Browse A-Z Glossary Index

A

Acoustic Intelligence (ACINT)

For military forces protection, acoustic wave’s detection and processing can be key assets when no other detection clues are...

Agnostic Electronic Warfare

Agnostic Electronic Warfare (EW) is a school of EW theory emerging from current and expected technological advances in the...

Amplitude Modulation in RECM techniques

Amplitude ON-OFF Modulations attempt to force alternately AGC operation for target return in saturation condition and signal...

Angle Deception

The Angle Deception goal is to generate false scan modulations that appear to come from a target at some angle different from...

Anti-Monopulse techniques - Cross-polarization

The goal of cross-polarization is to cause angular measurement errors in the victim mono-pulse radar by radiating a jamming...

Area Protection Task

Modern Air Defence (AD) is an integrated and multi-layered structure to counter incoming threats with multi-spectral...

B

Barrage Noise

Barrage Noise is a self-screening or support-jamming technique that transmits a noise-like signal over a wide RF band for...

C

Chaffs

The two primary chaff employment tactics are force screening and self-protection. Different chaff dispensing techniques are...

Cognitive EW

The leap towards cognitive technology is one of the most exciting trends in EW today. Programs such as DARPA’s Adaptive Radar...

Collaborative EW

Collaborative EA encompasses trends and advancements focused at generating broader EA effects at the operational level, which...

Communication Electronic Attack

Armed Forces use communication links to move signals through the Electro-Magnetic Spectrum (EMSO) to where they are needed in a...

Communication Electronic Counter Measures Basic Techniques

CECM Basic Techniques To know more about this topic please read the following entries: Noise (or Barrage) Jamming (Comm) Swept...

Communication Electronic Counter Measures in Stand-in Jammer Task

In terms of operating platforms, the CECM exploits its capability either on Stand-Off or Stand-In platforms, respectively with...

Communication Electronic Counter Measures in Stand-off Jammer Task

In terms of operating platforms, the CECM exploits its capability either on Stand-Off or Stand-In platforms, respectively with...

Communication Electronic Counter Measures Jamming Waveforms

To know more about this topic please read the following entries: Spot Noise (coming soon) Barrage noise (coming soon)

Communication Electronic Counter Measures Tactics

To know more about this topic please read the following entries: Signal Initiated Jamming (coming soon) Fast Sequential Jamming...

Communication Electronic Counter Measures Technologies

To know more about this topic please read the following entries: Digital signal generator (coming soon) Digital Receiver...

Communication Electronic Support Measures (CESM)

Following the need to collect and manage the heterogeneous information, the intelligence, has been turning the play more and...

Communication Electronic Support Measures Techniques

To know more about this topic please read the following entries: Correlative DF in CESM De-interleaving in CESM Identification...

Communication Electronic Support Measures Technologies

To know more about this topic please read the following entries: Communication Electronic Support Measures Antennas (coming...

Communication intelligence (COMINT)

The interception and analysis of the radio communications is the main application of COMINT systems. COMINT targets...

Convoy Protection

In present times, needs and purposes of convoys have changed, transportation vehicles have evolved as well as attacking and...

Correlative DF in CESM

One of the main functions in EW passive systems is DF (Direction Finding): being able to measure accurately the DOA of signals...

Counter Drone

The detection, identification, neutralization and (when possible or allowed) destruction of such UAS, used as unconventional...

Counter Radio Controlled Improvised Explosive Device (C-RCIED)

The Counter-IED will include a complete EW suite able to defeat Radio Controlled IED (C-RCIED) that are active in the frequency...

Counter UAS/UAV

Table 1 gives the commonly accepted classification of UAV, as a function of weight, altitude and payload (source: U.S. Army...

Counter-drone Area Protection

Counter-UAS are applied both in military field (protection of high value installation) and in civil field (protection of...

Cover Pulse (Radar)

Noise Cover Pulse is a method of generating “gated noise” with a “noise like” spectral content. The goal of this...

Cross-eye

A “Twin RX/TX Apertures” antenna system is based on two RX/TX phased array antennas located in different positions (forming...

Cyber Attack

Different wireless or wireless/wired networked systems, both military and civil infrastructures, require different frequencies...

