English · العربية · فارسی · עברית · Русский · 中文 · Español · Français

Electronic Warfare: Jamming, Spoofing, and the Invisible Battlefield

Guide 2026-03-21 14 min read
TL;DR

Electronic warfare (EW) is the military use of the electromagnetic spectrum to attack, deceive, or defend against adversary electronic systems. It encompasses jamming enemy radar so missiles cannot track targets, spoofing GPS so drones fly off course, and intercepting communications to gain intelligence. EW is the invisible dimension of modern warfare — every missile defense engagement, air strike, and drone operation is influenced by the electronic battle happening in the background.

Definition

Electronic warfare is the military discipline of using electromagnetic energy to control or exploit the electromagnetic spectrum while denying its effective use to adversaries. EW is divided into three pillars: Electronic Attack (EA), which involves jamming, spoofing, or destroying enemy electronic systems; Electronic Protection (EP), which involves hardening friendly systems against enemy electronic attack; and Electronic Support (ES), which involves intercepting and analyzing enemy electronic emissions for intelligence and situational awareness. These three pillars operate simultaneously — a military force must attack enemy electronics, protect its own electronics, and gather intelligence from the electromagnetic environment all at once. EW affects every domain of modern warfare because virtually every military system depends on the electromagnetic spectrum: radars, communications, GPS navigation, datalinks, and guided weapons all operate through electromagnetic signals that can be disrupted.

Why It Matters

Electronic warfare is a decisive factor in the Iran conflict that receives far less attention than kinetic weapons. Iran's missile defense depends on radars that can be jammed. Its ballistic missiles use GPS guidance that can be spoofed. Its command-and-control networks rely on communications that can be intercepted or disrupted. Coalition SEAD operations, precision strikes, and missile defense all depend on EW superiority. Conversely, Iran has invested in EW capabilities that threaten coalition systems — GPS jamming that can degrade precision-guided munitions, radar warning receivers that alert SAM operators to incoming anti-radiation missiles, and communications interception that provides intelligence on coalition operations. The side that dominates the electromagnetic spectrum has a decisive advantage in every engagement — from whether a missile finds its target to whether a SAM radar can track an incoming aircraft.

How It Works

Electronic attack (EA) is the offensive dimension of EW. Radar jamming floods an enemy radar's receiver with electromagnetic noise on the same frequency, drowning out the true signal and preventing the radar from detecting or tracking targets. Noise jamming produces broadband interference, while deceptive jamming creates false target returns that confuse operators into tracking phantom threats. Stand-off jamming attacks radar from outside its weapon engagement zone; escort jamming travels with strike aircraft to provide localized protection. GPS spoofing transmits false satellite navigation signals that cause GPS receivers to calculate incorrect positions. This can redirect drones off course, cause cruise missiles to miss their targets, or confuse the navigation systems that precision-guided bombs depend on. Iran has reportedly deployed GPS spoofing capabilities, and Israel's electronic warfare units have demonstrated spoofing capability in the region. Communications jamming disrupts the radio, satellite, and datalink connections that military forces depend on for coordination. Disrupting a SAM battery's communication with its command center can prevent it from receiving targeting data. Electronic protection (EP) involves techniques to resist enemy EA: frequency hopping (rapidly changing transmission frequencies so jammers cannot keep up), spread-spectrum signaling (distributing signals across a wide band so they are resistant to narrowband jamming), and anti-jam GPS receivers that filter out spoofing signals. Electronic support (ES) uses passive receivers to detect, identify, and locate enemy electronic emissions — building the electronic order of battle that EA planners need to know what to jam and where.

