0% found this document useful (0 votes)
86 views6 pages

Advancing CEMA for Army Operations

The US Army is advancing its Cyber Electromagnetic Activities (CEMA) capabilities, focusing on integrating Cyber Operations, Electronic Warfare, and Spectrum Management to enhance operational effectiveness. Key developments include the Terrestrial Layer System (TLS) for Brigade Combat Teams and Echelons Above Brigade, which aim to improve situational awareness and offensive capabilities against adversaries. The Army is also leveraging rapid prototyping and feedback from operational units to ensure that these capabilities meet evolving battlefield requirements.

Uploaded by

maruka33
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
86 views6 pages

Advancing CEMA for Army Operations

The US Army is advancing its Cyber Electromagnetic Activities (CEMA) capabilities, focusing on integrating Cyber Operations, Electronic Warfare, and Spectrum Management to enhance operational effectiveness. Key developments include the Terrestrial Layer System (TLS) for Brigade Combat Teams and Echelons Above Brigade, which aim to improve situational awareness and offensive capabilities against adversaries. The Army is also leveraging rapid prototyping and feedback from operational units to ensure that these capabilities meet evolving battlefield requirements.

Uploaded by

maruka33
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

support of a host of capability managers (CMs).

The EW, SIGINT, Intel, Fires


Communities and others all have a role in CEMA, which means there are a variety of
requirements calling for a lot of different materiel solutions. But, while it has taken time to

US Army Delivers CEMA to Soldiers in get here, the Army is now transforming its development efforts on the broad list of CEMA
requirements to the actual fielding of fully functional systems and capabilities.
the Field
By John Haystead
FM 3-38 lists four overarching goals of CEMA from an operational perspective: build,
operate, and defend the network; attack and exploit enemy and adversary systems; gain
situational understanding; and protect individuals and platforms.

First, with regard to networks, as noted in the document, “the increased dependence on
net-enabled capabilities makes unified land operations very sensitive to cyberspace and
EW threats that can jeopardize the confidentiality and integrity of the mission command
system and information.” The Army’s net-enabled capabilities are supported by
“LandWarNet,” the Army’s portion of the DOD’s Information Networks (DODIN). As such,
“inherent to the operation of the network are (cyber and EW) actions to defend it by
monitoring for, detecting, analyzing and responding to anomalous network activity.”

At the same time, however, and equally important, states FM 3-38, “is the need to attack
enemy or adversary networks and systems to disrupt and deny them freedom of action.”
Here CO will play a major role with cyberspace attacks employing capabilities, such as
tailored computer code, in and through various network nodes such as servers, bridges,
firewalls, sensors, protocols, operating systems and hardware associated with
computers or processors.
i
The electronic attack and exploitation of enemy systems mission can involve a number
of approaches including electromagnetic intrusion, jamming, electromagnetic pulse
T’S BEEN JUST over 10 years since the concept of Cyber Electromagnetic (EMP) and electronic probing. Finally, CEMA capabilities in SMO provide greatly
Activities (CEMA) was first defined in the US Army’s FM 3-38 document: “Activities enhanced situational awareness and understanding of an operational environment. SMO
leveraged to seize, retain and exploit an advantage over adversaries and enemies in also increases survivability by mitigating such factors as electromagnetic interference
both cyberspace and the electromagnetic spectrum, while simultaneously denying and (EMI) from friendly use of EW.
degrading adversary and enemy use of the same and protecting the mission command
system. It consists of Cyberspace Operations (CO), Electronic Warfare (EW) and
Spectrum Management Operations (SMO).”
The four tenet areas of CEMA more or less track with the Electronic Warfare Support
It was a big ask. And, in fact, the scope of the Army’s CEMA capabilities-development (ES), Electronic Attack (EA) and Electronic Protect (EP) elements of EW or
effort encompasses a plethora of technologies, programs and development offices Electromagnetic Dominance (ED). As such, one particularly central organization for
across the Service. All of this work and the players involved are synchronized through realizing the goals of, and fielding of the necessary systems to make CEMA a reality, is
the Army Deputy Chief of Staff for Operations, Plans and Training (G-3/5/7), with the the Electronic Warfare and Cyber program management office (PM EW&C) – an
element of Program Executive Office – Intelligence, Electronic Warfare and Sensors In April 2023, the Army awarded Lockheed Martin a $72.8 million contract for the TLS
(PEO-IEW&S) headquartered at Aberdeen Proving Ground, Maryland. BCT program. A continuation of earlier program awards, it was broken up into two parts:
a $35.4 million award for the procurement of TLS BCT systems on Strykers, and another
PM EW&C’s CEMA portfolio is very broad, incorporating most, if not all, of its CEMA $37.4 million for R&D funds to support operational demonstration and initial designs for
programs. Says Ken Strayer, PM EW&C Project Manager, “Depending on how you count TLS BCT hosted on the Army Multi-Purpose Vehicle (AMPV).
programs, we have about two-dozen current and emerging efforts, all focused on all-
domain spectrum dominance – the end goal of CEMA in alignment with the Army’s Strayer says the system going under test in April will mainly focus on SIGINT and ES
priorities as defined in FM 3-38.” Strayer says they really can’t link individual programs to requirements, with EA testing planned for later dates. “Pending the results of these tests,
discrete CEMA areas because they all contribute in some fashion to all of them. “That’s the Army will make a decision about where it wants to go. There are still lots of questions
the big talking point. You can’t get to any of this without a multi-layered and multi-domain out there about what the Army needs in terms of combat platforms in brigade formations,
approach to the problem. It’s the all-domain aspect of spectrum dominance.” Still, he and that will all play into mapping out the road ahead.” As it stands, projected activities
points to a number of signature programs that are now coming to fruition. Among these call for a rapid fielding transition or Major Capability Acquisition (MCA) for TLS-BCT and
is the Terrestrial Layer System (TLS) family of programs. a first-unit-issued in FY25-26.

