In 2017, the U.S. Army’s 2nd Cavalry Regiment stationed in Europe received the first batch of the improved or up-gunned—in military parlance—Stryker Dragoon armored vehicles. Commanders on the ground requested them, as the 2nd needed to improve its capabilities against near-peer adversaries in theatre. In Europe, this likely would mean Russia.

The term adversary is typically reserved for real foes. According to the official Department of Defense Dictionary of Military and Associated Terms, an “adversary” is “A party acknowledged as potentially hostile to a friendly party and against which the use of force may be envisaged.” However, according to The War Zone, “adversaries” is also a term used by U.S. armed forces to describe “surrogate opponents during an exercise.”

It’s therefore worrisome that according to the Pentagon’s Office of the Director of Test and Evaluation (DOT&E), the Strykers’ onboard systems had certain cyber vulnerabilities, which Russia disrupted on at least one occasion.

The Stryker Dragoon vehicles are recognized under two different designations: the XM1296 or the Infantry Carrier Vehicle – Dragoon (ICV-D). They’re manufactured by General Dynamics Land Systems. According to the DOT&E’s report, “Adversaries demonstrated the ability to degrade select capabilities of the ICV-D when operating in a contested cyber environment,” and that, “In most cases, the exploited vulnerabilities pre-date the integration of the lethality upgrades.”

This means the vulnerability didn’t affect the lethality systems and upgrades—including in a new 30mm gun. So it’s possible the vulnerabilities affected the vehicle’s data-sharing, navigation, or digital communications capabilities. Meddling with these systems can have extensive consequences. Since all Strykers use Blue Force tracking systems to distinguish friend from foe, crucial GPS navigation software that can be spoofed raises the possibilities of derailing missions and even worse, fratricide.

Cyber warfare: Did Russia hack the Army's Stryker Dragoon?
U.S. Army photo by 1st Lt. Ellen C. Brabo, 2nd Cavalry Regiment

The DOT&E’s report doesn’t identify specific adversaries. But, intrusions and disruptions have been felt by the U.S. military as well as several of its NATO allies. Last year, Norway complained about GPS signal disruptions on its border area, forcing pilots fly without GPS. Finland has also complained about similar tactics on its borders.

U.S. Army Gen. Raymond A. “Tony” Thomas III, commander of U.S. Special Operations Command, stated in April of 2018: “Right now in Syria, we’re in the most aggressive EW [electronic warfare] environment on the planet from our adversaries,” he said. “They’re testing us every day, knocking our communications down, disabling our AC-130s, ect….”