FirstSpear TV

Archive for the ‘ISR’ Category

Like Moths to a False Flame: Lethality and Protection Through Deception Operations

Thursday, July 10th, 2025

The ongoing war in Ukraine has dem­onstrated the deadly efficiency of modern battlefield targeting. Rapid sensor-to-shooter integration, enabled by signals intelligence (SIGINT), geo­spatial intelligence (GEOINT), and un­manned aerial systems (UAS) recon­naissance, has shortened kill chains to the point where detection often leads to immediate engagement. High-value assets, identified through electronic emissions or ground-based reconnais­sance, face a severe risk of engage­ment and destruction. The prevalence of SIGINT collection, integration of UAS, and massed indirect fires in the doctrines of American adversaries rep­resents a complex problem that can be mitigated by the use of tactical decep­tion.1

Russia and China both employ multi-layered information collection and rap­id sensor-to-shooter systems. Com­mand and Control (C2) nodes are an example of High-Value-Targets (HVT) targeted by adversary doctrines and are a convenient example for exploring the use of, and opportunities created by, deception. Adversary doctrine de­scribes the following kill chain for en­gaging C2 nodes: mobile SIGINT collec­tors locate command nodes, UAS con­firm the target location, and artillery at echelon execute massed fires strikes before blue force commanders can re­act. The threat to U.S. forces this sys­tem represents is not theoretical, it un­folds daily on the battlefields of Ukraine and represents the conditions under which American forces are ex­pected to fight and win. These doc­trines are replicated every rotation at the National Training Center (NTC), where the Troopers of the 11th Ar­mored Cavalry Regiment (Blackhorse) serve as the professional opposing force (OPFOR). Blackhorse provides units with a critical opportunity to train against the techniques America’s adversaries use daily. Unexercised so­lutions already exist within Army for­mations to mitigate the effects of the modern battlefield’s shortened kill chains. By understanding adversary collection techniques, reducing signa­ture, and presenting deception signa­tures, battalions can disrupt enemy targeting cycles and create opportuni­ties for lethal response.

Figure 1. NESTS in the vicinity of Strawberry Fields oriented towards Dazashah collecting on rotational brigade MCP and enabler signatures in the Pass Complex targeting Joint Battle Command-Platform (Photo by 11th ACR Regimental S2)

Threat Collection Doctrine

Russia and China prioritize rapid target acquisition, integrated information col­lection, and fire control automation as core tenets of their military doctrine. The 7-100 series doctrinal manuals lay out their shared approach to large-scale combat operations (LSCO), detail­ing the reliance on multi-layered information collection systems that feed directly into massed indirect fires, shortening the time between detection and engagement. SIGINT plays a criti­cal role in this process, by geolocating friendly forces C2 nodes and tracking emissions from communications and mission command information sys­tems. GEOINT, collected by UAS, sup­plements SIGINT data by confirming target locations and conducting battle damage assessment (BDA) to refine follow-on strikes. This integrated tar­geting process ensures that friendly forces are rapidly engaged before they can reposition, react, or conceal them­selves.

For U.S. forces, the threat posed by this level of collection and targeting cannot be overstated because of our reliance on digital mission command systems. The ability of adversaries to rapidly detect and engage formations means that any electronic emissions or movement bears significant risk of compromise and targeting. Without ef­fective mitigation measures, units risk being outpaced in the decision-making cycle, allowing the enemy to dictate the tempo of battle. Blackhorse repli­cates these conditions at NTC, ensur­ing that rotational training units (RTUs) experience the same information-driv­en targeting process they will face in combat. By understanding how adver­saries collect and process information, U.S. forces can better prepare to dis­rupt, degrade, deny enemy kill chains.

Threat Replication

Blackhorse executes information col­lection operations by integrating SI­GINT, UAS, and ground-based recon­naissance to target friendly command and control C2 nodes, thereby disrupt­ing decision-making processes. Their layered sensor network operates in a sequence designed to detect, validate, and engage targets in real time. The Networked Electronic Support Threat Sensors (NESTS) system collects SIGINT, identifying emissions from satellite-based communications, while the Ver­satile Radio Observation and Direction (VROD) system intercepts frequency modulated (FM) transmissions to lo­cate and classify targets. Identification of likely targets by SIGINT cues UAS to confirm targeting data and refine col­lection. Due to limited time on station, UAS only remain on their assigned named areas of interest (NAIs) long enough to confirm targeting data be­fore moving on to identify additional targets in support of the maneuver fight. Small UAS (sUAS) may conduct BDA later if required.

