For military forces protection, acoustic wave’s detection and processing can be key assets when no other detection clues are...
Agnostic Electronic Warfare (EW) is a school of EW theory emerging from current and expected technological advances in the...
Amplitude ON-OFF Modulations attempt to force alternately AGC operation for target return in saturation condition and signal...
The Angle Deception goal is to generate false scan modulations that appear to come from a target at some angle different from...
The goal of cross-polarization is to cause angular measurement errors in the victim mono-pulse radar by radiating a jamming...
Modern Air Defence (AD) is an integrated and multi-layered structure to counter incoming threats with multi-spectral...
Barrage Noise is a self-screening or support-jamming technique that transmits a noise-like signal over a wide RF band for...
The two primary chaff employment tactics are force screening and self-protection. Different chaff dispensing techniques are...
The leap towards cognitive technology is one of the most exciting trends in EW today. Programs such as DARPA’s Adaptive Radar...
Collaborative EA encompasses trends and advancements focused at generating broader EA effects at the operational level, which...
Armed Forces use communication links to move signals through the Electro-Magnetic Spectrum (EMSO) to where they are needed in a...
CECM Basic Techniques To know more about this topic please read the following entries: Noise (or Barrage) Jamming (Comm) Swept...
In terms of operating platforms, the CECM exploits its capability either on Stand-Off or Stand-In platforms, respectively with...
In terms of operating platforms, the CECM exploits its capability either on Stand-Off or Stand-In platforms, respectively with...
To know more about this topic please read the following entries: Spot Noise (coming soon) Barrage noise (coming soon)
To know more about this topic please read the following entries: Signal Initiated Jamming (coming soon) Fast Sequential Jamming...
To know more about this topic please read the following entries: Digital signal generator (coming soon) Digital Receiver...
Following the need to collect and manage the heterogeneous information, the intelligence, has been turning the play more and...
To know more about this topic please read the following entries: Correlative DF in CESM De-interleaving in CESM Identification...
To know more about this topic please read the following entries: Communication Electronic Support Measures Antennas (coming...
The interception and analysis of the radio communications is the main application of COMINT systems. COMINT targets...
In present times, needs and purposes of convoys have changed, transportation vehicles have evolved as well as attacking and...
One of the main functions in EW passive systems is DF (Direction Finding): being able to measure accurately the DOA of signals...
The detection, identification, neutralization and (when possible or allowed) destruction of such UAS, used as unconventional...
The Counter-IED will include a complete EW suite able to defeat Radio Controlled IED (C-RCIED) that are active in the frequency...
Table 1 gives the commonly accepted classification of UAV, as a function of weight, altitude and payload (source: U.S. Army...
Counter-UAS are applied both in military field (protection of high value installation) and in civil field (protection of...
Noise Cover Pulse is a method of generating “gated noise” with a “noise like” spectral content. The goal of this...
A “Twin RX/TX Apertures” antenna system is based on two RX/TX phased array antennas located in different positions (forming...
Different wireless or wireless/wired networked systems, both military and civil infrastructures, require different frequencies...
Traditionally, Electronic Warfare (EW) and Cyber Warfare (CW) were considered as independent, disparate disciplines:...
Cyber resiliency is the ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or...
De-interleaving is one of the main functions of Comm ESM systems; the goal of this function is twofold, as it must provide: a...
The receiver sends the information to the De-interleaving Process in the form of digital message called PDM (Pulse Descriptor...
The deception action consists in the transmission of signal as similar as possible to the original source. These techniques are...
Defensive Electronic Attack is performed by the Self-Protection Suite (SPS) that is installed in the platform to be defended....
Since modern radars exploit coherent processing, modern ECM must equally exploit coherent techniques. The key element to...
A receiver for monitoring the electromagnetic spectrum has as its primary purpose the detection and characterization through...
Directed Infra-Red Counter Measure System (DIRCM) is designed to counter any surface-to-air IR threat, featuring 1st, 2nd and...
Since the Cold War, the potential for the EMS to support conventional military forces has been clearly understood by both...
Electronic Attack (EA) missions are performed to degrade either temporarily or permanently enemy electronic sensors (radars and...
