EBOOK Giới thiệu Hệ thống Quốc phòng Điện tử (Thư viện Radar Artech House) Filippo Neri EBOOK Giới thiệu Hệ thống Quốc phòng Điện tử (Thư viện Radar Artech House) Filippo Neri EBOOK Giới thiệu Hệ thống Quốc phòng Điện tử (Thư viện Radar Artech House) Filippo Neri EBOOK Giới thiệu Hệ thống Quốc phòng Điện tử (Thư viện Radar Artech House) Filippo Neri EBOOK Introduction to Electronic Defense Systems (Artech House Radar Library) Filippo Neri
Trang 1Second Edition
Filippo Neri
Artech House Boston London www.artechhouse.com
Trang 2Published by SciTech Publishing Inc
Raleigh NC
www scitechpub.com
SciTech President: Dudley R Kay
Production Manager: Susan Manning
Page Composition: J.K Eckert Sr Coinpan!
Cover Design: Brent Beckley
This is the SciTech corrected and reprinted softcover version of the Second Edition published by Artech House under the ISBN 1-580i3-179-2
Printed in the U.S.A
This book is available at special quantity discounts to use as premiums and sales pron~otions or for use in corporate training programs For more informa- tion and quotes, please contact:
Director of Special Sales
SciTech Publishing, Inc
02006 by SciTech Publishing Inc
02001 by Artech House, Inc
/dl rights reserved No part of this book may be reproduced or used in any form whatsoever without written permission except in the case of brief quota- tions embodied in critical articles and reviews
ISBN 1-891 12 1-49-9
Trang 3In my government position I am responsible for military research and tech- nology for the Italian armed forces During my coordination work with the Western European Armament Group: Panel I1 (Research and Technology), discussions have often been of a highly technical nature It is certainly eas- ier to make management decisions with an adequate technical background, rather than having to grope with a poor knowledge of such technical issues
As a result, I support any effort that has the objective of promoting an under- standing of the many facets of military technology within the international community of people in charge of armament matters
Therefore, I greatly welcome Filippo Neri's easy and straightforward explanations on the most recent developments in the electronic defense field, from stealth technology to decoys, from electronic support measures (ESM)
to advanced jamming techniques In particular, the principles underlying low probability of intercept (LPI) threats, passive location techniques, the benefits afforded by advanced digital receivers, towed decoy jammers, new cross-eye jamming self-protection techniques, and high-power microwave weapons, have been illustrated in very simple terms
This book illustrates the significant progress that electronic defense technology has made and is expected to achieve in the future with the advent
of advanced integrated systems (e.g., multifunction W systems and direct energy weapons) The latter will not only represent effective aids to military operations, but also act as a deterrent to any likely conflicts Moreover, the book describes how modern electronic defense systems operate and how they can be put to use in the military operations of today and tomorrow
Trang 4xvi Introduction t o Electronic Defense Systems
Since this book has been revised and updated to account for the new advances in electronic defense techniques and technologies, I am certain that this second edition will be as popular as the first, which has been selected as
a basic EW textbook by many military colleges both in Europe and in the United States As an Italian officer, I must confess to be proud of it
I hope that the insight gained from reading this book will help defense personnel to better define their requirements and prompt the defense indus- tries towards the development of high-performance, cost-effective, and affordable systems
Now that EW has proven to be a real deterrent and force-multiplier, I
hope that armed forces around the globe will realize the benefits that new technological developments can afford and that these new assets will con- vince decision-makers to abstain from undertaking sad wars based on hard- kill weapons and to pursue less destructive and more effective solutions
in order to arrive at no-casualty operations based on high-tech electronic defense in support of political activities
Major General Pietro Finocchio
Italian Air Force August 2001
Trang 5principal functions of the different electronic warfare systems, what the vul- nerable parts of radars are, what the limitations of weapon systems are, and what makes an electronic defense system effective
Taking advantage of my experience as a designer of radar and weapon systems, I thought that a single volume describing the operating principles of both weapon systems and electronic defense systems might be useful to those wishing or needing to enter the field
