GORE-TEX WINDSTOPPER

Archive for the ‘EW’ Category

Summer Interns Gain Valuable Experience at PEO IEW&S

Sunday, August 10th, 2025

Using modern agile development tools to verify the integrity of data to reduce vulnerabilities in cyber systems, implementing automation with required regulation and policy to secure vulnerable networks, developing guidebooks and processes for acquisition professionals to understand program protection – these are just some examples of the work being done by summer interns this year at Program Executive Office Intelligence, Electronic Warfare and Sensors (PEO IEW&S).

After the positive experiences from last year’s cohort, PEO IEW&S once again hosted several interns through the Defense Civilian Training Corps (DCTC). The intern program is a collaboration between academia and the Department of Defense. Scholars attending participating schools are selected through a vigorous and highly competitive process who, once selected, work on challenging projects submitted by DoD host organizations. Interns are provided security clearances, receive stipends and may be offered employment upon graduation.

Cheryl Litteral, Talent Manager/Human Capital Strategist for PEO IEW&S, has been an advocate for internship programs and what they bring to both the students and the organizations who host them. She described this year’s cohort by saying, “The Defense Civilian Training Corps is a program sponsored by the Acquisition Innovation Research Center (AIRC) that is designed to prepare college students with the skills and experience to contribute to the DoD mission immediately after placement. The 8-week summer internship pairs students with DoD organizations and allows them to work and solve real-world problems. Building the bench is one of the key tools we require to help us grow and evolve as an organization and these students are stellar examples of the talent, we need to achieve that goal.”

Three project management offices (PMs) from PEO IEW&S hosted DCTC interns for six weeks beginning in early June, ending July 25th. One organization that participated was Project Manager Cyber & Space (PM C&S), which develops, acquires, and fields offensive cyber and tactical space capabilities that protect the Soldier, the Nation and enable cyberspace superiority. PM C&S challenged their two Virginia Tech Computational Modeling & Data Analytics majors, Paige Barnhart, and Ryan Pini, to an offensive cyber operational project where they tried to detect and prevent any issues with data integrity specifically with Packet Capture (PCAP) data. PCAP data contains the exact data transmitted between devices on a network, which has a history of causing problems with software used to process that data. According to James Kettner, System Engineer and mentor to the interns, “It was a well-scoped problem, and they went after it, using a modern set of agile development tools”. Mentor and civilian supervisor Wendi Duffy, Product Support Manager for PM C&S said “what they (the interns) bring to the organization I think is a new perspective. I think so often we get jaded in our world because we’re dealing with the same customers, the same products and when the interns come in, they look at it and can bring something totally different.”

PEO IEW&S’s PM Aircraft Survivability Equipment (PM ASE) also hosted two interns this summer. PM ASE develops and manages systems that protect military aircraft from threats such as enemy missiles, radar, and electronic warfare. William Buinicki attends Purdue as a cybersecurity and network engineering major and Lake Gohlke attends Virginia Tech, also a cybersecurity and network engineering major. Buinicki and Gohlke both applied to the DCTC program and were interested in the project submitted by PM ASE. This project involved assisting current PM ASE cybersecurity personnel in improving the organization’s cybersecurity posture via documentation improvement and vulnerability identification and remediation. By assisting with policy review and policy implementation, the scholars would be able to experience the complexities of implementing required regulation and policy into difficult to fit areas.

Gohlke said “I saw this project on the listing back in February and I thought it was a great opportunity to build on the basics that I’ve already been learning in class and really contribute to the workforce here.”

Brian Cary, Information System Security Manager and mentor, worked with the interns first with an overview of the risk management framework and how it relates to acquisition policies and regulations and then was able to transition to a hands-on approach with the interns, specifically introducing them to the tools the DoD uses to secure its networks. The interns were able to assist the team in preparing configuration reports and generate some automated capabilities. Cary said, “They were able to provide a foundation for some automation that we can definitely carry forward into the future, it’s not just a project that they worked and will be set aside.”

David Blevins, PM ASE Chief Information Officer and mentor/supervisor to the interns was also impressed with the work Buinicki and Gohlke were able to accomplish in a mere 6 weeks. “Having them assigned with Brian and them making a true impact versus simply catering to them as visitors or walking them around to show them different things, they made a true impact.”

