G24 Mount from Wilcox Ind

Archive for the ‘Army’ Category

MyDefence Receives Landmark $26 Million C-UAS Order from U.S. Army

Wednesday, July 16th, 2025

July 3rd 2025 – MyDefence, a global provider of Counter-Unmanned Aerial Systems (C-UAS) solutions, today announced it has received a landmark contract from the U.S. Army valued at $26 million. This is the largest order in MyDefence’s history. The agreement underscores the Army’s continued focus on strengthening its defense capabilities against unmanned aerial threats.

Under the contract, MyDefence will supply its advanced C-UAS technologies designed to detect and track a broad spectrum of drone threats. These systems will be deployed across U.S. Army operations to enhance force protection and tactical readiness.

“This historic contract represents a defining moment for MyDefence and a strong endorsement of our position in the global C-UAS industry.

We are honored to have been selected by the U.S. Army as supplier for C-UAS procurement – an endorsement of the trust placed in our team, our mission,and our ability to deliver battle-proven technology at scale. This commitment from the U.S. Army further strengthens our dedication to the U.S. market, and we are accelerating our investments and expanding job creation across multiple roles in response”

Dan Hermansen, CEO, MyDefence Group

William Ostrowski, recently appointed President and CEO of MyDefence North America LLC, added:

“This agreement marks a strategic milestone for our North American operations. We are committed to long-term collaboration with U.S. defense stakeholders and to delivering high-performance systems that adapt to the complex and fast-evolving threat landscape. The growing use of unmanned aerial systems presents a persistent threat across operational environments. Following extensive testing and evaluation, MyDefence’s systems proved reliable, adaptable, and mission-ready. These capabilities will enhance force protection and enable our units to operate with greater confidence in contested airspace.”

William Ostrowski, CEO, MyDefence North America LLC

MyDefence specializes in modular, scalable C-UAS solutions engineered for complex radio-frequency environments. Its technologies are fielded globally by armed forces and security agencies, enabling proactive defense against unmanned systems across diverse mission sets.

Editor’s Note: The US Army has purchased 485 Soldier-Kits, consisting of “Wingman” drone detector for real time scanning and “Pitbull” jammers from MyDefence. Of those, 15 have undergone evaluation during last month’s Project Fly Trap in Germany, along with other Counter-UAS systems.

US Army Begins Fielding Improved Ghillie System

Wednesday, July 16th, 2025

The Improved Ghillie System is hitting the field!

Supply Soldiers from the 1st Special Forces Group (Airborne) got a first look at this next-gen base layer-modular system during a recent fielding at Joint Base Lewis-McChord.

Led by Blaise Liess from Tactical Soldier Mobility under PdM SCIE, the team partnered with Salute Uniforms to innovate design and textiles, boosting mobility and concealment for snipers and recon teams while cutting production costs.

The result? An advanced and more accessible concealment system for the Soldiers who need it most!

– Via PEO Soldier

US Army Electromagnetic Warfare Capabilities Update

Monday, July 14th, 2025

Aberdeen Proving Ground, Md. – The U.S. Army is addressing a critical need for enhanced electromagnetic warfare (EW) capabilities with a new strategy and refined modernization approach. Recognizing a gap in extended-range, persistent ground and airborne EW assets, the Army is shifting its focus to improve targeting and provide commanders with the ability to effectively manipulate the electromagnetic spectrum in support of maneuver formations.

In March 2025, the Army published a comprehensive EW Strategy, designed to institutionalize enduring EW capabilities across the Army to support Joint Force operations. In conjunction with this strategy, the Army is refining its approach to the Terrestrial Layer System (TLS) for Brigade Combat Teams (BCT) and the Multifunction Electronic Warfare – Air Large (MFEW-AL) programs.

The recently concluded TLS BCT Rapid Prototyping program provided valuable insights into lightweight, modular architectures, informing the transition to the TLS Manpack as the primary EW/SIGINT system for all BCTs, with full fielding expected by FY28. Additionally, the Army plans to enhance TLS Manpack’s capabilities with vehicle agnostic modular adaptor kits (MAK) for mounted options that provide enhanced processing, extended range, and increased power. TLS Manpack will have the ability to provide EW capabilities at the brigade level, alongside distributed EW capabilities for division and higher echelons.

