Aquaterro

Archive for the ‘Cyber’ Category

TIAD Activation Marks New Chapter for ARCYBER

Tuesday, October 14th, 2025

Fort Gordon, GA —U.S. Army Cyber Command (ARCYBER) activated the second Theater Information Advantage Detachment (TIAD) during a ceremony held at the Cyber Conference and Catering Center at Fort Gordon Friday, October 3, 2025.

The activation marks a pivotal step in the Army’s evolving approach to information warfare.

Col. John Agnello, 2nd TIAD Commander, took charge of the ARCYBER TIAD, guiding a unit focused on supporting operations across the broader information environment. In remarks at TechNet Augusta earlier this year, Agnello highlighted the growing relevance of the TIAD’s mission in today’s complex strategic landscape.

“In an era where information is both weapon and shield, the mission of this detachment is nothing short of strategic necessity,” said Agnello “But no algorithm or system can replace the ingenuity and resolve of our soldiers. This TIAD is built on the shoulders of soldiers who bring not only technical mastery, but the courage to challenge, the creativity to adapt, and the conviction to lead. I’m honored to command a team that doesn’t just execute the mission; they embody it. They are the Army’s advantage in the information fight, and a key reason we’re positioned to succeed.”

The ARCYBER TIAD is one of three planned detachments tailored to specific geographic commands: Indo-Pacific, Europe, and ARCYBER itself. Each TIAD integrates disciplines such as cyber operations, electronic warfare, psychological operations, civil affairs, and public affairs into a unified team.

The activation ceremony served as an opportunity for soldiers and civilians from across the cyber and Information Operations community to gather and witness the birth of a unit that promises to redefine how the Army competes in the digital age.

Lt. Gen. Maria Barrett, Commander of ARCYBER, praised the TIAD concept during the Association of the U.S. Army’s 2024 annual meeting, noting that these detachments are essential for countering disinformation and malign influence:

“From the Signal Corps of World War II to the satellite networks of Desert Storm, the Army has always adapted to the character of conflict. Today, with the activation of this TIAD, we carry that legacy forward—into the information domain, where influence is decisive and truth must be defended. This is not just a new unit; it’s the next chapter in how the Army fights and wins.”

With its activation, the ARCYBER TIAD now stands at Initial Operating Capability—a foundational milestone that marks the beginning of its operational journey. As the unit builds toward Full Operating Capability, it will continue refining its integration across cyber, information, and influence disciplines, ensuring commanders have the tools and insights needed to compete effectively in the information environment across the competition continuum.

The road ahead is deliberate and mission-focused, with each step reinforcing the Army’s commitment to shaping the future of information warfare through innovation, agility, and the strength of its people.

Story by MAJ Lindsay Roman

U.S. Army Cyber Command

Army’s Principal Cyber Advisor Says Cyber Key to Preparing for Future Fight

Monday, September 22nd, 2025

WASHINGTON — Cyber is central to the Army’s once-in-a-generation transformation and to defending the homeland’s critical infrastructure, said Principal Cyber Advisor to the Secretary of the Army Brandon Pugh to attendees at the Billington CyberSecurity Summit, Sept. 11.

Pugh said the Army’s Continuous Transformation aims to put the right technology in Soldiers’ hands faster while strengthening readiness for the future battlefield — where cybersecurity underpins everything from base operations to mobilization.

“This is our effort to make sure the Army is adapting to the future battlefield,” Pugh said. “Cyber is a key component of Army Continuous Transformation.”

Pugh participated in “The Future of Cyber Threat” panel, moderated by Chris Townsend, an Elastic vice president. Alongside Pugh were Col. Ivan Kalabashkin, Deputy Head of Ukraine’s Security Services Cyber Division; Vikram Thakur, Technical Director at Broadcom; and Josh Salmanson, Vice President for the Defense Cyber Practice at Leidos. Panelists discussed a range of cyber-related issues.

People first

“People are the core of the Army,” Pugh said, noting that modernization efforts revolve around Soldiers and Army civilians who defend the nation every day. He highlighted opportunities to better harness the skills of Army National Guard and Army Reserve cyber professionals — many of whom work in cybersecurity in their civilian careers. “Who is better positioned to defend a critical infrastructure threat than the people who live there?” he asked.

