Sunteți pe pagina 1din 34

SUBCOURSE EDITION

IT 0513 C

US ARMY INTELLIGENCE CENTER

ELECTRONIC PROTECTION (EP)


ELECTRONIC PROTECTION (EP)

Subcourse Number IT 0513

Edition C

U.S. Army Intelligence Center


Fort Huachuca, Arizona 85613-6000

2 Credit Hours

Edition Date: January 1997

SUBCOURSE OVERVIEW

This subcourse provides information on the operation of the AN/PPS-5 (SERIES) radar set through EP,
interference recognition, deception and jamming operations, frequency changes, and reporting radar
electronic attack (EA) activity.

Suggested supplemental reading: USAIC&FH subcourses IT 0503, IT 0504, IT 0506, and IT 0508.

This subcourse reflects current doctrine at time of preparation. In your own work situation, always refer
to the latest publications.

The words "he," "him," "his," and "men," when used in this publication, represent the masculine and
feminine genders, unless otherwise stated.

TERMINAL LEARNING OBJECTIVE

ACTIONS: To recognize electromagnetic (EM) interference and apply EP.

CONDITIONS: Given an operational radar set, interference, and a tactical radar mission.

STANDARDS: Recognize, identify, and report all EM interference. Initiate corrective action.

i IT 0513
TABLE OF CONTENTS

Section Page

Subcourse Overview i

LESSON 1: ELECTRONIC WARFARE (EW) AND ELECTRONIC


ATTACK (EA) OPERATIONS 1-1

Introduction 1-1
EW Terminology 1-2
Preparation for Enemy EA Activity 1-3
Recognize Electromagnetic Interference 1-8
Enemy EA Intentional Interference and
Identification Recognition 1-9
Practice Exercise 1-14
Answer Key and Feedback 1-16

LESSON 2: OPERATE AN/PPS-5 (SERIES) RADAR SET THROUGH ENEMY


EA 2-1

Introduction 2-1
Apply Electronic Protection (EP) 2-1
Operation Through Deception 2-2
Operation Through Jamming 2-5
Enemy Electronic Countermeasure Activity Reports 2-10
Practice Exercise 2-15
Answer Key and Feedback 2-16

IT 0513 ii
LESSON 1

ELECTRONIC WARFARE (EW) AND ELECTRONIC ATTACK (EA) OPERATIONS

CRITICAL TASK: 301-341-1342

OVERVIEW

TASK DESCRIPTION

This lesson will familiarize you with what can be done to prevent or reduce enemy use of transmitting
and receiving equipment, while ensuring your equipment operates effectively.

LEARNING OBJECTIVE

ACTIONS: To understand the operations and concepts inherent in a electronic warfare (EW)
battlefield environment.

CONDITIONS: Given an operational radar set, interference, and a tactical radar mission.

STANDARDS: Recognize, identify, and report all electromagnetic (EM) interference incidents.
Initiate corrective action.

REFERENCES: The material contained in this lesson was derived from the following publications:

FM 24-33
FM 34-1
FM 100-5

INTRODUCTION

Have you ever tried tuning a radio to a station when there was another radio nearby on the same
station? If you have, you no doubt recall the high-pitched howl coming from the set as you tuned across
the other radio's setting. The noise (howl) in the radio was caused by oscillations produced between
the two radios because of their close proximity.

How about the time you were sitting in your favorite club, relaxing and enjoying some live
entertainment, and a loud scream came out of the loudspeakers? Many have been victims of this
experience. The noise (scream) produced in the loudspeakers was caused by feedback from a
microphone to an amplifier. This noise was probably caused by an improperly adjusted amplifier.

And now, for those who have operated citizen's band (CB) transceivers. How many times have you
been trying to pick up a "buddy" on the other end and had his transmission chopped off by someone
transmitting on a nearby channel? This inconvenience was caused by a possible mismatch between a
transmitter and an antenna, or being too close to the second transmitter. In either case, communication
was interrupted.

1-1 IT 0513
The three examples have one thing in common, unwanted noise or interference. The keys to operating
in and through interference depend on how well you know the radar set, and can recognize
interference.

The purpose of this lesson is to acquaint you with enemy EA operations. A firm understanding of EA
principles will enhance survival in an EW environment.

