FirstSpear TV

Archive for the ‘Cyber’ Category

75th USARIC Evaluates Emerging Army Technologies at Cyber Quest 25

Wednesday, November 19th, 2025

FORT GORDON, Ga.–During Cyber Quest 25, 75th U.S. Army Reserve Innovation Command Soldiers partnered with formerly Army Futures Command’s Futures and Concepts Center Cyber Capabilities Development Integration Directorate’s now renamed, as of Oct. 2, 2025, to the Army Transformation and Training Command’s Future and Concepts Command Cyber CDID, providing a tailored multidisciplinary data team to evaluate multiple emerging technologies, June 3-15, 2025.

As part of its direct support command relationship to T2COM’s FCC, the 75th USARIC’s specialized Army Reserve Citizen-Soldiers routinely provide custom built data teams in support of the Army innovation enterprise – leveraging civilian acquired technical expertise to solve a broad range of data driven warfighting problems.

CQ25 is an annual prototyping and data-centric Army Focused Warfighting Experiment providing capability development and acquisition communities a unique, realistic, and future-focused operationally relevant environment to inform critical capability gaps facing Cyber, Electromagnetic Warfare, Information Advantage and Signal operational forces.

The 75th USARIC helps the FCC drive force design, ensuring that the Army’s future formations are prepared for peer conflict and lead concept development, experimentation, and integration of requirements that translate into real organizations and capabilities.

Force design ensures that new concepts are not just theoretical but that they are turned into capabilities fielded at speed and scale.

CQ25 AFWE drives requirements definition, informs rapid acquisition initiatives, and supports acquisition risk reduction activities.

Leveraging Military & Civilian Expertise for Robust Evaluations while Driving Interoperability Through Collaboration

“The 75th USARIC’s fourteen personnel on-site brought invaluable military and civilian-acquired technical skills in artificial intelligence, data science, and cybersecurity to CQ25, enabling thorough assessments of Cyber, Electromagnetic Warfare and Information Advantage prototypes, expanding their impactful role during last year’s CQ24,” said Lt. Col. Allan Pitchford, lead data analyst for CQ25 and chief, Studies and Analysis, Cyber CDID.

The command’s tailored multi-disciplinary data teams focused on data-driven warfighter problem sets and then finding effective solutions.

During CQ25, “they [75th USARIC Soldiers] assess prototypes to identify capability gaps, test integration with Army systems, and provide actionable feedback for MDO 2028 requirements, collaborating with Soldiers, industry and allies,” Pitchford said. “Their evaluations are vital because their Soldiers, with dual civilian-military expertise, offer unique insights into technology usability and resilience in contested environments.”

There were more than 140 participants in CQ25 testing technology integration to deliver seamless capabilities for brigade and above echelons a key CQ25 objective according to Pitchford, including: Army Cyber Command, the 11th Cyber Battalion, 1st Infantry Division, U.S. Army Forces Command and U.S. coalition partners from Japan, Australia, the United Kingdom, the Netherlands, Singapore and France were also part of the experiment.

CQ25: Testing, Evaluating Innovative/Cutting Edge Technologies for MDO/LSCO

There were 14 vendors on-site with 12 innovative technologies positioned for stress testing and evaluation during CQ25 prior to future continued experimentation and possible acquisition by the Army.

“The 75th Innovation Command brings a uniquely qualified team to support this mission,” said Lt. Col. Shawn Lonergan, officer in charge, Detachment 8, Support Group, 75th USARIC and 75th USARIC CQ25 OIC. “Our Soldiers combine deep operational experience from across the Army—spanning both active duty and reserve components in cyber, signal, and other technical branches—with cutting-edge civilian expertise.”

According to Lonergan, team members work in sectors ranging from energy and financial services to technology and academia, allowing them to approach emerging technologies with a blend of real-world industry insight and military operational understanding.

“This combination enables us to evaluate technologies rigorously while also identifying novel applications to support the warfighter in ways that may not yet be fully realized,” Lonergan added.

BOLT-Data and Analysis Collection system

During large-scale experiments like Cyber Quest and Project Convergence, where Soldiers test new technologies in realistic environments, FCC Cyber CDID collects Soldier feedback and integrates it into requirements, ensuring that future systems are designed for the operational environment, not for the lab.

The 75th USARIC Soldiers’ observations were recorded using the FCC Cyber CDID’s Behavior Observation Logging Toolkit, which feeds into the Army’s broader innovation ecosystem.

“By capturing structured feedback through the BOLT digital system, the team provided quantifiable, actionable data on system performance, usability, and operational value,” said Sgt. Santhosh Meenhallimath, innovation analyst, Detachment 3, SG, 75th USARIC.

This data directly informs Army decision-makers, helping prioritize technologies with the highest potential for acquisition, scalability, and impact in future multi-domain operations, according to Pitchford.

The teams used digital tablets and portable micro-laptops with the BOLT software to collect their data, conduct analysis and complete feedback surveys for FCC Cyber CDID.

“The 75th USARIC survey data from the BOLT digital system, our tool for collecting structured feedback, will provide Army decision-makers with detailed insights into Soldier interactions with CQ25 technologies,” Pitchford said. “For instance, their input on interface usability or manual process challenges will highlight which systems enhance effectiveness or need refinement. This data will guide FCC Cyber CDID and Cross-Functional Teams in selecting technologies that reduce the cognitive burden and align with MDO goals, ensuring cost-effective acquisitions and focused innovation.”

