During the next two months, we will discuss the differences

Similar documents
Presented By : Lance Clayton AOC - Aardvark Roost

CONVERGENCE BETWEEN SIGNALS INTELLIGENCE AND ELECTRONIC WARFARE SUPPORT MEASURES

Passive Radars as Sources of Information for Air Defence Systems

Tactical COMMS/ESM System for Submarines. A Front-end Perspective

Electronic Warfare (EW) Principles and Overview p. 1 Electronic Warfare Taxonomy p. 6 Electronic Warfare Definitions and Areas p.

DISTRIBUTED COHERENT RF OPERATIONS

GIRAFFE 8A AESA 3D LONG RANGE RADAR

Mission Solution 300

39N6E KASTA-2E2 Low-Altitude 3D All-Round Surveillance Radar

EC312 Lesson 20: Electronic Warfare (3/20/14)

Boost Your Skills with On-Site Courses Tailored to Your Needs

Introduction to Electronic Defence EEE5106S

RECOMMENDATION ITU-R BS.80-3 * Transmitting antennas in HF broadcasting

Products & Services Brochure Brochure Microwave Antennas, Subsystems and Consultancy

ANTENNA INTRODUCTION / BASICS

ANTENNA INTRODUCTION / BASICS

DEFENSE and SECURITY RIGEL ES AND. Defense and security in five continents. indracompany.com

Microwave Engineering Project (MEP) Update The Problem is Pointing

RADAR PARAMETER GENERATION TO IDENTIFY THE TARGET

Jamming Calculations

Use of Communications EW in a Network Centric Warfare Environment

Radar observables: Target range Target angles (azimuth & elevation) Target size (radar cross section) Target speed (Doppler) Target features (imaging)

Electronic Order of Battle Records of Unfriendly Radar Systems using Certain Advanced Techniques as Electronic Support Measures

«Integrated Air Defence Systems - Countering Low Observable Airborne Threats»

Combining Air Defense and Missile Defense

Rec. ITU-R F RECOMMENDATION ITU-R F *

The Future of Land-Based EW Eyal Danan, VP General Manager EW SIGINT & Comm. Division. unclassified Proprietary Information of IAI Slide 1

CIRCULAR DUAL-POLARISED WIDEBAND ARRAYS FOR DIRECTION FINDING

The Old Cat and Mouse Game Continues

Antenna Fundamentals Basics antenna theory and concepts

Real-Time Spectrum Monitoring System Provides Superior Detection And Location Of Suspicious RF Traffic

1 SINGLE TGT TRACKER (STT) TRACKS A SINGLE TGT AT FAST DATA RATE. DATA RATE 10 OBS/SEC. EMPLOYS A CLOSED LOOP SERVO SYSTEM TO KEEP THE ERROR SIGNAL

Satellite Sub-systems

VectaStar 3500 METHODS FOR SUCCESSFUL ANTENNA DEPLOYMENT

Investigating jammer suppression with a 3-D staring array

Monopulse Antenna. Figure 2: sectional picture of an antenna array of a monopulse antenna

Antenna Performance. Antenna Performance... 3 Gain... 4 Radio Power and the FCC... 6 Link Margin Calculations... 7 The Banner Way... 8 Glossary...

Chapter 4. Meaconing, Intrusion, Jamming, and Interference Reporting

ANT5: Space and Line Current Radiation

A BROADBAND BICONICAL ANTENNA FOR WIDE ANGLE RECEPTION

Antennas Prof. Girish Kumar Department of Electrical Engineering India Institute of Technology, Bombay. Module - 1 Lecture - 1 Antennas Introduction-I

Bearing Accuracy Improvement of the Amplitude Comparison Direction Finding Equipment by Analyzing the Error

Design of Sectoral Horn Antenna with Low Side Lobe Level (S.L.L)

White Paper. 850 MHz & 900 MHz Co-Existence. 850 MHz Out-Of-Band Emissions Problem xxxx-xxxreva

Wind Turbine Analysis for. Cape Cod Air Force Station Early Warning Radar. and Beale Air Force Base Upgraded Early Warning Radar.

