Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

The Evolution of AWACS Capabilities to Contribute to Joint Electronic Warfare

admin by admin
Dec 26, 2022
in Electronic Warfare
A A
0

By Deb Henley

An airborne E-3G Sentry, operated by the Airborne Warning and Control System, or AWACS, Combined Test Force updated its electronic support measures, or ESM, database in flight over central Texas with a file transmitted from its reprogramming center at Eglin Air Force Base, Florida, using an existing beyond line-of-site satellite communications system.

The E-3G collected EW information using its existing ESM system and transmitted the in-flight recorded data to the 36th Electronic Warfare Squadron at Eglin AFB, Florida, using its satellite communications system. This test was conducted by 605th Test and Evaluation Squadron, Detachment 1, at Tinker AFB, Oklahoma, aligning with their mission to field innovation and develop tactics for the AWACS community.

“While most airborne EW systems provide self-protection, the primary purpose of the E-3G’s ESM system is to provide situational awareness, combat identification, and threat warning for the rest of the assets in theater. Modern advanced radars are increasingly digital and can adapt faster than ever before, and the mission data update process needs to adapt along with it,” said Maj. Jesse Snook, 605th TES, Det1 air battle manager.

Snook continued, “The E-3G has demonstrated its ability to exchange near real-time electronic warfare information with the experts on the ground and feed that information back into the fight immediately.”

Within an hour, the 36th EWS processed and analyzed the E-3G’s data, corrected deficiencies observed in the data, and transmitted the updated file back to the E-3G for immediate loading during the mission. The in-air update and in-air flight data transmissions were firsts for the E-3G. In addition, the concept referred to as Airborne Cooperative EW Integrated Reprogrammable Exchange, or ACEWIRE, was devised as a first step to accelerating antiquated reprogramming processes for the E-3G and the assets under its control.

“These are significant events,” said Col. Adam Shelton, 505th Test and Training Group commander, Hurlburt Field, Florida. “Our capability to detect, discover and defend ourselves against hostile threat systems is tied to our ability to quickly update software, especially mission data files, and there is a tactical demand to do so.”

The test was made possible using the E-3G’s upgraded satellite communications system called Internet Protocol Enabled Communications, or IPEC, in conjunction with the more modern and flexible mission computing system on the E-3G. The proof-of-concept test demonstrated the E-3G’s ability to adapt to new threats and facilitate the compressed mission data reprogramming timeline required for success in the future fight.

“The E-3G has to continuously evolve and find ways to adapt legacy technology for the future fight, and ACEWIRE is a great example,” said Lt. Col. Dameion Briggs, 605th TES, Det 1 commander. “The next step is to build on this concept within the E-3G community and work with other airborne platforms to use IPEC and existing datalinks to provide in-air updates for other platforms.”

The test also served as a valuable exercise for the 36th EWS as part of the 350th Spectrum Warfare Wing, activated in 2021 on Eglin AFB, Florida. The 350th SWW is focused on its mission to deliver adaptive and cutting-edge electromagnetic spectrum capabilities that provide the warfighter a tactical and strategic competitive advantage and freedom to attack, maneuver and defend.

“The E-3G has completed a process that used to take days or months in a matter of minutes. This aligns perfectly with CSAF (Air Force Chief of Staff Gen. CQ) Brown’s imperative to Accelerate Change or Lose that applies to software update processes as much as it applies to hardware upgrades and new platforms,” said Lt. Col. Carly Sims, 605th TES commander, Hurlburt Field, Florida.

This article was published by the USAF’s 605th Test and Evaluation Squadron, Detachment 1 on April 7, 2021.

Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.