Protecting critical infrastructure at home

Pugh emphasized that defending the homeland is a top priority, and that the Army has a direct stake because vulnerabilities in privately owned critical infrastructure — from power grids to transportation networks — can affect Army installations and unit mobilization. He pointed to assessments by the Army Cyber Institute at the U.S. Military Academy at West Point that examine how infrastructure weaknesses could disrupt the Army’s ability to project forces in crisis or conflict. “We need to be able to mobilize forces and equipment at a moment’s notice,” he said.

When asked how to address critical infrastructure vulnerabilities, Salmanson urged organizations to “get back to the basics” — patching systems, reducing vulnerabilities and avoiding shared passwords — to cut noise in networks and improve response to new threats. “We’re seeing higher volumes and better quality [attacks] consistently,” he said.

AI for cyber — at scale

Panelists agreed adversaries are already using artificial intelligence to increase the speed and quality of attacks. Kalabashkin said Ukraine has faced more than 13,000 cyberattacks on government and critical infrastructure systems since the start of the full-scale war, with Russia using AI in recent months to scan for network vulnerabilities.

Pugh said the Army is leaning into AI where it can provide a decisive edge. “How can AI be used more effectively and at scale for defensive cyber operations and perhaps even offensive cyber operations?” he asked, noting strong work already underway across Army Cyber Command and U.S. Cyber Command. “We should leverage AI to gain the upper hand — a force multiplier for our Soldiers.”

Speed to capability

Pugh said the Army is working to shorten timelines to field cyber capabilities, particularly from innovative companies with niche solutions. “If you have a unique capability that can add value to the military, there should be an ability to get that in the hands of a warfighter and test it in weeks,” he said. That effort, he added, aligns with the Army’s broader push to transform how it acquires, tests and fields technology.

By MAJ Sean M. Minton

Army’s New Cyber Advisor Sets Tone for Priorities

Friday, August 29th, 2025

WASHINGTON — Bringing innovative technologies to Soldiers and incorporating next generation software and capabilities will be among the priorities of the Army’s new top cyber strategist.

Brandon Pugh outlined his duties as the Principal Cyber Advisor to the Secretary of the Army during a discussion in Augusta, Georgia, Thursday.

Pugh, a Rutgers Law School graduate, not only boasts the cybersecurity experience and education to advise service leaders but Pugh, an officer in the Army reserve, can relate to the Soldiers his leadership will influence, having served as a paratrooper, international law officer and now as a national security law professor while in uniform.

Pugh was a non-resident fellow at the U.S. Military Academy and served as legislative counsel at the New Jersey General Assembly Minority Office, managing policy and legislation related to cybersecurity.

Pugh became the third person to be named PCA after President Donald Trump nominated him June 16, becoming the first political appointee to the role.

Pugh said that bolstering the Army’s cyber capabilities and cybersecurity aligns with the service’s continuous transformation priorities, where the service will leverage the latest technologies to keep pace with adversaries.

“I truly believe in the direction the Army is going,” Pugh said. “The Army’s continuous transformation is really a unique window in transforming the Army overall to the current battlefield, as well as where the future one is. And I think cyber is a key part of that.”

Pugh said his goals for Army cyber include pushing AI capabilities to the warfighter and fulfilling the president’s priority of defending the homeland. He said national defense can be achieved by bolstering the service’s cyber offensive and defensive capabilities.

“Transformation is really delivering capabilities to the warfighter in a quick speed. That’s just not a buzzword. How do I interpret that for our office?” he said. “It’s really looking at the nexus of AI and cyber. ARCYBER is doing a great job under [ … Army Cyber Command Science Advisor and Chief Analytics Officer Mark A. “Al” Mollenkopf’s] leadership, but I think that’s the direction we need to go in.”

Pugh will lead his office from the Pentagon and collaborate with Leonel Garciga, the Army’s Chief Information Officer, and other senior leaders. Pugh’s council comes at a critical time as Secretary of Defense Pete Hegseth identified cyber among the Army’s top areas to invest.

This fall, Army Cyber Command, based at Fort Gordon, Georgia, will form the first of its three Theater Information Advantage Detachments, which will focus on U.S. adversaries in the realm of cyber information. Pugh visited Fort Gordon, Georgia, in late July including meeting with Army cyber capability developers at the 11th Cyber Battalion.