This data supports future testing requirements, capability development, and acquisition decisions—ensuring that the technologies invested in are informed by real-world operational needs, added Pitchford.

“As we continue to professionalize data collection during Army experimentation, the contributions made by the subject matter experts from the 75th USARIC have been pivotal,” said U.K. Army Maj. James Harryman, experiment director, CQ25 and military personnel exchange program officer, Cyber Battle Lab, Cyber CDID, “working towards a common goal, I have been impressed by the focus and hard work, which has resulted in an extremely successful result.”

Information Advantage

At CQ25, 75th USARIC Soldiers evaluated a diverse set of technologies spanning advanced networking tools (including Zero Trust architectures), EW, cyber capabilities, and solutions designed to enable information advantage for decision-makers.

“In CQ24, their [75th USARIC Soldiers] assessments shaped the IA construct, and in CQ25, their feedback ensured we prioritized practical, interoperable solutions,” Pitchford said. “This expertise reduces risks in Army modernization by aligning prototypes with operational realities.”

The 75th USARIC evaluation and assessment teams focused on many of the 12 overall technologies at CQ25 including generative AI and how it can speed up information analysis for military decision makers in large scale combat operations and MDO.

“What excites me most are the tools that are bringing generative AI directly into the hands of analysts—reducing the time it takes to gather, synthesize, and analyze information,” said Lonergan, who is a partner at a multinational professional services and consulting firm in his civilian capacity, when not serving in uniform. “These capabilities have the potential to dramatically accelerate the delivery of actionable recommendations to commanders, enabling faster, more informed decisions in complex operational environments.”

The THiEF System

One technology tested and evaluated at CQ25 by the 75th USARIC team was the Tactical Handheld Emitter Finder, a portable system that uses radio direction finding sensors to monitor radio channel(s), or radio frequency spectrum. The THiEF system test/evaluation lane was operated by Army Staff Sgt. Zacharias Bolton, EW noncommissioned officer, 1st Infantry Division.

“I am out here at Cyber Quest to test and experiment with the new technology that the Army is interested in and how it can play a role in electromagnetic warfare, in future operations,” Bolton said.

Interacting with the 75th USARIC team has been a good experience, Bolton added.

“They ask questions on what we think about the technology that is out here and our feedback on future equipment with electromagnetic warfare,” said Bolton.

M.O.T.T.

During the first week of CQ25 another innovative technology evaluated by the 75th USARIC team was the Multi-Orbit Tactical Terminal: multi-orbit connectivity.

Sgt. 1st Class Michael Perry, innovation noncommissioned officer, digital engineer, and Chief Warrant Officer 3 Nicholas Chadwick, innovation digital engineer, both with Detachment 5, Support Group, 75th USARIC entered survey assessment and evaluation data about M.O.T.T. satellite communications.

“Our task was to put the M.O.T.T. through test and evaluation runs on an austere test track complete with tree top and terrain obstructions, and inclement weather [heavy rainstorms] to record and observe data that answer specific questions for the Army capability managers for network & switch,” said Chadwick.

As part of CQ25 testing, Perry and Chadwick entered the M.O.T.T. data for on-the-move lower earth orbit and geosynchronous earth orbit dual configurable ground station transceivers for enhanced and resilient network primary alternate contingency emergency technology into BOLT hand-held tablets from SATCOM panels mounted on the roof of an SUV.

“These assist the Army Capability Managers to develop realistic requirements based on observed, measured (quantitative), and qualitative data including how junior Signal Soldiers briefly trained on the technology are able to operate and understand the technology,” said Chadwick, who works as a senior solutions architect for AI, cloud and data management in his civilian career. “This provides insights into level of effort for training and ease of use.”

TReX and C-sUAS

CQ25 included an operational evaluation of diverse EW capabilities including a radio frequency emulator called Threat Representative Environment X.

“It stood out not only for its ability to generate a wide range of complex signals – such as frequency-hopping burst transmission and GPS spoofing waveforms- which are representative of real-world adversarial threats,” said Meenhallimath. “It also enables other EW technologies to test, train and adapt their detection capabilities. With further integration of AI/ML, TReX holds strong potential to enhance the Army’s ability to emulate complex electromagnetic threats, making it a valuable asset for both training and operational readiness.”

Meenhallimath, who has a master’s degree in computer applications and works as a cloud data architect in his civilian capacity when not serving in the Army Reserve, said CQ25 was also an opportunity for rapid adaptability of EW to evolving threats.

“The [CQ25] experiment demonstrated how tools like TReX and AI/ML [machine learning] based spectrum systems can work together to form a functional and adaptable C-sUAS [counter-small unmanned aerial systems] solution, highlighting the value of combined capabilities in real-world scenarios,” said Meenhallimath.

The intention of using fixed/semi-fixed, mounted or handheld C-sUAS is to defeat or disable drones through detection, tracking and identification.

According to a 2019 Defense Information Systems Agency’s fiscal year 2020 Army Programs C-sUAS executive summary: “common methods for detecting sUAS included radars, radio frequency scanners and electro-optical or infrared cameras.

