G24 Mount from Wilcox Ind

Archive for the ‘Army’ Category

Like Moths to a False Flame: Lethality and Protection Through Deception Operations

Thursday, July 10th, 2025

The ongoing war in Ukraine has dem­onstrated the deadly efficiency of modern battlefield targeting. Rapid sensor-to-shooter integration, enabled by signals intelligence (SIGINT), geo­spatial intelligence (GEOINT), and un­manned aerial systems (UAS) recon­naissance, has shortened kill chains to the point where detection often leads to immediate engagement. High-value assets, identified through electronic emissions or ground-based reconnais­sance, face a severe risk of engage­ment and destruction. The prevalence of SIGINT collection, integration of UAS, and massed indirect fires in the doctrines of American adversaries rep­resents a complex problem that can be mitigated by the use of tactical decep­tion.1

Russia and China both employ multi-layered information collection and rap­id sensor-to-shooter systems. Com­mand and Control (C2) nodes are an example of High-Value-Targets (HVT) targeted by adversary doctrines and are a convenient example for exploring the use of, and opportunities created by, deception. Adversary doctrine de­scribes the following kill chain for en­gaging C2 nodes: mobile SIGINT collec­tors locate command nodes, UAS con­firm the target location, and artillery at echelon execute massed fires strikes before blue force commanders can re­act. The threat to U.S. forces this sys­tem represents is not theoretical, it un­folds daily on the battlefields of Ukraine and represents the conditions under which American forces are ex­pected to fight and win. These doc­trines are replicated every rotation at the National Training Center (NTC), where the Troopers of the 11th Ar­mored Cavalry Regiment (Blackhorse) serve as the professional opposing force (OPFOR). Blackhorse provides units with a critical opportunity to train against the techniques America’s adversaries use daily. Unexercised so­lutions already exist within Army for­mations to mitigate the effects of the modern battlefield’s shortened kill chains. By understanding adversary collection techniques, reducing signa­ture, and presenting deception signa­tures, battalions can disrupt enemy targeting cycles and create opportuni­ties for lethal response.

Figure 1. NESTS in the vicinity of Strawberry Fields oriented towards Dazashah collecting on rotational brigade MCP and enabler signatures in the Pass Complex targeting Joint Battle Command-Platform (Photo by 11th ACR Regimental S2)

Threat Collection Doctrine

Russia and China prioritize rapid target acquisition, integrated information col­lection, and fire control automation as core tenets of their military doctrine. The 7-100 series doctrinal manuals lay out their shared approach to large-scale combat operations (LSCO), detail­ing the reliance on multi-layered information collection systems that feed directly into massed indirect fires, shortening the time between detection and engagement. SIGINT plays a criti­cal role in this process, by geolocating friendly forces C2 nodes and tracking emissions from communications and mission command information sys­tems. GEOINT, collected by UAS, sup­plements SIGINT data by confirming target locations and conducting battle damage assessment (BDA) to refine follow-on strikes. This integrated tar­geting process ensures that friendly forces are rapidly engaged before they can reposition, react, or conceal them­selves.

For U.S. forces, the threat posed by this level of collection and targeting cannot be overstated because of our reliance on digital mission command systems. The ability of adversaries to rapidly detect and engage formations means that any electronic emissions or movement bears significant risk of compromise and targeting. Without ef­fective mitigation measures, units risk being outpaced in the decision-making cycle, allowing the enemy to dictate the tempo of battle. Blackhorse repli­cates these conditions at NTC, ensur­ing that rotational training units (RTUs) experience the same information-driv­en targeting process they will face in combat. By understanding how adver­saries collect and process information, U.S. forces can better prepare to dis­rupt, degrade, deny enemy kill chains.

Threat Replication

Blackhorse executes information col­lection operations by integrating SI­GINT, UAS, and ground-based recon­naissance to target friendly command and control C2 nodes, thereby disrupt­ing decision-making processes. Their layered sensor network operates in a sequence designed to detect, validate, and engage targets in real time. The Networked Electronic Support Threat Sensors (NESTS) system collects SIGINT, identifying emissions from satellite-based communications, while the Ver­satile Radio Observation and Direction (VROD) system intercepts frequency modulated (FM) transmissions to lo­cate and classify targets. Identification of likely targets by SIGINT cues UAS to confirm targeting data and refine col­lection. Due to limited time on station, UAS only remain on their assigned named areas of interest (NAIs) long enough to confirm targeting data be­fore moving on to identify additional targets in support of the maneuver fight. Small UAS (sUAS) may conduct BDA later if required.

