Atrius Development Group

SECDEF Signs Drone Dominance Directive

July 10th, 2025

Late this afternoon, Secretary of Defense Pete Hegseth signed a memorandum entitled, “Unleashing U.S. Military Drone Dominance” which is on the heals of last months’s Executive Order, 14307 “Unleashing American Drone Domination.”

Here it is in full:

When I became the Secretary of Defense, I committed to rebuild our military to match threats to capabilities. Drones are the biggest battlefield innovation in a generation, accounting for most of this year’s casualties in Ukraine. Our adversaries collectively produce millions of cheap drones each year. While global military drone production skyrocketed over the last three years, the previous administration deployed red tape. U.S. units are not outfitted with the lethal small drones the modern battlefield requires.

On June 6th, President Trump issued Executive Order 14307 to support the American drone industry and arm our warfighters. The Department of Defense is going above and beyond this order. I am rescinding restrictive policies that hindered production and limited access to these vital technologies, unleashing the combined potential of American manufacturing and warfighter ingenuity. I am delegating authorities to procure and operate drones from the bureaucracy to our warfighters.

Our mission is threefold. First, we will bolster the nascent U.S. drone manufacturing base by approving hundreds of American products for purchase by our military. Leveraging private capital flows that support this industry, our overt preference is to Buy American.

Second, we will power a technological leapfrog, arming our combat units with a variety of low-cost drones made by America’s world-leading engineers and Al experts. Drone dominance is a process race as much as a technological race. Modem battlefield innovation demands a new procurement strategy that fuses manufacturers with our frontline troops.

Finally, we’ll train as we expect to fight. To simulate the modern battlefield, senior officers must overcome the bureaucracy’s instinctive risk-aversion on everything from budgeting to weaponizing and training. Next year I expect to see this capability integrated into all relevant combat training, including force-on-force drone wars.

Emergent technologies require new funding lines. To address the urgent need for drones, investment methods outlined in Executive Order 14307 are being investigated.

The directives detailed in the attached memorandum support our industrial base, reform acquisition, and field new technology for the warfighter. Lethality will not be hindered by self-imposed restrictions, especially when it comes to harnessing technologies we invented but were slow to pursue. Drone technology is advancing so rapidly, our major risk is risk-avoidance. The Department’s bureaucratic gloves are coming off.

Signed

Peter Hegseth

Secretary of Defense

SECDEF also released this video:

It seems that all of my Drone wishes are coming true.

-Eric Graves

Founder

*emphasis added by editor

DroneShield Receives $9.7m Latin American Contract

July 10th, 2025

– A $9.7 million package of three standalone contracts for a defence end customer in a Latin American (LATAM) country

– Delivery and payment due Q3-Q4 2025

DroneShield (ASX:DRO) is pleased to announce it has received a package of three standalone contracts for its handheld and on-the-move counter-drone systems. The contract sum is $9.7 million, with DroneShield’s privately owned in-country reseller that is contractually required to distribute the products to a defence end customer in a LATAM country. DroneShield expects to deliver all equipment throughout Q3 and Q4 2025, with cash payment expected in Q3 and Q4 2025. No additional material conditions need to be satisfied.

DroneShield has previously received two standalone contracts from this reseller for this defence customer in December 2024 and January 2025 totalling approximately $10.8 million, with all imports, deliveries, and payments handled on-time and in a highly professional manner. There is no obligation for any additional contracts from this reseller or the customer.


Pictured: DroneShield DroneSentry-X Mk2 counter-drone system

Oleg Vornik, DroneShield CEO, commented: “In 2025, DroneShield has successfully delivered products, capability, and training into the Latin American market. With a substantial pipeline, diversified over multiple countries and customers, DroneShield is anticipating further developments in 2025 in this region.”

Learn more at droneshield.com.