Cyber Electro Magnetic Activities (CEMA)

Traditionally, Electronic Warfare (EW) and Cyber Warfare (CW) were considered as independent, disparate disciplines:...

Cyber Protection / Cyber Resilience

Cyber resiliency is the ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or...

D

De-interleaving in Comm ESM

De-interleaving is one of the main functions of Comm ESM systems; the goal of this function is twofold, as it must provide: a...

De-interleaving process in RESM

The receiver sends the information to the De-interleaving Process in the form of digital message called PDM (Pulse Descriptor...

Deception Jamming (Deception Techniques in Radar ECM)

The deception action consists in the transmission of signal as similar as possible to the original source. These techniques are...

Defensive Electronic Attack

Defensive Electronic Attack is performed by the Self-Protection Suite (SPS) that is installed in the platform to be defended....

Digital Radio Frequency Memory DRFM for ECM applications

Since modern radars exploit coherent processing, modern ECM must equally exploit coherent techniques. The key element to...

Digital Receiver in RESM

A receiver for monitoring the electromagnetic spectrum has as its primary purpose the detection and characterization through...

Directed Infrared Countermeasure (DIRCM)

Directed Infra-Red Counter Measure System (DIRCM) is designed to counter any surface-to-air IR threat, featuring 1st, 2nd and...

E

Electro Magnetic Spectrum Operation (EMSO)

Since the Cold War, the potential for the EMS to support conventional military forces has been clearly understood by both...

Electronic Attack aka electromagnetic attack

Electronic Attack (EA) missions are performed to degrade either temporarily or permanently enemy electronic sensors (radars and...

Electronic Intelligence (ELINT)

Electronic Intelligence focuses its attention on the Radar Systems and to the analysis of their characteristics. Type of...

Electronic Protection (EP)

Electronic Protection techniques are often employed in radars against RECM and in radio networks against CECM. EP in Radar...

Electronic Support aka electromagnetic Support

The Electronic Support Measures (ESM) equipment usually consisting of two parts: Radar ESM (RESM) (usually covering the...

Electronic Warfare AKA Electromagnetic Warfare

According to the EW doctrine it can be divided into three major subfields: Electronic Support (ES): is the branch of the...

Escort Jammer Task

Escort Jammer Task is employed mainly on board of airborne platform but not exclusively, also naval and ground applications are...

EW Command & Control EWC2

 The EWM is the engine of the EW layer of integration and acts as tactical EW Command & Control (EWC2) for the...

EWC4

Modern EW operations suggest the definition of an EW layer where the information management organisation collapses into an...

Expendable Active Decoys (EAD)

Expendable Actie Decoys (EAD) are designed to lure the tracking gates of an enemy’s radar away from the aircraft. EADs...

F

Flares

A flare is an IR (Infra-Red) countermeasure that is commonly used to protect target platforms against IR heat-seeking SAM...

G

Geolocation

The key element to achieve superiority in the “battlefield” is the “Information Superiority”. In this...

Global Navigation Satellite System GNSS Spoofing

GNSS Spoofing represents a serious threat due to the pervasive use of GNSS information for diverse applications. In fact, GNSS...

H

High Energy Laser (HEL)

A continuous-wave HEL beam is nothing more than a focused ray of optical radiation, which simply delivers heat to the surface...

High-Power Microwave (HPM)

HPM is a relatively new research area belonging to the High-Power Electro Magnetic (HPEM) class where lightning electromagnetic...

Human intelligence (HUMINT)

Human Intelligence is the collection and analysis of information about adverse activity. It can cover different spheres of...

I

Image Intelligence (IMINT)

Image intelligence (IMINT) is obtained from the electro-optical and infrared sensors and from synthetic aperture radars (SAR),...

Information Operations

Information warfare covers all the fields where information is transformed in a weapon to weaken or destabilize an adversary....

Inverse Gain

Inverse Gain Technique is a form of angle deception used against Conical Scan Radars and is aiming to mislead the tracker from...

L

Laser Warning System

The Laser Warning System is a passive defence warning system aiming to detect, track and warn different kinds of laser threats...

M

Manned-Unmanned Teaming

The MUMT concept describes the interaction between humans and uninhabited vehicles at the tactical level for the achievement of...