The book is addressed to those who are about to start working as designers of these systems, to those who are or will become their users, and to those who administer their procurement
The formulas and the mathematical theory have been reduced to a minimum, and readers are frequently invited to consult the appropriate ref- erences for in-depth analyses The book can therefore be read and under- stood by anyone with a secondary education and interest in the systems used
by the armed forces
The book is divided into eight chapters Chapter 1 explains briefly the usefulness of electronic defense, how it is organized, and what systems it includes In addition, it describes the operational objectives of electronic defense
Chapter 2 analyzes the sensors of weapon systems in order to highlight their merits and, above all, their limits The objective is to help the designer exploit their weaknesses
xvii
Trang 6xviii Introduction to Electronic Defense Systems
Chapter 3 gives examples of ardlery and missile systems that use the electronic sensors described in Chapter 2, again with the objective of empha- sizing how their effectiveness may be reduced
-chapter 4 describes and- analyzes electronic systems dedicated to passive interception, generally known as electronic support measures (ESM) Both those using radio-frequency emissions and those using infrared are described
Chapter 5 is devoted to the more striking part of electronic defense: electronic countermeasures (ECM); that is, the generation of signals that, by interfering with the receivers of "victim" systems, cause a degradation in the performance of the associated weapon systems
Since weapon systems can undergo intentional jamming aimed at reducing their capabilities, they have been equipped with counter- countermeasures (ECCM) systems These systems and their applications are described in Chapter 6, which gives an account of their effectiveness
The thrust and parry of countermeasures and counter-countermeasures seem to have no end,-and new technologies ensure that it is now possible to attack the very operating principles ofweapon systems, which makes the development of effective counter-countermeasures very difficult Chapter 7
describes this technological advance -
Finally, to assist designers in achieving the optimum solution of the design problems described in Chapters 4 and 5, Chapter 8 lists the criteria that should be followed during the design stage of electronic defense systems Chapter 8 also discusses the methods of evaluation and simulation that can determine whether a system is really effective This should be particularly helpful to those who have to decide on the choice of an electronic defense system
I hope that this book will be found useful It is best seen as a simple ref- erence book for the rapid evaluation and organization of material In the end, the quality of a system and the achievement of its operational objectives will depend, as always, on the ability, the preparation, and the dedication of those who have to perform the work
Trang 7I thank Enzo Benigni (president of Elettronica SpA), Gabriele Gambarara (general manager), and Giuseppe Maresca (marketing & sales director), for the encouragement they gave me while I was writing the second edition of this book
A special thank you to my first teacher on Radar Systems, Piero Guargua- glini (President of Finmeccanica) for the many discussions and suggestions
on Radar and EW techniques
I also thank my colleagues at Elettronica SpA and at other firms and organizations who have collaborated in the writing:
Andrea De Martino and V Rossi for their help and for material on radar systems; M Grazzini for SAR technique; S Scarfb and A Zaccaron for contributions to and revision of the material on digital receiver, DRFM, and location techniques; S Spillo for ESM receivers; F Conte for ECM mate- rial revision; A Bacchelli for advanced identification techniques; G Pinto for microwave technology; A Zammit for electro-optics technology revision; G Broli and M Stinco for ELINT systems; Candidoro Giannicchi for revision
of material on tracking systems; J Marks for chaff revision; D Autiero for shared apertures; Michele Russo for contributions on telecommunications systems; L Girardi, G Carlini, E Nitoglia, and L Caprioli for the artwork
In particular, I thank: Ubaldo Menegotti, ESM & I W manager, Elet- tronica SPA, for information warfare; Vic Pheasant, international counter- measures director, Chemring Group Plc, for chaff and flares; and Silvano Padovani, technical director, FIAR SPA, for airborne radar
Filippo Neri Rome, Italy
August 2001
xix
Trang 8This page has been reformatted by Knovel to provide easier navigation
Contents
Foreword xv Preface xvii Acknowledgments xix
References 36
