1 / 46

Electronic Warfare IW - 150

College of Aerospace Doctrine, Research, and Education. Electronic Warfare IW - 150. INFORMATION-in-WARFARE. INFORMATION WARFARE. attack. gain. exploit. defend. COUNTERINFORMATION. DEFENSIVE COUNTERINFORMATION. OFFENSIVE COUNTERINFORMATION. Precision Nav & Position. Weather. ISR.

Anita
Télécharger la présentation

Electronic Warfare IW - 150

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. College of Aerospace Doctrine, Research, and Education Electronic Warfare IW - 150

  2. INFORMATION-in-WARFARE INFORMATION WARFARE attack gain exploit defend COUNTERINFORMATION DEFENSIVE COUNTERINFORMATION OFFENSIVE COUNTERINFORMATION Precision Nav & Position Weather ISR Information Assurance Counter- Intelligence PSYOP Physical Attack PAO Other Info Collection/ Dissemination Activities Military Deception Electronic Warfare OPSEC Counter- Propaganda PAO CNA Counter- Deception Electronic Protect CND PAO AFDD 2-5 INFORMATION SUPERIORITY INFORMATION OPERATIONS Successfully executed Information Operations achieve information superiority

  3. Overview EW FUNDAMENTALS ELECTRONIC SUPPORT - Basics - Assets ELECTRONIC ATTACK - Basics - Assets ELECTRONIC PROTECT - Basics - Assets INTEGRATION

  4. AFDD 2-5.1 Electronic Warfare … any military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or to attack an adversary.

  5. COMINT COMMS SIGINT Denial (OPSEC) Indications & Warning Deception Examples Laser Rangefinders Microwave Comms Radar Surveillance Electronic ID (IFF) Infrared Imagery EHF for Satellite Control Why is Electronic Warfare a pillar of Information Warfare? INFORMATION FUNCTIONS ACROSS THE EM SPECTRUM!

  6. Flight Chief / Deputy DCI Officer OCI Officer IA Planners EW Planner OPSEC Planner Deception Planner Counterdeception Planner Special IO Planner Counterintelligence Planner PSYOP Planner Space Planner NOSC-Defense Planner (A6) SIGINT, ELINT, MASINT HUMINT Specialists Counterintelligence Analysts IW Flights at Selected NAFs • MISSION: Provide full OCI/DCI planning capability to the NAF 26-29 Personnel

  7. Electromagnetic Spectrum The range of frequencies of electromagnetic radiation from zero to infinity

  8. ULTRA VIOLET EM SPECTRUM T H z 3 0 0 0 3 0 0 T H z 3 G H z 3 0 0 K H z 3 0 G H z 3 0 0 G H z 3 T H z 3 0 T H z 3 0 M H z 3 0 0 M H z 3 M H z D C VISIBLE INFINITY ELECTRO-OPTICAL RADIO WAVES X-RAYS MM MICROWAVES INFRARED WAVES GAMMA RAYS EHF UHF SHF MF HF VHF 1km 1m 1 mm 1 um .1 um .72 um .4 um WAVELENGTH

  9. Frequency Bands LF LORAN C 100 kHz MF LORAN A 1750-1950 kHz AM RADIO 535-1605 kHz HF CITIZENS BAND 26.965-27.405 MHz VHF TV (CH 2-6) 54-88 MHz FM RADIO 88-108 MHz VOR 108 - 118 MHz VHF COMM 118 - 136 MHz TV (CH 7-13) 174-216MHz UHF UHF COMM 225 - 400 MHz TV (CH 14-83) 470-890 MHz TACAN 962-1213 MHz

  10. EW FUNDAMENTALS ELECTRONIC SUPPORT ELECTRONIC ATTACK ELECTRONIC PROTECT INTEGRATION

  11. Electronic Attack • That division of electronic warfare involving the use of electromagnetic (EM), directed energy (DE) or anti-radiation weapons to attack personnel, facilities, or equipment with the intent of degrading, neutralizing, or destroying enemy combat capability

  12. Anti-Radiation Munitions • Any munition using an enemy’s source of electromagnetic radiation as a primary means of terminal guidance for the purpose of damaging or destroying the source

  13. AFTER BEFORE ARM Effects? SA-2 FAN SONG RADAR

  14. Directed Energy • Directed energy is an umbrella term for technologies relating to the production of a beam of concentrated EM energy or atomic or subatomic particles

  15. LASERS • Common on the battlefield • Low power • Dazzle / disorient personnel • Degrade sensors / optics • Objects with or near the source veiled • High power • Eye damage • Destroy sensors / optics • Damage / degrade guidance & seeker hardware • At long ranges dazzle / disorient

  16. NonDestructive EA • Jamming • Electromagnetic Deception

  17. Noise Jamming The deliberate radiation, reradiation or reflection of electromagnetic energy Advantages • Instantaneous application • Repeated applications • Degrades radar capabilities Disadvantages • Loss of surprise • Effects on friendly systems • Effectiveness measured by end game response

  18. Electromagnetic Jamming ...Often a battle of brute force

  19. Electronic Attack Assets EC-130H F-16 CJ EA-6B DRONES

  20. EC-130HCompass Call ROLE: Conducts information warfare using a computer-assisted and operator-controlled narrow band comm & data-link jammer system DESIGNED TO COUNTER: Air-to-air communication systems (A/A) Airborne-controlled intercept systems (ACI) Ground-controlled intercept systems (GCI) Command and control networks (C2)

  21. F-16CJ Wild Weasel ROLE: Multi-role, single seat, all weather, air superiority fighter MISSIONS: Suppression of Enemy Air Defenses (SEAD) Destruction of Enemy Air Defenses (DEAD) Offensive-Counter Air (OCA) Defensive-Counter Air (DCA)

