FM 3-36
FM 3-36
FM 3-36
(Publication Date)
FM 3-36
Field Manual No. 3-36 Headquarters Department of the Army Washington, DC, (Publication Date)
Chapter 2
Chapter 3
Chapter 4
Contents
Chapter 5
COORDINATION, DECONFLICTION, AND SYNCHRONIZATION..................5-1 Coordination and Deconfliction...........................................................................5-1 Synchronization ..................................................................................................5-5 Summary.............................................................................................................5-5 INTEGRATION WITH JOINT AND MULTINATIONAL OPERATIONS.............6-1 Joint Electronic Warfare Operations ...................................................................6-1 Multinational Electronic Warfare Operations ......................................................6-4 Summary.............................................................................................................6-6 ELECTRONIC WARFARE CAPABILITIES .......................................................7-1 Service Electronic Warfare Capabilities..............................................................7-1 External Support Agencies and Activities ...........................................................7-1 Summary.............................................................................................................7-3 THE ELECTROMAGNETIC ENVIRONMENT................................................... A-1 ELECTRONIC WARFARE INPUT TO OPERATION PLANS AND ORDERS. B-1 ELECTRONIC WARFARE RUNNING ESTIMATE........................................... C-1 ELECTRONIC WARFARE-RELATED REPORTS AND MESSAGES............. D-1 ARMY AND JOINT ELECTRONIC WARFARE CAPABILITIES...................... E-1 TOOLS AND RESOURCES RELATED TO ELECTRONIC WARFARE...........F-1 GLOSSARY .......................................................................................... Glossary-1 REFERENCES.................................................................................. References-1
Chapter 6
Chapter 7
Figures
Figure 1-1. The electromagnetic spectrum ......................................................................1-2 Figure 1-2. Electromagnetic spectrum targets.................................................................1-3 Figure 1-3. The three subdivisions of electronic warfare.................................................1-4 Figure 1-4. Means versus effects ..................................................................................1-12 Figure 2-1. Electronic warfare weight of effort during operations....................................2-2 Figure 3-1. Electronic warfare coordination organizational framework ...........................3-2 Figure 4-1. The operations process.................................................................................4-1 Figure 4-2. Example of analysis for an enemy center of gravity......................................4-3 Figure 4-3. Course of action development.......................................................................4-5 Figure 4-4. Course of action comparison.........................................................................4-8 Figure 4-5. Integrating processes and continuing activities...........................................4-10 Figure 4-6. Electronic warfare support to intelligence preparation of the battlefield .....4-11 Figure 4-7. Electronic warfare in the targeting process .................................................4-13 Figure 5-1. Spectrum deconfliction procedures...............................................................5-3 Figure 6-1. Joint frequency management coordination ...................................................6-3 Figure 6-2. Electronic warfare support request coordination...........................................6-4 Figure A-1. The electromagnetic spectrum..................................................................... A-2
ii
(Publication date)
Contents
Figure B-1. Appendix 4 (Electronic Warfare) to annex P (Information Operations) instructions ................................................................................................... B-2 Figure C-1. Example of an electronic warfare running estimate .....................................C-2 Figure C-2. Sample update information to the electronic warfare running estimate.......C-3 Figure E-1. Guardrail common sensor ............................................................................ E-2 Figure E-2. Aerial common sensor (concept).................................................................. E-2 Figure E-3. Prophet (vehicle-mounted) ........................................................................... E-3 Figure E-4. AN/MLQ-36A mobile electronic warfare support system ............................. E-5 Figure E-5. EA-6B Prowler .............................................................................................. E-6 Figure E-6. EC-130H Compass Call ............................................................................... E-8 Figure E-7. RC-135V/W Rivet Joint................................................................................. E-9 Figure E-8. Navy EA-6B Prowler................................................................................... E-10 Figure E-9. EA-18 Growler ............................................................................................ E-11
Tables
Table 2-1. Two Army information tasks: command and control warfare and information protection .................................................................................. 2-4 Table 2-2. Electronic warfare support to two Army information tasks............................. 2-5 Table 3-1. Functions of electronic warfare working groups ............................................ 3-3 Table 4-1. Sample input to synchronization matrix ......................................................... 4-7 Table A-1. Radio and radar designators and frequency bands ...................................... A-3 Table E-1. Army and joint electronic warfare capabilities ............................................. E-13 Table E-2. Electronic warfare systems and platforms resources.................................. E-14
(Publication date)
iii
Preface
PURPOSE
FM 3-36 provides Army doctrine for electronic warfare (EW) planning, preparation, execution, and assessment in support of full spectrum operations. Users of FM 3-36 must be familiar with full spectrum operations established in FM 3-0; the military decisionmaking process established in FM 5-0; the operations process established in FMI 5-0.1; commanders visualization described in FM 6-0; and electronic warfare described in JP 3-13.1.
SCOPE
FM 3-36 is organized into seven chapters and six appendixes. Each chapter addresses a major aspect of Army EW operations. The appendixes address aspects of EW operations that complement the operational doctrine. A glossary contains selected terms. Chapter 1 discusses the nature and scope of electronic warfare and the impact of the electromagnetic environment on Army operations. Chapter 2 offers a discussion of EW support to full spectrum operations, combat power, the warfighting functions, and information tasks. Chapter 3 introduces the organizational framework for command and control of EW operations. Chapter 4 describes how commanders integrate EW operations throughout the operations process. Chapter 5 discusses the coordination required to synchronize and deconflict EW operations effectively. Chapter 6 provides the baseline for integrating EW operations into joint and multinational operations. Chapter 7 discusses the enabling activities that support EW operations, such as command and control, intelligence, logistics, technical support and EW training. Appendix A discusses the electromagnetic environment. Appendix B illustrates an EW appendix to an operation order. Appendix C illustrates an EW running estimate. Appendix D discusses EW related reports and messages. Appendix E offers a reference guide to Army and joint EW capabilities. Appendix F discusses EW-related tools and resources.
APPLICABILITY
FM 3-36 provides guidance on EW operations for commanders and staffs at all echelons. This FM serves as an authoritative reference for personnel who Develop doctrine (fundamental principles and tactics, techniques, and procedures), materiel, and force structure. Develop institutional and unit training. Develop standing operating procedures for unit operations. Conduct planning, preparation, execution and assessment of electronic warfare. FM 3-36 applies to the Active Army, Army National Guard/Army National Guard of the United States, and U.S. Army Reserve.
iv
(Publication date)
Preface
ADMINISTRATIVE INFORMATION
Headquarters, U.S. Army Training and Doctrine Command, is the proponent for this publication. The preparing agency is the U.S. Army Electronic Warfare Proponent, U.S. Army Combined Arms Center. Send written comments and recommendations on a DA Form 2028 (Recommended Changes to Publications and Blank Forms) to Commander, U.S. Army Combined Arms Center and Fort Leavenworth, ATTN: ATZL-CSB-EW (FM 3-36), 950 Bluntville Lane, Building 391, Fort Leavenworth, KS 66027-2337; by e-mail to anthony.mcneill2@conus.army.mil; or submit an electronic DA Form 2028. The FM 3-36 writing team chief also may be contacted at commercial (913) 684-9464.
(Publication date)
Chapter 1
OPERATIONAL ENVIRONMENTS
1-1. An operational environment is a composite of the conditions, circumstances, and influences that affect the employment of capabilities and bear on the decisions of the commander (JP 3-0). An operational environment includes physical areasthe air, land, maritime, and space domains. It also includes the information that shapes the operational environment as well as enemy, adversary, friendly, and neutral systems relevant to a joint operation. Joint planners analyze operational environments in terms of six interrelated operational variables: political, military, economic, social, information, and infrastructure. To these variables Army doctrine adds two more: physical environment and time. (See FM 3-0 for additional information on the operational variables). Army leaders use operational variables to understand and analyze the broad environment in which they are conducting operations. 1-2. Army leaders use mission variables to synthesize operational variables and tactical-level information with local knowledge about conditions relevant to their mission. They use mission variables to focus analysis on specific elements that directly affect their mission. Upon receipt of a warning order or mission, Army tactical leaders narrow their focus to six mission variables known as METT-TC. They are mission, enemy, terrain and weather, troops and support available, time available and civil considerations. The mission variables outline the situation as it applies to a specific Army unit. 1-3. Commanders employ and integrate their units capabilities and actions within their operational environment to achieve a desired end state. Through analyzing their operational environment, commanders understand how the results of friendly, adversary, and neutral actions may impact that end state. During military operations, both friendly and enemy commanders depend on the flow of information to make informed decisions. This flow of information depends on the electronic systems and devices used to communicate, navigate, sense, store, and process information.
(Publication date)
1-1
Chapter 1
Figure 1-1. The electromagnetic spectrum 1-6. Adversaries and enemies, from small and single actors to large state, multinational, and nonstate actors, use the most modern technology. Such technology is moving into the cellular and satellite communications area. Most military and commercial operations rely on electromagnetic technologies and are susceptible to the inherent vulnerabilities associated with their use. This reliance requires Army forces to dominate the electromagnetic spectrum (within their operational environment) with the same authority that they dominate traditional land warfare operations. Emerging electromagnetic technologies offer expanded EW capabilities. They dynamically affect the electromagnetic spectrum through delivery and integration with other types of emerging weapons and capabilities. Examples are directed-energy weapons, high-powered microwaves, lasers, infrared, and electro-optical and wireless networks and devices.
1-2
(Publication date)
1-7. In any conflict, commanders attempt to dominate the electromagnetic spectrum. They do this by locating, targeting, exploiting, disrupting, degrading, deceiving, denying, or destroying the enemys electronic systems that support military operations or deny the spectrums use by friendly forces. The increasing portability and affordability of sophisticated electronic equipment guarantees that the electromagnetic environment in which forces operate will become even more complex. To ensure unimpeded access to and use of the electromagnetic spectrum, commanders plan, prepare, execute, and assess EW operations against a broad set of targets within the electromagnetic spectrum. (See figure 1-2.)
(Publication date)
1-3
Chapter 1
1-4
(Publication date)
ELECTRONIC ATTACK
1-9. Electronic attack is a division of electronic warfare involving the use of electromagnetic energy, directed energy, or antiradiation weapons to attack personnel, facilities, or equipment with the intent of degrading, neutralizing, or destroying enemy combat capability and is considered a form of fires (JP 313.1). Electronic attack includes Actions taken to prevent or reduce an enemys effective use of the electromagnetic spectrum, such as jamming and electromagnetic deception. Employment of weapons that use either electromagnetic or directed energy as their primary destructive mechanism (lasers, radio frequency weapons, particle beams). Offensive and defensive activities including countermeasures. 1-10. Common types of electronic attack include spot, barrage, and sweep electromagnetic jamming. Electronic attack actions also include various electromagnetic deception techniques such as false target or duplicate target generation. (See paragraphs 1-23 to 1-31 for further discussion of electronic attack activities.) 1-11. Directed energy is an umbrella term covering technologies that relate to the production of a beam of concentrated electromagnetic energy or atomic or subatomic particles (JP 1-02). A directed-energy weapon uses directed energy primarily as a direct means to damage or destroy an enemys equipment, facilities, and personnel. In addition to destructive effects, directed-energy weapon systems support area denial and crowd control. (See appendix A for more information on directed energy.) 1-12. Examples of offensive electronic attack include Jamming enemy radar or electronic command and control systems. Using antiradiation missiles to suppress enemy air defenses (antiradiation weapons use radiated energy emitted from the target as their mechanism for guidance onto targeted emitters). Using electronic deception techniques to confuse enemy intelligence, surveillance, and reconnaissance systems. Using directed-energy weapons to disable an enemys equipment or capability. 1-13. Defensive electronic attack uses the electromagnetic spectrum to protect personnel, facilities, capabilities, and equipment. Examples include self-protection and other protection measures such as use of expendables (flares and active decoys), jammers, towed decoys, directed-energy infrared countermeasure systems, and counter-radio-controlled improvised-explosive-device systems. (See JP 3-13.1 for more discussion of electronic attack.)
ELECTRONIC PROTECTION
1-14. Electronic protection is a division of electronic warfare involving actions taken to protect personnel, facilities, and equipment from any effects of friendly or enemy use of the electromagnetic spectrum that degrade, neutralize, or destroy friendly combat capability (JP 3-13.1). For example, electronic protection includes actions taken to ensure friendly use of the electromagnetic spectrum, such as frequency agility in a radio, or variable pulse repetition frequency in radar. Electronic protection should not be confused with self-protection. Both defensive electronic attack and electronic protection protect personnel, facilities, capabilities, and equipment. However, electronic protection protects from the effects of electronic attack (friendly and enemy), while defensive electronic attack primarily protects against lethal attacks by denying enemy use of the electromagnetic spectrum to guide or trigger weapons.
