BOSS-Xe from Wilcox Industries

Archive for the ‘CEMA’ Category

Allen-Vanguard Breaks into South America with a Multi-Million Dollar Order for Their EQUINOX NG and SCORPION 2 ECM systems

Friday, February 6th, 2026

Allen-Vanguard, the global leader in providing customised solutions and enabling technology across the Cyber and Electromagnetic Activities (CEMA) domain, has recently received multi-million dollar orders for EQUINOX NG (their vehicle-based Electronic Countermeasure (ECM) system) and SCORPION 2 (their manportable ECM system). Due to the sensitivity of the purchasing nation’s operations, it is not possible to disclose specific customer details. However, this initial multi-million dollar order is a major capability uplift for the end user, will deliver enhanced protection to their personnel operating in high-risk Radio Controlled Improvised Explosive Device (RCIED) environments and help mitigate the threat posed by the increasing use of drones to deliver lethal effects.

Allen-Vanguard has over 20 years of expertise in providing customised ECM solutions for defeating Radio Frequency (RF) based terrorist and extremist threats. These threats include the continued global use of RCIEDs to target security forces and the increasing prevalence of drones or Unmanned Aerial Vehicles (UAV) being used for intelligence, surveillance, target acquisition and reconnaissance (ISTAR) or lethal means. Defence Forces, Public Safety & Security agencies around the world trust Allen-Vanguard’s capability solutions, because they are easy to use, robust, reliable and have been operationally proven on the battlefield and in the most challenging of peace-keeping missions protecting those who protect us.

Based on the current threat profile, the customer has purchased EQUINOX NG, a highly sophisticated vehicle-based ECM system. Its agile and flexible technical architecture has been developed around the leading global standards for Electronic Warfare (EW) hardware, ensuring compliance and easy integration with major programs for an enduring and ‘ever-greening’ capability. Coupled to a highly flexible and scalable physical format, allows it to be easily configured for a wide range of scenarios from armoured vehicle fits for operational theatres, VIP convoy protection or static vulnerable fixed site locations. The system can be configured with relative ease to address both the RCIED and drone threats alike. SCORPION 2, has all the same technical heritage and similar capabilities as EQUINOX, but has been specifically designed to be portable using a backpack for patrol-based operations. Clearly, it can also be fitted to vehicles or used at static locations, offering maximum flexibility.

The contract comes with a full support package, including training for users, technicians and mission fill development. This support includes the deployment of Field Service Representatives to ensure the development of indigenous ECM capability and reach back to the Threat Management Team.

This team of RF experts optimise algorithms specific to the end user’s needs to combat evolving threats specific to their region of operations. This comprehensive wrap-around support maximises the protection offered by the ECM systems, both from a physical capability perspective but also from the essential changes to tactics, techniques and procedures necessary to keep operators safe.

Bobby Strawbridge, President Allen-Vanguard, said: “This is an important milestone in Allen-Vanguard’s history, breaking into the South American market. We are operationally proven with NATO countries globally and have been trusted by peace-keeping forces in the MENA region for many years. Our systems are not only market leading in relation to their technology and capability but our support packages also ensure purchasing nations improve their wider ECM capability and remain updated with the latest algorithms and software to maintain their protection.”

LTG James Rudd Nominated for DIRNSA / Commander, USCYBERCOM

Tuesday, December 30th, 2025

I am of two mindsets regarding the good news that LTG Joshua Rudd has been nominated to lead the National Security Agency and US Cyber Command. On one hand, he’s not an intelligence or cyber officer and has no intelligence experience, particularly with neither SIGINT nor Cyber. Considering how vital these two agencies are to our national defenses that’s a serious issue. It also continues to indicate that our nation is not serious about its Information Warfare capability. 