Pulse digitizer generator for ESM systems

WiFi Lab Division C Team #

Introduction to Radar Systems. The Radar Equation. MIT Lincoln Laboratory _P_1Y.ppt ODonnell

N0GW Log Periodic Installation

Antenna Engineering Lecture 3: Basic Antenna Parameters

Exercise 1-5. Antennas in EW: Sidelobe Jamming and Space Discrimination EXERCISE OBJECTIVE

KULLIYYAH OF ENGINEERING

3 Planning the Jamming Operation

Introduction to Radar Systems. Radar Antennas. MIT Lincoln Laboratory. Radar Antennas - 1 PRH 6/18/02

Chapter 6 Antenna Basics. Dipoles, Ground-planes, and Wires Directional Antennas Feed Lines

UNIT-3. Ans: Arrays of two point sources with equal amplitude and opposite phase:

White Paper 850 MHz & 900 MHz Co-Existence 900 MHz Receiver Blocking Problem

Newsletter 4.4. Antenna Magus version 4.4 released! Array synthesis reflective ground plane addition. July 2013

360 inches (915 cm) 240 inches (610 cm) 120 inches (305 cm) 240 inches is the recommended pole length, 360 inches is the recommended free space area

A Miniaturized Identification System for the Dismounted Warrior

Broadband Antenna. Broadband Antenna. Chapter 4

Characteristics of HF Coastal Radars

AN AUTOMATED CYLINDRICAL NEAR-FIELD MEASUREMENT AND ANALYSIS SYSTEM FOR RADOME CHARACTERIZATION

ELEC4604. RF Electronics. Experiment 1

PETER CLARKE - EW ANALYSIS & INTEGRATION

Session2 Antennas and Propagation

ELECTRONIC WARFARE. Robert Inkol. Defence Research and Development Canada

BATS WIRELESS. Electronically Steered Antenna (ESA) Omni Antenna. Sector Antenna. High Gain High Mobility Hi Reliability

Addressing the Challenges of Radar and EW System Design and Test using a Model-Based Platform

The C2/C4ISR Systems Market

6 Radio and RF. 6.1 Introduction. Wavelength (m) Frequency (Hz) Unit 6: RF and Antennas 1. Radio waves. X-rays. Microwaves. Light

stacking broadside collinear

Ray-Tracing Urban Picocell 3D Propagation Statistics for LTE Heterogeneous Networks

3D LANZA RADAR FAMILY

ECE 6390: Satellite Communications and Navigation Systems TEST 1 (Fall 2010)

Exercise 1-3. Radar Antennas EXERCISE OBJECTIVE DISCUSSION OUTLINE DISCUSSION OF FUNDAMENTALS. Antenna types

Performance Analysis of a Patch Antenna Array Feed For A Satellite C-Band Dish Antenna

Chapter 2 Threat FM 20-3

Optimizing 16 db Capture Effect to Overcome Class A 'Channelized' Signal Booster Group Delay problems within Public Safety Communications Systems

SPACE DOMAIN AWARENESS: A GLOBAL CHALLENGE. Konichiwa and thank you Yoshitomi-San for that very kind

ADJACENT BAND COMPATIBILITY OF TETRA AND TETRAPOL IN THE MHZ FREQUENCY RANGE, AN ANALYSIS COMPLETED USING A MONTE CARLO BASED SIMULATION TOOL

Portable Range Threat Simulators

Chapter 3 Army Air Defense Control Systems

A DUAL-RECEIVER METHOD FOR SIMULTANEOUS MEASUREMENTS OF RADOME TRANSMISSION EFFICIENCY AND BEAM DEFLECTION

INTRODUCTION. Basic operating principle Tracking radars Techniques of target detection Examples of monopulse radar systems

Chapter 2. Fundamental Properties of Antennas. ECE 5318/6352 Antenna Engineering Dr. Stuart Long

Radio Frequency Exposure Test Report

ABBREVIATIONS. jammer-to-signal ratio

A new Sensor for the detection of low-flying small targets and small boats in a cluttered environment

Antennas & wave Propagation ASSIGNMENT-I

EW Self Protection Systems.

DOPPLER RADAR. Doppler Velocities - The Doppler shift. if φ 0 = 0, then φ = 4π. where

National Data Links: Waveform Design and its role in Modern Electronic Warfare operations

System Design and Assessment Notes Note 43. RF DEW Scenarios and Threat Analysis

Background Data: Naval Warfare, Battle of the Atlantic, Cryptography, and the Code Game. Battle of the Atlantic Allied Convoys vs.

Antennas and Propagation

Silent Sentry. Lockheed Martin Mission Systems. Jonathan Baniak Dr. Gregory Baker Ann Marie Cunningham Lorraine Martin.

