MENU

Radar Electronic Countermeasures Techniques

Written By Massimo Annulli
729Radar Electronic Countermeasures Techniques

Electronic countermeasures are used effectively to protect platforms such as aircraft and naval vessels.
RECM systems can work in different ways, for example creating electronically false targets, or blinding the platform to be protected from the view of enemy radars.

A possible classification of electromagnetic actions (Electronic Counter Measures) can be defined according to their main peculiarity:

  • Jamming: These techniques are non-coherent and based on noise Frequency Modulation (FM) of the carrier.
    The jamming waveform is created by a random electronic noise that modulates the carrier in order to appear at the Radar receiver as background noise to masking the desired radar echo.
    The jamming waveforms can be matched to the radar BW (Spot Noise) or with a very wide bandwidth (Barrage Noise, often applied to counter frequency agile radars).
    An additional sweeping modulation (with triangular, sawtooth, Gaussian law) in the frequency domain can be superimposed.
    The waveforms can be CW (Continuous Wave) or pulsed (noise cover pulse).

Deception: The deception action consists in the transmission of signal as similar as possible to the original source.
These techniques are mainly coherent and based on the reception and re-transmission of the signal coming from the radar with additional modulations (frequency, time) superimposed (they are DRFM based).
The resultant waveform is coherent and naturally matched with the radar receiver that will not be able to discriminate it from the real echo.
Its intensity must be sufficient to overwhelm the transceiver and to “deceive” the receiver for synchronizing with the “false” transmitter with no evidence of the replacement, at waveform level.
In addition, cases of non-coherent deception techniques are contemplated (such as spoofing); in these cases, the replica of the received signal made by the DRFM is replaced by the direct synthesis of the carrier frequency of the jamming/deception signal.

 

Figure 1: JAMMING: Continuous Spot Noise

The effectiveness of the RECM depends on several factors:

• Distance (range) from the victim Radar: affected parameters:
◦ J/S, power relationship between jammer and echo: radar echo, at the radar receiver, will have a two-way propagation while the jammer will have a one-way propagation.

This means:
▪ a very big advantage in case of SIJ and some cases of EJ (the jammer is very closer with respect to the echo);
▪ an advantage in case of SPS and EJ (the jammer is almost at the same distance than the echo);
▪ a disadvantage in case of SOJ (the jammer is very far with respect to the echo);

◦ Same geometrical considerations apply to time domain:
▪ when the jammer is closer to the radar with respect to the defended platform/platforms (SIJ and some cases of EJ) totally coherent (follower) techniques can be applied (the jammer is able to receive, manipulate and re-transmit the signal before the arrival of the echo);
▪ when the jammer at the same distance from the radar with respect to the defended platform/platforms (SPJ and most of the cases of EJ) totally coherent (follower) techniques can be applied only for certain categories of radars (fixed frequency radars or agile radars with large PW’s), noise non-coherent techniques are applied in all the other cases ;
▪ when the jammer is at a longer distance from the radar with respect to the defended platform/platforms (SOJ) noise non-coherent techniques are applied;
• Level of the generated signal (affected parameter: J/S).
• Stealth capability of the defended platform/platforms: this will affect the RCS or Radar Cross Section and consequently the strength of the radar echo (affected parameter: J/S).
• Geographical constraints (obstacles, terrain);
• Duration of the service under threat;
• Intrinsic Electronic Protection measures of the attacked Radars.

From the same Author
exagon-bg

EWC4

READ MORE

exagon-bg

Radar Electronic CounterMeasures in Stand-in Jammer Task

READ MORE

exagon-bg

Stand-Off Jammer Task

READ MORE

exagon-bg

Self Protection Suite

READ MORE

exagon-bg

Spoofing in Radar ECM

READ MORE

exagon-bg

Deception Jamming (Deception Techniques in Radar ECM)

READ MORE

exagon-bg

Spot Noise

READ MORE

exagon-bg

Range Gate Pull-Off (RangeDeception)

READ MORE

exagon-bg

Signal/Data Processing Deception

READ MORE

exagon-bg

Radar Electronic Countermeasures in Stand-Off Task (Stand-Off-Jammer)

READ MORE

exagon-bg

Electronic Protection (EP)

READ MORE

exagon-bg

Cover Pulse (Radar)

READ MORE

exagon-bg

Inverse Gain

READ MORE

exagon-bg

EW Command & Control EWC2

READ MORE

exagon-bg

Radar Electronic Countermeasures in Self Protection task

READ MORE

exagon-bg

Offensive Electronic Attack

READ MORE

exagon-bg

Anti-Monopulse techniques - Cross-polarization

READ MORE

exagon-bg

Chaffs

READ MORE

exagon-bg

Radar Electronic CounterMeasures in Escort Jammer Task

READ MORE

exagon-bg

Repeater Jamming

READ MORE

exagon-bg

Self-Protection Task for Surface Ships

READ MORE

exagon-bg

Stand-In Jammer Task

READ MORE

exagon-bg

Swept Amplitude Modulation (SAM)

READ MORE

exagon-bg

Cross-eye

READ MORE

exagon-bg

Velocity Gate Pull-Off

READ MORE

exagon-bg

Self-Protection task (maritime)

READ MORE

exagon-bg

Communication Electronic Attack

READ MORE

exagon-bg

Defensive Electronic Attack

READ MORE

exagon-bg

Self-Protection Task in Maritime Aviation Environment

READ MORE

exagon-bg

Escort Jammer Task

READ MORE

exagon-bg

Threat Reaction

READ MORE

exagon-bg

Angle Deception

READ MORE

exagon-bg

Amplitude Modulation in RECM techniques

READ MORE

exagon-bg

Self-Protection for submarines

READ MORE

exagon-bg

Radar Electronic Countermeasures Techniques

READ MORE

exagon-bg

Counter UAS/UAV

READ MORE

exagon-bg

Space EW

READ MORE

exagon-bg

Self-Protection Task (airborne)

READ MORE

exagon-bg

Noise Jamming (Radar)

READ MORE

exagon-bg

Swept Noise (Radar)

READ MORE

exagon-bg

Barrage Noise

READ MORE

exagon-bg

Radar Electronic Attack

READ MORE