2018 Forecast: Can The Army Reinvent Itself?
Posted on
WASHINGTON: Over the next few weeks, US Army leaders will make major decisions about the Futures Command they’re standing up this summer. The new organization will be the biggest departure in how the Army buys weapons in 40 years. Important as it is, however, it’s also just one of many changes the Army must make… Keep reading →
Army Reorganizes, Accelerates EW: Synergy Or Hostile Takeover?
Posted on
ARLINGTON: Outgunned in the airwaves by Russian jammers, the US Army has a new plan for electronic warfare. The Army hopes to rebuild the long-neglected EW branch more quickly — in part, paradoxically, by partially submerging it in other branches, namely military intelligence and cyber. There’s both an equipment aspect and an organizational one. First… Keep reading →
Army Cyber Accelerates; Electronic Warfare Lags
Posted on
PENTAGON: The Army is ahead of schedule building cyber teams — but its equally essential electronic warfare branch is lagging badly. Like a fiddler crab, one arm is much more developed than the other. While effective in the current fight against Daesh (aka ISIL), this unbalanced force would be at a severe disadvantage in future Multi-Domain Battles… Keep reading →
Army Building 1st Battlefield Cyber/Electronic Warfare Team
Posted on
WASHINGTON: This afternoon, Army generals gathered to begin designing a new kind of unit, a tactical cyber/electronic warfare detachment, whose first experimental exercise overseas could be as early as next year. For the first time since the Cold War, at least a small part of the Army could have radio and radar jamming capabilities to… Keep reading →
Army Wargames Hone Battlefield Cyber Teams
Posted on
ARLINGTON: The Army is reinforcing its combat brigades with cyber soldiers. In 18 months of wargames with a wide range of units — tanks, Strykers, infantry, Airborne, Rangers — Army Cyber Command troops have brought hacking and jamming to bear on the (simulated) battlefield alongside guns and bombs. The exercises have already revealed cybersecurity shortfalls… Keep reading →