Figure 2. FM NEST Emission Assessment for 2/11 TOC (Photo by 11th ACR Regimental S2)

Once validated, the Blackhorse Regi­mental Targeting Intelligence Cell (RTIC) processes the refined target data and passes it to fires elements for strike execution. This sensor-to-shoot­er process mirrors adversary work­flows, where electronic detection leads to physical compromise and rapid en­gagement. The effectiveness of this process underscores the necessity for signature management, deception, and counter-fire strategies to disrupt enemy kill chains.

Defeat through Deception

Deception is a fundamental aspect of modern warfare but is typically rele­gated to a survivability operation. Suc­cessful battlefield deception forces ad­versaries to misallocate resources, de­lay decision-making, and strike false targets. FM 3-90 defines deception as actions executed to deliberately mislead adversary decision-makers about friendly military capabilities, in­tentions, and operations.2

Adversary intelligence, surveillance, and reconnaissance (ISR) networks rely on rapid detection, classification, and engagement. By integrating deception, friendly forces can manipulate enemy perception, disrupt targeting cycles, and increase survivability.3&4

Deception operates across all domains and targets two specific dimension: physical and technical. Together these dimensions influence the cognitive, or human, dimension of decision making. Physical deception uses false positions and decoys to mislead enemy analysts into assessing a decoy as a legitimate target. Technical deception manipu­lates the electromagnetic spectrum (EMS) by emitting signals that mimic actual targets, causing adversary col­lectors to misinterpret the data. C2 nodes have both a physical and techni­cal signature, making them a useful ex­ample for exploring the requirements of a deception story.5

Units generate deception stories by creating signatures inside the collected spectrums, that force adversary ana­lysts to make false assessments. In the electronic spectrum, the deception node must emit signatures that mimic a C2 node. This requires units to allo­cate FM and Joint Battle Command-Platform (JBCP) capability to the de­ception node as both systems are pres­ent in MCPs. JBCPs constantly update their location data to the network, cre­ating a continuous low-power emis­sion. JBCP emissions are commonly as­sumed to be too weak to be detected, this is a false assumption. In addition to being detectable, the static nature of C2 nodes allows enemy analysts to accurately classify their emissions as a C2 node and initiate a queuing cycle and kill chain.

Reinforcing the deception story re­quires physically constructing the de­ception node to present a believable target. After SIGINT assets identify a likely MCP, adversary doctrine calls for UAS or ground reconnaissance to validate the target. Blackhorse repli­cates this effect with a dedicated MQ-1C Gray Eagle during NTC rotations. When UAS collection begins, the de­ception node must match the physical signature of an actual MCP. To achieve this, units must equip the deception node with wheeled vehicles, tentage, antennas, and other identifiable MCP-associated equipment.

Battalions can improve deception ef­fectiveness by creating deception kits from non-functional or excess equip­ment components. Broken antennas simulate active communication archi­tecture, while trailers transporting generator mockups and fuel cans rep­licate life support systems. Worn-out power cables present the image of power distribution to tents, reinforcing the illusion of an operational command node. Because high quality thermal sensors are widely available common commercial markets, the deception node should also mimic the thermal signature of an operational command node. Crews can simulate a generator’s thermal signature by piping exhaust from the towing vehicle into the decoy, allowing it to escape through a repli­cated exhaust port. Properly routing exhaust tubing and covering both the vehicle and the fake generator with camouflage netting obscures the de­ception and breaks up its physical sig­nature, making identification of the de­ception story as a deception less likely. Damaged shelters staged as command post structures further reinforce the deception story without risking mis­sion-essential assets. Integrating these elements allows units to construct de­ception nodes capable of withstanding both SIGINT and GEOINT validation.

To reduce risk, all personnel should withdraw from the deception node once it establishes. A technique to im­prove the deception teams survivabil­ity is to locate them in offset security positions, several hundred meters away, minimizing exposure while main­taining operational control of the node. Using wired connections to FM radios enables deception teams to transmit from secure positions, in­creasing the deception node’s electro­magnetic (EM) signature while keeping personnel protected. This method strengthens deception by making the site appear active while preserving force survivability. Another technique to strengthen technical deception is to equip the deception node with a CX-13298 Retrans Cable, commonly known as a “dog bone”. This cable al­lows the deception node to act as a re­trans site, mimicking the radio traffic of the actual C2 node while simultane­ously allowing the C2 node to broad­cast lower power transmissions, reduc­ing the likelihood of electronic detec­tion.

