XC3 Weaponlight

Archive for the ‘EW’ Category

Northern Strike Brings Electromagnetic Warfare to the Front Lines

Saturday, August 16th, 2025

CAMP GRAYLING, Mich.—In modern warfare, battles are not only fought with rifles, tanks and artillery. Some of the most decisive victories are won across the electromagnetic spectrum.

At Northern Strike, the National Guard’s premier readiness exercise held this month at Michigan’s National All-Domain Warfighting Center, Soldiers trained in a high-intensity environment that pushed the limits of electromagnetic warfare, or EW. It tested their skills in realistic combat scenarios.

In classrooms, electromagnetic warfare specialists often train to disrupt, or “jam,” enemy communications, intercept signals and scan for threats. Jamming works by overpowering or confusing an enemy’s radio or data transmissions, preventing them from communicating or coordinating effectively.

Last year at Northern Strike, the 37th Infantry Brigade Combat Team, or IBCT, launched a pilot program that sent a mobile EW team into the field to disrupt the communication systems of units in training.

This year, the EW teams were embedded in infantry squads to create a more realistic, complex environment for Soldiers.

“This is a rare training opportunity in the National Guard and in the Army as a whole,” said Spc. Robert Bowley, an Electromagnetic Warfare specialist in the 37th IBCT from Columbus, Ohio. “To train with the equipment, you need the funding, and Northern Strike allows for that.”

Bowley was equipped with the Beast+ system, a handheld multi-channel receiver and transmitter designed for Army EW operations. The system scans the electromagnetic spectrum to detect enemy signals, identify spoofing or jamming threats and enhance battlefield awareness.

“The antenna gives you a general direction and signal strength. I can see anything on the [radio frequency] spectrum,” Bowley said. “We also have a power amplifier that lets us jam communication systems.”

Bowley, who also participated in the exercise in 2024, said he acted as “an early warning system. I will be giving the direction of the opposing force and jamming their comms.”

The mission brought together electromagnetic service members from the 37th IBCT, the Royal Irish Regiment and the Latvian National Armed Forces. The teams combined their expertise by embedding an electromagnetic specialist with the Irish regiment and managing signal towers with the Latvian forces to carry out a complex, coordinated operation.

“In my job, you are on the front lines. We are not cyber on computers, we are in the field,” Bowley said.

At 1800 hours, Browley and seven infantry soldiers from the 2nd Battalion, Royal Irish Regiment, British Army, stepped off to the Combined Arms Collective Training Facility, which simulates fighting in urban terrain. Once they arrived, the squad cleared the building and Bowley looked for the best place to set up the Beast+.

“Ideally, it would be on top of a roof,” he said. “But they have drone capabilities, so this [his location] was the next best thing. In the best case scenario you want to be high up and have nothing around you.”

While the Royal Irish Regiment placed obstacles around the building, Bowley found a dark corner with windows on both sides.

“We will be defending from up here. With this spot, I have a window on both sides and am able to get the antenna outside. The main thing that is important is what is being said over the radio. When I see something on my screen, I will know the direction they’re coming from,” Bowley said.

Bowley knew the long night ahead would test his focus. He monitored the electromagnetic spectrum for hours, watching for the slightest signal of an attack and standing ready to jam enemy communications.

“I brought a lot of caffeine,” he said, laughing. “We have the go-ahead to jam whatever. Usually, you have to really go through hoops. The problem with jamming is that it is risky. Turning off comms can do a lot. The things that I will be looking at jamming are important. Like when they call up nine-lines, or before an assault.”

Bowley’s squad was on defense, which required members to stay alert the entire time. At 2200 hours, they experienced probing from a platoon-sized element testing their defenses. A drone tagged four simulated casualties.

At 0300 hours, shouts echoed as infantry teams moved in to assault the objective. With their communications jammed, the attackers yelled to coordinate.

“They realized we were jamming them and immediately got off their comms,” Bowley said.

Moments later, the opposing force stormed into the room and took down the defending squad in the exercise.

Master Sgt. Jason Ross, the electromagnetic spectrum operations noncommissioned officer for the Army National Guard Information Advantage Division, said the exercise was a reminder of why electromagnetic warfare must be integrated into training.

