ES vs. SIGINT
ES vs. SIGINT
ES vs. SIGINT
ES vs. SIGINT
By Dave Adamy
D
uring the next two months, we will discuss the dif-
ferences between Electronic Support (ES) systems and
Signals Intelligence (SIGINT) systems, both of which 6,*,17
are designed to receive hostile signals. The differences
between SIGINT and ES have to do with the reasons those sig-
nals are received, as summarized in Table 1. There are also
&20,17 (/,17
some technical differences between the typical environments
in which these systems work that dictate differences in system
'HYHORSLQWHOOLJHQFH 'HYHORSLQWHOOLJHQFH
design approach and system hardware and software.
WKURXJKLQWHUFHSWDQG WKURXJKLQWHUFHSWDQG
DQDO\VLVRIHQHP\ DQDO\VLVRIHQHP\
SIGINT FRPPXQLFDWLRQV QRQFRPPXQLFDWLRQV
SIGINT is the development of militarily significant informa- VLJQDOV VLJQDOV
tion from received signals. It is commonly divided into Com-
munications Intelligence (COMINT) and Electronic Intelligence Figure 1: SIGINT comprises COMINT and ELINT to develop intelligence
(ELINT) as shown in Figure 1. Each of these subfields is some- from enemy communications and non-communications signals.
what related to ES as shown in Figure 2. ES is commonly divid-
ed into Communications ES and Radar ES as shown in Figure signals. Because of the nature of military communication, im-
3. The nature of communication and radar signals dictates dif- portant signals can be expected to be encrypted and, of course,
ferences in mission between these two subfields. The following in the enemy’s language. Decryption and translation of signals
paragraphs will focus on systems handling each type of signal, can be expected to delay the availability of the information
42 differentiating the intelligence and ES roles. recovered. Thus, COMINT can be considered more valuable to
strategic and high-level tactical considerations than to deter-
COMINT and Communications ES mination of appropriate immediate tactical response.
The Journal of Electronic Defense | January 2011
Figure 3 is a flow diagram showing the relationship be- Communications ES focuses on the externals of communica-
tween COMINT and Communications ES systems. tions signals: the type and level of modulation and the location
The dictionary definition of COMINT is “gathering of intel- of the transmitters. It supports tactical responses to current
ligence by intercept of wire or radio communications.” Basi- situations by determining the types and locations of enemy
cally, this is listening to what an enemy says to determine emitters. By modeling all of the types of emitters against the
his capability, his force structure and his intentions. This im- type of emitters used by various enemy organizations, esti-
plies that a COMINT system deals with the internals (i.e., the mates of the enemy force structure can be made. The location
information carried in the modulation) of transmitted enemy and location history of the observed emitters can be used to
Mission COMINT: Intercept enemy Comms ES: Identify and locate enemy
communications and determine communications emitters to allow development
enemy capabilities and intentions from of EOB and to support comms jamming.
information carried on signals. Radar ES: Identify and locate enemy radars
ELINT: Find and identify new to allow threat warning and to support radar
threat types. countermeasures.
Data Collected Gather all possible data on Gather only enough data to
received signals to support determine threat type, operating mode and
detailed analysis. location.
E W101
(6
5$:
'(7$,/(' 9$/,'$7(' '(9(/23
(/,17 7+5($7
$1$/<6,6
7+5($7 (:
6<67(0 '$7$ '$7$
+: 6:
7(&+1,48(6
6<67(06
'(6,*1
'HWHUPLQHHQHP\ :DUQRIZHDSRQVV\VWHPV
IRUFHVWUXFWXUHDQG WKUHDWHQLQJSURWHFWHGDVVHWV
SUHGLFWWDFWLFDODFWLRQV 7+5($7
3URYLGHWKUHDWVLJQDOGDWDWR 5$'$56 (6 :$51
+DQGRӽHQHP\FRPP VXSSRUW($V\VWHPV 6<67(06 &2817(5
7+5($76
VLJQDOLQIRWRVXSSRUW 68%6<67(06
FRPPV-DPPLQJ 3URYLGHWDUJHWLQJLQIRUPDWLRQ
IRUNLQHWLFDQGHOHFWURQLFZHDSRQV
3URYLGHWDUJHWLQJLQIRUPDWLRQ
IRUNLQHWLFDQGHOHFWURQLF Figure 4: ELINT systems gather threat data to support the development
ZHDSRQV of ES systems and subsystems for threat warning and countermeasure
selection.
Figure 2: ES comprises Comms ES and Radar ES. Both provide
is to determine the capabilities and vulnerabilities of newly
information about enemy emitters currently operating in support of EA
and weapon engagement. encountered enemy radars. As shown in Figure 4, the ELINT
system gathers enough data to support detailed analysis. The
indicate the location and movement of the enemy’s forces. The first task when a new radar signal type is received is to deter-
total laydown of transmitters is called the Electronic Order of mine whether the received signal is, in fact, a new threat. Two
Battle (EOB), and can be analyzed to determine the enemy’s other possibilities exist: it may be an old threat radar that is 43
capabilities and even his intentions. malfunctioning or there may have been something wrong with
In summary, COMINT determines the enemy’s capabilities the intercept system. If the received signal is, in fact, a new
and intentions by listening to what is said (i.e., signal inter- type of radar or a new operating mode, the detailed analysis
nals), while Communications ES determines the enemy’s capa- will allow modification of ES systems so that they will be able
bilities and intentions by analysis of signal externals. to recognize this new threat type.
