Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems...

download Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Guided Missiles) to Electronic Warfare, Pa

of 124

Transcript of Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems...

  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    1/124

    A M C P A M P H L E T

    ENGINEERING DESIGN

    HANDBOOK

    VULNERABILITY OF COMMUNICATION-ELECTRONIC AND

    ELECTRO-OPTICAL SYSTEMS EXCEPT GUIDED MISSILES)

    TO ELECTRONIC WARFARE

    A M C P 7 6411

    PART OWE

    INTROQUCTION

    A N G E N E R A L

    A P P R O A C l l

    TO

    E L E C T R O N I C W A R F A R E V U L N E R A B I L I T Y U ]

    CL AS SI FI ED BY CG U S A ECO M

    NA TIONAL SECURITY INFORMA TION

    EXEMPT FROM G EN ER AL DECLASSIFICATION

    Schedule o Executive Order 652

    Unauthorized Disclosure Subject to Criminal Sanctions

    EXEMP T IO N CAT E G O R Y 3

    DECLASSIFY ON 3 December 989

    H EA D QU A RT ER S U S A R M Y M A T E R IE L C O M M A W D

    J A W U A R Y

    1976

  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    2/124

    MCP706411

    Fig. No.

    1 1

    2 1

    2 2

    2 3

    2 4

    2 5

    2 6

    2 7

    2 8

    2 9

    A 1

    A 2

    U) LIST

    OF

    ILLUSTRATIONS

    Title b e

    Functional Organization of Electronic Warfare

    The Primary Factors of Vulnerability Analysis

    Flow Diagram of EW Vulnerability Analysis

    Flow Diagram of Technical EW Vulnerability

    Diagram Illustrating Geometry of

    ECM

    Vulnerability Analysis

    Postulated Mechanism

    for

    Control and

    Coordinationof Soviet EW Operations

    Diagram of a Typical Warsaw Pact Signal

    Intercept/EM Capability

    Photo Map of a Target Array Depicting a

    Warsaw Pact Army Front

    Array Input Flow Chart

    Array Network Diagram

    The

    ALLEN

    Model

    Hughes Simulation Structure and Output

    Analys.................................

    1 7

    2 4

    2 8

    2 9

    2 10

    2 11

    2 12

    2 15

    2 16

    2 17

    A 5

    A 7

    xi/xii

    http://82050_01.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_01.pdf/
  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    3/124

    U)

    LIST OF ILLUSTRATIONS

    Fig. No.

    Title Page

    AMCP 706 412

    3-

    1

    3- 2

    3-3

    3-4

    3-5

    3-6

    3-7

    3-8

    3-9

    3-10

    3-1 1

    3-12

    3-1 3

    3-1 4

    3-15

    3-16

    3-17

    3-18

    3-19

    3-20

    3-21

    3-22

    3-23

    A

    Theoretical Susceptibility Curve for Purposes

    of Illustration

    Susceptibility Curves Showing the Effect of

    Changing One Parameter

    Relation Between A1 and Various Measures of

    Speech Intelligibility

    Bands of Equal Articulation Index

    Relationship Between Percentage of Words Cor-

    rectandSNR

    Basic Communications System.

    The Michigan Diamond Map No.

    4

    for Six-Town

    Routes

    Comparison of Map Test and Intelligibility Score

    Test for an Audio Channel With Additive

    Gaussian Noise.

    Effect of Variations of Signal Jamming and

    Receiver Parameters on J / S

    Typical Teletypewriter Printouts

    Character Error Probability as a Function of Bit

    Error Probability for Two Teletype Codes

    Ratio of Jamming-Signal Strength to Desired-

    Signal Strength

    OnQff Keying Receiver

    Two-Filter FSK Receiver

    Coherent PSK and Differentially Coherent PSK

    Receivers

    F M

    Receiver Output Signal and Noise vs Input

    F M Carrier-to-Noise Power Ratio the Noise

    Power Taken in a Fixed 6.8-kHz Bandwidth

    Receiver Output vs Input Signal-to-Noise Ratios

    Input Noise Power Taken in a Fixed 6.8-kHz

    Bandwidth

    Receiver Output vs Input Signal-to-Noise Ratios

    With Input Noise Power the Total Power Enter-

    ing the Receiver and the Input Signal Power

    Being the Peak Envelope Power

    Probability of Bit Error for Coherent Nonco-

    herent and Differentially Coherent Reception.

    Error Probability for Orthogonal Signals k

    =

    Bit Error Probability for Orthogonal Signals

    Pulsed Interference to a Narrowband

    AM

    Voice

    Pulsed Interference to a Narrowband

    AM

    Voice

    1,2

    k = , 2 .

    Receiver Example

    1

    Receiver Example 2

    3-8

    3 10

    3-13

    3-14

    3-15

    3-16

    3-16

    3-17

    3-21

    3-25

    3-26

    3-28

    3-30

    3-30

    3-31

    3-35

    3-36

    3-38

    3-41

    3-42

    3-43

    3-46

    3-47

    x

    http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/
  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    4/124

    AMCP

    706412

    U)

    LIST OF ILLUSTRA TIONS

    (Con t .)

    Fig. No. Title

    Page

    3-24

    3-25

    3-26

    3-27

    3-28

    3-29

    3-30

    3-31

    3-32

    3-33

    3-34

    3-35

    3-36

    3-37

    3-38

    3-39

    3-40

    3-41

    3-42

    3-43

    3-44

    3-45

    3-46

    Pulsed Interference to

    a

    Narrowband

    FM

    Voice

    Receiver

    Susceptibility Data for Single-ChannelF M

    Voice

    Susceptibility Data for Single-Channel SSBSC

    Susceptibility Data for Single-Channel

    AM

    Voice

    Susceptib ility Data fo r Single-Channel CW

    Susceptibility Data for Single-Channel FSK

    Results of Continuous

    FM

    by Noise Jamming

    Against Single-Channel

    F M

    Voice, Receiver

    Not Detuned

    Results of Continuous F M by Noise Jamming

    Against Single-Channel F M Voice, Receiver

    Detuned

    Results of Continuous

    F M

    by Wideband Noise

    Jamming A gainst Single-ChannelF M Voice,

    Receiver Detun ed.

    Sum mary of Results of Timeshared FM by N ar-

    rowba nd N oise, Receiver On-Tuned

    Effect of Timesharing Rate on F M by Narrow-

    band N oise Performance

    Results of Timeshared

    F M

    by N arrowband Noise,

    Receiver Detuned

    Results of Timeshared F M by Wideband Noise

    Susceptibility Data f or AN/GRC-103-TDD-660,

    C ond i t ion1

    Susceptibility Data for AN/GRC-103-TDD-660,

    C ond i t ion2

    Susceptibility Data fo r AN/GRC-103-TDD-660,

    Condition 3

    Susceptibility Data for AN/GRC-103-TDD-660,

    C ond i t ion4

    Susceptibility Data for AN/GRC-143, AN/TCC-

    45, Conditon 1

    Susceptibility Data for AN/GRC-143, AN/TCC-

    45, Condition 2

    Suscep tibility Data for A N/GR C-143, AN/TCC-

    45, Condition

    3

    Susceptibility Data for AN /GRC-143, AN/TCC-

    45, Condition 4

    F M Characteristics for FDM/FM 12 -,2 4, 60 -,

    and 120-Voice Channels With Preemphasis

    Nomogram for Determination of Apparent Pow er

    Gain

    G

    in dB ) of a Parabolic R eflecto r.

    3-48

    3-49

    3-50

    3-51

    3-52

    3-53

    3-54

    3-57

    3-58

    3-59

    3-60

    3-61

    3-62

    3-65

    3-66

    3-67

    3-68

    3-69

    3-70

    3-71

    3-72

    3-75

    3-82

    http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/
  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    5/124

    AMCP 706412

    Fig.

    No.

    3-47

    3-48

    3-49

    3-50

    3-51

    3-52

    3-53

    (U) LIST

    OF

    ILLUSTRATIONS

    (Con t.)

    Title Page

    Average Antenna Patterns Parabolic Dishes and

    A Hypothetical Antenna Pattern for Use in a

    Cumulative Sidelobe Distribution Function.

    Example of Propagation

    Loss

    Results Obtained

    from Computer Method Described

    in

    ESSA

    Tech. Rept. ERL 79-ITS 67

    Corner Reflectors.

    3-81

    omputer Program 3-85

    3-86

    3-88

    ample Problem- Accessibility.