“Common defeat methods include jamming the sUAS RF control or video link; jamming the Global Navigation Satellite System signals or destroying the sUAS using a kinetic mechanism, such as lasers, projectiles or an intercepting sUAS,” reads the 2019 DISA FY20 Army Programs C-sUAS executive summary.

“CQ25 reinforced the importance of systems that can quickly adjust to novel signal-behaviors,” said Meenhallimath, “whether through manual configuration or model updated in AI-based platforms to remain effective in contested electromagnetic environments.”

CQ going forward

Going forward, according to CQ25 host-the Army CBL, part of now T2COM’s FCC Cyber CDID, future Cyber Quest experiments will be assumed into Army-wide experimentation events like Project Convergence.

Training and education under the new T2COM are tightly integrated with modernization. Soldiers are trained not only to master today’s tasks but also to adapt to tomorrow’s fight.

This includes exposure to emerging capabilities – for example, Soldiers in training pipelines may operate a c-UASs or AI-enabled C2 platforms being tested in Project Convergence.

“Their [75th USARIC] evaluations are vital because their Soldiers, with dual civilian-military expertise, offer unique insights into technology usability and resilience in contested environments,” Pitchford said.

By merging training with futures and doctrine, T2COM accelerates the cycle from concept to training to fielding. Army and Army Reserve Soldiers’ training pipelines are synchronized with modernization timelines, ensuring skill development and readiness matched to the current battlefield.

Regarding previous CQ-tested technologies acquired over the last 4–5 cycles (2020–2024), our experiments inform requirements and as such technologies are intentionally lower technology readiness levels and not yet ready for full-rate production, he added.

“To be clear no technology here is in its final form,” Pitchford said. “We are only attempting to inform and develop Army future requirements and there are no acquisition decisions being made, real or implied because of our findings out of Cyber Quest. The results from Cyber Quest do not directly trigger procurement after the event.”

Key Takeaways: “Innovate in real time”

One of the key takeaways is the utility of bringing a multidisciplinary team to evaluate emerging technologies, said Lonergan, who works as a partner at a multinational professional services firm in his civilian career.

“This was my first time attending Cyber Quest, and it was a great opportunity to evaluate emerging EW technologies and see the growing integration of AI/ML, a clear sign that the Army is moving in the right direction toward modern, adaptive capabilities,” said Meenhallimath. “It was valuable to work alongside other Army components, industry partners and stakeholders, fostering a shared understanding of operational needs and tech maturity.”

The 75th USARIC evaluations are critical in bridging the gap between concept and combat – bringing a user-centric, field-informed perspective to Army modernization efforts, Pitchford added.

“By leveraging a diverse range of skill sets—from cyber and signal to industry and academia—we’re able to identify novel use cases, challenges, and opportunities, and envision how these technologies might be applied across a variety of operational environments, Lonergan said.

“Another important insight is that innovation doesn’t happen organically—it requires deliberate effort across the entire ecosystem, from the front lines to research labs,” Lonergan said. “Experiments like Cyber Quest are critical because they give us the opportunity to explore and refine new capabilities in a controlled environment, so we can reduce the need to innovate in real time on the battlefield and keep the focus where it belongs: on success in mission execution.”

Editor’s Note: The 75th United States Army Reserve Innovation Command enables continuous transformation across the Army’s innovation operational environment by way of a structured innovation lifecycle process to shape requirements in support of a broad range of DOTMLPF-P solutions. The 75th USARIC leverages their unique blend of civilian acquired skills to synchronize continuous transformation efforts across the Army Reserve, ensuring innovation efforts are deliberate, resourced and operationally relevant to Army priorities. For more information about the 75th U.S. Army Reserve Innovation Command, visit www.usar.army.mil/75thIC/ or www.innovation.army.mil/.

Story by MSG Matthew Chlosta 

75th US Army Reserve Innovation Command

TIAD Activation Marks New Chapter for ARCYBER

Tuesday, October 14th, 2025

Fort Gordon, GA —U.S. Army Cyber Command (ARCYBER) activated the second Theater Information Advantage Detachment (TIAD) during a ceremony held at the Cyber Conference and Catering Center at Fort Gordon Friday, October 3, 2025.

The activation marks a pivotal step in the Army’s evolving approach to information warfare.

Col. John Agnello, 2nd TIAD Commander, took charge of the ARCYBER TIAD, guiding a unit focused on supporting operations across the broader information environment. In remarks at TechNet Augusta earlier this year, Agnello highlighted the growing relevance of the TIAD’s mission in today’s complex strategic landscape.

“In an era where information is both weapon and shield, the mission of this detachment is nothing short of strategic necessity,” said Agnello “But no algorithm or system can replace the ingenuity and resolve of our soldiers. This TIAD is built on the shoulders of soldiers who bring not only technical mastery, but the courage to challenge, the creativity to adapt, and the conviction to lead. I’m honored to command a team that doesn’t just execute the mission; they embody it. They are the Army’s advantage in the information fight, and a key reason we’re positioned to succeed.”

