SlideShare a Scribd company logo
INTRODUCTION
Action involving use of the electromagnetic spectrum
Three main divisions :
Electronic Attack (EA)
Electronic Protection (EP)
Electronic Warfare Support (ES)
ELECTRONIC ATTACK (EA)
Promote Uncertainty
Use of active and passive energy to
“attack “
Four Classes of EA
 Jamming
 Modifiers
 Radar-absorbing materials (RAM)
 Physical Destruction
NON-DESTRUCTIVE EA
DENIAL:
Overload opposition’s receiver to deny its
use by the enemy by JAMMING, CHAFF and
FLARES
DECEPTION:
Create false image or change image’s
characteristics on a radar display. Misleads or
“spoofs” by using repeaters, transponders, chaff-
disguise, radar decoys, blip enhancers and radar
cross section (RCS) modification
NOISE JAMMING
Deliberate impairing of enemy’s devices
radiation, re-radiation, or reflection of
electromagnetic energy
TGT Freq
True Noise
Ideal Jammer
Actual Spot
Jammer
CHAFF CORRIDORS
FLARES (ACTIVE)
CHAFF FALSE
TARGETS
Real Target
MULTIPLE FALSE
TARGETS
STROBES COVER PULSE JAMMING
X
“Reactive Jamming”
DECOYS
VELOCITY GATE PULL OFF
(VGPO)
Target Return
Velocity Gate
Gate Pull-Off
DESTRUCTIVE EA
Anti-Radiation Missiles
 SLAM
 HARM
 Sidewinder
Directed Energy
SLAMER
(Stand-off Land Attack Missile-
Expanded Response)
HARM
(HIGH-SPEED ANTI RADIATION
MISSILE)
SIDEWINGER
ELECTRONIC PROTECTION
(EP)
 Protection of friendly combat capability
against undesirable effect of friendly or enemy
employed EW
Types
 Passive EW
 Active EW
EP
Three ways to defend from enemy EW
 Modify radar
o Make it more complex
o Make it harder to jam
 Modify the Medium
o Chaff
o Torch
 Modify the platform
EP FACTORS
BURNTHROUGH:
Increase signal strength to overpower
jammer noise (ECCM)
Emission Control (EMCON)
Alpha
Bravo
Charlie
Delta
Operator Recognition Training
JAMMING EFFECTIVENESS
Match the victim radar’s RF
Be continuous
Have sufficient power
METHODS TO DEFEAT DIRECT
THREAT JAMMING
Frequency Techniques
 RF Change
 RF Diversity
 RF Agility
 Diplexing
Variable PRF
ELECTRONIC WARFARE
SUPPORT (ES)
 Passive surveillance of the EM spectrum
Detection
Tracking
Recognition
Targeting
Warning
Destruction
Avoidance
PASSIVE DETECTION
 RADAR
 IFF
 TACAN
 JAMMING
ES
(PASSIVE SURVEILLANCE)
ELINT : Electronic Intelligence
COMINT : Communications Intelligence
ES
(RECEIVER DESIGN
REQUIREMENTS)
Wide spectrum surveillance
Wide dynamic range
Unwanted signal rejection
Angle-of-Arrival measurement
Signal Analysis capability
Real-Time Display
Recording System
• SLQ-32 “Sidekick”
– On all combatants
– Radar warning, detection and jamming
– Uses internal library to auto detect/categorize
• Infrared Flares
– On all combatants
• Chaff
– On all combatants

More Related Content

What's hot

Electronic Warfare for the Republic of Singapore Air Force
Electronic Warfare for the Republic of Singapore Air ForceElectronic Warfare for the Republic of Singapore Air Force
Electronic Warfare for the Republic of Singapore Air Force
TBSS Group
 
Eccm in radar
Eccm in radarEccm in radar
Eccm in radar
Ho Son
 
Radar fundamentals
Radar fundamentalsRadar fundamentals
Radar fundamentals
Ali Sufyan
 
radar-principles
radar-principlesradar-principles
radar-principles
jhcid
 
Avionics
AvionicsAvionics
Avionics
Brightlin3
 
Electronic Warfare good.ppt
Electronic Warfare good.pptElectronic Warfare good.ppt
Electronic Warfare good.ppt
NadyaShevchenko
 
Unmanned aerial vehicles
Unmanned aerial vehiclesUnmanned aerial vehicles
Unmanned aerial vehicles
Shahnawaz Alam
 