On the other hand, he has extensive JSOC as well as current PACOM experience. As a consumer of intelligence, he’ll have an idea of what he expects the organization to produce and he comprehends the pacing threat we face in the Pacific. An additional advantage is that as an ARSOF General, he may gain a better appreciation for the “Cyber” element of the SOF-Cyber-Space triad currently so popular with his compatriots. In particular, I’m hoping he realizes that Electromagnetic Spectrum Operations are what they are really interested in and not the Cyber buzzword. Maybe he’ll also gain an appreciation for the authorities and expertise needed to provide the services associated with EMSO and why it’s best to defer to the pros from Dover and that the Cyber Electromagnetic Activities (CEMA) penguins don’t really need thumbs (a “Madagascar” reference) as they have their own. If anything, SOF needs more of them within their formations. 

For those of you unfamiliar with LTG Rudd’s here’s a link to his rather impressive bio.

This was first published in Soldier Systems Digest Vol 5, Issue 51, “The Convergence of Irregular Warfare and Information Warfare”

You can sign up for this weekly newsletter which concentrates on emerging warfighting capabilities here.

Milipol 25 – EO Spectre Tactical SIGINT System

Monday, December 1st, 2025

The EO Spectre Tactical SIGINT System from EO Security packs a lot of capability into this tablet. One of the main points I like about it is that it can be used threat collection as well as OPSEC awareness.

It can collect against Bluetooth, Wi-Fi, PTT, and Cellular as well as other signals of interest.

Technical Specifications:

  • Frequency range: 9 kHz up to 18 GHz
  • Sweep speed: up to 3,000 GHz/s
  • Instantaneous bandwidth: up to 490 MHz
  • Advanced analysis: deep insight into Bluetooth and Wi-Fi (2.4 GHz, 5 GHz and 6 GHz)
  • On-device AI: voice detection and transcription including translation
  • IMSI-catcher countermeasures: passive detection (GSM, UMTS, LTE, 5G-NSA, 5G-SA) and offensive countermeasures (GSM, UMTS, LTE, 5G-NSA)

eo-security.com/info-protect/eo-spectre-tactical-sigint-solution

NSA’s 12th Annual Codebreaker Challenge is Underway for 2025

Thursday, October 2nd, 2025

The National Security Agency (NSA) is launching their annual series of critical real-world scenarios for U.S.-based academic institutions titled Codebreaker Challenge. In its 12th iteration for 2025, the Codebreaker Challenge gives students the opportunity to analyze high-risk situations closely resembling the Intelligence Community’s classified tasks, equipping them for national security challenges. Participants will go head-to-head with other schools to accomplish mission-driven tasks aimed at enhancing their skills in reverse engineering, vulnerability research, cryptography, programming/scripting, and beyond.

This year’s challenge is to assist the Air Force’s Cyber Operations Squadron in maintaining the U.S. military’s cyber dominance against advanced foreign adversaries attempting to infiltrate and steal information. The goal is to investigate unusual behavior detected by an Air Force analyst and defend American interests against sophisticated nation-state threats. Maintaining vigilance and reinforcing the defense of robust yet vulnerable military networks is paramount.

“The Codebreaker Challenge is an opportunity for the future leaders of cyber defense to showcase their skills, and it’s extraordinary to see the enthusiasm and dedication they bring to the competition,” said Lieutenant General William Hartman, performing the duties of the Director of NSA. “I look forward to announcing this year’s winners and celebrating their success.”

The seven tasks in the challenge each have a particular point value and ramp up in complexity as students advance. After completion, points are earned by schools, and the highest totals win in three divisions, each based on the count of student participants.

The Codebreaker Challenge is open to anyone with an email address from a recognized U.S. school or university. All players register and log in individually. Students, professors, and alumni can participate, but only students will earn points and awards.

Join in and register for the challenge at nsa-codebreaker.org, where you can also watch this year’s kick-off video. Get ready to make your mark in the world of cybersecurity!

Via NSA

TCI Launches Two New Rackmount COMINT RF Systems for Success in Modern Electronic Warfare

Wednesday, September 3rd, 2025

Wappenham, UK, 2 September 2025: TCI, part of SPX Communications Technologies, today introduces two new Radio Frequency (RF) Receivers, designed for continuous, real-time signal collection to support Communications Intelligence (COMINT) operations. The 955 Rackmount RF COMINT and Geolocation System and the 957 Rackmount RF COMINT and Independent Geolocation System will be shown for the first time at DSEI 2025, 9–12 September, ExCeL London, Stand N6-130.

