TYR Tactical

Archive for the ‘ISR’ Category

RC-135 Rivet Joint, EA-37B Compass Call Conduct Historic Sorties

Monday, December 15th, 2025

OFFUTT AIR FORCE BASE, Neb. —  

An RC-135 Rivet Joint and an EA-37B Compass Call aircraft began the first-ever sustained, integrated sorties outside of a large force exercise performed by the two aircraft on Sept. 24, 2025. This operation was meant to advance the 55th Wing’s electromagnetic spectrum warfare capabilities.

The initial mission planning for these sorties was conducted September 8th, 15th and 22nd, 2025, between the 38th Reconnaissance Squadron and the 43rd Electronic Combat Squadron. Weapons officers and leaders from both communities have been creating the foundational steps for sustained integration.  Already there have been rapid developments and lessons learned. These lessons learned are shaping tactics, techniques, and procedures between the two assets.

The integration pairs the 38th RS and the 343rd RS rivet joint aircrews with the 43rd ECS and the 41st ECS compass call crews. The effort has grown since initial planning and now includes all four squadrons, creating a larger, more capable enterprise.

According to Capt. Wesley Ballinger, 38th RS weapons & tactics, flight chief, the world’s best electromagnetic warfare support aircraft, the RJ, is now rapidly and precisely integrating and refining operations on a continuous basis with the world’s pre-eminent electromagnetic attack aircraft, the EA-37B.

“The synergistic integration of Rivet Joint’s intelligence gathering with Compass Call’s electronic warfare capabilities has proven to be a game-changer on the modern battlefield. We’re not simply flying sorties; we’re creating a new paradigm. By refining tactics, techniques, and procedures, we’re ensuring our forces maintain a decisive advantage in the electromagnetic spectrum,” said Capt. Jasmine Harris, 38th RS, weapons & tactics flight commander.

“This level of sustained, continuous integration has never been conducted before by these two assets. Both assets complete specific actions in the kill-chain, and now the kill-chain is being refined into a faster, robust, and more lethal tool, the future of electromagnetic warfare belongs to the United States,” said Ballinger.

Other assets integrate, but what separates this event from others is that both assets are part of Air Combat Command and the 55th Wing family. They each have a specific role in targeting and engaging operations. These assets are the cutting edge of US electromagnetic capabilities and are re-shaping the electromagnetic spectrum for future conflicts.

“With the future of warfare lying in the electromagnetic spectrum, it is crucial we sharpen our skills and increase interoperability to ensure we maintain proficiency in arguably one of the most important domains in the battlespace,” said Capt. Drake Ronnau, 38th RS, weapons and tactics officer.

Moving forward, four sorties per month will be flown between Offutt Air Force Base and Davis-Monthan Air Force Base, Arizona, and will be conducted on a permanent basis. The EA-37B has never had sustained integrated sorties with any other asset.

By D.P. Heard

From 88 Days to 24 Hours: Capt. Keneally Phelan Earns Lt. Gen. Weinstein Award for Game-Changing Military Intelligence Innovation

Monday, December 8th, 2025

FORT CARSON, Colo. – Capt. Keneally Phelan, Director of Intelligence with 4th Battalion, 10th Special Forces Group (Airborne), was named the 2025 recipient of the Lt. Gen. Sidney T. Weinstein Award for Excellence in Military Intelligence at a ceremony held on Fort Carson, CO, Oct. 30, 2025. She is the first “Original” from the 10th SFG(A) to receive the award, which recognizes exceptional leadership and commitment within the Military Intelligence (MI) Corps.

The Weinstein Award was established in 2007 to honor Lt. Gen. Tom Weinstein, known as the “Father of Modern Military Intelligence.” His innovative vision transformed Army Intelligence, shaping its structure, doctrine, and capabilities—particularly the principles of Intelligence Preparation of the Battlefield (IPB), which remain crucial today.

To win the award, candidates must go through a thorough selection process. A board of at least five senior officers reviews the nominations. They evaluate each candidate based on their leadership and contributions to military intelligence in the past year.

Col. Nathanael E. Joslyn, Commander of 10th Special Forces Group (Airborne), praised Phelan for her outstanding accomplishments during the ceremony. He highlighted how her leadership enabled her team to become the first under Special Operations Command Europe (SOCEUR) to gain authority to release intelligence reports. This innovation dramatically shortened the time needed for intelligence production from 88 days to less than 24 hours.

“Your efforts didn’t just improve operations,” Joslyn added. “They made up an incredible 98 percent of SOCEUR’s total intelligence output; that’s a clear reflection of your dedication and drive to make a real difference.”

