<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:media="http://search.yahoo.com/mrss/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"><channel><title>C4ISRNET</title><link>https://www.c4isrnet.com</link><atom:link href="https://www.c4isrnet.com/arcio/rss/" rel="self" type="application/rss+xml"/><description>C4ISRNET News Feed</description><lastBuildDate>Mon, 12 Aug 2024 21:48:22 +0000</lastBuildDate><ttl>1</ttl><sy:updatePeriod>hourly</sy:updatePeriod><sy:updateFrequency>1</sy:updateFrequency><item><title>Marine regiment shows off capabilities at RIMPAC ahead of fall experimentation blitz</title><link>https://www.defensenews.com/battlefield-tech/2022/08/10/marine-regiment-shows-off-capabilities-at-rimpac-ahead-of-fall-experimentation-blitz/</link><description>The new 3rd Marine Littoral Regiment got to show off the basics of how it will operate with partners at RIMPAC. Now comes a major experimentation push ahead of a fall 2023 deadline to become operational.</description><guid isPermaLink="true">https://www.defensenews.com/battlefield-tech/2022/08/10/marine-regiment-shows-off-capabilities-at-rimpac-ahead-of-fall-experimentation-blitz/</guid><dc:creator>Megan Eckstein</dc:creator><pubDate>Wed, 10 Aug 2022 20:26:25 +0000</pubDate><content:encoded><![CDATA[<p>MARINE CORPS BASE HAWAII — A new U.S. Marine Corps regiment has shown how it can protect a carrier strike group while navigating through a strait, using only sensors, an unmanned truck armed with anti-ship missiles, and a fires and air detection unit.</p><p>The scenario at this summer’s Rim of the Pacific multinational naval exercise allowed the 3rd Marine Littoral Regiment to test its ability to contribute to a future fight at sea — a significant departure from the service’s land warfare focus of the past two decades.</p><p>During this test at RIMPAC, the Corps’ newest formation scattered a few task units ashore, who spread out sensors, set up the armed NMESIS truck, and established a fires and air direction element to confirm targets and authorize strikes.</p><p>As the carrier strike group approached the strait, it ordered the 3rd MLR to strike an adversary ship attempting to block the waterway. The order and the target came from the ship to the Marines ashore, who “achieved a simulated mission kill on the adversary surface vessel, enhancing the CSG’s [carrier strike group’s] ability to transit the strait unimpeded,” Maj. Oryan Lopes, 3rd MLR’s current operations officer, told Defense News.</p><p>“The CSG strait transit was an excellent opportunity to further refine how the 3d Marine Littoral Regiment could support the Combined Maritime Force Component Commander in a future fight. On many levels, the 3d MLR learned how to better communicate within and contribute to maritime operations across multiple task forces,” he added.</p><p>A lot of technical work remains before the regiment can declare itself operationally capable: It needs to continue refining the exact number of Marines and pieces of gear it requires, and it needs to reach digital interoperability with the rest of the joint and combined force.</p><p>But at RIMPAC 2022, the regiment proved its value thus far to a future maritime fight, in which it would work alongside American partners of the first island chain as a stand-in force in the Pacific. The U.S. Defense Department has <a href="https://media.defense.gov/2018/Aug/16/2001955282/-1/-1/1/2018-CHINA-MILITARY-POWER-REPORT.PDF" target="_blank">previously described that area</a> as “the islands running from the Kurils, through Taiwan, to Borneo, roughly encompassing the Yellow Sea, East China Sea, and South China Sea.” The regiment was designed specifically to operate inside contested areas like the South China Sea, scattering small units around islands and shorelines to conduct missions and then maneuver to a new location before being detected.</p><p><a href="https://www.defensenews.com/naval/2022/07/28/at-rimpac-2022-new-efforts-to-boost-sustainability-lethality-of-combined-force-in-the-pacific/" target="_blank">RIMPAC ran from June 29 to Aug. 4</a>. An experimentation scheduled for this fall will work out the finer details of how to maneuver and communicate during these distributed operations.</p><p>“If you look at standing in, you’re standing in next to a constellation of allies and partners, so we’re vetting how doable this is,” Col. Stephen Fiscus, the assistant chief of staff for force development, said during an interview.</p><p>Though “other venues provide the ability to get more exquisite and detailed in how” the new stand-in forces concept will work, he said, RIMPAC proved to be a great first chance to demonstrate “the blocking and tackling level of stuff, to show that you could do this together” in real-world operations.</p><p>What is 3rd MLR?</p><p>The 3rd Marine Littoral Regiment was redesignated in March to serve as a first-of-its-kind <a href="https://www.defensenews.com/naval/2022/05/18/pacific-marines-move-to-formalize-role-as-the-stand-in-force/" target="_blank">stand-in force in the Pacific</a>. Whereas other traditional formations — Marines operating from U.S. Navy ships, or units on rotational deployments in theater — could fight their way into contested areas, the idea is that 3rd MLR as the stand-in force would already be inside that space. Rather than the joint force having to kick the door down to get in, 3rd MLR could hold the door open, the thinking goes.</p><p>Col. Tim Brady, the unit’s commander, said 3rd MLR’s very presence is expected to change the calculus for potential adversaries.</p><p>“By standing in, we are deterring the malign behavior. We’re designed to fight and operate inside the enemy’s weapons engagement zone, to conduct and support sea-denial and sea-control operations, and, ultimately, to set the conditions for those joint force follow-on actions. And we’re training and experimenting with all that here at RIMPAC,” he said in the interview.</p><p>The key to its success is the range of capabilities brought together under a single Marine colonel, he added.</p><p>In February, the Corps activated its 3rd Littoral Anti-Air Battalion. In June, just ahead of RIMPAC, the Marines redesignated 3rd Littoral Combat Team and Combat Logistics Battalion 3. RIMPAC was the first time Brady could operate with these three subordinate commands, which provide the bulk of the capabilities the stand-in force needs: “the lethality of the littoral combat team and what it provides; the air direction, air control, early warning and air surveillance that the littoral anti-air battalion provides; the tactical logistics that the CLB provides,” Brady said.</p><p>He called his new unit light, maneuverable and, importantly, tailorable to the mission. “When we actually conduct [expeditionary advanced base operations], we take elements and pieces from each one of those subordinate battalions [and] re-task-organize into different task elements that [can] contribute to the joint and combined force,” he said, noting that he can pull the right amount of people and gear from each subordinate unit based on the mission and expected duration.</p><p>For Fiscus, who oversees force modernization for Marine Forces Pacific, the ability to create the right force package for the right mission — and do so quickly — is what makes 3rd MLR interesting.</p><p>“I can’t emphasize how novel it was to redesign [the subordinate units], so Tim can now, organic to his formation, task-organize in such a way that you can have that really deep sensing and understanding of the airspace, surface space,” all within a small unit that can either hide or defend itself as needed.</p><p>Brady said his regiment would include about 2,000 Marines, though the service’s Force Design 2030 initiative may adjust that slightly as the unit continues to experiment and identify the required capabilities. <a href="https://crsreports.congress.gov/product/pdf/IN/IN11281" target="_blank">Force Design 2030 aims</a> to prepare the Marine Corps for a potential future fight with an advanced adversary, such as Russia or China, in line with the National Defense Strategy.</p><p>The 3rd MLR is expected to reach initial operational capability by September 2023, and Fiscus called RIMPAC something of a midway point. The unit is mostly done reorganizing and has ideas for how to operate as a stand-in force, but it will still conducting experiments to refine its composition and tactics.</p><p>The eyes and ears</p><p>Fiscus and Brady agree that 3rd MLR’s greatest contribution to the joint force will be sensing inside an enemy’s weapons engagement zone, which rotational forces might be unable to access without escalating a tense situation or coming under fire.</p><p>To be an effective set of eyes and ears on the inside, Brady said Marines’ sensors, communications suites and weapons must be fully integrated with the naval, joint and combined force. Digital interoperability is a primary focus.</p><p>During the scenario in which a carrier strike group transited a strait, the 3rd MLR was asked to conduct sea control and sea denial operations from a strategic ground position, making communication between Marines ashore and ships at sea pivotal to mission success.</p><p>Maj. Adrian Solis, an action officer on Fiscus’ staff who focuses on fires modernization, said Marines observed how information moved between destroyers and the 3rd MLR, and whether that info went where it was needed or if Marines had to take data from one system and type them into another.</p><p>“That’ll be the crux of it: How do we improve our digital interoperability so we take slack out of the kill web, so we execute those kill chains and we’re not wasting time?” Solis said.</p><p>The stand-in force’s ability to be in multiple locations, understand the environment and pick out targets will make the force’s kill webs more robust, Brady said, but that kill web must also include sensors and shooters from “our allies and partners who are going to be alongside us inside the first island chain.”</p><p>“RIMPAC … really provides us an unprecedented opportunity in that multinational foundation to be able to train and experiment with that digital interoperability — those people, processes and systems — to be able to close kill webs,” he added. “Every time you add a new ally or partner or new aspect of the joint force to that [kill web], there are things that we need to overcome to improve upon the speed and the data transfer of that knowledge and battlespace awareness.”</p><p>What comes next?</p><p>The next year will be chock-full of milestones and tests for the regiment as it races toward its September 2023 declaration of initial operational capability. Though the regiment will primarily use gear already in the Marine Corps’ inventory, it will begin experimenting with two new items to help with maneuver and resupply: a stern landing vessel in lieu of the eventual Light Amphibious Warship, and a long-range unmanned surface vessel.</p><p>Brady said his regiment plans to eventually create a company to operate the unmanned vessel, but in the short term, later this summer, “we do receive 39 Marines as part of the research and development platoon. Most of that <a href="https://www.defensenews.com/naval/2022/05/19/whats-new-in-navy-and-marine-corps-unmanned-boats/">experimentation and training will happen back in Norfolk</a>, [Virginia], but those Marines will come to us later on this summer.”</p><p>Fiscus pointed to the stern landing vessel as a highlight of the 3rd MLR’s upcoming work, saying the ship would head to Southern California and then make its way out to the regiment in Hawaii.</p><p>“That’s a lot of the experimentation of how do we continually maneuver — move, maneuver and sustain … the stand-in force,” he said.</p><p>Brady <a href="https://www.defensenews.com/digital-show-dailies/modern-day-marine/2022/05/12/first-of-kind-marine-littoral-regiment-plays-with-new-concepts-weapons/">previously said the regiment might use the stern landing vessel</a> to move from Oahu to the big island of Hawaii, then go ashore for operations at the Pohakuloa Training Area. While Marines conduct missions at the range, the vessel might practice maneuvering at sea to stay hidden, or it could retrieve spare parts, ammunition, food and other goods to resupply Marines when they return to the beach.</p><p>Later this fall, Brady told Defense News, the Marine Corps will deactivate Bravo Battery, 1st Battalion, 12th Marines and redesignate the unit as Medium Missile Battery under the 3rd Littoral Combat Team, in what the colonel called a major milestone in implementing and shaping the 3rd MLR and <a href="https://www.defensenews.com/naval/2022/08/03/four-ways-to-kill-a-ship-how-us-marines-are-focused-on-controlling-the-seas/" target="_blank">its lethality</a>.</p><p>After that redesignation — the last major organizational move, other than the eventual long-range unmanned surface vessel company — Brady said he’ll be able to get into the weeds of several outstanding questions.</p><p>“What is the size of those task elements, to be able to have a sensing task element and a fires task element? And how many Marines truly is that? What is needed to lift and move those Marines, and what systems are needed to be able to incorporate the kill web for those Marines? Those are the things we’re going to be looking at here this fall,” he explained.</p><p>In February, the 3rd MLR will conduct the first-ever service-level training exercise for a Marine littoral regiment, operating around Southern California while testing tactics, techniques and procedures. The unit will then go right into the Balikatan exercise in the Philippines.</p><p>Brady said training alongside Philippine counterparts will help the Corps “get after some of the things that they are developing much like our capabilities, in the archipelagic coastal defense concept and the coastal defense regimen.”</p><p>Brig. Gen. Joseph Clearfield, the deputy commander of Marine Forces Pacific, told Defense News in a separate interview that the Philippines is one of many key allies and partners in the region that are reshaping their forces in similar ways to the 3rd MLR.</p><p>“I spend an awful lot of time in this job interacting with countries on the first island chain to the second island chain; that’s probably one of my primary duties. They are so excited about Force Design [2030], and they all have initiatives underway … to replicate a Marine littoral regiment-like unit,” he said. “They really want to know everything they can about what we’re doing and how we’re doing it.”</p><p>In the fall of 2023, Brady said, the larger Marine Forces Pacific’s capstone exercise will demonstrate a range of capabilities — including those of the 3rd MLR — paving the way for a declaration of initial operational capability.</p><p>“The MLR is a capability that exists right now today. We are ready and prepared to fight now,” Brady said. “Regardless of all those things we’re going to be continuing to train and experiment with in the future, and the future capabilities that are going to come to the MLR, we’re [a] capable unit today.”</p>]]></content:encoded><media:content height="2916" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/73JSGOBSD5HWJD6U44E3YKQEEA.jpg" width="5184"><media:description>U.S. Marine Corps Cpl. Jonathan Wise sets up communication lines at Marine Corps Training Area Bellows, Hawaii, on July 15, 2022. The 3rd MLR established one of three command nodes during Rim of the Pacific 2022. (Sgt. Melanye Martinez/U.S. Marine Corps)</media:description></media:content><media:content height="3152" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/ILZRHMRTE5E45KW45XQ7DKPYLQ.jpg" width="5043"><media:description>A U.S. Marine with Combat Logistics Battalion 3, 3rd Marine Littoral Regiment, 3rd Marine Division loads a cargo resupply during Rim of the Pacific on July 12, 2022. (Cpl. Patrick King/U.S. Marine Corps)</media:description></media:content><media:content height="3392" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/TOSWA5ZFY5BKJESTVCPNOJ5VTE.jpg" width="6030"><media:description>Col. Tim Brady, center, commanding officer of 3rd Marine Littoral Regiment, briefs Royal Australian Navy Commodore Paul O’Grady at Marine Corps Base Hawaii during Rim of the Pacific 2022. (Cpl. Patrick King/U.S. Marine Corps)</media:description></media:content><media:content height="3020" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/L6FT2NAMSRHC7BGQ5QBYMZ4Z2U.jpg" width="4530"><media:description>U.S. Marines with 3rd Littoral Anti-Air Battalion deploy an AN/TPS-80 Ground/Air Task-Oriented Radar at Pacific Missile Range Facility on Kauai, Hawaii, on July 26, 2022. (Sgt. Melanye Martinez/U.S. Marine Corps)</media:description></media:content><media:content height="3456" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/2PF37M73ERCO5KGOTCCKDKW7YQ.jpg" width="5184"><media:description>U.S. Marine Corps Brig. Gen. Adam Chalkley, left, who leads 3rd Marine Logistics Group, receives a brief from Col. Tim Brady, commanding officer of 3rd Marine Littoral Regiment, during Rim of the Pacific 2022 at Marine Corps Base Hawaii. (Sgt. Melanye Martinez/U.S. Marine Corps)</media:description></media:content><media:content height="3143" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/7HOI5WUW5FBCJMRSMO64JOTCBE.jpg" width="4714"><media:description>U.S. Marine Corps Sgt. Timothy Kaufusi, left, team leader of 3rd Marine Littoral Regiment, assists a Tongan marine while conducting a live-fire exercise during Rim of the Pacific 2022. (Lance Cpl. Haley Fourmet Gustavsen/U.S. Marine Corps)</media:description></media:content></item><item><title>US Army to collaborate with SpaceLink on tactical communications network</title><link>https://www.c4isrnet.com/battlefield-tech/space/2022/08/08/us-army-to-collaborate-with-spacelink-on-tactical-communications-network/</link><description>The cooperative research and development agreement allows the organizations to share facilities, intellectual property and expertise to “elevate solutions for both the warfighter and industry,” the company said in a statement.</description><guid isPermaLink="true">https://www.c4isrnet.com/battlefield-tech/space/2022/08/08/us-army-to-collaborate-with-spacelink-on-tactical-communications-network/</guid><dc:creator>Courtney Albon</dc:creator><pubDate>Mon, 08 Aug 2022 16:02:44 +0000</pubDate><content:encoded><![CDATA[<p>WASHINGTON — SpaceLink, a space communications company, said it agreed to work with the U.S. Army to help articulate the service’s plan for a tactical network that can help distribute data and imagery more quickly.</p><p>The cooperative research and development agreement with the U.S. Army Space and Missile Defense Command Technical Center, which SpaceLink announced Monday, allows the organizations to share facilities, intellectual property and expertise to “elevate solutions for both the warfighter and industry,” the McLean, Virginia-based company said in a statement. There is no funding connected to the agreement.