The systems deliver rapid detection, filtering, and geolocation of RF communication signals across congested spectrum environments, enabling faster decision-making and reaction times, improved threat awareness, and greater operational agility. Their 80 MHz Instantaneous Bandwidth – double that of its predecessor – allows wide-area signal collection for broad situational awareness, or narrower focus for heightened sensitivity in challenging RF conditions.

Combining two geolocation techniques – Hybrid Angle of Arrival (AOA) and Time Difference of Arrival (TDOA) – enables precise signal location with fewer deployed assets, even over low-bandwidth or intermittent networks.

The rugged, rack-mounted design supports deployment in vehicles, fixed installations, or forward field positions. Both models are built for mission flexibility, with the ability to switch roles without reconfiguration, from counter-terrorism and border security to front-line combat. The 955 is optimised for single-unit, vehicle-mounted, or stand-alone operations, while the 957 offers enhanced processing capacity for simultaneous, independent tasking and networked multi-sensor geolocation across dispersed teams.

The RF systems also feature a 72-hour look-back recording capability, enabling operators to identify a new threat and immediately analyse historical spectrum activity to extract further intelligence. The feature also supports automated and remote monitoring options, reduces manpower requirements for persistent 24/7 operations, and lowers operational costs. A database allows further intelligence analysis for days, weeks and months.

Both systems operate using TCI’s Blackbird software, currently in operational use on almost 1,000 frontline systems worldwide. Blackbird provides an intuitive interface that reduces training time and enables less experienced operators to perform effective COMINT tasks, immediately expanding the possible pool of operators. It allows highly skilled personnel to remain in safer, decentralised positions while remotely managing deployed systems, multiplying force effectiveness.

Built on the combat-proven heritage of their predecessor, the 953 receiver, the new 955 and 957 are backwards compatible with existing SPX Communication Technologies and partner systems, including the ECS BLACKTALON counter-uncrewed aerial system (C-UAS) solution, for scalable integration into wider electronic warfare architectures.

“Today, electronic warfare is at the heart of all defence operations, and mastering the spectrum is now as critical as controlling the air,” says David Beckett, Battlespace Business Development Director at TCI. “Our new systems give defence teams the decisive intelligence they need to succeed.”

The 955 and 957 are now available. See them for the first time at DSEI 2025, 9–12 September, ExCeL London, Stand N6-130, or contact tci_sales@spx.com for more information.

Army Principal Cyber Advisor Commends ARCYBER Innovations in Electromagnetic and Cyberspace Dominance

Saturday, August 2nd, 2025

FORT GORDON, Ga. — The Army’s top cyber strategist, Mr. Brandon Pugh, principal cyber advisor to the secretary of the Army, concluded a landmark three-day visit to Army Cyber Command Headquarters in late July, signaling strong support for the command’s forward-thinking approach to cyber readiness and modernization.

Following his recent appointment in June, Mr. Pugh’s inaugural trip from July 21-23 included extensive briefings and firsthand engagement with ARCYBER’s top talent and trailblazing technology. His itinerary spanned operational hubs, innovation centers and tactical units — each reinforcing the Army’s commitment to digital superiority in today’s increasingly complex and contested battlespace.

Operational Insights and Talent Retention

Early in the visit, Mr. Pugh was briefed on the need for the Cyber Readiness Skills Pay initiative, designed to incentivize retention of high-demand cyber professionals. Leadership briefed him on ARCYBER’s mission, structure and ongoing readiness programs, emphasizing the strategic need to empower and sustain elite cyber forces.

Frontline Innovation at the 11th Cyber Battalion

A key highlight of Mr. Pugh’s visit was his in-depth engagement with the capability developers from the 11th Cyber Battalion, who showcased a range of innovative, in-house engineered devices tailored to meet the unique operational needs of the expeditionary cyber teams. These demonstrations featured customized solutions designed to bridge target network connections and identify adversary emitters across the battlefield.