Pugh said that further incorporating the National Guard and his fellow reservists into ARCYBER and broader cyber efforts will be among his priorities. He said that many members of the guard and Army Reserve boast skills in the areas of cyber and technology that could benefit the Army’s cyber capabilities.

The Army established its Cyber Direct Commissioning Program, or CDCP, for those who possess key experience in the cyber field or education to be appointed to the Army’s Cyber Corps in the ranks of lieutenant to colonel.

“I see this as a total Army. We need our active-duty Soldiers, but we also need our Reservists and our Guardsmen, and I’ll add civilians on top of that,” Pugh said. “I think we see awesome examples of the Guard and Reserve being utilized.”

Pugh added that Guardsmen work in local communities where they can contribute to critical infrastructure defense.

“Some of these Reserve and Guardsmen have incredible skill sets. They’re in C-suite (top cyber strategy) positions sometimes in their civilian world [positions]. To make sure we’re leveraging them, I think is key.”

By Joe Lacdan Army News Service

Army Principal Cyber Advisor Visits U.S. Army’s Only Offensive Cyber Operations Brigade

Thursday, August 14th, 2025

FORT GEORGE G. MEADE, MD – Mr. Brandon Pugh, the U.S. Army’s Principal Cyber Advisor to the Secretary of the Army, visited the 780th Military Intelligence Brigade (Cyber) on August 6. The brigade is the Army’s sole offensive cyber operations unit, playing a pivotal role in national defense and cyber warfare.

The visit followed Mr. Pugh’s three-day trip to U.S. Army Cyber Command (ARCYBER) headquarters at Fort Gordon, Georgia, where he received briefings and engaged directly with ARCYBER’s top talent.

“The 780th Military Intelligence Brigade (Cyber) is on the frontline of defending our nation and conducting cyber operations,” said Brandon Pugh, the Army’s Principal Cyber Advisor. “The brigade is an invaluable component of the United States’ cyber enterprise. My visit to the 780th Military Intelligence Brigade (Cyber) was an extraordinary opportunity to meet Soldiers conducting these important cyber operations and to see its unique capabilities firsthand.”

During his time in Georgia, Mr. Pugh met with capability developers from the 11th Cyber Battalion, who showcased innovative, in-house engineered devices tailored to meet the operational needs of expeditionary cyber teams. He also interacted with Soldiers from the 782nd Military Intelligence Battalion (Cyber), who support Cyber Joint Force Headquarters (JFHQ-C) for the Army, Air Force, Navy, and Marine Corps.

The 780th MI BDE (Cyber) is geographically dispersed across four states. The brigade headquarters, the 781st MI Battalion (Cyber), and the Operations Support Element (OSE), are based at Fort George G. Meade, Maryland; the 11th CY Battalion and 782d MI Battalion (Cyber) are headquartered at Fort Gordon, Georgia; and the 782d has operational detachments in Hawaii and Texas.

According to the Brigade commanding officer, Col. Candy Boparai, the 780th MI BDE (Cyber) is a critical enabler of ARCYBER and U.S. Cyber Command (USCYBERCOM), delivering unique, multi-domain capabilities to sense, understand, and deliver effects in the information environment.

“The 780th MI Brigade (Cyber) directly supports USCYBERCOM’s core missions: defending the Nation and conducting cyber operations to achieve Combatant Command objectives,” said Boparai. “We operate as a key component of the Army’s Cyber Mission Force (CMF), specifically providing National Mission Teams, National Support Teams, Combat Mission Teams, and Combat Support Teams, and Capability Solutions Developers.”

According to Command Sgt. Maj. Joseph Daniel, the brigade’s senior enlisted leader, “As the Army’s only offensive cyber force, the 780th provides unique capabilities to sense, understand, and deliver tactical, operational and strategic cyber effects globally to achieve Combatant Command objectives.”

Daniel remarked that the brigade supports Joint Force efforts, leveraging their more than 2,100 personnel to address cyber challenges worldwide; and the brigade’s cyber teams, 11th CY BN Expeditionary CEMA (cyberspace electromagnetic activities) Teams (ECTs), and developers are all actively involved in regular cyber operations, collaborating with USCYBERCOM, Army electronic warfare units, and other partners.

In addition to receiving briefings, Mr. Pugh was able to see a live operation in the brigade’s Joint Mission Operations Center and view an Army Continuous Transformation drone demonstration by the OSE Cyber Solutions Development team.