TacJobs – Überleben Seeks Ops Manager

July 10th, 2025

We need your help! We’re currently looking to fill an Ops Manager position, onsite at our north Idaho HQ. Competitive pay, unlimited PTO, free product, and an opportunity to play a vital role in helping us shape the next chapter of Überleben.

We’ll have a few other roles opening soon, too.

www.uberleben.co/pages/jobs

Air Force Updates, Clarifies DAFI 36-2903 Guidance

July 10th, 2025

ARLINGTON, Va. (AFNS) —  

The Air Force updated its dress and personal appearance instruction to provide clear guidance for Airmen serving worldwide. The new guidance memorandum for DAFI 36-2903,?Dress and Personal Appearance of Department of the Air Force Personnel, clarifies mandatory uniform items and personal appearance standards while adding visuals for greater clarity. The changes in this guidance memorandum only pertain to Airmen; the U.S. Space Force is projected to release a separate dress and appearance instruction in the coming weeks.

The new guidance:

• OCP Uniform: Requires all officers to maintain one complete set of an Operational Camouflage Pattern (OCP) uniform

• Eyelash Extensions: Removes authorization of eyelash extensions unless needed for medical reasons

• Combat Boots: Establishes a minimum height for combat boots

• OCP Sleeve Folding/Cuffing: Clarifies the folding or cuffing of OCP sleeves

Under the new guidance, all Air Force officers, regardless of career field, must maintain at least one complete set of either the non-fire-retardant operational camouflage pattern uniform or an improved hot weather combat OCP uniform. Additionally, combat boots must now be between 8-12 inches in height from the bottom of the heel tread to the top of the back of the boot, and soling material will not exceed two inches in height. Airmen must comply with the new uniform and boot height guidance no later than 90 days from the date of the guidance memorandum.

With the publication of this update, eyelash extensions are no longer authorized unless for medical reasons and documented on an Air Force Form 469, Duty Limiting Condition Report. If medical authorization is obtained and documented on an AF Form 469, eyelash extensions will not exceed 12 mm in length. Airmen must comply with the new eyelash extension standard no later than 30 days from the date of the guidance memorandum.

This update also clarifies the policy of folding or cuffing OCP sleeves. When sleeves are not rolled up, cuffs may remain visible, or members may fold their sleeves once or twice as shown in the updated guidance memorandum.

The new guidance memorandum for DAFI 36-2903 will be posted soon.

Secretary of the Air Force Public Affairs

Safariland Launches New Cordura Wraps for Incog X IWB Holster

July 10th, 2025

JACKSONVILLE, Fla. – Safariland®, a brand of The Safariland Group and a leading global provider of safety products designed for the public safety, military, professional and outdoor markets and one of Cadre Holdings, Inc.’s (NYSE: CDRE) (“Cadre”) key brands, announces the release of new Cordura wrapped models of its award-winning Incog X Inside-the-Waistband (IWB) holster. These latest additions bring together enhanced durability and next-level personalization, reinforcing Safariland’s commitment in the EDC space.

Available in Multicam, Black Multicam and M81 Woodland, the Cordura-wrapped models deliver a rugged aesthetic backed by the field-proven toughness of Cordura® fabric. Built for users who demand reliability without compromising on style, these new variants add a tactical edge to one of the most trusted holsters on the market.

“The Incog X was built to adapt to the user and these new Cordura wraps take that versatility even further,” said Tim Drnec, Vice President of Marketing at Safariland. “With these wraps, users gain a more personalized carry experience, all while maintaining the high standards of reliability and performance they expect from the Incog X.”

The new Cordura wrapped Incog X holsters are sold exclusively with the attached mag caddy, offering extended functionality and a balanced, intuitive draw. Designed for modern EDC needs, these models retain all the original performance features, including red-dot sight compatibility, passive retention and Safariland’s signature over-the-belt clip system with adjustable concealment shims.

Fit Availability at launch includes:

Glock 19/17

Sig P365 X-Macro/Fuse

Glock 43X/48

Sig P365/X/XL

The new Cordura wrapped Incog X models are available now. To explore Safariland’s extensive range of holsters and accessories, visit Safariland.com.