</p><p>While the work isn’t tied to a specific Army program, it comes as the service is making plans for a <a href="https://www.c4isrnet.com/battlefield-tech/space/2021/05/01/army-approves-rapid-development-of-tactical-space-layer/" target="_blank">Tactical Space Layer </a>that would enable it to use overhead imagery to target beyond-line-of-sight threats. The Army has been partnering with commercial companies <a href="https://www.c4isrnet.com/battlefield-tech/space/2022/03/01/new-agreement-aims-to-bolster-us-army-space-force-cooperation-on-architecture-requirements/" target="_blank">and other military services</a> to conduct experiments and prototyping efforts aimed at reducing the amount of time it takes to collect and deliver satellite data to a weapon system.</p><p>SpaceLink is investing internal funds to develop a satellite relay system that will reside in medium Earth orbit — between 1,243 and 22,236 miles above planet’s surface — and use laser communications for faster and more secure data transfer. Anthony Colucci, the company’s chief strategy and commercial officer, told C4ISRNET in an interview that SpaceLink is in the “ready-for-production phase” and plans to launch its first constellation of four satellites by the end of 2024.</p><p>Colucci said the company views the agreement as a sign the U.S. government understands the value its system will bring once on orbit. Although its constellation isn’t operational, SpaceLink will provide modeling and simulation tools that the Army can use to better understand how the capability could fit into its architecture.</p><p>“It can take hours, and sometimes even days, between the time somebody says, ‘I need certain data, I need an impact of what’s going on,’ until they have that data back,” Colucci said. “With our system, it can be minutes to even seconds. So, you can imagine the tactical importance.”</p><p>After its first satellites arrive on orbit in 2024, SpaceLink plans to launch new capabilities every two years, increasing processing speed and capacity with each iteration.</p><p>Colucci said the company has discussed its plans with the Space Force, Space Development Agency and the Defense Innovation Unit, providing studies and white papers to show how the system could improve data delivery times. He said he expects additional partnerships to be formalized soon but declined to provide details.</p>]]></content:encoded><media:content height="1180" medium="image" type="image/png" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/X4OCQWXJQ5FPZD4XUUMNFCQSRA.png" width="2000"><media:description>A rendering of SpaceLink satellites connecting to low Earth orbit spacecraft through optical intersatellite links. (SpaceLink image)</media:description></media:content></item><item><title>Operation Cyber Dragon turning US Navy reservists into digital defenders</title><link>https://www.c4isrnet.com/cyber/2022/08/05/operation-cyber-dragon-turning-us-navy-reservists-into-digital-defenders/</link><description>“The interesting thing in the IT world or the network world is what’s patched and 100% compliant today might not be patched tomorrow, because vulnerabilities ebb and flow.”</description><guid isPermaLink="true">https://www.c4isrnet.com/cyber/2022/08/05/operation-cyber-dragon-turning-us-navy-reservists-into-digital-defenders/</guid><dc:creator>Colin Demarest</dc:creator><pubDate>Fri, 05 Aug 2022 21:20:51 +0000</pubDate><content:encoded><![CDATA[<p>JESSUP, Md. — On the borderlands of Fort Meade, the U.S. Navy is taking a tandem approach to cyber defense and talent development.</p><p>Inside an unassuming office building, a few floors up and tucked into a spread of austere rooms, is Operation Cyber Dragon. The brainchild of Chief Warrant Officer Scott Bryson, the hands-on endeavor authorized by <a href="https://www.c4isrnet.com/cyber/2020/08/13/the-new-strategy-from-navys-cyber-command/" target="_blank">U.S. Fleet Cyber Command</a> aims to fix virtual vulnerabilities — shoring up systems bit by bit — while also fostering a new wave of cybersecurity expertise.</p><p>“We’re doing it so that we can continue to mitigate and fortify our attack vectors and secure our networks even better,” Bryson told reporters July 22, while standing among computers, cubicles and colleagues.</p><p>Cyber Dragon kicked off in March, with the second phase of the program now underway. In its current form, <a href="https://www.c4isrnet.com/cyber/2022/07/06/cyber-yankee-exercise-hones-new-england-guard-skills-to-fight-digital-threats/" target="_blank">the operation</a> is focused on fortifying unclassified networks and rooting out common, widespread digital weaknesses: lax security settings, easily guessed credentials, unpatched software and more.</p><p>Doing so, officials said, makes its more difficult for hackers to break in and wreak havoc. According to the Navy, some 14,500 issues were initially identified on service networks as in need of addressing. Each could be a foothold for an adversary, especially at a time of heightened cyber conflict. Deputy Chief of Naval Operations for Information Warfare Vice Adm. Jeffrey Trussler in a February memo warned sailors that “cyberattacks against businesses and U.S. infrastructure are increasing in frequency and complexity.”</p><p>To tackle such a large and evolving workload, manpower was needed. So Bryson <a href="https://www.navytimes.com/news/your-navy/2022/07/19/how-one-navy-reservists-bright-idea-could-make-mobilizing-easier/" target="_blank">turned to the reserves</a>, including to people not necessarily cyber fluent.</p><p>“I went to the reserve forces that we have at 10th Fleet, and I requested some bodies, and I came up with a training plan. And I said, ‘Well, if you give me X amount of sailors for X amount of days, I think that we can get after a percentage of our vulnerabilities, patching and scanning.’ The reserve force came through with the manning, they came through with the space,” Bryson said.</p><p>“When we did the posting, it wasn’t limited,” he added. “I said I’ll take anybody.”</p><p>Among the dozens of participants were, by day, a long-haul truck driver, a banker and <a href="https://www.militarytimes.com/education-transition/2022/06/08/veteran-small-business-start-ups-need-more-federal-and-community-support-advocates-say/" target="_blank">a small-business owner</a>. The operation offers reservists the chance to fulfill annual training requirements while also making a tangible difference.</p><p>Cyber Dragon teams have thus far identified and remediated thousands of issues — everything from several “high-profile exposures” to default usernames and passwords<b> </b>to discovering “data where we didn’t want data to be,” according to officials involved with the effort.</p><p>“A default username and password means that anybody could could log in and execute on here, on these particular machines. Now, they weren’t national security-related. There was no major issue directly to national security,” said <a href="https://www.fcc.navy.mil/LEADERSHIP/Article/2382567/rear-admiral-stephen-d-donald/" target="_blank">Rear Adm. Steve Donald</a>, the deputy commander of Fleet Cyber Command/U.S. 10th Fleet. “But in some cases, it could have caused harm to individuals, identity theft or something of that nature. We were able to shut that down.”</p><p>Teams have also zeroed in on potential spoofing certificates, risky software use and cloud management hiccups. Some 50 sailors have been trained on state-of-the-art attack surface management software, used to discover, classify and assess the security of an organization’s assets, with 100 more expected to undergo the same education in the coming months.</p><p>Lt. Blake Blaze, a reservist with a cyber and tech background, said the operation has improved both his understanding of the field and the <a href="https://www.defensenews.com/global/europe/2022/04/29/naval-group-opens-new-counter-mine-warfare-cyber-labs-in-brussels/" target="_blank">cybersecurity of the Navy</a>.</p><p>“My biggest motivation for staying in the reserves was I wanted to be close to the fight in case things get interesting with some of our near-peer adversaries,” Blaze said. “We’re not directly engaging with the enemy, so to speak, but we are trying to prevent their avenues of access to our networks.”</p><a href="https://www.defensenews.com/digital-show-dailies/navy-league/2022/04/05/us-navy-had-cybersecurity-wrong-expect-change/">The US Navy had cybersecurity wrong. Expect change.</a><p>Both Bryson and Donald said they foresee a bright future for <a href="https://www.dvidshub.net/news/420969/us-fleet-cyber-command-executes-operation-cyber-dragon" target="_blank">Cyber Dragon</a>. As long as there are bugs to fix and the will to fix them, they said, the operation is viable. And Cyber Dragon’s format makes it mobile and replicable, appealing to workspaces and workforces of all sizes across the U.S.</p><p>All that’s really needed is floor space, network connectivity and a few tools from third-party vendors.</p><p>“The interesting thing in the IT world or <a href="https://www.c4isrnet.com/battlefield-tech/it-networks/" target="_blank">the network world</a> is what’s patched and 100% compliant today might not be patched tomorrow, because vulnerabilities ebb and flow,” Bryson said. “So do I think that this has legs to continue on? Absolutely.”</p>]]></content:encoded><media:content height="1500" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/GTEUDWH56JAEPE3NVL3MWEG3FQ.jpg" width="2400"><media:description>Operation Cyber Dragon kicked off earlier this year, with the second phase of the program now underway. One U.S. Navy admiral described it as "an absolutely awesome effort." (Image courtesy Purdue University)</media:description></media:content><media:content height="4016" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/S4LHXMM7CBBZLGGFJTIJ5I6WXU.jpg" width="6016"><media:description>Three seals adorn the entrance to the rooms where Operation Cyber Dragon is conducted. (Colin Demarest/C4ISRNET)</media:description></media:content></item><item><title>US Army sets timeline for demo of new, hard-to-detect mobile command post</title><link>https://www.c4isrnet.com/c2-comms/2022/07/27/us-army-sets-timeline-for-demo-of-new-hard-to-detect-mobile-command-post/</link><description>“Project Convergence is probably in our future,” said Tyler Barton, a computer scientist and project lead with the C5ISR Center. “Probably not next year.”</description><guid isPermaLink="true">https://www.c4isrnet.com/c2-comms/2022/07/27/us-army-sets-timeline-for-demo-of-new-hard-to-detect-mobile-command-post/</guid><dc:creator>Colin Demarest</dc:creator><pubDate>Wed, 27 Jul 2022 14:14:26 +0000</pubDate><content:encoded><![CDATA[<p>WASHINGTON — A burgeoning U.S. Army effort to ensure command posts are suited for fights teeming with sensors and combatants using advanced technology could soon be ready for a demonstration.</p><p>While the Mobile And Survivable <a href="https://www.c4isrnet.com/it-networks/2020/02/05/here-are-the-pentagons-issues-with-the-armys-new-command-post-set-up/" target="_blank">Command Post</a> project is still in the early stages of development, those closely involved are already eyeing a “significant, fully integrated” exhibition in the fiscal 2026-27 timeframe, possibly as part of the annual Project Convergence exercises.</p><p>“Project Convergence is probably in our future,” Tyler Barton, a computer scientist and MASCP project lead with the C5ISR Center, said during a July 21 roundtable with reporters. “Probably not next year.”</p><p>Project Convergence is the Army’s capstone test of cutting-edge kit and inter-service communications in furtherance of the Pentagon’s Joint All-Domain Command and Control vision for seamless and speedy information sharing on the battlefield. This year’s event, <a href="https://www.c4isrnet.com/battlefield-tech/it-networks/2022/06/06/army-verifies-info-sharing-abilities-with-forces-joining-project-convergence-22/" target="_blank">referred to as PC 22</a>, will for the first time directly involve allies, Australia and the U.K. included.</p><p>MASCP is one of several Army ventures meant to modernize command posts, which can be cumbersome to move and produce noticeable amounts of heat, noise and electronic artifacts, making them targetable.</p><p>The mobile-and-survivable project digs into the science and technology realms to find solutions. They include remote antenna systems, resilient data storage, enhanced camouflage techniques and materials, and self-sufficient power generation and banking. Considerations must also be made for distance and connectivity; all the speed in the world does not matter if <a href="https://www.c4isrnet.com/industry/2022/07/19/general-dynamics-it-wins-908-million-air-force-networks-contract-in-europe/" target="_blank">communications and data sharing go bust</a>.</p><a href="https://www.c4isrnet.com/battlefield-tech/it-networks/2022/07/25/us-army-tests-aerial-tier-communications-in-jersey-devils-stomping-ground/">US Army tests aerial tier communications in Jersey Devil’s stomping ground</a><p>“The more mobile and survivable the posture of your command post, the more challenging being effective is, both from a technology and systems standpoint, and just from a human standpoint of being dispersed from the staff you’re used to working with closely,” Barton said.</p><p>“The problem we’re seeking to get after is <a href="https://www.c4isrnet.com/c2-comms/2018/11/19/heres-how-a-new-command-post-system-makes-the-army-more-lethal/" target="_blank">redesigning our command posts</a> to survive competitive threats. That’s the bottom line,” he added. “We have a good understanding now of threat capabilities, how that maps to the vulnerabilities of command posts today.”</p><p>Scientists, engineers and other experts tested several preliminary MASCP capabilities this summer at the Network Modernization Experiment, or NetModX, at Joint Base McGuire-Dix-Lakehurst in New Jersey.</p><p>Much attention was paid to <a href="https://www.c4isrnet.com/electronic-warfare/" target="_blank">signature management</a> and mobility. Barton said the testing at NetModX, assisted by industry, “very much benefitted our program.” MASCP will return to the weekslong experiment next year.</p><p>“They have resources up there that would be incredibly challenging for us to do without that being set up ahead of time,” he said. “The ranges, the frequency availabilty, the infrastructure, like towers for us to elevate our emitters, spectrum sensors on hand for us to utilize, the integration teams they have up there are all great.”</p>]]></content:encoded><media:content height="2848" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/6TKCJT4OJVASZCNZ6EFQBVB5CE.jpg" width="4288"><media:description>U.S. soldiers with Headquarters and Headquarters Company, 28th Expeditionary Combat Aviation Brigade, in 2017 assemble a command post consisting of a deployable rapid assembly shelter, or DRASH, and camouflage netting. (Sgt. John Pascucci)</media:description></media:content></item><item><title>Why isn’t Russia doing more to jam GPS in Ukraine?</title><link>https://www.c4isrnet.com/opinion/2022/07/22/why-isnt-russia-jamming-gps-harder-in-ukraine/</link><description>The importance of GPS as a military tool was underscored by Kremlin media in November 2021 as troops were massing along the Ukraine border. After Russia demonstrated it could destroy a satellite in space, a television commentator known to be an unofficial mouthpiece of President Putin said the nation could “blind NATO” by shooting down all GPS satellites.</description><guid isPermaLink="true">https://www.c4isrnet.com/opinion/2022/07/22/why-isnt-russia-jamming-gps-harder-in-ukraine/</guid><dc:creator>Dana Goward</dc:creator><pubDate>Tue, 26 Jul 2022 18:11:06 +0000</pubDate><content:encoded><![CDATA[<p>Russian forces have been regularly jamming signals from the U.S. Global Positioning System as part of its war on Ukraine. These signals underlie many aspects of modern warfare, from navigating surveillance drones and targeting missiles to enabling mobile radios.</p><p>The importance of GPS as a military tool was underscored by Kremlin media in November as troops were massing along the Ukraine border. After Russia demonstrated it could destroy a satellite in space, a television commentator known to be an unofficial mouthpiece of President Vladimir Putin said the nation could “blind NATO” by shooting down all GPS satellites.</p><p>Despite this, Russian interference with GPS in Ukraine has not been nearly as aggressive as many observers had expected.</p><p>Experts within the GPS/positioning, navigation, and timing communities have proposed a number of possible reasons for this. Here are the most prevalent, all of which are based entirely on publicly available information:</p><p><b>Russia’s electronic warfare capability isn’t as good as it was thought to be.</b> Russian forces have a fearsome reputation when it comes to electronic warfare. And they go out of their way to reinforce this. At one point, the state-owned news agency <a href="https://www.spacedaily.com/reports/Russian_E_Warriors_Render_Aircraft_Carriers_Useless_999.html">Sputnik proclaimed Russian EW capabilities “render aircraft carriers useless.”</a></p><p>The popular wisdom is that they have developed and maintained this capability as a response to superior technology used by Western forces. Electronic warfare can be an inexpensive way to level the playing field.</p><p>Since Russian forces have been surprisingly less capable than expected in other aspects of the Ukraine conflict, some think this may be true with their ability to interfere with GPS.</p><p>Most observers discount this suggestion, though.</p><p>They point out that Russian forces regularly jam GPS signals in northern Norway from locations far across the border. And that in some cases this jamming has been so precise, signals in a nearby frequency band from Russia’s GLONASS satellite navigation system have been unaffected.</p><p>Russia has clearly demonstrated impressive abilities to spoof GPS over wide areas. Users in downtown Moscow often find their equipment falsely reporting they are at an airport. The same is true in many coastal areas, the Black Sea and other locations where senior government officials are to be found.</p><p>A 2016 Moscow Times headline read “<a href="https://www.themoscowtimes.com/2016/10/21/the-kremlin-eats-gps-for-breakfast-a55823">The Kremlin eats GPS for Breakfast</a>.” The general consensus in the community is that there has been a lot of evidence to support that claim.</p><p>The question is then, why is the Kremlin only nibbling at GPS in Ukraine?</p><p><b>Russian forces use and need GPS. </b>Proponents of this idea point to downed <a href="https://www.businessinsider.com/russia-su34-jets-basic-gps-receivers-taped-to-dashboards-uk-2022-5">Russian fighter jets found to have GPS receivers</a> taped to their dashboards.