MENU

Spoofing in Radar ECM

765Spoofing in Radar ECM

Spoofing consists in the generation of a programmed number of false echoes without specific kinematic law with constant or random spacing.
False echo delays are periodically refreshed to avoid the presence of annular (constant range lines) in radar PPI.

Spoofing generation is obtained through repetition of jamming pulses that are obtained from a stored slice of threat signal:
the detection and storage of countered Radar waveform is necessary to jam.

When counteracting a scanning radar, the jamming waveforms are transmitted after lobe acquisition and continues until the radar lobe is lost.
Non-coherent Spoofing, actually synthesized pulse train, can be limited by the lack of synchronization with radar PRI and radiated frequency.

Figure 1: Spoofing effect in a Radar PPI

Spoofing technique needs to generate random delay patterns. If the delay pattern for a maximum number of false echoes is less than the number of Spoofing false echoes, then the basic pattern can be repeated until the programmed number of false echoes is reached.

Figure 2: Spoofing, synthesized pulse train

Spoofing is normally programmed with a high duty cycle to produce a high number of false echoes that, in addition to increasing false detections, can affect the Radar adapted threshold (Radar adapted threshold is optimized for continuous background noise or clutter and real echoes can be masked.

Figure 3: Spoofing, programmed replicas

From the same Author
exagon-bg

Range Gate Pull-Off (RangeDeception)

READ MORE

exagon-bg

Spot Noise

READ MORE

exagon-bg

Anti-Monopulse techniques - Cross-polarization

READ MORE

exagon-bg

Communication Electronic CounterMeasures in Stand-in Jammer Task

READ MORE

exagon-bg

Angle Deception

READ MORE

exagon-bg

Human intelligence HUMINT

READ MORE

exagon-bg

Barrage Noise

READ MORE

exagon-bg

Acoustic Intelligence ACINT

READ MORE

exagon-bg

Communication intelligence COMINT

READ MORE

exagon-bg

Defensive Electronic Attack

READ MORE

exagon-bg

Cross-eye

READ MORE

exagon-bg

Communication Electronic Support Measures - CESM

READ MORE

exagon-bg

Communication Electronic CounterMeasures Basic Techniques

READ MORE

exagon-bg

Area Protection Task

READ MORE

exagon-bg

Spoofing in Radar ECM

READ MORE

exagon-bg

Chaffs

READ MORE