Leveraging AI for a Decisive Cyber Advantage

By CW4 Rory J.H. Rankin

Article published on: in the 2026 Edition of Gray Space

Read Time: < 13 mins

Three soldiers in camouflage uniforms focus on a computer screen in a dimly lit room with colored lights in the background.
Soldiers, Airmen, National Guard State Partnership Program (SPP) partners, and civilian cyber professionals train together during Cyber Shield 2025 at the Virginia National Guard’s State Military Reservation in Virginia Beach, VA, on June 11, 2025. (U.S. Army National Guard photo by Master Sgt. Arthur M. Wright)

The technological advancement of Artificial Intelligence (AI)/Machine Learning (ML) remains fluid globally, which poses a constant challenge for the U.S. Army to keep pace throughout the competition, crisis, and conflict phases. To dynamically exceed action at the speed of war, we must excel in the AI/ML space to secure, defend, and protect the homeland against our adversaries through digital modernization. One of the most critical homeland assets to protect and defend is our Critical Infrastructure/Key Resources (CI/KR) and Operational Technology (OT) across all military and commercial domains. Recent cyber attacks that triggered societal panic include the Colonial Pipeline by Darkside from Russia and China’s dual threat (Salt and Volt Typhoon) cyber-attacks on our power grids, water systems, ports, and telecommunications (CSIS, 2025). In response, we need to achieve digital modernization with agility at a dynamic pace to counter these cyber-attacks against our critical infrastructure. Artificial Intelligence can identify Indicators of Compromise (IOC) and Malicious Cyber Activity (MCA) at a faster pace than human speed, thereby preventing future cyber threats before they can become cyber attacks.

So, What is AI/ML?

Artificial Intelligence (AI) is only as good as the respective Machine Language (ML) and Learning Language Models (LLM) with accurate corresponding metadata it captures and feeds AI to self-learn. ML provides the core computing, reasoning, and data analytics that allow AI to predict correctly and to automate but not replace human intelligence. AI can integrate data analytics efficiently while collaborating with an agile and clear strategic approach. However, in some instances, such as advanced drones, AI/ML has reached full autonomy to self-learn and will only exponentiate in the future (Read, 2023).

Examples of Cyber Attacks

Several cyber attacks have paralyzed critical infrastructure and fall under several names such as Critical Infrastructure/Key Resources (CI/KR), Industrial Control Systems/Supervisory Control and Data Acquisition (ICS/SCADA), and what is now known as Operational Technology (OT) (FEMA, 2008). These cyber attacks include:

  • Stuxnet in June 2009 was an offensive OT-targeted cyber attack by U.S. and Israel to target the programmable logic controllers (PLCs) of the gas centrifuges making them overheat, thereby shutting down the Natanz Nuclear Facility in Iran (CSIS, 2025).
    Note: Congress just concluded a hearing on July 22, 2025, stating that our nation is not ready for a large-scale OT-targeted cyber-attack (Ribeiro, 2025).
  • In 2015, Ukraine became a testing ground for cyber-attacks by Russia.
  • Sandworm in 2016–2017 by Russia, which shut down 60 Ukrainian power substations causing 250,000 people to be with no electricity (CSIS, 2025).
  • In Southeastern U.S. in May 2021, Colonial Oil Pipeline suffered a $4.4 million ransomware loss, resulting in policy updates with Executive Order 14028, which modernized safeguards and incident response (CSIS, 2025; Driscoll & George, 2025).
  • Volt Typhoon from 2021 is a state-sponsored cyber-threat actor linked to China that has targeted energy, transportation, and water OT networks (CSIS, 2025).
  • In November 2024, Salt Typhoon, also from China, breached 8 telecom providers. However, since 2019, more than 80 countries have been targeted (Times of India World Desk, 2025). Overall, China’s two-pronged strategy (Salt/Volt Typhoon) exploited vulnerabilities in our legacy OT technology that has no redundancy with vulnerable 3rd-party vendors.
    Note: Center for Strategic and International Studies (CSIS) in February 2025 noted that China has increased OT-related cyber-attacks by 300% in 2024 (CSIS, 2025).
  • Russia in January 2024 hacked residential webcams in Kiev, Ukraine, to gather information on critical infrastructure. Overall, Russian cyber-attacks on Ukraine’s critical infrastructure surged 70% in 2024, with 4,315 incidents targeting critical infrastructure (CSIS, 2025).