“Communications systems have changed rapidly in recent years and now evolve almost monthly,” Ross said. “The threat has grown significantly. Thinking outside the box is critical, but it’s not always an easy discussion to have.”

This scenario was unique because the communications cell was on the red team, creating an unpredictable training environment.

“It is hard to duplicate what we are doing at Northern Strike. The approval for this type of training is tricky. The support that Michigan has given to this exercise is amazing,” Gilly said. “The reality is when we train on a rifle range, a Soldier knows what to expect. That is not the case with electromagnetic warfare.”

Maj. Tucker Palmatier, a cyber electromagnetic warfare officer and Cyber Electromagnetic Activities officer in charge of the 37th Infantry Brigade Combat Team, said training in electromagnetic warfare is challenging because of federal restrictions.

“The FCC [Federal Communications Commission] law on jamming dates back to 1934, which makes it difficult to realistically train for today’s technology-driven battlefield,” Palmatier said.“Our challenge is maximizing training opportunities without breaking laws or regulations so Soldiers know exactly what to expect when it matters most.”

Despite those hurdles, Palmatier said the operation was a success.

“Our enemy was not anticipating electromagnetic warfare. We were able to degrade their communications, which left them unable to coordinate their attack, allowing a smaller force to successfully defend the position,” he said.

By 2LT Paige Bodine, Michigan National Guard

Pacific Defense Launches SABER, a Multi-Function Electronic Warfare Product Family for Multi-Domain Missions

Tuesday, August 12th, 2025

SABER’s tactical edge-based AI/ML capabilities enhance system performance, reduce operator burden, and counter emerging threats—all built on a MOSA framework

EL SEGUNDO, Calif.– Pacific Defense, the leader in C5ISR Modular Open Suite of Standards (CMOSS) products and integrated mission systems, announces the launch of its SABER Multi-Function (MF) Electronic Warfare and Signals Intelligence (EW/SIGINT) product family. The first offering in the line is the EWS1090VP — a 9-slot 3U OpenVPX™ system that seamlessly integrates counter-UAS, counter-communications, counter-IED, and counter-radar electronic support capabilities.

Designed for rapid capability insertion and adaptation, SABER addresses the complexity of today’s electronic battlefield, where adversaries continuously adapt, and traditional countermeasures struggle to keep pace. With its wideband processing capabilities, SABER empowers operators to conduct comprehensive, full-spectrum surveys of the electromagnetic environment. Warfighters can pinpoint signals of interest in real-time, while advanced direction-finding and geolocation maintain persistent tracking of threat emitters. SABER also delivers electronic countermeasures through multiple low-latency active and reactive electronic attack (EA) modes, effectively neutralizing threats while enhancing situational awareness and force protection.

MOSA Standards Revolutionize Life-Cycle Management

Aligned with CMOSS and The Open Group’s Sensor Open Systems Architecture™, SOSA™, technical standards, SABER is a Modular Open Systems Approach (MOSA) solution that leverages Commercial Off-the-Shelf (COTS) components—such as antennas and amplifiers—to reduce delivery timelines, lower costs, and enable rapid integration of multi-vendor technologies.

By adhering to SOSA and the CMOSS Modular Open Radio Frequency Architecture (MORA), SABER provides open interfaces for radio frequency (RF) systems. This ensures the platform remains adaptable and capable of addressing frequency-agile threats in congested electromagnetic environments. SABER can be quickly upgraded with any MORA-compliant third-party software application or software-defined radio (SDR), allowing operators to stay ahead of emerging threats. These accelerated upgrade cycles and cost efficiencies ensure warfighters are equipped with the most advanced RF systems available—from trusted, government-approved partners.

SABER Enhances Operator Effectiveness

SABER’s software enables versatile orchestration, from interactive control to fully automated, remote managed operations. Through a unified user-friendly interface, warfighters can seamlessly monitor system hardware, operate battle management tools, integrate third-party applications, and deliver decisive effects across the electromagnetic spectrum.

Integrated advanced artificial intelligence and machine learning (AI/ML) algorithms enhance SABER’s ability to detect RF patterns of life and identify anomalous behaviors. This maximizes accuracy while reducing operator workload and increasing overall mission efficiency.

