns on the operator's scope. Mechanical jamming devices include chaff, corner reflectors, and decoys. Chaff is made of different length metallic strips, which reflect different frequencies, so as to create a large area of false returns in which a real contact would be difficult to detect. Chaff is often aluminum for weight purposes and is usually coated with something such as a plastic to make it more slick and less likely to bind up in large clumps.

Corner reflectors have the same effect as chaff but are physically

very different. Corner reflectors are multiplesided objects that reradiate radar energy. An aircraft can't carry as many corner reflectors as it can chaff.

Decoys are maneuverable flying objects

that are intended to deceive a radar operator into believing that they are actually aircraft. They are especially dangerous because they can clutter up radar with false targets making it easier for an attacker to get within weapons range and neutralize the radar. Corner reflectors can be fitted on decoys to make them appear larger then they are thus furthering the illusion that a decoy is an actual aircraft. Some decoys have the capability to perform electronic jamming or drop chaff.

2] Electronic Jamming: Electronic jamming is a form of Electronic Attack where jammers radiate interfering signals toward an enemy's radar, blocking the receiver with highly concentrated energy signals. The two main technique styles electronic

radar would hardly be affected because the jammer can only jam one frequency. While multiple jammers could possibly jam a range of frequencies, this would consume a great deal of resources to have any effect on frequency-agile radar, and would probably still be ineffective.

Noise techniques Repeater techniques. 1} Noise technique: The three types of noise jamming are spot, sweep, and barrage.

Spot jamming occurs when a jammer focuses all of its power on a single frequency. While this would severely degrade the ability to track on the jammed frequency, frequency agile
8

Sweep jamming is when a jammer's full power is shifted from one frequency to another. While this has the advantage of being able to jam multiple frequencies in quick succession, it does not affect them all at the same time, and thus limits the effectiveness of this type of jamming.

Barrage jamming is the jamming of multiple frequencies at once by a single jammer. Barrage jamming may be

accomplished by presetting multiple jammers on adjacent frequencies or by using a single wideband transmitter. Barrage jamming makes it possible to jam emitters on different frequencies simultaneously and reduces the need for operator assistance or complex control equipment

The advantage is that multiple frequencies can be jammed simultaneously; however, the jamming effect can be limited because this requires the jammer to spread its full power between these frequencies. So the more frequencies being jammed, the less effectively each is jammed.

Chapter 4
Introduction to Stealth technology as Passive component
What is Stealth technology?
Stealth or low observability (as it is scientifically known) is one of the most misunderstood and misinterpreted concepts in military aviation by the common man. Stealth
9

aircraft are considered as invisible aircraft, which dominate the skies. Though, the debate still continues on whether stealth technology

can make an aircraft invincible it was found that stealth aircraft are detectable by radar. The motive behind incorporating stealth technology in an aircraft is not just to avoid missiles being fired at is but also to give total deniability to covert operations. This is very much useful to strike targets where it is impossible to reach. Thus we can clearly say that the job of a stealth aircraft pilot is not to let others know that he was ever there.

jungle warfare. Unless the soldier comes near you, you can't see him. Though this gives a clear and safe striking distance for the aircraft, there is still a threat from radar systems, which can detect stealth aircraft.

How does Stealth technology work?


The concept behind the stealth technology is very simple. As a matter of fact it is totally the principle of reflection and absorption that makes aircraft "stealthy". Deflecting the incoming radar waves into another direction and thus reducing the number of waves does this, which returns to the radar. Another concept that is followed is to absorb the incoming radar waves totally and to redirect the absorbed electromagnetic energy in another direction. What ever may be the method used, the level of stealth an aircraft can achieve depends totally on the design and the substance with which it is made of.

