Marching toward intra-soldier wireless

The Defense Department's Rapid Reaction Technology Office is looking for hardware and software to enhance intra-soldier wireless (ISW) communications to connect various soldier-borne equipment so warfighters can better access and share situational awareness information.

An ISW specification is being developed by the military to securely and seamlessly connect helmet-mounted displays, radios, headsets, radio push-to-talk (PTT) switches and various other body-worn sensors for warfighters in small units across a broad spectrum of operations.

Based on initial evaluations of data rates, power consumption, range and security, officials determined that ultra-wideband was the most viable wide-area personal network technology for ISW applications.

The overall vision is to develop this technology to the point that other Army and DOD programs could leverage the capability to allow for wireless communication amongst different components using a variety of industry standard interfaces.

The Rapid Reaction Technology Office will conduct collaborative tabletop experiments to examine operational concepts and ramifications of potential technical solutions. Selected participants will brief government technical and materiel development communities and receive feedback from academia, industry  and other interested parties related to cost, schedule and performance for the tactical environment.

TTX is planned for summer 2019. More information is available here.

About the Author

Connect with the GCN staff on Twitter @GCNtech.


  • automated processes (Nikolay Klimenko/

    How the Army’s DORA bot cuts manual work for contracting professionals

    Thanks to robotic process automation, the time it takes Army contracting professionals to determine whether prospective vendors should receive a contract has been cut from an hour to just five minutes.

  • Russia prying into state, local networks

    A Russian state-sponsored advanced persistent threat actor targeting state, local, territorial and tribal government networks exfiltrated data from at least two victims.

Stay Connected