(Publication date)
1-5
Chapter 1
1-15. During operations, electronic protection includes, but is not limited to, the application of training and procedures for countering enemy electronic attack. Army commanders and forces understand the threat and vulnerability of friendly electronic equipment to enemy electronic attack and take appropriate actions to safeguard friendly combat capability from exploitation and attack. Electronic protection measures minimize the enemys ability to conduct electronic warfare support (electronic warfare support is discussed in paragraphs 1-18 to 1-20) and electronic attack operations successfully against friendly forces. To protect friendly combat capabilities, units Regularly brief force personnel on the EW threat. Ensure that electronic system capabilities are safeguarded during exercises, workups, and predeployment training. Coordinate and deconflict electromagnetic spectrum usage. Provide training during routine home station planning and training activities on appropriate electronic protection active and passive measures. Take appropriate actions to minimize the vulnerability of friendly receivers to enemy jamming (such as reduced power, brevity of transmissions, and directional antennas). 1-16. Electronic protection also includes spectrum management. The spectrum manager works for the G-6 or S-6 and plays a key role in the coordination and deconfliction of spectrum resources allocated to the force. Spectrum managers or their direct representatives participate in the planning for EW operations. 1-17. The development and acquisition of communications and electronic systems includes electronic protection requirements to clarify performance parameters. Army forces design their equipment to limit inherent vulnerabilities. If electronic attack vulnerabilities are detected, then units must review these programs. (See DODI 4650.01 for information on the spectrum certification process and electromagnetic compatibility.)
1-6
(Publication date)
PRINCIPAL ACTIVITIES
1-22. Principal EW activities support full spectrum operations by exploiting the opportunities and vulnerabilities inherent in the use of the electromagnetic spectrum. The numerous EW activities are categorized by the EW subdivisions with which they are most closely associated: electronic attack, electronic warfare support, and electronic protection. JP 3-13.1 discusses these principal activities in detail.
(Publication date)
1-7
Chapter 1
Electromagnetic Intrusion 1-28. Electromagnetic intrusion is the intentional insertion of electromagnetic energy into transmission paths in any manner, with the objective of deceiving operators or of causing confusion (JP 1-02). Electromagnetic Jamming 1-29. Electromagnetic jamming is the deliberate radiation, re-radiation, or reflection of electromagnetic energy for the purpose of preventing or reducing an enemys effective use of the electromagnetic spectrum, with the intent of degrading or neutralizing the enemys combat capability (JP 1-02). Electromagnetic Pulse 1-30. Electromagnetic pulse is the electromagnetic radiation from a strong electronic pulse, most commonly caused by a nuclear explosion that may couple with electrical or electronic systems to produce damaging current and voltage surges (JP 1-02). Electronic Probing 1-31. Electronic probing is the intentional radiation designed to be introduced into the devices or systems of potential enemies for the purpose of learning the functions and operational capabilities of the devices (JP 1-02). This activity is coordinated through joint or interagency channels and supported by Army forces.
1-8
(Publication date)
(Publication date)
1-9
Chapter 1
Electromagnetic Spectrum Management 1-42. Electromagnetic spectrum management is planning, coordinating, and managing joint use of the electromagnetic spectrum through operational, engineering, and administrative procedures. The objective of spectrum management is to enable electronic systems to perform their functions in the intended environment without causing or suffering unacceptable interference (JP 6-0). Wartime Reserve Modes 1-43. Wartime reserve modes are characteristics and operating procedures of sensors, communications, navigation aids, threat recognition, weapons, and countermeasures systems that will contribute to military effectiveness if unknown to or misunderstood by opposing commanders before they are used, but could be exploited or neutralized if known in advance. Wartime reserve modes are deliberately held in reserve for wartime or emergency use and seldom, if ever, applied or intercepted prior to such use (JP 1-02). Electromagnetic Compatibility 1-44. Electromagnetic compatibility is the ability of systems, equipment, and devices that utilize the electromagnetic spectrum to operate in their intended operational environments without suffering unacceptable degradation or causing unintentional degradation because of electromagnetic radiation or response. It involves the application of sound electromagnetic spectrum management; system, equipment, and device design configuration that ensures interference-free operation; and clear concepts and doctrines that maximize operational effectiveness (JP 1-02).
APPLICATION TERMINOLOGY
1-45. EW capabilities are applied from the air, land, sea, and space by manned, unmanned, attended, or unattended systems. Units employ EW capabilities to achieve the desired lethal or nonlethal effect on a given target. Units maintain freedom of action in the electromagnetic spectrum while controlling the use of it by the enemy. Regardless of the application, units employing EW capabilities must use appropriate levels of control and protection of the electromagnetic spectrum. In this way, they avoid adversely affecting friendly forces. (Improper EW actions must be avoided because they may cause fratricide or eliminate high-value intelligence targets.) 1-46. In the context of EW application, units use several terms to facilitate control and protection of the electromagnetic spectrum. Terms used in EW application include control, detection, denial, deception, disruption and degradation, protection, and destruction. The three subdivisions of EWelectronic attack, electronic protection, and electronic warfare supportare specified within the following descriptions.
Control
1-47. In the context of EW, control of the electromagnetic spectrum is achieved by effectively coordinating friendly systems while countering enemy systems. Electronic attack limits enemy use of the electromagnetic spectrum. Electronic protection secures use of the electromagnetic spectrum for friendly forces, and electronic warfare support enables the commanders accurate assessment of the situation. All three are integrated for effectiveness. Commanders ensure maximum integration of communications; intelligence, surveillance, and reconnaissance; and information tasks.
Detection
1-48. In the context of EW, detection is the active and passive monitoring of the operational environment for radio frequency, electro-optic, laser, infrared, and ultraviolet electromagnetic threats. Detection is the first step in EW for exploitation, targeting, and defensive planning. Friendly forces maintain the capability to detect and characterize interference as hostile jamming or unintentional electromagnetic interference.
1-10
(Publication date)
Denial
1-49. In the context of EW, denial is controlling the information an enemy receives via the electromagnetic spectrum and preventing the acquisition of accurate information about friendly forces. Degradation uses traditional jamming techniques, expendable countermeasures, destructive measures, or network applications. These range from limited effects up to complete denial of usage.
Deception
1-50. In the context of EW, deception is confusing or misleading an enemy by using some combination of human-produced, mechanical, or electronic means. Through use of the electromagnetic spectrum, EW deception manipulates the enemys decision loop, making it difficult to establish accurate situational awareness.
Protection
1-52. In the context of EW, protection is the use of physical properties; operational tactics, techniques, and procedures; and planning and employment processes to ensure friendly use of the electromagnetic spectrum. This includes ensuring that offensive EW activities do not electronically destroy or degrade friendly intelligence sensors or communications systems. Protection is achieved by component hardening, emission control, and frequency management and deconfliction. Frequency management and deconfliction include the capability to detect, characterize, geolocate, and mitigate electromagnetic interference that affects operations. Protection includes other means to counterattack and defeat enemy attempts to control the electromagnetic spectrum. Additionally, organizations such as a joint force commanders EW staff or a joint EW coordination cell enhance electronic protection by deconflicting EW efforts.
Destruction
1-53. Destruction, in the context of EW, is the elimination of targeted enemy systems. Sensors and command and control nodes are lucrative targets because their destruction strongly influences the enemys perceptions and ability to coordinate actions. Various weapons and techniques ranging from conventional munitions and directed energy weapons to network attacks can destroy enemy systems that use the electromagnetic spectrum. Electronic warfare support provides target location and related information. While destroying enemy equipment can effectively deny the enemy use of the electromagnetic spectrum, the duration of denial will depend on the enemys ability to reconstitute. (See JP 3-13.1.)
(Publication date)
1-11
Chapter 1
SUMMARY
1-55. As the modern battlefield becomes more technologically sophisticated, military operations continue to be executed in an increasingly complex electromagnetic environment. Therefore, commanders and staffs need to thoroughly understand and articulate how the electromagnetic environment impacts their operations and how friendly EW operations can be used to gain an advantage. Commanders and staffs use the terminology presented in this chapter to describe the application of EW. This ensures a common understanding and consistency within plans, orders, standing operating procedures, and directives.
1-12
(Publication date)
Chapter 2
(Publication date)
2-1
Chapter 2
Figure 2-1. Electronic warfare weight of effort during operations 2-3. Full spectrum operations involve more than executing all elements of operations simultaneously. They require that commanders and staffs consider their units capabilities and capacities relative to each of the elements of full spectrum operations. Commanders consider how much can be accomplished simultaneously, how much can be phased, and what nonorganic resources may be available to solve problems. The same applies to EW in support of full spectrum operations. Commanders and staffs determine which resident and joint force EW capabilities to leverage in support of each element of full spectrum operations. Weighting the EW focus of effort within each of the elements assists commanders and their staffs in visualizing how EW capabilities can support their operations. Commanders combine offensive, defensive, and stability or civil support operations to seize, retain, and exploit the initiative. As they apply the appropriate level of EW effort to support these elements, commanders can seize, retain, and exploit the initiative within the electromagnetic environment.
2-2
(Publication date)
IN SUPPORT OF LEADERSHIP
2-5. Leadership initiates the conditions for success. Commanders balance the ability to mass the effects of lethal and nonlethal systems with the requirements to deploy and sustain the units that employ those systems. Generating and maintaining combat power throughout an operation is essential. Todays operational environments require leaders who are competent, confident, and informed in using and protecting combat capabilities that operate within the electromagnetic spectrum. Commanders plan, prepare, execute, and assess EW operations to dominate the electromagnetic spectrum within their operational environment. To accomplish this domination, commanders effectively apply and integrate EW operations across the warfighting functions.
(Publication date)
2-3
Chapter 2
2-8. Command and control warfare is the integrated use of physical attack, electronic warfare, and computer network operations, supported by intelligence, to degrade, destroy, and exploit an enemys or adversarys command and control system or to deny information to it (FM 3-0). It includes operations intended to degrade, destroy, and exploit an enemys or adversarys ability to use the electromagnetic spectrum and computer and telecommunications networks. Information protection is active or passive measures that protect and defend friendly information and information systems to ensure timely, accurate, and relevant friendly information. Information protection denies enemies, adversaries, and others the opportunity to exploit friendly information and information systems for their own purposes (FM 3-0). Table 2-1 shows capabilities, intended effects, staff responsibilities, and functional cells for the command and control warfare and information protection tasks. (For further information on the information tasks, refer to FM 3-0.) Table 2-1. Two Army information tasks: command and control warfare and information protection
2-9. To support these information tasks, commanders ensure EW is coordinated, integrated, and synchronized with all other tasks. This occurs within the operations process through the various functional and integrating cells. Table 2-2 illustrates EW capabilities, actions, and objectives that support the command and control warfare and information protection tasks.
2-4
(Publication date)
(Publication date)
2-5
Chapter 2
Intelligence
2-12. The intelligence warfighting function is the related tasks and systems that facilitate understanding of the operational environment, enemy, terrain, and civil considerations (FM 3-0). It includes tasks associated with intelligence, surveillance, and reconnaissance. EW capabilities that enable the intelligence warfighting function include Increased access for intelligence collection assets (systems and personnel) by reducing antiaccess, antipersonnel, and antisystems threats. Increased capability to search for, intercept, identify, and locate sources of radiated electromagnetic energy in support of targeting, information tasks, and future operations. Increased capability in providing threat recognition and threat warning to the force. Indications and warning of threat emitters and radar. Denial and destruction of counter-intelligence, -surveillance, and -reconnaissance systems.
Fires
2-13. The fires warfighting function is the related tasks and systems that provide collective and coordinated use of Army indirect fires, joint fires, and command and control warfare, including nonlethal fires, through the targeting process (FM 3-0). It includes tasks associated with integrating command and control warfare. EW capabilities that enable the fires warfighting function include Detection and location of targets radiating electromagnetic energy. Disruption, degradation, and destruction options for servicing targets. This includes information systems, targets requiring precision strike (such as minimal collateral damage and minimal weapons signature), hard and deeply buried targets, weapons of mass destruction, and power generation and infrastructure targets. Control, dispersion, or neutralization of combatant and noncombatant personnel with nonpersistent effects and minimum collateral damage (scalable and nonlethal). Area denial capabilities against vehicles, vessels, and aircraft.