Phelan also improved intelligence training while working on TROJAN ARCHER (TA), the top validation exercise for Counterintelligence (CI) and Human Intelligence (HUMINT) agents in Special Operations. She developed a new Tier IV Training Manual for TA, which helped accelerate the career progression of 91 personnel in the 10th SFG(A) and ensured that skilled intelligence professionals were available more quickly.

Her model proved to be so effective that the 1st Special Forces Command (Airborne) plans to adopt and expand it for the 2026 TROJAN ARCHER exercise. This decision solidifies her legacy as a key driver of change within the Intelligence community.

“Your work embodies everything Lieutenant General Weinstein stood for,” Joslyn said. “Vision, innovation and commitment to excellence.”

Phelan used her acceptance speech to express her gratitude to her team. She emphasized that her success was a group effort and credited them for their support.

“Those accomplishments are not my own,” Phelan said. “They are a testament to teamwork, collaboration, and shared purpose with some of the hardest workers I’ve ever met.”

The award was presented by Lt. Gen. Weinstein’s daughters, Mila Masur and Halee Weinstein. It recognizes Phelan’s leadership, professional skills, and commitment to the values of Duty, Honor, and Country—all of which were integral to their father’s 33-year military career.

“I am really excited that another woman won the award,” said Masur. “My dad was a feminist, and it is really exciting when women are recognized.”

By SSG Michael Wood

Aery Aviation Unveils the RAVEN Multi-Purpose Special Missions Platform: A New Era of Airborne ISR & Electronic Warfare

Thursday, November 27th, 2025

RAVEN™, the world’s only turnkey, fully reconfigurable Gulfstream-based ISR, SIGINT, ELINT, and Electronic Warfare (EW) training aircraft.

NEWPORT NEWS, VA, UNITED STATES, November 24, 2025 — Aery AviationUnveils the RAVEN™ Multi-Purpose Special Missions Platform: A New Era of Airborne ISR & Electronic Warfare

Aery Aviation proudly announces the global debut of the RAVEN™ Multi-Purpose Special Missions PlatformTM, the world’s only turnkey, fully reconfigurable Gulfstream-based ISR, SIGINT, ELINT, and Electronic Warfare (EW) training aircraft. Purpose-built for today’s rapidly evolving threat environments, RAVEN delivers unmatched mission flexibility, long-range endurance, and full-spectrum electronic warfare capability for defense forces and government customers worldwide.

At its core, RAVEN combines the proven performance and reliability of the Gulfstream IVSP airframe with an advanced open-architecture mission suite engineered for rapid reconfiguration. Whether performing strategic ISR collection, RF environmental characterization, standoff jamming, or serving as a high-fidelity EW training surrogate, RAVEN brings a capability set previously unavailable on any single airborne platform.

The Gulfstream IVSP airframe provides long endurance of up to 12 hours and greater than 4,000 miles range, RAVEN offers global reach and persistent on-station endurance—delivering long-dwell ISR or extended EW training time without refueling or repositioning.

Full-Spectrum Electronic Warfare in a Single Platform

Built around a modular, open-architecture EW suite, RAVEN hosts:
• Software-defined radios with wideband record/playback
• Direction finding and geolocation capability
• High-gain steerable transmit antennas
• Frequency-agile threat analysis and radar pulse measurement
• Onboard PXI-based test and measurement instrumentation for real-time RF validation
• Supports a variety of customizable EW training payloads, including Stand Off Jamming, subject to U.S. export authorization.
This allows customers to train, test, evaluate, and validate hardware, software, and tactics—all in one aircraft.

Rapid Reconfiguration for Virtually Any Mission

The RAVEN platform is designed for accelerated mission adaptation, featuring:
• Wing hard points with integrated wiring, accepting most ISR or electronic POD’s up to 1,000 lbs. in total weight.
• Compatible with a variety of commercially available ISR radars, EO/IR sensors, and mission systems (all export controlled).
• Mission equipment racks and operator consoles, up to four customizable racks total
• High-speed optical networks and special-mission cooling equipment
• Wescam Electro Optical Infrared sensor system with BLOS encrypted real time data transfer
• Seamless integration support with Aery’s ODA, DER, and engineering teams and partners

From ISR to ELINT to C-UAS test work, the aircraft can be mission-ready in days, not months.

