Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

Principles of Electronic Warfare
Principles of Electronic Warfare
Principles of Electronic Warfare
Ebook412 pages4 hours

Principles of Electronic Warfare

Rating: 0 out of 5 stars

()

Read preview

About this ebook

Originally published in 1961, by a team of scientists and engineers from Convair led by Robert J. Schlesinger, this classic book still provides an excellent analysis of the principles of electronic warfare even today.

“During World War II, the rapid growth of military electronics had its start. Today, and in the foreseeable future, large-scale weapon systems depend and will depend on electronic technology.

The importance of these electronic weapon systems to the overall concept of warfare is often obscured in detailed discussions of specific systems. For this reason, a broad understanding of the principles involved is essential. It is significant that these principles involve both engineering sciences and military strategy. In electronic warfare the terms “radiation” and “detection” must be considered in the same light as “offense” and “defense” are in strategic and tactical warfare.”—From the Introduction
LanguageEnglish
Release dateMay 19, 2020
ISBN9781839745157
Principles of Electronic Warfare

Related to Principles of Electronic Warfare

Related ebooks

Wars & Military For You

View More

Related articles

Reviews for Principles of Electronic Warfare

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Principles of Electronic Warfare - Robert J. Schlesinger

    © Barakaldo Books 2020, all rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted by any means, electrical, mechanical or otherwise without the written permission of the copyright holder.

    Publisher’s Note

    Although in most cases we have retained the Author’s original spelling and grammar to authentically reproduce the work of the Author and the original intent of such material, some additional notes and clarifications have been added for the modern reader’s benefit.

    We have also made every effort to include all maps and illustrations of the original edition the limitations of formatting do not allow of including larger maps, we will upload as many of these maps as possible.