PM Positioning, Navigation, and Timing (PM PNT), which develops and fields technologies that provide Soldiers with reliable and resilient navigation and timing capabilities in GPS-contested environments, is another organization under PEO IEW&S that submitted a project to the DCTC internship program. Their project required the DCTC intern to develop a Program Protection roadmap with an acquisition lifecycle checklist for Assistant Product Manager’s (APMs) to codify lessons learned and provide continuity during turnover. In this project, DCTC Scholars would develop a Program Protection Overview roadmap with an acquisition lifecycle checklist to identify key milestones and events for Supply Chain Risk Management (SCRM), Program Protection Assessments, Cyber, tailored risk mitigation contract language, and other program protection activities planning for APMs

DCTC Intern Adam Lieu attends the University of Arizona as a management information systems major. He applied to the program with an interest in government service. He said, “this internship and the experience I’ve had here has given me a pretty unique skill set as far as people going into their senior year of college.” Lieu was able to earn a program protection credential while also working on the project.During his six weeks at PM PNT, Lieu created an APM guidebook consisting of flow charts, slides and acronym lists that will bridge a knowledge gap for the APMs.

Karie Anderson, civilian mentor/supervisor to Lieu and security specialist for PM PNT, said this was the organization’s first experience with the DCTC internship. “He has been absolutely amazing, taking on our project has been a great experience, he really attacked it being very APM centric and he really took ownership, and he gave us a product that the Army can really use. I would say too if there’s any other organization or civilian who’s thinking about submitting a project for consideration, you should do it. It is well worth it.”

Lieu was impressed with the communication and how supported he felt through the whole process from the beginning from both the DCTC side and the PM PNT. There was ample communication from the beginning that he felt he could hit the ground running.

With the end of another internship cycle at PEO IEW&S, one can see how today’s students are already making impacts and contributing to the Army’s mission.

By Allison Weissert, PEO IEW&S Public Affairs Specialist

Army Principal Cyber Advisor Commends ARCYBER Innovations in Electromagnetic and Cyberspace Dominance

Saturday, August 2nd, 2025

FORT GORDON, Ga. — The Army’s top cyber strategist, Mr. Brandon Pugh, principal cyber advisor to the secretary of the Army, concluded a landmark three-day visit to Army Cyber Command Headquarters in late July, signaling strong support for the command’s forward-thinking approach to cyber readiness and modernization.

Following his recent appointment in June, Mr. Pugh’s inaugural trip from July 21-23 included extensive briefings and firsthand engagement with ARCYBER’s top talent and trailblazing technology. His itinerary spanned operational hubs, innovation centers and tactical units — each reinforcing the Army’s commitment to digital superiority in today’s increasingly complex and contested battlespace.

Operational Insights and Talent Retention

Early in the visit, Mr. Pugh was briefed on the need for the Cyber Readiness Skills Pay initiative, designed to incentivize retention of high-demand cyber professionals. Leadership briefed him on ARCYBER’s mission, structure and ongoing readiness programs, emphasizing the strategic need to empower and sustain elite cyber forces.

Frontline Innovation at the 11th Cyber Battalion

A key highlight of Mr. Pugh’s visit was his in-depth engagement with the capability developers from the 11th Cyber Battalion, who showcased a range of innovative, in-house engineered devices tailored to meet the unique operational needs of the expeditionary cyber teams. These demonstrations featured customized solutions designed to bridge target network connections and identify adversary emitters across the battlefield.

Mr. Pugh observed demonstrations by expeditionary firing crews — five-person teams capable of delivering strategic cyber effects in support of theater-level objectives, combining cyber operations and electromagnetic warfare in ways previously unseen.

Drones and Dominance

The 11th Battalion is accelerating its Small Unmanned Aircraft System Training Program around the secretary of defense’s “Unleashing U.S. Military Drone Dominance” directive and now leads efforts to rapidly produce drone teams. With authority to directly acquire drones under 55 pounds, the battalion equips forces to execute electromagnetic reconnaissance and ISR missions across global theaters.

The SUAS capability promises full integration into beyond line of sight tactics, techniques, procedures and concept of operations by the end of 2026 — paving the way for drone-led data supremacy on tomorrow’s battlefields.

Driving Strategy Across Components

Beyond tech showcases, Mr. Pugh engaged ARCYBER leadership on key policy and structural enhancements, including:

Expanding the use of National Guard and Reserve cyber units

Strengthening electromagnetic warfare resources at the division level and below

Increasing strategic communications to highlight ARCYBER’s unique warfighting contributions

He concluded the visit by expressing a strong intent to continue collaborating closely with the team and aligning efforts to support their evolving mission needs. He announced an upcoming visit to the Cyber Center of Excellence, signaling enduring collaboration with cyber leadership.