</p><p>Signals from Russia’s GLONASS system and terrestrial Chayka electronic navigation system are both available for use in Ukraine. Yet it seems likely there not enough compatible receivers for these systems to equip all Russian forces. As the world’s first global navigation satellite system, GPS receivers have become both plentiful and inexpensive. Cheap GPS receivers and some duct tape seems like an interim solution for some poorly equipped Russians.</p><p>Also, GPS signals support a wide variety of infrastructure. Telecommunications, the internet, electrical grids and machine-control systems all rely on GPS for timing. Russian forces may wish to protect Ukraine’s infrastructure for their own benefit and use. Prolonged and widespread attacks on GPS signals could cause serious infrastructure problems with long-term strategic downsides greater than any temporary tactical gains.</p><p><b>High-power, persistent GPS jammers are easily targeted.</b> Any strong and consistent radio frequency transmission can be easily located and attacked. Many militaries have missiles specially designed to home in on and destroy jamming transmitters. Even without such weapons, direction-finding technology can pinpoint a transmitter enabling an artillery attack or an air or ground assault. Russian commanders may be limiting transmission power and time on air to avoid attracting hostile fire.</p><p><b>Ukraine is less impacted. </b>While Ukraine is increasingly receiving and using more Western weapons, many of which use GPS, it also has <a href="https://www.washingtonpost.com/world/2022/04/29/urkaine-russian-soviet-weapons/">huge stockpiles of Soviet-era weapons</a>. These don’t rely on GPS and are likely unaffected by most, if not all, forms of electronic warfare. Also, Ukrainian regular and irregular forces are likely less reliant upon sophisticated command, control and communications systems used by larger militaries. Thus, GPS jamming that could hamper normal operations for the U.S. and NATO may have less impact in Ukraine.</p><p><b>Saving the best to use against the U.S. and NATO. </b>Despite the location of the conflict, Ukraine is not the enemy Vladimir Putin is really worried about. His concerns focus on the U.S. and NATO. Deploying Russia’s most sophisticated and powerful electronic weapons in Ukraine would enable adversaries to study technologies and tactics. This would lead to the development of countermeasures and make the weapons less effective in future conflicts.</p><p>Better for Russia to keep its best tools and tricks for interfering with GPS in reserve, for use later against larger forces and more important targets.</p><p><i>Dana Goward is president of the Resilient Navigation and Timing Foundation and serves on the U.S. National Space-Based Positioning, Navigation, and Timing Advisory Board.</i></p><p>Have an opinion?</p><p><i>This article is an Op-Ed and as such, the opinions expressed are those of the authors. If you would like to respond, or have an editorial of your own you would like to submit, please </i><a href="mailto:cary.oreilly@C4ISRNET.com"><i>email C4ISRNET Senior Managing Editor Cary O’Reilly</i></a><i>.</i></p><p><i>Want more perspectives like this sent straight to you? </i><a href="https://link.militarytimes.com/join/5b9/sign-up-opinion"><i>Subscribe to get our Commentary &amp; Opinion newsletter</i></a><i> once a week.</i></p>]]></content:encoded><media:content height="889" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/H4DSTV2OJVFGLMNDGYQE7LGJTA.jpg" width="1280"><media:description>This sample provided by Hakweye 360 shows what it looks like when systems detect GPS interference. (Hawkeye 360)</media:description></media:content></item><item><title>US seeking to understand Russia’s failure to project cyber power in Ukraine</title><link>https://www.c4isrnet.com/cyber/2022/07/21/us-seeking-to-understand-russian-failures-to-project-cyber-power-in-ukraine/</link><description>“With regard to the Russian use of cyber and our takeaways,” Anne Neuberger said, “there are any number of theories for what we saw and what, frankly, we didn’t see.”</description><guid isPermaLink="true">https://www.c4isrnet.com/cyber/2022/07/21/us-seeking-to-understand-russian-failures-to-project-cyber-power-in-ukraine/</guid><dc:creator>Colin Demarest</dc:creator><pubDate>Thu, 21 Jul 2022 18:08:26 +0000</pubDate><content:encoded><![CDATA[<p>WASHINGTON — After some five months of war raging in Eastern Europe, feared Russian ranks of hackers have had an underwhelming impact on Ukrainian networks and critical infrastructure in the U.S. and other nations. The question is: why?</p><p>“With regard to the Russian use of cyber and our takeaways, there are any number of theories for what we saw and what, frankly, we didn’t see,” Anne Neuberger, deputy national security adviser for cyber and emerging technology, said July 20 at <a href="https://www.youtube.com/watch?v=wVtoQ2M8KRw" target="_blank">the Aspen Security Forum</a>.</p><p>“Some argue for the deterrence the U.S. has put in place,” she said, pointing to President Joe Biden’s meeting with Russian President Vladimir Putin following the Colonial Pipeline ransomware attack. “Some argue that it was the result of the extensive cybersecurity preparations Ukraine did, supported by allies and partners. And some argue that we don’t quite know.”</p><a href="https://www.c4isrnet.com/cyber/2022/07/19/cyber-defense-for-critical-infrastructure-approved-by-house/">Cybersecurity for critical infrastructure approved in $840 billion defense bill</a><p>While Russia did use cyberattacks to buttress its Feb. 24 invasion and continues to leverage the digital domain to aid its lurching offensives, what hasn’t been seen — and what many expected — are <a href="https://www.defensenews.com/cyber/2022/06/17/prolonged-war-may-make-russia-more-cyber-aggressive-us-official-says/" target="_blank">massive hacks that cripple power plants</a> and other infrastructure and retaliate against those assisting Ukraine.</p><p>Russia, historically, uses cyber to project power and meddle in foreign affairs. An International Institute for Strategic Studies report in 2021 placed the country in tier two of its cyber powerhouse rankings, alongside China but behind the U.S.</p><p>Why hasn’t Russia dominated with cyberattacks?</p><p>Exactly why the cyber operations <a href="https://www.c4isrnet.com/cyber/2022/04/29/feared-russian-cyberattacks-against-us-have-yet-to-materialize/" target="_blank">have fallen short</a> of expectations thus far is still up for debate, according to Neuberger, who previously served as the National Security Agency’s cybersecurity chief.</p><p>Biden in March said evolving intelligence showed Russia was planning stateside cyberattacks and cautioned the magnitude was “fairly consequential.” Neuberger on Wednesday said the potential for future attacks is being monitored very closely.</p><p>“It’s something I talk about with my <a href="https://www.c4isrnet.com/cyber/2022/05/05/nsa-cyber-boss-seeks-to-discourage-vigilante-hacking-against-russia/" target="_blank">intelligence and cyber colleagues</a> around the world regularly,” she said.</p><p>U.S. Cyber Command worked with Ukraine to reinforce network defenses and conducted related offensive operations, according to Gen. Paul Nakasone, who leads both the command and the NSA.</p><p>CYBERCOM also dispatched specialists to nearby Lithuania for three months to root out malign activity and inform future security efforts. Lithuanian Vice Minister of National Defense Margiris Abukevicius<a href="https://www.airforcetimes.com/cyber/2022/05/05/us-cyber-squad-boosts-lithuanian-defenses-amid-russian-threat/?contentFeatureId=f0fmoahPVC2AbfL-2-1-8&amp;contentQuery=%7B%22section%22%3A%22%2Fhome%22%2C%22exclude%22%3A%22%2Fcyber%22%2C%22from%22%3A5%2C%22size%22%3A10%7D" target="_blank"> </a>at the time said the “war against Ukraine has demonstrated that cyberattacks are an inseparable element of modern military campaigns” and <a href="https://www.airforcetimes.com/cyber/2022/05/05/us-cyber-squad-boosts-lithuanian-defenses-amid-russian-threat/?contentFeatureId=f0fmoahPVC2AbfL-2-1-8&amp;contentQuery=%7B%22section%22%3A%22%2Fhome%22%2C%22exclude%22%3A%22%2Fcyber%22%2C%22from%22%3A5%2C%22size%22%3A10%7D" target="_blank">preparations must be made</a> “during war and peace alike.”</p><p>Should an attack reach U.S. networks, the country is better prepared to identify the intrusion and ultimately defend itself, Neuberger said, citing the administration’s “relentless focus on improving the security of critical infrastructure” and investment in alliances and information sharing.</p><p>In June, U.S. officials said “robust” resources would be provided to a newly forged NATO program known as the “virtual rapid response cyber capability.” The cooperative, the <a href="https://www.marinecorpstimes.com/cyber/2022/06/30/nato-forging-cyber-response-force-amid-growing-russian-chinese-threats/" target="_blank">product of a summit in Madrid</a>, will use lessons learned from the Russia-Ukraine war to shape its approach.</p>]]></content:encoded><media:content height="2001" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/C5QMOBVJTFGSVELAAUFRJJYODY.jpg" width="3000"><media:description>In this photo provided by the Ukrainian Presidential Press Office on Friday, July 8, 2022, President Volodymyr Zelenskyy attends a meeting with military officials during his visit to the war-torn Dnipropetrovsk region. (Ukrainian Presidential Press Office via AP)</media:description></media:content></item><item><title>As US struggles to fill cyber defense jobs, Australia works to keep talent at home</title><link>https://www.c4isrnet.com/electronic-warfare/2022/07/20/as-us-struggles-to-fill-cyber-defense-jobs-australia-works-to-keep-talent-at-home/</link><description>Australia's artificial intelligence industry leaders point to a gap in the defense workforce at July 20 summit.</description><guid isPermaLink="true">https://www.c4isrnet.com/electronic-warfare/2022/07/20/as-us-struggles-to-fill-cyber-defense-jobs-australia-works-to-keep-talent-at-home/</guid><dc:creator>Catherine Buchaniec</dc:creator><pubDate>Thu, 21 Jul 2022 18:09:47 +0000</pubDate><content:encoded><![CDATA[<p>WASHINGTON — While U.S. companies struggle to fill cybersecurity and artificial intelligence positions, Australia has too few jobs to keep its talent at home, leaving it vulnerable in an increasingly hostile cyber environment, defense industry leaders said.</p><p>Australia is investing millions of dollars into research and development to close gaps in the country’s cyber defense apparatus, they told the Australian Defence Science, Technology and Research Summit in Sydney on June 20.</p><p>And while the talent pool for workers with for AI and machine learning in Australia is deep, Anton van den Hengel, director of the Centre for Augmented Reasoning at the Australian Institute for Machine Learning, said their are simply not enough jobs and career opportunities in the country to keep them at home.</p><p>“We’ve made very little — very little — progress towards artificial intelligence,” he said.</p><p>The U.S. faces a critical cyber labor shortage, with some 700,000 cybersecurity positions open nationwide, according to <a href="https://www.whitehouse.gov/briefing-room/statements-releases/2022/07/18/announcement-of-white-house-national-cyber-workforce-and-education-summit/" target="_blank">estimates</a> from the White House. More than 35,000 job openings are currently posted on the Indeed hiring wesbite using the search term “Artificial Intelligence.”</p><p>Van den Hengel, who also works as a director of applied science at Amazon, and other industry leaders at the summit pointed to the government’s inability to compete with tech companies as a major issue when expanding the country’s AI abilities. In both the U.S. and Australia, governments come up against the draw of private industry, creating high salary costs and other the hurdles to attracting and retaining talent.</p><p>“Defense no longer has the best tech,” he said, noting that private companies have committed billions of dollars to develop technologies and have the open positions to attract workers in the AI field.</p><p>The Defence Science and Technology Group, a part of the Australian defense department aimed at providing science and technology support to national security interests, hosted the summit.</p><p>Private-sector competition intensifies for AI talent</p><p>With high salaries and access to breaking-edge technologies, the private AI field has become increasingly lucrative. In recent years, many western counties, including the U.S., have turned to the private sector to compete with investments made by China.</p><p>Van den Hengel said outsourcing to the private sector only goes so far. Governments have to try and keep track of the technologies coming out of companies while also trying to understand them deeply enough to figure out their defense applications, he said.</p><p>In November, the Australian government <a href="https://www.minister.defence.gov.au/minister/melissa-price/media-releases/10-million-build-defences-ai-capability-and-support-critical#:~:text=%2410%20MILLION%20TO%20BUILD%20DEFENCE'S%20AI%20CAPABILITY%20AND%20SUPPORT%20CRITICAL%20TECH%20FOR%20AUSTRALIA,-18%20November%202021&amp;text=The%20Morrison%20Government%20is%20investing,jobs%20in%20Australia's%20defence%20industry." target="_blank">said</a> it would invest $10 million in innovative AI tech. The move followed the September <a href="https://www.defensenews.com/global/asia-pacific/2021/09/17/what-are-the-regional-reactions-to-the-new-us-uk-australia-security-pact/" target="_blank">announcement</a> that Australia would partner with Britain and U.S. in a new working group, known by the acronym AUKUS, to share advanced technologies, including AI.</p><p>Kate Devitt, the chief scientist of Trusted Autonomous Systems, said Australia specifically needs experts in the field of deep learning and natural language processing compared to companies such as Google and Meta as well as specialists in reinforcement learning.</p><p>“We lack the digital infrastructure and investment required to enable the human capital with these skills to flourish in universities,” she said. “These gaps make Australia vulnerable and dependent on the choices of our allies and our rivals.”</p><p>Trusted Autonomous Systems is Australia’s first defense cooperative research center. It partners the country’s defense industry and research organizations with Australia’s defense department to develop autonomous and robotic technology.</p><p>While Devitt said the “obvious” answer is more investment in technical AI capabilities and infrastructure, she said that Australia needs to be decisive in its investments. As a medium-sized country, the government must use its limited resources to make “scrappy” decisions that yield outsized impacts, she said.</p>]]></content:encoded><media:content height="4000" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/ULVBN554SNBVZBLCNA2ZS3D3KM.jpg" width="4400"><media:description>(fpm/Getty Images)</media:description></media:content></item><item><title>How this Marine saw ‘information warfare’ evolve across combat deployments</title><link>https://www.marinecorpstimes.com/news/your-marine-corps/2022/07/20/how-this-marine-officer-saw-information-warfare-evolve-across-years-of-combat-deployments/</link><description>An "information war-fighting" tool the then-young lieutenant used on patrol in Iraq in the mid-2000s? Beanie Babies.</description><guid isPermaLink="true">https://www.marinecorpstimes.com/news/your-marine-corps/2022/07/20/how-this-marine-officer-saw-information-warfare-evolve-across-years-of-combat-deployments/</guid><dc:creator>Todd South</dc:creator><pubDate>Wed, 20 Jul 2022 19:19:42 +0000</pubDate><content:encoded><![CDATA[<p>Almost as important as his M4, hand grenades and supporting fires, a tool that a young Marine 1st Lt. <a href="https://www.iimef.marines.mil/About/Leaders/Article-View/Article/529486/lieutenant-colonel-agur-s-adams/" target="_blank">Agur Adams</a> pulled from his kit while on patrol in Iraq in the mid-2000s provided its own <a href="https://www.marinecorpstimes.com/news/modern-day-marine/2022/05/13/new-social-media-electronics-policies-likely-on-the-way-for-marines/" target="_blank">“war-fighting function”</a> and a slightly softer touch: Beanie Babies.</p><p>During the hot days of his multiple Iraq deployments between 2004 and 2008, Adams and the Marines he led ― from scout sniper teams to reconnaissance platoons ― met many local leaders and took the opportunity to hand over the squishy toys to children.</p><p>The act felt good. It helped to help. And the kind gesture balanced the rougher purpose his Marines executed each night as they hunted the enemy.</p><p>It also served a larger purpose, building a <a href="https://www.airforcetimes.com/information-warfare/2022/06/29/marine-corps-unveils-information-guidance-as-us-rivals-spew-propaganda/" target="_blank">“prevailing narrative,”</a> a way to show the population that he and his Marines cared.</p><a href="https://www.marinecorpstimes.com/news/your-marine-corps/2022/06/29/ukraine-lessons-take-center-stage-in-marines-corps-new-information-warfare-plan/">Ukraine lessons take center stage in Corps' new information warfare plan</a><p>That prevailing narrative term, it wasn’t a part of the discussion then, but on the ground, through multiple deployments, young leaders such as Adams saw information emerging as a critical piece of winning the fight.</p><p>More than a decade later, the Marine Corps has defined “information” as a war-fighting function, built the Marine expeditionary force information group, or MIG, and established a deputy commandant of information, a three-star general position.</p><p>In June, the Corps released its Marine Corps Doctrinal Publication 8, Information, setting down the fundamentals of how the service wants its Marines to include information in all planning, exercises and operations.</p><p>Though the language is new, some of what Adams and thousands of other Marines saw in the most recent wars echoes what’s become a priority for the Corps: information used to enable maneuver warfare or even deterring a fight before it erupts.</p><p>“Information was not part of that conversation,” Adams told Marine Corps Times. “We were focused on this idea, find then capture or kill or eliminate the enemy in some way, shape or form.”</p><p>But the beginnings, such as the Beanie Baby example, were surfacing, and in troubling ways.</p><p>Adams remembers when he first started seeing terrorist and insurgent groups staging attacks on Marine positions almost purely so that they could video record them and post them as online propaganda.</p><p>“As I progressed in my time, I saw that as a technique the enemy was using again and again and again to get out their prevailing narrative,” Adams said. “It became real for me in that timeframe.”