Following the February 28 strikes on Iran and the escalating conflict in the Middle East, the global-threat environment has shifted. Most of the commentary circulating right now focuses on IT-facing threats. The question that matters for operators of power grids, water systems, oil and gas pipelines, and manufacturing facilities is different: What does this escalation mean for OT and ICS? Dragos conducted an intelligence briefing on March 12, 2026, on Iranian Cyber Nation State Actors and hacktivist activity with demonstrated OT/ICS capabilities and how to defend and prioritize OT/ICS threat environment (Messare, 2026).

How do We Secure Critical Infrastructure?

Cybersecurity requires continued coordination between local network defenders (LND), mission owners (MO), and Cybersecurity Service Providers (CSSPs) to continue to have the persistent, continuous monitoring tools automated by AI that help identify anomalies rapidly before anomalies are handed over to DCO for further forensics. Regional Cyber Centers (RCCs) must remain vigilant (Department of the Army, 2023; United States, Joint Chiefs of Staff, 2022b).

How do We Defend Critical Infrastructure?

Once LND (Local Network Defenders), MO (Mission Owners), or CSSP (Cybersecurity Service Provider) identify an anomaly, it is then handed off to the Defensive Cyberspace Operations (DCO) in the blue space for incident response and/or hunt-forward missions. DCO will set a baseline to assess, then clear and harden the network, then finish the operation with a risk-mitigation plan (United States, Joint Chiefs of Staff, 2022b). Dragos is the automated, comprehensive OT tool that is used within the Cyber Protection Brigade to immediately detect intrusion and then mitigate OT vulnerabilities. Having the CEO and co-founder of Dragos, LTC Rob Lee, direct commission to the Virginia National Guard on March 1, 2025, will help sustain and advocate growth to defend OT by utilizing AI. To keep pace with future technologies, ARCYBER Science and Technology, Program Manager RDT&E (Research Development Test & Evaluation), ATEC (Army Training and Evaluation Command), Operational Assessments, Developmental Testing, and Soldier Touch Points (STP) are leading the efforts in experimentation with AI in OT. Based on those assessments, the Program Manager (PM) DCO was able to purchase the Dragos OT Tool to meet the requirements under our DCO Tool Suite RDP (Requirements Development Program) and Program of Record (PoR) ahead of our OT Capability Drop (CD) being approved. This is another great example of acquisition translating operational needs into actionable requirements, thus meeting the critical cyber needs of our warfighters. Acquisition needs to be nested with training (U.S. Department of Defense, 2020; U.S. Department of Defense, 2022). The need for Dragos Training in future OT tools with AI will be vital. There are Job Qualification Specialties (JQS) on OT with four Cyber Protection Teams (CPTs). There are multiple training centers focusing on defending OT with the Indiana National Guard at Atterbury-Muscatatuck Training Center and Cyber Battle Lab (CBL) at Fort Gordon, GA conducting OT Table Top Exercise (TTX) in June 2026. Additionally, ICS Certification Exercises hosted by the U.S. Army Corps of Engineers (USACE) with state power companies, Department of Energy, Bureau of Reclamation, and USACE Critical Infrastructure Cybersecurity (UCIC) stakeholders continue to forge ahead to outpace our adversaries in AI to defend OT. Other exercises focusing on OT are Cyber Shield and Yankee hosted by the National Guard and EGZ hosted annually by the active component Cyber Protection Brigade conducting terrain mapping of OT environment. On the commercial side, Idaho National Labs is a premier training center specializing in OT (OT Lab: Idaho National Laboratory, 2025). Continuous experimentation is ongoing and critical to maintain technological advantage.