Mr. Pugh observed demonstrations by expeditionary firing crews — five-person teams capable of delivering strategic cyber effects in support of theater-level objectives, combining cyber operations and electromagnetic warfare in ways previously unseen.

Drones and Dominance

The 11th Battalion is accelerating its Small Unmanned Aircraft System Training Program around the secretary of defense’s “Unleashing U.S. Military Drone Dominance” directive and now leads efforts to rapidly produce drone teams. With authority to directly acquire drones under 55 pounds, the battalion equips forces to execute electromagnetic reconnaissance and ISR missions across global theaters.

The SUAS capability promises full integration into beyond line of sight tactics, techniques, procedures and concept of operations by the end of 2026 — paving the way for drone-led data supremacy on tomorrow’s battlefields.

Driving Strategy Across Components

Beyond tech showcases, Mr. Pugh engaged ARCYBER leadership on key policy and structural enhancements, including:

Expanding the use of National Guard and Reserve cyber units

Strengthening electromagnetic warfare resources at the division level and below

Increasing strategic communications to highlight ARCYBER’s unique warfighting contributions

He concluded the visit by expressing a strong intent to continue collaborating closely with the team and aligning efforts to support their evolving mission needs. He announced an upcoming visit to the Cyber Center of Excellence, signaling enduring collaboration with cyber leadership.

Building the Future of Warfare

Mr. Pugh’s visit reaffirmed the Army’s vision for cyber dominance — one shaped not just by emerging technology but by mission-aligned innovation.

“Technology is critical in today’s battlefield, and it is imperative that our warfighters fully leverage and lead with it, from cyber to drones,” Mr. Pugh noted. “ARCYBER’s work is a blueprint for building capabilities that achieve that goal and sharpen our warfighting edge.”

By Lindsay Roman

Commentary on a Concept to Create US Cyber Force

Sunday, July 6th, 2025

This is where I provide some commentary on commentary and originally appeared in Soldier Systems Digest, Vol 5, Issue 26.

The Pentagon knows its cyber force model is broken. Here’s how to fix it

The authors of this article revive the argument for establishing a US Cyber Force. I agree, except that the designation of Cyberspace as the fifth warfighting domain was myopic in the first place and establishing a “Cyber” force only gets part of the job done.

The reality is that Cyber is SIGINT by other means and that SIGINT is one of many elements of electromagnetic warfare. The EM spectrum is the true fifth domain.

To solve our current shortfalls, we must look to the past to face the future.

First, establish the US Security Service (USSS) as the sixth military service with specialization in offensive Cyber, Electromagnetic Warfare, and SIGINT. This requires a fix to the Title 10 / Title 50 issues which caused this bifurcation of effort in the first place.

Second, reconstitute service level versions of the Security Service which were stood down and merged with other Intel organizations in the 70s and 80s. Like the USSS, these service elements will provide offensive Cyber, EW, and SIGINT capabilities to support their own service branch.

Third, merge the National Security Agency and US Cyber Command once again into a single entity with additional technical control over Electromagnetic Warfare and an understanding that this entity controls offensive actions in addition to collection. Once again, the tweaking of Title 10 / Title 50 issues is critical.

Fourth, leave cyber security to the services as they establish and manage their own networks.

The new US Security Service will provide the National Cyber Force as well as the lead on national level EMS collection efforts and EW policy and execution. It will also provide forces to support joint warfighting at the Strategic, Operational, and Tactical Levels. Finally, it will establish a SOF component to support properly USSOCOM with a full seat at the table.

Unfortunately, cyber has become a generic term used by operations personnel to describe the full gamut of EW activities. While CEMA has been used here in the US as well as in the UK, Cyber ElectroMagnetic Activites seems to have lost favor even though it better describes the capability. As EW elements are embedded in Army formations under the Transformation In Contact initiative, Army combat arms Soldiers and Leaders will begin to use the term EW to generically refer to what is, EW. Unfortunately, they won’t be getting everything. The Army’s concept of EW is a stripped down capability which provides elementary direction finding and jamming, which makes it a hammer when it could be a scalpel. Signals will be geolocated without ample characterization and either jammed or passed to fires for destruction. This will invariably lead to the denial of exploitable nodes or the destruction of deceptive emitters while the real ones escape notice.

