ATP 3-36 (FM 3-36) : Distribution Restriction: This Manual Is Approved For Public Release Distribution Is Unlimited
ATP 3-36 (FM 3-36) : Distribution Restriction: This Manual Is Approved For Public Release Distribution Is Unlimited
December 2014
DISTRIBUTION RESTRICTION: This manual is approved for public release; distribution is unlimited.
Contents
Page
PREFACE.............................................................................................................. iii
INTRODUCTION ................................................................................................... iv
Chapter 1 OVERVIEW OF ELECTRONIC WARFARE ...................................................... 1-1
Definition of Electronic Warfare .......................................................................... 1-1
Divisions of Electronic Warfare........................................................................... 1-1
Key Personnel for Planning and Coordinating Electronic Warfare Activities ..... 1-3
Relationship with Cyber Electromagnetic Activities ........................................... 1-6
Electronic Warfare and Integrating Processes and Continuing Activities ........ 1-11
Chapter 2 ELECTRONIC WARFARE PLANNING ............................................................. 2-1
The Operations Process ..................................................................................... 2-1
Electronic Warfare Planning Considerations ...................................................... 2-1
Chapter 3 ELECTRONIC WARFARE PREPARATION, EXECUTION, AND
ASSESSMENT ................................................................................................... 3-1
Electronic Warfare Preparation .......................................................................... 3-1
Electronic Warfare Execution ............................................................................. 3-1
Electronic Warfare Assessment ......................................................................... 3-2
Special Considerations During Execution .......................................................... 3-3
Chapter 4 ELECTRONIC WARFARE TARGETING .......................................................... 4-1
Electronic Warfare in the Targeting Process ...................................................... 4-1
Call for Electronic Attack Fires ........................................................................... 4-3
Chapter 5 ELECTRONIC WARFARE IN JOINT AND MULTINATIONAL OPERATIONS 5-1
Joint Electronic Warfare Operations ................................................................... 5-1
Joint Force Principal Staff for Electronic Warfare .............................................. 5-1
Multinational Electronic Warfare Operations ...................................................... 5-4
Appendix A FORMS, REPORTS, AND MESSAGES ............................................................ A-1
Appendix B JAMMING CALCULATIONS ............................................................................. B-1
Appendix C ELECTRONIC WARFARE EQUIPMENT .......................................................... C-1
Distribution Restriction: This manual is approved for public release; distribution is unlimited.
i
Contents
Figures
Figure 1-1. Electronic warfare staff support of CEMA working group .................................. 1-10
Figure 1-2. Integrating processes and continuing activities ................................................. 1-12
Figure 1-3. Electronic warfare to support intelligence preparation of the battlefield ............ 1-13
Figure 2-1. EW running estimate ........................................................................................... 2-3
Figure 2-2. Course of action development ............................................................................. 2-5
Figure 2-3. Course of action comparison ............................................................................... 2-7
Figure 4-1. Electronic warfare in the targeting process ......................................................... 4-1
Figure 5-1. Joint frequency management coordination ......................................................... 5-3
Figure 5-2. Electronic warfare request coordination .............................................................. 5-4
Figure A-1. Sample joint spectrum interference resolution format ........................................ A-2
Figure A-2. Sample stop jamming message format............................................................... A-2
Figure B-1. Sample minimum jammer power output calculation ........................................... B-2
Figure B-2. Sample jammer maximum distance calculation .................................................. B-3
Tables
Table 1-1. Electronic warfare element organization .............................................................. 1-7
Table 2-1. EWE actions during the MDMP ............................................................................ 2-2
Table 3-1. Operator EMI troubleshooting checklist ................................................................ 3-7
Table 3-2. Sample EMI battle drill .......................................................................................... 3-8
Table B-1. Jammer formula symbols ..................................................................................... B-1
ELECTRONIC ATTACK
1-3. EA uses electromagnetic energy, directed energy, or antiradiation weapons to attack personnel,
facilities, or equipment with the intent of degrading, neutralizing, or destroying enemy combat capability.
EA may be an offensive or defensive action. Offensive EA includes jamming enemy electronic systems,
using a missile guided by radiated energy against the energy source, or using directed energy such as a laser
against enemy equipment. Defensive EA focuses on protection of personnel, facilities, capabilities, and
equipment, such as counter radio-controlled improvised explosive device electronic warfare (CREW)
systems. Tasks related to EA include—
Countermeasures.
Electromagnetic deception.
Electromagnetic intrusion.
Electromagnetic jamming.
Electromagnetic pulse.
Electronic probing.
Countermeasures
1-4. Countermeasures are that form of military science that, by the employment of devices and/or
techniques, has as its objective the impairment of the operational effectiveness of enemy activity
(JP 3-13.1).
Electromagnetic Deception
1-5. Electromagnetic deception is the deliberate radiation, reradiation, alteration, suppression, absorption,
denial, enhancement, or reflection of electromagnetic energy in a manner intended to convey misleading
information to an enemy or to enemy electromagnetic-dependent weapons, thereby degrading or
neutralizing the enemy’s combat capability.
Electromagnetic Intrusion
1-6. Electromagnetic intrusion is the intentional insertion of electromagnetic energy into transmission
paths in any manner, with the objective of deceiving operators or of causing confusion (JP 3-13.1).
Electromagnetic Jamming
1-7. Electromagnetic jamming is the deliberate radiation, reradiation, or reflection of electromagnetic
energy for the purpose of preventing or reducing an enemy’s effective use of the electromagnetic spectrum,
and with the intent of degrading or neutralizing the enemy’s combat capability (JP 3-13.1).
Electromagnetic Pulse
1-8. Electromagnetic pulse is the electromagnetic radiation from a strong electronic pulse, most
commonly caused by a nuclear explosion that may couple with electrical or electronic systems to produce
damaging current and voltage surges (JP 3-13.1).
Electronic Probing
1-9. Electronic probing is intentional radiation designed to be introduced into the devices or systems of
potential enemies for the purpose of learning the functions and operational capabilities of the devices or
systems (JP 3-13.1).
ELECTRONIC PROTECTION
1-10. Electronic protection involves actions taken to protect personnel, facilities, and equipment from any
effects of friendly or enemy use of the electromagnetic spectrum that degrade, neutralize, or destroy
friendly combat capability. Electronic protection (EP) focuses on the effects of friendly or threat use of the
electromagnetic spectrum. EP tasks include—
Electromagnetic hardening.
Electronic masking.
Emission control.
Electromagnetic spectrum management.
Wartime reserve modes.
Electromagnetic compatibility.
Electromagnetic Hardening
1-11. Electromagnetic hardening is action taken to protect personnel, facilities, and/or equipment by
blanking, filtering, attenuating, grounding, bonding, and/or shielding against undesirable effects of
electromagnetic energy (JP 3-13.1).
Electronic Masking
1-12. Electronic masking is the controlled radiation of electromagnetic energy on friendly frequencies in a
manner to protect the emissions of friendly communications and electronic systems against enemy
electronic warfare support measures/signals intelligence without significantly degrading the operation of
friendly systems (JP 3-13.1).
Emission Control
1-13. Emission control is the selective and controlled use of electromagnetic, acoustic, or other emitters to
optimize command and control capabilities while minimizing, for operations security: a. detection by
enemy sensors; b. mutual interference among friendly systems; and/or c. enemy interference with the
ability to execute a military deception plan (JP 3-13.1).
Electromagnetic Compatibility
1-16. Electromagnetic compatibility is the ability of systems, equipment, and devices that use the
electromagnetic spectrum to operate in their intended environments without causing or suffering
unacceptable or unintentional degradation because of electromagnetic radiation or response (JP 3-13.1).
Electronic Reconnaissance
1-18. Electronic reconnaissance is the detection, location, identification, and evaluation of foreign
electromagnetic radiations (JP 3-13.1).
Electronic Intelligence
1-19. Electronic intelligence is technical and geolocation intelligence derived from foreign
noncommunications electromagnetic radiations emanating from other than nuclear detonations or
radioactive sources (JP 3-13.1).
Electronics Security
1-20. Electronics security is the protection resulting from all measures designed to deny unauthorized
persons information of value that might be derived from their interception and study of communications
and noncommunications electromagnetic radiations.
1-22. Other key personnel involved in the planning and coordination of EW activities include—
Fire support coordinator.
G-5 (S-5) staff.
G-6 or S-6 staff.
Liaison officers.
Space support element.
Special technical operations staff.
Ensures that electronic threat characteristics requirements are included in the information
collection plan.
Determines enemy EW organizations, disposition, capabilities, and intentions via collection,
analysis, reporting, and dissemination.
Determines enemy EW vulnerabilities and high-value targets.
Provides intelligence support to lethal and nonlethal targeting operations.
Assesses effects of friendly EW operations on the enemy.
Conducts intelligence gain or loss analysis for EW targets with intelligence value.
Helps prepare the intelligence-related portion of the EW running estimate.
Provides input to the restricted frequency list by recommending guarded frequencies.
Provides updates on the rapid electronic threat characteristics.
Maintains appropriate threat EW data.
