G01S7/38

PROVIDING LOCALIZED JAMMING EFFECTS IN A TRAINING EXERCISE
20210328705 · 2021-10-21 · ·

A method for providing localized jamming effects includes using a processor onboard a vehicle to perform the steps of: receiving a jamming command to simulate a jamming effect on a particular sensor onboard the vehicle; and generating a jamming effect in a model of the particular sensor in response to the jamming command. The jamming effect in the model of the particular sensor simulates the jamming effect on the particular sensor being generated by an entity other than the vehicle.

DETERRENT FOR UNMANNED AERIAL SYSTEMS
20210302533 · 2021-09-30 ·

A system for providing integrated detection and deterrence against an unmanned vehicle including but not limited to aerial technology unmanned systems using a detection element, a tracking element, an identification element and an interdiction or deterrent element. Elements contain sensors that observe real time quantifiable data regarding the object of interest to create an assessment of risk or threat to a protected area of interest. This assessment may be based e.g., on data mining of internal and external data sources. The deterrent element selects from a variable menu of possible deterrent actions. Though designed for autonomous action, a Human in the Loop may override the automated system solutions.

DETERRENT FOR UNMANNED AERIAL SYSTEMS
20210302533 · 2021-09-30 ·

A system for providing integrated detection and deterrence against an unmanned vehicle including but not limited to aerial technology unmanned systems using a detection element, a tracking element, an identification element and an interdiction or deterrent element. Elements contain sensors that observe real time quantifiable data regarding the object of interest to create an assessment of risk or threat to a protected area of interest. This assessment may be based e.g., on data mining of internal and external data sources. The deterrent element selects from a variable menu of possible deterrent actions. Though designed for autonomous action, a Human in the Loop may override the automated system solutions.

System and methods for countering satellite-navigated munitions

A defense system that receives information regarding an incoming object(s), then automatically coordinates spoofing or jamming of SATNAV signals potentially used by the incoming object(s) while also informing friendly systems of the spoofing or jamming of SATNAV signal.

System and methods for countering satellite-navigated munitions

A defense system that receives information regarding an incoming object(s), then automatically coordinates spoofing or jamming of SATNAV signals potentially used by the incoming object(s) while also informing friendly systems of the spoofing or jamming of SATNAV signal.

Atomic clock base navigation system for on-the-move radar, obfuscation, sensing, and ad-hoc third party localization

Atomic clocks (at both the receiver and emitter) are used to obfuscate the location of the receiver by providing a different mechanism to synchronize (other than the direct reception). Using this approach, there is no need for the emitter to emit directly to the receiver; only the reflection is necessary, and therefore, the location of the receiver (or receivers) is better obfuscated. Phased antenna arrays are used in RADAR for a variety of applications, including steering of beams and increasing the “aperture” of the antenna for Synthetic Aperture Radar (SAR). The relative position of the emitters is known by means of using a Navigation unit. The beam-steering phase shifts are dynamically computed using the position of the emitters, and the atomic clock is used to synchronize the phase shifts.

Atomic clock base navigation system for on-the-move radar, obfuscation, sensing, and ad-hoc third party localization

Atomic clocks (at both the receiver and emitter) are used to obfuscate the location of the receiver by providing a different mechanism to synchronize (other than the direct reception). Using this approach, there is no need for the emitter to emit directly to the receiver; only the reflection is necessary, and therefore, the location of the receiver (or receivers) is better obfuscated. Phased antenna arrays are used in RADAR for a variety of applications, including steering of beams and increasing the “aperture” of the antenna for Synthetic Aperture Radar (SAR). The relative position of the emitters is known by means of using a Navigation unit. The beam-steering phase shifts are dynamically computed using the position of the emitters, and the atomic clock is used to synchronize the phase shifts.

Programmable multi-waveform RF generator for use as battlefield decoy
11096243 · 2021-08-17 · ·

The invention relates to a portable electronic signal generator, and in particular a programmable multi-waveform radiofrequency generator for use as battlefield decoy.

Programmable multi-waveform RF generator for use as battlefield decoy
11096243 · 2021-08-17 · ·

The invention relates to a portable electronic signal generator, and in particular a programmable multi-waveform radiofrequency generator for use as battlefield decoy.

METHOD AND APPARATUS FOR GENERATING DECEPTION TARGET INFORMATION FOR DECEPTION JAMMING OF PASSIVE RADAR

A method for generating deception target information is proposed. The method may include setting third transmission sources pre-selected based on movement path of a jammer as jamming channels, setting a passive radar reference position according to presence or reliability of prior information on position of the passive radar. The method may also include grouping set jamming channels into groups according to operating environment and purpose and analyzing a deception target settable area based on positions of the third transmission sources, the passive radar reference position, and a movement path of the actual target. The method may further include setting a deception target movement path and deriving the deception target information based on the passive radar reference position, the positions of the third transmission sources, the movement path, and a movement path of a virtual deception target for each deception target movement path.