Figure 2. FM NEST Emission Assessment for 2/11 TOC (Photo by 11th ACR Regimental S2)

Once validated, the Blackhorse Regi­mental Targeting Intelligence Cell (RTIC) processes the refined target data and passes it to fires elements for strike execution. This sensor-to-shoot­er process mirrors adversary work­flows, where electronic detection leads to physical compromise and rapid en­gagement. The effectiveness of this process underscores the necessity for signature management, deception, and counter-fire strategies to disrupt enemy kill chains.

Defeat through Deception

Deception is a fundamental aspect of modern warfare but is typically rele­gated to a survivability operation. Suc­cessful battlefield deception forces ad­versaries to misallocate resources, de­lay decision-making, and strike false targets. FM 3-90 defines deception as actions executed to deliberately mislead adversary decision-makers about friendly military capabilities, in­tentions, and operations.2

Adversary intelligence, surveillance, and reconnaissance (ISR) networks rely on rapid detection, classification, and engagement. By integrating deception, friendly forces can manipulate enemy perception, disrupt targeting cycles, and increase survivability.3&4

Deception operates across all domains and targets two specific dimension: physical and technical. Together these dimensions influence the cognitive, or human, dimension of decision making. Physical deception uses false positions and decoys to mislead enemy analysts into assessing a decoy as a legitimate target. Technical deception manipu­lates the electromagnetic spectrum (EMS) by emitting signals that mimic actual targets, causing adversary col­lectors to misinterpret the data. C2 nodes have both a physical and techni­cal signature, making them a useful ex­ample for exploring the requirements of a deception story.5

Units generate deception stories by creating signatures inside the collected spectrums, that force adversary ana­lysts to make false assessments. In the electronic spectrum, the deception node must emit signatures that mimic a C2 node. This requires units to allo­cate FM and Joint Battle Command-Platform (JBCP) capability to the de­ception node as both systems are pres­ent in MCPs. JBCPs constantly update their location data to the network, cre­ating a continuous low-power emis­sion. JBCP emissions are commonly as­sumed to be too weak to be detected, this is a false assumption. In addition to being detectable, the static nature of C2 nodes allows enemy analysts to accurately classify their emissions as a C2 node and initiate a queuing cycle and kill chain.

Reinforcing the deception story re­quires physically constructing the de­ception node to present a believable target. After SIGINT assets identify a likely MCP, adversary doctrine calls for UAS or ground reconnaissance to validate the target. Blackhorse repli­cates this effect with a dedicated MQ-1C Gray Eagle during NTC rotations. When UAS collection begins, the de­ception node must match the physical signature of an actual MCP. To achieve this, units must equip the deception node with wheeled vehicles, tentage, antennas, and other identifiable MCP-associated equipment.

Battalions can improve deception ef­fectiveness by creating deception kits from non-functional or excess equip­ment components. Broken antennas simulate active communication archi­tecture, while trailers transporting generator mockups and fuel cans rep­licate life support systems. Worn-out power cables present the image of power distribution to tents, reinforcing the illusion of an operational command node. Because high quality thermal sensors are widely available common commercial markets, the deception node should also mimic the thermal signature of an operational command node. Crews can simulate a generator’s thermal signature by piping exhaust from the towing vehicle into the decoy, allowing it to escape through a repli­cated exhaust port. Properly routing exhaust tubing and covering both the vehicle and the fake generator with camouflage netting obscures the de­ception and breaks up its physical sig­nature, making identification of the de­ception story as a deception less likely. Damaged shelters staged as command post structures further reinforce the deception story without risking mis­sion-essential assets. Integrating these elements allows units to construct de­ception nodes capable of withstanding both SIGINT and GEOINT validation.

To reduce risk, all personnel should withdraw from the deception node once it establishes. A technique to im­prove the deception teams survivabil­ity is to locate them in offset security positions, several hundred meters away, minimizing exposure while main­taining operational control of the node. Using wired connections to FM radios enables deception teams to transmit from secure positions, in­creasing the deception node’s electro­magnetic (EM) signature while keeping personnel protected. This method strengthens deception by making the site appear active while preserving force survivability. Another technique to strengthen technical deception is to equip the deception node with a CX-13298 Retrans Cable, commonly known as a “dog bone”. This cable al­lows the deception node to act as a re­trans site, mimicking the radio traffic of the actual C2 node while simultane­ously allowing the C2 node to broad­cast lower power transmissions, reduc­ing the likelihood of electronic detec­tion.