The final step in any deception opera­tion is concealing the actual asset. While the deception nodes attract en­emy collection by design, the real MCP must obscure or eliminate the signa­tures that would expose its location. This requires reversing the techniques used to make the deception node ap­pear authentic and ensuring the pro­tected asset remains undetected.

Figure 3. JBC-P NEST Emission Assessment for Troop CP and 2/11 TOC (Photo by 11th ACR Regimental S2)

Minimizing electromagnetic emissions is the first priority. JBCP should oper­ate on communications windows, es­tablish offset from the MCP, or estab­lish behind terrain that completely masks horizontal emissions. FM radios should connect by hardline to an offset antenna farm, preventing immediate correlation between transmissions and the MCP’s physical location. ATP 6-02.53, “Techniques for Tactical Ra­dio Operations,” details how antennas can offset more than two miles using ASIP remote operations via hardline connection, reducing the MCP’s expo­sure to SIGINT collection.6 When using a retrans setup on the deception node, the C2 node can locate in terrain that masks FM communication forward but allows broadcasts to hit the retrans system. These techniques not only im­prove concealment but also reinforce the deception story by generating EM emissions at the decoy location.

Beyond SIGINT mitigation, the physical composition of the MCP should be structured to blend into the operation­al environment while still meeting op­erational requirements. Use of vehi­cles and equipment incongruent with an MCP, reducing the size of the node, and collapsing assets during periods of UAS reconnaissance all contribute to the deception story by representing the C2 node as a different asset.

Reports of contact with UAS should trigger protection battle drills, includ­ing breaking down easily identifiable equipment, applying additional cam­ouflage, or even jumping the command post to prevent the presentation of an easy target. Once the ISR threat is neu­tralized or off-station, units can restore digital communications as needed.

Leveraging Lethality from Deception

A well-integrated deception plan must align with counter-reconnaissance, fires, and intelligence planning, antici­pating how and when enemy collection assets will react, and how to actively counter their efforts. This concept is rooted in reflexive control, a strategy developed by the Soviet Union in the 1960s and 1970s. Reflexive control seeks to manipulate an adversary’s de­cision-making process by shaping their perception, leading them to take ac­tions that are predictable and favor­able to the initiator. In this context, de­ception forces the enemy into a pre­dictable reaction, which friendly forces can prepare to exploit.

Given the passive nature of SIGINT col­lection, the first engagement window occurs when enemy UAS attempts to validate the deception target. To coun­ter this, units should establish anti-air ambushes near MCPs and deception nodes, positioning short-range air de­fense (SHORAD) or mobile air defense teams in ISR flight corridors. This al­lows friendly forces to engage enemy ISR platforms before they collect ac­tionable intelligence, denying the en­emy the ability to confirm or refine tar­gets.

If the enemy cannot validate the target with UAS, they may deploy ground re­connaissance teams to confirm or deny its presence. By identifying and secur­ing ground infiltration routes, units deny the enemy access to the decep­tion node, reinforcing the perception that a high-value target is present while creating opportunities to trap and destroy enemy reconnaissance el­ements before they can collect.

If deception is successful, the enemy will likely commit fires assets against the deception node without validation, encouraged in their belief that these protective efforts are aligned against a real asset. The final engagement op­portunity, where counter-fire radar, ground moving target indicator (GMTI) radar, and national level collection can detect and track enemy fires assets that have unmasked for a valueless en­gagement. Friendly forces can track and destroy these targets, preventing their use against friendly forces and creating hesitation to unmask assets for future strikes.

By integrating deception with air de­fense, counter-reconnaissance, and counter-fire operations, units can force the enemy into predictable, exploit­able mistakes while preserving their own combat power. Deception is not passive. It is a deliberate operation that includes all warfighting functions and sets conditions for the enemy to fail.7

Conclusion

By understanding adversary collection techniques, reducing the signature of high-value targets, and leveraging de­ception to shape enemy behavior, units can force adversaries to misallocate ISR and fires assets, disrupting their kill chain and protecting friendly forces. Current conflicts are occurring in high­ly contested ISR environments, where failure to integrate deception will re­sult in rapid targeting and engage­ment.

Deception is not just a defensive tool, it shapes the battlefield by forcing ad­versaries to react to false information, creating opportunities to disrupt their targeting cycles and degrade their ef­fectiveness. A well-integrated decep­tion plan must synchronize with recon­naissance, fires, and intelligence plan­ning to maximize survivability and cre­ate conditions for decisive action. Suc­cess in deception is not based on what friendly forces do, but by what the en­emy demonstrates they believe, mea­sured by the actions they take. When applied effectively, deception forces adversaries to waste resources, com­mit to false targets, and fight based on a reality that no longer ever existed.

