(2) In the search component, the ESM team uses special EW
equipment to search for enemy electronic transmissions.
The
intercept component occurs when the ESM team actually records the
transmissions
for
further
analysis.
Acquiring
LOB
on
the
It also helps to
identify where the equipment is located.
Identifying the emitter
occurs when all information from the previous components are combined
and analyzed.
staff in various EW reports.
b. ECM are actions taken to prevent or reduce effective use of
ECM operations can
degrade
an
enemy's
combat
effectiveness
by
degrading
his
electromagnetic operations.
ECM is the staff responsibility of the
G3. It includes electronic jamming and deception.
use of his electronic equipment.
It also permits exploitation by
friendly ESM teams. It allows them to gather vital information about
enemy intentions, location, size, and other data which could help the
commander and his staff in preparing operational plans.
Denying an
enemy the use of the electromagnetic spectrum causes chaos and
disrupts his effective combat operations.
This greatly reduces his
combat effectiveness.
(2) Electronic deception causes an enemy to misinterpret what
his electronic systems receive. Normally, it is conducted as part of
a larger deception operation.
It involves actions associated with
friendly
electromagnetic
(manipulative
electronic
deception (MED)) and simulative electronic deception (SED)), and with
those
of
the
enemy
(imitative
electronic
deception
(IED)).
the next lesson of this module.
2-9
SS0134