How do We Disrupt Critical Infrastructure?

Offensive Cyber Operations (OCO) conducts keyboard fire effects to gain advantage over our adversaries through disruption, degrading, or destroying in relation to the Stuxnet example noted earlier. Nesting operational graphics terminology with soldiers who are at the tip of the spear is purposeful. OCO can also influence adversaries with false information and kinetic effects. Identifying BOTs with AI over Social Media Platforms to manipulate public opinion through information advantage and information dimension is another strategy (United States, Joint Chiefs of Staff, 2022b). In December 2024, China claimed that we weaponized cyber attacks since May 2023 targeting Chinese companies specializing in energy and digital information, which coincided with heightened U.S. and China tensions over export controls on semiconductors and AI technologies (CSIS, 2025).

How do We Deliver OT Capabilities to the Warfighter?

The recently signed Army Transformation Initiative (ATI) memo by the Secretary of Defense on April 30, 2025, will get after continuous transformation. ATI will build upon the Transformation in Contact (TiC) effort, through rapid Commercial over the Shelf (COTS) prototyping while streamlining acquisition coupled with integrating AI with emerging OT technologies faster.

Agile funding already provided rapid procurement of the Dragos OT tool by adapting how we fight, train, organize, and buy equipment. Army Futures Command and Training and Doctrine Command will merge into Transformation and Training Command (T2COM) to align force generation, force design, and force development under a single headquarters on October 1, 2025 (Driscoll & George, 2025).

Sgt. Jordan Telting (in camouflage) operates equipment alongside another soldier during a Transformation in Contact field exercise in a wooded training area.
Army Transformation in Contact (TiC) 1.0 lets brigades rapidly test drones and electronic warfare, improving battlefield awareness, threat detection, and mission success. (Photo of Sgt. Jordan Telting by Adams Guerrero.)

How will Strategy Deliver OT Capabilities to the Warfighter?

Section 811: Modernizing the Department of Defense Requirements Process Final Report to Congress on July 14, 2025, is lockstep with ATI through increased timely equipment fielding and accelerated innovation cycles through experimentation. Additionally, the FY 2024 National Defense Authorization Act (NDAA) stated NLT October 1, 2025 the Army will modernize requirements and streamline acquisition processes to deliver agile, reliable, and combat-ready capabilities at speed and scale through COTS and rapid prototyping, while the 2025 National Defense Strategy (NDS) dated May 2, 2025, will prioritize defense of the U.S. homeland (Fiscal Year, 2025). The Digital Modernization Strategy will also align with the NDS on artificial intelligence to shift from hardware to more adaptable software enterprise with the cloud-based Big Data Platform (BDP). Gabriel Nimbus (GN) is the Army repository for OT anomalies and OT adversarial threat TTPs on the Army Gov Cloud BDP. We can now get after the low bandwidth at the tactical edge by parsing metadata at tactical edge to push and ingest large data from the BDP. Consequently, the AI Delivery of AI-enabled capabilities can be a force multiplier to support critical infrastructure in cooperation with DHS and cut the red tape with Generative AI. We need to have a technical computing advantage over China in advanced semiconductors during the competition phase to produce powerful GPUs (Graphics Processing Units). AI-capability development requires tremendous computing power and the large electrical footprint with hydroelectric dams and/or nuclear energy to power those data centers. On August 21, 2025, the disestablishment of JCIDS (Joint Capability Integration and Development System) prioritized agile delivery capabilities at speed of relevance to the warfighter by streamlining the acquisition process. In the past, the acquisition guidance to approve a capability was 103 days but took up to 2 years; consequently, the technology that was approved could not keep pace with evolving threats and emerging tech. Now it can take 30 days. The speed of delivery and continuous improvement will eliminate the stovepipes and promote cross-functional collaboration (Driscoll & George, 2025).

How will Policy Deliver OT Capabilities to the Warfighter?

