This website uses cookies to store information on your computer. Some of these cookies are used for visitor analysis, others are essential to making our site function properly and improve the user experience. By using this site, you consent to the placement of these cookies. Click Accept to consent and dismiss this message or Deny to leave this website. Read our Privacy Statement for more.
Communications Electronic Warfare

Communications Electronic Warfare (On-Demand Course)

Communications Electronic Warfare (On-Demand Course)


Course Length: 24 hours total - delivered across 8 sessions of 3-hours each. Each session contains lecture and practical problems.

    PLEASE NOTE: This course will be delivered through Adobe Connect. To ensure your computer system has access to Adobe Connect, please test your system HERE.

Description

This introductory course in Communications Electronic Warfare covers techniques for setting up intercept and jamming links for Electronic Warfare (EW) against ground to ground and air to ground enemy communication signals, UAV command and data links and weapon control links. It starts with a discussion of the one-way communication link, then covers the important propagation modes for communication band EW, modern signal modulations, and the techniques for predicting intercept and jamming performance as a function of the tactical geometry and local terrain. It gives practical guidance in the application of the theory presented to a wide variety of EW situations.

Course Delivery

There is a downloadable course syllabus provided for each session. It contains copies of all visual aids and problem worksheets for that session. It will be available for download in the meeting room.

Each session was presented LIVE by an actively engaged instructor. The virtual classroom allowed learners to “raise a hand,” ask questions audibly or type them in the chat, and the instructor responded in real-time. It’s just like sitting in the classroom.

These "Live Educational Courses" presented by AOC are recorded when broadcast live and are subsequently made available to registrants for 30 days in our "On-Demand Educational Courses" catalog.

You can now benefit from this course catalog with your purchase.

Who Should Attend

This course is intended primarily for individuals who have a basic understanding of Electronic Warfare and are looking to learn more about the communications element of the EW field.

  • Communications EW Session 1 - Introduction and Communications Math
  • This session discusses the general nature of communications links and the types of links that are important in Electronic Warfare. This includes tactical command and control links, cell phone links, data links, jamming links, improvised explosive device (IED) links and satellite links. Each type of link is described in terms of its applications, vulnerabilities and critical elements. Also covered in this session is the math required to characterize link performance. All calculations are performed using dB numbers and equations and require no math background beyond Algebra. The equations developed are easy to use and lead directly to the answers required to predict and evaluate EW effectiveness
  • Communications EW Session 2 - Communication Signals
  • This session discusses the structure of communication signals. It includes the spectrum characteristics of all common modulations and the way that each carries its information. Analog modulations like AM, FM and various multi-channel signals are described along with their important parameters and performance trade-offs. Digital communication theory is covered to the extend required to understand the advantages and vulnerabilities of all widely used digital modulations. This includes error correction codes and low-probability-of-intercept (LPI) modulations that are widely used in modern military systems to reduce the effectiveness of EW systems and techniques.
  • Communications EW Session 3 - Radio Propagation
  • This session presents the link equation and the most important radio propagation models. It details how to calculate the received power as a function of all of the link elements and the transmission environment. Included are: Line-of-sight links where the signal path is in a clean environment isolated from the ground, Two-ray links where the signal path is near the ground, and Knife-edge diffraction where the signal path is blocked by a ridge line. Also included are propagation situations in which signals must diffract over a complex ridge line, through trees, near the ocean or through rain; atmospheric attenuation for links within the atmosphere or between satellites and Earth stations. For each case, mathematical models are given, and in most cases nomographs and techniques using the provided antenna/propagation slide rule allow the determination of quick answers without performing calculations.
  • Communications EW Session 4 - Antennas and Receivers
  • This session includes descriptions of all important types of antennas including their signal gain, polarization and angular coverage. It also teaches the determination of antenna performance trade-offs either mathematically or by use of the provided antenna/propagation slide rule. The session also describes the various types of receivers used in Radars, Communication links, and EW applications. Each is described in terms of its configuration and performance parameters. Both analog and digital receivers are included. Finally, it teaches how to calculate sensitivity and dynamic range for all important types of receivers. This includes both analog and digital receivers.
  • Communications EW Session 5 - Signal Detection
  • This session covers the detection of conventional and low probability of intercept (LPI) signals. The primary emphasis of this session is detection of LPI signals, which are designed to make them difficult to detect. Techniques for detection of frequency hopping, chirp and direct sequence spread spectrum signals are described, along with predictions of the performance level to be expected in various tactical situations. Also covered is the detection of signals which are protected by multiple LPI techniques.
  • Communications EW Session 6 - Emitter Location
  • This session covers emitter location approaches and the techniques used to locate hostile radar and communications emitters. The techniques vary widely in the accuracy and sensitivity they provide and the types of signals against which they can be applied. Covered techniques include: amplitude comparison, Doppler, interferometer, time difference of arrival, frequency difference of arrival, and systems using multiple techniques. For each of the emitter location techniques presented, the theory of operation, achievable accuracy, calibration approaches and vulnerabilities are discussed. Of particular importance are the approaches used to determine the location of low-probability-of-intercept (LPI) signal transmitters.
  • Communications EW Session 7 - Communications Jamming
  • This session covers the theory and practice applicable to jamming both conventional and LPI communications signals. It first covers the jamming of conventional analog and digital signals. This includes approaches to determination of jamming effectiveness. Then, this session moves on to the jamming of LPI (frequency hopping, chirp and direct sequence spread spectrum) signals. Techniques covered include both those that can be used in fairly simple systems and those requiring sophisticated digital receivers and processors. Exercises leading to the determination of achieved jamming to signal ratios with various modulations and tactical situations are included.
  • Communications EW Session 8 - Communications Intercept
  • This session starts by covering the requirements to recover the information carried by conventional hostile communication signals in various tactical situations. This includes the calculation of effective ranges and the impact of modulations. The effect of various electronic protection techniques that can be applied by hostile communicators will be discussed. Also, this session will cover encryption and (in general) the approaches to defeating it. Finally, techniques for the recovery of information from (unencrypted) frequency hopping, chirp and direct sequence signals will be presented.

Please Note: Access to the course materials will be provided within one business day of registration. 

AOC Members - $1600

Non AOC Members - $1650

  • NOTE: Each registration is for one (1) participant ONLY. Distributing your registration URL or allowing others to participate in this course with you or under your account is grounds for removal from the course without refund of any kind.

Dave Adamy is an internationally recognized expert in electronic warfare who writes the popular monthly EW-101 column in the Journal of Electronic Defense magazine. He has over 50 years experience as a systems engineer and program technical director, developing EW systems from DC to Light, deployed on platforms from submarines to space, with specifications from quick reaction capability to high reliability. He has published over 250 professional articles on Electronic Warfare, receiver system design and closely related subjects, including the popular EW101 series in the Journal of Electronic Defense. He has presented dozens of EW courses for military, government and defense industry organizations in the US and allied countries. He holds an MSEE (Communication theory) and has written 16 books on Electronic Warfare and related subjects.

Dave Adamy

Top
With over 13,000 members internationally, the Association of Old Crows is an organization for individuals who have common interests in Electronic Warfare (EW), Electromagnetic Spectrum Management Operations, Cyber Electromagnetic Activities (CEMA), Information Operations (IO), and other information related capabilities. The Association of Old Crows provides a means of connecting members and organizations nationally and internationally across government, defense, industry, and academia to promote the exchange of ideas and information, and provides a platform to recognize advances and contributions in these fields.