By CPT Paul Dolan

Paul T. Dolan, a Captain in the Army, is currently assigned as a Battalion Intel­ligence Trainer with Panther Team at the National Training Center in Fort Ir­win, California. Prior to this, he served as a Squadron Intelligence Trainer with Cobra Team, also at the National Train­ing Center. Previous assignments in­clude Battalion Intelligence Officer for 2-8 Cavalry, 1st Cavalry Division; Cur­rent Operations Intelligence Officer for Task Force South East in Paktia Prov­ince, Afghanistan; and Platoon Leader for Bravo Troop, 1-40 Cavalry, 4th Bri­gade Combat Team, 25th Infantry Divi­sion. His military schooling includes the Armor Basic Officer Leader Course at Fort Benning, Georgia; Stryker Leader Course at Fort Benning, Georgia; Mili­tary Intelligence Captains Career Course at Fort Huachuca, Arizona; and the Army Space Basic Cadre Course at Peterson Space Force Base, Colorado. Dolan holds a Bachelor of Arts in Stud­ies in War and Peace from Norwich University and is currently pursuing a Master of Science in Unmanned and Autonomous Systems from Embry Rid­dle Aeronautical University.

Notes

1 ATP 7-100.1, “Russian Tactics”, 2024

2FM 3-90, “Tactics”, 2019

3ATP 7-100.1, “Russian Tactics”, 2024

4 ATP 7-100.2, “North Korean Tactics”, 2024

5 FM 3-90, “Tactics”, 2019

6 ATP 6-02.53, “Techniques for Tactical Ra­dio Operations”, 2019

7 FM 3-90, “Tactics”, 2019

GA Integrates Software for USMC Common Intelligence Picture WTI Course

Tuesday, May 20th, 2025

SAN DIEGO – 19 May 2025 – General Atomics Aeronautical Systems, Inc. (GA-ASI) has successfully integrated the advanced Optix software—developed by General Atomics Integrated Intelligence, Inc. (GA-i3)—into the U.S. Marine Corps (USMC) Common Intelligence Picture (CIP) for a multi-service Weapons and Tactics Instructor (WTI) course.

This milestone marks a significant enhancement in the USMC’s Intelligence, Surveillance, and Reconnaissance (ISR) capabilities, delivering a unified operational view critical to the training of future aviation leaders. For the USMC, this integration directly supports the deployment and effectiveness of the GA-ASI-supplied MQ-9A Medium-Altitude, Long-Endurance (MALE) Unmanned Aircraft System within the Marine Air-Ground Task Force (MAGTF).

Achieved through close collaboration with Marine Aviation Weapons and Tactics Squadron One (MAWTS-1) and Marine Operational Test and Evaluation Squadron One (VMX-1), the integration brought together engineers from GA-ASI and GA-i3 alongside USMC unmanned aviation operations experts. Their combined efforts enabled the seamless deployment of the Optix software during the rigorous WTI 2-25 training cycle.

USMC MQ-9A operations during the exercise took place at Yuma, Arizona, and the Strategic Expeditionary Landing Field (SELF) at Twenty-Nine Palms, California—the Marine Corps’ only expeditionary runway in the U.S. The live-fire training environment provided an invaluable opportunity to evaluate the MQ-9A’s role in complex combat scenarios.

By introducing Optix into this high-demand setting, Marines gained access to real-time data fusion, a shared operational picture, and enhanced collaborative decision-making—tools critical for modern battlefield success.

“The integration of Optix software represents a key step toward the effective deployment of the MQ-9A MUX MALE platform within the MAGTF and joint operations,” said Doug Brouwer, Senior Director for USMC Programs at GA-ASI. “It enables near real-time situational awareness and improves the decision-making process across the battlespace.”

Andrew Majchrowicz, Project Manager for Department of Defense Programs at GA-i3, added: “Equipping Marines with advanced ISR tools like Optix enhances the common intelligence picture and operational readiness in live-fire environments. This is a critical milestone in our shared goal of enabling joint-force effectiveness and full operational integration of the MQ-9A.”

The successful deployment of Optix within the WTI course underscores General Atomics’ continued commitment to delivering cutting-edge solutions that empower the U.S. military with unmatched intelligence and operational capabilities for future multi-domain operations.