    3-93

    ploy men t 3-97

    Example of EW Threat Model Equipment De-

    ulnerability Evaluation Flow Chart 3-101

    http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/
  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    6/124

    MCP70641

    1

    U)

    LIST OF T BLES

    Table No. Title Page

    1-1

    B-2

    B-3

    EW Spectrum

    1-5

    Direction Finders and Target Acquisition Sets

    Intercept Receivers and D irection Finders

    B-1

    COMINT Equipment

    B-2

    Com munications ESM)

    B-3

    Noncom munications ECM)

    B 5

    B-7

    -4

    ELINT ESM Equipment

    B-5 Nonexpendable Soviet Ground-Based Jammers B-9

    xiii/xiv

    http://82050_01.pdf/http://82050_apdx02.pdf/http://82050_apdx02.pdf/http://82050_apdx02.pdf/http://82050_apdx02.pdf/http://82050_apdx02.pdf/http://82050_apdx02.pdf/http://82050_apdx02.pdf/http://82050_apdx02.pdf/http://82050_apdx02.pdf/http://82050_apdx02.pdf/http://82050_01.pdf/
  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    7/124

    MCP706-41

    U)

    LIST OF T BLES

    Table

    No

    3-1

    3-2

    3-3

    3-4

    3-5

    3-6

    3-7

    3-8

    3-9

    3-10

    3-11

    3-12

    3-1 3

    Title Page

    Signal and Receiver Parameters

    Articulation Score in a Bandlimited Audio Chan-

    nel With Additive White Gaussian Noise for the

    SameJ S p

    = l o

    dB That Results in a Map

    Time

    of 20

    sec

    Susceptibility of Singlechannel Voice Com-

    munications

    ECM Performance Against

    FSK F l )

    and DFSK

    F6) 1OO-wpm Radio teletype

    Timeshared FM by Narrowband Noise Compari-

    s o n s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Timeshared FM by Wideband Noise Compari-

    s o n s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Theoretical and Experimental Results of Jamming

    Antenna Directivity Values

    Power Gain G and Effective Area A of Several

    Common Antennas

    Summary of Propagation Equations

    Hypothetical Signal Intercept Systems

    Hypothetical ECM Equipment.

    Some EW Simulations

    TDM/PPM-AM

    3-1

    1

    3-18

    3-44

    3-56

    3-63

    3-64

    3-73

    3-80

    3-81

    3-89

    3-99

    3-99

    3-100

    http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03b.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03b.pdf/http://82050_03a.pdf/http://82050_03a.pdf/
  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    8/124

    AMCP

    706 41

    PREFACE

    The Engineering Design Handbook Series of the

    US

    Army Materiel

    Command is a coordinated series of handbooks containing basic informa-

    tion and fundamental data. Th e hand boo ks are authoritative reference

    books of practical information and quantitative facts helpful in the de-

    sign and development of materiel that will meet the tactical needs of the

    Armed Forces.

    The objectives

    of

    this handb ook series are: 1) to collect diverse

    sources of information unique t o the determination of the vulnerability

    to electronic warfare

    o

    all types of communication-electronic and elec-

    tro-optical equ ipment/system s, exclusive of guided missiles, in o rde r to

    conserve time, materials, and money in the successful design of new

    equip men t; 2) t o provide guidance in capsule form for new personnel,

    Armed Forces co ntrac tors, or experienced design engineers in ot he r fields

    who require information about vehicle electrical systems; 3) to supply

    current fundamental inform ation; and 4) t o place the reader in a position

    tion to use new information generated subsequ ent t o the publication of

    this handbook. T o meet these objectives, the hand book has been written

    to provide the necessary b ackgroun d regarding t he vulnerability

    of

    mili-

    tary electromagnetic systems to electronic warfare EW).

    This h and bo ok series includes chapters o n basic concep ts of vulnerabil-

    ity and computational methods for determining the EW vulnerability of

    tactical and satellite communications, surveillance and target acquisition

    radars, avionics, and electro-optical system s. Th e series consists of six

    separate handbooks, i.e.,

    1. AM C P 70641 1 Chapter

    1

    and 2

    2.

    AMCP 706-412 Ch apte r 3

    3. AMCP 7 06 41 3 Chapte r

    4 AMCP 706-414 Chap ter 5

    5 AM C P 7064

    1

    5 Chapter 6

    6. AMCP 706-4 16 Ch apte r 7.

    Th e various handbo oks are designed t o be ordered and used separately;

    however, i t is recommended tha t AMCP 70 6 4 1 -which provides the in-

    trod uct ion and general approach t o EW vulnerability-be ordered t o ac-

    comp any the particular chapter s) of interest. An index of th e com ple te

    series

    s

    contained in each hand book . An abbreviated Table of Con tents

    of the other handbooks of the series is contained in each of the separate

    handbooks.

    This handbook was prepared by the Electronic Defense Laboratories of

    GTE Sylvania, Mountain View, CA. under subco ntract t o th e R esearch

    Triangle Institute, Research Triangle Park, NC, prime contractor to the

    US Army M zteriel Com mand . Mr. Ro bert St on e, GTE Sylvania, served

    xv

  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    9/124

    AMCP 706 411

    as Project Leader. Technical guidance and co ordin ation were provided by

    a committee under the direction of Mr. Simon Cohen, Electronic Warfare

    Laboratories, US Army Electronics Command, Ft. Monmouth, NJ.

    Th e Engineering Design Ha ndb ook s fall into t w o basic categories-those

    approved for release and sale, and those classified for security reasons.

    Th e US Army Materiel Comman d policy is to release these E ngineering

    Design Handb ooks in accordance w ith current DOD Directive 723 0.7,

    dated 18 Sep tem ber 1973 . All unclassified Han dbo oks can be obtaine d

    from the National Technical Informa tion Service NTIS). Procedures for

    acquiring these Handbooks follow

    a. All Depa rtme nt of Army activities having need fo r the H andbooks

    must su bmit their request on an official requisition form DA Form 17,

    dated Jan 70) directly to:

    Commander

    Let terkenny Army D epot

    Chambersburg, PA 172 0

    ATTN: AMXLE-ATD

    Requ ests for classif ied docu men ts must be s ubm itted, with appropriate

    Need t o Know justif ication, t o Letterkenny Army D epot.) DA activi-

    ties will not requisition Handbooks for further free distribution.

    b. All oth er requestors-DOD , Navy, Air Forc e, Marine Corps, non-

    military Governm ent agencies, co ntrac tors, private ind ustry , individuals,

    universities, and others-must purchase these Ha ndb ook s fro m:

    National Technical Information Service

    Department of Commerce

    Springfield, VA 22 15 1

    Classified documents may be released on a Need to Know basis veri-

    fied by an official Department of Army representative and processed

    from Defense Doc ume ntation Center DDC), ATTN: DDC-TSR,

    Cameron Station, Alexandria, VA 2231 4.

    Com men ts and suggestions on this Hand book are welcome and should

    be addressed to:

    Commander

    U

    Army Materiel Development nd

    Readiness Com mand

    Alexandria, VA 22 33 3

    DA Forms 2028 , Recommended Changes t o Publications, which are

    available through normal publications supply channels, may be used for

    comments/suggestions.)

    xvi

  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    10/124

    AMCP 70641

    1

    DEPARTMENT OF THE ARMY

    HEADQUARTERS UNITED STATES ARMY MATERIEL COMMAND

    500 1 Eisenhower Ave, Alexandria, V A 22333

    AMC PAMPHLET

    NO. 706-411

    5 JANUARY 1976

    ENGINEER ING DESIGN HANDBOOK

    A ND ELECTRO-OPTICAL SYSTEMS (Except Guided

    Missiles) TO ELECTRONIC WARFA RE SERIES

    VULNERABI L l T Y

    OF

    COMMUNICATION-ELECTRONIC

    PART ONE

    INTRODUCTION AND GENERA L APPROACH TO

    ELECTRONIC WARFA RE VULNERA BIL ITY

    TAB LE O F CONTENTS

    Paragraph Page

    LIST OF ILLUSTRATIONS

    ................

    xi

    LIST OF TABLES

    .......................

    x1n

    PREFACE .............................

    xv

    ...

    C) CHAPTER

    1.

    INTRODUCTION U)

    1-1

    1-1.1

    1-1.2

    1-1.3

    1-1.4

    1-1.4.1

    1-1.4.2

    1-1.4.3

    1-1.4.4

    1-1.4.5

    1-1.4.6

    Background of the Vulnerability Handbook

    . . . .

    General

    ...............................

    Purpose

    ...............................

    Scope

    .................................

    Handbook Content ......................

    Introduction to the Vulnerability Handbook

    Chapter 1)

    ..........................

    General Approach to Vulnerability of

    Communication-Electronicand Electro-

    Optical Systems to EW Chapter

    2) . . . . . . . .

    EW Vulnerability of Tactical Communications

    Chapter

    3) ..........................

    EW Vulnerability of Ground-Based and

    Airborne Surveillance and Target Acquisition

    Equipment Chapter

    4 ) .................

    EW Vulnerability

    of

    Avionics Chapter

    5

    Optical/Electronic Warfare Vulnerability of

    Electro-Optic Systems Chapter 6)

    ........

    1-1

    1-1

    1-1

    1-2

    1-2

    1-2

    1-2

    1-3

    1-3

    1-3

    1-4

    1

    http://82050_loi.pdf/http://82050_lot.pdf/http://82050_pref.pdf/http://82050_lot.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_pref.pdf/http://82050_lot.pdf/http://82050_loi.pdf/
  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    11/124

    MCP706411

    TAB LE OF CONTENTS

    (Con t.)

    Paragraph

    1-1.4.7

    1-2

    1-2.1

    1-2.2

    1-2.3

    1-2.3.1

    1-2.3.1.1

    1-2.3.1.2

    1-2.3.1.3

    1-2.3.2

    1-2.3.2.1

    1-2.3.2.2

    1-2.3.3

    1-2.3.3.1

    1-2.3.3.2

    1-2.3.4

    1-2.3.5

    1-2.4

    1-2.4.1

    1-2.4.2

    1-2.4.3

    1-3

    1-4

    1-4.1

    1-4.2

    1-4.3

    1-4.4

    1-4.5

    1-4.6

    1-5

    EW Vulnerability of Satellite Communications

    (Chapter

    7) ..........................

    Electronic Warfare ........................

    Definition

    .............................

    Brief History of Electronic Warfare

    ..........

