![LeMay Center](https://webarchive.library.unt.edu/web/20161021130835im_/https://www.doctrine.af.mil/images/banner2next.jpg)
- Home
- Core Doctrine
- Doctrine Annexes
- Annex 1-1 Force Development
- Annex 1-04 Legal Support to Ops
- Annex 2-0 Global Integrated ISR Ops
- Annex 3-0 Operations and Planning
- Annex 3-01 Counterair Ops
- Annex 3-2 Irregular Warfare
- Annex 3-03 Counterland Ops
- Annex 3-04 Countersea Ops
- Annex 3-05 Special Ops
- Annex 3-10 Force Protection
- Annex 3-12 Cyberspace Ops
- Annex 3-13 Information Ops
- Annex 3-14 Space Ops
- Annex 3-17 Air Mobility Ops
- Annex 3-22 Foreign Internal Defense
- Annex 3-27 Homeland Ops
- Annex 3-30 Command and Control
- Annex 3-34 Engineer Ops
- Annex 3-40 Counter-CBRN Ops
- Annex 3-50 Personnel Recovery
- Annex 3-51 Electronic Warfare Ops
- Annex 3-52 Airspace Control
- Annex 3-59 Weather Ops
- Annex 3-60 Targeting
- Annex 3-61 Public Affairs
- Annex 3-70 Strategic Attack
- Annex 3-72 Nuclear Ops
- Annex 4-0 Combat Support
- Annex 4-02 Medical Ops
- Air Force Glossary
- External Links
Tactics, Techniques and Procedures
You are leaving the US Air Force Doctrine site being redirected to a CAC-required site. You will not be able to access this site without a DoD issued Common Access Card.
ANNEX 3-51 Electronic Warfare Operations
![Air Force Doctrine Annex](https://webarchive.library.unt.edu/web/20161021130835im_/https://www.doctrine.af.mil/images/afdl_annexes_3d_ds50pct.png)
- Download Full Annex
- Link to Joint Pub. 3-13.1
- Last 2 Year Review: 10 Oct 14
This is a Department of Defense computer system. This computer system, including all related equipment, networks and network devices (specifically including Internet access), are provided only for authorized U.S. Government use.
DoD computer systems may be monitored for all lawful purposes, including to ensure that their use is authorized, for management of the system, to facilitate protection against unauthorized access, and to verify security procedures, survivability, and operational security. Monitoring includes active attacks by authorized DoD entities to test or verify the security of this system. During monitoring, information may be examined, recorded, copied, and used for authorized purposes. All information, including personal information, placed on or sent over this system may be monitored. Use of this DoD computer system, authorized or unauthorized, constitutes consent to monitoring of this system.
Unauthorized use may subject you to criminal prosecution. Evidence of unauthorized use collected during monitoring may be used for administrative, criminal, or other adverse action. Use of this system constitutes consent to monitoring for these purposes.
The appearance of hyperlinks does not constitute endorsement by the Curtis E. LeMay Center for Doctrine Development and Education, the United States Air Force, or the Department of Defense, of the external Web site, or the information, products or services contained therein. For other than authorized activities such as military exchanges and Morale, Welfare, and Recreation (MWR) sites, the United States Air Force does not exercise any editorial control over the information you may find at these locations. Such links are provided consistent with the stated purpose of the Web site.