Half-Wave Dipole. Radiation Resistance. Antenna Efficiency

Smart antenna technology

Phantom Dome - Advanced Drone Detection and jamming system

Transcription:

EW 101 ES vs. SIGINT By Dave Adamy 42 The Journal of Electronic Defense January 2011 During the next two months, we will discuss the differences between Electronic Support (ES) systems and Signals Intelligence (SIGINT) systems, both of which are designed to receive hostile signals. The differences between SIGINT and ES have to do with the reasons those signals are received, as summarized in Table 1. There are also some technical differences between the typical environments in which these systems work that dictate differences in system design approach and system hardware and software. SIGINT SIGINT is the development of militarily significant information from received signals. It is commonly divided into Communications Intelligence (COMINT) and Electronic Intelligence (ELINT) as shown in Figure 1. Each of these subfields is somewhat related to ES as shown in Figure 2. ES is commonly divided into Communications ES and Radar ES as shown in Figure 3. The nature of communication and radar signals dictates differences in mission between these two subfields. The following paragraphs will focus on systems handling each type of signal, differentiating the intelligence and ES roles. COMINT and Communications ES Figure 3 is a flow diagram showing the relationship between COMINT and Communications ES systems. The dictionary definition of COMINT is gathering of intelligence by intercept of wire or radio communications. Basically, this is listening to what an enemy says to determine his capability, his force structure and his intentions. This implies that a COMINT system deals with the internals (i.e., the information carried in the modulation) of transmitted enemy Table 1: SIGINT vs. ES Mission SIGINT Systems COMINT: Intercept enemy communications and determine enemy capabilities and intentions from information carried on signals. ELINT: Find and identify new threat types. Figure 1: SIGINT comprises COMINT and ELINT to develop intelligence from enemy communications and non-communications signals. signals. Because of the nature of military communication, important signals can be expected to be encrypted and, of course, in the enemy s language. Decryption and translation of signals can be expected to delay the availability of the information recovered. Thus, COMINT can be considered more valuable to strategic and high-level tactical considerations than to determination of appropriate immediate tactical response. Communications ES focuses on the externals of communications signals: the type and level of modulation and the location of the transmitters. It supports tactical responses to current situations by determining the types and locations of enemy emitters. By modeling all of the types of emitters against the type of emitters used by various enemy organizations, estimates of the enemy force structure can be made. The location and location history of the observed emitters can be used to ES Systems Comms ES: Identify and locate enemy communications emitters to allow development of EOB and to support comms jamming. Radar ES: Identify and locate enemy radars to allow threat warning and to support radar countermeasures. Timing Data Collected Timeliness of outputs is not too critical. Gather all possible data on received signals to support detailed analysis. Timeliness of information is central to mission. Gather only enough data to determine threat type, operating mode and location.

EW101 Figure 2: ES comprises Comms ES and Radar ES. Both provide information about enemy emitters currently operating in support of EA and weapon engagement. indicate the location and movement of the enemy s forces. The total laydown of transmitters is called the Electronic Order of Battle (EOB), and can be analyzed to determine the enemy s capabilities and even his intentions. In summary, COMINT determines the enemy s capabilities and intentions by listening to what is said (i.e., signal internals), while Communications ES determines the enemy s capabilities and intentions by analysis of signal externals. ELINT and Radar ES ELINT involves the intercept and analysis of non-communications signals, primarily from radars. The purpose of ELINT Figure 3: COMINT classically deals with signal internals to support strategic actions; Comms ES deals with signal externals to support immediate tactical decision making. Figure 4: ELINT systems gather threat data to support the development of ES systems and subsystems for threat warning and countermeasure selection. is to determine the capabilities and vulnerabilities of newly encountered enemy radars. As shown in Figure 4, the ELINT system gathers enough data to support detailed analysis. The first task when a new radar signal type is received is to determine whether the received signal is, in fact, a new threat. Two other possibilities exist: it may be an old threat radar that is malfunctioning or there may have been something wrong with the intercept system. If the received signal is, in fact, a new type of radar or a new operating mode, the detailed analysis will allow modification of ES systems so that they will be able to recognize this new threat type. Radar ES systems also receive hostile radar signals, but their purpose is to quickly determine which of the enemy s known weapons is being deployed against a target at the moment. After threat type and mode identification is complete, this information is displayed to operators along with the location of the threat emitter and/or passed to other electronic warfare systems or subsystems to support countermeasure initiation. If a signal of an unfamiliar type is received, it is considered an unknown. In some ES systems, the operator is merely notified that an unknown threat has been received. However, in other systems, an attempt is made to guess the threat type. In some ES systems, unknown threats are recorded for later analysis. In summary, ELINT determines what capabilities the enemy has, while Radar ES determines which of the enemy s radars is being used at the moment and where the emitter (hence the weapon it controls) is located. What s Next Next month, we will continue our discussion of the differences between ES and SIGINT, covering the technical differences between ES and SIGINT systems which are driven by their respective missions. For your comments and suggestions, Dave Adamy can be reached at dave@lynxpub.com. a The Journal of Electronic Defense January 2011 43