    PRINCIPLES OF ELECTRONIC WARFARE

    BY

    ROBERT J. SCHLESINGER

    TABLE OF CONTENTS

    Contents

    TABLE OF CONTENTS 4

    DEDICATION 5

    PREFACE 6

    1—THE SCOPE OF THE PROBLEM 8

    SOME ELEMENTS OF THE PROBLEM 8

    TECHNICAL SUPREMACY AND THE SECRET WEAPON 10

    DYNAMIC DEVELOPMENT OF AN ECM TACTIC 11

    ECM EQUIPMENT—ONE ELEMENT OF THE TOTAL SYSTEM 14

    2—TECHNIQUE AND TACTICS 17

    TACTICAL CONSIDERATIONS 17

    NOISE JAMMING 19

    DECEPTION JAMMERS 20

    OTHER RADAR CONFUSION DEVICES 21

    TYPICAL AIR-COMBAT ANALYSIS IN AN ECM ENVIRONMENT 23

    TACTICS—AN EXAMPLE 28

    3—NOISE, PROBABILITY, AND INFORMATION RECOVERY 33

    RELATIONSHIP OF NOISE TO AN INFORMATION-CARRYING SYSTEM 33

    ELEMENTARY TREATMENT OF NOISE THEORY 33

    ELEMENTARY PROBABILITY AND STATISTICS 37

    RECOVERY OF SIGNAL INFORMATION FROM A NOISE ENVIRONMENT 42

    DETECTION AND CORRELATION 45

    SIGNAL DETECTION IN THE PRESENCE OF ELECTRONIC COUNTER-MEASURES (ECM) 49

    4—ELECTRONIC RECONNAISSANCE 58

    THE PURPOSE OF ELECTRONIC RECONNAISSANCE 58

    ELECTRONIC INTELLIGENCE 58

    A. OPERATIONAL INFORMATION 59

    B. TECHNICAL DATA 60

    PROBABILITY OF DETECTING, PROBABILITY OF INTERCEPTING 62

    SEARCHING MODES 64

    PROBABILITY OF OVERFLIGHT 67

    OVERFLIGHT RESOLUTION 71

    HORIZONTAL RESOLUTION 75

    INTERCEPT CORRELATION 83

    GENERALIZED SENSOR CHARACTERISTICS 86

    RECEIVER MODES 88

    5—RADAR CONSIDERATIONS 94

    THE APPROACH TO RADAR COUNTERMEASURES 94

    PULSE RADARS 94

    PULSE-RADAR OPERATION 95

    OPTIMUM IF AMPLIFIER BAND WIDTH 99

    PULSE DETECTION AND INTEGRATION 103

    PULSE-RADAR RANGE 106

    CW RADARS 109

    DOPPLER-FILTER BAND WIDTH LIMITATIONS 111

    CW RADAR RANGE 119

    PULSE-DOPPLER RADARS 120

    MOVING TARGET INDICATION 126

    TARGET TRACKING SYSTEMS 129

    ANGLE TRACKING 129

    RANGE TRACKING 133

    VELOCITY TRACKING 134

    GENERAL RADAR CONCEPTS 135

    THE EFFECTS OF ECM ON RADARS 142

    RADAR COUNTER MEASURES TECHNIQUES 147

    6—THE ROLE OF ANTENNAS IN ELECTRONIC WARFARE 152

    ANTENNA DESCRIPTIVE PARAMETERS 152

    DIRECTIVITY AND GAIN 156

    ANTENNA SIDE LOBES 157

    BAND WIDTH 158

    PROPAGATION 159

    PROPAGATION OVER A PLAIN EARTH 159

    PROPAGATION OVER THE CURVED EARTH 161

    PROPAGATION IN THE STANDARD ATMOSPHERE 162

    PROPAGATION IN A NON-STANDARD ATMOSPHERE 164

    ATTENUATION DUE TO ABSORPTION AND SCATTERING 164

    ANTENNA APPLICATIONS 165

    TRACKING ANTENNAS 165

    MANUAL TRACKING 167

    MULTIPLE-BEAM TRACKING 167

    CONICAL SCAN 167

    MONOPULSE TRACKING 168

    SEARCH ANTENNAS 170

    EFFECT OF ANTENNA CHARACTERISTICS ON INTERCEPT PROBABILITY 170

    DESIGN OF LARGE GROUND-BASED ANTENNAS 173

    ANTENNAS OF OTHER TYPES 176

    7—OPTIMIZATION—CONSTRAINTS AND INCOMPLETE INFORMATION 177

    OBJECTIVES OF AN ECM SYSTEM 177

    OPTIMIZATION OF ECM EQUIPMENT CHARACTERISTICS 177

    DEFINITION OF THE EFFECTIVENESS FUNCTION 186

    OPTIMUM DISTRIBUTION OF AVAILABLE PAYLOAD BETWEEN WEAPONS AND ECM 193

    8—SOME ASPECTS OF ELECTRONIC WARFARE IN THE SPACE ERA 201

    INTRODUCTION 201

    SOME ELEMENTS OF THE SPACE ENVIRONMENT 203

    SPACE MISSIONS—COMMUNICATIONS AND RECONNAISSANCE 212

    ANTENNAS IN SPACE 221

    FLUSH ANTENNAS 221

    INFLATABLE AND UNFOLDING ANTENNAS 222

    POLARIZATION 222

    ANTENNA MATERIALS FOR SPACE SYSTEMS 223

    INFRARED APPLICATIONS 223

    SOME EFFECTS OF SPACE OPERATIONS ON RADAR AND RADAR COUNTERMEASURES 224

    BIBLIOGRAPHY 228

    CHAPTER 1 228

    CHAPTER 3 228

    CHAPTER 4 228

    CHAPTER 5 228

    CHAPTER 6 229

    CHAPTER 7 229

    CHAPTER 8 230

    REQUEST FROM THE PUBLISHER 231

    DEDICATION

    ELECTRONIC WARFARE

    It is not pleasant to think that warfare is fundamental to the nature of man, and indeed it may not necessarily be so. However, through all recorded history we find this unfortunate trend. Perhaps some day a discussion of the problems taken up in this book will be pointless; i.e., wars will no longer exist. Let us hope, for that reason, that the material herein will then no longer be required.

    In that light, this book is dedicated to its own obsolescence.

    PREFACE

    During World War II, the rapid growth of military electronics had its start. Today, and in the foreseeable future, large-scale weapon systems depend and will depend on electronic technology.

    The importance of these electronic weapon systems to the overall concept of warfare is often obscured in detailed discussions of specific systems. For this reason, a broad understanding of the principles involved is essential. It is significant that these principles involve both engineering sciences and military strategy. In electronic warfare the terms radiation and detection must be considered in the same light as offense and defense are in strategic and tactical warfare. To be sure, the engineering aspects of the problem must be given thorough analytical treatment; however, operational questions must also be considered if a broad appreciation of the principles of electronic warfare is to be achieved. The treatment presented here is intended to achieve a balance between these technical and tactical aspects of the problem. Therefore, it is hoped that both those concerned with deployment and tactics, and the professional engineer as well, will find many points of interest here.

