To Counter Russia’s Cyber Prowess, US Army Launches Rapid-Tech Office

Russian-backed forces in eastern Ukraine are using rapidly innovating IT and EW tactics. Here, Ukrainian servicemen ride an armored vehicle near Krasnoarmiisk in eastern Ukraine in 2015.

AP / Evgeniy Maloletka

AA Font size + Print

Russian-backed forces in eastern Ukraine are using rapidly innovating IT and EW tactics. Here, Ukrainian servicemen ride an armored vehicle near Krasnoarmiisk in eastern Ukraine in 2015.

The battle for eastern Ukraine shows how the pace of innovation in electronic warfare is picking up.

On Wednesday, Army Secretary Eric Fanning announced a new Rapid Capabilities Office to accelerate the development of cyber, electronic warfare, and position-and-timing gear. Read that to mean: outfitting troops to stand up to the IT and EW prowess of adversaries like Russia, according to one expert who spoke to Defense One.

“This office will address capability gaps that we’re seeing in real time, right now from our commanders in the field,” said a statement from Maj. Gen. Walter E. Piatt, who will direct operations for the office. “Our adversaries are modernizing at a rapid rate, and in some cases, our capabilities are inadequate to keep up. To maintain our edge, it’s vital that we can evolve existing and new technology at a pace that keeps it relevant to today’s and tomorrow’s conflicts.”

That rapid technological progression is on full display in eastern Ukraine where Ukrainian soldiers have been battling Russian-backed forces since 2014. For example, Russian-backed separatists have used EW and GPS-spoofing to jam and misdirect the drones that Ukrainian troops use to scope out enemy positions. “Over the past several years we’ve learned from what we’ve seen from Russia and Ukraine, and later in Syria, and from the different capabilities they’ve brought to the battlefield. We’ve seen the combination of unmanned aerial systems and offensive cyber and advanced electronic warfare capabilities and how they provided Russian forces a new degree of sophistication,” said Fanning.

Steven Pifer, a former U.S. ambassador to Ukraine, said there is much overlap between what soldiers in Ukraine are seeing and what the new capabilities office is focusing on.

“My guess is … that after 15 years of doing largely counter-insurgency operations in the Middle East, the Army is now taking a look at how it would do large force-on-force conflict in a place like Europe. One of the things we have seen the Russians use fairly effectively is electronic warfare in eastern Ukraine. I think there are some lessons that the U.S. military is extracting from what the Russian military has done in the Donbass region.”

Various training missions have given U.S. troops the chance to talk with Ukranian soldiers about this new kind of battlefield. For example, members of the 173rd Airborne Brigade Combat Team deployed there last year for Operation Fearless Guardian.

“The U.S. Army has been doing this training program for the Ukrainian national guard and Ukrainian Army,” said Pifer. “My guess is that the U.S. trainers are actually learning quite a bit from their Ukrainian counterparts in terms of the sorts of tactics the Russian Army is now using.”

The pace of innovation in EW — in the form of novel new waveforms that can disrupt an adversary’s electronics, paint enemy stealth aircraft, etc. — has surprised many in the military. That’s because EW innovation has become less and less a hardware challenge and more of a software challenge. You can make a new weapon as quickly as your algorithm can pull together a new waveform from the spectrum. But the military, too often, still procures EW assets the same way it buys jets and boats. Slowly.

“The software [to defeat new waveforms] may take on the order of months or years, but the effectiveness needs to programmed within hours or seconds. If it’s an interaction with a radar and a jammer, for example, sometime it’s only a microsecond,” Robert Stein, co-chair of the Defense Science Board’s 2013 EW study, said at an Association of Old Crows event last winter.

Service officials stressed that the new office is distinct from the Rapid Equipping Force, which sends warfighters materiel needed “urgently,” such as new weapons and solar panels for powering remote bases.

“The goal of the Army Rapid Capabilities Office is not to procure systems to outfit the entire Army, but rather to use targeted investments to execute strategic prototyping, concept evaluation and limited equipping — especially in areas where technology progresses rapidly. It will help commanders and soldiers in the field today, while building an advantage for those who will follow in their footsteps,” Katrina McFarland, the Army acquisition executive, said in a statement.

“If we want to operate in an environment where we are leading and causing our adversaries to react to us, we need to take risks,” Rapid Capabilities Office Director Douglas K. Wiltsie said in a statement. “The Army Rapid Capabilities Office is designed to take those technology risks, and to give us the agility to incorporate disruptive capabilities quickly when they can make a difference for our soldiers.”

Close [ x ] More from DefenseOne

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • Military Readiness: Ensuring Readiness with Analytic Insight

    To determine military readiness, decision makers in defense organizations must develop an understanding of complex inter-relationships among readiness variables. For example, how will an anticipated change in a readiness input really impact readiness at the unit level and, equally important, how will it impact readiness outside of the unit? Learn how to form a more sophisticated and accurate understanding of readiness and make decisions in a timely and cost-effective manner.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.


When you download a report, your information may be shared with the underwriters of that document.