SvenSvensonov
PROFESSIONAL
- Joined
- Oct 15, 2014
- Messages
- 1,617
- Reaction score
- 207
- Country
- Location
I put this together for those interested in electronic warfare, it's just the basics, but it provides a good foundation for further lessons that I will provide throughout the coming months. All information is referenced from publicly available US military documents as well as my own experience with ECM and ECCM. No classified information will be provided. Information can be cross-referenced with future lessons/posts using the JP/FM codes provided within the document.
*Example - FM 1-12 = document FM, Chapter 1 section 1-12.
This first document is has the FM code, FM 1.XX to be more accurate as it is the first chapter. Code designated post JP will follow at a yet-to-be-determined date (still working on it).
*EDIT - this document is now complete, all sections posted.
*a "z" prior to a word indicates a line-break, but the document didn't translate well from Microsoft Word - where I put the document together. Sorry for that inconvenience.
SvenSvensonov
Electronic Warfare Overview
OPERATIONAL ENVIRONMENTS
1-1.An operational environment is a composite of the conditions, circumstances, and influences that affect the employment of capabilities and bear on the decisions of the commander (JP 3-0). An operational environment includes physical areas—the air, land, maritime, and space domains. It also includes the information that shapes the operational environment as well as enemy, adversary, friendly, and neutral systems relevant to a joint operation. Joint planners analyze operational environments in terms of six interrelated operational variables: political, military, economic, social, information, and infrastructure. To these variables Army doctrine adds two more: physical environment and time. (See FM 3-0 for additional information on the operational variables). Army leaders use operational variables to understand and analyze the broad environment in which they are conducting operations.
1-2.Army leaders use mission variables to synthesize operational variables and tactical-level information with local knowledge about conditions relevant to their mission. They use mission variables to focus analysis on specific elements that directly affect their mission. Upon receipt of a warning order or mission, Army tactical leaders narrow their focus to six mission variables known as METT-TC. They are mission, enemy, terrain and weather, troops and support available, time available and civil considerations. The mission variables outline the situation as it applies to a specific Army unit.
1-3.Commanders employ and integrate their unit’s capabilities and actions within their operational environment to achieve a desired end state. Through analyzing their operational environment, commanders understand how the results of friendly, adversary, and neutral actions may impact that end state. During military operations, both friendly and enemy commanders depend on the flow of information to make informed decisions. This flow of information depends on the electronic systems and devices used to communicate, navigate, sense, store, and process information.
INFORMATION AND THE ELECTROMAGNETIC SPECTRUM
1-4.Commanders plan for and operate electronic systems and the weapon systems that depend on them in an intensive and non-permissive electromagnetic environment. They ensure the flow of information required for their decision making. Within the electromagnetic environment, electronic systems and devices operate in the electromagnetic spectrum.
1-5.The electromagnetic spectrum has been used for commercial and military applications for over a century. However, the full potential for its use as the primary enabler of military operations is not yet fully appreciated. New technologies are expanding beyond the traditional radio frequency spectrum. They include high-power microwaves and directed-energy weapons. These new technologies are part of an electronic warfare (EW) revolution by military forces. Just as friendly forces leverage the electromagnetic spectrum to their advantage, so do capable enemies use the electromagnetic spectrum to threaten friendly force operations. The threat is compounded by the growth of a wireless world and the increasingly sophisticated use of commercial off-the-shelf technologies.
1-6.Adversaries and enemies, from small and single actors to large state, multinational, and non-state actors, use the most modern technology. Such technology is moving into the cellular and satellite communications area. Most military and commercial operations rely on electromagnetic technologies and are susceptible to the inherent vulnerabilities associated with their use. This reliance requires Army forces to dominate the electromagnetic spectrum (within their operational environment) with the same authority that they dominate traditional land warfare operations. Emerging electromagnetic technologies offer expanded EW capabilities. They dynamically affect the electromagnetic spectrum through delivery and integration with other types of emerging weapons and capabilities. Examples are directed-energy weapons, high-powered microwaves, lasers, infrared, and electro-optical and wireless networks and devices.
1-7.In any conflict, commanders attempt to dominate the electromagnetic spectrum. They do this by locating, targeting, exploiting, disrupting, degrading, deceiving, denying, or destroying the enemy’s electronic systems that support military operations or deny the spectrum’s use by friendly forces. The increasing portability and affordability of sophisticated electronic equipment guarantees that the electromagnetic environment in which forces operate will become even more complex. To ensure unimpeded access to and use of the electromagnetic spectrum, commanders plan, prepare, execute, and assess EW operations against a broad set of targets within the electromagnetic spectrum.
DIVISIONS OF ELECTRONIC WARFARE
1-8.Electronic warfare is defined as military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or to attack the enemy. Electronic warfare consists of three divisions: electronic attack, electronic protection, and electronic warfare support.
ELECTRONIC ATTACK
1-9.Electronic attack is a division of electronic warfare involving the use of electromagnetic energy, directed energy, or antiradiation weapons to attack personnel, facilities, or equipment with the intent of degrading, neutralizing, or destroying enemy combat capability and is considered a form of fires.
13.1). Electronic attack includes— zActions taken to prevent or reduce an enemy’s effective use of the electromagnetic spectrum, such as jamming and electromagnetic deception.
z Employment of weapons that use either electromagnetic or directed energy as their primary destructive mechanism (lasers, radio frequency weapons, particle beams).
z Offensive and defensive activities including countermeasures.
1-10.Common types of electronic attack include spot, barrage, and sweep electromagnetic jamming. Electronic attack actions also include various electromagnetic deception techniques such as false target or duplicate target generation. (See paragraphs 1-23 to 1-31 for further discussion of electronic attack activities.)
1-11.Directed energy is an umbrella term covering technologies that relate to the production of a beam of concentrated electromagnetic energy or atomic or subatomic particles (JP 1-02). A directed-energy weapon uses directed energy primarily as a direct means to damage or destroy an enemy’s equipment, facilities, and personnel. In addition to destructive effects, directed-energy weapon systems support area denial and crowd control. (See appendix A for more information on directed energy.)