Building the Future of Warfare

Mr. Pugh’s visit reaffirmed the Army’s vision for cyber dominance — one shaped not just by emerging technology but by mission-aligned innovation.

“Technology is critical in today’s battlefield, and it is imperative that our warfighters fully leverage and lead with it, from cyber to drones,” Mr. Pugh noted. “ARCYBER’s work is a blueprint for building capabilities that achieve that goal and sharpen our warfighting edge.”

By Lindsay Roman

Electronic Warfare Leader Passes Responsibility

Sunday, July 20th, 2025

Kenneth Strayer, Project Manager (PM) for the Project Management Office Electronic Warfare & Cyber (PM EW&C) passed the reins of leadership to incoming PM, Col. Scott Shaffer in a July 10 change of responsibility ceremony at Aberdeen Proving Ground, Md.

As the ceremony’s host, Brig. Gen. Ed Barker, Program Executive Officer for U.S. Army Program Executive Officer, Intelligence, Electronic Warfare and Sensors (PEO IEW&S) presented the Superior Civilian Service Award to Strayer on behalf of the Acting Army Acquisition Executive, Jesse D. Tolleson, Jr. Barker also accepted the PM EW&C charter from Strayer and passed it to Shaffer signifying the official change of responsibility.

“Ken has been at the forefront of bringing EW capabilities back to the battlefield for this generation. The need to dominate the electromagnetic spectrum is more important than ever,” said Barker.

Under Strayer’s leadership since 2021, PM EW&C demonstrated the highest levels of excellence in the program management of urgently needed operational capabilities and priority requirements for U.S. Army Commanders. He instituted innovative acquisition approaches in a highly classified environment and tailored programs through rapid prototyping and flexible contracting to accelerate delivery and facilitate learning of the doctrine, organization, and training requirements necessary to reinvigorate electromagnetic warfare (EW) as a core competency.

Strayer spearheaded the development and fielding of the Terrestrial Layer System Manpack, Electronic Warfare Planning and Management Tool (EWPMT), Tactical Electronic Warfare System – Infantry (TEWS-I), Tactical Space Superiority systems, and many other EW capabilities to the force. He gained approval and chartered a new Colonel/GS-15 led Project Management Office for Cyber and Space to provide focused program management and stakeholder engagement for the joint cyber community. Additionally, he established a new GS-14 led Product Lead Office for Strategic Spectrum Warfare to provide responsive support for the growth in echelons above brigade requirements.

During his tenure, including his service as Deputy Project Manager EW&C from 2017 to 2020, PM EW&C received the 2019 Project Management Office Team of the Year (O-6/GS-15 level) award and the 2018 David Packard award for Acquisition Excellence.

“I am so proud of the more than 250 professionals on our team that equipped our Army to dominate the electromagnetic spectrum, ready for the next fight. It’s been amazing to watch the team’s creativity in development and delivery of capabilities. It has been the greatest privilege in my career to lead the EW&C team and family,” said Strayer during his remarks at the ceremony.

As the new Project Manager, Shaffer will guide a workforce of military and civilian professionals who develop and field integrated capabilities for spectrum warfare. He comes to PM EW&C after serving as the Executive Officer to the Principal Military Deputy to the Assistant Secretary of the Army (Acquisition, Logistics, and Technology) (ASA(ALT)) and after leading Product Manager Mission Command Cyber under the Program Executive Office for Command, Control, and Communications – Tactical (PEO C3T).

“This is an exciting time with changes to the operational environment and threat where we need to be more agile and creative to ensure we have the most lethal force with the right mix of capabilities and resources. Thank you for this great opportunity to serve as the next Project Manager for PM EW&C,” Shaffer said, concluding the ceremony.

By Matthew Schramm

US Army Electromagnetic Warfare Capabilities Update

Monday, July 14th, 2025

Aberdeen Proving Ground, Md. – The U.S. Army is addressing a critical need for enhanced electromagnetic warfare (EW) capabilities with a new strategy and refined modernization approach. Recognizing a gap in extended-range, persistent ground and airborne EW assets, the Army is shifting its focus to improve targeting and provide commanders with the ability to effectively manipulate the electromagnetic spectrum in support of maneuver formations.