PPT on Directed Energy Weapons
PPT on Directed Energy WeaponsPPT on Directed Energy Weapons
PPT on Directed Energy Weapons
Vishal Bait
 
PPT ON GUIDED MISSILES
PPT ON GUIDED MISSILESPPT ON GUIDED MISSILES
PPT ON GUIDED MISSILES
Sneha Jha
 
Radar Presentation
Radar PresentationRadar Presentation
Radar Presentation
AIM iTech
 
Study of Radar System
Study of Radar System Study of Radar System
Study of Radar System
Atul Sharma
 
Role of Electronics in Defence
Role of Electronics in Defence Role of Electronics in Defence
Role of Electronics in Defence
Aman Deep
 
Guided missile
Guided missileGuided missile
Guided missile
Kanhaiya Kumar
 
Radar Basics
Radar BasicsRadar Basics
Radar Basics
Aziz Zoaib
 
Electronic Warfare Threat Modeling and Simulation
Electronic Warfare Threat Modeling and Simulation Electronic Warfare Threat Modeling and Simulation
Electronic Warfare Threat Modeling and Simulation
Wesley Comal
 
UNMANNED AERIAL VEHICLE
UNMANNED AERIAL VEHICLEUNMANNED AERIAL VEHICLE
UNMANNED AERIAL VEHICLE
Thirumal Aero
 
Self Learning Anti Drone System
Self Learning Anti Drone SystemSelf Learning Anti Drone System
Self Learning Anti Drone System
yovist taufan
 
Airbone Radar Applications by Wg Cdr Anupam Tiwari
Airbone Radar Applications by Wg Cdr Anupam TiwariAirbone Radar Applications by Wg Cdr Anupam Tiwari
Airbone Radar Applications by Wg Cdr Anupam Tiwari
anupamtiwari1972
 

What's hot (20)

Electronic Warfare for the Republic of Singapore Air Force
Electronic Warfare for the Republic of Singapore Air ForceElectronic Warfare for the Republic of Singapore Air Force
Electronic Warfare for the Republic of Singapore Air Force
 
Eccm in radar
Eccm in radarEccm in radar
Eccm in radar
 
Radar fundamentals
Radar fundamentalsRadar fundamentals
Radar fundamentals
 
radar-principles
radar-principlesradar-principles
radar-principles
 
Avionics
AvionicsAvionics
Avionics
 
Electronic Warfare good.ppt
Electronic Warfare good.pptElectronic Warfare good.ppt
Electronic Warfare good.ppt
 
Unmanned aerial vehicles
Unmanned aerial vehiclesUnmanned aerial vehicles
Unmanned aerial vehicles
 
PPT on Directed Energy Weapons
PPT on Directed Energy WeaponsPPT on Directed Energy Weapons
PPT on Directed Energy Weapons
 
PPT ON GUIDED MISSILES
PPT ON GUIDED MISSILESPPT ON GUIDED MISSILES
PPT ON GUIDED MISSILES
 
Radar Presentation
Radar PresentationRadar Presentation
Radar Presentation
 
Study of Radar System
Study of Radar System Study of Radar System
Study of Radar System
 
Role of Electronics in Defence
Role of Electronics in Defence Role of Electronics in Defence
Role of Electronics in Defence
 
Guided missile
Guided missileGuided missile
Guided missile
 
Guided missiles
Guided missilesGuided missiles
Guided missiles
 
Radar Basics
Radar BasicsRadar Basics
Radar Basics
 
Electronic Warfare Threat Modeling and Simulation
Electronic Warfare Threat Modeling and Simulation Electronic Warfare Threat Modeling and Simulation
Electronic Warfare Threat Modeling and Simulation
 
UNMANNED AERIAL VEHICLE
UNMANNED AERIAL VEHICLEUNMANNED AERIAL VEHICLE
UNMANNED AERIAL VEHICLE
 
Self Learning Anti Drone System
Self Learning Anti Drone SystemSelf Learning Anti Drone System
Self Learning Anti Drone System
 
drone
dronedrone
drone
 
Airbone Radar Applications by Wg Cdr Anupam Tiwari
Airbone Radar Applications by Wg Cdr Anupam TiwariAirbone Radar Applications by Wg Cdr Anupam Tiwari
Airbone Radar Applications by Wg Cdr Anupam Tiwari
 

Recently uploaded

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

Final ew ppt