World Library  
Flag as Inappropriate
Email this Article

Electronic warfare

Electronic warfare (EW) is any action involving the use of the electromagnetic spectrum or directed energy to control the spectrum, attack an enemy, or impede enemy assaults via the spectrum. The purpose of electronic warfare is to deny the opponent the advantage of, and ensure friendly unimpeded access to, the EM spectrum. EW can be applied from air, sea, land, and space by manned and unmanned systems, and can target humans, communications, radar, or other assets.[1]


  • The electromagnetic environment 1
    • Electronic warfare applications 1.1
  • Subdivisions 2
    • Electronic attack (EA) 2.1
    • Electronic Protection (EP) 2.2
    • Electronic warfare support (ES) 2.3
    • Multifunctional EW system 2.4
  • See also 3
  • Further reading 4
  • References 5
  • General references 6

The electromagnetic environment

Military operations are executed in an information environment increasingly complicated by the electromagnetic (EM) spectrum. The electromagnetic spectrum portion of the information environment is referred to as the electromagnetic environment (EME). The recognized need for military forces to have unimpeded access to and use of the electromagnetic environment creates vulnerabilities and opportunities for electronic warfare (EW) in support of military operations.[1]

Within the information operations construct, EW is an element of information warfare; more specifically, it is an element of offensive and defensive counterinformation.[2]

NATO has a different and arguably more encompassing and comprehensive approach to EW. A Military Committee conceptual document from 2007 (MCM_0142 Nov 2007 Military Committee Transformation Concept for Future NATO Electronic Warfare) recognised the EME as an operational manoeuvre space and warfighting environment/domain. In NATO, EW is considered to be warfare in the EME. NATO has adopted simplified language which parallel those used in the other warfighting environments like maritime, land and air/space. For example, Electronic Attack is offensive use of EM energy. ED is electronic defence and ES electronic surveillance. The use of the traditional NATO EW measures (ECM, EPM and ESM) has been retained as they contribute to and support EA, ED and ES. Besides EW, other EM operations include ISTAR and SIGINT. Subsequently NATO has issued EW Policy and Doctrine and is addressing the other NATO defence lines of development.

Electronic warfare applications

Electronic warfare is any military action involving the use of the EM spectrum to include directed energy (DE) to control the EM spectrum or to attack an enemy. This is not limited to radio or radar frequencies but includes IR, visible, ultraviolet, and other less used portions of the EM spectrum. This includes self-protection, standoff, and escort jamming, and antiradiation attacks. EW is a specialized tool that enhances many air and space functions at multiple levels of conflict.[2]

The purpose of EW is to deny the opponent an advantage in the EM spectrum and ensure friendly unimpeded access to the EM spectrum portion of the information environment. EW can be applied from air, sea, land, and space by manned and unmanned systems. EW is employed to support military operations involving various levels of detection, denial, deception, disruption, degradation, protection, and destruction.[1]

EW contributes to the success of information operations (IO) by using offensive and defensive tactics and techniques in a variety of combinations to shape, disrupt, and exploit adversarial use of the EM spectrum while protecting friendly freedom of action in that spectrum. Expanding reliance on the EM spectrum increases both the potential and the challenges of EW in information operations. All of the core, supporting, and related information operations capabilities either directly use EW or indirectly benefit from EW.[2]

The principal EW activities have been developed over time to exploit the opportunities and vulnerabilities that are inherent in the physics of EM energy. Activities used in EW include: electro-optical, infrared and radio frequency countermeasures; EM compatibility and deception; communications jamming, radar jamming and anti-jamming; electronic masking, probing, reconnaissance, and intelligence; electronics security; EW reprogramming; emission control; spectrum management; and wartime reserve modes.[1][2]


RAF Menwith Hill, a large ECHELON site in the United Kingdom, and part of the UK-USA Security Agreement

Electronic warfare includes three major subdivisions: electronic attack (EA), electronic protection (EP), and electronic warfare support (ES).[1]

Electronic attack (EA)

Electronic attack (EA) involves the use of EM energy, directed energy, or anti-radiation weapons to attack personnel, facilities, or equipment with the intent of degrading, neutralizing, or destroying enemy combat capability. In the case of EM energy, this action is referred to as jamming and can be performed on communications systems (see Radio jamming) or radar systems (see Radar jamming and deception).

Electronic Protection (EP)

A right front view of a USAF Boeing E-4 advanced airborne command post (AABNCP) on the electromagnetic pulse (EMP) simulator (HAGII-C) for testing.

Electronic Protection (EP) (previously known as electronic protective measures (EPM) or electronic counter countermeasures (ECCM)) involves actions taken to protect personnel, facilities, and equipment from any effects of friendly or enemy use of the electromagnetic spectrum that degrade, neutralize, or destroy friendly combat capability. Jamming is not part of EP, it is an EA measure.

The use of flare rejection logic on an Infrared homing missile to counter an adversary’s use of flares is EP. While defensive EA actions and EP both protect personnel, facilities, capabilities, and equipment, EP protects from the effects of EA (friendly and/or adversary). Other examples of EP include spread spectrum technologies, use of Joint Restricted Frequency List (JRFL), emissions control (EMCON), and low observability or "stealth".[1]

An Electronic Warfare Self Protection (EWSP) is a suite of countermeasure systems fitted primarily to aircraft for the purpose of protecting the aircraft from weapons fire and can include among others: DIRCM (protects against IR missiles), Infrared countermeasures (protects against IR missiles), Chaff (protects against RADAR guided missiles), DRFM Decoys (Protects against Radar guided missiles), Flare (protects against IR missiles).