ELECTRONIC WARFARE (EW) TERMINOLOGY

EW is an essential component of command and control warfare (C2W). As part of C2W, EW is used in
conjunction with MDCI to protect friendly command control (C2) while attacking the enemy's C2
structure. Effective use of EW as a decisive element of combat power requires coordination and
integration of EW operations with the commander's scheme of maneuver and fire support plan. The
integrated use of EW throughout the battlefield supports the synergy needed to locate, identify,
damage, and destroy enemy forces and their C2 structure.

Enemy counterpart to our EW is radio electronic combat (REC). Enemy doctrine stresses REC is a
weapon system and, as such, must be integrated with other weapon systems in combat operations.

In order to understand the operations and concepts inherent in an EW environment found on the
battlefield, you should first learn some EW terminology. On the modem battlefield, there are more
electronic transmitting devices than ever before, and they play a vital role in today's high-speed, mobile
warfare. Never has EW been such a clear and present danger. The four main EW purposes are too--

Locate. Mainly, to find a transmitting station, radio, ground surveillance radar (GSR), and so
on.

Identify. Plot a targetable grid coordinate on active transmitters.

Damage. Fool the enemy as to operations, movement, and intent.

Destroy. Enemy forces and their command and control (C2) structure. By using air, ground,
or artillery assets.

Any transmitter is a potential target. A GSR operator must know how to respond to the EW threat.

EW activities can be broken down into three basic categories--

Electronic warfare support (ES).

EA.

EP.

IT 0513 1-2
ES are actions taken to search for, intercept, locate, and immediately identify radiated energy for threat
recognition and tactical force employment. Direction finding (DF) of radios and radar is an ES
technique. These ES techniques used in EW operations are used to-

Search for active transmitters.

Intercept transmissions for intelligence information and possible deception.

Locate active transmitters.

Identify equipment type(s) and unit(s) to which they are attached.

In established priorities, the enemy often fires on a DF fix only. Once a transmitter is located through
DF efforts, artillery fires a barrage to cover a wide area at the suspected transmitter location. Always
remember, once a transmitter has been located, it can be fired upon.

EA are actions taken to prevent or reduce enemy ability to use its communication, surveillance, and
target acquisition devices, or to deceive the enemy so it reacts to our best advantage. EA include--

Jamming. A technique used to override communication and saturate or blank out radar
target returns.

Disrupting. Nonperiodic periods of jamming.

Deceiving. Entering false or misleading information into command and control


communication nets and electronically introducing false targets in surveillance and target
acquisition radar systems.

Radio sets can be jammed by means of spot (one frequency), sweep, sequential, or barrage (band of
frequencies) when it is more desirable to jam than to obtain information from those nets. The enemy
also possesses a significant capability to conduct electronic deception operations against radio nets
and radar systems. An alert radar operator is one of the most effective tools against EA.

EP are actions taken to ensure friendly use of transmitting devices (radios and radars) against enemy
EA activities. The EP purpose is to protect operators, radio nets, personnel, equipment, and allow
friendly forces to accomplish their mission.

PREPARATION FOR ENEMY EA ACTIVITY

The enemy trains regularly for the eventuality of EW operations. Since REC is considered a weapon
system, the enemy will conduct extensive battlefield EA activities.

Know Your Equipment and You. A thorough knowledge of the equipment's normal operation and you is
a must. For example, if operating a defective GSR and do not realize it, how can you expect to operate
and survive in an enemy EA environment? Thorough equipment knowledge can be gained by the
following--

1-3 IT 0513
Ensure schedules are met, and radar maintenance is thorough. The maintenance charts in
the operator's training manual have much to offer to help recognize radar set deficiencies
and shortcomings. MAKE THE MOST OF MAINTENANCE--it will serve you well.

Practice radar operations at every opportunity, in all kinds of weather conditions, and in day
and night scenarios. Do not be satisfied with taking a backseat in training and letting the
other guy do it. Operating in enemy EA will be demanding, and you must be the best.
Second best on the battlefield is not good enough.

Know equipment capabilities and limitations. GSRs have much to offer in support of friendly
forces operations. However, they do not offer the solution for all situations. Know what the
GSR can do and take full advantage of it.

Know your own capabilities and limitations. In other words, know what you can do, and do it
to the best of your ability. Do not try to be a hero and overextend yourself. Very few real
heroes manage to survive to tell their exploits around a warm fireside.

Proper Site Selection by the radar section/operations sergeant will play an important part in minimizing
enemy EA threat. A well-selected radar site will provide--

Concealment and cover for equipment and you, to include a dug-in horseshoe position, a
frontal parapet, adequate drainage, and grenade sumps.