    Elements of Electronic Warfare

    Electronic Warfare Support Measures ESM)

    Target Intercept

    Target Identification

    ...................

    Target Location

    .......................

    Electronic Countermeasures (ECM)

    . . . . . . . . .

    Jamming

    ............................

    Deception

    Electronic CounterCountermeasures

    (ECCM) .............................

    Anti-ECM

    ...........................

    Anti-ESM

    Signal Intelligence (Sigint) . . . . . . . . . . . . . . . .

    Signal.Security (Sigsec)

    ..................

    Application of Electronic Warfare ...........

    Employment

    ..........................

    Deployment

    ...........................

    Intelligence Coordination

    ..................

    Most Pertinent Publications on Electronic

    Warfare Guidance .......................

    Communications-Electronics Electronic

    Warfare (AR 105-87) ...................

    Electronic Counter-Countermeasures(ECCM)

    Electromagnetic Cover and Deception (EC D)

    Electronic Warfare

    FM 32-20)

    . . . . . . . . . . . . .

    Electronic Countermeasures Handbook

    Adaptability

    ..........................

    AR105-2)

    (AR

    105-5) ...........................

    FM

    32-20-1) .........................

    Foreign Intelligence Office Handbook ........

    Glossary of Terms Associated With Vulnerability

    Assessment

    Bibliography

    ............................

    Page

    1-4

    1-4

    1-4

    1-5

    1-6

    1-6

    1-7

    1-7

    1-7

    1-7

    1-8

    1-8

    1-8

    1-8

    1-8

    1-9

    1-9

    1-9

    1-9

    1 10

    1 11

    1-11

    1-12

    1-12

    1-12

    1-12

    1-12

    1-12

    1-12

    1-12

    1-22

    S) CHAPTER

    2.

    GENERAL APPROACH TO VULNERABILITY

    OPTICAL SYSTEMS TO ELECTRONIC WARFARE

    OF COMMUNICATION-ELECTRONIC AND ELECTRO-

    LIST OF ABBREVIATIONS

    . . . . . . . . . . . . . . .

    2-1

    LIST OF SYMBOLS

    ......................

    2-2

    http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/
  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    12/124

    AMCP

    706-41

    1

    TABLE OF CONT ENTS (Con t.)

    Paragraph

    2-1

    2-2

    2-2.1

    2-2.2

    2-2.3

    2-2.3.1

    2-2.3.2

    2-2.3.3

    2-3

    2-3.1

    2-3.2

    2-3.3

    2-3.4

    2-3.5

    2-4

    2-4.1

    2-4.2

    2-4.3

    2-4.4

    2-4.5

    Introduction

    ............................

    The Philosophy of Vulnerability to Electronic

    Warfare ...............................

    Perspective ............................

    The Primary Factors of EW Vulnerability

    Evaluation

    ...........................

    Technical and Operational Vulnerability

    Analysis .............................

    General

    ..............................

    Distinctions Between Technical EW

    Vulnerability Analysis and Operational

    EW Vulnerability Analysis

    ...............

    Technical EW Vulnerability

    ...............

    EW Threat Precepts

    .......................

    General ...............................

    EW 'Ihreat

    .............................

    Tactical ECM

    actical SIGINT/ESM

    ....................

    Tactical Electro-Optical Warfare ............

    Purposes ..............................

    Application of Models in EW

    ...............

    Models of the EW Environment for Analysis

    General

    ...............................

    Electromagnetic Target Arrays (Tarays) . . . . . .

    Propagation Models

    ......................

    TerrainModels

    .........................

    References .............................

    A-1

    A-1.1

    A-1.2

    A-1.3

    A-1.4

    A-2

    A-2.1

    A-2.2

    A-2.3

    A-3

    A-3.1

    A-3.2

    APPENDIX A EW-RELATED SIMULATION PACKAGES

    Page

    2-3

    2-3

    2-3

    2-3

    2-6

    2-6

    2-7

    2-7

    2-9

    2-9

    2-10

    2-10

    2-11

    2-11

    2-13

    2-13

    2-13

    2-14

    2-16

    2-19

    2-19

    EW System Analysis Models

    ................

    A-1

    ACCESS Systems ....................... A-1

    USAEPG/EMETF Model ..................A-2

    ALLEN Models ......................... A-3

    Electro-Optical Models

    . . . . . . . . . . . . . . . . . . .

    A-4

    Message-Routing Models

    ...................

    A-6

    The Hughes MALLARD Simulation . . . . . . . . .A-6

    IBM ARTSS and MASS Simulations .........A-8

    GTE Sylvania-SES-East AMCN Program

    .....

    A-8

    OtherModels ........................... A-8

    COMMEL Model

    ........................

    A-8

    CRESS ............................... A-9

    APPENDIXB CURRENT THREAT

    . . . . . . . . .

    B-1

    ...

    111

    http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx02.pdf/http://82050_apdx02.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx02.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/
  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    13/124

    AMCP

    708411

    TABLE

    OF

    CONTENTS

    (Con t.)

    Paragraph Page

    C) CHAPTER 3 ELECTRONIC WARFARE VULNERABILITY

    OF TACTICAL COMMUNICATIONS U)

    3-1

    3-1.1

    3-1.2

    3-2

    3-2.1

    3-2.2

    3-2.3

    3-2.4

    3-3

    3-3.1

    3-3.2

    3-3.3

    3 -4

    3-4.1

    3-4.2

    3-4.3

    Introduction

    Scope

    Outline of the Methodology

    ECM Susceptibility Levels

    Susceptibility

    Susceptibility of Tactical Communication

    Equipment

    Susceptibility of Trunk Communication

    Susceptibility Sample Problems

    Discussion of Vulnerability

    Equipment

    Vulnerability

    Accessibility and Interceptibility

    Vulnerability of a Communication

    Link

    Programs

    Introduction

    EW Threat Models

    Vulnerability Simulation Programs

    References

    EW Threat Models and Vulnerability Simulation

    3-6

    3-6

    3-6

    3-8

    3-8

    3-34

    3-56

    3-74

    3-76

    3-76

    3-77

    3-88

    3-94

    3-94

    3-94

    3-96

    3-101

    (S) CHAPTER 4 ELECTRONIC WARFARE VULNERABILITY

    AND TARGET ACQUISITION RADARS U)

    OF GROUND-BASED AND AIRBORNE SURVEILLANCE

    4- 1

    4-2

    4-2.1

    4-2.2

    4-3

    4-3.1

    4-3.2

    4-4

    4-4.1

    4-4.2

    4-5

    4-5.1

    4-5.2

    Introduction

    Ground-Based Personnel and Vehicle-Detection

    Radars

    System Description

    Vulnerability

    Ground Mapping

    Vulnerability

    Weapon-Location Radars

    System Description

    Vulnerability

    Meteorological Radars

    System Description

    Vulnerability

    References

    Airborne Radar for Vehicle Detection and

    System Description

    4-2

    4-3

    4-3

    4-6

    4-25

    4-25

    4-26

    4-28

    4-28

    4-30

    4-39

    4-39

    4-39

    4-40

    iv

  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    14/124

    AMCP

    706411

    TABLE

    O

    CON TENTS (Con t.)

    Paragraph Page

    (S) CHAPTER 5 ELECTRONIC WARFARE VULNERABILITY

    O F AVIONICS (U)

    5-1

    5-1.1

    5-1.2

    5-2

    5-2.1

    5-2.2

    5-2.3

    5-3

    5-3.1

    5-3.2

    5-4

    5

    -4.1

    5-4.2

    c 1

    c-1.1

    c-1.2

    C- 1.3

    C- 1.4

    c -2

    c-2.1

    c-2.2

    c 3

    D- 1

    D-2

    D-3

    D-4

    D-5

    D-6

    Introduction

    Scope

    General Conten t

    EW Threat

    to

    Avionics

    Establishing th e Thre at

    Threat Equipment General Capabilities-Present

    a ndF u t u re

    Thre at Doctrine and Tactics

    EW Vulnerability of Avionic Equip men t

    Vulnerability Investigations

    Results

    of

    Typical Vulnerability Investigations

    Missions

    Development

    of

    Analysis Proced ure

    Illustration of t he Vulnerability Analysis

    Procedure

    References

    The Imp act of EW Vulnerability on A irmobile

    APPENDIX C THEORETICAL SUSCEPTIBILITY O F

    NAVIGATION EQUIPMENT (AN/ARN-92

    LORAN-D RECE IVER)

    Susceptibility During Search

    Receiver Operation During Search

    Nonco herent ECM-Search

    Coherent ECM-Search

    Conclusions Regarding Search Susceptibility

    Susceptibility During Track

    Noncoherent ECM-Track

    Coherent ECM-Track

    AN/ARN-92 LORAN Phase Tracking Loops

    5-5

    5 5

    5-6

    5-6

    5-6

    5-7

    5-7

    5-8

    5-8

    5-33

    5-58

    5-60

    5-73

    5-82

    c

    1

    c 1

    C-6

    c-11

    C-15

    C-16

    C-16

    c-20

    C-29

    APPENDIX D

    THEORETICAL SUSCEPTIBILITY O F A

    MULTIFUNCTION SYSTEM (HELMS)

    Target Powe r D-

    1

    Susceptibility Criteria D-4

    Sensitivity Due t o Receiver Noise D-8

    Susceptibility t o CW an d FMCW Jamm ing D-8

    Susceptibility

    to

    Direct Noise Amplification

    (DINA) Jamm ing D-9

    Susceptibility to Repeater Jamming

    D- 10

    V

  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    15/124

    AMCP 706-411

    TABLE

    OF CONTENTS (Con t.)