In March 2025, the Army published a comprehensive EW Strategy, designed to institutionalize enduring EW capabilities across the Army to support Joint Force operations. In conjunction with this strategy, the Army is refining its approach to the Terrestrial Layer System (TLS) for Brigade Combat Teams (BCT) and the Multifunction Electronic Warfare – Air Large (MFEW-AL) programs.

The recently concluded TLS BCT Rapid Prototyping program provided valuable insights into lightweight, modular architectures, informing the transition to the TLS Manpack as the primary EW/SIGINT system for all BCTs, with full fielding expected by FY28. Additionally, the Army plans to enhance TLS Manpack’s capabilities with vehicle agnostic modular adaptor kits (MAK) for mounted options that provide enhanced processing, extended range, and increased power. TLS Manpack will have the ability to provide EW capabilities at the brigade level, alongside distributed EW capabilities for division and higher echelons.

The MFEW-AL program will now prioritize leveraging Commercial-Off-The-Shelf (COTS) and Government-Off-The-Shelf (GOTS) solutions to rapidly deliver incremental capabilities for testing and feedback with Transformation in Contact (TiC) units in early Fiscal Year 2026. The program will utilize an incremental approach for delivery of capability that will evolve over time toward the full Army’s Airborne Electromagnetic Attack requirements.

These updates will be key in meeting recent direction from the Secretary of Defense that the Army remains the most lethal and ready land force in the world and achieve electromagnetic dominance by 2027.

Army Researchers Speed Up Delivery of Electromagnetic Warfare Capabilities

Tuesday, July 8th, 2025

ABERDEEN PROVING GROUND, Md. (July 7, 2025) — To accelerate the pace of deploying electromagnetic warfare techniques to Soldiers, Army researchers are developing new methods to deliver capabilities with greater speed and flexibility.

The Army Command, Control, Communications, Computers, Cyber, Intelligence, Surveillance and Reconnaissance (C5ISR) Center’s DynamIQ Electromagnetic Attack program improves how EW tools move rapidly across the battlefield to match the operational pace required in today’s warfare.

The Center’s research supports the Army’s EW Arsenal — demonstrated this year at Project Convergence Capstone 5 and Cyber Quest 2025 — that enables Soldiers to view a repository of available EW techniques, systems and targets. Given the mission objective and threats, users can understand their tools and quickly engage the adversary.

The key to C5ISR Center’s DynamIQ EA program is the ability to take validated EW techniques from the lab or from existing systems and transport them quickly to additional hardware platforms in a matter of hours, with no additional development time, according to a branch chief Shane Snyder. The Army saves time, money and resources by advancing from legacy EW systems to portable solutions.

“The Army is building a flexible foundation for evolving threats by creating a modular mission payload,” Snyder said. “Developing EW techniques in a modular fashion creates platform independence. Soldiers now have the freedom to choose which tools they need for a mission.”

The C5ISR Center has a long history of science and technology investments in Army EW systems, Snyder said. Multiple C5ISR Center R&D teams continue to invest in both offensive and force protection EW systems to ensure the Army can protect Soldiers from EW threats while impacting the threat decision cycles through offensive EW techniques.

C5ISR Center scientists and engineers working with Soldiers, specifically the 11th Cyber Battalionsince its activation in 2019, during field testing and experimentation events has provided valuable operational input, said Yaakov Gorlin, a C5ISR Center EW subject matter expert.

Testing events like Project Convergence and Cyber Quest provide the C5ISR Center with venues to test out both emerging concepts and maturing technologies, while getting direct operational feedback through their employment by the Soldiers. The C5ISR Center values these types of events as it allows the engineers and scientists to get first-hand insight into the capabilities being developed by the Center and provide the Soldier with relevant technology faster.

“Soldiers giving us direct feedback and talking about implementation during the development phase enables the Army to move faster,” Gorlin said. “Researchers need to understand what their work in the lab means from an operational perspective. These interactions with Soldiers help C5ISR Center achieve goals of improving ease of use and decreasing the cognitive burden. Software capabilities are tailored to the user.”

By Dan Lafontaine, C5ISR Center Public Affairs

Commentary on a Concept to Create US Cyber Force

Sunday, July 6th, 2025

This is where I provide some commentary on commentary and originally appeared in Soldier Systems Digest, Vol 5, Issue 26.

The Pentagon knows its cyber force model is broken. Here’s how to fix it

The authors of this article revive the argument for establishing a US Cyber Force. I agree, except that the designation of Cyberspace as the fifth warfighting domain was myopic in the first place and establishing a “Cyber” force only gets part of the job done.