Clear line-of-sight (LOS) from the radar's antenna to the assigned surveillance area.

Characteristics listed above should apply to all sites at all times. (See USAIC&FH subcourse IT 0506).

Radar operates by transmitting radio frequency (RF) energy. When transmitting, GSRs not only radiate
its main beam (lobe) into the target area, it also radiates several other weaker beams known as side
lobes (Figure 1-1). These lobes are also generated to the rear (back lobes), but have been omitted
from figure 1-1 for clarity.

Figure 1-1. GSR RF Energy.

IT 0513 1-4
Avoid setting up radar where it would transmit toward probable enemy intercept sites (usually hilltops).
Site radar where side and back lobes will be absorbed by the surroundings. Take advantage of
surroundings by siting--

Between hills or in defiles.

Next to embankments.

Under tree line cover.

Select a good target background area when possible. Two types of target backgrounds that offer the
best options are soft and hard.

Soft background. A good example is heavy woods. Heavy woods tend to absorb a good
portion of the main beam, and make site detection more difficult (figure 1-2). This site offers
another advantage. The woods surrounding the radar site will absorb side and back lobes.
The surveillance area is well covered, and enemy interception is minimized.

Figure 1-2. Soft Background.

1-5 IT 0513
Hard background. A good example is rocky terrain or buildings. Hard backgrounds have a
tendency to randomly scatter the main beam (Figure 1-3).

Effects of soft and hard backgrounds. To get a fuller understanding of how soft and hard backgrounds
can aid you, Figure 1-3.

Figure 1-3. Soft and hard Backgrounds.

Enemy DF stations have been deceived. Their fixes indicate the site is at a point where the dash lines
cross (Figure 1-3).

Reduce chances of being DFed and located by--

Taking advantage of natural terrain to shield site.

Remembering DF stations are normally located on or near hilltops, and operating set
accordingly.

Selecting suitable target background areas to assist in deception.

Good Operating Procedures assist in operations security (OPSEC) efforts. They involve using
equipment to ensure proper surveillance area coverage while protecting yourself from EA activities.
The following procedures apply to an ideal site, and some not so ideal sites you may be forced to work
from--

IT 0513 1-6
Do not operate continuously. Coordination with supported units S2 should allow to random
operation (Figure 1-4).

Figure 1-4. Random Operating Pattern.

Example: The surveillance area has been broken


down into three parts (sectors): A, B, and C.
An acceptable operating pattern follows--

1. A 4. C 7. A 10. B 13. B

2. C 5. A 8. C 11. C (and soon)

3. B 6. B 9. A 12. A

A continuous A, B, C, A, B, C, A, B, C, (and so on) operation will definitely get you in a bind in short
order. The enemy can decipher the pattern and work around it.

When not required to search surveillance area, place radar set on standby. A silent
transmitter tells the enemy nothing. This procedure must be fully coordinated with the
supported unit's S2.

1-7 IT 0513
If making adjustments or performing on-site maintenance, rotate antenna to the rear of site
away from the enemy, when possible.

When searching through surveillance area, adjust elevation and azimuth so radar beam
goes no farther than necessary.

RECOGNIZE EM INTERFERENCE

Interference is any electrical or electronic noise or clutter whose source cannot be quickly and positively
identified. Listed below are four interference sources and their causes--

Natural. Weather extremes (heavy winds, rain; or snow) or poor surveillance area terrain.

Internal. Equipment malfunction(s) which is best defind by operators manuals.

Mutual. Other friendly electronic sources (radars, generator sets, power transmission lines,
and so on).

Intentional. Enemy EA.

Operator Interference Determination is knowing which of the four causes is producing radar equipment
interference. This is where knowing the equipment really comes into play.

REMEMBER: A thorough knowledge of how the GSR operates when it is fully functional is of utmost
importance, and will assist in determining what interference type you are experiencing.

Recognition of Natural Interference and Operator Actions. Operating in and through natural
interference will be difficult at times. For the most part, you will just have to work harder at operating.

Atmospheric conditions such as lightning, heavy wind, rain, sand storms, and snow will
interfere with radar operation. These are characterized by excessive headset noise and
scope interference. Unfortunately, there is nothing you can do about the weather. The fact
you can identify the problem as weather-related is a step forward. Weather extremes do not
eliminate radar use, but you will have to work harder to identify real targets.