The ARCYBER TIAD is one of three planned detachments tailored to specific geographic commands: Indo-Pacific, Europe, and ARCYBER itself. Each TIAD integrates disciplines such as cyber operations, electronic warfare, psychological operations, civil affairs, and public affairs into a unified team.

The activation ceremony served as an opportunity for soldiers and civilians from across the cyber and Information Operations community to gather and witness the birth of a unit that promises to redefine how the Army competes in the digital age.

Lt. Gen. Maria Barrett, Commander of ARCYBER, praised the TIAD concept during the Association of the U.S. Army’s 2024 annual meeting, noting that these detachments are essential for countering disinformation and malign influence:

“From the Signal Corps of World War II to the satellite networks of Desert Storm, the Army has always adapted to the character of conflict. Today, with the activation of this TIAD, we carry that legacy forward—into the information domain, where influence is decisive and truth must be defended. This is not just a new unit; it’s the next chapter in how the Army fights and wins.”

With its activation, the ARCYBER TIAD now stands at Initial Operating Capability—a foundational milestone that marks the beginning of its operational journey. As the unit builds toward Full Operating Capability, it will continue refining its integration across cyber, information, and influence disciplines, ensuring commanders have the tools and insights needed to compete effectively in the information environment across the competition continuum.

The road ahead is deliberate and mission-focused, with each step reinforcing the Army’s commitment to shaping the future of information warfare through innovation, agility, and the strength of its people.

Story by MAJ Lindsay Roman

U.S. Army Cyber Command

Army’s Principal Cyber Advisor Says Cyber Key to Preparing for Future Fight

Monday, September 22nd, 2025

WASHINGTON — Cyber is central to the Army’s once-in-a-generation transformation and to defending the homeland’s critical infrastructure, said Principal Cyber Advisor to the Secretary of the Army Brandon Pugh to attendees at the Billington CyberSecurity Summit, Sept. 11.

Pugh said the Army’s Continuous Transformation aims to put the right technology in Soldiers’ hands faster while strengthening readiness for the future battlefield — where cybersecurity underpins everything from base operations to mobilization.

“This is our effort to make sure the Army is adapting to the future battlefield,” Pugh said. “Cyber is a key component of Army Continuous Transformation.”

Pugh participated in “The Future of Cyber Threat” panel, moderated by Chris Townsend, an Elastic vice president. Alongside Pugh were Col. Ivan Kalabashkin, Deputy Head of Ukraine’s Security Services Cyber Division; Vikram Thakur, Technical Director at Broadcom; and Josh Salmanson, Vice President for the Defense Cyber Practice at Leidos. Panelists discussed a range of cyber-related issues.

People first

“People are the core of the Army,” Pugh said, noting that modernization efforts revolve around Soldiers and Army civilians who defend the nation every day. He highlighted opportunities to better harness the skills of Army National Guard and Army Reserve cyber professionals — many of whom work in cybersecurity in their civilian careers. “Who is better positioned to defend a critical infrastructure threat than the people who live there?” he asked.

Protecting critical infrastructure at home

Pugh emphasized that defending the homeland is a top priority, and that the Army has a direct stake because vulnerabilities in privately owned critical infrastructure — from power grids to transportation networks — can affect Army installations and unit mobilization. He pointed to assessments by the Army Cyber Institute at the U.S. Military Academy at West Point that examine how infrastructure weaknesses could disrupt the Army’s ability to project forces in crisis or conflict. “We need to be able to mobilize forces and equipment at a moment’s notice,” he said.

When asked how to address critical infrastructure vulnerabilities, Salmanson urged organizations to “get back to the basics” — patching systems, reducing vulnerabilities and avoiding shared passwords — to cut noise in networks and improve response to new threats. “We’re seeing higher volumes and better quality [attacks] consistently,” he said.

AI for cyber — at scale

Panelists agreed adversaries are already using artificial intelligence to increase the speed and quality of attacks. Kalabashkin said Ukraine has faced more than 13,000 cyberattacks on government and critical infrastructure systems since the start of the full-scale war, with Russia using AI in recent months to scan for network vulnerabilities.

Pugh said the Army is leaning into AI where it can provide a decisive edge. “How can AI be used more effectively and at scale for defensive cyber operations and perhaps even offensive cyber operations?” he asked, noting strong work already underway across Army Cyber Command and U.S. Cyber Command. “We should leverage AI to gain the upper hand — a force multiplier for our Soldiers.”

Speed to capability

Pugh said the Army is working to shorten timelines to field cyber capabilities, particularly from innovative companies with niche solutions. “If you have a unique capability that can add value to the military, there should be an ability to get that in the hands of a warfighter and test it in weeks,” he said. That effort, he added, aligns with the Army’s broader push to transform how it acquires, tests and fields technology.

By MAJ Sean M. Minton

Army’s New Cyber Advisor Sets Tone for Priorities

Friday, August 29th, 2025

WASHINGTON — Bringing innovative technologies to Soldiers and incorporating next generation software and capabilities will be among the priorities of the Army’s new top cyber strategist.

Brandon Pugh outlined his duties as the Principal Cyber Advisor to the Secretary of the Army during a discussion in Augusta, Georgia, Thursday.

