The goal of Electronic Warfare is to design an RF system that can help deny usage of spectrum by the enemy to plan, coordinate and communicate. It is also necessary to design robust, wireless information systems that can work in the harsh RF environments found on today's battlefields. Spectrum is often crowded and dynamic in bandwidth and frequency utilization and it might be just as likely a particular system sees interference from the enemy as it might from other "friendly" users. To help assure that a deployed design will work, there is no substitute for spectrum recordings that are of the highest fidelity, can be shared throughout the design team, and can be modified and then re-injected, at IF or RF, in to the systems under test. Ideally a designer would want spectrum captures that were taken in-situ so the communications environments can be accurately reproduced.
X-COM Systems Solutions for Electronic Warfare
X-COM Systems' compact IQC5000A Series Spectrum Capture and Playback System can record and play back one or two independent channels of signal activity up to 160MHz in bandwidth from HF through millimeter wavelengths for upto 6 hours at full bandwidth.
If capture of wider RF segments is required without retuning, the X-COM Systems WARP Capture and Storage product line allows direct RF sampling and recording of bandwidths up to 6GHz.
No matter how long the duration of the signal capture, signals of interest can be identified within it and analyzed using X-COM's Spectro-X Signal Analysis Toolkit software and sent to X-COM's RF Editor, Graphical RF Signal Editing software to make a much smaller file that contains only those signals.
The resulting file can then be imported for further analysis into Agilent Technologies' 89600 or Tektronix SignalVu vector signal analysis software. The original or modified capture file or a file created by RF Editor can also be played back using the IQC5000A directly at a fixed frequency or through a vector signal generator at its original or any other frequency.
This full range of capabilities can be exploited in-theater, at a command center, or in a lab far from the action for threat analysis, as well as for creating threat libraries and many other EW-related functions.