As part of the Principal Cyber Advisor’s briefing, the brigade discussed the training requirements to achieve and maintain mastery in a Cyber Soldier’s assignment. These requirements are executed at the brigade, following their training at the U.S. Army Cyber School. The additional training can range from several months to more than a year and continues as the Soldiers progress.

“The Army’s most significant inputs into cyber readiness are presenting high quality personnel and providing the supporting talent management policies to sustain them in Cyber Mission Force long enough to achieve and maintain mastery in their skillsets,” said Boparai. “We are the only U.S. Army offensive cyber operations brigade and our focus as the administrative command headquarters is to man, train, equip, assess and enable the Army CMF and CEMA teams in accordance with published USCYBERCOM and ARCYBER standards.”

The 780th MI Brigade (Cyber) motto is inscribed on the organization’s Distinctive Unit Insignia “Ubique Et Semper In Pugna.” Latin for “Everywhere and always fighting,” we don’t specifically talk about what we do nor who we are in a cyber ‘knife fight’ with; however, we are “Everywhere and Always…In the Fight!”

Story by Steven Stover
780th Military Intelligence Brigade (Cyber)

Summer Interns Gain Valuable Experience at PEO IEW&S

Sunday, August 10th, 2025

Using modern agile development tools to verify the integrity of data to reduce vulnerabilities in cyber systems, implementing automation with required regulation and policy to secure vulnerable networks, developing guidebooks and processes for acquisition professionals to understand program protection – these are just some examples of the work being done by summer interns this year at Program Executive Office Intelligence, Electronic Warfare and Sensors (PEO IEW&S).

After the positive experiences from last year’s cohort, PEO IEW&S once again hosted several interns through the Defense Civilian Training Corps (DCTC). The intern program is a collaboration between academia and the Department of Defense. Scholars attending participating schools are selected through a vigorous and highly competitive process who, once selected, work on challenging projects submitted by DoD host organizations. Interns are provided security clearances, receive stipends and may be offered employment upon graduation.

Cheryl Litteral, Talent Manager/Human Capital Strategist for PEO IEW&S, has been an advocate for internship programs and what they bring to both the students and the organizations who host them. She described this year’s cohort by saying, “The Defense Civilian Training Corps is a program sponsored by the Acquisition Innovation Research Center (AIRC) that is designed to prepare college students with the skills and experience to contribute to the DoD mission immediately after placement. The 8-week summer internship pairs students with DoD organizations and allows them to work and solve real-world problems. Building the bench is one of the key tools we require to help us grow and evolve as an organization and these students are stellar examples of the talent, we need to achieve that goal.”

Three project management offices (PMs) from PEO IEW&S hosted DCTC interns for six weeks beginning in early June, ending July 25th. One organization that participated was Project Manager Cyber & Space (PM C&S), which develops, acquires, and fields offensive cyber and tactical space capabilities that protect the Soldier, the Nation and enable cyberspace superiority. PM C&S challenged their two Virginia Tech Computational Modeling & Data Analytics majors, Paige Barnhart, and Ryan Pini, to an offensive cyber operational project where they tried to detect and prevent any issues with data integrity specifically with Packet Capture (PCAP) data. PCAP data contains the exact data transmitted between devices on a network, which has a history of causing problems with software used to process that data. According to James Kettner, System Engineer and mentor to the interns, “It was a well-scoped problem, and they went after it, using a modern set of agile development tools”. Mentor and civilian supervisor Wendi Duffy, Product Support Manager for PM C&S said “what they (the interns) bring to the organization I think is a new perspective. I think so often we get jaded in our world because we’re dealing with the same customers, the same products and when the interns come in, they look at it and can bring something totally different.”

PEO IEW&S’s PM Aircraft Survivability Equipment (PM ASE) also hosted two interns this summer. PM ASE develops and manages systems that protect military aircraft from threats such as enemy missiles, radar, and electronic warfare. William Buinicki attends Purdue as a cybersecurity and network engineering major and Lake Gohlke attends Virginia Tech, also a cybersecurity and network engineering major. Buinicki and Gohlke both applied to the DCTC program and were interested in the project submitted by PM ASE. This project involved assisting current PM ASE cybersecurity personnel in improving the organization’s cybersecurity posture via documentation improvement and vulnerability identification and remediation. By assisting with policy review and policy implementation, the scholars would be able to experience the complexities of implementing required regulation and policy into difficult to fit areas.