What is Stealth?
In simple terms, stealth technology allows an aircraft to be partially invisible to Radar or any other means of detection. This doesn't allow the aircraft to be fully invisible on radar. Stealth technology cannot make the aircraft invisible to enemy or friendly radar. All it can do is to reduce the detection range or an aircraft. This is similar to the camouflage tactics used by soldiers in

10

Types of Stealth technology:


1] RAS (Radar absorbent surface ) 2] RAM ( Radar absorbent material )

RAS (Radar absorbent surface ) are the surfaces on the aircraft, which can deflect the incoming radar waves and reduce the detection range. RAS works due to the angles at which the structures on the aircraft's fuselage or the fuselage itself are placed. These structures can be anything from wings to a refueling boom on the aircraft.. From above equation we can see that . So as the Radar cross section decreases so power transmitting factor also decreases and Radar does not receive sufficient EM waves and it is misguided. Thus is the main advantage of Stealth Technology due to which aircraft is not detected by RADAR.

Where

RAM ( Radar absorbent material )


11

Radar absorbent surfaces absorb the incoming radar waves rather than deflecting it in another direction. RAS totally depends on the material with which the .

surface of the aircraft is made. Though the composition of this material is a top secret. The RAS is believed to be silicon based inorganic compound

Examples of aircrafts using stealth technology:

12

Chapter 5
Effects of Electronic warfare:
1] Detection: In the context of EW, detection is the active and passive monitoring of the operational environment for radio frequency, electro-optic, laser, infrared, and ultraviolet electromagnetic threats. Detection is the first step in EW for exploitation, targeting, and defensive planning. Friendly forces maintain the capability to detect and characterize interference as hostile jamming or unintentional electromagnetic interference. 2] Denial: In the context of EW, denial is controlling the information an enemy receives via the electromagnetic spectrum and preventing the acquisition of accurate information about friendly forces. Degradation uses traditional jamming techniques, expendable countermeasures, destructive measures, or network applications. These range from limited effects up to complete denial of usage. 3] Disruption and degradation: In the context of EW, disruption and degradation techniques interfere with the enemys use of the electromagnetic spectrum to limit enemy combat capabilities. This is achieved with electronic jamming, electronic deception, and electronic intrusion. These enhance attacks on hostile forces and act as force multipliers by increasing enemy uncertainty, while reducing uncertainty for friendly forces. 4] Destruction: Destruction, in the context of EW, is the elimination of targeted enemy systems. Sensors and command and control nodes are lucrative targets because their destruction strongly influences the enemys perceptions and ability to coordinate actions. Various weapons and techniques ranging from conventional munitions and directed energy weapons to network attacks can destroy enemy systems that use the electromagnetic spectrum.

Advantages and Disadvantages of Electronic Attack:


Advantages:
We can protect our aircraft from detection of RADAR. We can misguide the RADAR and can attack the opponents and destroy them. Missile Guiding System. Useful in battlefield for different tactics and operations.

Disadvantages:

Aircraft using stealth technology has less speed, cant carry more weapons. It is expensive technology. Jammer are ineffective to Doppler RADARs.

Frequency hopping, pulse compression, radiation homming technologies are used against jamming techniques.

Chapter 6
Enlighting Future: Electronic warfare through effective use of detection, denial, deception, disruption, and destruction provides timely intelligence, enhances combat power by disrupting the enemys use of the electromagnetic spectrum at critical times, and ensures continued friendly use of the electromagnetic spectrum. The synergistic effects of various EW techniques can significantly disrupt an Bibliography: http://www.powerpoint-search.com/electronic-warfare-ppt4.html http://stealth.htm IADS, sensors, communication links, weapon systems, and C2. Jamming, chaff, and decoys degrade the enemys ability to find, fix, track, target, engage, and assess. Radar-guided weapon systems that survive destruction attempts lose some effectiveness in an EW environment. In short, the probability of success is greatly increased when EW is properly employed. Electronic warfare is a key element in the successful employment of air and space forces.

http://www.pdf-search-engine.com/electronic-warfarepdf.html http://www.radartutorial.eu/02.basics/rp08.en.html

Vous aimerez peut-être aussi