    Paragraph Page

    APPENDIX E. SUSCEPTIBILITY OF VARIABLE PARAMETER

    TERRAIN-AVOIDANCE RADAR (VPTAR)

    E- 1

    E-2

    E-2.1

    E-2.2

    E-2.3

    E-2.4

    E-2.5

    E-2.6

    E-3

    E-3.1

    E-3.2

    E-4

    F

    F-2

    F 3

    6 1

    6-1.1

    6- 1.2

    6-2

    6-2.1

    6-2.2

    6-2.3

    6-2.4

    6-2.5

    6-2.6

    6-3

    Suscep tibility Criteria E- 1

    Susceptibility E- 1

    tion (DINA) Jamming E-2

    Jamming Signals E-5

    Sensitivity Limitation Due t o Receiver Noise E-1

    Susceptibility D ue t o Direct Noise Am plifica-

    Susceptibility t o Spot Continuous-Wave (CW)

    Suscep tibility to Pulsed CW Jamm ing S ignals.

    E-6

    Continuous-W ave (AMCW) Jamm ing Signals E-6

    Continuous-Wave (FMCW) Jamm ing Signals E-7

    Variable Param eters E-8

    Power Transm itted E-8

    Transmitted Frequency E-8

    Conclusions and Reco mm endation s E-8

    Susceptibility

    to

    Amplitude-Modulated

    Susceptibility to Frequency-M odulated

    Sensitivity of VPTAR ECM Vu lnerability to t he

    APPENDIX F. EQUIPMENT OPERATIONAL

    CHARACTERISTICS

    LORAN-D Airbo rne Receiver Charac teristics F-1

    HELMS Characteristics F-3

    VPTAR Characteristics F-5

    (S)

    CHAPTER 6.OPTICAL/ELECTRONIC WARFARE

    SYSTEMS (U)

    WL NER ABIL ITY OF ELECTRO-OPTIC

    Introduction 6-5

    Chapter Contents

    6 6

    Terminology 6-6

    6-

    9

    System Definitions 6-

    1

    ulnerability of EO Systems

    Criteria fo r Effective O peration of V ictim

    6-

    1

    ystems

    hre at Analysis 6-20

    Susceptibility of EO Equip men ts 6-33

    Interceptibility a nd Accessibility of E O

    Systems 6-69

    Feasibility of Optical-E lectronic Warfare 6-133

    Optical/Electronic Counter-Countermeasures 6-154

  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    16/124

    AMCP

    706-41

    1

    TA B LE OF CONTENTS (Con t.)

    Paragraph

    Page

    6-3.1 Red uction of Multiple Optical Intern al

    eflections 6- 15 4

    6-3.2 Reduction of Potential Precursor Signals 6-155

    Damage 6-159

    6-3.4 Optical Aug mentation 6-161

    6-3.5 Misce llaneous Design Approaches 6- 167

    References 6- 167

    6-3.3

    Hardening of Certain IR Detectors Against

    S )

    CHAPTER 7 LECTRON IC WARFARE VULN ERABILITY

    OF SATE LLITE COMMUNICATIONS (U)

    7- 1

    7-2

    7-2.1

    7-2.2

    7-2.3

    7-2.4

    7-2.5

    7-3

    7-3.1

    7-3.2

    7-3.3

    7-3.4

    7-4

    7-4.1

    7-4.2

    7-4.3

    7-4.4

    G- 1

    G-2

    G-2.1

    G-2.2

    G-3

    G-3.1

    G-3.2

    G-4

    G-4.1

    Introduction

    Satellite Comm unication System

    Introduction

    Space Subsystem

    Satellite Transponder

    Earth Term inal Subsystem

    Secondary System Characteristics/

    Considerations

    Satellite Communication System V ulnerability

    Introduction

    Basic Tool Requirements

    Design Aids

    Vulnerability E xamples

    Increased ERF

    Receiving Antenna Directivity/Sidelobe

    Reduction

    Spread-Spectrum Techniques

    Oth er ECM Strategies

    References

    Bibliography

    Satellite Antijamming Techniques

    APPENDIX G ATELLITES

    7-7

    7-7

    7-7

    7-11

    7-23

    7-28

    7-40

    7-57

    7-57

    7-61

    7-62

    7-109

    7-110

    7-1 10

    7-1 14

    7-1 14

    7-115

    7-1 16

    7-1 17

    General G-1

    Initial Defense Communications Satellite

    Program (1DCSP)-DCS Phase I G- 1

    Space Subsystem. Gene ral G- 1

    Satellite Transponder G- 1

    DCSC Phase I1 Satellite

    G-5

    Space Subsystem. Gene ral G-5

    Satellite Transponder G-6

    TACSAT G-8

    Space Subsy stem. Gene ral G-8

  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    17/124

    AMCP 70641

    1

    TABLE

    OF

    CONTE NTS (Cont.)

    Paragraph Page

    G-4.2

    G-5

    G-5.1

    G-5.2

    G-6

    G-6.1

    G-6.2

    G-7

    G-7.1

    G-7.2

    H- 1

    H-2

    H-3

    H-4

    H-5

    H-6

    H-7

    H-8

    H-9

    H-10

    H-11

    H-12

    I-

    1

    1-2

    1-3

    1-4

    1-5

    1 6

    1 7

    J

    1

    5-2

    5 2.1

    5-2.2

    5-2.3

    TACSAT Transpo nder G-9

    SKYNET G-11

    General G-11

    SKYNFT Satellite Transponder

    G-17

    NATO G-18

    General G-18

    NATO Transponder G-20

    INTELSAT G-20

    General G-20

    INTELSAT IV Transponder G-20

    APPENDIX H. EART H TERMINALS

    General

    AN/FSC-9

    AN/MSC46

    AN/MSC-54

    AN/MSCdO, Heavy Transportable (HT)

    AN/MSC-6 1, Medium Transportable (MT)

    SCT-21

    AN/TSC-80

    AN/MSC-57

    Diplomatic Telecomm unications Service (DTS)

    Major Ship Satellite Terminal (MASST)

    AN/TSC-86 (LT)

    APPENDIX I. PHASE I

    H- 1

    H- 1

    H- 1

    H-6

    H-10

    H-12

    H-12

    H-15

    H-15

    H-16

    H-19

    H-19

    Background and Co nce pt. I- 1

    System Description 1-1

    Mo dulation Characteristics 1-4

    Spacecraft 1-6

    Com puter-T oCo mp uter Comm unications 1-6

    Link Configu ration 1-7

    CS Interfa ce 1-7

    APPENDIX J. PHASE I1

    Program D escription J-1

    Requirements fo r Stage 1a Ear th Terminals J-2

    Requirements for Stage 1b Earth Terminals

    J 5

    Requirements for Stage 1c Ea rth Terminals J-5

    Eq uip me nt Aspects 5-2

    viii

  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    18/124

    AMCP 706411

    TABLE OF CONTENTS (Con t.)

    Paragraph Page

    APPENDIX K. OTHER COMMUNICATION SATELLITE SYSTEMS

    K-

    K-1.1

    K-1.2

    K-2

    K-3

    ir

    Force Satellite Communication System

    AFSCS)

    K-1

    General Description

    K-

    Missions Served K-1

    Mini Communications Satellite System

    K-

    12

    Concealment LES 8/91

    K- 3

    APPENDIX L. SPACE GROUND LINK SYSTEM

    INDEX IND-1

    ixlx

  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    19/124

    AMCP 706 412

    DEPARTMENT OF THE ARMY

    HEADQUARTERS UNITED STATES ARMY MATERIEL COMMAND

    5001

    Eisenhower Ave, Alexandria, VA

    333

    AMCP PAMPHLET

    NO. 706 412

    6

    January

    1976

    ENGINEERING DESIGN HANDBOOK

    VU LNERABI I Y 0F COM MUNI ATION L ECT RONI

    AND ELECTRO-OPTICALSYSTEMS EXCEPT GUIDED

    MISSILES) TO ELECTRONIC WARFARE SERIES

    PART TWO

    ELECTRONIC WARFARE VULNERABILITY OF

    TACTICAL COMMUNlCATl ONS

    TABLE OF CONTENTS

    Paragraph

    Page

    LIST OF ILLUSTRATIONS . . . . . . . . . . . . . . . . x

    LIST OF TABLES.

    .......................

    xv

    PREFACE

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    xvii

    (C) CHAPTER 1. INTRODUCTION (U)

    1-1

    1-1.1

    1-1.2

    1-1.3

    1-1.4

    1-2

    1-2.1

    1-2.2

    1-2.3

    1-2.4

    1-3

    1-4

    1-4.1

    1-4.2

    1-4.3

    Background of the Vulnerability Handbook

    . . . .

    General

    Purpose

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Scope

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Handbook C ontent.

    Electronic Warfare

    ........................

    Definition

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Brief History of Electronic Warfare

    . . . . . . . . . .

    Elements of Electronic Warfare . . . . . . . . . . . . .

    App lication of Electronic W arfare

    . . . . . . . . . . .

    Intelligence Coordination. . . . . . . . . . . . . . . . . . .

    Most Pertinent Publications on Electronic

    Warfare Guidance

    Communication-Electronic Electronic Warfare

    Electronic Counter-Countermeasures (ECCM)

    Electromagnetic Cover and Deception (EC D)

    (AR 105-87)

    . . . . . . . . . . . . . . . . . . . . . . . . . .