Pugh, a Rutgers Law School graduate, not only boasts the cybersecurity experience and education to advise service leaders but Pugh, an officer in the Army reserve, can relate to the Soldiers his leadership will influence, having served as a paratrooper, international law officer and now as a national security law professor while in uniform.

Pugh was a non-resident fellow at the U.S. Military Academy and served as legislative counsel at the New Jersey General Assembly Minority Office, managing policy and legislation related to cybersecurity.

Pugh became the third person to be named PCA after President Donald Trump nominated him June 16, becoming the first political appointee to the role.

Pugh said that bolstering the Army’s cyber capabilities and cybersecurity aligns with the service’s continuous transformation priorities, where the service will leverage the latest technologies to keep pace with adversaries.

“I truly believe in the direction the Army is going,” Pugh said. “The Army’s continuous transformation is really a unique window in transforming the Army overall to the current battlefield, as well as where the future one is. And I think cyber is a key part of that.”

Pugh said his goals for Army cyber include pushing AI capabilities to the warfighter and fulfilling the president’s priority of defending the homeland. He said national defense can be achieved by bolstering the service’s cyber offensive and defensive capabilities.

“Transformation is really delivering capabilities to the warfighter in a quick speed. That’s just not a buzzword. How do I interpret that for our office?” he said. “It’s really looking at the nexus of AI and cyber. ARCYBER is doing a great job under [ … Army Cyber Command Science Advisor and Chief Analytics Officer Mark A. “Al” Mollenkopf’s] leadership, but I think that’s the direction we need to go in.”

Pugh will lead his office from the Pentagon and collaborate with Leonel Garciga, the Army’s Chief Information Officer, and other senior leaders. Pugh’s council comes at a critical time as Secretary of Defense Pete Hegseth identified cyber among the Army’s top areas to invest.

This fall, Army Cyber Command, based at Fort Gordon, Georgia, will form the first of its three Theater Information Advantage Detachments, which will focus on U.S. adversaries in the realm of cyber information. Pugh visited Fort Gordon, Georgia, in late July including meeting with Army cyber capability developers at the 11th Cyber Battalion.

Pugh said that further incorporating the National Guard and his fellow reservists into ARCYBER and broader cyber efforts will be among his priorities. He said that many members of the guard and Army Reserve boast skills in the areas of cyber and technology that could benefit the Army’s cyber capabilities.

The Army established its Cyber Direct Commissioning Program, or CDCP, for those who possess key experience in the cyber field or education to be appointed to the Army’s Cyber Corps in the ranks of lieutenant to colonel.

“I see this as a total Army. We need our active-duty Soldiers, but we also need our Reservists and our Guardsmen, and I’ll add civilians on top of that,” Pugh said. “I think we see awesome examples of the Guard and Reserve being utilized.”

Pugh added that Guardsmen work in local communities where they can contribute to critical infrastructure defense.

“Some of these Reserve and Guardsmen have incredible skill sets. They’re in C-suite (top cyber strategy) positions sometimes in their civilian world [positions]. To make sure we’re leveraging them, I think is key.”

By Joe Lacdan Army News Service

Army Principal Cyber Advisor Visits U.S. Army’s Only Offensive Cyber Operations Brigade

Thursday, August 14th, 2025

FORT GEORGE G. MEADE, MD – Mr. Brandon Pugh, the U.S. Army’s Principal Cyber Advisor to the Secretary of the Army, visited the 780th Military Intelligence Brigade (Cyber) on August 6. The brigade is the Army’s sole offensive cyber operations unit, playing a pivotal role in national defense and cyber warfare.

The visit followed Mr. Pugh’s three-day trip to U.S. Army Cyber Command (ARCYBER) headquarters at Fort Gordon, Georgia, where he received briefings and engaged directly with ARCYBER’s top talent.

“The 780th Military Intelligence Brigade (Cyber) is on the frontline of defending our nation and conducting cyber operations,” said Brandon Pugh, the Army’s Principal Cyber Advisor. “The brigade is an invaluable component of the United States’ cyber enterprise. My visit to the 780th Military Intelligence Brigade (Cyber) was an extraordinary opportunity to meet Soldiers conducting these important cyber operations and to see its unique capabilities firsthand.”

During his time in Georgia, Mr. Pugh met with capability developers from the 11th Cyber Battalion, who showcased innovative, in-house engineered devices tailored to meet the operational needs of expeditionary cyber teams. He also interacted with Soldiers from the 782nd Military Intelligence Battalion (Cyber), who support Cyber Joint Force Headquarters (JFHQ-C) for the Army, Air Force, Navy, and Marine Corps.

The 780th MI BDE (Cyber) is geographically dispersed across four states. The brigade headquarters, the 781st MI Battalion (Cyber), and the Operations Support Element (OSE), are based at Fort George G. Meade, Maryland; the 11th CY Battalion and 782d MI Battalion (Cyber) are headquartered at Fort Gordon, Georgia; and the 782d has operational detachments in Hawaii and Texas.

According to the Brigade commanding officer, Col. Candy Boparai, the 780th MI BDE (Cyber) is a critical enabler of ARCYBER and U.S. Cyber Command (USCYBERCOM), delivering unique, multi-domain capabilities to sense, understand, and deliver effects in the information environment.

