Principles of Electronic Warfare
()
About this ebook
“During World War II, the rapid growth of military electronics had its start. Today, and in the foreseeable future, large-scale weapon systems depend and will depend on electronic technology.
The importance of these electronic weapon systems to the overall concept of warfare is often obscured in detailed discussions of specific systems. For this reason, a broad understanding of the principles involved is essential. It is significant that these principles involve both engineering sciences and military strategy. In electronic warfare the terms “radiation” and “detection” must be considered in the same light as “offense” and “defense” are in strategic and tactical warfare.”—From the Introduction
Related to Principles of Electronic Warfare
Related ebooks
Electronic Warfare: Element of Strategy and Multiplier of Combat Power Rating: 5 out of 5 stars5/5Advanced Array Systems, Applications and RF Technologies Rating: 0 out of 5 stars0 ratingsSpace Microsystems and Micro/Nano Satellites Rating: 0 out of 5 stars0 ratingsHandbook of VLSI Microlithography: Principles, Technology and Applications Rating: 5 out of 5 stars5/5Instruments of Darkness: The History of Electronic Warfare, 1939–1945 Rating: 4 out of 5 stars4/5Guidance and Control II Rating: 0 out of 5 stars0 ratingsRadar Man: A Personal History of Stealth Rating: 4 out of 5 stars4/5Elements of Space Technology Rating: 4 out of 5 stars4/5Dynamics and Simulation of Flexible Rockets Rating: 0 out of 5 stars0 ratingsFighting in the Electromagnetic Spectrum: U.S. Navy and Marine Corps Electronic Warfare Aircraft, Operations, and Equipment Rating: 0 out of 5 stars0 ratingsIntroduction to Space Dynamics Rating: 5 out of 5 stars5/5Academic Press Library in Signal Processing, Volume 7: Array, Radar and Communications Engineering Rating: 0 out of 5 stars0 ratingsMissile Guidance and Pursuit: Kinematics, Dynamics and Control Rating: 5 out of 5 stars5/5Radar Systems, Peak Detection and Tracking Rating: 5 out of 5 stars5/5Achieving Accuracy: A Legacy of Computers and Missiles Rating: 0 out of 5 stars0 ratingsThree Dimensional Warriors: Second Edition Rating: 0 out of 5 stars0 ratingsRegional Missile Defense from a Global Perspective Rating: 0 out of 5 stars0 ratingsInside History of the Usaf Lightweight Fighters, 1900 to 1975 Rating: 5 out of 5 stars5/5Birds of Fray - World's Top 4.5 & 5th Gen Fighter Jet Aircraft Programs Rating: 0 out of 5 stars0 ratingsRigid Body Dynamics for Space Applications Rating: 0 out of 5 stars0 ratingsManned Spacecraft Design Principles Rating: 0 out of 5 stars0 ratingsBeam Weapons: Roots of Reagan's Star Wars Rating: 0 out of 5 stars0 ratingsMathematical Theory Of Rocket Flight Rating: 0 out of 5 stars0 ratingsThe Long Road To Desert Storm And Beyond: The Development Of Precision Guided Bombs Rating: 5 out of 5 stars5/5Space Mathematics: Math Problems Based on Space Science Rating: 2 out of 5 stars2/5Newnes Communications Technology Handbook Rating: 0 out of 5 stars0 ratingsRadar Signals: An Introduction to Theory and Application Rating: 3 out of 5 stars3/5Before Topgun Days: The Making of a Jet Fighter Instructor Rating: 4 out of 5 stars4/5
Wars & Military For You
