Identification Friend or Foe (IFF) is a radio-based system used to distinguish friendly aircraft,
vehicles and other military assets from potential threats.
Helicopters, along with other assets, send and receive radio signals to identify each other and even provide altitude,
bearing and range information.
Identified assets can be shown in pilot displays with icons identifying them as friendly, hostile, or unknown.
IFF essentially consists of a transponder with added encryption to prevent enemies from advertising themselves as friendlies.
Computers process the received signals and populate cockpit displays to simplify the pilot’s workload as much as possible.
Figure 1 - Example display of friendlies and foes based on IFF identification.
Why it’s Important
IFF helps avoid friendly fire accidents (fratricide).
Because helicopters often fly at lower altitudes and speeds than jets,
they are particularly vulnerable to ground-based air defenses.
IFF allows those defenses to quickly and reliably determine a helicopter is friendly and not mistaken for an enemy target in a high-stress combat zone.
By integrating IFF results into cockpit displays, IFF also protects other friendly forces from a helicopter.
These systems make it much easier for the helicopter pilot to decipher friend/foe.
Basic Operation
IFF functions as a digital "challenge and response" password system consisting of interrogation, response and identification.
Interrogation. A ground station, ship, or another aircraft sends a coded "challenge" signal on 1030 MHz.
Response. The helicopter's transponder automatically receives this signal and, if correctly configured with the daily key, sends back an encrypted "password" on 1090 MHz.
Identification. If the code is correct, the helicopter appears as a "friendly" icon on the interrogator's radar screen. If there is no response or an incorrect one, it remains "unknown" or "hostile".
Above the helicopter was acting as a responder, but it also acts as an interrogator using the same 3 steps to identify nearby systems.
Could an enemy simply record and playback the responses from the opposing forces to appear as a friendly?
No. The response depends on both the secure key and the specific interrogation.
It's as if the interrogation includes a username, and the response must include the password
associated with that specific username. Each interrogation includes a different username, so each response
is unique. Simply replaying the response from another asset would be providing a password associated
to a different username and would be indentified as invalid.
IFF Modes and other Details
IFF includes several "modes" to share different types of data.
The interrogator communicates the desired mode based on the spacing of pulses it broadcasts.
The various modes are listed below, along with the information the responder sends back to the interrogator.
Mode 1: The responder broadcasts a mission code, which encodes the aircraft type and possibly the state. The meaning of the codes is not fixed, but determined before a particular mission. Codes may communicate things like “I’m an attack helicopter” or “I’m currently performing a search and rescue operation.”
Mode 2: Used to transmit the helicopter’s tail-number, i.e. tell other assets specifically which helicopter this is.
Mode 3/A: Standard for both military and civilian air traffic control; provides a 4-digit "squawk" code.
Mode C: Automatically reports the helicopter’s pressure altitude.
Mode 4: This mode was retired in 2020, replaced by mode 5. It consisted of encrypted messages purely used to identify friend versus foe.
Mode 5: The modern military standard (replacing the older Mode 4). It uses lethal interrogation formats and advanced cryptography to resist jamming and spoofing. The message includes a “password” proving the it’s friendly along with information about the identity and state of the aircraft including national origin, pressure altitude, GPS coordinates, heading, velocity, ….
Mode S / ADS-B: Similar to mode 5, but without encryption. This is used for civilian air traffic control. It provides detailed flight data and GPS-based positioning for better situational awareness in crowded airspace.
Using IFF in a Helicopter
Before a mission, a helicopter’s transponder must be "coded" to understand and
properly reply to encrypted challenges from ships, SAM sites, or other aircraft.
Pilots or other aircrew load crypto keys using a simple key loader (SKL) such as the
AN/PYQ-10 pictured below.
Figure 2 - Example of a simple key loader (SKL).
IFF crypto keys are only valid for specified duration, typically 24 hours, and are required to provide a valid Mode 4/5 responses.
After a day, new keys will need to be loaded for subsequent missions.
Once the keys are loaded and the helicopter is powered up,
the pilot or co-pilot configures the IFF control panel (often integrated into the MCDU or Multi-function Display).
The crew ensures all required modes are enabled (typically Mode 3/A for civilian ATC, and Mode 4/5 for military identification).
For Mode 3/A, the crew enters the 4-digit "squawk" code assigned by Air Traffic Control.
The system is set to STBY (Standby) during ground operations to avoid cluttering local radar,
then moved to NORM or ON just before takeoff.
Once in flight the IFF system operates largely in the background.
Some actions the crew may take follow.
Interrogation: If the helicopter is equipped with an interrogator (common in attack helicopters like the AH-64 Apache), the pilot can "interrogate" a target on their screen. The system sends a challenge; if the target responds correctly, it is labeled as "FRIEND" on the display.