Trang 9This page has been reformatted by Knovel to provide easier navigation
References 280
Trang 10This page has been reformatted by Knovel to provide easier navigation
Trang 11This page has been reformatted by Knovel to provide easier navigation
Trang 12Index 601
Trang 131.1 Introduction
With the passing of time, electronic technology has come to play an increas- ingly important role in military operations The electronic era, and with it the first steps in the introduction of electronics.into weapons, goes back to the time when radio and the radio direction finder were first used to give the platform position The second step was the introduction of radar for the detection, and location in angle and in range, of hostile platforms, and its subsequent use to increase the accuracy of artillery The last step, and proba- bly the most lethal one, has been the use of electronic devices for precision guidance of missiles (Figure 1.1)
The effectiveness of electronically guided weapon systems, expressed in terms of kill probability, has risen to values very close to unity, thus leaving undefended targets little hope of escape Consequently, almost all effective weapons now employ electronic guidance devices However, the sophistica- tion of'today's weapon systems is such that they are rendered worthless should their electronic circuits not operate correctly As a result, it has become essential to develop counter electronic systems capable of reducing the effectiveness of weapon guidance devices
The fruitfulness of these countermeasure techniques has quickly become ,apparent They have been developed to the point that they can seriously degrade the performance of nearly all weapon systems (Figure 1.2)
Trang 142 Introduction to Electronic Defense Systems
Figure 1.1 A missile system exploits radar signals to hit its targets with precision
Figure 1.2 The aim of an electronic defense system is to incapacitate the enemy's
weapon systems by generating electromagnetic jamming signals
Trang 15The inevitable next step has been the development of counter- countermeasures to try to restore the original effectiveness of the weapon sensors
The techniques and technologies that lead to the construction of devices capable of electronically countering a weapon system, and to the development of counter-countermeasures, go under the name "electronic warfare." However, given the basic harmlessness of these electronic sys- tems-"electrons don't make holes," at least as long as no directed-energy weapons are available-the name "electronic defense" seems more appropriate
1.2 Systems in Use in the Armed Forces
In every country, the armed forces have at their disposal a number of weapon systems, each with a different function The following brief survey of the missions of the navy, army, and air force will help to identify the main weapon systems against which electronic defense must operate
It should be emphasized that the aim of this survey is the identification
of electronically guided weapon systems, without reference to any specific military organization Moreover, systems pertaining specifically to nuclear warfare are outside the scope of this book; only systems used with conven- tional armaments will be discussed
Generally speaking, the mission of an air force is the surveillance and defense of the sky above national territory; the mission of a navy is the sur- veillance of the seas surrounding national territory and protection of impor- tant sea routes; and the mission of an army is the protection of the national territory itself
1.2.1 The Air Force
An air force has to provide air defense of the national territory, coordinating its own systems with those of the other armed forces That is, the air force must:
Contribute to the survival of important centers;
Inflict losses and give attrition when attacked by an enemy;
Ensure the neutralization of important military objectives in enemy territory;
Trang 164 Introduction to Electronic Defense Systems
Give air support to land and sea action;
Ensure air transport;
Execute reconnaissance as necessary
Under hostile air attack, survival of important centers and attrition of the enemy are achieved by combining the use of a surveillance (or search) radar network with the deployment of air forces in the area where an incursion has been detected
Such a combination is called an air defense network Air defense search radars are characterized by high sensitivity, and can detect and give early warning of, the approach of targets at long ranges They are sometimes called early warning radars (EWR) and are characterized by high sophistication and reliability, as they must operate continuously in the complete range of environments
