GORE-TEX WINDSTOPPER

Archive for the ‘Army’ Category

PEO Soldier Marks Major Milestone in Aircrew Protection at ACE Vest Full-Rate Production Kickoff

Tuesday, June 17th, 2025

MEADOWS OF DAN, Va. — Project Manager Soldier Survivability (PM SSV), under Program Executive Office Soldier (PEO Soldier), marked the Full-Rate Production (FRP) kickoff of the Aircrew Combat Equipment (ACE) vest at the Aerial Machine and Tool Corp. manufacturing facility, June 4, 2025, in Meadows of Dan, Virginia. The ACE vest represents a major milestone in rotary-wing protection, delivering the Army’s most significant upgrades in more than two decades.

During the kickoff, Maj Caleb Hughes, assistant product manager for PM SSV’s Air Warrior, (AW) Air Soldier Systems and ACE vest program lead, provided a technical overview of ACE program objectives to senior PM SSV leadership focusing on showcasing the vest’s core deliverables, reducing the physical weight borne by the air warrior while enhancing Soldier protection and survivability.

Developed as a Preplanned Product Improvement (P3I) under the Air Soldier System, the ACE vest replaces the legacy Generation III Air Warrior Personal Survival Gear Carrier (PSGC), delivering a 19% lighter system, with a 10% reduction in bulk from the legacy carrier.

“The improvements to form, fit, and function dramatically increase mission effectiveness and survivability,” Maj. Hughes said. “Reducing body-carried weight is key to lowering fatigue and increasing aircrew sustainment during long-duration aviation missions.”

To achieve these efforts, the ACE vest integrates components from the Modular Scalable Vest (MSV) developed under the Soldier Protective Equipment (SPE) portfolio. The MSV’s low-profile soft armor replaces heavier legacy materials while streamlining compatibility with other ACE protective elements.

“The ACE vest is a strong example of cross-platform integration,” said Neal Nguyen, lead systems engineer for SPE. “The MSV’s upgraded soft armor reduces core areal density from 1.8 to 0.78 lb/ft², with a drop in carried weight from 9.3 pounds to 5.61. This transformational capability results in significant improvements to aircrew mobility.”

By aligning the MSV across platforms, PEO-Solider ensures proven ballistic technologies are fielded faster without requiring separate testing or validation from each system team, Nguyen added.

During the kickoff, Maj. Hughes also introduced the laser-cut Pouch Attachment Ladder System (PALS), a modernized textile solution replacing the traditional MOLLE system.

“The PALS eliminates unnecessary bulk from excess stitching and cloth and supports a more flexible gear configuration,” Maj. Hughes said. “This modular capability allows aircrews to tailor the vest based on mission and environmental factors, reducing equipment load without compromising protection.”

The ACE vest includes additional survivability features such as the advanced Personal Restraint Tether (PRT), an attenuating safety line designed to control deceleration during a fall from a rotary-wing platform.

“The tether helps reduce the jolt a crew member might otherwise experience during a fall,” Maj. Hughes said. “Instead of a hard stop that could cause secondary injuries, the design absorbs energy and enhances recovery safety.”

Another notable upgrade to Aircrew survivability is the repositioned Life Preserver Unit (LPU-42/P) floatation device, now mounted at the abdomen. The configuration increases the head’s range of motion, reducing fatigue and enhancing situational awareness during flight operations and water egress scenarios. The LPU-42 redesign also increases buoyancy by nearly 39%, a critical survivability improvement delivered through the ACE vest.

Following the technical presentation, senior leaders toured the production facility, observing elements of the ACE vest manufacturing line and Aerial’s recent technology upgrades implemented to support product development. The event concluded with a complete product layout, offering a firsthand look at the ACE vest’s fielded components and marking the milestone in the program’s transition to full-rate production.

“Today’s event highlights the culmination of hard work and collaboration across the Army to deliver the first update to Aircrew protection in more than 20 years,” said Col. James Lindh, Project Manager of Soldier Survivability. (PM SSV) “This dramatic increase in protection and comfort will make our Aircrews more lethal and survivable. This milestone reflects our commitment to delivering the best kit for our Aircrews available today, while supporting Army-wide modernization.”

Limited procurement for the ACE system began in fiscal year 2022, followed by initial fielding in FY24 to the 25th Combat Aviation Brigade and rapid delivery to elements of the 101st Airborne Division (Air Assault) at Fort Campbell, Kentucky, earlier this year. The ACE vest and modular component fielding will continue through FY32 based on aviation unit priorities.

“Supporting the Air Warrior mission means ensuring these systems are fielded where they are needed most,” said Maj. Hughes. “What this event means for the Aviator, is delivering the best equipment to the field faster.”

Story by Khylee Woodford 

PEO Soldier

Soldiers Train With – And Praise – Nett Warrior System of the Future

Tuesday, June 17th, 2025

Hohenfels, Germany – With the rapid advances of technologies and the ever-changing technological landscape, it remains more important than ever for the United States Army to remain at the cutting edge of innovation. Which is why an event like the Human Machine Integration (HMI) Fight Tonight Excursion is so essential.

The HMI Fight Tonight Excursion is a training event to train today’s Soldiers on how to use the emerging technologies and devices of tomorrow. For three days, Soldiers were given hours of training and hands-on experience to test, experiment with, and provide direct feedback for some of the latest technologies and breakthroughs coming from PEO Soldier.

And the Soldiers of 3rd Brigade, 10th Mountain Division led the way.

“The Fight Tonight Excursion is an Army Futures Command Commanding General priority to rapidly integrate a Common Control Solution for uncrewed systems for the Army,” said MAJ Adam Arnold, assistant program manager of Nett Warrior. “The focus for the excursion centered around bridging Nett Warrior, Short Range Reconnaissance (SRR) Unmanned Aircraft Systems (UAS) assets along with other commercial off-the-shelf UAS with commercial controllers to provide Soldiers a common control software solution and reduce the number of controllers on the battlefield.”