The MFEW-AL program will now prioritize leveraging Commercial-Off-The-Shelf (COTS) and Government-Off-The-Shelf (GOTS) solutions to rapidly deliver incremental capabilities for testing and feedback with Transformation in Contact (TiC) units in early Fiscal Year 2026. The program will utilize an incremental approach for delivery of capability that will evolve over time toward the full Army’s Airborne Electromagnetic Attack requirements.

These updates will be key in meeting recent direction from the Secretary of Defense that the Army remains the most lethal and ready land force in the world and achieve electromagnetic dominance by 2027.

Protected Logistics Truck: Rheinmetall MAN Military Vehicles Presents New TGS-Mil Protected

Sunday, July 13th, 2025

At the RMMV Mobility Days, which were held for the first time this year, Rheinmetall MAN Military Vehicles (RMMV) presented its new TGS-Mil Protected armoured truck. The TGS-Mil Protected is based on the TG-generation of military trucks produced by RMMV in Vienna. The TGS-Mil Protected model on display is equipped with a protected cabin for two persons. The solution developed by Rheinmetall complies with current NATO standards and is available in 6×6 and 8×8 variants.

Thanks to its modular design philosophy, the vehicle can be adapted to a wide range of mission profiles, including protection levels, communication systems, and specialised payload options.

With the TGS-Mil Protected, RMMV is specifically targeting a broad and growing segment of the international market that demands protected logistical mobility combined with long-term cost efficiency. The development of this vehicle highlights RMMV’s commitment to continuously adapt its militarized truck portfolio to evolving mission requirements and geopolitical developments. With the TGS-Mil Protected, RMMV can now offer both protected and unprotected variants within the same modular system, providing flexibility, fleet harmonisation and reduced life-cycle costs for new and already existing customers alike.

The TGS-Mil Protected is powered by a MAN D2676 six-cylinder diesel engine with up to 382 kW/520 hp and up to 2,650 Nm of torque. The engine complies with Euro II, V and VIe-standards and is compatible with NATO fuel F34. The drive and chassis systems are based on proven components from the civilian sector, which simplifies maintenance and worldwide service. The all-wheel drive ensures excellent off-road capabilities.

The RMMV Mobility Days 2025 were held under the motto ‘Innovation in Motion’. Around 120 participants from 22 countries gathered in Vienna for the event. They received information about RMMV’s current products and activities. The programme included a factory tour at the long-standing production facility in Vienna-Liesing which has recently been upgraded with a state-of the-art logistics system and digitised manufacturing processes. In future, around 4,000 HX and TG vehicles can be produced here each year to meet growing global demand. RMMV also demonstrated the versatility and off-road capabilities of its vehicle families (HX and TG) on an off-road site near Vienna. In addition, future technologies such as tele-operated driving and autonomous mobility were also part of the presentation.

Rheinmetall MAN Military Vehicles (RMMV) is the competence centre for professional military and militarised logistics trucks within the Rheinmetall Vehicle Systems Division. The joint venture, headquartered in Munich, is one of the world’s leading providers of defence solutions in the field of land mobility logistics, in which Rheinmetall AG holds a 51 per cent majority stake and MAN Truck & Bus SE holds the remaining 49 per cent. Together with its predecessor companies, RMMV can look back on more than 100 years of experience in truck manufacturing for the most demanding military applications.

First Army, Army Reserve and National Guard Team Up in Counter-Unmanned Aircraft Systems Fight

Saturday, July 12th, 2025

FORT BLISS, Texas — First Army has assumed a crucial role in countering the threat posed by unmanned aircraft systems. It is working with Army Reserve and Army National Guard units to ensure that Component 2 and 3 Soldiers have the tools and skills to win on an emerging battlefield.

Being able to neutralize these threats is an obligation First Army takes seriously, said Col. Douglas Serie, 5th Armored Brigade commander.

“As the Army’s Counter-Unmanned Aircraft System Center of Excellence, we’re the tip of the spear when it comes to developing, validating and delivering the most up-to-date effective training available,” he said. “We’re shaping doctrine, informing procurement and ensuring that the force is equipped not just with the right gear, but the right mindset and tactics to counter drone threats.”

Doing this successfully means working closely and regularly with partnered units, added Maj. Jason Sierakowski, 2-289 Field Artillery executive officer: “We train the First Army OCs in the brigade and then we train the partnered organizations in Compos 2 and 3.”