The TLS consists of three main components: The TLS for Brigade Combat Teams (TLS
BCT); TLS for Echelons Above Brigade (TLS EAB), and a program spun out of TLS BCT
known as TLS BCT Manpack.

Underway for about four years, the TLS BCT is the Army’s “next-generation tactical
SIGINT, EW and CO overmatch system that delivers capabilities to the Joint All-Domain
Operational (JADO) force.” As described, TLS BCT will provide BCT Commanders with
superior spectrum awareness, as well as the ability to conduct EA and offensive cyber
operations. Built to a modular, open-system architecture, it can be deployed in multiple
configurations “providing capabilities against changing near-peer threats and multi-
domain capability gaps.”

Planned for deployment to Stryker, Armored and Infantry BCTs, the capability will i
undergo a round of testing in April/May of this year aboard Stryker platforms. This
follows an operational demonstration conducted about 18 months ago. As described by
Strayer, “Coming out of that demonstration, we had a lot of lessons learned in terms of
how we need to organize the fight, and the way the equipment needs to operate, and
The version of TLS getting the most attention recently is the TLS BCT Manpack, as it
we’ve spent the last 18 months making those adjustments.”
involves the rapid transitioning and fielding of a government-controlled, Commercial-Off-
Strayer says one of the biggest lessons learned from the demonstration was that the The-Shelf (COTS) capability into a fielded system this year. Although certainly less
integration of EW and SIGINT needed to be looked at from a functional perspective and capable than the full TLS BCT system, the TLS BCT Manpack will be capable of
not necessarily a physical on-board perspective. “Having both EW and SIGINT operators conducting RF survey, signals collection and direction finding (DF), as well as EA, force-
on the same platform really restricted the commander in terms of the way they need to protection and EMS visualization and scanning/surveying operations.
operate. They have very similar equipment but different approaches and configurations,
Each TLS Manpack system consists of four soldier-worn nodes, requiring four soldiers to
so we’ve now separated those efforts.”
fully man the equipment. The EW products themselves come from CACI Mastodon
(Reston, Virginia) which was awarded a $100 million procurement and fielding contract expects to be equipping one Brigade per month this year and accelerating to two
in July 2024. The four nodes include two of the “Beast+” lightweight, soldier-worn EW Brigades/month next year. “The goal is to get all Brigades equipped over the next three
sense-and-attack subsystems, and one “Kraken” system, which is multiple Beast radios years.”
put together in a four-channel configuration to provide more bandwidth and processing
power. The additional capability provides the teams more operational options without a
tradeoff in weight. The fourth node is a beyond-line-of-sight radio so that the two Beast
systems and Kraken, which can already communicate internally, can also push data and
reports back to the EWPMT and into the C2 and Fires network for the Brigade.

There is a total of six manpack systems (24 nodes) planned for each BCT. Originally,
three of the systems (12 nodes) were to be operated by EW soldiers and the remaining
three systems (12 nodes) by intelligence soldiers, but as Strayer explains, “the Intel force
structure is now in the process of moving to the Division level, so although we’re still
fielding six per Brigade, only the three EW systems will be with the Brigade, with the
other three with SIGINT soldiers at Division.”

