MENU

Spoofing in Radar ECM

Written By Massimo Annulli
765Spoofing in Radar ECM

Spoofing consists in the generation of a programmed number of false echoes without specific kinematic law with constant or random spacing.
False echo delays are periodically refreshed to avoid the presence of annular (constant range lines) in radar PPI.

Spoofing generation is obtained through repetition of jamming pulses that are obtained from a stored slice of threat signal:
the detection and storage of countered Radar waveform is necessary to jam.

When counteracting a scanning radar, the jamming waveforms are transmitted after lobe acquisition and continues until the radar lobe is lost.
Non-coherent Spoofing, actually synthesized pulse train, can be limited by the lack of synchronization with radar PRI and radiated frequency.

Figure 1: Spoofing effect in a Radar PPI

Spoofing technique needs to generate random delay patterns. If the delay pattern for a maximum number of false echoes is less than the number of Spoofing false echoes, then the basic pattern can be repeated until the programmed number of false echoes is reached.

Figure 2: Spoofing, synthesized pulse train

Spoofing is normally programmed with a high duty cycle to produce a high number of false echoes that, in addition to increasing false detections, can affect the Radar adapted threshold (Radar adapted threshold is optimized for continuous background noise or clutter and real echoes can be masked.

Figure 3: Spoofing, programmed replicas

From the same Author
exagon-bg

Defensive Electronic Attack

READ MORE

exagon-bg

Radar Electronic Attack

READ MORE

exagon-bg

Offensive Electronic Attack

READ MORE

exagon-bg

Deception Jamming (Deception Techniques in Radar ECM)

READ MORE

exagon-bg

Threat Reaction

READ MORE

exagon-bg

Velocity Gate Pull-Off

READ MORE

exagon-bg

Inverse Gain

READ MORE

exagon-bg

Repeater Jamming

READ MORE

exagon-bg

Stand-In Jammer Task

READ MORE

exagon-bg

Signal/Data Processing Deception

READ MORE

exagon-bg

Self-Protection for submarines

READ MORE

exagon-bg

Counter UAS/UAV

READ MORE

exagon-bg

Self-Protection Task for Surface Ships

READ MORE

exagon-bg

Spot Noise

READ MORE

exagon-bg

Radar Electronic Countermeasures in Self Protection task

READ MORE

exagon-bg

Cover Pulse (Radar)

READ MORE

exagon-bg

EW Command & Control EWC2

READ MORE

exagon-bg

Escort Jammer Task

READ MORE

exagon-bg

Space EW

READ MORE

exagon-bg

Swept Amplitude Modulation (SAM)

READ MORE

exagon-bg

Range Gate Pull-Off (RangeDeception)

READ MORE

exagon-bg

Self-Protection Task (airborne)

READ MORE

exagon-bg

Self-Protection task (maritime)

READ MORE

exagon-bg

EWC4

READ MORE

exagon-bg

Angle Deception

READ MORE

exagon-bg

Spoofing in Radar ECM

READ MORE

exagon-bg

Barrage Noise

READ MORE

exagon-bg

Communication Electronic Attack

READ MORE

exagon-bg

Self Protection Suite

READ MORE

exagon-bg

Amplitude Modulation in RECM techniques

READ MORE

exagon-bg

Cross-eye

READ MORE

exagon-bg

Electronic Protection (EP)

READ MORE

exagon-bg

Stand-Off Jammer Task

READ MORE

exagon-bg

Radar Electronic CounterMeasures in Escort Jammer Task

READ MORE

exagon-bg

Self-Protection Task in Maritime Aviation Environment

READ MORE

exagon-bg

Anti-Monopulse techniques - Cross-polarization

READ MORE

exagon-bg

Noise Jamming (Radar)

READ MORE

exagon-bg

Radar Electronic Countermeasures in Stand-Off Task (Stand-Off-Jammer)

READ MORE

exagon-bg

Swept Noise (Radar)

READ MORE

exagon-bg

Radar Electronic Countermeasures Techniques

READ MORE

exagon-bg

Radar Electronic CounterMeasures in Stand-in Jammer Task

READ MORE

exagon-bg

Chaffs

READ MORE