Sierakowski has seen the mission grow and adapt over the years.

“In 2019, we mobilized the first battery for counter-UAS for compo 2,” he recalled, “2020 was when we mobilized the first unit, where we didn’t have any METS at all.”

That has changed substantially, and as the mission has grown more complex and crucial.

“The biggest thing is coming up with a solid uniform training strategy,” Sierakowksi said. “There are always new things coming out, new tools and techniques, so this just gets added onto it. The biggest success has been the evolution of the training timeline.”

Of note, many of the Soldiers being trained are going beyond their normal areas of expertise.

“The learning curve is very unique because these are troops that can be any MOS,” Sierakowksi said. “They can be anything from a mechanic to a Military Police to anything that you can imagine, and now we tell them, ‘You’re not going to do that role, you’re going to do counter-UAS and you’re going to work in a base defense operations center.’ So they start from the beginning and the learning curve is very steep.”

But they adapt and carry on with the mission, he added: “As we get into repetitions, they become a subject matter expert very quickly, especially when they go forward and deploy on these systems, and that just inherently makes them better.”

Meanwhile, First Army continually adapts and refines its C-UAS role and mission.

“First Army … has become extremely evolutionary and revolutionary within the past two to three years,” Sierakowski said. “Division East has been developing and acquiring different UAS, even 3D printing. The support from the top has been nothing but positive and how can we support the OC/T at the battalion level.”

This success is important on the battlefield, because as Serie noted, the drone threat continues to grow.

“It’s no longer theoretical. It’s real, it’s persistent, and it’s evolving rapidly,” he said. “There are adversaries that are using not only commercial but military grade UAVs to gather intelligence, disrupt our operations, and even deliver kinetic effects. Counter-UAS training is critical to staying ahead of that threat.”

That’s where the continual work and refinement with Reserve Component units pays off.

“It’s a team effort. Our partners are preparing, even before they come to Fort Bliss in a post-mobilization…on how they are going to set up their teams and task-organize their formations so when they get to the center of excellence for counter-UAS, we can go right into training,” Serie said. “We replicate real-world drone threats so our Soldiers face the same challenges in training that they’ll encounter on the battlefield. It’s not just about knowing how to push buttons. It’s about understanding the threat landscape, ROE considerations, and how to integrate C-UAS into a layered defense strategy.”

One reason the threat continually adapts and evolves is because drones are readily available and can be used in a variety of ways.

“These are things being bought off Amazon and used,” Serie said. “You can use it in an observation mode, you can use it in intelligence gathering, you can use it to disrupt operations just by flying it over, because how are you supposed to know what is on that drone? And it can be used to deliver kinetic effects.”

As such, Serie said that the center of excellence does more than react to drones, it trains “to deter, deny and defeat them before they can impact a mission. The UAS threat changes monthly, sometimes even faster. That means our training has to evolve constantly. We’re constantly refining our curriculum based on threat trends, feedback from the field, and lessons learned from combat theaters. Being a center of excellence doesn’t mean we have all the answers. It means we’re constantly asking the right questions and staying agile in our approach to training counter-UAS operations and in getting Soldiers the repetitions to build confidence to go forward.”

The stakes are enormous, Serie added: “This is the future of warfare and if we don’t figure it out know and get it right, Soldiers are going to get hurt.”

As such, the precision approach and attention to detail are paying big dividends. “We’ve trained thousands of warfighters, from infantry squads to brigade staffs, on how to detect, track, and neutralize UAS threats,” Serie said. “Units that come through our pipeline deploy with confidence and a proven playbook for dealing with UAS.”

By Warren W. Marlow

Cole Engineering Awarded $62M U.S. Army Production Contract for Next-Generation Stinger Training System

Friday, July 11th, 2025

CESI is closing the gap in live force-on-force training with innovative Live Training solutions.

ORLANDO, Fla.–Cole Engineering Services, Inc. (CESI), a By Light Company, has been awarded a $62 million production contract by the U.S. Army’s Program Executive Office for Simulation, Training, and Instrumentation (PEO STRI) to deliver more than 100 Stinger Training Systems (STS) over the next five years.

This award follows a successful prototyping effort and represents a major step forward in the Army’s modernization under the Synthetic Training Environment (STE). STS is a critical component of the STE’s Live Training Systems (STE-LTS) Increment 1, designed to close live force-on-force training gaps and deliver scalable multi-domain realism.

