Electronic Warfare Specialists On The Frontline

In the age of digital communications, the US Army’s ability to dominate the electromagnetic spectrum can significantly influence the outcome of future armed conflicts. Consequently, the US Army will pilot a new idea to place coders and software developers at the 'tactical edge' of the battlefield to reprogram electronic warfare and communications systems.

The US Army is preparing to field a raft of electronic warfare equipment, including combined cyber and signals intelligence, that it needs to be able to rapidly reprogram these systems to exploit new signals that it might encounter over the course of a conflict.

The pilot program, operation Starblazor, aims to identify gaps in Army capabilities and provide actionable information to develop military doctrine. In particular, Starblazor will  will help military leaders learn what is needed to train the cyber and electronic warfare operators with existing equipment and what these personnel will need for any future conflict

The US Army has recently created a new military occupational specialty within its cyber branch dedicated to software development. Those specialists sit alongside operators and build tools on the spot to keep up with the dynamic environment of cyberspace. During World War II, jamming missions conducted by Allied forces successfully disrupted German command and control systems and navigation capabilities. When adversaries used radio-controlled improvised explosive devices to attack ground forces in Afghanistan and Iraq, the US Army defended its Soldiers with newly developed tools that jammed radio-activated triggers.

Today, If the Army finds itself in a conflict with another nation-state, it will likely come across signals it hasn’t seen before. This presents problems for the force because it won’t know how to exploit or defeat those signals until it categorizes them.

In the Cold War, this could take years, but now with software-defined systems, new signals can be deployed, detected and tweaked in weeks. Starblazor will help determine what new code developers need and provide information for capability development for large acquisition programs while they’re still in the research and development phase.

Defense News:     I-HLS:      Army.mil:        C4SRNet:      CROWS:     Image: Unsplash

You Might Also Read:

Cyber Warfare Is The New Frontier:

 

« AI Reveals Iran’s Nuclear Weapons Factory
Cyber Liabilities Advisory Advocates Resilience »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Infineon Technologies

Infineon Technologies

Infineon is a leader in semiconductor solutions for a huge range of applications including automation, smart systems and security for the Internet of Things.

DG Technology

DG Technology

DG Technology is a customer-centric technology expert and business consultant that delivers services and products to minimize your information security, compliance, and business risks.

Threat Intelligence

Threat Intelligence

Threat Intelligence is a specialist security company providing penetration testing, threat intelligence, incident response and training services.

Network Integrated Business Solutions (NIBS)

Network Integrated Business Solutions (NIBS)

NIBS is an IT services provider offering a range of services with the aim of simplifying and securing technology.

Assac Networks

Assac Networks

Assac Networks ShieldIT is an app that completely protects any BYOD smartphone from both tapping and hacking.

OCM Business Systems

OCM Business Systems

OCM are experts in the safe, secure and responsible disposal of IT & EPoS assets.

Tokio Marine HCC

Tokio Marine HCC

Tokio Marine HCC is a leading specialty insurance group with a Financial and Professional product line including Tech and Cyber.

Inspira Enterprise

Inspira Enterprise

Inspira Enterprise is a leading digital transformation company with expertise in Cyber Security, Internet of Things (IOT), Blockchain, Big Data & Analytics, Intelligent Automation and Cloud Computing.

Terralogic

Terralogic

Terralogic is a software and IT services company, an expert in IoT, Cloud, DevOps, App development and Cybersecurity.

Nucleon Security

Nucleon Security

Nucleon Endpoint Detection and Response EDR is the most effective way to protect the value created by your organization against any threat.

HiScout

HiScout

HiScout is your integrated management system for IT governance, risk & compliance.

OpenAVN (DefenseArk)

OpenAVN (DefenseArk)

Defending your life online, keeping your data safe and private. We detect digital threats magnitudes faster than the leading antivirus software.

Aiden Technologies

Aiden Technologies

Aiden simplifies your IT process, giving you peace of mind and security by ensuring your computers get exactly the software they need and nothing else.

StrongBox IT

StrongBox IT

Strongbox IT provides solutions to secure web applications and infrastructure.

Blackwell Security

Blackwell Security

Blackwell is a driving force in healthcare cybersecurity, transforming how security operations are conducted within this critical sector.

Cyber Guards

Cyber Guards

Cyber Guards provide comprehensive, turn-key cyber security programs for small and mid-size business for about the cost of one full-time cybersecurity hire.