    (AR 105-2)

    . . . . . . . . . . . . . . . . . . . . . . . . . . .

    (AR 105-5) . . . . . . . . . . . . . . . . . . . . . . . . . . .

    1-1

    1-1

    1-1

    1-2

    1-2

    1-4

    1-4

    1-5

    1-6

    1-9

    1-11

    1-12

    1-12

    1-12

    1-12

    i

  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    20/124

    AMCP 706412

    T A B L E OF CONT ENTS (Con t.)

    Paragraph

    Page

    1-4.4

    1-4.5

    1-4.6

    1-5

    Electronic W arfare (FM 32-20)

    . . . . . . . . . . . . .

    1

    2

    Electronic Countermeasures Handbook (FM

    32-20-1)

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    1-12

    Foreign Intelligence Office Handboo k . . . . . . . .

    1

    2

    Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2

    Glossary

    of Terms A ssociated With V ulnerability

    Bibliography

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    1 2

    (S)

    CHAPTER 2 GENERAL APPROACH TO VULNERABILITY OF

    SYSTEMS TO ELECTRON IC WA RFARE (U)

    COMMUNICATION-ELECTRONIC AND ELEC TRO OPTICA L

    2- 1

    2- 2

    2-2.1

    2-2.2

    2-2.3

    2-3

    2-3.1

    2-3.2

    2-3.3

    2-3.4

    2-3.5

    2-4

    2-4.1

    2-4.2

    2-4.3

    2-4.4

    2-4.5

    Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . .

    The Philosophy of Vulnerability of Electronic

    Warfare

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Perspective

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Th e Primary Facto rs of EW Vulnerability

    Evaluation

    . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Technical and O perational Vulnerability

    Evaluation

    . . . . . . . . . . . . . . . . . . . . . . . . . . .

    EW Threat Precepts

    . . . . . . . . . . . . . . . . . . . . . . .

    General

    EW Threat

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Tactical SIGINT/ESM

    Tactical ECM

    . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Tactical Electro-Optical Warfare . . . . . . . . . . .

    Models of the EW E nvironm ent for Analysis

    Purposes

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Application of Models in EW

    . . . . . . . . . . . . . . .

    Electromagnetic Target Arrays

    . . . . . . . . . . . . .

    Propagation Models

    . . . . . . . . . . . . . . . . . . . . .

    Terrain Models

    . . . . . . . . . . . . . . . . . . . . . . . . .

    References . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    2-3

    2-3

    2-3

    2-3

    2-6

    2-9

    2-9

    2-10

    2-10

    2-11

    2-11

    2-13

    2-13

    2-13

    2-14

    2-16

    2-18

    2-19

    APPENDIX A

    .

    EW-RELATED SIMULATION PACKAGES

    A- 1

    A-1.1

    A-1.2

    A-1.3

    A-1.4

    A-2

    A-2.1

    A-2.2

    A-2.3

    EW Sys tem Analys is Models A-

    ACCESS Systems

    . . . . . . . . . . . . . . . . . . . . . . .

    A- 1

    USA EPG/EM ETF Model A-2

    ALLEN Models

    . . . . . . . . . . . . . . . . . . . . . . . . .

    A-3

    Electro-Optical Models A-4

    Message-Routing Models . . . . . . . . . . . . . . . . . . . A-6

    The Hughes MALLARD Simulation

    . . . . . . . . .

    A-6

    IBM

    ART SS and MASS Simulation

    . . . . . . . . .

    A-8

    GTE Sylvania-SES-East AMCN Program

    . . . . . .

    A-8

    11

  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    21/124

    AMCP 706 412

    T A B L E

    OF

    CONTENTS (Con t . )

    Paragraph Page

    A-3

    Other

    Models

    . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    A-8

    A-3.1 COMM EL Model A-8

    A-3.2 CRESS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-9

    APPENDIX

    B

    . C U R R E N T T H R E A T

    . . . . . . . . . B-

    C) CHAPTER 3

    .

    ELECTRONIC WARFARE VULNERABILITY

    3- 1

    3-1.1

    3-1.2

    3-2

    3-2.1

    3-2.1.1

    3-2.1.2

    3-2.1.2.1

    3-2.1.2.2

    3-2.1.2.3

    3-2.1.2.4

    3-2.1.2.5

    3-2.1.2.6

    3-2.1.3

    3-2.1.3.1

    3-2.1.3.2

    3-2.1.3.3

    3-2.1.3.4

    3-2.1.4

    3-2.1.4.1

    3-2.1.4.2

    3-2.1.5

    3-2.1.5.1

    3-2.1.5.2

    3-2.1.5.3

    3-2.1.5.4

    3-2.1.6

    3-2.2

    O F

    TACTICAL COMMUNICATIONS (U)

    LIST OF ABBREVIATIONS . . . . . . . . . . . . . . .

    LIST

    O F

    SYMBOLS

    . . . . . . . . . . . . . . . . . . . . . . .

    Introduction

    . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Scope

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Outline of the Methodology

    . . . . . . . . . . . . . . .

    ECM Susceptibility Levels

    . . . . . . . . . . . . . . . . . .

    Susceptibility . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Conditions That Must Be Specified When Ex-

    pressing Susceptibility

    Receiver Performance and Selection of Sus-

    ceptibility Threshold in Terms of Perfor-

    mance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Bit Error Rate BER)

    Intelligibility Testing

    . . . . . . . . . . . . . . . . . . .

    MapTest

    . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Character Error Rate

    . . . . . . . . . . . . . . . . . . .

    Relative Message Delay . . . . . . . . . . . . . . . . .

    Signal-to-Noise Ratio and Related Measures

    Jamming-to-Signal Ratios

    JS).

    . . . . . . . . . . . .

    Measures of

    JS

    . . . . . . . . . . . . . . . . . . . . . . .

    Variation of Required

    JS

    With Signal and

    Equipment Parameters . . . . . . . . . . . . . . . . .

    Processing Gain

    . . . . . . . . . . . . . . . . . . . . . . .

    Environmental

    Noise

    and Interference . . . . .

    Susceptibility Thresholds

    . . . . . . . . . . . . . . . . .

    Discussion of Thresholds . . . . . . . . . . . . . . .

    Selection of Performance Thresholds . . . . . . .

    Causes of Susceptibility

    . . . . . . . . . . . . . . . . .

    Susceptibility in the Receiver Before De-

    tec io n

    Susceptibility in the Receiver During the

    Susceptibility in Ancillary Equipment at the

    Receiver . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Susceptibility of the User Operator)

    . . . . . . .

    Detection Process and Following

    Susceptibility to Deception ECM

    . . . . . . . . . . .

    Susceptibility of Tactical Communication

    Equipment

    3-1

    3-3

    3-6

    3-6

    3-6

    3-8

    3-8

    3-9

    3-9

    3-9

    3-12

    3-16

    3-18

    3-18

    3-18

    3-19

    3-19

    3-19

    3-20

    3-22

    3-23

    3-23

    3-23

    3-27

    3-27

    3-29

    3-31

    3-32

    3-33

    3-34

    iii

    http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/
  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    22/124

    AMCP 706 41

    2

    T A B L E

    OF

    CONT ENTS (Con t.)

    Page

    aragraph

    3-2.2.1

    3-2.2.1.1

    3-2.2.1.2

    3-2.2.2

    3-2.3

    3-2.3.1

    3-2.3.2

    3-2.3.2.1

    3-2.3.2.2

    3-2.4

    3-3

    3-3.1

    3-3.1.1

    3-3.1.2

    3-3.1.3

    3-3.1.4

    3-3.2

    3-3.2.1

    3-3.2.1.1

    3-3.2.1.2

    3-3.2.2

    3-3.2.2.1

    3-3.2.2.2

    3-3.2.2.3

    3-3.2.2.4

    3-3.2.2.5

    3-3.2.3

    3-3.3

    3-3.3.1

    3-3.3.2

    3-3.3.2.1

    3-3.3.2.2

    3-3.3.2.3

    3-4

    3-4.1

    3-4.2

    3-4.2.1

    3-4.2.2

    3-4.2.2.1

    3-4.2.2.2

    Theore ical Susceptibility

    :

    General Curves

    and Equations . . . . . . . . . . . . . . . . . . . . . . . .

    3-34

    Analog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    3-34

    Digital

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-38

    HF.SSB. and VHF-FM 3-42

    ment

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-56

    Susceptibility-Empirical Results . . . . . . . . . . . 3-56

    Special Considerations for Trunk Equipment

    3-56

    Preemphasis/Deemphasis . . . . . . . . . . . . . . .

    3-56

    Threshold Extension by

    F M

    Feedback

    3-74

    Susceptibility Sample Problems

    . . . . . . . . . . . . .

    3-74

    Vulnerability . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-76

    Discussion of Vulnerability

    . . . . . . . . . . . . . . . .

    3-76

    Susceptibility .........................

    3-76

    Accessibility

    . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-77

    Interceptibility

    . . . . . . . . . . . . . . . . . . . . . . . . .

    3-77

    Feasibility . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    3-77

    Accessibility and Interceptibility

    . . . . . . . . . . . . 3-77

    Calculation of Accessibility and Intercepti-

    bility

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-77

    Accessibility

    . . . . . . . . . . . . . . . . . . . . . . . . .