Turnkey Operations or Lease — COCO or GOCO – Domestic or OCONUS

Aery Aviation offers multiple procurement and operational models:
• Full Turnkey — Aery provides the aircraft, flight crew, EW/ISR operators, and dedicated maintenance personnel for all missions.
• Lease-to-Operate — End users may lease a fully configured RAVEN to execute missions independently.
• Hybrid Models — Tailored operational support and onboard training options.

One-of-a-Kind Capability — and Available Now

There is no other platform like RAVEN in the world. Aery currently has two RAVEN aircraft available, with a third in active development to meet global demand.

Aery Aviation Statement

“RAVEN represents a transformative leap for airborne ISR and electronic warfare training. No other commercial platform blends this level of endurance, altitude, payload flexibility, and EW fidelity into a single aircraft. The RAVEN is purpose-built for today’s threat environment—and tomorrow’s.” Aery is a full-service design, build, fly and sustain aircraft company based in Newport News, VA with key certifications such as DCMA 8210.1, FAA Part 135/145, ISO-9001/AS-9100, USTRANSCOM CARB approved operator and more. In addition, Aery employs over 100 dedicated experienced professionals with hundreds of collective years of military service.

RAVEN is designed to support a variety of ISR, EW training, and mission-systems payloads, depending on end-user requirements and U.S. export authorization. The platform accommodates multiple commercial and government-furnished systems while ensuring strict compliance with ITAR and EAR regulations. No controlled technical data is disclosed or implied in this release.

www.aeryaviation.com

How The US Army Can Enhance Joint Operations

Saturday, November 8th, 2025

U.S. Soldiers assigned to the 35 series military occupation specialty can play a crucial role in gathering and analyzing intelligence on targets in joint operations. These assessments can support the U.S. Air Force in planning precise strikes with aircraft, like the B-2 Spirit stealth bomber. Military intelligence is conducted throughout the global operational theater to maintain readiness, develop warfighting capabilities and increase lethality. (U.S. Army Video by Pfc. Jaidyn Moore)

“Surveillance Operation” by Daniel Millidge is licensed under De Wolfe Music Library. To request a copy of the 5th Mobile Public Affairs Detachment’s music license please email team@dewolfemusic.com]

77th Intelligence Wing Activates on JBAB

Saturday, September 27th, 2025

JOINT BASE ANACOSTIA-BOLLING, Washington, D.C.  –  

Joint Base Anacostia-Bolling hosted an historic ceremony for the activation of the 77th Intelligence Wing at JBAB, Washington, D.C., July 24, 2025.

Established during WWII as the 77th Observation Group of the U.S. Army Air Forces, the 77th has evolved over more than 80 years of service, supporting various Army and Air Force mission sets. In its next mission as the 77th IW, the wing will support the Defense Intelligence Agency by aligning Air Force competencies with mission assets, supporting Airmen development and retention, and empowering mission command at the appropriate levels.

“This activation will ensure we have mission-ready Airmen trained and equipped to support the Defense Intelligence Agency mission,” said Chief Master Sgt. Jermaine Evans, the senior enlisted leader for the 77th IW.  “The new wing’s construct, with wing and squadron leadership, is familiar to our Airmen and will help as they communicate issues and solve problems.”

The 77th IW traces its roots to a rich history of supporting the warfighter since 1942.

“We want to ensure our Airmen receive the same, if not better, support, development, and advocacy they would receive in a traditional Air Force organization while becoming the premier wing that Airmen volunteer to be a part of,” said Evans.

The 77th IW continues its legacy of supporting the warfighter by ensuring Airmen are equipped to support the DIA mission – to prevent and decisively win wars.

“My number one job is to normalize and standardize Air Force training, force development, and adherence to regulations in order to ensure the Airmen of the 77th IW can meet the demands of the DIA mission and peer competition,” said Col. Ryan O’Neal, commander of the 77th IW.  “I foresee the 77th Intelligence Wing becoming a critical link aligning the Air Force intelligence community with all source intelligence analysis and tradecraft provided by DIA as the intelligence community’s functional lead.”

As an effective case study, the Air Force currently operates the 70th Intelligence, Surveillance and Reconnaissance Wing, which trains and equips Airmen to support world-wide cryptologic and cyber missions from its headquarters at the National Security Agency, Fort George G. Meade, Maryland.

O’Neal explained that the proven concept of the 70th ISR being a force multiplier to the NSA is what the 77th IW will be to DIA. Units under the 77th IW include the 2nd and 15th Intelligence Squadrons along with the 5th and 6th Intelligence Support Squadrons, which are slated to conduct activation ceremonies on JBAB in late July and early August.

According to O’Neal and Evans, Airmen in the 77th IW can expect a tradition of excellence and an emphasis on honing their skillsets, which bring value to the Air Force, the intelligence community and the American people.

