Professional Documents
Culture Documents
A 390666
A 390666
0 0 0 0 I
z 0
Contract or Grant Number Program Element Number Project Number Task Number Work Unit Number
Performing Organization Name(s) and Address(es) ASC/ENAD Wright-Patterson AFB, OH Sponsoring/Monitoring Agency Name(s) and Address(es)
Performing Organization Number(s) Monitoring Agency Acronym Monitoring Agency Report Number(s)
Distribution/Availability Statement Approved for public release, distribution unlimited Supplementary Notes Abstract Subject Terms "IATAC COLLECTION" Document Classification unclassified Classification of Abstract unclassified Number of Pages 77 Classification of SF298 unclassified Limitation of Abstract unlimited
Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188), Washington, DC 20503
Briefing
5. FUNDING NUMBERS
6. AUTHOR(S)
John E. Geise
IATAC Information Assurance Technology Analysis Center 3190 Fairview Park Drive Falls Church VA 22042
9. SPONSORING / MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSORING / MONITORING AGENCY REPORT NUMBER
Defense Technical Information Center DTIC-IA 8725 John J. Kingman Rd, Suite 944 Ft. Belvoir, VA 22060
11. SUPPLEMENTARY NOTES
The goal of this session is to provide a comprehensive look at functional areas of ECM system and trade-off considerations, i.e. apertures, receivers/processors, counter/measurer techniques generators, and high power sources. Also to a provide comprehensive look at techniques, i.e. generators, system architectures, interaction between jamming and radar processing, trades & drivers, and processes/tools
EW
17. SECURITY CLASSIFICATION OF REPORT 18. SECURITY CLASSIFICATION OF THIS PAGE 19. SECURITY CLASSIFICATION OF ABSTRACT 20. LIMITATION OF ABSTRACT
Unclassified
UNCLASSIFIED
UNCLASSIFIED
None
INTRODUCTION -1
GOAL, OFSESSZON
. PROVIDE COMPREHENSIVE LOOK AT FUNCTIONAL AREAS OF ECM SYSTEM AND TRADE-OFF CONSIDERATIONS
l l l l
GOALOFTOPZC
l
SYSTEM ARCHITECTURES INTERACTION BETWEEN JAMMING AND RADAR PROCESSING TRADES & DRIVERS PROCESSES/TOOLS
--------------T
: , ELECTRONIC COMBAT ;
I,,,, ---K-ai--7---J
AIRCRAFT OBSERVABLES
ENVIRONMENT
FOG OF WAR
II
VULNERABILITY
pi-G&
AIR CREW
EWRESPONSETOENEMYAIRDEFENSE
-1 '
THREATIADS
h 1
ECFORCEELEMENTS
SEARCH/EARLY WARNING +
(Initial Detection)
4/
ACQUSITION/GCI
(Target Assignment/Initial Track) *
/I
TARGET ENGAGEMENT
(Measure/Predict Target Position) 4 Ii
SURVIVABILITY FACTORS
JA2M TO SIGNM RATIO (J/S) - SELF SCREENING
l
RATIOOFJAMMERPOWERTOTARGETRETURNPOWER
4n;R2 . (J. . B,
1 BJ
TGT
for B, > BT
WHERE: PJ = Jammer TX Power G, = Jammer TX Antenna Gain PT = Radar TX Power GT = Radar Antenna Gain R = Range - Jammer to Radar CL= Target Radar Cross Section BT = Radar Bandwidth B, = Jammer Bandwidth
AGENDA
Receive Antenna
FOV/Beamwidth Polarization Gain DF
MODULATOR
Transmit Antenna
FOVlBeamwidth Polarization Gain DF
Receiver/Processor Environment Sorting Parameter Measurement (F, PRI, PW, Amp, Pol) PRI Tracking Frequency Tracking Threat ID/Prioritization Parameter Prediction
