Generated by GPT-5-mini| Krasukha | |
|---|---|
![]() Vitaly V. Kuzmin · CC BY-SA 3.0 · source | |
| Name | Krasukha |
| Origin | Russia |
| Type | Electronic warfare system |
| Service | 2000s–present |
| Used by | Russia |
Krasukha is a Russian mobile electronic warfare (EW) system designed to jam, suppress, and destroy airborne and satellite-borne electronic sensors and communications. Developed during the post-Soviet modernization era, it is associated with Russian Ground Forces, Russian Aerospace Forces, Southern Military District, and deployments near conflict zones such as Crimea, Donetsk People's Republic, and Syrian Civil War. The system is often discussed in the context of contemporary electronic warfare and countermeasure developments involving actors such as NATO, United States Department of Defense, Ministry of Defence (United Kingdom), NATO Electronic Warfare Policy, and industry partners like Almaz-Antey and Rostec.
Krasukha entered service amid modernization programs linked to the State Armament Program 2011–2020 and later updates tied to State Armament Program 2027–2035. It complements legacy systems such as R-330ZH Zhitel, Pole-21, and Shtora-1 within layered EW doctrines used by formations like the Western Military District and Central Military District. International attention spiked after reported deployments near Ukraine and operations supporting Syrian Arab Republic forces during engagements involving Russian Armed Forces and partner contractors.
Development traces to research institutes linked to Radioelectronic Technologies (KRET), Scientific Research Institute of Radio Engineering (NIIR)],] and design bureaus affiliated with Svetlana (company), Tikhomirov Scientific Research Institute of Instrument Design (NIIP), and defense conglomerates including Almaz-Antey and Rostec. Industrial partners include Ulyanovsk Mechanical Plant and vehicle integrators such as KAMAZ and Ural Automotive Plant. Design goals referenced doctrines from Gerald Reaven-era Western analyses, countering threats exemplified by systems like Predator (UAV), MQ-9 Reaper, RQ-4 Global Hawk, and satellites in Low Earth Orbit including reconnaissance platforms from National Reconnaissance Office and civilian operators such as Planet Labs. Political drivers included lessons from conflicts like the Russo-Georgian War and the Second Chechen War, informing planners at General Staff of the Armed Forces of the Russian Federation.
Krasukha variants reportedly operate across microwave and centimeter bands targeting links used by systems including AN/APG-77, AN/APG-81, APG-68, and other airborne radars, as well as datalinks like Link 16 and satellite constellations such as Iridium and GLONASS. Platform integrations have employed chassis from BTR-80, KAMAZ-6350, and wheeled carriers used by Russian Ground Forces. Electronic subsystems reference heritage from institutes such as Central Scientific Research Institute of Special Engineering (TsNIIsp), with antennas, power amplifiers, and signal processors analogous to those in projects by Sukhoi, Tupolev, and United Aircraft Corporation research programs. Reported output power, beamforming, and frequency agility enable suppression of sensors used on aircraft like Sukhoi Su-35, MiG-29, and reconnaissance platforms such as S-300-class radar networks, while also affecting civilian satellites operated by SpaceX and broadcasts from providers like Eutelsat.
Units equipped with the system have been allocated to brigades affiliated with commands including 1st Guards Tank Army, 20th Guards Motor Rifle Division, and coastal groupings such as Black Sea Fleet and Northern Fleet. Operational doctrine pairs Krasukha assets with air defense systems like S-400, Pantsir-S1, and integrated air defense networks of the Russian Aerospace Forces. Exercises including Zapad, Vostok, Sea Breeze, and drills run with allies like Belarus and Syria have demonstrated coordination with reconnaissance assets including Tu-214R, Il-20, Orlan-10, and signal intelligence platforms tied to Federal Security Service (FSB). Deployments near bases in Kaliningrad Oblast, Sevastopol, Latakia, and staging areas in Rostov Oblast underscore strategic employment patterns.
Open-source reporting links Krasukha activity to incidents affecting MQ-9 Reaper operations over Syria, interference reported by United States Central Command, and disruptions to Ukrainian Armed Forces ISR during the Russo-Ukrainian War. NATO partners including United States European Command, NATO Allied Command Operations, and national militaries such as Poland Armed Forces and Estonian Defence Forces have documented electronic interference attributed to Krasukha during patrols and exercises like BALTOPS and Trident Juncture. Civilian satellite operators including SES S.A. and Inmarsat reported anomalous signals in contested regions, while investigative journalism from outlets such as BBC News, The New York Times, and The Guardian analyzed battlefield effects. Diplomatic reactions involved ministries like Ministry of Foreign Affairs (Russia) and counterpart institutions in United States Department of State.
Several variants, commonly cataloged by analysts as different series, have been linked to export discussions with partners including India, Algeria Armed Forces, Egypt Armed Forces, and United Arab Emirates Armed Forces, though confirmed sales remain opaque in International Institute for Strategic Studies and Stockholm International Peace Research Institute reports. Countermeasures developed by organizations such as NATO Communications and Information Agency, DARPA, European Defence Agency, and companies including Raytheon Technologies, Lockheed Martin, and Thales Group focus on hardened datalinks, low-probability-of-intercept radios, and electronic protection suites used on platforms like F-35 Lightning II and Eurofighter Typhoon. Tactics to mitigate effects reference doctrine from Joint Chiefs of Staff (United States) and lessons captured in case studies by RAND Corporation and Center for Strategic and International Studies.
Category:Electronic warfare systems