US Army Retires Two Most Distinguished Aerial Intelligence Platforms

Saturday, September 20th, 2025

CAMP HUMPHREYS, Korea — The 501st Military Intelligence Brigade-Theater (MIB-T) observed the closure of the U.S. Army’s two most distinguished aerial intelligence, surveillance and reconnaissance (ISR) legacies, GUARDRAIL and Airborne Reconnaissance Low (ARL) during events, July 30-31, 2025.

In an event designated Operation PACIFIC SUNSET, the 501st MIB-T hosted a commemorative ceremony at the Desidario Army Airfield that featured a final flight of the aerial platforms, exhibition flights, and a runway display of aircraft. Soldiers of the Republic of Korea concluded the ceremony with a dedication honoring the contributions of the 3rd Military Intelligence (MI) Battalion, ARL, and GUARDRAIL Common Sensor (GRCS).

Since 1975, GUARDRAIL has provided indications and warnings to United States Forces Korea. Throughout its operational history, GUARDRAIL monitored the Demilitarized Zone (DMZ) through a series of diplomatic crises on the peninsula. In 1988, under the 3rd MI Battalion, the first version of GRCS entered service, ensuring foreknowledge of any aggressive actions across the DMZ for many years to come.

“[GUARDRAIL] is our longest serving U.S. Army ISR asset in the [Korean Theater of Operations], and our only true [program of record] aircraft,” said Lt. Col. Derrick J. Zantt, commander of the 3rd MI Battalion.

At the program’s high point, GUARDRAIL aircraft and ground stations became standard, serving in six aerial MI battalions. Each iteration, at its debut, was on the cutting edge of technology.

By the 1990s, the U.S. Army Intelligence and Security Command (INSCOM) had gained considerable experience in the development and fielding of special electronic mission aircraft. ARL emerged out of a shift in national priorities toward counterdrug smuggling, primarily out of the Andean Ridge region of South America. Originally a quick reaction capability, ARL was developed to satisfy low intensity multi-intelligence requirements in U.S. Southern Command and quickly proved its worth.

When the Army decided to retire the OV-1D Mohawks, the service looked to DoD and Congress for a solution.

“JSTARS couldn’t do it. The Air Force U-2 couldn’t do it. Even satellites couldn’t do it,” said Dr. Thomas Hauser, U.S. Army Intelligence and Security (INSCOM) historian and author of the INSCOM aviation book series. “INSCOM came through at the last minute with a solution: the versatile ARL. Their ever-watchful eyes stayed open all these years. It was always on the flightline or in the air, ready to serve the Army.”

During five decades of service, GUARDRAIL and ARL flew over 120,000 hours of support, over 30,000 sorties, and were flown by more than 800 military pilots through the 3rd MI Battalion over the life of the systems.

The final flights of these aerial intelligence platforms come as the Army transitions to more modern and lethal assets.

“Through the end of [its] life, the aircraft continued [its] operational collection mission until the last day and were able to effect a seamless handoff to the ATHENA program, which is serving as our bridge,” said Col. Brian Tinklepaugh, 501st MI Brigade-Theater commander.

The Army Theater-level High-altitude Expeditionary Next Airborne (ATHENA) platform combines multiple intelligence disciplines into a singular platform, enabling the Army to have a multi-intelligence approach to targets where the Army can use geospatial intelligence, signals intelligence, and electronic intelligence to look at a single target and better define that target for operational commanders.

“These bridge aircraft will continue to inform HADES programmatic requirements, facilitate early implementation of new training concepts and fielding strategies, and ultimately ensure “No Cold Starts” for the HADES program,” said Jordan Rubin, chief, INSCOM G3 ISR Operations.

The Army’s shift to the High Accuracy Detection and Exploitation System (HADES) marks a pivotal step in the future of aerial intelligence. HADES is a crewed aerial multi-intelligence collection system optimized for active campaigning in areas where range, speed, and data convergence are critical to rapidly gain and maintain situational understanding, freedom of maneuver, overmatch, and decision advantage in multi-domain operations. The system will employ on-board data processing using artificial intelligence and machine learning and will provide sensor-to-shooter links to shorten the kill chain to operate at the tempo and volume of high-intensity conflict.

HADES replaces legacy platforms such as GUARDRAIL and ARL and gives commanders the ability to see deeper, decide faster, and strike more effectively across multiple domains. As large-scale combat operations grow more complex, HADES and other strategic aerial assets will be central to ensuring U.S. forces maintain overmatch and decision advantage on the battlefield.