30mm ROF-90 TALL for Aimpoint ACRO & Steiner MPS

July 10th, 2025

Hillsborough, North Carolina, July 10 2025 – Reptilia® is proud to announce the release of the 30mm ROF-90™ TALL, the latest addition to our Ruggedized Offset Optic Mount (ROF™) line,now available and shipping.

Purpose-built for shooters running a 30mm magnified optic, the ROF-90 TALL mounts your mini red dot sight (MRDS) at the true 12 o’clock position, offering rapid transitions and a heads-up aiming solution that minimizes offset and simplifies target acquisition.

This updated version features increased height to clear taller and larger elevation turrets, expanding compatibility across a wider range of LPVOs and precision scopes. Whether you’re running compact glass or heavy-duty elevation knobs, the ROF-90 TALL ensures a clean, unobstructed fit, no interference, and no compromise.

Designed to integrate seamlessly with:
• Reptilia AUS™ 30mm Mounts
• Geissele® Super Precision 30mm Mounts

Compatible with:
• Aimpoint® ACRO P1 & P2
• Steiner® Optics MPS

Product Specs:
• CNC-machined from 7075-T6 billet aluminum
• MIL-STD Type III hardcoat anodized
• Made in the USA

Like all Reptilia products, the ROF-90 TALL was developed with direct end-user feedback and built to exceed expectations in the field. Durable, precise, and proudly American-made.

www.reptiliacorp.com

4GD to Triple Training Capacity with Two New Urban Warfare Training Facilities

July 10th, 2025

London, 9th July 2025 – Military training technology specialists 4GD has significantly expanded its operations to two new urban warfare training facilities. The new Garrison Urban Skills Facilities (GUSFs) are based at Catterick Training Area in North Yorkshire and Rollestone near Salisbury. With an existing 4GD SmartFacility in operation with 16 Air Assault Brigade in Colchester, 4GD’s military training sites now represent a broad geographical footprint and can be utilised by British Army units across the UK.

In close collaboration with the Defence Infrastructure Organisation (DIO), Landmarc Support Services (Landmarc) and the Land Warfare Centre, 4GD provide the technological backbone to the facilities.

4GD’s input into these facilities represents the next generation in urban warfare training. 4GD has installed its trademark SimWall and 4GAV systems across all Urban Fighting Skills Facilities. SimWall comprises a series of reconfigurable and adaptable panels designed to provide a greater variety of training scenarios. 4GAV has then enhanced the facility through the use of light, smoke and sound effects as well as detailed ‘after-action’ reviews. 4GD’s use of advanced technology serves to enhance the learning experience for the soldier. Facilities are ready for upgrading to integrate 4GD’s flagship robotic SimStriker, as already in use in the Urban Training Facility at Colchester.

Both GUSF facilities have recently become operational. These urban training environments, being used by the British Army, have been designed with unprecedented levels of realism, complexity and density that replicate the range of urban environments likely to be encountered by military personnel deploying on operations. The three sites (Catterick, Rollestone and Colchester) alongside 4GD’s significant upgrading of Copehill Down Village facilities can all connect together to form a larger training area. This provides unrivalled training opportunities across four sites. 

Through these facilities, 4GD and its partners have significantly enhanced the British Army’s capacity to conduct realistic and relevant urban warfare training. These facilities underscore a shared commitment to equipping military personnel with the skills and experience they need to operate effectively.

Rob Taylor, 4GD Founder and Director, said:

“4GD’s expanded footprint enables British Army units across the UK to access high-fidelity, urban warfare training environments designed to reflect the diverse, high-stakes scenarios soldiers are likely to encounter in real-world deployments.

Increasing the training capacity of facilities with 4GD technology allows us to collect much more real-world data on how soldiers train in urban facilities. This enables us to understand the needs of the warfighter and stay ahead of the curve when developing future products.”

