Electronic Camouflage In Future Warfare

Traditional visual camouflage will no longer be adequate in future operating environments against more capable US adversaries, one intelligence official believes.

“The Marine Corps really has to get better at keeping our activities, our movements and our presence masked in the current electromagnetic environment where it is incredibly easy for adversaries … to identify and locate people, capabilities and forces,” a senior Marine intelligence officer said. Electronic camouflage becomes an essential element in the future battlefield. This is not unique to the Marines, the US Army, is also grappling with this problem.

“We can get all camouflaged up, we can hide in holes, we can put camouflage nets on, wear ghillie suits, camo up our faces, color our teeth green and you can’t see us at all until I push the button on my radio to talk, to tell my boss: ‘Hey, I’m here,’” said Col. Jeffery Church last year when he was chief of strategy and policy at the Army’s Cyber Directorate within G-3/5/7.

“All that physical camouflage from the eyeball just went away because now you’re broadcasting in the spectrum. So we can show that to commanders and they can start getting an appreciation of how the spectrum is a capability for them and a vulnerability,” he said at the time.

The Marines are implementing policies, tactics, techniques and procedures into exercises. They are taking a look at themselves in the field, he explained, trying to understand what the Marine Air Ground Task Force looks like from an electromagnetic spectrum perspective when it’s running around an exercise environment.

Understanding these signatures is incredibly important, he said, because the US must “get on top of this before the adversary makes us pay the price.”

According to c4isrnet.com, the Marines have also experimented with tools to help them not only understand their signature, but plan and visualise effects in the nonphysical electromagnetic spectrum with solutions like RadioMap, developed by the Defense Advanced Research Projects Agency in partnership with industry.

RadioMap is a software-based geographic information system framework allowing for customisable plugins using heat maps of the radio frequency picture and regions where devices might be emitting.

Though commanders will often take a risk-management approach, sometimes deciding to entirely cut off communications as to not risk EMS detection, Dave Ochmanek of the think tank Rand doesn’t believe this will completely solve the problem against a near-peer competitor in the future operating environment.

Just reducing the Communications footprint alone won’t work, given adversaries’ detection capabilities such as electro-optical sensors and syntactic aperture radar. Thus, he said during the same panel, a strategy for reducing detectability has to be part of a broader strategy that takes into account these advanced sensing capabilities.

Unlike the last 16 years of war against a technologically inferior enemy, “now we may face actors that have more sensors, looking at us more than we do at them,” Ochmanek said.

Chudoba believes the US stands to learn from Russia and its use of electronic warfare. “I think we can learn from our Russian friends if we rewind the movie and look at what they did on the global stage over the last decade or so,” he said.

I-HLS

You Might Also Read: 

Electronic Warfare Development Rate:

New Material Promises NSA-proof Wallpaper:

 

« Self-Drive Cars Coming to Manhattan
Tech Giants Face US Congress Over Russia Election »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

National Institute of Standards & Technology (NIST)

National Institute of Standards & Technology (NIST)

NIST is a measurement standards laboratory, and a non-regulatory agency of the United States Department of Commerce. Areas covered include IT and cybersecurity.

StackRox

StackRox

StackRox delivers a container-native security platform that adapts detection and response to new threats.

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

OGCIO supports the development of community-wide information technology infrastructure and setting of technical and professional standards to strengthen Hong Kong’s position as a world digital city.

Proton Data Security

Proton Data Security

Proton Data Security is a certified small business specializing in the design, manufacturing and sales of data security products for permanent erasure of hard drives, tapes and optical media.

PurpleSynapz

PurpleSynapz

PurpleSynapz provides hyper-realistic Cyber Security Training with a modern curriculum and Cyber Range.

SAP National Security Services (NS2)

SAP National Security Services (NS2)

SAP NS2 are dedicated to delivering the best of SAP innovation, from cloud to predictive analytics; machine learning to data fusion.

Thrive

Thrive

Thrive delivers the experience, resources, and expertise needed to create a comprehensive cyber security plan that covers your vital data, SaaS applications, end users, and critical infrastructure.

NOW Insurance

NOW Insurance

NOW Insurance provides small business owners and other professional classes with a seamless purchasing experience for general liability, professional liability, and cybersecurity insurance coverage.

Security Risk Management (SRM)

Security Risk Management (SRM)

SRM provide a comprehensive security risk management service encompassing people, processes, technology, governance, compliance and risk management.

Grove Group

Grove Group

Grove provides businesses with the tools that work best for their unique operations, through cybersecurity and cloud services, custom software development and our big data analytics expertise.

Scybers

Scybers

Scybers are a global cybersecurity advisory and managed services company. With our deep expertise, we help our clients reduce their cyber risks with confidence.

ZX Security

ZX Security

ZX Security is a New Zealand owned and operated cyber security consultancy.

SecurityBridge

SecurityBridge

SecurityBridge provide a cybersecurity connection between our customers’ IT departments, the forward-facing business services, and their SAP applications.

Acumen

Acumen

Acumen's cyber security engineers protect your critical systems, in critical moments. We are here when you need us most.

Boston Government Services (BGS)

Boston Government Services (BGS)

Boston Government Services is an engineering, technology, and security firm providing mission-focused solutions for the clean energy, nuclear, and federal programs markets.

Vantyr

Vantyr

Vantyr's core mission is to safeguard the business-led adoption of SaaS applications by automating the lifecycle management and security of non-human identities.