A CRFS GUIDE TO

Electromagnetic Spectrum Operations

Electromagnetic intelligence delivers tactical and strategic advantage. This guide uses three CONOPs to show how multi-domain RF sensor deployments provide critical signals intelligence to support operations in contested environments.

The Electromagnetic Environment (EME) is not just a support domain—it is a critical operational environment that directly influences operational success. From intelligence gathering to communications, PNT, surveillance, and weapons guidance, military forces have become entirely dependent on the electromagnetic spectrum.

Adversaries have become increasingly aware of the importance of disrupting and denying spectrum access; the ability to operate freely in the EME is no longer a given. To achieve spectrum freedom and agility in the EME, militaries must gain electromagnetic superiority and, ultimately, [toggle:1-e2s:electromagnetic supremacy (E2S).]This requires effective electromagnetic spectrum operations (EMSO), a coordinated set of activities that include electronic warfare (EW), signals intelligence (SIGINT), cyber and electromagnetic activity (CEMA), and spectrum management. 

EMSO is a foundation  of modern multi-domain operations—allowing forces to exploit the EME for tactical and strategic advantages while degrading and disrupting the enemy’s ability to do so.

Achieving E2S in an increasingly congested, contested, and degraded environment demands advanced electromagnetic sensing capabilities. CRFS delivers cutting-edge, passive RF technology that enables real-time spectrum awareness, precision targeting, and superiority in electronic support measures and surveillance —empowering forces to achieve spectrum overmatch in any environment. 

Achieving E2S with CRFS

top_line

Achieving E2S requires persistent, real-time spectrum awareness—something only possible with rapidly deployable, cutting-edge RF sensing technology. 

CRFS builds battle-proven [toggle:2-COTS:COTS RF sensors] that can be procured and deployed within months—not years—ensuring forces have the latest technology without the delays of traditional acquisition programs. Designed for modularity, these solutions are cost-effective, scalable, and upgradeable.

They can detect any signal from 9kHz to 40GHz, meaning even modified drones operating on unconventional frequencies can be detected. That they are passive means they can operate in stealth mode; unlike radar, they cannot be reverse targeted. And their edge-computing capability means that most data is processed on the sensor, reducing latency, network bandwidth requirements, and dependence on a centralized cloud infrastructure.

From tactical sensors rapidly deployed over small areas to wide-area networks  across entire borders, CRFS technology is designed to scale—providing forces with a network-enabled capability that can connect to a command and control (C2) node located anywhere on the planet.

Interoperability is critical for EMSO, where RF sensing must integrate seamlessly with multiple other sensors into [toggle:3-multi-sensor:larger system-of-systems.]CRFS ensures full interoperability with C2 networks through [toggle:4-APIs:open APIs], allowing for real-time RF signal monitoring, geolocation, and data fusion. Streaming [toggle:5-deepview:I/Q data in VITA-49] allows data to be processed further for demodulation.

CRFS’ TRL-9 technology has been deployed and tested in the most extreme environments worldwide. The software-defined sensors are optimized for SWaP-C and, whether deployed in [toggle:6-outdoor-kit:fixed installations], [toggle:7-SIGINT:mounted on vehicles], or integrated into [toggle:8-unmanned:unmanned platforms], provide mission flexibility across all domains.

Effective EMSO requires more than just advanced sensors—it demands rigorous training. CRFS’ RF software supports [toggle:9-wargames:wargaming and simulation exercises], enabling operators to simulate electromagnetic conditions to practice maneuvers and refine EMSO tactics and strategies. 

emso-callback

Talk to an electromagnetic spectrum advisor

Let’s discuss your CONOP requirement, achieving E2S, and real-time spectrum awareness.

CONOP: Littoral strike operation

top_line

EMSO CONOP Littoral Strike Operation 7aug

Passive RF sensors play a critical role in littoral strike operations by providing situational awareness, critical intelligence, and targeting support.

They enable persistent surveillance and electromagnetic intelligence gathering without emitting any RF signals that could reveal positions or intent.

Below is an illustrative concept of how passive RF sensors could be integrated into the ISR, ISTAR, and ESM components of a littoral strike operation to showcase how CRFS’ RF technology can play an important role in EMSO.

 

Introduction

Mission objective: Secure a hostage held on enemy territory

Scope: Conduct over-the-horizon intelligence gathering before deploying an amphibious assault ship. Using offshore raiding craft, target an island where an adversary is holding a hostage in a military compound. The operation will last 48 hours, including ISR, ISTAR, SIGINT, and EW operations in the 40 hours before the raid. This is a joint operation involving a CEMA unit and an amphibious task force.