Maritime Surveillance

The term Maritime Surveillance is formally determined by the combination of the “maritime domain​ ​awareness” and...

Missile Warning System

The MWS (Missile Warning System) is a passive defence warning system aiming at detecting, tracking and giving warning of...

N

Navigation Warfare

Where am I, how do I get there, and what time is it? These are three questions that must be answered to accomplish many...

Net-centric EW

Definitions Networks are force multipliers and NCEW takes the principles of NCW, typically the reliance on sharing ISR data,...

Noise Jamming (Radar)

The jamming waveform is created by a random electronic noise that modulates the carrier in order to appear at the Radar...

Noise or Barrage Jamming against Radio Communications

The noise jamming essentially consists in generating into the target’s receiver the increasing of the background (thermal)...

O

Offensive Electronic Attack

Offensive Jamming can be reactive or preventive. This mission is performed by attacking the sensors of the Ground Based Air...

OpenSource intelligence (OSINT)

Open Source Intelligence is an intelligence discipline that deals with the research, collection and analysis of data and news...

Operational Support Centre for SIGINT Missions

Modern EW operations have evolved to control information flow based on the Electro Magnetic Spectrum to ensure friendly freedom...

P

Passive Direction Finding [DF] Techniques – Amplitude Comparison

In order to explain how the Amplitude Technique works it is important to understand that the antenna radiation pattern is...

Passive Direction Finding [DF] Techniques – DTOA (Difference Time of Arrival) Comparison

The Time-Of-Arrival (TOA) comparison measurement can be done with a two antennas receiver, a third antenna is used to eliminate...

Passive Direction Finding [DF] Techniques – General

The purpose of radio-goniometers is to find out the Direction Of Arrival [DOA] of an incoming RF emission. The measurement of...

Passive Direction Finding [DF] Techniques – Phase Comparison

In an Phase Mono-pulse DF system (Phase-interferometry) more antennas (≥3) are arranged in different spatial positions to...

R

Radar Electronic Attack

The task of Radar Electronic Attack is to contribute to Platform Immunity (or Platform Survivability) by decreasing or...

Radar Electronic Counter Measures in Escort Jammer Task

An EJ system is capable of automatically intercepting and processing received radio frequency signals, while any consequent...

Radar Electronic Counter Measures in Self Protection task

Self-Protection RECM systems can work in different ways, for example creating electronically false targets, or blinding the...

Radar Electronic Counter Measures in Stand-in Jammer Task

Radar Electronic Countermeasures in Stand-in Task are performed by airborne platforms that have to get very close to the victim...

Radar Electronic Counter Measures in Stand-Off Task (Stand-Off-Jammer)

A Stand-off Jammer (SOJ) is a Jammer System installed on board a special mission airborne platform (or in one or more external...

Radar Electronic Counter Measures Techniques

Electronic countermeasures are used effectively to protect platforms such as aircraft and naval vessels. RECM systems can work...

Radar Electronic Counter Measures Technologies

To know more about this topic please read the following entries: Active Phased Array Jammer (coming soon) Radio Frequency Power...

Radar Electronic Support Measures (RESM)

The Radar Electronic Support Measurement (RESM) equipment usually is consisting of two parts: Radar ESM (RESM) and...

Radar Electronic Support Measures Techniques

To know more about this topic please read the following entries: Direction Finding in RESM De-interleaving Process in RESM...

Radar Electronic Support Measures Technologies

To know more about this topic please read the following entries: RESM Antennas (coming soon) Receiver Architecture in EW and ELINT

Radar Warning System

The RWR is the simplest and lightest ES warning sensor and as such is installed on board of all the military platforms. It...

Range Gate Pull-Off (RangeDeception)

The most used deception technique is Range Gate Pull Off (RGPO), based on the manipulation of the time of arrival of the target...

Receiver Architecture in EW and ELINT

The architecture of the receiver is strictly dependent on the use of the passive sensors of which it is part; we can summarize...

Repeater Jamming

Repeater jammer are divided in two main categories: Coherent repeater: The device derives ECM signal directly from the received...

S

Self Protection Suite

The Architecture of the SPS is based on a very high level of System integration powered by an advanced control scheduler for...