“SABER’s tactical edge-based AI/ML capabilities enhance system performance, reduce operator burden, and counter emerging threats—all built on a MOSA framework,” said Frank Pietryka, VP of EW, SIGINT, and Autonomy at Pacific Defense. “Warfighters gain theater-level EMS superiority today, with the flexibility to upgrade emergent capabilities tomorrow. The modular design behind SABER’s multifunctionality allows us to continuously innovate and stay ahead of rapidly evolving EW threats.”

For more information, please visit: SABER.

Summer Interns Gain Valuable Experience at PEO IEW&S

Sunday, August 10th, 2025

Using modern agile development tools to verify the integrity of data to reduce vulnerabilities in cyber systems, implementing automation with required regulation and policy to secure vulnerable networks, developing guidebooks and processes for acquisition professionals to understand program protection – these are just some examples of the work being done by summer interns this year at Program Executive Office Intelligence, Electronic Warfare and Sensors (PEO IEW&S).

After the positive experiences from last year’s cohort, PEO IEW&S once again hosted several interns through the Defense Civilian Training Corps (DCTC). The intern program is a collaboration between academia and the Department of Defense. Scholars attending participating schools are selected through a vigorous and highly competitive process who, once selected, work on challenging projects submitted by DoD host organizations. Interns are provided security clearances, receive stipends and may be offered employment upon graduation.

Cheryl Litteral, Talent Manager/Human Capital Strategist for PEO IEW&S, has been an advocate for internship programs and what they bring to both the students and the organizations who host them. She described this year’s cohort by saying, “The Defense Civilian Training Corps is a program sponsored by the Acquisition Innovation Research Center (AIRC) that is designed to prepare college students with the skills and experience to contribute to the DoD mission immediately after placement. The 8-week summer internship pairs students with DoD organizations and allows them to work and solve real-world problems. Building the bench is one of the key tools we require to help us grow and evolve as an organization and these students are stellar examples of the talent, we need to achieve that goal.”

Three project management offices (PMs) from PEO IEW&S hosted DCTC interns for six weeks beginning in early June, ending July 25th. One organization that participated was Project Manager Cyber & Space (PM C&S), which develops, acquires, and fields offensive cyber and tactical space capabilities that protect the Soldier, the Nation and enable cyberspace superiority. PM C&S challenged their two Virginia Tech Computational Modeling & Data Analytics majors, Paige Barnhart, and Ryan Pini, to an offensive cyber operational project where they tried to detect and prevent any issues with data integrity specifically with Packet Capture (PCAP) data. PCAP data contains the exact data transmitted between devices on a network, which has a history of causing problems with software used to process that data. According to James Kettner, System Engineer and mentor to the interns, “It was a well-scoped problem, and they went after it, using a modern set of agile development tools”. Mentor and civilian supervisor Wendi Duffy, Product Support Manager for PM C&S said “what they (the interns) bring to the organization I think is a new perspective. I think so often we get jaded in our world because we’re dealing with the same customers, the same products and when the interns come in, they look at it and can bring something totally different.”

PEO IEW&S’s PM Aircraft Survivability Equipment (PM ASE) also hosted two interns this summer. PM ASE develops and manages systems that protect military aircraft from threats such as enemy missiles, radar, and electronic warfare. William Buinicki attends Purdue as a cybersecurity and network engineering major and Lake Gohlke attends Virginia Tech, also a cybersecurity and network engineering major. Buinicki and Gohlke both applied to the DCTC program and were interested in the project submitted by PM ASE. This project involved assisting current PM ASE cybersecurity personnel in improving the organization’s cybersecurity posture via documentation improvement and vulnerability identification and remediation. By assisting with policy review and policy implementation, the scholars would be able to experience the complexities of implementing required regulation and policy into difficult to fit areas.

Gohlke said “I saw this project on the listing back in February and I thought it was a great opportunity to build on the basics that I’ve already been learning in class and really contribute to the workforce here.”