1-12.Examples of offensive electronic attack include— z Jamming enemy radar or electronic command and control systems.
z Using antiradiation missiles to suppress enemy air defenses (antiradiation weapons use radiated energy emitted from the target as their mechanism for guidance onto targeted emitters).
z Using electronic deception techniques to confuse enemy intelligence, surveillance, and reconnaissance systems.
z Using directed-energy weapons to disable an enemy’s equipment or capability.
1-13.Defensive electronic attack uses the electromagnetic spectrum to protect personnel, facilities, capabilities, and equipment. Examples include self-protection and other protection measures such as use of expendables (flares and active decoys), jammers, towed decoys, directed-energy infrared countermeasure systems, and counter-radio-controlled improvised-explosive-device systems. (See JP 3-13.1 for more discussion of electronic attack.)
ELECTRONIC PROTECTION
1-14.Electronic protection is a division of electronic warfare involving actions taken to protect personnel, facilities, and equipment from any effects of friendly or enemy use of the electromagnetic spectrum that degrade, neutralize, or destroy friendly combat capability (JP 3-13.1). For example, electronic protection includes actions taken to ensure friendly use of the electromagnetic spectrum, such as frequency agility in a radio, or variable pulse repetition frequency in radar. Electronic protection should not be confused with self-protection. Both defensive electronic attack and electronic protection protect personnel, facilities, capabilities, and equipment. However, electronic protection protects from the effects of electronic attack (friendly and enemy), while defensive electronic attack primarily protects against lethal attacks by denying enemy use of the electromagnetic spectrum to guide or trigger weapons.
1-15.During operations, electronic protection includes, but is not limited to, the application of training and procedures for countering enemy electronic attack. Army commanders and forces understand the threat and vulnerability of friendly electronic equipment to enemy electronic attack and take appropriate actions to safeguard friendly combat capability from exploitation and attack. Electronic protection measures minimize the enemy’s ability to conduct electronic warfare support (electronic warfare support is discussed in paragraphs 1-18 to 1-20) and electronic attack operations successfully against friendly forces. To protect friendly combat capabilities, units— zRegularly brief force personnel on the EW threat.
z Ensure that electronic system capabilities are safeguarded during exercises, workups, and predeployment training.
z Coordinate and de-conflict electromagnetic spectrum usage.
z Provide training during routine home station planning and training activities on appropriate electronic protection active and passive measures.
z Take appropriate actions to minimize the vulnerability of friendly receivers to enemy jamming (such as reduced power, brevity of transmissions, and directional antennas).
1-16. Electronic protection also includes spectrum management. The spectrum manager works for the G-6 or S-6 and plays a key role in the coordination and de-confliction of spectrum resources allocated to the force. Spectrum managers or their direct representatives participate in the planning for EW operations.
1-17. The development and acquisition of communications and electronic systems includes electronic protection requirements to clarify performance parameters. Army forces design their equipment to limit inherent vulnerabilities. If electronic attack vulnerabilities are detected, then units must review these programs.
ELECTRONIC WARFARE SUPPORT
1-18.Electronic warfare support is a division of electronic warfare involving actions tasked by, or under the direct control of, an operational commander to search for, intercept, identify, and locate or localize sources of intentional and unintentional radiated electromagnetic energy for the purpose of immediate threat recognition, targeting, planning, and conduct of future operations (JP 3-13.1).
1-19.Electronic warfare support systems are a source of information for immediate decisions involving electronic attack, electronic protection, avoidance, targeting, and other tactical employments of forces.
Electronic warfare support systems collect data and produce information or intelligence to— z Corroborate other sources of information or intelligence. z Conduct or direct electronic attack operations.
z Initiate self-protection measures. z Task weapon systems.
z Support electronic protection efforts.
z Create or update EW databases. z Support information tasks.
1-20.Electronic warfare support and signals intelligence missions use the same resources. The two differ in the detected information’s intended use, the degree of analytical effort expended, the detail of information provided, and the time lines required. Like tactical signals intelligence, electronic warfare support missions respond to the immediate requirements of a tactical commander. Signals intelligence above the tactical level is under the operational control of the National Security Agency and directly supports the overarching national security mission. Resources that collect tactical-level electronic warfare support data can simultaneously collect national-level signals intelligence. (See FM 2-0 for more information on signals intelligence.)
ACTIVITIES AND TERMINOLOGY
1-21.Although new equipment and tactics, techniques, and procedures continue to be developed, the physics of electromagnetic energy remains constant. Hence, effective EW activities remain the same despite changes in hardware and tactics. Principal EW activities are discussed in the following paragraphs.
PRINCIPAL ACTIVITIES
1-22.Principal EW activities support full spectrum operations by exploiting the opportunities and vulnerabilities inherent in the use of the electromagnetic spectrum. The numerous EW activities are categorized by the EW subdivisions with which they are most closely associated: electronic attack, electronic warfare support, and electronic protection. JP 3-13.1 discusses these principal activities in detail.
Electronic Attack Activities
1-23.Activities related to electronic attack are either offensive or defensive and include— zCountermeasures.
z Electromagnetic deception. z Electromagnetic intrusion. z Electromagnetic jamming. z Electromagnetic pulse. zElectronic probing.
Countermeasures
1-24.Countermeasures are that form of military science that, by the employment of devices and/or techniques, has as its objective the impairment of the operational effectiveness of enemy activity (JP 1-02). They can be deployed preemptively or re-actively. Devices and techniques used for EW countermeasures include electro-optical-infrared countermeasures and radio frequency countermeasures.
