Angle Deception Jamming
   HOME
*





Angle Deception Jamming
Angle deception jamming is an electronic warfare technique used against conical scanning radar systems. It generates a false signal that fools the radar into believing the target is to one side of the Antenna boresight, boresight, causing the radar to "walk away" from the target and break its radar lock-on. It is also known as angle walk-off, angle stealing, or inverse con-scan. Angle stealing was one of the earliest jamming techniques to be used operationally, with systems employed against the German Würzburg radars near the end of World War II. The technique is not useful against monopulse radars, and is one of the main reasons those radars became popular in the post-war era. Angle stealing belongs to the wider class of "deceptive jamming" techniques, which attempt to deceive radars based on knowledge of their operating procedures, rather than simply trying to blind them with noise. Another popular deception technique that was used against early radars is range gate pull-off. De ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Electronic Warfare
Electronic warfare (EW) is any action involving the use of the electromagnetic spectrum (EM spectrum) or directed energy to control the spectrum, attack an enemy, or impede enemy assaults. The purpose of electronic warfare is to deny the opponent the advantage of—and ensure friendly unimpeded access to—the EM spectrum. EW can be applied from air, sea, land, and/or space by crewed and uncrewed systems, and can target communication, radar, or other military and civilian assets. The electromagnetic environment Military operations are executed in an information environment increasingly complicated by the electromagnetic spectrum. The electromagnetic spectrum portion of the information environment is referred to as the electromagnetic environment (EME). The recognized need for military forces to have unimpeded access to and use of the electromagnetic environment creates vulnerabilities and opportunities for electronic warfare in support of military operations. Within the informat ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  



MORE