-
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
1/124
A M C P A M P H L E T
ENGINEERING DESIGN
HANDBOOK
VULNERABILITY OF COMMUNICATION-ELECTRONIC AND
ELECTRO-OPTICAL SYSTEMS EXCEPT GUIDED MISSILES)
TO ELECTRONIC WARFARE
A M C P 7 6411
PART OWE
INTROQUCTION
A N G E N E R A L
A P P R O A C l l
TO
E L E C T R O N I C W A R F A R E V U L N E R A B I L I T Y U ]
CL AS SI FI ED BY CG U S A ECO M
NA TIONAL SECURITY INFORMA TION
EXEMPT FROM G EN ER AL DECLASSIFICATION
Schedule o Executive Order 652
Unauthorized Disclosure Subject to Criminal Sanctions
EXEMP T IO N CAT E G O R Y 3
DECLASSIFY ON 3 December 989
H EA D QU A RT ER S U S A R M Y M A T E R IE L C O M M A W D
J A W U A R Y
1976
-
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
2/124
MCP706411
Fig. No.
1 1
2 1
2 2
2 3
2 4
2 5
2 6
2 7
2 8
2 9
A 1
A 2
U) LIST
OF
ILLUSTRATIONS
Title b e
Functional Organization of Electronic Warfare
The Primary Factors of Vulnerability Analysis
Flow Diagram of EW Vulnerability Analysis
Flow Diagram of Technical EW Vulnerability
Diagram Illustrating Geometry of
ECM
Vulnerability Analysis
Postulated Mechanism
for
Control and
Coordinationof Soviet EW Operations
Diagram of a Typical Warsaw Pact Signal
Intercept/EM Capability
Photo Map of a Target Array Depicting a
Warsaw Pact Army Front
Array Input Flow Chart
Array Network Diagram
The
ALLEN
Model
Hughes Simulation Structure and Output
Analys.................................
1 7
2 4
2 8
2 9
2 10
2 11
2 12
2 15
2 16
2 17
A 5
A 7
xi/xii
http://82050_01.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_01.pdf/ -
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
3/124
U)
LIST OF ILLUSTRATIONS
Fig. No.
Title Page
AMCP 706 412
3-
1
3- 2
3-3
3-4
3-5
3-6
3-7
3-8
3-9
3-10
3-1 1
3-12
3-1 3
3-1 4
3-15
3-16
3-17
3-18
3-19
3-20
3-21
3-22
3-23
A
Theoretical Susceptibility Curve for Purposes
of Illustration
Susceptibility Curves Showing the Effect of
Changing One Parameter
Relation Between A1 and Various Measures of
Speech Intelligibility
Bands of Equal Articulation Index
Relationship Between Percentage of Words Cor-
rectandSNR
Basic Communications System.
The Michigan Diamond Map No.
4
for Six-Town
Routes
Comparison of Map Test and Intelligibility Score
Test for an Audio Channel With Additive
Gaussian Noise.
Effect of Variations of Signal Jamming and
Receiver Parameters on J / S
Typical Teletypewriter Printouts
Character Error Probability as a Function of Bit
Error Probability for Two Teletype Codes
Ratio of Jamming-Signal Strength to Desired-
Signal Strength
OnQff Keying Receiver
Two-Filter FSK Receiver
Coherent PSK and Differentially Coherent PSK
Receivers
F M
Receiver Output Signal and Noise vs Input
F M Carrier-to-Noise Power Ratio the Noise
Power Taken in a Fixed 6.8-kHz Bandwidth
Receiver Output vs Input Signal-to-Noise Ratios
Input Noise Power Taken in a Fixed 6.8-kHz
Bandwidth
Receiver Output vs Input Signal-to-Noise Ratios
With Input Noise Power the Total Power Enter-
ing the Receiver and the Input Signal Power
Being the Peak Envelope Power
Probability of Bit Error for Coherent Nonco-
herent and Differentially Coherent Reception.
Error Probability for Orthogonal Signals k
=
Bit Error Probability for Orthogonal Signals
Pulsed Interference to a Narrowband
AM
Voice
Pulsed Interference to a Narrowband
AM
Voice
1,2
k = , 2 .
Receiver Example
1
Receiver Example 2
3-8
3 10
3-13
3-14
3-15
3-16
3-16
3-17
3-21
3-25
3-26
3-28
3-30
3-30
3-31
3-35
3-36
3-38
3-41
3-42
3-43
3-46
3-47
x
http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/ -
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
4/124
AMCP
706412
U)
LIST OF ILLUSTRA TIONS
(Con t .)
Fig. No. Title
Page
3-24
3-25
3-26
3-27
3-28
3-29
3-30
3-31
3-32
3-33
3-34
3-35
3-36
3-37
3-38
3-39
3-40
3-41
3-42
3-43
3-44
3-45
3-46
Pulsed Interference to
a
Narrowband
FM
Voice
Receiver
Susceptibility Data for Single-ChannelF M
Voice
Susceptibility Data for Single-Channel SSBSC
Susceptibility Data for Single-Channel
AM
Voice
Susceptib ility Data fo r Single-Channel CW
Susceptibility Data for Single-Channel FSK
Results of Continuous
FM
by Noise Jamming
Against Single-Channel
F M
Voice, Receiver
Not Detuned
Results of Continuous F M by Noise Jamming
Against Single-Channel F M Voice, Receiver
Detuned
Results of Continuous
F M
by Wideband Noise
Jamming A gainst Single-ChannelF M Voice,
Receiver Detun ed.
Sum mary of Results of Timeshared FM by N ar-
rowba nd N oise, Receiver On-Tuned
Effect of Timesharing Rate on F M by Narrow-
band N oise Performance
Results of Timeshared
F M
by N arrowband Noise,
Receiver Detuned
Results of Timeshared F M by Wideband Noise
Susceptibility Data f or AN/GRC-103-TDD-660,
C ond i t ion1
Susceptibility Data for AN/GRC-103-TDD-660,
C ond i t ion2
Susceptibility Data fo r AN/GRC-103-TDD-660,
Condition 3
Susceptibility Data for AN/GRC-103-TDD-660,
C ond i t ion4
Susceptibility Data for AN/GRC-143, AN/TCC-
45, Conditon 1
Susceptibility Data for AN/GRC-143, AN/TCC-
45, Condition 2
Suscep tibility Data for A N/GR C-143, AN/TCC-
45, Condition
3
Susceptibility Data for AN /GRC-143, AN/TCC-
45, Condition 4
F M Characteristics for FDM/FM 12 -,2 4, 60 -,
and 120-Voice Channels With Preemphasis
Nomogram for Determination of Apparent Pow er
Gain
G
in dB ) of a Parabolic R eflecto r.
3-48
3-49
3-50
3-51
3-52
3-53
3-54
3-57
3-58
3-59
3-60
3-61
3-62
3-65
3-66
3-67
3-68
3-69
3-70
3-71
3-72
3-75
3-82
http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/ -
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
5/124
AMCP 706412
Fig.
No.
3-47
3-48
3-49
3-50
3-51
3-52
3-53
(U) LIST
OF
ILLUSTRATIONS
(Con t.)
Title Page
Average Antenna Patterns Parabolic Dishes and
A Hypothetical Antenna Pattern for Use in a
Cumulative Sidelobe Distribution Function.
Example of Propagation
Loss
Results Obtained
from Computer Method Described
in
ESSA
Tech. Rept. ERL 79-ITS 67
Corner Reflectors.
3-81
omputer Program 3-85
3-86
3-88
ample Problem- Accessibility.
3-93
ploy men t 3-97
Example of EW Threat Model Equipment De-
ulnerability Evaluation Flow Chart 3-101
http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/ -
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
6/124
MCP70641
1
U)
LIST OF T BLES
Table No. Title Page
1-1
B-2
B-3
EW Spectrum
1-5
Direction Finders and Target Acquisition Sets
Intercept Receivers and D irection Finders
B-1
COMINT Equipment
B-2
Com munications ESM)
B-3
Noncom munications ECM)
B 5
B-7
-4
ELINT ESM Equipment
B-5 Nonexpendable Soviet Ground-Based Jammers B-9
xiii/xiv
http://82050_01.pdf/http://82050_apdx02.pdf/http://82050_apdx02.pdf/http://82050_apdx02.pdf/http://82050_apdx02.pdf/http://82050_apdx02.pdf/http://82050_apdx02.pdf/http://82050_apdx02.pdf/http://82050_apdx02.pdf/http://82050_apdx02.pdf/http://82050_apdx02.pdf/http://82050_01.pdf/ -
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
7/124
MCP706-41
U)
LIST OF T BLES
Table
No
3-1
3-2
3-3
3-4
3-5
3-6
3-7
3-8
3-9
3-10
3-11
3-12
3-1 3
Title Page
Signal and Receiver Parameters
Articulation Score in a Bandlimited Audio Chan-
nel With Additive White Gaussian Noise for the
SameJ S p
= l o
dB That Results in a Map
Time
of 20
sec
Susceptibility of Singlechannel Voice Com-
munications
ECM Performance Against
FSK F l )
and DFSK
F6) 1OO-wpm Radio teletype
Timeshared FM by Narrowband Noise Compari-
s o n s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Timeshared FM by Wideband Noise Compari-
s o n s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Theoretical and Experimental Results of Jamming
Antenna Directivity Values
Power Gain G and Effective Area A of Several
Common Antennas
Summary of Propagation Equations
Hypothetical Signal Intercept Systems
Hypothetical ECM Equipment.