God Is Not One: The Eight Rival Religions That Run the World--and Why Their Differences Matter Rating: 4 out of 5 stars4/5The God Delusion Rating: 4 out of 5 stars4/5Unit 731: Testimony Rating: 4 out of 5 stars4/5The Art of War Rating: 4 out of 5 stars4/5Mein Kampf: The Original, Accurate, and Complete English Translation Rating: 0 out of 5 stars0 ratingsThe Afghanistan Papers: A Secret History of the War Rating: 4 out of 5 stars4/5The Ethnic Cleansing of Palestine Rating: 4 out of 5 stars4/5Doctors From Hell: The Horrific Account of Nazi Experiments on Humans Rating: 4 out of 5 stars4/5Blitzed: Drugs in the Third Reich Rating: 4 out of 5 stars4/5Sun Tzu's The Art of War: Bilingual Edition Complete Chinese and English Text Rating: 4 out of 5 stars4/5A Daily Creativity Journal Rating: 3 out of 5 stars3/5Unacknowledged: An Expose of the World's Greatest Secret Rating: 5 out of 5 stars5/5The Doomsday Machine: Confessions of a Nuclear War Planner Rating: 4 out of 5 stars4/5The Art of War & Other Classics of Eastern Philosophy Rating: 4 out of 5 stars4/5Band of Brothers: E Company, 506th Regiment, 101st Airborne from Normandy to Hitler's Eagle's Nest Rating: 5 out of 5 stars5/5The Wager Disaster: Mayem, Mutiny and Murder in the South Seas Rating: 4 out of 5 stars4/5The Last Kingdom Rating: 4 out of 5 stars4/5The Rise of the Fourth Reich: The Secret Societies That Threaten to Take Over America Rating: 4 out of 5 stars4/5The Making of the Atomic Bomb Rating: 5 out of 5 stars5/5Killing the SS: The Hunt for the Worst War Criminals in History Rating: 4 out of 5 stars4/5Ordinary Men: Reserve Police Battalion 101 and the Final Solution in Poland Rating: 4 out of 5 stars4/5Bill O'Reilly's Legends and Lies: The Civil War Rating: 4 out of 5 stars4/5How to Hide an Empire: A History of the Greater United States Rating: 4 out of 5 stars4/5The Rise and Fall of the Third Reich Rating: 4 out of 5 stars4/5Art of War: The Definitive Interpretation of Sun Tzu's Classic Book of Strategy Rating: 4 out of 5 stars4/5On Killing: The Psychological Cost of Learning to Kill in War and Society Rating: 4 out of 5 stars4/5The Faithful Spy: Dietrich Bonhoeffer and the Plot to Kill Hitler Rating: 5 out of 5 stars5/5They Thought They Were Free: The Germans, 1933–45 Rating: 4 out of 5 stars4/5
Reviews for Principles of Electronic Warfare
0 ratings0 reviews
Book preview
Principles of Electronic Warfare - Robert J. Schlesinger
© Barakaldo Books 2020, all rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted by any means, electrical, mechanical or otherwise without the written permission of the copyright holder.
Publisher’s Note
Although in most cases we have retained the Author’s original spelling and grammar to authentically reproduce the work of the Author and the original intent of such material, some additional notes and clarifications have been added for the modern reader’s benefit.
We have also made every effort to include all maps and illustrations of the original edition the limitations of formatting do not allow of including larger maps, we will upload as many of these maps as possible.
PRINCIPLES OF ELECTRONIC WARFARE
BY
ROBERT J. SCHLESINGER
TABLE OF CONTENTS
Contents
TABLE OF CONTENTS 4
DEDICATION 5
PREFACE 6
1—THE SCOPE OF THE PROBLEM 8
SOME ELEMENTS OF THE PROBLEM 8
TECHNICAL SUPREMACY AND THE SECRET WEAPON 10
DYNAMIC DEVELOPMENT OF AN ECM TACTIC 11
ECM EQUIPMENT—ONE ELEMENT OF THE TOTAL SYSTEM 14
2—TECHNIQUE AND TACTICS 17
TACTICAL CONSIDERATIONS 17
NOISE JAMMING 19
DECEPTION JAMMERS 20
OTHER RADAR CONFUSION DEVICES 21
TYPICAL AIR-COMBAT ANALYSIS IN AN ECM ENVIRONMENT 23
