Electronic Camouflage In Future Warfare

Traditional visual camouflage will no longer be adequate in future operating environments against more capable US adversaries, one intelligence official believes.

“The Marine Corps really has to get better at keeping our activities, our movements and our presence masked in the current electromagnetic environment where it is incredibly easy for adversaries … to identify and locate people, capabilities and forces,” a senior Marine intelligence officer said. Electronic camouflage becomes an essential element in the future battlefield. This is not unique to the Marines, the US Army, is also grappling with this problem.

“We can get all camouflaged up, we can hide in holes, we can put camouflage nets on, wear ghillie suits, camo up our faces, color our teeth green and you can’t see us at all until I push the button on my radio to talk, to tell my boss: ‘Hey, I’m here,’” said Col. Jeffery Church last year when he was chief of strategy and policy at the Army’s Cyber Directorate within G-3/5/7.

“All that physical camouflage from the eyeball just went away because now you’re broadcasting in the spectrum. So we can show that to commanders and they can start getting an appreciation of how the spectrum is a capability for them and a vulnerability,” he said at the time.

The Marines are implementing policies, tactics, techniques and procedures into exercises. They are taking a look at themselves in the field, he explained, trying to understand what the Marine Air Ground Task Force looks like from an electromagnetic spectrum perspective when it’s running around an exercise environment.

Understanding these signatures is incredibly important, he said, because the US must “get on top of this before the adversary makes us pay the price.”

According to c4isrnet.com, the Marines have also experimented with tools to help them not only understand their signature, but plan and visualise effects in the nonphysical electromagnetic spectrum with solutions like RadioMap, developed by the Defense Advanced Research Projects Agency in partnership with industry.

RadioMap is a software-based geographic information system framework allowing for customisable plugins using heat maps of the radio frequency picture and regions where devices might be emitting.

Though commanders will often take a risk-management approach, sometimes deciding to entirely cut off communications as to not risk EMS detection, Dave Ochmanek of the think tank Rand doesn’t believe this will completely solve the problem against a near-peer competitor in the future operating environment.

Just reducing the Communications footprint alone won’t work, given adversaries’ detection capabilities such as electro-optical sensors and syntactic aperture radar. Thus, he said during the same panel, a strategy for reducing detectability has to be part of a broader strategy that takes into account these advanced sensing capabilities.

Unlike the last 16 years of war against a technologically inferior enemy, “now we may face actors that have more sensors, looking at us more than we do at them,” Ochmanek said.

Chudoba believes the US stands to learn from Russia and its use of electronic warfare. “I think we can learn from our Russian friends if we rewind the movie and look at what they did on the global stage over the last decade or so,” he said.

I-HLS

You Might Also Read: 

Electronic Warfare Development Rate:

New Material Promises NSA-proof Wallpaper:

 

« Self-Drive Cars Coming to Manhattan
Tech Giants Face US Congress Over Russia Election »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

National Agency for the Security of Information Systems (ANSSI) - France

National Agency for the Security of Information Systems (ANSSI) - France

The role of Agence Nationale de la Sécurité des Systèmes d'Information (ANSSI) is to foster a coordinated, ambitious, pro-active response to cybersecurity issues in France.

Law Enforcement Cyber Center (LECC)

Law Enforcement Cyber Center (LECC)

LECC is designed to assist police, digital forensic investigators, detectives, and prosecutors who are investigating and preventing crimes that involve technology.

Adlink Technology

Adlink Technology

ADLINK is a leading provider of embedded computing products and services for applications including IoT and industrial automation.

GoCyber

GoCyber

GoCyber is a new, highly innovative cyber security training app that uses action based learning to significantly improve the online behaviour of all employees in less than a month.

Abacode

Abacode

Abacode is a Managed Security Services Provider (MSSP). We help businesses consolidate all of their Regulatory Compliance & Cybersecurity needs, under one roof.

Startups.be

Startups.be

Startups.be helps tech entrepreneurs to be successful by providing quality access to service providers, business partners, customers and investors.

Internet Infrastructure Investigation

Internet Infrastructure Investigation

Internet Infrastructure Investigation offers a bespoke Internet Governance Solution to your brands online infringement problems.

Littlefish

Littlefish

Littlefish provide world-class, award-winning Managed IT and Cyber Security Services, delivered from our 24/7 UK service centres.

AirITSystems

AirITSystems

AirITSystems offer companies comprehensive IT security solutions that take all security considerations into account and are tailored to your business.

Avancer Corporation

Avancer Corporation

Avancer Corporation is a multi-system integrator focusing on Identity and Access Management (IAM) Technology. Founded in 2004.

Securious

Securious

If you need to improve your cyber security or achieve cyber security accreditations, Securious provide an independent service that will identify and address your issues quickly and efficiently.

Vertek

Vertek

Vertek is a leading provider of operations consulting, end-to-end business process outsourcing, business intelligence, software applications and managed cybersecurity solutions.

Astran

Astran

At Astran, we revolutionize data security by introducing a groundbreaking solution for data confidentiality headaches.

Cysmo Cyber Risk

Cysmo Cyber Risk

Cysmo is an innovative cyber risk assessment platform specifically designed for the needs of the German insurance industry.

Datos Insights

Datos Insights

Datos Insights is a leading global provider of insights, data, and advisory services to the financial services, insurance, and retail technology industries.

Noma Security

Noma Security

Noma Security's mission is Application Security for the Entire Data & AI Lifecycle.