A poor background terrain selection will also cause excessive headset noise and scope
interference. If it is not possible to change antenna direction and still cover the desired area,
move to an alternate site. A different site will often allow antenna direction change, and still
cover the assigned area.

Ground surveillance radar (GSR) team movement to an alternate site must be coordinated with the
supported unit's S2 prior to the actual move.

REMEMBER: Enemy REC personnel will take full advantage of the weather to conceal their attempts to
interfere with the radar's operation.

IT 0513 1-8
Recognition of Internal Interference and Operator Actions. As a rule, internal interference is quite easy
to identify in the AN/PPS-5 (SERIES) radar set. Internal interference is usually caused by improper
equipment adjustments (frequency, volume level, and scope). However, there is a possibility of internal
component malfunctions (breakdowns) and assemblies. To determine if this is the cause-

Rotate antenna through a full 6400 mil circle. If problem remains constant throughout
rotation with little or no noticeable change, there is likely internal interference.

Once having identified internal interference, turn to the operator's manual maintenance
charts, and determine what steps can be taken to isolate the problem.

Recognition of Mutual Interference and Operator Actions. With all the equipment that operates
electronically or gives off electronic signals, it will not be unusual to receive unintentional interference
from friendly sources. To determine if this is the cause--

Rotate antenna through a full 6400 mil circle. Try to determine the interference location.
Mutual interference should be heavier from a given azimuth, depending on the interfering
equipment location.

Contact operators running the equipment. Attempts should be made to come to a mutual
agreement on operational time(s).

If coordination fails to produce agreeable results and the mutual interference cannot be corrected, you
may have to move radar location so some sort of shielding (hills, trees, heavy shrubs, and so on) is
between the antenna and interference.

GSR team movement to another location must be coordinated with the supported unit's S2 prior to the
actual move.

ENEMY EA INTENTIONAL INTERFERENCE AND IDENTIFICATION RECOGNITION

Two Types of Intentional Enemy EA you will have to recognize and operate through. The first is
deception, and second is jamming. In either case, enemy action will be deliberate.

Intentional enemy EA are usually directional (strongest from one direction).

EA signals can be uniform/stable or varying depending on the device type being used.

Deception is an EA tactic used to introduce false receiver target sounds. Deception signals fall into two
categories--

Reflected deception is an EA tactic normally used against target acquisition radars and long-range
search systems. It is characterized by dropping chaff (bits of foil, metal strips, and so on) into the air,
thereby producing false returns which allow enemy aircraft to continue on (hopefully) unobserved.

It is highly improbable reflected deception will be used against GSR systems.

1-9 IT 0513
Transmission deception. This is an EA tactic used against GSR to introduce false targets.
Transmission deception signals fall into two categories--

Multiple signals that produce several moving target indications. They may be on a single or
several azimuths. These sounds like several apparently real targets moving through the
area of interest.

Single target of unrecognizable characteristics. This sounds like a moving target, but win
have unrecognizable overtones or sounds. It may be on a single or several azimuths.

Jamming. Jamming is an EA tactic used to cover (hide) actual target sounds and indications, overload
receivers, or reflect transmitted signal. There are two types of jamming: Transmitted signal
(transmission), and deception (reflected).

IT 0513 1-10
NORMAL OPERATION REVIEW

Figure 1-5 shows received signals created from ground clutter or background noise. They will also tell
when enemy activity is in the area.

Figure 1-5. Received Signals.

Transmission jamming can put enough power on the receivers frequency to completely hide any
moving surveillance area targets (Figure 1-6).

Figure 1-6. Transmission Jamming.

1-11 IT 0513
Jamming is usually strongest on a fixed azimuth and elevation. Remembering this will aid in locating
the jammer's position.

There are four basic types of jamming: spot, sweep, barrage, and sequential (Figure 1-7)

Figure 1-7. Jamming Types.

The most common jamming techniques are fast and slow sweep, spot, and barrage using continuous
wave (CW) signal. Fast and slow sweep jamming differ only in the length of time they remain on the
radar receiver's frequency. Spot jamming affects a specific frequency. In sequential jamming, selected
frequencies are spot jammed in rapid succession and in a cyclic manner.

IT 0513 1-12
There are three basic types of jamming signals with their characteristic sounds-

CW signals are fixed frequencies that may sound like high-pitched head-set whines. They
are quite similar to the 1000 Hz tone heard on TV sets when the station is transmitting its
test pattern.

