Electronic Warfare Development Rate

The US Army’s Rapid Capabilities Office (RCO) has recently sent its near-term electronic warfare (EW) capability solution to Europe, and soldiers there will get a chance to try it out, according to RCO Director Doug Wiltsie 

The RCO is designed to zero in on the Army’s largest requirements with the intent to deliver capabilities within a one- to five-year horizon. It’s part of the service’s aggressive overhaul to its troubled procurement system and pushes even beyond acquisition reform outlined in congressional defense policy.

The office claimed it would prioritise developing capability in the areas of electronic warfare; position, cyber, navigation and timing that were neglected in the counter-insurgency operations of the past 15 years. Now that the US Army anticipates battling more near-peer adversaries in contested environments, it is refocusing on ensuring its capability overmatch those possible enemies. By December, the RCO had approved a strategy for a phased way to rapidly prototype electronic warfare capability. 
“It was very clear that the strategic gap in EW was the ability for NATO and the American participation in NATO to be able to do ground maneuver in a contested environment,” Wiltsie said. “So what we’re focused on is being able to field a capability that will allow the maneuver force the ability to ground maneuver in a contested environment.” 

The prototype will be tried out in an operational assessment during the Saber Guardian exercise in Romania, Hungary, and Bulgaria. The Army will run another operational assessment in October and then take the information to the RCO for a decision on whether to field the capability to designated units.  

The second element in the prototype will have an offensive capability, Wiltsie said. “Everything looks very, very good,” he added. “It’s providing soldiers the ability to understand the electromagnetic spectrum that they are in, are you being jammed, or what other radios/emitters are in your environment.” 

The next phase, Wiltsie said, will tackle how to integrate the EW prototype onto a vehicle and how troops will use it. “One of the questions that we have to be able to answer to the board is: Could you do this with the existing organizations and troops that you have, or do we need to augment troops in order to be able to do this?” 

An element of the EW solution would incorporate cyber capability, but the RCO is also working with US Army Cyber Command on both offensive and defensive capabilities with more of a focus on the defensive side first. The RCO has delivered an infrastructure solution to cyber forces and is working on a situational understanding capability. That capability is currently in source selection, and an award will be made soon. 

For position, navigation and timing (PNT) the RCO is looking at five to seven different technologies “to see which one gives us either the best performance or is the fastest that we can incorporate,” Wiltsie said. “The idea is to spend very little money on a multitude of options to take them to some kind of assessment and then come back to the board and say: ‘We believe this one or these two are the ones that we want to go forward with,’ he noted.

I-HLS

You Might Also Read:

Drones, Satellites And Cyber Warfare:

Cyber War Calls For A New Look US Soldier:

‘Cyber War’ Is Fast Becoming Just ‘War’:

 

 

« North Korea's Unit 180 Managed WannaCry Attack
Crimes Of The Future Will Be Solved Using IT, Robot CSIs, Smell & VR »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Avatu

Avatu

Avatu specialise in providing clients the advice, technology and tools they need to fight cyber and insider threats.

BGD E-GOV CIRT

BGD E-GOV CIRT

BGD e-GOV CIRT's mission is to support government efforts to develop ICT programs by establishing incident management capabilities within Bangladesh.

Dispersive Networks

Dispersive Networks

Dispersive Virtual Network is a carrier-grade software-defined programmable network that is inspired by battlefield-proven wireless radio techniques.

ISARA Corp

ISARA Corp

ISARA Corporation is a security solutions company specializing in creating class-defining quantum-safe cryptography for today's computing ecosystems.

iSecurity Consulting

iSecurity Consulting

iSecurity delivers a complete lifecycle of digital protection services across the globe for public and private sector clients.

Datacentrix

Datacentrix

Datacentrix provides end-to-end cybersecurity services for the operational technology (OT) and IT environments to monitor, assess and defend our customers' information assets.

Towerwall

Towerwall

Towerwall offers a comprehensive suite of security services and solutions using best-of-breed tools and information security services.

InfoSystems Inc

InfoSystems Inc

InfoSystems provides reliable IT solutions to build and maintain strong and secure systems for both SMB and enterprise organizations.

Dynamic Quest

Dynamic Quest

Dynamic Quest is a managed IT, cloud and security services companies, providing a comprehensive range of technology services including cybersecurity, backup and disaster recovery.

Prevasio

Prevasio

Prevasio is a next-gen Cloud Security Posture Management (CSPM) with a built-in Vulnerability and Anti-Malware Scan for Containers.

Avalanchio Technologies

Avalanchio Technologies

The Avalanchio platform gives you a complete solution to collect, process, and analyze security data to detect threats in real-time and analyze historical data using security DSL or SQL.

ClosingLock

ClosingLock

ClosingLock is the leading provider of wire fraud prevention software for the real estate industry.

Intelligent CloudCare

Intelligent CloudCare

Intelligent CloudCare, a division of IPS, is a full IT Services provider serving the needs of SMBs in the metropolitan New York City region.

Exalens

Exalens

With deep roots in AI-driven cyber-physical security research and intrusion detection, at Exalens, we are enhancing operational resilience for cyber-physical systems at the OT edge.

Guardian Angel Cyber

Guardian Angel Cyber

Guardian Angel Cyber, is your trusted ally in safeguarding your digital assets and online presence.

ITUS Secure Technologies

ITUS Secure Technologies

ITUS offer fully outsourced cybersecurity solutions working with leading security vendors, providing next-gen solutions.