Back to news

October 30, 2019 | International, Naval

Raytheon to develop airborne dual-band decoy for the U.S. Navy

Goleta, Calif., October 28, 2019 /PRNewswire/ - Raytheon (NYSE: RTN) was awarded a $33M U.S. Navy Demonstration of Existing Technology contract to develop a modern towed decoy for the F/A-18 E/F over the next 27 months.

The technology protects pilots by emitting signals across extended frequencies to counter advancing threats, convincing hostile weapon systems that the real target is the decoy, not the aircraft.

"Decoys are there to bring a pilot home safely - period," said Jeremy Carney, director, Raytheon Electronic Warfare Systems. "The dual-band decoy will look like the target, deceive threats and steer missiles toward it, rather than the aircraft."

The dual-band decoy is based in part on design lineage from the ALE-50, a decoy system that has deployed in multiple military operations protecting both U.S. and allied aircraft. Raytheon has delivered more than 29,000 ALE-50 units and will leverage ALE-50 aerodynamic performance experience and advancements in compact electronic self-protect capabilities to support the Navy's F/A-18 E/F decoy requirements.

"Pilots nicknamed the ALE-50 the Little Buddy during previous conflicts because it consistently saved their lives," said Carney. "The dual-band decoy will continue to do that in the face of modern threats."

About Raytheon
Raytheon Company, with 2018 sales of $27 billion and 67,000 employees, is a technology and innovation leader specializing in defense, civil government and cybersecurity solutions. With a history of innovation spanning 97 years, Raytheon provides state-of-the-art electronics, mission systems integration, C5I® products and services, sensing, effects and mission support for customers in more than 80 countries. Raytheon is headquartered in Waltham, Massachusetts. Follow us on Twitter.

Media Contact
Dana Carroll
+1.310.647.4352

saspr@raytheon.com

View original content to download multimedia:http://www.prnewswire.com/news-releases/raytheon-to-develop-airborne-dual-band-decoy-for-the-us-navy-300945755.html

On the same subject

  • US Air Force readies to award collaborative combat aircraft deals

    February 13, 2024 | International, Aerospace

    US Air Force readies to award collaborative combat aircraft deals

    This next round of collaborative combat aircraft development could involve the U.S.’s closest and “most strategic” international partners, Kendall said.

  • German cyberwarriors assert right to ‘hack back’ when attacked

    August 8, 2018 | International, C4ISR

    German cyberwarriors assert right to ‘hack back’ when attacked

    By: Sebastian Sprenger COLOGNE, Germany – German authorities believe they are on firm legal footing to retaliate against cyber attacks by unleashing digital or conventional counterattacks, according to a series of recent written responses by government officials to lawmakers. The documents shed light on some of the legal considerations of cyber-warfare mulled in Berlin, just as the Bundeswehr moves toward full operational capability of a new command devoted to cyber operations. Some of the assertions outlined in a missive last month are surprisingly hawkish for a country reflexively averse to the use of military force. While acknowledging certain gray areas in responding to potentially crippling cyber attacks, officials also made clear that defending the country would afford the security services broad leeway under international law. “Just as in the land, air and naval domains, the Bundeswehr possesses 'active and reactive' capabilities that can be used for lawful operations,” Peter Tauber, the parliamentary deputy defense secretary, wrote to a collection of lawmakers from the opposition Green Party. So-called hack backs, or the retaliatory targeting of an attacker's information infrastructure, fall into that category, according to Tauber. As such, no new legal authorities for cyber defense would be required, he argued. At the same time, officials noted that such counterattacks would be permitted only as a counter-strike, not as an unprovoked act. Full Article: https://www.fifthdomain.com/global/europe/2018/08/07/german-cyberwarriors-assert-right-to-hack-back-when-attacked/

  • What will forces need in complex EW environment?

    November 30, 2018 | International, C4ISR

    What will forces need in complex EW environment?

