Back to news

September 5, 2018 | International, C4ISR

5 ways the Army will keep pace in cyber and electronic warfare

By:

The Army is making several changes to be in a better position to compete with adversaries in cyber, the electromagnetic spectrum and space.

Russia and China have begun to organize all information-related capability — to include cyber, electronic warfare, information operations and space — under singular entities. Now, Army leaders, say the service must do the same.

“Integrated formations will be innovative because they'll help us create novel approaches to problem solving by leveraging multiple skillsets,” David May, senior intelligence adviser at the Army Cyber Center of Excellence, said during a presentation at TechNet Augusta in August.

May outlined five force design updates the Army is implementing. Four of those five updates will begin immediately to provide competitive edge in multidomain operations.

1. The widespread introduction of cyber and electromagnetic activities

May said the Army will introduce cyber and electromagnetic activities, or CEMA sections, at every echelon from the brigade to service component commands. These sections will plan, synchronize and integrate cyber and EW operations as well as conduct spectrum management.

At the Army's cyber school, effective Oct. 1, all previous electronic warfare personnel in the functional area 29 will transition into the cyber branch to serve as these CEMA planners. That's important because it moves those staffers out from working as a functional area specialist and into an operational branch, Maj. Gen. John Morrison, commander of the Cyber Center of Excellence, the home of the cyber school, told C4ISRNET during an interview at TechNet.

May said Army leaders are expected to approve this plan in the next six weeks. Moreover, the update will not require any additional growth to the Army as it will reorganize existing workforce.

2. New electronic warfare platoons

Electronic warfare platoons will be stood up within brigades residing inside military intelligence companies working in tandem with signals intelligence teams and double the Army's sensing capability in the electromagnetic spectrum, May said.

Full article: https://www.c4isrnet.com/show-reporter/technet-augusta/2018/09/04/here-are-5-army-modernization-efforts-to-keep-pace-in-cyber-and-electronic-warfare

On the same subject

  • The Cybersecurity 202: Hackers just found serious vulnerabilities in a U.S. military fighter jet

    August 19, 2019 | International, Aerospace

    The Cybersecurity 202: Hackers just found serious vulnerabilities in a U.S. military fighter jet

    By Joseph Marks LAS VEGAS — In a Cosmopolitan hotel suite 16 stories above the Def Con cybersecurity conference this weekend, a team of highly vetted hackers tried to sabotage a vital flight system for a U.S. military fighter jet. And they succeeded. It was the first time outside researchers were allowed physical access to the critical F-15 system to search for weaknesses. And after two long days, the seven hackers found a mother lode of vulnerabilities that — if exploited in real life — could have completely shut down the Trusted Aircraft Information Download Station, which collects reams of data from video cameras and sensors while the jet is in flight. They even found bugs that the Air Force had tried but failed to fix after the same group of hackers performed similar tests in November without actually touching the device. “They were able to get back in through the back doors they already knew were open,” Will Roper, the Air Force's top acquisition official, told me in an exclusive briefing of the results. The hackers lobbed a variety of attacks — including injecting the system with malware and even going at it with pliers and screwdrivers. When I saw it, the metal box that's usually secure on the aircraft had wires hanging out the front. The hackers briefed Roper on the findings on Saturday afternoon. He was surrounded by discarded pizza boxes, iced coffee drinks — and the hotel's drinking glasses filled with screws, nuts and bolts removed from five fully dismantled TADS devices, which run about $20,000 a pop. He'd expected the results to be about this bad, Roper told me on a private tour of the hacking event. He pinned the weaknesses on decades of neglect of cybersecurity as a key issue in developing its products, as the Air Force prioritized time, cost and efficiency. He's trying to turn that around, and is hopeful about the results of the U.S. government's newfound openness to ethical hackers. He'd come straight from Def Con's first-ever Aviation Village, which the Air Force helped establish, and was wearing a gray T-shirt with the words “No, Mr. Bond, I expect you to hack,” emblazoned on the front — a riff on a classic line from the 1964 James Bond film “Goldfinger.” This is a drastic change from previous years, when the military would not allow hackers to try to search for vulnerabilities in extremely sensitive equipment, let alone take a literal whack at it. But the Air Force is convinced that unless it allows America's best hackers to search out all the digital vulnerabilities in its planes and weapons systems, then the best hackers from adversaries such as Russia, Iran and North Korea will find and exploit those vulnerabilities first, Roper told me. “There are millions of lines of code that are in all of our aircraft and if there's one of them that's flawed, then a country that can't build a fighter to shoot down that aircraft might take it out with just a few keystrokes,” he said. Roper wants to put his military hardware where his mouth is. During next year's Def Con conference, he wants to bring vetted hackers to Nellis or Creech Air Force bases near Las Vegas where they can probe for bugs on every digital system in a military plane, including for ways that bugs in one system can allow hackers to exploit other systems until they've gained effective control of the entire plane. He also wants to open up the ground control system for an operational military satellite for hacker testing, he said. “We want to bring this community to bear on real weapons systems and real airplanes,” Roper told me. “And if they have vulnerabilities, it would be best to find them before we go into conflict.” Those hacking challenges will also be useful for the private sector because military planes and satellites share many of their computer systems with the commercial versions of those products, Roper said, and the Air Force can share its findings. The seven hackers probing the TADS devices were all brought to Vegas by the cybersecurity company Synack, which sells the Pentagon third-party vulnerability testing services, under a contract with the Defense Digital Service, a team of mostly private-sector technology stars who try to solve some of the Pentagon's thorniest technology problems during short-term tours. The Defense Digital Service started by organizing large-scale hacking competitions in 2016, with names such as “Hack the Pentagon” and, eventually, “Hack the Air Force.” These were open to almost anybody — but included only public-facing hacking targets such as military service websites and apps. Shortly after, they also began opening more sensitive systems to a smaller number of vetted hackers who sign nondisclosure agreements. DDS has run about a dozen of those more sensitive hacking competitions so far, but this is the first time it has offered up the same system for hacking twice, said Brett Goldstein, DDS's director, who earned a reputation in technology as Open Table's IT director and chief data officer for the city of Chicago. “That's important because security is a continuous process,” he told me. “You can't do an exercise and say, ‘Oh, we found everything' and check the box. You need to constantly go back and reevaluate.” They also allowed the hackers to be more aggressive this time and to physically disassemble the TADS systems to get a better idea of what kinds of digital attacks might be effective, Goldstein said. That meant the hackers could simulate a cyberattack from adversaries that had infiltrated the vast network of suppliers that make TADS components and had sophisticated knowledge about how to compromise those elements. They could also advise the Air Force about flaws in how the TADS hardware was built that make it more susceptible to digital attacks. Moving forward, Roper told me, he wants to start using that knowledge to mandate that Air Force vendors build better software and hardware security controls into their planes and weapons systems upfront so the Air Force doesn't have to do so much cybersecurity work on the back end. He's up against an arcane and byzantine military contracting process, however, that's going to make those sorts of fundamental reforms extremely difficult, he acknowledged. In some cases, the company that built an Air Force system owns the software embedded in that system and won't let the Air Force open it up for outside testing, he says. In other cases, the Air Force is stuck with legacy IT systems that are so out of date that it's difficult for even the best technologists to make them more secure. “It's difficult to do this going backward, but we're doing our best,” Roper told me. “I can't underscore enough, we just got into the batter's box for what's going to be a long baseball game.” https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2019/08/14/the-cybersecurity-202-hackers-just-found-serious-vulnerabilities-in-a-u-s-military-fighter-jet/5d53111988e0fa79e5481f68/