Because of their sensitivity, they can give broad cover to the national air space The coordination of the data they provide and the correlation with other information (data fusion) take place in special command and control centers, where operational decisions are taken
In time of peace, upon the detection of a suspect aircraft (i.e., one that has not spontaneously revealed its identity), the search centers warn an air unit, usually consisting of two very fast and maneuverable fighter aircraft, and (with the help of an appropriate communications system) guide it toward the position of the aircraft that has to be identified The interceptor fighters approach the target, identify it, and either let it pass or force it to retrace its steps or to land (Figure 1.3)
In time of war, the procedure is different As soon as the presence of an alien aircraft has been discovered, the fighters (Figure 1.4) take to the air with quite different intentions They are still guided from the coordination center and try to locate the target as soon as possible with their own onboard radar Identification is made with the help of identification of friend or foe (IFF) equipment, devices for automatic recognition of friendly and hostile plat- forms If the result warrants it, they lock onto the target and fire at it with their onboard weapons (usually air-to-air missiles) They then try to make a
"kill assessment" to determine the amount of damage suffered by the target and finally make their way back to base If the target is not immediately hit
by a long- or medium-range missile, the fighters will have to approach closer
to the intruding aircraft, starting a series of dogfights either by launching short-range missiles, usually infrared-guided, or by firing their onboard cannon
Trang 17Figun 1.4 The task of fighter aircraft is to ensure air space superiority The photograph
showsthe European fighter aircraft (EFA)
Trang 186 Introduction to Electronic Defense Systems
Surveillance of air space can be conducted directly by air patrols or by a nerwork of air defense radars
The neutralization of military objectives of special importance on enemy territory is achieved by sending special strike aircraft (Figure 1.5) and bombers Strike aircraft make coven surprise attacks with a few units approaching the target at very low altitude Bomber tactics entail a powerful attack by many aircraft, aided by fighters, with radar and electro-optic sen- sors being employed to locate and identify their ground targets
In its air support role, the air force cooperates with ground forces
to stop the advance of enemy forces It launches air raids against advancing enemy columns and bombs their tanks and support services (the ground attack function) This function is carried out by fighter-bombers (Figure 1.G) which are extremely maneuverable aircraft fitted with a rariety of air-to- surface weapon systems
In addition, the air force will usually have to provide for the defense of its own bases, airfields, and services
To sum up, in order to be able to carry out the Functions detailed above, the air force will require the following systems:
SurveiILmcc andsearch ytm, consisting of land-based search radars (Figure 1.7) positioned on high ground (i.e., mountains, high hills)
to offset the limitations of radar range at low altitude, as explained in Chapter 2;
Airborne suwciIlancc and search ~ y s m (Figure 1.8) These systems are similar to the preceding ones but weigh less, and can therefore be
Figuml.5 Strike aircraft are entrusted with the task of hitting
tives on enemy ground The photograph shows the T
important military objee ornado in ks IDS version
Trang 19fighter-bomber
Figurn 1.7 The early detection and acquisition of targets is ensured by search radars
The photograph shows the RAT 31s search radar for land-based installations
Trang 208 Introduction to Electronic Defense Systems
Figurel.8 Airborne search radars permit detection of targets flying at low altitude The
photograph shows the airborne warning and control system (AWACS)
carried on board aircraft having long-range capabilities without refu- eling Such systems help to solve the problem of intercepting low- level targets at adequate ranges A very detailed control of a territory can be achieved by airborne side looking aperture (or antenna) radars (SLAR) that exploit synthetic apermre radar (SAR) tech- nique These radars are able to provide detailed images of the con- trolled territory even at night or in presence of clouds;
Fighters, characterized by very high speed and maneuverability, fit- ted with:
1 Radar systems for target acquisition and cracking (airborne inter- ceptors) (Figure 1.9) An onboard radar of this type is ser in the front ofthe Fuselage and is protected with a tapering shell, which
is transparent to electromagnetic waves, called a radome (radar dome);
