Electronic Warfare Training Courses

Electronic Warfare (EW) Training Courses

Electronic Warfare - Foundation

The course will provide personnel with an introduction to EW and Signals Intelligence (SIGINT), enabling personnel to progress to further (role specific) training or fulfil a position within an intelligence related organisation.

Course duration: 15 days

Entry criteria: No prior knowledge of EW is required prior to attendance.

Contact us to book your course

Course Content

  • EW related Mathematics
  • Radio theory
  • Wave theory
  • Basic Electronic theory
  • Antennas & Propagation
  • EW & SIGINT Doctrine
  • The Electromagnetic Spectrum (EMS)
  • Communications Electronic Warfare Support Measures (CESM) fundamentals
  • Radar Electronic Warfare Support Measures (RESM) fundamentals
  • Intelligence feeds & sources
  • Operational use of EW in Air, Land & Maritime domains
  • Battlespace Spectrum Management (BSM)
  • The role of the EW Coordination Cell (EWCC)
  • Electro Optic & Infra Red (EOIR) overview
  • Intelligence Surveillance Target Acquisition & Reconnaissance (ISTAR)
  • Platform / Force protection / ECM(FP)
  • Linguistics
  • Technical vocabulary tuition
  • Military vocabulary
  • Operational vocabulary
  • Practical language tutorials, to include:
  • Student presentations
  • Problem solving
  • Communications networks
  • Communications targeting
  • Logging Techniques
  • Roles and responsibilities of the CESM operator and EW Supervisor
  • Basic code breaking
  • Network and traffic (1st line) analysis
  • Global System for Mobile (GSM) Communications overview
  • Satellite Communications (SATCOM) overview
  • Remote or Radio-Controlled Improvised Explosive Device (RCIED) overview
  • Counter RCIED Electronic Warfare (CREW) principles
  • Introduction to EW planning
  • Introduction to Complex signals
  • Propagation, antennas and complex wave forms
  • Intelligence Collection Plan (ICP)
  • Production of appropriate level Intelligence reports
  • Prioritise target tasks for search / intercept plans
  • Analogue and Digital communications including: Direct Sequence Spread Spectrum (DSSS), Terrestrial Trunk Radio (TETRA), Voice Over Internet Protocol (VoIP), Global System for Mobile (GSM) Communications infrastructure and associated architecture, High Powered Cordless Phones (HPCP), Worldwide Interoperability for Microwave Access (WiMax), Synchronous and asynchronous techniques.
  • Propagation, antennas and complex wave forms
  • Intelligence Collection Plan (ICP)
  • Production of appropriate level Intelligence reports
  • Prioritise target tasks for search / intercept plans
  • Analogue and Digital communications including: Direct Sequence Spread Spectrum (DSSS), Terrestrial Trunk Radio (TETRA), Voice Over Internet Protocol (VoIP), Global System for Mobile (GSM) Communications infrastructure and associated architecture, High Powered Cordless Phones (HPCP), Worldwide Interoperability for Microwave Access (WiMax), Synchronous and asynchronous techniques.
  • Radar fundamentals refresher
  • Radar Cross Section (RCS)
  • Maths for Radar (Radar range equation, detection range, power considerations)
  • Antenna characteristics and properties
  • Radar waveforms and modulations
  • ESM / RWR equipment and weapon systems
  • Jamming types and methodology
  • Outlining an analyst's role in the Intelligence Cycle
  • Applying Critical Thinking, the components of an argument and the most common biases and fallacies to intelligence analysis
  • Understanding how key assumptions and the quality of information affect intelligence analysis
  • Undertaking brainstorming session formally
  • Presenting an intelligence product
  • Using the principal auditable analytical techniques, including Indicators and Warning tables, Environmental Scanning, Alternative Competing Hypotheses, and Link Analysis
  • Revising an analyst's role in the Intelligence Cycle, generating Information Requirements and writing a Collection Plan
  • Understanding the benefits and shortfalls of the principal Collection types
  • Writing an intelligence product suitable for a senior readership
  • Applying Critical Thinking, the components of an argument and the most common biases and fallacies to intelligence analysis
  • Understanding how key assumptions and the quality of information affect intelligence analysis
  • Countering deception, including in statistics
  • Producing a Form of Words for targeted release
  • Understanding how high-impact and low-probability events affect intelligence analysis
  • Undertaking brainstorming session formally
  • Using the principal auditable analytical techniques, including Indicators and Warning tables, Process Activity maps, Pattern Analysis and Data Reduction, Cone of Plausibility prediction, Environmental Scanning, Alternative Competing Hypotheses, Dialectics and Red Teaming and Link Analysis
  • Revising an analyst's role in the Intelligence Cycle, generating Information Requirements and writing a Collection Plan
  • Understanding the benefits and shortfalls of the principal Collection types
  • Writing an intelligence product suitable for a senior readership
  • Applying Critical Thinking, the components of an argument and the most common biases and fallacies to intelligence analysis
  • Understanding how key assumptions and the quality of information affect intelligence analysis
  • Countering deception, including in statistics
  • Producing a Form of Words for targeted release
  • Understanding how high-impact and low-probability events affect intelligence analysis
  • Undertaking brainstorming session formally
  • Using the principal auditable analytical techniques, including Indicators and Warning tables, Process Activity maps, Pattern Analysis and Data Reduction, Cone of Plausibility prediction, Environmental Scanning, Alternative Competing Hypotheses, Dialectics and Red Teaming and Link Analysis

