The goal of this course is to educate the participants in the the field of Electronic Countermeasures (ECM) and Electronic Attacks (EA). This includes the complete countermeasures development cycle from analysing threat systems, to developing jammer techniques, and finally confirming their effectiveness.
Each session will be presented LIVE by an actively engaged instructor. The virtual classroom allows you to “raise your hand,” ask your questions audibly or type them in the chat, and the instructor will respond to your questions in real-time. It’s just like sitting in the classroom with the instructor – all without leaving your office or home. All sessions are recorded and are made available to registrants for 30 days after registering. Recordings are available within 24 hours.
Module 1 — Principles of Electronic Attacks
May 1 - 1300-1600 EDT (1700-2000 UTC)
This module starts with understanding the weapon systems that will be attacked, and how the desired effects can be achieved in them. This is followed by a review of radar concepts, followed by a discussion of jammer-to-signal ratio and its relation to ECM.
Register for Session 1
Module 2 — Attacking Search and Tracking Radars
May 3 - 1300-1600 EDT (1700-2000 UTC)
This module focuses on the understanding the various forms of electronic attacks and how they create effects in the threat systems. Deceptive techniques covering range, velocity, and angle will be explored, along with noise jamming. These techniques will then be applied to both search and tracking radar systems.
Register for Session 2
Module 3 — ECM Design and Effectiveness
May 8 - 1300-1600 EDT (1700-2000 UTC)
Using the knowledge gathered so far this module explores its application in developing coun-termeasures against specific threats. This includes analysing ELINT, understanding ECM effects against different types of radar threats, and modelling their effectiveness. The spectrum of ECM systems will also be explored from chaff to digital radio frequency memory jammers on multiple platforms including towed and active decoys.
Register for Session 3
Module 4 — Attacking Communications and Infrared Systems
May 10 - 1300-1600 EDT (1700-2000 UTC)
This module covers the application of EA techniques and platforms to communications and IR systems. The IR lessons start with a discussion of seekers followed by their ECM and the meth-ods to achieve those effects. This includes the spectrum of IR ECM, from flares to Directed IR Countermeasures (DIRCM).
Register for Session 4
Module 5 — Modern Jammer Architectures
May 15 - 1300-1600 EDT (1700-2000 UTC)
In order to design effective countermeasures it is necessary to understand the architecture and performance of modern jammers. This module explores the design of a Digital Radio Frequency Memory (DRFM) jammer along with the associated radar warning receiver. Topics covered in-clude: direction finding, digital wideband receivers, DRFM system performance and its effects on radar electronic protective measures.
Register for Session 5
Module 6 — Electronic Protection
May 17 - 1300-1600 EDT (1700-2000 UTC)
The final module in this course focuses on Electronic Protection (EP) and how we can use mod-elling and simulation to understand the interaction between all the various systems involved in an EW engagement. This starts with a discussion of RF stealth and Low Probability of Intercept (LPI) systems in order to understand the challenges and capabilities of a modern radar system. Mod-elling and simulation is then explored to develop and validate ECM against known and projected threats.
Register for Session 6