Sustainment
2-14. The sustainment warfighting function is the related tasks and systems that provide support and services to ensure freedom of action, extend operational reach, and prolong endurance (FM 3-0). EW capabilities that enable the sustainment warfighting function include Protection of sustainment forces from friendly and adversary use of EW in static or mobile environments. Enhanced electromagnetic environment situational awareness through the interception, detection, identification, and location of adversary electromagnetic emissions and by providing indications and warnings. (This information can assist in convoy planning, asset tracking, and targeting of potential threats to sustainment operations.) Countering improvised explosive devices to support ground lines of communication (includes counter-radio-controlled improvised-explosive-device systems and countering other threats triggered through the electromagnetic spectrum, such as lasers). Spectrum deconfliction and emissions control procedures in support of sustainment command and control. Electromagnetic spectrum obscuration, low-observability, and multispectral stealth (These capabilities provide protection during sustainment operations).
2-6
(Publication date)
Protection
2-16. The protection warfighting function is the related tasks and systems that preserve the force so the commander can apply maximum combat power (FM 3-0). EW capabilities and actions that enable the protection warfighting function include Enhanced electromagnetic spectrum situational awareness through the interception, detection, identification, and location of adversary electromagnetic emissions used to providing indications and warnings of threat emitters and radars. Denial, disruption, or destruction of electromagnetic-spectrum-triggered improvised explosive devices and enemy air defense systems. Deception of enemy forces. Electromagnetic spectrum obscuration, low-observability, and multispectral stealth. EW countermeasures for platform survivability (air and ground). Area denial capabilities (lethal and nonlethal) against personnel, vehicles, and aircraft. Protection of friendly personnel, equipment, and facilities from friendly and enemy electronic attack, including friendly information systems and information. (This includes the coordination and use of both airborne and ground-based electronic attack with higher and adjacent units.)
SUMMARY
2-17. Army EW operations provide the land force commander capabilities to support full spectrum operations (offensive, defensive, and stability or civil support operations). EW supports full spectrum operations by applying EW capabilities to detect, deny, deceive, disrupt, or degrade and destroy enemy combat capability and by controlling and protecting friendly use of the electromagnetic spectrum. These capabilitieswhen applied across the warfighting functionsenable commanders to address a broad set of electromagnetic-spectrum-related targets to gain and maintain an advantage within the electromagnetic spectrum.
(Publication date)
2-7
Chapter 3
(Publication date)
3-1
Chapter 3
Figure 3-1. Electronic warfare coordination organizational framework 3-5. Regardless of the organizational framework employed, EW working groups perform specific tasks. Table 3-1 (page 3-3) details the functions of the EW working groups by echelon from battalion to Army Service component command. There is no formal organizational framework for EW at the company level (see paragraph 3-9).
3-2
(Publication date)
(Publication date)
3-3
Chapter 3
BRIGADE LEVEL
3-6. At the brigade level, the EW officer heads the EW working group and is accountable to the S-3 for integrating EW requirements. Additional staff representation within EW working groups at the brigade combat team level may include the fire support coordinator, EW targeting technician, S-2, S-6, spectrum manager, S-7, and liaison officers as required. 3-7. The EW working group at the brigade combat team coordinates with the higher echelon EW working groups. The brigade working group plays an important role in requesting and integrating joint air and ground EW support. It also manages the brigades organic EW fight within the fires cell. The EW officer works as part of the brigade combat team staff. In this position, the EW officer synchronizes, integrates, and deconflicts brigade combat team EW actions with the EW working group at division level. Although EW falls under the control of the S-3, EW officers are fully immersed in fires targeting and planning to ensure proper use and coordination of EW. See table 3-1, page 3-3, for an outline of the functions of the brigade combat team EW working group.
BATTALION LEVEL
3-8. At the battalion level, the EW officer or noncommissioned officer leads the EW working group and is accountable to the S-3 for integrating EW requirements. Additional staff representation within EW working groups at the battalion level may include the S-2, S-6, fire support officer, and a joint terminal attack controller when assigned. The battalion EW working group coordinates battalion EW operations with the brigade combat team EW working group. See table 3-1, page 3-3, for an outline of the functions of the battalion EW working group.
COMPANY LEVEL
3-9. At the company level, trained EW personnel holding an additional skill identifier of 1K (tactical EW operations) or 1J (operational EW operations) perform several tasks. They advise the commander on the employment of EW equipment, track EW equipment status, assist operators in the use and maintenance of EW equipment, and coordinate with higher headquarters EW working groups.
3-4
(Publication date)
Directs electronic protection measures the unit will take based on recommendations from the G6 or S-6, the EW officer, and the EW working group. Coordinates and synchronizes EW training with other unit training requirements. Coordinates and synchronizes EW training with other unit training requirements. Issues EW support tasks within the unit intelligence, surveillance, and reconnaissance plan. These tasks are according to the collection plan and the intelligence synchronization matrices developed by the G-2 or S-2 and the collection manager. Coordinates with the EW working group to ensure planned EW operations support the overall tactical plan. Integrates electronic attack as a form of fires within the fires cell.
(Publication date)
3-5
Chapter 3
SPECTRUM MANAGER
3-15. The spectrum manager coordinates electromagnetic spectrum use for a wide variety of communications and electronic resources. The spectrum manager Issues the signal operating instructions. Provides all spectrum resources to the task force. Coordinates for spectrum usage with higher echelon G-6 or S-6, and applicable host-nation and international agencies as necessary. Coordinates the preparation of the restricted frequency list and issuance of emissions control guidance. Coordinates frequency allotment, assignment, and use. Coordinates electromagnetic deception plans and operations in which assigned communications resources participate. Coordinates measures to reduce electromagnetic interference. Coordinates with higher echelon spectrum managers for electromagnetic interference resolution that cannot be resolved internally. Assists the EW officer in issuing guidance in the unit (including subordinate elements) regarding deconfliction and resolution of interference problems between EW systems and other friendly systems. Participates in the EW working group to deconflict friendly electromagnetic spectrum requirements with planned EW operations and intelligence collection.
SUMMARY
3-16. The organizational framework for EW coordination and functions varies by echelon. The necessity to form an EW working group is largely based on the overall structure of the combatant force and the level of EW to be conducted. During unified actions, other Service EW officers, signals intelligence officers, and EW asset representatives are invaluable to Army EW working groups in the planning, preparation, execution, and assessment of EW operations. As Army EW capabilities and concepts for employment continue to evolve, so do the organizational designs that ensure their effective command and control and execution in support of operations.
3-6
(Publication date)
Chapter 4
(Publication date)
4-1
Chapter 4
RECEIPT OF MISSION
4-4. Commanders begin the MDMP upon receiving or anticipating a new mission. During this first step, commanders issue their initial guidance and initial information requirements or commanders critical information requirements. 4-5. Upon receipt of a mission, the staff EW officer alerts the staff members supporting the EW working group. The EW officer and support staff begin to gather the resources required for mission analysis. Resources might include a higher headquarters operation order or plan, maps of the area of operations, electronic databases, required field manuals and standing operating procedures, current running estimates, and reachback resources (see appendix F). The EW officer also provides input to the staffs initial assessment and updates the EW running estimate. As part of this update, the EW officer identifies all friendly EW assets and resources and their status. The EW officer also provides this information throughout the operations process. This includes monitoring, tracking, and seeking out information relating to EW operations to assist the commander and staff.
MISSION ANALYSIS
4-6. Planning includes a thorough mission analysis. Both the process and products of mission analysis help commanders refine their situational understanding and determine their restated mission. (See FM 5-0 for more details.) The EW officer and supporting members of the EW working group contribute to the overall mission analysis by participating in IPB and through the planning actions discussed in paragraphs 4-7 through 4-14. (Paragraphs 4-35 to 4-40 discuss EW input to IPB during operations.) 4-7. The EW officer and EW working group members Convene the appropriate EW working group. Determine known facts, status, or conditions of forces capable of EW operations as defined in the commanders planning documents, such as a warning order or operation order. Identify EW planning support requirements and develop support requests as needed. 4-8. The EW officer and EW working group members support the G-2 and S-2 in IPB by Determining the threats dependence on the electromagnetic spectrum. Determining the threats EW capability.
4-2
(Publication date)
Determining the threats intelligence system collection capability. Determining which threat vulnerabilities relate to the electromagnetic spectrum. Determining how the operational environment affects EW operations using the operational variables and mission variables as appropriate. Initiating, refining, and validating information requirements and requests for information. 4-9. The EW officer and EW working group members Determine facts and develop necessary assumptions relevant to EW such as the status of EW capability at probable execution and time available. Analyze the commanders mission and intent from an EW perspective. Identify constraints relevant to EW Actions EW operations must perform. Actions EW operations cannot perform. Other constraints. Analyze mission, enemy, terrain and weather, troops and support available, time available and civil considerations from the EW perspective. 4-10. The EW officer and EW working group members determine enemy and friendly centers of gravity and list their critical capabilities, requirements, and vulnerabilities from an EW perspective. (They determine how EW capabilities can best attack an enemys command and control system.) The center of gravity analysis process outlined in figure 4-2 helps identify and list the critical vulnerabilities of enemy centers of gravity. The EW officer and EW working group members also list the critical requirements associated with the identified command and control critical capability (or command and control nodes) and then identify the critical vulnerabilities associated with the critical requirements. Through this process, the EW officer and EW working group members help determine which vulnerabilities can be engaged by EW capabilities to produce a decisive outcome.
Figure 4-2. Example of analysis for an enemy center of gravity 4-11. Additionally, the EW officer and EW working group members determine how EW can help protect friendly centers of gravity. The center of gravity analysis process as outlined in figure 4-2 can also be used help identify critical vulnerabilities of friendly centers of gravity. The EW officer and EW working group members list the critical requirements associated with the identified friendly command and control critical capability. Then, the EW officer and EW working group members identify the critical vulnerabilities associated with the critical requirements. These vulnerabilities can help determine how to best use EW
(Publication date)
4-3
Chapter 4
capabilities to defend or protect friendly centers of gravity from enemy attack. Key to this portion of the analysis is to assess the potential impact of EW operations on friendly information systems such as electromagnetic interference. 4-12. The EW officer and EW working group members identify and list High-value targets that can be engaged by EW capabilities. Tasks that EW forces perform according to EW subdivision (electronic attack, electronic warfare support, and electronic protection) in support of the warfighting functions. These include Determining specified EW tasks. Determining implied EW tasks. 4-13. The EW officer and EW working group members Conduct initial EW force structure analysis to determine if sufficient assets are available to perform the identified EW tasks. (If organic assets are insufficient, they draft requests for support and augmentation.) Conduct an initial EW risk assessment and review the risk assessment done by the entire working group. Provide EW perspective in the development of the commanders restated mission. Assist in development of the mission analysis briefing for the commander. 4-14. By the conclusion of mission analysis, the EW officer and EW working group members generate or gather the following products and information: The initial information requirements for EW operations. A rudimentary command and control nodal analysis of the enemy. The list of EW tasks required to support the mission. A list of assumptions and constraints related to EW operations. The planning guidance for EW operations. EW personnel augmentation or support requirements. An update of the EW running estimate. EW portion or input to the commanders restated mission.
4-4
(Publication date)
Figure 4-3. Course of action development 4-16. The EW officer and EW working group members contribute to COA development through the following planning actions Determining which friendly EW capabilities are available to support the operation, including organic and nonorganic capabilities for planning. Determining possible friendly and enemy EW operations, including identifying friendly and enemy vulnerabilities. 4-17. Additionally, the EW officer and EW working group members help develop initial COA options by Identifying COA options that may be feasible based on their functional expertise (while brainstorming of COAs). Providing options to modify a COA to enable accomplishing a requirement within the EW area of expertise. Identifying information (relating to EW options) that may impact other functional areas and sharing that information immediately. Identifying the EW-related tasks required to support the COA options. 4-18. The EW officer and EW working group members determine the forces required for mission accomplishment by Determining the EW tasks that support each COA and how to perform those tasks based on available forces and capabilities. (Available special technical operations capabilities are considered in this analysis.) Providing input and support to proposed deception options. Ensuring the EW options provided in support of all possible COAs meet the established screening criteria. 4-19. The EW officer and EW working group members identify EW supporting tasks and their purpose in supporting any decisive, shaping, and sustaining operations as each COA is developed. These EW tasks include those Focused on defeating the enemy. Required to protect friendly force operations.
