US Army Eyes Ukraine Conflict for Intel on Russian Military Technology

The U.S. Army is working to glean intelligence on Russian military technology from the conflict between pro-Russian separatists and Ukrainian forces.

The U.S. Army is working to glean intelligence on Russian military technology from the conflict between pro-Russian separatists and Ukrainian forces, American generals said.

The Moscow-backed rebels are waging a hybrid war that includes the use of soft power such as disinformation and cyberattacks to hard power such as truck-mounted Grad rocket launchers, according to Lt. Gen. Ben Hodges, commander of U.S. Army Europe.

U.S. Army leaders have found that American-supplied counter-mortar radar systems are helping Ukrainian forces detect incoming motor fire by calculating the point of origin of the enemy round, Hodges said. Washington reportedly supplied Kiev with 20 of the systems as part of an aid package valued at $118 million.

“Certainly, we’re taking advantage of the opportunity to study what’s being done in Crimea in Eastern Ukraine, where the Ukrainians have employed the counter-fire radar,” he said on Tuesday in Huntsville, Alabama, during a conference organized by the Association of the United States Army.

“The lightweight counter-mortar radar, turns out, that it is a much better piece of equipment than we realized,” Hodges said. “None of us have ever — maybe one or two exceptions — have ever been under a massive Russian artillery [attack] the way the Ukrainians have, and so we have learned a lot in the way that they have responded to that.”

On the other hand, the conflict has exposed the potential for Russian electronic warfare technology to pierce U.S. and allied battlefield communications networks, Hodges and other U.S. generals said.

Rostec, a Russian-owned arms and technology company, last year claimed it used “complex radio-electronic” frequencies to hack into an MQ-5B Hunter drone that was flying over Crimea and belonged to the Army’s 66th military intelligence brigade based in Germany.

“When you think of access denial, you think of Chinese Silkworm missiles and things like that,” Hodges said, referring to sophisticated enemy air defenses, known in military parlance as anti-access, area-denial, or A2/AD environments.

“But actually to be able to project combat power into the Port of Riga [in Latvia], or Port of Bremerhaven or Ramstein [in Germany], there is so much reliance on network, and the Russians have demonstrated so much capability in Ukraine in their electronic warfare capabilities that makes it not almost impossible but extremely difficult to operate networks, especially if they’re unsecured,” he said.

The Army has spent billions of dollars trying to upgrade its battlefield communications networks through acquisition programs such as the Joint Tactical Radio System, or JTRS; Warfighter Information Network-Tactical, or WIN-T; and Nett Warrior. Some of these efforts have been canceled or restructured due to under-performing technology or changing requirements.

Despite those significant investments, the Army’s tactical communications network remains problematic, incomplete and vulnerable to attack, according to Lt. Gen. H.R. McMaster, director of the Army Capabilities Integration Center.

“Just to talk air to ground, ground to air, to talk with adjacent units, we have a network that is incomplete and we have a network that is very complex,” he said during the same panel at the conference. “Because of that complexity, it’s vulnerable — it’s vulnerable to failure, it’s vulnerable to enemy actions.”

The service’s shortcomings in tactical communications aren’t limited to Eastern Europe.

In Afghanistan, AH-64E Apache pilots had difficulty receiving live video feeds from the RQ-7 Shadowdrone because the helicopter uses a secure communications system called the tactical common data link while the unmanned aerial vehicle uses an older system.

“We couldn’t see everybody else’s video, so you go old school. You talk to the guy — you talk to boots on the ground,” said Lt. Col. John Davis, commander of 1st Battalion, 229th Aviation Regiment, part of the 16th Combat Aviation Brigade. “Actually, the E is ahead of its time when it comes to having the tactical common data link. Everybody at one point will be at that band on their systems. We’re just ahead of it.”

Maj. Gen. Dan Hughes, who oversees the service’s programs for tactical command, control and communications, and other officials are working on solutions to the network problems, McMaster said.