1-25.Electro-optical-infrared countermeasures consist of any device or technique employing electro-optical-infrared materials or technology that is intended to impair or counter the effectiveness of enemy activity, particularly with respect to precision guided weapons and sensor systems. Electro-optical-infrared is the part of the electromagnetic spectrum between the high end of the far infrared and the low end of ultraviolet. Electro-optical-infrared countermeasures may use laser and broadband jammers, smokes/aerosols, signature suppressants, decoys, pyrotechnics/pyrophorics, high-energy lasers, or directed infrared energy countermeasures (JP 3-13.1).
1-26.Radio frequency countermeasures consist of any device or technique employing radio frequency materials or technology that is intended to impair the effectiveness of or counter enemy activity, particularly with respect to precision guided weapons and sensor systems (JP 3-13.1).
Electromagnetic Deception
1-27.Electromagnetic deception is the deliberate radiation, re-radiation, alteration, suppression, absorption, denial, enhancement, or reflection of electromagnetic energy in a manner intended to convey misleading information to an enemy or to enemy electromagnetic-dependent weapons, thereby degrading or neutralizing the enemy’s combat capability (JP 3-13.4). Among the types of electromagnetic deception are the following:
z Manipulative electromagnetic deception involves actions to eliminate revealing, or convey misleading, electromagnetic telltale indicators that may be used by hostile forces.
z Simulative electromagnetic deception involves actions to simulate friendly, notional, or actual capabilities to mislead hostile forces.
z Imitative electromagnetic deception introduces electromagnetic energy into enemy systems that imitates enemy emissions.
Electromagnetic Intrusion
1-28.Electromagnetic intrusion is the intentional insertion of electromagnetic energy into transmission paths in any manner, with the objective of deceiving operators or of causing confusion (JP 1-02).
Electromagnetic Jamming
1-29.Electromagnetic jamming is the deliberate radiation, re-radiation, or reflection of electromagnetic energy for the purpose of preventing or reducing an enemy’s effective use of the electromagnetic spectrum, with the intent of degrading or neutralizing the enemy’s combat capability (JP 1-02).
Electromagnetic Pulse
1-30.Electromagnetic pulse is the electromagnetic radiation from a strong electronic pulse, most commonly caused by a nuclear explosion that may couple with electrical or electronic systems to produce damaging current and voltage surges (JP 1-02).
Electronic Probing
1-31.Electronic probing is the intentional radiation designed to be introduced into the devices or systems of potential enemies for the purpose of learning the functions and operational capabilities of the devices (JP 1-02). This activity is coordinated through joint or inter-agency channels and supported by Army forces.
Electronic Warfare Support Activities
1-32.Activities related to electronic warfare support include— z Electronic reconnaissance. z Electronic intelligence. z Electronics security.
Electronic Reconnaisance
1-33.Electronic reconnaissance is the detection, location, identification, and evaluation of foreign electromagnetic radiations (JP 1-02).
Electronic Intelligence
1-34.Electronic intelligence is technical and geolocation intelligence derived from foreign non-communications electromagnetic radiations emanating from other than nuclear detonations or radioactive sources (JP 1-02).
Electronics Security
1-35.Electronics security is the protection resulting from all measures designed to deny unauthorized persons information of value that might be derived from their interception and study of non-communications electromagnetic radiations, e.g., radar (JP 1-02).
Electronic Protection Activities
1-36.Activities related to electronic protection include— z Electromagnetic hardening. z Electromagnetic interference. z Electronic masking.
z Electronic warfare reprogramming. z Emission control. z Spectrum management. zWartime reserve modes. z Electromagnetic compatibility.
Electromagnetic Hardening
1-37.Electromagnetic hardening consists of action taken to protect personnel, facilities, and/or equipment by filtering, attenuating, grounding, bonding, and/or shielding against undesirable effects of electromagnetic energy (JP 1-02).
Electromagnetic Interference
1-38.Electromagnetic interference is any electromagnetic disturbance that interrupts, obstructs, or otherwise degrades or limits the effective performance of electronics and electrical equipment. It can be induced intentionally, as in some forms of electronic warfare, or unintentionally, as a result of spurious emissions and responses, inter-modulation products and the like (JP 1-02).
Electronic Masking
1-39.Electronic masking is the controlled radiation of electromagnetic energy on friendly frequencies in a manner to protect the emissions of friendly communications and electronic systems against enemy electronic warfare support measures/signals intelligence, without significantly degrading the operation of friendly systems (JP 1-02).
Electronic Warfare Reprogramming
1-40.Electronic warfare reprogramming is the deliberate alteration or modification of electronic warfare or target sensing systems, or the tactics and procedures that employ them, in response to validated changes in equipment, tactics, or the electromagnetic environment. These changes may be the result of deliberate actions on the part of friendly, adversary, or third parties; or may be brought about by electromagnetic interference or other inadvertent phenomena. The purpose of electronic warfare reprogramming is to maintain or enhance the effectiveness of electronic warfare and target sensing system equipment. Electronic warfare reprogramming includes changes to self-defense systems, offensive weapons systems, and intelligence collection systems (JP 3-13.1).
Emission Control
1-41.Emission control is the selective and controlled use of electromagnetic, acoustic, or other emitters to optimize command and control capabilities while minimizing transmissions for operations security: a. detection by enemy sensors; b. mutual interference among friendly systems; and/or c. enemy interference with the ability to execute a military deception plan (JP 1-02).
Electromagnetic Spectrum Management
1-42.Electromagnetic spectrum management is planning, coordinating, and managing joint use of the electromagnetic spectrum through operational, engineering, and administrative procedures. The objective of spectrum management is to enable electronic systems to perform their functions in the intended environment without causing or suffering unacceptable interference (JP 6-0).
Wartime Reserve Modes
1-43.Wartime reserve modes are characteristics and operating procedures of sensors, communications, navigation aids, threat recognition, weapons, and countermeasures systems that will contribute to military effectiveness if unknown to or misunderstood by opposing commanders before they are used, but could be exploited or neutralized if known in advance. Wartime reserve modes are deliberately held in reserve for wartime or emergency use and seldom, if ever, applied or intercepted prior to such use (JP 1-02).