The reality is that Cyber is SIGINT by other means and that SIGINT is one of many elements of electromagnetic warfare. The EM spectrum is the true fifth domain.

To solve our current shortfalls, we must look to the past to face the future.

First, establish the US Security Service (USSS) as the sixth military service with specialization in offensive Cyber, Electromagnetic Warfare, and SIGINT. This requires a fix to the Title 10 / Title 50 issues which caused this bifurcation of effort in the first place.

Second, reconstitute service level versions of the Security Service which were stood down and merged with other Intel organizations in the 70s and 80s. Like the USSS, these service elements will provide offensive Cyber, EW, and SIGINT capabilities to support their own service branch.

Third, merge the National Security Agency and US Cyber Command once again into a single entity with additional technical control over Electromagnetic Warfare and an understanding that this entity controls offensive actions in addition to collection. Once again, the tweaking of Title 10 / Title 50 issues is critical.

Fourth, leave cyber security to the services as they establish and manage their own networks.

The new US Security Service will provide the National Cyber Force as well as the lead on national level EMS collection efforts and EW policy and execution. It will also provide forces to support joint warfighting at the Strategic, Operational, and Tactical Levels. Finally, it will establish a SOF component to support properly USSOCOM with a full seat at the table.

Unfortunately, cyber has become a generic term used by operations personnel to describe the full gamut of EW activities. While CEMA has been used here in the US as well as in the UK, Cyber ElectroMagnetic Activites seems to have lost favor even though it better describes the capability. As EW elements are embedded in Army formations under the Transformation In Contact initiative, Army combat arms Soldiers and Leaders will begin to use the term EW to generically refer to what is, EW. Unfortunately, they won’t be getting everything. The Army’s concept of EW is a stripped down capability which provides elementary direction finding and jamming, which makes it a hammer when it could be a scalpel. Signals will be geolocated without ample characterization and either jammed or passed to fires for destruction. This will invariably lead to the denial of exploitable nodes or the destruction of deceptive emitters while the real ones escape notice.

The Army is actually exacerbating the issue. The Army is combining USAREUR’s 2nd Multi-Domain Task Force with the 56th Artillery Command referring to “cyber” and traditional fires and defensive and offensive fires. The Army got the CEMA element correct in the 2nd MDTF, combining Cyber, EW, and SI in one organization. The danger is placing all of that capability under a commander who only understands that targets get destroyed.

Eric Graves
 Founder
 SSD

Harnessing SIGINT and EW for Tactical Dominance: A Guide for Combat Arms Leaders

Monday, June 16th, 2025

Introduction

To the combat arms platoon leader and company commander: You are leading formations that will close with and destroy the enemy. Your ability to shoot, move, communicate, and then move again (see later section on countering enemy surveillance in the electromagnetic spectrum) is paramount to our success on the modern battlefield. The enemy is sophisticated, adaptive, and aggressively contesting your ability to maneuver in all domains, including the electromagnetic spectrum (EMS). You are not alone in this fight; the intelligence and cyber communities will enable you to dominate the EMS. These communities stand ready to provide you with actionable targets and the means to influence/dominate the EMS at echelon. This is not theory; this is the reality of combat against peer and near-peer adversaries, and we are bringing the full weight of the Department of Defense (DoD) and its combat support agencies to bear. Your S-2 section and Cyber Electromagnetic Warfare Activities (CEMA) cell will innovate at speed across the range of operations to ensure that you have the capabilities necessary to win.

SIGINT and EW: Your Tactical Edge

Signals intelligence (SIGINT) and electromagnetic warfare (EW) are distinct but complementary disciplines that must be integrated effectively to maximize battlefield effects. SIGINT identifies and characterizes enemy signals, providing critical intelligence that inform EW operations. EW teams can use that information to help locate enemy positions for destruction, or simply to disrupt, deceive, or deny the adversary’s use of the electromagnetic spectrum. Proper coordination between SIGINT and EW enables deception operations, enhances precision targeting, and strengthens force protection measures, ensuring that friendly forces maintain dominance over the EMS while denying the enemy key capabilities.

Based on historical analysis of large-scale combat operations (LSCO), recent lessons learned from Ukraine, and predictive analysis of China’s People’s Liberation Army (PLA) capabilities, the teaming of SIGINT and EW can be a force multiplier across the warfighting functions. By integrating SIGINT-derived intelligence with EW’s ability to deny and disrupt, we can significantly degrade an adversary’s ability to maneuver and execute multidomain operations (MDO).

