Hands on in Signal intelligence, Electronic Warfare, CEMA for Security applications

Oct 4th and 5th, 2023
Grand Hyatt, Kochi, India


Hands on in Signal intelligence, Electronic Warfare, CEMA for Security applications

  1. Understanding the history of Electronic warfare
  2. How Electronic warfare can
  3. Categories and sub categories in ELINT and SIGINT
  4. Electromagnetic spectrum operation and management
  5. Hands on with SDR and EW
  6. Intersection of EW and cyber operations

Course Content (ToC):

  1. EW -101
  2. SDR-101
  3. Wireless communication -101
  4. GRC
  5. Hands on with SDR
  6. Flow graph building constraints
  7. Basic tone Tx and Flow graph
  8. Basic FM demodulation in GRC and out of tree software
  9. Radiotap for CEMA
  10. Physical layer reversing of signals
  11. Jammer basics
  12. Jammer Hands on
  13. CTF on the above mentioned topics
  14. Pre-requisite:

    • Basic Knowledge of Radio
    • Beginner level Python Skills
    • Basic Knowledge of Embedded Signals
    • Basic Linux commands

    Participants Requirements:

    • Laptop with basic configuration (4gb ram)
    • Internet connection
    • Ubuntu 20.04 (mandatory installed not virtual box or vmware)


    2 Days (6 Hours each day min)

    Who Should Attend:

    • ECE students, M.Tech Students and Phd students
    • Faculties
    • Law enforcement agency officials

    What to Expect:

    • EW-101, SDR applications EW

    What not to expect:

    • Becoming an expert in EMSO or telecom interception


Samarth Bhaskar Bhat

Technical Director , Reinfosec , India

▪ Security Architect
▪ Over six years of experience in Information Security, design and development of Application
▪ Software.
▪ Audited 50+ business Web-Applications in the areas of Banking, Finance, Insurance, Trading and eCommerce.
▪ Conducted security audit of Payment Gateway.
▪ Expertise in handling various Application security Assessments, Penetration Tests and Vulnerability Assessment
▪ Good work exposure on implementation of SOC (Security Operation Centre) and Data Loss Prevention
▪ Proficient in understanding application level vulnerabilities like XSS, SQL injection, response splitting attacks, session hijacking, authorization bypass, weak cryptography, authentication flaws & design level vulnerabilities along with the defence mechanisms.
▪ Expert in web security testing tools like Proxy Editors, Network Sniffing tools, Web Vulnerability scanners, flash de-compilers.
▪ Well versed with OWASP Top 10
▪ Proficiency in creating Threat profile for different types of applications
▪ Knowledge of different phases, methodologies, concepts and procedures involved in the PT/VA.
▪ Good understanding of vulnerability scanners like Nessus, QualysGuard, Rapid7 and Symantec CCSVM.
▪ Expertise in implementation and configuration disk encryption and email encryption (PGP)
▪ Sound knowledge on remediation process for the vulnerabilities identified during the assessment
▪ Proficient in Information security reporting for executive management
▪ Trained in secure code review of .NET applications.
▪ Trained in web services testing methodology.
▪ Sound knowledge of T-SQL, Crystal Reports, VBA, C# (Winforms), Visual Basic.NET
▪ Expertise in database programming
▪ Experienced with exposure and experience in understanding, reversing and
▪ fuzzing wireless protocols in the RF-Layer of systems.
▪ Experienced in reversing hardware protocols and implementing hardware attacks and threat-modelling of Wireless and Signals Systems. Have previous exposure and experience in Signal Design and Offensive Signal Tactics. Presently working on application of EW and SIGINT techniques in the Aerospace and Defence domain. Personal projects include machine learning and deep learning methods of recognition and deepfaking signals that can cause signal cant impact on the physical domain/layer of systems and OpenWRT for mesh networking.
▪ Signal Detection meta information extraction of signals using Commercially available SDR platforms.
▪ Protocol decomposition ofsignal of interest.
▪ Baseline formulation of minimum jamming requirements for RADAR and datalink.
▪ Utilization of SDR for SIGINT and ELINT in drones.
▪ Proof of Concept development of DRFM systems using commercially available SDR.
▪ Telecom signal (LTE) reconnaissance using commercially available SDR/
▪ Radio Direction Finding (RDF) and aggregation using commercially avaialble SDR.
▪ Establishment of CEMA guidelines for EW and Cross layer protocol research.
▪ Bechmarking of default DSP algorithms in GP-CPU's using python (adopted from BDTI guidelines).
▪ Network metrics computation of IQ data transfer metrics on mesh networks for SIGINT and ELINT operations.
▪ Wideband FHSS interception techniques using aliasing and FFT shot detection.
▪ Development of PoC of Automatic Modulation Recognition techniques using function models in python.
▪ 3D cyclostationary analysis ofsignalsfor operator visulalization.
▪ IQ signal generator and interference generator using SDR for RDF testing.
▪ Information security baseline for CEMA and ELINT operations

Workshop Assistant

Aditya Arun Kumar

Advisor and Trainer , South Indian- software defined radio (SI-SDR) group , India

Aditya arun Kumar is a SDR hobbyist who’s been doing SDR work for more than 5 years now. He has previous exposure to digital signal processing system and blind signal analysis and SDR applications for electronic warfare. He is interested in signal reversing and analysis of signal and physical layer security and building custom framework for communication systems. He is currently working on applications on Machine and Deep learning techniques for communication system as a hobby project.


Information Security Research Association Kerala Police


UNICEF UNICRI Centre for Artificial Intelligence and Robotics International Centre for Missing & Exploited Children WeProtect Global Alliance CESP | Conseil Européen des Syndicats de Police Kerala IT Mission


Federal Bank Synthite RP GRPUP


Keyzotrick Intelligence Pvt. Ltd National Critical Information Infrastructure Protection Centre Bharat Petroleum Palo Alto Networks Cyble - Cybersecurity Threat Intelligence Platform & Solutions Seqrite


Cochin Shipyard ICICI Bank State Bank of India SBI Life Geojit SFS Homes Cochin International Airport Manage Engine Resecurity: Cybersecurity Solutions and Services Fortinet Technologies India Pvt Ltd &


GAIL (india) LIMITED Canara Bank Elite Foods CSB Bank Petronet LNG Luker India Trend Micro AVT Natural CYFIRMA Indian Oil Corporation Cochin Port Trust Kerala State Industrial Development Corporation ESAF Bank The Kerala Minerals and Metals Limited


PureID Cyble - Cybersecurity Threat Intelligence Platform & Solutions Resecurity: Cybersecurity Solutions and Services Prophaze Manage Engine Darwis Fortinet Technologies India Pvt Ltd & Alibi Global Private Limited eSec Forte Technologies Palo Alto Networks Seqrite Innspark Enterprise Security C-DAC: Centre for Development of Advanced Computing, India ECS Biztech State Bank of India Kratikal Tech Pvt. Ltd. CYFIRMA TerraEagle Netskope Geojit


EliteCISOs GTech - Group of Technology Companies - Technopark, Infopark, Cyberpark BSides Odisha


WTC Kochi


Information Security Media Group The 420



Jet Suit demo partner


c0c0n @16

c0c0n is a 15 years old platform that is aimed at providing opportunities to showcase, educate, understand and spread awareness on Information Security, data protection, and privacy...

Where & When?

Oct 04th to 07th 2023
Grand Hyatt, Kochi, India

Reach us @

(+91) 974-690-6654