Many current SRR drones only come with controllers provided by the manufacturing companies. While these controllers work, they only work for the specific drones they are made for and can quickly add a lot of excess bulk and weight for Soldiers to carry if units are given multiple different SRRs to operate.

That is where PEO Soldier and Nett Warrior come in: Working with the DEVCOM Soldier Center, they designed an all-in-one system that can deploy and control multiple different types of SRR drones, eliminating the need for Soldiers to constantly keep track of different controllers and operating systems.

Getting here has been a collaborative process from the beginning. Taking DEVCOM solutions and partners at Program Manager UAS have been integral to bringing these advanced systems online well before they were ever in the hands of Soldiers. PM UAS has been crucial in receiving UAS vendor support to update their firmware so the systems will work. It is also responsible for sending three of their trainers to join the Nett Warrior team to help train Soldiers on these advanced systems.

The feedback from the Soldiers testing the Army’s cutting-edge system has been very positive.

Soldiers who trained with the Nett Warrior system thought the software was “simpler” and more “user-friendly” than what they were currently used to. They found that the drones they controlled performed better on the Nett Warrior system and that the interface was very easy to use.

That is no small feat given that the training took place in the frigid, single-degree German winter weather.

The Nett Warrior system also adds the same extensibility to platoon leaders and commanders. Now, reconnaissance footage and intelligence can be relayed through multiple touchpoints. Leaders at all echelons can see the video in real time. Nett Warrior also allows commanders to assign tasks directly to their units and even remotely take control of the UAS if necessary.

All that in one easy-to-use system, designed from the ground up with Soldiers in mind.

“The collaborative efforts between PEO Soldier, PEO Aviation, PEO C3N, and our industry partners were in full display in the work required to bring UAS assets into the unit network architecture,” MAJ Arnold said. “The ability to pass Position Location Information (PLI) and video streaming throughout the formation will provide Soldiers with far more extensibility and situational awareness than ever before.”

After this training, the Soldiers had an additional month to use the Nett Warrior system on their own, integrating it with their other duties and training to see how the system performed in the field.

The response was incredibly positive.

The training was “an overwhelming success,” said Chief Warrant Officer 2 Brendan Henske, Brigade UAS Operations Officer, noting that the overall Nett Warrior devices and systems helped to “reduce and simplify the Soldiers’ workload.”

“Soldiers took to learning the new interface with vigor and did not want to give up the equipment at the end,” CW2 Henske said.

This is far from the end, however. The Soldiers will provide the Nett Warrior team with direct feedback on their favorite features and what could be improved. That feedback will be used to refine, improve, and perfect the Nett Warrior system.

It is that commitment, to put Soldiers at the forefront of everything being done, that helps Nett Warrior and all the teams across the multiple PEOs thrive and continue to deliver the best and most advanced systems in the world to the men and women in uniform.

By Zachary Montanaro

Overland AI Demonstrates Soldier-Led Autonomy Across Day and Night Operations

Monday, June 16th, 2025

FORT LEONARD WOOD, Mo., June 10, 2025 — Overland AI’s fully autonomous tactical vehicles, ULTRA, were deployed across 15 live mission scenarios to comprehensively demonstrate end-to-end, Soldier-operated ground autonomy.

ULTRA, Overland’s fully autonomous tactical vehicle, operating in dense forest and utilizing tree line for cover during mission scenarios at Fort Leonard Wood, Mo.

Soldiers from the 555th, 36th, and 20th Engineer Brigades, and the 173rd Airborne Brigade, executed these 15 missions using two ULTRAs. They also leveraged Overland’s tactical C2 interface, OverWatch, to plan, execute, and adapt operations on the fly. From pre-operation vehicle checks, payload swaps and munition loading, to mission planning and execution in OverWatch, the experimentation event was conducted almost entirely by end users.

“This was a particularly unique event,” said Chris Merz, who serves as the director of product at Overland AI. “Nearly every phase of the operation—from munition loading to software-based replanning—was in the hands of the Soldier. We saw real independence from the operator, not just in planning and execution, but in adapting tactics in real time.”

ULTRA deploying smoke deception to confuse the enemy and create an element of surprise during a day mission in wooded terrain.

Participating units were tasked with planning complex, multi-vehicle missions. Soldiers used ULTRA’s modular platform for kinetic and electronic warfare breaching, terrain shaping with XM204s, deception, obscuration, and delivery of third-party payloads, including uncrewed aerial vehicles (UAV) and electronic warfare (EW) capabilities.

Overland’s autonomy stack is highly adaptable in the field. Some operators re-tasked vehicles mid-mission in response to enemy activity and adjusted payload configurations under time pressure with little notice. Other operators, planning two simultaneous terrain-shaping missions with over 20 checkpoints and five tasks per vehicle, took less than three minutes to plan.

A Soldier from the 555th Engineer Brigade plans a series of missions with ULTRAs using OverWatch, Overland’s intuitive, tactical command and control (C2) interface.

“Our mission is to empower the Armed Forces to dominate any and all missions they need to accomplish,” said Byron Boots, co-founder and chief executive officer of Overland AI. “This wide-ranging event showed that Soldiers both trust our autonomous land systems and can leverage our versatile capability from start to finish.”

Overland AI remains committed to advancing autonomous military technologies, having previously secured an $18.6 million contract with the U.S. Army and the Defense Innovation Unit (DIU) to develop autonomy software for the Army’s Robotic Combat Vehicle (RCV) program. The company continues to support a range of U.S. military programs, including the U.S. Army, Marine Corps, and Special Operations Command.

To learn more about Overland AI and see open roles, visit www.overland.ai.