COURSE CONTENT

  • Roles of Radar systems and ECM in an operational context
  • Detection and tracking performance of a Radar system in the presence of noise and clutter
  • Calculation of antenna characteristics
  • Principles of various Radar signal processing techniques
  • Configurations and forms of ECM and prediction of effects
  • Descriptions of Electronic Protection Measures (EPM)
  • Review of EOIR systems
  • Blackbody radiation, reflection and transmission of radiation
  • Types of Transduction
  • Typical calculations relating to EOIR spectral regions
  • Optical engineering
  • Concepts of active and passive EOIR systems
  • Tracking control of EOIR systems
  • Determination of a robust EOIR system
  • Threat systems
  • Platform vulnerability including; Radar Cross Section (RCS), Infra-Red (IR) Signature
  • Stealth technology overview
  • Threat avoidance
  • Threat detection
  • Countering the threat through; Introduction to Suppression of Enemy Air Defences (SEAD), Jamming (including noise and deception techniques), Expendables and Decoys (including Chaff and Flare), Defensive tactics
  • Introduction to Suppression of Enemy Air Defences (SEAD)

Advanced Threat systems including:

  • Radar-Guided Surface to Air Missiles (SAM)
  • Electro-Optic / Infra-Red (EOIR) guided SAMs
  • Short Range Air Defence System (SHORADS)
  • Man Portable Air Defence Systems (MANPADS)

In depth Platform vulnerability including:

  • Radar Cross Section (RCS)
  • Infra Red (IR) Signature
  • Low Observables / Stealth technologies

Threat avoidance utilising:

  • Intelligence Tactics, Techniques and Procedures (TTP)
  • Threat detection equipment

Countering the threat through:

  • Advanced Jamming techniques
  • Expendables and Decoys (including Chaff, Flare and Towed Radar Decoy (TRD))
  • Suppression of Enemy Air Defence (SEAD)
  • Interpreting and exploiting the underwater environment
  • Acoustic analysis, oceanography and propagation of sound in water
  • ASW command and control (C2), tactics and countermeasures
  • ASW mission planning, execution and command briefs
  • ASW shipboard organisation, personnel duties, roles responsibilities and training
  • Demodulated Noise (DEMON) and Low frequency Acquisition And Recording (LOFAR)
  • Effects on the environment (marine life) and environmental forecasting
  • Narrowband pulse types and Doppler theory
  • Noise sources, reduction, anechoic cladding and signature reduction
  • Operational considerations (detection, classification and operational employment)
  • Sonar types, advantages and disadvantages of active and passive, bi-static, mono-static, parametric
  • Submarine search & rescue and evasion techniques
  • Submarine propulsion methods, machinery and cavitation
  • Threat and principles of mine countermeasures (MCM)

EW Threat Vulnerability Analysis (TVA) of:

  • Radio Frequency (RF) systems
  • Electro-Optics (EO) systems
  • Infra-Red (IR) systems
  • Receiver techniques influencing selection of jamming techniques
  • Engagement modelling
  • Assessment of generic CM effectiveness
  • Optimisation of CM versus the threat
  • CM robustness development
  • Radar and sensor principles, capabilities and applications
  • Missile design and performance
  • ELINT analysis techniques for exploitation
  • Weapon system modelling and simulation
  • Receivers and Jamming techniques
  • Threat detection, tactics and CM development
  • EW Operational Support (EWOS) processes
  • EW data management systems
  • Design of CM techniques and their incorporation into a defensive tactic
  • Principles of CM techniques

Design and application of:

  • Chaff programs
  • Flare programs
  • ECM techniques
  • Defensive manoeuvres
  • Decoy techniques
  • CM tactics

EW threat analysis to identify vulnerabilities such as:

  • Radio Frequency (RF) systems
  • Electro-Optic (EO) systems
  • Infra-Red (IR) systems
  • Threat receiver techniques influencing jamming selection
  • Influence of Low Observable technologies on the CM process
  • Threat detection and selection of the appropriate tactics and CM development process
  • Processes and procedures used in developing CM
  • Engagement simulations using modelling software
  • Understanding the intelligence architecture
  • Understanding the Intelligence Cycle (Direction, Collection, Processing, Dissemination)
  • Understanding the types of intelligence including capabilities and limitations
  • Understanding the roles of the principal military arms and services and the Manouverist Approach to Warfare
  • Understanding Counter Insurgency Operations
  • Performing an Intelligence Preparation of the Battlefield
  • Conducting research, including open-source research, and developing presentational skills
  • Understanding the most common biases and performing basic analytical techniques
  • Using mapping effectively
  • Delivering formal and informal verbal intelligence briefings
  • Producing intelligence products (written and pictorial intelligence summaries)
  • Understanding the probability yardstick and differentiating between comment and assessment

Using a combination of lectures, practical exercises and scenarios, this course will provide knowledge and understanding of Communications Intelligence (COMINT) analysis enabling personnel to carry out the roles and responsibilities of a COMINT analyst.

Course duration: 10 days

Entry criteria: Although not a prerequisite, it would be beneficial for personnel to have completed the EW Foundation course and/or fulfilled the role of a COMINT operator prior to attendance.

Contact us to book your course

Course Content

The COMINT analyst course modules will include the following topics:

  • Roles and responsibilities of the COMINT analyst
  • Analytical processes and problem solving
  • Communications networks and Orders of Battle (ORBAT)
  • Intelligence Cycle and EW Estimate
  • Intelligence Preparation of the Battlespace (IPB) / environment (IPE)
  • EW Triage and target prioritisation
  • Cryptanalysis Techniques
  • Extraction of information from; Operators logs and comments, Direction Finding (DF) results
  • Code words / Cover terms
  • Database manipulation and processing
  • All source Intelligence feeds
  • Intelligence fusion including Intelligence Surveillance Target Acquisition and Reconnaissance (ISTAR) sources
  • Intelligence briefings

FInd out more

Create your bespoke training course

Talk to one of our EWOS business advisors on +44 (0)1480 222600 between 0800-1800 UTC