The STS is part of the CESI Family of Live Training Products, which includes both direct and indirect fire weapons training solutions. Together, these capabilities deliver software-defined, high-fidelity training experiences across a range of operational scenarios, engineered for total situational dominance.

“At the core of our STS solution is CESI’s commercial artificial intelligence and computer vision application that revolutionizes optical tracking and engagement fidelity,” said Thomas Fransson, Senior Vice President, Simulation Products & Services at CESI. “CESI brings battlefield precision to the training range, enabling warfighters to train with greater realism, agility, and trust in their systems.”

The STS replicates guided munition effects and integrates seamlessly with current Tactical Engagement Simulation Systems (TESS) and STE instrumentation. These ruggedized, interoperable systems will be fielded across Brigade Combat Teams and Combat Training Centers, enhancing readiness through next-generation realism and reliability.

This production award includes system delivery, lifecycle support, and planned integration with future STE-LTS capabilities, reinforcing CESI’s commitment to delivering the tip of the spear for modern Air Defense Artillery (ADA) training through AI-enhanced optical targeting.

To support STS and other strategic Artificial Intelligence (AI) initiatives, By Light has officially launched AI Lab, an innovation hub designed to accelerate the development, testing, and deployment of AI-enabled solutions across defense, cybersecurity, and enterprise domains.

Army Researchers Turn Battlefield Data into Decision Dominance Tool for NGC2

Friday, July 11th, 2025

FORT BELVOIR, Va. (July 8, 2025) — Soldiers must quickly decipher an increasingly large amount of real-time battlefield data as they build and execute their mission plans. To enable better and faster battlefield decisions, U.S. Army researchers are developing a set of applications to analyze battlefield data to provide decision dominance and greater lethality.

These new applications, known collectively as Project Odin, monitor live data feeds, unit locations, sensor coverage, fuel, maintenance and ammunition status, weather, terrain, and more. They synthesize all this real-time information to understand and predict adversary actions, and enable commanders and staff to outpace their adversaries’ maneuvers and decisions.

The Army’s Command, Control, Communications, Computers, Cyber, Intelligence, Surveillance and Reconnaissance (C5ISR) Center leverages advances in artificial intelligence and real-time sensor data processing, according to Odin’s Project Lead Ben Rosen. C5ISR Center received feedback in July 2022 — the Army needed a Commanders decision tool to enable warfighting concepts and facilitate synchronization, lethality and flexibility.

“We developed a proof of concept within a year and immediately began an aggressive experimentation campaign to inform our development cycles from then on out. Being focused on capability gaps, the plan was to insert ourselves and live directly in the problem space,” Rosen said. “The burden on staffs to process all this battlefield data can slow down decisions. Project Odin speeds up the process to a fraction of the time.

“The program ingests battlefield information, analyzes it, and provides knowledge for Commanders to apply judgment, then decide and act faster than the adversary.”

Senior Army leaders are recognizing the benefits of emerging AI tech in expanding the possibilities of next-generation battlefield command and control tools. Gen. James Rainey, Army Futures Command commanding general, said during an AI summit last year: “The real potential for military application of artificial intelligence is to empower our commanders — the men and women who lead our formations. And how do we bring the power of AI to bear to let them do three things: make more decisions, make better decisions and make faster decisions?”

For the Army to accelerate Project Odin’s transition from R&D to a capability ready for Soldiers, C5ISR Center subject-matter experts are working directly with multiple units during experimentation events, such as Project Convergence and Transformation in Contact rotations.

“The Center’s S&T expertise is essential to delivering these tools to units. We combine technical experience, ability to interact with Soldiers in the field, partner with other Army R&D organizations, and quickly incorporate operational feedback for further improvements,” Rosen said.

Teaming the S&T community with units for persistent experimentation has been successful, as the Secretary of the Army wrote in the Army’s Posture Statement to Congress in May: “Feedback from TiC participants validated that our formations can evolve quickly when we pair the skill of developers with the warfighting ingenuity of soldiers. By adjusting how they organized and employed equipment, TiC units were able to more effectively see the battlespace, strike, and maneuver against opponent forces in training.”

Project Odin capabilities are hosted as applications on mission-command platforms such as the Android Tactical Assault Kit, commonly known as ATAK. By leveraging existing infrastructure and the Next Generation Command and Control data layer, the need for standalone single-use software across the force is eliminated.