Harnessing SIGINT and EW for Tactical Dominance: A Guide for Combat Arms Leaders

Monday, June 16th, 2025

Introduction

To the combat arms platoon leader and company commander: You are leading formations that will close with and destroy the enemy. Your ability to shoot, move, communicate, and then move again (see later section on countering enemy surveillance in the electromagnetic spectrum) is paramount to our success on the modern battlefield. The enemy is sophisticated, adaptive, and aggressively contesting your ability to maneuver in all domains, including the electromagnetic spectrum (EMS). You are not alone in this fight; the intelligence and cyber communities will enable you to dominate the EMS. These communities stand ready to provide you with actionable targets and the means to influence/dominate the EMS at echelon. This is not theory; this is the reality of combat against peer and near-peer adversaries, and we are bringing the full weight of the Department of Defense (DoD) and its combat support agencies to bear. Your S-2 section and Cyber Electromagnetic Warfare Activities (CEMA) cell will innovate at speed across the range of operations to ensure that you have the capabilities necessary to win.

SIGINT and EW: Your Tactical Edge

Signals intelligence (SIGINT) and electromagnetic warfare (EW) are distinct but complementary disciplines that must be integrated effectively to maximize battlefield effects. SIGINT identifies and characterizes enemy signals, providing critical intelligence that inform EW operations. EW teams can use that information to help locate enemy positions for destruction, or simply to disrupt, deceive, or deny the adversary’s use of the electromagnetic spectrum. Proper coordination between SIGINT and EW enables deception operations, enhances precision targeting, and strengthens force protection measures, ensuring that friendly forces maintain dominance over the EMS while denying the enemy key capabilities.

Based on historical analysis of large-scale combat operations (LSCO), recent lessons learned from Ukraine, and predictive analysis of China’s People’s Liberation Army (PLA) capabilities, the teaming of SIGINT and EW can be a force multiplier across the warfighting functions. By integrating SIGINT-derived intelligence with EW’s ability to deny and disrupt, we can significantly degrade an adversary’s ability to maneuver and execute multidomain operations (MDO).

Understanding SIGINT in Your Fight

SIGINT is not just a tool for strategic planners in some far-off headquarters. It is a tactical enabler that allows you to detect, locate, and exploit enemy communications in real time. Whether you are setting up an ambush, planning a fire mission, or maneuvering to secure a key objective, SIGINT can provide the enemy’s disposition, intent, and vulnerabilities. The Army’s ability to identify and track enemy command nodes, air defense systems, and maneuver elements through SIGINT means you can strike at the right place and time with overwhelming force.

How EW Shapes the Battlefield

EW is your ability to seize control of the EMS. EW is the counterweight to enemy SIGINT and can greatly affect their ability to execute command and control (C2) while disrupting their ability to communicate, navigate, and coordinate. If the enemy cannot receive orders, they cannot react. If their targeting systems are blinded, they cannot fire effectively. Ultimately, if they can’t navigate, they cannot effectively maneuver forces on the battlefield. EW, when employed effectively, can have significant battlefield effects, all without firing a shot.

EW’s Three Essential Functions:

Electromagnetic Support (ES): Detecting and identifying enemy emitters to support targeting and situational awareness.

Electromagnetic Attack (EA): Jamming and deception operations that deny the enemy use of the spectrum.

Electromagnetic Protection (EP): Ensuring that friendly forces maintain reliable communications despite enemy jamming, to include employment of emission control measures (e.g., radio power, antenna placement, etc.) to defeat enemy attempts to surveil and target friendly forces.

The Critical Role of SIGINT and EW in Tactical Operations

The operational environment requires agility, synchronization, and unity of effort to converge all sensors and effects on a rapidly evolving threat. The ability to integrate SIGINT with EW at the tactical level allows commanders to enhance targeting fidelity (SIGINT and EW), disrupt adversary operations (EW), and provide real-time intelligence for maneuver forces (SIGINT).

To focus on C2 and counter-C2, expanded maneuver, and cross-domain fires, we must team SIGINT and EW across EA, ES, and EP to present multiple dilemmas to our enemy, enhance C2 protection, and increase lethality. Let’s look at an example:

Kill Chain Analysis: A Counter-Unmanned Aerial System (C-UAS) Scenario

In an era where UAS play an increasingly critical role in modern warfare, understanding the full kill chain process for countering these threats is essential for operational success.

Phase 1: Detect and Identify

A brigade combat team (BCT) is executing a deliberate attack when SIGINT elements intercept and transcribe enemy communications emanating from an urban area associated with drone activity. Electromagnetic support reporting from sensors riding on a remote-controlled scouting vehicle confirms the presence of enemy UAS operating frequencies, geolocating multiple launch sites and relay nodes.

Phase 2: Target and Disrupt

Upon confirming the threat, the BCT’s organic EW platoon, using Terrestrial Layer System (TLS) Manpacks, receives the locations of the threat signals of interest (SOI), and executes an electromagnetic attack to jam the drone’s control frequencies, disrupting the operator’s ability to maneuver the UAS effectively. Simultaneously, SIGINT analysts coordinating with higher-echelon intelligence teams pinpoint the drone operator’s location for kinetic targeting.

Phase 3: Engage and Destroy

With the drone rendered ineffective, the fire support element coordinates an artillery strike on the enemy UAS ground control station, leveraging the precision geolocation refined by enhanced tools like the Electromagnetic Warfare Planning and Management Tool (EWPMT) and the Army Intelligence Data Platform (AIDP). Simultaneously, the EW platoon continues to jam the enemy’s communications, preventing coordinated support or retrograde. Friendly forces neutralize the threat, allowing maneuver elements to proceed unimpeded.

Phase 4: Assess and Adapt

Post-strike analysis from SIGINT utilizing High Altitude Platform (HAP) sensors reveals ongoing enemy attempts to reestablish drone operations, underscoring the necessity for sustained EA efforts. In response, SIGINT teams disseminate updated threat reporting to the EW platoon, enabling them to adjust jamming frequencies and counter enemy adaptations. Concurrently, SIGINT elements refine their intelligence collection to anticipate and prepare for potential future enemy tactics, ensuring proactive EW measures.