Works with the CEMA working group to synchronize information collection with EW
requirements and deconflict planned EW actions.
Provides guidance to the EWO to deconflict ES and signals intelligence (SIGINT) operations.
SPECTRUM MANAGER
1-27. The spectrum manager coordinates electromagnetic spectrum use for a wide variety of
communications and electronic resources. The spectrum manager—
Issues the signal operating instructions.
Provides all spectrum resources to the task force.
Coordinates for spectrum usage with higher echelon G-6 (S-6), and applicable host-nation and
international agencies as necessary.
Coordinates the preparation of the restricted frequency list and issuance of emissions control
guidance.
Coordinates frequency allotment, assignment, and use.
Coordinates electromagnetic deception plans and operations in which assigned communications
resources participate.
Coordinates measures to reduce electromagnetic interference.
Coordinates with higher echelon spectrum managers for electromagnetic interference resolution
that cannot be resolved internally.
Assists the EWO in issuing guidance in the unit (including subordinate elements) regarding
deconfliction and resolution of interference problems between EW systems and other friendly
systems.
Participates in the CEMA working group to deconflict friendly electromagnetic spectrum
requirements with planned EW operations and information collection.
responsible to the chief of staff. Battalions do not have a EWE but rather a single EW representative on the
battalion staff.
1-34. Primarily the EWE develops EW plans and monitors EW operations and activities. The EWE plays
an important role in requesting and integrating joint air and ground EW and manages the organic EW
“fight” within the main command post. The EWE ensures electromagnetic spectrum management within its
specified area of operations and assists the ground commander in coordinating shaping operations. The
EWE, through the CEMA working group, leads and facilitates the integration of CEMA, with assistance
and coordination from the G-6 (S-6) and G-2 (S-2).
1-35. Cyber electromagnetic activities is defined as activities leveraged to seize, retain, and exploit an
advantage over adversaries and enemies in both cyberspace and the electromagnetic spectrum, while
simultaneously denying and degrading adversary and enemy use of the same and protecting the mission
command system (ADRP 3-0). CEMA consist of cyberspace operations, EW, and spectrum management
operations. The EWE does not have the resident expertise to advise the commander or complete the
detailed planning for all CEMA capabilities and must be augmented by other functional area experts. For
example, cyberspace operations include offensive cyberspace operations and defensive cyberspace
operations that are the responsibility of the G-2 (S-2) and G-6 (S-6), respectively, in coordination with the
G-3 (S-3) who specifies the desired effects. Both offensive and defensive cyberspace operations are
enabled by cryptologic platforms coordinated by the intelligence staff.
1-36. The process for integrating CEMA in an operation involves both the EWE and the CEMA working
group. For example, units requesting EA forward a request to the appropriate EWE. Coordination of the
request, as time permits, is performed through the CEMA working group, which prioritizes the requests and
makes a recommendation to the commander. Once approved, the request is forwarded to the higher
headquarters. The commander responsible for the EW assets ultimately approves the request based on the
mission variables. The CEMA working group integrates new EW requests into the intelligence
synchronization process. If the CEMA working group recommends to approve the new request, then it
appears in the requirements tool and the unit information collection plan. The technical data required to
support EW requests pass via SIGINT channels within the G-2 (S-2) by classified means.
1-37. The EWE plays an important role in requesting and integrating joint air and ground EW support and
manages the organic EW fight. The EWE plans the frequencies to be targeted by EA, analyzes the
probability of frequency fratricide, and collaborates with the G-6 (S-6) to mitigate harmful effects from EW
to friendly personnel, equipment, and facilities. The personnel who make up the EWE are predominantly
EW trained, but also include Soldiers trained in spectrum management. Table 1-1 depicts the structure of a
fully resourced EWE at each level.
Table 1-1. Electronic warfare element organization
Organization Personnel
ASCC 1 x 29A O6
1 x 29A O5
1 x 290A W5
Corps 1 x 29A O6 1 x 290A W4
1 x 29A O5 1 x 29E E9
1 x 29A O4 1 x 25E E7
Division 1 x 29A O5 1 x 29E E8
1 x 29A O4 1 x 25E E7
1 x 290A W4
BCT 1 x 29A O3 1 x 29E E6
*Aviation, fires, battlefield surveillance, 1 x 290A W2 1 x 29E E5
maneuver enhancement, and other special
function brigades have similar electronic 1 x 29E E8 1 x 25E E6
warfare element structure.
ASCC Army Service component command
BCT brigade combat team
1-38. The EWE has the following personnel: electronic warfare officer, electronic warfare technician,
electronic warfare noncommissioned officer, and spectrum manager.
1-39. The electronic warfare officer (29A)—
Serves as the commander’s subject matter expert and advisor on all EW matters.
Plans, coordinates, synchronizes, and deconflicts EW tasks to support unified land operations.
Integrates EW intelligence preparation of the battlefield (IPB) into the military decisionmaking
process (MDMP).
Provides input to fragmentary orders for EW tasks to support unified land operations.
Identifies the potential for frequency fratricide in the MDMP.
Plans, coordinates, and synchronizes EW activities and assets into unified land operations.
Recommends priorities for EW effects and targets, and integrates EW into the targeting process.
Coordinates, synchronizes, and deconflicts with collection manager and G-2 (S-2).
Coordinates and reviews EW battle damage assessment.
Coordinates CEMA in units conducting cyberspace operations.
Maintains current assessment of EW resources available.
Leads the CEMA working group.
When designated, serves as the electronic warfare control authority.
Supervises and manages EW activities for the commander.
Oversees the creation of all EW products for dissemination.
WORKING GROUPS
1-43. A working group is a grouping of predetermined staff representatives who meet to provide analysis,
coordinate, and provide recommendations for a particular purpose or function (FM 6-0). The CEMA
working group, when established, is accountable to the chief of staff but must coordinate with the G-3 (S-3)
and fire support coordinator to integrate EW with all other effects. The CEMA working group replaces and
assumes the duties and functions formerly performed by the EW working group. To effectively integrate
CEMA, the working group usually includes representation from across the staff. The recommended
structure and functions of the CEMA working group is described in detail in FM 3-38.
1-44. In brigade through ASCC organizations, the senior EWO heads the CEMA working group.
Additional staff representation within the CEMA working group may include a fire support coordinator, a
spectrum manager, a space operations officer, a representative of the staff judge advocate, and liaison
officers as required. Depending on the echelon, liaison elements could include joint, interagency, and
multinational representatives. When an Army headquarters serves as the headquarters of a joint task force
or joint force land component command, the Army headquarters’ CEMA working group becomes the joint
force electronic warfare cell. The joint term for the EW staff organization is electronic warfare cell (rather
than electronic warfare element). (See JP 3-13.1.)
1-45. When Army forces are employed as part of a joint or multinational operation, they normally have
EW representatives supporting higher headquarters’ EW coordination organizations. These organizations
may include the joint force commander’s EW staff or the information operations element within a joint task
force. Sometimes a component EW organization may be designated as the joint electronic warfare cell
(EWC). (Chapter 5 discusses joint EW operations in more detail.) The overall structure of the combatant
force and the level of EW to be conducted determine the structure of the joint EWC. The organization to
accomplish the required EW coordination and functions varies by echelon.
1-46. Regardless of the organizational framework employed, CEMA working groups perform the tasks
identified in FM 3-38. The EWE within the CEMA element provides specific support to the CEMA
working group. Figure 1-1 on page 1-10 details those supporting functions performed by the EWE.
BATTALION-LEVEL STAFFING
1-47. Battalion-level organizations do not have an EWE. Instead, battalions have an EW NCO responsible
for planning and integrating EW requirements. Other staff elements that the EW NCO must coordinate at
the battalion level include the S-2, S-6, fire support officer, and the joint terminal attack controller when
assigned. The battalion EW NCO coordinates battalion EW operations with the brigade CEMA working
group.
COMPANY-LEVEL STAFFING
1-49. At the company level, units assigned CREW systems may have trained EW personnel holding an
additional skill identifier of 1K—for completion of the CREW Master Gunner Course or 1J for completion
of the Army Operational Electronic Warfare Operations Course—perform several tasks. They advise the
commander on using EW equipment, track EW equipment status, assist operators in the use and
maintenance of EW equipment, and coordinate with higher headquarters’ EW staff.
1-50. Company CREW specialist duties and responsibilities include but are not limited to—
Advising company commander on the employment of CREW and other EW equipment.
Tracking CREW and EW equipment status.
Training and assisting operators in the use and maintenance of CREW equipment.
Operating CREW systems.
Assessing effectiveness of CREW for company operations.
Training company personnel on CREW system capabilities; company tactics, techniques, and
procedures; and precombat checks and precombat inspections.
Ensuring all CREW systems are fully operational, to include conducting precombat checks and
precombat inspections as well as troubleshooting and reporting the malfunction of CREW
systems to the chain of command and battalion EW NCO.
Submitting required CREW reports to the battalion EW NCO.
1-56. When evaluating enemy capabilities, the EWO and supporting staff examine doctrinal principles;
tactics, techniques, and procedures; and observed patterns of operation from an EW perspective. The
EWO—
Uses the operational and mission variables to help determine the enemy’s critical nodes.