    By: Mark Pomerleau Sophisticated adversaries have been leveraging the electromagnetic spectrum to create significant dilemmas for U.S. and allied forces, say officials, and transformative efforts are needed to deal with an increasing complicated threat. “China is outspending us probably 10 to 1 on trying to figure out how to use and manipulate the electromagnetic spectrum. Russia showed us what they're going to do with it in their incursion into Ukraine ... Electromagnetic warfare, electronic warfare at the maneuver level,” Gen. Paul Selva, vice chairman of the Joint Chiefs of Staff, said at the annual Association of Old Crows symposium held Nov. 28 in Washington, D.C. “We haven't designed ourselves to fight that fight. They have demonstrated that they are not only willing, but they're [also] capable of deploying and employing electronic countermeasures at the ground and maneuver level. It is a reality that we are going to have to adjust to.” The capabilities forces need For the Army, it's not going to be one thing, Col. Mark Dotson, the capabilities manager for electronic warfare at the Cyber Center of Excellence, said at the symposium Nov. 27. There have to be layered capabilities and effects, each increasing range and sensing capability. “We're still sorting through that,” Dotson said, noting the need to develop from the current tactical focus all the way to the strategic level. “We're trying to expand our scope and get into what are those other things we need. Do we need artillery delivered capability? Do we need loitering munitions? Is it going to manned or is it an unmanned aircraft?” In addition, Dotson said, the Army needs systems integrating EW, cyber and signals intelligence, and the service has started generating requirements working with the Intelligence Center of Excellence and the Cyber Center of Excellence. “I think SIGINT and EW go hand in hand, so us not sharing going forward and working like a team like we do now makes no sense,” Col. Jennifer McAfee, Dotson's counterpart for Terrestrial and Identity at the Army Intelligence Center of Excellence, told C4ISRNET in a November interview. McAfee added that the team is also joining up with the other centers of excellence to ensure that when they are pursuing requirements for airborne or ground systems, the Intelligence and Cyber centers are plugged in to leverage EW expertise and not create duplicative efforts. Geolocating solutions Others across the joint force have expressed the desire for more decoys, physical or non-physical, to confuse or confound enemy systems. “It's network electronic warfare from air, sea and land; it's smart warfare combined with advanced decoys, whether they're physical decoys or cyber decoys out there; drones, swarms and jamming drones,” Col. John Edwards, commander of the 28th Bomb Wing, said at the symposium. “Things that go out there to where an air defense operator cannot distinguish between what is cyber and what is real out there.” Such aerial systems can be used to either overwhelm or distract air defenses, allowing strike aircraft to penetrate, or take the point jamming the air defenses and thus assuming all the risk leaving the more expensive and manned systems in the rear. On the ground side, officials have also discussed the need for more investments in decoys. Lt. Gen. Stephen Fogarty, commander of Army Cyber Command, told reporters in August that big investments needed to be made in this area. He envisioned forces being able to drop a decoy emitting strong signals off a truck at a fork in the road, thus drawing enemy attention to it. “Now we're presenting multiple dilemmas to the adversary,” he said. One of the difficulties of modern warfare is all jammers and sensors emit some kind of a signal in the electromagnetic spectrum, meaning they can be geolocated and targeted. This means if an enemy wants to use it, they have to take into account a risk calculus in revealing their position. “Jammers are emitters, emitters are targets. I think that's something we really ought to be thinking about,” Selva said. “If you're going to operate in an electronically dense environment ... the tools actually reveal their position." Similarly, decoys can be used to throw adversaries off the trail of friendly forces or distract from other items forces might want to protect. ”If I have something like a counterfire radar, that's really important to me. Maybe what I want to do, again, is push an alternate threat to the adversary," Fogarty said. In these complex environments, Selva said forces need to be able to identify, localize and characterize the jammer. If that's possible, then forces can decide what to do with it. If the answer is they want to kill it, they have to have a tool to kill it. “If you can't do all three of those things, the jamming is very effective,” he said. https://www.c4isrnet.com/electronic-warfare/2018/11/29/what-will-forces-need-in-complex-ew-environment

All news