This coordinated SIGINT and EW kill chain ensures the enemy’s UAS capability is neutralized before it can affect friendly operations. This vignette effectively illustrates the critical synergy between intelligence-driven targeting and spectrum dominance.

How You Can Leverage SIGINT and EW at Your Level

To gain a decisive battlefield advantage, leaders must integrate SIGINT and EW capabilities to counter enemy threats in the EMS. The following approaches can help achieve this:

Incorporate SIGINT and EW into the DNA of Your Planning and Execution

From the outset, consider how to effectively integrate these capabilities into your operations to inform and shape your decision-making. Collaborate closely with supporting staff elements, such as the BCT CEMA cell and S-2 section, to gain a deep understanding of the enemy’s electromagnetic spectrum usage and identify opportunities to disrupt and exploit their vulnerabilities. By incorporating SIGINT and EW into your operational framework, you can create a more comprehensive and effective approach to achieving your mission objectives.

Train Your Leaders and Soldiers to Recognize and Exploit the EMS

Your Soldiers must understand that controlling the EMS is just as vital as controlling key terrain. Integrate SIGINT and EW considerations into your battle drills, mission rehearsals, and after-action reviews. Units that fail to account for enemy EW will put their formations at significant risk on the battlefields of the future. Training ensures you can adapt and maintain tempo under contested conditions.

SIGINT and EW teams can sense across the EMS with ES at the tactical edge. By developing new tactics, techniques, and procedures (TTPs), SIGINT support from higher echelons, such as from the division level, can be pushed down to BCTs, providing real-time EMS sensing without burdening them with protecting and maneuvering higher-echelon intelligence capabilities. Ultimately, this enables more agile and lethal maneuver forces.

Ensure Interoperability with Supporting SIGINT and EW Units

SIGINT and EW units are enablers, not afterthoughts. Integration of SIGINT and EW elements throughout the organic targeting process is key. Work with them to refine target identification and EA options. Develop unit standard operating procedures (SOPs) that detail how to request and synchronize their capabilities in real-time engagements and incorporate them in all rehearsals. Leaders must ensure that EW Soldiers are embedded within tactical formations to provide immediate effects that enhance maneuver and fires.

Adopt an Aggressive, Learning-Focused Mindset

The enemy is adapting. As such, we must do the same. Stay informed on the latest TTPs by leveraging resources such as the Center for Army Lessons Learned (CALL) and current doctrinal publications like Field Manual (FM) 2-0, Intelligence, and FM 3-12, Cyberspace Operations and Electromagnetic Warfare. We must continue to share lessons learned across our formations and with intelligence and EW enablers to continually refine our operational effectiveness.

Conclusion

In an era where the electromagnetic spectrum is as contested as the physical battlespace, success demands leaders fully integrate SIGINT and EW into their tactical decision-making. These are not ancillary capabilities but core enablers of maneuver, fires, and protection. By treating SIGINT and EW as an integral piece of battlefield operations rather than separate support functions, we can outthink, outmaneuver, and overwhelm our adversaries before they can react.

The future fight will be won by those who master the integration of intelligence and electromagnetic warfare, seamlessly fusing these disciplines into their formations and operational planning. This requires continuous learning, rigorous training, and adaptive thinking to counter evolving enemy tactics. The intelligence and EW communities stand ready to support, provide counsel for our specialties, and execute through our commanders’ intent.

Superiority in the EMS is not an option — it is a necessity. By embracing these capabilities and fostering interoperability, we ensure that our forces maintain a lethal edge on the battlefield. The challenge is clear, and the tools are at hand. Now is the time to educate our leaders and Soldiers and incorporate these capabilities into our training so we are prepared to fight and win our nation’s wars.

By MG Rick Appelhans and MG Ryan Janovic

MG Richard T. “Rick” Appelhans currently serves as the commanding general of the U.S. Army Intelligence Center of Excellence and Fort Huachuca, AZ. Prior to assuming this position, he served as the director of Intelligence, U.S. Forces Korea/deputy director of Intelligence, Combined Forces Command. MG Appelhans’ overseas assignments and deployments include the Republic of Korea, Kuwait, Germany, the Netherlands, Afghanistan, Bosnia-Herzegovina, and Iraq. He began his military career as an Armor officer, serving as a tank platoon leader, company executive officer, and battalion S-4. Since transitioning to Military Intelligence in 1997, MG Appelhans has served in a variety of command and staff assignments to include detachment commander, battalion S-2, company commander, brigade combat team S-2, analysis and control element chief, region commander, division G-2, and group commander.

MG Ryan Janovic currently serves as the commanding general of the U.S. Army Cyber Center of Excellence and Fort Eisenhower, GA. A native of Akron, OH, he graduated from the U.S. Military Academy at West Point, NY, in 1993 and commissioned into the Military Intelligence Corps. He served with Multi-National Forces-Iraq, 1st Infantry Division in eastern Afghanistan, Military Intelligence in Korea, and later with Commander United Nations Command/Combined Forces Command/U.S. Forces Korea. His other assignments include various posts throughout the U.S. to include a tour as a White House Fellow. In 2019, MG Janovic joined the cyber ranks as the deputy commander of Joint Force Headquarters – Cyber (Army), leading the organization toward unit citations earned in support of U.S. Central Command.

This article appears in the Summer 2025 issue of Infantry. Read more articles from the professional bulletin of the U.S. Army Infantry at www.benning.army.mil/Infantry/Magazine or www.lineofdeparture.army.mil/Journals/Infantry.

Airborne Operation Strengthens Colorado Guard, Jordan Partnership

Monday, June 16th, 2025

CENTENNIAL, Colo. – In a display of cooperation and capability, Soldiers from the Colorado Army National Guard and the Jordanian Armed Forces recently conducted a joint airborne operation in Watkins, Colorado.

