Warfare |
---|
Eras
Prehistoric
Ancient Medieval Gunpowder Industrial Modern Battlespace
Attrition warfare
Guerrilla warfare Maneuver warfare Siege Total war Trench warfare Conventional warfare Unconventional warfare Asymmetric warfare Counter-insurgency Network-centric warfare Cold war Proxy war Economic
Grand Operational Logistics
Technology and equipment
Materiel Supply chain management Lists
|
Portal |
Electronic warfare (EW) refers to any action involving the use of the electromagnetic spectrum or directed energy to control the spectrum, attack an enemy, or impede enemy assaults via the spectrum. The purpose of electronic warfare is to deny the opponent the advantage of, and ensure friendly unimpeded access to, the EM spectrum. EW can be applied from air, sea, land, and space by manned and unmanned systems, and can target communication, radar, or other services.[1] EW includes three major subdivisions: Electronic Attack (EA), Electronic Protection (EP), and Electronic warfare Support (ES).
Contents |
Electronic Warfare Support (ES), is the subdivision of EW involving actions tasked by, or under direct control of, an operational commander to search for, intercept, identify, and locate or localize sources of intentional and unintentional radiated electromagnetic (EM) energy for the purpose of immediate threat recognition, targeting, planning, and conduct of future operations.[1]
An overlapping discipline, signals intelligence (SIGINT) is the related process of analyzing and identifying the intercepted frequencies (e.g. as a mobile phone or RADAR). SIGINT is broken into three categories: ELINT, COMINT, and FISINT.
Where these activities are under the control of an operational commander and being applied for the purpose of situational awareness, threat recognition, or EM targeting, they also serve the purpose of Electronic Warfare surveillance (ES).
Electronic attack (EA) or electronic countermeasures (ECM) involves the use of the electromagnetic energy, or anti-radiation weapons to attack personnel, facilities, or equipment with the intent of degrading, neutralizing, or destroying enemy combat capability and is considered a form of fires (see Joint Publication [JP] 3-09, Joint Fire Support).[1]
EA operations can be detected by an adversary due to their active transmissions. Many modern EA techniques are considered to be highly classified. Examples of EA include communications jamming, IADS suppression, DE/LASER attack, expendable decoys (e.g., flares and chaff), and counter radio controlled improvised explosive device (C-RCIED) systems.
Electronic Protection (EP) (previously known as electronic protective measures (EPM) or electronic counter countermeasures (ECCM)) involves actions taken to protect personnel, facilities, and equipment from any effects of friendly or enemy use of the electromagnetic spectrum that degrade, neutralize, or destroy friendly combat capability. Jamming is not part of EP, it is an EA measure.
The use of flare rejection logic on an IR missile to counter an adversary’s use of flares is EP. While defensive EA actions and EP both protect personnel, facilities, capabilities, and equipment, EP protects from the EFFECTS of EA (friendly and/or adversary). Other examples of EP include spread spectrum technologies, use of Joint Restricted Frequency List (JRFL), emissions control (EMCON), and low observability or "stealth".[1]