“Odin is helping inform the Operational Modeling Tool annex to NGC2,” Rosen said. “We’re rapidly developing and experimenting to with NGC2 in mind, asking ourselves how we can leverage the NGC2 data layer to better understand the battlespace with a set of applications and services that work in concert with the overall NGC2 ecosystem.”

C5ISR Center has partnered with Army Research Laboratory and Army Corps of Engineers to take advantage of their areas of expertise in artificial intelligence, terrain data and digital modeling. The Army team has transitioned the capabilities from a concept to a fielded system in the hands of units in two years.

Experimentation with active-duty units continues to inform the program’s concepts and identify gaps.

“Project Odin quickens tactical decision cycles by removing the cognitive burden of monitoring highly synchronized plans and increasingly complex battlefields,” said Maj. Aaron Phillips, who used Odin during a recent Joint Readiness Training Center rotation. “This allows Commanders and their staffs to focus on selecting their next action, rather than tracking their current and past actions.”

Odin’s individual software components are at different levels of technical maturity, according to Steve Webster, the project’s technical lead at C5ISR Center. Some features are ready for Soldiers to use today during experimentation events like Project Convergence or Transformation in Contact rotations.

“We also have more advanced software under development earlier in the technology readiness pipeline that needs more development but is actively being informed by the experimentation we’re doing with the more mature services,” Webster said. “All of these efforts help us both in delivering capability and informing the needs for NGC2’s Operational Modeling Tools.”

One such capability in the R&D phase is Course of Action Generation, which continuously compares planned actions to real-time data — such as environmental conditions, available combat power and enemy position — to create new recommendations that guide staff to the best decisions. These Course of Action generation tools analyze information much faster than is possible for humans.

“Project Odin delivers on the Army’s need for a more data-centric command and control platform during a time of rapid technology advancements. Smarter, faster decision-making delivers lethality for Soldiers,” Webster said.

By Dan Lafontaine, C5ISR Center Public Affairs

Like Moths to a False Flame: Lethality and Protection Through Deception Operations

Thursday, July 10th, 2025

The ongoing war in Ukraine has dem­onstrated the deadly efficiency of modern battlefield targeting. Rapid sensor-to-shooter integration, enabled by signals intelligence (SIGINT), geo­spatial intelligence (GEOINT), and un­manned aerial systems (UAS) recon­naissance, has shortened kill chains to the point where detection often leads to immediate engagement. High-value assets, identified through electronic emissions or ground-based reconnais­sance, face a severe risk of engage­ment and destruction. The prevalence of SIGINT collection, integration of UAS, and massed indirect fires in the doctrines of American adversaries rep­resents a complex problem that can be mitigated by the use of tactical decep­tion.1

Russia and China both employ multi-layered information collection and rap­id sensor-to-shooter systems. Com­mand and Control (C2) nodes are an example of High-Value-Targets (HVT) targeted by adversary doctrines and are a convenient example for exploring the use of, and opportunities created by, deception. Adversary doctrine de­scribes the following kill chain for en­gaging C2 nodes: mobile SIGINT collec­tors locate command nodes, UAS con­firm the target location, and artillery at echelon execute massed fires strikes before blue force commanders can re­act. The threat to U.S. forces this sys­tem represents is not theoretical, it un­folds daily on the battlefields of Ukraine and represents the conditions under which American forces are ex­pected to fight and win. These doc­trines are replicated every rotation at the National Training Center (NTC), where the Troopers of the 11th Ar­mored Cavalry Regiment (Blackhorse) serve as the professional opposing force (OPFOR). Blackhorse provides units with a critical opportunity to train against the techniques America’s adversaries use daily. Unexercised so­lutions already exist within Army for­mations to mitigate the effects of the modern battlefield’s shortened kill chains. By understanding adversary collection techniques, reducing signa­ture, and presenting deception signa­tures, battalions can disrupt enemy targeting cycles and create opportuni­ties for lethal response.