“As we move forward to the Army’s aerial future with HADES, I’m incredibly proud of not just the [legacy] aircraft, but the men and women who have flown the aircraft, maintained the aircraft, and who have provided that intelligence watch over more than five decades,” said Tinklepaugh.

By Erin Rohn

Like Moths to a False Flame: Lethality and Protection Through Deception Operations

Thursday, July 10th, 2025

The ongoing war in Ukraine has dem­onstrated the deadly efficiency of modern battlefield targeting. Rapid sensor-to-shooter integration, enabled by signals intelligence (SIGINT), geo­spatial intelligence (GEOINT), and un­manned aerial systems (UAS) recon­naissance, has shortened kill chains to the point where detection often leads to immediate engagement. High-value assets, identified through electronic emissions or ground-based reconnais­sance, face a severe risk of engage­ment and destruction. The prevalence of SIGINT collection, integration of UAS, and massed indirect fires in the doctrines of American adversaries rep­resents a complex problem that can be mitigated by the use of tactical decep­tion.1

Russia and China both employ multi-layered information collection and rap­id sensor-to-shooter systems. Com­mand and Control (C2) nodes are an example of High-Value-Targets (HVT) targeted by adversary doctrines and are a convenient example for exploring the use of, and opportunities created by, deception. Adversary doctrine de­scribes the following kill chain for en­gaging C2 nodes: mobile SIGINT collec­tors locate command nodes, UAS con­firm the target location, and artillery at echelon execute massed fires strikes before blue force commanders can re­act. The threat to U.S. forces this sys­tem represents is not theoretical, it un­folds daily on the battlefields of Ukraine and represents the conditions under which American forces are ex­pected to fight and win. These doc­trines are replicated every rotation at the National Training Center (NTC), where the Troopers of the 11th Ar­mored Cavalry Regiment (Blackhorse) serve as the professional opposing force (OPFOR). Blackhorse provides units with a critical opportunity to train against the techniques America’s adversaries use daily. Unexercised so­lutions already exist within Army for­mations to mitigate the effects of the modern battlefield’s shortened kill chains. By understanding adversary collection techniques, reducing signa­ture, and presenting deception signa­tures, battalions can disrupt enemy targeting cycles and create opportuni­ties for lethal response.

Figure 1. NESTS in the vicinity of Strawberry Fields oriented towards Dazashah collecting on rotational brigade MCP and enabler signatures in the Pass Complex targeting Joint Battle Command-Platform (Photo by 11th ACR Regimental S2)

Threat Collection Doctrine

Russia and China prioritize rapid target acquisition, integrated information col­lection, and fire control automation as core tenets of their military doctrine. The 7-100 series doctrinal manuals lay out their shared approach to large-scale combat operations (LSCO), detail­ing the reliance on multi-layered information collection systems that feed directly into massed indirect fires, shortening the time between detection and engagement. SIGINT plays a criti­cal role in this process, by geolocating friendly forces C2 nodes and tracking emissions from communications and mission command information sys­tems. GEOINT, collected by UAS, sup­plements SIGINT data by confirming target locations and conducting battle damage assessment (BDA) to refine follow-on strikes. This integrated tar­geting process ensures that friendly forces are rapidly engaged before they can reposition, react, or conceal them­selves.

For U.S. forces, the threat posed by this level of collection and targeting cannot be overstated because of our reliance on digital mission command systems. The ability of adversaries to rapidly detect and engage formations means that any electronic emissions or movement bears significant risk of compromise and targeting. Without ef­fective mitigation measures, units risk being outpaced in the decision-making cycle, allowing the enemy to dictate the tempo of battle. Blackhorse repli­cates these conditions at NTC, ensur­ing that rotational training units (RTUs) experience the same information-driv­en targeting process they will face in combat. By understanding how adver­saries collect and process information, U.S. forces can better prepare to dis­rupt, degrade, deny enemy kill chains.

Threat Replication

Blackhorse executes information col­lection operations by integrating SI­GINT, UAS, and ground-based recon­naissance to target friendly command and control C2 nodes, thereby disrupt­ing decision-making processes. Their layered sensor network operates in a sequence designed to detect, validate, and engage targets in real time. The Networked Electronic Support Threat Sensors (NESTS) system collects SIGINT, identifying emissions from satellite-based communications, while the Ver­satile Radio Observation and Direction (VROD) system intercepts frequency modulated (FM) transmissions to lo­cate and classify targets. Identification of likely targets by SIGINT cues UAS to confirm targeting data and refine col­lection. Due to limited time on station, UAS only remain on their assigned named areas of interest (NAIs) long enough to confirm targeting data be­fore moving on to identify additional targets in support of the maneuver fight. Small UAS (sUAS) may conduct BDA later if required.

