Exposing complex threats, protecting our national security
Drawing from 40+ years of experience with the intelligence community, Dynetics' comprehensive understanding of threat systems is unparalleled.
Dynetics' experience supporting the intelligence community is based on expert assessments of foreign technology and foreign weapon systems to characterize and quantify threat system capabilities, vulnerabilities, and limitations.
In support of these areas, we perform the following:
- Provide complete system definitions
- Build systems to collect information about foreign threats
- Support US vulnerability assessments and countermeasure development
- Support tactics, techniques, and procedures development
- Develop threat simulators and other threat representations
- Provide an authoritative basis for EA, EP, and ES system requirements
- Provide detailed waveform descriptions to support operational units
S&TI analysis focuses on identifying new enemy weapons and describing their characteristics. Dynetics' exceptional threat system expertise gained through decades of S&TI analyses provides crucial insight into U.S. weapon system developers, test and training customers, and key policy makers developing strategies for U.S. weapon system employment.
We are a premier provider of analytical services to S&TI production centers—this starts with our employees. Our experts are skilled in processing and analyzing all types of intelligence data, including electronic intelligence (ELINT), foreign instrumentation signals intelligence (FISINT), human intelligence (HUMINT), imagery intelligence (IMINT), measurement and signatures intelligence (MASINT), communications intelligence (COMINT), and open-source intelligence (OSINT). As trained intelligence analysts, we excel in the area of foreign materiel exploitation (FME).
Dynetics has analyzed the following systems and subsystems:
- Ground-based, shipborne, and airborne radar
- Guided missiles and rockets
- EW systems such as jammers, warning receivers, and defensive avionics
- Command, control, communication, and computer (C4)
- Active protection for armored vehicles
- *Radio frequency (RF) and electro-optics/infrared (EO/IR) sensors and detectors
- Phased arrays
- Transmitters and recievers
- Signal processors
- Operator displays and controls
- Computers (including software algorithms)
- RF and EO/IR missile seekers
- Proximity fuzes
- Inertial instruments
- Guidance computers
- Propulsion systems
- Airframes and control surfaces
- Power systems
Contributing to the warfighter's success through EW techniques and equipment
EW is a growing arena of warfighting focused on both offensive attacks and countermeasures—increasingly important to the protection and success of the warfighter in today’s complex battlefield environment. EW provides access to the battlespace; diminishes the enemy’s capability to attack; and ultimately, saves lives. Dynetics supports the design, development, and testing of EW techniques and equipment through work with the intelligence community, service laboratories, and operational elements.
EW Integrated Planning
Using data analysis, reverse engineering, threat weapon system exploitation, and threat weapon system test and evaluation, we develop a comprehensive description of the threat weapon system that forms the foundation for the development of effective EW techniques and equipment.
Electronic Support (ES)
Through detailed signal analyses, we develop innovative threat radar signal representations for use in improving the performance of EW systems. We also develop predictions of IR, ultraviolet (UV), and RF signatures to support development of algorithms to identify and track threat missiles. We support the development of NGES, the Next-Generation EW Integrated Reprogramming Database (EWIRDB) System.
Test and Evaluation
Testing of EW Equipment
Our high-fidelity models and simulations of threat weapon systems, including models of radars, jammers, seekers, and radar warning receivers, support all phases of EW equipment development from concept of operations, through design and development, to test and evaluation. Our simulations are used in several hardware-in-the-loop (HWIL) test facilities throughout the United States to test EW equipment in development or undergoing upgrades.
For example, the Laboratory Intelligence Validated Emulator (LIVE) is a closed-loop, low-power, direct inject radar emulation HWIL system designed and developed by Dynetics and validated through our partnership with the intelligence community.
Support across the Entire Spectrum
Our longstanding support to the U.S. intelligence community and ongoing work with service laboratories and operational forces ensure new EW concepts, techniques, and equipment meet the challenges of current and future threats to our military.
We perform the following critical steps of integrated planning:
- Characterize performance of threat weapon systems
- Reveal threat system vulnerabilities
- Provide realistic threat system responses to support EA technique development
- Provide realistic jammer waveforms and models to support EP system development
Intelligence, Surveillance, and Reconnaissance (ISR) systems
Dynetics supports essential missions by providing ISR systems expertise to multiple Department of Defense (DoD) and intelligence community customers.
Dynetics develops custom ISR products to meet specific mission needs. As threat systems evolve, we work closely with customers to develop conceptual sensor designs and gather data in the desired part of the spectrum. We apply systems engineering principles to create and manufacture sensor designs by integrating commercial-/Government-off-the-shelf (COTS/GOTS) products with custom hardware and software solutions. The assembled ISR systems are tested in laboratory and field environments to ensure that performance specifications are met.
Deployment and Operations
We support the worldwide deployment and operation of ISR systems. We partner with our customers to identify and evaluate candidate sites to host ISR systems for both short- and long-term deployments. Site surveys are conducted to develop installation plans considering mechanical and electrical interfaces, communication systems, on-site manpower, and spectral interference.
We operate deployed ISR systems to collect and process data from multiple sensors. Activities include sensor tasking, data transfer/processing/analysis, and site maintenance. We support operation scenarios ranging from daily routine operations to high-priority single-event activities, developing custom user interfaces and scenario visualizations for intuitive use.
Analysis and Reporting
We develop custom analysis and reporting tools to convert ISR sensor data into actionable threat intelligence information. As sensor data are captured, we process and analyze the data to characterize threats; identify patterns and trends; and ultimately, understand adversary intent. We develop a variety of custom software solutions for analysis, including signal processing tools, databases, machine learning applications, all-source data fusion, and data visualizations. Analysis results are captured in reports and web-based tools that are disseminated to multiple customers.