Frequency modulation (FM) signals are rising and falling frequencies with varying volume
levels. They sound similar to buzz saws in headsets.

Overtones are sounds within the jamming (garbled voices, loud banging noises, music, and
any other disruptive noise) that can be transmitted into the receiver.

Reflected jamming is simply what its name implies. It is caused by the enemy hanging or stringing
metal in the target area. Reflected jamming from metallic objects will produce the effect of many more
targets then there actually are (Figure 1-8). Two methods of producing reflected jamming are--

Scrap metal. Large metal pieces scattered throughout target area or tin cans and/or foil
attached to trees. This definitely will increase ground clutter level, but they do not move far,
so they will appear as stationary targets.

Corner reflectors. These are motor driven (stationary reflectors) that produce a large target
return and appear to have movement.

Figure 1-8. Reflected Jamming.

1-13 IT 0513
LESSON 1

Practice Exercise

The following items will test your grasp of the material covered in this lesson. There is only one correct
answer for each item. When you have completed the exercise, check your answers with the answer
key that follows. If you answer any item incorrectly, study again that part of the lesson which contains
the portion involved.

1. What are the main purpose(s) of EW?

2. Why are ES techniques used in EW operations?

3. What are three actions that fall under EA?

4. What is the purpose of siting radars to take advantage of surrounding terrain?

5. What must you do when performing radar maintenance at an operational site?

6. List interference types you may encounter while operating radar set?

7. What type(s) of enemy EA can be expected while operating radar set?

8. What types of jamming can be expected while operating radar set?

9. What jamming signal type is identified by a headset buzz saw sound?

10. List reflected jamming sources used against GSRs.

11. What jamming characteristic can aid in locating the jammer?

12. What specific interference type are you experiencing if you pick up a moving target with
unrecognizable overtones?

13. How can you pinpoint friendly radar station location interfering with your operation?

14. What are EP?

15. Where can you expect enemy intercept sites to be located?

IT 0513 1-14
LESSON 1

PRACTICE EXERCISE

Answer Key and Feedback

Item Correct Answer and Feedback

1. Locate, identify, damage, and destroy. (page 1-2)

2. Search for active transmitters, intercept


transmissions for intelligence information and
possible deception, locate active transmitters,
and identify equipment types and units to which
they are attached. (pages 1-2/1-3)

3. Jamming, disrupting, and deceiving. (page 1-3)

4. To absorb radiated side and back lobes. (page 1-5)

5. Rotate antenna to rear of site away from


enemy. (page 1-8)

6. Natural, internal, mutual, and intentional. (page 1-8)

7. Deception and jamming. (page 1-9)

8. Spot, sweep, barrage, and sequential. (page 1-12)

9. FM. (page 1-13)

10. Scrap metal and corner reflectors. (page 1-13)

11. Jamming is usually strongest on a fixed azimuth


and elevation. (page 1-12)

12. Transmission deception. (page 1-10)

13. Rotate antenna through a full 6400 mil circle.


Mutual interference should be heavier from a
given azimuth depending on mutual interference
location. (page 1-9)

14. Actions taken to ensure friendly use of trans-


mitting devices against enemy EA activities. (page 1-3)

15. On hilltops. (page 1-5)

IT 0513 1-16
LESSON 2

OPERATE THE AN/PPS-5 (SERIES) RADAR SET THROUGH ENEMY EA

CRITICAL TASK: 301-341-1342

OVERVIEW

TASK DESCRIPTION

This lesson provides EP guidance to enable you to operate the AN/PPS-5 (SERIES) radar set through
enemy EA.

LEARNING OBJECTIVE

ACTION: To counter enemy efforts to degrade or neutralize radar operations.

CONDITIONS: Given an operational radar set, interference, and a tactical radar mission.

STANDARDS: Recognize, identify, and report all EM interference incidents. Initiate corrective
action.

REFERENCES: The material contained in this lesson was derived from the following publications:

FM 24-33
FM 34-1
FM 100-5
TM 11-5840-298-12

INTRODUCTION

The key to successful operation through enemy EA will be your knowledge and skillful use of EP
techniques. Lesson 1 stated, "EP are actions taken to ensure friendly use of electronic devices (radios
and radars) against enemy EA activities."

APPLY EP

Ultimately, battlefield survival will rely entirely on how well you apply proper EP procedures to counter
EA activities.