US Army Conducts First Battalion-Level All-Domain Home Station Training Exercise

Tuesday, April 15th, 2025

YAKIMA TRAINING CENTER, Wash.—Within the foothills of the Cascade Mountain range, the 1st Multi-Domain Effects Battalion (MDEB) from the 1st Multi-Domain Task Force (MDTF) conducted the Army’s first battalion-level All-Domain Home Station Training (HST) exercise, Static Focus 3. Held from March 3-14, the exercise took place at the Yakima Training Center in conjunction with Project Convergence Capstone 5 (PC-C5).

Static Focus 3 enabled live training of the MDEB’s family of systems used to conduct Reconnaissance, Surveillance, and Target Acquisition (RSTA) and non-kinetic effects execution. 1MDEB, activated concurrently with 1MDTF in 2020, integrates the task force’s information, intelligence, cyber, electromagnetic warfare, and space capabilities.

A highlight of the training was the network extension integration and deep sensing capability of High-Altitude Balloons (HABs) and the experimentation with ultra long-endurance, solar powered Unmanned Aircraft System (UAS).

“This is our first real exercise integrating government owned and operated ultra long-endurance UAS specifically designed for long-range deep sensing,” said Lt. Col. Joseph Mroszczyk, commander of 1MDEB.

Prior to the exercise, the unit spent two years testing and training with the platform alongside the long-endurance UAS system’s contractor, Kraus Hamdani Aerospace. It wasn’t until this event that the Soldiers were able to independently operate the system.

“We’ve got trained pilots and mechanics gaining valuable experience on the platform now,” Lt. Col. Mroszczyk added. “They’re logging hours and providing crucial sensor data, enabling us to serve as the task force’s eyes and ears, and as key contributing Army sensor to the Joint Force.”

During Static Focus 3, 1MDEB logged over a hundred UAS flight hours in various configurations.

“From a maintenance perspective, I was astonished by how little time and resources the platform demanded,” said Sgt. Jake Meyer from the UAS platoon from 1MDEB’s Extended Range and Sensing Effects (ERSE) Company. “Compared to traditional platforms, which require several months to get familiarized with, we were up and running in just two days.”

Max endurance testing was included in the experimentation of the platform, to include multi-ship flights.

“Multi-ship flight operations are the most complex missions, but the autonomous capability allows me, as an operator, to focus on the mission instead of my continuous direct management of each aircraft,” said Staff Sgt. Jacob Wilbert from the UAS platoon from 1MDEB’s ERSE Company.

Complementary to the long-range deep sensing UAS, the unit also experimented with HABs from three vendors, sponsored by the Army Intelligence, Surveillance, and Reconnaissance (ISR) Task Force for inclusion in the event and in conjunction with PC-C5.

“For me, the highlight of the event was witnessing the successive launches from all three HAB vendors and creating a constellation. Being part of this was exhilarating, because each vendor offered their own unique features and capabilities,” said Sgt. Antonio Morales from 1MDEB’s ERSE Company’s HAB platoon.

Previously, the unit had to travel to Fort Huachuca, Arizona, to access the same level of training. Static Focus 3 not only reduced the cost of traveling to Arizona to train, but also served as a valuable technical rehearsal for future employment.

“The progress that we’ve made over this last week greatly enhanced our capability as a task force,” said Mroszczyk.

As a theater-level unit and Joint Force enabler, assigned to the Indo-Pacific, the 1MDTF plays a vital role in synchronizing long-range precision fires layered with long-range precision effects to create multiple dilemmas and neutralize adversary anti-access and area denial networks. The MDTF’s proven innovation, agility, and lethality have led the Army to direct five full MDTFs in strategically significant locations worldwide.

PC-C5 is an Army hosted experiment that provides Joint and Multinational participants various locations that supports individual modernization efforts while solving problems through applications with Combined, Joint All Domain Operations (CJADO). PC-C5 ensures that the Army, can rapidly and continuously converge effects across all domains – air, land, sea, space, and cyber, to increase operational tempo and generate decision advantage over our adversaries. These structured series of experiments demonstrate transformation and modernization efforts, expand war-winning capabilities, and deliver the Army of 2030 while designing the Army of 2040.

By SSG Brandon Rickert

RT’s Advanced Aerostat Technologies Are Poised to Take US Border Security to the Next Level

Friday, April 4th, 2025

The pioneering company will show how its latest ATV (All Terrain Vehicle) aerostat system can provide a superior solution for border security professionals.

TX, USA – April 2, 2025 – RT LTA Systems Ltd., a global leader inthe development and manufacture of aerostat systems for intelligence, surveillance, reconnaissance (ISR) and communications, will showcase its full range of advanced aerostat solutions at the upcoming Border Security Expo in Phoenix, Arizona. Alongside its U.S. subsidiary, RT Aerostat Systems, Inc., the company will present its innovative mobile aerostat platforms, offering critical solutions to U.S. Customs and Border Protection (CBP) and other security agencies.