Transmitter
High Power Multiple Signal/ Power Sharing
CONTROL COMPUTER
Modulator
Amplitude Freq/Phase Polarization
Memory
Technique Selection Time Delay/Advance Coherent Signal Replication
Signal Source
Receiver Support (e.g., LO) Threat Frequency Replication
-1
CONSTANT POWER
.POWERSHARINGvsMULTIPLESIGNALS l TxOPERATESATORNEARSATURATIONREGARDLESSOFINPUT SIGNALLEVEL l ELECTRONICGAINMAYBEGREATERTHANISOLATION .TYPICALLY,TxMUSTSHUTDOWNFORRxTOSEETHREAT .J/SDECREASESWITHRANGE(-6dB/OCTAVE)
\ \ \ \ \ \
ANTENNA ISOLATION - MUST SHUT OFF TX ON RECEIVE LOOKTHROUGH 0 ENOUGH TO ALLOW RECEIVERS TO ACQUIRE/MAINTAIN TRACK l SMALL ENOUGH TO PRECLUDE JAMMING DEGRADATION
CHOP *TIMING
l
SPECTRAL SPREADING
SYSTEM LOSSES (CABLES, COUPLERS, ETC.) WILL DEGRADE RANGE AND J/S DIFFICULT TO ACHIEVE/MAINTAIN COHERENCY
AGENDA
SURVIVABILITYFACI'ORS ECMSYSTEMARCHITECTSJRES RADARCOUNTERMEASURESTECHNIQUES *RANGE 4ELOCITY .ANGLE MISSILECOUNTERMEASURES COUNTERMEASURESWRAPUP ECMANALYSISTOOLSANDPROCESSES
BASIC RADAR
LAY - RANGE
PROCESSES REFLECTION
RADARCOUNTERMEASURES
NON-COHERENT-PULSE RADAR CIURACTERLS
l
RANGE TRACKING PHASE INFORMATION NOT PRESERVED HIGH PEAK POWER l GROUND BASED (- 120 dBm) l AIRBORNE (- 100 dBm) LOW DUTY CYCLE (< 1%) l MAY HAVE NARROW PW (c 1 USEC) l LOW PRF (<SK PPS) INSTANTANEOUS BANDWIDTH (MEGAHERTZ)
RADARCOUNTERMEASURES
RANGE TECHNIQUES VS PULSE RALMR
l
BROADBAND NOISE .. BARRAGE (BARR) l SWEPT SPOT (SSN) POWER MANAGED NOISE l RANGE GATED NOISE (RGN) PULSE REPEATER l RANGE GATE PULL OFF (RGPO) .
~
~
POWER MANAGED TRANSPONDER l RANGE GATE PULL IN & OUT (RANRAP) l RANGE FALSE TARGETS (RFT)
Early Gate
I
Amplitude Detector
Early Gate
Range Output
L
t
Late Gate
Gate Generator
Late Gate
Amplitude Detector
AMP
THREAT RANGE
FREOUENCY OR TIME
FREOUENCY OR TIME
FREOUENCY OR TIME
AMPLITUDE
AMPLITUDE
AMPLITUDE
AMPLITUDE s a c) 1
m m c
m cn
m Q
W a
I-
IL W (3 2
W v) I
I-
z 0
I
A ml
0 a 0 e
II
cn W 0 z
t a W a W lL
a n
W cn
lJm
0
ob
N N
a LL l
K IL
l
k 0
RADARCOUNTERMEASURES
TRADES & DRIVERS - RANGE TECHNIQUES
l
NOISE FREQUENCY SET ON - ACCURACY & SETTLING TIME BANDwIDTH MATCHING LOOK THROUGH RATE
l l l
REPEATER CONSTANT. GAIN - ISOLATION/GAIN VERSUS TARGET RCS 0 TIME DELAY THROUGH SYSTEM 0 CONSTANT POWER - CHOP RATE/SPECTRAL SPREADING .
l
TRANSPONDER SYSTEM COMPLEXITY SIGNAL SORTING/TRACKING FREQUENCY/TIME SET ON ACCURACY LOOK THROUGH RATE
l l l l
AGENDA
SURVIVABILITYFACTORS ECMSYSTEMARCHITECI'URES RADARCOUNTERMEASURESTECHNIQUES ORANGE *VELOCITY @ANGLE MISSILECOUNTERMEAURES COUNTERMEASURESWRAPUP ECMANALYSIS-TOOLSANDPROCESSES
BASIC RADAR 1
L,_
RECEIVER SIGNAL PROCESSOR
- RANGE
PROCESSES REFLECTION
0 n 0
1
.z.:.:i . , .I.a .%&L -J?~L *
RADARCOUNTERMEASURES
KELOCITY TECHNIQUES VS DOPPLER RADAR
.REPEATER W?LOCITYGATEPULL-OFF(VGP0) l VELOCITYFALSETARGETS(VFI') .TRANSPONDER(DRFMTECHNIQUES)
COMBINEDRANGE/VELOCITYPULL-OFF .RANGE/VELOCITYFALSE'TARGETS(R/VFT)
L 4
co 0 )I v)
bLJ
8 w ----; .