Some EW Simulations
TDM/PPM-AM
3-1
1
3-18
3-44
3-56
3-63
3-64
3-73
3-80
3-81
3-89
3-99
3-99
3-100
http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03b.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03b.pdf/http://82050_03a.pdf/http://82050_03a.pdf/ -
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
8/124
AMCP
706 41
PREFACE
The Engineering Design Handbook Series of the
US
Army Materiel
Command is a coordinated series of handbooks containing basic informa-
tion and fundamental data. Th e hand boo ks are authoritative reference
books of practical information and quantitative facts helpful in the de-
sign and development of materiel that will meet the tactical needs of the
Armed Forces.
The objectives
of
this handb ook series are: 1) to collect diverse
sources of information unique t o the determination of the vulnerability
to electronic warfare
o
all types of communication-electronic and elec-
tro-optical equ ipment/system s, exclusive of guided missiles, in o rde r to
conserve time, materials, and money in the successful design of new
equip men t; 2) t o provide guidance in capsule form for new personnel,
Armed Forces co ntrac tors, or experienced design engineers in ot he r fields
who require information about vehicle electrical systems; 3) to supply
current fundamental inform ation; and 4) t o place the reader in a position
tion to use new information generated subsequ ent t o the publication of
this handbook. T o meet these objectives, the hand book has been written
to provide the necessary b ackgroun d regarding t he vulnerability
of
mili-
tary electromagnetic systems to electronic warfare EW).
This h and bo ok series includes chapters o n basic concep ts of vulnerabil-
ity and computational methods for determining the EW vulnerability of
tactical and satellite communications, surveillance and target acquisition
radars, avionics, and electro-optical system s. Th e series consists of six
separate handbooks, i.e.,
1. AM C P 70641 1 Chapter
1
and 2
2.
AMCP 706-412 Ch apte r 3
3. AMCP 7 06 41 3 Chapte r
4 AMCP 706-414 Chap ter 5
5 AM C P 7064
1
5 Chapter 6
6. AMCP 706-4 16 Ch apte r 7.
Th e various handbo oks are designed t o be ordered and used separately;
however, i t is recommended tha t AMCP 70 6 4 1 -which provides the in-
trod uct ion and general approach t o EW vulnerability-be ordered t o ac-
comp any the particular chapter s) of interest. An index of th e com ple te
series
s
contained in each hand book . An abbreviated Table of Con tents
of the other handbooks of the series is contained in each of the separate
handbooks.
This handbook was prepared by the Electronic Defense Laboratories of
GTE Sylvania, Mountain View, CA. under subco ntract t o th e R esearch
Triangle Institute, Research Triangle Park, NC, prime contractor to the
US Army M zteriel Com mand . Mr. Ro bert St on e, GTE Sylvania, served
xv
-
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
9/124
AMCP 706 411
as Project Leader. Technical guidance and co ordin ation were provided by
a committee under the direction of Mr. Simon Cohen, Electronic Warfare
Laboratories, US Army Electronics Command, Ft. Monmouth, NJ.
Th e Engineering Design Ha ndb ook s fall into t w o basic categories-those
approved for release and sale, and those classified for security reasons.
Th e US Army Materiel Comman d policy is to release these E ngineering
Design Handb ooks in accordance w ith current DOD Directive 723 0.7,
dated 18 Sep tem ber 1973 . All unclassified Han dbo oks can be obtaine d
from the National Technical Informa tion Service NTIS). Procedures for
acquiring these Handbooks follow
a. All Depa rtme nt of Army activities having need fo r the H andbooks
must su bmit their request on an official requisition form DA Form 17,
dated Jan 70) directly to:
Commander
Let terkenny Army D epot
Chambersburg, PA 172 0
ATTN: AMXLE-ATD
Requ ests for classif ied docu men ts must be s ubm itted, with appropriate
Need t o Know justif ication, t o Letterkenny Army D epot.) DA activi-
ties will not requisition Handbooks for further free distribution.
b. All oth er requestors-DOD , Navy, Air Forc e, Marine Corps, non-
military Governm ent agencies, co ntrac tors, private ind ustry , individuals,
universities, and others-must purchase these Ha ndb ook s fro m:
National Technical Information Service
Department of Commerce
Springfield, VA 22 15 1
Classified documents may be released on a Need to Know basis veri-
fied by an official Department of Army representative and processed
from Defense Doc ume ntation Center DDC), ATTN: DDC-TSR,
Cameron Station, Alexandria, VA 2231 4.
Com men ts and suggestions on this Hand book are welcome and should
be addressed to:
Commander
U
Army Materiel Development nd
Readiness Com mand
Alexandria, VA 22 33 3
DA Forms 2028 , Recommended Changes t o Publications, which are
available through normal publications supply channels, may be used for
comments/suggestions.)
xvi
-
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
10/124
AMCP 70641
1
DEPARTMENT OF THE ARMY
HEADQUARTERS UNITED STATES ARMY MATERIEL COMMAND
500 1 Eisenhower Ave, Alexandria, V A 22333
AMC PAMPHLET
NO. 706-411
5 JANUARY 1976
ENGINEER ING DESIGN HANDBOOK
A ND ELECTRO-OPTICAL SYSTEMS (Except Guided
Missiles) TO ELECTRONIC WARFA RE SERIES
VULNERABI L l T Y
OF
COMMUNICATION-ELECTRONIC
PART ONE
INTRODUCTION AND GENERA L APPROACH TO
ELECTRONIC WARFA RE VULNERA BIL ITY
TAB LE O F CONTENTS
Paragraph Page
LIST OF ILLUSTRATIONS
................
xi
LIST OF TABLES
.......................
x1n
PREFACE .............................
xv
...
C) CHAPTER
1.
INTRODUCTION U)
1-1
1-1.1
1-1.2
1-1.3
1-1.4
1-1.4.1
1-1.4.2
1-1.4.3
1-1.4.4
1-1.4.5
1-1.4.6
Background of the Vulnerability Handbook
. . . .
General
...............................
Purpose
...............................
Scope
.................................
Handbook Content ......................
Introduction to the Vulnerability Handbook
Chapter 1)
..........................
General Approach to Vulnerability of
Communication-Electronicand Electro-
Optical Systems to EW Chapter
2) . . . . . . . .
EW Vulnerability of Tactical Communications
Chapter
3) ..........................
EW Vulnerability of Ground-Based and
Airborne Surveillance and Target Acquisition
Equipment Chapter
4 ) .................
EW Vulnerability
of
Avionics Chapter
5
Optical/Electronic Warfare Vulnerability of
Electro-Optic Systems Chapter 6)
........
1-1
1-1
1-1
1-2
1-2
1-2
1-2
1-3
1-3
1-3
1-4
1
http://82050_loi.pdf/http://82050_lot.pdf/http://82050_pref.pdf/http://82050_lot.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_pref.pdf/http://82050_lot.pdf/http://82050_loi.pdf/ -
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
11/124
MCP706411
TAB LE OF CONTENTS
(Con t.)
Paragraph
1-1.4.7
1-2
1-2.1
1-2.2
1-2.3
1-2.3.1
1-2.3.1.1
1-2.3.1.2
1-2.3.1.3
1-2.3.2
1-2.3.2.1
1-2.3.2.2
1-2.3.3
1-2.3.3.1
1-2.3.3.2
1-2.3.4
1-2.3.5
1-2.4
1-2.4.1
1-2.4.2
1-2.4.3
1-3
1-4
1-4.1
1-4.2
1-4.3
1-4.4
1-4.5
1-4.6
1-5
EW Vulnerability of Satellite Communications
(Chapter
7) ..........................
Electronic Warfare ........................
Definition
.............................
Brief History of Electronic Warfare
..........
Elements of Electronic Warfare
Electronic Warfare Support Measures ESM)
Target Intercept
Target Identification
...................
Target Location
.......................
Electronic Countermeasures (ECM)
. . . . . . . . .
Jamming
............................
Deception
Electronic CounterCountermeasures
(ECCM) .............................