  • Anduril Unveils Barracuda-M Family of Cruise Missiles

    September 12, 2024 | International, Aerospace

    Anduril Unveils Barracuda-M Family of Cruise Missiles

    The Barracuda family of AAVs consists of Barracuda-100, Barracuda-250, and Barracuda-500

  • US Space Force Awards L3Harris Technologies $500 Million IDIQ Contract for Anti-Jam Satellite Communications Modem

    April 24, 2020 | International, Aerospace, C4ISR

    US Space Force Awards L3Harris Technologies $500 Million IDIQ Contract for Anti-Jam Satellite Communications Modem

    Melbourne, Fla. April 23, 2020 - The U.S. Space Force's Space and Missile Systems Center (SMC) has awarded L3Harris Technologies (NYSE:LHX) a five-year, $500 million ceiling, indefinite delivery, indefinite quantity (IDIQ) contract — with an initial delivery order of $30.6 million — for the Air Force and Army Anti-jam Modem (A3M). A3M provides the Department of the Air Force and Army with a secure, wideband, anti-jam satellite communications terminal modem for tactical satellite communication operations. The contract and order were received in the first quarter of 2020. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20200423005148/en/ “With the proliferation and growing sophistication of threats in the electromagnetic spectrum, it has become increasingly important to enhance protected communications capabilities for the warfighter,” said Dana Mehnert, President, Communication Systems, L3Harris. “The A3M technology solution enhances the warfighter's ability to communicate critical data by maintaining resilient and secure satellite communications in highly congested and contested environments that include the presence of adversarial jamming.” L3Harris will collaborate with SMC for the design, development, fabrication, integration, certification and testing of Block 1 modems for use in the Air Force Ground Multiband Terminal and the Army Satellite Transportable Terminal. The jam-resistant modems support SMC's Protected Tactical Waveform technology, an anti-jam capability operating on military satellite communication terminals through the Wideband Global Satcom constellation. The L3Harris modems are optimized for high-rate production and are designed to become an integral part of the service's growing Protected Anti-Jam Tactical Service enterprise. Several airborne and ground-based platforms and thousands of terminals across the Department of Defense have been identified as transition candidates to the Protected Tactical Waveform. About L3Harris Technologies L3Harris Technologies is an agile global aerospace and defense technology innovator, delivering end-to-end solutions that meet customers' mission-critical needs. The company provides advanced defense and commercial technologies across air, land, sea, space and cyber domains. L3Harris has approximately $18 billion in annual revenue and 50,000 employees, with customers in 130 countries. L3Harris.com. Forward-Looking Statements This press release contains forward-looking statements that reflect management's current expectations, assumptions and estimates of future performance and economic conditions. Such statements are made in reliance upon the safe harbor provisions of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934. The company cautions investors that any forward-looking statements are subject to risks and uncertainties that may cause actual results and future trends to differ materially from those matters expressed in or implied by such forward-looking statements. Statements about the value or expected value of orders, contracts or programs and about our system capabilities are forward-looking and involve risks and uncertainties. L3Harris disclaims any intention or obligation to update or revise any forward-looking statements, whether as a result of new information, future events, or otherwise. View source version on businesswire.com: https://www.businesswire.com/news/home/20200423005148/en/

All news