---+
z a g ---.
a
W Ic) a
a EC c)
w - m -
a n a a )I z
a
W W
a
m -
m-m-
L .
----
. .
0
x 0 m I
---
---
-T - .I -1 -1 -iI! -;1
--
CL
u,
a
w c -
w---
I-
c)
PC
0 I I 1 n
L LL
c!s
te
3anulduuv
n z a
COMBINED RGPO/VGPO
TARGET SPEEDS UP, OR TURNS INTO THREAT
i .
c X 5;
AGENDA
SURVIVABILITYFACI'ORS ECMSYSTEMARCHITECTURES RADARCOUNTERMEASURES @RANGE .VELOCITY *ANGLE * MISSILECOUNTERMEASURES . COUNTERMEASURESVVRAPUP ECMANALYSIS-TOOLSANDPROCESSES
BASIC RADAR /
. TRANSMlTlER
i .
RECEIVER
- RANGE
SIGNAL PROCESSOR
PROCESSES REFLECTION
RADARCOUNTERMEASURES
ANGLE TRACHNG CCTEHSTICS
. AZIMUTH/ELEVATION TRACKING IN ADDITION TO RANGE AND/OR VELOCITY
l
UTILIZES ANTENNA BEAM SHAPE FOR ANTENNA POINTING USE RANGE OR DOPPLER (BINS/GATES/CELLS) TO REDUCE NOISE, CLUTTER, JAMMING, INTERFERENCE TO TRACK ONLY SIGNAL SINGLE ANGLE CHANNEL l USES SINGLE ANTENNA BEAM l TARGET POSITION - RETURN @ MAXIMUM AMPLITUDE l SUSCEPTIBLE TO AMPLITUDE MODULATION ECM l ACTIVE/PASSIVE TRACK WHILE SCAN (TWS), CONICAL/SEQUENTIAL SCAN MULTIPLE ANGLE CHANNELS (MONOPULSE) l COMPARES MULTIPLE ANTENNA BEAMS l TARGET POSITION - WHERE ANGLE ERROR IS ZERO l NULLIFIES CONVENTIONAL AM l SUSCEPTIBLE TO MORE SOPHISTICATED TECHNIQUES
IV1EASURMENT
BEAMWIDTH
BEAMWIDTH
e3dB
85* =d
70* 83dB =d
(FOR UN-TAPERED)
SIDELOBES
n
0
V z 0 v
W VI
T
A
SKIN RETURN
TOT
ADD: ECM
RECEIVED SIGNAL
b TIME
), TIME
RWSSNV DKr173 1.2
u m
El
ZHO9
ZHOS
ZHOS
ZH 09
-1
RADARCOUNTERMEASURES '
TRADES & DRMZRS - AMTPLITUDE MODULATION
. TECHNIQUE GENERATOR COMPLEXITY
l
DETECTION & TRACKING SIGNAL AMPLITUDE SCAN RATE & PHASE DEPTH OF MODULATION MONITORING OF SIGNAL AMPLITUDE (FOR JOG DETECT)
l l l l
MODULATION i SCAN FREQUENCY SET-Oh ACCURACY PHASE SET-ON ACCURACY DUTY CYCLE DEPTH OF MODULATION
l l l
FOUR SIMULTANEOUSLY RECEIVE BEAMS. l ANGLE ERRORS DERIVED FROM INSTANTANEOUS BEAM COMPARISON -AZIMUTH ERROR = (A + D) - (B + C) -ELEVATION ERROR = (A + B) - (C + D)> l TARGET BORESIGHTED WHEN AmB=C=D TIME INDEPENDENT
SCANNING RADAR
AMPLITUDE ECM
MODULATION
TIME
AMPLITUDE
MONOPULSE RADAR
MODULATION
AC& ERROR
ANQLE ERROR
ANGLE
ERROR
ANU
ERROR
ERG
gRz
TIME
awu#n om 114
POLARIZATION I
TRANSMITTED POLARIZATION ECM (HORIZONTAL)
7/I
BORESITE
k V
0 u
c R 3 c4 c
X 0 2 0 d W b m * v3
0 0 4
E b4
I
.