Anti-ECM
...........................
Anti-ESM
Signal Intelligence (Sigint) . . . . . . . . . . . . . . . .
Signal.Security (Sigsec)
..................
Application of Electronic Warfare ...........
Employment
..........................
Deployment
...........................
Intelligence Coordination
..................
Most Pertinent Publications on Electronic
Warfare Guidance .......................
Communications-Electronics Electronic
Warfare (AR 105-87) ...................
Electronic Counter-Countermeasures(ECCM)
Electromagnetic Cover and Deception (EC D)
Electronic Warfare
FM 32-20)
. . . . . . . . . . . . .
Electronic Countermeasures Handbook
Adaptability
..........................
AR105-2)
(AR
105-5) ...........................
FM
32-20-1) .........................
Foreign Intelligence Office Handbook ........
Glossary of Terms Associated With Vulnerability
Assessment
Bibliography
............................
Page
1-4
1-4
1-4
1-5
1-6
1-6
1-7
1-7
1-7
1-7
1-8
1-8
1-8
1-8
1-8
1-9
1-9
1-9
1-9
1 10
1 11
1-11
1-12
1-12
1-12
1-12
1-12
1-12
1-12
1-12
1-22
S) CHAPTER
2.
GENERAL APPROACH TO VULNERABILITY
OPTICAL SYSTEMS TO ELECTRONIC WARFARE
OF COMMUNICATION-ELECTRONIC AND ELECTRO-
LIST OF ABBREVIATIONS
. . . . . . . . . . . . . . .
2-1
LIST OF SYMBOLS
......................
2-2
http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/http://82050_01.pdf/ -
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
12/124
AMCP
706-41
1
TABLE OF CONT ENTS (Con t.)
Paragraph
2-1
2-2
2-2.1
2-2.2
2-2.3
2-2.3.1
2-2.3.2
2-2.3.3
2-3
2-3.1
2-3.2
2-3.3
2-3.4
2-3.5
2-4
2-4.1
2-4.2
2-4.3
2-4.4
2-4.5
Introduction
............................
The Philosophy of Vulnerability to Electronic
Warfare ...............................
Perspective ............................
The Primary Factors of EW Vulnerability
Evaluation
...........................
Technical and Operational Vulnerability
Analysis .............................
General
..............................
Distinctions Between Technical EW
Vulnerability Analysis and Operational
EW Vulnerability Analysis
...............
Technical EW Vulnerability
...............
EW Threat Precepts
.......................
General ...............................
EW 'Ihreat
.............................
Tactical ECM
actical SIGINT/ESM
....................
Tactical Electro-Optical Warfare ............
Purposes ..............................
Application of Models in EW
...............
Models of the EW Environment for Analysis
General
...............................
Electromagnetic Target Arrays (Tarays) . . . . . .
Propagation Models
......................
TerrainModels
.........................
References .............................
A-1
A-1.1
A-1.2
A-1.3
A-1.4
A-2
A-2.1
A-2.2
A-2.3
A-3
A-3.1
A-3.2
APPENDIX A EW-RELATED SIMULATION PACKAGES
Page
2-3
2-3
2-3
2-3
2-6
2-6
2-7
2-7
2-9
2-9
2-10
2-10
2-11
2-11
2-13
2-13
2-13
2-14
2-16
2-19
2-19
EW System Analysis Models
................
A-1
ACCESS Systems ....................... A-1
USAEPG/EMETF Model ..................A-2
ALLEN Models ......................... A-3
Electro-Optical Models
. . . . . . . . . . . . . . . . . . .
A-4
Message-Routing Models
...................
A-6
The Hughes MALLARD Simulation . . . . . . . . .A-6
IBM ARTSS and MASS Simulations .........A-8
GTE Sylvania-SES-East AMCN Program
.....
A-8
OtherModels ........................... A-8
COMMEL Model
........................
A-8
CRESS ............................... A-9
APPENDIXB CURRENT THREAT
. . . . . . . . .
B-1
...
111
http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx02.pdf/http://82050_apdx02.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_apdx02.pdf/http://82050_apdx01.pdf/http://82050_apdx01.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/http://82050_02.pdf/ -
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
13/124
AMCP
708411
TABLE
OF
CONTENTS
(Con t.)
Paragraph Page
C) CHAPTER 3 ELECTRONIC WARFARE VULNERABILITY
OF TACTICAL COMMUNICATIONS U)
3-1
3-1.1
3-1.2
3-2
3-2.1
3-2.2
3-2.3
3-2.4
3-3
3-3.1
3-3.2
3-3.3
3 -4
3-4.1
3-4.2
3-4.3
Introduction
Scope
Outline of the Methodology
ECM Susceptibility Levels
Susceptibility
Susceptibility of Tactical Communication
Equipment
Susceptibility of Trunk Communication
Susceptibility Sample Problems
Discussion of Vulnerability
Equipment
Vulnerability
Accessibility and Interceptibility
Vulnerability of a Communication
Link
Programs
Introduction
EW Threat Models
Vulnerability Simulation Programs
References
EW Threat Models and Vulnerability Simulation
3-6
3-6
3-6
3-8
3-8
3-34
3-56
3-74
3-76
3-76
3-77
3-88
3-94
3-94
3-94
3-96
3-101
(S) CHAPTER 4 ELECTRONIC WARFARE VULNERABILITY
AND TARGET ACQUISITION RADARS U)
OF GROUND-BASED AND AIRBORNE SURVEILLANCE
4- 1
4-2
4-2.1
4-2.2
4-3
4-3.1
4-3.2
4-4
4-4.1
4-4.2
4-5
4-5.1
4-5.2
Introduction
Ground-Based Personnel and Vehicle-Detection
Radars
System Description
Vulnerability
Ground Mapping
Vulnerability
Weapon-Location Radars
System Description
Vulnerability
Meteorological Radars
System Description
Vulnerability
References
Airborne Radar for Vehicle Detection and
System Description
4-2
4-3
4-3
4-6
4-25
4-25
4-26
4-28
4-28
4-30
4-39
4-39
4-39
4-40
iv
-
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
14/124
AMCP
706411
TABLE
O
CON TENTS (Con t.)
Paragraph Page
(S) CHAPTER 5 ELECTRONIC WARFARE VULNERABILITY
O F AVIONICS (U)
5-1
5-1.1
5-1.2
5-2
5-2.1
5-2.2
5-2.3
5-3
5-3.1
5-3.2
5-4
5
-4.1
5-4.2
c 1
c-1.1
c-1.2
C- 1.3
C- 1.4
c -2
c-2.1
c-2.2
c 3
D- 1
D-2
D-3
D-4
D-5
D-6
Introduction
Scope
General Conten t
EW Threat
to
Avionics
Establishing th e Thre at
Threat Equipment General Capabilities-Present
a ndF u t u re
Thre at Doctrine and Tactics
EW Vulnerability of Avionic Equip men t
Vulnerability Investigations
Results
of
Typical Vulnerability Investigations
Missions
Development
of
Analysis Proced ure
Illustration of t he Vulnerability Analysis
Procedure
References
The Imp act of EW Vulnerability on A irmobile
APPENDIX C THEORETICAL SUSCEPTIBILITY O F
NAVIGATION EQUIPMENT (AN/ARN-92
LORAN-D RECE IVER)
Susceptibility During Search
Receiver Operation During Search
Nonco herent ECM-Search
Coherent ECM-Search
Conclusions Regarding Search Susceptibility
Susceptibility During Track
Noncoherent ECM-Track
Coherent ECM-Track
AN/ARN-92 LORAN Phase Tracking Loops
5-5
5 5
5-6
5-6
5-6
5-7
5-7
5-8
5-8
5-33
5-58
5-60
5-73
5-82
c
1
c 1
C-6
c-11
C-15
C-16
C-16
c-20
C-29
APPENDIX D
THEORETICAL SUSCEPTIBILITY O F A
MULTIFUNCTION SYSTEM (HELMS)
Target Powe r D-
1
Susceptibility Criteria D-4
Sensitivity Due t o Receiver Noise D-8
Susceptibility t o CW an d FMCW Jamm ing D-8
Susceptibility
to
Direct Noise Amplification
(DINA) Jamm ing D-9
Susceptibility to Repeater Jamming
D- 10
V
-
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
15/124
AMCP 706-411
TABLE
OF CONTENTS (Con t.)