Collects the required data—operational net assessments, electronic threat characteristics, and
electronic databases—to template the command and control critical nodes and the systems
required to support and maintain them.
Assists the G-2 (S-2) in determining the enemy’s EW-related threat characteristics by
identifying—
Types of communications equipment available.
Types of noncommunications emitters.
Surveillance and target acquisition assets.
Technological sophistication of the threat.
Communications network structure.
Frequency allocation techniques.
Operation schedules.
Station identification methods.
Measurable characteristics of communications and noncommunications equipment.
Command, control, and communications structure of the threat.
Tactics, from a communication perspective (such as how the enemy deploys command,
control, and communications assets; whether or not communications systems are remote; and the
level of discipline in procedures, communications security, and operations security).
Electromagnetic deception capabilities.
Reliance on active or passive surveillance systems.
Electromagnetic profiles of each node.
Unique electromagnetic spectrum signatures.
Assists the G-2 (S-2) in analyzing the center of gravity (identifying its critical system nodes and
determining what aspects to engage, exploit, or attack to modify the system’s behavior or
achieve a desired effect).
Identifies organic and nonorganic EW capabilities available to achieve desired effects on
identified high-value targets.
Submits initial EW-related requests for information that describe the intelligence support
required to support EW operations.
Obtains the high-value target list, threat templates, and initial priority intelligence requirements
list to assist in subsequent EW planning.
1-57. When determining enemy COAs, the EWO—
Assists the G-2 (S-2) in development of threat COAs.
Provides EW input to the situation templates.
Ensures event templates include EW named areas of interests.
Assists in providing EW options for target areas of interest.
Assists in providing EW options to support decision points.
Provides EW input to the event template and event matrix.
TARGETING
1-58. Targeting and the targeting process are more fully described in chapter 4.
RISK MANAGEMENT
1-59. Risk management is a process for identifying hazards and controlling risks. Throughout the
operations process, the EWO uses risk management to mitigate risks associated with all hazards that have
the potential impact mission effectiveness. Like targeting, risk management begins in planning and
continues through preparation and execution. Risk management consists of the following steps:
Identify hazards.
Assess hazards to determine risks.
Develop control measures and make risk decisions.
Implement control measures.
Supervise and evaluate.
CONTINUING ACTIVITIES
1-60. While executing tasks throughout the operations process, commanders and staffs plan for and
coordinate continuing activities. (See figure 1-2 on page 1-12.) The EWO coordinates with the staff to
participate in these continuing activities to address specific EW tasks as needed.
MDMP synchronizes several processes, including IPB, the targeting process (see FM 3-60), and risk
management (see ATP 5-19). These processes occur continuously during operations.
2-6. Depending on the organizational echelon, the EW staff officer leads EW planning through the
CEMA working group and EWE. The next sections outline key EW contributions to the processes and
planning actions that occur during the seven steps of the MDMP. (ADRP 5-0 discusses the MDMP in
detail.) Table 2-1 summarizes EWE actions during MDMP.
Table 2-1. EWE actions during the MDMP
Receipt of Mission
2-7. Commanders begin the MDMP upon receiving or anticipating a new mission. During this first step,
commanders issue their initial guidance and initial information requirements or commander’s critical
information requirements.
2-8. Upon receipt of a mission, the EWE alerts the staff supporting the CEMA working group. The EWO
and supporting staff begin to gather resources required for mission analysis. Resources might include a
higher headquarters operation order or plan, maps of the area of operations, electronic databases, required
field manuals and standard operating procedures, current running estimates, and reachback resources.
2-9. The EWO also provides input to the staff’s initial assessment and updates the EW running estimate.
(See figure 2-1.) As part of this update, the EWO identifies all friendly EW assets and resources and their
statuses throughout the operations process. Lastly, the EWO monitors, tracks, and seeks information
relating to EW operations to assist the commander and staff.
Mission Analysis
2-10. Planning includes a thorough mission analysis. Both the process and products of mission analysis
help commanders refine their situational understanding and determine their restated mission. The EWO and
members of the CEMA working group contribute to the overall mission analysis by participating in IPB
and through the planning actions. (Paragraphs 1-52 through 1-57 discuss EW input to IPB during
operations.)
2-11. The CEMA working group and EWO—
Determine known facts, status, or conditions of forces capable of EW operations as defined in
the commander’s planning documents, such as a warning order or operation order.
Identify EW planning support requirements and develop support requests as needed.
Determine facts and develop necessary assumptions relevant to EW such as the status of EW
capability at probable execution and time available.
Conduct an initial EW risk assessment and review the risk assessment done by the entire CEMA
working group.
Provide an EW perspective when developing the commander’s restated mission.
Help develop the mission analysis briefing for the commander.
2-12. The CEMA working group and EWO support the G-2 (S-2) in IPB by—
Determining the threat’s dependence on the electromagnetic spectrum.
Determining the threat’s EW capability.
Determining the threat’s intelligence system collection capability.
Determining which threat vulnerabilities relate to the electromagnetic spectrum.
Determining how an operational environment affects EW operations using the operational
variables and mission variables as appropriate.
Initiating, refining, and validating information requirements and requests for information.
2-13. The CEMA working group and EWO determine enemy and friendly decisive points and list their
critical capabilities, requirements, and vulnerabilities from an EW perspective. (They determine how EW
capabilities can best attack an enemy’s command and control system.) The CEMA working group and
EWO list the critical requirements associated with the enemy’s command and control capability (or
command and control nodes) and then identify the critical vulnerabilities associated with the critical
requirements. Through this process, the CEMA working group and EWO help determine which enemy
vulnerabilities can be engaged by EW capabilities to produce a decisive outcome.
2-14. The CEMA working group and EWO identify and list—
High-value targets that can be engaged by EW capabilities.
Tasks that EW forces perform according to EW division—EA, ES, and EP—to support the
warfighting functions. These include—
Specified EW tasks.
Implied EW tasks.
Constraints relevant to EW such as—
Actions EW operations must perform.
Actions EW operations cannot perform.
Other constraints.
2-15. The CEMA working group and EWO analyze—
The commander’s intent and mission from an EW perspective.
Mission variables (mission, enemy, terrain and weather, troops and support available, time
available, and civil considerations) from an EW perspective.
The initial EW force structure to determine if forces have sufficient assets to perform the
identified EW tasks. (If organic assets are insufficient, they draft requests for support and
augmentation.)
2-16. By the conclusion of mission analysis, the CEMA working group and EWO create or gather the
following products and information:
The initial information requirements for EW operations.
A rudimentary analysis of the enemy command and control nodes.
The list of EW tasks required to support the mission.
A list of assumptions and constraints related to EW operations.
The planning guidance for EW operations.
EW personnel augmentation or support requirements.
An update of the EW running estimate.
EW portion or input to the commander’s restated mission.
2-20. The EWO and CEMA working group determine the forces required for mission accomplishment
by—
Determining the EW tasks that support each COA and the best method to perform those tasks
based on available forces and capabilities. (They consider available special technical operations
capabilities in this analysis.)
Providing input and support to proposed deception options.
Ensuring the EW options provided to support all possible COAs meet the established screening
criteria.
2-21. The EWO and CEMA working group identify EW supporting tasks and their purposes to support
decisive, shaping, and sustaining operations as each COA is developed. These EW tasks include those
focused on defeating the enemy and those required to protect friendly force operations.
2-22. The EWO and CEMA working group assist in developing the COA briefing as required. By the
conclusion of COA development, the EWO and CEMA working group create or gather the following
products and information:
2-24. During COA analysis, the EWO and CEMA working group synchronize EW actions and assist the
staff in integrating EW capabilities into each COA. The EWO and CEMA working group address how each
EW capability supports each COA. They apply these capabilities to associated timelines, critical events,
and decision points in the synchronization matrix. During this planning phase, the EWO and CEMA
working group aim to—
Analyze each COA from an EW functional perspective.
Recommend any EW task organization adjustments.
Identify key EW decision points.
Provide EW data for the synchronization matrix.
Identify EW intelligence gaps.
Identify EW supporting tasks to any branches and sequels.
Identify potential EW high-value targets.
Assess EW risks created by telegraphing intentions, allowing time for enemy to mitigate effects,
unintended effects of EA, and the impact of asset or capability shortfalls.
2-25. By the conclusion of COA analysis (war game), the EWO and CEMA working group create or
gather the following products and information:
The EW data for the synchronization matrix.
The EW portion of the branches and sequels.
A list of high-value targets related to EW.
A list of commander’s critical information requirements related to EW.
The risk assessment for EW operations to support each COA.
An update to the EW running estimate.
COA comparisons. The EWO may develop an EW functional matrix to compare the COAs or to use the
decision matrix developed by the staff. Regardless of the matrix used, the evaluation criteria developed
before the war game are used to compare the COAs. Normally, the chief of staff or executive officer
weights each criterion used for the evaluation based on its relative importance and the commander’s
guidance. (See FM 6-0 for more information on COA comparison and a sample decision matrix.)