Radar Jamming: Blinding the Enemy's Eyes

Radar jamming is the most tactically significant form of electronic attack because radar is the primary sensor for air defense, naval warfare, and targeting. Modern jamming techniques have evolved far beyond simple noise broadcasting. The US Navy's EA-18G Growler, the premier Western EW aircraft, carries the AN/ALQ-249 Next Generation Jammer (NGJ) — a podded system with separate mid-band and low-band modules that can target multiple radars simultaneously across different frequency ranges. The NGJ uses active electronically scanned array (AESA) technology to form precisely directed jamming beams, concentrating power on specific radars rather than broadcasting energy in all directions. This focused approach is more effective and harder for the target to filter out. Deceptive jamming represents a more sophisticated approach. Rather than drowning out the real signal, deceptive techniques create false target returns in the enemy radar. Range-gate pull-off (RGPO) creates a phantom target that slowly separates from the real aircraft, pulling the radar's tracking gate away from the true position. Velocity-gate pull-off does the same with Doppler tracking. Cross-eye jamming creates contradictory signals from two spatially separated transmitters, causing the radar's angle-tracking system to generate errors. Against Iran's S-300 and Bavar-373 systems, jamming effectiveness depends on the specific variant and frequency band. Iran operates radars across VHF, S-band, and X-band frequencies — each requiring different jamming approaches. VHF radars are more resistant to jamming due to their lower resolution but can be effective for early warning. Higher-frequency engagement radars are more jammable but carry the tracking precision needed for missile guidance.

GPS Warfare: Spoofing, Jamming, and Navigation Denial

GPS has become so central to modern warfare that disrupting it has become a major EW priority. Military GPS receivers use encrypted P(Y)-code signals that are harder to jam than civilian GPS, but they are not immune. High-power jammers can overwhelm even military receivers at tactically relevant ranges. GPS spoofing — transmitting false GPS signals that cause receivers to calculate incorrect positions — is an even more insidious threat because the affected system may not realize it has been compromised. Iran has demonstrated GPS disruption capabilities. In December 2011, Iran claimed to have used GPS spoofing to force down a US RQ-170 Sentinel stealth drone, though US officials attributed the incident to a control system malfunction. Regardless, Iran has since invested significantly in GPS warfare capabilities. Iranian-backed forces have reportedly deployed GPS jammers that interfere with precision-guided munitions in Syria and Iraq. Coalition forces counter GPS threats through multiple approaches. Selective Availability Anti-Spoofing Module (SAASM) GPS receivers used by military systems are significantly harder to spoof than civilian receivers. Many precision weapons use GPS-aided inertial navigation — an inertial measurement unit provides position data independent of GPS, and the weapon can continue to its target even if GPS is lost, albeit with reduced accuracy. Jam-resistant antennas with controlled reception patterns can reject jamming signals arriving from directions other than the satellite constellation. The increasing reliance on GPS across all military domains — from navigation to targeting to timing — means that GPS warfare has strategic implications beyond individual weapon accuracy. If GPS were broadly denied across a theater, the cascading effects on coordination, communication timing, and precision would significantly degrade coalition operational effectiveness.

Electronic Intelligence: Listening to the Spectrum

Electronic support — the intelligence-gathering dimension of EW — provides the foundation for all electronic operations. Before you can jam an enemy radar, you must know its frequency, location, signal characteristics, and operating patterns. Signals Intelligence (SIGINT) and Electronic Intelligence (ELINT) platforms continuously monitor the electromagnetic spectrum to build this picture. The US operates several dedicated ELINT platforms in the Middle East. The RC-135 Rivet Joint intercepts and analyzes electronic communications and radar emissions from standoff positions. The EP-3E ARIES II performs similar functions for the Navy. Space-based SIGINT satellites provide persistent coverage of Iranian electronic emissions. These platforms collectively build an electronic order of battle — a comprehensive map of every radar, communication system, and electronic emitter in the theater, including their locations, frequencies, operating schedules, and technical characteristics. Israel's Unit 8200, one of the world's most capable signals intelligence organizations, provides ELINT and SIGINT specific to the Iran theater. Israel also operates dedicated EW aircraft and ground-based systems that monitor Iranian electronic emissions continuously. The intelligence collected informs both offensive planning (which radars to target, what frequencies to jam) and defensive operations (what threats coalition aircraft face, when SAM radars activate). Electronic intelligence has a direct feedback loop with electronic attack. When a new Iranian radar is detected, ELINT analysts characterize its parameters, EW engineers develop jamming techniques, and the information is loaded into the threat libraries of EA systems. This cycle of detect-analyze-counter is continuous and represents one of the most classified aspects of modern military operations.