The final step in any deception opera­tion is concealing the actual asset. While the deception nodes attract en­emy collection by design, the real MCP must obscure or eliminate the signa­tures that would expose its location. This requires reversing the techniques used to make the deception node ap­pear authentic and ensuring the pro­tected asset remains undetected.

Figure 3. JBC-P NEST Emission Assessment for Troop CP and 2/11 TOC (Photo by 11th ACR Regimental S2)

Minimizing electromagnetic emissions is the first priority. JBCP should oper­ate on communications windows, es­tablish offset from the MCP, or estab­lish behind terrain that completely masks horizontal emissions. FM radios should connect by hardline to an offset antenna farm, preventing immediate correlation between transmissions and the MCP’s physical location. ATP 6-02.53, “Techniques for Tactical Ra­dio Operations,” details how antennas can offset more than two miles using ASIP remote operations via hardline connection, reducing the MCP’s expo­sure to SIGINT collection.6 When using a retrans setup on the deception node, the C2 node can locate in terrain that masks FM communication forward but allows broadcasts to hit the retrans system. These techniques not only im­prove concealment but also reinforce the deception story by generating EM emissions at the decoy location.

Beyond SIGINT mitigation, the physical composition of the MCP should be structured to blend into the operation­al environment while still meeting op­erational requirements. Use of vehi­cles and equipment incongruent with an MCP, reducing the size of the node, and collapsing assets during periods of UAS reconnaissance all contribute to the deception story by representing the C2 node as a different asset.

Reports of contact with UAS should trigger protection battle drills, includ­ing breaking down easily identifiable equipment, applying additional cam­ouflage, or even jumping the command post to prevent the presentation of an easy target. Once the ISR threat is neu­tralized or off-station, units can restore digital communications as needed.

Leveraging Lethality from Deception

A well-integrated deception plan must align with counter-reconnaissance, fires, and intelligence planning, antici­pating how and when enemy collection assets will react, and how to actively counter their efforts. This concept is rooted in reflexive control, a strategy developed by the Soviet Union in the 1960s and 1970s. Reflexive control seeks to manipulate an adversary’s de­cision-making process by shaping their perception, leading them to take ac­tions that are predictable and favor­able to the initiator. In this context, de­ception forces the enemy into a pre­dictable reaction, which friendly forces can prepare to exploit.

Given the passive nature of SIGINT col­lection, the first engagement window occurs when enemy UAS attempts to validate the deception target. To coun­ter this, units should establish anti-air ambushes near MCPs and deception nodes, positioning short-range air de­fense (SHORAD) or mobile air defense teams in ISR flight corridors. This al­lows friendly forces to engage enemy ISR platforms before they collect ac­tionable intelligence, denying the en­emy the ability to confirm or refine tar­gets.

If the enemy cannot validate the target with UAS, they may deploy ground re­connaissance teams to confirm or deny its presence. By identifying and secur­ing ground infiltration routes, units deny the enemy access to the decep­tion node, reinforcing the perception that a high-value target is present while creating opportunities to trap and destroy enemy reconnaissance el­ements before they can collect.

If deception is successful, the enemy will likely commit fires assets against the deception node without validation, encouraged in their belief that these protective efforts are aligned against a real asset. The final engagement op­portunity, where counter-fire radar, ground moving target indicator (GMTI) radar, and national level collection can detect and track enemy fires assets that have unmasked for a valueless en­gagement. Friendly forces can track and destroy these targets, preventing their use against friendly forces and creating hesitation to unmask assets for future strikes.

By integrating deception with air de­fense, counter-reconnaissance, and counter-fire operations, units can force the enemy into predictable, exploit­able mistakes while preserving their own combat power. Deception is not passive. It is a deliberate operation that includes all warfighting functions and sets conditions for the enemy to fail.7

Conclusion

By understanding adversary collection techniques, reducing the signature of high-value targets, and leveraging de­ception to shape enemy behavior, units can force adversaries to misallocate ISR and fires assets, disrupting their kill chain and protecting friendly forces. Current conflicts are occurring in high­ly contested ISR environments, where failure to integrate deception will re­sult in rapid targeting and engage­ment.