Understanding SIGINT in Your Fight

SIGINT is not just a tool for strategic planners in some far-off headquarters. It is a tactical enabler that allows you to detect, locate, and exploit enemy communications in real time. Whether you are setting up an ambush, planning a fire mission, or maneuvering to secure a key objective, SIGINT can provide the enemy’s disposition, intent, and vulnerabilities. The Army’s ability to identify and track enemy command nodes, air defense systems, and maneuver elements through SIGINT means you can strike at the right place and time with overwhelming force.

How EW Shapes the Battlefield

EW is your ability to seize control of the EMS. EW is the counterweight to enemy SIGINT and can greatly affect their ability to execute command and control (C2) while disrupting their ability to communicate, navigate, and coordinate. If the enemy cannot receive orders, they cannot react. If their targeting systems are blinded, they cannot fire effectively. Ultimately, if they can’t navigate, they cannot effectively maneuver forces on the battlefield. EW, when employed effectively, can have significant battlefield effects, all without firing a shot.

EW’s Three Essential Functions:

Electromagnetic Support (ES): Detecting and identifying enemy emitters to support targeting and situational awareness.

Electromagnetic Attack (EA): Jamming and deception operations that deny the enemy use of the spectrum.

Electromagnetic Protection (EP): Ensuring that friendly forces maintain reliable communications despite enemy jamming, to include employment of emission control measures (e.g., radio power, antenna placement, etc.) to defeat enemy attempts to surveil and target friendly forces.

The Critical Role of SIGINT and EW in Tactical Operations

The operational environment requires agility, synchronization, and unity of effort to converge all sensors and effects on a rapidly evolving threat. The ability to integrate SIGINT with EW at the tactical level allows commanders to enhance targeting fidelity (SIGINT and EW), disrupt adversary operations (EW), and provide real-time intelligence for maneuver forces (SIGINT).

To focus on C2 and counter-C2, expanded maneuver, and cross-domain fires, we must team SIGINT and EW across EA, ES, and EP to present multiple dilemmas to our enemy, enhance C2 protection, and increase lethality. Let’s look at an example:

Kill Chain Analysis: A Counter-Unmanned Aerial System (C-UAS) Scenario

In an era where UAS play an increasingly critical role in modern warfare, understanding the full kill chain process for countering these threats is essential for operational success.

Phase 1: Detect and Identify

A brigade combat team (BCT) is executing a deliberate attack when SIGINT elements intercept and transcribe enemy communications emanating from an urban area associated with drone activity. Electromagnetic support reporting from sensors riding on a remote-controlled scouting vehicle confirms the presence of enemy UAS operating frequencies, geolocating multiple launch sites and relay nodes.

Phase 2: Target and Disrupt

Upon confirming the threat, the BCT’s organic EW platoon, using Terrestrial Layer System (TLS) Manpacks, receives the locations of the threat signals of interest (SOI), and executes an electromagnetic attack to jam the drone’s control frequencies, disrupting the operator’s ability to maneuver the UAS effectively. Simultaneously, SIGINT analysts coordinating with higher-echelon intelligence teams pinpoint the drone operator’s location for kinetic targeting.

Phase 3: Engage and Destroy

With the drone rendered ineffective, the fire support element coordinates an artillery strike on the enemy UAS ground control station, leveraging the precision geolocation refined by enhanced tools like the Electromagnetic Warfare Planning and Management Tool (EWPMT) and the Army Intelligence Data Platform (AIDP). Simultaneously, the EW platoon continues to jam the enemy’s communications, preventing coordinated support or retrograde. Friendly forces neutralize the threat, allowing maneuver elements to proceed unimpeded.

Phase 4: Assess and Adapt

Post-strike analysis from SIGINT utilizing High Altitude Platform (HAP) sensors reveals ongoing enemy attempts to reestablish drone operations, underscoring the necessity for sustained EA efforts. In response, SIGINT teams disseminate updated threat reporting to the EW platoon, enabling them to adjust jamming frequencies and counter enemy adaptations. Concurrently, SIGINT elements refine their intelligence collection to anticipate and prepare for potential future enemy tactics, ensuring proactive EW measures.

This coordinated SIGINT and EW kill chain ensures the enemy’s UAS capability is neutralized before it can affect friendly operations. This vignette effectively illustrates the critical synergy between intelligence-driven targeting and spectrum dominance.