REMEMBER: The purpose of EP is to protect operators, radio nets, personnel, and equipment, and to
allow friendly forces to accomplish their mission.

2-1 IT 0513
OPERATION THROUGH DECEPTION

It is quite certain the enemy will engage in battlefield deception (BAT-D) operations. The enemy knows
your radar is effective, and it will attempt to degrade or neutralize operations in any way possible. Do
not forget: the best EA defense is thorough radar set knowledge, its capabilities, and limitations. To
further your defense, train to recognize all the varied target deception tones you can expect to
encounter. The control-indicator on the AN/PPS-5 (SERIES) is a great aid in identifying all types of
interference. However, advantages exist only through radar set knowledge.

Operation Through Transmission Deception. The first thing is to CONTINUE TO OPERATE. DO NOT
TURN RADAR SET OFF when experiencing deception. Turning radar set off only tells the enemy how
effective its deception efforts are. Transmission deception signals can be identified if you are
observant. Since the signals are generated electronically, they will appear to be too perfect. Displayed
A- and B-scope waveshapes will usually be uniform and stable, compared to a normal target that jitters.
There are three types of transmission deception signals to watch for--

Multiple pulse transmission. This conceals a target by making it appear like two or more
targets on the same azimuth, but at different ranges.

Variable single pulse transmission. This conceals a target by making its range seem greater
or lesser than it actually is.

Side lobe deception. This appears as weak target indications directly in front of antenna.

Learn to follow these procedures when experiencing transmission deception--

Determine if you are actually receiving deception signals (Figure 2-1).

Figure 2-1. Deception Signals.

IT 0513 2-2
Rotate antenna to rear of site, if possible.

Determine if there is a headset noise level change to rule out possible mutual or internal
interference.

Rotate antenna into target area and continue operation.

Use normal search procedures (range, azimuth, and elevation scanning) to aid in operation
through deception.

Operation Against Multiple Targets. DO NOT CONCENTRATE ALL EFFORTS AND ATTENTION ON
SUSPECTED DECEPTION SIGNALS.; Real targets may be in the deception signal vicinity, or in
another part of the surveillance area. To assist operating against multiple target signals, perform the
following--

REMEMBER: The deception purpose is to DECEIVE, so cover assigned surveillance area accordingly.

If all multiple targets produce moving target indications (MTI), try to track the one target
whose indication is most like a recognizable target sound. This should help detect the
mobile deception transmitter carrier.

Listen for target tones, and look for waveshapes that are too perfect.

If you find this is a single target of unrecognizable characteristics, study this target and try to
track it as a normal target. If it cannot be tracked, search along the same azimuth for a
stationary or moving source of the unusual target (Figure 2-2). Listen carefully for an
overtone that may be recognizable as a normal target carrying a reflector.

2-3 IT 0513
Figure 2-2. Unusual Target.

Operations Through Reflected Deception. As lesson 1 stated, reflected deception is normally used
against target acquisition radars and long-range search systems. Although it is doubtful reflected
deception will be used against a GSR to any great extent, be prepared for it. Reflected deception
signals will sound very much like real headset targets, and look like real A- and B-scope targets.
Actually, they are real targets because they move in azimuth or range. Notice, as you detect them,
they will remain in the same place. In addition, they will produce a regular headset tone that can be
distinguished from tones produced by real moving targets. Reflected deception (Figure 2-3) is
characterized by the following:

Figure 2-3. Reflected Deception.

IT 0513 2-4
It may sound like large moving or fixed targets at a certain range and azimuth. However,
the target will not move from that one spot.

It produces tones or noises that will disturb existing targets.

It may cover several mils in azimuth, and several hundred meters in range.

Actual operation through reflected deception is accomplished as follows--

Locate deception device range and azimuth by searchlighting and distinguishing between
real and artificial targets.

Find real target range by listening for an echo that is not quite as perfect as other echoes on
the same azimuth.

Searchlight deception signal area edges for targets attempting to move out of deception
area.

Resume normal target scanning at azimuths and ranges away from the deception signal.

If you suspect enemy main beam detectors are operating against you, use scan speed #4.
Select the narrowest sector width that gives the required coverage. Watch A-scope for
weak or erratic moving targets.

OPERATION THROUGH JAMMING

We will encounter deception operations on the next battlefield, and the enemy will employ jamming
operations.