Lt Col Gord Robinson (RANGERS), SO1 Optimisation, Land Warfare Centre commented:

“These state-of-the-art facilities have been extremely well received by the soldiers who appreciate how easily the internal space can be reconfigured to provide a non-repetitive and altering urban training scenario. It really is a long overdue enhancement to the Defence Training Estate which fully enables the achievement of platoon level urban training objectives in a controlled realistic urban environment.”

Like Moths to a False Flame: Lethality and Protection Through Deception Operations

July 10th, 2025

The ongoing war in Ukraine has dem­onstrated the deadly efficiency of modern battlefield targeting. Rapid sensor-to-shooter integration, enabled by signals intelligence (SIGINT), geo­spatial intelligence (GEOINT), and un­manned aerial systems (UAS) recon­naissance, has shortened kill chains to the point where detection often leads to immediate engagement. High-value assets, identified through electronic emissions or ground-based reconnais­sance, face a severe risk of engage­ment and destruction. The prevalence of SIGINT collection, integration of UAS, and massed indirect fires in the doctrines of American adversaries rep­resents a complex problem that can be mitigated by the use of tactical decep­tion.1

Russia and China both employ multi-layered information collection and rap­id sensor-to-shooter systems. Com­mand and Control (C2) nodes are an example of High-Value-Targets (HVT) targeted by adversary doctrines and are a convenient example for exploring the use of, and opportunities created by, deception. Adversary doctrine de­scribes the following kill chain for en­gaging C2 nodes: mobile SIGINT collec­tors locate command nodes, UAS con­firm the target location, and artillery at echelon execute massed fires strikes before blue force commanders can re­act. The threat to U.S. forces this sys­tem represents is not theoretical, it un­folds daily on the battlefields of Ukraine and represents the conditions under which American forces are ex­pected to fight and win. These doc­trines are replicated every rotation at the National Training Center (NTC), where the Troopers of the 11th Ar­mored Cavalry Regiment (Blackhorse) serve as the professional opposing force (OPFOR). Blackhorse provides units with a critical opportunity to train against the techniques America’s adversaries use daily. Unexercised so­lutions already exist within Army for­mations to mitigate the effects of the modern battlefield’s shortened kill chains. By understanding adversary collection techniques, reducing signa­ture, and presenting deception signa­tures, battalions can disrupt enemy targeting cycles and create opportuni­ties for lethal response.

Figure 1. NESTS in the vicinity of Strawberry Fields oriented towards Dazashah collecting on rotational brigade MCP and enabler signatures in the Pass Complex targeting Joint Battle Command-Platform (Photo by 11th ACR Regimental S2)

Threat Collection Doctrine

Russia and China prioritize rapid target acquisition, integrated information col­lection, and fire control automation as core tenets of their military doctrine. The 7-100 series doctrinal manuals lay out their shared approach to large-scale combat operations (LSCO), detail­ing the reliance on multi-layered information collection systems that feed directly into massed indirect fires, shortening the time between detection and engagement. SIGINT plays a criti­cal role in this process, by geolocating friendly forces C2 nodes and tracking emissions from communications and mission command information sys­tems. GEOINT, collected by UAS, sup­plements SIGINT data by confirming target locations and conducting battle damage assessment (BDA) to refine follow-on strikes. This integrated tar­geting process ensures that friendly forces are rapidly engaged before they can reposition, react, or conceal them­selves.

For U.S. forces, the threat posed by this level of collection and targeting cannot be overstated because of our reliance on digital mission command systems. The ability of adversaries to rapidly detect and engage formations means that any electronic emissions or movement bears significant risk of compromise and targeting. Without ef­fective mitigation measures, units risk being outpaced in the decision-making cycle, allowing the enemy to dictate the tempo of battle. Blackhorse repli­cates these conditions at NTC, ensur­ing that rotational training units (RTUs) experience the same information-driv­en targeting process they will face in combat. By understanding how adver­saries collect and process information, U.S. forces can better prepare to dis­rupt, degrade, deny enemy kill chains.