    3-77

    Interceptibility

    . . . . . . . . . . . . . . . . . . . . . . . . 3-78

    Antennas . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    3-78

    Antenna Directivity and Gain

    . . . . . . . . . . . . .

    3-79

    The Receiving Antenna and Effective

    Aperture

    . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-80

    Parabolic Antennas . . . . . . . . . . . . . . . . . . . . 3-81

    Sidelobes

    . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-82

    Sample Problems 3-83

    Propagation Models

    3-85

    Vulnerability

    of

    a Communication Link

    . . . . . . . 3-87

    General

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    3-87

    Sample Problem . . . . . . . . . . . . . . . . . . . . . . . 3-90

    Susceptibility Calculations. . . . . . . . . . . . . . .

    3-91

    Accessibility Calculations

    . . . . . . . . . . . . . . . 3-91

    Susceptibility-Empirical Results for HF.AM.

    Susceptibility of Trunk Communication Equ ip

    Interceptibility Calculations

    3-92

    EW Threat Models and Vulnerability Simulation

    Programs

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-94

    Introduction

    . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-94

    EW Threat Models . . . . . . . . . . . . . . . . . . . . . . . 3-95

    General

    ...............................

    3-95

    Establishing the Current Threat Projection

    . . .

    3-95

    Foreign Science and Technology Center

    . . . . 3-96

    ACSI

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-96

    iv

    http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/
  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    23/124

    AMCP

    706 412

    T A B L E OF CONT ENTS (Con t .)

    Paragraph Page

    3 4.2.2.3

    Fore ign Intelligence Office (FIO )

    . . . . . . . . .

    3 96

    3 4.2.3

    Exam ples of D ata fro m Threat Models . . . . . . 3 96

    3 4.2.3.1

    Equipment

    . . . . . . . . . . . . . . . . . . . . . . . . . . .

    3 96

    3 4.2.3.2

    Deployment . . . . . . . . . . . . . . . . . . . . . . . . . 3 96

    3 4.3 Vulnerability S imula tion Programs . . . . . . . . . . 3 96

    References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 102

    (S) CHAPTER 4 . ELECTRONIC WARFA RE VULNERABILITY O F

    TARGET ACQUISITION RADARS (U)

    GROUND-BASED AND AIRBORNE SURVEILLANCE AND

    4 1

    4 2

    4 2.1

    4 2.2

    4 3

    4 3.1

    4 3.2

    4 4

    4 4.1

    4 4.2

    4 5

    4 5.1

    4 5.2

    Int roduct ion . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Ground-Based P ersonnel and Vehicle Dete ction

    Radars

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    System Description . . . . . . . . . . . . . . . . . . . . . . .

    Vulnerability

    . . . . . . . . . . . . . . . . . . . . . . . . . . .

    GroundMapping . . . . . . . . . . . . . . . . . . . . . . .

    Sys tem Description. . . . . . . . . . . . . . . . . . . . . . .

    Vulnerability

    . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Weapon-Location Radars

    . . . . . . . . . . . . . . . . . . .

    System Description . . . . . . . . . . . . . . . . . . . . . .

    Vulnerability . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Meteorological Radars

    . . . . . . . . . . . . . . . . . . . . .

    System Description. . . . . . . . . . . . . . . . . . . . . . .

    Vulnerability

    References . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Airborne Radar fo r Vehicle D etect ion and

    4 2

    4 3

    4 3

    4 6

    4 25

    4 25

    4 26

    4 28

    4 28

    4 30

    4 39

    4 39

    4 39

    4 40

    (S) CHAPTER 5 ELECTRONIC WARFA RE VULNERABILITY O F

    AVIONICS (U)

    5 1

    5 1.1

    5 1.2

    5 2

    5 2.1

    5 2.2

    5 2.3

    5 3

    5 3.1

    5 3.2

    5 4

    5 4.1

    5 4.2

    Int roduct ion

    Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    General Conten t

    . . . . . . . . . . . . . . . . . . . . . . . . .

    EW Threat to Avionics

    . . . . . . . . . . . . . . . . . . . . .

    Establishing t he T hreat

    . . . . . . . . . . . . . . . . . . .

    Th reat Equ ipm ent General Capabilities-Present

    a n d F u t u r e . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Threat Doctrine and Tactics

    . . . . . . . . . . . . . . . .

    EW Vulnerability of Avionic Equipment

    . . . . . . .

    Vulnerability Investigations

    . . . . . . . . . . . . . . .

    Results of Typical Vulnerability Investigations .

    Missions

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Development

    of

    Analysis Procedure

    . . . . . . . . .

    Illustration of the Vulnerability Analysis Pro-

    The Impact of EW Vulnerability o n Airmobile

    5 5

    5 5

    5 6

    5 6

    5 6

    5 7

    5 7

    5 8

    5 8

    5 33

    5 58

    5 60

    cedure

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 73

    V

    http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/
  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    24/124

    AMCP 706 412

    T A B L E OF CONTEN TS (Con t.)

    Page

    aragraph

    5-4.2

    c- 1

    c 1.1

    c-1.2

    C-1.3

    C-1.4

    c - 2

    c-2.1

    c-2 .2

    c 3

    D- 1

    D-2

    D-3

    D-4

    D-5

    D-6

    E- 1

    E-2

    E-2.1

    E-2.2

    E-2.3

    E-2.4

    E-2.5

    Illustration of the Vulnerability Analysis Pro-

    cedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    5-73

    References . . . . . . . . . . . . . . .

    5-82

    (C) APPENDIX C. THEORETICAL SUSCEPTIBILITY

    OF NAVIGATION EQUIPMENT

    CEIVER)

    (AN/ARN-92 LORAN-D RE-

    Susceptibility During Search

    . . . . . . . . . .

    Receiver O peratio n During Search . . . . .

    Noncoherent ECM-Search

    .

    .

    .

    . .

    .

    . .

    Coh erent ECM-Search

    . . . . . . .

    Conclusions Regarding Search Susceptibility

    . .

    Susceptibility During Track . . . . . . .

    Noncoherent ECM-Track . . . . . . . . .

    Coh erent ECM-Track . . . . . . . . . . .

    AN/ARN-92 LORAN Phase Tracking Loops

    .

    c- 1

    c- 1

    C-6

    c -11

    C-15

    C-16

    C-16

    c - 2 0

    C-29

    (C) APPENDIX D. THEORETICAL SUSCEPTIBILITY

    OF A MULTIFUNCTION SYSTEM

    (HELMS)

    Target Power . . . . . . . . . . . D-1

    Susceptibility Criteria . . .

    .

    . . . . . . D-4

    Sensitivity Due t o Receiver Noise . . . D-8

    Susceptibility

    to

    CW and FMCW Jam mi ng.

    . . . .

    D-8

    Susceptibility t o D irect Noise Amplification

    (DINA) Jamming.

    . . . . . . . . .

    D-9

    Susceptibility to Repeater Jamming.

    . . .

    D-1

    0

    (C) APPENDIX E.

    SUSCEPTIBILITY

    OF

    VARIABLE

    PARAMETER TERRAIN-AVOID-

    ANCE RADAR (VPTAR)

    Susceptibility Criteria

    . . . . . . . . . .

    E- 1

    Susceptibility . . .

    . .

    . . . . E- 1

    Sensitivity Lim itation Due to Receiver Noise . E-1

    Susceptibility Due

    to

    Direct N oise Amplifica-

    t ion (DINA) Jamming

    . . . . . . . . . . . .

    E-2

    Susceptibility

    to

    Spot Continuous-Wave (CW)

    Jam min g Signals . . . . . . . . .

    E-5

    Susceptibility to Pulsed CW Jamming Signals.

    .

    E-6

    Susceptibility

    to

    Amplitude-Modulated Con-

    tinuous-Wave (AMCW) Jam mi ng Signals . . E-6

    vi

  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    25/124

    AMCP 708412

    T A B L E OF CONTENTS (Con t .)

    Paragraph Page

    E-2.6 Susceptibility t o Frequency-Modulated Con-

    E-3

    tinuous-Wave (FMCW ) Jam mi ng Signals

    . . . . .

    E-7

    Variable Parameters . . . . . . . . . . . . . . . . . . . . . . E-8

    E-3.1 Power Tran smitted

    . . . . . . . . . . . . . . . . . . . . . .

    E-8

    E-3.2 Transm itted Frequency

    . . . . . . . . . . . . . . . . . . .

    E-8

    Sensitivity of VPTAR ECM Vulnerability to t he

    E-4 Conclusions and Recom mendations

    . . . . . . . . . . .

    E-8

    (C) APPENDIX

    F

    EQUIPMENT OPERA TIONAL

    CHARACTERISTICS

    F-

    1 LORAN-D Airb orne Receiver Characteristics

    . . .

    F- 1

    F-2 HELMS Characteristics . . . . . . . . . . . . . . . . . . . . F-3

    F-3 VPTAR Characteristics

    . . . . . . . . . . . . . . . . . . . .

    F-5

    S)

    CHAPTER 6

    .

    OPTICAL/ELECTRONIC W ARFA RE

    SYSTEMS (U)

    VULNERA BILITY O F ELECTRO-OPTIC

    6-1

    6-1.1

    6-1.2

    6-2

    6-2.1

    6-2.2

    6-2.3

    6-2.4

    6-2.5

    6-2.6

    6-3

    6-3.1

    6-3.2

    6-3.3

    6-3.4

    6-3.5

    Int roduct ion . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Chapter Contents

    . . . . . . . . . . . . . . . . . . . . . . . .