Brian Cary, Information System Security Manager and mentor, worked with the interns first with an overview of the risk management framework and how it relates to acquisition policies and regulations and then was able to transition to a hands-on approach with the interns, specifically introducing them to the tools the DoD uses to secure its networks. The interns were able to assist the team in preparing configuration reports and generate some automated capabilities. Cary said, “They were able to provide a foundation for some automation that we can definitely carry forward into the future, it’s not just a project that they worked and will be set aside.”

David Blevins, PM ASE Chief Information Officer and mentor/supervisor to the interns was also impressed with the work Buinicki and Gohlke were able to accomplish in a mere 6 weeks. “Having them assigned with Brian and them making a true impact versus simply catering to them as visitors or walking them around to show them different things, they made a true impact.”

PM Positioning, Navigation, and Timing (PM PNT), which develops and fields technologies that provide Soldiers with reliable and resilient navigation and timing capabilities in GPS-contested environments, is another organization under PEO IEW&S that submitted a project to the DCTC internship program. Their project required the DCTC intern to develop a Program Protection roadmap with an acquisition lifecycle checklist for Assistant Product Manager’s (APMs) to codify lessons learned and provide continuity during turnover. In this project, DCTC Scholars would develop a Program Protection Overview roadmap with an acquisition lifecycle checklist to identify key milestones and events for Supply Chain Risk Management (SCRM), Program Protection Assessments, Cyber, tailored risk mitigation contract language, and other program protection activities planning for APMs

DCTC Intern Adam Lieu attends the University of Arizona as a management information systems major. He applied to the program with an interest in government service. He said, “this internship and the experience I’ve had here has given me a pretty unique skill set as far as people going into their senior year of college.” Lieu was able to earn a program protection credential while also working on the project.During his six weeks at PM PNT, Lieu created an APM guidebook consisting of flow charts, slides and acronym lists that will bridge a knowledge gap for the APMs.

Karie Anderson, civilian mentor/supervisor to Lieu and security specialist for PM PNT, said this was the organization’s first experience with the DCTC internship. “He has been absolutely amazing, taking on our project has been a great experience, he really attacked it being very APM centric and he really took ownership, and he gave us a product that the Army can really use. I would say too if there’s any other organization or civilian who’s thinking about submitting a project for consideration, you should do it. It is well worth it.”

Lieu was impressed with the communication and how supported he felt through the whole process from the beginning from both the DCTC side and the PM PNT. There was ample communication from the beginning that he felt he could hit the ground running.

With the end of another internship cycle at PEO IEW&S, one can see how today’s students are already making impacts and contributing to the Army’s mission.

By Allison Weissert, PEO IEW&S Public Affairs Specialist

Army Principal Cyber Advisor Commends ARCYBER Innovations in Electromagnetic and Cyberspace Dominance

Saturday, August 2nd, 2025

FORT GORDON, Ga. — The Army’s top cyber strategist, Mr. Brandon Pugh, principal cyber advisor to the secretary of the Army, concluded a landmark three-day visit to Army Cyber Command Headquarters in late July, signaling strong support for the command’s forward-thinking approach to cyber readiness and modernization.

Following his recent appointment in June, Mr. Pugh’s inaugural trip from July 21-23 included extensive briefings and firsthand engagement with ARCYBER’s top talent and trailblazing technology. His itinerary spanned operational hubs, innovation centers and tactical units — each reinforcing the Army’s commitment to digital superiority in today’s increasingly complex and contested battlespace.

Operational Insights and Talent Retention

Early in the visit, Mr. Pugh was briefed on the need for the Cyber Readiness Skills Pay initiative, designed to incentivize retention of high-demand cyber professionals. Leadership briefed him on ARCYBER’s mission, structure and ongoing readiness programs, emphasizing the strategic need to empower and sustain elite cyber forces.

Frontline Innovation at the 11th Cyber Battalion

A key highlight of Mr. Pugh’s visit was his in-depth engagement with the capability developers from the 11th Cyber Battalion, who showcased a range of innovative, in-house engineered devices tailored to meet the unique operational needs of the expeditionary cyber teams. These demonstrations featured customized solutions designed to bridge target network connections and identify adversary emitters across the battlefield.

