Electronic Camouflage In Future Warfare

Traditional visual camouflage will no longer be adequate in future operating environments against more capable US adversaries, one intelligence official believes.

“The Marine Corps really has to get better at keeping our activities, our movements and our presence masked in the current electromagnetic environment where it is incredibly easy for adversaries … to identify and locate people, capabilities and forces,” a senior Marine intelligence officer said. Electronic camouflage becomes an essential element in the future battlefield. This is not unique to the Marines, the US Army, is also grappling with this problem.

“We can get all camouflaged up, we can hide in holes, we can put camouflage nets on, wear ghillie suits, camo up our faces, color our teeth green and you can’t see us at all until I push the button on my radio to talk, to tell my boss: ‘Hey, I’m here,’” said Col. Jeffery Church last year when he was chief of strategy and policy at the Army’s Cyber Directorate within G-3/5/7.

“All that physical camouflage from the eyeball just went away because now you’re broadcasting in the spectrum. So we can show that to commanders and they can start getting an appreciation of how the spectrum is a capability for them and a vulnerability,” he said at the time.

The Marines are implementing policies, tactics, techniques and procedures into exercises. They are taking a look at themselves in the field, he explained, trying to understand what the Marine Air Ground Task Force looks like from an electromagnetic spectrum perspective when it’s running around an exercise environment.

Understanding these signatures is incredibly important, he said, because the US must “get on top of this before the adversary makes us pay the price.”

According to c4isrnet.com, the Marines have also experimented with tools to help them not only understand their signature, but plan and visualise effects in the nonphysical electromagnetic spectrum with solutions like RadioMap, developed by the Defense Advanced Research Projects Agency in partnership with industry.

RadioMap is a software-based geographic information system framework allowing for customisable plugins using heat maps of the radio frequency picture and regions where devices might be emitting.

Though commanders will often take a risk-management approach, sometimes deciding to entirely cut off communications as to not risk EMS detection, Dave Ochmanek of the think tank Rand doesn’t believe this will completely solve the problem against a near-peer competitor in the future operating environment.

Just reducing the Communications footprint alone won’t work, given adversaries’ detection capabilities such as electro-optical sensors and syntactic aperture radar. Thus, he said during the same panel, a strategy for reducing detectability has to be part of a broader strategy that takes into account these advanced sensing capabilities.

Unlike the last 16 years of war against a technologically inferior enemy, “now we may face actors that have more sensors, looking at us more than we do at them,” Ochmanek said.

Chudoba believes the US stands to learn from Russia and its use of electronic warfare. “I think we can learn from our Russian friends if we rewind the movie and look at what they did on the global stage over the last decade or so,” he said.

I-HLS

You Might Also Read: 

Electronic Warfare Development Rate:

New Material Promises NSA-proof Wallpaper:

 

« Self-Drive Cars Coming to Manhattan
Tech Giants Face US Congress Over Russia Election »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IASME Consortium

IASME Consortium

IASME is one of five companies appointed as Accreditation Bodies for assessing and certifying against the UK Government's Cyber Essentials Scheme.

Allen & Overy

Allen & Overy

Allen & Overy is an international law firm. Practice areas include Cybersecurity and Data Protection.

ThaiCERT

ThaiCERT

ThaiCERT is the national Computer Security Incident Response Team (CSIRT) for Thailand.

ControlScan

ControlScan

ControlScan is a Managed Security Services Provider (MSSP) - our primary focus is protecting your business and securing your sensitive data.

InfoWatch

InfoWatch

InfoWatch solutions allow you to protect data and information assets that are critically important to your business.

OSSEC

OSSEC

OSSEC is a scalable, multi-platform, open source Host-based Intrusion Detection System (HIDS).

Agio

Agio

Agio is a hybrid managed IT and cybersecurity provider servicing the financial services, health care and payments industries.

Maven Security Consulting

Maven Security Consulting

Maven Security Consulting helps companies secure their information assets and digital infrastructure by providing a wide range of customized consulting and training services.

BreachQuest

BreachQuest

BreachQuest brings together cybersecurity experts with decades of experience identifying security flaws, penetrating networks, and responding to incidents.

ExchangeDefender

ExchangeDefender

ExchangeDefender provides cybersecurity services that secures your company email and data, and guarantees 24/7 email access.

Association of Azerbaijani Cyber Security Organizations (AKTA)

Association of Azerbaijani Cyber Security Organizations (AKTA)

The Association of Azerbaijani Cyber Security Organizations (AKTA) is a non-commercial organization aimed at strengthening the country's cybersecurity system.

Anchor Technologies Inc (ATI)

Anchor Technologies Inc (ATI)

Anchor provides a full spectrum of cybersecurity services assisting our clients with all aspects of cybersecurity risk planning, identification, management, and monitoring.

CyberSalus

CyberSalus

CyberSalus is a pioneering cyber tech services company dedicated to protecting the digital integrity of healthcare organizations.

Eclypses

Eclypses

Eclypses has a disrupting cyber technology, offering organizations an advanced data security solution called MicroToken Exchange (MTE).

Quantum Bridge

Quantum Bridge

Our unbreakable key distribution technology ensures the highest level of protection for your critical infrastructure and sensitive data in an evolving digital landscape.

Prowler

Prowler

Prowler is at the forefront of the Open Cloud Security movement, championing a new era of transparency, customizability, and community-driven security for cloud environments.