Deception is not just a defensive tool, it shapes the battlefield by forcing ad­versaries to react to false information, creating opportunities to disrupt their targeting cycles and degrade their ef­fectiveness. A well-integrated decep­tion plan must synchronize with recon­naissance, fires, and intelligence plan­ning to maximize survivability and cre­ate conditions for decisive action. Suc­cess in deception is not based on what friendly forces do, but by what the en­emy demonstrates they believe, mea­sured by the actions they take. When applied effectively, deception forces adversaries to waste resources, com­mit to false targets, and fight based on a reality that no longer ever existed.

By CPT Paul Dolan

Paul T. Dolan, a Captain in the Army, is currently assigned as a Battalion Intel­ligence Trainer with Panther Team at the National Training Center in Fort Ir­win, California. Prior to this, he served as a Squadron Intelligence Trainer with Cobra Team, also at the National Train­ing Center. Previous assignments in­clude Battalion Intelligence Officer for 2-8 Cavalry, 1st Cavalry Division; Cur­rent Operations Intelligence Officer for Task Force South East in Paktia Prov­ince, Afghanistan; and Platoon Leader for Bravo Troop, 1-40 Cavalry, 4th Bri­gade Combat Team, 25th Infantry Divi­sion. His military schooling includes the Armor Basic Officer Leader Course at Fort Benning, Georgia; Stryker Leader Course at Fort Benning, Georgia; Mili­tary Intelligence Captains Career Course at Fort Huachuca, Arizona; and the Army Space Basic Cadre Course at Peterson Space Force Base, Colorado. Dolan holds a Bachelor of Arts in Stud­ies in War and Peace from Norwich University and is currently pursuing a Master of Science in Unmanned and Autonomous Systems from Embry Rid­dle Aeronautical University.

Notes

1 ATP 7-100.1, “Russian Tactics”, 2024

2FM 3-90, “Tactics”, 2019

3ATP 7-100.1, “Russian Tactics”, 2024

4 ATP 7-100.2, “North Korean Tactics”, 2024

5 FM 3-90, “Tactics”, 2019

6 ATP 6-02.53, “Techniques for Tactical Ra­dio Operations”, 2019

7 FM 3-90, “Tactics”, 2019

US Army Seeks Suppliers for up to 10,000 Low-Cost Drones per Month

Wednesday, July 9th, 2025

Last week, Army Contracting Command, on behalf of Program Executive Office (PEO), Aviation, released a Sources Sought notice entitled, “Uncrewed Aircraft Systems (UAS) for the United States Army.” It complements an earlier RFI which was issued in April for Purpose Built Attritable Systems (PBAS).

This is great news. While the acquisition system has been slow to adapt to this requirement, Brigade and Division commanders are creating the capability out of hide, using Soldiers who have off-duty experience with drones, paired with 3D printing. Unfortunately, none of it is effectively resourced in manpower, training, or O&M funding. An acquisition of this magnitude will get the Army on its way to learning how to use this capability and incorporate it across the entire formation. Soldiers will adapt quickly and soon be able to employ FPV drones along with other systems to enhance ISR, precision targeting, EW, and low-cost mass effects via swarms.

This new Sources Sought focuses more on cost without the constraints of performance, payloads, and other requirements in the previous announcement. The goal of this Sources Sought is to deliver low-cost UAS solutions into Army formations rapidly and reduce “gold plating.” The Army understands UAS production capacity must expand across the industrial base.

As I mentioned when the PBAS RFI was released, I refer to attritable drones as the “155 shell of the future.” The reason I use that comparison is that a 155mm shell is about $3000. The Army is looking to pay up to $2000 for each of the proposed PBAS but I think that’s a bit low. The availability of these systems, built with US sourced parts (or reliable allied country), is a national imperative.

From the Sources Sought Notice:

“The Army requires low-cost unmanned aerial systems for immediate fielding with up to 10,000 air vehicles within 12 months. The ability to deliver systems at or below our threshold cost is the primary weighted measure.  The system performance characteristics will distinguish systems meeting this core requirement.  The production capability as well as the ability for Soldiers to modify and repair are additional distinguishing characteristics. The intent for modifications is to ensure Soldiers are able to add simple payloads (such as 30mm mortars, grenades, or other lethal payloads) and non-lethal capabilities based on mission needs without vendor involvement in the field. These systems may also be utilized as targets during Counter Unmanned Aircraft Systems (C-UAS) training and other training exercises. Likewise, Soldier repair is needed to allow units to fully understand their equipment and stay in the fight while waiting for additional systems / spare components.”