Mr. Pugh observed demonstrations by expeditionary firing crews — five-person teams capable of delivering strategic cyber effects in support of theater-level objectives, combining cyber operations and electromagnetic warfare in ways previously unseen.

Drones and Dominance

The 11th Battalion is accelerating its Small Unmanned Aircraft System Training Program around the secretary of defense’s “Unleashing U.S. Military Drone Dominance” directive and now leads efforts to rapidly produce drone teams. With authority to directly acquire drones under 55 pounds, the battalion equips forces to execute electromagnetic reconnaissance and ISR missions across global theaters.

The SUAS capability promises full integration into beyond line of sight tactics, techniques, procedures and concept of operations by the end of 2026 — paving the way for drone-led data supremacy on tomorrow’s battlefields.

Driving Strategy Across Components

Beyond tech showcases, Mr. Pugh engaged ARCYBER leadership on key policy and structural enhancements, including:

Expanding the use of National Guard and Reserve cyber units

Strengthening electromagnetic warfare resources at the division level and below

Increasing strategic communications to highlight ARCYBER’s unique warfighting contributions

He concluded the visit by expressing a strong intent to continue collaborating closely with the team and aligning efforts to support their evolving mission needs. He announced an upcoming visit to the Cyber Center of Excellence, signaling enduring collaboration with cyber leadership.

Building the Future of Warfare

Mr. Pugh’s visit reaffirmed the Army’s vision for cyber dominance — one shaped not just by emerging technology but by mission-aligned innovation.

“Technology is critical in today’s battlefield, and it is imperative that our warfighters fully leverage and lead with it, from cyber to drones,” Mr. Pugh noted. “ARCYBER’s work is a blueprint for building capabilities that achieve that goal and sharpen our warfighting edge.”

By Lindsay Roman

Electronic Warfare Leader Passes Responsibility

Sunday, July 20th, 2025

Kenneth Strayer, Project Manager (PM) for the Project Management Office Electronic Warfare & Cyber (PM EW&C) passed the reins of leadership to incoming PM, Col. Scott Shaffer in a July 10 change of responsibility ceremony at Aberdeen Proving Ground, Md.

As the ceremony’s host, Brig. Gen. Ed Barker, Program Executive Officer for U.S. Army Program Executive Officer, Intelligence, Electronic Warfare and Sensors (PEO IEW&S) presented the Superior Civilian Service Award to Strayer on behalf of the Acting Army Acquisition Executive, Jesse D. Tolleson, Jr. Barker also accepted the PM EW&C charter from Strayer and passed it to Shaffer signifying the official change of responsibility.

“Ken has been at the forefront of bringing EW capabilities back to the battlefield for this generation. The need to dominate the electromagnetic spectrum is more important than ever,” said Barker.

Under Strayer’s leadership since 2021, PM EW&C demonstrated the highest levels of excellence in the program management of urgently needed operational capabilities and priority requirements for U.S. Army Commanders. He instituted innovative acquisition approaches in a highly classified environment and tailored programs through rapid prototyping and flexible contracting to accelerate delivery and facilitate learning of the doctrine, organization, and training requirements necessary to reinvigorate electromagnetic warfare (EW) as a core competency.

Strayer spearheaded the development and fielding of the Terrestrial Layer System Manpack, Electronic Warfare Planning and Management Tool (EWPMT), Tactical Electronic Warfare System – Infantry (TEWS-I), Tactical Space Superiority systems, and many other EW capabilities to the force. He gained approval and chartered a new Colonel/GS-15 led Project Management Office for Cyber and Space to provide focused program management and stakeholder engagement for the joint cyber community. Additionally, he established a new GS-14 led Product Lead Office for Strategic Spectrum Warfare to provide responsive support for the growth in echelons above brigade requirements.

During his tenure, including his service as Deputy Project Manager EW&C from 2017 to 2020, PM EW&C received the 2019 Project Management Office Team of the Year (O-6/GS-15 level) award and the 2018 David Packard award for Acquisition Excellence.

“I am so proud of the more than 250 professionals on our team that equipped our Army to dominate the electromagnetic spectrum, ready for the next fight. It’s been amazing to watch the team’s creativity in development and delivery of capabilities. It has been the greatest privilege in my career to lead the EW&C team and family,” said Strayer during his remarks at the ceremony.