    Terminology

    . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Vulnerability of E O Systems . . . . . . . . . . . . . . . .

    System Definitions

    . . . . . . . . . . . . . . . . . . . . . .

    Systems

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Thre at A nalysis . . . . . . . . . . . . . . . . . . . . . . . . .

    Criteria for Effective Operatio n of V ictim

    Susceptibi li ty of E O Equip men ts

    . . . . . . . . . . . .

    Intercep tibility and A ccessibility of E O Sys-

    tems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Feasibility of Optical-Electronic Warfare

    Red uction of Multiple O ptical Intern al Re-

    Op tical/Electro nic Counter-Countermeasures

    . . .

    f lect ions

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Re du ctio n of Po tential Precursor Signals . . . . . .

    Damage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Optical Augm entat ion . . . . . . . . . . . . . . . . . . . .

    Miscellaneous Design App roach es

    . . . . . . . . . . .

    References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Hardening of Certain IR Dete ctors Against

    6-5

    6-6

    6-6

    6-9

    6-11

    6-11

    6-20

    6-33

    6-69

    6-133

    6-154

    6-1

    5 4

    6-1

    6-1

    9

    6-161

    6-167

    6-167

    S) CHAPTER 7 . ELECTRONIC WARFARE VULNERABILITY

    OF SATELLITE COMMUNICATIONS (U)

    7-

    1

    Int roduct ion . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-7

    7-2 Satellite Com mu nication Sys tem . . . . . . . . . . . . . 7-7

    vii

  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    26/124

    AMCP

    70841

    2

    TABLE

    OF

    CONTENTS

    (Con t)

    Pagearagraph

    7-2.1

    7-2.2

    7-2.3

    7-2.4

    7-2.5

    7-3

    7-3.1

    7-3.2

    7-3.3

    7-3.4

    7-4

    7-4.1

    7-4.2

    7-4.3

    7-4.4

    G-

    1

    G-2

    G-2.1

    G-2.2

    G-3

    G-3.1

    G-3.2

    G-4

    G-4.1

    G-4.2

    G-5

    G-5.1

    G-5.2

    G-6

    G-6.1

    G-6.2

    G-7

    G-7.1

    G-7.2

    H-

    Introduction

    Space Subsystem

    Satellite Transponder

    . . . . . . . . . . . . . . . . . . . . .

    Earth Terminal Subsystem . . . . . . . . . . . . . . . . .

    Secon dary System Characteristics/Considera-

    tions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Satellite Communication System Vulnerability .

    Introduction

    Basic Tool Requirements

    . . . . . . . . . . . . . . . . . .

    Vulnerability Examples

    . . . . . . . . . . . . . . . . . . .

    Increased ERP

    Receiving Antenn a Directivity/Sidelobe Re-

    duction

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Oth er ECM Strategies . . . . . . . . . . . . . . . . . . . .

    References

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Design Aids

    . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Satellite Antijamming Techniques

    . . . . . . . . . . . .

    Spread-Spectrum Techniques

    . . . . . . . . . . . . . . .

    Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    (U) APPENDIX G. SATELLITES

    General

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Initial Defense Communications Satellite

    Pro-

    gram (1DCSP)-DCS Phase I . . . . . . . . . . . . . . .

    Space Subsystem. General . . . . . . . . . . . . . . . . .

    Satellite Transponder . . . . . . . . . . . . . . . . . . . . .

    DCSC Phase I1 Sate llite

    . . . . . . . . . . . . . . . . . . . .

    Space Sub system. General . . . . . . . . . . . . . . . . .

    Satellite Transponder .....................

    TACSAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Space Sub system. General . . . . . . . . . . . . . . . . .

    TACSAT Transponder

    ....................

    SKYNET

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    SKYNET Satellite Transponder . . . . . . . . . . . . .

    NATO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    General

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    NATO Transponder

    . . . . . . . . . . . . . . . . . . . . . .

    INTELSAT

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    General

    INTELSAT IV T ransponder

    . . . . . . . . . . . . . . . .

    (U)

    APPENDIX H EARTH TERMINALS

    7-7

    7-11

    7-23

    7-28

    7-40

    7-57

    7-57

    7-61

    7-62

    7-109

    7-1 10

    7-110

    7-1 14

    7-1 14

    7-115

    7-1 16

    7-117

    G-

    1

    G- 1

    G- 1

    G- 1

    G-5

    G-5

    G-6

    G-8

    G-8

    G-9

    G-11

    G-11

    G-17

    G-18

    G-18

    G-20

    G-20

    G-20

    G-20

    General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . H-1

    ...

    Vl l l

  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    27/124

    AMCP

    706412

    TABLE

    OF

    CONT ENTS (Con t.)

    Paragraph

    Page

    H-2

    H-3

    H-4

    H-5

    H-6

    H-7

    H-8

    H-9

    H-10

    H-11

    H-12

    I-

    1

    I- 2

    1-3

    1-4

    1-5

    1-6

    1-7

    J-

    1

    5-2

    5-2.1

    5-2.2

    5-2.3

    K-

    1

    K-1.1

    K-1.2

    K-2

    K-3

    AN/FSC-9

    . . . . .

    .

    . . .

    . .

    .

    AN/MSC-46

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    AN/MSC-54

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    AN/MSC-60, Heavy Transportable (H T)

    . .

    AN/MSC-61 Medium Transportable

    MT)

    . . .

    SCT-21

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    AN/TSC-80

    . . . . .

    .

    . . . .

    .

    AN/MSC-57 . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Diplomatic Telecommu nications Service (DTS)

    . .

    Major Ship Satellite Terminal (MASST).

    . . . .

    AN/TSC-86 (LT)

    . . . . . . . . . .

    (U) APPEN DIX I. PHASE I

    H- 1

    H-

    1

    H-6

    H-10

    H-12

    H-12

    H-15

    H-15

    H-16

    H-19

    H-19

    Background an d Conc ept

    System D escription

    . . . . . . . . . . . .

    Modulation Characteristics.

    . . . . . . .

    Computer-To-Computer Communications.

    . .

    DCS Interface

    . . . . . . . . . .

    Link Configuration

    . . .

    .

    . .

    . .

    .

    . . . . . . . . . . . . .

    I- 1

    I- 1

    1-4

    1-6

    1-7

    1-7

    Spacecraft

    . . . . . . . . . .

    1-6

    (U)

    APPEN DIX J. PHASE I1

    Program Description

    . .

    .

    .

    J- 1

    Equipm ent Aspects

    . .

    .

    .

    J

    Req uirem ents for Stage la Ear th Terminals

    . .

    5-2

    Requirem ents for Stage 1

    b

    Earth Terminals

    . .

    J-5

    Requirem ents for Stage l c Earth Terminals

    . .

    J-5

    (S) APPENDIX K. OTH ER COMMUNICATION

    SATELLITE SYSTEMS

    Air Force Satelli te C omm unication System

    K- 1

    K-12

    (AFSCS)

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Missions Served

    . . . . . . . . . .

    General Description

    . . . . . . .

    K- 1

    Mini Comm unications Satellite System

    . . . . . .

    Concealment (LES 8/9 )

    . . . . . . .

    K-12

    K-13

    S)

    APPENDIX

    L.

    SPACE GROU ND LINK

    SYSTEM

    1nd-1

    NDEX

    ix /x

    http://82050_indx.pdf/http://82050_indx.pdf/
  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    28/124

  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    29/124

    AMCP 706-411

    them from specific end items of equipment-

    and consolidates the data into a single series

    of classified documents, together with a dis-

    cussion and interpretation of the data. Thus,

    development personnel-concerned with the

    EW vulnerability of their systems-will be

    saved time and effort in attempting to locate

    and apply appropriate information or con-

    ducting EW vulnerability studies. To pro-

    vide a continuing and up-todate data base,

    some studies will still have to be conducted.

    Sample calculations are used throughout the

    text to illustrate the theory and ideas pre-

    sented.

    1-1.3 U) SCOPE

    This

    handbook covers investigations,

    studies, and analyses concerned with the vul-

    nerability to electronic warfare EW) of all

    types of communicationelectronic CE) and

    electro-optical EO) equipment/systems, ex-

    clusive of guided missiles. It includes the

    various EW threats, present and future,

    which US communicationelectronic and

    electro-optical systems may face in the field.

    Elements comprising the handbook in-

    clude:

    1) Factors that determine system vul-

    nerability to EW-i.e., susceptibility, acces-

    sibility, interceptibility feasibility, and tac-

    tics

    2) Steps, theoretical and experimental,

    that constitute a vulnerability investigation

    3) Effects of ECM modulations on dif-

    ferent classes of equipment; e.g., fm radio,

    pulse Doppler radar, noncoherent moving

    target indicator mti)

    (4) Specific jamming-to-signal ratios

    J/S,

    and the effect of such J/S on the perfor-

    mance capabilities of the equipment exposed.

    1-1.4

    U)

    HANDBOOK CONTENT

    This

    handbook is presented in seven chap-

    ters. Chapters 1 and 2 introduce the basic

    concepts of vulnerability. Each of the re-

    maining five chapters is designed

    as

    a com-

    plete treatise

    on

    its respective CE and EO

    subject matter. The overall content of each

    chapter is described in the paragraphs that

    follow.