TACTICS—AN EXAMPLE 28
3—NOISE, PROBABILITY, AND INFORMATION RECOVERY 33
RELATIONSHIP OF NOISE
TO AN INFORMATION-CARRYING SYSTEM 33
ELEMENTARY TREATMENT OF NOISE THEORY 33
ELEMENTARY PROBABILITY AND STATISTICS 37
RECOVERY OF SIGNAL INFORMATION FROM A NOISE ENVIRONMENT 42
DETECTION AND CORRELATION 45
SIGNAL DETECTION IN THE PRESENCE OF ELECTRONIC COUNTER-MEASURES (ECM) 49
4—ELECTRONIC RECONNAISSANCE 58
THE PURPOSE OF ELECTRONIC RECONNAISSANCE 58
ELECTRONIC INTELLIGENCE 58
A. OPERATIONAL INFORMATION 59
B. TECHNICAL DATA 60
PROBABILITY OF DETECTING, PROBABILITY OF INTERCEPTING 62
SEARCHING MODES 64
PROBABILITY OF OVERFLIGHT 67
OVERFLIGHT RESOLUTION 71
HORIZONTAL
RESOLUTION 75
INTERCEPT CORRELATION 83
GENERALIZED SENSOR
CHARACTERISTICS 86
RECEIVER MODES 88
5—RADAR CONSIDERATIONS 94
THE APPROACH TO RADAR COUNTERMEASURES 94
PULSE RADARS 94
PULSE-RADAR OPERATION 95
OPTIMUM IF AMPLIFIER BAND WIDTH 99
PULSE DETECTION AND INTEGRATION 103
PULSE-RADAR RANGE 106
CW RADARS 109
DOPPLER-FILTER BAND WIDTH LIMITATIONS 111
CW RADAR RANGE 119
PULSE-DOPPLER RADARS 120
MOVING TARGET INDICATION 126
TARGET TRACKING SYSTEMS 129
ANGLE TRACKING 129
RANGE TRACKING 133
VELOCITY TRACKING 134
GENERAL RADAR CONCEPTS 135
THE EFFECTS OF ECM ON RADARS 142
RADAR COUNTER MEASURES TECHNIQUES 147
6—THE ROLE OF ANTENNAS IN ELECTRONIC WARFARE 152
ANTENNA DESCRIPTIVE PARAMETERS 152
DIRECTIVITY AND GAIN 156
ANTENNA SIDE LOBES 157
BAND WIDTH 158
PROPAGATION 159
PROPAGATION OVER A PLAIN EARTH 159
PROPAGATION OVER THE CURVED EARTH 161
PROPAGATION IN THE STANDARD ATMOSPHERE 162
PROPAGATION IN A NON-STANDARD ATMOSPHERE 164
ATTENUATION DUE TO ABSORPTION AND SCATTERING 164
ANTENNA APPLICATIONS 165
TRACKING ANTENNAS 165
MANUAL TRACKING 167
MULTIPLE-BEAM TRACKING 167
CONICAL SCAN 167
MONOPULSE TRACKING 168
SEARCH ANTENNAS 170
EFFECT OF ANTENNA CHARACTERISTICS ON INTERCEPT PROBABILITY 170
DESIGN OF LARGE GROUND-BASED ANTENNAS 173
ANTENNAS OF OTHER TYPES 176
7—OPTIMIZATION—CONSTRAINTS AND INCOMPLETE INFORMATION 177
OBJECTIVES OF AN ECM SYSTEM 177
OPTIMIZATION OF ECM EQUIPMENT CHARACTERISTICS 177
DEFINITION OF THE EFFECTIVENESS FUNCTION 186
OPTIMUM DISTRIBUTION OF AVAILABLE PAYLOAD BETWEEN WEAPONS AND ECM 193
8—SOME ASPECTS OF ELECTRONIC WARFARE IN THE SPACE ERA 201
INTRODUCTION 201
SOME ELEMENTS OF THE SPACE ENVIRONMENT 203
SPACE MISSIONS—COMMUNICATIONS AND RECONNAISSANCE 212
ANTENNAS IN SPACE 221
FLUSH ANTENNAS 221
INFLATABLE AND UNFOLDING ANTENNAS 222
POLARIZATION 222
ANTENNA MATERIALS FOR SPACE SYSTEMS 223
INFRARED APPLICATIONS 223
SOME EFFECTS OF SPACE OPERATIONS ON RADAR AND RADAR COUNTERMEASURES 224
BIBLIOGRAPHY 228
CHAPTER 1 228
CHAPTER 3 228
CHAPTER 4 228
CHAPTER 5 228
CHAPTER 6 229
CHAPTER 7 229
CHAPTER 8 230
REQUEST FROM THE PUBLISHER 231
DEDICATION
ELECTRONIC WARFARE
It is not pleasant to think that warfare is fundamental to the nature of man, and indeed it may not necessarily be so. However, through all recorded history we find this unfortunate trend. Perhaps some day a discussion of the problems taken up in this book will be pointless; i.e., wars will no longer exist. Let us hope, for that reason, that the material herein will then no longer be required.
In that light, this book is dedicated to its own obsolescence.
PREFACE
During World War II, the rapid growth of military electronics had its start. Today, and in the foreseeable future, large-scale weapon systems depend and will depend on electronic technology.