The Army is actually exacerbating the issue. The Army is combining USAREUR’s 2nd Multi-Domain Task Force with the 56th Artillery Command referring to “cyber” and traditional fires and defensive and offensive fires. The Army got the CEMA element correct in the 2nd MDTF, combining Cyber, EW, and SI in one organization. The danger is placing all of that capability under a commander who only understands that targets get destroyed.

Eric Graves
 Founder
 SSD

Harnessing SIGINT and EW for Tactical Dominance: A Guide for Combat Arms Leaders

Monday, June 16th, 2025

Introduction

To the combat arms platoon leader and company commander: You are leading formations that will close with and destroy the enemy. Your ability to shoot, move, communicate, and then move again (see later section on countering enemy surveillance in the electromagnetic spectrum) is paramount to our success on the modern battlefield. The enemy is sophisticated, adaptive, and aggressively contesting your ability to maneuver in all domains, including the electromagnetic spectrum (EMS). You are not alone in this fight; the intelligence and cyber communities will enable you to dominate the EMS. These communities stand ready to provide you with actionable targets and the means to influence/dominate the EMS at echelon. This is not theory; this is the reality of combat against peer and near-peer adversaries, and we are bringing the full weight of the Department of Defense (DoD) and its combat support agencies to bear. Your S-2 section and Cyber Electromagnetic Warfare Activities (CEMA) cell will innovate at speed across the range of operations to ensure that you have the capabilities necessary to win.

SIGINT and EW: Your Tactical Edge

Signals intelligence (SIGINT) and electromagnetic warfare (EW) are distinct but complementary disciplines that must be integrated effectively to maximize battlefield effects. SIGINT identifies and characterizes enemy signals, providing critical intelligence that inform EW operations. EW teams can use that information to help locate enemy positions for destruction, or simply to disrupt, deceive, or deny the adversary’s use of the electromagnetic spectrum. Proper coordination between SIGINT and EW enables deception operations, enhances precision targeting, and strengthens force protection measures, ensuring that friendly forces maintain dominance over the EMS while denying the enemy key capabilities.

Based on historical analysis of large-scale combat operations (LSCO), recent lessons learned from Ukraine, and predictive analysis of China’s People’s Liberation Army (PLA) capabilities, the teaming of SIGINT and EW can be a force multiplier across the warfighting functions. By integrating SIGINT-derived intelligence with EW’s ability to deny and disrupt, we can significantly degrade an adversary’s ability to maneuver and execute multidomain operations (MDO).

Understanding SIGINT in Your Fight

SIGINT is not just a tool for strategic planners in some far-off headquarters. It is a tactical enabler that allows you to detect, locate, and exploit enemy communications in real time. Whether you are setting up an ambush, planning a fire mission, or maneuvering to secure a key objective, SIGINT can provide the enemy’s disposition, intent, and vulnerabilities. The Army’s ability to identify and track enemy command nodes, air defense systems, and maneuver elements through SIGINT means you can strike at the right place and time with overwhelming force.

How EW Shapes the Battlefield

EW is your ability to seize control of the EMS. EW is the counterweight to enemy SIGINT and can greatly affect their ability to execute command and control (C2) while disrupting their ability to communicate, navigate, and coordinate. If the enemy cannot receive orders, they cannot react. If their targeting systems are blinded, they cannot fire effectively. Ultimately, if they can’t navigate, they cannot effectively maneuver forces on the battlefield. EW, when employed effectively, can have significant battlefield effects, all without firing a shot.

EW’s Three Essential Functions:

Electromagnetic Support (ES): Detecting and identifying enemy emitters to support targeting and situational awareness.

Electromagnetic Attack (EA): Jamming and deception operations that deny the enemy use of the spectrum.

Electromagnetic Protection (EP): Ensuring that friendly forces maintain reliable communications despite enemy jamming, to include employment of emission control measures (e.g., radio power, antenna placement, etc.) to defeat enemy attempts to surveil and target friendly forces.