2 Long-, medium-, and short-range air-to-air missile (AAM) sys-
Trang 21Figum 1.10 Sidewinder (IRI and Aspide (RFI air-to-air missiles installed on two F-104s
(2) AAM a n d air-to-surface missile (ASM) systems; (3) b o m b con- trol and guidance systems (often this type o f aircraft is fitted w i t h
Trang 2210 Introduction to Electronic Defense Svstems
terrain-following radar for blind navigation at very low altitude); and (4) fighter-bombers for ground attack
Besides all these, mention must be made of other aircraft assigned to the fol- lowing missions:
Transportation;
Patrolling;
Training;
A surface-to-air missile (SAM) system, for the defense of airfields
and other objectives of vital importance A missile system can be long-range, for the defense of a zone or an area (area defense) (Figure 1.1 I), or medium to short range for the defense of a site or
a point (point defense) (Figure 1.12) Usually, a missile defense system consists of a local search radar (sometimes called acquisition
Figum 1.11 Long-range SAM systems are frequently employed to defend huge areas of
territory The photograph shows the SAM Patriot system
Trang 2412 Introduction to Electronic Defense Systems
Convoy protection is carried out by well-armed naval vessels, which special- ize in conflict with various potential attack systems such as submarines, air- craft, and other large ships When some of a nation's interests lie Far From its own territorial waters, it will be necwary to deploy aircraft carriers (Figure 1.13) to ensure adequate air cover for the fleet For the navy, too, the system requirements will be on a par with those for air defense In fact, what
is needed is the organization of the defense of the very wide area covered by the whole fleet
The following systems will therefore be required:
Shipborne and airborne EWR to prevent surprise attadc against such
a valuable target as a carrier;
Figure 1.13 Aircraft carriers give the necessary air cover to the fleet when it operates
tar tram national waters
Trang 25Fighters and strike aircraft, equipped with medium- and long-range AAM and ASM systems
Because of its enormous value, a carrier is usually escorted by other naval ves- sels such as cruisers, destroyers, and frigates Ships of these three types conai- tute the usual naval armament of those nations whose strong interests are normally limited to their own territorial waters
Cruisers (Figure 1.14) are heavily armed, medium to high tonnage ships (8,000-20,000 tons displacement) They defend the formations that they escort from air, surface, and underwater threats Destroyers (4,000-8,000 tons) are in practice large frigates equipped with a variety of armament Frigates (Figure 1.15) are well-armed, low- to medium-tonnage ships (1,5004,500 tons) whose task is to provide an effective escort to other ships in convoy or formation Often they are designed for antisubmarine warfare Shipborne helicopters are frequently used in order to increase the effectiveness of this role
For patrolling not too far from coasts, moderately armed small tonnage vessels are often used, including corvettes (200-800 tons) and sometimes hydrofoils Effective patrolling is often achieved with small- or medium-
Figure1.14 The Italian 'all-deck" cruiser Garibaldi allowing the usage of vertical and
shorttakeoff and landing (V-STOLI aircraft
Trang 2614 Introduction to Electronic Defense Svstems
Figura 1.15 The Maestrale class frigate, equipped with the following radar-employing
systems: air-search radar, navigation radar, tracking radar for guidance of cannon and SAMs, and antiship Otomat missiles
tonnage submarines because of their very low detectability when submerged and the noise level is kept low Submarines and electroawustic equipment, such as active and passive sonar, and weapon systems such as magnetically or sonar-guided torpedoes are beyond the scope of this book
Minesweepers are responsible for the detection and neutralization of submerged mines dispersed by the enemy on major naval routes
Operationally, in time of war the seas are patrolled by the various naval formations Each vessel has an onboard long-range air-search system for early detection of potential air attack For good sensitiviry at medium to high alti- tudes, this radar operates at rather low frequencies, which, as will be seen later, does not allow good sensitivity detection at low altitudes In order to
Trang 27detect surface targets, higher-frequency radar is needed This last require- ment may sometimes be met in conjunction with the navigation radar, whose range is horizon-limited All of a ship's operations are controlled by its command, control, communications, and information ( c ~ I ) center, which also has the task of controlling the information exchange with satellites to get
a "wide area picture."
