New Tools To Simulate Electronic Warfare

The US Air Force is integrating a new simulator for weapons testing under electronic warfare and challenging jamming, environments. This is part of the service’s 'swarming munitions' program called Golden Horde, which relies on GPS positioning, navigation and timing information.

The BroadSim Wavefront simulator was selected to help test electronic protection technology and testing to take place at the Guided Weapons Evaluation Facility (GWEF) located at Eglin Air Force Base, Florida.

The GWEF provides laboratory testing and simulation tools for developing precision-guided weapon technology, including a comprehensive scope of GPS/INS systems and integrated components like sensors, signals of opportunity and controlled reception pattern antennas (CRPAs), which offer protection against GPS jamming and spoofing.

Golden Horde is one of the Air Force Research Laboratory’s (AFRL) four high-priority Vanguard programs. It is designed to network swarms of munitions to operate autonomously using a common playbook. The program is expected to rapidly advance emerging weapons systems and warfighting concepts through prototype and experimentation. 

The AFRL conducted its first Golden Horde test in December 2020 during in which an F-16 dropped two laser-guided Collaborative Small Diameter Bombs that established communication links and were able to detect multiple targets.

Because of a software issue, the onboard processor, after opting to shift from an initial target to a higher-priority one, was unable to redirect to the new target.

The program has since completed two more live demonstration exercises, and last September AFRL announced it would partner with the Defense Innovation Unit and John Hopkins Applied Physics Lab to transition the program into a new virtual competitive technology demonstration phase. The initiative, dubbed Operation Protovision, will use Golden Horde’s virtual environment to test industry capabilities like autonomous software and networked radios.

AFRL:     Leonardo:     Edwards Air Force Base:      I-HLS:    

You Might Also Read: 

Artificial Intelligence, Automation & Drones (£):

 

« The EU Mobilises Its Cyber Rapid Response Team To Deal With Russian Attacks
Increasing Use Of Encryption For Malicious Purposes »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Array Networks

Array Networks

Array Networks, the network functions platform company, develops purpose-built systems for hosting virtual networking and security functions with guaranteed performance.

Optiv

Optiv

Optiv is a market-leading provider of end-to-end cyber security solutions. We help clients plan, build and run successful cyber security programs that achieve business objectives.

FinCom.co

FinCom.co

FinCom.Co is the world’s first automatic AML/ KYC screening system, for comprehensive compliance.

SOCOTEC Certification International

SOCOTEC Certification International

SOCOTEC Certification International has been providing management systems assessment and accredited ISO certification services to organisations around the world since 1995.

Secured Communications

Secured Communications

Secured Communications has developed the only unified secure communications platform trusted by public safety and counter terrorism professionals around the world.

Navixia

Navixia

As a leading Swiss IT security specialist, Navixia offers a global and pragmatic approach to information security.

DKBInnovative

DKBInnovative

DKBinnovative is a best-practice driven IT management firm that provides secure, reliable IT solutions to productivity-focused clients around the globe.

Activu

Activu

Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical operations including network security.

eMazzanti Technologies

eMazzanti Technologies

eMazzanti Technologies provides IT consulting services for businesses ranging from home offices to multinational corporations throughout the USA and internationally.

Skudo

Skudo

Skudo is dedicated to creating innovative best-in-class solutions that protect data exchange with the highest level of security and privacy.

CYSIAM

CYSIAM

CYSIAM provides world-leading expertise in offensive security and critical incident response. We train our clients to be able to protect themselves and respond to attacks and breaches when they occur.

Guernsey

Guernsey

Guernsey provides a wide range of engineering, architecture and consulting services to multiple markets, including cybersecurity consulting and CMMC certification.

Vantor

Vantor

Vantor is a Managed Security Services Provider (MSSP) that specializes in providing outsourced, managed cybersecurity services.

Toro Solutions

Toro Solutions

Toro provide managed security & consultancy to keep governments, businesses & society resilient in the space where cyber, physical & people security converge.

CYSEC Global

CYSEC Global

CYSEC Global is a series of summits dedicated to tackle regional cyber security challenges.

Didomi

Didomi

Didomi helps organizations implement great Privacy User Experiences that respect choices and give people control over their data.