Orders Production
2-32. Orders production consists of the staff preparing the operation order or plan by converting the
selected COA into a clear, concise concept of operations. The staff also provides supporting information
that enables subordinates to execute and implement risk control measures. They do this by coordinating and
integrating risk control measures into the appropriate paragraphs and graphics of the order.
2-33. During orders production, the EWO provides the EW operations input for several sections of the
operation order or plan. (See FM 6-0 for the primary areas for EW operations input within an Army order
or plan.
and mobile as the force it supports. Maneuver units must logistically support the EW assets, and supported
commanders must clearly identify EW requirements.
2-40. Ground-based EW capabilities have certain limitations. They are vulnerable to enemy attack and can
be masked by terrain. They are vulnerable to enemy electromagnetic deceptive measures and EP activities.
In addition, they have distance or propagation limitations against enemy electronic systems. As with any
spectrum-based system, units must properly program EW equipment to avoid friendly interference and
compatibility issues.
2-43. Airborne EW capabilities have certain advantages. They can provide direct support to other tactical
aviation missions such as suppression of enemy air defenses, destruction of enemy air defenses, and
employment of high speed antiradiation missiles. They can provide extended range over ground-based
assets. Airborne EW capabilities can provide greater mobility and flexibility than ground-based assets. In
addition, they can support ground-based units in beyond line-of-sight operations.
2-44. Limitations associated with airborne EW capabilities include limited time on station, vulnerability to
enemy air defense systems, enemy EP actions, electromagnetic deception techniques, and limited assets.
2-46. The EWO, the G-2 (S-2), the G-3 (S-3), the G-6 (S-6), the spectrum manager, and the information
operations officer coordinate closely to avoid friendly communications interference that can occur when
using EW systems on the battlefield. Coordination ensures that EA system frequencies are properly
deconflicted with friendly communications and intelligence systems, or that ground maneuver and friendly
information tasks are modified accordingly.
2-47. The number of information systems, EW systems, and sensors operating simultaneously on the
battlefield makes deconfliction with communications systems a challenge. The EWO, the G-2 (S-2), the
G-6 (S-6), and the spectrum manager plan and rehearse deconfliction procedures to adjust their use of EW
or communications systems quickly.
2-48. EA operations depend on ES and SIGINT to provide targeting information and battle damage
assessment. However, EWOs must keep in mind that not all information collection focuses on supporting
EW. If not properly coordinated with the G-2 (S-2) staff, EA operations may interrupt information
collection by jamming or inadvertently interfering with a particular frequency being used to collect data on
the threat or by jamming a given enemy frequency or system that deprives friendly forces of that means of
collecting data. Either interruption can significantly deter information collection efforts and their ability to
answer critical information requirements. Coordination between the EWO, the fire support coordinator, and
the G-2 (S-2) prevents this interference. In situations where a known conflict between the information
collection effort and the use of EA exists, the CEMA working group brings the problem to the G-3 (S-3)
for resolution.
2-49. Planners consider other effects that rely on electromagnetic spectrum when planning for EA. For
example, military information support operations may include plans to use certain frequencies to broadcast
messages, or a military deception plan may include the broadcast of friendly force communications. In both
examples, the use of EA could unintentionally interfere or disrupt such broadcasts if not properly
coordinated. To ensure EA does not negatively affect planned operations, the EWO coordinates between
fires, network operations, and other functional or integrating cells as required.
2-50. Like any other form of electromagnetic radiation, EA can adversely affect local media and other
communications systems and infrastructure. EW planners consider unintended consequences of EW
operations and deconflict these operations with the various functional or integrating cells. For example,
friendly jamming could potentially deny the functioning of essential services such as ambulance or
firefighters to a local population. EWOs routinely synchronize EA with the other functional or integrating
cells responsible for the information tasks. In this way, they ensure that EA efforts do not cause fratricide
or unacceptable collateral damage to their intended effects.
2-51. The potential for hostile intelligence collection also affects EA. A well-equipped enemy can detect
friendly EW activities and thus gain intelligence on friendly force intentions. For example, the frequencies
Army forces jam could indicate where they believe the enemy’s capabilities lie. The EWO and the G-2
(S-2) develop an understanding of the enemy’s collection capability. Along with the red team (if available),
they determine what the enemy might gain from friendly force use of EA. (A red team is an organizational
element comprised of trained and educated members that provide an independent capability to fully explore
alternatives in plans and operations in the context of the operational environment and from the perspective
of adversaries and others [JP 2-0].)
2-52. The effects of jamming only persist as long as the jammer itself is emitting and is in range to affect
the target. Normally these effects last a matter of seconds or minutes, which makes the timing of such
missions critical. This is particularly true when units use jamming in direct support of aviation platforms.
For example, in a mission that supports suppression of enemy air defense, the time on target and duration
of the jamming must account for the speed of attack of the aviation platform. They must also account for
the potential reaction time of enemy air defensive countermeasures. Aside from antiradiation missiles, the
effects of jamming are less persistent than effects achieved by other means. The development of directed
energy weapons may change this dynamic in the future.
2-56. Careful integration of electromagnetic deception with other detectable actions is critical. What the
enemy detects electronically must remain consistent with other sources of intelligence reports. Because of
the reliance placed on electromagnetic radiation (for example, communication, surveillance, and
navigation), this aspect of deception requires close attention. Although electromagnetic deception can be
the sole act of deception, the effect is often of short duration.
2-57. The enemy’s success depends upon its knowledge of friendly emitters. Success in manipulative
electromagnetic deception and simulative electromagnetic deception depends on understanding how
friendly emitters appear to the enemy. The SIGINT team should keep a database of the friendly command’s
voice and data emitters. The EW planners can then determine how best to portray a desired portion of that
command electronically. The EW planners consider what is occurring and what should occur with all
electromagnetic emitters in the unit’s area.
2-58. Close control and coordination is necessary to avoid confusing actual activities from deception plan
activities. Therefore, when planning an electromagnetic deception, the EW planners consider actions that
support the current operation as well as those that will support the deception operation and perform
integration and deconfliction as necessary.
2-59. Time is a critical factor in deception planning. Given sufficient time, the enemy can discover even
the most complex electromagnetic deception. A maneuver deception plan intended to deceive the enemy
for two or three days must include a well-coordinated electromagnetic deception that covers all electronic
emitters. However, a deception plan for only a short period just before an attack may be relatively simple
since there is less time for the enemy to discover the deception. Regardless of the duration, the enemy’s
ability to detect emitters is essential to the success of an electromagnetic deception. Therefore false
emissions must be—
On signals strong enough to reach the enemy.
On a frequency the enemy can intercept.
In a modulation the enemy can intercept.
2-60. Imitative electromagnetic deception usually requires approval at higher command levels. This
restriction ensures that the deception does not jeopardize the SIGINT effort. Imitative electromagnetic
deception, if recognized by the enemy, could provide data concerning the friendly ES effort. This could
have the unintended effect of causing the enemy to improve its communications security and thereby
reduce the effectiveness of the friendly SIGINT.
Maintain direct liaison with the fires cell and network operations officer to ensure integration
and deconfliction of EW operations.
Coordinate and manage EW taskings to subordinate units or assets.
Coordinate requests for nonorganic EW.
Continue to assist the targeting working group in target development and to recommend targets
for attack by EA assets.
Receive, process, and coordinate subordinate requests for EW during operations.
Receive and process immediate support requests for suppression of enemy air defense or EW
from joint or multinational forces, and coordinate requests through the fire support officer and
fire support coordinator with the battlefield coordination detachment and joint or multinational
liaisons.
Coordinate with the airspace control section on all suppression of enemy air defense or EW
missions.
Provide input to the overall assessment regarding effectiveness of EA missions.
Maintain, update, and distribute the status of EW assets.
Validate and disseminate cease jamming requests.
Coordinate and expedite electromagnetic interference reports with the G-2 (S-2) representative
and G-6 (S-6) representative for potential deconfliction.
Perform electronic warfare control authority function for ground-based EW within the area of
operations, when designated.
3-5. Providing an accessible and accurate portrayal of the EW environment challenges the EWE. An
updated running estimate is important, but a graphical portrayal in the form of an EW overlay gives
relevance to the contributions EW makes to mission accomplishment. Currently, the command post of the
future (known as CPOF) is the best tool since the staff uses it to maintain a common operational picture for
the commander. However, the staff uses caution when depicting range fans and range rings for EW assets
by considering the effects of terrain and weather. Such caution avoids giving a false impression of asset
capabilities.
3-8. The EWO and supporting members of the CEMA working group make assessments throughout the
operations process. During planning and preparation, assessments of EW are made during the MDMP, IPB,
targeting, information collection synchronization, and risk management integration.