Paragraph Page
APPENDIX E. SUSCEPTIBILITY OF VARIABLE PARAMETER
TERRAIN-AVOIDANCE RADAR (VPTAR)
E- 1
E-2
E-2.1
E-2.2
E-2.3
E-2.4
E-2.5
E-2.6
E-3
E-3.1
E-3.2
E-4
F
F-2
F 3
6 1
6-1.1
6- 1.2
6-2
6-2.1
6-2.2
6-2.3
6-2.4
6-2.5
6-2.6
6-3
Suscep tibility Criteria E- 1
Susceptibility E- 1
tion (DINA) Jamming E-2
Jamming Signals E-5
Sensitivity Limitation Due t o Receiver Noise E-1
Susceptibility D ue t o Direct Noise Am plifica-
Susceptibility t o Spot Continuous-Wave (CW)
Suscep tibility to Pulsed CW Jamm ing S ignals.
E-6
Continuous-W ave (AMCW) Jamm ing Signals E-6
Continuous-Wave (FMCW) Jamm ing Signals E-7
Variable Param eters E-8
Power Transm itted E-8
Transmitted Frequency E-8
Conclusions and Reco mm endation s E-8
Susceptibility
to
Amplitude-Modulated
Susceptibility to Frequency-M odulated
Sensitivity of VPTAR ECM Vu lnerability to t he
APPENDIX F. EQUIPMENT OPERATIONAL
CHARACTERISTICS
LORAN-D Airbo rne Receiver Charac teristics F-1
HELMS Characteristics F-3
VPTAR Characteristics F-5
(S)
CHAPTER 6.OPTICAL/ELECTRONIC WARFARE
SYSTEMS (U)
WL NER ABIL ITY OF ELECTRO-OPTIC
Introduction 6-5
Chapter Contents
6 6
Terminology 6-6
6-
9
System Definitions 6-
1
ulnerability of EO Systems
Criteria fo r Effective O peration of V ictim
6-
1
ystems
hre at Analysis 6-20
Susceptibility of EO Equip men ts 6-33
Interceptibility a nd Accessibility of E O
Systems 6-69
Feasibility of Optical-E lectronic Warfare 6-133
Optical/Electronic Counter-Countermeasures 6-154
-
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
16/124
AMCP
706-41
1
TA B LE OF CONTENTS (Con t.)
Paragraph
Page
6-3.1 Red uction of Multiple Optical Intern al
eflections 6- 15 4
6-3.2 Reduction of Potential Precursor Signals 6-155
Damage 6-159
6-3.4 Optical Aug mentation 6-161
6-3.5 Misce llaneous Design Approaches 6- 167
References 6- 167
6-3.3
Hardening of Certain IR Detectors Against
S )
CHAPTER 7 LECTRON IC WARFARE VULN ERABILITY
OF SATE LLITE COMMUNICATIONS (U)
7- 1
7-2
7-2.1
7-2.2
7-2.3
7-2.4
7-2.5
7-3
7-3.1
7-3.2
7-3.3
7-3.4
7-4
7-4.1
7-4.2
7-4.3
7-4.4
G- 1
G-2
G-2.1
G-2.2
G-3
G-3.1
G-3.2
G-4
G-4.1
Introduction
Satellite Comm unication System
Introduction
Space Subsystem
Satellite Transponder
Earth Term inal Subsystem
Secondary System Characteristics/
Considerations
Satellite Communication System V ulnerability
Introduction
Basic Tool Requirements
Design Aids
Vulnerability E xamples
Increased ERF
Receiving Antenna Directivity/Sidelobe
Reduction
Spread-Spectrum Techniques
Oth er ECM Strategies
References
Bibliography
Satellite Antijamming Techniques
APPENDIX G ATELLITES
7-7
7-7
7-7
7-11
7-23
7-28
7-40
7-57
7-57
7-61
7-62
7-109
7-110
7-1 10
7-1 14
7-1 14
7-115
7-1 16
7-1 17
General G-1
Initial Defense Communications Satellite
Program (1DCSP)-DCS Phase I G- 1
Space Subsystem. Gene ral G- 1
Satellite Transponder G- 1
DCSC Phase I1 Satellite
G-5
Space Subsystem. Gene ral G-5
Satellite Transponder G-6
TACSAT G-8
Space Subsy stem. Gene ral G-8
-
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
17/124
AMCP 70641
1
TABLE
OF
CONTE NTS (Cont.)
Paragraph Page
G-4.2
G-5
G-5.1
G-5.2
G-6
G-6.1
G-6.2
G-7
G-7.1
G-7.2
H- 1
H-2
H-3
H-4
H-5
H-6
H-7
H-8
H-9
H-10
H-11
H-12
I-
1
1-2
1-3
1-4
1-5
1 6
1 7
J
1
5-2
5 2.1
5-2.2
5-2.3
TACSAT Transpo nder G-9
SKYNET G-11
General G-11
SKYNFT Satellite Transponder
G-17
NATO G-18
General G-18
NATO Transponder G-20
INTELSAT G-20
General G-20
INTELSAT IV Transponder G-20
APPENDIX H. EART H TERMINALS
General
AN/FSC-9
AN/MSC46
AN/MSC-54
AN/MSCdO, Heavy Transportable (HT)
AN/MSC-6 1, Medium Transportable (MT)
SCT-21
AN/TSC-80
AN/MSC-57
Diplomatic Telecomm unications Service (DTS)
Major Ship Satellite Terminal (MASST)
AN/TSC-86 (LT)
APPENDIX I. PHASE I
H- 1
H- 1
H- 1
H-6
H-10
H-12
H-12
H-15
H-15
H-16
H-19
H-19
Background and Co nce pt. I- 1
System Description 1-1
Mo dulation Characteristics 1-4
Spacecraft 1-6
Com puter-T oCo mp uter Comm unications 1-6
Link Configu ration 1-7
CS Interfa ce 1-7
APPENDIX J. PHASE I1
Program D escription J-1
Requirements fo r Stage 1a Ear th Terminals J-2
Requirements for Stage 1b Earth Terminals
J 5
Requirements for Stage 1c Ea rth Terminals J-5
Eq uip me nt Aspects 5-2
viii
-
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
18/124
AMCP 706411
TABLE OF CONTENTS (Con t.)
Paragraph Page
APPENDIX K. OTHER COMMUNICATION SATELLITE SYSTEMS
K-
K-1.1
K-1.2
K-2
K-3
ir
Force Satellite Communication System
AFSCS)
K-1
General Description
K-
Missions Served K-1
Mini Communications Satellite System
K-
12
Concealment LES 8/91
K- 3
APPENDIX L. SPACE GROUND LINK SYSTEM
INDEX IND-1
ixlx
-
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
19/124
AMCP 706 412
DEPARTMENT OF THE ARMY
HEADQUARTERS UNITED STATES ARMY MATERIEL COMMAND
5001
Eisenhower Ave, Alexandria, VA
333
AMCP PAMPHLET
NO. 706 412
6
January
1976
ENGINEERING DESIGN HANDBOOK
VU LNERABI I Y 0F COM MUNI ATION L ECT RONI
AND ELECTRO-OPTICALSYSTEMS EXCEPT GUIDED
MISSILES) TO ELECTRONIC WARFARE SERIES
PART TWO
ELECTRONIC WARFARE VULNERABILITY OF
TACTICAL COMMUNlCATl ONS
TABLE OF CONTENTS
Paragraph
Page
LIST OF ILLUSTRATIONS . . . . . . . . . . . . . . . . x
LIST OF TABLES.
.......................
xv
PREFACE
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
xvii
(C) CHAPTER 1. INTRODUCTION (U)
1-1
1-1.1
1-1.2
1-1.3
1-1.4
1-2
1-2.1
1-2.2
1-2.3
1-2.4
1-3
1-4
1-4.1
1-4.2
1-4.3
Background of the Vulnerability Handbook
. . . .
General
Purpose
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Scope
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Handbook C ontent.
Electronic Warfare
........................
Definition
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Brief History of Electronic Warfare
. . . . . . . . . .
Elements of Electronic Warfare . . . . . . . . . . . . .
App lication of Electronic W arfare
. . . . . . . . . . .
Intelligence Coordination. . . . . . . . . . . . . . . . . . .
Most Pertinent Publications on Electronic
Warfare Guidance
Communication-Electronic Electronic Warfare
Electronic Counter-Countermeasures (ECCM)
Electromagnetic Cover and Deception (EC D)
(AR 105-87)
. . . . . . . . . . . . . . . . . . . . . . . . . .
(AR 105-2)
. . . . . . . . . . . . . . . . . . . . . . . . . . .
(AR 105-5) . . . . . . . . . . . . . . . . . . . . . . . . . . .
1-1
1-1
1-1
1-2
1-2
1-4
1-4
1-5
1-6
1-9
1-11
1-12
1-12
1-12
1-12
i
-
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
20/124
AMCP 706412
T A B L E OF CONT ENTS (Con t.)
Paragraph
Page
1-4.4
1-4.5
1-4.6
1-5
Electronic W arfare (FM 32-20)
. . . . . . . . . . . . .
