Operate Through: Secure Use /Insecure Environments

Ensure that US forces can operate through wherever and whenever we deploy

Check back frequently for Updates Latest Developments

Counter adversary attempts

  • To Deny access to the RF spectrum​

    Hardware and software for dynamically using the spectrum

  • To deny access to 5G networks

    “Zero Trust” architectures that mitigate attacks on network roles / authorities

“There is no such thing as a secure system - we can work to make things more secure, be more mindful of vulnerabilities, but ultimately, we must effectively use networks in which we have ‘zero trust.’”
 – Saving Our Spectrum, October 10, 2019