3-9. The EWO, in conjunction with the G-5 (S-5), helps develop the measures of performance and
measures of effectiveness for evaluating EW operations during execution. A measure of performance is a
criterion used to assess friendly actions that is tied to measuring task accomplishment (JP 3-0). A measure
of effectiveness is a criterion used to assess changes in system behavior, capability, or operational
environment that is tied to measuring the attainment of an end state, achievement of an objective, or
creation of an effect (JP 3-0). In the context of EW, an example of a measure of performance is the
percentage of known enemy command and control nodes targeted and attacked by EA means (action)
versus the number of enemy command and control nodes that were actually destroyed or rendered
inoperable for the desired duration (task accomplishment). Measures of effectiveness are used to determine
the degree to which an EW action achieved the desired result. Normally, the EWO measures this by
analyzing data collected by both active and passive means. For example, effectiveness is measured by using
radar or visual systems to detect changes in enemy weapons flight and trajectory profiles. However, use
caution in selecting measures of effectiveness to avoid flaws in an analysis of the EW operation. For
example, the lack of enemy activity such as communications or improvised explosive device (known as
IED) initiation does not necessarily mean it was the result of the EW operation; other factors may be the
cause.
3-10. During execution, the EWO and CEMA working group participate in combat assessments within the
targeting process to determine the effectiveness of EA employment to support operations. Combat
assessment consists of three elements: munitions effects assessment, battle damage assessment, and re-
attack recommendations.
normally included in the spectrum management operations database limiting the effectiveness of spectrum
management operations.
distribute the necessary cancellation information. Immediately after, EWOs e-mail an official cancellation
JTAR and electronic attack request format directly to the EWE to ensure units receive information
promptly. Effective units include this process in the unit standard operating procedure and battle drills.
Key Personnel
3-26. The following personnel are involved in dynamically retasking an airborne electronic attack:
Joint tactical attack controller.
Battalion EW NCO.
Brigade combat team EWO.
Electronic warfare element.
Air operations center.
Validates, requests, and prepares JTAR and electronic attack request format information for
retask consideration.
Deconflicts with affected organizations.
Deconflicts EW effects with information collection efforts, SIGINT, and other EA assets.
Submits requests to higher EWE for prioritization and final validation.
3-32. The process for retasking airborne electronic attack platforms vary depending on joint command and
control arrangements, force disposition, and unit boundaries. The requesting unit submits a request over
internet relay chat or other available means to their supporting EW representative or EWE. The electronic
attack 9-line is an excellent format for such a request (see ATP 3-09.32 for the format).
3-33. If the requesting unit previously submitted a JTAR for EA support, the EWE modifies the existing
JTAR with a numbered change JTAR. If the requesting unit has not submitted a JTAR for the mission, the
EWE creates a new JTAR. It is important that the EWE provides status updates to the requesting unit.
3-34. Due to the dynamic nature of a troops-in-contact, there is no way to predict the amount of time
needed for airborne electronic attack support. If it is apparent that the duration of support will exceed what
was originally requested, the EWO or JTAC notifies the EWE and AOC. The AOC notifies the airborne
electronic attack asset and coordinates any additional fuel requirements, or determines the need to retask
another airborne electronic attack asset. The AOC then informs the EWO and JTAC of what support to
expect. Once the airborne electronic attack support is no longer needed, the JTAC or EWO will contact the
AOC to release the airborne electronic attack asset for new tasking.
3-37. The ATO mission block is annotated at the bottom of the ATO calendar. The EWE assigns each unit
a specific set of three digit numbers. The EWE uses these sets of numbers to identify which unit is
submitting an airborne electronic attack request. The mission block allows the unit to request several
different airborne electronic attacks for that ATO date.
ELECTROMAGNETIC INTERFERENCE
3-38. Electromagnetic interference is any electromagnetic disturbance, induced intentionally or
unintentionally, that interrupts, obstructs, or otherwise degrades or limits the effective performance of
electronics and electrical equipment (JP 3-13.1). It can be induced intentionally, as in some forms of EW,
or unintentionally, as a result of spurious emissions and responses, intermodulation products, and the like.
3-39. Electromagnetic interference may be a major concern of commanders, staffs, and operational units
during execution. Not all electromagnetic interference (EMI) requires action. Only when the EMI impacts
operations by prohibiting friendly use of the spectrum does EMI become an issue. Units should incorporate
effective techniques to minimize, reduce, or eliminate prohibitive EMI into every unit’s operations.
3-40. EMI mitigation begins with operator-level troubleshooting and reporting. Troubleshooting may
identify the source of the interference as truly EMI or an equipment or operator failure. Reporting
facilitates situational understanding and supports the development of solutions. See table 3-1 for steps to
mitigate EMI problems.
Table 3-1. Operator EMI troubleshooting checklist
Step Tasks
1 Follow equipment troubleshooting (verify frequency, cable and antenna connections,
communications security). If EMI continues, then follow remaining steps.
2 Determine start and stop times or duration of EMI.
3 Identify EMI effect (interfering voice, noise, static).
4 Identify other emitters in area of operations.
5 Check adjacent and nearby units for similar problems.
6 Prepare and submit joint spectrum interference resolution report to S-6.
EMI electromagnetic interference
S-6 signal staff officer
Responsible Task
party
G-6 (S-6) • Receive joint spectrum interference resolution report from affected unit.
• Check with adjacent units to determine are affected.
• Verify frequency assignment or SATCOM authorization.
• Perform mitigation as required.
• If PNT system is affected, coordinate with space element.
• Develop response options.
EWE • Determine if electronic attack assets are in the vicinity of the affected unit.
• Notify and coordinate with subordinate EWEs and EW staffs.
• Report findings to G-6 (S-6) and spectrum manager.
• Develop response options.
Space SATCOM Interference PNT Interference
Element
• Conduct analysis to • Verify affected unit’s receivers
determine location of EMI. configured properly.
• Determine impact of EMI • Discuss jamming mitigation
and recommend techniques with unit.
countermeasures. • Contact other military and nonmilitary
• Develop response options. organizations to monitor jammer
detection and location.
• Develop response options or support.
Operations • Notify command group.
Chief • Notify higher headquarters.
• Notify host-nation liaison officer.
• Reposition information collection assets as required.
• Monitor engagement.
• Develop response based on staff input.
• Provide final report to command group.
EMI electromagnetic interference PNT positioning, navigation, and timing
EW electronic warfare S-6 battalion or brigade signal staff officer
EWE electronic warfare element SATCOM satellite communications
G-6 assistant chief of staff, signal
4-3. An important part of targeting is identifying potential fratricide situations and performing the
coordination measures to manage and control the targeting effort positively. The targeting working group
and staff incorporate these measures into the coordinating instructions and appropriate annexes of the
operation plans and orders. (FM 6-0 has detailed information on operation plans and orders. FM 3-60 has
more information on targeting.)
4-4. The EWO thoroughly integrates EA in the targeting process and integrates EA fires into all
appropriate portions of the operation plan, operation order, and other planning products. To support EW
targeting, the EWO—
Helps the targeting working group determine EA requirements against specific high-payoff
targets and high-value targets.
Ensures EA can meet the desired effect (in terms of the targeting objective).
Ensures EA will not adversely affect friendly electromagnetic spectrum use.
Coordinates with the SIGINT staff element through the collection manager to satisfy ES and EA
information requirements.
Provides EA mission management through the command post or joint operations center and the
tactical air control party (for airborne electronic attack).
Provides EA mission management as the electronic warfare control authority for ground or
airborne electronic attack when designated.
Determines and requests theater Army EA support.
Recommends to the G-3 (S-3) and the fire support coordinator or fire support officer whether to
engage a target with EA.
Expedites EMI reports to the targeting working group.
DECIDE
4-5. Decide is the first step in the targeting process. This step provides the overall focus for fires, a
targeting plan, and some of the priorities for information collection. As part of the staff in the main
command post, the EWO assists the targeting working group in planning the target priorities for each phase
and critical events of the operation. Initially, the targeting working group does not develop EA targets using
any special technique or separately from targets for physical destruction. However, as the process
continues, these targets are passed through intelligence organizations and further planned using information
collection procedures. The planned use of EA is integrated into the standard targeting products (graphic or
text based). Products that involve EA planning may include—
High-payoff target list.
Attack guidance matrix.
Annex D (Fires) of the operation order.
DETECT
4-6. Based on what the targeting working group identified as high-payoff targets during the decide step,
collection assets are then allocated and tasked to detect them. The intelligence enterprise pairs assets to
targets based on the collection plan and the current threat situation. When conducting EA tasks, information
collection units perform ES tasks linked to and working closely with the EA missions. EW support units
(with support from the target assessment and SIGINT staff elements) provide the data—location, signal
strength, and frequency of the target—to focus EA assets on the intended target. These assets also identify
the enemy’s command and control system vulnerabilities open to attack by EA assets.
DELIVER
4-7. Once friendly force capabilities identify, locate, and track the high-payoff targets, the next step in the
process is to deliver fires against those targets. EA assets must satisfy the attack guidance developed during
the decide step. Close coordination between those conducting ES and EA is critical during the engagement.
The EWO facilitates this coordination and ensures EA fires are fully synchronized and deconflicted with
other fires. This officer remains aware of the potential for unintended effects between adjacent units when
conducting EA. The EWO continually coordinates with adjacent unit EWOs to mitigate and deconflict
these effects during cross boundary operations. Normally, the G-3 (S-3) or fire support coordinator
provides requirements and guidance for this coordination and synchronization in the attack guidance
matrix, intelligence synchronization matrix, spectrum management plan, and the EW input to the operation
plan or operation order annexes and appendixes.