A naval vessel is a relatively easy target T o avoid detection, it has to limit its own radar and other electromagnetic emissions as much as it can Observed threats are first assigned to long-range missile systems (area defense) if sufficiently distant, and to SAM systems or to artillery fire (point defense) if at shorter ranges (in the jargon this operation is called "designa- tion or TI")
When a ship-to-ship engagement takes place, the first step is to launch antiship surface-to-surface missile (SSM) systems These are often called sea skimmers because they attempt to fly at an extremely low elevation where search radars do not see well (Figure 1.16) Obviously, each vessel tries to be the first to fire If no missiles are available, or if the target is not worthy of them, artillery systems can be used
As can easily be seen, the main threat to a ship is the antiship sea- skimming missile, because of its high kill probability and its low detectabil- ity For their own defense, naval vessels are frequently equipped with SAM systems (Figure 1.17) and special short-range systems, or close-in weapon systems (CIWS) that, once enabled, come into action automatically and fire
at missile threats detected at the very last moment (Figure 1.18)
T o sum up, the main weapon systems for a navy are:
Shipborne early warning surveillance and search systems;
Airborne surveillance and search systems (e.g., Maritime Patrol Air- craft);
Medium- to long-range SAM systems;
Short- to medium-range SAM systems;
Artillery or other weapon delivery systems;
SSM systems;
Trang 2816 Introduction to Electronic Defense Systems
figure 1.16 A radar-guided, sea-skimming missile is the greatest threat to a naval ves-
sel The photographs show la1 the launching of an antiship Otomat missile and lb) a Harpoon missile
Trang 29Figure 1.17 Launching of a SAM missile of the ALBATROS system
Figure 1.18 Short-range defense systems are the last links in a ship's defense system
The photograph shows the radar antenna and the gun of DARDO system
Trang 3018 Introduction to Electronic Defense Systems
1 2 3 Tho Army
The defensive task of an army is to conduct operations on the ground that will wear the enemy down by a process of attrition and repel or deter an attack T o achieve this end, the army will make use of the usual corps:
Infantry;
Armored units;
Artillery;
0 Engineers
To stop or weaken enemy forces, the army will have at its disposal ballistic
or inertial-guidance SSMs and long-range artillery to strike in-depth and to prevent the enemy from taking the initiative
It will have tanks to counter enemy tanks Those tanks will have weapon delivery systems controlled by laser rangefinders, which enable them
to hit with the first shot, hopefully without having come to a halt
The army will be provided with SAM systems (Figure 1.19) to counter the enemy's ground attack aircraft, as well as with radar-guided artillery
( M A ) (Figure 1.20) A characteristic of army systems is their mobiliry, so
Figure 1.19 SAM systems are frequently used to defend ground forces against air raids
The photograph showsthe Soviet SA-13 battery
Previous Page
Trang 31point defense SKYGYARD
Trang 3220 Introduction to Electronic Defense Svnems
that they can easily follow troop movements and be redeployed frequently to avoid being detected and destroyed
The army will also be equipped with helicopters (Figure 1.21) able to climb swiftly and to launch wire- or infrared-guided ASMs against enemy ranks
Figurel2l Thanks to as mobility, the helicopter is extremely effective againn tanks
The photograph shows the A-129 antitank helicopter
Trang 33T o help them control the battlefield, the army will use dedicated information-gathering sensors, such as radars, infrared systems, and remotely piloted vehicles (RPVs), also known as unmanned air vehicles (UAVs) The army will have antimortar radar systems capable of locating accu- rately the direction and hence the location from which projectiles are fired so
as to be able to direct counterfire with precision to destroy the battery More recently, weapon-locating radars (WLRs) have been developed to specifically locate the source of rockets
In an army, C ~ I systems have great importance In fact, the army con- sists of a multitude of extremely mobile units whose activities are constantly
Long-, medium- and short-range artillery systems;
Search and acquisition radar systems to detect the ground attack aircraft;
SAM systems;
AAA systems;
Antimortar radars and WLRs;
Armored vehicles;
Helicopters with wire- or infrared-guided missiles;
Battlefield surveillance systems
1.3 The Main Weapon Systems
All the operations listed above are conducted in two phases: first the detec- tion phase, and then the response phase in which missiles or guns are used Accordingly, the main systems employed by the armed forces against which protection is required are the following:
Search systems;
Missile systems;
Artillery systems
Trang 3422 Introduction to Electronic Defense Systems
The functioning of all these systems is based on the use of electronic sen- sors It has been amply proved that the effectiveness of a weapon system
is destroyed by adequately jamming its sensors The concept of electronic defense, the development of specialized equipment, and the mission it has to accomplish, are all consequences of this fact
