Back to top
three coworkers looking at a monitor

Electronic Warfare

Exposing complex threats, protecting our national security

Drawing from 45+ years of experience with the intelligence community, our comprehensive understanding of threat systems is unparalleled. Our experience supporting the intelligence community is based on expert assessments of foreign technology and foreign weapon systems to characterize and quantify threat system capabilities, vulnerabilities, and limitations. In support of these areas, we perform the following:

    • Build systems to collect information about foreign threats

    • Support US vulnerability assessments and countermeasure development

    • Support tactics, techniques, and procedures development

    • Develop threat simulators and other threat representations

    • Provide an authoritative basis for EA, EP, and ES system requirements

    • Provide detailed waveform descriptions to support operational units

    • Provide complete system definitions

    Learn more about our intel capabilities 

    S&TI Analysis

    S&TI analysis focuses on identifying new enemy weapons and describing their characteristics. Our exceptional threat system expertise gained through decades of S&TI analyses provides crucial insight into U.S. weapon system developers, test and training customers, and key policy makers developing strategies for U.S. weapon system employment.

    We are a premier provider of analytical services to S&TI production centers—this starts with our employees. Our experts are skilled in processing and analyzing all types of intelligence data, including electronic intelligence (ELINT), foreign instrumentation signals intelligence (FISINT), human intelligence (HUMINT), imagery intelligence (IMINT), measurement and signatures intelligence (MASINT), communications intelligence (COMINT), and open-source intelligence (OSINT). As trained intelligence analysts, we excel in the area of foreign materiel exploitation (FME). We have analyzed the following systems and subsystems:
     

    Systems
    • Ground-based, shipborne, and airborne radar
    • Guided missiles and rockets
    • EW systems
    • Jamming
    • Communications
    • Active protection for armored vehicles
    • Develop threat simulators and other threat representations C4
    Subsystems
    • RF and EO/IR sensors and detectors
    • Phased arrays
    • Transmitters and receivers
    • Antennas
    • Signal processors
    • Operator displays and controls
    • Datalinks
    • Computers (including software algorithms)
    • RF and EO/IR missile seekers
    • Warheads
    • Proximity fuzes
    • Autopilots
    • Inertial instruments
    • Altimeters 
    • Guidance computers
    • Propulsion systems
    • Airframes and control surfaces
    • Power systems

    Electronic Warfare

    Contributing to the warfighter's success through EW techniques and equipment

    EW is a growing arena of warfighting focused on both offensive attacks and countermeasures—increasingly important to the protection and success of the warfighter in today’s complex battlefield environment. EW provides access to the battlespace; diminishes the enemy’s capability to attack; and ultimately, saves lives. We support the design, development, and testing of EW techniques and equipment through work with the intelligence community, service laboratories, and operational elements.

    EW integrated planning

    Using data analysis, reverse engineering, threat weapon system exploitation, and threat weapon system test and evaluation, we develop a comprehensive description of the threat weapon system that forms the foundation for the development of effective EW techniques and equipment.

    Electronic Support (ES)

    Through detailed signal analyses, we develop innovative threat radar signal representations for use in improving the performance of EW systems. We also develop predictions of IR, ultraviolet (UV), and RF signatures to support development of algorithms to identify and track threat missiles. We support the development of NGES, the Next-Generation EW Integrated Reprogramming Database (EWIRDB) System.

    Testing of EW equipment

    Our high-fidelity models and simulations of threat weapon systems, including models of radars, jammers, seekers, and radar warning receivers, support all phases of EW equipment development from concept of operations, through design and development, to test and evaluation. Our simulations are used in several hardware-in-the-loop (HWIL) test facilities throughout the United States to test EW equipment in development or undergoing upgrades.

    For example, the Laboratory Intelligence Validated Emulator (LIVE) is a closed-loop, low-power, direct inject radar emulation HWIL system designed and developed by our company and validated through our partnership with the intelligence community.

    Support across the entire spectrum

    Our longstanding support to the U.S. intelligence community and ongoing work with service laboratories and operational forces ensure new EW concepts, techniques, and equipment meet the challenges of current and future threats to our military.

    We perform the following critical steps of integrated planning:
     

    1. Characterize performance of threat weapon systems
    2. Reveal threat system vulnerabilities
    3. Provide realistic threat system responses to support EA technique development
    4. Provide realistic jammer waveforms and models to support EP system development

    Intelligence, Surveillance, and Reconnaissance systems

    We support essential missions by providing ISR systems expertise to multiple Department of Defense (DoD) and intelligence community customers.

    We develop custom ISR products to meet specific mission needs. As threat systems evolve, we work closely with customers to develop conceptual sensor designs and gather data in the desired part of the spectrum. We apply systems engineering principles to create and manufacture sensor designs by integrating commercial-/Government-off-the-shelf (COTS/GOTS) products with custom hardware and software solutions. The assembled ISR systems are tested in laboratory and field environments to ensure that performance specifications are met.

    Deployment and operations

    We support the worldwide deployment and operation of ISR systems. We partner with our customers to identify and evaluate candidate sites to host ISR systems for both short- and long-term deployments. Site surveys are conducted to develop installation plans considering mechanical and electrical interfaces, communication systems, on-site manpower, and spectral interference.

    We operate deployed ISR systems to collect and process data from multiple sensors. Activities include sensor tasking, data transfer/processing/analysis, and site maintenance. We support operation scenarios ranging from daily routine operations to high-priority single-event activities, developing custom user interfaces and scenario visualizations for intuitive use.

    Analysis and reporting

    We develop custom analysis and reporting tools to convert ISR sensor data into actionable threat intelligence information. As sensor data are captured, we process and analyze the data to characterize threats; identify patterns and trends; and ultimately, understand adversary intent. We develop a variety of custom software solutions for analysis, including signal processing tools, databases, machine learning applications, all-source data fusion, and data visualizations. Analysis results are captured in reports and web-based tools that are disseminated to multiple customers.

    Programs

    In 2019, we were awarded a General Services Administration (GSA) Blanket Purchase Agreement (BPA) to provide scientific and technical intelligent support services to the U.S. Air Force's National Air and Space Intelligence Center (NASIC). NASIC’s MEGASTAR program supports Wright-Patterson Air Force Base focusing on scientific and technical intelligence products such as electronic warfare, modeling and simulation, counterspace, cyberspace and radar and signal analysis. We supported Wright-Patterson locally since 1992 and have provided valuable support to NASIC on many other heritage contracts.