Figure 2. FM NEST Emission Assessment for 2/11 TOC (Photo by 11th ACR Regimental S2)

Once validated, the Blackhorse Regi­mental Targeting Intelligence Cell (RTIC) processes the refined target data and passes it to fires elements for strike execution. This sensor-to-shoot­er process mirrors adversary work­flows, where electronic detection leads to physical compromise and rapid en­gagement. The effectiveness of this process underscores the necessity for signature management, deception, and counter-fire strategies to disrupt enemy kill chains.

Defeat through Deception

Deception is a fundamental aspect of modern warfare but is typically rele­gated to a survivability operation. Suc­cessful battlefield deception forces ad­versaries to misallocate resources, de­lay decision-making, and strike false targets. FM 3-90 defines deception as actions executed to deliberately mislead adversary decision-makers about friendly military capabilities, in­tentions, and operations.2

Adversary intelligence, surveillance, and reconnaissance (ISR) networks rely on rapid detection, classification, and engagement. By integrating deception, friendly forces can manipulate enemy perception, disrupt targeting cycles, and increase survivability.3&4

Deception operates across all domains and targets two specific dimension: physical and technical. Together these dimensions influence the cognitive, or human, dimension of decision making. Physical deception uses false positions and decoys to mislead enemy analysts into assessing a decoy as a legitimate target. Technical deception manipu­lates the electromagnetic spectrum (EMS) by emitting signals that mimic actual targets, causing adversary col­lectors to misinterpret the data. C2 nodes have both a physical and techni­cal signature, making them a useful ex­ample for exploring the requirements of a deception story.5

Units generate deception stories by creating signatures inside the collected spectrums, that force adversary ana­lysts to make false assessments. In the electronic spectrum, the deception node must emit signatures that mimic a C2 node. This requires units to allo­cate FM and Joint Battle Command-Platform (JBCP) capability to the de­ception node as both systems are pres­ent in MCPs. JBCPs constantly update their location data to the network, cre­ating a continuous low-power emis­sion. JBCP emissions are commonly as­sumed to be too weak to be detected, this is a false assumption. In addition to being detectable, the static nature of C2 nodes allows enemy analysts to accurately classify their emissions as a C2 node and initiate a queuing cycle and kill chain.

Reinforcing the deception story re­quires physically constructing the de­ception node to present a believable target. After SIGINT assets identify a likely MCP, adversary doctrine calls for UAS or ground reconnaissance to validate the target. Blackhorse repli­cates this effect with a dedicated MQ-1C Gray Eagle during NTC rotations. When UAS collection begins, the de­ception node must match the physical signature of an actual MCP. To achieve this, units must equip the deception node with wheeled vehicles, tentage, antennas, and other identifiable MCP-associated equipment.

Battalions can improve deception ef­fectiveness by creating deception kits from non-functional or excess equip­ment components. Broken antennas simulate active communication archi­tecture, while trailers transporting generator mockups and fuel cans rep­licate life support systems. Worn-out power cables present the image of power distribution to tents, reinforcing the illusion of an operational command node. Because high quality thermal sensors are widely available common commercial markets, the deception node should also mimic the thermal signature of an operational command node. Crews can simulate a generator’s thermal signature by piping exhaust from the towing vehicle into the decoy, allowing it to escape through a repli­cated exhaust port. Properly routing exhaust tubing and covering both the vehicle and the fake generator with camouflage netting obscures the de­ception and breaks up its physical sig­nature, making identification of the de­ception story as a deception less likely. Damaged shelters staged as command post structures further reinforce the deception story without risking mis­sion-essential assets. Integrating these elements allows units to construct de­ception nodes capable of withstanding both SIGINT and GEOINT validation.

To reduce risk, all personnel should withdraw from the deception node once it establishes. A technique to im­prove the deception teams survivabil­ity is to locate them in offset security positions, several hundred meters away, minimizing exposure while main­taining operational control of the node. Using wired connections to FM radios enables deception teams to transmit from secure positions, in­creasing the deception node’s electro­magnetic (EM) signature while keeping personnel protected. This method strengthens deception by making the site appear active while preserving force survivability. Another technique to strengthen technical deception is to equip the deception node with a CX-13298 Retrans Cable, commonly known as a “dog bone”. This cable al­lows the deception node to act as a re­trans site, mimicking the radio traffic of the actual C2 node while simultane­ously allowing the C2 node to broad­cast lower power transmissions, reduc­ing the likelihood of electronic detec­tion.