The number of 10,000 per month is also significant as it is the low end of the number of attritable drones Ukraine claims it expends each month in operations against Russia. This number can surge to 30,000 per month or even higher. The question is, how can the US Army consume that many drones per month during peacetime? Well, for one, 10,000 is the surge capacity and they don’t pan to get there immediately, although I think the requirement will be far beyond just 10,000 per month of we end up in Large Scale Combat Operations. While FPV drones aren’t as capable as exquisite precision guided systems, they are a fraction of the cost and can be produced in a fraction of the time. Ukraine enjoys federated production of drones in workshops and cellars as much as in factories and produces hundreds each night. Second, the Army will use these drones for Counter Unmanned Aerial System training. So far, there hasn’t been much opportunity to go after live systems. This is an opportunity for the Army (and others in DoD) to conduct some simultaneous live training for both offensive and defensive UAS capabilities.

Accessing to the request, potential vendors of PBAS must be able to deliver the following:

  • – Unit cost for air vehicle less than $2,000.00.
  • – Additional dependent equipment to include ground control station/controller, communications equipment, goggles, batteries, and charging station for one to many controllers to UAS. Cost for these items will be fairly considered during response evaluation.
  • – Production capability to deliver an initial quantity of systems by 30 September 2025 with the ability to quickly ramp production and deliver larger quantities up to 10,000 air vehicles within 12 months.
  • – The ability for our Soldiers to modify, within reason, the system with a variety of third-party payloads, armaments, and munitions without vendor involvement
  • – The ability for our Soldiers to repair the system without vendor involvement
  • Furthermore, systems must be 2020 NDAA Sec 848, 2023 NDAA Sec 817 and American Security Drone Act of 2023 (2024 NDAA, PL 118-31, DIV A, Title XVIII, Subtitle B, SEC. 1821) compliant or demonstrate a path to compliance.

    Most important about this action? Funding is available to achieve this capacity expansion. Lack of capital has held many manufacturers back.

    The Army is seeking white papers which are due by 1600 hours CST 18 July 2025.

    Visit for sam.gov full details.

    I am concerned that there still isn’t a PBAS Interface Control Document which would help both DoD and industry create Modular Open System Architecture drones which become plug and play for the integration of end effectors, comms, guidance, and motors. This would alleviate the concern over which components will work with which drones as everything would work together. Executing this scale of acquisition before establishing these standards is putting the cart before the horse.

    Despite my concern, I am very excited about this action and look forward to the Army executing and obtaining an attritable FPV drone capability at the smallest units and all across the formation.

    Eric Graves

    Founder

    SSD

    Army Scales Down Military Working Equid Program for Warfighting Priorities

    Wednesday, July 9th, 2025

    WASHINGTON – The U.S. Army is streamlining its Military Working Equid program to align more resources with warfighting capability and readiness. MWEs include horses, mules, and donkeys owned by the Department of Defense and housed on Army installations.

    Starting in July 2025, the Army will sunset ownership, operation and materiel support of MWE programs at Fort Irwin, California; Fort Huachuca, Arizona; Fort Riley, Kansas; Fort Sill, Oklahoma; and Fort Hood, Texas. However, MWE programs will continue with The Old Guard caisson units at the Military District of Washington and Joint Base San Antonio, Texas.

    Concentrating the MWE program with The Old Guard will allow the Army to achieve significant cost savings while retaining the program for national ceremonial duties.

    The Army is committed to ensuring a smooth transfer to appropriate owners and will continue to maintain the highest standards of care for the MWEs that remain in its formations. This initiative will save the Army $2 million annually and will allow the funds and Soldiers dedicated to MWE programs to be redirected to readiness and warfighting priorities.

    Installation commanders will have one year to transfer, facilitate adoption, or donate the MWEs to vetted owners according to federal law. The Army Surgeon General’s MWE Task Force, comprised of equine veterinarian experts, will provide oversight to ensure the MWEs go to appropriate owners.

    By Office of the Assistant Secretary of the Army (Manpower & Reserve Affairs)

    Army Updates Facial Hair Policy to Reinforce Grooming Standards

    Tuesday, July 8th, 2025

    The U.S. Army is updating its facial hair grooming policy in an Army Directive that resulted from a force-wide review of military standards. The update reinforces the Army’s long-standing policy that all Soldiers must be clean-shaven when in uniform or civilian clothes while on duty, with temporary exemptions for medical reasons and permanent exemptions for religious accommodations.

