兔子先生

Converged Cyber, SIGINT, EW

Controlling the Electromagnetic Spectrum

Enemy forces jam equipment; congested airwaves make it difficult to distinguish friend from foe. In today’s digital environment, this is a small sample of threats and challenges we face. Having the ability to see and control the virtual battlefield is essential to completing your mission safely.

Terrestrial Layer System-Echelons Above Brigade (TLS-EAB)

Terrestrial Layer System-Echelons Above Brigade (TLS-EAB) is designed as part of the multi-platform TLS family of systems specifically developed to support cross-platform collaboration to provide optimized and integrated Signals Intelligence (SIGINT), Electronic Warfare (EW), and Cyberspace support operations to Joint All Domain Operational (JADO) enabled forces.
TLS

Capabilities

  • The TLS EAB is an extended-range, terrestrial sensing, collection, and electronic attack system providing integrated SIGINT, EW and cyber capabilities for situational awareness, situational understanding, Intelligence & Warning, command post survivability, critical asset protection operations, and supports the delivery of lethal and non-lethal effects in a holistic, synchronized manner for Multi-Domain Operations (MDO).
  • True open architecture system leverages DoD’s C5ISR/EW Modular Open Suite of Standards (CMOSS) to prevent vendor lock and enable rapid technology insertion to pace the threat in a dynamic mission environment.
  • Network integration enables interoperability with other TLS systems and data throughput to the Common Operating Picture.?

Terrestrial Layer System-Brigade Combat Team (TLS-BCT)

The Terrestrial Layer System-Brigade Combat Team (TLS-BCT) program, a critical component of the??that will help soldiers address signals found in the electromagnetic environment.

Leveraging more than 50 years of Lockheed Martin’s airborne and ground Electronic Warfare (EW) products and capabilities, TLS-BCT is the U.S. Army’s next generation, tactical vehicle-based system that delivers an integrated suite of Signals Intelligence (SIGINT), EW and Cyberspace Operations overmatch capabilities to enable the?Joint All Domain Operations (JADO) Capable Force.

Capabilities

  • Full suite of SIGINT and EW capabilities provides situational understanding to the Commander
  • True open architecture system leverages DoD’s C5ISR/EW Modular Open Suite of Standards (CMOSS) to prevent vendor lock and enable rapid technology insertion to pace the threat in a dynamic mission environment
  • Network integration enables interoperability with other TLS systems and data throughput to the Common Operating Picture
  • Operates on the move or at the halt, providing real time data and situation updates while staying with the formation
TLS

Multi-Function Electronic Warfare-Air Large

Multi-Function Electronic Warfare – Air Large (MFEW-AL) provides Electronic Support (ES), offensive Electronic Attack (EA) non-kinetic fires, dissemination of Military Information Support Operation (MISO), and support to offensive cyber operations in a podded form factor.?
MFEW-AL

Capabilities

  • MFEW-AL sees and shoots the furthest of all Army EW systems and is a key enabler of the Army Modernization Priorities, Assured Positioning, Navigation and Timing/兔子先生 Cross Functional Teams (CFT), Network CFT, and Long-Range Precision Fires (LRPF) CFT. It utilizes technologically advanced systems with system architecture based on the Modular Open System Standards – CMOSS and provides the essential aerial component of the integrated EW system in Multi-Domain Operations (MDO).
  • True open architecture system leverages DoD’s C5ISR/EW Modular Open Suite of Standards (CMOSS) to prevent vendor lock and enable rapid technology insertion to pace the threat in a dynamic mission environment.
  • Platform-agnostic design addresses multiple mission needs in one compact system.
  • Fully autonomous with demonstrated in-flight reprogram ability to address evolving battlefield environment.

Designed to Handle 21st?Century Threats

Aligned to our?21st Century Security??vision, these systems are designed to not only handle today’s threats, they’re designed to take on future threats to ensure our customers stay ahead of ready. That’s all thanks to the open architecture design that allows us to rapidly deliver upgrades to the system.

Lockheed Martin’s system design conforms to the DoD’s C5ISR/EW Modular Open Suite of Standards (CMOSS) and will for years to come. Through CMOSS open system standards, the Department of Defense and industry can:

  • Rapidly develop and deploy new techniques
  • Use hardware and software across platforms for optimal interoperability
  • Promptly insert new hardware technology
  • Reduce total ownership costs

Accelerated Technology Development

Our internal research & development programs have resulted in first-of-its-kind converged technology programs of record that are at the forefront of realizing our customers’ urgent need and vision for combined cyber and electronic warfare (EW) capability and superiority.

Through a trusted partnership with the Army codified through embracing soldier touchpoints, we have been able to accelerate programs through all phases of development using feedback from the soldiers to guide the design. ??

In addition, we have continued to transform our design, engineering and manufacturing processes with cutting-edge digital technologies that optimize our operations and allow us to quickly deliver technologies into the hands of the Soldiers. ?As part of our ongoing digital transformation initiative, all of our engineering processes have embraced a full DevSecOps methodology, allowing us to remain agile and be able to continuously update and refresh our technology to adapt to the evolving needs of the warfighter ensuring that they always remain Ahead of Ready.?

Latest News   ___
Feb 14, 2023
Story
A paradigm shift in modern warfare is putting Electromagnetic Spectrum Operations (EMSO) at the forefront for the U.S. military and allies.
Oct 19, 2020
Story
What Cyber Career is Right for You?
Jul 26, 2020
Third Party Article
America’s adversaries have targeted the military’s weaknesses via information warfare in recent years and as a result the Department of Defense has made a series of moves to reorganize and better defend against such threats.
Additional Information   ___
Contacts   ___