Electromagnetic Compatibility
1-44.Electromagnetic compatibility is the ability of systems, equipment, and devices that utilize the electromagnetic spectrum to operate in their intended operational environments without suffering unacceptable degradation or causing unintentional degradation because of electromagnetic radiation or response. It involves the application of sound electromagnetic spectrum management; system, equipment, and device design configuration that ensures interference-free operation; and clear concepts and doctrines that maximize operational effectiveness (JP 1-02).
APPLICATION TERMINOLOGY
1-45.EW capabilities are applied from the air, land, sea, and space by manned, unmanned, attended, or unattended systems. Units employ EW capabilities to achieve the desired lethal or nonlethal effect on a given target. Units maintain freedom of action in the electromagnetic spectrum while controlling the use of it by the enemy. Regardless of the application, units employing EW capabilities must use appropriate levels of control and protection of the electromagnetic spectrum. In this way, they avoid adversely affecting friendly forces. (Improper EW actions must be avoided because they may cause fratricide or eliminate high-value intelligence targets.)
1-46.In the context of EW application, units use several terms to facilitate control and protection of the electromagnetic spectrum. Terms used in EW application include control, detection, denial, deception, disruption and degradation, protection, and destruction. The three subdivisions of EW—electronic attack, electronic protection, and electronic warfare support—are specified within the following descriptions.
Control
1-47.In the context of EW, control of the electromagnetic spectrum is achieved by effectively coordinating friendly systems while countering enemy systems. Electronic attack limits enemy use of the electromagnetic spectrum. Electronic protection secures use of the electromagnetic spectrum for friendly forces, and electronic warfare support enables the commander’s accurate assessment of the situation. All three are integrated for effectiveness. Commanders ensure maximum integration of communications; intelligence, surveillance, and reconnaissance; and information tasks.
Detection
1-48.In the context of EW, detection is the active and passive monitoring of the operational environment for radio frequency, electro-optic, laser, infrared, and ultraviolet electromagnetic threats. Detection is the first step in EW for exploitation, targeting, and defensive planning. Friendly forces maintain the capability to detect and characterize interference as hostile jamming or unintentional electromagnetic interference.
Denial
1-49.In the context of EW, denial is controlling the information an enemy receives via the electromagnetic spectrum and preventing the acquisition of accurate information about friendly forces. Degradation uses traditional jamming techniques, expendable countermeasures, destructive measures, or network applications. These range from limited effects up to complete denial of usage.
Deception
1-50.In the context of EW, deception is confusing or misleading an enemy by using some combination of human-produced, mechanical, or electronic means. Through use of the electromagnetic spectrum, EW deception manipulates the enemy’s decision loop, making it difficult to establish accurate situational awareness.
Disruption and Degradation
1-51.In the context of EW, disruption and degradation techniques interfere with the enemy’s use of the electromagnetic spectrum to limit enemy combat capabilities. This is achieved with electronic jamming, electronic deception, and electronic intrusion. These enhance attacks on hostile forces and act as force multipliers by increasing enemy uncertainty, while reducing uncertainty for friendly forces. Advanced electronic attack techniques offer the opportunity to non-destructively disrupt or degrade enemy infrastructure.
Protection
1-52.In the context of EW, protection is the use of physical properties; operational tactics, techniques, and procedures; and planning and employment processes to ensure friendly use of the electromagnetic spectrum. This includes ensuring that offensive EW activities do not electronically destroy or degrade friendly intelligence sensors or communications systems. Protection is achieved by component hardening, emission control, and frequency management and de-confliction. Frequency management and de-confliction include the capability to detect, characterize, geolocate, and mitigate electromagnetic interference that affects operations. Protection includes other means to counterattack and defeat enemy attempts to control the electromagnetic spectrum. Additionally, organizations such as a joint force commander’s EW staff or a joint EW coordination cell enhance electronic protection by de-conflicting EW efforts.
Destruction
1-53.Destruction, in the context of EW, is the elimination of targeted enemy systems. Sensors and command and control nodes are lucrative targets because their destruction strongly influences the enemy’s perceptions and ability to coordinate actions. Various weapons and techniques ranging from conventional munitions and directed energy weapons to network attacks can destroy enemy systems that use the electromagnetic spectrum. Electronic warfare support provides target location and related information. While destroying enemy equipment can effectively deny the enemy use of the electromagnetic spectrum, the duration of denial will depend on the enemy’s ability to reconstitute. (See JP 3-13.1.)
MEANS VERSUS EFFECTS
1-54.EW means are applied against targets to create a full range of lethal and nonlethal effects. Choosing a specific EW capability depends on the desired effect on the target and other considerations, such as time sensitivity or limiting collateral damage. EW capabilities provide commanders with additional options for achieving their objectives. During major combat operations there may be circumstances where commanders want to limit the physical damage on a given target. Under such circumstances, the EW staff articulates clearly to the commander the lethal and nonlethal effects EW capabilities can achieve. For example, a target might be enemy radar mounted on a fixed tower. Two EW options to defeat the radar could be to jam the radar or destroy it with antiradiation missiles. If the commander desired to limit damage to the tower, an electronic attack jamming platform would be preferred. In circumstances where commanders cannot sufficiently limit undesired effects such as collateral damage, they may be constrained from applying physical force. The EW staff articulates succinctly how EW capabilities can support actions to achieve desired effects and provide lethal and nonlethal options for commanders.
SUMMARY
1-55.As the modern battlefield becomes more technologically sophisticated, military operations continue to be executed in an increasingly complex electromagnetic environment. Therefore, commanders and staffs need to thoroughly understand and articulate how the electromagnetic environment impacts their operations and how friendly EW operations can be used to gain an advantage. Commanders and staffs use the terminology presented in this chapter to describe the application of EW. This ensures a common understanding and consistency within plans, orders, standing operating procedures, and directives.