    The new policy requires exemptions for non-religious reasons to be supported by a temporary medical profile (DA Form 3349-SG) and an exception-to-policy (ETP) memo granted by an O-5 officer in the chain of command. The change, which will be effective the day the directive is signed, will ensure that leaders are actively involved in the process.

    Soldiers requiring exceptions must also maintain presentable copies of their required documents when in uniform or civilian clothes while on duty. Similarly, religious exemptions will require religious accommodation documentation.

    “This update reinforces our culture that fosters discipline – and discipline equals readiness,” said Sgt. Maj. of the Army Michael R. Weimer. “Through a phased implementation we are working with providers through commanders to effectively address grooming standards to ensure we maintain a professional force.”

    The directive also provides guidance on pseudo-folliculitis barbae or PFB, which is commonly known as razor bumps. It emphasizes the roles of healthcare providers and commanders in motivating and supporting Soldiers with PFB to manage their condition and to adhere to grooming standards within a reasonable timeframe.

    Army healthcare providers, commanders, and leaders will assist Soldiers by providing education and treatment plans while monitoring Soldiers’ progress toward adhering to the grooming standards. Soldiers who cannot comply with grooming standards within a reasonable time may be administratively separated.

    This policy update underlines the Army’s commitment to maintaining both warfighting readiness and a uniform, disciplined force. We will ensure our Soldiers have the resources and support they need to meet Army standards.

    By U.S. Army Public Affairs

    Army Researchers Speed Up Delivery of Electromagnetic Warfare Capabilities

    Tuesday, July 8th, 2025

    ABERDEEN PROVING GROUND, Md. (July 7, 2025) — To accelerate the pace of deploying electromagnetic warfare techniques to Soldiers, Army researchers are developing new methods to deliver capabilities with greater speed and flexibility.

    The Army Command, Control, Communications, Computers, Cyber, Intelligence, Surveillance and Reconnaissance (C5ISR) Center’s DynamIQ Electromagnetic Attack program improves how EW tools move rapidly across the battlefield to match the operational pace required in today’s warfare.

    The Center’s research supports the Army’s EW Arsenal — demonstrated this year at Project Convergence Capstone 5 and Cyber Quest 2025 — that enables Soldiers to view a repository of available EW techniques, systems and targets. Given the mission objective and threats, users can understand their tools and quickly engage the adversary.

    The key to C5ISR Center’s DynamIQ EA program is the ability to take validated EW techniques from the lab or from existing systems and transport them quickly to additional hardware platforms in a matter of hours, with no additional development time, according to a branch chief Shane Snyder. The Army saves time, money and resources by advancing from legacy EW systems to portable solutions.

    “The Army is building a flexible foundation for evolving threats by creating a modular mission payload,” Snyder said. “Developing EW techniques in a modular fashion creates platform independence. Soldiers now have the freedom to choose which tools they need for a mission.”

    The C5ISR Center has a long history of science and technology investments in Army EW systems, Snyder said. Multiple C5ISR Center R&D teams continue to invest in both offensive and force protection EW systems to ensure the Army can protect Soldiers from EW threats while impacting the threat decision cycles through offensive EW techniques.

    C5ISR Center scientists and engineers working with Soldiers, specifically the 11th Cyber Battalionsince its activation in 2019, during field testing and experimentation events has provided valuable operational input, said Yaakov Gorlin, a C5ISR Center EW subject matter expert.

    Testing events like Project Convergence and Cyber Quest provide the C5ISR Center with venues to test out both emerging concepts and maturing technologies, while getting direct operational feedback through their employment by the Soldiers. The C5ISR Center values these types of events as it allows the engineers and scientists to get first-hand insight into the capabilities being developed by the Center and provide the Soldier with relevant technology faster.

    “Soldiers giving us direct feedback and talking about implementation during the development phase enables the Army to move faster,” Gorlin said. “Researchers need to understand what their work in the lab means from an operational perspective. These interactions with Soldiers help C5ISR Center achieve goals of improving ease of use and decreasing the cognitive burden. Software capabilities are tailored to the user.”

    By Dan Lafontaine, C5ISR Center Public Affairs

    Commentary on a Concept to Create US Cyber Force

    Sunday, July 6th, 2025

    This is where I provide some commentary on commentary and originally appeared in Soldier Systems Digest, Vol 5, Issue 26.

