Cyber Affairs
No Result
View All Result
  • Login
  • Register
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers
Home Electronic Warfare

Air Force may put Angry Kitten in planes for electronic warfare edge

admin by admin
Dec 23, 2022
in Electronic Warfare
0 0
A A
0
FacebookTwitterLinkedIn

WASHINGTON — A ferocious feline may help transform how the U.S. military approaches electronic warfare.

The so-called Angry Kitten, a cluster of electronic components contained in a vaguely cat-shaped tube, has proved so successful as a training tool in simulating enemy EW actions that officials with Air Combat Command recommended at least four pods be reworked for use in actual combat, allowing fighter pilots to benefit in the real world.

The Air Force has used Angry Kitten in tests and training for years, outfitting aggressor squadrons with the gear to harass trainees and replicate electronic assaults. Lessons learned from using the device have “dramatically shaped the direction” of the service, it said Aug. 3.

During evaluations this year, Angry Kitten kit was reprogrammed overnight to account for conditions previously encountered, meaning techniques used the next day were both better informed and more effective. The quick turnarounds are a departure from the Air Force’s traditionally rigid software-hardware coupling that take time and money to retool.

“The hardware and software stovepipe solutions prevalent throughout the Air Force enterprise significantly impair the Air Force’s ability to quickly adapt and defeat new emerging electromagnetic systems threats,” said Keith Kirk, who manages a campaign known as AERRES, experiments aimed at developing app-enabled EW systems.

With Angry Kitten, “software was updated within hours based on the performance they were seeing against certain threats and then was improved, and those improvements were verified during flight test the following day,” he said in a statement. “That’s really tough to do with software and tools that are not designed to open standards.”

Georgia Tech Research Institute next-generation electronic warfare equipment — carried in a bright blue pod at the bottom of the photo — being flight-tested aboard an L-39 Albatros jet trainer aircraft. (Stan Sutphin/GTRI)

The on-the-fly changes were made possible by an open-ended design that the Air Force expects to increasingly employ in the future.

The Angry Kitten Combat Pod was tested last year at the Northern Lightning exercise, as well. The Air Force at the time said teams identified avenues to convert the pod from trainer to battle-ready. Recent feedback will inform a potential fielding decision.

The combat pod is derived from technology developed by the Georgia Tech Research Institute, which in 2013 said the project used commercial electronics, custom hardware and novel machine-learning to provide “unprecedented levels” of adaptability.

Researchers referred to the matter as cognitive EW, systems that use machine learning and other sophisticated tech to select a means of jamming, analyze its effectiveness and then self-correct to exploit identified weakness. The practice is different than deploying chaff, material used to confuse radar, or other more-common measures.

Dominating the electromagnetic spectrum will be critical in a fight with China or Russia, the two most significant national security threats, according to U.S. officials. Modern warfare relies heavily on the spectrum, which is used to communicate with friendly forces, to identify and suppress opponents, and to guide weapons.

RELATED

Angry Kitten’s less-than-fearsome name — a far cry from the aggressive monikers the military often uses, such as Reaper or Predator drones or Hellfire missiles — is a mix of inside joke and design goals, according to a 2013 Newsweek report, which noted “the system reacts with ‘the mind of a cat.’”

“Despite having an admittedly slightly silly name, Angry Kitten represents very serious technology,” Roger Dickerson, senior research engineer with the Sensor and Electromagnetic Applications Laboratory at the Georgia Tech Research Institute, told C4ISRNET in 2015. “We’ve been working hard to improve the capabilities and the readiness of the war fighters in our sponsor organizations: the Army, the Navy and especially the U.S. Air Force air combat community.”

Colin Demarest is a reporter at C4ISRNET, where he covers military networks, cyber and IT. Colin previously covered the Department of Energy and its National Nuclear Security Administration — namely Cold War cleanup and nuclear weapons development — for a daily newspaper in South Carolina. Colin is also an award-winning photographer.

Read the full article here

ShareTweetSharePinShareShareSend

Related Articles

Cyber and Electronic Warfare Are on Display in Ukraine Russia War
Electronic Warfare

Cyber and Electronic Warfare Are on Display in Ukraine Russia War

How China is harnessing surveillance technologies to support modernisation of its military
Electronic Warfare

How China is harnessing surveillance technologies to support modernisation of its military

Space Control Squadron Redesignated Electronic Warfare Squadron > National Guard > Guard News
Electronic Warfare

Space Control Squadron Redesignated Electronic Warfare Squadron > National Guard > Guard News

Pentagon tester gives thumbs up to US Army electronic warfare planner
Electronic Warfare

Pentagon tester gives thumbs up to US Army electronic warfare planner

Thales onboard the Hellenic Navy’s FDI HN Frigates
Electronic Warfare

Thales onboard the Hellenic Navy’s FDI HN Frigates

Electronic Warfare

Rapid Electronic Warfare Update System Set For F-35 Test

Pentagon tester gives thumbs up to US Army electronic warfare planner
Electronic Warfare

Pentagon tester gives thumbs up to US Army electronic warfare planner

Electronic warfare ‘keeps me up at night’: undersecretary of the Army
Electronic Warfare

Army looking at ‘payload agnostic’ EW capabilities as it modernizes its architecture

Soldier Spotlight: Sgt. 1st Class Westley | Article
Electronic Warfare

Soldier Spotlight: Sgt. 1st Class Westley | Article

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended Stories

Understanding the Implications & Guarding Privacy- Axios Security Group

Understanding the Implications & Guarding Privacy- Axios Security Group

Hackers Actively Using Pupy RAT to Attack Linux Systems

Hackers Actively Using Pupy RAT to Attack Linux Systems

Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Popular VPN Software Flaw Let Attackers Crash the Systems

Popular VPN Software Flaw Let Attackers Crash the Systems

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Popular Stories

  • Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    0 shares
    Share 0 Tweet 0
  • Malware Trends 2024 – Top Malware Families and Types

    0 shares
    Share 0 Tweet 0
  • French Football Club Ticketing System Targeted in Cyber Attack

    0 shares
    Share 0 Tweet 0
  • Singha Durbar server continues to face cyberattacks

    0 shares
    Share 0 Tweet 0
  • Argentina – Global Investigations Review

    0 shares
    Share 0 Tweet 0
Cyber Affairs

Cyber Affairs is your one-stop news website for the latest cyber crime, cyber warfare, and all cyber related news and updates, follow us to get the news that matters to you.

LEARN MORE »

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.