Figure 1. NESTS in the vicinity of Strawberry Fields oriented towards Dazashah collecting on rotational brigade MCP and enabler signatures in the Pass Complex targeting Joint Battle Command-Platform (Photo by 11th ACR Regimental S2)

Threat Collection Doctrine

Russia and China prioritize rapid target acquisition, integrated information col­lection, and fire control automation as core tenets of their military doctrine. The 7-100 series doctrinal manuals lay out their shared approach to large-scale combat operations (LSCO), detail­ing the reliance on multi-layered information collection systems that feed directly into massed indirect fires, shortening the time between detection and engagement. SIGINT plays a criti­cal role in this process, by geolocating friendly forces C2 nodes and tracking emissions from communications and mission command information sys­tems. GEOINT, collected by UAS, sup­plements SIGINT data by confirming target locations and conducting battle damage assessment (BDA) to refine follow-on strikes. This integrated tar­geting process ensures that friendly forces are rapidly engaged before they can reposition, react, or conceal them­selves.

For U.S. forces, the threat posed by this level of collection and targeting cannot be overstated because of our reliance on digital mission command systems. The ability of adversaries to rapidly detect and engage formations means that any electronic emissions or movement bears significant risk of compromise and targeting. Without ef­fective mitigation measures, units risk being outpaced in the decision-making cycle, allowing the enemy to dictate the tempo of battle. Blackhorse repli­cates these conditions at NTC, ensur­ing that rotational training units (RTUs) experience the same information-driv­en targeting process they will face in combat. By understanding how adver­saries collect and process information, U.S. forces can better prepare to dis­rupt, degrade, deny enemy kill chains.

Threat Replication

Blackhorse executes information col­lection operations by integrating SI­GINT, UAS, and ground-based recon­naissance to target friendly command and control C2 nodes, thereby disrupt­ing decision-making processes. Their layered sensor network operates in a sequence designed to detect, validate, and engage targets in real time. The Networked Electronic Support Threat Sensors (NESTS) system collects SIGINT, identifying emissions from satellite-based communications, while the Ver­satile Radio Observation and Direction (VROD) system intercepts frequency modulated (FM) transmissions to lo­cate and classify targets. Identification of likely targets by SIGINT cues UAS to confirm targeting data and refine col­lection. Due to limited time on station, UAS only remain on their assigned named areas of interest (NAIs) long enough to confirm targeting data be­fore moving on to identify additional targets in support of the maneuver fight. Small UAS (sUAS) may conduct BDA later if required.

Figure 2. FM NEST Emission Assessment for 2/11 TOC (Photo by 11th ACR Regimental S2)

Once validated, the Blackhorse Regi­mental Targeting Intelligence Cell (RTIC) processes the refined target data and passes it to fires elements for strike execution. This sensor-to-shoot­er process mirrors adversary work­flows, where electronic detection leads to physical compromise and rapid en­gagement. The effectiveness of this process underscores the necessity for signature management, deception, and counter-fire strategies to disrupt enemy kill chains.

Defeat through Deception

Deception is a fundamental aspect of modern warfare but is typically rele­gated to a survivability operation. Suc­cessful battlefield deception forces ad­versaries to misallocate resources, de­lay decision-making, and strike false targets. FM 3-90 defines deception as actions executed to deliberately mislead adversary decision-makers about friendly military capabilities, in­tentions, and operations.2

Adversary intelligence, surveillance, and reconnaissance (ISR) networks rely on rapid detection, classification, and engagement. By integrating deception, friendly forces can manipulate enemy perception, disrupt targeting cycles, and increase survivability.3&4

Deception operates across all domains and targets two specific dimension: physical and technical. Together these dimensions influence the cognitive, or human, dimension of decision making. Physical deception uses false positions and decoys to mislead enemy analysts into assessing a decoy as a legitimate target. Technical deception manipu­lates the electromagnetic spectrum (EMS) by emitting signals that mimic actual targets, causing adversary col­lectors to misinterpret the data. C2 nodes have both a physical and techni­cal signature, making them a useful ex­ample for exploring the requirements of a deception story.5

Units generate deception stories by creating signatures inside the collected spectrums, that force adversary ana­lysts to make false assessments. In the electronic spectrum, the deception node must emit signatures that mimic a C2 node. This requires units to allo­cate FM and Joint Battle Command-Platform (JBCP) capability to the de­ception node as both systems are pres­ent in MCPs. JBCPs constantly update their location data to the network, cre­ating a continuous low-power emis­sion. JBCP emissions are commonly as­sumed to be too weak to be detected, this is a false assumption. In addition to being detectable, the static nature of C2 nodes allows enemy analysts to accurately classify their emissions as a C2 node and initiate a queuing cycle and kill chain.