“The 780th MI Brigade (Cyber) directly supports USCYBERCOM’s core missions: defending the Nation and conducting cyber operations to achieve Combatant Command objectives,” said Boparai. “We operate as a key component of the Army’s Cyber Mission Force (CMF), specifically providing National Mission Teams, National Support Teams, Combat Mission Teams, and Combat Support Teams, and Capability Solutions Developers.”

According to Command Sgt. Maj. Joseph Daniel, the brigade’s senior enlisted leader, “As the Army’s only offensive cyber force, the 780th provides unique capabilities to sense, understand, and deliver tactical, operational and strategic cyber effects globally to achieve Combatant Command objectives.”

Daniel remarked that the brigade supports Joint Force efforts, leveraging their more than 2,100 personnel to address cyber challenges worldwide; and the brigade’s cyber teams, 11th CY BN Expeditionary CEMA (cyberspace electromagnetic activities) Teams (ECTs), and developers are all actively involved in regular cyber operations, collaborating with USCYBERCOM, Army electronic warfare units, and other partners.

In addition to receiving briefings, Mr. Pugh was able to see a live operation in the brigade’s Joint Mission Operations Center and view an Army Continuous Transformation drone demonstration by the OSE Cyber Solutions Development team.

As part of the Principal Cyber Advisor’s briefing, the brigade discussed the training requirements to achieve and maintain mastery in a Cyber Soldier’s assignment. These requirements are executed at the brigade, following their training at the U.S. Army Cyber School. The additional training can range from several months to more than a year and continues as the Soldiers progress.

“The Army’s most significant inputs into cyber readiness are presenting high quality personnel and providing the supporting talent management policies to sustain them in Cyber Mission Force long enough to achieve and maintain mastery in their skillsets,” said Boparai. “We are the only U.S. Army offensive cyber operations brigade and our focus as the administrative command headquarters is to man, train, equip, assess and enable the Army CMF and CEMA teams in accordance with published USCYBERCOM and ARCYBER standards.”

The 780th MI Brigade (Cyber) motto is inscribed on the organization’s Distinctive Unit Insignia “Ubique Et Semper In Pugna.” Latin for “Everywhere and always fighting,” we don’t specifically talk about what we do nor who we are in a cyber ‘knife fight’ with; however, we are “Everywhere and Always…In the Fight!”

Story by Steven Stover
780th Military Intelligence Brigade (Cyber)

Summer Interns Gain Valuable Experience at PEO IEW&S

Sunday, August 10th, 2025

Using modern agile development tools to verify the integrity of data to reduce vulnerabilities in cyber systems, implementing automation with required regulation and policy to secure vulnerable networks, developing guidebooks and processes for acquisition professionals to understand program protection – these are just some examples of the work being done by summer interns this year at Program Executive Office Intelligence, Electronic Warfare and Sensors (PEO IEW&S).

After the positive experiences from last year’s cohort, PEO IEW&S once again hosted several interns through the Defense Civilian Training Corps (DCTC). The intern program is a collaboration between academia and the Department of Defense. Scholars attending participating schools are selected through a vigorous and highly competitive process who, once selected, work on challenging projects submitted by DoD host organizations. Interns are provided security clearances, receive stipends and may be offered employment upon graduation.

Cheryl Litteral, Talent Manager/Human Capital Strategist for PEO IEW&S, has been an advocate for internship programs and what they bring to both the students and the organizations who host them. She described this year’s cohort by saying, “The Defense Civilian Training Corps is a program sponsored by the Acquisition Innovation Research Center (AIRC) that is designed to prepare college students with the skills and experience to contribute to the DoD mission immediately after placement. The 8-week summer internship pairs students with DoD organizations and allows them to work and solve real-world problems. Building the bench is one of the key tools we require to help us grow and evolve as an organization and these students are stellar examples of the talent, we need to achieve that goal.”

Three project management offices (PMs) from PEO IEW&S hosted DCTC interns for six weeks beginning in early June, ending July 25th. One organization that participated was Project Manager Cyber & Space (PM C&S), which develops, acquires, and fields offensive cyber and tactical space capabilities that protect the Soldier, the Nation and enable cyberspace superiority. PM C&S challenged their two Virginia Tech Computational Modeling & Data Analytics majors, Paige Barnhart, and Ryan Pini, to an offensive cyber operational project where they tried to detect and prevent any issues with data integrity specifically with Packet Capture (PCAP) data. PCAP data contains the exact data transmitted between devices on a network, which has a history of causing problems with software used to process that data. According to James Kettner, System Engineer and mentor to the interns, “It was a well-scoped problem, and they went after it, using a modern set of agile development tools”. Mentor and civilian supervisor Wendi Duffy, Product Support Manager for PM C&S said “what they (the interns) bring to the organization I think is a new perspective. I think so often we get jaded in our world because we’re dealing with the same customers, the same products and when the interns come in, they look at it and can bring something totally different.”

PEO IEW&S’s PM Aircraft Survivability Equipment (PM ASE) also hosted two interns this summer. PM ASE develops and manages systems that protect military aircraft from threats such as enemy missiles, radar, and electronic warfare. William Buinicki attends Purdue as a cybersecurity and network engineering major and Lake Gohlke attends Virginia Tech, also a cybersecurity and network engineering major. Buinicki and Gohlke both applied to the DCTC program and were interested in the project submitted by PM ASE. This project involved assisting current PM ASE cybersecurity personnel in improving the organization’s cybersecurity posture via documentation improvement and vulnerability identification and remediation. By assisting with policy review and policy implementation, the scholars would be able to experience the complexities of implementing required regulation and policy into difficult to fit areas.

