Win the first battle
The operational environment is rapidly evolving. With advancements in guided missiles, sensors, radars, and surveillance, peer and near-peer adversaries are able to impact the battlefield by exploiting the electromagnetic spectrum. Our ability to seize, retain, and exploit the spectrum is critical to battlefield superiority.
You must win the first battle – the battle for the electromagnetic spectrum. High value airborne assets (HVAA), such as the P-8A Poseidon, C-130 Hercules and C-17 Globemaster III transports, and KC-135 Stratotanker and KC-46 Pegasus tankers, must be able to operate closer to the threat environment and win this battle simultaneously across all domains. The days of thinking about radio frequency (RF) or electro-optical/infrared (EO/IR) or mission planning as independent functions are over. HVAAs must dominate the full spectrum at all times with multispectral survivability systems.
Podded survivability delivers end-to-end fused multi-spectral threat detection, countermeasures, and route planning solutions to significantly improve HVAA survivability:
- Sensor fusion: Fused EO/IR and RF threat detection provides maximum situational awareness
- Long-range threat warning increases reaction time and optimizes aircrew response
- RF countermeasures: Advanced threat defeat increases survivability
- Portability: Effective detection and countermeasures response in a portable solution
- Mission optimization: Dynamic route planning and tactics, techniques, and procedures
Ready for emerging threats
These capabilities can be provided in a variety of pods, which mount to the pylon of your platform and create a protective shield around the aircraft to detect threats from above and below.
Pylon capabilities can include:
- High-performance RF antennas
- Small form factor jammer
- High-powered amplifier
- Fiber-optic towed decoy
- EO/IR threat detection sensors
The system’s flexible, open architecture design allows rapid and affordable modernization. It is compatible with future threat-detection and decoy countermeasure capabilities and can host third-party electronic warfare techniques.