@Slav Defence - as promised here's the first of the Electronic Warfare threads I will be providing. I really hope this helps and will provide good information to improve the quality of PDF. More will be following as soon as I can get them finished.
*Example - FM 1-12 = document FM, Chapter 1 section 1-12.
This first document is has the FM code, FM 1.XX to be more accurate as it is the first chapter. Code designated post JP will follow at a yet-to-be-determined date (still working on it).
*EDIT - this document is now complete, all sections posted.
*a "z" prior to a word indicates a line-break, but the document didn't translate well from Microsoft Word - where I put the document together. Sorry for that inconvenience.
SvenSvensonov
Electronic Warfare Overview
OPERATIONAL ENVIRONMENTS
1-1.An operational environment is a composite of the conditions, circumstances, and influences that affect the employment of capabilities and bear on the decisions of the commander (JP 3-0). An operational environment includes physical areas—the air, land, maritime, and space domains. It also includes the information that shapes the operational environment as well as enemy, adversary, friendly, and neutral systems relevant to a joint operation. Joint planners analyze operational environments in terms of six interrelated operational variables: political, military, economic, social, information, and infrastructure. To these variables Army doctrine adds two more: physical environment and time. (See FM 3-0 for additional information on the operational variables). Army leaders use operational variables to understand and analyze the broad environment in which they are conducting operations.
1-2.Army leaders use mission variables to synthesize operational variables and tactical-level information with local knowledge about conditions relevant to their mission. They use mission variables to focus analysis on specific elements that directly affect their mission. Upon receipt of a warning order or mission, Army tactical leaders narrow their focus to six mission variables known as METT-TC. They are mission, enemy, terrain and weather, troops and support available, time available and civil considerations. The mission variables outline the situation as it applies to a specific Army unit.
1-3.Commanders employ and integrate their unit’s capabilities and actions within their operational environment to achieve a desired end state. Through analyzing their operational environment, commanders understand how the results of friendly, adversary, and neutral actions may impact that end state. During military operations, both friendly and enemy commanders depend on the flow of information to make informed decisions. This flow of information depends on the electronic systems and devices used to communicate, navigate, sense, store, and process information.
INFORMATION AND THE ELECTROMAGNETIC SPECTRUM
1-4.Commanders plan for and operate electronic systems and the weapon systems that depend on them in an intensive and non-permissive electromagnetic environment. They ensure the flow of information required for their decision making. Within the electromagnetic environment, electronic systems and devices operate in the electromagnetic spectrum.
1-5.The electromagnetic spectrum has been used for commercial and military applications for over a century. However, the full potential for its use as the primary enabler of military operations is not yet fully appreciated. New technologies are expanding beyond the traditional radio frequency spectrum. They include high-power microwaves and directed-energy weapons. These new technologies are part of an electronic warfare (EW) revolution by military forces. Just as friendly forces leverage the electromagnetic spectrum to their advantage, so do capable enemies use the electromagnetic spectrum to threaten friendly force operations. The threat is compounded by the growth of a wireless world and the increasingly sophisticated use of commercial off-the-shelf technologies.
1-6.Adversaries and enemies, from small and single actors to large state, multinational, and non-state actors, use the most modern technology. Such technology is moving into the cellular and satellite communications area. Most military and commercial operations rely on electromagnetic technologies and are susceptible to the inherent vulnerabilities associated with their use. This reliance requires Army forces to dominate the electromagnetic spectrum (within their operational environment) with the same authority that they dominate traditional land warfare operations. Emerging electromagnetic technologies offer expanded EW capabilities. They dynamically affect the electromagnetic spectrum through delivery and integration with other types of emerging weapons and capabilities. Examples are directed-energy weapons, high-powered microwaves, lasers, infrared, and electro-optical and wireless networks and devices.
1-7.In any conflict, commanders attempt to dominate the electromagnetic spectrum. They do this by locating, targeting, exploiting, disrupting, degrading, deceiving, denying, or destroying the enemy’s electronic systems that support military operations or deny the spectrum’s use by friendly forces. The increasing portability and affordability of sophisticated electronic equipment guarantees that the electromagnetic environment in which forces operate will become even more complex. To ensure unimpeded access to and use of the electromagnetic spectrum, commanders plan, prepare, execute, and assess EW operations against a broad set of targets within the electromagnetic spectrum.
DIVISIONS OF ELECTRONIC WARFARE
1-8.Electronic warfare is defined as military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or to attack the enemy. Electronic warfare consists of three divisions: electronic attack, electronic protection, and electronic warfare support.
ELECTRONIC ATTACK
1-9.Electronic attack is a division of electronic warfare involving the use of electromagnetic energy, directed energy, or antiradiation weapons to attack personnel, facilities, or equipment with the intent of degrading, neutralizing, or destroying enemy combat capability and is considered a form of fires.
13.1). Electronic attack includes— zActions taken to prevent or reduce an enemy’s effective use of the electromagnetic spectrum, such as jamming and electromagnetic deception.
z Employment of weapons that use either electromagnetic or directed energy as their primary destructive mechanism (lasers, radio frequency weapons, particle beams).
z Offensive and defensive activities including countermeasures.
1-10.Common types of electronic attack include spot, barrage, and sweep electromagnetic jamming. Electronic attack actions also include various electromagnetic deception techniques such as false target or duplicate target generation. (See paragraphs 1-23 to 1-31 for further discussion of electronic attack activities.)
1-11.Directed energy is an umbrella term covering technologies that relate to the production of a beam of concentrated electromagnetic energy or atomic or subatomic particles (JP 1-02). A directed-energy weapon uses directed energy primarily as a direct means to damage or destroy an enemy’s equipment, facilities, and personnel. In addition to destructive effects, directed-energy weapon systems support area denial and crowd control. (See appendix A for more information on directed energy.)