Threat Replication

Blackhorse executes information col­lection operations by integrating SI­GINT, UAS, and ground-based recon­naissance to target friendly command and control C2 nodes, thereby disrupt­ing decision-making processes. Their layered sensor network operates in a sequence designed to detect, validate, and engage targets in real time. The Networked Electronic Support Threat Sensors (NESTS) system collects SIGINT, identifying emissions from satellite-based communications, while the Ver­satile Radio Observation and Direction (VROD) system intercepts frequency modulated (FM) transmissions to lo­cate and classify targets. Identification of likely targets by SIGINT cues UAS to confirm targeting data and refine col­lection. Due to limited time on station, UAS only remain on their assigned named areas of interest (NAIs) long enough to confirm targeting data be­fore moving on to identify additional targets in support of the maneuver fight. Small UAS (sUAS) may conduct BDA later if required.

Figure 2. FM NEST Emission Assessment for 2/11 TOC (Photo by 11th ACR Regimental S2)

Once validated, the Blackhorse Regi­mental Targeting Intelligence Cell (RTIC) processes the refined target data and passes it to fires elements for strike execution. This sensor-to-shoot­er process mirrors adversary work­flows, where electronic detection leads to physical compromise and rapid en­gagement. The effectiveness of this process underscores the necessity for signature management, deception, and counter-fire strategies to disrupt enemy kill chains.

Defeat through Deception

Deception is a fundamental aspect of modern warfare but is typically rele­gated to a survivability operation. Suc­cessful battlefield deception forces ad­versaries to misallocate resources, de­lay decision-making, and strike false targets. FM 3-90 defines deception as actions executed to deliberately mislead adversary decision-makers about friendly military capabilities, in­tentions, and operations.2

Adversary intelligence, surveillance, and reconnaissance (ISR) networks rely on rapid detection, classification, and engagement. By integrating deception, friendly forces can manipulate enemy perception, disrupt targeting cycles, and increase survivability.3&4

Deception operates across all domains and targets two specific dimension: physical and technical. Together these dimensions influence the cognitive, or human, dimension of decision making. Physical deception uses false positions and decoys to mislead enemy analysts into assessing a decoy as a legitimate target. Technical deception manipu­lates the electromagnetic spectrum (EMS) by emitting signals that mimic actual targets, causing adversary col­lectors to misinterpret the data. C2 nodes have both a physical and techni­cal signature, making them a useful ex­ample for exploring the requirements of a deception story.5

Units generate deception stories by creating signatures inside the collected spectrums, that force adversary ana­lysts to make false assessments. In the electronic spectrum, the deception node must emit signatures that mimic a C2 node. This requires units to allo­cate FM and Joint Battle Command-Platform (JBCP) capability to the de­ception node as both systems are pres­ent in MCPs. JBCPs constantly update their location data to the network, cre­ating a continuous low-power emis­sion. JBCP emissions are commonly as­sumed to be too weak to be detected, this is a false assumption. In addition to being detectable, the static nature of C2 nodes allows enemy analysts to accurately classify their emissions as a C2 node and initiate a queuing cycle and kill chain.

Reinforcing the deception story re­quires physically constructing the de­ception node to present a believable target. After SIGINT assets identify a likely MCP, adversary doctrine calls for UAS or ground reconnaissance to validate the target. Blackhorse repli­cates this effect with a dedicated MQ-1C Gray Eagle during NTC rotations. When UAS collection begins, the de­ception node must match the physical signature of an actual MCP. To achieve this, units must equip the deception node with wheeled vehicles, tentage, antennas, and other identifiable MCP-associated equipment.