The Critical Role of SIGINT and EW in Tactical Operations

The operational environment requires agility, synchronization, and unity of effort to converge all sensors and effects on a rapidly evolving threat. The ability to integrate SIGINT with EW at the tactical level allows commanders to enhance targeting fidelity (SIGINT and EW), disrupt adversary operations (EW), and provide real-time intelligence for maneuver forces (SIGINT).

To focus on C2 and counter-C2, expanded maneuver, and cross-domain fires, we must team SIGINT and EW across EA, ES, and EP to present multiple dilemmas to our enemy, enhance C2 protection, and increase lethality. Let’s look at an example:

Kill Chain Analysis: A Counter-Unmanned Aerial System (C-UAS) Scenario

In an era where UAS play an increasingly critical role in modern warfare, understanding the full kill chain process for countering these threats is essential for operational success.

Phase 1: Detect and Identify

A brigade combat team (BCT) is executing a deliberate attack when SIGINT elements intercept and transcribe enemy communications emanating from an urban area associated with drone activity. Electromagnetic support reporting from sensors riding on a remote-controlled scouting vehicle confirms the presence of enemy UAS operating frequencies, geolocating multiple launch sites and relay nodes.

Phase 2: Target and Disrupt

Upon confirming the threat, the BCT’s organic EW platoon, using Terrestrial Layer System (TLS) Manpacks, receives the locations of the threat signals of interest (SOI), and executes an electromagnetic attack to jam the drone’s control frequencies, disrupting the operator’s ability to maneuver the UAS effectively. Simultaneously, SIGINT analysts coordinating with higher-echelon intelligence teams pinpoint the drone operator’s location for kinetic targeting.

Phase 3: Engage and Destroy

With the drone rendered ineffective, the fire support element coordinates an artillery strike on the enemy UAS ground control station, leveraging the precision geolocation refined by enhanced tools like the Electromagnetic Warfare Planning and Management Tool (EWPMT) and the Army Intelligence Data Platform (AIDP). Simultaneously, the EW platoon continues to jam the enemy’s communications, preventing coordinated support or retrograde. Friendly forces neutralize the threat, allowing maneuver elements to proceed unimpeded.

Phase 4: Assess and Adapt

Post-strike analysis from SIGINT utilizing High Altitude Platform (HAP) sensors reveals ongoing enemy attempts to reestablish drone operations, underscoring the necessity for sustained EA efforts. In response, SIGINT teams disseminate updated threat reporting to the EW platoon, enabling them to adjust jamming frequencies and counter enemy adaptations. Concurrently, SIGINT elements refine their intelligence collection to anticipate and prepare for potential future enemy tactics, ensuring proactive EW measures.

This coordinated SIGINT and EW kill chain ensures the enemy’s UAS capability is neutralized before it can affect friendly operations. This vignette effectively illustrates the critical synergy between intelligence-driven targeting and spectrum dominance.

How You Can Leverage SIGINT and EW at Your Level

To gain a decisive battlefield advantage, leaders must integrate SIGINT and EW capabilities to counter enemy threats in the EMS. The following approaches can help achieve this:

Incorporate SIGINT and EW into the DNA of Your Planning and Execution

From the outset, consider how to effectively integrate these capabilities into your operations to inform and shape your decision-making. Collaborate closely with supporting staff elements, such as the BCT CEMA cell and S-2 section, to gain a deep understanding of the enemy’s electromagnetic spectrum usage and identify opportunities to disrupt and exploit their vulnerabilities. By incorporating SIGINT and EW into your operational framework, you can create a more comprehensive and effective approach to achieving your mission objectives.

Train Your Leaders and Soldiers to Recognize and Exploit the EMS

Your Soldiers must understand that controlling the EMS is just as vital as controlling key terrain. Integrate SIGINT and EW considerations into your battle drills, mission rehearsals, and after-action reviews. Units that fail to account for enemy EW will put their formations at significant risk on the battlefields of the future. Training ensures you can adapt and maintain tempo under contested conditions.