In order to understand the way in which jamming interferes with weapon systems, it is necessary to examine in more detail how the weapon systems themselves are structured and how they operate
The performance of an air defense system depends on the capabilities
of the long-range search radar associated with it An electronic device designed to jam a detection system can interfere only with the radar sensor and its signal processing, as the ensuing data processing can take place in remote, well-protected command and control centers
As already stated, a missile system usually consists of:
A medium-range search radar (acquisition radar);
A number of tracking radars, each tracking one target to supply guidance data for the missile;
A number of missile launchers
A missile may be guided exclusively by commands from the tracking radar (command missile) or it may be launched on the basis of data supplied by the tracking radar, and then acquire signals for self-guidance to its target (hom- ing) Homing, therefore, can be as follows:
Active, if the missile is fitted with a sensor (seeker comprising a small tracking radar);
Semiactive, if the energy source is an illuminator at the missile site and the seeker is a tracking radar receiver that sees radiation reflected
by the target;
Passive, if the missile has a seeker that does not require any transmit- ter but detects the energy radiated by the target in the infrared, ultra- violet, or microwave spectrum
An artillery system consists of:
A medium-range search radar (acquisition radar);
Trang 35A number of tracking radars (sometimes the tracking is achieved by optical means);
A number of cannon and machine guns
Here too the search radar detects and identifies the target, then designates it
to a tracking radar The tracking radar searches, detects, acquires, and tracks the indicated target, and supplies its data to a computer that accurately com- putes the interceptor point and aims the weapon
T o sum up, it is apparent from this review that all of the weapon systems that we have examined employ one of the following sensors, which could be the victim of electronic jamming systems:
1.4 The Objectives of Electronic Defense
In Section 1.3, the main means of defense and offense have been listed, based
on "hard kill." This section deals with the electronic defense devices them- selves, their military functions, and how by interfering with them "soft kills"
of the enemy can be achieved
1.4.1 The Organization of Electronic Defense
It should be remembered that the ultimate objective of electronic defense
is to minimize the effectiveness of those weapon systems that draw on
Trang 3624 Introduction to Electronic Defense Systems
electronic sensing devices for their operation T o achieve this end, the follow- ing measures are necessary:
Strategic knowledge of the enemy's electronic devices This is obtained by monitoring and studying the signals that they emit [sig- nal intelligence (SIGINT)]
Tactical knowledge of the enemy's devices, that is, knowledge of the distribution over an area, or around the protected point or platform,
of hostile electromagnetic sources [electronic order of battle (EOB)] This is needed both for a defensive response for self-protection or mutual protection and for an electronic offense operation suppres- sion of enemy air defense (SEAD) Responses employing traditional weapons are not discussed here
Generation of electronic countermeasures (ECM), which has as its aim the maximum reduction of the operational capabilities of enemy electronic devices, including search radars, acquisition and tracking radars, infrared systems, laser systems, and communications systems
Adoption of electronic counter-countermeasures (ECCM) It is
in fact sometimes possible to reduce or eliminate an intentionally caused disturbance or interference by incorporating filters and other special devices
The organizational display of electronic defense, as shown in Figure 1.22, is based on the above list
1.5 Electronic Defense Systems and Their Operational Objective
The main electronic defense systems will be defined here according to their position in the table of organization (Figure 1.22) It should be remembered that an electronic defense system can consist of a collection of the equipment described next For example, it is possible to have two separate electronic support measures (ESM) and ECM systems, or one integrated system, when both functions are performed together
Signal Intelligence (SIGINT)
The task of SIGINT systems is the acquisition of as much data as possible about the electromagnetic emissions of a potential enemy They can be fur- ther classified into electronic intelligence (ELINT) systems, which collect
Trang 37Electronic Electronic Electronic counter- intelligence support measures countermeasures countermeasures
COMINT
Communications I I I ECM 11 ECM 11 ECCM 11 ECCM
intelligence (Communication) (Weapons systems) (Weapons systems) (Communication)
Trang 3826 Introduction t o Electronic Defense Systems
radar emission data, and communications intelligence (COMINT) systems, which collect enemy communication data
Their function is primarily a strategic one; they are essential for the identification of a potential enemy's operational procedures