Gohlke said “I saw this project on the listing back in February and I thought it was a great opportunity to build on the basics that I’ve already been learning in class and really contribute to the workforce here.”

Brian Cary, Information System Security Manager and mentor, worked with the interns first with an overview of the risk management framework and how it relates to acquisition policies and regulations and then was able to transition to a hands-on approach with the interns, specifically introducing them to the tools the DoD uses to secure its networks. The interns were able to assist the team in preparing configuration reports and generate some automated capabilities. Cary said, “They were able to provide a foundation for some automation that we can definitely carry forward into the future, it’s not just a project that they worked and will be set aside.”

David Blevins, PM ASE Chief Information Officer and mentor/supervisor to the interns was also impressed with the work Buinicki and Gohlke were able to accomplish in a mere 6 weeks. “Having them assigned with Brian and them making a true impact versus simply catering to them as visitors or walking them around to show them different things, they made a true impact.”

PM Positioning, Navigation, and Timing (PM PNT), which develops and fields technologies that provide Soldiers with reliable and resilient navigation and timing capabilities in GPS-contested environments, is another organization under PEO IEW&S that submitted a project to the DCTC internship program. Their project required the DCTC intern to develop a Program Protection roadmap with an acquisition lifecycle checklist for Assistant Product Manager’s (APMs) to codify lessons learned and provide continuity during turnover. In this project, DCTC Scholars would develop a Program Protection Overview roadmap with an acquisition lifecycle checklist to identify key milestones and events for Supply Chain Risk Management (SCRM), Program Protection Assessments, Cyber, tailored risk mitigation contract language, and other program protection activities planning for APMs

DCTC Intern Adam Lieu attends the University of Arizona as a management information systems major. He applied to the program with an interest in government service. He said, “this internship and the experience I’ve had here has given me a pretty unique skill set as far as people going into their senior year of college.” Lieu was able to earn a program protection credential while also working on the project.During his six weeks at PM PNT, Lieu created an APM guidebook consisting of flow charts, slides and acronym lists that will bridge a knowledge gap for the APMs.

Karie Anderson, civilian mentor/supervisor to Lieu and security specialist for PM PNT, said this was the organization’s first experience with the DCTC internship. “He has been absolutely amazing, taking on our project has been a great experience, he really attacked it being very APM centric and he really took ownership, and he gave us a product that the Army can really use. I would say too if there’s any other organization or civilian who’s thinking about submitting a project for consideration, you should do it. It is well worth it.”

Lieu was impressed with the communication and how supported he felt through the whole process from the beginning from both the DCTC side and the PM PNT. There was ample communication from the beginning that he felt he could hit the ground running.

With the end of another internship cycle at PEO IEW&S, one can see how today’s students are already making impacts and contributing to the Army’s mission.

By Allison Weissert, PEO IEW&S Public Affairs Specialist

Forging the Future: ARCYBER Integrates AI to Transform Cyberspace Operations

Wednesday, August 6th, 2025

FORT GORDON, Ga. — The U.S. Army Cyber Command is advancing an ambitious multi-year plan to operationalize artificial intelligence across its digital battle space, aiming to enhance cybersecurity defenses, accelerate analysis and empower its Soldiers.

In spring 2023, Lt. Gen. Maria B. Barrett catalyzed a transformation by tasking the command to harness automation and AI — not for novelty, but to make missions more effective, decisions smarter and time more available for the people behind the screens.

“AI is not a luxury — it’s a necessity. Our mission demands speed, precision, and adaptability, and artificial intelligence is the force multiplier that enables all three,” Barrett emphasized. Since then, ARCYBER has rolled out a strategic roadmap focused on phased AI-human teaming, with milestones spanning from assisted operations to semi-autonomous digital agents by 2033.

Early results are already reshaping how the military fights and defends in cyberspace.

PANOPTIC JUNCTION, an AI-driven continuous monitoring platform designed to learn how systems are built, identify their most vulnerable points by analyzing system architecture and threat intelligence, and then automatically direct monitoring tools to watch those specific areas. In its prototype phase, it achieved an impressive 87% success rate in detecting malicious activity. ARCYBER is now implementing a 12-month production pilot to accelerate its adoption.

GHOSTCREW equips red team operatives with AI simulations to predict attack paths and recommend mission actions. By integrating human and machine expertise, the tool allows junior operators to benefit from the insights of seasoned veterans.