An Electronic Warfare Tactics Range (EWTR) is a practice range which provides for the training of aircrew in electronic warfare. There are two such ranges in Europe; one at RAF Spadeadam in the United Kingdom and the POLYGON range in Germany and France. EWTRs are equipped with ground-based equipment to simulate electronic warfare threats that aircrew might encounter on missions.

Antifragile EW is a step beyond standard EP, occurring when a communications link being jammed actually increases in capability as a result of a jamming attack, although this is only possible under certain circumstances such as reactive forms of jamming. [3]

Electronic warfare support (ES)

Electronic Warfare Support (ES), is the subdivision of EW involving actions tasked by, or under direct control of, an operational commander to search for, intercept, identify, and locate or localize sources of intentional and unintentional radiated electromagnetic (EM) energy for the purpose of immediate threat recognition, targeting, planning, and conduct of future operations.[1] These measures begin with systems designed and operators trained to make Electronic Intercepts (ELINT) and then classification and analysis broadly known as Signals intelligence from such detection to return information and perhaps actionable intelligence (e.g. a ship's identification from unique characteristics of a specific radar) to the commander.

The overlapping discipline, signals intelligence (SIGINT) is the related process of analyzing and identifying the intercepted frequencies (e.g. as a mobile phone or radar). SIGINT is broken into three categories: ELINT, COMINT, and FISINT. the parameters of intercepted txn are-: communication equipment-: freq, bandwidth, modulation, polarisation etc. The distinction between intelligence and electronic warfare support (ES) is determined by who tasks or controls the collection assets, what they are tasked to provide, and for what purpose they are tasked. Electronic warfare support is achieved by assets tasked or controlled by an operational commander. The purpose of ES tasking is immediate threat recognition, targeting, planning and conduct of future operations, and other tactical actions such as threat avoidance and homing. However, the same assets and resources that are tasked with ES can simultaneously collect intelligence that meets other collection requirements.[1]

Where these activities are under the control of an operational commander and being applied for the purpose of situational awareness, threat recognition, or EM targeting, they also serve the purpose of Electronic Warfare surveillance (ES).

Multifunctional EW system

In February 2015 the Russian army received their first set of the multifunctional electronic warfare system, known as Borisoglebsk 2. After some months of testing, has it been used in Ukraine. According to Svenska Dagbladet, its initial usage caused concern within NATO.[4][5] [6][7]

Russia describes Borisoglebsk 2 as "The 'Borisoglebsk-2' when compared to its predecessors has better technical characteristics: wider frequency bandwidth for conducting radar collection and jamming, faster scanning times of the frequency spectrum, and higher precision when identifying the location and source of radar emissions, and increased capacity for suppression." [8]

See also

Electronic Warfare Systems:


US specific:

Further reading

  • FM 3-36: Electronic Warfare In Operations. Safeguarding Soldiers Through Technology. Fort Leavenworth, U.S. Army Combined Arms Center (CAC), 26 February 2009 – PDF, 114 p., 4,5 MB. – See also: John Milburn: Army manual raises emphasis on electronic warfare. Washington Post, 26 February 2009.
  • Jon Latimer, Deception in War, London: John Murray, 2001
  • David Adamy EW 101: A First Course in Electronic Warfare
  • David Adamy EW 102: A Second Course in Electronic Warfare
  • Joint Publication 3-13.1: Electronic Warfare[1]
  • Aadu Jogiaas: Disturbing soviet transmissions in August 1991.
  • Words: MATT BOLTON Photographs: MATT MUNRO , A GLIMPSE INTO TALLINN’S SECRET HISTORY OF ESPIONAGEThe Tallinn Cables Lonely Planet Magazine, December 2011


  1. ^ a b c d e f g h i
  2. ^ a b c d
  3. ^
  4. ^
  5. ^
  6. ^
  7. ^ Swedish newspaper "Svenska Dagbladet", ("Putin's new super weapon frightens NATO") Swedish "De slår ut kommunikation och gps-system och gör moderna vapensystem obrukbara. Kanske klarar sig inte ens det nya stridsflyget F-35 mot den nya tekniken. Rysslands nya vapen skrämmer amerikanerna och Nato." litterary translates to "They beat out communication and GPS-system and makes the most modern weapon systems inoperable. Perhaps will not even the new fighter aircraft F-35 stand up against the new technology. Russia's new weapon frightens the Americans and NATO".
  8. ^

General references

  • The Changing Capability of Manpack Electronic Warfare Systems
  • Carlo Kopp "Electronic Warfare in Operation Desert Storm", Australian Aviation, June/July/August, 1993
  • Association of Old Crows
  • Electronic Warfare Jamming Systems
  • Information Warfare, Information Operations and Electronic Attack on APA
  • Electronic Warfare Products
  • Joint Publication 3-13.1 Electronic Warfare; PDF-674k (text version)
  • Air Force Instruction on Electronic Warfare (EW) Operations PDF
This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.

Copyright © World Library Foundation. All rights reserved. eBooks from World Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.