</p><p>Adams describes leaving the theater in 2009 after those deployments as a “Eureka!” moment when he saw just how much the enemy was using information to its advantage.</p><p>ISIS elevated the information warfare game, making high-production-value online videos and stretching their message across the globe.</p><p>At the same time, Adams was tracking information sources as part of the Special Purpose Marine Air-Ground Task Force across all of U.S. Central Command. He experienced the proactive and reactive or offensive and defensive evolution of information, as it played out in the region.</p><p>“It was not just getting information, but prioritizing information from other sources to tap into that to build a sight picture for a commander on where a crisis might emerge,” Adams said.</p><p>His scout sniper and recon experience led to adviser training in Iraq and later intelligence work with the Special Purpose Marine Air-Ground Task Force-Crisis Response combatting the Islamic State in 2017. Most recently, the now-Lt. Col. Adams, commanded 2nd Radio Battalion, Camp Lejeune, North Carolina.</p><p>Now a mid-career officer, Adams can offer deployment-earned guidance as his Marines learn how information affects everything they do. Though they likely already know some of it.</p><p>He said that many young Marines now are “digital natives” living much of their lives online. Explaining the landscape isn’t necessarily the focus.</p><p>Instead, Adams said, leaders can help define what a Marine’s new responsibilities are in this environment where Marines are always being watched, on the home front and on deployment.</p><p>Actions that lance corporals took in small Iraqi villages did have impacts that spread across the globe.</p><p>The 1990s-era vision of the “strategic corporal” formulated by then-Commandant Gen. Charles Krulak came into stark relief in those settings.</p><p>The environment has only grown more saturated with eyes watching and ways to blast that message out more rapidly and widely.</p><p>“Realize what the weight of your actions can carry, they have tremendous impact and therefore we need to act judiciously, and you need to understand and be aware of what those implications might be,” Adams said.</p><p>The Corps sees a training need there too.</p><p>Marine Corps Times sister publication <a href="https://www.airforcetimes.com/information-warfare/2022/06/29/marine-corps-unveils-information-guidance-as-us-rivals-spew-propaganda/" target="_blank">C4ISRNET</a> reported in June that MCDP 8, Information calls for media literacy training across the ranks.</p><p>U.S. forces have been complacent, Deputy Commandant of Information Lt. Gen. Matthew Glavy told reporters in a June 28 interview session, assuming that information is “like the air we breathe” and will always be available and there are no consequences to using it incorrectly.</p><p>From collecting to verifying preserving and using information, Marines at every rank need a reframed focus on the vital importance of information.</p><p>That’s because it’s not only the decisions Marines make in far-off combat outposts but what they’re doing online from their barracks rooms. They’re being watched by adversaries online, too.</p><p>The new doctrinal publication specifically cites ongoing events in Ukraine and how that conflict is being fought with information at a scale not previously seen.</p><p>Glavy told Marine Corps Times that as Marine leaders drafted the new publication, they paused to edit and add in specifics from the ongoing conflict at Commandant Gen. David Berger’s direction.</p><p>“When we are complacent with understanding the power of information, we will lose, we will lose,” Glavy said. “We see it time and time again: those who are slow on the uptake of messaging, and how important their narrative is … will have problems.”</p>]]></content:encoded><media:content height="1022" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/2FZTF6ZSRZCLBILTOOZZPOHMCI.jpg" width="1431"><media:description>Marine Corps Lt. Col. Agur Adams, Commanding Officer of 2nd Radio Battalion, 2nd Marine Expeditionary Force Information Group, speaks to the Marines present during the 2nd Marine Information Group’s celebration of the 245th Marine Corps Birthday on Camp Lejeune, North Carolina, Nov. 12, 2020. (Lance Cpl. Henry Rodriguez/Marine Corps)</media:description></media:content><media:content height="3328" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/XDYDLGCEXNCJHMAVXIQVYFIJ4Q.jpg" width="4992"><media:description>Then Marine Capt. Agur S. Adams (left) from Washington D.C., an intelligence officer with 1st Battalion, 4th Marine Regiment, Regimental Combat Team 1 writes notes while Lt. Col. Eric C. Hastings (center), Battalion Commander of 1/4, RCT-1 has a conversation with Shiek Khamsi Hasnawi Aifan Ad Issawi, the leader of the shiek Tribal Council in Al Fallujah, Iraq, Nov. 19, 2008. (Marine Corps)</media:description></media:content><media:content height="866" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/4UHONXJLS5EKPCUFEHIK3JDIYA.jpg" width="690"><media:description>Lt. Col. Agur S. Adams (Marine Corps)</media:description></media:content></item><item><title>Lockheed nabs $59 million order for Stryker cyber, electronic warfare suite</title><link>https://www.c4isrnet.com/electronic-warfare/2022/07/14/lockheed-nabs-59-million-order-for-stryker-cyber-electronic-warfare-suite/</link><description>Officials have said the Terrestrial Layer System-Brigade Combat Team program will help defeat threats on an increasingly digital battlefield.</description><guid isPermaLink="true">https://www.c4isrnet.com/electronic-warfare/2022/07/14/lockheed-nabs-59-million-order-for-stryker-cyber-electronic-warfare-suite/</guid><dc:creator>Colin Demarest</dc:creator><pubDate>Thu, 14 Jul 2022 15:59:56 +0000</pubDate><content:encoded><![CDATA[<p>WASHINGTON — Lockheed Martin secured a $58.8 million contract to furnish prototypes for the Terrestrial Layer System-Brigade Combat Team program, meant to give soldiers a relevant suite of electronic warfare, cyber and signals intelligence capabilities.</p><p>The other transaction authority agreement, announced July 13 by the U.S. Army, runs through October 2023. Lockheed will provide prototypes <a href="https://www.c4isrnet.com/electronic-warfare/2021/09/27/lockheed-scores-us-army-contract-for-major-electronic-warfare-intel-and-cyber-platform/" target="_blank">mounted into Stryker combat vehicles</a> ready for operational assessment and issuance to an initial unit.</p><p>The TLS-BCT is considered a next-generation platform for the Army that brings the service one step closer to satisfying the joint all-domain operations philosophy, a holistic approach to planning and fighting. The system is designed to boost awareness and offer troops more offensive options that can deny or degrade enemy systems.</p><p>Officials have said the TLS-BCT will help defeat contemporary threats on an increasingly digital battlefield. Modern warfare often revolves around <a href="https://www.c4isrnet.com/electronic-warfare/2019/02/21/heres-what-the-army-is-looking-for-in-its-new-ew-program/#:~:text=The%20Terrestrial%20Layer%20System%20%28TLS%29%20is%20an%20integrated,old%20Multi-Functional%20Electronic%20Warfare%20Ground%20and%20Dismounted%20system." target="_blank">control of the electromagnetic spectrum</a>, which is relied upon to communicate with allies and identify and suppress adversaries.</p><p>“The new integrated suite of signals intelligence, electronic warfare, and cyberspace operations provides the warfighter with critical situational awareness of the enemy through detection, identification, location, exploitation, and disruption of enemy signals of interest,” said Ken Strayer, the project manager for electronic warfare and cyber at the Army’s Program Executive Office for Intelligence, Electronic Warfare and Sensors.</p><p>The deal announced Wednesday is the latest advancement in the effort, and marks another win <a href="https://www.militarytimes.com/battlefield-tech/it-networks/5g/2022/03/23/lockheed-eyes-project-convergence-after-successful-5g-expedition/" target="_blank">for Lockheed</a>.</p><a href="https://www.c4isrnet.com/battlefield-tech/it-networks/2022/07/07/stryker-power-problem-uncovered-in-test-of-us-army-network-gear/">Stryker power problem uncovered in test of US Army network gear</a><p>The Maryland-based aerospace and defense company in September won a $9.6 million second-round contract, beating out Boeing subsidiary Digital Receiver Technology and allowing it to continue development.</p><p>At the time, Lockheed said it would spend a few months <a href="https://news.lockheedmartin.com/2021-10-18-US-Army-Chooses-Lockheed-Martin-to-Continue-Development-of-Terrestrial-Layer-System-for-its-Tactical-Vehicles" target="_blank">finalizing hardware and software</a> designs based on previous experience and soldier feedback.</p><p>Deon Viergutz, vice president of Lockheed’s spectrum convergence division, on July 14 said he and his team were “pleased to continue” their partnership with the Army and its program “that will help soldiers operate effectively within the electromagnetic spectrum.”</p><p>“TLS-BCT is an example of Lockheed Martin’s 21st century security vision in action, taking a cutting-edge program from concept to fully fielded prototype under an aggressive schedule to put this important capability into the hands of the warfighter, helping them be ready for future mission needs,” <a href="https://www.linkedin.com/in/deon-viergutz-3170b54/" target="_blank">Viergutz said</a>.</p><p>The Army this year identified a power problem associated with new networking tools and older Strykers during a live-fire exercise in Germany. Officials on June 23 told reporters the matter was under investigation and would be fixed, and that a solution may already exist with newer variants.</p><p>The Program Executive Office for Ground Combat Systems, which <a href="https://www.defensenews.com/land/2022/06/03/russian-invasion-of-ukraine-sparks-renewed-interest-in-stryker-protection-system/" target="_blank">works with Strykers</a>, was looped in to help.</p>]]></content:encoded><media:content height="2667" medium="image" type="image/png" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/Y2JN2VVRMJBXZFNZBK5QLISQIQ.png" width="4000"><media:description>The U.S. Army on Wednesday said it selected Lockheed Martin to provide prototypes for its Terrestrial Layer System–Brigade Combat Team program. (Provided/Lockheed Martin)</media:description></media:content></item><item><title>BAE Systems delivers new M-code GPS receivers to Germany under first non-US sale</title><link>https://www.defensenews.com/global/europe/2022/07/13/bae-systems-delivers-new-m-code-gps-receivers-to-germany-under-first-non-us-sale/</link><description>Berlin placed the order for an undisclosed number of receivers in 2020 as a Foreign Military Sale (FMS) fulfilled through U.S. Space Systems Command (SSC).</description><guid isPermaLink="true">https://www.defensenews.com/global/europe/2022/07/13/bae-systems-delivers-new-m-code-gps-receivers-to-germany-under-first-non-us-sale/</guid><dc:creator>Vivienne Machi</dc:creator><pubDate>Sun, 17 Jul 2022 16:02:00 +0000</pubDate><content:encoded><![CDATA[<p>STUTTGART, Germany — Germany has received its first batch of anti-spoofing, anti-jamming military-code GPS equipment, in the first non-U.S. sale of this equipment, manufacturer BAE Systems announced Tuesday.</p><p>The advanced M-code GPS receivers will be used for ground-based missions, BAE said in a statement. Germany placed the order for an undisclosed number of receivers <a href="https://www.c4isrnet.com/battlefield-tech/space/2020/11/24/allies-begin-ordering-m-code-enabled-gps-receivers/"><u>in 2020</u></a>, and the order was processed as a Foreign Military Sale (FMS), via a contract managed by U.S. Space Systems Command (SSC).</p><p>“Germany is the first country to receive M-Code GPS capabilities via FMS, leading the way among our allies,” Greg Wild, director of Navigation and Sensor Systems at BAE Systems, said in the release. “Accelerating the delivery of M-Code capabilities to allied warfighters around the globe is critical to ensuring trusted PNT in the face of modern threats from our adversaries.”</p><p>The Miniature Precision Lightweight GPS Receiver Engine – M-Code (MPE-M) can provide assured position, navigation, and timing for equipment such as handheld devices, ground vehicles, and unmanned aerial systems (UAS), BAE said.</p><p>The company declined to share how many systems were delivered to Berlin. In an email to Defense News, a spokesperson said that “a number of international customers” have expressed interest in the M-code technology, but would not provide further details on which countries.</p><p>“Any orders for our M-Code receivers will be processed by the U.S. FMS Office,” the spokesperson added.</p><p><a href="https://www.c4isrnet.com/battlefield-tech/space/2021/07/15/space-force-declares-operational-acceptance-of-fifth-anti-jamming-gps-iii-satellite/"><u>Twenty-four of the GPS satellites currently in orbit broadcast the M-code signal,</u></a><b> </b>including the five GPS III satellites that have been launched to date. Last December, BAE Systems received a new order from the Defense Logistics Agency to procure new M-code receivers for the U.S. military, bringing the total contract value up to $641 million.</p><p>In March 2021, <a href="https://www.c4isrnet.com/battlefield-tech/space/2021/03/25/space-force-begins-loaning-anti-jamming-gps-tech-to-allies/"><u>the U.S. Space Force launched a three-year program during which allies can borrow receiver cards for M-Code-ready Military GPS User Equipment (MGUE) </u></a>technology for their own laboratory and field testing.</p>]]></content:encoded><media:content height="5362" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/2QHAUNJQUVA2NFTJ7WTJCMTW3M.jpg" width="8040"><media:description>Soldiers of the Bundeswehr's Panzerbrigade 21 tank brigade are pictured with electronic communication equipment in Augustdorf, Germany, in March 2022. The Bundeswehr stands to get a batch of advanced GPS receivers made by BAE Systems and sold through the U.S. government. (Photo by Andreas Rentz/Getty Images)</media:description></media:content></item><item><title>US must prepare for proliferation of cyber warfare</title><link>https://www.c4isrnet.com/it-networks/2022/06/24/us-must-prepare-for-proliferation-of-cyber-warfare/</link><description>To build cyber resilience in this heightened threat environment, agencies must work closely with both international counterparts and industry to align on a proactive, global approach to all cyber threats –– not just state-sponsored attacks.</description><guid isPermaLink="true">https://www.c4isrnet.com/it-networks/2022/06/24/us-must-prepare-for-proliferation-of-cyber-warfare/</guid><dc:creator>Jim Richberg</dc:creator><pubDate>Fri, 24 Jun 2022 11:51:10 +0000</pubDate><content:encoded><![CDATA[<p>Urgent calls from the Biden administration to strengthen cyber defenses amid the Ukraine crisis and overall heightened threat environment underscore the growing concern over the impact a cyber incident would have on U.S. networks and critical infrastructure.</p><p>This year’s <a href="https://www.whitehouse.gov/briefing-room/legislation/2022/03/15/bill-signed-h-r-2471/">$1.5 trillion omnibus spending package</a> includes an <a href="https://www.cisa.gov/news/2022/03/11/statement-cisa-director-easterly-passage-cyber-incident-reporting-legislation">unprecedented budget increase</a> for the Cybersecurity and Infrastructure Security Agency, as well as tightened cyber incident reporting requirements for sectors like transportation and energy.</p><p>To build cyber resilience in this heightened threat environment, agencies must work closely with both international counterparts and industry to align on a proactive, global approach to all cyber threats –– not just state-sponsored attacks. That means understanding the threat landscape, shoring up critical infrastructure and developing a plan to coordinate well before attacks happen.</p><p><b>Understanding an increasingly turbulent cyber threat landscape</b></p><p>In general, the massive state-sponsored cyberattacks many analysts expected on critical infrastructure in Ukraine and elsewhere have yet to materialize. Still, the conflict has given rise to a <a href="https://www.nbcnews.com/tech/security/hacktivists-new-veteran-target-russia-one-cybers-oldest-tools-rcna20652">complex and shadowy landscape</a> of citizen cyber hacktivists, vigilantes and criminal groups taking advantage of the crisis to steal money and working as potential proxies for state actors.</p><p><a href="https://www.fortinet.com/blog/threat-research/bad-actors-capitalize-current-events-email-scams">Chatter within ransomware groups</a> indicates some threat actors are siding with Russia, some with the West and some are simply using the theater of war as a smokescreen to facilitate cybercrime. FortiGuard Labs researchers also identified email <a href="https://www.fortinet.com/blog/threat-research/bad-actors-capitalize-current-events-email-scams">phishing scams</a> perpetrated by opportunistic criminals posing as trusted organizations like the United Nations to fraudulently solicit donations and potentially infect devices.</p><p>History shows the potential for outsized impact when the tools of cyber conflict inevitably proliferate. In 2017, for example, the <a href="https://www.fortinet.com/blog/industry-trends/analyzing-the-history-of-ransomware-across-industries">NotPetya</a> ransomware initially was launched in the update servers for accounting software in Ukraine but quickly and predictably spread worldwide, affecting even large and well-prepared firms and causing an estimated <a href="https://www.apextechservices.com/topics/articles/435235-notpetya-worlds-first-10-billion-malware.htm">$10 billion</a> in damage.</p><p>Many analysts believe that despite having some of the surface charactaristics of ransomware, NotPetya was intended from the outset to be destructive, rather than a tool for criminal profit. And as the conflict in Ukraine continues, threat researchers are encountering increasing amounts of “wiperware”––malicious software designed to disrupt operations or delete data.</p><p><b>Shoring up critical infrastructure</b></p><p>Within the United States, new investments in cybersecurity from both the omnibus bill and the <a href="https://www.whitehouse.gov/briefing-room/statements-releases/2021/08/02/updated-fact-sheet-bipartisan-infrastructure-investment-and-jobs-act/">Infrastructure Investment and Job Act</a> offer a unique opportunity to help mitigate the risk of both state-sponsored and criminal cyberattacks on critical infrastructure.