(Publication date)
4-5
Chapter 4
4-20. The EW officer and EW working group members assist in developing the COA briefing as required. By the conclusion of COA development, the EW officer and EW working group members generate or gather the following products and information: A list of EW objectives and desired effects related to the EW tasks. A list of EW capabilities required to perform the stated EW tasks for each COA. The information and intelligence requirements for performing the EW tasks in support of each COA. An update to the EW running estimate.
4-6
(Publication date)
(Publication date)
4-7
Chapter 4
Figure 4-4. Course of action comparison 4-26. By the conclusion of COA comparison, the EW officer and EW working group members generate or gather the following products and information: A list of the pros and cons for each COA relative to EW. A prioritized list of the COAs from an EW perspective. An update to the EW running estimate if required.
4-8
(Publication date)
4-29. After the COA decision has been made, the EW officer and EW working group members generate or gather the following products and information: An updated command and control nodal analysis of the enemy relevant to the selected COA. Required requests for information to refine the enemy command and control nodal architecture. Latest electronic order of battle tailored to the selected COA. Any new direction provided in the refined commanders intent. A list of any new commanders critical information requirements that can be used in support of EW operations. The warning order to assist developing EW operations required to support the operation order or plan. Refined input to the initial intelligence, surveillance, and reconnaissance (ISR) plan, including Any additional specific EW information requirements. Updated potential collection assets for the units ISR plan.
ORDERS PRODUCTION
4-30. Orders production consists of the staff preparing the operation order or plan by converting the selected COA into a clear, concise concept of operations. The staff also provides supporting information that enables subordinates to execute and implement risk controls. They do this by coordinating and integrating risk controls into the appropriate paragraphs and graphics of the order. 4-31. During orders production, the EW officer provides the EW operations input for several sections of the operation order or plan. See appendix B for the primary areas for EW operations input within an Army order or plan. The primary areas for EW input in a joint order, if required, also are shown in appendix B. (See CJCSM 3122.03C for the Joint Operation Planning and Execution System format).
(Publication date)
4-9
Chapter 4
4-10
(Publication date)
4-37. When evaluating the operational environment from an EW perspective, the EW officer Determines the electromagnetic environment within the defined physical environment: Area of operations. Area of influence. Area of interest. Uses electronic databases to identify gaps. Identifies adversary fixed EW sites such as EW support and electronic attack sites. Identifies airfields and installations that support, operate, or house adversary EW capabilities. In coordination with the G-2 or S-2 and G-6 or S-6, helps identify enemy electromagnetic spectrum usage and requirements within the area of operations and area of interest.
Figure 4-6. Electronic warfare support to intelligence preparation of the battlefield 4-38. When describing how the variables of the operational environment may impact EW operations, the EW officer Focuses on characteristics of both the land and air domains using the factors of observation and fields of fire, avenues of approach, key and decisive terrain, obstacles, and cover and concealment. Identifies key terrain that may provide protection for communications and target acquisition systems from exploitation or disruption. Identifies how terrain affects line of sight, including effects on both communications and noncommunications emitters. Evaluates how vegetation affects radio wave absorption and antenna height requirements. Locates power lines and their potential to interfere with radio waves. Assesses most likely and most dangerous avenues of approach (air, ground) and where EW operations would likely be positioned to support these approaches.
(Publication date)
4-11
Chapter 4
If operating within urban terrain, considers how the infrastructurepower plants, power grids, structural heights, and communications and media nodesmay restrict or limit EW capabilities. Assists the G-2 or S-2 with the development of a modified combined obstacle overlay. Determines how weathervisibility, cloud cover, rain, and windmay affect ground-based and airborne EW operations and capabilities (for example, no-go weather conditions at an airborne EW launch and recovery base). Considers all other relevant aspects of the operational environment that affect EW operations, using the operational variables (PMESII-PTpolitical, military, economic, social, information, infrastructure, physical environment, and time) and mission variables (METT-TCmission, enemy, terrain and weather, troops and support available, time available, and civil considerations). 4-39. When evaluating enemy capabilities, the EW officer and supporting staff examine doctrinal principles; tactics, techniques and procedures; and observed patterns of operation from an EW perspective. The EW officer Uses the operational variables (PMESII-PT) and mission variables (METT-TC) to help determine the adversarys critical nodes. Collects the required dataoperational net assessments, electronic order of battle, and electronic databasesto template the command and control critical nodes and the systems required to support and maintain them. Assists the G-2 in determining the adversarys EW-related threat characteristics (order of battle) by identifying Types of communications equipment available. Types of noncommunications emitters. Surveillance and target acquisition assets. Technological sophistication of the threat. Communications network structure. Frequency allocation techniques. Operation schedules. Station identification methods. Measurable characteristics of communications and noncommunications equipment. Command, control, and communications structure of the threat. Tactics from a communication perspective. Examples are how the enemy deploys command, control, and communications assets; whether or not communications systems are remote; and the level of discipline in procedures, communications security, and operations security. Electronic deception capabilities. Reliance on active or passive surveillance systems Electromagnetic profiles of each node. Unique electromagnetic spectrum signatures. Assists the G-2 or S-2 in center of gravity analysis. Helps identify the critical system nodes of the center of gravity and determines what aspects of the system should be engaged, exploited, or attacked to modify the systems behavior or to achieve a desired effect. Identifies organic and nonorganic EW capabilities available to achieve desired effects on identified high-value targets. Submits initial EW-related requests for information that describe the intelligence support required to support EW operations. Obtains the high-value target list, threat templates, and initial priority intelligence requirements list to assist in follow-on EW planning.
4-12
(Publication date)
4-40. When determining adversary COAs, the EW officer Assists the G-2 or S-2 in development of adversary COAs. Provides EW input to the situation templates. Ensures event templates include EW named areas of interests. Assists in providing EW options for target areas of interest. Assists in providing EW options to support decision points. Provides EW input to the event template and event matrix.
TARGETING
4-41. Targeting is the process of selecting and prioritizing targets and matching the appropriate response to them, considering operational requirements and capabilities (JP 3-0). A decide, detect, deliver, and assess methodology is used to direct friendly forces to attack the right target with the right asset at the right time. (See figure 4-7.) Targeting provides an effective method to match the friendly force capabilities against targets. Commanders intent plays a critical role in the targeting process. The targeting working group strives to thoroughly understand the commanders intent to ensure the commanders intended effects on targets are achieved. 4-42. An important part of targeting is identifying potential fratricide situations and performing the coordination measures to manage and control the targeting effort positively. The targeting working group and staff incorporate these measures into the coordinating instructions and appropriate annexes of the operation plans and orders. (FM 6-20-10 has more information on targeting.)
(Publication date)
4-13
Chapter 4
4-43. The EW officer thoroughly integrates electronic attack in the targeting process and integrates electronic attack fires into all appropriate portions of the operation plan, operation order, and other planning products. In support of EW targeting, the EW officer Helps the targeting working group determine electronic attack requirements against specific high-payoff targets and high-value targets. Ensures electronic attack can meet the desired effect (in terms of the targeting objective). Coordinates with the signals intelligence staff element through the collection manager to satisfy EW support and electronic attack information requirements. Prepares the EW tab and the EW portion of the command and control warfare tab to the fires appendix. Provides electronic attack mission management through the tactical operations center or joint operations center and the tactical air control party (for airborne electronic attack). Provides electronic attack mission management as the jamming control authority for ground or airborne electronic attack when designated. Prepares and coordinates the EW annex for operation plans and operation orders. Determines and requests theater Army electronic attack support. Recommends to the G-3 or S-3 and the fire support coordinator or fire support officer whether to engage a target with electronic attack. Expedites electromagnetic interference reports to the targeting working group. (See appendix D for information on electromagnetic interference reporting.)
Decide
4-44. Decide is the first step in the targeting process. This step provides the overall focus for fires, a targeting plan, and some of the priorities for intelligence collection. As part of the staff in the fires cell, the EW officer assists the targeting working group in planning the target priorities for each phase and critical events of the operation. Initially, the targeting working group does not develop electronic attack targets using any special technique or separately from targets for physical destruction. However, as the process continues, these targets are passed through intelligence organizations and further planned using ISR procedures. The planned use of electronic attack is integrated into the standard targeting products (graphic or text-based). Products that involve electronic attack planning may include High-payoff target list. Attack guidance matrix. Appendix 4 (Electronic Warfare) to Annex P (Information Operations) of the operation order. (At the time this manual was written, this was the current doctrine for operation orders. This appendix will be revised upon publication of the revised FM 5-0.)
Detect
4-45. Based on what the targeting working group identified as high-payoff targets during the decide step, collection assets are then deployed to detect them. The intelligence enterprise pairs assets to targets based on the collection plan and the current threat situation. When conducting electronic attack operations in support of command and control warfare, ISR units perform EW support tasks linked to and working closely with the electronic attack missions. Electronic warfare support units (with support from the target assessment and signals intelligence staff elements) provide the datalocation, signal strength, and frequency of the targetto focus electronic attack assets on the intended target. These assets also identify the command and control system vulnerabilities open to attack by electronic attack assets.
Deliver
4-46. Once friendly force capabilities identify, locate, and track the high-payoff targets, the next step in the process is to deliver fires against those targets. Electronic attack assets must satisfy the attack guidance developed during the decide step. Close coordination between those conducting EW support and electronic
4-14
(Publication date)
attack is critical during the engagement. The EW officer facilitates this coordination and ensures electronic attack fires are fully synchronized and deconflicted with other fires. The EW officer remains aware of the potential for unintended effects between adjacent units when conducting electronic attack. The EW officer continually coordinates with adjacent unit EW officers to mitigate and deconflict these effects during cross-boundary operations. Normally, the G-3, S-3, or fire support coordinator provides requirements and guidance for this coordination and synchronization in the attack guidance matrix, intelligence synchronization matrix, spectrum management plan, and the EW input to the operation plan or operation order annexes and appendixes.
Assess
4-47. Once the target as been engaged, the next step is to assess the engagements effectiveness. This is done through combat assessment, which involves determining the effectiveness of force employment during military operations. It consists of three elements: Munitions effects assessment. Battle damage assessment. Re-attack recommendations. 4-48. The first two elements, munitions effects assessment and battle damage assessment, are used to inform the commander on the effects achieved against targets and target sets. From this information, the G2 or S-2 continues to analyze the threats ability to further conduct and sustain combat operations (sometimes articulated in terms of the effects achieved against the threats centers of gravity). The last element involves the assessment and recommendation whether or not to re-attack the targets. 4-49. The assessment of a jamming mission used against an enemys command and control system is unlike fires that can be observed visually. The signals intelligence staff element and units executing the electronic attack mission coordinate continuously to assess mission effectiveness. Close coordination between sensor and shooter allows instant feedback on the success or failure of the intended jamming effects. It also can quickly provide the necessary adjustments to produce desired effects.
EMPLOYMENT CONSIDERATIONS
4-53. EW has specific ground-based, airborne, and functional (electronic attack, electronic warfare support, or electronic protection) employment considerations. The EW officer ensures EW-related employment considerations are properly articulated early in the operations process. Each capability employed has certain advantages and disadvantages. The staff plans for all of these before executing EW operations.