Radar ES systems also receive hostile radar signals, but their
ELINT and Radar ES purpose is to quickly determine which of the enemy’s known
ELINT involves the intercept and analysis of non-commu- weapons is being deployed against a target at the moment.
nications signals, primarily from radars. The purpose of ELINT After threat type and mode identification is complete, this
information is displayed to operators along with the location
of the threat emitter and/or passed to other electronic warfare
systems or subsystems to support countermeasure initiation.
6,*1$/ '(7$,/(' 6833257
&20,17 ,17(51$/6 675$7(*,& If a signal of an unfamiliar type is received, it is considered an
6<67(0 $1$/<6,6 $1$/<6,6
unknown. In some ES systems, the operator is merely notified
that an unknown threat has been received. However, in other
systems, an attempt is made to guess the threat type. In some
ES systems, unknown threats are recorded for later analysis.
+267,/(
&20081,&$7,216 In summary, ELINT determines what capabilities the enemy
6,*1$/6 has, while Radar ES determines which of the enemy’s radars is
being used at the moment and where the emitter (hence the
weapon it controls) is located.
&20081,&$7,216
(6 6,*1$/ 5$3,' ,00(',$7(
6<67(06
(;7(51$/6 7$5*(7(' 7$&7,&$/ What’s Next
$33/,&$7,21
68%6<67(06 $1$/<6,6 Next month, we will continue our discussion of the dif-
ferences between ES and SIGINT, covering the technical dif-
ferences between ES and SIGINT systems which are driven by
Figure 3: COMINT classically deals with signal internals to support
strategic actions; Comms ES deals with signal externals to support
their respective missions. For your comments and suggestions,
immediate tactical decision making. Dave Adamy can be reached at dave@lynxpub.com. a
EW 101
T
his month, we will deal with some technical dif-
ferences between ES and SIGINT systems dictated
'ZHOORQ6LJQDO$QJOHRI$UULYDOPVHF
3HUFHQWDJHRIWLPHDQWHQQDLVRQWDUJHW
by mission and environment considerations. These
differences have to do with the anticipated inter-
cept geometry, the different types of information
VHF VHF
taken from intercepted hostile signals, and time
6&$1 VHF
6&$1 VHF
criticality of intercepts. 6&$1
6&$1
reduced angular sector. as it occurs. The directional antenna, on the other hand,
Angular coverage has a significant impact on the prob- must be scanned to the direction of arrival of a new signal
ability of intercepting a hostile signal at an unknown direc- before it can be received. If a hostile signal is present for a
tion of arrival. As shown in Figure 1, a 360-degree coverage limited time, the probability of intercept is a function of the
antenna (or array of antennas) “looks” in all directions all of antenna beam width and the scan rate of the antenna. For an
intercept to occur, the antenna must
be moved to place the signal’s direc-
&RYHUDJHE\ tion of arrival into the antenna beam
1%DQWHQQD coverage area.
(PLWWHUGZHOOLQDQWHQQD As shown in Figure 2, the beamwidth
%:63
determines the percentage of possible
%: $QWHQQDEHDPZLGWK angles of arrival covered by the anten-
63 $QWHQQD6FDQ3HULRG na. To use this part of the figure, draw
a line straight up from the beamwidth
to the black line, then draw right to the
black ordinate value. This considers only
one search dimension (e.g., azimuthal
(PLWWHUGZHOOLQDQWHQQD
search); a two-dimensional search is
&RYHUDJHE\ significantly more difficult. In the same
DQWHQQD figure, the amount of time that a scan-
ning antenna will dwell on the signal’s
angle of arrival (also in azimuth only)
is shown as a function of beam width
)L $ G OLN GL O KL LG I OO L K I for various circular scan periods. To use
Figure 1: A 360-degree antenna, like a dipole or whip, provides 100 percent coverage of all
this part of the figure, draw straight up
azimuths of arrival, while a narrow-beam antenna must be scanned to the correct direction
of arrival. from the beam width to the green line
E W101
INTERCEPT RANGE CONSIDERATIONS
Figure 4 shows an intercept situation for ei-
ther an ES or SIGINT system. Note that the range
at which a receiving system can intercept a hos-
*DLQLQG%IRU(ԀFLHQF\
1
Technical Symposium
EW/IO in a Cyber World
You are invited to join us
A
S
H eld in conjunction with the National Collegiate Cyber Defense Competition (NCCDC)
(8-10 April), and the Congressional Cyber Security Caucus Summit (9 April),
FiestaCrow 2011 will bring together renowned cyber/IO policy makers and technical
experts, providing you the opportunity to meet and hear senior officials such as Mr. Howard
Schmidt, White House Cyber Policy Coordinator; Mr. Robert Butler, Deputy TI
ON
O F OL
D
IA
Assistant Secretary of Defense for Space and Cyber Policy; Major General
CR
CO
OW
ASS
Richard Webber, Commander, 24th Air Force; and Major General Bradley
S
R
TE
LL
Y
M
Agency. FC11 is co-sponsored by the Air Force ISR Agency and 24th Air Force. I TC
H E LL C
H A