The importance of these electronic weapon systems to the overall concept of warfare is often obscured in detailed discussions of specific systems. For this reason, a broad understanding of the principles involved is essential. It is significant that these principles involve both engineering sciences and military strategy. In electronic warfare the terms radiation
and detection
must be considered in the same light as offense
and defense
are in strategic and tactical warfare. To be sure, the engineering aspects of the problem must be given thorough analytical treatment; however, operational questions must also be considered if a broad appreciation of the principles of electronic warfare is to be achieved. The treatment presented here is intended to achieve a balance between these technical and tactical aspects of the problem. Therefore, it is hoped that both those concerned with deployment and tactics, and the professional engineer as well, will find many points of interest here.
Some aspects of the Electronic Countermeasures (ECM) problem have intentionally been omitted because security requirements impose an important constraint on the selection and treatment of topics.
There is no discussion of specific equipment in this text. There are two reasons for this intentional omission. First, a discussion of operational equipment is not our objective; second, such a treatment does not represent a fundamental approach to the problem. A sincere attempt has been made to bring reasonable generality to all mathematical analysis.
The opening chapter is intended to indicate the range of the subject matter and to point up typical situations representative of electronic warfare.
Chapter 2 represents an attempt to relate the broad concepts of techniques and tactics and also to provide a general discussion of some classic ECM methods.
In Chapter 3, we provide a basic introduction to the mathematics associated with probability and then apply this to a discussion of noise theory, which is inherent to many parts of the problem. In Chapter 4 we develop the theory of electronic intelligence and then discuss some basic problems of reconnaissance systems. It is intended here to establish the relationships between reconnaissance inputs and ECM tactics. In Chapter 5 we carry out a fundamental analysis of radar systems, with emphasis on parameters important to ECM and ECCM techniques. In Chapter 6 we define the role of the antenna as the transducer between the electronic system and the environment, and again point out factors critical to the electronic warfare problem. In Chapter 7 we provide an operations analysis approach to the problem of establishing an effective ECM environment on a mission profile with typical constraints. In Chapter 8 we extend present thinking into the space era and discuss some of the ramifications of electronic warfare as influenced by space flight.
Although this book is the composite effort of all contributors, Mr. Ehrhorn is primarily responsible for Chapter 3, Mr. Logue for Chapter 5, Mr. Abbey for Chapter 6, and Mr. Friedenthal and Mr. Schlesinger for Chapters 1, 2, 4, 7, and 8.
Robert J. Schlesinger
1—THE SCOPE OF THE PROBLEM
SOME ELEMENTS OF THE PROBLEM
It is our goal in this book to set down some of the existing theories, explore the current philosophies, and define the present problems connected with electronic warfare.
One of the first problems to consider is a definition of electronic warfare that will be acceptable in the situations to be discussed. In the context of this book, the interaction between two or more communication systems for the purpose of intentional interference will represent electronic warfare. A communication system is here understood to be any electronic device that radiates and/or receives information.
The problems concerned with when, where, and how to generate this electronic interference and, on the other hand, the action to be taken to counter its detrimental effects are of fundamental importance to electronic warfare. The former problem is generally referred to as Electronic Counter-Measures (ECM) and the latter as Electronic Counter-Counter Measures (ECCM).
It is the end purpose of ECM to interfere with the successful operation of an opponent’s weapon system; particularly weapon systems that might be used to destroy the vehicle (for example, an aircraft) on which the ECM equipment is carried.
Since the jamming of radar, communication, and missile guidance systems tends to accomplish this end purpose, these are the areas in which ECM has found its widest application.
It is natural to expect that as weapon systems came to place more reliance on the use of electromagnetic radiation as a connecting link among their elements, the weakness inherent to such a link would be exploited. Unfortunately for the user, one of the weaknesses of these systems lies in the fact that the radiation of Radio Frequency (RF) energy, in most of its applications, is not secure from detection and interference. To be sure, considerable effort is expended in some applications, notably communications, to provide some degree of security. However, since all weapon systems of the type considered here must transmit information in order to be useful, their security becomes a function of the detector used to intercept the signal. If the enemy has exactly the right type of receiver for the signal characteristics being transmitted, security is extremely difficult, if not impossible.
The subject of security is considered here because of its basic importance to the intelligent application of ECM methods. If the presence of a hostile signal cannot be detected, no jamming action can be initiated wisely. After detection has been accomplished, it is necessary to establish the information content of the signal to determine if jamming is required. Typical techniques of preventing these two steps from being carried out include high-speed transmissions and pseudo-noise generation with correlation to impede detection, and coded modulation methods to prevent information analysis. Many other techniques are used, some of which will be discussed in later sections of this text.