The final step in any deception opera­tion is concealing the actual asset. While the deception nodes attract en­emy collection by design, the real MCP must obscure or eliminate the signa­tures that would expose its location. This requires reversing the techniques used to make the deception node ap­pear authentic and ensuring the pro­tected asset remains undetected.

Figure 3. JBC-P NEST Emission Assessment for Troop CP and 2/11 TOC (Photo by 11th ACR Regimental S2)

Minimizing electromagnetic emissions is the first priority. JBCP should oper­ate on communications windows, es­tablish offset from the MCP, or estab­lish behind terrain that completely masks horizontal emissions. FM radios should connect by hardline to an offset antenna farm, preventing immediate correlation between transmissions and the MCP’s physical location. ATP 6-02.53, “Techniques for Tactical Ra­dio Operations,” details how antennas can offset more than two miles using ASIP remote operations via hardline connection, reducing the MCP’s expo­sure to SIGINT collection.6 When using a retrans setup on the deception node, the C2 node can locate in terrain that masks FM communication forward but allows broadcasts to hit the retrans system. These techniques not only im­prove concealment but also reinforce the deception story by generating EM emissions at the decoy location.

Beyond SIGINT mitigation, the physical composition of the MCP should be structured to blend into the operation­al environment while still meeting op­erational requirements. Use of vehi­cles and equipment incongruent with an MCP, reducing the size of the node, and collapsing assets during periods of UAS reconnaissance all contribute to the deception story by representing the C2 node as a different asset.

Reports of contact with UAS should trigger protection battle drills, includ­ing breaking down easily identifiable equipment, applying additional cam­ouflage, or even jumping the command post to prevent the presentation of an easy target. Once the ISR threat is neu­tralized or off-station, units can restore digital communications as needed.

Leveraging Lethality from Deception

A well-integrated deception plan must align with counter-reconnaissance, fires, and intelligence planning, antici­pating how and when enemy collection assets will react, and how to actively counter their efforts. This concept is rooted in reflexive control, a strategy developed by the Soviet Union in the 1960s and 1970s. Reflexive control seeks to manipulate an adversary’s de­cision-making process by shaping their perception, leading them to take ac­tions that are predictable and favor­able to the initiator. In this context, de­ception forces the enemy into a pre­dictable reaction, which friendly forces can prepare to exploit.

Given the passive nature of SIGINT col­lection, the first engagement window occurs when enemy UAS attempts to validate the deception target. To coun­ter this, units should establish anti-air ambushes near MCPs and deception nodes, positioning short-range air de­fense (SHORAD) or mobile air defense teams in ISR flight corridors. This al­lows friendly forces to engage enemy ISR platforms before they collect ac­tionable intelligence, denying the en­emy the ability to confirm or refine tar­gets.

If the enemy cannot validate the target with UAS, they may deploy ground re­connaissance teams to confirm or deny its presence. By identifying and secur­ing ground infiltration routes, units deny the enemy access to the decep­tion node, reinforcing the perception that a high-value target is present while creating opportunities to trap and destroy enemy reconnaissance el­ements before they can collect.

If deception is successful, the enemy will likely commit fires assets against the deception node without validation, encouraged in their belief that these protective efforts are aligned against a real asset. The final engagement op­portunity, where counter-fire radar, ground moving target indicator (GMTI) radar, and national level collection can detect and track enemy fires assets that have unmasked for a valueless en­gagement. Friendly forces can track and destroy these targets, preventing their use against friendly forces and creating hesitation to unmask assets for future strikes.

By integrating deception with air de­fense, counter-reconnaissance, and counter-fire operations, units can force the enemy into predictable, exploit­able mistakes while preserving their own combat power. Deception is not passive. It is a deliberate operation that includes all warfighting functions and sets conditions for the enemy to fail.7

Conclusion

By understanding adversary collection techniques, reducing the signature of high-value targets, and leveraging de­ception to shape enemy behavior, units can force adversaries to misallocate ISR and fires assets, disrupting their kill chain and protecting friendly forces. Current conflicts are occurring in high­ly contested ISR environments, where failure to integrate deception will re­sult in rapid targeting and engage­ment.