1
2
Electronic Countermeasures Handbook (FM
32-20-1)
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1-12
Foreign Intelligence Office Handboo k . . . . . . . .
1
2
Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2
Glossary
of Terms A ssociated With V ulnerability
Bibliography
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1 2
(S)
CHAPTER 2 GENERAL APPROACH TO VULNERABILITY OF
SYSTEMS TO ELECTRON IC WA RFARE (U)
COMMUNICATION-ELECTRONIC AND ELEC TRO OPTICA L
2- 1
2- 2
2-2.1
2-2.2
2-2.3
2-3
2-3.1
2-3.2
2-3.3
2-3.4
2-3.5
2-4
2-4.1
2-4.2
2-4.3
2-4.4
2-4.5
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . .
The Philosophy of Vulnerability of Electronic
Warfare
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Perspective
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Th e Primary Facto rs of EW Vulnerability
Evaluation
. . . . . . . . . . . . . . . . . . . . . . . . . . .
Technical and O perational Vulnerability
Evaluation
. . . . . . . . . . . . . . . . . . . . . . . . . . .
EW Threat Precepts
. . . . . . . . . . . . . . . . . . . . . . .
General
EW Threat
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Tactical SIGINT/ESM
Tactical ECM
. . . . . . . . . . . . . . . . . . . . . . . . . . .
Tactical Electro-Optical Warfare . . . . . . . . . . .
Models of the EW E nvironm ent for Analysis
Purposes
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Application of Models in EW
. . . . . . . . . . . . . . .
Electromagnetic Target Arrays
. . . . . . . . . . . . .
Propagation Models
. . . . . . . . . . . . . . . . . . . . .
Terrain Models
. . . . . . . . . . . . . . . . . . . . . . . . .
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2-3
2-3
2-3
2-3
2-6
2-9
2-9
2-10
2-10
2-11
2-11
2-13
2-13
2-13
2-14
2-16
2-18
2-19
APPENDIX A
.
EW-RELATED SIMULATION PACKAGES
A- 1
A-1.1
A-1.2
A-1.3
A-1.4
A-2
A-2.1
A-2.2
A-2.3
EW Sys tem Analys is Models A-
ACCESS Systems
. . . . . . . . . . . . . . . . . . . . . . .
A- 1
USA EPG/EM ETF Model A-2
ALLEN Models
. . . . . . . . . . . . . . . . . . . . . . . . .
A-3
Electro-Optical Models A-4
Message-Routing Models . . . . . . . . . . . . . . . . . . . A-6
The Hughes MALLARD Simulation
. . . . . . . . .
A-6
IBM
ART SS and MASS Simulation
. . . . . . . . .
A-8
GTE Sylvania-SES-East AMCN Program
. . . . . .
A-8
11
-
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
21/124
AMCP 706 412
T A B L E
OF
CONTENTS (Con t . )
Paragraph Page
A-3
Other
Models
. . . . . . . . . . . . . . . . . . . . . . . . . . . .
A-8
A-3.1 COMM EL Model A-8
A-3.2 CRESS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-9
APPENDIX
B
. C U R R E N T T H R E A T
. . . . . . . . . B-
C) CHAPTER 3
.
ELECTRONIC WARFARE VULNERABILITY
3- 1
3-1.1
3-1.2
3-2
3-2.1
3-2.1.1
3-2.1.2
3-2.1.2.1
3-2.1.2.2
3-2.1.2.3
3-2.1.2.4
3-2.1.2.5
3-2.1.2.6
3-2.1.3
3-2.1.3.1
3-2.1.3.2
3-2.1.3.3
3-2.1.3.4
3-2.1.4
3-2.1.4.1
3-2.1.4.2
3-2.1.5
3-2.1.5.1
3-2.1.5.2
3-2.1.5.3
3-2.1.5.4
3-2.1.6
3-2.2
O F
TACTICAL COMMUNICATIONS (U)
LIST OF ABBREVIATIONS . . . . . . . . . . . . . . .
LIST
O F
SYMBOLS
. . . . . . . . . . . . . . . . . . . . . . .
Introduction
. . . . . . . . . . . . . . . . . . . . . . . . . . . .
Scope
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Outline of the Methodology
. . . . . . . . . . . . . . .
ECM Susceptibility Levels
. . . . . . . . . . . . . . . . . .
Susceptibility . . . . . . . . . . . . . . . . . . . . . . . . . . .
Conditions That Must Be Specified When Ex-
pressing Susceptibility
Receiver Performance and Selection of Sus-
ceptibility Threshold in Terms of Perfor-
mance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Bit Error Rate BER)
Intelligibility Testing
. . . . . . . . . . . . . . . . . . .
MapTest
. . . . . . . . . . . . . . . . . . . . . . . . . . . .
Character Error Rate
. . . . . . . . . . . . . . . . . . .
Relative Message Delay . . . . . . . . . . . . . . . . .
Signal-to-Noise Ratio and Related Measures
Jamming-to-Signal Ratios
JS).
. . . . . . . . . . . .
Measures of
JS
. . . . . . . . . . . . . . . . . . . . . . .
Variation of Required
JS
With Signal and
Equipment Parameters . . . . . . . . . . . . . . . . .
Processing Gain
. . . . . . . . . . . . . . . . . . . . . . .
Environmental
Noise
and Interference . . . . .
Susceptibility Thresholds
. . . . . . . . . . . . . . . . .
Discussion of Thresholds . . . . . . . . . . . . . . .
Selection of Performance Thresholds . . . . . . .
Causes of Susceptibility
. . . . . . . . . . . . . . . . .
Susceptibility in the Receiver Before De-
tec io n
Susceptibility in the Receiver During the
Susceptibility in Ancillary Equipment at the
Receiver . . . . . . . . . . . . . . . . . . . . . . . . . . .
Susceptibility of the User Operator)
. . . . . . .
Detection Process and Following
Susceptibility to Deception ECM
. . . . . . . . . . .
Susceptibility of Tactical Communication
Equipment
3-1
3-3
3-6
3-6
3-6
3-8
3-8
3-9
3-9
3-9
3-12
3-16
3-18
3-18
3-18
3-19
3-19
3-19
3-20
3-22
3-23
3-23
3-23
3-27
3-27
3-29
3-31
3-32
3-33
3-34
iii
http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/http://82050_03a.pdf/ -
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
22/124
AMCP 706 41
2
T A B L E
OF
CONT ENTS (Con t.)
Page
aragraph
3-2.2.1
3-2.2.1.1
3-2.2.1.2
3-2.2.2
3-2.3
3-2.3.1
3-2.3.2
3-2.3.2.1
3-2.3.2.2
3-2.4
3-3
3-3.1
3-3.1.1
3-3.1.2
3-3.1.3
3-3.1.4
3-3.2
3-3.2.1
3-3.2.1.1
3-3.2.1.2
3-3.2.2
3-3.2.2.1
3-3.2.2.2
3-3.2.2.3
3-3.2.2.4
3-3.2.2.5
3-3.2.3
3-3.3
3-3.3.1
3-3.3.2
3-3.3.2.1
3-3.3.2.2
3-3.3.2.3
3-4
3-4.1
3-4.2
3-4.2.1
3-4.2.2
3-4.2.2.1
3-4.2.2.2
Theore ical Susceptibility
:
General Curves
and Equations . . . . . . . . . . . . . . . . . . . . . . . .
3-34
Analog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3-34
Digital
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-38
HF.SSB. and VHF-FM 3-42
ment
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-56
Susceptibility-Empirical Results . . . . . . . . . . . 3-56
Special Considerations for Trunk Equipment
3-56
Preemphasis/Deemphasis . . . . . . . . . . . . . . .
3-56
Threshold Extension by
F M
Feedback
3-74
Susceptibility Sample Problems
. . . . . . . . . . . . .
3-74
Vulnerability . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-76
Discussion of Vulnerability
. . . . . . . . . . . . . . . .
3-76
Susceptibility .........................
3-76
Accessibility
. . . . . . . . . . . . . . . . . . . . . . . . . . . 3-77
Interceptibility
. . . . . . . . . . . . . . . . . . . . . . . . .
3-77
Feasibility . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3-77
Accessibility and Interceptibility
. . . . . . . . . . . . 3-77
Calculation of Accessibility and Intercepti-
bility
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-77
Accessibility
. . . . . . . . . . . . . . . . . . . . . . . . .
3-77
Interceptibility
. . . . . . . . . . . . . . . . . . . . . . . . 3-78
Antennas . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3-78
Antenna Directivity and Gain
. . . . . . . . . . . . .