The successful rapid fielding of TLS Manpack is the result of a great deal of cooperation
and coordination between multiple Army organizations, including the Army Capability
Manager – Electronic Warfare (ACM EW), ACM Intelligence Sensors (ACM IS), the
i
Army Test and Evaluation Center, as well as EW Officers (EWOs) within multiple
operational units, particularly the Army’s new Transforming-in-Contact (TIC) units.

TIC units are specific operational units that have been designated to receive the latest Meanwhile, PM EW&C is also working on a version of the TLS capability for Echelons
and best equipment that is still in the development cycle and to provide direct feedback Above Brigade (TLS-EAB) (i.e., Divisions, Corps, and Multi-Domain Task Forces
into the modernization process. The first phase of the effort was executed in FY2024 (MDTFs)). TLS-EAB is also a rapid-prototyping program built using a Modular Open-
with three BCTs: 2nd Brigade Combat Team, 101st Airborne Division; the 10th Mountain System Architecture aligned with the C5ISR/EW Modular Open Suite of Standards
Division’s 3rd BCT; and 2nd BCT, 25th Infantry Division. (CMOSS).

As explained by COL Leslie Gorman, Army Capability Manager – Electronic Warfare In June 2023, the Army entered into an Other Transaction Authority (OTA) agreement
(ACM EW) Director, “The use of the TIC units enabled us to conduct immersive through the Consortium for Command, Control, and Communications in Cyberspace
experimentation with operational feedback opportunities from EW soldiers. EW (C5) with Lockheed Martin to support Phase 2 prototype build and demonstration. The
warfighters are now directly involved in designing systems that allow them to accomplish Phase 2 agreement totaled $36.7M for a 21-month period of performance.
their mission. This type of constant feedback not only helps validate written
requirements, but it allows the PEO PM staff to receive the same feedback for future EW “There have been lots of lessons learned as the program heads into its third year,” says
systems upgrades. I think TIC truly helps us get at rapid prototyping and fielding to the Strayer, “and we’ve really pretty much settled on two main configurations of different
force based on operational knowledge gained.” size, weight and capabilities.” One configuration is described as the Extended-Range
TLS-EAB – a capability designed for the Corps echelon. “Although it’s definitely
Strayer notes that “the near-record turnaround time for the TLS Manpack underscores transportable, it’s larger and more robust in its capabilities to provide the advanced
the utility of the Middle Tier Acquisition (MTA) pathway to quickly bring a capability to processing in some of the extended-range apertures that you need for a Corps-level
fruition. We’re now in the process of equipping the Army’s total requirements for the capability and potentially for an MDTF – although MDTFs are all a little different
Manpack to the BCTs, currently building out our fourth Brigade as we speak.” Strayer depending on what part of the globe you’re in.”
For Division-level echelons and some of the Task Forces in the Pacific Theatre, Strayer provide BCT Commanders with airborne, offensive CEMA capabilities organic to the
says the need was for something much more lightweight. “For them, we’re working on a unit. The system is based on a Software-Defined Radio (SDR)/Digital Radio Frequency
second component that we’re just calling TLS-EAB, as opposed to TLS-EAB Extended Memory (DRFM) architecture housed in a self-contained pod that is mounted on the
Range. It’s going to be smaller, with more compact processing power and easily Army’s MQ-1C “Gray Eagle” unmanned aircraft system (UAS). It will utilize both pre-
transported in lightweight vehicles organic to the unit. It will also heavily leverage remote programmed signal characteristic information and real-time battlefield information to
sensors.” support remote operations and dynamic tasking.

Strayer says there will also be multiple flavors of both configurations, with one tailored Strayer says MFEW-AL is heading towards airworthiness/developmental testing this year
for SIGINT and the other for EW. “They have slightly different requirements and certainly with the goal of getting it into limited user test. “We still need to verify performance in a
different classification levels. For the SIGINT capabilities, they can leverage all the very rigorous test environment, and we’re now in the process of planning out that
SIGINT-developed TOP SECRET classified capabilities, but for the EW flavor, there’s a testing.” Although MFEW is actually platform agnostic, it’s primarily designed for the
real need to work at a lower level of classification such as SECRET, SENSITIVE or an Gray Eagle UAS and/or that class of platform. “This is the aircraft that we’re pursuing air
unclassified level so that we can more rapidly feed the targeting and Fires cycles, as well worthiness on now, and we’d really love to get this capability out in the hands of soldiers
as work seamlessly with Joint and Coalition Partners.” next year, but it will depend on the results of the final air worthiness tests,” says Strayer.