SIGINT and EW teams can sense across the EMS with ES at the tactical edge. By developing new tactics, techniques, and procedures (TTPs), SIGINT support from higher echelons, such as from the division level, can be pushed down to BCTs, providing real-time EMS sensing without burdening them with protecting and maneuvering higher-echelon intelligence capabilities. Ultimately, this enables more agile and lethal maneuver forces.

Ensure Interoperability with Supporting SIGINT and EW Units

SIGINT and EW units are enablers, not afterthoughts. Integration of SIGINT and EW elements throughout the organic targeting process is key. Work with them to refine target identification and EA options. Develop unit standard operating procedures (SOPs) that detail how to request and synchronize their capabilities in real-time engagements and incorporate them in all rehearsals. Leaders must ensure that EW Soldiers are embedded within tactical formations to provide immediate effects that enhance maneuver and fires.

Adopt an Aggressive, Learning-Focused Mindset

The enemy is adapting. As such, we must do the same. Stay informed on the latest TTPs by leveraging resources such as the Center for Army Lessons Learned (CALL) and current doctrinal publications like Field Manual (FM) 2-0, Intelligence, and FM 3-12, Cyberspace Operations and Electromagnetic Warfare. We must continue to share lessons learned across our formations and with intelligence and EW enablers to continually refine our operational effectiveness.

Conclusion

In an era where the electromagnetic spectrum is as contested as the physical battlespace, success demands leaders fully integrate SIGINT and EW into their tactical decision-making. These are not ancillary capabilities but core enablers of maneuver, fires, and protection. By treating SIGINT and EW as an integral piece of battlefield operations rather than separate support functions, we can outthink, outmaneuver, and overwhelm our adversaries before they can react.

The future fight will be won by those who master the integration of intelligence and electromagnetic warfare, seamlessly fusing these disciplines into their formations and operational planning. This requires continuous learning, rigorous training, and adaptive thinking to counter evolving enemy tactics. The intelligence and EW communities stand ready to support, provide counsel for our specialties, and execute through our commanders’ intent.

Superiority in the EMS is not an option — it is a necessity. By embracing these capabilities and fostering interoperability, we ensure that our forces maintain a lethal edge on the battlefield. The challenge is clear, and the tools are at hand. Now is the time to educate our leaders and Soldiers and incorporate these capabilities into our training so we are prepared to fight and win our nation’s wars.

By MG Rick Appelhans and MG Ryan Janovic

MG Richard T. “Rick” Appelhans currently serves as the commanding general of the U.S. Army Intelligence Center of Excellence and Fort Huachuca, AZ. Prior to assuming this position, he served as the director of Intelligence, U.S. Forces Korea/deputy director of Intelligence, Combined Forces Command. MG Appelhans’ overseas assignments and deployments include the Republic of Korea, Kuwait, Germany, the Netherlands, Afghanistan, Bosnia-Herzegovina, and Iraq. He began his military career as an Armor officer, serving as a tank platoon leader, company executive officer, and battalion S-4. Since transitioning to Military Intelligence in 1997, MG Appelhans has served in a variety of command and staff assignments to include detachment commander, battalion S-2, company commander, brigade combat team S-2, analysis and control element chief, region commander, division G-2, and group commander.

MG Ryan Janovic currently serves as the commanding general of the U.S. Army Cyber Center of Excellence and Fort Eisenhower, GA. A native of Akron, OH, he graduated from the U.S. Military Academy at West Point, NY, in 1993 and commissioned into the Military Intelligence Corps. He served with Multi-National Forces-Iraq, 1st Infantry Division in eastern Afghanistan, Military Intelligence in Korea, and later with Commander United Nations Command/Combined Forces Command/U.S. Forces Korea. His other assignments include various posts throughout the U.S. to include a tour as a White House Fellow. In 2019, MG Janovic joined the cyber ranks as the deputy commander of Joint Force Headquarters – Cyber (Army), leading the organization toward unit citations earned in support of U.S. Central Command.

This article appears in the Summer 2025 issue of Infantry. Read more articles from the professional bulletin of the U.S. Army Infantry at www.benning.army.mil/Infantry/Magazine or www.lineofdeparture.army.mil/Journals/Infantry.