The U.S. Army cyber force is putting its boots on. The service is expanding its cyber operations to reflect cyber warfare’s growing role on the battlefield, putting cyber warriors–specifically those engaged in electronic warfare (EW)–into the field with other soldiers.

As part of its Electronic Warfare Strategy released earlier this year, the Army plans to add an electronic warfare platoon to every brigade combat team’s military intelligence company in the coming years. And it will start this year with an EW platoon operating within the Army’s I Corps to support the Pacific-led task force.

“That will be kind of the first test case for our electronic warfare organizations,” Brig. Gen. Jennifer Buckner, director of cyber in the Army’s G-3/5/7 office, said recently. “We’re going to experiment with the capabilities as much as we’re going to also try to validate force design that we’ve put on paper.”

It might seem natural to think of cyber warfare as being conducted from dark rooms with big computer screens (and there is still plenty of that), but the cyber domain extends everywhere and EW operations have followed. Russia demonstrated advanced EW during its incursions into Ukraine in 2014, prompting the Pentagon to accelerate its efforts. Department of Defense leaders had acknowledged that they let EW slide as a priority during 15 years of operating in the mostly uncontested electromagnetic spectrum environment of Iraq and Afghanistan, but realized they were behind the curve as their focus shifted to the Pacific and other global hot spots.

Ultimately, the service plans to integrate EW with cyber and information operations across all of its echelons. The Army increased spending on Multi-Function Electronic Warfare six-fold, from $4 million in 2017 to $24 million in 2018, and its Multi-Domain Task Force has been developing EW capabilities in the Pacific region. Meanwhile, the Army is increasing the size of its cyber corps by bringing EW troops into the fold. In October, the service brought the EW career field (29-series) into the cyber operations career field (17-series). “We have really focused on the next phase of development and that’s in our electronic warfare force,” Buckner said.

In addition to putting an EW platoon with each brigade, cyber and electromagnetic activity cells (CEMA) will be created to advise commanders at the brigade, division, corps, and Army Service Component Command levels, the Army said. And a Cyber Warfare Support Battalion, expected to grow to 600 personnel within expeditionary cyber teams over the next half dozen years, will be available to support tactical forces as needed.

It’s part of a DoD-wide push toward greater use of EW, reflected in programs such as the Air Force’s Electronic Warfare and Electromagnetic Spectrum Superiority initiative and the Navy’s focus on the Next Generation Jammer to counter EW attacks. The Defense Information Systems Agency (DISA) also just announced that it is creating a Joint Spectrum Data Repository to collect, standardize, and share spectrum-related data. The repository, run by the Defense Spectrum Organization, will provide access and customized reports on data up to the Secret level. DISA said it plans in the coming years to also provide additional data sources, data quality assessments, and other services.

EW essentially concerns ensuring communications by protecting it from enemy attacks and disrupting an enemy’s communications. On the defensive side, EW can protect radar signals and weapons guidance systems, and foil attacks against ships, fighter jets, and other larger platforms. It can detect and thwart signals that set off improvised explosive devices, protect against efforts to jam communications, or defeat attempts to take control of drones. Offensive EW operations do the opposite, looking to disrupt enemy communications and signals intelligence, and, when possible, take over enemy drones.

Read More About