ASSESS
4-8. Once the target has been engaged, the next step is to assess the engagement’s effectiveness. This
combat assessment involves determining the effectiveness of force employment during military operations.
It consists of three elements:
Munitions effects assessment.
Battle damage assessment.
Reattack recommendations.
4-9. The first two elements, munitions effects assessment and battle damage assessment, inform the
commander on the effects achieved against targets and target sets. From this information, the G-2 (S-2)
continues to analyze the threat’s ability to further conduct and sustain combat operations (sometimes
articulated in terms of the effects achieved against the enemy’s centers of gravity). The last element
involves the assessment and recommendation whether or not to reattack the targets.
4-10. The assessment of a jamming mission used against an enemy’s command and control system is
unlike fires that friendly forces can visually observe. The SIGINT staff element and units executing the EA
mission coordinate continuously to assess mission effectiveness. Close coordination between sensor and
shooter allows timely feedback on the success or failure of the intended jamming effects. It also can
quickly provide the necessary adjustments to produce desired effects.
5-4. The supporting centers for EW operations may include the joint operations center, joint intelligence
center, joint frequency management office, and joint targeting coordination board.
EW staff is an element within the J-3. It consists of representatives from each component of the joint force.
An EWO, whether Army or other Service, appointed by the J-3 leads this element. The joint force
commander’s EW staff includes representatives from the J-2 and J-6 to facilitate intelligence support and
EW frequency deconfliction.
5-7. On many joint staffs, the intrastaff coordination previously accomplished through a joint force
commander’s EW staff is performed by a joint information operations cell or similar organization. A joint
information operations cell, if established, coordinates EW activities with other information operations
activities to maximize effectiveness and prevent mutual interference. If both a joint force commander’s EW
staff and a joint information operations cell exist, a joint force commander’s EW staff representative may
be assigned to the joint information operations cell to facilitate coordination. (For more information about
the organization and procedures of the joint information operations cell, see JP 3-13.)
Center. The joint frequency management office coordinates the information systems use of the
electromagnetic spectrum, frequency management, and frequency deconfliction. The joint frequency
management office develops the frequency management plan and makes recommendations to alleviate
mutual interference.
5-14. The G-6 (S-6) coordinates the Army’s use of the electromagnetic spectrum, frequency management,
and frequency deconfliction with the joint frequency management office through network operations. If
established, coordination with the joint spectrum management element is required. (See figure 5-1.)
OTHER CONSIDERATIONS
5-24. EW in multinational operations addresses other considerations. Soldiers must consider—
The exchange of EW information.
FORMULA SYMBOLS
B-1. Mathematical formulas use the symbols in table B-1. Each symbol identifies a unit of measure that
must be used for the calculation to be accurate.
Table B-1. Jammer formula symbols
Symbol Use of
Pj Minimum amount of jammer power output required in watts (read on power output meter of
the jammer).
Pt Power output of the enemy transmitter in watts.
Hj Elevation of the jammer location above sea level in feet (does not include antenna height or
length).
Ht Elevation of the enemy transmitter location above the sea level.
Dj Jammer location-to-target receiver location distance in kilometers.
Dt Enemy transmitter location-to-target receiver location distance in kilometers.
K Frequency modulated (FM) jammer tuning accuracy factor.
n Terrain and ground conductivity factors:
5 = Very rugged terrain (rocky mountains or desert) with poor ground conductivity.
4 = Moderately rugged terrain (rolling to high hills, forests) with fair to good ground
conductivity.
3 = Rolling hills (farmland type terrain) with good ground conductivity.
2 = Level terrain (over water, sea, lakes, and ponds) with good ground conductivity.
B-2. The technical data needed to solve the equation are found in technical manuals or specifications
written for friendly equipment and technical intelligence publications for enemy systems. The G-2 (S-2)
may be able to provide data on enemy systems. Sometimes enemy forces use off-the-shelf equipment
whose technical data may be found on the internet. It may be necessary to estimate data when no
information is available.
B-4. The difference between Ht and Hj is less than 10 meters, then they are considered to be at the same
elevation. When dividing Dj by Dt, include the second decimal place and do not round off. Also, note that
this is for a jammer using a whip antenna; divide the result by 2 for a log periodic array (known as LPA)
antenna. Figure B-1 provides a sample calculation.
Calculate the minimum power needed to jam an enemy receiver. The enemy receiver is
17 kilometers from the friendly jammer. The enemy transmitter is rated at 5 watts power
output and is located 9 kilometers from its intended receiver location. The enemy
transmitter is 385 meters above sea level and the friendly jammer is 388 meters above
sea level. The terrain is moderately rugged with rolling high hills and forests. The
formula data is—
𝑯𝒕 𝟐 𝑫𝒋 𝒏
𝑷𝒋 = 𝑷𝒕 × 𝑲 × � � × � �
𝑯𝒋 𝑫𝒕
𝟑𝟖𝟓 𝟐 𝟏𝟕 𝟒
𝑷𝒋 = 𝟓 × 𝟐 × � � × � �
𝟑𝟖𝟖 𝟗
𝑷𝒋 = 𝟏𝟎 × 𝟏𝟐. 𝟒𝟔
Therefore, the minimum power output for the friendly jammer must be at least 125 watts
with a whip antenna and 62.5 watts with an LPA antenna. Less jammer power output
will produce ineffective jamming results.
FM frequency modulated
LPA log periodic array
𝒏
𝑷𝒋
𝑫𝒋 = 𝑫𝒕 ×
� 𝑯𝒕 𝟐
𝑷𝒕 × 𝑲 × � �
𝑯𝒋
B-6. Note that since formula 2 determines maximum distance, the number used for Pj (jammer power
output) should be the maximum power the jammer can produce. Figure B-2 provides a sample calculation.
Calculate the maximum distance a friendly jammer may be from an enemy receiver.
Using the same tactical situation as in figure B-1, the enemy transmitter is rated at 5
watts power output and is located 9 kilometers from its intended receiver location. The
enemy transmitter is 385 meters above sea level and the friendly jammer is 388 meters
above sea level. The friendly jammer has a maximum power rating of 1500 watts. The
terrain is moderately rugged with rolling high hills and forests. Formula data is—
𝑷𝒋
𝑫𝒋 = 𝑫𝒕 × 𝒏
� 𝑯𝒕 𝟐
𝑷𝒕 × 𝑲 × � �
𝑯𝒋
𝟒
𝟏𝟓𝟎𝟎
𝑫𝒋 = 𝟗 ×
� 𝟑𝟖𝟓 𝟐
𝟓 ×𝟐×� �
𝟑𝟖𝟖
𝟒 𝟏𝟓𝟎𝟎
𝑫𝒋 = 𝟗 × �
𝟏𝟎 × (𝟏)𝟐
𝟒 𝟏𝟓𝟎𝟎
𝑫𝒋 = 𝟗 × �
𝟏𝟎
𝟒
𝑫𝒋 = 𝟗 × √𝟏𝟓𝟎
𝑫𝒋 = 𝟗 × 𝟑. 𝟓 = 𝟑𝟏. 𝟓 𝒌𝒎
ARMY
C-1. The Army is currently expanding its EW capability. It maintains several EW systems in its inventory.
When requested, the Army provides these capabilities to combatant commands for employment at corps
and lower echelons.
C-3. Jammers may function in an active or reactive mode. Active means the jammer continuously emits a
signal to block a preprogrammed frequency. It is effective against multiple low-power signals but may be
easily located by direction finding equipment and may not be effective against high-power signals.
Reactive jammers search for specific signals and then emit the jamming signal. Reactive jammers are less
susceptible to being exploited by location finding and are excellent against high-power signals, but
effectiveness may be reduced in a congested signals environment.
INTELLIGENCE SYSTEMS
C-5. The intelligence community maintains many systems that provide data for use in EW operations.
SIGINT systems provide most of this required data. These assets are dual use. Usually the data collected is
categorized as SIGINT. The National Security Agency/Central Security Service governs and maintains the
data within sensitive compartmented information channels. The data sometimes support EW or, more
specifically, ES. Paragraphs C-6 and C-7 illustrate some SIGINT systems that, when tasked, can provide
ES data to support EA and EP actions.
Prophet
C-7. Prophet enhanced is a dedicated, all-weather, any time, ground-based tactical SIGINT system. This
system provides force protection and situational awareness through technologically advanced intelligence
support to brigade combat team, Stryker brigade combat team, and enhanced military intelligence brigade
commanders. Prophet systems provide commanders flexible, modular components for their mission.
MARINE CORPS
C-10. The Marine Corps has two types of EW units: radio battalions (often called RADBNs), and Marine
tactical EW squadrons (referred to as VMAQs). Paragraphs C-11 through C-25 discuss the units’ missions,
primary tasks, and capabilities currently being employed. (For further information on the Marine Corps EW
units and systems, see MCWP 2-22.)
