How can soldiers leverage AI in the cyber realm?
Oct 29, 2025
Lt. Gen. Jeth Rey and Brandon Pugh stop by our booth at AUSA to discuss the next steps for integrating AI systems into the Army.
View Video Transcript
0:00
Welcome back. Nowadays, cyber, AI, and autonomy are almost guaranteed to have a place in any military initiative
0:07
With that development comes kinks that need working out and bridges that need crossing
0:12
At this year's AUSA, we sat down with two experts to get their takes on these problems. Have a look
0:17
I want to ask sort of a broad question here, but you know, the Army often talks about speed of relevance
0:23
So from your vantage points, cyber network modernization, what are some of the biggest bottlenecks that still slow down how quickly the Army fields new technology
0:35
Is it technical, cultural, bureaucratic, a nice, lovely mix of all those things
0:41
Let's just talk at sort of the high level on that, if you can
0:45
I think it's all of the above. I think we're in a time right now where it's a cultural shift that we're kind of walking into
0:56
There's some policies that probably need to be identified in order to be changed
1:01
in order for us to use things like AI, machine learning, large language models, those things in our space
1:08
because those are all new, coming on board. So some policies we'll have to adjust on the way we use it, especially at the edge
1:15
And now we can talk a little deeper about how we want to use AI at the edge a little bit later
1:20
But, yeah, I think across the board it's a cultural shift, and we're getting there one day at a time
1:27
Yeah, I think General Ray is right. This is a unique time for the Army. I don't know how many people had the opportunity to listen to Secretary Driscoll this morning
1:34
But, you know, the Army is really preparing for that future fight, making sure we stay ahead of these threats through what we call continuous transformation
1:41
And that's not just a buzzword or a simple reorganization. It is a holistic view by the secretary and the chief
1:47
to make sure the army is prepared for that future fight. And obviously technology, cyber, AI, drones
1:54
are all central to that. And it really making sure we stay ahead of adversaries Absolutely Can you give me an example where a program sort of broke through the friction And you know what lessons you learned from that in recent experience
2:10
Yeah, when we start off, I can talk about next generation command and control
2:14
I know everybody talks about that. So, you know, we had tons and tons of disparate, you know, C2 systems that were out there, 13 systems to be exact
2:23
You know, AFAT has a couple of different ones. So what we decided to do is look at an ecosystem that could potentially replace that
2:30
And next generation command and control is something that we looked at. Now, that was built off the predication of everything we did within C2FIX
2:40
Organizations were working from 82nd, 101st, and 25th Infantry Division did the C2FIX portion
2:47
which really leveraged all that we learned there into what we're doing with next gen C2 with the 4th ID
2:53
which is our first prototype organization. So again, NextGen C2, a full stack
3:00
What we're doing on the acceleration portion of it is we're looking at the infrastructure
3:06
and the transport portion of it and how we can accelerate that across all 19 divisions
3:10
in a 30-month sprint. And I believe if we can put that transport
3:15
and infrastructure in place, which is the highway that we need in order for everything from the data
3:21
and application layer to lay on top of that, we're going to be in a really, really good place
3:26
Yeah, I think General Ray is right. I mean, maybe to kind of touch on something that's near and dear to my heart is AI
3:32
but specific for our AI relates to cybersecurity. And I know this could be an entire panel in itself
3:37
but I think what we're seeing in AI at the business use case at enterprise level is extraordinary
3:43
Our CIO with the G6 are doing great work. I'm really passionate about how do we move AI to operational use cases, specifically cyber
3:50
So for instance, how can AI be leveraged for cyber defense? And equally as important, how can we leverage it for cyber offense
3:57
And really seeing both sides of that. And in fairness Army Cyber Command I would say is really the leader when it comes to AI and cyber There still significant room we can continue to improve upon their efforts and stay ahead But I would say looking out at the services it extraordinary to see what our cyber already done leveraging AI
4:16
Let's pull the thread a little on the NextGenC2 effort that you have going right now
4:21
Obviously, the fourth ID has been very busy working on this. They have kind of different sprints iterations every, I think, once a month that builds on developing this ecosystem and this tech stack, if you will
4:37
25th ID is going to be doing the same, I think a little bit, with two different prototypes, my understanding
4:44
We're working with a lot of different companies. Two separate prototypes between 25th and 45th ID
4:48
Yeah, so this, I mean, this is a super ambitious effort when you talk about a 30-month sprint to get this out to, you know, 19 divisions
4:57
talk about what you're learning so far from the fourth ID, for instance
5:02
And are they giving you confidence that you're going to be able to, you know
5:07
hit those goals when it comes to being able to field this to the broader force
5:12
Yeah, I think they are. You know, again, this is a new, we're embarking on something new
5:19
And in the process of that, there are, we're keeping cybersecurity on the forefront of everything
5:24
Just like Mr. Puget said, when it comes to cybersecurity, we're going to bake it in early in the process
5:30
is what we did with what's happening with 4th ID and their first application that they utilized
5:37
We saw that there was some risks. We mitigated those risks. We moved forward from there, and we were able to actually get ahead of it
5:45
and still use the application as it was designed. And from there, we believe now we can move on to the next set of applications
5:53
that we would like to bring in, you know, logistics. We're looking at Intel apps that we're bringing onto the platform
6:00
And then we're going to assess those, and we going to move forward from there And I believe we can then move on to other organizations at the end of Ivy the sprints that we doing with Ivy Ivy Sting Ivy Sting
6:14
Yes. Thank you. Yes, too. Yeah. All right. Well, in terms of the cybersecurity risk you were talking about
6:23
there was a memo that came out recently. So I'm hoping that you can address that a little bit further
6:29
in terms of how you address cybersecurity deficiencies and risk. This is obviously a program that's going very quickly
6:38
and you're still at a pretty early phase here, if you will
6:43
but it's moving quick. So how will you continue to address those cybersecurity risks
6:49
and what are you currently concerned about as you move forward? You may have resolved some of the present risks
6:57
But, you know, how do you kind of continue to address and keep learning from that? Sure
7:02
I mean, what we did was we burnt down everything that we built in the beginning and we built
7:08
a new process and a new environment in order to create better security measures across
7:13
the board. That's what we actually did. And that's what we'll continue to do. We have a team that stood up to overwatch all this now
7:20
Now, the Army Data Operations Center is going to be kind of a data team that's going to
7:25
overlook that for the entire army across the board. So we're putting measures in place to
7:30
mitigate all those potential problems that may come about going forward. Yeah, and General Ray
7:36
actually said something in his first answer I just want to kind of flesh out too. It's really making
7:40
sure as we're doing a new capability, making sure security is designed really by default and by
7:45
design. So is security started at the very beginning and how is it being infused throughout
7:50
And it should iterate. I actually think it's a good day if we detect the vulnerability and
7:54
We Remedy, that's great. It's important to do it early on and now continue to fine tune the product
8:00
which is what we've seen really throughout a lot of your efforts. Yeah, I mean, wouldn't you like to find it out earlier rather than us outfitting 19 divisions
8:07
100%. 100%. Exactly. So we're there. We're doing a good job at it
#news


