The C3I Applied Cyber program (Program Element 0602213A) is a research and development initiative within the Army's Research, Development, Test & Evaluation (RDT&E) budget. It focuses on advancing cyber architectures, software, tools, and techniques to support Cyber Electromagnetic Activities (CEMA). The goal is to enable both offensive and defensive cyber capabilities that counter adversary communications and strengthen the Army's tactical communications networks against sophisticated cyber threats. The program aligns with the Under Secretary of Defense for Research and Engineering's priority areas and supports Army modernization priorities, particularly in the context of near-peer adversaries and evolving cyber warfare landscapes.
2CY: Information Trust Technology is a key project under this program, dedicated to developing defensive cyber technologies that ensure data integrity and authenticity as information traverses Army networks. Objectives include enhancing system access controls, improving user and non-person entity (NPE) authentication, and maintaining information provenance from originator to consumer. The project is also responsible for integrating zero trust principles where access to resources is granted based on continuous risk assessments into tactical network architectures. Work is performed by the C5ISR Center and is closely coordinated with related advanced development efforts.
Within 2CY: Information Trust Technology, two major efforts are underway. The first, PKI-Modernization & Dynamic Access Control for Tactical (DAC-T) Technology, focuses on developing cryptographic algorithms and automating account provisioning to support secure communications in disconnected, interrupted, and low-bandwidth (DIL) environments. The second, Tactical Zero Trust, investigates the adaptation of zero trust concepts for tactical networks, including unique identification of NPEs, protection of data-in-use, and adversarial machine learning techniques to enhance network resilience. These efforts aim to reduce the operational burden on soldiers while improving the security posture of Army networks.
3CY: Network Access and Effects Technology is another major project, emphasizing research into computer-assisted and automated methodologies to accelerate technology development for Offensive Cyber Operations (OCO) and Radio Frequency (RF) enabled operations. The project investigates non-traditional access and effect vectors against adversary targets, enabling commanders to employ non-kinetic options and maintain operational flexibility in complex, contested environments. Machine learning applications are explored to expedite the identification of vulnerabilities, development of courses of action, and execution of offensive cyber capabilities at the pace required for near-peer engagements.
The Network Exploitation Research and Development (NERD) Technology effort under 3CY is specifically focused on reducing the timelines for exploiting emerging and validated targets, developing offensive cyber tools, and identifying optimal non-kinetic firing options. The project aims to circumvent traditional computer security measures of adversaries and ensure that Army cyber operators can rapidly adapt to evolving threats. Funding for this project is being realigned as component design and maturation efforts are completed, with a shift toward more cost-effective software development and agile funding mechanisms to foster innovation.
CY6: Autonomous Cyber Technology is the third major project, targeting the development and application of robust cybersecurity techniques for advanced communications and networking devices within wireless tactical networks. The primary goal is to protect against nation-state level cyber effects, ensuring the integrity and availability of network information, resources, and identities. This project is executed by the Army Research Laboratory (ARL) and the C5ISR Center, and it complements advanced technology development in related program elements.
Within CY6, the Predictive Intelligent Networking (PIN) effort investigates network micro-segmentation and autonomous network adaptation to support advanced zero trust concepts and ensure network resiliency against adversarial AI-driven electronic and cyberattacks. The Proactive Cyber Defense effort develops software algorithms for automated active defense, including machine learning-based intrusion detection and adversarial resilience techniques for resource-constrained tactical environments. These initiatives are designed to maintain cyber superiority and agile defense capabilities at the tactical edge, with funding adjustments reflecting a transition to the Department of Defense's Capability Based (Agile) Funding pilot for accelerated innovation and deployment.