</p><p>Recent <a href="https://www.cisa.gov/control-systems-goals-and-objectives">CISA guidance</a> emphasizes the vital importance of including cybersecurity in the design of new infrastructure projects, regardless of the sector or the size of the organization. This is where national cybersecurity becomes a state and local issue as well. <a href="https://statescoop.com/state-local-cyber-grant-program-summer-cisa/">This summer,</a> CISA is expected to issue guidelines to help mayors and governors utilize the law’s $1 billion cyber grant program dedicated to building cyber maturity at the state and local level. However, if we spent only $1 billion on cybersecurity out of a $1.2 trillion total, we would be woefully underinvesting in cybersecurity and resilience.</p><p>For those state and local governments, it’s better to build in cyber protocols now as the infrastructure upgrades are being planned and implemented than trying to chase down vulnerabilities as they’re being exploited.</p><p><b>Coordinating across borders and sectors</b></p><p>In addition to fortifying our defenses domestically, slowing the success of malicious cyber actors will require robust cooperation beyond our borders, as well collaboration with the private sector.</p><p>That means more information sharing before, during and after attacks. President Biden even went so far as to write guidelines into his 2021 cyber <a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/">executive order</a>, ensuring that IT services providers be able to share information with the government as a whole and require them to share certain breach information. And the recently enacted <a href="https://www.cisa.gov/circia">Cyber Incident Reporting for Critical Infrastructure Act</a> requires that critical infrastructure providers notify CISA of any significant cyber incident within 72 hours or any ransomware payment within 24 hours.</p><p>Internationally, governments and the private sector should be aligning cyber defense and mitigation playbooks among NATO allies—a critical first step to mitigate the risk of burgeoning threats. Beyond that, multilateral organizations such as the <a href="https://www.fortinet.com/ru/corporate/about-us/newsroom/press-releases/2019/fortinet-serves-as-a-founding-partner-of-world-economic-forum-s-">World Economic Forum Centre for Cybersecurity</a> could convene global public-private partnerships to encourage information-sharing and the development of cyber norms.</p><p>This is just a taste of what we’ll need to do in the coming months and years, but it’s a good start.</p><p>Delivering more effective cybersecurity to protect our nation’s networks is a complex challenge –– one that will require governments and industry to work together effectively to confront. Progress is necessary and it will take an effort of allies. No single government or organization or cybersecurity vendor can take this on alone.</p><p><i>Jim Richberg is public sector field CISO at Fortinet. He formerly served as the national intelligence manager for cyber in the Office of the Director of National Intelligence, where he set national cyber intelligence priorities.</i></p>]]></content:encoded><media:content height="4000" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/C5OKFYT6FNCF7FP245DDNUFPMY.jpg" width="6000"><media:description>Pennsylvania National Guard Soldiers with the Defense Cyber Operations Element participate in Cyber Shield 20 at Fort Indiantown Gap, Pennsylvania, Sept. 20, 2020. In total 16 PNG Soldiers joined more than 800 National Guard Soldiers and Airmen from more than 40 states for the exercise designed to sharpen their skills as network defenders from Sept. 12-27.</media:description></media:content></item><item><title>US Air Force seeks tech sweet spot for Advanced Battle Management System</title><link>https://www.c4isrnet.com/battlefield-tech/it-networks/2022/06/23/us-air-force-seeks-tech-sweet-spot-for-advanced-battle-management-system/</link><description>“Those who have followed this ABMS journey, they’ve probably seen that it’s evolved over time as we learn more,” said Gen. CQ Brown, U.S. Air Force chief of staff.</description><guid isPermaLink="true">https://www.c4isrnet.com/battlefield-tech/it-networks/2022/06/23/us-air-force-seeks-tech-sweet-spot-for-advanced-battle-management-system/</guid><dc:creator>Colin Demarest</dc:creator><pubDate>Thu, 23 Jun 2022 19:37:26 +0000</pubDate><content:encoded><![CDATA[<p>WASHINGTON — The U.S. Air Force must strike the right balance of old and new, saving and spending, to successfully build out its Advanced Battle Management System, according to the service’s chief of staff, Gen. CQ Brown.</p><p>Understanding exactly how dated technologies will interact with newer ones and what must be carried forward in favor of what must be left behind is “where some of the tension” resides when developing the next of generation of command and control, Brown said at <a href="https://www.youtube.com/watch?v=Ubae9X2bPIk" target="_blank">a Hudson Institute event</a> June 22.</p><p>“You look at some of our weapon systems, they were all developed at different times. Some of them were developed before the internet was a thing. So how do you then make something backward compatible? And in that lies part of our challenge,” Brown said. “And then how much do you invest? If it’s a radio or piece of hardware, if you’ve got to buy one for every single airplane, that gets pretty expensive.”</p><p>ABMS is the <a href="https://www.airforcetimes.com/battlefield-tech/it-networks/2022/06/16/how-war-in-ukraine-is-informing-future-us-air-force-networks/" target="_blank">Air Force’s contribution</a> to Joint All-Domain Command and Control, or JADC2, the Department of Defense’s vision of seamless information sharing across land, air, sea, space and cyber.</p><p>Using cloud environments, artificial intelligence, updated communications gear and more, the Air Force hopes to quickly dispatch more and more-tailored information to forces on the battlefield.</p><p>“You don’t want to be all the way back at the headquarters directing traffic or having the puppet strings. You need to allow the airmen to go out and execute, and that’s the key part. You’ve got to push the information forward,” <a href="https://www.airforcetimes.com/news/your-air-force/2022/06/16/space-force-seeks-a-bigger-voice-in-military-operations/" target="_blank">Brown said</a>. “ABMS is not just one system. What we find is we have a number of communication systems.”</p><p>Realizing those systems, though, has proven tricky. Congress dinged the endeavor before — slashing millions in funding — and watchdogs questioned its fitness.</p><p>In describing ABMS as one of his seven “operational imperatives,” Air Force Secretary Frank Kendall has called for <a href="https://www.af.mil/News/Article-Display/Article/2953552/kendall-details-seven-operational-imperatives-how-they-forge-the-future-force/" target="_blank">spending discipline</a> and tangible success.</p><p>“We can’t invest in everything and we shouldn’t invest in improvements that don’t have clear operational benefit,” he said at the Air Force Association’s Warfare Symposium in March. “We must be more focused on specific improvements with measurable value and operational impact.”</p><p>Moving forward, <a href="https://www.defensenews.com/air/2022/06/16/a-10-retirements-more-air-force-f-35s-in-senate-defense-policy-bill/" target="_blank">the Air Force</a> is focusing on what systems can breeze ahead and what needs tinkering to remain effective and compatible with key information streams, according to Brown.</p><p>In some cases, a data translator is needed. In others, it’s not so simple.</p><p>“Those who have followed <a href="https://www.c4isrnet.com/battlefield-tech/it-networks/2022/03/10/congress-wants-to-give-air-force-an-extra-65-million-for-abms/" target="_blank">this ABMS journey</a>, they’ve probably seen that it’s evolved over time as we learn more,” Brown said. “I think, in some cases, we were very visionary about what we wanted to do, starting out.”</p>]]></content:encoded><media:content height="3707" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/XFACMH7NNVBQNPSVAMWTDO45AI.jpg" width="5559"><media:description>Gen. CQ Brown, left, chief of staff of the U.S. Air Force, testifies before the Senate Armed Services Committee on May 3, 2022, in Washington. (Patrick Semansky/AP Photo)</media:description></media:content></item><item><title>Parsons’ chief executive talks acquisitions, Ukraine and the defense budget</title><link>https://www.defensenews.com/industry/2022/06/23/parsons-chief-executive-talks-acquisitions-ukraine-and-the-defense-budget/</link><description>Carey Smith took over as chief executive of Parsons in April 2021. Since then, the contractor has kept up a busy pace of acquisitions, most recently picking up Xator, which specializes in cybersecurity, counter-drone technology, biometrics and more.</description><guid isPermaLink="true">https://www.defensenews.com/industry/2022/06/23/parsons-chief-executive-talks-acquisitions-ukraine-and-the-defense-budget/</guid><dc:creator>Marjorie Censer</dc:creator><pubDate>Fri, 24 Jun 2022 17:42:56 +0000</pubDate><content:encoded><![CDATA[<p><i>Editor’s note: This story initially included an inaccurate date for the start of Smith’s tenure. She took over in July 2021.</i></p><p>WASHINGTON — Carey Smith took over as chief executive of Parsons in July 2021. Since then, the defense and infrastructure company has kept up a busy pace of acquisitions, most recently picking up Xator, which specializes in cybersecurity, counter-drone technology, biometrics and more.</p><p>The $400 million deal this month added more than 1,000 new employees to Parsons, primarily in its engineered systems unit. Smith said Parsons prides itself on a stable retention rate, even as acquisitions typically generate a wave of departures and the COVID-19 pandemic has driven significant turnover across industries.</p><p>Defense News sat down with Smith to discuss her tenure and what’s ahead. This interview was edited for clarity and space.</p><p><b>Looking back, what were your top priorities coming in as CEO a year ago?</b></p><p>I had three, which is we’re a people-first company. How do we make sure that everybody who comes to work every day wants to be very engaged and involved, and how do we ensure we have a unique culture here?</p><p>The second one is something I call “get to yes,” which is really: How do we support the [profit and loss] functions to be able to execute business and win more business by having agile processes?</p><p>Then the third one is having top positions in high-growth markets. It would be, in federal, focused on cyberspace, missile defense, C5ISR; and now, with the addition of Xator, critical infrastructure protection.</p><p><b>You’ve talked about how the war in Ukraine could lead to new business. What could that open up in terms of opportunities?</b></p><p>Russia and China are fighting as near-peer threats an information war. And if you’re fighting information warfare, it’s a consolidation of cyber, electromagnetic spectrum and information operations. If you look at where our investment’s been, we’ve been enabling the company to be able to position against near-peer threats by fighting an information war. So that would be one area.</p><p>Another one would be post conflict. When Ukrainians try and move back in, there’s going to be unexploded ordnance that’s going to have to be eliminated. We perform that type of work. There’s going to be a lot of contamination in the environment that’s going to have to be remediated. The big one will be the rebuild of Ukraine. So we see opportunities both on the federal side as well as on the critical infrastructure side.</p><p><b>How are you feeling about the federal budget?</b></p><p>We’re very positive on the budget. [The fiscal 2023 budget] at 4% uptick is good; it will probably end up being more than 4% at the end of the day. And then within there, [it includes a] 9% [increase] for the research and development budget, which is largely where we play.</p><p>Again, the budget’s going to go toward China being the No. 1 threat, with Russia being second. But areas like artificial intelligence, cybersecurity, missile defense, hypersonic defense, all the areas [in which we participate] are still very, very well supported within the budget. Areas that are being cut are more on the procurement side, and we don’t really play there as much, not being an [original equipment manufacturer].</p><p><b>You’ve been busy with acquisitions. Where else are you looking for potential deals?</b></p><p>We’ve bought eight companies over five years. We have a very deliberate strategy. Every month we go through a refresh. We’re not about buying for scale — we’re about buying for technology differentiation. Our focus largely to date has been on cyberspace and critical infrastructure protection. Going forward, you can expect to see us continue in those areas. But I would add to that, potentially, an acquisition on the critical infrastructure side that would have a technology component.</p>]]></content:encoded><media:content height="800" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/LNYXBQJUQVHUTFRCHSHBHNLXO4.jpg" width="1200"><media:description>Carey Smith, the chief executive of Parsons, makes remarks at the groundbreaking of an innovation lab at Aberdeen Proving Ground, Md., on June 7, 2022.</media:description></media:content></item><item><title>Ukrainian troops training with US electronic jamming kit</title><link>https://www.c4isrnet.com/electronic-warfare/2022/05/19/ukrainian-troops-training-with-us-electronic-jamming-kit/</link><description>The comments Wednesday come roughly two weeks after the Department of Defense announced it would send electronic warfare gear to Eastern Europe as part of a $150 million security assistance package.</description><guid isPermaLink="true">https://www.c4isrnet.com/electronic-warfare/2022/05/19/ukrainian-troops-training-with-us-electronic-jamming-kit/</guid><dc:creator>Colin Demarest</dc:creator><pubDate>Thu, 19 May 2022 14:01:56 +0000</pubDate><content:encoded><![CDATA[<p>WASHINGTON — Ukrainian forces are training to use electronic jamming equipment provided by the U.S. in their bloody battle against Russia.</p><p>A senior U.S. defense official, speaking May 18 on condition of anonymity to discuss sensitive issues, confirmed <a href="https://www.c4isrnet.com/electronic-warfare/2022/05/09/us-sending-ukraine-electronic-jamming-gear-in-150m-package/" target="_blank">electronic warfare instruction</a> was underway. No details were provided on the curriculum or the gear itself.</p><p>“We told you that we were going to give the Ukrainians some electronic jamming equipment,” the official said. “There is training going on with a very small number of Ukrainian soldiers on that equipment. That’s ongoing, as well. So that’s happening.”</p><p>Hundreds of Ukrainian soldiers have either completed or are undergoing training on Western artillery, air defense radar systems, loitering drones armed with explosives, and more, <a href="https://www.defensenews.com/pentagon/2022/05/09/from-howitzers-to-suicide-drones-pentagon-seeks-right-balance-on-training-ukrainians-on-new-arms/" target="_blank">Defense News reported May 9</a>, citing Pentagon Press Secretary John Kirby.</p><p>The comments come roughly two weeks after the Department of Defense announced it would send EW kit to Eastern Europe as part of a $150 million security assistance package. Also included in that drawdown, the ninth for Ukraine since August, were 25,000 artillery rounds, radar systems and field equipment and spares.</p><p>It’s the first time the U.S. gave electronic jamming equipment to Ukraine since <a href="https://www.c4isrnet.com/cyber/2022/03/14/blue-yellow-and-gray-zone-the-cyber-factor-in-ukraine/" target="_blank">Russia rolled into the country</a> Feb. 24. A senior defense official, also speaking on condition of anonymity, on May 9 said the gear would allow the Ukrainians to operate more effectively in a “very condensed geographic area.”</p><p>Modern warfare often centers on the fight for control of the electromagnetic spectrum, which is relied upon to communicate and coordinate with allies and monitor and suppress adversaries. As the digital footprints of militaries grow, so does the appeal of EW.</p><p>The U.S. years ago began supplying Ukraine with more-modern radios <a href="https://www.c4isrnet.com/battlefield-tech/c2-comms/2022/05/11/war-in-ukraine-reinforces-need-for-us-army-network-upgrades-officials-say/" target="_blank">to shield communications</a> and beat back jamming attempts. The Pentagon in early April said a $300 million batch of aid bound for Ukraine would include secure communications systems and similar equipment.</p><p>The U.S. has provided more than $6.5 billion in security assistance to Ukraine since 2014, with a bulk of that made since Russia kicked off its latest invasion. The training programs, Kirby said last month, complement the stream of materiel.</p><p>“These soldiers are eager to learn these new skills, but they’re also eager to apply those new skills in the conflict,” <a href="https://www.defense.gov/News/News-Stories/Article/Article/3015610/us-troops-train-ukrainians-in-germany/" target="_blank">he said</a>.</p>]]></content:encoded><media:content height="3340" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/VXBMZGA3HJHUXN3M6EIRSOXWKU.jpg" width="5000"><media:description>Ukrainian servicemen take rest in a recently retaken village north of Kharkiv, east Ukraine, Sunday, May 15, 2022. (Mstyslav Chernov/AP Photo)</media:description></media:content></item><item><title>Special ops force calls for ‘untethered’ tool for recon and resupply</title><link>https://www.militarytimes.com/smr/sofic/2022/05/18/special-ops-force-calls-for-untethered-tool-for-recon-and-resupply/</link><description>For the past two decades, radio frequencies were open, and it was uncommon for those deployed to encounter extensive jamming or interception. That’s not the case when facing more advanced adversaries like Russia or China, as opposed to terrorist organizations.</description><guid isPermaLink="true">https://www.militarytimes.com/smr/sofic/2022/05/18/special-ops-force-calls-for-untethered-tool-for-recon-and-resupply/</guid><dc:creator>Todd South</dc:creator><pubDate>Wed, 18 May 2022 19:52:47 +0000</pubDate><content:encoded><![CDATA[<p>TAMPA, Fla. — Special <a href="https://www.militarytimes.com/news/your-military/2021/11/04/playing-on-the-edges-of-empire-special-operations-forces-face-uncertain-future/" target="_blank">operations</a> experts are looking for ways to untether much of their gear, from moving <a href="https://www.militarytimes.com/news/modern-day-marine/2022/05/13/ukraine-war-has-the-marine-corps-revamping-ied-training/" target="_blank">beyond </a>radio frequencies to looking at institutions such as NASA for logistics lessons in austere locations.</p><p>Those were some of the <a href="https://www.militarytimes.com/news/your-marine-corps/2022/05/16/lethal-and-survivable-or-irrelevant-and-vulnerable-marine-corps-redesign-debate-rages/" target="_blank">priorities </a>laid out by program managers for various portfolios of <a href="https://www.c4isrnet.com/information-warfare/2022/05/17/special-ops-leader-issues-warning-over-information-warfare-capabilities-funding/" target="_blank">U.S. Special Operations Command</a> this week at the Special Operations Forces Industry Conference, hosted by the National Defense Industrial Association in Florida.