Policy addresses all elements of Doctrine, Organization, Training, Materiel, Leadership and Education (DOTmLPF-P). Executive Order (EO) 14179 signed January 23, 2025, revokes previous barriers to AI innovation (Fiscal Year, 2025). This allowed the ATI to follow COTS free market to pursue future AI technology. The end state is the opportunity to overmatch our adversaries exponentially while our adversaries are constantly adapting and evolving their respective cyber threats. Another EO 14028 signed May 12, 2021, following the Colonial Pipeline ransomware cyber-attack ensured stronger baseline cybersecurity measures such as Zero Trust Architecture (ZTA). This policy has already created ZTA curriculum and training at the respective schoolhouse under Cyber Center of Excellence, providing a competitive automated-edge solution with AI called Security Orchestration Automated Response (SOAR). Both EO policies directed AI governance to keep pace with technology. Policy on OT vulnerabilities also led to Senator Eric Schmitt (MO) reaching out to ACM-Cyber. On December 5, 2024, Sen. Schmitt also introduced a bi-partisan bill to encourage competition in AI procurement aligning with EO 14179 (Office of U.S. Senator Eric Schmitt, 2024).

US Critical Infrastructure Remains Exposed as Congress Confronts OT Cybersecurity Gaps

In closing, to continue moving AI innovation forward will require continuous transformation. T2COM is one of the leaders to meet these AI with OT capability gaps through Concept-Focused Warfighter Experiments (CFWE) and Project Convergence Capstone to discover AI/OT advanced technology through experimentation. There is recognition at the highest levels of U.S. government on the importance of AI and OT.

We must be postured effectively to avoid technological surprises. We must be predictive and adaptive. We must keep pace with rapid changes in the operational environment and the force employment phase of the continuum of strategic direction described in CJCSI 3100.01e and Joint Doctrine Note 2-19 (United States, Joint Chiefs of Staff, 2019). Continuous transformation will get us across the finish line. Continuous transformation (3 phases) will train through exercises, equip through experimentation, and exceed the pace of adversaries during the competition phase. We must stay flexible, agile, and adaptive to new and emerging technologies in AI and OT. First, we must demonstrate tangible near-term results while innovating new capabilities through rapid acquisition in 18-24 months. Second, deliberate transformation will deliver capabilities to the total force in 2-7 years. Finally, with concept-driven transformation, we will invest in future capabilities driven by experimentation through Science and Technology (ARCYBER S&T) in 7-15 years towards the Army 2030/2040 concept (Driscoll & George, 2025). If we don’t, our adversaries will likely target a hydroelectric dam that could flood a city, cause a blackout, and shut down transportation systems all at the same time.