Adversary capabilities: The compound is a lightly fortified area with S-band radar and naval patrol vessels. Defensive maneuvers involve degrading the spectrum by jamming GPS bands and disrupting beyond-line-of-sight (BLOS) communications.

Communication is via digital mobile radios and Satcom, and patrols are equipped with night vision goggles (NGV), thermal imaging cameras (TI), and dogs.

 

Mission statement 

To support the force’s littoral strike, a CEMA unit will conduct prior ISR, ISTAR, SIGINT, and ESM. Several UAVs and USVs equipped with passive RF sensors will be deployed off the coast of the island where the hostage is being held to covertly monitor the spectrum and record I/Q data.

Analysts will use this data to build an intelligence picture, identifying targets for neutralization, required electronic protection (EP) measures, and frequencies for jamming. 

 

Deploying passive RF sensors

Objective: Establish an [toggle:10-red-forces:electronic order of battle (EOB)] and map the adversary’s RF spectrum activities.

 

Deployment methods

  • 3x [toggle:11-USVs:unmanned surface vessels (USVs)] – each with an integrated [toggle:12-node-plus:RFeye Node Plus.]This sensor can capture 100MHz of raw I/Q data locally for up to eight hours as it has an integrated 16TB SSD. This eliminates the need for backhaul that could potentially compromise the USV’s location.
  • 2x [toggle:13-UAVs:unmanned aerial vehicles] (UAVs) – each with an integrated [toggle:14-lightweight-node:RFeye Node 100-18 LW] as a payload. Weighing less than 2kg, this high-performance sensor is optimized for SWaP, maximizing flight time. It has in-built edge processing to reduce backhaul data bandwidth, offers advanced signal intercept, and has exceptional RF performance.
  • 1x [toggle:15-tethered-drone:tethered drone] – positioned beyond the radio horizon and operating at 100m above sea level, this drone has increased line-of-sight to detect signals of interest while remaining undetected.


At night, USVs offer stealth capability in anti-access/area denial (A2/AD) zones. A network of USVs deployed no further than 2km off the shore can passively record all enemy emissions for eight hours at a time, being replaced when all available storage space on the drive is occupied. During daylight hours, the tethered drone can be launched from a ship, operating under EMCON.

For [toggle:17-ISR:multi-domain ISR], a fleet of USVs can be deployed with multiple UAVs that provide real-time spectrum monitoring and geolocation capabilities. The increased line of-sight (LOS) gained by using UAVs for spectrum monitoring and TDoA missions benefits the precision of the results. Also, the increased LOS afforded by RF sensors in medium-altitude long-endurance (MALE) of high-altitude long endurance (HALE) UAVs allows the platforms to operate at safer distances away from the enemy’s military compound—reducing the chances of being detected and neutralized.

 

Actions

Persistent, real-time RF spectrum monitoring: Conduct airborne ISR to detect and geolocate enemy radar, comms, and datalink networks using [toggle:18-3D-TDoA:3D Time Difference on Arrival] (TDoA) to assess the enemy’s ORBAT.

RF pattern-of-life analysis: Recording I/Q data for [toggle:19-deepview:analysis in post-processing] will allow analysts to identify patrol schedules and C2 nodes—intelligence that can be used for target acquisition as part of the kill chain.

SIGINT: Streaming RF data to [toggle:20-SIGINT:SIGINT software] for real-time identification, classification, and localization of known and unknown RF signals.

COMINT: Aerial surveillance will detect enemy communications. This data will be streamed in VITA-49 to third-party applications for decoding and decryption.

Identify targets for EA: Identify critical enemy comms to be targeted with high-powered effects during the raid.

EMCON planning: Assess blue force emissions to reduce the risk of detection.

emso-callback

Talk to an electromagnetic spectrum advisor

Let’s discuss your CONOP requirement, achieving E2S, and real-time spectrum awareness.

CONOP: Force protection of an airbase

top_line

EMSO CONOP Force Protection at an Airbase 7aug

A Force Protection unit has been tasked with providing continuous specialist protection for critical assets at a strategic overseas airbase.

Routine foot patrols forming the backbone of the security operations rely on several surveillance technologies for situational awareness.

Fixed passive RF sensors positioned around the airbase offer persistent spectrum monitoring, providing early warning capabilities for potential enemy threats. They are an integral part of any multi-layered sensor system functioning as a defensive network.