RT’s persistent, elevated surveillance and communicationssolutions provide 360-degree coverage over vast areas, delivering real-time intelligence, early warning alerts and enhanced situational awareness. With nearly three decades of operational experience and over six million flight hours, RT has established itself as a trusted provider of combat-proven aerostat systems. Designed for extreme weather conditions, these systems prioritize multi-domain versatility and user-friendliness—critical factors when securing a nation’s extensive borders.

Each aerostat system consists of a ground control station, a ground system module, a tether, a lighter-than-air platform, a stabilized payload platform and an advanced sensor suite. The systems can be rapidly deployed by a

small crew, making them ideal for border security missions. RT’s systems support a variety of payloads, including radars, COMINT/ELINT modules, electro-optical (EO) and infrared (IR) cameras, as well as communications equipment, ensuring high adaptability for various mission types and seamless interoperability with other field assets, such as UAVs, drones and ground forces.RT’s Skystar™ tactical aerostats provide high mobility and cost efficiency, carrying diverse payloads at altitudes of up to 1,500 feet. The larger, blimp-shaped Skyguard aerostat family can reach up to 20,000 feet, ensuring comprehensive surveillance across expansive geographic areas. RT’s systems have consistently proven their reliability and adaptability across a wide range of environments,from deserts and mountains to maritime settings, offering 24/7 surveillance and communications, even in the harshest conditions.

A standout among RT’s offerings is its compact tactical aerostat mounted on an ATV. Engineered for real-time reconnaissanceacross rugged terrains, and with rapid deployment and maneuverability both on- and off-road, the system can markedly improve flexibility and efficiency for border security operations. This unique system can be operated locally or remotely – from the site or from a distance – supporting EO/IR cameras and communication payloads at altitudes up to 1,500 feet, with real-time data transmission to command and control centers. This robust aerostat solution is easily transportable and operable with minimal training by a small team. The system offers medium-range surveillance capabilities, with swift assembly and launch within 15 minutes. Control is effortlessly managed through a handheld personal control system, making it an ideal choice for diverse surveillance missions.

Rami Shmueli, RT’s CEO, emphasized the company’s commitment to providing reliable, long-endurance surveillance solutions: “For years, we have delivered cutting-edge aerostat technologies to border security agencies worldwide. Our highly mobile and versatile systems are designed to address the evolving challenges of the U.S. Southern Border and beyond. With our Texas-based subsidiary, we are well-positioned to equip U.S. border security agencies with state-of-the-art ISR solutions.”

RT will present its SkyStar™ and Skyguard Aerostat systems at the upcoming Border Security Expo 2025, taking place at the Phoenix Convention Center, South Building, 8-9 April, 2025 (booth #239). Visitors and delegates are encouraged to reach out in advance to schedule an in-person meeting.

Air Force Senior Leaders Discuss Intelligence Driving Unified Action

Monday, March 10th, 2025

AURORA, Colo. (AFNS) —

Air Force Lt. Gen. Leah Lauderback, deputy chief of Staff, ISR and Cyber Effects Operations, and Space Force Maj. Gen. Gregory Gagnon, deputy chief of Space Operations for Intelligence, joined a panel discussion with Mr. Greg Ryckman, Defense Intelligence Agency deputy director for Global Integration, during the Air and Space Force Association Warfare Symposium in Aurora, Colorado, March 4.

The two senior Department of the Air Force intelligence officers joined the stage alongside Ryckman to discuss the current intelligence environment, monitoring threats and on-going collaboration between combat support agencies.

To begin the panel, Gagnon gave context for why America’s need for intelligence is growing. He stated there has been significant changes throughout the world in the past 10 years, including the drastically decreasing gap between the U.S. and Chinese economies.

“In the past 10 years, the Chinese economy has grown 78%,” Gagnon stated. “Let me tell you why this is important… what makes you rich can make you strong.”

Gagnon explained the efforts China has taken to increase its defense budget and noted they’ve increased on-orbit assets by 650% since the U.S. Space Force’s creation in 2019.

Lauderback spoke about the importance of unifying the Department of Defense’s intel capabilities with combat support agencies such as the DIA. She explained senior intelligence leaders are working to get intel information to as many levels throughout the DoD as possible.

We want to be able to provide the intentions of the adversary,” Lauderback said. “We want to provide their capabilities, and we want to give [commanders and decision-makers] confidence in the intelligence so that [they] can make the best decisions in a high-end conflict.”