EW 101 ES vs. SIGINT Part 2 Antenna and Range Considerations By Dave Adamy 50 The Journal of Electronic Defense February 2011 This month, we will deal with some technical differences between ES and SIGINT systems dictated by mission and environment considerations. These differences have to do with the anticipated intercept geometry, the different types of information taken from intercepted hostile signals, and time criticality of intercepts. ANTENNA ISSUES Antennas can be characterized as directional or nondirectional. This is, of course, a great over-simplification. Antennas, such as whips and dipoles, are sometimes (incorrectly) described as omni-directional. This is not true, as both antenna types have nulls in their coverage. However, both types, if vertically oriented, provide 360 degrees of azimuthal coverage. There are also circular arrays of directional antennas that provide full azimuthal coverage. Directional antennas (including but not limited to parabolic dishes, phased arrays or log periodic antennas) restrict their coverage to a reduced angular sector. Angular coverage has a significant impact on the probability of intercepting a hostile signal at an unknown direction of arrival. As shown in Figure 1, a 360-degree coverage antenna (or array of antennas) looks in all directions all of Figure 2: The percentage of angular space within the antenna beam varies inversely with the beamwidth, as does the dwell time at the signal s angle of arrival. the time, so it will input any new signal to a receiver as soon as it occurs. The directional antenna, on the other hand, must be scanned to the direction of arrival of a new signal before it can be received. If a hostile signal is present for a limited time, the probability of intercept is a function of the antenna beam width and the scan rate of the antenna. For an intercept to occur, the antenna must be moved to place the signal s direction of arrival into the antenna beam Figure 1: A 360-degree antenna, like a dipole or whip, provides 100 percent coverage of all azimuths of arrival, while a narrow-beam antenna must be scanned to the correct direction of arrival. coverage area. As shown in Figure 2, the beamwidth determines the percentage of possible angles of arrival covered by the antenna. To use this part of the figure, draw a line straight up from the beamwidth to the black line, then draw right to the black ordinate value. This considers only one search dimension (e.g., azimuthal search); a two-dimensional search is significantly more difficult. In the same figure, the amount of time that a scanning antenna will dwell on the signal s angle of arrival (also in azimuth only) is shown as a function of beam width for various circular scan periods. To use this part of the figure, draw straight up from the beam width to the green line

Figure 3: The gain of a narrow-beam antenna varies inversely with its beamwidth. for the selected scan period, then draw left to the green ordinate value. It should be noted that a frequency search must be made during the time the antenna is pointed at each possible angle of arrival. The narrower the antenna beam, the slower the receiving antenna must be scanned to allow for frequency search. Thus, the longer it will take to find a signal of interest at unknown frequency and angle of arrival. Frequency search will be discussed next month. Normally, SIGINT intercepts are less time critical. Thus, a delay in intercept caused by scanning a narrow beam antenna is likely to be acceptable. However, because ES systems must typically intercept a hostile signal within a small number of seconds, a wide coverage antenna or array of antennas is usually required. As shown in Figure 3, there is a trade-off of the half power (3 db) beamwidth of an antenna and the antenna gain. This figure is for a 55-percent efficient parabolic dish antenna, but this trade-off applies to all types of narrow beam antennas. The receiving antenna gain is an important consideration in the range at which a hostile signal can be intercepted, as discussed below. This means that wide-coverage (hence low-gain) antennas are almost always required for ES systems, while narrowbeam (hence high-gain) antennas may be the best solution for SIGINT systems. Figure 4: The range at which a receiving system can intercept a hostile emitter signal is a function of antenna gain and receiver system sensitivity. EW101 INTERCEPT RANGE CONSIDERATIONS Figure 4 shows an intercept situation for either an ES or SIGINT system. Note that the range at which a receiving system can intercept a hostile signal depends on the effective radiated power of the target signal, the applicable propagation mode, the receiving antenna gain in the direction of the emitter, and the sensitivity of the receiving system. Propagation modes are discussed in detail in the EW 101 columns in the July, August and September 2007 editions of JED. Radar and data link signals typically propagate in the line-of-sight mode. In this mode, the intercept range is given by the formula: RI = Anti-log {[ERPT 32-20 log(f) + GR S] / 20} Where: RI = the intercept range in km ERPT = the effective radiated power of the target emitter in dbm F = the frequency of the transmitted signal GR = the gain of the receiving antenna in the direction of the target emitter S = the sensitivity of the receiver system in dbm Communication signals will propagate in the line-of-sight or 2-ray modes, depending on the link distance, antenna heights and frequency. If propagation is in the 2-ray mode, the intercept range is given by the formula: RI = Anti-log {[ERPT 120 + 20 log(ht) + 20 log (hr) + GR S] / 40} Where: RI = the intercept range in km ERPT = the effective radiated power of the target emitter in dbm ht = the height of the transmitting antenna in meters hr = the height of the receiving antenna in meters GR = the gain of the receiving antenna in the direction of the target emitter S = the sensitivity of the receiver system in dbm As you can see from these formulas, the intercept range is always impacted by the receiving antenna gain and the sensitivity of the receiving system. Note that the sensitivity is the required signal strength for a successful intercept. The more sensitivity the receiving system has, the lower this number will be. For example, a high-sensitivity receiver might have a sensitivity of -120 dbm, while a low-sensitivity receiver could have a sensitivity of -50 dbm. The effective radiated power (ERP) of the target emitter is the amount of power it transmits in the direction of the intercepting receiver. Tactical communication threats will usually have 360-degree antennas with fairly constant gain vs. azimuth; the ERP is the sum of the transmitter power (in dbm) and the The Journal of Electronic Defense February 2011 51