How You Can Leverage SIGINT and EW at Your Level

To gain a decisive battlefield advantage, leaders must integrate SIGINT and EW capabilities to counter enemy threats in the EMS. The following approaches can help achieve this:

Incorporate SIGINT and EW into the DNA of Your Planning and Execution

From the outset, consider how to effectively integrate these capabilities into your operations to inform and shape your decision-making. Collaborate closely with supporting staff elements, such as the BCT CEMA cell and S-2 section, to gain a deep understanding of the enemy’s electromagnetic spectrum usage and identify opportunities to disrupt and exploit their vulnerabilities. By incorporating SIGINT and EW into your operational framework, you can create a more comprehensive and effective approach to achieving your mission objectives.

Train Your Leaders and Soldiers to Recognize and Exploit the EMS

Your Soldiers must understand that controlling the EMS is just as vital as controlling key terrain. Integrate SIGINT and EW considerations into your battle drills, mission rehearsals, and after-action reviews. Units that fail to account for enemy EW will put their formations at significant risk on the battlefields of the future. Training ensures you can adapt and maintain tempo under contested conditions.

SIGINT and EW teams can sense across the EMS with ES at the tactical edge. By developing new tactics, techniques, and procedures (TTPs), SIGINT support from higher echelons, such as from the division level, can be pushed down to BCTs, providing real-time EMS sensing without burdening them with protecting and maneuvering higher-echelon intelligence capabilities. Ultimately, this enables more agile and lethal maneuver forces.

Ensure Interoperability with Supporting SIGINT and EW Units

SIGINT and EW units are enablers, not afterthoughts. Integration of SIGINT and EW elements throughout the organic targeting process is key. Work with them to refine target identification and EA options. Develop unit standard operating procedures (SOPs) that detail how to request and synchronize their capabilities in real-time engagements and incorporate them in all rehearsals. Leaders must ensure that EW Soldiers are embedded within tactical formations to provide immediate effects that enhance maneuver and fires.

Adopt an Aggressive, Learning-Focused Mindset

The enemy is adapting. As such, we must do the same. Stay informed on the latest TTPs by leveraging resources such as the Center for Army Lessons Learned (CALL) and current doctrinal publications like Field Manual (FM) 2-0, Intelligence, and FM 3-12, Cyberspace Operations and Electromagnetic Warfare. We must continue to share lessons learned across our formations and with intelligence and EW enablers to continually refine our operational effectiveness.

Conclusion

In an era where the electromagnetic spectrum is as contested as the physical battlespace, success demands leaders fully integrate SIGINT and EW into their tactical decision-making. These are not ancillary capabilities but core enablers of maneuver, fires, and protection. By treating SIGINT and EW as an integral piece of battlefield operations rather than separate support functions, we can outthink, outmaneuver, and overwhelm our adversaries before they can react.

The future fight will be won by those who master the integration of intelligence and electromagnetic warfare, seamlessly fusing these disciplines into their formations and operational planning. This requires continuous learning, rigorous training, and adaptive thinking to counter evolving enemy tactics. The intelligence and EW communities stand ready to support, provide counsel for our specialties, and execute through our commanders’ intent.

Superiority in the EMS is not an option — it is a necessity. By embracing these capabilities and fostering interoperability, we ensure that our forces maintain a lethal edge on the battlefield. The challenge is clear, and the tools are at hand. Now is the time to educate our leaders and Soldiers and incorporate these capabilities into our training so we are prepared to fight and win our nation’s wars.

By MG Rick Appelhans and MG Ryan Janovic

MG Richard T. “Rick” Appelhans currently serves as the commanding general of the U.S. Army Intelligence Center of Excellence and Fort Huachuca, AZ. Prior to assuming this position, he served as the director of Intelligence, U.S. Forces Korea/deputy director of Intelligence, Combined Forces Command. MG Appelhans’ overseas assignments and deployments include the Republic of Korea, Kuwait, Germany, the Netherlands, Afghanistan, Bosnia-Herzegovina, and Iraq. He began his military career as an Armor officer, serving as a tank platoon leader, company executive officer, and battalion S-4. Since transitioning to Military Intelligence in 1997, MG Appelhans has served in a variety of command and staff assignments to include detachment commander, battalion S-2, company commander, brigade combat team S-2, analysis and control element chief, region commander, division G-2, and group commander.

