PHILADELPHIA – The war in Ukraine confirms the US military’s efforts to upgrade communications facilities and improve cybersecurity tools, according to officials managing the modernization of the service network.

“I think the things we’ve seen have reinforced the campaign we’ve been through, and we need to continue that momentum and the way we do it,” Major General Robert Collins told reporters on May 10. in the corridors at a technical forum.

As executive director of the Command, Control, and Communication Tactics program, Collins helped oversee the implementation of what are known as the feature sets, hardware, and software injections the military needs for an intuitive, robust, and operational network.

IN conflict in Eastern Europe reaffirms the process of a set of capabilities and its concepts by training the spotlight on “basic blocking and dealing” with security of transmission and communications, Collins said.

“Besides, when you have a living and breathing threat,” he said, “you have to think about things like a contested and congested environment.”

Russian forces in Ukraine have used simpler and less secure communication devices – mobile phones, for example – to transmit information. They have also come across critical methods for command and control.

“We see them using a lot more unclassified communications because their ability to communicate in a classified way is, well, for one reason or another, not as strong as it should be,” a senior defense official told a Pentagon briefing. March 21st.

The omissions go away The military machine of Moscow vulnerable.

“This is another one of those logistics problems we’ve seen struggling with,” the senior official said. “They just weren’t fully prepared for operations of such intensity for so long on so many different lines of attack.”

The United States cannot and will not allow the same problems to befall it in future battles, Brig said. General Jet Ray, director of the army Network cross-functional team. So the military takes notes.

“That’s what we learn from,” Ray said at the May 10 event. “We will be so divided in the battle and we will see how they will be distributed.”

Russia is beaten Ukrainian lines of communication before his invasion in late February and continues to direct them. The United States said last month it would send protected, tactical communications equipment to Ukraine after providing the country with modernized anti-eavesdropping and jamming radios.

“It simply came to our notice then. Are these commercial applications, are they really what we want to use on the battlefield? ” That’s what Ray told reporters. “We want to ensure that their security is baked in time so that they are not compromised and put our forces at risk.

The initiative for a set of opportunities started in the fiscal year 2021. Additional improvements shaped by industry and soldiersare expected every two years.

The ’21 feature set focuses on infantry brigades, increased connectivity and making the communications kit smaller, faster and more resilient. About seven brigade combat teams received upgrades, leaving two more.

The ’23 feature set focuses on Stryker’s brigades and aims to improve data sharing and mobility, while including e-war and cyber warfare considerations. The army wrapped him up critical design review for the Capability Set ’23 technology in April, and later this year will send the systems to Europe, where ongoing testing and analysis will influence usage decisions.

“In previous wars, the difference between a good decision and a bad decision can be minutes,” Collins said during a demonstration on April 26 in Fort Meyer, Virginia. “In future combat space, this difference between a good decision and a bad decision can be seconds or milliseconds.”

Colin Demarest is a reporter for C4ISRNET, where he covers networks and IT. Colin had previously covered the Department of Energy and its National Nuclear Security Administration – namely the development of nuclear weapons and the Cold War cleanup – for a South Carolina daily.

Previous articleUS Smart Grid – Evolves Significantly, But Higher Levels of Sophistication Needed
Next articleTrace / debugger helps to analyze high speed Wi-Fi streams