Electronic Warfare Against the New Threat Environment
A new generation of threats has created a significant number of new challenges to Electronic Warfare equipment and tactics. This is a practical, hands-on course which covers Spectrum Warfare and current EW approaches, and moves on to discuss the new equipment capabilities and Tactics that are required to meet the new threat challenges. The course covers Spectrum Warfare, including the nature of this newly recognized “battle-space.” It also covers both legacy and next generation threat radars, digital communication theory and practice, and legacy communication threats, digital RF Memories, new developments in Infrared threats and countermeasures, and modern radar decoys. Each section of the course includes lecture, discussion and practical in-class problems. The corresponding textbook by Dave Adamy, Electronic Warfare Against a New Generation of Threats (Artech House, 2015), is recommended but not required.
What You Will Learn:
- Concepts and strategies of Electromagnetic Spectrum Warfare.
- Important EW calculations (including J/S ratio, Burn-through range, Intercept range, etc.)
- EW impact of improved capabilities of new radar and communications threat systems.
- New EW systems and strategies required to counter modern threats
- Capabilities and applications of digital RF memories.
- Capabilities of modern IR weapons and countermeasures.
- Capabilities of radar decoys.
- EW Principals & Overview Review of Electronic Warfare basics and dB math.
- Electronic Spectrum Warfare. The nature and significance of this newly recognized “battle space.”
- Legacy Radars Description of current threat systems and the EW techniques used against them.
- Next Generation Threat Radars Description of new threat systems developed to counter current EW techniques and equipment.
- Digital Communication Digital communication theory and its application to modern communication threat systems including integrated air defense systems.
- Legacy Comm Threats Current hostile military communication and the countermeasures used against them.
- Modern Comm Threats New generation hostile communications systems – including IEDs and the EW techniques used against them.
- DRFMs Description of digital RF memory hardware & software and their application to EW operations.
- IR Threats and CM Legacy and new generation IR threats and the countermeasures used against them.
- Radar Decoys Modern radar decoys and how they protect airborne and shipboard assets.
Dave Adamy has over 50 years experience developing EW systems from DC to Light, deployed on platforms from submarines to space, with specifications from QRC to high reliability. For the last 30 years, he has run his own company, performing studies for the US Government and defense contractors. He has also presented dozens of courses in the US and allied countries on Electronic Warfare and related subjects He has published over 250 professional articles on Electronic Warfare, receiver system design and closely related subjects, including the popular EW101 column in the Journal of Electronic Defense. He holds an MSEE (Communication theory) and has 16 books in print.
REGISTRATION: There is no obligation or payment required to enter the Registration for an actively scheduled course. We understand that you may need approvals but please register as early as possible or contact us so we know of your interest in this course offering.
SCHEDULING: If this course is not on the current schedule of open enrollment courses and you are interested in attending this or another course as an open enrollment, please contact us at (410)956-8805 or firstname.lastname@example.org. Please indicate the course name, number of students who wish to participate. and a preferred time frame. ATI typically schedules open enrollment courses with a 3-5 month lead-time. To express your interest in an open enrollment course not on our current schedule, please email us at email@example.com.
|Software Defined Radio: Practical Applications
|Design and Analysis of Bolted Joints (DABJ)
|Deep Learning Architectures for Defense and Security