    The Pentagon knows its cyber force model is broken. Here’s how to fix it

    The authors of this article revive the argument for establishing a US Cyber Force. I agree, except that the designation of Cyberspace as the fifth warfighting domain was myopic in the first place and establishing a “Cyber” force only gets part of the job done.

    The reality is that Cyber is SIGINT by other means and that SIGINT is one of many elements of electromagnetic warfare. The EM spectrum is the true fifth domain.

    To solve our current shortfalls, we must look to the past to face the future.

    First, establish the US Security Service (USSS) as the sixth military service with specialization in offensive Cyber, Electromagnetic Warfare, and SIGINT. This requires a fix to the Title 10 / Title 50 issues which caused this bifurcation of effort in the first place.

    Second, reconstitute service level versions of the Security Service which were stood down and merged with other Intel organizations in the 70s and 80s. Like the USSS, these service elements will provide offensive Cyber, EW, and SIGINT capabilities to support their own service branch.

    Third, merge the National Security Agency and US Cyber Command once again into a single entity with additional technical control over Electromagnetic Warfare and an understanding that this entity controls offensive actions in addition to collection. Once again, the tweaking of Title 10 / Title 50 issues is critical.

    Fourth, leave cyber security to the services as they establish and manage their own networks.

    The new US Security Service will provide the National Cyber Force as well as the lead on national level EMS collection efforts and EW policy and execution. It will also provide forces to support joint warfighting at the Strategic, Operational, and Tactical Levels. Finally, it will establish a SOF component to support properly USSOCOM with a full seat at the table.

    Unfortunately, cyber has become a generic term used by operations personnel to describe the full gamut of EW activities. While CEMA has been used here in the US as well as in the UK, Cyber ElectroMagnetic Activites seems to have lost favor even though it better describes the capability. As EW elements are embedded in Army formations under the Transformation In Contact initiative, Army combat arms Soldiers and Leaders will begin to use the term EW to generically refer to what is, EW. Unfortunately, they won’t be getting everything. The Army’s concept of EW is a stripped down capability which provides elementary direction finding and jamming, which makes it a hammer when it could be a scalpel. Signals will be geolocated without ample characterization and either jammed or passed to fires for destruction. This will invariably lead to the denial of exploitable nodes or the destruction of deceptive emitters while the real ones escape notice.

    The Army is actually exacerbating the issue. The Army is combining USAREUR’s 2nd Multi-Domain Task Force with the 56th Artillery Command referring to “cyber” and traditional fires and defensive and offensive fires. The Army got the CEMA element correct in the 2nd MDTF, combining Cyber, EW, and SI in one organization. The danger is placing all of that capability under a commander who only understands that targets get destroyed.

    Eric Graves
     Founder
     SSD

    US Army Releases TC 3-20.31-040 Direct Fire Kill Chain

    Sunday, July 6th, 2025

    The recently released TC 3-20.31-040 Direct Fire Kill Chain provides the standardized direct fire kill chain for crews, teams, squads, and small units. It provides coordinating principles for the actions of these entities that serve to establish cohesion through a common, standardized engagement process. The concepts in this training circular apply to all direct fire weapons, weapon systems, and small units in the armored brigade combat team, Stryker brigade combat team, and Infantry brigade combat team. This training circular is intended for all Army personnel, commanders, and staffs for use at Soldier through brigade combat team levels.

    The purpose of the direct fire kill chain is to provide a standard description of all the tasks and actions of the firers, teams, squads, crews, and platoons employing direct fire weapon systems. This allows Soldiers and leaders to maximize the effects of lethal fires against any threat while simultaneously reducing or eliminating fratricide and collateral damage.

    The direct fire kill chain is a deliberate, ongoing series of interconnected tasks, actions, and functions that enable the rapid and effective application of the appropriate combat power on a confirmed threat to achieve the desired tactical effects on the target.

    Get your copy at armypubs.army.mil/epubs/DR_pubs/DR_a/ARN44092-TC_3-20.31-040-000-WEB-1.

    250 Years of Army Uniforms with Beetle Bailey

    Sunday, July 6th, 2025

    Who better to showcase 250 years of Army uniforms than the iconic Beetle Bailey?

    Since 1950, Beetle Bailey has brought laughs to generations of Soldiers and civilians alike. Take a look back at how this iconic character has evolved over the decades.

    Courtesy of US Army

    Beetle Bailey © King Features Syndicate. Created by Mort Walker.