The enemy will definitely attempt to degrade or neutralize radar operations any way it can. To further
aid in your defense, train to recognize all the varied jamming signals you can expect to encounter.

DO NOT FORGET: The best defense against enemy EA is thorough radar set knowledge, its
capabilities, and limitations.

Operation Through Transmission Jamming. CONTINUE TO OPERATE. DO NOT TURN RADAR SET
OFF when experiencing jamming. Follow these procedures when experiencing transmission
deception--

2-5 IT 0513
Rotate antenna to the rear of site, if possible.

Listen for a signal increase or decrease.

If signal does not change, you may be experiencing internal interference. Refer to
operator's manual.

If signal decreases, you may be getting jammed unless there are other causes such as
mutual interference.

Rotate antenna into target area and continue operation.

Normal A- and B-scope indications are depicted in Figure 2-4.

Figure 2-4. A- and B-Scope Indications.

IT 0513 2-6
In order to identify various jamming types, you must be familiar with normal scope presentations. Take
a look at the scopes when jamming signal(s) is introduced. Random and barrage noise indications are
depicted in Figure 2-5.

Figure 2-5. Random and Barrage Noise.

NOTE: These indications can be produced by improper receiver gain adjustment.

Continuous Wave (CW) and Frequency Modulation (FM) on the A- and B scope are depicted on both
scopes as uniform sweeps as shown in Figure 2-6.

Figure 2-6. CW and FM Indications.

2-7 IT 0513
There are two types of enemy jamming to make you think the set is malfunctioning. Check carefully
before deciding. Take a look at signals caused by jamming if not caused by mutual or internal
interference.

Single and multiple pulse spot jamming are depicted in Figure 2-7.

Figure 2-7. Single and Multiple Pulse.

Figures 2-2 to 2-7 depict only a few of the possible signals the enemy can direct at the radar to confuse
and make you think the equipment is malfunctioning.

Once determined you are experiencing transmission jamming, take action against it by--

Sweeping area where jamming signal is coming from to determine the azimuth and
elevation of the affected area.

Attempting to determine azimuth where jamming signal is loudest. This should give a direct
azimuth to the jammer (Figure 2-8). Do not spend too much time doing this.

REMEMBER: When the enemy is jamming, it is probably covering up for some other operation.

IT 0513 2-8
Figure 2-8. Jammer Azimuth.

Searchlight. Turn down receiver gain to pinpoint jamming signal azimuth. Listen in
headsets until jamming appears to be in one narrow azimuth sector.

Determine if jamming signal is CW or FM (Figure 2-6) by listening to noise or noise variation,


and observing A- and B-scopes.

Try to pick out sounds above jamming noise level (recognizable overtones). Then try to
pinpoint real target tones by using range gate.

Lower headset volume and listen for moving targets through the noise.

Lower A-scope gain and look for signals riding on top of the jamming signal.

Scan to the immediate left or right of jamming azimuth for targets moving out from jammed
sector cover.

If the jamming being received is so heavy you cannot pick up or track any targets, you can perform the
following--

Change frequency. ONLY WHEN AUTHORIZED/APPROVED BY HIGHER AUTHORITY.

2-9 IT 0513
Move to an alternate or supplemental position. These positions have already been selected
by the radar section/operations sergeant. Movement to a new site must be
AUTHORIZED/APPROVED BY HIGHER AUTHORITY.

Both these cases are considered drastic measures because implementing either will tell the enemy its
jamming has successfully disrupted operations.

REMEMBER: Neither action is taken without approval of higher authority, specifically, the S2/G2
section of the supported unit.

Operation Through Reflected Jamming. Continue to operate. DO NOT TURN SET OFF (Figure 1-8).
Learn to follow these procedures when experiencing reflected jamming-

Lower headset volume and A- and B-scope gain. Listen and watch for recognizable target
sounds, and indications within the jammed area. The reflected jamming will produce targets
that appear to move.

Searchlight jammed area edges to pick up moving targets coming out of jamming area.

DO NOT CONCENTRATE ALL YOUR ATTENTION ON THE JAMMED AREA. The reflected jamming
may have been deployed to hold your attention in one area, while the enemy moves through other
areas.

Frequency Changes. Changing radar set frequency should be done only as a last resort. Enemy REC
personnel will be monitoring your signal, and detect any erratic operating procedures.

Frequency changes on the AN/PPS-5 (SERIES) radar set are covered in USAIC&FH Subcourse IT
0508 and the operator's manual.