The April 23 “Friendship Jump” brought together paratroopers from two nations to strengthen warfighting readiness and enhance interoperability under high-risk, realistic training conditions. The Colorado National Guard and Jordan have been partners since May 24, 2004, through the Department of Defense National Guard Bureau State Partnership Program.

“Airborne operations bond people together,” said U.S. Army Master Sgt. Casey Finkbiner, jumpmaster, Colorado Army National Guard. “You place your lives in one another’s hands and trust that they will place your safety above all else. It shows real partnership when we are able to execute air ops with our foreign counterparts.”

The jump, initiated and organized by Finkbiner, showcased the commitment of both forces to operate as a cohesive, capable team in demanding environments.

The operation was particularly complex because of differences in equipment, language and procedures.
Jordanian paratroopers had never jumped from a CH-47 Chinook or used the U.S. MC-6 parachute system. Through detailed coordination and instruction from Colorado Army National Guard jumpmasters, the forces bridged those gaps and executed a successful joint mission.

“Any training that is high risk builds trust between partner militaries, and this makes detailed planning and collaboration even more important,” Finkbiner said.

U.S. Army Col. Alyssa Aarhaus, commander, 89th Troop Command, emphasized the historical and symbolic importance of the jump.

“Although raised in culturally different environments, we came together to celebrate our unique airborne capabilities and the partnership of our two amazing nations,” she said. “By completing this jump with both Jordanian and American jumpmasters, COARNG [Colorado Army National Guard] solidified an already strong partnership and highlighted the talent of our two nations.”

After completing the joint airborne operation, participants were awarded Jordanian jump wings, “a coveted recognition and outward expression of our strong partnership,” Aarhaus said.

The award acknowledges the mutual trust, coordination and shared risk involved in the combined training event, reinforcing interoperability between the two forces.

Finkbiner said the successful execution of this operation serves as a stepping stone for future collaborative missions involving more complex joint capabilities.

“Exercises and partnership events under realistic or high-risk conditions allow the U.S. and Jordanian forces to coordinate and execute complex military operations, improving communication and processes, and overall becoming a more effective combined force,” she said.

A participant from the JAF said, “This joint airborne jump represents a step that reflects the high level of coordination and understanding between the Jordanian Armed Forces and the Colorado National Guard.

“This training provided us with the opportunity to exchange experiences and acquire new skills, which enhanced our readiness and ability to operate jointly in diverse and evolving environments. Cooperation based on mutual respect and professionalism makes us better prepared to face future challenges efficiently and effectively,” the participant said.

While modern technologies such as drones and cybersecurity tools offer critical capabilities in reconnaissance, surveillance and precision engagement, airborne forces continue to play a vital role by providing the ability to rapidly deploy large-scale personnel across the globe. This capability complements emerging domains, ensuring that military forces remain flexible and prepared across both conventional and digital battlefields.

As global security challenges continually evolve, efforts like the “Friendship Jump” can ensure that allied forces remain ready, responsive and resilient together.

Officially signed May 24, 2004, the partnership between Jordan and the Colorado Guard represents a milestone in the SPP program because it was the first such partnership established in the Levant region of the Middle East. Celebrating more than 20 years of cooperation, the partnership has become a cornerstone of strategic collaboration and mutual support between the JAF and the Colorado National Guard.

By Senior Airman Melissa Escobar-Pereira, Colorado National Guard

Army Cyber Corps – A Prehistory

Sunday, June 15th, 2025

On September 1, 2024, the U.S. Army Cyber Corps turned ten years old. Some may chuckle at the thought of this branch still teetering on the verge of adolescence compared to the more grizzled veteran branches like Infantry, Field Artillery, and Signal just to name a few. However, there is more than meets the eye with cyber, and as I communicate to my students at the U.S. Army Cyber and Electromagnetic Warfare School (which also turned ten) at Fort Eisenhower, GA, the Cyber Corps has accomplished much in its first decade. While still a pre-teen so to speak, the rate of change in this domain has always necessitated that Cyber act mature for its age. What follows is the first part of a planned series chronicling the history of the U.S. Army Cyber Corps and its school. This first essay provides a general synopsis of the emergence of cyber and how it became a key focus for the U.S. military, tracing its early connections to information warfare and operations. It also details the origins of cybersecurity, alongside the creation of Army Cyber Command and West Point’s Army Cyber Institute. Finally, a major theme of this essay focuses on the cyberspace areas of concentration developed by the Army Military Intelligence and Signal branches – setting the stage for the eventual adoption of cyber as a standalone career field for Army personnel.

The seeds of this domain germinated in the 1960s as the U.S. military began piecing together computer networks to speed up information sharing and threat detection in the midst of the ever present Soviet nuclear threat. Additionally, throughout the 1960s and 1970s, the NSA had hundreds of “internetted” terminals. It was during this environment of early networking capabilities that the Advanced Research Projects Agency Network (ARPANET) first came online in 1969. By 1976, “Information War” as it pertained to the information flow between weapons systems and the possible digital disruption of Soviet command and control, was viewed as a worthy pursuit. By 1979, NSA leadership recognized that any computer system could be breached by a knowledgeable user, and ideas about “deep penetration” technical capabilities against U.S. adversaries began to take root. By 1986, and possibly earlier, Special Access Programs overseen by the Joint Chiefs and National Security Agency (NSA) began attempting computer network exploitation. As the opportunities for intrusion into adversary networks widened, the U.S. discovered in 1986 that the Soviets were paying hackers to engage in similar tradecraft against U.S. networks.