Electronic Intelligence (ELINT)
This equipment must be able to define the characteristics, the time depend- ence, and the location of hostile electronic emissions It should also be able to analyze the enemy's electronic signals both in time and in frequency, and to associate with them a serial number of the enemy's equipment (i.e., fingerprinting), sometimes even in a one-to-one relation, thus making it pos- sible to follow the movement of the equipment
These systems can be airborne for deep probes into the electronic sce- nario of a potentially hostile country They can also be land-based, located
on sufficiently elevated mountain sites and on promontories or straits, for control of sea traffic (Figure 1.23)
The collected data are usually transmitted to an analysis center, which codes them suitably, memorizes them in a database, and correlates them with the information gathered by equipment of other types, or by other organiza- tions, or at different times
Figure 1.23 The main purpose of an ELINT system is to intercept and analyze, for strate-
gic purposes, all the electromagnetic radiation generated in a potentially hostile country
Trang 39All this information, processed according to operational criteria estab- lished by the military organizations, will be used to build up special files
in which all emissions and other features of enemy equipment will be listed (libraries) From these files information is compiled to be loaded into the memories of electronic defense equipment used for detection of enemy signals
Communications Intelligence (COMINT)
These systems are similar to the preceding ones, but their task is the intercep- tion and analysis of telecommunications emissions and the identification of relevant communications networks
Electronic Support Measures (ESM)
The main objective of equipment of this type of class is tactical interception The simplest systems are those whose main function is to detect the presence
of already known emitters by comparison of the intercepted signals with stored data They are called radar warning receivers (RWR)
This equipment, which can instead reconstruct a very complex electro- magnetic scenario, including previously unknown emitters, and can there- fore contribute to an attack by identifying and detecting enemy platforms, is more sophisticated These are the ESM systems
RWR
The main features of equipment of this class are simplicity (they measure few parameters with moderate accuracy), high reliability, low weight, and low cost
They are used to detect an imminent threat, that is, the presence in a
given direction of the radar of a hostile weapon system locked on to the protected platform They are mainly committed to aircraft defense and enable the pilot to react promptly either by an evasive maneuver, or by both a maneuver and the simultaneous launching of chaff, which consists of explo- sive cartridges containing millions of tiny, extremely light dipoles, capable of generating a very strong radar echo that masks the platform (see Chapter 5),
or by generating electronic jamming signals, or by a combination of these different techniques
ESM
This class of equipment is characterized by medium to high complexity and sophistication Its task is an almost real-time reconstruction of an electro- magnetic scenario, which can be highly complex and previously unknown,
Trang 4028 Introduction to Electronic Defense Systems
starting from the interception of the multitude of signals crowding into its antenna Usually, the total "traffic" consists of pulse and continuous wave signals Pulse signals are frequently very dense (millions of pulses per sec- ond), are dispersed on bandwidths from a few hundred megahertz to a few tens of gigahertz to millimeter waves, and make use of the most varied wave forms, including pulses, modulated pulses, and so forth
The main aim of such a system is to give a picture of the electromag- netic scenario in the environment both for self-defense, by discovering the presence of enemy platforms (ESM on a naval platform) (Figure 1.24), and for passive surveillance of a wide area (ESM on an aerial platform or land- based network of ESM systems)
Reconstruction of the electromagnetic environment depends both on detection of the electromagnetic signal input to the antennas and on charac- terization of signals in terms of carrier frequency, direction of arrival (DOA), time of arrival (TOA), pulse width (PW), amplitude, modulation on pulse (MOP), form and modulation in time, and modulation and amplitude of continuous waves (CW)
Out of this information an ESM installation must extract knowledge of the generating emitters The process of correlating pulses and of grouping them in possible "families" is a very complex one, and is called sorting or deinterleaving Because of the variability of the signals, automatic extraction
is even more difficult Frequently, wrong conclusions are reached: Emitters that do not really exist are created, and so false alarms are generated that reduce the reliability of the equipment
TN2:RADAR No 2 TN3:RADAR No 3
Figure 1.24 The purpose of an ESM system is to detect the presence of enemy platforms
by intercepting their electromagnetic emissions