(Publication date)
4-15
Chapter 4
4-16
(Publication date)
Hostile intelligence collection. Persistency of effect. 4-62. The EW officer, the G-2 or S-2, the G-3 or S-3, the G-6 or S-6, the spectrum manager, and the G-7 or S-7 coordinate closely to avoid friendly communications interference that can occur when using EW systems on the battlefield. Coordination ensures that electronic attack systems frequencies are properly deconflicted with friendly communications and intelligence systems or that ground maneuver and friendly information tasks are modified accordingly. 4-63. The number of information systems, EW systems, and sensors operating simultaneously on the battlefield makes deconfliction with communications systems a challenge. The EW officer, the G-2 or S-2, the G-6 or S-6, and the spectrum manager plan and rehearse deconfliction procedures to quickly adjust their use of EW or communications systems. 4-64. Electronic attack operations depend on EW support and signals intelligence to provide targeting information and battle damage assessment. However, EW officers must keep in mind that not all intelligence collection is focused on supporting EW. If not properly coordinated with the G-2 or S-2 staff, electronic attack operations may impact intelligence collection by jamming or inadvertently interfering with a particular frequency being used to collect data on the threat, or by jamming a given enemy frequency or system that deprives friendly forces of that means of collecting data. Either can significantly deter intelligence collection efforts and their ability to answer critical information requirements. Coordination between the EW officer, the fire support coordinator, and the G-2 or S-2 is prevents this interference. In situations where a known conflict between the intelligence collection effort and the use of electronic attack exists, the EW working group brings the problem to the G-3 or S-3 for resolution. 4-65. Other forms of effects rely on electromagnetic spectrum. For example, psychological operations may plan to use a given set of frequencies to broadcast messages, or a military deception plan may include the broadcast of friendly force communications. In both examples, the use of electronic attack could unintentionally interfere or disrupt such broadcasts if not properly coordinated. To ensure electronic attack does not negatively impact planned operations, the EW officer coordinates between fires, network operations, and other functional or integrating cells as required. 4-66. Like any other form of electromagnetic radiation, electronic attack can adversely affect local media and communications systems and infrastructure. EW planners consider unintended consequences of EW operations and deconflict these operations with the various functional or integrating cells. For example, friendly jamming could potentially deny the functioning of essential services such as ambulance or fire fighters to a local population. EW officers routinely synchronize electronic attack with the other functional or integrating cells responsible for the information tasks. In this way, they ensure that electronic attack efforts do not cause fratricide or unacceptable collateral damage to their intended effects. 4-67. The potential for hostile intelligence collection also affects electronic attack. A well-equipped enemy can detect friendly EW capabilities and thus gain intelligence on friendly force intentions. For example, the frequencies Army forces jam could indicate where they believe the enemys capabilities lie. The EW officer and the G-2 or S-2 develop an understanding of the enemys collection capability. Along with the red team (if available), they determine what the enemy might gain from friendly force use of electronic attack. (A red team is an organizational element comprised of trained and educated members that provide an independent capability to fully explore alternatives in plans and operations in the context of the operational environment and from the perspective of adversaries and others. [JP 2-0]) 4-68. The effects of jamming only persist as long as the jammer itself is emitting and is in range to affect the target. Normally this time frame is a matter of seconds or minutes, which makes the timing of such missions critical. This is particularly true when jamming is used in direct support of aviation platforms. For example, in a mission that supports suppression of enemy air defense, the time on target and duration of the jamming must account for the speed of attack of the aviation platform. They must also account for the potential reaction time of enemy air defensive countermeasures. The development of directed-energy weapons may change this dynamic in the future. However, at present (aside from antiradiation missiles), the effects of jamming are less persistent than effects achieved by other means.
(Publication date)
4-17
Chapter 4
4-18
(Publication date)
processed, and implemented consistently by all friendly forces. During joint operations, EW reprogramming coordination and monitoring is the responsibility of the joint force commanders EW staff. (For more information on EW reprogramming, see FM 3-13.10).
(Publication date)
4-19
Chapter 4
Continue to assist the targeting working group in target development and recommend targets for attack by electronic attack assets. Receive, process, and coordinate subordinate requests for EW support during operations. Receive and process immediate support requests for suppression of enemy air defense or EW from joint or multinational forces; coordinate through fire support officer and fire support coordinator with the battlefield coordination detachment and joint or multinational liaisons for support request. Coordinate with airspace control section on all suppression of enemy air defense or EW missions. Provide input to the overall assessment regarding effectiveness of electronic attack missions. Maintain, update, and distribute the status of EW assets. Validate and disseminate cease-jamming requests. Coordinate and expedite electromagnetic interference reports with the analysis and control element for targeting and the spectrum manager for potential deconfliction. Perform jamming control authority function for ground-based EW within the assigned area of operations (when designated by the jamming control authority).
4-20
(Publication date)
4-83. During execution, the EW officer and members of the EW working group participate in combat assessments within the fires cell to determine the effectiveness of electronic attack employment in support of operations. Combat assessment consists of three elements: munitions effects assessment, battle damage assessment, and reattack recommendations. (Paragraphs 4-47 to 4-49 discuss combat assessment.)
SUMMARY
4-84. The EW officer and staff members supporting the EW working group ensure the successful integration of EW capabilities into operations. The EW officer leads the EW integration effort throughout the operations process. The EW officer must be familiar with and participate in the applicable integrating processes and continuing activities discussed within this chapter.
(Publication date)
4-21
Chapter 5
(Publication date)
5-1
Chapter 5
coordination detachment at the joint air operations center. EW staffs at higher echelons monitor EWrelated activities and resolve conflicts when necessary. 5-6. Normally the senior Army headquarters (ARFOR) G-3 or S-3 coordinates with external EW organizations, unless direct liaison is authorized at lower echelons. Other components requesting Army EW support coordinate their support requirements with the EW officer located at the ARFOR headquarters or tactical operations center. Often, a liaison from the requesting organization completes these requests. If other Service or functional components have an immediate need for Army EW support, they send the request to the operational fires directorate or fires cell and the senior headquarters EW working group (sometimes referred to as an EW coordination cell) via the Global Command and Control System or Global Command and Control System-Army. In support of external EW coordination, the staff EW officer within the J-3, G-3, or S-3 Provides an assessment of EW capabilities to other component operation centers. Coordinates preplanned EW operations with other Service components (within prescribed time lines). Updates preplanned EW operations in coordination with other components as required.
5-2
(Publication date)
Figure 5-1. Spectrum deconfliction procedures 5-11. The spectrum manager is a member of the G-6 or S-6 section that has staff responsibility for spectrum management in the unit. The spectrum manager is a member of the units EW working group. Conflicts regarding spectrum use and allocation that cannot be resolved through direct coordination by the spectrum manager are referred to the G-3 or S-3 for resolution.
ASSET MANAGEMENT
5-13. Regardless of echelon, the EW officer monitors and tracks the organizations EW assets and their status. The EW officer makes recommendations to the G-3 or S-3 concerning EW asset allocation and reallocation when required. The EW officer monitors and tracks EW asset status within the EW working group and reports this information to higher echelons via the Army battle command system.
(Publication date)
5-3
Chapter 5
Coordination Between EW, Command and Control Warfare, and Information Tasks
5-17. EW working groups coordinate their supporting actions with the elements responsible for the Army information tasksinformation engagement, command and control warfare, information protection, operations security, and military deception. Although EW plays a major role in supporting command and control warfare and information protection, it also enhances or provides direct support to other information tasks. For example, enemy radio and television broadcasts can be disrupted or replaced with friendly radio and television messages as part of larger psychological operations in support of information engagement. Electronic deception capabilities can support and enhance an overall military deception operation.
DECONFLICTION
5-18. Friendly forces depend on electromagnetic energy and the electromagnetic spectrum to sense, process, store, measure, analyze, and communicate information. This dependency creates the potential for significant interference between various friendly systems. Without proper deconfliction, interference could damage friendly capabilities or lead to operational failure. This is especially true with regard to EW systems. EW deconfliction includes Friendly electromagnetic spectrum use for communications and other purposes (such as navigation systems and sensors) with electronic attack activities (such as counter-radiocontrolled improvised-explosive-device EW systems). Electronic attack activities with electronic warfare support activities (potential electromagnetic interference of collection assets).
5-4
(Publication date)
Electronic attack and electronic warfare support activities with information tasks involving electromagnetic emissions (such as counter-radio-controlled improvised-explosive-device EW systems interfering with a psychological-operations radio broadcast). Electronic attack activities with host-nation electromagnetic spectrum users (such as commercial broadcasters, emergency first responders, and law enforcement). 5-19. The forum for deconfliction is the units EW working group. As such, the specific composition of the working group may expand to include more than the standard staff representation described in chapter 3. Regardless of echelon, to perform its critical deconfliction function, the EW working group retains knowledgeable representation from and ready access to decisionmakers. The EW working group also retains knowledge of and access to higher headquarters assistance and reachback capabilities available (See appendix F for more information).
SYNCHRONIZATION
5-20. EW, particularly in electronic attack, can produce both intended and unintended effects. Therefore, units thoroughly synchronize its use with other forms of fires and with friendly systems operating in the electromagnetic spectrum. Through synchronization, units avoid negative effects such as communications fratricide by jammers. The EW officer ensures all EW activities are integrated into the appropriate sections of plansfires, information protection, command and control warfare, and military deception plans. This officer also synchronizes EW activities for maximum contribution to the commanders desired effects while preventing EW from inhibiting friendly force capabilities. The primary forum for this synchronization is the units EW working group. The EW officer attends the regular targeting meetings in the fires cell and may also participate (perhaps as a standing member) in other functional or integrating cells and working groups. These may include fires, information engagement, network operations, or future operations. The EW officers participation in these other cells and working groups helps to synchronize EW operations.
SUMMARY
5-21. EW capabilities yield many advantages for the commander. The EW working groups sole purpose is to facilitate the integration, coordination, deconfliction, and synchronization of EW operations to ensure advantages are achieved. This effort requires constant coordination with the units other functional cells and working groups. As conflicts are identified during the planning and execution of operations, the EW officer and supporting staff members coordinate solutions to those conflicts within the EW working group.
(Publication date)
5-5
Chapter 6
(Publication date)
6-1
Chapter 6
An EW officer appointed by the J-3 leads this element. The joint force commanders EW staff includes representatives from the J-2 and J-6 to facilitate intelligence support and EW frequency deconfliction. 6-5. On many joint staffs, the intra-staff coordination previously accomplished through a joint force commanders EW staff is now performed by an IO cell or similar organization. An IO cell, if established, coordinates EW activities with other IO activities to maximize effectiveness and prevent mutual interference. If both a joint force commanders EW staff and an IO cell exist, a joint force commanders EW staff representative may be assigned to the IO cell to facilitate coordination. For more information about the organization and procedures of the joint IO cell, see JP 3-13.
6-2
(Publication date)
(Publication date)
6-3
Chapter 6
Figure 6-2. Electronic warfare support request coordination 6-13. The composition and focus of each joint intelligence center varies by theater. However, each can perform indications and warning as well as collect, manage, and disseminate current intelligence. Through the joint intelligence center, the ARFOR (Army Service component) headquarters coordinates support from the Air Force, Navy, and Marine Corps and national, interagency, and multinational sources. In addition to its other functions, the joint intelligence center coordinates the acquisition of national intelligence for the joint task force and the combatant commands staff.
6-4
(Publication date)
located at multinational force headquarters. An IO cell may also be established to coordinate all IO-related activities, including related EW operations.
OTHER CONSIDERATIONS
6-20. EW in multinational operations addresses other considerations. Soldiers must consider Exchange of EW information. Exchange of signals intelligence information. Exchange of the electronic order of battle. Electronic warfare reprogramming. 6-21. Army forces participating in multinational EW operations must exchange EW information with other forces. They must help develop joint information exchange protocols and use those protocols for conducting operations. 6-22. Exchanging signals intelligence information requires care to avoid violating signals intelligence security rules. The policy and relationship between EW and signals intelligence within NATO are set out in NATO Military Committee (MC) 64.
(Publication date)
6-5
Chapter 6
6-23. In peacetime, before forming a multinational force, the exchange of electronic order of battle information is normally achieved under bilateral agreement. During multinational operations, a representative of the joint EW coordination cell, through the theater joint analysis center or the joint intelligence center, ensures the maintenance of an up-to-date electronic order of battle. The inclusion of multinational forces is based on security and information exchange guidelines agreed upon by the participating nations. 6-24. Electronic warfare reprogramming is a national responsibility. However, the joint EW coordination cell remains aware of reprogramming efforts being conducted within the multinational force. FM 3-13.10 guides the Armys reprogramming effort.
SUMMARY
6-25. Every joint or multinational operation is uniquely organized to accomplish the mission. Army EW officers integrate EW forces and capabilities with the organizations and agencies outlined in this chapter. To coordinate Army EW operations with joint and multinational forces, Army EW officers must understand fully the organizational frameworks, policies, and guidelines established for joint and multinational EW operations.
6-6
(Publication date)
Chapter 7
(Publication date)
7-1
Chapter 7
7-2
(Publication date)
Corps enterprise network. It is co-located with the Marine Corps forces computer network defense, the component to the joint task force for computer network operations, and the Marine Corps computer incident response team. This relationship provides a strong framework for integrated network management and defense.
SUMMARY
7-13. This chapter and appendix E provide a sampling of available joint and Service EW capabilities, activities, and agencies that support ground force commanders in full spectrum operations. To leverage these capabilities for EW support, Army EW officers acquire a working knowledge of the capabilities available and the procedures for requesting support. Additionally, appendix F provides information on available EW related tools and other resources.