Gohlke said “I saw this project on the listing back in February and I thought it was a great opportunity to build on the basics that I’ve already been learning in class and really contribute to the workforce here.”

Brian Cary, Information System Security Manager and mentor, worked with the interns first with an overview of the risk management framework and how it relates to acquisition policies and regulations and then was able to transition to a hands-on approach with the interns, specifically introducing them to the tools the DoD uses to secure its networks. The interns were able to assist the team in preparing configuration reports and generate some automated capabilities. Cary said, “They were able to provide a foundation for some automation that we can definitely carry forward into the future, it’s not just a project that they worked and will be set aside.”

David Blevins, PM ASE Chief Information Officer and mentor/supervisor to the interns was also impressed with the work Buinicki and Gohlke were able to accomplish in a mere 6 weeks. “Having them assigned with Brian and them making a true impact versus simply catering to them as visitors or walking them around to show them different things, they made a true impact.”

PM Positioning, Navigation, and Timing (PM PNT), which develops and fields technologies that provide Soldiers with reliable and resilient navigation and timing capabilities in GPS-contested environments, is another organization under PEO IEW&S that submitted a project to the DCTC internship program. Their project required the DCTC intern to develop a Program Protection roadmap with an acquisition lifecycle checklist for Assistant Product Manager’s (APMs) to codify lessons learned and provide continuity during turnover. In this project, DCTC Scholars would develop a Program Protection Overview roadmap with an acquisition lifecycle checklist to identify key milestones and events for Supply Chain Risk Management (SCRM), Program Protection Assessments, Cyber, tailored risk mitigation contract language, and other program protection activities planning for APMs

DCTC Intern Adam Lieu attends the University of Arizona as a management information systems major. He applied to the program with an interest in government service. He said, “this internship and the experience I’ve had here has given me a pretty unique skill set as far as people going into their senior year of college.” Lieu was able to earn a program protection credential while also working on the project.During his six weeks at PM PNT, Lieu created an APM guidebook consisting of flow charts, slides and acronym lists that will bridge a knowledge gap for the APMs.

Karie Anderson, civilian mentor/supervisor to Lieu and security specialist for PM PNT, said this was the organization’s first experience with the DCTC internship. “He has been absolutely amazing, taking on our project has been a great experience, he really attacked it being very APM centric and he really took ownership, and he gave us a product that the Army can really use. I would say too if there’s any other organization or civilian who’s thinking about submitting a project for consideration, you should do it. It is well worth it.”

Lieu was impressed with the communication and how supported he felt through the whole process from the beginning from both the DCTC side and the PM PNT. There was ample communication from the beginning that he felt he could hit the ground running.

With the end of another internship cycle at PEO IEW&S, one can see how today’s students are already making impacts and contributing to the Army’s mission.

By Allison Weissert, PEO IEW&S Public Affairs Specialist

Forging the Future: ARCYBER Integrates AI to Transform Cyberspace Operations

Wednesday, August 6th, 2025

FORT GORDON, Ga. — The U.S. Army Cyber Command is advancing an ambitious multi-year plan to operationalize artificial intelligence across its digital battle space, aiming to enhance cybersecurity defenses, accelerate analysis and empower its Soldiers.

In spring 2023, Lt. Gen. Maria B. Barrett catalyzed a transformation by tasking the command to harness automation and AI — not for novelty, but to make missions more effective, decisions smarter and time more available for the people behind the screens.

“AI is not a luxury — it’s a necessity. Our mission demands speed, precision, and adaptability, and artificial intelligence is the force multiplier that enables all three,” Barrett emphasized. Since then, ARCYBER has rolled out a strategic roadmap focused on phased AI-human teaming, with milestones spanning from assisted operations to semi-autonomous digital agents by 2033.

Early results are already reshaping how the military fights and defends in cyberspace.

PANOPTIC JUNCTION, an AI-driven continuous monitoring platform designed to learn how systems are built, identify their most vulnerable points by analyzing system architecture and threat intelligence, and then automatically direct monitoring tools to watch those specific areas. In its prototype phase, it achieved an impressive 87% success rate in detecting malicious activity. ARCYBER is now implementing a 12-month production pilot to accelerate its adoption.

GHOSTCREW equips red team operatives with AI simulations to predict attack paths and recommend mission actions. By integrating human and machine expertise, the tool allows junior operators to benefit from the insights of seasoned veterans.

To enhance analytical depth, the Analytic Superiority Task Force leveraged AI tools from the Cyber Protection Brigade’s GEMINI project to uncover hidden enemy command-and-control infrastructure embedded in DNS traffic. This achievement would’ve eluded traditional analysis methods, taking days rather than minutes to analyze the data.

ARCYBER isn’t just focusing on mission execution. Projects like STORMYARCHER, an AI coding assistant pilot, and QUESCRIBE, an automated document reviewer, show the command’s intent to streamline support operations and strengthen developer capabilities. Despite early setbacks, teams learned critical lessons about infrastructure and performance, which led to the development of custom-built solutions that effectively meet operational needs.