Reinforcing the deception story re­quires physically constructing the de­ception node to present a believable target. After SIGINT assets identify a likely MCP, adversary doctrine calls for UAS or ground reconnaissance to validate the target. Blackhorse repli­cates this effect with a dedicated MQ-1C Gray Eagle during NTC rotations. When UAS collection begins, the de­ception node must match the physical signature of an actual MCP. To achieve this, units must equip the deception node with wheeled vehicles, tentage, antennas, and other identifiable MCP-associated equipment.

Battalions can improve deception ef­fectiveness by creating deception kits from non-functional or excess equip­ment components. Broken antennas simulate active communication archi­tecture, while trailers transporting generator mockups and fuel cans rep­licate life support systems. Worn-out power cables present the image of power distribution to tents, reinforcing the illusion of an operational command node. Because high quality thermal sensors are widely available common commercial markets, the deception node should also mimic the thermal signature of an operational command node. Crews can simulate a generator’s thermal signature by piping exhaust from the towing vehicle into the decoy, allowing it to escape through a repli­cated exhaust port. Properly routing exhaust tubing and covering both the vehicle and the fake generator with camouflage netting obscures the de­ception and breaks up its physical sig­nature, making identification of the de­ception story as a deception less likely. Damaged shelters staged as command post structures further reinforce the deception story without risking mis­sion-essential assets. Integrating these elements allows units to construct de­ception nodes capable of withstanding both SIGINT and GEOINT validation.

To reduce risk, all personnel should withdraw from the deception node once it establishes. A technique to im­prove the deception teams survivabil­ity is to locate them in offset security positions, several hundred meters away, minimizing exposure while main­taining operational control of the node. Using wired connections to FM radios enables deception teams to transmit from secure positions, in­creasing the deception node’s electro­magnetic (EM) signature while keeping personnel protected. This method strengthens deception by making the site appear active while preserving force survivability. Another technique to strengthen technical deception is to equip the deception node with a CX-13298 Retrans Cable, commonly known as a “dog bone”. This cable al­lows the deception node to act as a re­trans site, mimicking the radio traffic of the actual C2 node while simultane­ously allowing the C2 node to broad­cast lower power transmissions, reduc­ing the likelihood of electronic detec­tion.

The final step in any deception opera­tion is concealing the actual asset. While the deception nodes attract en­emy collection by design, the real MCP must obscure or eliminate the signa­tures that would expose its location. This requires reversing the techniques used to make the deception node ap­pear authentic and ensuring the pro­tected asset remains undetected.

Figure 3. JBC-P NEST Emission Assessment for Troop CP and 2/11 TOC (Photo by 11th ACR Regimental S2)

Minimizing electromagnetic emissions is the first priority. JBCP should oper­ate on communications windows, es­tablish offset from the MCP, or estab­lish behind terrain that completely masks horizontal emissions. FM radios should connect by hardline to an offset antenna farm, preventing immediate correlation between transmissions and the MCP’s physical location. ATP 6-02.53, “Techniques for Tactical Ra­dio Operations,” details how antennas can offset more than two miles using ASIP remote operations via hardline connection, reducing the MCP’s expo­sure to SIGINT collection.6 When using a retrans setup on the deception node, the C2 node can locate in terrain that masks FM communication forward but allows broadcasts to hit the retrans system. These techniques not only im­prove concealment but also reinforce the deception story by generating EM emissions at the decoy location.

Beyond SIGINT mitigation, the physical composition of the MCP should be structured to blend into the operation­al environment while still meeting op­erational requirements. Use of vehi­cles and equipment incongruent with an MCP, reducing the size of the node, and collapsing assets during periods of UAS reconnaissance all contribute to the deception story by representing the C2 node as a different asset.

Reports of contact with UAS should trigger protection battle drills, includ­ing breaking down easily identifiable equipment, applying additional cam­ouflage, or even jumping the command post to prevent the presentation of an easy target. Once the ISR threat is neu­tralized or off-station, units can restore digital communications as needed.