Battalions can improve deception ef­fectiveness by creating deception kits from non-functional or excess equip­ment components. Broken antennas simulate active communication archi­tecture, while trailers transporting generator mockups and fuel cans rep­licate life support systems. Worn-out power cables present the image of power distribution to tents, reinforcing the illusion of an operational command node. Because high quality thermal sensors are widely available common commercial markets, the deception node should also mimic the thermal signature of an operational command node. Crews can simulate a generator’s thermal signature by piping exhaust from the towing vehicle into the decoy, allowing it to escape through a repli­cated exhaust port. Properly routing exhaust tubing and covering both the vehicle and the fake generator with camouflage netting obscures the de­ception and breaks up its physical sig­nature, making identification of the de­ception story as a deception less likely. Damaged shelters staged as command post structures further reinforce the deception story without risking mis­sion-essential assets. Integrating these elements allows units to construct de­ception nodes capable of withstanding both SIGINT and GEOINT validation.

To reduce risk, all personnel should withdraw from the deception node once it establishes. A technique to im­prove the deception teams survivabil­ity is to locate them in offset security positions, several hundred meters away, minimizing exposure while main­taining operational control of the node. Using wired connections to FM radios enables deception teams to transmit from secure positions, in­creasing the deception node’s electro­magnetic (EM) signature while keeping personnel protected. This method strengthens deception by making the site appear active while preserving force survivability. Another technique to strengthen technical deception is to equip the deception node with a CX-13298 Retrans Cable, commonly known as a “dog bone”. This cable al­lows the deception node to act as a re­trans site, mimicking the radio traffic of the actual C2 node while simultane­ously allowing the C2 node to broad­cast lower power transmissions, reduc­ing the likelihood of electronic detec­tion.

The final step in any deception opera­tion is concealing the actual asset. While the deception nodes attract en­emy collection by design, the real MCP must obscure or eliminate the signa­tures that would expose its location. This requires reversing the techniques used to make the deception node ap­pear authentic and ensuring the pro­tected asset remains undetected.

Figure 3. JBC-P NEST Emission Assessment for Troop CP and 2/11 TOC (Photo by 11th ACR Regimental S2)

Minimizing electromagnetic emissions is the first priority. JBCP should oper­ate on communications windows, es­tablish offset from the MCP, or estab­lish behind terrain that completely masks horizontal emissions. FM radios should connect by hardline to an offset antenna farm, preventing immediate correlation between transmissions and the MCP’s physical location. ATP 6-02.53, “Techniques for Tactical Ra­dio Operations,” details how antennas can offset more than two miles using ASIP remote operations via hardline connection, reducing the MCP’s expo­sure to SIGINT collection.6 When using a retrans setup on the deception node, the C2 node can locate in terrain that masks FM communication forward but allows broadcasts to hit the retrans system. These techniques not only im­prove concealment but also reinforce the deception story by generating EM emissions at the decoy location.

Beyond SIGINT mitigation, the physical composition of the MCP should be structured to blend into the operation­al environment while still meeting op­erational requirements. Use of vehi­cles and equipment incongruent with an MCP, reducing the size of the node, and collapsing assets during periods of UAS reconnaissance all contribute to the deception story by representing the C2 node as a different asset.

Reports of contact with UAS should trigger protection battle drills, includ­ing breaking down easily identifiable equipment, applying additional cam­ouflage, or even jumping the command post to prevent the presentation of an easy target. Once the ISR threat is neu­tralized or off-station, units can restore digital communications as needed.

Leveraging Lethality from Deception

A well-integrated deception plan must align with counter-reconnaissance, fires, and intelligence planning, antici­pating how and when enemy collection assets will react, and how to actively counter their efforts. This concept is rooted in reflexive control, a strategy developed by the Soviet Union in the 1960s and 1970s. Reflexive control seeks to manipulate an adversary’s de­cision-making process by shaping their perception, leading them to take ac­tions that are predictable and favor­able to the initiator. In this context, de­ception forces the enemy into a pre­dictable reaction, which friendly forces can prepare to exploit.