3-79
The Receiving Antenna and Effective
Aperture
. . . . . . . . . . . . . . . . . . . . . . . . . . . 3-80
Parabolic Antennas . . . . . . . . . . . . . . . . . . . . 3-81
Sidelobes
. . . . . . . . . . . . . . . . . . . . . . . . . . . 3-82
Sample Problems 3-83
Propagation Models
3-85
Vulnerability
of
a Communication Link
. . . . . . . 3-87
General
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3-87
Sample Problem . . . . . . . . . . . . . . . . . . . . . . . 3-90
Susceptibility Calculations. . . . . . . . . . . . . . .
3-91
Accessibility Calculations
. . . . . . . . . . . . . . . 3-91
Susceptibility-Empirical Results for HF.AM.
Susceptibility of Trunk Communication Equ ip
Interceptibility Calculations
3-92
EW Threat Models and Vulnerability Simulation
Programs
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-94
Introduction
. . . . . . . . . . . . . . . . . . . . . . . . . . . 3-94
EW Threat Models . . . . . . . . . . . . . . . . . . . . . . . 3-95
General
...............................
3-95
Establishing the Current Threat Projection
. . .
3-95
Foreign Science and Technology Center
. . . . 3-96
ACSI
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-96
iv
http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03c.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/http://82050_03b.pdf/ -
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
23/124
AMCP
706 412
T A B L E OF CONT ENTS (Con t .)
Paragraph Page
3 4.2.2.3
Fore ign Intelligence Office (FIO )
. . . . . . . . .
3 96
3 4.2.3
Exam ples of D ata fro m Threat Models . . . . . . 3 96
3 4.2.3.1
Equipment
. . . . . . . . . . . . . . . . . . . . . . . . . . .
3 96
3 4.2.3.2
Deployment . . . . . . . . . . . . . . . . . . . . . . . . . 3 96
3 4.3 Vulnerability S imula tion Programs . . . . . . . . . . 3 96
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 102
(S) CHAPTER 4 . ELECTRONIC WARFA RE VULNERABILITY O F
TARGET ACQUISITION RADARS (U)
GROUND-BASED AND AIRBORNE SURVEILLANCE AND
4 1
4 2
4 2.1
4 2.2
4 3
4 3.1
4 3.2
4 4
4 4.1
4 4.2
4 5
4 5.1
4 5.2
Int roduct ion . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Ground-Based P ersonnel and Vehicle Dete ction
Radars
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
System Description . . . . . . . . . . . . . . . . . . . . . . .
Vulnerability
. . . . . . . . . . . . . . . . . . . . . . . . . . .
GroundMapping . . . . . . . . . . . . . . . . . . . . . . .
Sys tem Description. . . . . . . . . . . . . . . . . . . . . . .
Vulnerability
. . . . . . . . . . . . . . . . . . . . . . . . . . .
Weapon-Location Radars
. . . . . . . . . . . . . . . . . . .
System Description . . . . . . . . . . . . . . . . . . . . . .
Vulnerability . . . . . . . . . . . . . . . . . . . . . . . . . . .
Meteorological Radars
. . . . . . . . . . . . . . . . . . . . .
System Description. . . . . . . . . . . . . . . . . . . . . . .
Vulnerability
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Airborne Radar fo r Vehicle D etect ion and
4 2
4 3
4 3
4 6
4 25
4 25
4 26
4 28
4 28
4 30
4 39
4 39
4 39
4 40
(S) CHAPTER 5 ELECTRONIC WARFA RE VULNERABILITY O F
AVIONICS (U)
5 1
5 1.1
5 1.2
5 2
5 2.1
5 2.2
5 2.3
5 3
5 3.1
5 3.2
5 4
5 4.1
5 4.2
Int roduct ion
Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
General Conten t
. . . . . . . . . . . . . . . . . . . . . . . . .
EW Threat to Avionics
. . . . . . . . . . . . . . . . . . . . .
Establishing t he T hreat
. . . . . . . . . . . . . . . . . . .
Th reat Equ ipm ent General Capabilities-Present
a n d F u t u r e . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Threat Doctrine and Tactics
. . . . . . . . . . . . . . . .
EW Vulnerability of Avionic Equipment
. . . . . . .
Vulnerability Investigations
. . . . . . . . . . . . . . .
Results of Typical Vulnerability Investigations .
Missions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Development
of
Analysis Procedure
. . . . . . . . .
Illustration of the Vulnerability Analysis Pro-
The Impact of EW Vulnerability o n Airmobile
5 5
5 5
5 6
5 6
5 6
5 7
5 7
5 8
5 8
5 33
5 58
5 60
cedure
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 73
V
http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/http://82050_03d.pdf/ -
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
24/124
AMCP 706 412
T A B L E OF CONTEN TS (Con t.)
Page
aragraph
5-4.2
c- 1
c 1.1
c-1.2
C-1.3
C-1.4
c - 2
c-2.1
c-2 .2
c 3
D- 1
D-2
D-3
D-4
D-5
D-6
E- 1
E-2
E-2.1
E-2.2
E-2.3
E-2.4
E-2.5
Illustration of the Vulnerability Analysis Pro-
cedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5-73
References . . . . . . . . . . . . . . .
5-82
(C) APPENDIX C. THEORETICAL SUSCEPTIBILITY
OF NAVIGATION EQUIPMENT
CEIVER)
(AN/ARN-92 LORAN-D RE-
Susceptibility During Search
. . . . . . . . . .
Receiver O peratio n During Search . . . . .
Noncoherent ECM-Search
.
.
.
. .
.
. .
Coh erent ECM-Search
. . . . . . .
Conclusions Regarding Search Susceptibility
. .
Susceptibility During Track . . . . . . .
Noncoherent ECM-Track . . . . . . . . .
Coh erent ECM-Track . . . . . . . . . . .
AN/ARN-92 LORAN Phase Tracking Loops
.
c- 1
c- 1
C-6
c -11
C-15
C-16
C-16
c - 2 0
C-29
(C) APPENDIX D. THEORETICAL SUSCEPTIBILITY
OF A MULTIFUNCTION SYSTEM
(HELMS)
Target Power . . . . . . . . . . . D-1
Susceptibility Criteria . . .
.
. . . . . . D-4
Sensitivity Due t o Receiver Noise . . . D-8
Susceptibility
to
CW and FMCW Jam mi ng.
. . . .
D-8
Susceptibility t o D irect Noise Amplification
(DINA) Jamming.
. . . . . . . . .
D-9
Susceptibility to Repeater Jamming.
. . .
D-1
0
(C) APPENDIX E.
SUSCEPTIBILITY
OF
VARIABLE
PARAMETER TERRAIN-AVOID-
ANCE RADAR (VPTAR)
Susceptibility Criteria
. . . . . . . . . .
E- 1
Susceptibility . . .
. .
. . . . E- 1
Sensitivity Lim itation Due to Receiver Noise . E-1
Susceptibility Due
to
Direct N oise Amplifica-
t ion (DINA) Jamming
. . . . . . . . . . . .
E-2
Susceptibility
to
Spot Continuous-Wave (CW)
Jam min g Signals . . . . . . . . .
E-5
Susceptibility to Pulsed CW Jamming Signals.
.
E-6
Susceptibility
to
Amplitude-Modulated Con-
tinuous-Wave (AMCW) Jam mi ng Signals . . E-6
vi
-
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
25/124
AMCP 708412
T A B L E OF CONTENTS (Con t .)
Paragraph Page
E-2.6 Susceptibility t o Frequency-Modulated Con-
E-3
tinuous-Wave (FMCW ) Jam mi ng Signals
. . . . .
E-7
Variable Parameters . . . . . . . . . . . . . . . . . . . . . . E-8
E-3.1 Power Tran smitted
. . . . . . . . . . . . . . . . . . . . . .
E-8
E-3.2 Transm itted Frequency
. . . . . . . . . . . . . . . . . . .
E-8
Sensitivity of VPTAR ECM Vulnerability to t he
E-4 Conclusions and Recom mendations
. . . . . . . . . . .
E-8
(C) APPENDIX
F
EQUIPMENT OPERA TIONAL
CHARACTERISTICS
F-
1 LORAN-D Airb orne Receiver Characteristics
. . .
F- 1
F-2 HELMS Characteristics . . . . . . . . . . . . . . . . . . . . F-3
F-3 VPTAR Characteristics
. . . . . . . . . . . . . . . . . . . .
F-5
S)
CHAPTER 6
.
OPTICAL/ELECTRONIC W ARFA RE
SYSTEMS (U)
VULNERA BILITY O F ELECTRO-OPTIC
6-1
6-1.1
6-1.2
6-2
6-2.1
6-2.2
6-2.3
6-2.4
6-2.5
6-2.6
6-3
6-3.1
6-3.2
6-3.3
6-3.4
6-3.5
Int roduct ion . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter Contents
. . . . . . . . . . . . . . . . . . . . . . . .