    1-1.4.1 U) Introduc t ion to the Vulnerabi l -

    ity Handbook (Chapter 1)

    Chapter 1 serves as an introduction to the

    handbook and presents the general subject

    of electronic warfare as

    it

    relates to vulner-

    ability assessment. The chapter contains

    four major paragraphs:

    1) 1-1 Background of the Vulnerability

    Handbook

    2) 1-2 Electronic Warfare

    3) 1-3 Intelligence Coordination

    4)

    1 4 Most Pertinent Publications on

    Electronic Warfare Guidance.

    The paragraphs on electronic warfare pro-

    vide a laymans introduction to the con-

    cept of EW, including identification of its

    component parts, the need for intelligence

    inputs, and the concepts of command and

    control of EW. Par. 1-5 provides a glossary

    of terms most frequently encountered in the

    field of EW.

    1-1.4.2 U) General Approach to Vulnera-

    bi l i ty of Communication-Elec-

    tro nic and Electro-Optical

    Sys-

    tems to EW (Chapter 2)

    Chapter 2 is a working explanation

    of

    vulnerability to EW. The subject matter is

    presented in four main paragraphs:

    1) 2-1 Introduction

    1-2

  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    30/124

    AMCP 706-411

    2) 2-2

    Philosophy of Vulnerability to

    Electronic Warfare

    3) 2-3 EW Threat Precepts

    4)

    2 4

    Models of the EW Environment

    for Analysis Purposes.

    The elements of vulnerability are identi-

    fied and their relationship is shown. The

    Soviet threat capability is discussed, with

    emphasis

    on

    tactical employment, and the

    significance of threat modeling for vulnera-

    bility assessment is identified.

    The different types of models of EW en-

    vironment are outlined, with an explanation

    of the construction and utility of each type

    of model. Two Appendices are provided

    that list and define some of the existing

    models used in EW vulnerability analyses,

    and Soviet signal intercept systems.

    1-1.4.3

    U)

    EW Vuln erabilit y of Tactical

    Commu nications (Chapter 3 )

    Chapter 3 deals with the vulnerability of

    tactical communications and is presented in

    four major paragraphs:

    (1) 3-1 Introduction

    2) 3-2

    ECM Susceptibility Level

    3) 3-3

    EW Threat Models

    4) 3 4 Vulnerability.

    The susceptibility of both tactical and

    trunk systems is discussed in terms of ECM

    modulations and their effects on equipment

    performance. The level of jamming required

    is analyzed. Current threat data are sum-

    marized with direction on how to obtain up-

    dating through intelligence channels. Vulner-

    ability is examined with respect to its ele-

    ments, simulations, and critical parameters.

    A sample problem solution is given for the

    assessment of the vulnerability of a commu-

    nication network.

    1-1.4.4

    U)

    EW Vulnerability

    o f

    Ground-

    Based

    and Airborne Surveillance

    and Target Acquisition Radars

    (Chapter 4)

    Chapter 4 covers the vulnerability assess-

    ment technique for surveillance and target

    acquisition radars. The chapter is presented

    in

    five major paragraphs:

    1) 4-1 Introduction

    2) 4-2 Ground-Based and Personnel and

    Field Detection Radars

    3) 4-3

    Airborne Vehicle Detection and

    Ground Mapping Radars

    4) 4 4 Weapon Location Radars

    5) 4-5

    Meteorological Radars.

    Each paragraph is complete within itself

    and identifies the radar system tactical role

    and employment concepts. Pertinent char-

    acteristics of the radar class are discussed,

    and the means of assessing the system vulner-

    ability are identified.

    1-1.4.5 U) EW Vulnerability o f Avionics

    (Chapter 5 )

    Chapter 5 discusses the assessment of the

    vulnerability of avionic systems. It is pre-

    sented in four major paragraphs:

    1 )

    5-1

    Introduction

    2) 5-2

    EW Threat to Avionics

    3)

    5-3 EW Vulnerability of Avionic

    Equipment

    4)

    5 4

    The Impact of EW Vulnerability

    on the Selection of Avionic Configurations.

    1-3

  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    31/124

    AMCP 706-411

    The avionic systems are identified by class

    such as Communication, IFF, Terrain Avoid-

    ance Radar, and Navigation Systems. The

    general threat to these systems is discussed,

    and the system vulnerability criteria are iden-

    tified. Steps to be taken in analysis are de-

    scribed, and methods for data reduction and

    presentation are explained. A discussion on

    mutual interference problems and mission

    profile as it affects vulnerability and the ef-

    fects of EW vulnerability on air mobility

    missions completes the chapter.

    1-1.4.6 U) Optic aVElectron ic Warfare Vu l-

    nerabi l i ty of Electro-Optic

    Sys-

    tems (Chapter 6)

    Chapter 6 covers the vulnerability assess-

    ment of electro-optical systems. It is divided

    into three major paragraphs:

    1)

    6-1 Introduction

    2) 6-2 Vulnerability of Electro-Optic

    Systems

    3) 6-3 Optical/Electronic Counter-Mea-

    sures.

    This chapter describes the electro-optic

    equipments employed, their tactical employ-

    ment and deployment requirements, the vul-

    nerability aspects of the different classes of

    systems, the potential threats to these sys-

    tems, and concepts for electro-optic counter-

    countermeasures. Specific approaches to de-

    termining the degree of susceptibility, inter-

    ceptibility, and accessibility of the electro-

    optic systems are discussed.

    1-1.4.7 U) EW Vulnerab i l i ty of Satel l i te

    Comm unications (Chapter

    7 )

    EW vulnerability of satellite communica-

    tions is addressed in four major paragraphs:

    1) 7-1 Introduction

    2) 7-2 Satellite Communication Systems

    3) 7-3 Satellite Communication System

    Vulnerability

    4) 7-4 Satellite Antijamming Techniques.

    A brief history of satellite systems is pre-

    sented, continuing with discussions on active/

    passive systems and orbit considerations.

    Satellite transponder subsystems and ground

    terminals for communication links are de-

    scribed for both uhf and shf systems. A

    presentation of vulnerability assessment tech-

    niques leads to a description of the suscep-

    tibility of several existing systems, and vul-

    nerability assessment examples are provided

    for user assistance. Electronic counter-

    countermeasure ECCM) approaches are

    treated briefly. Six appendixes are included

    detailing Satellites, Earth Terminals, Phase I,

    and Phase

    11,

    other Communication Satellite

    Systems, and Space Ground Link Subsys-

    tems.

    1-2

    U)

    ELECTRO NIC W A RFARE

    1-2.1 U) DEFIN IT IO N

    AR 105-87 provides the following defini-

    tion of electronic warfare

    :

    Electronic warfare EW) is military action

    involving the use of electromagnetic energy

    to determine, exploit, reduce or prevent hos-

    tile use of the electromagnetic spectrum and

    action which retains friendly use of the elec-

    tromagnetic spectrum. There are three divi-

    sions within EW:

    1)

    Electronic warfare support measures

    ESM)

    2) Electronic countermeasures ECM)

    3) Electronic countercountermeasures

    ECCM).

    Fundamentals of EW

    USAFA, includes

    the following defining characteristics of elec-

    tronic warfare:

    1-4

  • 8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui

    32/124

    AMCP

    706-41

    1

    Although not included in official US

    Army definitions, we should note that EW

    is really dependent on the radiation of elec-

    tromagnetic radiation and not on electron-

    ics

    per se.

    Hence, EW includes systems using

    all forms of electromagnetic energy e.g.,

    radio, radar, infrared IR), optical systems,

    lasers, etc.).

    For the purposes of this handbook, EW

    has been broadened to mean electromagnetic

    warfare. Table 1-1 shows the electromag-

    netic divisions for EW.

    1-2.2

    (U) BRIEF HISTORY OF ELEC-

    TRONIC WARFARE

    The use of electronic warfare is not new.

    It had its modest beginnings early in World

    War I when the Germans used deceptive

    messages to exploit Russian communication

    intelligence comint) operations during 1914.

    Electronic warfare support measures ESM)

    had its beginning during the Battle of Jut-

    land in 1918, when the British tracked the

    German fleet radio transmissions, allowing

    intercept of the fleet with tactical advantage

    and subsequent victory by the British.

    Recognition of the value of ESM led the

    Germans to the use of ECM. British radio

    stations along the Mediterranean were jammed

    to support the escape of the German fleet

    from the Black Sea.

    TABLE 1 1 U).

    World War I1 placed the development of

    EW on its exponential increase. The dra-

    matic expansion in electronic technology and

    changes in tactical warfare doctrine during

    this period brought about the development of

    the CE complex and the EW equipments and

    concepts to exploit and counteract the use of

    electronic systems. Early in the war, the

    Germans deployed a navigation system to

    direct bombing raids on Britain. The British

    responded with deception signals to disorient

    the Luftwaffe. The game of oneupmanship

    began with two successive iterations of the

    German navigation systems countered suc-

    cessfully by the British.

    Denial jamming came of age following the

    emplacement of radardirected coastal guns

    by the Germans along the French coast. The

    British employed jammers to protect their

    coastal shipping lanes. The Germans also

    proved adept at deceptive jamming by

    initiating short-term jamming against British

    radars and gradually increasing the jamming

    period over several days span, making the

    interference appear as atmospheric in origin.

    Finally, they established a jamming period of

    sufficient duration to cover the escape of

    three cruisers from the harbor at Brest

    through the English Channel to their home

    ports.

    During the Libyan campaign of 1942, the

    EW SPECTRUM

    U )

    Nomenclature

    Radio

    Infrared

    Visible Light