(Publication date)
7-3
Appendix A
(Publication date)
A-1
Appendix A
Figure A-1. The electromagnetic spectrum A-3. Included within the radio and microwave regions of the electromagnetic spectrum are the radio frequency and radar bands. These bands are routinely referred to by their band designators. For example, high frequency radios are HF radios and K-band radars are radars that operate between 18 and 27 gigahertz. Civilian agencies and military forces throughout the world use several different designator systems, which can result in confusion. Table A-1 shows the radio frequency band designators and their associated frequency ranges. It also shows radar band designators, associated frequency ranges, and typical usage. These are standard designations used by the United States.
A-2
(Publication date)
(Publication date)
A-3
Appendix A
DIRECTED ENERGY
A-6. Directed energy refers to technologies that produce of a beam of concentrated electromagnetic energy or atomic or subatomic particles (see chapter 1). Directed-energy warfare is military action involving the use of directed-energy weapons, devices, and countermeasures to either cause direct damage or destruction of enemy equipment, facilities, and personnel, or to determine, exploit, reduce, or prevent hostile use of the electromagnetic spectrum through damage, destruction, and disruption. It also includes actions taken to protect friendly equipment, facilities, and personnel and retain friendly use of the electromagnetic spectrum (JP 1-02). A directed-energy weapon is a system using directed energy primarily as a direct means to damage or destroy enemy equipment, facilities, and personnel (JP 1-02). In addition to destructive effects, directed-energy weapons can also support area denial, crowd control, and obscuration. A-7. The application of directed energy includes lasers, radio-frequency weapons, and particle-beam weapons. As directed-energy weapons evolve, the tactics, techniques, and procedures for their use also evolve to ensure their safe, effective employment. In electronic warfare, most directed-energy applications fit into the category of electronic attack. However, other applications can be categorized as electronic protection or even electronic warfare support. Examples include the following: Applications used for electronic attack, which may include A laser designed to blind or disrupt optical sensors. A millimeter wave directed-energy weapon used for crowd control. A laser-warning receiver designed to initiate a laser countermeasure to defeat a laser weapon. A millimeter wave obscuration system used to disrupt or defeat a millimeter wave system. A device used to counter radio-controlled improvised explosive devices. A laser-warning receiver designed solely to detect and analyze a laser signal is used for electronic warfare support. A visor or goggle designed to filter out the harmful wavelength of laser light is used for electronic protection. A-8. As the use of destructive directed-energy weapons grows, Army forces require the capability to collect information on them. Additionally, Army forces require tactics, techniques, and procedures to mitigate directed-energy weapon effects. Currently, the definitions and terms relating to directed energy are articulated within electronic warfare doctrine. As the technologies related to directed energy expand, joint and Army doctrine may discuss employing directed energy under other doctrinal subjects.
A-4
(Publication date)
Appendix B
(Publication date)
B-1
Appendix B
B-2
(Publication date)
Appendix C
(Publication date)
C-1
Appendix C
Figure C-1. Example of an electronic warfare running estimate C-3. Once the commander approves the order, the EW running estimate is used to inform current and future operations. During execution the EW running estimate is used to help determine if current EW operations are proceeding according to plan and if future EW operations are supportable. Figure C-2, page C-3, shows a sample of the information that might be used to update the EW running estimate during execution. The EW officer and supporting staff members within the EW working group produce and update the running estimate.
C-2
(Publication date)
Figure C-2. Sample update information to the electronic warfare running estimate
(Publication date)
C-3
Appendix D
(Publication date)
D-1
Appendix D
JOINT TACTICAL AIR STRIKE REQUEST OR JOINT TACTICAL AIR SUPPORT REQUEST
D-10. Use a joint tactical air strike request or joint tactical air support request to request electronic attack. These requests require the information listed in paragraph D-6. Organizations without an automated capability submit these requests using DD Form 1972 (Joint Tactical Air Strike Request). See JP 3-09.3 and FM 3-09.32 for more information.
COUNTER-IMPROVISED-EXPLOSIVE-DEVICE ACTIVITIES
D-14. Certain reports and references are associated with counter-improvised-explosive-device activities. Most of these reports include information pertinent to counter-radio-controlled improvised-explosivedevice EW activities. EW working groups have the responsibility to monitor these reports to assess planned counter-radio-controlled improvised-explosive-device EW operations and to support future operations. These reports typically use formats established in FM 6-99.2 modified to include improvised explosive device considerations and current operations. See GTA 90-10-046 for examples of reports and references applicable to counter-radio-controlled improvised-explosive-device EW operations.
D-2
(Publication date)
Appendix E
ARMY
E-1. The Army is currently expanding its electronic warfare (EW) capability. It maintains several EW systems in its inventory. Currently, all units whose sole purpose is to conduct EW operations are assigned to 1st Information Operations Command. When requested, these capabilities are provided to combatant commands for employment at corps and lower echelons.
INTELLIGENCE SYSTEMS
E-4. The intelligence community maintains many systems that provide data for use in EW operations. Signals intelligence systems provide most of this required data. These assets are dual use. Usually the data collected is categorized as signals intelligence. It is maintained within sensitive compartmented information channels and governed by the National Security Agency/Central Security Service. The data sometimes support EW or, more specifically, electronic warfare support. Paragraphs E-5 through E-7 illustrate some intelligence systems that (when tasked) can provide electronic warfare support data to support electronic attack and electronic protection actions. For a detailed description of other intelligence and EW-supportrelated systems, see appendix F.
(Publication date)
E-1
Appendix E
E-2
(Publication date)
Prophet
E-7. The Prophet system is the division, brigade combat team, and armored cavalry regiment principal ground tactical signals intelligence and EW system. (See figure E-3.) Prophet systems will also be assigned to the technical collection battalion of battlefield surveillance brigades. Prophet detects, identifies, and locates enemy electronic emitters. It provides enhanced situational awareness and actionable 24-hour information within the units area of operations. Prophet consists of a vehicular signals intelligence receiver mounted on a high mobility multipurpose wheeled vehicle, plus a dismounted-Soldier-portable version. The dismounted Soldier portable version is used for airborne insertion or early entry to support rapid reaction contingency and antiterrorist operations. Future Prophet systems are planned to include an electronic attack capability.
MARINE CORPS
E-8. The Marine Corps has two types of EW units: radio battalions (often called RADBNs), and Marine tactical EW squadrons (referred to as VMAQs). Paragraphs E-9 through E-24 discuss the units missions, their primary tasks, and capabilities currently being employed. (For further information on the Marine Corps EW units and systems, see MCWP 2-22.)
RADIO BATTALION
E-9. Radio battalions are the Marine Corps tactical level ground-based EW units. During operations, teams from radio battalions are most often attached to the command element (or senior headquarters) of Marine expeditionary units. Each radio battalion has the following mission, tasks, and equipment.
(Publication date)
E-3
Appendix E
Equipment
E-11. The following illustrate EW capabilities a radio battalion uses to accomplish the mission and perform the tasks in support of the MAGTF: AN/ULQ-19(V)2 Electronic Attack Set E-12. The AN/ULQ-19(V)2 electronic attack set allows operators to conduct spot or sweep jamming of single-channel voice or data signals. To provide the required jamming, the system must be employed and operated from a location with an unobstructed signal line of sight to the target enemys communications transceiver. AN/MLQ-36 Mobile Electronic Warfare Support System E-13. The AN/MLQ-36 mobile electronic warfare support system provides a multifunctional capability that gives signals intelligence and EW operators limited armor protection. This equipment can provide signals intelligence and EW support to highly mobile mechanized and military operations in urban terrain where maneuver or armor protection is critical. This system is installed in a logistic variant of the Marine Corpss light armored vehicle. It consists of the following: Signals intercept system. Radio direction finding system. Electronic attack system. Secure communication system. Intercom system.
E-4
(Publication date)
AN/MLQ-36A Mobile Electronic Warfare Support System (Product Improved) E-14. The product-improved AN/MLQ-36A mobile electronic warfare support system (sometimes called the AN/MLQ-36A MEWSS PIP) is an advanced signals intelligence and EW system integrated into the Marine Corpss light armored vehicle. (See figure E-4.) This system replaces the equipment in the AN/MLQ-36. E-15. The AN/AMLQ-36A has the following capabilities: Detect and evaluate enemy communications emissions. Detect and categorize enemy noncommunications emissions (such as battlefield radars). Determine lines of bearing. Degrade enemy tactical radio communications. When mission-configured and working cooperatively with other AN/MLQ-36As, the system can provide precision location of battlefield emitters. E-16. This system and its future enhancements will provide the capability to exploit new and sophisticated enemy electronic emissions and conduct electronic attack in support of existing and planned national, combatant command, fleet, and MAGTF signals intelligence and EW operations.
(Publication date)
E-5
Appendix E
Providing liaison personnel to higher staffs to assist in squadron employment planning. Providing an air EW liaison officer to the MAGTF EW coordination cell. Conducting electronic attack operations for electronic protection training of MAGTF units. E-19. The squadrons EW division supports EA-6B Prowler tactical missions with intelligence, the tactical electronic reconnaissance processing and evaluation system (TERPES), and the joint mission planning system. All systems support premission planning and postmission processing of collected data, and production of pertinent intelligence reports. Working with squadron intelligence, these systems provide required electronic intelligence and electronic order of battle intelligence products to the aviation combat element, MAGTF, and other requesting agencies.
Equipment
E-20. Marine tactical electronic warfare squadrons maintain the following equipment: EA-6B Prowler. Joint mission planning system. Tactical electronic reconnaissance processing and evaluation system. EA-6B Prowler E-21. The EA-6B Prowler is a subsonic, all-weather, carrier-capable aircraft. (See figure E-5.) The crew consists of one pilot and three electronic countermeasure officers. The EA-6B has two primary missions. One is collecting and processing designated threat signals of interest for jamming and subsequent processing, analysis, and intelligence reporting. The other is employing the AGM-88 high-speed antiradiation missile against designated targets. The EA-6Bs AN/ALQ-99 tactical jamming system incorporates receivers for the reception of emitted signals and external jamming pods for the transmission of energy to jam targeted radars (principally those associated with enemy air defense radars and associated command and control). In addition to the AN/ALQ-99, the EA-6B also employs the USQ-113 communications jammer to collect, record, and disrupt threat communications.
E-6
(Publication date)
Joint Mission Planning System E-22. The joint mission planning system helps the EA-6B aircrew plan and optimize receivers, jammers, and high-speed antiradiation missiles. This system allows an operator to Maintain area of operations emitter listings. Edit emitter parameters. Develop mission-specific geographic data and electronic order of battle to Tailor or create high-speed antiradiation missile direct attack libraries, or manually modify entries or new threat cards. Plan target selection. Perform postflight mission analysis to Identify electronic emitters using various electronic parameter databases and electronic intelligence analytical techniques. Localize emitters by coordinates with a certain circular error of probability for each site. Correlate new information with existing data. Gather postflight high-speed antiradiation missile information. This information includes aircraft launch parameters, predicted seeker footprint, and the onboard system detection of a targeted signal at impact. AN/TSQ-90 Tactical Electronic Reconnaissance Processing and Evaluation System E-23. The TERPES (AN/TSQ-90) is an air and land transportable, single-shelter electronic intelligence processing and correlation system. Each of the four Marine tactical electronic warfare squadrons includes a TERPES section. E-24. A TERPES section consists of Marines, equipment, and software. The section identifies and locates enemy radar emitters from data collected by EA-6B aircraft and those received from other intelligence sources. It processes and disseminates EW data rapidly to MAGTF and other intelligence centers and provides mission planning and briefing support. Section support areas include operational support, intelligence analysis support, data fusion, fusion processing, and intelligence reporting. The section provides the following operational support: Translates machine-readable, airborne-collected, digital data into human- and machine-readable reports (such as paper, magnetic tape, secure voice, plots, and overlays). Receives and processes EA-6B mission tapes. Accepts, correlates, and identifies electronic emitter data from semiautomatic or automatic collection systems using various electronic parameter databases and various analysis techniques. Provides tactical jamming analysis.
(Publication date)
E-7
Appendix E
AIR FORCE
E-25. The Air Force has two primary platforms that provide EW capability: the EC-130H Compass Call and RC-135V/W Rivet Joint. (For further information on Air Force EW equipment, see AFDD 2-5.1.)
Capabilities
E-28. The EC-130H is designed to deny, degrade, and disrupt adversary command and control information systems. This includes denial and disruption of enemy surveillance radars; denial and disruption of hostile communications being used in support of enemy ground, air, or maritime operations; and denial and disruption of many modern commercial communication signals that an adversary might employ.