1-12.Examples of offensive electronic attack include— z Jamming enemy radar or electronic command and control systems.
z Using antiradiation missiles to suppress enemy air defenses (antiradiation weapons use radiated energy emitted from the target as their mechanism for guidance onto targeted emitters).
z Using electronic deception techniques to confuse enemy intelligence, surveillance, and reconnaissance systems.
z Using directed-energy weapons to disable an enemy’s equipment or capability.
1-13.Defensive electronic attack uses the electromagnetic spectrum to protect personnel, facilities, capabilities, and equipment. Examples include self-protection and other protection measures such as use of expendables (flares and active decoys), jammers, towed decoys, directed-energy infrared countermeasure systems, and counter-radio-controlled improvised-explosive-device systems. (See JP 3-13.1 for more discussion of electronic attack.)
ELECTRONIC PROTECTION
1-14.Electronic protection is a division of electronic warfare involving actions taken to protect personnel, facilities, and equipment from any effects of friendly or enemy use of the electromagnetic spectrum that degrade, neutralize, or destroy friendly combat capability (JP 3-13.1). For example, electronic protection includes actions taken to ensure friendly use of the electromagnetic spectrum, such as frequency agility in a radio, or variable pulse repetition frequency in radar. Electronic protection should not be confused with self-protection. Both defensive electronic attack and electronic protection protect personnel, facilities, capabilities, and equipment. However, electronic protection protects from the effects of electronic attack (friendly and enemy), while defensive electronic attack primarily protects against lethal attacks by denying enemy use of the electromagnetic spectrum to guide or trigger weapons.
1-15.During operations, electronic protection includes, but is not limited to, the application of training and procedures for countering enemy electronic attack. Army commanders and forces understand the threat and vulnerability of friendly electronic equipment to enemy electronic attack and take appropriate actions to safeguard friendly combat capability from exploitation and attack. Electronic protection measures minimize the enemy’s ability to conduct electronic warfare support (electronic warfare support is discussed in paragraphs 1-18 to 1-20) and electronic attack operations successfully against friendly forces. To protect friendly combat capabilities, units— zRegularly brief force personnel on the EW threat.
z Ensure that electronic system capabilities are safeguarded during exercises, workups, and predeployment training.
z Coordinate and de-conflict electromagnetic spectrum usage.
z Provide training during routine home station planning and training activities on appropriate electronic protection active and passive measures.
z Take appropriate actions to minimize the vulnerability of friendly receivers to enemy jamming (such as reduced power, brevity of transmissions, and directional antennas).
1-16. Electronic protection also includes spectrum management. The spectrum manager works for the G-6 or S-6 and plays a key role in the coordination and de-confliction of spectrum resources allocated to the force. Spectrum managers or their direct representatives participate in the planning for EW operations.
1-17. The development and acquisition of communications and electronic systems includes electronic protection requirements to clarify performance parameters. Army forces design their equipment to limit inherent vulnerabilities. If electronic attack vulnerabilities are detected, then units must review these programs.
ELECTRONIC WARFARE SUPPORT
1-18.Electronic warfare support is a division of electronic warfare involving actions tasked by, or under the direct control of, an operational commander to search for, intercept, identify, and locate or localize sources of intentional and unintentional radiated electromagnetic energy for the purpose of immediate threat recognition, targeting, planning, and conduct of future operations (JP 3-13.1).
1-19.Electronic warfare support systems are a source of information for immediate decisions involving electronic attack, electronic protection, avoidance, targeting, and other tactical employments of forces.
Electronic warfare support systems collect data and produce information or intelligence to— z Corroborate other sources of information or intelligence. z Conduct or direct electronic attack operations.
z Initiate self-protection measures. z Task weapon systems.
z Support electronic protection efforts.
z Create or update EW databases. z Support information tasks.
1-20.Electronic warfare support and signals intelligence missions use the same resources. The two differ in the detected information’s intended use, the degree of analytical effort expended, the detail of information provided, and the time lines required. Like tactical signals intelligence, electronic warfare support missions respond to the immediate requirements of a tactical commander. Signals intelligence above the tactical level is under the operational control of the National Security Agency and directly supports the overarching national security mission. Resources that collect tactical-level electronic warfare support data can simultaneously collect national-level signals intelligence. (See FM 2-0 for more information on signals intelligence.)
ACTIVITIES AND TERMINOLOGY
1-21.Although new equipment and tactics, techniques, and procedures continue to be developed, the physics of electromagnetic energy remains constant. Hence, effective EW activities remain the same despite changes in hardware and tactics. Principal EW activities are discussed in the following paragraphs.
PRINCIPAL ACTIVITIES
1-22.Principal EW activities support full spectrum operations by exploiting the opportunities and vulnerabilities inherent in the use of the electromagnetic spectrum. The numerous EW activities are categorized by the EW subdivisions with which they are most closely associated: electronic attack, electronic warfare support, and electronic protection. JP 3-13.1 discusses these principal activities in detail.
Electronic Attack Activities
1-23.Activities related to electronic attack are either offensive or defensive and include— zCountermeasures.
z Electromagnetic deception. z Electromagnetic intrusion. z Electromagnetic jamming. z Electromagnetic pulse. zElectronic probing.
Countermeasures
1-24.Countermeasures are that form of military science that, by the employment of devices and/or techniques, has as its objective the impairment of the operational effectiveness of enemy activity (JP 1-02). They can be deployed preemptively or re-actively. Devices and techniques used for EW countermeasures include electro-optical-infrared countermeasures and radio frequency countermeasures.
1-25.Electro-optical-infrared countermeasures consist of any device or technique employing electro-optical-infrared materials or technology that is intended to impair or counter the effectiveness of enemy activity, particularly with respect to precision guided weapons and sensor systems. Electro-optical-infrared is the part of the electromagnetic spectrum between the high end of the far infrared and the low end of ultraviolet. Electro-optical-infrared countermeasures may use laser and broadband jammers, smokes/aerosols, signature suppressants, decoys, pyrotechnics/pyrophorics, high-energy lasers, or directed infrared energy countermeasures (JP 3-13.1).
