Electronic Warfare Development Rate

The US Army’s Rapid Capabilities Office (RCO) has recently sent its near-term electronic warfare (EW) capability solution to Europe, and soldiers there will get a chance to try it out, according to RCO Director Doug Wiltsie 

The RCO is designed to zero in on the Army’s largest requirements with the intent to deliver capabilities within a one- to five-year horizon. It’s part of the service’s aggressive overhaul to its troubled procurement system and pushes even beyond acquisition reform outlined in congressional defense policy.

The office claimed it would prioritise developing capability in the areas of electronic warfare; position, cyber, navigation and timing that were neglected in the counter-insurgency operations of the past 15 years. Now that the US Army anticipates battling more near-peer adversaries in contested environments, it is refocusing on ensuring its capability overmatch those possible enemies. By December, the RCO had approved a strategy for a phased way to rapidly prototype electronic warfare capability. 
“It was very clear that the strategic gap in EW was the ability for NATO and the American participation in NATO to be able to do ground maneuver in a contested environment,” Wiltsie said. “So what we’re focused on is being able to field a capability that will allow the maneuver force the ability to ground maneuver in a contested environment.” 

The prototype will be tried out in an operational assessment during the Saber Guardian exercise in Romania, Hungary, and Bulgaria. The Army will run another operational assessment in October and then take the information to the RCO for a decision on whether to field the capability to designated units.  

The second element in the prototype will have an offensive capability, Wiltsie said. “Everything looks very, very good,” he added. “It’s providing soldiers the ability to understand the electromagnetic spectrum that they are in, are you being jammed, or what other radios/emitters are in your environment.” 

The next phase, Wiltsie said, will tackle how to integrate the EW prototype onto a vehicle and how troops will use it. “One of the questions that we have to be able to answer to the board is: Could you do this with the existing organizations and troops that you have, or do we need to augment troops in order to be able to do this?” 

An element of the EW solution would incorporate cyber capability, but the RCO is also working with US Army Cyber Command on both offensive and defensive capabilities with more of a focus on the defensive side first. The RCO has delivered an infrastructure solution to cyber forces and is working on a situational understanding capability. That capability is currently in source selection, and an award will be made soon. 

For position, navigation and timing (PNT) the RCO is looking at five to seven different technologies “to see which one gives us either the best performance or is the fastest that we can incorporate,” Wiltsie said. “The idea is to spend very little money on a multitude of options to take them to some kind of assessment and then come back to the board and say: ‘We believe this one or these two are the ones that we want to go forward with,’ he noted.

I-HLS

You Might Also Read:

Drones, Satellites And Cyber Warfare:

Cyber War Calls For A New Look US Soldier:

‘Cyber War’ Is Fast Becoming Just ‘War’:

 

 

« North Korea's Unit 180 Managed WannaCry Attack
Crimes Of The Future Will Be Solved Using IT, Robot CSIs, Smell & VR »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Brookings Institution

Brookings Institution

The Brookings Institution is a nonprofit public policy organization. Cyber security is covered within the various study areas.

360Logica

360Logica

360Logica is a software testing company offering numerous kinds of testing services to improve the quality and performance of your software and IT systems.

Boldon James

Boldon James

Boldon James are market leaders in data classification and secure messaging software.

Dathena

Dathena

Dathena is a company developing data governance software based on machine learning algorithms.

NinjaJobs

NinjaJobs

NinjaJobs is a community-run job platform developed by information security professionals. We focusing strictly on cybersecurity positions.

Splone

Splone

Splone is a Berlin-based IT security research team and consultancy. We help improve IT-security by offering red team assements, penetration tests, audits and customized consulting.

Cyway

Cyway

Cyway is a value-added cybersecurity distributor focusing on on-prem, cloud solutions and hybrid solutions, IoT, AI & machine learning IT security technologies.

Veridium

Veridium

Veridium is a leader in single step - multi factor biometric authentication, designed to safeguard enterprises’ most critical assets.

Bedrock Systems

Bedrock Systems

BedRock Systems is on a mission to deliver a trusted computing base from edge to cloud, where safety and security isn’t just a perception, it’s a formally proven reality.

Votiro

Votiro

Votiro is an award-winning cybersecurity company that specializes in file sanitization, ensuring every organization is safe from zero-day and undisclosed attacks.

Timus Networks

Timus Networks

Timus Networks enables today's work from anywhere organizations to secure their networks very easily and cost effectively.

SafePaas

SafePaas

SafePaas is a leading Enterprise Risk Management Platform. One source of truth for all your Audit, Risk, and Compliance requirements. Complete governance across your systems.

OryxLabs

OryxLabs

OryxLabs provide advanced enterprise digital risk protection solutions. Learn more about how 24x7 continuous assessment, monitoring, and improvement can secure your network.

Gogolook

Gogolook

Gogolook is a leading TrustTech company. With "Build for Trust" as its core value, it aims to create an AI- and data-driven global anti-fraud network as well as Risk Management as a Service.

Hughes Network Systems

Hughes Network Systems

Hughes are industry leaders in networking technologies and services, innovating constantly to deliver the global solutions that power a connected future for people, enterprises and things everywhere.

Liverton Security

Liverton Security

Liverton Security is a New Zealand-owned cyber security provider offering consultancy and security-related products to government and commercial customers throughout New Zealand.