advanced-menu-icon

An overview to electronic attack and the jamming classifications

Electronic attack (EA) include a set of actions aimed at diminishing the effectiveness of hostile military assets through electronic means. This dynamic approach involves targeting various enemy radars and communication systems. EA employs diverse methods, including jamming, chaff, flares, anti-radiation weapons, and high-power radiation.

Read the blog

Introduction to Electronic Warfare and its Subfields

Welcome to our blog series where we dive into the most important concepts and terminology of electronic warfare. Through a sequence of interconnected articles, we aim to equip you with the knowledge necessary to comprehend the fundamental principles and intricate systems of jamming and its association with electronic warfare. This blog series is directed to a diverse audience, ranging from beginners eager to explore this field to seasoned experts seeking further insights.

Read the blog

Introducing The ‘Cyber Security For Airworthiness (CSA) Regulation’ For Military Air Systems

To combat the threats of cyber attacks on military air systems, the British Ministry of Defence has introduced a new regulation to assess and mitigate possible impacts on air safety. This regulation can prove to be a valuable guideline for the assessment and improvement of cyber-resilience of military air-systems, extending its significance not only within the UK but also across international borders.

Read the blog

Electronic Warfare - Detecting Conspicuous Phase Shifts Caused by Deception Jamming (Video)

To detect and remove/suppress the fake targets (range deceived targets) we implemented an algorithm for reflection power tracking. This algorithm consists of a search window of 5 samples and a tracking algorithm which tracks the return of reflected power within the sliding window (read the introductory article for reflection power tracking)

Read the blog

Electronic Warfare - Reflection Power Tracking Algorithm to Neutralize Range Deception (Video)

This article introduces a "reflection power tracking", a statistical method to neutralize range deception. It shows a training implementation in FreeScopes.

Read the blog

Electronic Warfare - Uncovering Range Deception with Pulse Compression and Pulse Doppler

Drones and military aircraft try to hide their real positions through deception jamming. The following videos show successful detection with pulse compression and alternatively pulse Doppler, and subsequent detection algorithms.

Read the blog

SkySim - Defeating Range Deception Successfully (Video)

In this video we show how a sequence of defense algorithms can defeat a range deception attack.

Read the blog

SkyRadar's Solutions for Military Training Academies - An Executive Summary

SkyRadar has been developing training radar solutions for military training applications since 2008. The solutions have been applied by and optimized with allied forces on 5 continents.This article give an executive overview.

Read the blog

Training Solutions for Electronic Counter Measures (ECM) & Electronic Counter Counter Measures

SkyRadar provides military universities and academies around the world, empowering the use of ECM and ECCM solutions.

Read the blog