Electronic Intelligence focuses its attention on the Radar Systems and to the analysis of their characteristics. Type of...
Electronic Protection techniques are often employed in radars against RECM and in radio networks against CECM. EP in Radar...
The Electronic Support Measures (ESM) equipment usually consisting of two parts: Radar ESM (RESM) (usually covering the...
According to the EW doctrine it can be divided into three major subfields: Electronic Support (ES): is the branch of the...
Escort Jammer Task is employed mainly on board of airborne platform but not exclusively, also naval and ground applications are...
The EWM is the engine of the EW layer of integration and acts as tactical EW Command & Control (EWC2) for the...
Modern EW operations suggest the definition of an EW layer where the information management organisation collapses into an...
Expendable Actie Decoys (EAD) are designed to lure the tracking gates of an enemy’s radar away from the aircraft. EADs...
A flare is an IR (Infra-Red) countermeasure that is commonly used to protect target platforms against IR heat-seeking SAM...
The key element to achieve superiority in the “battlefield” is the “Information Superiority”. In this...
GNSS Spoofing represents a serious threat due to the pervasive use of GNSS information for diverse applications. In fact, GNSS...
A continuous-wave HEL beam is nothing more than a focused ray of optical radiation, which simply delivers heat to the surface...
HPM is a relatively new research area belonging to the High-Power Electro Magnetic (HPEM) class where lightning electromagnetic...
Human Intelligence is the collection and analysis of information about adverse activity. It can cover different spheres of...
Image intelligence (IMINT) is obtained from the electro-optical and infrared sensors and from synthetic aperture radars (SAR),...
Information warfare covers all the fields where information is transformed in a weapon to weaken or destabilize an adversary....
Inverse Gain Technique is a form of angle deception used against Conical Scan Radars and is aiming to mislead the tracker from...
The Laser Warning System is a passive defence warning system aiming to detect, track and warn different kinds of laser threats...
The MUMT concept describes the interaction between humans and uninhabited vehicles at the tactical level for the achievement of...
The term Maritime Surveillance is formally determined by the combination of the “maritime domain awareness” and...
The MWS (Missile Warning System) is a passive defence warning system aiming at detecting, tracking and giving warning of...
Where am I, how do I get there, and what time is it? These are three questions that must be answered to accomplish many...
Definitions Networks are force multipliers and NCEW takes the principles of NCW, typically the reliance on sharing ISR data,...
The jamming waveform is created by a random electronic noise that modulates the carrier in order to appear at the Radar...
The noise jamming essentially consists in generating into the target’s receiver the increasing of the background (thermal)...
Offensive Jamming can be reactive or preventive. This mission is performed by attacking the sensors of the Ground Based Air...
Open Source Intelligence is an intelligence discipline that deals with the research, collection and analysis of data and news...
Modern EW operations have evolved to control information flow based on the Electro Magnetic Spectrum to ensure friendly freedom...
In order to explain how the Amplitude Technique works it is important to understand that the antenna radiation pattern is...
The Time-Of-Arrival (TOA) comparison measurement can be done with a two antennas receiver, a third antenna is used to eliminate...
The purpose of radio-goniometers is to find out the Direction Of Arrival [DOA] of an incoming RF emission. The measurement of...
In an Phase Mono-pulse DF system (Phase-interferometry) more antennas (≥3) are arranged in different spatial positions to...
The task of Radar Electronic Attack is to contribute to Platform Immunity (or Platform Survivability) by decreasing or...
An EJ system is capable of automatically intercepting and processing received radio frequency signals, while any consequent...
Self-Protection RECM systems can work in different ways, for example creating electronically false targets, or blinding the...
Radar Electronic Countermeasures in Stand-in Task are performed by airborne platforms that have to get very close to the victim...
A Stand-off Jammer (SOJ) is a Jammer System installed on board a special mission airborne platform (or in one or more external...
Electronic countermeasures are used effectively to protect platforms such as aircraft and naval vessels. RECM systems can work...
To know more about this topic please read the following entries: Active Phased Array Jammer (coming soon) Radio Frequency Power...