“In the short term, what we need to do is harden our systems and make sure that they can degrade gracefully — we can’t have single points of failure,” McMaster said. “We need really what are … deterministic networks — networks that can route communications even if certain nodes are disrupted. … We also need a degree of redundancy.”

Eventually, those technologies will need to be shared with NATO partners, Hodges said.

“If you accept the premise that we’re always going to be part of an alliance or a coalition with alliance members, we’re going to have to have networks that are interoperable, yet still have to protect your databases and your information, so that’s a heck of a challenge for Army Cyber and our G-6 in the joint community, to be able to do that,” he said.

McMaster also questioned the notion that a smaller but more technologically savvy Army will be adequate to combat future threats. After growing in size to 570,000 soldiers in 2008 at the height of the war in Iraq, the active component has less than 500,000 troops today and is on pace to shrink to 475,000 soldiers by next fiscal year.

“It has become an element of conventional wisdom that we can be prepared for the future — future conflict — by cutting capacity and manpower in the armed forces,” he said. “And compensating for those cuts and making the force smaller with greater investments in high technology solutions to the problems of future war.”

— Brendan McGarry can be reached at

About the Author

Brendan McGarry
Brendan McGarry is the managing editor of He can be reached at Follow him on Twitter at @Brendan_McGarry.
  • ghostwhowalksnz

    Irony is US equipment being used by Saudi ( plus other Sunni nations from Egypt to Pakistan) to invade their smaller southern neighbor Yemen. Their President is now in Riyadh , yet is supposed calls for assistance. At least Putin told Ukraine's president who fled , you're finished.

  • torquewrench

    "We need really what are … deterministic networks — networks that can route communications even if certain nodes are disrupted. … We also need a degree of redundancy."

    Gee whiz, Wally. I guess we could hand out a bunch of multibillion-dollar consulting contracts to various Beltway-bandit companies and have them come back with a solution that meets all of the above requirements.

    But then we'll have to give it an appropriate mil-spec acronym. How about TCP/IP? Too nerdy?

    • Michael

      > How about TCP/IP? Too nerdy?

      Already done. According to a book named "Battlespace technologies: network-enabled information dominance" these datalinks are built around several open international standard such as:
      -The TCP/IP model as used across the Internet;
      -The Open System Interconnection (OSI) standards model;
      -The Global Information Grid (GIG) model."

      The chapter 1 of link 22 cookbook is available for free from their website.

      • Michael

        I don't have enough knowledge to understand how jamming work but I suppose that cranking up transmission power is not the magic solution. Tcp/ip or not when you can't transmit nor receive I don't think it will make a difference that the network have 10 failsafe node ready to relay your message. I guess that being more directional will help but is it possible to be jamproof without relying on laser or else?

        Or worse I hope they did not relied on open cryptographic standard deliberately weakened to make eavesdropping easier, there is a scary thought (and it might explain 1 or 2 things).

    • jbiz

      What they do need is multiple ways to communicate. Example if the radio frequencies are blocked then reuse the laser range finders to communicate if need be. The sophistication of jamming communication is only going to increase especially with swarms of drones with limited intelligence who will be cheap and easily replaced.

  • blight_jklasdfljk

    Ad hoc mesh networks to the rescue! Hub-and-spoke isn't the best model for combat, where the hubs can be destroyed at the most inopportune time.

    If the Russians learn how to pick up Blue Force Tracker…we'd have to turn that stuff off. Back to the old days.

    • Michael

      >Hub-and-spoke isn't the best model for combat, where the hubs can be destroyed at the most inopportune time.

      Page 1-36 of the cookbook hint that link 22 give that capability but obviously we don't know exactly how deep they can perturbate these communication. Maybe all it need is to upgrade to the newest protocol, but I am skeptical, unless all that was needed was more node and a more clever frequency hoping, but did cyberattack already compromised this, along with blue force tracker?

  • Kevin

    For the love of God, do we have to get involved in every conflict on the planet? Apparently so. It'll never end. In the words of Steppenwolf, "There's a monster on the loose…….."