MENU

Deception Jamming (Deception Techniques in Radar ECM)

Written By Massimo Annulli
559Deception Jamming (Deception Techniques in Radar ECM)

The deception action consists in the transmission of signal as similar as possible to the original source.
These techniques are coherent and based on the reception and re-transmission of the signal coming from the radar with additional modulations (frequency, time) superimposed (they are DRFM based).
The resultant waveform is coherent and naturally matched with the radar receiver that will not be able to discriminate it from the real echo.
Its intensity must be sufficient to overwhelm the radar target echo and to “deceive” the radar receiver in order to synchronize it with the “false” transmitter with no evidence of the replacement, at waveform level.
The deception is mainly a coherent technique, whose waveform is generated by a DRFM (Digital radio Frequency memory), that consists in:
a. Receiving and storing (in a digital memory) the samples of the radar signal (the storage can be maintained for a long time without loss of information).
b. Retrieving the stored signal after the programmed time, elaborating it with superimposition of modulation (frequency, phase, etc…) and
c. Retransmitting the manipulated signal towards the radar receiver
In case of non-coherent deception technique, points a. and b. above are replaced by the direct synthesis of the carrier frequency of the jamming/deception signal.
Domains of application of deception techniques are relevant to Range, Doppler, Amplitude, and Angle:

Range Domain: Range Gate Pull Off (RGPO), Range Gate Pull In (RGPI),
Doppler Domain: Velocity Gate Pull Off/In (VGPO/I)
Range/Doppler: Coordinated RVGPO
Multiple False Targets (MFT):
◦ Range: Multiple RGPO/I
◦ Doppler: Multiple Doppler False Targets (MDFT)
◦ Range/Doppler: Multiple Range Doppler False Targets (MRDFT), Coordinated RVGPO
◦ Spoofing (coherent or not-coherent false targets)
Amplitude Domain: On Off (or swept amplitude modulation), Count Down
Angle Domain: Inverse Gain, Beam Scan Modulation (Fixed or Swept Poke up gate), Cross Eye , Cross Pol

 

A good example of deception, used both in defensive and offensive EA, is given by the combination of some of the above-mentioned techniques that generates a number of false targets surrounding the real one/ones, made by a synchronized mix of MDFT with coordinated Multiple RGPO/I

The purpose of this combined technique is to engage the radar receiver and processing resources with a number of “credible” false signals to mask the platform to be protected (Defensive Electronic Attack, Figure 1) or to create a “free” Electro Magnetic corridor for the intruder attack package (Offensive Electronic Attack, figure 2).

 

 

 

From the same Author
exagon-bg

Swept Noise (Radar)

READ MORE

exagon-bg

Chaffs

READ MORE

exagon-bg

Self-Protection for submarines

READ MORE

exagon-bg

Communication Electronic Attack

READ MORE

exagon-bg

Space EW

READ MORE

exagon-bg

Velocity Gate Pull-Off

READ MORE

exagon-bg

Offensive Electronic Attack

READ MORE

exagon-bg

Amplitude Modulation in RECM techniques

READ MORE

exagon-bg

Cross-eye

READ MORE

exagon-bg

Radar Electronic Countermeasures Techniques

READ MORE

exagon-bg

Radar Electronic Countermeasures in Self Protection task

READ MORE

exagon-bg

Self Protection Suite

READ MORE

exagon-bg

Stand-Off Jammer Task

READ MORE

exagon-bg

Noise Jamming (Radar)

READ MORE

exagon-bg

Cover Pulse (Radar)

READ MORE

exagon-bg

Radar Electronic CounterMeasures in Stand-in Jammer Task

READ MORE

exagon-bg

Radar Electronic CounterMeasures in Escort Jammer Task

READ MORE

exagon-bg

Threat Reaction

READ MORE

exagon-bg

Self-Protection Task for Surface Ships

READ MORE

exagon-bg

Inverse Gain

READ MORE

exagon-bg

Self-Protection Task (airborne)

READ MORE

exagon-bg

EWC4

READ MORE

exagon-bg

Radar Electronic Attack

READ MORE

exagon-bg

Repeater Jamming

READ MORE

exagon-bg

Defensive Electronic Attack

READ MORE

exagon-bg

Escort Jammer Task

READ MORE

exagon-bg

Radar Electronic Countermeasures in Stand-Off Task (Stand-Off-Jammer)

READ MORE

exagon-bg

Range Gate Pull-Off (RangeDeception)

READ MORE

exagon-bg

Swept Amplitude Modulation (SAM)

READ MORE

exagon-bg

Signal/Data Processing Deception

READ MORE

exagon-bg

Deception Jamming (Deception Techniques in Radar ECM)

READ MORE

exagon-bg

Electronic Protection (EP)

READ MORE

exagon-bg

Self-Protection task (maritime)

READ MORE

exagon-bg

EW Command & Control EWC2

READ MORE

exagon-bg

Counter UAS/UAV

READ MORE

exagon-bg

Barrage Noise

READ MORE

exagon-bg

Self-Protection Task in Maritime Aviation Environment

READ MORE

exagon-bg

Spot Noise

READ MORE

exagon-bg

Angle Deception

READ MORE

exagon-bg

Spoofing in Radar ECM

READ MORE

exagon-bg

Stand-In Jammer Task

READ MORE

exagon-bg

Anti-Monopulse techniques - Cross-polarization

READ MORE