CROSS-EYE
-~~-
CROSS-EYE
Rw61CRO Du#lrn 52
W e4 m
I
s u
n w N J
ti 0
\
\ \ \ \ \
Ir, -,
l
RADARCOUNTERMEASURES
TRADE&DRI-WRS-CHAFFANGLEECM
DISPENSE RATE BLOOM RATE/SIZE VELOCITY OF DIPOLES VS DOPPLER TRACKERS EFFECTIVE CROSS SECTION OF CHAFF CLOUD WEATHER AIRCRAFT MANEUVER
AGENDA
SURVIVABILITYFACTORS ECMSYSTEMARCHITECTURES RADARCOUNTERMEASURES *RANGE .VELOCITY @ANGLE e MISSILECOUNTERMEASURES MISSILECOUNTERMEASURES COUNTERMEASURESWRAPUP ECMANALYSIS-TOOLSANDPROCESSES -
MISSILE COUNTERMEASURES
COMWD GUIDED FVlZAPON JMMINGAPPROA
l
. FALSE TARGET POSITION VERSUS TARGET TRACK RADAR (ITR) RANGE - FALSE TARGETS (RFT/RANRAP), MASKING - NOISE ANGLE - ANGLE ERROR - AM, XPOL
l
FALSE MISSILE POSITION VERSUS MISSILE TRACKING RECEIVER RANGE - FALSE RANGE POSITION ANGLE - LINE OF SIGHT WITH TARGET, NOT WITH MISSILE DENY MISSILE TRACK
l l l
COMMAND LINK - (UPLINK) ISSUES INCORRECT FLIGHT COMMANDS TO MISSILE MISSILE FLYS TO WRONG RANGE/ANGLE FOR INTERCEPT
l l
- r
MISSILE COUNTERMEASURES
TRADES & DRIVERS - COMAMVD GUIDED MISSILE (DOWN LINK JMMING)
l
REQUIRES HIGH POWER TO BE EFFECTIVE JAM TO BEACON (J/B) RATIO APRIORI KNOWLEDGE OF BEACON FREQUENCY OR ABILITY TO MEASURE BEACON FREQUENCY
l l
REQUIRES HIGH DUTY CYCLE FROM JAMMER @MULTIPLE ECM PULSES FOR EACH RADAR PULSE TIME/FREQUENCY MULTIPLEXING TO COVER UNCERTAINTY
l
1L-
POINTING DATA
TARGET TRACKER I
w c)
/ / / / /
z 1
0
MISSILE COUNTERMEASURES
TRADES & DRllXRS - TERRAIN BOUNCE MISSILE
l
ATTACKS SEMI-ACTIVE AND ACTIVE MISSILES THREAT CAPABILITY - TWO TARGET PROCESSING/CCM
(J/S) DIRECT
vs
POWER DENSITY DIMISHES WITH ALTITUDE ANTENNA TRADES MAINLOBE GAIN/BEAMWIDTH DEPRESSION ANGLE SIDELOBE SUPPRESSION
l l l
TERRAIN REFLECTIVITY VARIES WITH TERRAIN TYPE DOPPLER SPREAD TIME DELAY
l l l
MISSILE COUNTERMEASURES
TRADES & DR.M?RS - TOWED DECOYMISSILE CM
*THREATCAPABILITY .TWOTARGETPROCESSINGCCM'S *LETHALRADIUS aFUSING *SALVOSHOT dIRCRAFTSIGNATURETOBEPROTECTED *GEOMETRY-ZONESOFNOPROTECTION
l
rl
.QUANTITYTOBECARRIED
I
l
MISSILE COUNTERMEASURES
TRADES&DmRS-REPEATERTOWEDDECOY
SIMPLE ARCHITECTURE LIMITED ELECTRONIC GAIN - DUE TO ISOLATION OF CLOSELY SPACED TRANSMIT AND RECEIVE ANTENNAS DOPPLER MODULATION RESULTS IN SPECTXAL SPREADING & LOSS OF J/S THREAT RANGE RESOLUTION LIMITS TOW LINE LENGTH GEOMETRY DELAY
