Electronic Warfare Specialists On The Frontline

In the age of digital communications, the US Army’s ability to dominate the electromagnetic spectrum can significantly influence the outcome of future armed conflicts. Consequently, the US Army will pilot a new idea to place coders and software developers at the 'tactical edge' of the battlefield to reprogram electronic warfare and communications systems.

The US Army is preparing to field a raft of electronic warfare equipment, including combined cyber and signals intelligence, that it needs to be able to rapidly reprogram these systems to exploit new signals that it might encounter over the course of a conflict.

The pilot program, operation Starblazor, aims to identify gaps in Army capabilities and provide actionable information to develop military doctrine. In particular, Starblazor will  will help military leaders learn what is needed to train the cyber and electronic warfare operators with existing equipment and what these personnel will need for any future conflict

The US Army has recently created a new military occupational specialty within its cyber branch dedicated to software development. Those specialists sit alongside operators and build tools on the spot to keep up with the dynamic environment of cyberspace. During World War II, jamming missions conducted by Allied forces successfully disrupted German command and control systems and navigation capabilities. When adversaries used radio-controlled improvised explosive devices to attack ground forces in Afghanistan and Iraq, the US Army defended its Soldiers with newly developed tools that jammed radio-activated triggers.

Today, If the Army finds itself in a conflict with another nation-state, it will likely come across signals it hasn’t seen before. This presents problems for the force because it won’t know how to exploit or defeat those signals until it categorizes them.

In the Cold War, this could take years, but now with software-defined systems, new signals can be deployed, detected and tweaked in weeks. Starblazor will help determine what new code developers need and provide information for capability development for large acquisition programs while they’re still in the research and development phase.

Defense News:     I-HLS:      Army.mil:        C4SRNet:      CROWS:     Image: Unsplash

You Might Also Read:

Cyber Warfare Is The New Frontier:

 

« AI Reveals Iran’s Nuclear Weapons Factory
Cyber Liabilities Advisory Advocates Resilience »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

AWS Marketplace eBook: Optimizing your cloud deployments to accelerate cloud activities, reduce costs, and improve customer experience.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

TrustedIA

TrustedIA

TrustedIA - safeguarding your business, it's critical assets, information, reputation and brand.

Bitglass

Bitglass

Bitglass' Cloud Access Security Broker (CASB) solution enables your enterprise to adopt cloud apps while ensuring data security and regulatory compliance.

Eustema

Eustema

Eustema designs and manages ICT solutions for medium and large organizations.

GuardKnox

GuardKnox

GuardKnox protects the users of connected vehicles against threats that can endanger their physical safety and the safety of their personal information.

mPrest

mPrest

mPrest is a global provider of mission-critical monitoring and control solutions for the defense, security, utility and Industrial Internet of Things (IoT) sectors.

SOCOTEC Certification International

SOCOTEC Certification International

SOCOTEC Certification International has been providing management systems assessment and accredited ISO certification services to organisations around the world since 1995.

Quantum Armor

Quantum Armor

Quantum Armor is a next-gen cyber security monitoring platform that allows you to continuously stay aware of your security posture, and proactively spot trends, vulnerabilities and potential attacks.

Meditology

Meditology

Meditology Services is a top-ranked provider of information risk management, cybersecurity, privacy, and regulatory compliance consulting services exclusively for healthcare organizations.