SkyRadar Blog

Radar and SMC Laboratory to Conduct Training Conform to ICAO DOC 10057 & EU Reg 2017/373 (Video)

This modular laboratory allows training from radar basics to complex ATSEP calibration, parametrization and switching procedures. Optionally it can include a unit on electronic warfare. It also includes SkyRadar's SMC suite with a miniaturized ATM infrastructure.

Read the blog

Understanding Hastened and Delayed Range Deception in Electronic Warfare: Strategic Implications and Training Solutions (Videos)

Range Deception is a relevant approach used by aircraft and drones to deceive the supervising radars. 

Explore the intricacies of Range Deception in Electronic Warfare—a tactic used by aircraft and drones to mislead enemy radars. Learn how altering radar signal timings can affect an adversary's ability to accurately locate and target. Understand the strategic implications and countermeasures in this evolving field.

Read the blog

Challenges and Considerations of Electronic Warfare in an Interconnected World

Welcome back to our blog series on electronic warfare! In this sequel, we will explore the challenges and considerations associated with electronic warfare in an increasingly interconnected world. It is essential to approach electronic warfare as a tool of the military, with the primary focus on defense and peacekeeping efforts. As technology advances, responsible and ethical use of electronic warfare becomes paramount in maintaining global security while upholding principles of peace and stability.

Read the blog

Advancements in Electronic Warfare: Paving the Path for Responsible Use in Peacekeeping

Welcome back to our blog series on electronic warfare! In this sequel, we will explore some of the latest advancements in this ever-evolving field while emphasizing the need for responsible and ethical applications in peacekeeping efforts. As technology progresses, electronic warfare capabilities become increasingly sophisticated, enabling more effective operations. However, it is crucial to recognize the responsibility that comes with these advancements and their potential impact on global peace and security.

Read the blog

Strategy and Mission Planning in Electronic Warfare

In this sequel to our blog series on electronic warfare, we will explore the critical aspects of strategy and mission planning in the dynamic domain of electronic warfare. As we dive deeper into this topic, we aim to equip you with the knowledge necessary to understand how electronic warfare is applied in real-world scenarios to achieve strategic objectives.

Read the blog

An overview to electronic attack and the jamming classifications

Electronic attack (EA) include a set of actions aimed at diminishing the effectiveness of hostile military assets through electronic means. This dynamic approach involves targeting various enemy radars and communication systems. EA employs diverse methods, including jamming, chaff, flares, anti-radiation weapons, and high-power radiation.

Read the blog

Introduction to Electronic Warfare and its Subfields

Welcome to our blog series where we dive into the most important concepts and terminology of electronic warfare. Through a sequence of interconnected articles, we aim to equip you with the knowledge necessary to comprehend the fundamental principles and intricate systems of jamming and its association with electronic warfare. This blog series is directed to a diverse audience, ranging from beginners eager to explore this field to seasoned experts seeking further insights.

Read the blog

Introducing The ‘Cyber Security For Airworthiness (CSA) Regulation’ For Military Air Systems

To combat the threats of cyber attacks on military air systems, the British Ministry of Defence has introduced a new regulation to assess and mitigate possible impacts on air safety. This regulation can prove to be a valuable guideline for the assessment and improvement of cyber-resilience of military air-systems, extending its significance not only within the UK but also across international borders.

Read the blog

Electronic Warfare - Detecting Conspicuous Phase Shifts Caused by Deception Jamming (Video)

To detect and remove/suppress the fake targets (range decepted targets) we implemented an algorithm for reflection power tracking. This algorithm consists of a search window of 5 samples and a tracking algorithm which tracks the return of reflected power within the sliding window (read the introductory article for reflection power tracking)

Read the blog