We have introduced two of the primary requirements for the employment of ECM: (1) it is necessary to detect the radiation from an enemy system; (2) it must be established that it is desirable to jam the signal detected.
It is not always in the best interest of the mission to jam every signal being emitted within enemy territory. For example, if an incoming bomber raid detected radiation, but did not analyze the signal, ECM transmitters might be turned on to jam a local UHF television station. This would hinder, more than aid, the success of the raid. Once the jamming transmitters are turned on, a public announcement is given that hostile aircraft are in the area. Because of the beaconing
effect{1} of these transmitters, the area alerted is much larger than that covered by the surveillance radars alone.
In the foregoing discussion two important steps were defined that are necessary to the evaluation of the electronic environment with respect to the presence of hostile signals. This evaluation has up to this point depended only on the type of monitoring equipment carried aboard the penetrating aircraft and is therefore basically a reconnaissance function. If reconnaissance is the primary purpose of the flight it is not generally necessary to carry jamming transmitters.{2} A record of the signals intercepted can be stored on tape and/or film for use at a later time. (The application of reconnaissance information will be covered in the fourth chapter.) However, if the mission of the raid is to reach a specific target the use of active ECM techniques may be required to confuse and jam enemy air-defense systems.
When sufficient information has been received to determine that jamming tactics should indeed be employed, a second set of problems arises. These problems concern the actual ECM tactical considerations. For example, some of the questions that must be answered include: What mode of jamming should be used? How long should it be used? How many of the aircraft should use it? Exactly when should the jamming transmitters be turned on? To answer these questions, something must be known about the operational constraints imposed by the raid configuration, its mission, and the characteristics of the ECM equipment being carried.
It can be seen that the introduction of so many variable factors makes a general solution to the ECM tactics problem extremely difficult. However, if a specific raid is considered and previous reconnaissance data have given some details of the hostile electronic environment to be encountered in the target area, optimum ECM tactics may be established. Unfortunately, this information can seldom be provided in the detail desired.
The Strategic Air Command (SAC) force required to penetrate deep into enemy territory would like very much to have a general tactic to employ in the face of an unknown electronic environment. This is a basic problem that has been of major concern to both military and civilian planners engaged in establishing electronic-warfare strategies. Before further consideration of this problem is undertaken, one additional complication and some illustrative examples will be discussed.
TECHNICAL SUPREMACY AND THE SECRET WEAPON
In many studies it has been shown that technical supremacy
is a critical factor. Should SAC bombers encounter an air-defense system using tracking and missile-guidance radars operating at a frequency of 40 kmcs, when the highest-frequency ECM equipment they carried was 30 kmcs, the results could be fatal! Generally, since the monitoring receivers do not search higher in frequency than their companion jamming transmitters, the first indication the raid would have of their being illuminated by the enemy defense system would be the explosion of surface-to-air or air-to-air missiles. In this case, even if they had employed their ECM transmitters blindly, no amount of jamming would have reduced the effectiveness of the enemy air-defense system. The SAC bombers were not technically equipped to defeat the threat they encountered in this example. However, the correct employment of chaff at the proper time may have been of some aid. It is not uncommon to find chaff and active ECM used simultaneously in certain cases. For deep penetration raids, requiring many hours of flying time over enemy territory, it is impossible to carry enough chaff for continuous dispersal. Therefore, some operational information to establish the correct time to disperse the chaff is still required.
Perhaps the most interesting case of technical supremacy is the now classical example of submarine searching carried on during World War II.{3}
In early 1942, the RAF Coastal Command used L-band radar as an aid for locating German U-boats recharging batteries on the surface. The overall effectiveness of the RAF in this task was quite good until the U-boats began using L-band search receivers. These receivers allowed the submarine to hear transmitted radar signals at a range greater than that over which the radar echo could effectively be returned. The U-boat therefore had time to crash-dive before actually being sighted by the searching aircraft. In turn, the general effectiveness of the RAF anti-submarine effort decreased. The Allies, realizing what had happened, installed new S-band search radars aboard their aircraft during early 1943. As a result of the effectiveness of new equipment the intercept rate rose sharply. German submarines sitting on the surface, listening to L-band search receivers, became vulnerable targets for S-band radar directed aircraft.