Leveraging Lethality from Deception

A well-integrated deception plan must align with counter-reconnaissance, fires, and intelligence planning, antici­pating how and when enemy collection assets will react, and how to actively counter their efforts. This concept is rooted in reflexive control, a strategy developed by the Soviet Union in the 1960s and 1970s. Reflexive control seeks to manipulate an adversary’s de­cision-making process by shaping their perception, leading them to take ac­tions that are predictable and favor­able to the initiator. In this context, de­ception forces the enemy into a pre­dictable reaction, which friendly forces can prepare to exploit.

Given the passive nature of SIGINT col­lection, the first engagement window occurs when enemy UAS attempts to validate the deception target. To coun­ter this, units should establish anti-air ambushes near MCPs and deception nodes, positioning short-range air de­fense (SHORAD) or mobile air defense teams in ISR flight corridors. This al­lows friendly forces to engage enemy ISR platforms before they collect ac­tionable intelligence, denying the en­emy the ability to confirm or refine tar­gets.

If the enemy cannot validate the target with UAS, they may deploy ground re­connaissance teams to confirm or deny its presence. By identifying and secur­ing ground infiltration routes, units deny the enemy access to the decep­tion node, reinforcing the perception that a high-value target is present while creating opportunities to trap and destroy enemy reconnaissance el­ements before they can collect.

If deception is successful, the enemy will likely commit fires assets against the deception node without validation, encouraged in their belief that these protective efforts are aligned against a real asset. The final engagement op­portunity, where counter-fire radar, ground moving target indicator (GMTI) radar, and national level collection can detect and track enemy fires assets that have unmasked for a valueless en­gagement. Friendly forces can track and destroy these targets, preventing their use against friendly forces and creating hesitation to unmask assets for future strikes.

By integrating deception with air de­fense, counter-reconnaissance, and counter-fire operations, units can force the enemy into predictable, exploit­able mistakes while preserving their own combat power. Deception is not passive. It is a deliberate operation that includes all warfighting functions and sets conditions for the enemy to fail.7

Conclusion

By understanding adversary collection techniques, reducing the signature of high-value targets, and leveraging de­ception to shape enemy behavior, units can force adversaries to misallocate ISR and fires assets, disrupting their kill chain and protecting friendly forces. Current conflicts are occurring in high­ly contested ISR environments, where failure to integrate deception will re­sult in rapid targeting and engage­ment.

Deception is not just a defensive tool, it shapes the battlefield by forcing ad­versaries to react to false information, creating opportunities to disrupt their targeting cycles and degrade their ef­fectiveness. A well-integrated decep­tion plan must synchronize with recon­naissance, fires, and intelligence plan­ning to maximize survivability and cre­ate conditions for decisive action. Suc­cess in deception is not based on what friendly forces do, but by what the en­emy demonstrates they believe, mea­sured by the actions they take. When applied effectively, deception forces adversaries to waste resources, com­mit to false targets, and fight based on a reality that no longer ever existed.

By CPT Paul Dolan

Paul T. Dolan, a Captain in the Army, is currently assigned as a Battalion Intel­ligence Trainer with Panther Team at the National Training Center in Fort Ir­win, California. Prior to this, he served as a Squadron Intelligence Trainer with Cobra Team, also at the National Train­ing Center. Previous assignments in­clude Battalion Intelligence Officer for 2-8 Cavalry, 1st Cavalry Division; Cur­rent Operations Intelligence Officer for Task Force South East in Paktia Prov­ince, Afghanistan; and Platoon Leader for Bravo Troop, 1-40 Cavalry, 4th Bri­gade Combat Team, 25th Infantry Divi­sion. His military schooling includes the Armor Basic Officer Leader Course at Fort Benning, Georgia; Stryker Leader Course at Fort Benning, Georgia; Mili­tary Intelligence Captains Career Course at Fort Huachuca, Arizona; and the Army Space Basic Cadre Course at Peterson Space Force Base, Colorado. Dolan holds a Bachelor of Arts in Stud­ies in War and Peace from Norwich University and is currently pursuing a Master of Science in Unmanned and Autonomous Systems from Embry Rid­dle Aeronautical University.

Notes

1 ATP 7-100.1, “Russian Tactics”, 2024

2FM 3-90, “Tactics”, 2019

3ATP 7-100.1, “Russian Tactics”, 2024

4 ATP 7-100.2, “North Korean Tactics”, 2024

5 FM 3-90, “Tactics”, 2019

6 ATP 6-02.53, “Techniques for Tactical Ra­dio Operations”, 2019

7 FM 3-90, “Tactics”, 2019