Iran's Electronic Warfare Capabilities

Iran has developed a significant indigenous EW capability, though it remains well below coalition capabilities in sophistication and power. Iran's EW efforts focus on several areas. GPS jamming and spoofing has been a priority, with multiple jamming systems deployed along borders and around sensitive facilities. These systems can disrupt civilian GPS receivers and potentially degrade military GPS at close range. Iran claims to have used GPS warfare to capture drones and redirect cruise missiles, though the effectiveness of these claims is difficult to independently verify. Radar warning receivers (RWRs) on Iranian aircraft and air defense systems provide alerts when they are being tracked by enemy radar or targeted by radar-guided missiles. This information allows evasive action or electronic countermeasure activation. Iran's RWR technology is a mix of domestically developed and imported systems, with varying degrees of sophistication. Iran has invested in passive radar systems that detect aircraft by analyzing reflections of existing electromagnetic emissions — television signals, FM radio, cellular networks — rather than broadcasting their own signals. These systems are immune to anti-radiation missiles because they emit nothing for an ARM to home in on. Iran claims its Ghadir and other passive radar systems can detect stealth aircraft by exploiting the larger radar cross-section that stealth aircraft present at longer wavelengths. Communications security has improved with Iran adopting encrypted military communications and fiber-optic links for air defense command networks that are resistant to radio-frequency jamming. However, Iran's legacy systems — many of which predate modern encryption standards — remain vulnerable to coalition SIGINT collection.

The Convergence of EW and Cyber Warfare

The boundary between electronic warfare and cyber warfare is increasingly blurred. Traditional EW operates through the electromagnetic spectrum — jamming radar frequencies, intercepting radio communications, spoofing GPS signals. Cyber warfare operates through networked computer systems — exploiting software vulnerabilities, inserting malicious code, corrupting data. But modern military systems are networked computers that communicate through the electromagnetic spectrum, making the distinction artificial. Israel's 2007 strike on Syria's Al-Kibar nuclear reactor reportedly involved a cyber-electronic operation where Israeli aircraft used the Suter airborne system to hack into Syrian air defense radar computers, either inserting false data or suppressing real detections. Syrian operators reportedly saw clear skies on their screens while Israeli F-15s flew overhead. This type of cyber-electronic attack is more effective than traditional jamming because the operator does not even know they are being attacked. Iran has been both a target and practitioner of cyber-electronic operations. The Stuxnet malware that damaged centrifuges at Natanz in 2010 exploited the control systems of physical machinery through cyber means — a template for how future conflicts will target industrial and military infrastructure. Iran has reportedly developed its own offensive cyber capabilities, including attacks on Saudi Aramco systems and attempts to probe US critical infrastructure. In the current conflict, the cyber-electronic dimension operates in the background of every kinetic engagement. Missile defense networks, targeting systems, logistics databases, and command communications all depend on computer networks that are targets for cyber-electronic attack. The integration of EW and cyber into a unified electromagnetic-cyber warfare discipline is one of the most significant military developments of the current decade.

In This Conflict

Electronic warfare operates across every dimension of the Iran conflict, though largely out of public view. Coalition EW assets — Growler aircraft, RC-135s, ground-based jammers, and space-based systems — continuously monitor and prepare to counter Iran's air defense radars, missile guidance systems, and command networks. Israel's October 2024 strikes on Iran reportedly involved significant EW operations to suppress air defenses protecting targeted sites. GPS warfare affects both sides: Iran has reportedly attempted to jam GPS-guided munitions during coalition strikes, while coalition electronic warfare has targeted Iranian navigation and communication systems. The Houthi anti-ship campaign in the Red Sea has an EW dimension as well, with both sides attempting to jam or deceive the other's targeting systems. Iranian-supplied Houthi anti-ship missiles rely on radar and infrared seekers that can be countered by shipboard EW systems, while the Houthis have reportedly attempted to use GPS jamming and spoofing against commercial shipping. The electronic spectrum has become as contested as physical airspace, and dominance in this invisible domain is a prerequisite for success in every other dimension of the conflict.

Historical Context

Electronic warfare has been a factor in conflict since World War II, when British Window (chaff) confused German radar and the Battle of the Beams saw electronic duels over bombing navigation signals. The Vietnam War saw intensive EW operations as US aircraft faced Soviet-supplied SA-2 missiles, leading to the development of the first dedicated EW aircraft. Israel's 1982 Lebanon War featured a masterful EW campaign where Israeli EW systems blinded Syrian air defenses, enabling the destruction of 29 SAM batteries in the Bekaa Valley without losing a single aircraft. This operation — Operation Mole Cricket 19 — remains the textbook example of EW-enabled air superiority and directly informs current coalition planning against Iran's IADS.