Squawk Ident: If requested by a controller, the pilot may press an IDENT button. This adds a special pulse to the response for ~20 seconds, making the helicopter’s icon "bloom" or flash on the controller’s radar scope.
Emergencies: In an emergency, the pilot switches the IFF to EMER. This automatically broadcasts a specific Mode 3 code (7700), which triggers alarms at nearby monitoring stations.
After a mission, or if the helicopter is at risk of being captured/crashed,
the pilot will hit the ZEROIZE switch.
This instantly wipes the cryptographic keys from the hardware,
turning the IFF system into a "brick" for anyone who captures it.
An enemy with valid crypto keys could pose as friendly with devastating consequences.
Components
On a helicopter, an IFF system typically entails the following hardware.
Figure 3 - Example IFF receiver/transmitter.
Two antennas, typically one on the roof and another below the tail. This enhances the ability to communicate with aircraft flying overhead and ground-based systems.
The receiver/transponder, wired to the antennas, receives/creates the signal sensed/emitted by the antennas. It is mounted in a protected area, typically with some isolation from helicopter vibration.
An example is the APX-123. An example receiver/transponder is shown in Figure 2 above.
In older aircraft a cryptographic computer was a separate box that managed crypto keys, but in modern aircraft this is handled by the transponder itself.
Crypto keys are typically stored on a card and read by a card reader.
User interface(s) to (1) turn various modes on/off, (2) enter codes that will be broadcast in the modes, (3) configure attributes of Mode 5 and Mode S, and (4) view results of interrogations. This may be integrated into a glass cockpit, using the same screen and buttons as other systems. In older aircraft, there may be a dedicated IFF control unit. An example interface unit is shown in Figure 3 below.
A zeroize switch is located in the cockpit, near the pilot. This allows the pilot to clear the crypto keys, preventing adversaries from accessing them.
An emergency switch near the pilot. When active, this causes the transponder to send a Mode 3 emergency code.
Figure 4 - Example remote control unit for an IFF.
Helicopter Specifics
Helicopters have unique characteristics that often make IFF more critical. These are listed below.
Terrain Masking: Helicopters often fly "nap-of-the-earth" to avoid detection.
This can block line-of-sight IFF signals, requiring robust systems that can maintain a link despite ground clutter.
Space and Weight Constraints: Helicopters are more sensitive to size, weight, and power consumption than other systems.
Every ounce of weight, inch of space, and watt of power is crucial onboard a helicopter. Systems like the
BAE AN/DPX-7 are designed specifically for such sensitive platforms.
Close Air Support: When helicopters operate near friendly infantry,
the risk of "blue-on-blue" incidents is high.
Modern IFF systems, such as the
AN/APX-123
found on the
AH-64 Apache and
UH-60 Black Hawk,
provide the high-speed, secure identification needed to support ground troops safely.
Future
Modern helicopter IFF is evolving to include ADS-B (Automatic Dependent Surveillance-Broadcast),
which allows helicopters to constantly broadcast their GPS position.
This, combined with passive receive capabilities, allows pilots to see other friendly forces on their
cockpit displays without having to interrogate them, significantly further simplifying situational awareness in contested airspaces.
IFF Failures
Like all systems, IFF can fail for a number of reasons. Some are described below.
Antenna
Because IFF relies on line-of-sight radio signals at 1030/1090 MHz,
it is highly susceptible to physical blockages.
The main rotor blades can act as a "connectivity shredder,"
momentarily blocking or reflecting signals as many as 33 times per second.
Additionally, during steep turns, the helicopter’s own fuselage or tail can "shadow" the antennas.
For polar angles greater than 70°, signal levels can drop by up to 15 dB, causing the interrogator to lose track.
Operator Error
If the pilot enters the wrong 4-digit squawk code assigned by air traffic control,
they may be identified as an "unknown" or "hostile" contact.
The pilot may also forget to switch the IFF from STBY (Standby) to NORM (Normal) or LOW after takeoff,
leaving the aircraft "dark" to interrogation.
Transponder Issues
At high temperatures, transponder output power can decrease (power droop),
significantly reducing the range at which ground stations or other aircraft can "see" the helicopter.
In cold weather, while max power might increase, the signal can "droop" or fluctuate out of the 2 dB specification,
causing air traffic control receivers to reject the transmission.
Key Failures / Tamper
Even if the hardware is perfect, the secure military modes (Mode 4 and Mode 5) will fail if the digital security isn't right.
This can happen if the pilot hits the “zeroize” switch or fails to properly load current keys.
The crypto keys may also be lost due to depletion of the internal cryptographic backup battery.
A certain amount of power is needed to hold the keys.
A lower power may be treated as a “tamper” event where an enemy is trying to steal the keys,
in which case the system will zeroize (delete the keys).