Enhancing Cyber Electromagnetic Activity solutions to achieve spectrum dominance across multi-domain operations (sponsored)
This article is brought to you by Roke Manor.
The rise of wide area networking, mobile communications and automation across civilian and defence applications, means key sections of the electro-magnetic spectrum are highly congested and, from a military perspective, increasingly contested.
This growth is likely to be sustained through the proliferation of devices exploiting digitally enabled functionality through automation, internet of things and space-based data services.
So what are the key challenges in today’s congested and contested EME?
Within the EME, the density of real and apparent targets together with active attempts to spoof, confuse or defeat communications is a concern. Recent reviews have highlighted that China and Russia are both focussed on spectrum exploitation, with the latter said to have a capability lead in ground-based Electronic Warfare (EW).
In a congested EME, identifying sources of interest reliably can also prove challenging with operators needing to separate and identify the components quickly and precisely.
Given the importance of the EME, it is crucial that EW units are equipped to counter these threats by deploying modern sensors which deliver great insight and analysis with reduced vulnerability and maximum operational flexibility.
How can technology solve the problems of a congested and contested EME?
The starting point in countering EME threats is to enable operators to interpret emitter characteristics rapidly and accurately. The use of Adaptive Digital Beamforming (ADBF) overcomes this problem by allowing the sensor or array to focus on specific targets of interest, increasing gain or steering a null onto unwanted interferers, intentional or otherwise.

In addition, identifying and characterising signals of interest reliably is increasingly dependent on advanced analytical tools. Super Resolution Direction Finding (SRDF), enables the operator to ‘see’ through a congested RF environment to resolve specific transmissions. Even where multiple sources operate on the same frequency and in high multi-path environments, the operator can resolve a threat or target decisively.
What key features can enhance a CEMA solution’s capability?
Maintaining Awareness of Position
Low Size, Weight and Power (SWaP)
Countering digital and agile threats
Reducing operator burden through high performance software
Electronic Surveillance (ES) systems usually require accurate positioning information to determine source location and typically use GNSS services for this purpose. This dependency introduces a vulnerability to denial of service or spoofing attacks. Russia has demonstrated proficiency in these techniques, with publically documented instances. Modern ES sensors address this issue through dual GNSS compassing and inertial positioning enhanced by use of on-board magnetometers.
To deliver maximum tactical flexibility, improvements in modern antenna design and electronic performance are exploited to drive down size, weight and power characteristics and to simplify connectivity. With advanced design, the sensor head can achieve most processing on-board and requires only a single fibre optic cable to provide both power and connectivity. An end user device (typically a laptop) is used for operator interface, enabling analysis/distribution. A highly integrated sensor head should also require minimal calibration and, with augmented position fixing, have no external data dependencies.

The design of electronic components and high density printed circuit boards continues to advance. Highly optimised wide-band antenna configurations coupled with the compute power available from advanced processors, now enable ES sensors weighing as little as 10Kg and occupying less than 0.2m3 to deliver ADBF, SRDF, azimuth and elevation DF functionality from within the integrated sensor head. Such an advanced sensor can deliver high performance across a wide bandwidth and address a comprehensive range of target types. Reduced SWaP characteristics facilitate mast mounting of the sensor on a tactical vehicle.
The compute performance available within the sensor also supports processing of multiple simultaneous transmissions for off-board analysis/interpretation, supporting up to 64 Digital Drop Channels (DDC). A modern ES t system can therefore provide an effective communications intelligence (COMINT) capability.
There is a growing need to counter asymmetric threats and contest grey zone operations. Adversaries in these operations are quick to exploit new commercial and commercial derived technologies and services. EW sensors must therefore be capable of dealing with sources that include digital mobile radio (DMR), cellular and satellite communications.
Advanced ES systems should also be effective against frequency hopping threats. Cluster algorithms and high performance processing analyse frequency dwell time and hop raster characteristics, overcoming such countermeasures and maintaining operational effectiveness.
The full operational lifecycle, from planning through operations to post mission debrief, analysis and training should be supported from a common software platform. Operators require an intuitive interface and flexible formats in order to be effective quickly with minimal training. Design principles for integrated, software driven, systems should therefore include:
Integrated by Design: Platforms should be designed to operate seamlessly using core software suites for operational control/presentation and analysis/interpretation. Compatible systems should enable smooth connectivity/handoff to deliver operational effect in real time over chosen networks
Interoperable through Open Standards: End to end solutions should integrate third party applications, radio heads and receivers with particular focus on vehicle integration via Modular Open RF Architecture (MORA), JICD 4.2 Common Services Mission Fabric and Raptor X
Evergreen: Software components should use agile algorithm and coding development to iteratively deliver new features to customers. This allows customers’ emerging needs to shape the software development cycle and allows suppliers to deliver intuitive Graphical User Interfaces (GUIs) and workflows whilst utilising automation to reduce operator burden
Support Operator Effectiveness: By minimising the number of software applications which are involved in managing across the spectrum, operator training is minimised and expertise evolves quickly
As we have explored in this article, the threat landscape is continually evolving and requires a proactive approach from defence and security forces. Industry is on hand to help with emerging requirements and Roke’s CEMA solutions are a generational advance in EW Support.
To continue the conversation, find out more or meet our experts, meet with us at AOC Europe; alternatively visit us at www.roke.co.uk
More from Industry Spotlights
-
Multi-domain integration in the spotlight at AOC Europe 2023 (Sponsored)
Association of Old Crows (AOC) Europe heads to Bonn, Germany, in May 2023 to put ‘Multi-Domain Integration’ in the spotlight for the electromagnetic warfare (EW) community.
-
Disrupting enemy command and control (Sponsored Video)
With a multi-million dollar expansion in support of electronic warfare, BAE Systems is driving unparalleled enhancements to the EC-37B. Integrating our innovative Compass Call mission system into the platform enables warfighters to combat advanced threats and support special missions.
-
How to ensure ultimate fleet availability and performance over the entire lifecycle? (Sponsored)
Are you looking for a broad range service concept that ensures your fleets are always ready for critical operations with optimal costs? Patria has developed a modular service concept called Patria OPTIME, which covers air, land and sea domains. It is tailored to the customer needs and requirements and it is set up in phases together with the customer.
-
IHSE’s mission-critical KVM solutions - When uncompromising security is required (Sponsored)
In defense, government and other restricted information applications, security is imperative. Leakage of confidential information quickly becomes a serious threat and managers must ensure that their systems provide the highest level of protection against external and internal threats. IHSE’s Common Criteria certified KVM extenders offer a new level of security that helps to maintain complete data integrity and to prevent unauthorized access.
-
European military training shifts gear (Sponsored)
This article is brought to you by Clarion Events As the international training and simulation market reconvenes in Rotterdam, the Netherlands, for IT²EC 2023 later …
-
Changing the game of the modern battlefield (Sponsored)
Tactical forces today increasingly require autonomy in the field. The Orbiter 4 STUAS meets this need.