Electronic Camouflage In Future Warfare

Traditional visual camouflage will no longer be adequate in future operating environments against more capable US adversaries, one intelligence official believes.

“The Marine Corps really has to get better at keeping our activities, our movements and our presence masked in the current electromagnetic environment where it is incredibly easy for adversaries … to identify and locate people, capabilities and forces,” a senior Marine intelligence officer said. Electronic camouflage becomes an essential element in the future battlefield. This is not unique to the Marines, the US Army, is also grappling with this problem.

“We can get all camouflaged up, we can hide in holes, we can put camouflage nets on, wear ghillie suits, camo up our faces, color our teeth green and you can’t see us at all until I push the button on my radio to talk, to tell my boss: ‘Hey, I’m here,’” said Col. Jeffery Church last year when he was chief of strategy and policy at the Army’s Cyber Directorate within G-3/5/7.

“All that physical camouflage from the eyeball just went away because now you’re broadcasting in the spectrum. So we can show that to commanders and they can start getting an appreciation of how the spectrum is a capability for them and a vulnerability,” he said at the time.

The Marines are implementing policies, tactics, techniques and procedures into exercises. They are taking a look at themselves in the field, he explained, trying to understand what the Marine Air Ground Task Force looks like from an electromagnetic spectrum perspective when it’s running around an exercise environment.

Understanding these signatures is incredibly important, he said, because the US must “get on top of this before the adversary makes us pay the price.”

According to c4isrnet.com, the Marines have also experimented with tools to help them not only understand their signature, but plan and visualise effects in the nonphysical electromagnetic spectrum with solutions like RadioMap, developed by the Defense Advanced Research Projects Agency in partnership with industry.

RadioMap is a software-based geographic information system framework allowing for customisable plugins using heat maps of the radio frequency picture and regions where devices might be emitting.

Though commanders will often take a risk-management approach, sometimes deciding to entirely cut off communications as to not risk EMS detection, Dave Ochmanek of the think tank Rand doesn’t believe this will completely solve the problem against a near-peer competitor in the future operating environment.

Just reducing the Communications footprint alone won’t work, given adversaries’ detection capabilities such as electro-optical sensors and syntactic aperture radar. Thus, he said during the same panel, a strategy for reducing detectability has to be part of a broader strategy that takes into account these advanced sensing capabilities.

Unlike the last 16 years of war against a technologically inferior enemy, “now we may face actors that have more sensors, looking at us more than we do at them,” Ochmanek said.

Chudoba believes the US stands to learn from Russia and its use of electronic warfare. “I think we can learn from our Russian friends if we rewind the movie and look at what they did on the global stage over the last decade or so,” he said.

I-HLS

You Might Also Read: 

Electronic Warfare Development Rate:

New Material Promises NSA-proof Wallpaper:

 

« Self-Drive Cars Coming to Manhattan
Tech Giants Face US Congress Over Russia Election »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Wisegate

Wisegate

Wisegate is a community of IT experts providing advisory services on all areas of IT including security.

Threatpost

Threatpost

Threatpost, is an independent news site which is a leading source of information about IT and business security.

CGI Group

CGI Group

CGI is a leading IT and business process services provider. Services include IT consulting, Systems Integration, Application Development, Infrastructure, Business Processes, Digital IP.

IBackup

IBackup

IBackup is a Web Based Online Backup service provider.

Altius IT

Altius IT

Altius IT reviews your website for security vulnerabilities and provides a report identifying vulnerabilities and recommendations to make secure.

CERT Syria

CERT Syria

CERT Syria is the national Computer Emergency Response Team for Syria.

ENEA Qosmos Division

ENEA Qosmos Division

Qosmos, a division of Enea, leads the market for IP traffic classification and network intelligence technology used in physical, SDN and NFV architectures.

Accolade Technology

Accolade Technology

Accolade provides the most technologically advanced host cpu offload, 100% packet capture FPGA-based PCIe adapters and 1U platforms available in the network monitoring and cyber security markets.

Cyber Security Education

Cyber Security Education

CybersecurityEducation.org is an online directory of cyber security education and careers.

Port53 Technologies

Port53 Technologies

Port53 Technologies is focused on delivering enterprise-grade, cloud-delivered security solutions that are easy to deploy, simple to manage and extremely effective.

CryptoNext Security

CryptoNext Security

CryptoNext provides optimal end-to-end post-quantum cybersecurity remediation tools and solutions for IT/OT infrastructures & applications.

Fulcrum IT Partners

Fulcrum IT Partners

Fulcrum IT Partners is the parent company of an expanding portfolio of established IT solution companies around the world with proven expertise in cyber security, cloud, and managed services.

Sec3

Sec3

Sec3 is a security and research firm providing bespoke audits and cutting edge tools to Web3 projects.

TRM Labs

TRM Labs

TRM enables risk management and compliance for a global community of financial institutions, cryptocurrency businesses and government agencies.

Cognna

Cognna

Cognna's innovative platform is designed to empower you and your team, providing the tools you need to detect, prevent, and resolve threats with ease.

Astreya

Astreya

Astreya is the leading IT solutions provider for some of the world's most recognizable and innovative organizations.