EW&C will be demonstrating all of the different configuration items beginning this
summer with some of the lightweight capability being demonstrated at the “Project
Convergence Capstone 5” event at Aberdeen in April. “We’ll also be demonstrating Serving as the backbone and capabilities management resource for all of the EW and
some of the larger extended-range capability this summer, taking it out to the range to cyber resources supporting CEMA is the EW Planning and Management Tool (EWPMT),
test against some live targets and to get some soldier feedback with the goal of more a software suite which provides the ability to plan, synchronize and execute ES and EA
rigorous operational assessment of some early prototypes forward-deployed with some multi-domain operations by integrating data from multiple sensor sources to provide
key units in FY26/27.” battlefield commanders with detailed situational awareness.

The development of the EWPMT, performed by Raytheon, has really been at the
forefront in terms of realizing the Army’s CEMA objectives. Already in full-fielding under
“Increment 1” of the software, the EWPMT is the enabler of both cyber and
electromagnetic activities, providing data for the overall Mission Command Operational
Picture (COP). “There are currently multiple teams across the globe equipping and
training units to do mission planning and have situational awareness of EW sensors that
connect to critical National data bases to give commanders a detailed assessment of
their spectrum,” says Strayer.

Simultaneously, the PM is in the process of an architecture update of the EWPMT to


what they call “EWPMT-X.” Says Strayer, “The X really comes from the underlying
architecture and data structure that we’re replacing on the toolset with the Tactical
i Assault Kit framework (TAK-X).” EWPMT-X is intended to support the Army’s Next-
Generation Command and Control (NGC2) approach to a new data-centric architecture
fusing EW and intelligence data for commanders to make more, faster, and better
decisions and to ultimately reduce sensor to effector/shooter timelines. According to
Strayer, EWPMT-X will converge with the TAK framework, allowing the system to be
To service the Air Domain, the Multi-Function EW – Air Large (MFEW-AL) program will
more widely used due to the already widespread use of TAK across the Army. “TAK-X is
a mature software framework that has a lot of momentum with other Army C2 systems. Expected to begin the prototype phase this year, S2AS is planned as a COTS solution
By us migrating to this underlying architecture, it will allow us to be able to more quickly that will integrate with the EWPMT to provide EMS situational awareness and contribute
add operational functionality in future and reduce our overall sustainment costs. Most to the NGC2’s enhancement of commanders’ decision making. Strayer explains, “By
importantly, it will provide us with direct linkage and tie in with the next-generation C2 being able to see how they look in the spectrum, commanders will be able to reposition
and Joint All-Domain Command and Control (JADC2) initiatives in the Army and Joint or mask their own capabilities to limit their EMS signature. They can maintain their ability
communities, particularly in the way that we shift to a data centric approach to our C2 to communicate while also picking up on enemy activities in the environment that may
systems.” be impacting that ability.”

According to Strayer, a pilot demonstration of the EWPMT-X with TIC units last year was The S2AS currently has an approved requirement, but program start is pending FY25
very well received, and they are now proceeding to mature the capability and appropriations. “But,” says Strayer, “we’ve done a lot of pre-prototyping activity, and a lot
demonstrate additional functionality with a goal of delivering a minimum viable product of market surveys, so that we’re convinced of its viability and have already seen existing
of the X framework in FY2026. “At that point, we’ll just swap over from the older version commercial products out there that will allow us to move very quickly.”
EWPMT to the new with some slight differences on the user interface. The main
changes are about getting the architecture right and moving forward with some of the
advances we’ve made in how we manage software in a data-centric approach.”
In discussing PM EW&C’s activities across the three elements of EW–ES, EA and EP–
Strayer notes that his program office is not really in the business of EP. “EP is not really
our mission, and we don’t really do EP with EW assets. EP is something that’s generally
built into individual electronics and communications gear to protect itself. We focus on
the ES and EA attack elements.”

Still, as noted in the FM 3-38 document, the broader scope of the EP element of EW can
also include such capabilities as “Countermeasures and Electromagnetic Deception
including: Electromagnetic Hardening, Electronic Masking, Emission Control,
Electromagnetic Spectrum Management, Wartime Reserve Modes, and Electromagnetic
Compatibility.” As such there is one program within PM EW&C that may prove the
exception to the rule: the Modular Electromagnetic Spectrum System (MEMSS).