1-26.Radio frequency countermeasures consist of any device or technique employing radio frequency materials or technology that is intended to impair the effectiveness of or counter enemy activity, particularly with respect to precision guided weapons and sensor systems (JP 3-13.1).
Electromagnetic Deception
1-27.Electromagnetic deception is the deliberate radiation, re-radiation, alteration, suppression, absorption, denial, enhancement, or reflection of electromagnetic energy in a manner intended to convey misleading information to an enemy or to enemy electromagnetic-dependent weapons, thereby degrading or neutralizing the enemy’s combat capability (JP 3-13.4). Among the types of electromagnetic deception are the following:
z Manipulative electromagnetic deception involves actions to eliminate revealing, or convey misleading, electromagnetic telltale indicators that may be used by hostile forces.
z Simulative electromagnetic deception involves actions to simulate friendly, notional, or actual capabilities to mislead hostile forces.
z Imitative electromagnetic deception introduces electromagnetic energy into enemy systems that imitates enemy emissions.
Electromagnetic Intrusion
1-28.Electromagnetic intrusion is the intentional insertion of electromagnetic energy into transmission paths in any manner, with the objective of deceiving operators or of causing confusion (JP 1-02).
Electromagnetic Jamming
1-29.Electromagnetic jamming is the deliberate radiation, re-radiation, or reflection of electromagnetic energy for the purpose of preventing or reducing an enemy’s effective use of the electromagnetic spectrum, with the intent of degrading or neutralizing the enemy’s combat capability (JP 1-02).
Electromagnetic Pulse
1-30.Electromagnetic pulse is the electromagnetic radiation from a strong electronic pulse, most commonly caused by a nuclear explosion that may couple with electrical or electronic systems to produce damaging current and voltage surges (JP 1-02).
Electronic Probing
1-31.Electronic probing is the intentional radiation designed to be introduced into the devices or systems of potential enemies for the purpose of learning the functions and operational capabilities of the devices (JP 1-02). This activity is coordinated through joint or inter-agency channels and supported by Army forces.
Electronic Warfare Support Activities
1-32.Activities related to electronic warfare support include— z Electronic reconnaissance. z Electronic intelligence. z Electronics security.
Electronic Reconnaisance
1-33.Electronic reconnaissance is the detection, location, identification, and evaluation of foreign electromagnetic radiations (JP 1-02).
Electronic Intelligence
1-34.Electronic intelligence is technical and geolocation intelligence derived from foreign non-communications electromagnetic radiations emanating from other than nuclear detonations or radioactive sources (JP 1-02).
Electronics Security
1-35.Electronics security is the protection resulting from all measures designed to deny unauthorized persons information of value that might be derived from their interception and study of non-communications electromagnetic radiations, e.g., radar (JP 1-02).
Electronic Protection Activities
1-36.Activities related to electronic protection include— z Electromagnetic hardening. z Electromagnetic interference. z Electronic masking.
z Electronic warfare reprogramming. z Emission control. z Spectrum management. zWartime reserve modes. z Electromagnetic compatibility.
Electromagnetic Hardening
1-37.Electromagnetic hardening consists of action taken to protect personnel, facilities, and/or equipment by filtering, attenuating, grounding, bonding, and/or shielding against undesirable effects of electromagnetic energy (JP 1-02).
Electromagnetic Interference
1-38.Electromagnetic interference is any electromagnetic disturbance that interrupts, obstructs, or otherwise degrades or limits the effective performance of electronics and electrical equipment. It can be induced intentionally, as in some forms of electronic warfare, or unintentionally, as a result of spurious emissions and responses, inter-modulation products and the like (JP 1-02).
Electronic Masking
1-39.Electronic masking is the controlled radiation of electromagnetic energy on friendly frequencies in a manner to protect the emissions of friendly communications and electronic systems against enemy electronic warfare support measures/signals intelligence, without significantly degrading the operation of friendly systems (JP 1-02).
Electronic Warfare Reprogramming
1-40.Electronic warfare reprogramming is the deliberate alteration or modification of electronic warfare or target sensing systems, or the tactics and procedures that employ them, in response to validated changes in equipment, tactics, or the electromagnetic environment. These changes may be the result of deliberate actions on the part of friendly, adversary, or third parties; or may be brought about by electromagnetic interference or other inadvertent phenomena. The purpose of electronic warfare reprogramming is to maintain or enhance the effectiveness of electronic warfare and target sensing system equipment. Electronic warfare reprogramming includes changes to self-defense systems, offensive weapons systems, and intelligence collection systems (JP 3-13.1).
Emission Control
1-41.Emission control is the selective and controlled use of electromagnetic, acoustic, or other emitters to optimize command and control capabilities while minimizing transmissions for operations security: a. detection by enemy sensors; b. mutual interference among friendly systems; and/or c. enemy interference with the ability to execute a military deception plan (JP 1-02).
Electromagnetic Spectrum Management
1-42.Electromagnetic spectrum management is planning, coordinating, and managing joint use of the electromagnetic spectrum through operational, engineering, and administrative procedures. The objective of spectrum management is to enable electronic systems to perform their functions in the intended environment without causing or suffering unacceptable interference (JP 6-0).
Wartime Reserve Modes
1-43.Wartime reserve modes are characteristics and operating procedures of sensors, communications, navigation aids, threat recognition, weapons, and countermeasures systems that will contribute to military effectiveness if unknown to or misunderstood by opposing commanders before they are used, but could be exploited or neutralized if known in advance. Wartime reserve modes are deliberately held in reserve for wartime or emergency use and seldom, if ever, applied or intercepted prior to such use (JP 1-02).