    Some aspects of the Electronic Countermeasures (ECM) problem have intentionally been omitted because security requirements impose an important constraint on the selection and treatment of topics.

    There is no discussion of specific equipment in this text. There are two reasons for this intentional omission. First, a discussion of operational equipment is not our objective; second, such a treatment does not represent a fundamental approach to the problem. A sincere attempt has been made to bring reasonable generality to all mathematical analysis.

    The opening chapter is intended to indicate the range of the subject matter and to point up typical situations representative of electronic warfare. Chapter 2 represents an attempt to relate the broad concepts of techniques and tactics and also to provide a general discussion of some classic ECM methods.

    In Chapter 3, we provide a basic introduction to the mathematics associated with probability and then apply this to a discussion of noise theory, which is inherent to many parts of the problem. In Chapter 4 we develop the theory of electronic intelligence and then discuss some basic problems of reconnaissance systems. It is intended here to establish the relationships between reconnaissance inputs and ECM tactics. In Chapter 5 we carry out a fundamental analysis of radar systems, with emphasis on parameters important to ECM and ECCM techniques. In Chapter 6 we define the role of the antenna as the transducer between the electronic system and the environment, and again point out factors critical to the electronic warfare problem. In Chapter 7 we provide an operations analysis approach to the problem of establishing an effective ECM environment on a mission profile with typical constraints. In Chapter 8 we extend present thinking into the space era and discuss some of the ramifications of electronic warfare as influenced by space flight.

    Although this book is the composite effort of all contributors, Mr. Ehrhorn is primarily responsible for Chapter 3, Mr. Logue for Chapter 5, Mr. Abbey for Chapter 6, and Mr. Friedenthal and Mr. Schlesinger for Chapters 1, 2, 4, 7, and 8.

    Robert J. Schlesinger

    1—THE SCOPE OF THE PROBLEM

    SOME ELEMENTS OF THE PROBLEM

    It is our goal in this book to set down some of the existing theories, explore the current philosophies, and define the present problems connected with electronic warfare.

    One of the first problems to consider is a definition of electronic warfare that will be acceptable in the situations to be discussed. In the context of this book, the interaction between two or more communication systems for the purpose of intentional interference will represent electronic warfare. A communication system is here understood to be any electronic device that radiates and/or receives information.

    The problems concerned with when, where, and how to generate this electronic interference and, on the other hand, the action to be taken to counter its detrimental effects are of fundamental importance to electronic warfare. The former problem is generally referred to as Electronic Counter-Measures (ECM) and the latter as Electronic Counter-Counter Measures (ECCM).

    It is the end purpose of ECM to interfere with the successful operation of an opponent’s weapon system; particularly weapon systems that might be used to destroy the vehicle (for example, an aircraft) on which the ECM equipment is carried.

    Since the jamming of radar, communication, and missile guidance systems tends to accomplish this end purpose, these are the areas in which ECM has found its widest application.

    It is natural to expect that as weapon systems came to place more reliance on the use of electromagnetic radiation as a connecting link among their elements, the weakness inherent to such a link would be exploited. Unfortunately for the user, one of the weaknesses of these systems lies in the fact that the radiation of Radio Frequency (RF) energy, in most of its applications, is not secure from detection and interference. To be sure, considerable effort is expended in some applications, notably communications, to provide some degree of security. However, since all weapon systems of the type considered here must transmit information in order to be useful, their security becomes a function of the detector used to intercept the signal. If the enemy has exactly the right type of receiver for the signal characteristics being transmitted, security is extremely difficult, if not impossible.

    The subject of security is considered here because of its basic importance to the intelligent application of ECM methods. If the presence of a hostile signal cannot be detected, no jamming action can be initiated wisely. After detection has been accomplished, it is necessary to establish the information content of the signal to determine if jamming is required. Typical techniques of preventing these two steps from being carried out include high-speed transmissions and pseudo-noise generation with correlation to impede detection, and coded modulation methods to prevent information analysis. Many other techniques are used, some of which will be discussed in later sections of this text.

    We have introduced two of the primary requirements for the employment of ECM: (1) it is necessary to detect the radiation from an enemy system; (2) it must be established that it is desirable to jam the signal detected.