RADIO BATTALION
C-11. Radio battalions are the Marine Corps’ tactical level ground-based EW units. During operations,
teams from radio battalions are most often attached to the command element (or senior headquarters) of
Marine expeditionary units. Each radio battalion has specific mission, tasks, and equipment.
unit supporting the MAGTF command element provides communications connectivity for
special intelligence communications.
Providing task-organized detachments to MAGTFs with designated SIGINT, EW, special
intelligence communication, and other required capabilities.
Exercising technical control and direction over MAGTF SIGINT and EW operations.
Providing radio reconnaissance teams with specialized insertion and extraction capabilities (such
as combat rubber raiding craft, fast rope, rappel, helocast, and static-line parachute) for specified
SIGINT and limited EA support during advance force, preassault, or deep postassault operations.
Coordinating technical SIGINT requirements and exchanging technical information and material
with national, combatant command, joint, and other SIGINT units.
Providing intermediate, third, and fourth echelon maintenance of the radio battalion’s SIGINT
and EW equipment.
Equipment
C-13. The radio battalion uses EW capabilities to accomplish the mission and perform the tasks to support
the MAGTF.
When mission-configured and working cooperatively with other AN/MLQ-36As, the system can provide
precision location of battlefield emitters.
C-18. This system and its future enhancements will provide the capability to exploit new and sophisticated
enemy electronic emissions and conduct EA to support existing and planned national, combatant command,
fleet, and MAGTF SIGINT and EW operations.
C-21. The squadron’s EW division supports EA-6B Prowler tactical missions with intelligence, the tactical
electronic reconnaissance processing and evaluation system (TERPES), and the joint mission planning
system. All systems support premission planning and postmission processing of collected data, and
production of pertinent intelligence reports. Working with squadron intelligence, these systems provide
required electronic intelligence and electronic threat characteristics intelligence products to the aviation
combat element, MAGTF, and other requesting agencies.
Equipment
C-22. Marine tactical electronic warfare squadrons maintain the following equipment:
EA-6B Prowler.
TERPES.
EA-6B Prowler
C-23. The EA-6B Prowler is a subsonic, all-weather, carrier-capable aircraft. The crew consists of one pilot
and three electronic countermeasure officers. The EA-6B Prowler has two primary missions. One is
collecting and processing designated threat signals of interest for jamming and subsequent processing,
analysis, and intelligence reporting. The other is employing the AGM-88 high-speed antiradiation missile
against designated targets. The EA-6B’s AN/ALQ-99 tactical jamming system incorporates receivers for
the reception of emitted signals and external jamming pods for the transmission of energy to jam targeted
radars (principally those associated with enemy air defense radars and associated enemy command and
control). In addition to the AN/ALQ-99, the EA-6B Prowler also employs the USQ-113 communications
jammer to collect, record, and disrupt threat communications.
centers and provides mission planning and briefing support. Section support areas include operational
support, intelligence analysis support, data fusion, fusion processing, and intelligence reporting. The
TERPES section provides the following operational support:
Translates machine-readable, airborne-collected, digital data into human- and machine-readable
reports (such as paper, magnetic tape, secure voice, plots, and overlays).
Receives and processes EA-6B mission tapes.
Accepts, correlates, and identifies electronic emitter data from semiautomatic or automatic
collection systems using various electronic parameter databases and various analysis techniques.
Provides tactical jamming analysis.
AIR FORCE
C-26. The Air Force has two primary platforms that provide EW capability: the EC-130H Compass Call
and RC-135V/W Rivet Joint. (For further information on Air Force EW, see Air Force Annex 3-51.)
Capabilities
C-29. The EC-130H is designed to deny, degrade, and disrupt enemy command and control information
systems. This includes denial and disruption of enemy surveillance radars; hostile communications being
used to support enemy ground, air, or maritime operations; and many modern commercial communication
signals that an enemy might employ.
Capabilities
C-32. The RC-135V/W Rivet Joint is equipped with an extensive array of sophisticated information
gathering equipment that enables monitoring of enemy electronic activity. The aircraft is integrated into the
theater air control system via data links and voice (as required). Refined intelligence data can be transferred
from Rivet Joint to an Airborne Warning and Control System platform through the tactical digital
information link. Alternatively, this data can be placed into intelligence channels via satellite and the
tactical information broadcast service (a near real-time combatant command information broadcast). The
aircraft has secure ultrahigh frequency, very high frequency, and high frequency (commonly known as
UHF, VHF, and HF, respectively) as well as satellite communications. It can be refueled in the air.
NAVY
C-33. The Navy’s primary airborne EW platforms are the EA-6B Prowler and the E/A-18G Growler. The
Navy also maintains both surface and subsurface EW shipboard systems for offensive and defensive
missions to support the fleet. (For further information on Navy missions and equipment, see NWP 3-13.)
EA-6B PROWLER
C-34. The EA-6B Prowler is a subsonic, all-weather, carrier-capable aircraft. The crew consists of one pilot
and three electronic countermeasure officers. Although the Navy’s EA-6B Prowler is in the process of
being removed from service, the Navy still uses them in current operations.
Capabilities
C-36. The Navy’s EA-6B Prowlers either are outfitted with the improved capability II or improved
capability III systems.
Improved Capability II
C-37. The improved capability II program was initiated in the 1980s. It was completed across the fleet of
EA-6B aircraft (including U.S. Marine Corps aircraft) in the 1990s. The program incorporated incremental
capability improvements that include communications, navigation, and computer interface upgrades; a
high-speed antiradiation missile capability; and improved jamming pods. Several system interfaces were
also upgraded in preparation for the improved capability III improvements.
C-40. The AN/USQ-113 (V) radio countermeasures set enhances the aircraft’s jamming capability through
its integration with the tactical display system. This capability enables the crew to display AN/USQ-113
communications jamming data as well as control AN/USQ-113 operations through the tactical display
system.
E/A-18G GROWLER
C-41. The E/A-18G Growler is the Navy’s replacement aircraft for the EA-6B Prowler.
Capabilities
C-43. The following is a list of the E/A-18G Growler’s general capabilities:
Suppression of enemy air defenses. The EA-18G Growler counters enemy air defenses using
both reactive and preemptive jamming techniques.
Stand-off and escort jamming. The EA-18G Growler is highly effective in the traditional stand-
off jamming mission, but with the speed and agility of a Super Hornet, it is effective in the escort
role.
Integrated air and ground airborne electronic attack. Enhanced situational awareness and
uninterrupted communications enables the EA-18G Growler to achieve a higher degree of
integration with ground operations than previously.
Self-protect and time-critical strike support. With its active electronically scanned array radar,
digital data links, and air-to-air missiles, the EA-18G Growler can protect itself and effectively
identify and prosecute targets.
Growth. High commonality with the F/A-18E and F/A-18F, nine available weapon stations, and
modern avionics enable cost-effective synergistic growth, setting the stage for continuous
capability enhancement.
C-44. The following is a list of the E/A-18G Growler’s airborne electronic attack capabilities:
Entire spectrum. The EA-18G Growler’s ALQ-218 wideband receiver combined with the ALQ-
99 tactical jamming system is effective against any surface-to-air threat.
Precision airborne electronic attack. Selective-reactive technology enables the EA-18G Growler
to rapidly sense and locate threats much more accurately than before. This improved accuracy
enables greater concentration of energy against threats.
Advanced communication countermeasures. Its modular communication countermeasure set
enables the EA-18G Growler to counter a wide range of communications systems and is readily
adaptable to an ever changing threat spectrum.
EMI cancellation system. This system dramatically enhances aircrew situational awareness by
enabling uninterrupted communications during jamming operations.
SECTION II – TERMS
countermeasures
That form of military science that, by the employment of devices and/or techniques, has as its objective
the impairment of the operational effectiveness of enemy activity. (JP 3-13.1)
cyber electromagnetic activities
Activities leveraged to seize, retain, and exploit an advantage over adversaries and enemies in both
cyberspace and the electromagnetic spectrum, while simultaneously denying and degrading adversary
and enemy use of the same and protecting the mission command system. (ADRP 3-0)
directed energy
An umbrella term covering technologies that relate to the production of a beam of concentrated
electromagnetic energy or atomic or subatomic particles. (JP 3-13.1)
electromagnetic compatibility
The ability of systems, equipment, and devices that use the electromagnetic spectrum to operate in
their intended environments without causing or suffering unacceptable or unintentional degradation
because of electromagnetic radiation or response. (JP 3-13.1)
electromagnetic hardening
Action taken to protect personnel, facilities, and/or equipment by blanking, filtering, attenuating,
grounding, bonding, and/or shielding against undesirable effects of electromagnetic energy. (JP 3-13.1)
electromagnetic interference
Any electromagnetic disturbance, induced intentionally or unintentionally, that interrupts, obstructs, or
otherwise degrades or limits the effective performance of electronics and electrical equipment.