  22. EA-6BProwler ROLE: To support strike aircraft and ground troops by degrading enemy electronic activity and to obtain tactical electronic intelligence MISSIONS: Electronic Support (ES) Electronic Attack (EA) Suppression of Enemy Air Defense (SEAD)

  23. Electronic Deception • The deliberate radiation, re-radiation, alteration, absorption, or reflection of electromagnetic energy in a manner to mislead an enemy in the interpretation or use of information received by his electronic systems • Meaconing • Chaff • Flares • A-10 Rudders • B-2 Engines • Stealth Technology

  24. Chaff • Thin strips of metal or metalized glass • Reradiate the radar energy • Cut to counter specific frequencies • Purpose • Generate False Targets • Deny Radar Scan (Chaff Corridor) • Track breaking (against target trackers) • In operational use since 1943

  25. Flares • Rapid burning dispensable • Function • Decoy for IR missile • Characteristics • Must have more IR energy in the missile’s FOV than the aircraft • Appropriate frequency coverage • Enough burn time LARGE FOV SMALL FOV

  26. Drones • Designed to saturate the enemy’s air defense systems • Act as missile bait • Quail • Sampson • TALD • Shooters?

  27. OVERVIEW EW FUNDAMENTALS ELECTRONIC SUPPORT ELECTRONIC ATTACK ELECTRONIC PROTECT INTEGRATION

  28. Electronic Protect • Actions taken to protect personnel, facilities, and equipment from any effects of friendly or enemy employment of EW that degrade, neutralize, or destroy friendly combat capability.

  29. EMCON • Emissions control • Selective and controlled use of EM, acoustic, or other emitters to optimize C2 capabilities while minimizing detection of enemy sensors • Example: Turn off mapping radar... • Turn off IFF? • What sort of IW is EMCON? Defensive Counterinformation

  30. Hardening forms a solid barrier against unwanted EM energy EM Hardening • Action taken to protect personnel, facilities, and/or equipment against undesirable effects of EM energy • Methods • Filtering • Attenuating • Grounding • Shielding

  31. Frequency Deconfliction • Joint Restricted Frequency List (JRFL) • Guarded • Frequencies exploited by intelligence • Restricted • Friendly frequencies which should not be jammed unless absolutely necessary • Taboo • Friendly frequencies that must never be jammed • Who cares about the JRFL?

  32. Other EP Techniques • WARM • Frequency Hopping • Directional Antennas • LPI • Go off spectrum

  33. EW FUNDAMENTALS ELECTRONIC SUPPORT ELECTRONIC ATTACK ELECTRONIC PROTECT INTEGRATION

  34. Electronic Support • Actions taken by, or under direct control of an operational commander to search for, identify, and locate sources of radiated electromagnetic energy for immediate threat recognition in support of EW and other tactical operations

  35. Electronic Support • ES provides a source of information required for immediate decisions involving electronic attack (EA), avoidance, targeting and other tactical employment of forces—particularly SEAD forces! • ES assets and data can also be used to produce signals intelligence (SIGINT), communications intelligence (COMINT) and electronic intelligence (ELINT)

  36. Electronic Support Assets U-2 EP-3 RC-12 RC-135

  37. U-2SDragon Lady ROLE: ES / SIGINT / IMINT support to theater commander, battlestaff & warfighters

  38. EP-3 Aries • ROLE & MISSION: • Multi-INT scientific and technical collection of naval and littoral targets • Fleet support • SENSORS: • ACINT • COMINT • ELINT • LASINT • IMINT: oblique camera, vertical camera, FLIR, & TOSS

  39. RC-12 Guardrail • US Army modified C-12 • COMINT / ELINT collection program • Common sensor • Tethered to a ground site • Subordinate to army corps CC

  40. RC-135Rivet Joint ROLE: Collect, correlate, fuse, and disseminate tactical intelligence in near real-time to the warfighter DESIGNED TO: Conduct electronic warfare support Provide ELINT and COMINT Establish OB baselines Provide indications and warnings Provide limited BDA

  41. AUTOMATIC SYSTEMS • Computer driven • Timeliness • Data link • Accuracy • LOB’s • Limited parametric data • RF, PRI, PW • Process thousands of signals per mission • Hundreds of signals simultaneously

  42. THE FUTURE - UAVs • 5 UAVs UNDER DEVELOPMENT • JOINT AIRBORNE SIGINT ARCHITECTURE (JASA)

  43. EW FUNDAMENTALS ELECTRONIC SUPPORT ELECTRONIC ATTACK ELECTRONIC PROTECT INTEGRATION

  44. SUPPRESSION OF ENEMY AIR DEFENSE (SEAD) • That activity which neutralizes, destroys, or temporarily degrades enemy air defenses in a specific area by physical attack, deception and/or electronic warfare

  45. Goals of SEAD • Isolate -- SAM or AAA operator from C2 • Minimize --shrink associated weapon’s system engagement envelope (jamming and deception) • Disable/Destroy -- the weapon system (ARMs, bombs, etc.) • Bombs on Target -- allow the strike package to deliver ordnance on the JFACC’s targets.

  46. Theater SEAD Campaign Integrates IW, IIW, and EW • EA—HARMs, Jamming Acquisition radars, Deceiving Passive collectors, denying Comms • ES--Use of Collectors to target IADS nodes (TCT) and provide warning to strikers/HVAA • OPSEC to protect mission • PSYOPS to reinforce desired behavior • Information Attack: Deceive or Deny IADS • IIW: IPB, fused real-time intel, assessment

More Related