E-8
(Publication date)
Capabilities
E-31. The RC-135V/W is equipped with an extensive array of sophisticated intelligence gathering equipment that enables monitoring of enemy electronic activity. The aircraft is integrated into the theater air control system via data links and voice (as required). Refined intelligence data can be transferred from Rivet Joint to an Airborne Warning and Control System platform through the tactical digital information link. Alternatively, this data can be placed into intelligence channels via satellite and the tactical information broadcast service (a near real-time combatant command information broadcast). The aircraft
(Publication date)
E-9
Appendix E
has secure ultrahigh frequency, very high frequency, and high frequency (commonly known as UHF, VHF, and HF respectively) as well as satellite communications. It can be refueled in the air.
NAVY
E-32. The Navys primary airborne EW platforms are the EA-6B Prowler and its planned replacement, the E/A-18G Growler. E/A-18G fielding is scheduled to begin in 2009 and is scheduled to replace the Navys carrierborne EA-6B aircraft. The Navy also maintains both surface and subsurface EW shipboard systems for offensive and defensive missions in support of the fleet. (For further information on Navy missions and equipment, see NWP 3-13.)
EA-6B PROWLER
E-33. Paragraphs E-34 through E-39 discuss the missions, primary tasks, and capabilities of the Navys EA-6B Prowler platforms. (See figure E-8.)
Capabilities
E-35. The Navys EA-6B Prowlers are outfitted with either the improved capability II or improved capability III systems. The following lists the major capability upgrades these systems provide. Improved Capability II E-36. The improved capability II program was initiated in the 1980s. It was completed across the fleet of EA-6B aircraft (including U.S. Marine Corps aircraft) in the 1990s. The program incorporated incremental capability improvements that include communications, navigation, and computer interface upgrades; a high-speed antiradiation missile capability; and improved jamming pods. Several system interfaces were also upgraded in preparation for the improved capability III improvements.
E-10
(Publication date)
Improved Capability III E-37. The improved capability III program incorporates a highly evolved receiver system and provides upgraded EA-6B aircraft with increased signal detection, geolocation capability, a new selective reactivejamming capability, and better reliability. High-speed antiradiation missile employment is also improved due to the speed of the receiver and its geolocation accuracy. Increased battlefield situational awareness of joint forces is also provided through Link-16. The improved capability III program provides a new ALQ218 receiver system, integration of the USQ-113 and the multifunctional information distribution system (often called MIDS). This system incorporates Link-16 and various connectivity avionics into the Prowler. The major EW-related subsystems are the AN/ALQ-99 (V) tactical jamming countermeasures set and AN/USQ-113 (V) radio countermeasures set. E-38. The AN/ALQ-99 (V) tactical jamming countermeasures set has upgraded receivers and processors to provide the following: Improved frequency coverage. Direction-of-arrival determination capability. Narrower frequency discrimination to support narrowband jamming. Enhanced interface with onboard systems. E-39. The AN/USQ-113 (V) radio countermeasures set will enhance the aircrafts jamming capability through its integration with the tactical display system. This will enable the crew to display AN/USQ-113 communications jamming data as well as control AN/USQ-113 operations through the tactical display system.
E/A-18G GROWLER
E-40. The E/A-18G Growler is the Navys replacement aircraft for the EA-6B Prowler. Paragraphs E-41 and E-42 discuss the missions, primary tasks, and capabilities of the Navys E/A-18G Growler. (See figure E-9.) E/A-18G fielding began in 2008. The first operational E/A-18G deployment will occur in 2009, as the Navy begins to replace its carrierborne EA-6B aircraft.
(Publication date)
E-11
Appendix E
Capabilities
E-42. The following is a list of the E/A-18Gs general capabilities: Suppression of enemy air defenses. The EA-18G will counter enemy air defenses using both reactive and preemptive jamming techniques. Stand-off and escort jamming. The EA-18G will be highly effective in the traditional stand-off jamming mission, but with the speed and agility of a Super Hornet, it will also be effective in the escort role. Integrated air and ground airborne electronic attack. Enhanced situational awareness and uninterrupted communications will enable the EA-18G to achieve a higher degree of integration with ground operations than previously. Self-protect and time-critical strike support. With its active electronically scanned array radar, digital data links, and air-to-air missiles, the EA-18G will be able to protect itself and effectively identify and prosecute targets. Growth. High commonality with the F/A-18E and F/A-18F, nine available weapon stations, and modern avionics enable cost-effective synergistic growth, setting the stage for continuous capability enhancement. E-43. The following is a list of the E/A-18Gs airborne electronic attack capabilities: Entire spectrum. The EA-18Gs ALQ-218 wideband receiver combined with the ALQ-99 tactical jamming system will be effective against any surface-to-air threat. Precision airborne electronic attack. Selective-reactive technology enables the EA-18G to rapidly sense and locate threats much more accurately than before. This improved accuracy enables greater concentration of energy against threats. Advanced communication countermeasures. Its modular communication countermeasure set enables the EA-18G to counter a wide range of communication systems and is readily adaptable to an ever changing threat spectrum. Interference cancellation system. This system dramatically enhances aircrew situational awareness by enabling uninterrupted communications during jamming operations.
E-12
(Publication date)
CAPABILITIES SUMMARY
E-44. Table E-1 lists Army and joint EW capabilities. (Bold text indicates capabilities not described in the preceding paragraphs.) EW officers, noncommissioned officers, and supporting staff members should be familiar with these capabilities and how they can support Army operations. Additional information on the EW capabilities listed in table E-1 is found in the Web sites listed in table E-2, page E-12. Table E-1. Army and joint electronic warfare capabilities
(Publication date)
E-13
Appendix E
E-14
(Publication date)
Appendix F
E-SPACE
F-7. E-Space is a Department of Defense (DOD) entity housed in the National Security Agency. It provides intelligence assistance (primarily signals intelligence) to deployed EW officers. E-Space is a reachback capability available to EW officers and spectrum managers that can be leveraged to provide allsource intelligence products and answers to requests for information and spectrum interference questions.
(Publication date)
F-1
Appendix F
ADDITIONAL INFORMATION
F-14. Further information on the above tools and resources can be accessed through Army Knowledge Online. The links to these Web sites can be viewed by first accessing the Army Operational Electronic Warfare Course on Army Knowledge Online at http://www.us.army.mil/suite/page/400055 and then clicking on Folders >Links>EW links.
F-2
(Publication date)
Glossary
SECTION I ACRONYMS AND ABBREVIATIONS
ARAT C-3 CJCSI CJCSM COA DD DOD DODI EW FM FMI G-2 G-3 G-5 G-6 G-7 GTA HF Hz IED IO IPB ISR J-2 J-3 J-5 J-6 JFMO JIOWC JP MAGTF MC MCWP MDMP Army Reprogramming Analysis Team operations directorate of a multinational (combined) staff Chairman of the Joint Chiefs of Staff instruction Chairman of the Joint Chiefs of Staff manual course of action Department of Defense (official forms only) Department of Defense Department of Defense Instruction electronic warfare field manual field manual, interim assistant chief of staff, intelligence assistant chief of staff, operations assistant chief of staff, plans assistant chief of staff, signal assistant chief of staff, information engagement graphic training aid high frequency hertz improvised explosive device information operations intelligence preparation of the battlefield intelligence, surveillance, and reconnaissance intelligence directorate of a joint staff operations directorate of a joint staff plans directorate of a joint staff communications system directorate of a joint staff Joint Frequency Management Office Joint Information Operations Warfare Center joint publication Marine air-ground task force Military Committee (NATO) Marine Corps warfighting publication military decisionmaking process
(Publication Date)
Glossary-1
Glossary
North Atlantic Treaty Organization intelligence staff officer operations staff officer signal staff officer information engagement staff officer SECRET Internet Protocol Router Network standardization agreement (NATO) tactical electronic reconnaissance processing and evaluation system United States
SECTION II TERMS
communications security (joint) The protection resulting from all measures designed to deny unauthorized persons information of value that might be derived from the possession and study of telecommunications, or to mislead unauthorized persons in their interpretation of the results of such possession and study. (JP 6-0) computer network operations (joint) Comprised of computer network attack, computer network defense, and related computer network exploitation enabling operations. (JP 3-13) directed energy (joint) An umbrella term covering technologies that relate to the production of a beam of concentrated electromagnetic energy or atomic or subatomic particles. (JP 3-13.1) electromagnetic environment (joint) The resulting product of the power and time distribution, in various frequency ranges, of the radiated or conducted electromagnetic emission levels that may be encountered by a military force, system, or platform when performing its assigned mission in its intended operational environment. It is the sum of the electromagnetic interference; electromagnetic pulse; hazards of electromagnetic radiation to personnel, ordnance, and volatile materials; and natural phenomena effects of lightning and precipitation static. (JP 3-13.1) electromagnetic environmental effects The impact of the electromagnetic environment upon the operational capability of military forces, equipment, systems, and platforms. It encompasses all electromagnetic disciplines, including electromagnetic compatibility and electromagnetic interference; electromagnetic vulnerability; electromagnetic pulse; electronic protection, hazards of electromagnetic radiation to personnel, ordnance, and volatile materials; and natural phenomena effects of lightning and precipitation static. (JP 3-13.1) electromagnetic spectrum (joint) The range of frequencies of electromagnetic radiation from zero to infinity. It is divided into 26 alphabetically designated bands. (JP 1-02) electromagnetic vulnerability (joint) The characteristics of a system that cause it to suffer a definite degradation (incapability to perform the designated mission) as a result of having been subjected to a certain level of electromagnetic environmental effects. (JP 1-02)
Glossary-2
(Publication Date)
Glossary
electronic attack (joint) Division of electronic warfare involving the use of electromagnetic energy, directed energy, or antiradiation weapons to attack personnel, facilities, or equipment with the intent of degrading, neutralizing, or destroying enemy combat capability and is considered a form of fires. (JP 3-13.1) electronic protection (joint) Division of electronic warfare involving actions taken to protect personnel, facilities, and equipment from any effects of friendly or enemy use of the electromagnetic spectrum that degrade, neutralize or destroy friendly combat capability. (JP 3-13.1) electronic warfare (joint) Military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or to attack the enemy. Electronic warfare consists of three divisions: electronic attack, electronic protection, and electronic warfare support. (JP 3-13.1) electronic warfare support (joint) Division of electronic warfare involving actions tasked by, or under direct control of, an operational commander to search for, intercept, identify, and locate or localize sources of intentional and unintentional radiated electromagnetic energy for the purpose of immediate threat recognition, targeting, planning, and conduct of future operations. (JP 3-13.1) emission control (joint) The selective and controlled use of electromagnetic, acoustic, or other emitters to optimize command and control capabilities while minimizing, for operations security: a. detection by enemy sensors; b. mutual interference among friendly systems; and/or c. enemy interference with the ability to execute a military deception plan. (JP 1-02) joint restricted frequency list (joint) A time a geographically-oriented listing of TABOO, PROTECTED, and GUARDED functions, nets, and frequencies. It should be limited to the minimum number of frequencies necessary for friendly forces to accomplish objectives. (JP 3-13.1) working group (Army) A temporary grouping of predetermined staff representatives who meet to coordinate and provide recommendations for a particular purpose or function. (FMI 5-0.1)
(Publication Date)
Glossary-3
References
REQUIRED PUBLICATIONS
These documents must be available to intended users of this publication. FM 1-02 (101-5-1). Operational Terms and Graphics. 21 September 2004. JP 1-02. Department of Defense Dictionary of Military and Associated Terms. 12 April 2001. (As amended through 4 March 2008.) JP 3-13.1. Electronic Warfare. 25 January 2007. FM 3-0. Operations. 27 February 2008. FM 5-0 (101-5). Army Planning and Orders Production. 20 January 2005. FM 6-0. Mission Command: Command and Control of Army Forces. 11 August 2003. FMI 5-0.1. The Operations Process. 31 March 2006.
RELATED PUBLICATIONS
These documents contain relevant supplemental information.