To enhance analytical depth, the Analytic Superiority Task Force leveraged AI tools from the Cyber Protection Brigade’s GEMINI project to uncover hidden enemy command-and-control infrastructure embedded in DNS traffic. This achievement would’ve eluded traditional analysis methods, taking days rather than minutes to analyze the data.

ARCYBER isn’t just focusing on mission execution. Projects like STORMYARCHER, an AI coding assistant pilot, and QUESCRIBE, an automated document reviewer, show the command’s intent to streamline support operations and strengthen developer capabilities. Despite early setbacks, teams learned critical lessons about infrastructure and performance, which led to the development of custom-built solutions that effectively meet operational needs.

In the public affairs realm, QUESCRIBE’s impact is already being felt. “QUESCRIBE, even in its pilot phase, has already proven itself to be a game-changer,” said Maj. Lindsay D. Roman, chief of public affairs for ARCYBER. “It’s dramatically streamlined our review workflow, eliminating time-intensive tasks and allowing my team and others involved to focus on higher-priority efforts — from crisis communications to strategic messaging. I love it already — it’s a powerful example of how thoughtful AI integration can translate directly into mission impact.”

Meanwhile, the grassroots AI Users Group puts tools like Ask Sage and CAMOGPT into the hands of Soldiers and civilians, fostering everyday innovation and productivity.

The backbone of these efforts is a robust governance framework. An AI Governance Board ensures ethical alignment, compliance and the effective deployment of capabilities. Its oversight began with QUESCRIBE, emphasizing transparency and user education from the outset.

Looking ahead, ARCYBER has its sights set on next-gen pilots:

  • PIXIEMIRROR, which will use AI to compare classified threat indicators across unclassified data sources.
  • AI-powered task routing is designed to deliver the right task to the right expert with minimal lag.
  • NETCOM’s Unified Network Operations Dashboard which consolidates network data into a single decision-making interface.

ARCYBER’s adoption of AI isn’t a leap — it’s a methodical march. By pairing machine intelligence with human ingenuity, ARCYBER is building an adaptable cyber force ready to dominate the information environment.

“Machine Intelligence will be the decisive advantage in future decision making, maneuver and generation of capability — our job is to ensure every algorithm answers to a purpose, not just a possibility,” said Mark A. “Al” Mollenkopf, science advisor and chief analytics officer for ARCYBER.

That principle may be the command’s most significant asset of all.

By Lindsay D. Roman

Army Principal Cyber Advisor Commends ARCYBER Innovations in Electromagnetic and Cyberspace Dominance

Saturday, August 2nd, 2025

FORT GORDON, Ga. — The Army’s top cyber strategist, Mr. Brandon Pugh, principal cyber advisor to the secretary of the Army, concluded a landmark three-day visit to Army Cyber Command Headquarters in late July, signaling strong support for the command’s forward-thinking approach to cyber readiness and modernization.

Following his recent appointment in June, Mr. Pugh’s inaugural trip from July 21-23 included extensive briefings and firsthand engagement with ARCYBER’s top talent and trailblazing technology. His itinerary spanned operational hubs, innovation centers and tactical units — each reinforcing the Army’s commitment to digital superiority in today’s increasingly complex and contested battlespace.

Operational Insights and Talent Retention

Early in the visit, Mr. Pugh was briefed on the need for the Cyber Readiness Skills Pay initiative, designed to incentivize retention of high-demand cyber professionals. Leadership briefed him on ARCYBER’s mission, structure and ongoing readiness programs, emphasizing the strategic need to empower and sustain elite cyber forces.

Frontline Innovation at the 11th Cyber Battalion

A key highlight of Mr. Pugh’s visit was his in-depth engagement with the capability developers from the 11th Cyber Battalion, who showcased a range of innovative, in-house engineered devices tailored to meet the unique operational needs of the expeditionary cyber teams. These demonstrations featured customized solutions designed to bridge target network connections and identify adversary emitters across the battlefield.

Mr. Pugh observed demonstrations by expeditionary firing crews — five-person teams capable of delivering strategic cyber effects in support of theater-level objectives, combining cyber operations and electromagnetic warfare in ways previously unseen.

