New Tools To Simulate Electronic Warfare

The US Air Force is integrating a new simulator for weapons testing under electronic warfare and challenging jamming, environments. This is part of the service’s 'swarming munitions' program called Golden Horde, which relies on GPS positioning, navigation and timing information.

The BroadSim Wavefront simulator was selected to help test electronic protection technology and testing to take place at the Guided Weapons Evaluation Facility (GWEF) located at Eglin Air Force Base, Florida.

The GWEF provides laboratory testing and simulation tools for developing precision-guided weapon technology, including a comprehensive scope of GPS/INS systems and integrated components like sensors, signals of opportunity and controlled reception pattern antennas (CRPAs), which offer protection against GPS jamming and spoofing.

Golden Horde is one of the Air Force Research Laboratory’s (AFRL) four high-priority Vanguard programs. It is designed to network swarms of munitions to operate autonomously using a common playbook. The program is expected to rapidly advance emerging weapons systems and warfighting concepts through prototype and experimentation. 

The AFRL conducted its first Golden Horde test in December 2020 during in which an F-16 dropped two laser-guided Collaborative Small Diameter Bombs that established communication links and were able to detect multiple targets.

Because of a software issue, the onboard processor, after opting to shift from an initial target to a higher-priority one, was unable to redirect to the new target.

The program has since completed two more live demonstration exercises, and last September AFRL announced it would partner with the Defense Innovation Unit and John Hopkins Applied Physics Lab to transition the program into a new virtual competitive technology demonstration phase. The initiative, dubbed Operation Protovision, will use Golden Horde’s virtual environment to test industry capabilities like autonomous software and networked radios.

AFRL:     Leonardo:     Edwards Air Force Base:      I-HLS:    

You Might Also Read: 

Artificial Intelligence, Automation & Drones (£):

 

« The EU Mobilises Its Cyber Rapid Response Team To Deal With Russian Attacks
Increasing Use Of Encryption For Malicious Purposes »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perforce Software

Perforce Software

Perforce helps companies build complex software products more collaboratively, securely, and efficiently.

GigaOm

GigaOm

GigaOm's mission is to provide enterprises with information and analysis to help them make better decisions about technology.

Palo Alto Networks

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate.

NetMotion Software

NetMotion Software

NetMotion Software specializes in mobile performance management solutions to manage, secure and support the mobile enterprise.

Owl Cyber Defense

Owl Cyber Defense

Owl patented DualDiode Technology enables hardware-enforced network segmentation and deterministic, one-way transfer of all data types and file sizes.

Early Warning Services

Early Warning Services

Early Warning is committed to providing awareness, education, and enablement around fraud prevention.

Woz U

Woz U

Woz U provides best-in-class technology training for Learners, Higher-Ed and Corporations. We focus on the most in-demand occupations such as Software Development, Data Science and Cyber Security.

IoT Security Institute (IoTSI)

IoT Security Institute (IoTSI)

IoT Security Institute is an academic and industry body dedicated to providing frameworks and supporting educational services to assist in managing security within an Internet of Things eco-system.

NeuShield

NeuShield

NeuShield is the only anti-ransomware technology that can recover your damaged data from malicious software attacks without a backup.

Electric Power Research Institute (EPRI)

Electric Power Research Institute (EPRI)

The Electric Power Research Institute’s Cyber Security Research Laboratory (CSRL) addresses the security issues of critical functions of electric utilities.

Adit Ventures

Adit Ventures

Adit Ventures is a venture capital firm with a focus on dynamic growth sectors including AI & Machine Learning, Big Data, Cybersecurity and IoT.

AWARE7

AWARE7

IT security for human and machine. With the help of our products and services, we work with you to increase the IT security level of your organization.

ZILLIONe

ZILLIONe

ZILLIONe is one of Sri Lanka´s top enterprise technology solutions providers.

DataProof Communications

DataProof Communications

DataProof Communications is Cybersecurity Company specialising in cybersecurity operations, incident management and response best practices and technologies.

CyberCure

CyberCure

CyberCure provide specialised roles and services to manage your organisations cybersecurity requirements and professional advisory services in governance, risk and compliance.

DeepSurface Security

DeepSurface Security

DeepSurface is the first risk-based vulnerability management platform that allows cybersecurity teams to automate the process of analyzing and prioritizing vulnerabilities.