With DIA acting as the lead to unify intelligence information, Gagnon said they are putting the “‘common’ back in the common intel picture,” emphasizing its importance for global synchronization.

“Our design in the Department of Defense is to deliver unified action,” Gagnon said. “That requires a unified set of understanding about where the enemy is and what their intent is, so this is a very important initiative.”

-Secretary of the Air Force Public Affairs

Kirtland AFB to Gain 306th Intelligence Squadron

Thursday, December 19th, 2024

ARLINGTON, Va. (AFNS) —

The Department of the Air Force selected Kirtland Air Force Base, New Mexico, as the preferred location to host the 306th Intelligence Squadron.

The 306th IS, currently located at Will Rogers Air National Guard Base, Oklahoma, trains analysts that integrate with Air Force Special Operations Commandaircrew. They help ensure situational awareness, threat warning, and signals collection.

The service will move the 306th IS and its detachments at Hurlburt AFB, Florida, and Cannon AFB, New Mexico, to Kirtland AFB to align and integrate with AFSOC weapon system formal training units.

AFSOC is consolidating their AC-130J, MC-130J and CV-22A FTUs at Kirtland AFB under the 58th Special Operations Wing.

Kirtland AFB will gain almost 100 new personnel, including permanent party active duty, civilians and students.

The Department of the Air Force will continue the strategic basing process in pursuit of a final decision in the near future.

Photo by Senior Airman Christopher Storer

Bombardier Defense Delivers First Global 6500 Aircraft To The U.S. Army’s HADES Program

Wednesday, November 27th, 2024

Bombardier Defense delivered the first Bombardier Global 6500 aircraft in support of the United States Army’s High Accuracy Detection and Exploitation System (HADES) program during a ceremony held at Bombardier Group’s U.S. Headquarters in Wichita, Kansas

The Global 6500 is a proven platform providing range, speed, reliability and endurance. It represents the ideal fixed-wing solution for the U.S. Army’s next-generation intelligence, surveillance and reconnaissance (ISR) aircraft, flying higher, faster and farther than legacy airborne sensor platforms

With the ability to deploy in all weather conditions, and the support of Bombardier’s 24/7 worldwide services network, Bombardier’s Global family of aircraft has become the platform of choice for over 10 different mission types


The Bombardier Global 6500 aircraft delivered to the U.S. Army in support of the HADES program.

Bombardier Defense celebrated the delivery of the first Bombardier Global 6500 aircraft to the United States Army in support of the High Accuracy Detection and Exploitation System (HADES) program. Bolstered by the Global 6500’s high-performance capabilities, the fixed-wing platform will contribute to strengthening the U.S. Army’s aerial deep sensing abilities and marks a significant milestone toward the United States’ goal of modernizing its aerial military intelligence.

Joined by U.S. Senator Jerry Moran (R-KS), State of Kansas officials, and U.S. Army leaders, the celebration highlighted the delivery of the first prototype airframe for the next-generation intelligence, surveillance and reconnaissance (ISR) solution and the beginning of the next stage of the program to integrate systems.

“Bombardier Defense is honored to support the U.S. Army with the delivery of the first Global 6500aircraft, a high-performance platform that possesses the speed, endurance-at-range and altitude capabilities to support deep-sensing for the Army of tomorrow,” said Steve Patrick, Vice President of Bombardier Defense. “This best-in-class jet is the future-proofed solution to provide the U.S. Army with the capabilities needed to face current and future threats.”

“We are proud of the partnership with Bombardier Defense and the mission-focused professionals in the State of Kansas. We remain excited about the opportunities we can unlock by pairing the performance, versatility and reliability of the Global 6500 with modern payloads aligned to priority intelligence requirements. HADES is the centerpiece of the Army’s collection strategy, and the Global 6500 is the system that brings that strategy to life. This aircraft gives us the range, payload capacity, speed and endurance to deliver timely, relevant and responsive capabilities for the full spectrum of Army and Joint collection requirements.” – Andrew Evans, Director, HQDA G-2 ISR Task Force

“The partnership between Bombardier, the U.S. Army and the Wichita workforce has produced a next-generation aircraft equipped to meet the demands of warfare in a new era of technology,” said U.S. Senator Jerry Moran (R-KS). “The HADES aircraft has the tools needed to deter threats, conduct surveillance and help keep our country safe. This is the start of a new chapter in the aviation capabilities of our military and continues Kansas’ legacy of defense manufacturing.”

