Featured Post

Ultra violet

UV is a form of radiation generated by atomic transitions in chemical reactions such as those present in the Sun and in man-made equipment s...

Thursday, December 10, 2009

Electronic Warfare Activities



EW supports all types of military activity across the spectrum of conflict. It is used: to control the EM spectrum to ensure provision, protection, exploitation and attack of Command and Control (C2) and other battlefield systems, in platform, force or area protection, in Intelligence, Surveillance, Target Acquisition and Reconnaissance (ISTAR), for defensive and offensive actions and in support of other war fighting capabilities and strategies. EW relies on a combination of technical capabilities and is comprised of the following 3 sub-components that can each be used in isolation:
• Electronic Warfare Support Measure (ESM)
• Electronic Countermeasure (ECM)
• Electronic Protective Measures (EPM)
The ability to dominate the EM spectrum is an increasingly critical factor in every type and level of military operations; “Electronic Combat” is now a widely recognised component of any modern force structure.
Besides providing an immediate threat recognition capability, EW also allows the opportunity to determine the adversary’s EOB. Along with other sources of intelligence, EW’s mapping of the EOB can provide accurate information on the adversary’s dispositions and strengths. This vital information can be exploited quickly to neutralise the adversary’s C3 and Air Defence capability early in the campaign. This can be described as EW being used offensively and aggressively. EW can also be used offensively but less aggressively to interfere with or deny the adversary’s use of the EM spectrum. These activities can be useful during Peace Support operations or when more aggressive actions are politically or militarily unacceptable. Below are EW activities, offensive and defensive, that are non-aggressive in nature:
• Monitoring the EM spectrum for presence of the adversary
• Determining the adversary’s strengths and dispositions
• Providing warning of adversary’s intentions
• Prove the adversary’s vulnerabilities to EW
• Deceive and disrupt the adversary’s C3 capability
• Protect own or friendly use of the EM spectrum
• Prove or disprove compliance with UN resolutions
Additionally, the adversary will no doubt be conducting its own EW operations to search, intercept, locate, identify, target and disrupt own or friendly use of the EM spectrum. It is important therefore that measures are taken to protect and maintain own or friendly use of the EM spectrum.

No comments:

Post a Comment