Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

SpaceX shut down a Russian electromagnetic warfare attack in Ukraine last month — and the Pentagon is taking notes

admin by admin
Dec 26, 2022
in Electronic Warfare
A A
0

WASHINGTON — Russia’s halting efforts to conduct electromagnetic warfare in Ukraine show how important it is to quickly respond, and immediately shut down, such attacks, Pentagon experts said Wednesday.

But the U.S. needs to get much better at its own EW rapid response, they said during the C4ISRNET Conference Wednesday — and can learn a lot from how the private sector has handled these situations.

Brig. Gen. Tad Clark, director of the Air Force’s electromagnetic spectrum superiority directorate, said modern wars will increasingly involve electromagnetic warfare, particularly to shape the battlefield when conflicts begin.

Dave Tremper, director of electronic warfare for the Office of the Secretary of Defense, pointed to SpaceX’s ability last month to swiftly stymie a Russian effort to jam its Starlink satellite broadband service, which was keeping Ukraine connected to the Internet. SpaceX founder Elon Musk steered thousands of Starlink terminals to Ukraine after an official sent him a tweet asking for help keeping the besieged country online.

“The next day [after reports about the Russian jamming effort hit the media], Starlink had slung a line of code and fixed it,” Tremper said. “And suddenly that [Russian jamming attack] was not effective anymore. From [the] EW technologist’s perspective, that is fantastic … and how they did that was eye-watering to me.”

The government, on the other hand, has a “significant timeline to make those types of corrections” as it muddles through analyses of what happened, decides how to fix it and gets a contract in place for the fix.

“We need to be able to have that agility,” Tremper said. “We need to be able to change our electromagnetic posture to be able to change, very dynamically, what we’re trying to do without losing capability along the way.”

Redundancy is also critical so the U.S. could keep operating on another system if an EW attack succeeded at knocking one out, Tremper said.

The U.S. needs to think a lot more innovatively when it comes to building new EW equipment, Clark said. It won’t be enough to just buy upgraded versions of legacy systems, he said — the U.S. has to come up with new systems that allow for much greater resilience and speed.

This includes incorporating artificial intelligence and machine learning into next-generation systems to be able to respond faster, he said. Increased use of digital engineering can also help the military model new equipment with a computer and work out the kinks before going through the time-consuming typical acquisition and testing process.

Clark said the Air Force’s in-development Compass Call, the EC-37B, is a prime example of how digital engineering is transforming how the service approaches new electromagnetic warfare capabilities.

Software coders and engineers are working with Compass Call operators on the ground to figure out creative ways to jam enemy signals, Clark said.

Russia’s invasion of Ukraine has taught the U.S. a great deal about the sophistication and reliability of Russian equipment, they said, and their troops’ ability to carry out missions in a synchronized way.

In particular, Tremper said, it has shown how important it is to properly train the personnel assigned to carry out electromagnetic warfare operations. Trying to carry out EW while moving forward inside the territory you’re invading, and not in a secure location, makes it even trickier.

“It’s a very hard problem, if you don’t have well-trained operators,” Tremper said. “The degree of coordination and synchronization of these types of operations is such that the undertrained operator will have a harder time pulling off those types of events successfully.”

Tremper said the Pentagon expected a “much stronger” EW showing from Russia — but cautioned that isn’t to say all of Russia’s efforts have failed.

Stephen Losey is the air warfare reporter for Defense News. He previously covered leadership and personnel issues at Air Force Times, and the Pentagon, special operations and air warfare at Military.com. He has traveled to the Middle East to cover U.S. Air Force operations.

Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.