</p><p>In a session with reporters Monday, David Breede, program executive officer for the command’s special reconnaissance office, said SOCOM wants to untether itself from radio frequencies. That move will allow systems to operate on their own in contested communications environments.</p><p>“From GPS satellites to command and control, how do I operate completely in an untethered way?” Breede said.</p><p>For the past two decades, radio frequencies were open, and it was uncommon for those deployed to encounter extensive jamming or interception. That’s not the case when facing more advanced adversaries like Russia or China, as opposed to terrorist organizations.</p><p>Media reports and official statements in recent years noted extensive jamming in Syria near Russian forces.</p><p>“It’s tough, it’s hard, it’s not something we can do right now,” Breede said of the untethered concept.</p><p>The special reconnaissance group also focuses on adding autonomy to its systems, especially its aerial drones. Those systems are small in order to avoid detection. Breede and his team are looking to at “portable autonomy” to give operators software and control algorithms for a variety of devices; that way, even if jammed through traditional radio frequency channels, they can still function.</p><p>But there are trade-offs on small drones.</p><p>“It becomes tougher and tougher when you get down to the really small stuff,” Breede said. If designers add more capability on top of what’s already on the platform, he added, then something else usually has to go.</p><p>“Whether that’s time on station, whether that’s speed or the other payload onboard,” he explained.</p><p>And that’s a major initiative of the head of SOCOM, Gen. Richard Clarke, who said in a separate event Tuesday that the command will divest single-use drones.</p><p>The force needed drones for intelligence, surveillance and reconnaissance missions throughout the past two decades. But the next generation of drones must do more, he said.</p><p>Getting artificial intelligence on platforms will help, Breede noted, which is in line with Clark’s other major goal: a SOCOM data strategy.</p><p>“This absolutely goes back to data,” Clark said. “The No. 1 thing. [Artificial intelligence] is great, but if we don’t get the data and pull that in and [are] able to search it, it’s not worthwhile.”</p><p>That goes a long way in helping battlefield commanders see, sense and shoot with the right information, he added.</p><p>Certainly the sensing and shooting is key, but what about operators on the ground?</p><p>Army Col. Joseph Blanton, program executive officer for the command’s support activity office, echoed Breede’s untethered theme while talking to reporter, saying his team is looking at untethered logistics.</p><p>And they’re not reinventing the wheel. While Blanton did not specify specific communications, he did say providing key gear, equipment, materials and resupply in austere locations has been done before.</p><p>“So historically you think you have a rucksack, some days of supply on your back; and in some days when that’s gone, you have to get resupplied,” Blanton said.</p><p>And that resupply has to come from somewhere. “How do you extend that initial period of time so operators stay forward, untethered from a larger resupply network?” Blanton said.</p><p>The colonel said looking at outer space and operations that other agencies do could provide lessons.</p><p>“We’re trying to understand that space, untethered logistics, a limited class of supply at the tactical edge,” Blanton said.</p>]]></content:encoded><media:content height="4480" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/27HR5RHYWRAI3LUCEWYBNKS7SQ.jpg" width="6720"><media:description>Army Spc. William Ellison launches an RQ-11 Raven drone during an operators course at Chabelley Airfield, Djibouti, on Oct. 13, 2021. (Pfc. Gauret Stearns/U.S. Army)</media:description></media:content></item><item><title>Special operators need counter-drone, counter-IED tech in a smaller package</title><link>https://www.militarytimes.com/smr/sofic/2022/05/18/special-operators-need-counter-drone-counter-ied-tech-in-a-smaller-package/</link><description>The command expects to pick a device in less than two years.</description><guid isPermaLink="true">https://www.militarytimes.com/smr/sofic/2022/05/18/special-operators-need-counter-drone-counter-ied-tech-in-a-smaller-package/</guid><dc:creator>Todd South</dc:creator><pubDate>Wed, 18 May 2022 16:23:11 +0000</pubDate><content:encoded><![CDATA[<p>TAMPA, Fla. — <a href="https://www.c4isrnet.com/electronic-warfare/2021/05/27/the-army-is-nearly-tripling-electronic-warfare-personnel/" target="_blank">U.S. special operations forces</a> need a <a href="https://www.c4isrnet.com/electronic-warfare/2021/06/07/army-research-budget-focuses-on-integrated-tactical-electronic-warfare-architecture/" target="_blank">tool</a> that can both jam radio frequencies to stop roadside bombs from exploding as well as neutralize drone threats by land, air and sea — and it has to be small.</p><p>That’s what <a href="https://www.c4isrnet.com/information-warfare/2022/05/17/special-ops-leader-issues-warning-over-information-warfare-capabilities-funding/" target="_blank">Special Operations Command</a> officials said Tuesday at the Special Operations Forces Industry Conference, hosted in Florida by the National Defense Industrial Association. A lieutenant colonel who serves as the command’s program manager for counterproliferation said SOCOM is seeking a next-generation multimission electronic countermeasure device. (Under rules of the conference, individuals at the paygrade of O-5 and below were not to be identified in press reports.)</p><p>But an O-6, Army Col. Anh Ha, who leads the command’s warrior-focused office, said a major initiative is ensuring an operator working in an isolated area — far from command infrastructure and with limited resources and power — can still have a shared, common operating picture with higher headquarters.</p><p>“Contested comms, this one always scares everyone,” Ha said. “What happens when we can’t talk?”</p><p>For its part, the Army’s research budget last year emphasized tactical architecture for electronic warfare, C4ISRNET reported. That included a request to increase spending for the Multi-Function Electronic Warfare effort, the Terrestrial Layer System—Brigade Combat Team program, the Electronic Warfare Planning and Management Tool, and the Terrestrial Layer System—Echelons Above Brigade effort.</p><p>Big Army also pumped up its budget request last year to nearly triple its EW personnel.</p><p>The counterproliferation Army lieutenant colonel at SOFIC is focused on a smaller package. “Counter-unmanned systems: This consumes the bulk of our energy in the program office,” the O5 said.</p><p>The office stood up the counter-UAS program this past fall, he noted, and although the current focus is on aerial threats, the office is looking for ground and maritime counter-drone options, too.</p><p>His team wants to find portable, dismounted and fixed expeditionary site options for the next-generation multimission electronic countermeasure gear. The Marine Corps and SOCOM have an existing system called Modi, made by the Sierra Nevada Corporation and used by the Army and Marines.</p><p>The next-gen version needs to hit those other domains and be more portable. The current dismounted system weighs 40 pounds.</p><p>The program manager said “ideally” the office expects to select a system by fiscal 2024 and begin production in fiscal 2025. And SOCOM would like to run these systems as smoothly as they can in order to “reduce burden to our operators and incentivize autonomy as much as possible,” the O5 said.</p>]]></content:encoded><media:content height="3573" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/YK4RGMYKCFBBTPXCCOZEIKOTVI.jpg" width="4931"><media:description>Soldiers conduct electronic warfare training during Combined Resolve XV on Feb. 23, 2021, at the Hohenfels Training Area in Germany. (Sgt. Julian Padua/U.S. Army)</media:description></media:content><media:content height="4892" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/STQEW3SNKFHZHJJR2LZYFL463E.jpg" width="2621"><media:description>Marine Cpl. Emilio Vasquez, an electronic warfare operator, uses a Modi II electronic warfare system to disrupt radio signals during a communications field testing exercise at Naval Air Station Point Mugu, Calif., on Apr. 22, 2021. (Cpl. Thomas Spencer/U.S. Marine Corps)</media:description></media:content></item><item><title>US sending Ukraine electronic jamming gear in $150M package</title><link>https://www.c4isrnet.com/electronic-warfare/2022/05/09/us-sending-ukraine-electronic-jamming-gear-in-150m-package/</link><description>The equipment will be siphoned from American defense stocks, marking the ninth drawdown for Ukraine since August 2021.</description><guid isPermaLink="true">https://www.c4isrnet.com/electronic-warfare/2022/05/09/us-sending-ukraine-electronic-jamming-gear-in-150m-package/</guid><dc:creator>Colin Demarest</dc:creator><pubDate>Mon, 09 May 2022 17:01:42 +0000</pubDate><content:encoded><![CDATA[<p>WASHINGTON — The U.S. is sending electronic jamming equipment to the front lines in Ukraine.</p><p>The <a href="https://www.defensenews.com/artificial-intelligence/2022/05/04/pentagon-must-advance-ai-to-stay-ahead-of-rivals-industry-execs-tell-congress/" target="_blank">Defense Department</a> on May 6 said a $150 million security package bound for Eastern Europe includes the jamming gear, as well as 25,000 artillery rounds, radar systems, and other field equipment and spares.</p><p>The Pentagon would not comment publicly on specific details about the electronic warfare kit, which Ukrainian forces requested as Russia continues its offensive in the east part of the country. A senior defense official said Monday it was the first time the U.S. gave EW equipment to Ukraine since Russia’s invasion began Feb. 24.</p><p>“This is all of a piece of allowing the Ukrainians to operate more effectively, in a very condensed geographic area, where we know the Russians routinely tried to use electronic jamming as a way of their own ability to defend themselves against attack,” the official said.</p><p>The equipment will be <a href="https://www.defensenews.com/global/europe/2022/05/06/ukraine-to-get-a-dozen-howitzers-from-germany-and-the-netherlands/" target="_blank">siphoned from American defense stocks</a>, marking the ninth drawdown for Ukraine since August. The U.S. has committed more than $6.5 billion in security assistance to the country since 2014, with nearly $4 billion of that total made since Russia launched its latest invasion.</p><p>“The United States has provided a historic amount of security assistance to Ukraine at rapid speed,” President Joe Biden said in a statement. “U.S. support, together with the contributions of our allies and partners, has been critical in helping Ukraine win the battle of Kyiv and hinder Putin’s war aims in Ukraine.”</p><p>Electronic warfare is a battle for control of the electromagnetic spectrum, relied upon for situational awareness and communications. While EW, as it’s known, lacks the spectacle or bombast of missiles meeting targets and tanks thundering through towns, <a href="https://www.c4isrnet.com/electronic-warfare/2022/01/14/following-procurement-cut-the-army-is-looking-to-add-funding-back-in-2022-for-aerial-jamming-pod/" target="_blank">it can be decisive</a>, considering the digital portfolio of modern militaries.</p><p>The U.S. years ago began providing Ukraine with upgraded radios to protect communications and combat jamming efforts. In early April, the Pentagon announced a potentially $300 million batch of aid would include communications systems and similar gear.</p><p>“There’s a quite extensive, detailed list of what some of these capabilities are, including unmanned aerial systems and some <a href="https://www.c4isrnet.com/battlefield-tech/it-networks/2022/04/05/us-sending-ukraine-tactical-communications-gear-in-new-300m-package/" target="_blank">tactical, secure communications</a>, and other like capabilities,” John Kirby, the Pentagon press secretary, said during an April 4 briefing.</p><p>Days prior, he told reporters Ukrainian leaders “still have good command and control over their forces in the field,” despite Russian harassment.</p><p><i>Joe Gould contributed to this report.</i></p>]]></content:encoded><media:content height="3980" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/FBLXOFQVM5EKRP4ZBFEXNJNUYI.jpg" width="5962"><media:description>A man carries the Ukrainian and American flags, split by his hand, through Lafayette Square on Feb. 27, 2022. (Colin Demarest/C4ISRNET)</media:description></media:content></item><item><title>Following procurement cut, the Army is looking to add funding back in 2022 for aerial jamming pod</title><link>https://www.c4isrnet.com/electronic-warfare/2022/01/14/following-procurement-cut-the-army-is-looking-to-add-funding-back-in-2022-for-aerial-jamming-pod/</link><description>The Army updated its capability document for the MFEW-Air Large system.</description><guid isPermaLink="true">https://www.c4isrnet.com/electronic-warfare/2022/01/14/following-procurement-cut-the-army-is-looking-to-add-funding-back-in-2022-for-aerial-jamming-pod/</guid><dc:creator>Mark Pomerleau</dc:creator><pubDate>Fri, 14 Jan 2022 18:43:53 +0000</pubDate><content:encoded><![CDATA[<p>WASHINGTON — After zeroing out procurement for the Army’s first brigade aerial jamming pod for Fiscal Year 2022, the service’s electronic warfare community is trying to add funding back in the next budget cycle.</p><p>In the Army’s most recent budget, it <a href="https://www.c4isrnet.com/electronic-warfare/2021/05/28/army-cuts-procurement-of-airborne-jammer-in-smaller-electronic-warfare-budget/" target="_blank">eliminated its plan to spend $12 million to purchase</a> the Multifunction Electronic Warfare-Air Large system, an electronic attack pod also capable of cyber effects mounted to a MQ-1C Gray Eagle. It was designed to be the first brigade-organic airborne electronic attack asset.</p><p>Despite cutting procurement, the Army did ask for<a href="https://www.c4isrnet.com/electronic-warfare/2021/06/07/army-research-budget-focuses-on-integrated-tactical-electronic-warfare-architecture/" target="_blank"> $12 million in Fiscal 2022 for research and development funds</a> for the pod.</p><p>“We have proposed a course of action for consideration to Army senior leaders to add a limited amount of procurement back to the line. That’s pending,” Col. Daniel Holland, capability manager for electronic warfare, said during a virtual presentation hosted by AFCEA’s Northern Virginia chapter Jan. 13.</p><p>Holland said they are updating the capability development document for MFEW to “tighten up some key performance parameters for multidomain operations against near peer threats.”</p><p>Following the zeroing out for procurement dollars, the Army’s top acquisition official for the EW portfolio described a “prove it” phase for MFEW.</p><p>“We’ve got to show that the MFEW capability can operate in a robust environment and potentially on platforms, not just the Gray Eagle, but looking at diversified platform set … and looking for how MFEW will operate before we make a commitment on how we’ll necessarily go after a capability like MFEW in the future,” <a href="https://www.c4isrnet.com/electronic-warfare/2021/08/23/after-procurement-cuts-us-army-jammer-in-prove-it-phase/" target="_blank">said</a> Mark Kitz, program executive officer for intelligence, electronic warfare and sensors. “I think over the next year the Army is going to get some data and learn how this MFEW capability will enable how we want to operate in the future, and I think that data will then inform how we go forward with an MFEW-like capability.”</p><p>While acknowledging challenges in the budgeting cycle, Holland believes the Army is on “solid footing” for a developmental test and a limited user test in 2022, for which the updated document will be necessary to inform.</p><p>“We think that the [capability development document] update includes feedback from the operational force, particularly the division, which is particularly important as the Army pivots from a [brigade combat team]-centric Army to a division-centric Army, since MFEW is intended to be fielded to division combat aviation brigades, the detailed performance improvements that we’re going to specify in the [capability development document] update are particularly relevant for this pivot,” he said. “I’ll say that we’re constantly looking to pace the threat and the [capability development document] does just that.”</p><p>Despite the challenges, Holland said the Army’s electronic warfare community believes MFEW is an important component of the service’s portfolio. In fact, other service officials have noted that MFEW is an integral part of the Army’s family of electronic warfare systems.</p><p>“All of our capabilities … when used in tandem — <a href="https://www.c4isrnet.com/electronic-warfare/2020/06/18/heres-what-to-expect-from-the-armys-new-electronic-warfare-effort/" target="_blank">[Terrestrial Layer System-Brigade Combat Team]</a>, <a href="https://www.c4isrnet.com/electronic-warfare/2021/06/07/army-research-budget-focuses-on-integrated-tactical-electronic-warfare-architecture/" target="_blank">[Terrestrial Layer System-Echelons Above Brigade]</a>, MFEW Air Large — are all integrated to provide that EW and those cyber effects,” said Deputy Project Manager for Electronic Warfare and Cyber Willie Utroska in August.</p>]]></content:encoded><media:content height="1625" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/LFVFZSZNRZHIHKMH6KS5KOZSMY.jpeg" width="2436"><media:description>The Army updated its capability document for the MFEW-Air Large system, which is designed to be mounted on a MQ-1C Gray Eagle. (Spc. Jovian Siders/U.S Army)</media:description></media:content></item><item><title>Northrop looks to adapt electronic attack system for smaller ships</title><link>https://www.c4isrnet.com/electronic-warfare/2022/01/10/northrop-looks-to-adapt-electronic-attack-system-for-smaller-ships/</link><description>Northrop Grumman is looking to adapt its SEWIP Block 3 capability built for Arleigh Burke-class destroyers to smaller ship types.</description><guid isPermaLink="true">https://www.c4isrnet.com/electronic-warfare/2022/01/10/northrop-looks-to-adapt-electronic-attack-system-for-smaller-ships/</guid><dc:creator>Mark Pomerleau</dc:creator><pubDate>Mon, 10 Jan 2022 15:00:00 +0000</pubDate><content:encoded><![CDATA[<p>WASHINGTON — Northrop Grumman is conducting research and development to adapt its electronic attack platform — built for the Arleigh Burke-class destroyer — to fit on smaller ships, a company official said.