As the proliferation of computer networks spread globally and the ability of these computers to collect, sort, and analyze information at higher speeds, the Department of Defense (DOD) increasingly recognized the high value of information at the strategic and tactical levels of war. During the Gulf War in early 1991 (Operation Desert Storm), information played a crucial role, both in providing Allied forces with enemy intelligence and in disrupting enemy command, control, and communications. Both advantages were greatly increased by technology and computing power, and as one observer declared, “in Desert Storm, knowledge came to rival weapons and tactics in importance…” Unseen, but implicit in the glowing Desert Storm after action reports, were the information systems – “networks of computers and communications that synchronized the awesome air campaign and that turned dumb bombs into sure-kill weapons.” This set the stage for the DOD’s focus on the power of information and further exploration on the role computers could play in this sphere.

The growing emphasis on computing power and information as a force multiplier dovetailed with the end of the Cold War and the collapse of the Soviet Union in late 1991. With a reduction in defense spending, the Army capitalized on the idea that information dominance could utilize the latest networks, systems, and sensors to gain information superiority while also economizing force in an era of reduced budgets and manpower. For the next several years, the DOD and Army produced doctrinal concepts ranging from Information Warfare, Command and Control Warfare, and Information Operations (IO). For the Army, this culminated in the activation of Land Information Warfare Activity (LIWA) in 1995 at Fort Belvoir, VA. LIWA had personnel engaging in elements of what we now call Offensive Cyberspace Operations (OCO) and Defensive Cyberspace Operations (DCO). The international peacekeeping operation in Bosnia integrated information operations personnel with maneuver staffs, and the success of these missions demonstrated the importance of IO. In order to maintain the permanence of such skilled IO staff, the Army created the first IO career field with Functional Area (FA) 30 in 1997.

While LIWA and the IO community played a large role in forming the concepts and framework of cyberspace within the Army, the Military Intelligence (MI) branch was instrumental in developing the actual cyberspace capabilities associated with OCO today. In the 1990s, the intelligence community began correlating computer network operations within foreign computer networks as another form of signal intelligence (SIGINT). With this mindset, the Army’s SIGINT brigade (704th MI BDE) created a small unit to focus on cyber warfare in 1995; in 1998, B Co, 742d MI BN was tasked to focus on computer network operations. This begat “Detachment Meade” in 2000 – a unit starting with about three dozen Soldiers. Detachment Meade retained a close relationship with LIWA, which by 2002, had been redesignated as 1st IO Command. Over the next decade, the Army OCO unit at Fort Meade grew and changed names often. By 2008, the Army Network Warfare Battalion had close to 200 members. It grew into the 744th MI Battalion and finally culminated in today’s 780th MI BDE (Cyber) in December 2011.

Underpinning all this cyber activity, was the vital need to maintain the security of U.S. digital property. In 1967, RAND computer scientist, Willis Ware issued a clarion call for the military to beef up security of these new networking capabilities. After becoming the Computer Security Task Force lead, Ware further warned U.S. officials in 1970 that corrupt insiders and spies could actively penetrate government computers and steal or copy classified information. In the days before computer networks were regimented into the various classifications we are familiar with today, those with prying eyes had easier access to data they had no business reading.

The Signal Corps utilized and maintained computers early on but became increasingly involved as computers became ubiquitous within the Army and essential for communications devices, whether via email or other network-centric methods. Signal’s role with network defense was emphasized after the 2002 activation of Network Enterprise Technology Command (NETCOM), where it assumed the role of Army proponent for network defense. However, complexities within the chain of command for cyber defense kept this from being a streamlined process. Army Computer Emergency Response Teams (CERTs) received mission priorities from NETCOM, but 1st IO Command operationally controlled the defenders. Additionally, Signal culture shaped the priorities of those working within cyber defense. Network defense and network maintenance are inherently different. The former identifies and seeks to defeat threat actors while the latter strives for information assurance through securely maintained networks and is less concerned with outside threats. The aforementioned culture of signaleers leans hard toward the goal of properly functioning networks. Network defense might hinder network assurance, and this mentality contributed to keeping the two spheres distinct.

While the Joint Chiefs of Staff labeled cyberspace a “domain” of military operations in the 2004 National Military Strategy, the Army continued mapping out its overall cyber strategy. A few years prior to this in 1998, the Army designated Space and Missile Defense Command/Army Strategic Command (SMDC/ARSTRAT) as the higher headquarters for cyberspace activity. A decade later, in 2008, the Secretary of Defense (SECDEF) directed the different services to establish cyber commands, and the following year, SMDC/ARSTRAT created an interim unit called Army Forces Cyber Command (ARFORCYBER). As the various Army subcommunities already conducting different aspects of the cyber mission (INSCOM, NETCOM, SMDC/ARSTRAT) jockeyed for lead of this new interim unit, SECDEF Gates announced the creation of U.S. Cyber Command (USCYBERCOM) in June 2009. Per Gates’ memo, the service branches needed to establish component commands to support USCYBERCOM by October 2010. Now the Army reoriented its focus on meeting this requirement, which resulted in the activation of Army Cyber Command (ARCYBER) as a new three-star command on October 1, 2010. The first two ARCYBER commanders held combat arms backgrounds, strongly suggesting that the Army sought leaders who could bring fresh perspectives disconnected from the tribal feuding between the intelligence and signal communities.

In the year prior to ARCYBER’s activation, the Army Training and Doctrine Command (TRADOC) Commander, Gen. Martin Dempsey, released a memo in 2009 summarizing a Combined Arms Center (CAC) led working group’s findings on how the Army should organize cyber, electronic warfare (EW), and information operations. Based on the group’s analysis, Dempsey did not recommend the creation of a new cyberspace career field, opting to retain the status quo of relying on the MI and Signal fields to perform the functions of offensive and defensive cyberspace respectively. Shortly after the activation of ARCYBER and the continued lack of a separate TRADOC governed cyberspace career field, ARCYBER assumed force modernization proponency for cyberspace.