Key Numbers

3 pillars
Electronic warfare comprises Electronic Attack (jamming/spoofing), Electronic Protection (hardening), and Electronic Support (intelligence)
29 SAM batteries
Syrian air defense batteries destroyed by Israel in 1982's Operation Mole Cricket 19 — enabled by EW dominance with zero aircraft lost
2011
Year Iran claimed to have used GPS spoofing to capture a US RQ-170 Sentinel drone — accelerating Iran's EW investment
Multiple bands
Iran's air defenses operate across VHF, S-band, X-band, and other frequencies — requiring multi-band jamming capability to suppress
Speed of light
Electronic attacks propagate at electromagnetic speed — providing instantaneous effect compared to kinetic weapons that must physically travel to target
2007
Year Israel reportedly used cyber-electronic attack to blind Syrian radar during the Al-Kibar nuclear reactor strike

Key Takeaways

  1. Electronic warfare is the invisible enabler of every kinetic operation — missile defense, air strikes, and drone operations all depend on electromagnetic spectrum control
  2. Radar jamming, GPS spoofing, and communications disruption can neutralize enemy systems without physically destroying them, creating temporary windows of advantage
  3. Iran has invested in GPS warfare, passive radar, and fiber-optic communications specifically to counter coalition EW superiority
  4. The convergence of electronic and cyber warfare means that computer network attacks and electromagnetic operations are increasingly unified into one discipline
  5. EW dominance provides a decisive advantage — Israel's 1982 Bekaa Valley operation destroyed 29 SAM batteries with zero aircraft lost, demonstrating EW's multiplier effect

Frequently Asked Questions

What is electronic warfare in simple terms?

Electronic warfare is the military use of electromagnetic energy (radio waves, radar, GPS signals) to disrupt enemy systems while protecting your own. This includes jamming enemy radar so they cannot track your aircraft, spoofing GPS signals so enemy missiles miss their targets, and intercepting enemy communications for intelligence. Every modern military system — radars, guided weapons, communications — depends on electronics that can be attacked or defended.

How does radar jamming work?

Radar jamming works by transmitting electromagnetic energy on the same frequency a radar operates on, overwhelming the radar receiver with noise so it cannot distinguish real targets from interference. More sophisticated deceptive jamming creates false target returns that trick the radar into tracking phantom objects. Modern jamming systems like the AN/ALQ-249 use AESA technology to simultaneously jam multiple radars across different frequencies.

Can GPS be jammed or spoofed?

Yes. GPS jamming overwhelms GPS receivers with noise so they cannot acquire satellite signals, causing navigation failure. GPS spoofing is more sophisticated — it transmits false satellite signals that cause receivers to calculate an incorrect position, potentially redirecting drones or causing precision weapons to miss. Military GPS receivers with encrypted P(Y) code are harder to spoof than civilian receivers, but high-power systems can still disrupt them.

What is the EA-18G Growler?

The EA-18G Growler is the US Navy's dedicated electronic warfare aircraft, based on the F/A-18F Super Hornet airframe. It carries the AN/ALQ-249 Next Generation Jammer system, anti-radiation missiles (AGM-88 HARM/AARGM), and chaff/flare dispensers. The Growler can jam enemy radars, locate and destroy SAM sites, and provide electronic protection for strike packages. It is the primary SEAD/EW platform in US naval aviation.

Does Iran have electronic warfare capabilities?

Yes, though less advanced than coalition systems. Iran has GPS jamming and spoofing systems deployed around sensitive sites, passive radar that detects aircraft without emitting signals, radar warning receivers on aircraft and SAM systems, and encrypted communications networks. Iran claimed to have used GPS spoofing to capture a US RQ-170 drone in 2011. Iran's EW capabilities are defensive in orientation, designed to reduce the effectiveness of coalition SEAD and precision strike operations.

Related

Sources

Electronic Warfare: Principles and Applications for Modern Conflict RAND Corporation academic
Joint Publication 3-13.1: Electronic Warfare US Joint Chiefs of Staff official
Iran's Electronic Warfare and Cyber Capabilities Center for Strategic and International Studies (CSIS) academic
Next Generation Jammer Program Update US Naval Air Systems Command (NAVAIR) official

Related Topics

Iran's April 2024 Attack on Israel Israel Iran Nuclear Strike What Is Radar Cross Section Iran's Nuclear Sites Iron Dome Intercept Rate Cyber Warfare in the Iran Conflict

Related News & Analysis