 

Introduction

Mission objective: Ensure that aircraft at a strategic overseas airbase and their supporting elements are protected when not flying.

Scope: Force Protection must safeguard the entire airbase and its perimeter, including entry control points, flight lines, and airspace.

Adversary capabilities: Adversaries may try to compromise the physical or electromagnetic integrity of the airbase using unmanned aerial systems (UAVs, USVs, UGVs), [toggle:21-jamming:jamming], surveillance, and hostile incursions.

 

Mission statement

By integrating RF sensors with existing CCTV, radar, acoustic sensors, and human intelligence (HUMINT), the force can implement a robust multi-layered security network.

Persistent and passive spectrum monitoring can act as an early warning system by detecting potential threats in the spectrum before they are recognized by other sensors. When a signal of interest is detected, operators will run a geolocation to establish its precise location.

A rapid reaction protocol will then automatically dispatch a quick reaction force; each member of the team will be able to view the geolocation data on their personal device.

 

Deploying passive RF sensors

Objective: Conduct persistent spectrum monitoring around the entire perimeter of an airbase. This enables operators to establish a baseline pattern of life, enhancing situational awareness and allowing rapid detection of deviations. Operators can also monitor real-time spectrum activity for intentional or unintentional interference and capture I/Q data for post-mission analysis.

 

Deployment methods

  • 8x [toggle:22-100-40:RFeye Node 100-40] – deployed around the perimeter of the airbase in ruggedized outdoor kits, which are designed to resist the build-up of ice and snow in cold climates and have sunshields to minimize solar loading in hot climates. RFeye Nodes monitor up to 40GHz.
  • 2x [toggle:13-UAVs:unmanned aerial vehicles] (UAVs) – each with an integrated [toggle:14-lightweight-node:RFeye Node 100-18 LW] as a payload. Weighing less than 2kg, this high-performance sensor is optimized for SWaP, maximizing flight time. It has in-built edge processing to reduce backhaul data bandwidth, offers advanced signal intercept, and has exceptional RF performance.
  • 2x [toggle:15-tethered-drone:tethered drones] – integrated onto tactical vehicles, these can be deployed to 100m within five minutes of being in location and deployed as an additional network to help triangulate signals.
  • 8x personal devices on the chest of each member of the combat readiness team with actionable intelligence in real-time streamed directly from [toggle:24-rfeye-site:spectrum monitoring and geolocation software.]


Actions

Continuous RF spectrum monitoring and threat detection: Passive RF sensors will continuously scan the electromagnetic spectrum for unauthorized transmissions, [toggle:25-wargaming:jamming attempts], and adversary surveillance activities.

Geolocation and identification of threats: Operators may detect threats in real-time or receive [toggle:26-mission-manager:automated alerts] when an SOI is detected. Fixed RF sensors, in addition to tethered drones on tactical vehicles, will form a network to triangulate the signal. The software will then conduct [toggle:27-air-defense:Time Difference on Arrival] (TDoA) geolocations.

Dispatch a rapid response unit: When a threat is detected, the quick reaction force will be immediately deployed by the command center, which will share geolocation data in real-time directly to tactical devices. The patrol can also take tactical vehicles equipped with tethered drones if extra capability is required.

Integration with airbase defense systems: RF sensors can be integrated into the airbase’s wider air defense system, providing additional passive RF detection and geolocation capability.

Continuous monitoring and hidden threats: Enemy transmitters located outside the airbase’s perimeter may be used by adversaries to conduct covert surveillance. Recording I/Q data for [toggle:19-deepview:analysis in post-processing] will allow analysts to identify signals that remain undetected in real-time.

This will allow spectrum managers to build threat libraries and detect evolving enemy techniques, tactics, and procedures (TTPs).

emso-callback

Talk to an electromagnetic spectrum advisor

Let’s discuss your CONOP requirement, achieving E2S, and real-time spectrum awareness.

CONOP: Land-based offensive action

top_line

EMSO CONOP Land-based offensive action 7aug

An infantry unit has been tasked with carrying out an assault on an enemy position. To seize and hold the initiative, prior understanding of the adversary’s vulnerabilities is required.

The force elements responsible for electronic surveillance through ISR activity must generate intelligence to inform tactical offensive decisions and PACE planning.

Pre-assault ISR activities involve monitoring the electromagnetic spectrum using passive RF surveillance to build a pattern of life and [toggle:10-red-forces:understand the enemy’s ORBAT].

 

Introduction

Mission objective: Disrupt and destroy enemy Forward Operating Base (FOB) through a land-based offensive action.