Even after the creation of ARCYBER and its authority over Army cyberspace proponency, leaders continued to favor the model whereby cyber personnel in the Army held certain Additional Skill Identifiers (ASI) that determined their roles within the cyberspace workforce. The Signal Corps and MI communities still desired more stability within this career field and opted to create new military occupational specialties (MOS) to establish more permanency. The Signal Corps looked to their warrant officer cohort to provide the technical expertise necessary to defend the Army’s portion of cyberspace. Announced in 2010, the new 255S – Information Protection Technician would perform Information Assurance and Computer Network Defense measures, including protection, detection, and reaction functions to support information superiority. The MI Branch unveiled the enlisted MOS 35Q in the Fall of 2012. Originally called the Cryptologic Network Warfare Specialist, the title later changed to Cryptologic Cyberspace Intelligence Collector. A senior enlisted advisor to the MOS stated: “A 35Q supervises and conducts full-spectrum military cryptologic digital operations to enable actions in all domains, NIPRNet as well as SIPRNet, to ensure friendly freedom of action in cyberspace and deny adversaries the same.” The Signal Corps also established an enlisted MOS, 25D – Cyber Network Defender, starting at the rank of E-6, reasoning that “an MOS built on an experienced and seasoned Information Assurance (IA) Noncommissioned Officer workforce, highly trained in Cyber Defense, is the only way to mitigate our vulnerability.” The first 25D class graduated from the Signal School in November 2013.

During the first decade of the 21st century, the Electrical Engineering and Computer Science (EECS) Department at West Point advocated for a standalone Army cyber career field. A NSA partnership fueled cooperation and internships between the organizations, and the creation of a cadet cyber security club were just some of the initiatives moving EECS personnel towards advocacy of a new career field. Meanwhile, the EECS program continued training cadets proficient in cyberspace despite not having a branch for them to naturally land. The head of West Point’s Cyber Security Research Center, Lieutenant Colonel Gregory Conti, wrote several articles advocating and theorizing about a dedicated cyber work force within the Army. In 2010, Conti and Lt. Col. Jen Easterly contributed a piece on recruiting and retention of cyber warriors within an Army that still did not seem to understand what to do with these specialists. As a testament to the reputation of the EECS department, the Secretary of the Army in 2012 directed the establishment of a U.S. Army Cyber Center at West Point, to “serve as the Army’s premier resource for strategic insight, advice, and exceptional subject matter expertise on cyberspace-related issues.” This ultimately became the Army Cyber Institute at West Point, which officially opened in October 2014 with Col. Conti at the helm. However, before this occurred, Col. Conti and two EECS instructors, Major Todd Arnold and Major Rob Harrison, wrote a draft theorizing what an Army cyber career path might look like, specifically for officers. While they did not know whether the Army would indeed create a new branch, this detailed study covered multiple courses of action and analyzed the relationships with MI and Signal. The paper even included a proposed cyber branch insignia designed by Arnold and Harrison-with crossed lightning bolts superimposed on a dagger-which ultimately became the basis for the approved insignia.

While the West Point EECS leadership conceptualized the professionalization of a cyber career field, and the MI and Signal branches had created the aforementioned cyber related MOSs, top leadership-including Chief of Staff of the Army (CSA) General Raymond Odierno and General Robert Cone, the Commanding General of Training and Doctrine Command (TRADOC)-was coming to the conclusion over the course of 2012 and 2013 that the existing split-branch solution was inadequate.

With the approval in late 2012 of the Cyber Mission Force (CMF), it became essential that personnel had the right abilities to go through a very long and exquisite training. Normally, by the time an individual completed this training, they had well over 24 months on station, and as members of the MI or Signal branches, they were often reassigned. Besides the issue of losing skilled personnel due to the normal PCS cycle, Generals Odierno and Cone, as well as many of their subordinates, felt strongly that the cyberspace domain needed to be viewed from a maneuver perspective, which was beyond the MI and Signal Corps’ normal mission set. On 20 February 2013, during an Association of the U.S. Army (AUSA) symposium in Ft. Lauderdale, Florida, GEN Cone publicly called for the formal creation of a cyber school and career field. He stated the Army needed to, “start developing career paths for cyber warriors as we move to the future.” After GEN Cone’s remarks, the wheels were in motion to turn this new school and career field into reality.

Endnotes

Called the Semi-Automatic Ground Environment or SAGE, it consisted of hundreds of radars, 24 direction centers, and 3 combat centers spread throughout North America. For more information, see www.ll.mit.edu/about/history/sage-semi-automatic-ground-environment-air-defense-system.

Thomas Misa, “Computer Security Discourse at RAND, SDC, and NSA (1958–1970),” IEEE Annals of the History of Computing Volume: 38, no.4 (Oct.-Dec. 2016): 17, tjmisa.com/papers/2016_Misa_ComputerSecurity.

Researchers at the Advanced Research Projects Agency (now DARPA) created the ARPANET. By 1989, most were calling the network by a more ubiquitous name – “Internet.”

The Boeing Aerospace Company for the Office of the Secretary of Defense, Weapon Systems and Information War, Thomas Rona. (Seattle, WA, 1976).

Craig J. Wiener, “Penetrate, Exploit, Disrupt, Destroy: The Rise of Computer Network Operations as a Major Military Innovation” (PhD diss., George Mason University, Fairfax, VA, 2016), 81; 85.

Wiener, “Penetrate, Exploit, Disrupt, Destroy,” 93; 98; 352.

Clifford Stoll, The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage, (New York: Doubleday, 1989).

Alan D. Campen, ed., The First Information War: The Story of Communications, Computers, and Intelligence Systems in the Persian Gulf War (Fairfax, VA: AFCEA International, 1992), x-xi.

MAJ Sarah White, “The Origins and History of U.S. Army Information Doctrine,” (Thesis, U.S. Army Command and General Staff College, Fort Leavenworth, KS, 2022), Chapter 5; MAJ Sarah White, Chapter 3 Edit provided to author from: “Subcultural Influence on Military Innovation: The Development of U.S. Military Cyber Doctrine” (PhD diss., Harvard University, Cambridge, MA, 2019).

