IWS - The Information Warfare Site
News Watch Make a  donation to IWS - The Information Warfare Site Use it for navigation in case java scripts are disabled



BKEW101.RVW 20020902

"EW 101: A First Course in Electronic Warfare", David Adamy, 2001, 1-58053-169-5, U$89.00
%A David Adamy
%C 685 Canton St., Norwood, MA 02062
%D 2001
%G 1-58053-169-5
%I Artech House/Horizon
%O U$89.00 800-225-9977 fax: 617-769-6334
%P 308 p.
%T "EW 101: A First Course in Electronic Warfare"

 

The book is based on the "EW 101" columns in the "Journal of Electronic Defense." It is, in fact, the first sixty such columns, structured into chapters and linked with additional material.

Electronic warfare (EW), as chapter one tells us, is intended to reserve the electromagnetic spectrum for friendly use, while denying it to the enemy. We may be using the spectrum for communications, such as radio, although the primary concern seems to be with remote sensing, such as radar. EW is not concerned with such activities as interception of enemy communications, or the design of directed energy weapons. Chapter two covers basic mathematics necessary for working with EW, such as logarithms (for working with decibel, or dB, representations) or spherical trigonometry. There is a very clear discussion of antenna characteristics, uses and design considerations in chapter three. Chapter four does the same thing for receivers, with an added examination of the concept of sensitivity. Processing of received signals is dealt with in chapter five, with a special concentration on display for and to the user (generally a pilot or signals officer). Chapter six looks at the multidimensional and multitechnology problem of the search for "threats" (as radio emitters are known in electronic warfare circles). "Low probability of intercept" (LPI) signals are the topic of chapter seven, which emphasizes the considerations in regard to spread spectrum technology. Various techniques for locating emitters are covered in chapter eight. Chapter nine deals with the many different types of jamming, and the power calculations necessary to concepts such as "burn through" range. Different types, missions, and purposes of decoys are discussed in chapter ten. Chapter eleven examines a wide variety of considerations involved in simulations.

As the title notes, for those interested in an introduction to the topic, this book is an informative and interesting tutorial, readable, and with a minimum of mathematics necessary to the topic.

copyright Robert M. Slade, 2002 BKEW101.RVW 20020902