Search Defense Budget

C3I Applied Cyber

Category: RDT&E • Line Item: 0602213A • FY26 Budget Request: $4.7M

Overview

Budget Account
2040A - Research, Development, Test and Evaluation, Army
Budget Activity
02 - Applied Research
Previous Year
Description

The C3I Applied Cyber program (Program Element 0602213A) is a research and development initiative within the Army's Research, Development, Test & Evaluation (RDT&E) budget. It focuses on advancing cyber architectures, software, tools, and techniques to support Cyber Electromagnetic Activities (CEMA). The goal is to enable both offensive and defensive cyber capabilities that counter adversary communications and strengthen the Army's tactical communications networks against sophisticated cyber threats. The program aligns with the Under Secretary of Defense for Research and Engineering's priority areas and supports Army modernization priorities, particularly in the context of near-peer adversaries and evolving cyber warfare landscapes.

2CY: Information Trust Technology is a key project under this program, dedicated to developing defensive cyber technologies that ensure data integrity and authenticity as information traverses Army networks. Objectives include enhancing system access controls, improving user and non-person entity (NPE) authentication, and maintaining information provenance from originator to consumer. The project is also responsible for integrating zero trust principles where access to resources is granted based on continuous risk assessments into tactical network architectures. Work is performed by the C5ISR Center and is closely coordinated with related advanced development efforts.

Within 2CY: Information Trust Technology, two major efforts are underway. The first, PKI-Modernization & Dynamic Access Control for Tactical (DAC-T) Technology, focuses on developing cryptographic algorithms and automating account provisioning to support secure communications in disconnected, interrupted, and low-bandwidth (DIL) environments. The second, Tactical Zero Trust, investigates the adaptation of zero trust concepts for tactical networks, including unique identification of NPEs, protection of data-in-use, and adversarial machine learning techniques to enhance network resilience. These efforts aim to reduce the operational burden on soldiers while improving the security posture of Army networks.

3CY: Network Access and Effects Technology is another major project, emphasizing research into computer-assisted and automated methodologies to accelerate technology development for Offensive Cyber Operations (OCO) and Radio Frequency (RF) enabled operations. The project investigates non-traditional access and effect vectors against adversary targets, enabling commanders to employ non-kinetic options and maintain operational flexibility in complex, contested environments. Machine learning applications are explored to expedite the identification of vulnerabilities, development of courses of action, and execution of offensive cyber capabilities at the pace required for near-peer engagements.

The Network Exploitation Research and Development (NERD) Technology effort under 3CY is specifically focused on reducing the timelines for exploiting emerging and validated targets, developing offensive cyber tools, and identifying optimal non-kinetic firing options. The project aims to circumvent traditional computer security measures of adversaries and ensure that Army cyber operators can rapidly adapt to evolving threats. Funding for this project is being realigned as component design and maturation efforts are completed, with a shift toward more cost-effective software development and agile funding mechanisms to foster innovation.

CY6: Autonomous Cyber Technology is the third major project, targeting the development and application of robust cybersecurity techniques for advanced communications and networking devices within wireless tactical networks. The primary goal is to protect against nation-state level cyber effects, ensuring the integrity and availability of network information, resources, and identities. This project is executed by the Army Research Laboratory (ARL) and the C5ISR Center, and it complements advanced technology development in related program elements.

Within CY6, the Predictive Intelligent Networking (PIN) effort investigates network micro-segmentation and autonomous network adaptation to support advanced zero trust concepts and ensure network resiliency against adversarial AI-driven electronic and cyberattacks. The Proactive Cyber Defense effort develops software algorithms for automated active defense, including machine learning-based intrusion detection and adversarial resilience techniques for resource-constrained tactical environments. These initiatives are designed to maintain cyber superiority and agile defense capabilities at the tactical edge, with funding adjustments reflecting a transition to the Department of Defense's Capability Based (Agile) Funding pilot for accelerated innovation and deployment.

Budget Trend

C3I Applied Cyber Research Development, Test & Evaluation Programs (0602213A) budget history and request


Interactive stacked bar chart for exploring the C3I Applied Cyber budget
Interactive line chart for exploring the C3I Applied Cyber budget
2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026
Actual Actual Actual Actual Actual Actual Actual Actual Actual Actual Actual Enacted Requested
$0 $0 $0 $0 $0 $0 $17,351,000 $18,816,000 $12,119,000 $13,605,000 $20,664,000 $28,656,000 $4,716,000
The DoD did not provide line item forecasts in its FY26 budget request, see the prior year budget for any forecasted years
Download

FY2026 Defense Budget Detail

Loading
Loading
FY2026 Budget Released: 06/30/25