    It is not always in the best interest of the mission to jam every signal being emitted within enemy territory. For example, if an incoming bomber raid detected radiation, but did not analyze the signal, ECM transmitters might be turned on to jam a local UHF television station. This would hinder, more than aid, the success of the raid. Once the jamming transmitters are turned on, a public announcement is given that hostile aircraft are in the area. Because of the beaconing effect{1} of these transmitters, the area alerted is much larger than that covered by the surveillance radars alone.

    In the foregoing discussion two important steps were defined that are necessary to the evaluation of the electronic environment with respect to the presence of hostile signals. This evaluation has up to this point depended only on the type of monitoring equipment carried aboard the penetrating aircraft and is therefore basically a reconnaissance function. If reconnaissance is the primary purpose of the flight it is not generally necessary to carry jamming transmitters.{2} A record of the signals intercepted can be stored on tape and/or film for use at a later time. (The application of reconnaissance information will be covered in the fourth chapter.) However, if the mission of the raid is to reach a specific target the use of active ECM techniques may be required to confuse and jam enemy air-defense systems.

    When sufficient information has been received to determine that jamming tactics should indeed be employed, a second set of problems arises. These problems concern the actual ECM tactical considerations. For example, some of the questions that must be answered include: What mode of jamming should be used? How long should it be used? How many of the aircraft should use it? Exactly when should the jamming transmitters be turned on? To answer these questions, something must be known about the operational constraints imposed by the raid configuration, its mission, and the characteristics of the ECM equipment being carried.

    It can be seen that the introduction of so many variable factors makes a general solution to the ECM tactics problem extremely difficult. However, if a specific raid is considered and previous reconnaissance data have given some details of the hostile electronic environment to be encountered in the target area, optimum ECM tactics may be established. Unfortunately, this information can seldom be provided in the detail desired.

    The Strategic Air Command (SAC) force required to penetrate deep into enemy territory would like very much to have a general tactic to employ in the face of an unknown electronic environment. This is a basic problem that has been of major concern to both military and civilian planners engaged in establishing electronic-warfare strategies. Before further consideration of this problem is undertaken, one additional complication and some illustrative examples will be discussed.

    TECHNICAL SUPREMACY AND THE SECRET WEAPON

    In many studies it has been shown that technical supremacy is a critical factor. Should SAC bombers encounter an air-defense system using tracking and missile-guidance radars operating at a frequency of 40 kmcs, when the highest-frequency ECM equipment they carried was 30 kmcs, the results could be fatal! Generally, since the monitoring receivers do not search higher in frequency than their companion jamming transmitters, the first indication the raid would have of their being illuminated by the enemy defense system would be the explosion of surface-to-air or air-to-air missiles. In this case, even if they had employed their ECM transmitters blindly, no amount of jamming would have reduced the effectiveness of the enemy air-defense system. The SAC bombers were not technically equipped to defeat the threat they encountered in this example. However, the correct employment of chaff at the proper time may have been of some aid. It is not uncommon to find chaff and active ECM used simultaneously in certain cases. For deep penetration raids, requiring many hours of flying time over enemy territory, it is impossible to carry enough chaff for continuous dispersal. Therefore, some operational information to establish the correct time to disperse the chaff is still required.

    Perhaps the most interesting case of technical supremacy is the now classical example of submarine searching carried on during World War II.{3}

    In early 1942, the RAF Coastal Command used L-band radar as an aid for locating German U-boats recharging batteries on the surface. The overall effectiveness of the RAF in this task was quite good until the U-boats began using L-band search receivers. These receivers allowed the submarine to hear transmitted radar signals at a range greater than that over which the radar echo could effectively be returned. The U-boat therefore had time to crash-dive before actually being sighted by the searching aircraft. In turn, the general effectiveness of the RAF anti-submarine effort decreased. The Allies, realizing what had happened, installed new S-band search radars aboard their aircraft during early 1943. As a result of the effectiveness of new equipment the intercept rate rose sharply. German submarines sitting on the surface, listening to L-band search receivers, became vulnerable targets for S-band radar directed aircraft.

    As the U-boat sinkings increased, the Germans tried frantically to determine the method of detection the Allies were using. Since reports from surviving submarines stated that no radiation had been heard in their L-band search receivers prior to the attack, it was thought that perhaps an infrared detection device of some type was being employed. Considerable effort was spent in an attempt to combat a non-existing infrared threat. U-boat activity was greatly reduced by the time the German High Command realized that a new high-frequency radar (S-band) was in use.