(JP 3-13.1)
electromagnetic intrusion
The intentional insertion of electromagnetic energy into transmission paths in any manner, with the
objective of deceiving operators or of causing confusion. (JP 3-13.1)
electromagnetic jamming
The deliberate radiation, reradiation, or reflection of electromagnetic energy for the purpose of
preventing or reducing an enemy’s effective use of the electromagnetic spectrum, and with the intent
of degrading or neutralizing the enemy’s combat capability. (JP 3-13.1)
electromagnetic pulse
The the electromagnetic radiation from a strong electronic pulse, most commonly caused by a nuclear
explosion that may couple with electrical or electronic systems to produce damaging current and
voltage surges. (JP 3-13.1)
electromagnetic spectrum
The range of frequencies of electromagnetic radiation from zero to infinity. It is divided into 26
alphabetically designated bands. (JP 3-13.1)
electromagnetic spectrum management
Planning, coordinating, and managing use of the electromagnetic spectrum through operational,
engineering, and administrative procedures. (JP 6-01)
electronic attack
A division of electronic warfare involving the use of electromagnetic energy, directed energy, or
antiradiation weapons to attack personnel, facilities, or equipment with the intent of degrading,
neutralizing, or destroying enemy combat capability and is considered a form of fires. (JP 3-13.1)
electronic intelligence
Technical and geolocation intelligence derived from foreign noncommunications electromagnetic
radiations emanating from other than nuclear detonations or radioactive sources. (JP 3-13.1)
electronic masking
The controlled radiation of electromagnetic energy on friendly frequencies in a manner to protect the
emissions of friendly communications and electronic systems against enemy electronic warfare support
measures/signals intelligence without significantly degrading the operation of friendly systems.
(JP 3-13.1)
electronic probing
Intentional radiation designed to be introduced into the devices or systems of potential enemies for the
purpose of learning the functions and operational capabilities of the devices or systems. (JP 3-13.1)
electronic protection
Division of electronic warfare involving actions taken to protect personnel, facilities, and equipment
from any effects of friendly or enemy use of the electromagnetic spectrum that degrade, neutralize, or
destroy friendly combat capability. (JP 3-13.1)
electronic reconnaissance
The detection, location, identification, and evaluation of foreign electromagnetic radiations. (JP 3-13.1)
electronic warfare
Military action involving the use of electromagnetic and directed energy to control the electromagnetic
spectrum or to attack the enemy. (JP 3-13.1)
electronic warfare reprogramming
The deliberate alteration or modification of electronic warfare or target sensing systems, or the tactics
and procedures that employ them, in response to validated changes in equipment, tactics, or the
electromagnetic environment. (JP 3-13.1)
electronic warfare support
A division of electronic warfare involving actions tasked by, or under direct control of, an operational
commander to search for, intercept, identify, and locate or localize sources of intentional and
unintentional radiated electromagnetic energy for the purpose of immediate threat recognition,
targeting, planning and conduct of future operations. (JP 3-13.1)
electronics security
The protection resulting from all measures designed to deny unauthorized persons information of value
that might be derived from their interception and study of noncommunications electromagnetic
radiations, e.g., radar. (JP 3-13.1)
emission control
The selective and controlled use of electromagnetic, acoustic, or other emitters to optimize command
and control capabilities while minimizing, for operations security: a. detection by enemy sensors; b.
mutual interference among friendly systems; and/or c. enemy interference with the ability to execute a
military deception plan. (JP 3-13.1)
measure of effectiveness
A criterion used to assess changes in system behavior, capability, or operational environment that is
tied to measuring the attainment of an end state, achievement of an objective, or creation of an effect.
(JP 3-0)
measure of performance
A criterion used to assess friendly actions that is tied to measuring task accomplishment. (JP 3-0)
operational environment
A composite of the conditions, circumstances, and influences that affect the employment of
capabilities and bear on the decisions of the commander. (JP 3-0)
red team
An organizational element comprised of trained and educated members that provide an independent
capability to fully explore alternatives in plans and operations in the context of the operational
environment and from the perspective of adversaries and others. (JP 2-0)
targeting
The process of selecting and prioritizing targets and matching the appropriate response to them,
considering operational requirements and capabilities. (JP 3-0)
unified land operations
How the Army seizes, retains, and exploits the initiative to gain and maintain a position of relative
advantage in sustained land operations through simultaneous offensive, defensive, and stability
operations in order to prevent or deter conflict, prevail in war, and create the conditions for favorable
conflict resolution. (ADP 3-0)
wartime reserve modes
Characteristics and operating procedures of sensor, communications, navigation aids, threat
recognition, weapons, and countermeasures systems that will contribute to military effectiveness if
unknown to or misunderstood by opposing commanders before they are used, but could be exploited or
neutralized if known in advance. (JP 3-13.1)
working group
(Army) A grouping of predetermined staff representatives who meet to provide analysis, coordinate,
and provide recommendations for a particular purpose or function. (FM 6-0)
REQUIRED PUBLICATIONS
These publications must be available to intended users of this publication.
ADRP 1-02. Terms and Military Symbols. 24 September 2013.
JP 1-02. Department of Defense Dictionary of Military and Associated Terms. 08 November 2010.
RELATED PUBLICATIONS
These documents contain relevant supplemental information.
ARMY PUBLICATIONS
Most Army publications are available online: http://www.apd.army.mil/.
ADP 3-0. Unified Land Operations. 10 October 2011.
ADRP 3-0. Unified Land Operations. 16 May 2012.
ADRP 5-0. The Operations Process. 17 May 2012.
ATP 3-09.32. JFIRE Multi-Service Tactics, Techniques, and Procedures for the Joint Application of
Firepower. 30 November 2012.
ATP 3-13.10. EW Reprogramming Multi-Service Tactics, Techniques, and Procedures for
Reprogramming Electronic Warfare (EW) Systems. 17 June 2014.
ATP 5-19. Risk Management. 14 April 2014.
FM 3-38. Cyber Electromagnetic Activities. 12 February 2014.
FM 3-60. The Targeting Process. 26 November 2010.
FM 6-0. Commander and Staff Organization and Operations. 5 May 2014.
FM 6-02.70. Army Electromagnetic Spectrum Operations. 20 May 2010.
FM 6-99. U.S. Army Report and Message Formats. 19 August 2013.
FM 27-10. The Law of Land Warfare. 18 July 1956.
OTHER PUBLICATIONS
Annex 3-51. Electronic Warfare Operations. 28 July 2011. Available at https://doctrine.af.mil/.
MCWP 2-22. Signals Intelligence. 22 February 1999. Available at
https://www.doctrine.usmc.mil/currentPubsListing.asp.
NWP 3-13. Navy Information Operations. February 2014. Available at
https://ndls.nwdc.navy.mil/FilterDocList.aspx.
RECOMMENDED READINGS
FM 1-04. Legal Support to the Operational Army. 18 March 2013.
PRESCRIBED FORMS
None.
REFERENCED FORMS
Unless otherwise indicated, DA forms are available on the Army Publishing Directorate web site:
http://www.apd.army.mil/. DD Forms are available on the Office of the Secretary of Defense
web site: http://www.dtic.mil/whs/directives/infomgt/forms/index.htm.
DA Form 2028. Recommended Changes to Publications and Blank Forms.
DD Form 1972. Joint Tactical Air Strike Request.
joint force staff, for electronic military decisionmaking process, retasking, personnel, 3-26–3-34
warfare, 5-5–5-7 application, 2-5–2-33 risk management, 1-59
joint frequency management in a time constrained
office, 5-13–5-14 environment, 2-34–2-35 S–T
joint intelligence center, 5-15– mission analysis, 2-10–2-16 spectrum manager, electronic
5-16 multinational force commander, warfare activities, 1-27
joint operations staff section, 5-20 5-19 staff judge advocate, electronic
multinational operations, warfare activities, 1-29
joint restricted frequency list,
deconfliction, 3-12–3-16 considerations, 5-24–5-28 stop jamming message, A-4
electronic warfare, 5-18–5-28 targeting, 1-58
joint spectrum interference, joint electronic warfare cell,
resolution program, 3-41 defined, 4-2
5-21 process, 4-1–4-10
resolution report, A-2–A-3 joint operations staff section, 5-
joint spectrum management troops-in-contact, 3-25
20
element, 5-23 multinational force U–V–W–X–Y–Z
joint tactical air strike request, A-1 commander, 5-19
unified land operations, defined,
joint targeting coordination board, 1-32
5-17 O–P–Q–R
wartime reserve modes, defined,
joint task force component operations process, electronic 1-15
commands, 5-9–5-12 warfare, 2-1–2-3
working groups, cyber
joint terminal attack controller, orders production, 2-32–2-33 electromagnetic activities,
3-27 prophet, C-7 1-43–1-46
radio battalion, C-11–C-18 defined, 1-43
M–N
Marine tactical electronic warfare receipt of mission, 2-7–2-9
squadron, C-19–C-25
RAYMOND T. ODIERNO
General, United States Army
Chief of Staff
Official:
GERALD B. O’KEEFE
Administrative Assistant to the
Secretary of the Army
1434202
DISTRIBUTION:
Active Army, Army National Guard, and United States Army Reserve: Distributed in electronic media
only (EMO).
PIN: 104868-000