Notes

  1. Center for Strategic and International Studies (CSIS). (2025). CSIS Significant Cyber Incidents Since 2006. https://www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents
  2. Department of the Army. (2023). Information (ADP 3-13) https://armypubs.army.mil/epubs/DR_pubs/DR_a/ARN39736-ADP_3-13-000-WEB-1.pdf
  3. Driscoll, D., & George, R. (2025, May 1). Letter to the force: Army transformation initiative. www.army.mil. https://www.army.mil/article/285100/letter_to_the_force_army_transformation_initiative
  4. FEMA. (2008). CISA: Critical Infrastructure and Key Resources Support Annex [PDF]. FEMA. https://www.fema.gov/pdf/emergency/nrf/nrf-support-cikr.pdf
  5. Fiscal Year 2024 National Defense Authorization Act, Section 811: Modernizing the Department of Defense Requirements Process. (2025). https://www.jcs.mil/portals/36/fy24%20ndaa%20section%20811%20report%20to%20congress.pdf
  6. Messare, M. (2026, March 12). Middle East escalation: Assessing spillover threats to OT/ICS [Intelligence Briefing]. Dragos.com. https://hub.dragos.com/on-demand/middle-east-escalation-assessing-spillover-threats-to-ot-ics?utm_campaign=34250564-2026+year+in+review+full+report&utm_medium=email&_hsenc=p2anqtz-_oshx2ne06skdulwfantjz_kww4yrqcg9t1hdkgjzava_gg3d_1bt-852p2osz9mdrv78l3rtttsdm6hvuocd7fsov-0ifhvptehszgq8q7dwtcuq&_hsmi=410311650&utm_content=410311650&utm_source=hs_automation
  7. Office of U.S. Senator Eric Schmitt. (2024, December 5). Senator Schmitt and Senator Warren Introduce Bipartisan Bill to Encourage Resiliency, Competition in Department of Defense’s Procurement of AI, Cloud Computing Tools [Press Release]. https://www.schmitt.senate.gov/media/press-releases/senator-schmitt-and-senator-warren-introduce-bipartisan-bill-to-encourage-resiliency-competition-in-department-of-defenses-procurement-of-ai-cloud-computing-tools/
  8. OT Lab: Idaho National Laboratory. (2025). https://inl.gov/national-security/
  9. OT Lab: Indiana National Guard Camp Atterbury. (2025). https://www.in.gov/indiana-national-guard/camp-atterbury/
  10. Times of India World Desk. (2025, September 5). ‘Salt Typhoon’ attack: How China hackers may have accessed sensitive US data; tapped into power grids. Times of India. https://www.msn.com/en-in/news/world/salt-typhoon-attack-how-china-hackers-may-have-accessed-sensitive-us-data-tapped-into-power-grids/ar-aa1lveud?ocid=bingnewsserp
  11. Ribeiro, A. (2025, July 22). US critical infrastructure remains exposed as Congress confronts OT cybersecurity gaps, fifteen years after Stuxnet. Industrial Cyber. https://industrialcyber.co/industrial-cyber-attacks/us-critical-infrastructure-remains-exposed-as-congress-confronts-ot-cybersecurity-gaps-fifteen-years-after-stuxnet/
  12. Read. (2023). The National Academies Press. https://www.nationalacademies.org/read/27503/chapter/8
  13. United States, Joint Chiefs of Staff. (2022a). Joint strategic planning system (CJCSI 3100.01E).
  14. United States, Joint Chiefs of Staff. (2022b). Cyberspace operations (JP 3-12) https://irp.fas.org/doddir/dod/jp3_12r.pdf
  15. United States, Joint Chiefs of Staff. (2019). Strategy [Joint Doctrine Note 2-19].
  16. U.S. Department of Defense. (2020, September 9). The Defense Acquisition System (DoDD 5000.01)
  17. U.S. Department of Defense. (2022, July 28). Operation of the Defense Acquisition Framework (DoDI 5000.02)

Author

Chief Warrant Officer 4 Rory J.H. Rankin is currently assigned with the newly established Cyber Future Capabilities Directorate (FCD) resulting from recent Transformation and Training Command (T2COM) re-organization. He was previously dual-hatted as DCO Branch Chief and the Senior Technical Advisor (STA) for Army Capability Manager-Cyber (ACM-Cy) from August 2023 to January 2026. With aggregated knowledge and understanding, he has accumulated over 25 years in special forces, tactical, operational, strategic, and combat environments on leadership assignments for five sister services at all COMPOs and at all echelons (Joint, Corps, Division, Regiment, Brigade, Battalion, Company, and Mobile Training Teams (MTT) Squad levels) with an additional 18 years at one company in the corporate Information Technology (IT) field. Throughout his career, he has interacted with 18 inter-agencies of the Intelligence Community (IC) and 14 different foreign militaries, which has provided him conceptual knowledge and understanding. He has been trained at 15 professional military education courses spanning five different MOS’s in Signal, Military Intelligence, and Cyber with an ASI in Capability Development, and a PDSI (Senior Host Analyst). The National Defense Strategy (NDS) remains fluid as technological capabilities constantly evolve across funding, policy, and doctrine. Within this environment, CW4 Rankin continues to inform and assist decision-making within the Army. His goal is to form relationships with the community of interest and respective stakeholders to build the bridge between cutting-edge technologies such as Artificial Intelligence/Machine Learning (AI/ML) in the public sector and partner collectively to enable the DoW (Department of War) to be effective.