</p><p>“We’re also looking at opportunities to scale down the system for smaller ship classes — frigates and smaller — and looking at ways to make a scaled-down version of SEWIP that can be effectively employed and rapidly installed on the smaller ship classes,” Mike Meaney, vice president of land and maritime sensors at Northrop, told C4ISRNET.</p><p>SEWIP is the Surface Electronic Warfare Improvement Program Block 3. This version provides ships with a non-kinetic, electronic attack capability, enabling them an “unlimited volley of bullets” to knock down incoming missiles.</p><p>Meaney <a href="https://www.c4isrnet.com/digital-show-dailies/navy-league/2021/08/02/electronic-attack-system-to-provide-navy-more-capabilities-flexible-options/?contentQuery={%22section%22%3A%22%2Fhome%22%2C%22exclude%22%3A%22%2Fdigital-show-dailies%2Fnavy-league%22%2C%22from%22%3A45%2C%22size%22%3A10}&amp;contentFeatureId=f0fmoahPVC2AbfL-2-1-8" target="_blank">previously stated</a> the company was working on a contract to develop a technology data package based on SEWIP technology for larger-deck ships such as aircraft carriers and amphibious assault ships.</p><p>The design activity for that effort is expected to wrap up this year. Once done, the U.S. Navy will have the opportunity to buy them, but Meaney wasn’t sure what the Navy has planned.</p><p>Now, Northrop is working on its own to adapt the system based on inklings the Navy would like this type of soft-kill capability on smaller ships.</p><p>“On smaller ships sizes, we know it’s of great interest to the Navy to put this soft-kill capability with unlimited bullets on almost every ship that they have because the incredible protection electronic warfare offers you,” Meaney said. “We know that they’re interested in doing that, so we’re off on our own trying to develop what we think would make sense to go do in anticipation of the Navy having a requirement to do a scaled-down version of it.”</p><p>Meaney said the hope is the Navy will release a requirement for this capability in the coming year. He couldn’t offer specifics regarding how they are looking to scale the system, given Northrop is in the middle of that effort, but he did note that smaller ships don’t have as much cooling or power available and don’t need as much radio-frequency energy to effectively jam. The company, he added, is trying to find the right balance of radio frequency versus available power and cooling.</p><p>Northrop is focused on frigates for this smaller capability, but Meaney said the firm is taking a broad approach to figure out an easy configuration for installation on a wide variety of ships.</p><p>Block 3 integration</p><p>Meaney also said Northrop has ongoing production contracts for the SEWIP Block 3 system with a limited-rate initial production contract to complete two systems.</p><p>The company has shipped one and is beginning installation aboard an Arleigh Burke-class destroyer on the West Coast, although due to sensitivities, he declined to name a specific ship.</p><p>There also isn’t an exact date set for competition of the installation or sea trials. The second ship planned for integration won’t happen for some time due to when the ship will be available for retrofit activity.</p><p>There are three systems under contract for follow-on production.</p><p>Moreover, Meaney said, Northrop is anticipating an order for about four more systems in the current fiscal year, bringing the total number of Block 3 systems under contract to nine in the next few months.</p>]]></content:encoded><media:content height="751" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/64HD5QKL55EVHHW4RXA5HXB2YM.jpg" width="1153"><media:description>Northrop Grumman is looking to adapt its SEWIP Block 3 capability built for Arleigh Burke-class destroyers to smaller ship types. (IS1 Alexander Fraser/U.S. Navy)</media:description></media:content></item><item><title>‘Confusion’ emerges as new weapon class for Air Force cyber warriors</title><link>https://www.c4isrnet.com/electronic-warfare/2021/12/01/confusion-emerges-as-new-weapon-class-for-air-force-cyber-warriors/</link><description>A new spectrum warfare wing wants to plug and play capabilities across platforms like LEGO pieces.</description><guid isPermaLink="true">https://www.c4isrnet.com/electronic-warfare/2021/12/01/confusion-emerges-as-new-weapon-class-for-air-force-cyber-warriors/</guid><dc:creator>Mark Pomerleau</dc:creator><pubDate>Fri, 10 Dec 2021 14:19:44 +0000</pubDate><content:encoded><![CDATA[<p>WASHINGTON — Shooting down an aircraft or blowing up a target might not be the pinnacle of winning in future conflicts. Rather, sowing confusion among adversaries might be more associated with triumph on the battlefield, according to an Air Force official.</p><p>“I would argue, in this 21st-century battlespace that we’re preparing for, infusing that doubt, hesitation, that confusion is winning for us,” Brig. Gen. Tad Clark, director of the electromagnetic spectrum superiority directorate at the Air Force, or A2/6L, said during a presentation at the Association of Old Crows Symposium Nov. 30. “If we get the adversary … to stop for a moment, reassess if the odds are in their favor, try to determine if they can make a move or not and if it’s an advantageous time for them to do so or not, we’re slowing their decision matrix down.”</p><p>Achieving this type of confusion, however, is critically dependent upon superiority in the electromagnetic spectrum, Clark said, adding that superiority in the spectrum underpins every core mission within the military.</p><p>Non-kinetic capabilities will be crucial in realizing this type of confusion among adversaries and may even prevent shooting wars from occurring in the future.</p><p>Clark’s organization is helping the Air Force understand what capabilities could be available now and what investments to make, which will prove important as the military is facing tighter budgets going forward.</p><p>Created a couple of years ago, the directorate aims to <a href="https://www.c4isrnet.com/electronic-warfare/2021/06/17/us-air-force-attempts-to-awaken-spectrum-ops-after-decades-of-waning-electromagnetic-warfare/" target="_blank">provide unified oversight of electromagnetic spectrum</a> issues from the headquarters Air Force level.</p><p>Gen. Charles Brown, chief of staff of the Air Force, has previously <a href="https://www.c4isrnet.com/electronic-warfare/2021/01/27/air-force-chief-electromagnetic-spectrum-could-be-cheaper-option-to-defeat-enemies/" target="_blank">said</a>, “In some aspects, an electron is much cheaper than a very expensive missile,” meaning the Air Force could realize some actual cost savings in non-kinetic capabilities.</p><p>He also explained at a conference earlier this year that such non-kinetic capabilities could “reign supreme,” <a href="https://breakingdefense.com/2021/11/us-air-force-chief-could-kinetic-warfare-go-the-way-of-blockbuster/" target="_blank">according to Breaking Defense</a>, adding , “Now we’re somewhere stuck in the thinking that mass needs to be physical. What if we did not have to produce sorties to achieve the same effect? What if a future small diameter bomb looks like ones and zeros?”</p><p>Clark noted that given the finite amount of funds, the service has to make sure it invests its money wisely.</p><p>“That’s what our directorate is trying to do. At the end of the day, winning for us is going to be when we see our Department of Air Force make investments in Air Force and Space Force types of capabilities that allow us to further technology, capability to get after where we need to be in the future,” he said.</p><p>To do this, Clark said his organization is trying to communicate to senior leaders what is in the art of the possible today, noting there are some great capabilities that currently exist.</p><p>One such capability set lies in the convergence between cyberspace and the electromagnetic spectrum.</p><p>“The connective tissue between cyberspace and the electromagnetic spectrum is amazing. There are tremendous capabilities that we can achieve now that allow us to get the desired end state, the desired effects, non-kinetic effects, for something that is pennies on the dollar,” he said. “It is something that we were wrestling with for a while trying to get our arms around all the things that fit in that line of effort and as we peel that onion back, there are a lot of examples of things that we can do both with cyberspace and electromagnetic spectrum that are, again, are repeatable, sustainable and affordable.”</p><p>While initially created within the A5 strategy section of the Air Staff, the directorate has now moved to the A2/6 section, which encompasses cyber and electromagnetic spectrum operations.</p><p>LEGOs and the future of spectrum warfare</p><p>Officials have consistently noted that they regard capabilities as a networked system of systems aboard several platforms that need to have the right concept behind them in order to be truly effective.</p><p>For the newly established 350th Spectrum Warfare Wing, connecting disparate capabilities spread across various platforms will be a key undertaking going forward.</p><p><a href="https://www.c4isrnet.com/electronic-warfare/2021/06/28/air-force-activates-first-of-its-kind-wing-for-spectrum/" target="_blank">Created in June</a>, the wing will enable, equip and optimize the fielding of electromagnetic spectrum capabilities with the aim of providing a sustainable and competitive advantage in the non-kinetic realm.</p><p>As part of its role, its commander used the analogy of LEGO blocks as a means of connecting platforms and capabilities to make the most of resources in the inventory.</p><p>“The idea of where we’re going is really how can you put those LEGOs that exist on different aircraft together into on-demand, ad-hoc kill webs,” Col. William Young, commander of the 350th Spectrum Warfare Wing, said during the same conference.</p><p>Young explained that during a meeting, one group commander threw a box of LEGOs on a table and used the mobile application Brickit, which looks at all the different combinations of LEGOs on the table and provides a list of all the different things that can potentially be built.</p><p>“Put yourself in the position of an adversary who now thinks they have deep insight United States Air Force or entire Department of Defense but now has to face this,” Young said, referring to a futuristic state in which capabilities aboard platforms are LEGO pieces that can be reassembled and reconfigured in a number of different fashions. “We traditionally package our things at the platform level. What we’re talking about here with this is type of warfare is the ability to package at the subsystem level.”</p>]]></content:encoded><media:content height="1333" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/T6VRYEMYGVEPPKXF2PXHIMWJAM.jpg" width="2000"><media:description>A new spectrum warfare wing wants to plug and play capabilities across platforms like LEGO pieces. (Senior Airman Lawrence Sena/Air Force)</media:description></media:content></item><item><title>IAI unveils Scorpius electronic warfare system for multi-threat confrontations</title><link>https://www.c4isrnet.com/electronic-warfare/2021/11/12/iai-unveils-scorpius-electronic-warfare-system-for-multi-threat-confrontations/</link><description>Israel Aerospace Industries has unveiled its new Scorpius family of electronic warfare systems based on active electronically scanned array technology that provides the capability to detect and simultaneously confront threats over a long range.</description><guid isPermaLink="true">https://www.c4isrnet.com/electronic-warfare/2021/11/12/iai-unveils-scorpius-electronic-warfare-system-for-multi-threat-confrontations/</guid><dc:creator>Seth Frantzman</dc:creator><pubDate>Fri, 12 Nov 2021 16:12:02 +0000</pubDate><content:encoded><![CDATA[<p>JERUSALEM — Israel Aerospace Industries has unveiled its new Scorpius family of electronic warfare systems based on active electronically scanned array technology that provides the capability to detect and simultaneously confront threats over a long range.</p><p>“The system is able to target a range of threats, including: UAVs, ships, missiles, communication links, low probability of interception (LPOI) radars, and more. Scorpius effectively disrupts the operation of their electromagnetic systems, including radar and electronic sensors, navigation, and data communications,” IAI said in a statement.</p><p>Added Elta Systems, an IAI subsidiary that also makes the radar for the Iron Dome air defense system: “With AESA’s multi-beam capability, Scorpius can simultaneously scan the entire surrounding region for targets, and deploy narrowly focused beams to interfere with multiple threats across the electromagnetic spectrum.”</p><p>The transition from focusing on a single threat to now multiple threats at once meshes with <a href="https://www.defensenews.com/battlefield-tech/it-networks/2021/07/23/israel-pushes-military-digital-transformation-in-the-age-of-artificial-intelligence-war/" target="_blank">the modern battlefield</a> that hosts drones and other advanced platforms, said Gideon Fostick, a marketing director at Elta.</p><p>“Everything is vulnerable to attack, confusion and deception, so this system covers the whole sky and simultaneously detects these threats. This is a new tool in air defense systems for soft-kill capability,” Fostick said. “So in times of peace or tensions, using this soft defense system offers you an option when you wouldn’t dare to use hard kill.”</p><p>“The EW system is designed to prevent [enemies] from using their systems. In the past, a focused beam would take out an enemy system. But a single beam is limited to specific roles and systems,” he added. “It offers greatly increased sensitivity to detect and jam threats even if they are hundreds of kilometers away.”</p><p>He noted that the Scorpius can add to a multilayered air defense system. Israel has in recent years increased integration of its multilayered air defense systems through work on the Iron Dome, David’s Sling and Arrow as well as their respective radars.</p><p>Elta would not say whether the Israel Defense Forces use Scorpius, although the company says it’s in use by three countries without naming the clients. Fostick told Defense News that the U.S. is a potential customer and is “very aware of the technology.”</p><p>The system, which comes in land, naval and air variants, was used during <a href="https://www.defensenews.com/opinion/commentary/2021/11/03/blue-flag-exercise-has-israels-enemies-seeing-red/" target="_blank">Israel’s recent Blue Flag exercise</a>. The October drill in Israel included air forces from the U.K., Germany, Italy, Greece, the United States, Italy and India. Fourth- and fifth-generation aircraft were present.</p><p>The range for Scorpius depends on which version is used, with the pod version mounted on an aircraft having a shorter range than a larger ground-based system.</p><p>The naval version, known as Scorpius, can be used on military vessels such as frigates and corvettes. The system essentially projects a defensive EW dome over a maritime task force, Fostick said. The training version of the system, Scorpius T, was used during the <a href="https://www.defensenews.com/training-sim/2019/11/15/analysis-whats-the-benefit-of-israel-hosting-blue-flag/" target="_blank">Blue Flag drill</a>.</p>]]></content:encoded><media:content height="907" medium="image" type="image/png" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/XUSFAA73G5CELNEZXEFRQFY5GI.PNG" width="1620"><media:description>The Scorpius, shown in this artist's rendering, was recently unveiled by IAI. (Courtesy of Israel Aerospace Industries)</media:description></media:content><media:content height="2101" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/VPDEGA4PRNCRNM4AO3ECPTUVNM.jpg" width="2101"><media:description>The Scorpius N, shown in this artist's rendering, is the electronic warfare system's naval variant. (Courtesy of Israel Aerospace Industries)</media:description></media:content></item><item><title>High operations tempo contributing to Lockheed spectrum convergence growth</title><link>https://www.c4isrnet.com/electronic-warfare/2021/10/13/high-operations-tempo-contributing-to-lockheed-spectrum-convergence-growth/</link><description>Lockheed Martin's vice president of spectrum convergence spoke with C4ISRNET about trends within the cyber and electromagnetic spectrum environment.</description><guid isPermaLink="true">https://www.c4isrnet.com/electronic-warfare/2021/10/13/high-operations-tempo-contributing-to-lockheed-spectrum-convergence-growth/</guid><dc:creator>Mark Pomerleau</dc:creator><pubDate>Tue, 19 Oct 2021 13:45:41 +0000</pubDate><content:encoded><![CDATA[<p>WASHINGTON — About three years ago, in response to the growing convergence of cyberspace and electromagnetic spectrum operations within the military, Lockheed Martin underwent an internal reorganization to adjust to the new demands.</p><p>The result was a <a href="https://www.c4isrnet.com/show-reporter/afcea-west/2019/02/19/lockheed-martin-reorganizes-around-integrated-cyber-electronic-warfare-and-intelligence/" target="_blank">new spectrum convergence business</a>, which set out to break down the barriers between similar technologies linking intelligence, electronic warfare and cyber systems together.</p><p>Vice president of spectrum convergence, Deon Viergutz addressed how the business has been performing and some recent progress the company has made since its inception.</p><p>The following transcript has been lightly edited for clarity.</p><p><b>How has the spectrum convergence business grown over the last year or so?</b></p><p>Spectrum convergence is continuing to grow and expand to support customers in the electromagnetic battlespace. We see that outlook continuing with significant cyber electronic warfare (CEW) market growth because of our customer’s high ops tempo and the high mission demand for our products and capabilities to support joint, all-domain missions.</p><p>Recent awards for <a href="https://www.c4isrnet.com/digital-show-dailies/navy-league/2021/08/02/navy-nears-production-decision-on-fleets-electronic-warfare-system/" target="_blank">Advanced Off-Board Electronic Warfare (AOEW)</a> low-rate initial production and <a href="https://www.c4isrnet.com/show-reporter/ausa/2020/10/14/us-army-tests-jamming-pod-on-gray-eagle-drone/" target="_blank">Multi-Functional Electronic Warfare Air Large (MFEW-AL)</a> present new growth opportunities. Concurrently, we have continued to sustain and celebrate significant contract accomplishments in maritime EW with the Surface Electronic Warfare Improvement Program (SEWIP) 100th delivery and continued deliveries of the Submarine BLQ 10 system and award of the various airborne electronic warfare contracts including CRH, B2, MH 60R. We also deliver significant products and capabilities in the classified domain</p><p><b>How has the covid pandemic affected business?