l l
MISSILE COUNTERMEASURES - r
TRADES & DRI-WRS - TRANSSPONDER TOWED DECOY
l
ELECTRONIC GAIN- HIGHER DUE TO WIDE ANTENNA SEPARATION LONGER TOW LENGTH POSSIBLE GEOMETRY ISSUES REMAIN COMPLEX MODULATIONS POSSIBLE DOPPLER RANGE TECHNIQUES - OVERCOME DELAYS
l l
AGENDA
COUNTERMEASURES-WRAPUP
/ REQUlREMENTSAAlD STRATEGYDERI-WD FROM
l
THREAT ENVIRONMENT IADS - C3 VULNERABILITY SIGNAL DENSITY RADAR CAPABILITIES (RANGE, DOPPLER, ANGLE) MISSILE CAPABILITY (CG, SA, A)
l l l l l l
COUNTERh4EASURES GOALS
l
COUNTERMEASURES-WRAP UP
SYYSTElk4RCHITECTURE
l l
l
l
COHERENCY
COUNTERMEASURES TECHNIQUES
l
dXADAROPERATION&ECCM'S @OPERATOR *
l
AGENDA
-ECANALYSIS-TOOLSANDPROCESSES -1
ECANALYSIS TASK
l
EW ENVIRONMENT - COMPLEX COUNTLESS FACTORS AFFECT EC OUTCOME MULTIPLE TOOLS AVAILABLE FOR EC TECHNIQUE ANALYSIS
I--I
WHICH TOOL DO I CHOOSE TO HELP ANALYZE ECM TECHNIQUES PERFORMANCE? DONT DEFINE THE PROBLEM TO FIT THE TOOL THE TOOL MUST FIT THE PROBLEM
ECANALYSIS-TOOLSANDPROCESSES
FACTORS TO CONSIDER IN TOOL CHOICE
~ UNDERSTAND WHAT IS IMPORTANT TO QUESTION BEING ASKED 0 NOT FEASIBLE TO CAPTURE ALL REAL WORLD VARIABLES IN I A MODEL - ASSUMPTIONS ARE INHERENT - WHAT ARE THEY? CHALLENGE - SELECT & ADEQUATELY TREAT PERTINENT VARIABLES IN THE QUESTION TO BE ANSWERED
l l l
CHECK TO SEE IF IT IS THE RIGHT TOOL MODEL MUST MATCH THE PHYSICS OF THE ISSUE USE HARD THREAT.DATA FOR VARIABLES THAT ARE THREAT SENSITIVE REPRESENTATION OF INTELLIGENCE DATA IN THE TOOL MUST ADEQUATELY SUPPORT ADDRESSING THE CRITICAL ISSUE
l l l
UNDERSTAND THE PEDIGREE OF THE TOOL SA-xx or MiG - zz NAMEPLATE - DOES NOT ENSURE FIDELITY WHAT ASPECTS OF TOOL HAVE HIGH FIDELITY?
l l
CONFIDENCEPROCESS/OUTPUT.S
SCHEMATICS
7
CIRCUIT ANALYSIS
I
I
-1
I I I I
I I I
I I
I I I I I I
I
I
I I
I I I I I
I
I
I
I I I
I
I
I
I I
I
I I I I
I
I
I I
I I
I
I I
I I
I
I
I
I I I
I I I
I I I
\ 6
I
I
I I I I I
I I I
I
I
I I I
-1
3 2.5 2 1.5 t! 2? 1 ii? n 0.5
SYSTEMRESPONSEDATA
Hardware Response (Green) vs. Simulation Response (Blue), Target (Red) 3.5
15 Time(s)
25
30
- r
ECMANALYSIS-TOOLSANDPROCESSES
EC EFFECTIVENESS ASSESSMENTS
l
EC TOOLS DO NOT PROVIDE ANSWERS EC TOOLS PROVIDE INSIGHT TO INFORMED ANALYSTS IF THE TOOL, THE INPUT DATA, AND CONSTRAINTS ARE UNDERSTOOD