The Radar Electronic Support Measurement (RESM) equipment usually is consisting of two parts: Radar ESM (RESM) and...
To know more about this topic please read the following entries: Direction Finding in RESM De-interleaving Process in RESM...
To know more about this topic please read the following entries: RESM Antennas (coming soon) Receiver Architecture in EW and ELINT
The RWR is the simplest and lightest ES warning sensor and as such is installed on board of all the military platforms. It...
The most used deception technique is Range Gate Pull Off (RGPO), based on the manipulation of the time of arrival of the target...
The architecture of the receiver is strictly dependent on the use of the passive sensors of which it is part; we can summarize...
Repeater jammer are divided in two main categories: Coherent repeater: The device derives ECM signal directly from the received...
The Architecture of the SPS is based on a very high level of System integration powered by an advanced control scheduler for...
Primary role for a Maritime Patrol platform is a tactical multispectral observation of area of operation, with a 24 hours/day...
Submarines are the least visible of all military assets. While this makes them highly secretive in nature, it also makes them...
Self-Protection Task is reactive and acting in a multi-spectral domain including the Radio Frequency (RF) and the Electro Optic...
In maritime environment, platforms are employed in a wide spectrum of operational roles, from traditional blue water to...
Self-Protection Task, as part of Electronic Attack, contributes to Platform Immunity (or Platform Survivability) by decreasing...
Maritime Aviation refers to different missions carried out by different platforms; depending on the platforms it can be divided...
Signal intelligence is based on sources of information from electromagnetic interceptions (radars and communications) coming...
False Range target (FRT): A jammer based on a DRFM can generate false targets at distances much or less great than the distance...
Many factors influence the demand for simulation. Within the EMS, simulation needs can be influenced by environmental factors...
The value chain of a generic Space System (or System of Systems) is often identified by 4 macro-areas: (1) launch...
As known, the wording “Signal-In-Space” (SIS) refers the timing and frequency characteristic of the aerial transmitted...
Specific Emitter Identification (SEI) is a more powerful process, able to provide a more complete recognition assigning a...
Future Electromagnetic Environment and challenges for EMSO After air, land, sea and space, the Electromagnetic Spectrum (EMS)...
Spoofing consists in the generation of a programmed number of false echoes without specific kinematic law with constant or...
Spot Noise is a self-screening or support ECM technique that transmits narrowband noise-like energy for masking signals...
Stand-in task is performed when the platform carrying the jammer gets closer to the enemy radar with respect to the defended...
EW aircraft hover out of range of enemy missiles (Missile Engagement Zone, MEZ) and create a penetration corridor for friendly...
The main figures of a receiver made for surveillance application are the Total bandwidth f, the Probability of Intercept...
Effective angle countermeasures against lobe scanning radars, aiming to mislead the tracker as the actual target angle, need to...
Barrage jamming can be specifically synthesised as a frequency swept jamming. It may perform better than noise jamming because...
Swept Spot Noise uses a saw-tooth, triangular or piecewise frequency modulation superimposed to a spot noise FM. • Linear...
As a first example a typical legacy Tactical Surveillance Task is performed by Mission Aircraft dedicated to Maritime Patrol...
Threat Reaction is a part of the wider Self Protection Task and logically follows the Threat Alarm/Warning Task. The Threat...
The Warning Suite (WS, i.e. RWR,EOWR and LWR) has to provide continuous 360º bearing coverage to automatically detect and...
The most simple and classic application of a tones jamming is against FSK modulated target signals, where a single tone jamming...
The first generation of the Towed Decoy (TD) RF (Radio Frequency) countermeasure was the ALE-50 developed by Raytheon, which...
According to the principles of System Engineering (SE) [5], the process models of the life cycle for a complex HW/SW system may...
The focus is on four different types of self- protection systems, which become compulsory for modern warfare: Passive armour...
The signal received in a coherent radar exhibits a Doppler shift whenever there is a time varying path length between...
The Wide Open structure instantaneously covers the whole Radar RF spectrum (ΔF). A Wide Open Receiver performs a detection on...