google search engine

Google
 

ELECTRONIC WARFARE

INTRODUCTION

In the prehistoric times the battles were fought with swords ,bows and arrows, etc. But with the advancement of mankind in various areas especially technological. Now he has entered into a new kind of warfare this is known as electronic warfare. He uses his intelligence and with technology as his tool, he creates plans to defeat his enemy.

Electronic warfare mainly consists of electronic equipments and gadgets to detect enemy in the host area then take defensive action to defend .it also covers jamming the enemy devices in our territory. Jamming is also of different types which will be covered in detail .

By using these warfare methods effectively and intelligently we can save a lot of lives of our soldiers and also of innocent civilians of that particular area.



ELECTRONIC WARFARE

Electronic warfare (EW) includes any military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or attack an enemy. EW comprises three major subdivisions:

2.1 Electronic attack (EA)

Use of electromagnetic or directed energy to attack personnel, facilities, or equipment with the intent of degrading, neutralizing, or destroying enemy combat capability.

2.2 Electronic support (ES)

Actions taken by, or under direct control of, an operational commander to search for, intercept, identify, and locate sources of radiated electromagnetic energy for immediate threat recognition in support of EW operations and other tactical actions such as threat avoidance, homing, and targeting

Electronic Support is a passive activity as the Electronic Support equipment does not transmit any electromagnetic energy in the performance of its roles. It is important that the adversary remains unaware of the ES activity, because there are many tactics an adversary radar system can employ to make the Electronic Support role even more difficult than it is normally.

Additionally, remaining passive lessens the opportunity for the adversary radar to plant false information into the transmissions in an attempt to corrupt or confuse the Electronic Support effort.

2.3 Electronic protection

Actions taken to protect personnel, facilities, or equipment for any effects of friendly or enemy employment of electronic warfare that degrade, neutralize, or destroy friendly combat capability.

2.4 Passive EW

n Electronic Intelligence (ELINT): Info derived from foreign non-comms EM information, particularly radar.

n Communications Intelligence (COMINT): Info derived from foreign comms.

EW and directed warfare are leading technologies for solving Army problems in scenarios where nonlethal (i.e., no permanent injury) or less than lethal (i.e., could suffer serious injury) force is required.

2.5 Effectiveness factors

Many factors impact on the effectiveness of Electronic Support, but all factors can be grouped into one of the following categories

1. transmitter characteristics including transmitted power, operating frequency, polarisation, signal bandwidth;

2. transmitting antenna characteristics including beamwidth, sidelobe levels, and scan patterns;

3. environmental characteristics between the radar and the Electronic Support equipment including atmospheric and meteorological conditions; and

4. the capability of the Electronic Support equipment including the receiving antenna characteristics, and the receiver capabilities and sensitivity.

TECHNOLOGY SUBAREAS

3.1 Electronic Attack

Goals and time frames

Develop the technologies that provide the capability to intercept and bring under EA advanced communications signals being used by adversarial C2 networks on the digital battlefield. Through EA strategies demonstrated with prototype hardware and software, these digital communications signals will be disrupted, denied, or modified to render the communications system ineffective and unreliable to the threat command and control function. Near–term goals are to demonstrate electronic attack against a set of digital formats being implemented in commercial communications systems and data transmission systems.

Mid–term goals are to demonstrate the ability to disrupt other commercial communication networks and wide bandwidth communications. Long–term goals include the ability to surgically attack specific users within a nonobtrusive means while maintaining the overall integrity of the targeted communications network.

Development of sensor and countermeasure technologies is a complex chess game of trying to outplay your opponent, betting that your defensive systems can outmatch his offensive capabilities. Advanced technology and tactics are the last line of defense where a time span of 2 seconds or less can mean the difference between winning or losing. Technology goals include development of multifunctional/multispectral IR countermeasures, radar and laser warning, and countermeasures that can provide both self– and area–protection of air and ground platforms, as well as targeting and real–time situational awareness at the fighting station(s). Near–term goals include demonstration of a beam coupler for the DARPA laser/antitank infrared countermeasures (IRCM) point/tracker, the evaluation of IRCM techniques for top attack threats for ground vehicles, and the demonstration of an RF sensor and ECM modulator with the capability to locate, deceive, and jam monopulse and phased array radars from ultra high frequency (UHF) through millimeter wavebands. Mid–term goals include development of countermeasures for advanced EO/IR missiles using imaging seekers, and the continued development of advanced RF countermeasures with low–cost fingerprinting for signal sorting, jamming, targeting, and combat identification. Long–term goals include initiatives to develop integrated RF/IR/laser sensors and countermeasures against advanced EO/IR surface–to–air missiles and horizontal/top attack smart munitions.

Major Technical Challenges

The increasing use of common carrier commercial communications networks by potential adversaries presents the major technical challenge. We must be able to separate the threat–relevant communications from the purely commercial traffic and perform effective EW without disrupting the entire network. These targeted communication systems are characterized as adaptive sophisticated digital networks and modulation schemes that employ various layers of protocol and user protection.

Technology challenges also include development of uncooled, low false alarm rate detectors with <1>



Figure IV-8. Battlefield Applications of DEW and Jamming

No comments:

google search engine

Google