</b></p><p>There have been significant challenges during the pandemic and we, as with many companies, have had to adjust our workplace to ensure the safety of our employees.</p><p>This team has responded to these challenges remarkably. We were able to innovate our way through this pandemic, learning new ways to operate and increase our efficiency and effectiveness for engaging with our customers, employees and supply chain. Every element of our business has transformed to the new Normal.</p><p>There has been no slowdown in work, while meeting our customer commitments and enabling the warfighter with exceptional CEW unmatched capabilities on the battlefield.</p><p><b>What new or developing internal research efforts are underway?</b></p><p>We are constantly investing in advanced state-of-the-art technologies to leverage our 50-year heritage of CEW expertise to better address near-peer threats in the electromagnetic spectrum. These investments range from advanced miniaturized RF electronics, 3-D additive manufacturing RF antennas, Modular Open Systems Architecture (MOSA) based systems, to artificial intelligence and machine learning.</p><p>We have embraced an agile delivery model that has enabled us to innovate at the speed of necessity and move much faster as a company to meet the demands of our customers.</p><p><b>How do you see cyber and electromagnetic spectrum operations continuing and progressing to converge on the battlefield?</b></p><p>Over the last three decades, our near-peer adversaries have learned from the U.S. how to exploit the electromagnetic spectrum and made significant strides in closing the technology gap. Cyber and electronic warfare capabilities will continue to be critical tools for U.S. and its allies’ commanders to ensure freedom of maneuver in the battlefield against evolving threats.</p><p>We believe CEW operations will be proliferated across the DoD and joint forces, becoming integrated into their Concept of Operations for the future fight. The electromagnetic spectrum is a physical battlespace for our warfighters, and it is increasingly paramount that we understand it and bolster our ability to operate, own, dominate, and defend against adversaries.</p><p>As part of our 21st Century Warfare vision, we’re leveraging emerging technologies to continue to grow in the all-domain environment, everything from electromagnetic spectrum defensive tools, battlespace awareness, command and control across spectrum, to long-range effectors and sensors.</p><p>As we look ahead, there will be sustained requirements for systems to be able to conduct multiple missions while delivering a variety of effects in partnership with our allies.</p><p><b>Where are you in terms of </b><a href="https://www.c4isrnet.com/electronic-warfare/2021/08/23/after-procurement-cuts-us-army-jammer-in-prove-it-phase/" target="_blank"><b>MFEW Air Large</b></a><b>?</b></p><p>We are excited about the program. MFEW-AL is not only the Army’s longest-range effector but also the first Army program of record to conform to the DoD C5ISR/EW Modular Open Suite of Standards (CMOSS) and Sensor Open System Architecture (SOSA) standards. Earlier this year, MFEW-AL performed extremely well during the US Army’s Experimental Demonstration Gateway Exercise (EDGE) 21 events, important in validating performance and capability.</p><p>Currently, we are continuing to progress with the RDT&amp;E phase of the program. Continued RDT&amp;E funding was in the President’s Budget Request for FY 22. We look forward to receiving that funding to continue our demonstrations validating the long-range sensing, Electronic Warfare Support (ES) &amp; Electronic Attack (EA) capabilities of this one-of-a-kind capability. Specifically, we are working towards two major capstone events in the first half of next year. These events will validate the performance of the MFEW-AL phase two systems against operational requirements.</p><p>Near term, the team is preparing to support flight experiments this fall during the upcoming Project Convergence 21 and Position, Navigation, and Timing Assessment Exercise (PNTAX) events. Our objective for each is to show how the MFEW-AL systems can support critical U.S. Army missions in operational, tactical environments.</p><p><b>What are some of the major trends and themes you’ve noticed within the last two years as it applies to cyberspace and electromagnetic spectrum convergence?</b></p><p>There have been several developments and trends in the electromagnetic spectrum domain over recent years, including technology advancement enabling size, weight and power – cooling (SWAP-C) reduction as well as artificial intelligence (AI) and machine learning (ML), market shifts and growing demand for CEW capabilities to support joint, all-domain warfighting.</p><p>There is the continual need to reduce the SWAP-C of RF electronics and the desire to enable as much capability as possible in a smaller footprint. Technology is now available to support those SWAP-C reductions and deliver increased performance at a lower cost.</p><p>Another major trend would be the increased use of AI/ML capabilities to enable “Cognitive Electronics Warfare” where systems can process vast amounts of data to assist operators in increasingly complex and congested electromagnetic battlefields.</p><p>Lastly, there is the concept of an Open Systems Architecture—ensuring we are building systems that are avoiding vendor lock and enabling fewer and fewer proprietary systems. This is an area where Spectrum Convergence is leading the way with systems like MFEW, AOEW, BLQ-10 and SEWIP being compliant with SOSA and CMOSS open system standards. This is key for enabling fast CEW technique development and deployment; interoperability of hardware and software across airborne and ground platforms; prompt insertion of new hardware technology; and significant reduction of total ownership costs. Ultimately this results in systems able to rapidly adapt to a continuously evolving threat that optimizes support for warfighters.</p>]]></content:encoded><media:content height="2813" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/K72JVJM2ZZHOFJXDDKPBBJIUCM.jpg" width="5000"><media:description>Lockheed Martin's vice president of spectrum convergence spoke with C4ISRNET about trends within the cyber and electromagnetic spectrum environment. (alengo/Getty Images)</media:description></media:content></item><item><title>Lockheed scores US Army contract for major electronic warfare, intel and cyber platform</title><link>https://www.c4isrnet.com/electronic-warfare/2021/09/27/lockheed-scores-us-army-contract-for-major-electronic-warfare-intel-and-cyber-platform/</link><description>The contract will support additional prototyping and proof of concept for the Terrestrial Layer System-Brigade Combat Team.</description><guid isPermaLink="true">https://www.c4isrnet.com/electronic-warfare/2021/09/27/lockheed-scores-us-army-contract-for-major-electronic-warfare-intel-and-cyber-platform/</guid><dc:creator>Mark Pomerleau</dc:creator><pubDate>Mon, 27 Sep 2021 17:00:53 +0000</pubDate><content:encoded><![CDATA[<p>WASHINGTON — Lockheed Martin has won a second-round contract worth $9.6 million to continue work on the U.S. Army’s first integrated electronic warfare, signals intelligence and cyber platform, the service announced Monday.</p><p>The other transaction authority agreement for phase two on the Terrestrial Layer System-Brigade Combat Team, or TLS-BCT, follows a 16-month prototyping period that involved <a href="https://www.c4isrnet.com/electronic-warfare/2020/08/17/lockheed-develops-electronic-warfare-tools-with-eye-toward-multinational-interoperability/" target="_blank">Lockheed </a>and <a href="https://www.c4isrnet.com/electronic-warfare/2020/06/18/heres-what-to-expect-from-the-armys-new-electronic-warfare-effort/" target="_blank">Boeing subsidiary Digital Receiver Technology</a>. During those months, each company was charged with developing prototypes and working with soldiers, after which point the Army would pick one solution to move forward.</p><p>TLS-BCT will be mounted on a Stryker vehicle, and officials have said it will be critical to modernizing the force to defeat modern and sophisticated threats on the battlefield.</p><p>“When fielded, TLS will be assigned to the Multi-functional Platoon and the EW Platoon organic to the Military Intelligence (MI) Company (MICO) in the BCTs. TLS will provide the warfighter at multiple echelons critical situational awareness of the enemy through detection, identification, location, exploitation, and disruption of enemy signals of interest,” said Ken Strayer, the project manager for electronic warfare and cyber within Program Executive Office Intelligence, Electronic Warfare and Sensors.</p><p>In the most recent <a href="https://www.c4isrnet.com/electronic-warfare/2021/06/07/army-research-budget-focuses-on-integrated-tactical-electronic-warfare-architecture/" target="_blank">budget request, the Army asked for $39.7 million for the program from research and development funds</a>. The first unit is to receive the system in fiscal 2022.</p><p>Lockheed’s award will provide prototypes for manufacturing proof of concept.</p>]]></content:encoded><media:content height="853" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/L44P2V33KBAC5LDYMOPPNUFXLE.jpg" width="1221"><media:description>An artist's rendering of Lockheed Martin's offering for the Army's Terrestrial Layer System. (Lockheed Martin)</media:description></media:content></item><item><title>Soldiers with this Stryker unit test tool to ‘see’ the electronic battlefield</title><link>https://www.armytimes.com/news/your-army/2021/09/23/soldiers-with-this-stryker-unit-test-tool-to-see-the-electronic-battlefield/</link><description>The tool allows soldiers to plan for the effects of electronic attacks.</description><guid isPermaLink="true">https://www.armytimes.com/news/your-army/2021/09/23/soldiers-with-this-stryker-unit-test-tool-to-see-the-electronic-battlefield/</guid><dc:creator>Todd South</dc:creator><pubDate>Fri, 24 Sep 2021 13:36:11 +0000</pubDate><content:encoded><![CDATA[<p>Soldiers usually known for rattling off machine gun or 40mm rounds are testing a new tool that helps them “see” electronic warfare threats on the battlefield.</p><p>Soldiers with 2nd Stryker Brigade Combat Team, 4th Infantry Division, recently tested software that runs the Electronic Warfare Planning and Management Tool at Fort Carson, Colorado, according to an Army <a href="https://forthoodpresscenter.com/4id-soldiers-test-new-electronic-warfare-spectrum-management-battlefield-software-tool/" target="_blank">release</a>.</p><p>The EWPMT pulls together battlefield data and manages electronic warfare and spectrum management.</p><a href="https://www.c4isrnet.com/electronic-warfare/2020/11/25/us-army-is-looking-for-updates-to-its-electronic-warfare-planning-tool/">The Army is looking for updates to its electronic warfare planning tool</a><p>It is a command-and-control planning tool that lets allows users to “visualize the potential effects of electronic warfare in the field and chart courses of action to prevent jammed capabilities,” according to Army Times’ sister publication, <a href="https://www.c4isrnet.com/electronic-warfare/2019/10/15/a-new-electronic-warfare-system-for-the-army-is-getting-closer/" target="_blank">C4ISRNET</a>.</p><p>What that means for the soldiers is a way to see the invisible threats of EW and also put out their own “non-kinetic” effects on the enemy.</p><p>“As a planner, EWPMT enabled me to visualize my effects in the electromagnetic spectrum (EMS),” said brigade CEMA head, Chief Warrant Officer 2 Brandon Cruz, in the <a href="https://forthoodpresscenter.com/4id-soldiers-test-new-electronic-warfare-spectrum-management-battlefield-software-tool/" target="_blank">release</a>. “The modeling and simulation tools EWPMT provides enabled me to position Electromagnetic Warfare (EW) systems onto the optimal piece of terrain on the battlefield.”</p><p>When the unit moved from planning to operations soldiers transferred from non-lethal to lethal fires, Cruz said.</p><p>The tool is expected to see an Army decision that would distribute it across the force by early next year.</p><p><a href="https://www.c4isrnet.com/electronic-warfare/2020/06/15/the-army-may-have-the-electronic-warfare-tool-the-pentagon-needs/" target="_blank">C4ISRNET </a>previously reported that the Army was <a href="https://www.c4isrnet.com/show-reporter/ausa/2020/10/13/us-army-demonstrates-a-first-in-electronic-warfare/" target="_blank">the first </a>to demonstrate, “the ability to remotely control electronic warfare sensors through an over-the-air data link and feed the information back to a central battle management tool.”</p><p>Earlier test versions of the EWPMT were wired to the device, making for difficult field operations when compared to remote abilities.</p>]]></content:encoded><media:content height="1073" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/3RH5FDL4RJFULFPGW2F33GCVNM.jpg" width="1431"><media:description>The 2nd Stryker Brigade Combat Team, 4th Infantry Division, at Fort Carson, Colorado, recently tested some new software. (Lt. Col. Derek Kamachi/Army)</media:description></media:content><media:content height="1757" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/H4AGEUGIEFC6ZKRIIZAKEZAY2A.jpg" width="1317"><media:description>An Electronic Warfare Planning and Management Tool operator uses the system to support unit planning and management of the Electromagnetic spectrum. (Lt. Col. Derek Kamachi/Army)</media:description></media:content></item><item><title>Northrop tests interoperability between advanced airborne radar and electronic warfare system</title><link>https://www.c4isrnet.com/electronic-warfare/2021/09/22/northrop-tests-interoperability-between-advanced-airborne-radar-and-electronic-warfare-system/</link><description>The company tested the interoperability of a new Next Generation Electronic Warfare System and AESA radar aboard a demonstrator aircraft, pictured.</description><guid isPermaLink="true">https://www.c4isrnet.com/electronic-warfare/2021/09/22/northrop-tests-interoperability-between-advanced-airborne-radar-and-electronic-warfare-system/</guid><dc:creator>Mark Pomerleau</dc:creator><pubDate>Wed, 22 Sep 2021 20:54:13 +0000</pubDate><content:encoded><![CDATA[<p>WASHINGTON — Northrop Grumman said it successfully demonstrated interoperability during a recent test of a new electronic warfare system meant for F-16s.</p><p>During the Northern Lightning Air Force exercise, which took place in August at Volk Field Air National Guard Base, aboard a Canadair Regional Jet, the company says it tested using the APG-83 Scalable Agile Beam Radar, which the company is providing to the Air Force, and what it is calling the Next Generation Electronic Warfare System, an ultrawideband system that detects the radio frequency environment to decide which signals to jam.</p><p>Company officials said it’s critical both aircraft subsystems — the active electronically scanned array radar, which is nearly identical to those aboard F-35s and F-22s, and the EW system — can perform their roles without interfering or degrading each other.</p><p>“You needed it to be interoperable with the other subsystems and one of those other key subsystems is the advanced AESA. Because you don’t want electronic warfare to have a negative impact on AESA, you don’t want AESA to have a negative impact on electronic warfare,” James Conroy, Northrop’s vice president for navigation, targeting and survivability, told C4ISRNET. The EW system is “a survivability function. AESAs aren’t typically only doing survivability, they’re doing other situational awareness as well as targeting capabilities. You have subsystems that are doing different functions, and you need both those functions to be able to operate simultaneously.”</p><p>Northrop representatives also noted the company built the EW system to be compatible with the radar.</p><p>The system flew against over 170 test points and against Joint Threat Emitters on the ground, which simulate advanced radars.</p><p>Conroy said the test was the first demonstration of the EW system outside a lab environment. During the exercise, the company took the system to an airborne platform and flew it against simulated threats while also having to operate with other aircraft and radars in the same airspace.</p><p>“During Northern Lightning, we gained valuable insight on NGEW capabilities,” Lt Col. Stephen Graham, F-16 electronic warfare test director of the Operational Flight Program Combined Test Force, said in a <a href="https://www.53rdwing.af.mil/News/Article/2754024/test-milestones-reached-at-northern-lightning/" target="_blank">news release</a>. “We are one step closer to installing the first NGEW suite on an Eglin F-16 in less than one year.”</p><p>While the Next Generation Electronic Warfare System is not in production for the Air Force, Northrop did win an other transaction authority award last year<b> </b>to develop<b> </b>the system using existing technology. Since the award, Northrop has been working with the Air Force to showcase how<b> </b>it can interact with the F-16, its subsystems and other critical capabilities.</p><p>This work is part of the F-16 modernization efforts the Air Force has undertaken. Because the aircraft has been flying for decades — long before modern technological threats on the battlefield — the Air Force must implement upgrades to make the system more survivable against sophisticated adversaries.</p><p>“There is a strong push to improve electronic protection for the F-16 against modern adversaries,” Graham said. “NL21 allowed for both an RF-dense environment while permitting targeted testing before, during and after LFE [Large Force Exercise]<b> </b>fights.”</p><p>Conroy said the F-16 is still capable.</p><p>“We really need the electronic warfare on these platforms to really make them survivable in that next generation or the next type of conflict that these platforms may be engaged in,” he said. “The RF threat environment has got so congested, meaning that there are so many other signals that are out there and being able to find the right signals really requires a lot of advanced processing.”</p><p>Northrop officials said they view the demonstration as a stepping stone. Next spring, Conroy said, they’ll begin developmental test on actual F-16s.</p>]]></content:encoded><media:content height="2997" medium="image" type="image/jpeg" url="https://cloudfront-us-east-1.images.arcpublishing.com/mco/MO3TEZK3KJHXZDK4HVEXQQI6BY.jpg" width="4622"><media:description>The company tested the interoperability of a new Next Generation Electronic Warfare System and AESA radar aboard a demonstrator aircraft, pictured. (Northrop Grumman)</media:description></media:content></item></channel></rss>