Electronic Warfare Specialists On The Frontline

In the age of digital communications, the US Army’s ability to dominate the electromagnetic spectrum can significantly influence the outcome of future armed conflicts. Consequently, the US Army will pilot a new idea to place coders and software developers at the 'tactical edge' of the battlefield to reprogram electronic warfare and communications systems.

The US Army is preparing to field a raft of electronic warfare equipment, including combined cyber and signals intelligence, that it needs to be able to rapidly reprogram these systems to exploit new signals that it might encounter over the course of a conflict.

The pilot program, operation Starblazor, aims to identify gaps in Army capabilities and provide actionable information to develop military doctrine. In particular, Starblazor will  will help military leaders learn what is needed to train the cyber and electronic warfare operators with existing equipment and what these personnel will need for any future conflict

The US Army has recently created a new military occupational specialty within its cyber branch dedicated to software development. Those specialists sit alongside operators and build tools on the spot to keep up with the dynamic environment of cyberspace. During World War II, jamming missions conducted by Allied forces successfully disrupted German command and control systems and navigation capabilities. When adversaries used radio-controlled improvised explosive devices to attack ground forces in Afghanistan and Iraq, the US Army defended its Soldiers with newly developed tools that jammed radio-activated triggers.

Today, If the Army finds itself in a conflict with another nation-state, it will likely come across signals it hasn’t seen before. This presents problems for the force because it won’t know how to exploit or defeat those signals until it categorizes them.

In the Cold War, this could take years, but now with software-defined systems, new signals can be deployed, detected and tweaked in weeks. Starblazor will help determine what new code developers need and provide information for capability development for large acquisition programs while they’re still in the research and development phase.

Defense News:     I-HLS:      Army.mil:        C4SRNet:      CROWS:     Image: Unsplash

You Might Also Read:

Cyber Warfare Is The New Frontier:

 

« AI Reveals Iran’s Nuclear Weapons Factory
Cyber Liabilities Advisory Advocates Resilience »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CoSoSys Endpoint Protector

CoSoSys Endpoint Protector

Endpoint Protector by CoSoSys is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks and protects from malicious data theft.

CyberSecurityJobsite.com

CyberSecurityJobsite.com

CyberSecurityJobsite.com is a specialist job board designed to attract candidates working within Cyber Security, Information Security or Information Assurance.

Swivel Secure

Swivel Secure

Swivel Secure is an award winning provider of multi-factor authentication solutions.

Concise Technologies

Concise Technologies

Concise Technologies provide specialist IT and telecoms solutions, support services, managed backup, disaster recovery, cyber security and consultancy to SME businesses across the UK and Europe.

ShmooCon

ShmooCon

ShmooCon is an annual east coast hacker convention offering three days of demonstrations and discussions of critical infosec issues.

Salient CRGT

Salient CRGT

Salient CRGT is a leading provider of health, data analytics, cloud, agile software development, mobility, cyber security, and infrastructure solutions.

Procilon Group

Procilon Group

Procilon Group specialize in the development of cryptographic software as well as strategic advice on information security and data protection.

Ponemon Institute

Ponemon Institute

Ponemon Institute conducts independent research on data protection and emerging information technologies.

Hubraum

Hubraum

Hubraum is Deutsche Telekom’s tech incubator, helping startups to create new business opportunities in areas including data analytics, AI, robot process automation and cyber security.

SecureStrux

SecureStrux

SecureStrux are a cybersecurity consulting firm providing specialized services in the areas of compliance, vulnerability assessment, computer network defense, and cybersecurity strategies.

MyDocSafe

MyDocSafe

MyDocSafe is an all-in-one document security and e-sign software.

PPC Protect

PPC Protect

PPC Protect is an entirely automated click fraud prevention solution.

Infosec Cloud

Infosec Cloud

Infosec Cloud is a specialist Cyber Security company offering fully managed Training & Testing Services in addition to market leading Cyber Security technology and accredited professional services.

KT Secure

KT Secure

KTSecure’s mission is to provide proven and productive cyber security solutions and managed services, backed by our highly qualified and passionate team of experts.

mxHERO

mxHERO

mxHERO reduces the risks inherent with ransom and cyber-security threats specific to email.

Piiano

Piiano

Piiano offers developer-friendly privacy and security products. Reduce risk and protect your data by using our specialized security and privacy SaaS tools.