As described by Strayer, “MEMSS is really in this weird hybrid area. Yes, it contributes to
EP but really it’s more on the EA side, although not actively attacking.” If that description
i has you scratching your head a bit, it’s intentional, as the precise purpose and
methodology of MEMSS is classified. What has been published is that the effort is
related to command-post survivability and could employ techniques to confuse and
deceive adversaries. What Strayer would say is that MEMSS “provides various signals
on the battlefield to help units hide, and provide freedom-of-maneuver, in the spectrum.”
In terms of new-start programs in support of CEMA, one particularly significant effort is
the Spectrum Situational Awareness System (S2AS), which is designed to give MEMSS is proposed to be a new start in FY2026. “We’re currently in the planning
commanders the ability to see their units’ own emissions in the spectrum and indicate phases and the requirement is still headed toward an Army Requirements Oversight
how visible they are to enemy EW and SIGINT sensors. The Russia/Ukraine war has Council (AROC) for finalization,” says Strayer.
clearly illuminated how military units can be located and targeted using their emissions
in the EMS, and this has not gone unnoticed by the Army.
could be used. There’s still a lot of Army experimentation going on with some programs
for these unmanned systems, and we definitely see the benefit of being able to use them
or have them carry our sensors to where they need to be on the battlefield.”

The size and scope of CEMA perhaps explains why its name uses the very generic word
“activities” to encompass all of the objectives, missions and functions within its mandate.
At PM EW&C, Strayer explains that they work from a materiel standpoint. “From this
perspective, what you want is a master strategy and a master plan that lays out a clear
roadmap for all of the materiel that you’ll need to make this happen. The Army is still on
a journey in this area. A lot has changed since the last time we did true EW, before Iraq
and Afghanistan, and we’re still in learning mode. That’s why we’re doing so much rapid
prototyping, and we’re still collecting lots of lessons learned from what’s going on in
i Europe and even more so what’s happening in the Pacific today.”

But, Strayer emphasizes that CEMA is much more than just materiel. “As is clear from
FM 3-38, CEMA also includes doctrine, organization, force structure, training,
development and everything else that goes behind it. Where this all comes together on
Later this month, the AOC will be holding its CEMA 2025 Conference at Aberdeen the battlefield is at the Echelon level, with each Echelon having its own CEMA cell
Proving Ground. This year’s theme is “All Domain Operations in Support of the Deep consisting of representatives from Intel, Operations, the G-6, and the Network
Fight,” highlighting that a big part of this is the capability to leverage autonomous Communications and Fires realms all joining together to synchronize CEMA activities in
platforms. time and space.”

In that regard, Colonel Gorman says, “EW is a shaping enabler to cross-domain Fires Strayer points out that the Army Capability Manager EW (ACM EW) plays a crucial role
and how we get non-lethal effects synchronized and integrated into lethal fires will be in accelerating this process through tailored acquisition pathways. “They are our
crucial to the success in future operating environments, where the tyranny of distance proponency for requirements and for representing the Army and the operational force for
and timing are major variables in conflict. Therefore, our EW capabilities must function requirements-prioritization and helping us to coordinate the direct unit and soldier
as a system of systems with seamless integration that can afford dynamic feedback, which is so important. Through tailored acquisition pathways, we’ve shifted
reprogramming for effects generation and delivery. This approach is foundational for from establishing firm requirements upfront to instead defining overall goals, objectives,
autonomous EW operations moving forward.” and operational concepts from a higher level, because we know we have to learn, and
those requirements have to be informed through an intricate cycle. The AMC is
Strayer says his PM’s contribution to the concept is in sensors and payloads. “We’re responsible for collecting all that data and getting materiel requirements across the
working on this through our TLS-EAB program for Division, Corps and MDTFs, with the entire DOTMLPF spectrum of players. It’s this all-domain aspect of spectrum dominance
idea being the use of remote, optionally manned/unmanned sensors and effectors.” for which we are now transitioning from development to the fielding of capabilities for
Strayer relates this to the TLS-EAB’s requirement for extended range. “One of the key multiple programs. We have a lot of momentum behind us and a true sense of urgency
ways we can really get that range, is to get the sensors forward to where they need to in getting the Army ready for the next fight.”
be. That requires small, portable, optionally attritable, sensors.” Noting that the same
sensors can be used on manned systems, whether air- or ground-based, although with
different SWAP challenges, he adds that, “We’re not working specifically on the
unmanned systems themselves, but rather just the potential detectors and effectors that

You might also like