Terminology
. . . . . . . . . . . . . . . . . . . . . . . . . . .
Vulnerability of E O Systems . . . . . . . . . . . . . . . .
System Definitions
. . . . . . . . . . . . . . . . . . . . . .
Systems
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Thre at A nalysis . . . . . . . . . . . . . . . . . . . . . . . . .
Criteria for Effective Operatio n of V ictim
Susceptibi li ty of E O Equip men ts
. . . . . . . . . . . .
Intercep tibility and A ccessibility of E O Sys-
tems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Feasibility of Optical-Electronic Warfare
Red uction of Multiple O ptical Intern al Re-
Op tical/Electro nic Counter-Countermeasures
. . .
f lect ions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Re du ctio n of Po tential Precursor Signals . . . . . .
Damage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Optical Augm entat ion . . . . . . . . . . . . . . . . . . . .
Miscellaneous Design App roach es
. . . . . . . . . . .
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Hardening of Certain IR Dete ctors Against
6-5
6-6
6-6
6-9
6-11
6-11
6-20
6-33
6-69
6-133
6-154
6-1
5 4
6-1
6-1
9
6-161
6-167
6-167
S) CHAPTER 7 . ELECTRONIC WARFARE VULNERABILITY
OF SATELLITE COMMUNICATIONS (U)
7-
1
Int roduct ion . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-7
7-2 Satellite Com mu nication Sys tem . . . . . . . . . . . . . 7-7
vii
-
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
26/124
AMCP
70841
2
TABLE
OF
CONTENTS
(Con t)
Pagearagraph
7-2.1
7-2.2
7-2.3
7-2.4
7-2.5
7-3
7-3.1
7-3.2
7-3.3
7-3.4
7-4
7-4.1
7-4.2
7-4.3
7-4.4
G-
1
G-2
G-2.1
G-2.2
G-3
G-3.1
G-3.2
G-4
G-4.1
G-4.2
G-5
G-5.1
G-5.2
G-6
G-6.1
G-6.2
G-7
G-7.1
G-7.2
H-
Introduction
Space Subsystem
Satellite Transponder
. . . . . . . . . . . . . . . . . . . . .
Earth Terminal Subsystem . . . . . . . . . . . . . . . . .
Secon dary System Characteristics/Considera-
tions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Satellite Communication System Vulnerability .
Introduction
Basic Tool Requirements
. . . . . . . . . . . . . . . . . .
Vulnerability Examples
. . . . . . . . . . . . . . . . . . .
Increased ERP
Receiving Antenn a Directivity/Sidelobe Re-
duction
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Oth er ECM Strategies . . . . . . . . . . . . . . . . . . . .
References
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Design Aids
. . . . . . . . . . . . . . . . . . . . . . . . . . . .
Satellite Antijamming Techniques
. . . . . . . . . . . .
Spread-Spectrum Techniques
. . . . . . . . . . . . . . .
Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . .
(U) APPENDIX G. SATELLITES
General
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Initial Defense Communications Satellite
Pro-
gram (1DCSP)-DCS Phase I . . . . . . . . . . . . . . .
Space Subsystem. General . . . . . . . . . . . . . . . . .
Satellite Transponder . . . . . . . . . . . . . . . . . . . . .
DCSC Phase I1 Sate llite
. . . . . . . . . . . . . . . . . . . .
Space Sub system. General . . . . . . . . . . . . . . . . .
Satellite Transponder .....................
TACSAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Space Sub system. General . . . . . . . . . . . . . . . . .
TACSAT Transponder
....................
SKYNET
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
SKYNET Satellite Transponder . . . . . . . . . . . . .
NATO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
General
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
NATO Transponder
. . . . . . . . . . . . . . . . . . . . . .
INTELSAT
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
General
INTELSAT IV T ransponder
. . . . . . . . . . . . . . . .
(U)
APPENDIX H EARTH TERMINALS
7-7
7-11
7-23
7-28
7-40
7-57
7-57
7-61
7-62
7-109
7-1 10
7-110
7-1 14
7-1 14
7-115
7-1 16
7-117
G-
1
G- 1
G- 1
G- 1
G-5
G-5
G-6
G-8
G-8
G-9
G-11
G-11
G-17
G-18
G-18
G-20
G-20
G-20
G-20
General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . H-1
...
Vl l l
-
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
27/124
AMCP
706412
TABLE
OF
CONT ENTS (Con t.)
Paragraph
Page
H-2
H-3
H-4
H-5
H-6
H-7
H-8
H-9
H-10
H-11
H-12
I-
1
I- 2
1-3
1-4
1-5
1-6
1-7
J-
1
5-2
5-2.1
5-2.2
5-2.3
K-
1
K-1.1
K-1.2
K-2
K-3
AN/FSC-9
. . . . .
.
. . .
. .
.
AN/MSC-46
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
AN/MSC-54
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
AN/MSC-60, Heavy Transportable (H T)
. .
AN/MSC-61 Medium Transportable
MT)
. . .
SCT-21
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
AN/TSC-80
. . . . .
.
. . . .
.
AN/MSC-57 . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Diplomatic Telecommu nications Service (DTS)
. .
Major Ship Satellite Terminal (MASST).
. . . .
AN/TSC-86 (LT)
. . . . . . . . . .
(U) APPEN DIX I. PHASE I
H- 1
H-
1
H-6
H-10
H-12
H-12
H-15
H-15
H-16
H-19
H-19
Background an d Conc ept
System D escription
. . . . . . . . . . . .
Modulation Characteristics.
. . . . . . .
Computer-To-Computer Communications.
. .
DCS Interface
. . . . . . . . . .
Link Configuration
. . .
.
. .
. .
.
. . . . . . . . . . . . .
I- 1
I- 1
1-4
1-6
1-7
1-7
Spacecraft
. . . . . . . . . .
1-6
(U)
APPEN DIX J. PHASE I1
Program Description
. .
.
.
J- 1
Equipm ent Aspects
. .
.
.
J
Req uirem ents for Stage la Ear th Terminals
. .
5-2
Requirem ents for Stage 1
b
Earth Terminals
. .
J-5
Requirem ents for Stage l c Earth Terminals
. .
J-5
(S) APPENDIX K. OTH ER COMMUNICATION
SATELLITE SYSTEMS
Air Force Satelli te C omm unication System
K- 1
K-12
(AFSCS)
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Missions Served
. . . . . . . . . .
General Description
. . . . . . .
K- 1
Mini Comm unications Satellite System
. . . . . .
Concealment (LES 8/9 )
. . . . . . .
K-12
K-13
S)
APPENDIX
L.
SPACE GROU ND LINK
SYSTEM
1nd-1
NDEX
ix /x
http://82050_indx.pdf/http://82050_indx.pdf/ -
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
28/124
-
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
29/124
AMCP 706-411
them from specific end items of equipment-
and consolidates the data into a single series
of classified documents, together with a dis-
cussion and interpretation of the data. Thus,
development personnel-concerned with the
EW vulnerability of their systems-will be
saved time and effort in attempting to locate
and apply appropriate information or con-
ducting EW vulnerability studies. To pro-
vide a continuing and up-todate data base,
some studies will still have to be conducted.
Sample calculations are used throughout the
text to illustrate the theory and ideas pre-
sented.
1-1.3 U) SCOPE
This
handbook covers investigations,
studies, and analyses concerned with the vul-
nerability to electronic warfare EW) of all
types of communicationelectronic CE) and
electro-optical EO) equipment/systems, ex-
clusive of guided missiles. It includes the
various EW threats, present and future,
which US communicationelectronic and
electro-optical systems may face in the field.
Elements comprising the handbook in-
clude:
1) Factors that determine system vul-
nerability to EW-i.e., susceptibility, acces-
sibility, interceptibility feasibility, and tac-
tics
2) Steps, theoretical and experimental,
that constitute a vulnerability investigation
3) Effects of ECM modulations on dif-
ferent classes of equipment; e.g., fm radio,
pulse Doppler radar, noncoherent moving
target indicator mti)
(4) Specific jamming-to-signal ratios
J/S,
and the effect of such J/S on the perfor-
mance capabilities of the equipment exposed.
1-1.4
U)
HANDBOOK CONTENT
This
handbook is presented in seven chap-
ters. Chapters 1 and 2 introduce the basic
concepts of vulnerability. Each of the re-
maining five chapters is designed
as
a com-
plete treatise
on
its respective CE and EO
subject matter. The overall content of each
chapter is described in the paragraphs that
follow.