Electromagnetic Compatibility
1-44.Electromagnetic compatibility is the ability of systems, equipment, and devices that utilize the electromagnetic spectrum to operate in their intended operational environments without suffering unacceptable degradation or causing unintentional degradation because of electromagnetic radiation or response. It involves the application of sound electromagnetic spectrum management; system, equipment, and device design configuration that ensures interference-free operation; and clear concepts and doctrines that maximize operational effectiveness (JP 1-02).
APPLICATION TERMINOLOGY
1-45.EW capabilities are applied from the air, land, sea, and space by manned, unmanned, attended, or unattended systems. Units employ EW capabilities to achieve the desired lethal or nonlethal effect on a given target. Units maintain freedom of action in the electromagnetic spectrum while controlling the use of it by the enemy. Regardless of the application, units employing EW capabilities must use appropriate levels of control and protection of the electromagnetic spectrum. In this way, they avoid adversely affecting friendly forces. (Improper EW actions must be avoided because they may cause fratricide or eliminate high-value intelligence targets.)
1-46.In the context of EW application, units use several terms to facilitate control and protection of the electromagnetic spectrum. Terms used in EW application include control, detection, denial, deception, disruption and degradation, protection, and destruction. The three subdivisions of EW—electronic attack, electronic protection, and electronic warfare support—are specified within the following descriptions.
Control
1-47.In the context of EW, control of the electromagnetic spectrum is achieved by effectively coordinating friendly systems while countering enemy systems. Electronic attack limits enemy use of the electromagnetic spectrum. Electronic protection secures use of the electromagnetic spectrum for friendly forces, and electronic warfare support enables the commander’s accurate assessment of the situation. All three are integrated for effectiveness. Commanders ensure maximum integration of communications; intelligence, surveillance, and reconnaissance; and information tasks.
Detection
1-48.In the context of EW, detection is the active and passive monitoring of the operational environment for radio frequency, electro-optic, laser, infrared, and ultraviolet electromagnetic threats. Detection is the first step in EW for exploitation, targeting, and defensive planning. Friendly forces maintain the capability to detect and characterize interference as hostile jamming or unintentional electromagnetic interference.
Denial
1-49.In the context of EW, denial is controlling the information an enemy receives via the electromagnetic spectrum and preventing the acquisition of accurate information about friendly forces. Degradation uses traditional jamming techniques, expendable countermeasures, destructive measures, or network applications. These range from limited effects up to complete denial of usage.
Deception
1-50.In the context of EW, deception is confusing or misleading an enemy by using some combination of human-produced, mechanical, or electronic means. Through use of the electromagnetic spectrum, EW deception manipulates the enemy’s decision loop, making it difficult to establish accurate situational awareness.
Disruption and Degradation
1-51.In the context of EW, disruption and degradation techniques interfere with the enemy’s use of the electromagnetic spectrum to limit enemy combat capabilities. This is achieved with electronic jamming, electronic deception, and electronic intrusion. These enhance attacks on hostile forces and act as force multipliers by increasing enemy uncertainty, while reducing uncertainty for friendly forces. Advanced electronic attack techniques offer the opportunity to non-destructively disrupt or degrade enemy infrastructure.
Protection
1-52.In the context of EW, protection is the use of physical properties; operational tactics, techniques, and procedures; and planning and employment processes to ensure friendly use of the electromagnetic spectrum. This includes ensuring that offensive EW activities do not electronically destroy or degrade friendly intelligence sensors or communications systems. Protection is achieved by component hardening, emission control, and frequency management and de-confliction. Frequency management and de-confliction include the capability to detect, characterize, geolocate, and mitigate electromagnetic interference that affects operations. Protection includes other means to counterattack and defeat enemy attempts to control the electromagnetic spectrum. Additionally, organizations such as a joint force commander’s EW staff or a joint EW coordination cell enhance electronic protection by de-conflicting EW efforts.
Destruction
1-53.Destruction, in the context of EW, is the elimination of targeted enemy systems. Sensors and command and control nodes are lucrative targets because their destruction strongly influences the enemy’s perceptions and ability to coordinate actions. Various weapons and techniques ranging from conventional munitions and directed energy weapons to network attacks can destroy enemy systems that use the electromagnetic spectrum. Electronic warfare support provides target location and related information. While destroying enemy equipment can effectively deny the enemy use of the electromagnetic spectrum, the duration of denial will depend on the enemy’s ability to reconstitute. (See JP 3-13.1.)
MEANS VERSUS EFFECTS
1-54.EW means are applied against targets to create a full range of lethal and nonlethal effects. Choosing a specific EW capability depends on the desired effect on the target and other considerations, such as time sensitivity or limiting collateral damage. EW capabilities provide commanders with additional options for achieving their objectives. During major combat operations there may be circumstances where commanders want to limit the physical damage on a given target. Under such circumstances, the EW staff articulates clearly to the commander the lethal and nonlethal effects EW capabilities can achieve. For example, a target might be enemy radar mounted on a fixed tower. Two EW options to defeat the radar could be to jam the radar or destroy it with antiradiation missiles. If the commander desired to limit damage to the tower, an electronic attack jamming platform would be preferred. In circumstances where commanders cannot sufficiently limit undesired effects such as collateral damage, they may be constrained from applying physical force. The EW staff articulates succinctly how EW capabilities can support actions to achieve desired effects and provide lethal and nonlethal options for commanders.
SUMMARY
1-55.As the modern battlefield becomes more technologically sophisticated, military operations continue to be executed in an increasingly complex electromagnetic environment. Therefore, commanders and staffs need to thoroughly understand and articulate how the electromagnetic environment impacts their operations and how friendly EW operations can be used to gain an advantage. Commanders and staffs use the terminology presented in this chapter to describe the application of EW. This ensures a common understanding and consistency within plans, orders, standing operating procedures, and directives.
@Slav Defence - as promised here's the first of the Electronic Warfare threads I will be providing. I really hope this helps and will provide good information to improve the quality of PDF. More will be following as soon as I can get them finished.
Last edited: