CONTENT PREVIEW
C4iSR: Joint & Common Equipment

Raytheon targets cyber force training requirement

29 January 2018

Raytheon has been demonstrating a proof-of-concept cyber trainer in advance of an expected solicitation for a Persistent Cyber Training Environment (PCTE) from the US Army.

The army is seeking a training platform that enables cyber mission forces (CMF) to train in emulated network environments utilising current cyber tools.

According to the US Department of Defense, the goal is to "establish a joint PCTE that will be a constellation of federated, interoperable common training capabilities enabling full spectrum training from individual competencies to the team, unit, group, and force training, exercises, TTP development and mission rehearsal."Seen here is a virtual table top 3D depiction of a US Army mission showing the network connections between a UAV and air and ground platforms. (Raytheon)Seen here is a virtual table top 3D depiction of a US Army mission showing the network connections between a UAV and air and ground platforms. (Raytheon)

Raytheon's virtual training environment covers all of these requirements. The company is looking to add more capability, particularly in gaming and analytics as well as making the system available to mobile devices, Howard Miller, capture manager for Raytheon, told Jane's during a demonstration of PCTE on 24 January in Arlington, Virginia.

In the current iteration of Raytheon's PCTE, users wearing virtual reality goggles can access a mock-up of a cyber operations center that can be customised by adding or moving work stations, wall-sized display screens, and table top 3D representations of a mission.

"We wanted to make sure that everything we do from a training perspective, especially in cyber, is tied to the mission," Miller said.

"We have an area where we can do mission rehearsal, where you can see the effects of different cyber tools and techniques on the network," he added.

Miller noted that it was important for the virtual training environment to be realistic for the users.

"We built this particular cyber operations center based on what we are seeing [from] the customer," Miller said. "What you are training on is very much analogous to what you are operating on for your actual mission."

Want to read more? For analysis on this article and access to all our insight content, please enquire about our subscription options at ihs.com/contact



(316 of 743 words)
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT