Electronic Warfare Development Rate

The US Army’s Rapid Capabilities Office (RCO) has recently sent its near-term electronic warfare (EW) capability solution to Europe, and soldiers there will get a chance to try it out, according to RCO Director Doug Wiltsie 

The RCO is designed to zero in on the Army’s largest requirements with the intent to deliver capabilities within a one- to five-year horizon. It’s part of the service’s aggressive overhaul to its troubled procurement system and pushes even beyond acquisition reform outlined in congressional defense policy.

The office claimed it would prioritise developing capability in the areas of electronic warfare; position, cyber, navigation and timing that were neglected in the counter-insurgency operations of the past 15 years. Now that the US Army anticipates battling more near-peer adversaries in contested environments, it is refocusing on ensuring its capability overmatch those possible enemies. By December, the RCO had approved a strategy for a phased way to rapidly prototype electronic warfare capability. 
“It was very clear that the strategic gap in EW was the ability for NATO and the American participation in NATO to be able to do ground maneuver in a contested environment,” Wiltsie said. “So what we’re focused on is being able to field a capability that will allow the maneuver force the ability to ground maneuver in a contested environment.” 

The prototype will be tried out in an operational assessment during the Saber Guardian exercise in Romania, Hungary, and Bulgaria. The Army will run another operational assessment in October and then take the information to the RCO for a decision on whether to field the capability to designated units.  

The second element in the prototype will have an offensive capability, Wiltsie said. “Everything looks very, very good,” he added. “It’s providing soldiers the ability to understand the electromagnetic spectrum that they are in, are you being jammed, or what other radios/emitters are in your environment.” 

The next phase, Wiltsie said, will tackle how to integrate the EW prototype onto a vehicle and how troops will use it. “One of the questions that we have to be able to answer to the board is: Could you do this with the existing organizations and troops that you have, or do we need to augment troops in order to be able to do this?” 

An element of the EW solution would incorporate cyber capability, but the RCO is also working with US Army Cyber Command on both offensive and defensive capabilities with more of a focus on the defensive side first. The RCO has delivered an infrastructure solution to cyber forces and is working on a situational understanding capability. That capability is currently in source selection, and an award will be made soon. 

For position, navigation and timing (PNT) the RCO is looking at five to seven different technologies “to see which one gives us either the best performance or is the fastest that we can incorporate,” Wiltsie said. “The idea is to spend very little money on a multitude of options to take them to some kind of assessment and then come back to the board and say: ‘We believe this one or these two are the ones that we want to go forward with,’ he noted.

I-HLS

You Might Also Read:

Drones, Satellites And Cyber Warfare:

Cyber War Calls For A New Look US Soldier:

‘Cyber War’ Is Fast Becoming Just ‘War’:

 

 

« North Korea's Unit 180 Managed WannaCry Attack
Crimes Of The Future Will Be Solved Using IT, Robot CSIs, Smell & VR »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Okta

Okta

Okta is an enterprise-grade identity management service, built from the ground up in the cloud to address the challenges of a cloud-mobile-interconnected world.

Willis Towers Watson

Willis Towers Watson

Willis Towers Watson is a global risk management, insurance brokerage and advisory company. Services offered include Cyber Risks insurance.

CyberPilot

CyberPilot

CyberPilot ApS is a Danish cybersecurity company. We work with all types of companies and organisations, both large and small, who want to achieve effective cybersecurity.

SEC Consult

SEC Consult

SEC Consult is a leading European consultancy for application security services and information security.

Harel Mallac Technologies

Harel Mallac Technologies

Harel Mallac Technologies is a Mauritian organisation that has developed a strong network of ICT specialists with nodes across the African continent.

SGBox

SGBox

SGBox is a highly flexible and scalable solution for IT security. Choose the modules which your company needs and implement it without any modification to your network infrastructure.

ePlus

ePlus

ePlus designs and delivers effective, integrated cybersecurity programs centered on culture and technology, aimed at mitigating business risk and empowering digital transformation.

CyberSecJobs.com

CyberSecJobs.com

CyberSecJobs.com is a career site and job fair company providing services and resources to the cyber security community.

Securden

Securden

Securden provide an all-in-one Platform for Next-Gen Privileged Access Governance, helping you to prevent identity thefts, malware propagation, cyber attacks, and insider exploitation.

Secured Communications

Secured Communications

Secured Communications has developed the only unified secure communications platform trusted by public safety and counter terrorism professionals around the world.

Portshift

Portshift

Portshift leverages the power of Kubernetes and Service-Mesh to deliver a single source of truth for containers and cloud-native applications security.

Trail of Bits

Trail of Bits

Trail of Bits combine high-end security research with a real-world attacker mentality to reduce risk and fortify code.

Ruptura InfoSecurity

Ruptura InfoSecurity

Ruptura InfoSecurity provide CREST Accredited Penetration Testing & Offensive Security Services. We secure your critical assets through targeted and research driven penetration testing.

Buzz Cybersecurity

Buzz Cybersecurity

Buzz Cybersecurity systems and services are designed to proactively guard against common and uncommon cyber threats.

Mercury Systems

Mercury Systems

Mercury Systems is the leader in making trusted, secure mission-critical technologies profoundly more accessible to aerospace and defense.

DNS Research Federation (DNSRF)

DNS Research Federation (DNSRF)

DNSRF's mission is to advance the understanding of the Domain Name System's impact on cybersecurity, policy and technical standards.