As the new Project Manager, Shaffer will guide a workforce of military and civilian professionals who develop and field integrated capabilities for spectrum warfare. He comes to PM EW&C after serving as the Executive Officer to the Principal Military Deputy to the Assistant Secretary of the Army (Acquisition, Logistics, and Technology) (ASA(ALT)) and after leading Product Manager Mission Command Cyber under the Program Executive Office for Command, Control, and Communications – Tactical (PEO C3T).

“This is an exciting time with changes to the operational environment and threat where we need to be more agile and creative to ensure we have the most lethal force with the right mix of capabilities and resources. Thank you for this great opportunity to serve as the next Project Manager for PM EW&C,” Shaffer said, concluding the ceremony.

By Matthew Schramm

US Army Electromagnetic Warfare Capabilities Update

Monday, July 14th, 2025

Aberdeen Proving Ground, Md. – The U.S. Army is addressing a critical need for enhanced electromagnetic warfare (EW) capabilities with a new strategy and refined modernization approach. Recognizing a gap in extended-range, persistent ground and airborne EW assets, the Army is shifting its focus to improve targeting and provide commanders with the ability to effectively manipulate the electromagnetic spectrum in support of maneuver formations.

In March 2025, the Army published a comprehensive EW Strategy, designed to institutionalize enduring EW capabilities across the Army to support Joint Force operations. In conjunction with this strategy, the Army is refining its approach to the Terrestrial Layer System (TLS) for Brigade Combat Teams (BCT) and the Multifunction Electronic Warfare – Air Large (MFEW-AL) programs.

The recently concluded TLS BCT Rapid Prototyping program provided valuable insights into lightweight, modular architectures, informing the transition to the TLS Manpack as the primary EW/SIGINT system for all BCTs, with full fielding expected by FY28. Additionally, the Army plans to enhance TLS Manpack’s capabilities with vehicle agnostic modular adaptor kits (MAK) for mounted options that provide enhanced processing, extended range, and increased power. TLS Manpack will have the ability to provide EW capabilities at the brigade level, alongside distributed EW capabilities for division and higher echelons.

The MFEW-AL program will now prioritize leveraging Commercial-Off-The-Shelf (COTS) and Government-Off-The-Shelf (GOTS) solutions to rapidly deliver incremental capabilities for testing and feedback with Transformation in Contact (TiC) units in early Fiscal Year 2026. The program will utilize an incremental approach for delivery of capability that will evolve over time toward the full Army’s Airborne Electromagnetic Attack requirements.

These updates will be key in meeting recent direction from the Secretary of Defense that the Army remains the most lethal and ready land force in the world and achieve electromagnetic dominance by 2027.

Army Researchers Speed Up Delivery of Electromagnetic Warfare Capabilities

Tuesday, July 8th, 2025

ABERDEEN PROVING GROUND, Md. (July 7, 2025) — To accelerate the pace of deploying electromagnetic warfare techniques to Soldiers, Army researchers are developing new methods to deliver capabilities with greater speed and flexibility.

The Army Command, Control, Communications, Computers, Cyber, Intelligence, Surveillance and Reconnaissance (C5ISR) Center’s DynamIQ Electromagnetic Attack program improves how EW tools move rapidly across the battlefield to match the operational pace required in today’s warfare.

The Center’s research supports the Army’s EW Arsenal — demonstrated this year at Project Convergence Capstone 5 and Cyber Quest 2025 — that enables Soldiers to view a repository of available EW techniques, systems and targets. Given the mission objective and threats, users can understand their tools and quickly engage the adversary.

The key to C5ISR Center’s DynamIQ EA program is the ability to take validated EW techniques from the lab or from existing systems and transport them quickly to additional hardware platforms in a matter of hours, with no additional development time, according to a branch chief Shane Snyder. The Army saves time, money and resources by advancing from legacy EW systems to portable solutions.

“The Army is building a flexible foundation for evolving threats by creating a modular mission payload,” Snyder said. “Developing EW techniques in a modular fashion creates platform independence. Soldiers now have the freedom to choose which tools they need for a mission.”