Self-Protection for Maritime Patrolling platforms

Primary role for a Maritime Patrol platform is a tactical multispectral observation of area of operation, with a 24 hours/day...

Self-Protection for submarines

Submarines are the least visible of all military assets. While this makes them highly secretive in nature, it also makes them...

Self-Protection Task (airborne)

Self-Protection Task is reactive and acting in a multi-spectral domain including the Radio Frequency (RF) and the Electro Optic...

Self-Protection task (maritime)

In maritime environment, platforms are employed in a wide spectrum of operational roles, from traditional blue water to...

Self-Protection Task for Surface Ships

Self-Protection Task, as part of Electronic Attack, contributes to Platform Immunity (or Platform Survivability) by decreasing...

Self-Protection Task in Maritime Aviation Environment

Maritime Aviation refers to different missions carried out by different platforms; depending on the platforms it can be divided...

Signal Intelligence (SIGINT)

Signal intelligence is based on sources of information from electromagnetic interceptions (radars and communications) coming...

Signal-Data Processing Deception

False Range target (FRT): A jammer based on a DRFM can generate false targets at distances much or less great than the distance...

Simulation in EW

Many factors influence the demand for simulation. Within the EMS, simulation needs can be influenced by environmental factors...

Space EW

The value chain of a generic Space System (or System of Systems) is often identified by 4 macro-areas: (1) launch...

Specific Emitter Identification for Comm Signals

As known, the wording “Signal-In-Space” (SIS) refers the timing and frequency characteristic of the aerial transmitted...

Specific Emitter identification for Radar Signals

Specific Emitter Identification (SEI) is a more powerful process, able to provide a more complete recognition assigning a...

Spectrum Management

Future Electromagnetic Environment and challenges for EMSO After air, land, sea and space, the Electromagnetic Spectrum (EMS)...

Spoofing in Radar ECM

Spoofing consists in the generation of a programmed number of false echoes without specific kinematic law with constant or...

Spot Noise

Spot Noise is a self-screening or support ECM technique that transmits narrowband noise-like energy for masking signals...

Stand-In Jammer Task

Stand-in task is performed when the platform carrying the jammer gets closer to the enemy radar with respect to the defended...

Stand-Off Jammer Task

EW aircraft hover out of range of enemy missiles (Missile Engagement Zone, MEZ) and create a penetration corridor for friendly...

Super Heterodyne (SH) Receiver in RESM

The main figures of a receiver made for surveillance application are the Total bandwidth f, the Probability of Intercept...

Swept Amplitude Modulation (SAM)

Effective angle countermeasures against lobe scanning radars, aiming to mislead the tracker as the actual target angle, need to...

Swept Jamming against Radio Communications

Barrage jamming can be specifically synthesised as a frequency swept jamming. It may perform better than noise jamming because...

Swept Noise (Radar)

Swept Spot Noise uses a saw-tooth, triangular or piecewise frequency modulation superimposed to a spot noise FM. • Linear...

T

Tactical Surveillance

As a first example a typical legacy Tactical Surveillance Task is performed by Mission Aircraft dedicated to Maritime Patrol...

Threat Reaction

Threat Reaction is a part of the wider Self Protection Task and logically follows the Threat Alarm/Warning Task. The Threat...

Threat Warning - Alarm and Warning task

The Warning Suite (WS, i.e. RWR,EOWR and LWR) has to provide continuous 360º bearing coverage to automatically detect and...

Tones Jamming against Radio Communications

The most simple and classic application of a tones jamming is against FSK modulated target signals, where a single tone jamming...

Towed Decoys

The first generation of the Towed Decoy (TD) RF (Radio Frequency) countermeasure was the ALE-50 developed by Raytheon, which...

V

Validation in EW

According to the principles of System Engineering (SE) [5], the process models of the life cycle for a complex HW/SW system may...

Vehicle Protection

The focus is on four different types of self- protection systems, which become compulsory for modern warfare: Passive armour...

Velocity Gate Pull-Off

The signal received in a coherent radar exhibits a Doppler shift whenever there is a time varying path length between...

W

Wide Open Receiver in RESM

The Wide Open structure instantaneously covers the whole Radar RF spectrum (ΔF). A Wide Open Receiver performs a detection on...

Browse by Category

Read more
'Top