Deception is not just a defensive tool, it shapes the battlefield by forcing ad­versaries to react to false information, creating opportunities to disrupt their targeting cycles and degrade their ef­fectiveness. A well-integrated decep­tion plan must synchronize with recon­naissance, fires, and intelligence plan­ning to maximize survivability and cre­ate conditions for decisive action. Suc­cess in deception is not based on what friendly forces do, but by what the en­emy demonstrates they believe, mea­sured by the actions they take. When applied effectively, deception forces adversaries to waste resources, com­mit to false targets, and fight based on a reality that no longer ever existed.

By CPT Paul Dolan

Paul T. Dolan, a Captain in the Army, is currently assigned as a Battalion Intel­ligence Trainer with Panther Team at the National Training Center in Fort Ir­win, California. Prior to this, he served as a Squadron Intelligence Trainer with Cobra Team, also at the National Train­ing Center. Previous assignments in­clude Battalion Intelligence Officer for 2-8 Cavalry, 1st Cavalry Division; Cur­rent Operations Intelligence Officer for Task Force South East in Paktia Prov­ince, Afghanistan; and Platoon Leader for Bravo Troop, 1-40 Cavalry, 4th Bri­gade Combat Team, 25th Infantry Divi­sion. His military schooling includes the Armor Basic Officer Leader Course at Fort Benning, Georgia; Stryker Leader Course at Fort Benning, Georgia; Mili­tary Intelligence Captains Career Course at Fort Huachuca, Arizona; and the Army Space Basic Cadre Course at Peterson Space Force Base, Colorado. Dolan holds a Bachelor of Arts in Stud­ies in War and Peace from Norwich University and is currently pursuing a Master of Science in Unmanned and Autonomous Systems from Embry Rid­dle Aeronautical University.

Notes

1 ATP 7-100.1, “Russian Tactics”, 2024

2FM 3-90, “Tactics”, 2019

3ATP 7-100.1, “Russian Tactics”, 2024

4 ATP 7-100.2, “North Korean Tactics”, 2024

5 FM 3-90, “Tactics”, 2019

6 ATP 6-02.53, “Techniques for Tactical Ra­dio Operations”, 2019

7 FM 3-90, “Tactics”, 2019

GA Integrates Software for USMC Common Intelligence Picture WTI Course

Tuesday, May 20th, 2025

SAN DIEGO – 19 May 2025 – General Atomics Aeronautical Systems, Inc. (GA-ASI) has successfully integrated the advanced Optix software—developed by General Atomics Integrated Intelligence, Inc. (GA-i3)—into the U.S. Marine Corps (USMC) Common Intelligence Picture (CIP) for a multi-service Weapons and Tactics Instructor (WTI) course.

This milestone marks a significant enhancement in the USMC’s Intelligence, Surveillance, and Reconnaissance (ISR) capabilities, delivering a unified operational view critical to the training of future aviation leaders. For the USMC, this integration directly supports the deployment and effectiveness of the GA-ASI-supplied MQ-9A Medium-Altitude, Long-Endurance (MALE) Unmanned Aircraft System within the Marine Air-Ground Task Force (MAGTF).

Achieved through close collaboration with Marine Aviation Weapons and Tactics Squadron One (MAWTS-1) and Marine Operational Test and Evaluation Squadron One (VMX-1), the integration brought together engineers from GA-ASI and GA-i3 alongside USMC unmanned aviation operations experts. Their combined efforts enabled the seamless deployment of the Optix software during the rigorous WTI 2-25 training cycle.

USMC MQ-9A operations during the exercise took place at Yuma, Arizona, and the Strategic Expeditionary Landing Field (SELF) at Twenty-Nine Palms, California—the Marine Corps’ only expeditionary runway in the U.S. The live-fire training environment provided an invaluable opportunity to evaluate the MQ-9A’s role in complex combat scenarios.

By introducing Optix into this high-demand setting, Marines gained access to real-time data fusion, a shared operational picture, and enhanced collaborative decision-making—tools critical for modern battlefield success.

“The integration of Optix software represents a key step toward the effective deployment of the MQ-9A MUX MALE platform within the MAGTF and joint operations,” said Doug Brouwer, Senior Director for USMC Programs at GA-ASI. “It enables near real-time situational awareness and improves the decision-making process across the battlespace.”

Andrew Majchrowicz, Project Manager for Department of Defense Programs at GA-i3, added: “Equipping Marines with advanced ISR tools like Optix enhances the common intelligence picture and operational readiness in live-fire environments. This is a critical milestone in our shared goal of enabling joint-force effectiveness and full operational integration of the MQ-9A.”

The successful deployment of Optix within the WTI course underscores General Atomics’ continued commitment to delivering cutting-edge solutions that empower the U.S. military with unmatched intelligence and operational capabilities for future multi-domain operations.