In the public affairs realm, QUESCRIBE’s impact is already being felt. “QUESCRIBE, even in its pilot phase, has already proven itself to be a game-changer,” said Maj. Lindsay D. Roman, chief of public affairs for ARCYBER. “It’s dramatically streamlined our review workflow, eliminating time-intensive tasks and allowing my team and others involved to focus on higher-priority efforts — from crisis communications to strategic messaging. I love it already — it’s a powerful example of how thoughtful AI integration can translate directly into mission impact.”

Meanwhile, the grassroots AI Users Group puts tools like Ask Sage and CAMOGPT into the hands of Soldiers and civilians, fostering everyday innovation and productivity.

The backbone of these efforts is a robust governance framework. An AI Governance Board ensures ethical alignment, compliance and the effective deployment of capabilities. Its oversight began with QUESCRIBE, emphasizing transparency and user education from the outset.

Looking ahead, ARCYBER has its sights set on next-gen pilots:

  • PIXIEMIRROR, which will use AI to compare classified threat indicators across unclassified data sources.
  • AI-powered task routing is designed to deliver the right task to the right expert with minimal lag.
  • NETCOM’s Unified Network Operations Dashboard which consolidates network data into a single decision-making interface.

ARCYBER’s adoption of AI isn’t a leap — it’s a methodical march. By pairing machine intelligence with human ingenuity, ARCYBER is building an adaptable cyber force ready to dominate the information environment.

“Machine Intelligence will be the decisive advantage in future decision making, maneuver and generation of capability — our job is to ensure every algorithm answers to a purpose, not just a possibility,” said Mark A. “Al” Mollenkopf, science advisor and chief analytics officer for ARCYBER.

That principle may be the command’s most significant asset of all.

By Lindsay D. Roman

Army Principal Cyber Advisor Commends ARCYBER Innovations in Electromagnetic and Cyberspace Dominance

Saturday, August 2nd, 2025

FORT GORDON, Ga. — The Army’s top cyber strategist, Mr. Brandon Pugh, principal cyber advisor to the secretary of the Army, concluded a landmark three-day visit to Army Cyber Command Headquarters in late July, signaling strong support for the command’s forward-thinking approach to cyber readiness and modernization.

Following his recent appointment in June, Mr. Pugh’s inaugural trip from July 21-23 included extensive briefings and firsthand engagement with ARCYBER’s top talent and trailblazing technology. His itinerary spanned operational hubs, innovation centers and tactical units — each reinforcing the Army’s commitment to digital superiority in today’s increasingly complex and contested battlespace.

Operational Insights and Talent Retention

Early in the visit, Mr. Pugh was briefed on the need for the Cyber Readiness Skills Pay initiative, designed to incentivize retention of high-demand cyber professionals. Leadership briefed him on ARCYBER’s mission, structure and ongoing readiness programs, emphasizing the strategic need to empower and sustain elite cyber forces.

Frontline Innovation at the 11th Cyber Battalion

A key highlight of Mr. Pugh’s visit was his in-depth engagement with the capability developers from the 11th Cyber Battalion, who showcased a range of innovative, in-house engineered devices tailored to meet the unique operational needs of the expeditionary cyber teams. These demonstrations featured customized solutions designed to bridge target network connections and identify adversary emitters across the battlefield.

Mr. Pugh observed demonstrations by expeditionary firing crews — five-person teams capable of delivering strategic cyber effects in support of theater-level objectives, combining cyber operations and electromagnetic warfare in ways previously unseen.

Drones and Dominance

The 11th Battalion is accelerating its Small Unmanned Aircraft System Training Program around the secretary of defense’s “Unleashing U.S. Military Drone Dominance” directive and now leads efforts to rapidly produce drone teams. With authority to directly acquire drones under 55 pounds, the battalion equips forces to execute electromagnetic reconnaissance and ISR missions across global theaters.

The SUAS capability promises full integration into beyond line of sight tactics, techniques, procedures and concept of operations by the end of 2026 — paving the way for drone-led data supremacy on tomorrow’s battlefields.

Driving Strategy Across Components

Beyond tech showcases, Mr. Pugh engaged ARCYBER leadership on key policy and structural enhancements, including:

Expanding the use of National Guard and Reserve cyber units

Strengthening electromagnetic warfare resources at the division level and below

Increasing strategic communications to highlight ARCYBER’s unique warfighting contributions

He concluded the visit by expressing a strong intent to continue collaborating closely with the team and aligning efforts to support their evolving mission needs. He announced an upcoming visit to the Cyber Center of Excellence, signaling enduring collaboration with cyber leadership.

Building the Future of Warfare

Mr. Pugh’s visit reaffirmed the Army’s vision for cyber dominance — one shaped not just by emerging technology but by mission-aligned innovation.

“Technology is critical in today’s battlefield, and it is imperative that our warfighters fully leverage and lead with it, from cyber to drones,” Mr. Pugh noted. “ARCYBER’s work is a blueprint for building capabilities that achieve that goal and sharpen our warfighting edge.”

By Lindsay Roman