As the U-boat sinkings increased, the Germans tried frantically to determine the method of detection the Allies were using. Since reports from surviving submarines stated that no radiation had been heard in their L-band search receivers prior to the attack, it was thought that perhaps an infrared detection device of some type was being employed. Considerable effort was spent in an attempt to combat a non-existing infrared threat. U-boat activity was greatly reduced by the time the German High Command realized that a new high-frequency radar (S-band) was in use.
This is an interesting example of a weapon (L-band radar), a counter measure (L-band search receiver), and an improvement (S-band radar) providing a clear margin of technical supremacy.
There is another point to be considered. To be sure, the use of S-band radar employing magnetrons and extending the useable frequency by a factor of ten provided a definite advantage. However, had the Germans had information as to what was being used, the time lag until they were able to develop an effective S-band search receiver would have been greatly reduced. An added advantage was gained by the Allies because of the Germans’ lack of information. It is obvious then that the enemy’s lack of information is the basic requirement of the so-called secret weapon.
This point is mentioned here because illustrated in this example is one of the important roles of electronic reconnaissance. Had the Germans been conducting an extensive reconnaissance program at the time, it is probable that they would have intercepted S-band signals from magnetron oscillators in the development and testing stages during flights over England. The development of the magnetron was, of course, the crux of the problem of generating high power for 10 cm radar, but simple crystal receivers for reconnaissance purposes were indeed available, if the Germans had cared to use them in this application. Sensitivity is, of course, not necessary for intercepting high-power sources. Therefore, special requirements of a reconnaissance system include being general enough to intercept the unexpected and providing intelligence inputs for an advanced ECCM program. Other relationships between ECM, ECCM, and reconnaissance will also be taken up in the fourth chapter.
DYNAMIC DEVELOPMENT OF AN ECM TACTIC
It was stated, prior to these examples, that it is difficult to specify a general ECM tactic to be employed on any and all raids. When intelligence information is complete and exact on the defenses of any given area or target (the precise types and location of all air-defense systems are known), a detailed ECM tactic can be prescribed prior to raid penetration. Unfortunately, information is seldom that complete. Although a general tactic cannot be defined beforehand, a general approach to establishing the optimum tactic as the raid progresses can be defined. Figure 1-1 shows the steps in the development of the problem.
Generally, some information obtained from reconnaissance or other forms of intelligence analysis is on hand. It is this information that must determine the ECM equipment to be carried on the mission. Since the weight of the ECM equipment will displace bomb loading (or equivalent firepower in the case of ground forces), its selection should be carefully considered. Obviously, once the mission has started, if incorrect or insufficient jamming units are being carried, little can be done to remedy the situation. As the raid penetrates into unfriendly territory, continuous sampling of the electronic environment is carried on. Search receivers capable of controlling jamming transmitters, as well as various types of chaff-dispensing systems, continuously evaluate intercepted signals. The results may be presented in various display forms to a member of the crew or may be programmed to allow automatic operation of the aircraft-defense subsystem. If the latter operation is selected, a manual override is generally allowed for. The outputs from this evaluation can be considered trivial, in which case no action is required; or hostile, in which case some defensive action is indeed required.
The decision as to the defensive tactic to be employed is a complex function. It is at this point that it is determined whether or not the correct equipment was selected earlier. Optimal selection of initial equipment, based on the information available prior to the raid, will be discussed analytically in Chapter 7. Selection of the best ECM tactic to use is obviously restricted by the equipment on hand. Mission restrictions also affect the decision. In the case of aircraft, which are of primary concern here, the number involved in the flight and the altitude (high-or low-level penetration) has a bearing on the problem. In view of these conditions, the ECM tactic is selected when the presence of a hostile environment is established. Some of the details involved in this selection will be taken up later. Once the tactic to use is chosen (barrage jamming, spot jamming, chaff, and so on),{4} a decision as to when to start using it and for how long is required. In short, operational considerations of the tactic selected must be established. Generally, an approaching aircraft carrying a searching receiver can hear the signal emitted from a surveillance radar before a strong enough echo is reflected for the radar receiver to detect the aircraft. This fact also provides time, in the order of minutes, between the determination that a hostile environment is being approached and the decision that defensive action must be initiated. Should the jamming transmitters be turned on too soon, since their radiated power is much greater than the returned radar echo, the jamming signal could be detected by the radar operator before he actually received a return pip on his scope. This early action would effectively extend the surveillance range of the radar and is referred to as beaconing.
Obviously, this condition is undesirable from the point of view of the penetrating aircraft, since it reduces the time during which it can escape detection. This, therefore, is one of the important operational considerations;