The C5ISR Center has a long history of science and technology investments in Army EW systems, Snyder said. Multiple C5ISR Center R&D teams continue to invest in both offensive and force protection EW systems to ensure the Army can protect Soldiers from EW threats while impacting the threat decision cycles through offensive EW techniques.

C5ISR Center scientists and engineers working with Soldiers, specifically the 11th Cyber Battalionsince its activation in 2019, during field testing and experimentation events has provided valuable operational input, said Yaakov Gorlin, a C5ISR Center EW subject matter expert.

Testing events like Project Convergence and Cyber Quest provide the C5ISR Center with venues to test out both emerging concepts and maturing technologies, while getting direct operational feedback through their employment by the Soldiers. The C5ISR Center values these types of events as it allows the engineers and scientists to get first-hand insight into the capabilities being developed by the Center and provide the Soldier with relevant technology faster.

“Soldiers giving us direct feedback and talking about implementation during the development phase enables the Army to move faster,” Gorlin said. “Researchers need to understand what their work in the lab means from an operational perspective. These interactions with Soldiers help C5ISR Center achieve goals of improving ease of use and decreasing the cognitive burden. Software capabilities are tailored to the user.”

By Dan Lafontaine, C5ISR Center Public Affairs

Commentary on a Concept to Create US Cyber Force

Sunday, July 6th, 2025

This is where I provide some commentary on commentary and originally appeared in Soldier Systems Digest, Vol 5, Issue 26.

The Pentagon knows its cyber force model is broken. Here’s how to fix it

The authors of this article revive the argument for establishing a US Cyber Force. I agree, except that the designation of Cyberspace as the fifth warfighting domain was myopic in the first place and establishing a “Cyber” force only gets part of the job done.

The reality is that Cyber is SIGINT by other means and that SIGINT is one of many elements of electromagnetic warfare. The EM spectrum is the true fifth domain.

To solve our current shortfalls, we must look to the past to face the future.

First, establish the US Security Service (USSS) as the sixth military service with specialization in offensive Cyber, Electromagnetic Warfare, and SIGINT. This requires a fix to the Title 10 / Title 50 issues which caused this bifurcation of effort in the first place.

Second, reconstitute service level versions of the Security Service which were stood down and merged with other Intel organizations in the 70s and 80s. Like the USSS, these service elements will provide offensive Cyber, EW, and SIGINT capabilities to support their own service branch.

Third, merge the National Security Agency and US Cyber Command once again into a single entity with additional technical control over Electromagnetic Warfare and an understanding that this entity controls offensive actions in addition to collection. Once again, the tweaking of Title 10 / Title 50 issues is critical.

Fourth, leave cyber security to the services as they establish and manage their own networks.

The new US Security Service will provide the National Cyber Force as well as the lead on national level EMS collection efforts and EW policy and execution. It will also provide forces to support joint warfighting at the Strategic, Operational, and Tactical Levels. Finally, it will establish a SOF component to support properly USSOCOM with a full seat at the table.

Unfortunately, cyber has become a generic term used by operations personnel to describe the full gamut of EW activities. While CEMA has been used here in the US as well as in the UK, Cyber ElectroMagnetic Activites seems to have lost favor even though it better describes the capability. As EW elements are embedded in Army formations under the Transformation In Contact initiative, Army combat arms Soldiers and Leaders will begin to use the term EW to generically refer to what is, EW. Unfortunately, they won’t be getting everything. The Army’s concept of EW is a stripped down capability which provides elementary direction finding and jamming, which makes it a hammer when it could be a scalpel. Signals will be geolocated without ample characterization and either jammed or passed to fires for destruction. This will invariably lead to the denial of exploitable nodes or the destruction of deceptive emitters while the real ones escape notice.

The Army is actually exacerbating the issue. The Army is combining USAREUR’s 2nd Multi-Domain Task Force with the 56th Artillery Command referring to “cyber” and traditional fires and defensive and offensive fires. The Army got the CEMA element correct in the 2nd MDTF, combining Cyber, EW, and SI in one organization. The danger is placing all of that capability under a commander who only understands that targets get destroyed.

Eric Graves
 Founder
 SSD