1-1.4.1 U) Introduc t ion to the Vulnerabi l -
ity Handbook (Chapter 1)
Chapter 1 serves as an introduction to the
handbook and presents the general subject
of electronic warfare as
it
relates to vulner-
ability assessment. The chapter contains
four major paragraphs:
1) 1-1 Background of the Vulnerability
Handbook
2) 1-2 Electronic Warfare
3) 1-3 Intelligence Coordination
4)
1 4 Most Pertinent Publications on
Electronic Warfare Guidance.
The paragraphs on electronic warfare pro-
vide a laymans introduction to the con-
cept of EW, including identification of its
component parts, the need for intelligence
inputs, and the concepts of command and
control of EW. Par. 1-5 provides a glossary
of terms most frequently encountered in the
field of EW.
1-1.4.2 U) General Approach to Vulnera-
bi l i ty of Communication-Elec-
tro nic and Electro-Optical
Sys-
tems to EW (Chapter 2)
Chapter 2 is a working explanation
of
vulnerability to EW. The subject matter is
presented in four main paragraphs:
1) 2-1 Introduction
1-2
-
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
30/124
AMCP 706-411
2) 2-2
Philosophy of Vulnerability to
Electronic Warfare
3) 2-3 EW Threat Precepts
4)
2 4
Models of the EW Environment
for Analysis Purposes.
The elements of vulnerability are identi-
fied and their relationship is shown. The
Soviet threat capability is discussed, with
emphasis
on
tactical employment, and the
significance of threat modeling for vulnera-
bility assessment is identified.
The different types of models of EW en-
vironment are outlined, with an explanation
of the construction and utility of each type
of model. Two Appendices are provided
that list and define some of the existing
models used in EW vulnerability analyses,
and Soviet signal intercept systems.
1-1.4.3
U)
EW Vuln erabilit y of Tactical
Commu nications (Chapter 3 )
Chapter 3 deals with the vulnerability of
tactical communications and is presented in
four major paragraphs:
(1) 3-1 Introduction
2) 3-2
ECM Susceptibility Level
3) 3-3
EW Threat Models
4) 3 4 Vulnerability.
The susceptibility of both tactical and
trunk systems is discussed in terms of ECM
modulations and their effects on equipment
performance. The level of jamming required
is analyzed. Current threat data are sum-
marized with direction on how to obtain up-
dating through intelligence channels. Vulner-
ability is examined with respect to its ele-
ments, simulations, and critical parameters.
A sample problem solution is given for the
assessment of the vulnerability of a commu-
nication network.
1-1.4.4
U)
EW Vulnerability
o f
Ground-
Based
and Airborne Surveillance
and Target Acquisition Radars
(Chapter 4)
Chapter 4 covers the vulnerability assess-
ment technique for surveillance and target
acquisition radars. The chapter is presented
in
five major paragraphs:
1) 4-1 Introduction
2) 4-2 Ground-Based and Personnel and
Field Detection Radars
3) 4-3
Airborne Vehicle Detection and
Ground Mapping Radars
4) 4 4 Weapon Location Radars
5) 4-5
Meteorological Radars.
Each paragraph is complete within itself
and identifies the radar system tactical role
and employment concepts. Pertinent char-
acteristics of the radar class are discussed,
and the means of assessing the system vulner-
ability are identified.
1-1.4.5 U) EW Vulnerability o f Avionics
(Chapter 5 )
Chapter 5 discusses the assessment of the
vulnerability of avionic systems. It is pre-
sented in four major paragraphs:
1 )
5-1
Introduction
2) 5-2
EW Threat to Avionics
3)
5-3 EW Vulnerability of Avionic
Equipment
4)
5 4
The Impact of EW Vulnerability
on the Selection of Avionic Configurations.
1-3
-
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
31/124
AMCP 706-411
The avionic systems are identified by class
such as Communication, IFF, Terrain Avoid-
ance Radar, and Navigation Systems. The
general threat to these systems is discussed,
and the system vulnerability criteria are iden-
tified. Steps to be taken in analysis are de-
scribed, and methods for data reduction and
presentation are explained. A discussion on
mutual interference problems and mission
profile as it affects vulnerability and the ef-
fects of EW vulnerability on air mobility
missions completes the chapter.
1-1.4.6 U) Optic aVElectron ic Warfare Vu l-
nerabi l i ty of Electro-Optic
Sys-
tems (Chapter 6)
Chapter 6 covers the vulnerability assess-
ment of electro-optical systems. It is divided
into three major paragraphs:
1)
6-1 Introduction
2) 6-2 Vulnerability of Electro-Optic
Systems
3) 6-3 Optical/Electronic Counter-Mea-
sures.
This chapter describes the electro-optic
equipments employed, their tactical employ-
ment and deployment requirements, the vul-
nerability aspects of the different classes of
systems, the potential threats to these sys-
tems, and concepts for electro-optic counter-
countermeasures. Specific approaches to de-
termining the degree of susceptibility, inter-
ceptibility, and accessibility of the electro-
optic systems are discussed.
1-1.4.7 U) EW Vulnerab i l i ty of Satel l i te
Comm unications (Chapter
7 )
EW vulnerability of satellite communica-
tions is addressed in four major paragraphs:
1) 7-1 Introduction
2) 7-2 Satellite Communication Systems
3) 7-3 Satellite Communication System
Vulnerability
4) 7-4 Satellite Antijamming Techniques.
A brief history of satellite systems is pre-
sented, continuing with discussions on active/
passive systems and orbit considerations.
Satellite transponder subsystems and ground
terminals for communication links are de-
scribed for both uhf and shf systems. A
presentation of vulnerability assessment tech-
niques leads to a description of the suscep-
tibility of several existing systems, and vul-
nerability assessment examples are provided
for user assistance. Electronic counter-
countermeasure ECCM) approaches are
treated briefly. Six appendixes are included
detailing Satellites, Earth Terminals, Phase I,
and Phase
11,
other Communication Satellite
Systems, and Space Ground Link Subsys-
tems.
1-2
U)
ELECTRO NIC W A RFARE
1-2.1 U) DEFIN IT IO N
AR 105-87 provides the following defini-
tion of electronic warfare
:
Electronic warfare EW) is military action
involving the use of electromagnetic energy
to determine, exploit, reduce or prevent hos-
tile use of the electromagnetic spectrum and
action which retains friendly use of the elec-
tromagnetic spectrum. There are three divi-
sions within EW:
1)
Electronic warfare support measures
ESM)
2) Electronic countermeasures ECM)
3) Electronic countercountermeasures
ECCM).
Fundamentals of EW
USAFA, includes
the following defining characteristics of elec-
tronic warfare:
1-4
-
8/11/2019 Engineering Design Handbook - Vulnerability of Communication-Electronic and Electro-Optical Systems (Except Gui
32/124
AMCP
706-41
1
Although not included in official US
Army definitions, we should note that EW
is really dependent on the radiation of elec-
tromagnetic radiation and not on electron-
ics
per se.
Hence, EW includes systems using
all forms of electromagnetic energy e.g.,
radio, radar, infrared IR), optical systems,
lasers, etc.).
For the purposes of this handbook, EW
has been broadened to mean electromagnetic
warfare. Table 1-1 shows the electromag-
netic divisions for EW.
1-2.2
(U) BRIEF HISTORY OF ELEC-
TRONIC WARFARE
The use of electronic warfare is not new.
It had its modest beginnings early in World
War I when the Germans used deceptive
messages to exploit Russian communication
intelligence comint) operations during 1914.
Electronic warfare support measures ESM)
had its beginning during the Battle of Jut-
land in 1918, when the British tracked the
German fleet radio transmissions, allowing
intercept of the fleet with tactical advantage
and subsequent victory by the British.
Recognition of the value of ESM led the
Germans to the use of ECM. British radio
stations along the Mediterranean were jammed
to support the escape of the German fleet
from the Black Sea.
TABLE 1 1 U).
World War I1 placed the development of
EW on its exponential increase. The dra-
matic expansion in electronic technology and
changes in tactical warfare doctrine during
this period brought about the development of
the CE complex and the EW equipments and
concepts to exploit and counteract the use of
electronic systems. Early in the war, the
Germans deployed a navigation system to
direct bombing raids on Britain. The British
responded with deception signals to disorient
the Luftwaffe. The game of oneupmanship
began with two successive iterations of the
German navigation systems countered suc-
cessfully by the British.
Denial jamming came of age following the
emplacement of radardirected coastal guns
by the Germans along the French coast. The
British employed jammers to protect their
coastal shipping lanes. The Germans also
proved adept at deceptive jamming by
initiating short-term jamming against British
radars and gradually increasing the jamming
period over several days span, making the
interference appear as atmospheric in origin.
Finally, they established a jamming period of
sufficient duration to cover the escape of
three cruisers from the harbor at Brest
through the English Channel to their home
ports.
During the Libyan campaign of 1942, the
EW SPECTRUM
U )
Nomenclature
Radio
Infrared
Visible Light