Electronic Warfare Development Rate

The US Army’s Rapid Capabilities Office (RCO) has recently sent its near-term electronic warfare (EW) capability solution to Europe, and soldiers there will get a chance to try it out, according to RCO Director Doug Wiltsie 

The RCO is designed to zero in on the Army’s largest requirements with the intent to deliver capabilities within a one- to five-year horizon. It’s part of the service’s aggressive overhaul to its troubled procurement system and pushes even beyond acquisition reform outlined in congressional defense policy.

The office claimed it would prioritise developing capability in the areas of electronic warfare; position, cyber, navigation and timing that were neglected in the counter-insurgency operations of the past 15 years. Now that the US Army anticipates battling more near-peer adversaries in contested environments, it is refocusing on ensuring its capability overmatch those possible enemies. By December, the RCO had approved a strategy for a phased way to rapidly prototype electronic warfare capability. 
“It was very clear that the strategic gap in EW was the ability for NATO and the American participation in NATO to be able to do ground maneuver in a contested environment,” Wiltsie said. “So what we’re focused on is being able to field a capability that will allow the maneuver force the ability to ground maneuver in a contested environment.” 

The prototype will be tried out in an operational assessment during the Saber Guardian exercise in Romania, Hungary, and Bulgaria. The Army will run another operational assessment in October and then take the information to the RCO for a decision on whether to field the capability to designated units.  

The second element in the prototype will have an offensive capability, Wiltsie said. “Everything looks very, very good,” he added. “It’s providing soldiers the ability to understand the electromagnetic spectrum that they are in, are you being jammed, or what other radios/emitters are in your environment.” 

The next phase, Wiltsie said, will tackle how to integrate the EW prototype onto a vehicle and how troops will use it. “One of the questions that we have to be able to answer to the board is: Could you do this with the existing organizations and troops that you have, or do we need to augment troops in order to be able to do this?” 

An element of the EW solution would incorporate cyber capability, but the RCO is also working with US Army Cyber Command on both offensive and defensive capabilities with more of a focus on the defensive side first. The RCO has delivered an infrastructure solution to cyber forces and is working on a situational understanding capability. That capability is currently in source selection, and an award will be made soon. 

For position, navigation and timing (PNT) the RCO is looking at five to seven different technologies “to see which one gives us either the best performance or is the fastest that we can incorporate,” Wiltsie said. “The idea is to spend very little money on a multitude of options to take them to some kind of assessment and then come back to the board and say: ‘We believe this one or these two are the ones that we want to go forward with,’ he noted.

I-HLS

You Might Also Read:

Drones, Satellites And Cyber Warfare:

Cyber War Calls For A New Look US Soldier:

‘Cyber War’ Is Fast Becoming Just ‘War’:

 

 

« North Korea's Unit 180 Managed WannaCry Attack
Crimes Of The Future Will Be Solved Using IT, Robot CSIs, Smell & VR »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYBERPOL

CYBERPOL

CYBERPOL is the leading Public Utility Agency for investigating cyber crimes and cyber attacks by criminals, international adversaries.

Resource Centre for Cyber Forensics (RCCF)

Resource Centre for Cyber Forensics (RCCF)

RCCF is a pioneering institute, pursuing research activities in the area of Cyber Forensics.

Atlantic Council Digital Forensic Research Lab (DFRLab)

Atlantic Council Digital Forensic Research Lab (DFRLab)

The Atlantic Council’s DFRLab has operationalized the study of disinformation by exposing falsehoods and fake news, documenting human rights abuses, and building digital resilience worldwide.

sayTEC

sayTEC

sayTEC's mission is to develop and deliver next-generation products and services in encrypted data and voice transmission.

Chronicle

Chronicle

Chronicle products combine intelligence about global threats in the wild, threats inside your network, and unique signals about both.

Network Integrated Business Solutions (NIBS)

Network Integrated Business Solutions (NIBS)

NIBS is an IT services provider offering a range of services with the aim of simplifying and securing technology.

Crosser

Crosser

The Crosser Platform enables real-time processing of streaming or batch data for Industrial IoT, Data Transformation, Analytics, Automation and Integration.

NSW Cyber Security Innovation Node

NSW Cyber Security Innovation Node

NSW Cyber Security Innovation Node is part of a national network designed to foster and accelerate cyber capability and innovation across Australia.

IntaPeople

IntaPeople

IntaPeople are IT and engineering recruitment specialists. We have specialist teams for job sectors including Cybersecurity, IT infrastructure and DevOps.

KBR

KBR

To help governments and other agencies to combat cyber threats, KBR is safeguarding their most valuable systems with sophisticated tools, hardware and training.

RKVST

RKVST

RKVST is a powerful tool that builds trust in multi-party processes when it’s critical to have high assurance in data for confident decisions.

Persistent Systems

Persistent Systems

Persistent Systems are a trusted Digital Engineering and Enterprise Modernization partner, combining deep technical expertise and industry experience to help our clients.

Summit 7 (S7)

Summit 7 (S7)

Summit 7 is a national leader in cybersecurity, compliance, and managed services for the Aerospace and Defense industry and corporate enterprises.

TachTech

TachTech

TachTech is passionate about trust, security and privacy in the digital world. We create tailored security and compliance solutions to improve your business.

Quantum Squint

Quantum Squint

Quantum Squint is a cutting-edge cybersecurity company specializing in the use of advanced regression management techniques to detect, analyze, and prevent vulnerabilities in digital systems.

Validia

Validia

Validia is a deepfake cybersecurity service that provides proactive and reactive defense to the deepfake threat enterprises increasingly face with the rapid growth of generative AI.