White, Chapter 3 Edit, 12-16.

Willis Ware, “Security and Privacy in Computer Systems” (Paper presentation, Spring Joint Computer Conference, Atlantic City, April 17-19, 1967).

The RAND Corporation for the Office of the Director of Defense Research and Engineering, Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security, Willis Ware. (Washington D.C., 11 February 1970).

White, Chapter 3 Edit, 27-29.

Ibid., 24-26.

Secretary of Defense Robert Gates, Memorandum: “Establishment of a Subordinate Unified U.S. Cyber Command Under U.S. Strategic Command for Military Cyberspace Operations,” 23 June 2009.

U.S. Army Cyber Command, “Our History,” www.arcyber.army.mil/About/History.

White, “Subcultural Influence,” 133.

Ibid., 134.

CW5 Todd Boudreau, “Repurposing Signal Warrant Officers,” Army Communicator 35, no. 1 (Winter 2010): 21.

David Vergun, “Army Opens New Intelligence MOS,” Army.mil, 30 November 2012, accessed 18 October 2021, www.army.mil/article/92099/Army_opens_new_intelligence_MOS.

Craig Zimmerman, “SUBJECT: Recommended Change to DA Pam 611-21, Military Occupational Classification and Structure, to Add Military Occupational Specialty (MOS) — Cyber Network Defender,” (Signal Center of Excellence and Fort Gordon, 30 May 2012).

Wilson Rivera, “Cyberspace warriors graduate with Army’s newest military occupational specialty,” Army.mil, 13 December 2013. Accessed 20 March 2025, www.army.mil/article/116564/Cyberspace_warriors_graduate_with_Army_s_newest_military_occupational_specialty.

White, “Subcultural,” 157-160.

Lt. Col. Gregory Conti and Lt. Col. Jen Easterly, “Recruiting, Development, and Retention of Cyber Warriors Despite an Inhospitable Culture.” Small Wars Journal, 29 July 2010, smallwarsjournal.com/jrnl/art/recruitingdevelopment-and-retention-of-cyber-warriors-despite-an-inhospitable-culture. Jen Easterly went on to become the Director of the Cybersecurity and Infrastructure Security Agency (CISA) from 2021-2025.

John M. McHugh, Memorandum, “Establishment of the Army Cyber Center at West Point,” 19 October 2012.

Sgt 1st Class Jeremy Bunkley, “SecArmy officially opens Cyber Institute at West Point, Army.mil, 10 October 2014, www.army.mil/article/135961/secarmy_officially_opens_cyber_ins.

Todd Arnold, Rob Harrison, and Gregory Conti, “Professionalizing the Army’s Cyber Officer Force,” Army Cyber Center, Vol 1337 No II (23 November 2013); Email between LTC Todd Arnold and Scott Anderson, 7 November 2018.

White, Chapter 3 Edit, 36-37.

Mr. Todd Boudreau Oral History Interview with Scott Anderson, 22 February 2021.

Unknown Author, “Army leaders see much cyber work to do,” Taktik(z), 24 Feb 2013.

By Scott Anderson – Cyber Corps Branch Historian

Thompson’s Rifle Battalion: The Original Unit of the Army of the United Colonies (Now the United States Regular Army)

Saturday, June 14th, 2025

Although 1775 is indisputably the birth year of the US Army, two events occurred on June 14 of that year to which the Army can credit its birthday. One is the adoption by the Continental Congress of the collective militia forces from several colonies outside Boston to form a Continental Army, of which Congress appointed George Washington the commander in chief on June 15, 1775. In addition, the US Regular Army officially dates its beginning to June 14, 1775, when the Second Continental Congress directed 10 companies of expert riflemen to be raised immediately in Pennsylvania, Maryland, and Virginia.

William Thompson’s commission as the colonel of the Pennsylvania Rifle Battalion was dated June 25, 1775, and made him the first colonel of what would eventually become, through George Washington’s Continental Army, the US Regular Army. But William Thompson has not found a prominent place in the American pantheon of revolutionary heroes for a variety of reasons. In addition, Thompson’s Pennsylvania Rifle Battalion later became the 1st Continental Regiment and ended the American Revolution as the 1st Pennsylvania Regiment, but its lineage has not continued in the modern US Army.

The Army War College Press presents this monograph focusing on this unit pivotal in the creation of the United States Army.

Written by John A. Bonin

Download your copy here.

Army Launches Detachment 201: Executive Innovation Corps to Drive Tech Transformation

Saturday, June 14th, 2025

New Executive Innovation Corps brings top tech talent into the Army Reserve to bridge the commercial-military tech gap, with four tech leaders set to join as officers.

WASHINGTON — The U.S. Army is establishing Detachment 201: The Army’s Executive Innovation Corps, a new initiative designed to fuse cutting-edge tech expertise with military innovation. On June 13, 2025, the Army will officially swear in four tech leaders.

Det. 201 is an effort to recruit senior tech executives to serve part-time in the Army Reserve as senior advisors. In this role they will work on targeted projects to help guide rapid and scalable tech solutions to complex problems. By bringing private-sector know-how into uniform, Det. 201 is supercharging efforts like the Army Transformation Initiative, which aims to make the force leaner, smarter, and more lethal.

The four new Army Reserve Lt. Cols. are Shyam Sankar, Chief Technology Officer for Palantir; Andrew Bosworth, Chief Technology Officer of Meta; Kevin Weil, Chief Product Officer of OpenAI; and Bob McGrew, advisor at Thinking Machines Lab and former Chief Research Officer for OpenAI.

Their swearing-in is just the start of a bigger mission to inspire more tech pros to serve without leaving their careers, showing the next generation how to make a difference in uniform.