advanced-menu-icon

Challenges and Considerations of Electronic Warfare in an Interconnected World

Welcome back to our blog series on electronic warfare! In this sequel, we will explore the challenges and considerations associated with electronic warfare in an increasingly interconnected world. It is essential to approach electronic warfare as a tool of the military, with the primary focus on defense and peacekeeping efforts. As technology advances, responsible and ethical use of electronic warfare becomes paramount in maintaining global security while upholding principles of peace and stability.

Read the blog

Advancements in Electronic Warfare: Paving the Path for Responsible Use in Peacekeeping

Welcome back to our blog series on electronic warfare! In this sequel, we will explore some of the latest advancements in this ever-evolving field while emphasizing the need for responsible and ethical applications in peacekeeping efforts. As technology progresses, electronic warfare capabilities become increasingly sophisticated, enabling more effective operations. However, it is crucial to recognize the responsibility that comes with these advancements and their potential impact on global peace and security.

Read the blog

Strategy and Mission Planning in Electronic Warfare

In this sequel to our blog series on electronic warfare, we will explore the critical aspects of strategy and mission planning in the dynamic domain of electronic warfare. As we dive deeper into this topic, we aim to equip you with the knowledge necessary to understand how electronic warfare is applied in real-world scenarios to achieve strategic objectives.

Read the blog

An overview to electronic attack and the jamming classifications

Electronic attack (EA) include a set of actions aimed at diminishing the effectiveness of hostile military assets through electronic means. This dynamic approach involves targeting various enemy radars and communication systems. EA employs diverse methods, including jamming, chaff, flares, anti-radiation weapons, and high-power radiation.

Read the blog

Introduction to Electronic Warfare and its Subfields

Welcome to our blog series where we dive into the most important concepts and terminology of electronic warfare. Through a sequence of interconnected articles, we aim to equip you with the knowledge necessary to comprehend the fundamental principles and intricate systems of jamming and its association with electronic warfare. This blog series is directed to a diverse audience, ranging from beginners eager to explore this field to seasoned experts seeking further insights.

Read the blog

Introducing The ‘Cyber Security For Airworthiness (CSA) Regulation’ For Military Air Systems

To combat the threats of cyber attacks on military air systems, the British Ministry of Defence has introduced a new regulation to assess and mitigate possible impacts on air safety. This regulation can prove to be a valuable guideline for the assessment and improvement of cyber-resilience of military air-systems, extending its significance not only within the UK but also across international borders.

Read the blog

Electronic Warfare - Detecting Conspicuous Phase Shifts Caused by Deception Jamming (Video)

To detect and remove/suppress the fake targets (range decepted targets) we implemented an algorithm for reflection power tracking. This algorithm consists of a search window of 5 samples and a tracking algorithm which tracks the return of reflected power within the sliding window (read the introductory article for reflection power tracking)

Read the blog

Electronic Warfare - Reflection Power Tracking Algorithm to Neutralize Range Deception (Video)

This article introduces a "reflection power tracking", a statistical method to neutralize range deception. It shows a training implementation in FreeScopes.

Read the blog

Electronic Warfare - Uncovering Range Deception with Pulse Compression and Pulse Doppler

Drones and military aircraft try to hide their real positions through deception jamming. The following videos show successful detection with pulse compression and alternatively pulse Doppler, and subsequent detection algorithms.

Read the blog