Drones and Dominance

The 11th Battalion is accelerating its Small Unmanned Aircraft System Training Program around the secretary of defense’s “Unleashing U.S. Military Drone Dominance” directive and now leads efforts to rapidly produce drone teams. With authority to directly acquire drones under 55 pounds, the battalion equips forces to execute electromagnetic reconnaissance and ISR missions across global theaters.

The SUAS capability promises full integration into beyond line of sight tactics, techniques, procedures and concept of operations by the end of 2026 — paving the way for drone-led data supremacy on tomorrow’s battlefields.

Driving Strategy Across Components

Beyond tech showcases, Mr. Pugh engaged ARCYBER leadership on key policy and structural enhancements, including:

Expanding the use of National Guard and Reserve cyber units

Strengthening electromagnetic warfare resources at the division level and below

Increasing strategic communications to highlight ARCYBER’s unique warfighting contributions

He concluded the visit by expressing a strong intent to continue collaborating closely with the team and aligning efforts to support their evolving mission needs. He announced an upcoming visit to the Cyber Center of Excellence, signaling enduring collaboration with cyber leadership.

Building the Future of Warfare

Mr. Pugh’s visit reaffirmed the Army’s vision for cyber dominance — one shaped not just by emerging technology but by mission-aligned innovation.

“Technology is critical in today’s battlefield, and it is imperative that our warfighters fully leverage and lead with it, from cyber to drones,” Mr. Pugh noted. “ARCYBER’s work is a blueprint for building capabilities that achieve that goal and sharpen our warfighting edge.”

By Lindsay Roman

Commentary on a Concept to Create US Cyber Force

Sunday, July 6th, 2025

This is where I provide some commentary on commentary and originally appeared in Soldier Systems Digest, Vol 5, Issue 26.

The Pentagon knows its cyber force model is broken. Here’s how to fix it

The authors of this article revive the argument for establishing a US Cyber Force. I agree, except that the designation of Cyberspace as the fifth warfighting domain was myopic in the first place and establishing a “Cyber” force only gets part of the job done.

The reality is that Cyber is SIGINT by other means and that SIGINT is one of many elements of electromagnetic warfare. The EM spectrum is the true fifth domain.

To solve our current shortfalls, we must look to the past to face the future.

First, establish the US Security Service (USSS) as the sixth military service with specialization in offensive Cyber, Electromagnetic Warfare, and SIGINT. This requires a fix to the Title 10 / Title 50 issues which caused this bifurcation of effort in the first place.

Second, reconstitute service level versions of the Security Service which were stood down and merged with other Intel organizations in the 70s and 80s. Like the USSS, these service elements will provide offensive Cyber, EW, and SIGINT capabilities to support their own service branch.

Third, merge the National Security Agency and US Cyber Command once again into a single entity with additional technical control over Electromagnetic Warfare and an understanding that this entity controls offensive actions in addition to collection. Once again, the tweaking of Title 10 / Title 50 issues is critical.

Fourth, leave cyber security to the services as they establish and manage their own networks.

The new US Security Service will provide the National Cyber Force as well as the lead on national level EMS collection efforts and EW policy and execution. It will also provide forces to support joint warfighting at the Strategic, Operational, and Tactical Levels. Finally, it will establish a SOF component to support properly USSOCOM with a full seat at the table.

Unfortunately, cyber has become a generic term used by operations personnel to describe the full gamut of EW activities. While CEMA has been used here in the US as well as in the UK, Cyber ElectroMagnetic Activites seems to have lost favor even though it better describes the capability. As EW elements are embedded in Army formations under the Transformation In Contact initiative, Army combat arms Soldiers and Leaders will begin to use the term EW to generically refer to what is, EW. Unfortunately, they won’t be getting everything. The Army’s concept of EW is a stripped down capability which provides elementary direction finding and jamming, which makes it a hammer when it could be a scalpel. Signals will be geolocated without ample characterization and either jammed or passed to fires for destruction. This will invariably lead to the denial of exploitable nodes or the destruction of deceptive emitters while the real ones escape notice.

The Army is actually exacerbating the issue. The Army is combining USAREUR’s 2nd Multi-Domain Task Force with the 56th Artillery Command referring to “cyber” and traditional fires and defensive and offensive fires. The Army got the CEMA element correct in the 2nd MDTF, combining Cyber, EW, and SI in one organization. The danger is placing all of that capability under a commander who only understands that targets get destroyed.

Eric Graves
 Founder
 SSD