Electronic Camouflage In Future Warfare

Traditional visual camouflage will no longer be adequate in future operating environments against more capable US adversaries, one intelligence official believes.

“The Marine Corps really has to get better at keeping our activities, our movements and our presence masked in the current electromagnetic environment where it is incredibly easy for adversaries … to identify and locate people, capabilities and forces,” a senior Marine intelligence officer said. Electronic camouflage becomes an essential element in the future battlefield. This is not unique to the Marines, the US Army, is also grappling with this problem.

“We can get all camouflaged up, we can hide in holes, we can put camouflage nets on, wear ghillie suits, camo up our faces, color our teeth green and you can’t see us at all until I push the button on my radio to talk, to tell my boss: ‘Hey, I’m here,’” said Col. Jeffery Church last year when he was chief of strategy and policy at the Army’s Cyber Directorate within G-3/5/7.

“All that physical camouflage from the eyeball just went away because now you’re broadcasting in the spectrum. So we can show that to commanders and they can start getting an appreciation of how the spectrum is a capability for them and a vulnerability,” he said at the time.

The Marines are implementing policies, tactics, techniques and procedures into exercises. They are taking a look at themselves in the field, he explained, trying to understand what the Marine Air Ground Task Force looks like from an electromagnetic spectrum perspective when it’s running around an exercise environment.

Understanding these signatures is incredibly important, he said, because the US must “get on top of this before the adversary makes us pay the price.”

According to c4isrnet.com, the Marines have also experimented with tools to help them not only understand their signature, but plan and visualise effects in the nonphysical electromagnetic spectrum with solutions like RadioMap, developed by the Defense Advanced Research Projects Agency in partnership with industry.

RadioMap is a software-based geographic information system framework allowing for customisable plugins using heat maps of the radio frequency picture and regions where devices might be emitting.

Though commanders will often take a risk-management approach, sometimes deciding to entirely cut off communications as to not risk EMS detection, Dave Ochmanek of the think tank Rand doesn’t believe this will completely solve the problem against a near-peer competitor in the future operating environment.

Just reducing the Communications footprint alone won’t work, given adversaries’ detection capabilities such as electro-optical sensors and syntactic aperture radar. Thus, he said during the same panel, a strategy for reducing detectability has to be part of a broader strategy that takes into account these advanced sensing capabilities.

Unlike the last 16 years of war against a technologically inferior enemy, “now we may face actors that have more sensors, looking at us more than we do at them,” Ochmanek said.

Chudoba believes the US stands to learn from Russia and its use of electronic warfare. “I think we can learn from our Russian friends if we rewind the movie and look at what they did on the global stage over the last decade or so,” he said.

I-HLS

You Might Also Read: 

Electronic Warfare Development Rate:

New Material Promises NSA-proof Wallpaper:

 

« Self-Drive Cars Coming to Manhattan
Tech Giants Face US Congress Over Russia Election »

Directory of Suppliers

InnovaSec

InnovaSec

InnovaSec is a specialist consultancy in cyber and physical security technology.

Maureen Data Systems

Maureen Data Systems

Maureen Data Systems (MDS) services cover Data Centres, Cloud Computing, Cyber Security, Mobility, Virtualisation, Managed Services.

Techmeme

Techmeme

Techmeme is an online news curation service focused on leading edge technology, including cyber security.

Cloud Management Suite

Cloud Management Suite

Cloud Management Suite allows organizations of all sizes to proactively monitor and manage their environment, all from a web browser without the need to deploy or maintain agents.

SoftSol

SoftSol

SoftSol is a leading independent solutions provider of quality assurance and software testing services.

PayMate

PayMate

PayMate is a leading provider of electronic Business-to-Business(B2B) payment solutions.

Bedrock Automation

Bedrock Automation

Bedrock Automation provides the world’s most powerful, scalable and cyber secure industrial control system (ICS).

Adroit Technologies

Adroit Technologies

Adroit Technologies has been developing award winning real-time software for the industrial automation markets for over 25 years.

Allure Security Technology

Allure Security Technology

Allure provide Behavioral Analytics software that combines machine learning and decoy technology to protect enterprise devices from data loss and intrusion both inside and outside the enterprise.

Assured Information Security (AIS)

Assured Information Security (AIS)

AIS is committed to providing our customers with critical information security products, services, and training. We support diverse needs throughout business and industry.

KayHut

KayHut

KayHut is a young, innovative company engaged in cyber research and security solutions.

Seclytics

Seclytics

Seclytics is a one-stop cyber threat intelligence correlation and prediction platform.

Untangle

Untangle

Untangle provides network security products designed specifically for the below-enterprise market, safeguarding businesses, home offices, nonprofits, schools and governmental organizations.

Saudi Federation for Cyber Security and Programming (SAFCSP)

Saudi Federation for Cyber Security and Programming (SAFCSP)

SAFCSP is a national institution under the umbrella of the Saudi Arabian Olympic Committee, which seeks to build national and professional capabilities in the fields of cyber security and programming.

Berwick Partners

Berwick Partners

Berwick Partners’ Cyber Security Practice is a leading recruiter of senior management positions in this field; we have an exceptional understanding of the constantly changing Cyber landscape.