Return frequency to original setting when jamming stops.

In some cases, enemy REC personnel will use a broadband jammer covering many frequencies at a
time. If this is the case, there is a possibility changing frequency will have little or no effect. If this
happens, continue to operate, as best you can, through the jamming and await higher authority
instructions.

ENEMY EA ACTIVITY REPORTS

Enemy EA will be a deadly serious operation and, as GSR operators, you will be among its prime
targets. The only way anyone will know you are being jammed or deceived is to report it. Once having
reported jamming or deception, friendly forces can act to reduce or eliminate its source.

When and How to Report. The following is a guide you must use in reporting enemy EA activity:

EA activity MUST BE REPORTED PROMPTLY AND ACCURATELY.

IT 0513 2-10
Initiate report as soon as you recognize interference problems, and determine they are the
result of enemy EA actions.

Jamming/deception report format. Figure 2-9 shows a jamming/deception report. ALL


information must be as complete and accurate as possible. This is only an initial report.
Record all information for a follow-up or end-of-mission report.

Your entire jamming/deception report must be sent by secure means to the supported unit's S2 section.
This will require using signal operation instructions (SOI).

(Strike out what does not apply)

Figure 2-9. JAMMING/DECEPTION REPORT.

Meaconing, intrusion, jamming, and interference (MIJI) reports are originated by the supported unit's S2
and/or higher headquarters, and forwarded to friendly EW or artillery units for further action. Figure 2-
10 is a MIJI report. You may be required to submit part or all of the information as a follow-up or end-
of-mission report.

All MIJI reports are sent by secure means. Improperly sent, the MIJI report can tell the enemy
everything it wants to know.

2-11 IT 0513
Figure 2-10. MIJI Report.

IT 0513 2-12
Figure 2-10. MIJI Report (Continued).

2-13 IT 0513
Figure 2-10. MIJI Report (Concluded).

Since the purpose of enemy EA is to reduce and disrupt effective radar operation, remember the
following--

Rules to Follow

Do not panic. Your ability to react calmly will certainly assist in survival against EA.

Continue to operate. Do not turn radar set off when under EA attack.

React quickly and decisively. EP must be employed as soon as possible without error.

Change frequency or move to a new site only as a last resort. Keep the enemy from
knowing how effective its EA tactics are.

REMEMBER: Frequency changes and radar site movement require approval by higher authority.

Enemy EA Training

To effectively combat EA, take a vigorious and active part in training exercises as often as possible.

Concentrate on learning the characteristic sounds and indications of every possible interference that
can be indicated by the radar set.

IT 0513 2-14
LESSON 2

PRACTICE EXERCISE

The following items will test your grasp of the material covered in the lesson. There is only one correct
answer to each item. When you have completed the exercise, check your answers with the answer key
that follows. If you answer any item incorrectly, study again that part of the lesson which contains the
portion involved.

1. What is the key to successful operation through enemy EA?

2. What operational principle should be first used when encountering enemy deception or
jamming?

3. What type of deception are you experiencing if the target appears on the same azimuth at
different ranges?

4. You have picked up a target with unrecognizable characteristics. What will be your first course
of action?

5. You suspect the enemy is using main beam detectors in an attempt to locate your site. What
procedures will you use?

6. What type(s) of interference can you generate by improperly setting receiver gain?

7. Reflected jamming produces MTI that are peculiar due to the fact they appear to be--

8. List the rules that will assist in operating against enemy EA.

9. Exactly when should you prepare a jamming/deception report?

2-15 IT 0513
LESSON 2

PRACTICE EXERCISE

Answer Key and Feedback

Item Correct Answer and Feedback

1. Knowledge and skillful use of EP techniques. (page 2-1)

2. Continue to operate. (page 2-2)

3. Multiple pulse transmission. (page 2-2)

4. Try to track it as though it were a normal


target. (page 2-3)

5. Use scan speed #4, select narrowest sector


width that gives the required coverage, and
watch A-scope for weak or erratic moving
targets. (page 2-5)

6. Random and barrage noise. (page 2-7)

7. Stationary. (pages 2-4/2-5)

8. Do not panic, continue to operate, react


quickly and decisively, and change frequency
or move to a new site only as a last resort. (page 2-14)

9. As soon as interference problems are recognized


and determined to be the result of enemy EA
actions. (pages 2-10/
2-11)

IT 0513 2-16

S-ar putea să vă placă și