In an organisation where some unit anniversaries stretch back to the 1600s, marking just five years of existence might seem rather trivial.
But this particular half-decade mark deserves celebrating because it belongs to 13 Signal Regiment, which in its short life has become crucial to the future of the British Army.
With the character of warfare evolving fast, digital and cyber capabilities are increasingly being relied upon for operational effectiveness and safety of personnel. And 13 Sig Regt is the service’s one and only defensive cyber unit, created to safeguard many of the networks upon which the army’s huge digitisation revolution now hinges.
Every major platform launched in recent years – think Wildcat, the updated Apache, Ajax and those still in the development pipeline such as Challenger 3 – are dependent on network connectivity to operate at their full potential.
We recently learned via the strategic defence review that these capabilities will help form the sharp end of a £1 billion “digital targeting web” which for the first time will enable sensors and main platforms – whether on land, sea or in the air – to combine and form a single kill chain.
And a new tri-service Cyber and Electromagnetic Command is being set up right now to coordinate all the armed forces’ cyber resources – including 13 Sig Regt’s unique defensive capabilities.
“The demand for our services has grown exponentially since we were formed back in 2020,” notes Maj Neil Donaghy (R Signals), OC 233 Squadron.
“People are realising just how important cyber security is. “The truth is, the more data you handle and devices you operate the more routes there are for an adversary to attack.
“If you look at Project Asgard, the MoD’s initiative to network the UK’s reconnaissance and strike capabilities, it requires the rapid passage of data and if an enemy can deny or corrupt it, you’ve lost the battle.”
As the core of the Army Cyber Information Services Operations Centre, 13 Sig Regt’s four specialist squadrons are dedicated to sustaining and assuring the army’s digital networks through the provision of expert engineering advice (see panel right).
“Currently we deal with anything from nation states trying to access our networks for strategic reasons, to hacktivists doing it for a bit of fun,” adds Maj Donaghy.
It’s a hectic workload and over the last couple of years the regiment’s personnel have helped shield UK military systems from around 90,000 attacks, not to mention incidents caused by less malevolent but, potentially, equally destructive actors.
“The internal threat is very real,” Maj Donaghy explains.
“For example, people plug a USB into their device they don’t realise contains some kind of malicious code, or someone in a field headquarters accidentally damages a piece of hardware placed under a table, bringing the network down.
“Formations have to make sure they have the appropriate security controls in place to protect their own systems from themselves as well as foes.”

Soldiers at work at the Army Cyber Information Services Operations Centre
13 Sig Regt is well-equipped to offer informed advice on virtually all aspects of cyber security.
Although it’s an army unit, it is staffed by top cyber specialists recruited from across the forces, as well as civil servants and contractors – and it provides services to the whole of UK defence.
“We monitor and assure any IT system the army owns or is responsible for,” says Maj Donaghy. “That ranges from local IT networks at home and overseas right up to Falcon – our tactical internet – and includes OpNet, the new deployed mission system used on ships, field headquarters and forward air bases.”
For army units that are deploying, the regiment can support what are called ‘level two defensive cyber operations’, which protect information systems devoted to unit-led activity. Formations can apply for this by completing a support request through the Land Operations Centre.
“We can advise, help, train, mentor, do policy wraps and even provide deployed support, where our engineers go forward to the location if deep technical capabilities are required,” explains Maj Donaghy.
“Some existing operations have recently started using our services after they experienced cyber security incidents.
“Deployed commanders have to consider digital fires as well.
“An adversary might deny your reach back to the UK and if you’re unable to have a fast decision cycle because your enemy has somehow congested or corrupted your network, they have got the upper hand.”
Not surprisingly, the demand for talented cyber warriors to protect these functions is growing fast and 13 Sig Regt is as keen as any organisation operating in this realm to attract the best possible talent.
“Anyone in the Royal Signals can apply to join us and if they have the interest and ability we will grow them as a cyber security specialist,” says Maj Donaghy. “If you want to be deployed on operations or exercises then this is the place to come because our soldiers are constantly committed, supporting the army and UK defence around the globe.
“If you’re not in the Royal Signals then there are posts in 259 Signal Squadron, which has 17 cap badges supporting the army’s tactical communications systems. More opportunities will also open up as the new cyber career pathway is established.”
This will be open mainly to personnel who’ve advanced their skills on the cutting-edge cyber foundation pathway course or the cyber direct-entry programme that was launched earlier this year. Both are run out of the Defence Cyber Academy at Shrivenham.
Open to serving troops and civilians, the direct-entry pilot scheme is currently run by the Royal Navy and Royal Air Force, with the army slated to join in 2026. The personnel on it are not required to serve in dangerous environments or handle weapons.
Meanwhile, its accelerated learning syllabus will churn out the first graduates before the end of the year.
For those already serving in cyber roles, the move to open doors to a wider pool of individuals is a welcome development.
“We want and need diverse people – even those with a background in the arts,” says Maj Donaghy. “When you are protecting a network you have to be able to think differently – you have to be able to see things from your adversaries’ point of view.”
Fast-tracking specialists to bolster the armed forces’ world-class capabilities is a major statement of intent.
Ultimately, it can only make the army even more adept at fending off the growing number of threats lurking out there, deep in cyberspace.

LCpl James Leedham (R Signals, above), serving with 233 Signal Squadron, has these tips for budding cyber specialists…
Do the immersive labs
These are free to anyone, and can be found on the Defence Learning Environment. The virtual scenarios provide valuable practice and are a good way of getting clued up on cyber.
You’ve got to want it
Be prepared to do lots of courses and revision in your own time. I’ve done external CompTIA qualifications, for example, which provided a very good knowledge base.
Take part in Defence Cyber Marvel
Anyone can participate in this contest that tests your skills to stop cyber attacks. I’ve been part of the red team – the hackers – twice and found it really useful. I got to travel to South Korea and Estonia to take part.
Get on the cyber foundation pathway course
I worked up to module four and there are six in total. It’s a tough course that sets you up for success in the trade. Anyone can apply, although it’s easier to get on for those who are in a cyber role already.