Given the passive nature of SIGINT col­lection, the first engagement window occurs when enemy UAS attempts to validate the deception target. To coun­ter this, units should establish anti-air ambushes near MCPs and deception nodes, positioning short-range air de­fense (SHORAD) or mobile air defense teams in ISR flight corridors. This al­lows friendly forces to engage enemy ISR platforms before they collect ac­tionable intelligence, denying the en­emy the ability to confirm or refine tar­gets.

If the enemy cannot validate the target with UAS, they may deploy ground re­connaissance teams to confirm or deny its presence. By identifying and secur­ing ground infiltration routes, units deny the enemy access to the decep­tion node, reinforcing the perception that a high-value target is present while creating opportunities to trap and destroy enemy reconnaissance el­ements before they can collect.

If deception is successful, the enemy will likely commit fires assets against the deception node without validation, encouraged in their belief that these protective efforts are aligned against a real asset. The final engagement op­portunity, where counter-fire radar, ground moving target indicator (GMTI) radar, and national level collection can detect and track enemy fires assets that have unmasked for a valueless en­gagement. Friendly forces can track and destroy these targets, preventing their use against friendly forces and creating hesitation to unmask assets for future strikes.

By integrating deception with air de­fense, counter-reconnaissance, and counter-fire operations, units can force the enemy into predictable, exploit­able mistakes while preserving their own combat power. Deception is not passive. It is a deliberate operation that includes all warfighting functions and sets conditions for the enemy to fail.7

Conclusion

By understanding adversary collection techniques, reducing the signature of high-value targets, and leveraging de­ception to shape enemy behavior, units can force adversaries to misallocate ISR and fires assets, disrupting their kill chain and protecting friendly forces. Current conflicts are occurring in high­ly contested ISR environments, where failure to integrate deception will re­sult in rapid targeting and engage­ment.

Deception is not just a defensive tool, it shapes the battlefield by forcing ad­versaries to react to false information, creating opportunities to disrupt their targeting cycles and degrade their ef­fectiveness. A well-integrated decep­tion plan must synchronize with recon­naissance, fires, and intelligence plan­ning to maximize survivability and cre­ate conditions for decisive action. Suc­cess in deception is not based on what friendly forces do, but by what the en­emy demonstrates they believe, mea­sured by the actions they take. When applied effectively, deception forces adversaries to waste resources, com­mit to false targets, and fight based on a reality that no longer ever existed.

By CPT Paul Dolan

Paul T. Dolan, a Captain in the Army, is currently assigned as a Battalion Intel­ligence Trainer with Panther Team at the National Training Center in Fort Ir­win, California. Prior to this, he served as a Squadron Intelligence Trainer with Cobra Team, also at the National Train­ing Center. Previous assignments in­clude Battalion Intelligence Officer for 2-8 Cavalry, 1st Cavalry Division; Cur­rent Operations Intelligence Officer for Task Force South East in Paktia Prov­ince, Afghanistan; and Platoon Leader for Bravo Troop, 1-40 Cavalry, 4th Bri­gade Combat Team, 25th Infantry Divi­sion. His military schooling includes the Armor Basic Officer Leader Course at Fort Benning, Georgia; Stryker Leader Course at Fort Benning, Georgia; Mili­tary Intelligence Captains Career Course at Fort Huachuca, Arizona; and the Army Space Basic Cadre Course at Peterson Space Force Base, Colorado. Dolan holds a Bachelor of Arts in Stud­ies in War and Peace from Norwich University and is currently pursuing a Master of Science in Unmanned and Autonomous Systems from Embry Rid­dle Aeronautical University.

Notes

1 ATP 7-100.1, “Russian Tactics”, 2024

2FM 3-90, “Tactics”, 2019

3ATP 7-100.1, “Russian Tactics”, 2024

4 ATP 7-100.2, “North Korean Tactics”, 2024

5 FM 3-90, “Tactics”, 2019

6 ATP 6-02.53, “Techniques for Tactical Ra­dio Operations”, 2019

7 FM 3-90, “Tactics”, 2019