Electronic Warfare Specialists On The Frontline

In the age of digital communications, the US Army’s ability to dominate the electromagnetic spectrum can significantly influence the outcome of future armed conflicts. Consequently, the US Army will pilot a new idea to place coders and software developers at the 'tactical edge' of the battlefield to reprogram electronic warfare and communications systems.

The US Army is preparing to field a raft of electronic warfare equipment, including combined cyber and signals intelligence, that it needs to be able to rapidly reprogram these systems to exploit new signals that it might encounter over the course of a conflict.

The pilot program, operation Starblazor, aims to identify gaps in Army capabilities and provide actionable information to develop military doctrine. In particular, Starblazor will  will help military leaders learn what is needed to train the cyber and electronic warfare operators with existing equipment and what these personnel will need for any future conflict

The US Army has recently created a new military occupational specialty within its cyber branch dedicated to software development. Those specialists sit alongside operators and build tools on the spot to keep up with the dynamic environment of cyberspace. During World War II, jamming missions conducted by Allied forces successfully disrupted German command and control systems and navigation capabilities. When adversaries used radio-controlled improvised explosive devices to attack ground forces in Afghanistan and Iraq, the US Army defended its Soldiers with newly developed tools that jammed radio-activated triggers.

Today, If the Army finds itself in a conflict with another nation-state, it will likely come across signals it hasn’t seen before. This presents problems for the force because it won’t know how to exploit or defeat those signals until it categorizes them.

In the Cold War, this could take years, but now with software-defined systems, new signals can be deployed, detected and tweaked in weeks. Starblazor will help determine what new code developers need and provide information for capability development for large acquisition programs while they’re still in the research and development phase.

Defense News:     I-HLS:      Army.mil:        C4SRNet:      CROWS:     Image: Unsplash

You Might Also Read:

Cyber Warfare Is The New Frontier:

 

« AI Reveals Iran’s Nuclear Weapons Factory
Cyber Liabilities Advisory Advocates Resilience »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CyberArk Software

CyberArk Software

CyberArk is an established leader in privileged access management and offers the most complete set of Identity Security capabilities.

CyberSift

CyberSift

CyberSift is a cyber security provider. We develop threat detection software which needs no infrastructure changes as it integrates with almost any security tool.

Mako Networks

Mako Networks

The Mako System is an award winning networking and security service designed specifically for SMEs and branch offices of larger organisations.

Sangfor Technologies

Sangfor Technologies

Sangfor is a global leader of IT infrastructure, security solutions, and cloud computing.

CyberTech Network

CyberTech Network

CyberTECH is a global cybersecurity, Internet of Things (IoT) and Smart City network ecosystem and incubator operator.

Digital Innovation Hub Slovenia (DIH)

Digital Innovation Hub Slovenia (DIH)

DIH Slovenia is a central hub providing services to grow digital competencies in areas including robotics, IoT, cyberphysical systems and cybersecurity.

Ogasec

Ogasec

Ogasec is a cybersecurity company formed by the merger between Aker and N-Stalker in 2017. Solutions include Security & Connectivity Networking, Application Security, and Managed Security Services.

Cowbell Cyber

Cowbell Cyber

Cowbell Cyber™ offers continuous risk assessment, comprehensive cyber liability coverage, and continuous underwriting through an AI-powered platform.

Collins Aerospace

Collins Aerospace

Collins Aerospace provides cybersecurity services and systems to protect critical infrastructure facilities and railroad operations.

ARIA Cybersecurity Solutions

ARIA Cybersecurity Solutions

The ARIA ADR Automatic Detection & Response solution was designed to find, verify, and stop all types of attacks - automatically and in real time.

Advent One

Advent One

Advent One are recognised for solving intricate dilemmas, not only making technology work but building foundations that customers can grow upon in an effective and secure way.

MicroAge

MicroAge

Powered by five decades of experience, lasting partnerships, client relationships, and the values that guide us daily, MicroAge is here to help you secure, accelerate, and transform your business.

Apura Cybersecurity Intelligence

Apura Cybersecurity Intelligence

Apura is a Brazilian company that develops advanced products and provides specialized services in information security and cyber defense.

SecZone

SecZone

SecZone is a Chinese enterprise with a mission to "Make It Secure." We are dedicated to driving software security innovation globally.

Entitle

Entitle

Entitle's SaaS-based platform automates how permissions are managed, enabling organizations to eliminate bottlenecks and implement robust cloud least privilege access.

CYNC Secure

CYNC Secure

CYNC boosts cybersecurity remediation by consolidating fragmented data and optimizing operational processes.