advanced-menu-icon

Advancements in Electronic Warfare: Paving the Path for Responsible Use in Peacekeeping

Welcome back to our blog series on electronic warfare! In this sequel, we will explore some of the latest advancements in this ever-evolving field while emphasizing the need for responsible and ethical applications in peacekeeping efforts. As technology progresses, electronic warfare capabilities become increasingly sophisticated, enabling more effective operations. However, it is crucial to recognize the responsibility that comes with these advancements and their potential impact on global peace and security.

Read the blog

Strategy and Mission Planning in Electronic Warfare

In this sequel to our blog series on electronic warfare, we will explore the critical aspects of strategy and mission planning in the dynamic domain of electronic warfare. As we dive deeper into this topic, we aim to equip you with the knowledge necessary to understand how electronic warfare is applied in real-world scenarios to achieve strategic objectives.

Read the blog

An overview to electronic attack and the jamming classifications

Electronic attack (EA) include a set of actions aimed at diminishing the effectiveness of hostile military assets through electronic means. This dynamic approach involves targeting various enemy radars and communication systems. EA employs diverse methods, including jamming, chaff, flares, anti-radiation weapons, and high-power radiation.

Read the blog

Introduction to Electronic Warfare and its Subfields

Welcome to our blog series where we dive into the most important concepts and terminology of electronic warfare. Through a sequence of interconnected articles, we aim to equip you with the knowledge necessary to comprehend the fundamental principles and intricate systems of jamming and its association with electronic warfare. This blog series is directed to a diverse audience, ranging from beginners eager to explore this field to seasoned experts seeking further insights.

Read the blog

Electronic Warfare - Detecting Conspicuous Phase Shifts Caused by Deception Jamming (Video)

To detect and remove/suppress the fake targets (range deceived targets) we implemented an algorithm for reflection power tracking. This algorithm consists of a search window of 5 samples and a tracking algorithm which tracks the return of reflected power within the sliding window (read the introductory article for reflection power tracking)

Read the blog

Electronic Warfare - Reflection Power Tracking Algorithm to Neutralize Range Deception (Video)

This article introduces a "reflection power tracking", a statistical method to neutralize range deception. It shows a training implementation in FreeScopes.

Read the blog

Electronic Warfare - Uncovering Range Deception with Pulse Compression and Pulse Doppler

Drones and military aircraft try to hide their real positions through deception jamming. The following videos show successful detection with pulse compression and alternatively pulse Doppler, and subsequent detection algorithms.

Read the blog

SkySim - Defeating Range Deception Successfully (Video)

In this video we show how a sequence of defense algorithms can defeat a range deception attack.

Read the blog

SkyRadar's Solutions for Military Training Academies - An Executive Summary

SkyRadar has been developing training radar solutions for military training applications since 2008. The solutions have been applied by and optimized with allied forces on 5 continents.This article give an executive overview.

Read the blog