Scope: The operation will take place in enemy-controlled territory. Organic and supporting fires will be used to prepare and soften resistance prior to any advance by land forces.

Prior to the offensive action, ISR units will conduct long-range surveillance and close-target reconnaissance missions to map enemy positions.

Adversary capabilities: The enemy FOB is home to a short-range SAM system, mobile radar installations, EW jammers, and C2 Satcom infrastructure.     

 

Mission statement

The ISR team will conduct a pre-offensive multi-INT surveillance operation, including real-time RF spectrum monitoring and I/Q data capture to generate actionable signals intelligence.

MALE UAVs equipped with passive RF sensors will perform long-range, stand-off surveillance over and around the enemy FOB, minimizing exposure to known SAM and EW threats.

RF data will be fused with EO/IR imagery and other ISR feeds to corroborate signal sources, identify emitters with high confidence, and build a comprehensive picture of the enemy’s pattern of life, force disposition, and electronic order of battle (EOB).

 

Deploying passive RF sensors

Objective: Deploying passive mobile / deployable RF sensors will help ISR units to map the enemy’s electromagnetic footprint, carry out an Intelligence Preparation of the Battlefield (IPB), and understand the ORBAT.

 

Deployment methods

  • 2x [toggle:13-UAVs:unmanned aerial vehicles] (UAVs) – each with an integrated [toggle:14-lightweight-node:RFeye Node 100-18 LW] as a payload. Weighing less than 2kg, this high-performance sensor is optimized for SWaP, maximizing flight time. It has in-built edge processing to reduce backhaul data bandwidth, offers advanced signal intercept, and has exceptional RF performance.
  • 4x [toggle:15-tethered-drone:tethered drones] – integrated onto tactical vehicles, these can be deployed to 100m within five minutes of being in location and deployed as an additional network to help triangulate signals.


Actions

Spectrum monitoring during ISR: Passive RF sensors deployed via UAVs and tethered drones will monitor the EMS surrounding the enemy FOB. The purpose is to identify hostile radar emissions, [toggle:21-jamming:jamming signals], and C2 communications transmissions at range without the need to have troops exposed in a high threat environment.

Pattern-of-life analysis: I/Q data analyzed in post-processing can help analysts assess enemy movement and communication schedules—providing insights into frequencies to use to avoid jammers, shift rotations, periods of heightened alert, and exploitable gaps.

Geolocating transmitters for kinetic targeting: After identifying SOIs (from SAM radar systems and high-power emitters, for example), operators can geolocate these signals and combine this intelligence from other sources to inform targeting.

Identifying transmitters for EA: The frequencies of critical communication such as SATCOM links and military PMR can be identified and disrupted during the assault by CEMA units to provide a tactical advantage.

Pre-assault EMCON planning: By understanding their own emissions, units can adjust power levels to reduce detection and then execute EP TTPs onto multiple PACE plans.

Support dynamic targeting and fires coordination: During the assault, UAVs will continue to monitor and geolocate enemy emissions in real-time, helping JTACs direct air support.

emso-callback

Talk to an electromagnetic spectrum advisor

Let’s discuss your CONOP requirement, achieving E2S, and real-time spectrum awareness.

Conclusion

top_line

Whether on land, at sea, or in the air, the modern battlespace is increasingly shaped by technologies requiring RF systems. Controlling the EMS—and denying the adversary freedom to operate within it—delivers decisive advantages at every stage of the find, fix, strike, and exploit tactical framework.

Although EW used to be the domain of higher-level tactical formations, parity in electromagnetic capability across peer and near-peer adversaries demands a shift in strategic thinking. Today, integrating EW into all operations and down to lower tactical echelons is not only feasible—it is operationally essential. Companies and platoons can be empowered and equipped to sense, understand, and exploit the EMS, turning RF data into actionable intelligence.

This shift has been enabled in part by the incorporation of [toggle:8-unmanned:unmanned systems (UxS)] into modern doctrine. Smaller units no longer need to rely solely on strategic ISR assets like the RC-135W Rivet Joint to generate electromagnetic intelligence. Instead, they can field organic ISR capabilities using lightweight UAVs with passive RF payloads—providing speed, autonomy, and mission-specific flexibility.

To ensure that operations are effective in contested and congested environments, C4ISR systems must be built to support Agile C2. This means facilitating real-time, distributed decision-making using cutting-edge technology such as passive RF sensors and geolocation software that integrate seamlessly with C4ISR systems. By integrating these capabilities, commanders at all levels can sense, decide, and act within the EMS faster than the enemy.