Page 169 - Radar Technology Encyclopedia
P. 169

159   ECM, deception                                                           ECM, range measurement



           the seeker to home on the jammer-illuminated patch on the  Offboard ECM systems are designed to be used remotely
           earth’s surface rather than on the jammer itself.    from the defended  platform (e.g., airborne or naval plat-
               Both blinking and terrain bounce techniques can be  forms). The main representatives of this systems are decoys
           implemented in either repeater jammer or noise jammer con-  (active and passive) and chaff. SAL
           figurations. (See also JAMMING, deception.) PCH, SAL  Ref.: Neri (1991), pp. 399–411.
           Ref.: Schleher (1986), pp. 138, 145–160; Skolnik (1990), p. 9.5.
                                                                Onboard ECM systems  are ECM devices within the
           Downlink ECM is used against satellites, aircraft, and mis-  defended platform. Typically, they are active systems: noise
           sile-borne radars that have separate, onboard systems  to  and deception jammers. Sometimes various means for RCS
           “downlink” target  information  or  other radar sensor data,  reduction are classified as passive ingredients of onboard
           such as platform position and radar mapping data, from the  ECM systems. SAL
           radar acquisition platform to a ground radar or data process-  Ref.: Neri (1991), pp. 338–364.
           ing center. Downlink ECM is directed at disrupting this line  Passive ECM refers to electronic countermeasures involving
           of communication.                                    devices reflecting electromagnetic energy in such a manner
               In the interest of efficiency as well as security, most of  that the reradiated signal competes with true target return to
           the waveforms used by downlink transmitters are modulated  conceal real reflection. A typical example of passive ECM is
           in either time, frequency, phase, amplitude, or combinations  chaff. SAL
           thereof. Encryption  algorithms may be superimposed for
                                                                Ref.: Barton (1991), p. 12-8; Chrzanowski (1990), p. 8.
           added security. In the absence of detailed knowledge of the
                                                                Range-measurement ECM provides interfering signals, the
           downlinked signal coding, attempts to interfere with the
                                                                main goal of which is disrupting the measurement of time of
           downlink are mostly restricted to the use of stand-off noise
                                                                arrival to determine target range. Typically, it may be imple-
           jamming.
                                                                mented in two ways. First is to cover or suppress echo return
               Downlink jamming is made more difficult still, due to the
                                                                before it can be detected in radar receiver. Noise jamming is
           one-way transmission path of the downlink, and the usually
                                                                an appropriate technique for this purpose; only the high radi-
           high power  transmitters employed  by downlink  systems.
                                                                ated power is required, especially  if frequency agility is
           Downlink transmission systems generally employ fairly wide
                                                                employed in victim radar. The second is to confuse a radar as
           beamwidth antennas, but even coarse directivity can pose sig-
                                                                to the true location of the target. This can be implemented by
           nificant problems for a noise jammer, forcing it, in many cir-
                                                                use of deception jamming. In this case false targets (passive
           cumstances (e.g., a missile downlink) to jam through the
                                                                decoys) presenting many radar blips with different ranges and
           downlink antenna sidelobes. Yet another complication for the
                                                                range-gate pull-off are the effective measures.
           missile downlink jammer occurs when the downlink is used
                                                                    Range  gate pull-off (RGPO)  is an  range-measurement
           only infrequently, i.e., has a low duty cycle and so is vulnera-
                                                                ECM technique in  which a  repeater captures the tracking
           ble only for a small portion of the total missile flight time.
                                                                range gate and introduces delay or advance to move the gate
           (See also JAMMING, downlink.) PCH
                                                                away from the target echo. A typical RGPO cycle is shown in
           ECM (range) equation (see RANGE EQUATION).           Fig. E5. In the first phase of the cycle, the repeater pulse is
           Escort ECM is the “ECM tactic in which the jamming plat-
                                                                        J/S
           form accompanies the strike vehicle and jams radars to pro-
           tect the strike vehicles,”  This tactic  is  applied to aircraft  10
           combat operations.  It is generally used  when the strike air-
                                                                                                          t
           craft has no enough available power or payload for self-pro-   0
           tection. Its effectiveness usually is greater than for stand-off  1st phase  2nd phase  3rd phase
                                                                         t
           ECM due to its closer proximity to the victim system. SAL     d
           Ref.: Schleher (1986), p. 13; Skolnik (1990), p. 9.6.         t D
           Expendable ECM is “deployed once for a limited time off-
                                                                                                          t
           board the platform which they are designed to protect.” This
           technique is typically divided into active and passive expend-
           able ECM systems. First usually are active decoys (miniature
                                                                  Figure E5 Range gate pull-off operation.
           jammers),  and the second type  is primarily  represented by
           passive decoys and  chaff.  To be  cost  effective, expendable  introduced and raised smoothly to a level sufficient to sup-
           ECM systems must be  relatively cheap.  Active expendable  press the target echo pulse (without creating transients that
           systems are usually more expensive than passive ones, and  might disclose the presence of the ECM). In the second phase
           they tend to be used where passive devices are not effective.  the repeater pulse is delayed or advanced to pull the gate off
           SAL                                                  the target echo. Only delay is possible in cases of PRF stagger
           Ref.: Schleher (1986), p. 178.                       or carrier frequency agile radars, except that a linear FM
   164   165   166   167   168   169   170   171   172   173   174