(Publication date)
References-1
References
ARMY PUBLICATIONS
Most Army doctrinal publications are available online: <http://www.army.mil/usapa/doctrine/Active_FM.html>. FM 2-0 (34-1). Intelligence. 17 May 2004. FM 3-09.32. JFIRE: Multi-Service Tactics, Techniques, and Procedures for the Joint Application of Firepower. 20 December 2007. FM 3-13 (100-6). Information Operations: Doctrine, Tactics, Techniques, and Procedures. 28 November 2003. FM 3-13.10 (3-51.1). Reprogramming: Multi-Service Tactics, Techniques, and Procedures for the Reprogramming of Electronic Warfare and Target Sensing Systems. 22 January 2007. FM 5-19 (100-14). Composite Risk Management. 21 August 2006. FM 6-20-10. Tactics, Techniques, and Procedures for the Targeting Process. 8 May 1996. FM 6-99.2 (101-5-2). U.S. Army Report and Message Formats. 30 April 2007. FM 34-130. Intelligence Preparation of the Battlefield. 8 July 1994. [When published, FM 2-01.3 will supersede FM 34-130.] FMI 2-01. Intelligence, Surveillance, and Reconnaissance (ISR) Synchronization. 11 November 2008. GTA 90-10-046. MNC-I Counter IED Smart Book. September 2008.
NATO PUBLICATIONS
Allied Joint Publication 3.6. Allied Joint Electronic Warfare Doctrine. December 2003. MC 64. NATO Electronic Warfare (EW) Policy. 26 April 2004. STANAG 5048 C3 (Edition 5). The Minimum Scale of Convectivity for Communications and Information Systems for NATO Land Forces. 16 February 2000.
OTHER PUBLICATIONS
AFDD 2-1.9. Targeting. 8 June 2006. AFDD 2-5.1. Electronic Warfare. 5 November 2002. Executive Order 12333. United States Intelligence Activities. 4 December 1981. MCWP 2-22 (2-15.2). Signals Intelligence. 13 July 2004. NWP 3-13. Navy Information Operations. June 2003.
SOURCES USED
Electronic Warfare Working Group, U.S. House of Representatives, Issue Brief #17. Compass Call During Operation Iraqi Freedom. 11 March 2004. Available online at http://www.house.gov/pitts/initiatives/ew/Library/Briefs/brief17.htm.
PRESCRIBED FORMS
None
REFERENCED FORMS
DD Form 1972. Joint Tactical Air Strike Request.
References-2
(Publication Date)
Index
Entries are by paragraph number unless specified otherwise.
AB
aerial common sensor, E-6 aircraft survivability equipment, E-3 AN/ALQ-99 tactical jamming system, E-21, E-34 AN/MLQ-36 mobile electronic warfare support system, E-13, E-14 AN/MLQ-36A mobile electronic warfare support system, E-14 E-16 AN/TSQ-90 tactical electronic reconnaissance processing and evaluation system (TERPES), E-19, E-23E-24 AN/ULQ-19(V)2 electronic attack set, E-12 antiradiation missiles, electronic attack and, 1-12, 1-54, 4-68. See also high-speed antiradiation missiles. area denial, 1-11, 2-13, 2-16 directed energy and, A-6 Army Reprogramming Analysis Team (ARAT), 5-16, F-1F-3 assessment, defined, 4-79 electronic attack and, 4-47 4-49 electronic attack, of, 4-78, 4-794-83 asset management, 5-2, 5-13 asset tracking, EW support of, 2-14, 2-15 attack guidance matrix, electronic attack and, 4-44, 4-45, 4-46, 4-76 band designators, A-3, table A-1 battalion, EW working group at, 3-8 battle damage assessment, electronic attack and, 4-48, 4-64
battlefield coordination detachment, EW coordination and, 5-5 EW support requests and, 4-78 battlefield surveillance brigade, Prophet and, E-7 Big Crow Program Office, 7-3 branches, EW supporting tasks for, 4-22, 4-23, 4-75 brigade, EW working group at, 3-63-7
C
center of gravity analysis, EW contributions to, 4-104-11, 4-39, figure 4-2 Central Security Service, 7-11, E-4 CITP, F-5 collateral damage, preventing, 1-54, 2-13, 4-21, 4-66 collection manager, 3-11 collection plan, 5-15 electronic order of battle and, 3-13 EW tasks in, 3-11 preparation and, 4-76 targeting and, 4-45 combat assessment, electronic attack and, 4-474-49 execution, during, 4-83 command and control tasks, EW support to, table 2-2 command and control warfare, 2-7, table 2-1 defined, 2-8 electronic attack and, 4-45 EW coordination with, 5-17 EW support to, table 2-2 EW synchronization and, 5-20 fires warfighting function and, 2-13 in a time-constrained environment, 4-33 intelligence, surveillance, and reconnaissance and, 4-45 preparation for, 4-76
command and control warfare working group, execution, during, 4-78 command and control warfighting function, EW support of, 2-15 commanders critical information requirements, course of action analysis and, 4-23 course of action approval and, 4-28, 4-29 execution, during, 4-78 commanders visualization, EW employment, of, 2-3 communications fratricide, 3-14 EW synchronization and, 5-20 communications security, 4-69, 4-71, 7-5, E-10 company, EW support at, 3-9 Compass Call, E-26E-28 composite risk management, assessment during, 4-81. See also EW risks, risk controls. contingency planning, peacetime, joint, 5-3 continuing activities, EW contributions to, 4-34 convoy planning, EW support of, 2-14 coordination, EW, joint level, 5-3 external EW agencies, with, 5-6 counter-IED targeting program (CITP), F-5 countermeasures, 1-241-26, A-7, E-3 defined, 1-24 degradation, 1-49 electronic attack and, 1-9, 1-13 protection warfighting function and, 2-16 wartime reserve modes and, 1-43 counter-radio-controlled IED EW, 4-5, E-2 deconfliction and, 5-18
(Publication date)
Index-1
Index
E
EA-6B Prowler, Marine Corps, E-19, E-21, E-24 Navy, E-33E-39 E/A-18G Growler, E-40E-43 EC-130H Compass Call, E-26 E-28 electromagnetic compatibility, defined, 1-44 Electromagnetic Compatibility Center, 7-8 electromagnetic deception, control of, 3-11 coordination of, 3-15 defined, 1-27 electronic attack and, 1-9, 1-10 electromagnetic effects, A-4 electromagnetic emissions, EW deconfliction and, 5-18 electromagnetic environment, described, A-1 IPB and, 4-37 electromagnetic hardening, defined, 1-37 electromagnetic interference, defined, 1-38 resolution of, 3-15 electromagnetic intrusion, defined, 1-28 electromagnetic jamming, defined, 1-29 electromagnetic pulse, defined, 1-30
D
deception, 1-50, 2-16 electronic, disruption and degradation and, 1-51 EW support of, 4-18 decisionmaking in a timeconstrained environment, EW working group decisionmaking tasks, 4-324-33 deconfliction, 5-185-19 frequency, 6-11 Joint Spectrum Center and, 7-8 preparation and, 4-76 protection and, 1-52 spectrum requirements, 5-10 5-11 Defense Information Systems Agency, 7-4
Index-2
(Publication date)
Index
F
fires, EW synchronization and, 5-20 integration of EW with, 3-12
(Publication date)
Index-3
Index
J
jamming, E-12, E-18, E-21, E-34, E-36, E-37, E-39, E-42, E-43 assessment and, 4-49 degradation and, 1-49, 1-51 disruption and, 1-51 effects of, 4-68 electromagnetic, defined 1-29 electronic attack and, 1-9, 1-10, 1-12 EW synchronization and, 5-20 Joint Spectrum Center and, 7-8 support to, 4-55 jamming control authority, 3-12, 4-43, 4-78, 5-12 Joint Communications Security Monitor Activity, 7-5 Joint Electronic Warfare Center, 7-7, F-8 joint force air component command, EW coordination with, 5-5 joint force EW organization, 6-2 6-14 joint frequency management office, 6-106-11 Joint Improvised Explosive Device Defeat Organization (JIEDDO), F-9 Joint Information Operations Warfare Command, 7-67-7 joint intelligence center, 6-126-13 joint mission planning system, E-22 joint operations, EW coordination for, 3-4 joint restricted frequency list, D-12D-13 jamming control authority and, 5-12 Joint Spectrum Center and, 7-8 Joint Spectrum Center, 7-8, F-10 F-12 joint spectrum interference resolution, D-11
GHI
G-2 staff, EW responsibilities of, 3-13 G-3 staff, EW duties of, 3-11 G-5 staff, EW assessment and, 4-82 G-6 staff, EW duties of, 3-14 Growler, E/A-18G, E-40E-43 guarded frequencies, 3-13 Guardrail common sensor, E-5 hardening, protection and, 1-52 high-payoff targets, 4-43, 4-44, 4-45 high-speed antiradiation missiles, 4-59, E-21, E-22, E-34, E-36, E-37, E-41. See also antiradiation missiles. high-value targets, EW, 3-13 EW contributions to, 4-39, 4-43 identifying, 4-12, 4-22, 4-23 improved capability II, EA-6B, E-36 improved capability III, EA-6B, E-37 indications and warnings, intelligence warfighting function and, 2-12, 2-14, 2-16 information engagement working group, EW synchronization and, 5-20 information operations, Joint Spectrum Center and, 7-8 U.S. Strategic Command and, 7-6 information operations cell (joint), 3-4, 6-2, 6-3, 6-5 multinational operations and, 6-16 information protection, defined, 2-8
Index-4
(Publication date)
Index
KLM
Knowledge and Information Fusion Exchange (KnIFE), F-13 lasers, directed energy and, A-7 leadership (element of combat power), EW support of, 2-5 lethal effects, decisionmaking example, 1-54 Marine Corps Information Technology and Network Operations Center, 7-10 Marine radio battalion. See radio battalion. Marine tactical electronic warfare squadron, E-17E-24 measures of effectiveness, developing EW, 4-82 military deception, EW synchronization and, 5-20 military decisionmaking process (MDMP), assessment during, 4-81 mission analysis, EW actions during, 4-64-14 mission rehearsal exercise, 4-76 mission variables, 1-2 mobile electronic warfare support system, E-13, E-14E-16 modified combined obstacle overlay, EW contributions to, 4-38 movement and maneuver warfighting function, EW support of, 2-11 multinational operations, 3-4, 6-156-24 munitions effects assessment, electronic attack and, 4-48 named areas of interest, EW contributions to, 4-40
OP
obscuration, directed energy and, A-6 offensive electronic attack, 4-61 operational environment, defined, 1-1 evaluating from EW prospective, 4-374-38 orders, Army, EW input for, B-1, figure B-1 joint, EW input for, B-2B-3 orders production, EW contributions to, 4-304-31 particle-beam weapons, A-7 planning, assessment during, 4-81 considerations for EW, 4-1 plans, Army, EW input for, B-1, figure B-1 joint, EW input for, B-2B-3 precipitation static, defined, A-1 preparation, 4-754-76 assessment during, 4-81 defined, 4-75 priority intelligence requirements, EW contributions to, 4-22, 4-39 Prophet, E-7 protection, 1-52 protection warfighting function, EW support of, 2-16 Prowler. See EA-6B Prowler.
S
S-2 staff, EW duties of, 3-13 S-3 staff, EW duties of, 3-11 S-5 staff, EW assessment and, 4-82 S-6 staff, EW duties of, 3-14 sequels, 4-22, 4-23, 4-75 signal operating instructions, 3-15 signals intelligence, E-4, E-13, E-14, E-16, F-7 aerial common sensor and, E-6 assessing electronic attack and, 4-49 EW support, compared with, 1-20, 4-73 EW-related information requirements and, 4-52 foreign, 7-11 Guardrail common sensor, E-5 multinational operations, for, 6-22
QR
Q-19(V)2 electronic attack set, E-12 Q-36 mobile electronic warfare support system, E-13 Q-36A mobile electronic warfare support system, E-14 Q-90 tactical electronic reconnaissance processing and evaluation system (TERPES), E-19, E-23E-24 Q-99 tactical jamming system, E-21, E-34
N
National Ground Intelligence Center, F-4F-5 national intelligence, coordination for, 6-13 National Security Agency, 7-11 7-12
(Publication date)
Index-5
Index
UV
U.S. Strategic Command, 7-6 USQ-113 radio countermeasures set, E-34, E-39 visualization, EW employment, of, 2-3 VMAQ. See Marine tactical EW squadron. vulnerabilities, EW, 3-13 vulnerability analysis and assessment, 4-70, 7-4
WXYZ
war-gaming. See course of action analysis. wartime reserve modes, defined, 1-43 working group, defined, 3-2. See also command and control working group, EW working group, information engagement working group, targeting working group.
T
tactical electronic reconnaissance processing and evaluation system (TERPES), E-19, E-23 E-24 tactical jamming system, AN/ALQ-99, E-21, E-34 target areas of interest, EW contributions to, 4-40
Index-6
(Publication date)