Fixed-wing platforms like Bombardier’s Global 6500aircraft, which flies faster, longer, and higher than legacy airborne sensor platforms, offer a significant advantage toward enhancing performance of aerial ISR missions. The Global 6500 provides several advantages for military entities, such as reliability, operational reach, and expanded operating areas. With a maximum endurance of up to 18 hours, and up to 750 flight hours between maintenance intervals, and part of the Global family that has an impressive 99.83% dispatch reliability, the Global 6500 aircraft is an ideal choice to accomplish operational objectives such as deep sensing.

Bombardier Defense has dedicated in-house engineering and support teams available 24/7 worldwide with the ability to incorporate modifications tailored to the customer’s need with complete certification capabilities across the full spectrum of civilian, military and hybrid operations. Bombardier brings decades of experience working with special mission operators and renowned mission systems integrators to adapt its proven platform for critical operations worldwide.

Soldiers Provide Input on Microsensor Tech Developed in Partnership with ROK

Tuesday, November 19th, 2024

ABERDEEN PROVING GROUND, Md. — This year, the U.S. Army Combat Capabilities Development Command Chemical Biological Center hosted a Soldier touchpoint event at Aberdeen Proving Ground in Edgewood, Maryland to test out new unmanned drones equipped with a set of microsensors developed in conjunction with the Republic of Korea’s Agency for Defense Development, or ROK ADD. Soldier touchpoints are one of the first major milestones in testing a potential technology to be fielded.

The microsensor effort began as a partnership between the Center and ROK ADD in 2018 to successfully meet the stringent form-factor requirements set forth by the customer. Kevin Wan, a DEVCOM CBC chemical engineer and project manager for the microchemical sensor effort, called in ROK ADD for assistance with the 3-gram sensor size requirement while his team focused on suitable use cases. Both centers pushed to complete their collaborative effort in time for this upcoming user assessment.

“The design space was quite limiting to begin with, so we worked with our Korean partners to get this working on a three-gram payload,” said Wan. “The hornet drones are great at intelligence, surveillance and reconnaissance missions, but adding chemical-sensing capabilities would further its use cases — this is what we primarily wanted to focus on.”

The effort came to a head on July 31, 2024, when the center hosted Soldiers from the U.S. Army Reserve’s 455 Chemical Brigade, headquartered in Sloan, Nevada, as well as their partners from ROK ADD, which serves as their DEVCOM equivalent, in an exercise where all participants could give concerted feedback on the drones and sensors.

Initial funding for the project came from DEVCOM Soldier Center in Natick, Massachusetts, which had the need for a sensor weighing no more than three grams. This form factor would specifically fit on the Black Hornet III, a currently fielded minuscule drone platform weighing in at 38 grams. The project received funding from the Assistant Secretary of Defense for Industrial Base Policy International Cooperation Office’s Coalition Warfare Program and other organizations.

Wan and his team shifted their focus on the sensor’s early warning detection capabilities against a chemical threat — whether it may be a nerve or blister agent. They then focused their efforts on redundancy and reliability to increase detection. “Having two independent sensors provide the same response would increase the confidence of detection,” said Wan. “That redundancy and reliability coupled with a low limit of detection for early warning is critical to us and our Soldiers.”

To test their prototypes, DEVCOM CBC invited CBRN specialists to learn how to fly these drones and run a simulated scenario involving piloting the Black Hornets into various tents in an enclosed space with one of the tents housing a simulated agent. Cpl. Brittney Batimana, one of the Soldiers involved, said that the new drones would increase Soldiers’ safety and mission success.

“It’s pretty simple — once you get comfortable with the camera’s point of view, it’s easy to identify your targets,” said Batimana. “Our job is to identify and decontaminate hazards: this is just another way for us to always stay prepared if a situation were to ever turn chemical.”

The collaborative effort between the two centers was evident throughout the Soldier touchpoint and mirrored the success of this joint development process. “We love to work together with our partners,” said Wan. “Highly competent and highly intelligent. What we both want to see going forward are more use cases and increasing the library of threats that can be detected.” This sentiment was further echoed by Dr. Myung Kyu Park, Wan’s ROK ADD counterpart and micro chemical sensor project manager: “We do very well together — [they] worked very hard to see that these sensors work.”

Increasing the library of substances to detect would include various explosives, narcotics or industrial chemicals, furthering the drone’s use cases significantly beyond the intelligence, surveillance and reconnaissance realm. With the success of the Soldier touchpoint exercise, Wan and his team know that the form factor lends itself to an even wider variety of scenarios.

By Parker Martin