MG Ryan Janovic currently serves as the commanding general of the U.S. Army Cyber Center of Excellence and Fort Eisenhower, GA. A native of Akron, OH, he graduated from the U.S. Military Academy at West Point, NY, in 1993 and commissioned into the Military Intelligence Corps. He served with Multi-National Forces-Iraq, 1st Infantry Division in eastern Afghanistan, Military Intelligence in Korea, and later with Commander United Nations Command/Combined Forces Command/U.S. Forces Korea. His other assignments include various posts throughout the U.S. to include a tour as a White House Fellow. In 2019, MG Janovic joined the cyber ranks as the deputy commander of Joint Force Headquarters – Cyber (Army), leading the organization toward unit citations earned in support of U.S. Central Command.

This article appears in the Summer 2025 issue of Infantry. Read more articles from the professional bulletin of the U.S. Army Infantry at www.benning.army.mil/Infantry/Magazine or www.lineofdeparture.army.mil/Journals/Infantry.

Georgia Guard Activates First-Ever Electromagnetic Warfare Company

Thursday, June 12th, 2025

FOREST PARK, Ga. — The Georgia Army National Guard made history with the activation of the 111th Electromagnetic Warfare Company, the first unit of its kind in the U.S. Army.

The ceremony, held at the Fort Gillem Enclave, also included the assumption of command by Capt. Caleb Rogers.

Lt. Col. Luke Gurley, commander of the 221st Intelligence and Electronic Warfare Battalion, the parent command of the 111th EW, presided over the ceremony.

“Today we activate the 111th Electronic Warfare Company, a unit that will be at the forefront of our capabilities in the electromagnetic spectrum,” Gurley said.

The activation of the 111th EW Company marks a significant step in modernizing the Army’s capabilities within a domain that is increasingly critical to national security. This new formation will provide capabilities to detect, recognize, locate and identify signals of interest, supporting combatant commanders.

During his remarks, Gurley said the activation aligns with the philosophy of U.S. Army Chief of Staff Gen. Randy George, who advocates for rapidly modernizing units and equipment based on emerging needs and technology. He also believes every unit will need to master the electronic warfare fight.

“The legacy of the 221st Intelligence and Electronic Warfare Battalion and the Georgia Guard to lead from the front and provide those critical capabilities to support the warfight both locally and abroad is going to be driven by Georgia Soldiers,” said Brig. Gen. Theodore Scott III, commander of the 78th Troop Command. “And that means the world to me.”

Scott, once the leader of the 221st IEW, has watched the formation grow over the years.

“As the battlefield continues to evolve, the 221st IEW is ready,” Scott said. “It’s one of the most deployed units in the state and has been for a number of decades. And so that continues to articulate the relevancy of 221st and now the 111th.”

The 221st IEW has deployed Soldiers to Afghanistan, Iraq, Kuwait, Syria, Jordan, Turkey, Qatar, United Arab Emirates, Kosovo, Cuba and the southern border, and has supported U.S. Central Command and U.S. Indo-Pacific Command activities.

The 111th EW Company traces its lineage to the 1st Battalion, 111th Signal Battalion, the only Georgia Army National Guard unit mobilized during the Berlin Crisis in 1961 and the first unit mobilized since the Korean War.

“Today is not simply about activating a new unit. It’s about recognizing and honoring a proud legacy,” Gurley said.

Rogers, the newly appointed commander, acknowledged the unique challenges and opportunities associated with leading this pioneering unit. He said he is charged with coordinating with relevant schools and units to train on developing systems as the Army continues to identify and finalize the necessary training for the unit’s capabilities.

“No Soldier in the 111th ended up here through recruiting,” Rogers said. “They knew what they wanted when they came to the 111th. They knew that they wanted to rebuild Army EW.”

Rogers said the company will provide division commanders with four platoons of electromagnetic warfare teams, with a total of more than 80 Soldiers.

“All of our Soldiers are expected to keep up with evolving technology, and the unit as a whole is remaining flexible with the expectation of receiving a growing number of mission types,” Rogers said.

He also confirmed that the 111th EW Company will conduct its first field exercise in August at the Chattahoochee National Forest, focusing on electromagnetic support training and identifying and locating static and moving targets, including helicopters provided by the Georgia Guard’s 78th Aviation Troop Command.

“It’s a great time to be in military intelligence and electromagnetic warfare,” Scott said. “I am excited for the future.”

By Charles Emmons, Georgia National Guard