Featured Post

test270621

Tuesday, December 29, 2009

ESM Characteristics and Activities


The following are the key characteristics of ESM:
• It is used only during crisis and war. During peacetime, EW and ESM will interact with SIGINT and benefit from its product, in particular building of databases.

• It is one of the few tactical information gathering systems which has the potential to provide cover to the limit of the Force Commander’s area of interest
• It provides all weather, day/night, long-range information gathering systems at the operational and tactical level monitoring activity in the EM environment
• It exploits an adversary’s EM emissions and can provide information on the adversary’s capabilities and intentions
• It is offensive and passive, but be aware that its C2 systems can produce a unique signature that can be exploited by adversary EW
• It is a non-intrusive method of signals collection

1.8.7. ESM Activities

During the initial stages of a crisis or during preparations for war, EW efforts are stepped-up in an effort to improve knowledge and readiness. In this respect ESM activities will increase in tempo and focus. The immediate threat will become the priority. The following activities, therefore, usually take place:
• Individual nations, if on a Combined operation, may put increased emphasis on updating the technical parameters of all communications and non-communications systems in their area of interest.
• Creation of own and friendly EOBs to ensure interoperability of systems and reduce potential for fratricide. The Electronic Warfare Co-ordination Cell (EWCC) must be kept informed of friendly EOBs, specific equipment parameters and changes made. Own and friendly EOB information will be correlated with known adversary EOBs to create a consolidated Area of Operations (AO) EOB.
• Development and production of Standard Operating Procedures (SOP), Rules of Engagement (ROE), and any specific “Actions On” for the operation. For Combined operations, higher level Memorandums of Understanding and Agreement will provide the mechanism to exchange nationally held data.


Picture from http://www.cotsjournalonline.com/

No comments:

Post a Comment