52 EW101 antenna gain (in db). However, radar threats are expected to have narrow-beam antennas. As shown in Figure 5, the narrowbeam antenna has a main lobe and side lobes. The side lobes are shown simplified in that they are all the same strength actual antenna side lobes vary. However, the drawing is realistic in that the nulls between the lobes are much narrower than the lobes. This means that an intercept receiver pointed at the radar threat emitter away from the direction of the main beam can be expected to encounter an ERP at the average side lobe level. This level is usually stated as: S/L = -N db, where N is the number of db that the average side lobe level is below the boresight gain. Although not always true, it is fairly common for an ES system to be specified to receive the main lobe of a radar threat Figure 5: Radar ESM systems are often characterized as receiving signals from the boresight of threat radar antennas, while ELINT systems are often characterized as receiving average side lobe level signals. while an ELINT system would be specified to intercept side lobe transmissions from target radar emitters. This means that an ES system will often require less sensitivity and/or receiving antenna gain than an ELINT system. SIGINT systems are generally assumed to require greater intercept range than ES systems however, as with all generalities, this depends on the specific mission and situation. If we accept that SIGINT systems require greater intercept range, the receiving antenna gain and/or the sensitivity must be greater than required for ES systems. Narrow-beam antennas have higher gain, but provide reduced probability of intercept (in a short time period). Thus, they are more appropriate for SIGINT applications. Full-coverage antennas, while they provide less gain, can provide significantly better probability of intercept in a short time period, so are generally most appropriate for ES systems. What s Next Next month, we will continue our discussion of the technical differences between ES and SIGINT, with coverage of receiver and data collection issues. For your comments and suggestions, Dave Adamy can be reached at dave@lynxpub.com. a The Journal of Electronic Defense February 2011 The Billy Mitchell Chapter Invites You to Attend the 2011 Mountain-Western Region Technical Symposium EW/IO in a Cyber World You are invited to join us April 11th through April 14th, 2011 in San Antonio during our fabulous Fiesta week! H eld in conjunction with the National Collegiate Cyber Defense Competition (NCCDC) (8-10 April), and the Congressional Cyber Security Caucus Summit (9 April), FiestaCrow 2011 will bring together renowned cyber/io policy makers and technical experts, providing you the opportunity to meet and hear senior officials such as Mr. Howard Schmidt, White House Cyber Policy Coordinator; Mr. Robert Butler, Deputy Assistant Secretary of Defense for Space and Cyber Policy; Major General Richard Webber, Commander, 24th Air Force; and Major General Bradley Heithold, Commander, Air Force Intelligence, Surveillance & Reconnaissance Agency. FC11 is co-sponsored by the Air Force ISR Agency and 24th Air Force. For additional Information, go to our website at www.fiestacrow.com S A N FIE STACROW A N T O N ASSOC BI LLY A I T I ON 11 T X I O, O M I TCH E LL F OLD CROW CHAPTE R S