Electronic Warfare Development Rate

The US Army’s Rapid Capabilities Office (RCO) has recently sent its near-term electronic warfare (EW) capability solution to Europe, and soldiers there will get a chance to try it out, according to RCO Director Doug Wiltsie 

The RCO is designed to zero in on the Army’s largest requirements with the intent to deliver capabilities within a one- to five-year horizon. It’s part of the service’s aggressive overhaul to its troubled procurement system and pushes even beyond acquisition reform outlined in congressional defense policy.

The office claimed it would prioritise developing capability in the areas of electronic warfare; position, cyber, navigation and timing that were neglected in the counter-insurgency operations of the past 15 years. Now that the US Army anticipates battling more near-peer adversaries in contested environments, it is refocusing on ensuring its capability overmatch those possible enemies. By December, the RCO had approved a strategy for a phased way to rapidly prototype electronic warfare capability. 
“It was very clear that the strategic gap in EW was the ability for NATO and the American participation in NATO to be able to do ground maneuver in a contested environment,” Wiltsie said. “So what we’re focused on is being able to field a capability that will allow the maneuver force the ability to ground maneuver in a contested environment.” 

The prototype will be tried out in an operational assessment during the Saber Guardian exercise in Romania, Hungary, and Bulgaria. The Army will run another operational assessment in October and then take the information to the RCO for a decision on whether to field the capability to designated units.  

The second element in the prototype will have an offensive capability, Wiltsie said. “Everything looks very, very good,” he added. “It’s providing soldiers the ability to understand the electromagnetic spectrum that they are in, are you being jammed, or what other radios/emitters are in your environment.” 

The next phase, Wiltsie said, will tackle how to integrate the EW prototype onto a vehicle and how troops will use it. “One of the questions that we have to be able to answer to the board is: Could you do this with the existing organizations and troops that you have, or do we need to augment troops in order to be able to do this?” 

An element of the EW solution would incorporate cyber capability, but the RCO is also working with US Army Cyber Command on both offensive and defensive capabilities with more of a focus on the defensive side first. The RCO has delivered an infrastructure solution to cyber forces and is working on a situational understanding capability. That capability is currently in source selection, and an award will be made soon. 

For position, navigation and timing (PNT) the RCO is looking at five to seven different technologies “to see which one gives us either the best performance or is the fastest that we can incorporate,” Wiltsie said. “The idea is to spend very little money on a multitude of options to take them to some kind of assessment and then come back to the board and say: ‘We believe this one or these two are the ones that we want to go forward with,’ he noted.

I-HLS

You Might Also Read:

Drones, Satellites And Cyber Warfare:

Cyber War Calls For A New Look US Soldier:

‘Cyber War’ Is Fast Becoming Just ‘War’:

 

 

« North Korea's Unit 180 Managed WannaCry Attack
Crimes Of The Future Will Be Solved Using IT, Robot CSIs, Smell & VR »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

mile2

mile2

Mile2 develop and deliver proprietary vendor neutral professional certifications for the cyber security industry.

Kaseya

Kaseya

Kaseya is a premier provider of unified IT management and security software for managed service providers (MSPs) and small to medium-sized businesses (SMBS).

Teradata

Teradata

Teradata is a leading provider of enterprise big data analytics and services. Applications include Cyber Security Analytics.

Forensic Control

Forensic Control

Forensic Control specialise in providing simple & straightforward Cyber Security to organisations, helping them assess, prevent and respond to cyber threats.

Orange Cyberdefense

Orange Cyberdefense

Orange Cyberdefense is the expert cybersecurity business unit of the Orange Group, providing managed security, managed threat detection & response services to organizations around the globe.

Sysorex Government Services

Sysorex Government Services

Sysorex Government Services helps customers meet their strategic missions by providing secure, optimized IT solutions that allow them to perform more efficiently and effectively.

CounterCraft

CounterCraft

The CounterCraft Cyber Deception Platform fits seamlessly into existing security strategies and delivers high-end deception for threat hunting and threat detection.

RHEA Group

RHEA Group

RHEA Group offers aerospace and security engineering services and solutions, system development, and technologies including cyber security.

Open Cloud Factory

Open Cloud Factory

Open Cloud Factory is a European based security company, that strives to ease the pressure on IT managers, by providing tools to implement your Security Strategy in an effective and easy manner.

Immuta

Immuta

Immuta empowers data engineering and operations teams to automate data governance, security, access control & privacy protection.

vCISO Services

vCISO Services

vCISO Services is a small, specialized, veteran-owned firm focused on the needs of SMBs only.

MindWise

MindWise

MindWise is a comprehensive global threat monitoring solution with implementations for fraud prevention and enterprise threat intelligence.

CI-ISAC Australia

CI-ISAC Australia

CI-ISAC has been designed to support and promote existing legislation and Government initiatives that are working to uplift cyber resilience across critical infrastructure sectors.

Inroad Technologies

Inroad Technologies

Inroad Technologies provide IT services that help keep your business computers, servers and networks secure and trouble-free.

CompassMSP

CompassMSP

CompassMSP deliver Managed IT and cybersecurity solutions designed to unleash your business's full potential.

CyberAntix

CyberAntix

CyberAntix offers Premium CyberSecurity for your business using an advanced Security Operations Centre technology and process platform reinforced by a steadfast and expert SOC team.