    This is an interesting example of a weapon (L-band radar), a counter measure (L-band search receiver), and an improvement (S-band radar) providing a clear margin of technical supremacy.

    There is another point to be considered. To be sure, the use of S-band radar employing magnetrons and extending the useable frequency by a factor of ten provided a definite advantage. However, had the Germans had information as to what was being used, the time lag until they were able to develop an effective S-band search receiver would have been greatly reduced. An added advantage was gained by the Allies because of the Germans’ lack of information. It is obvious then that the enemy’s lack of information is the basic requirement of the so-called secret weapon.

    This point is mentioned here because illustrated in this example is one of the important roles of electronic reconnaissance. Had the Germans been conducting an extensive reconnaissance program at the time, it is probable that they would have intercepted S-band signals from magnetron oscillators in the development and testing stages during flights over England. The development of the magnetron was, of course, the crux of the problem of generating high power for 10 cm radar, but simple crystal receivers for reconnaissance purposes were indeed available, if the Germans had cared to use them in this application. Sensitivity is, of course, not necessary for intercepting high-power sources. Therefore, special requirements of a reconnaissance system include being general enough to intercept the unexpected and providing intelligence inputs for an advanced ECCM program. Other relationships between ECM, ECCM, and reconnaissance will also be taken up in the fourth chapter.

    DYNAMIC DEVELOPMENT OF AN ECM TACTIC

    It was stated, prior to these examples, that it is difficult to specify a general ECM tactic to be employed on any and all raids. When intelligence information is complete and exact on the defenses of any given area or target (the precise types and location of all air-defense systems are known), a detailed ECM tactic can be prescribed prior to raid penetration. Unfortunately, information is seldom that complete. Although a general tactic cannot be defined beforehand, a general approach to establishing the optimum tactic as the raid progresses can be defined. Figure 1-1 shows the steps in the development of the problem.

    Generally, some information obtained from reconnaissance or other forms of intelligence analysis is on hand. It is this information that must determine the ECM equipment to be carried on the mission. Since the weight of the ECM equipment will displace bomb loading (or equivalent firepower in the case of ground forces), its selection should be carefully considered. Obviously, once the mission has started, if incorrect or insufficient jamming units are being carried, little can be done to remedy the situation. As the raid penetrates into unfriendly territory, continuous sampling of the electronic environment is carried on. Search receivers capable of controlling jamming transmitters, as well as various types of chaff-dispensing systems, continuously evaluate intercepted signals. The results may be presented in various display forms to a member of the crew or may be programmed to allow automatic operation of the aircraft-defense subsystem. If the latter operation is selected, a manual override is generally allowed for. The outputs from this evaluation can be considered trivial, in which case no action is required; or hostile, in which case some defensive action is indeed required.

    The decision as to the defensive tactic to be employed is a complex function. It is at this point that it is determined whether or not the correct equipment was selected earlier. Optimal selection of initial equipment, based on the information available prior to the raid, will be discussed analytically in Chapter 7. Selection of the best ECM tactic to use is obviously restricted by the equipment on hand. Mission restrictions also affect the decision. In the case of aircraft, which are of primary concern here, the number involved in the flight and the altitude (high-or low-level penetration) has a bearing on the problem. In view of these conditions, the ECM tactic is selected when the presence of a hostile environment is established. Some of the details involved in this selection will be taken up later. Once the tactic to use is chosen (barrage jamming, spot jamming, chaff, and so on),{4} a decision as to when to start using it and for how long is required. In short, operational considerations of the tactic selected must be established. Generally, an approaching aircraft carrying a searching receiver can hear the signal emitted from a surveillance radar before a strong enough echo is reflected for the radar receiver to detect the aircraft. This fact also provides time, in the order of minutes, between the determination that a hostile environment is being approached and the decision that defensive action must be initiated. Should the jamming transmitters be turned on too soon, since their radiated power is much greater than the returned radar echo, the jamming signal could be detected by the radar operator before he actually received a return pip on his scope. This early action would effectively extend the surveillance range of the radar and is referred to as beaconing. Obviously, this condition is undesirable from the point of view of the penetrating aircraft, since it reduces the time during which it can escape detection. This, therefore, is one of the important operational considerations;

    Enjoying the preview?
    Page 1 of 1