536. Project Deterrence — An Entangled Future

[Editor’s Note:  The Army’s Mad Scientist Laboratory is pleased to feature the first in a series of posts excerpting findings from Team Axis Insight 2035Project Deterrence Final Report.  This Integrated Research Project documents the findings from the group’s United States Army War College (USAWC) Strategic Research Requirement portion of the Master of Strategic Studies degree program that occurred over the academic year (from November 2024 to April 2025).

Team Axis Insight 2035 consisted of COL Byron N. Cadiz, COL T. Marc Skinner, LTC Robert W. Mayhue, LTC Lori L. Perkins, and LTC Shun Y. Yu — all U.S. Army Officers and now proclaimed Army Mad Scientists!  Team Axis Insight 2035‘s Project Deterrence Final Report documents their collective response to the following question posed by Ian Sullivan, Deputy Chief of Staff, G-2, U.S. Army Training and Doctrine Command:

How are China, Russia, Iran, and North Korea likely to respond to U.S.-led deterrence efforts by 2035?

Team Axis Insight 2035‘s Key Findings are:

“By 2035, it is almost certain that China, Russia, Iran, and North Korea will respond to US deterrence with entanglement, disruptive technology, and persistent coercion.  The global landscape is rapidly transforming, characterized by increasing complexity and challenges to U.S. influence.  This seismic shift is marked by two key findings, the first encompassed in three threat vectors:  1) an entangled future of situational cooperation and transactional interdependence among China, Russia, Iran, and North Korea which amplifies deterrence challenges; 2) disruptive technology by which the U.S. advantages are severely threatened or lost to adversarial emerging technologies; and 3) persistent coercion consisting of the expansion and exploitation of gray zone activities in which aggression below the level of armed conflict bypasses traditional deterrence.  Collectively, these developments forecast that U.S. deterrence is at risk of becoming strategically irrelevant without integrated, adaptive responses across all instruments of power.  The second key finding is that China is not just the pacing challenge, but the true threat:  all roads go through China.   Russia, Iran, and North Korea will continue to pose primarily regional challenges.  While China is highly unlikely (16-30%)* to exert direct control of Russia, Iran, or North Korea, its regional investments will provide China with considerable leverage to provoke or mitigate destabilizing actions to promote and protect its interests.”

Today’s post excerpts Team Axis Insight 2035‘s finding regarding “an entangled future of situational cooperation and transactional inter-dependence among China, Russia, Iran, and North Korea which amplifies deterrence challenges” — Enjoy!]

Threat Vector #1: Entangled Future

Despite shared opposition to the U.S.-led global order, China, Russia, Iran, and North Korea are highly unlikely* to formalize an alliance by 2035 due to longstanding historical animosities and conflicting geopolitical priorities. Instead, the relationships among these actors are almost certain (86-99%)* to intensify, presenting significant challenges to established global norms and the influence of the United States.  Characterized as situational, opportunistic, and largely bilateral, their partnerships are highly likely* to become more complex as they become entangled through economic realignments, supply chain dependencies, and technological cooperation.

Strategic Goals and Areas of Cooperation.
Self-generated from Analytic Reports Supporting Key Findings

As their relationships deepen, the resulting increase in strategic and tactical coordination among these nations will likely (56-70%)* create uncertainty across multiple domains, reducing the effectiveness of traditional U.S. deterrence measures.  Current U.S. deterrence approaches rely on forward presence, technology export controls, economic sanctions or incentives, and military alliances and partnerships, such as NATO, AUKUS, and the Quad.  Our adversaries and competitors seek to exploit the gaps and seams in U.S. deterrence activities.  The synergistic effect of revisionist states’ asymmetric tactics, amplified by China’s institutional and economic leverage, threatens to normalize illiberal practices while eroding the credibility of U.S.-backed enforcement mechanisms.  This convergence poses a distributed, persistent threat to U.S. influence, marked by institutional fragmentation, economic decoupling, and the strategic erosion of the foundations of the existing international order.

China

Graph of China’s economic progress, from 1961-2018 in U.S. Dollars (2019). For an animation, visit The Visual Capitalist website.

As the economic powerhouse of the quartet, China’s approach to reshaping the international order is highly likely* to favor entangled inter-dependence, leveraging economic, technological, and institutional dependencies to exert influence without direct confrontation.  The Belt and Road Initiative, including the Digital Silk Road, serves as a key mechanism for expanding Chinese influence through physical and digital infrastructure, energy grids, and financial systems.  China’s dominance in critical supply chains, including rare earth minerals, pharmaceuticals, and semiconductors and its growing influence in international standard-setting bodies will likely* enable it to apply subtle yet firm pressure on states dependent on its technologies and markets to achieve Chinese interests.  By 2035, the entanglement of U.S. adversaries is unlikely (31-45%)* to overthrow the U.S.-led order but is highly likely* reconfigure it into a hybrid system where liberal norms coexist with Chinese-centric rules.

China’s strategy does not operate in isolation.  It is increasingly intertwined with the actions of Russia, Iran, and North Korea.  These relationships, driven by necessity rather than shared ideology, are almost certain to intensify as a direct response to U.S.-led deterrence and containment efforts.  By 2035, these will almost certainly evolve into more integrated multi-domain operations with enhanced artificial intelligence, space, and cyber capabilities with a sharp focus on technological denial regimes.  For its benefit, China supports Russia in exchange for long-term guaranteed access to oil and gas resources to support its industrial base while undergoing conversions to clean energy.  Similarly, China uses Iran for access to oil and gas at preferential prices while diversifying energy suppliers to reduce vulnerability.  North Korea benefits China by acting as a geographic buffer between China and U.S.-allied South Korea, preventing U.S. military presence along the Chinese border.

Russia

Chart plotting acts of Russian assertiveness by country.  Green area of pie chart are positive acts, red are negative.  Adapted from The Hague Centre for Strategic Studies.

Russia, heavily sanctioned and seeking to undermine U.S. influence, is likely* to continue its assertive behavior in Europe, though war with North Atlantic Treaty Organization (NATO) countries will remain unlikely.*  Russia’s reliance on China for economic support and its exchange of military materiel with North Korea underscore a growing alignment against the West.  Russia’s development of advanced military technologies aims to erode U.S. military superiority, while its financial decoupling from the dollar, through the expansion of the System for Transfer of Financial Messages and integration with China’s Cross-Border Interbank Payment Systems, will likely* diminish the effectiveness of U.S.-led economic sanctions.  China serves as Russia’s economic lifeline, providing industrial goods, consumer products, and dual-use technology while under Western sanctions.  Russia uses Iran for regional power projection into the Middle East to counter US influence, facilitating military cooperation in exchange for potential basing options.

Iran

Iranian drones were sent to Russia for use against Ukraine.

Iran, motivated by regime survival, is highly likely* to continue its aggressive development of drone warfare capabilities and conduct cyberattacks against critical U.S. infrastructure.  Its willingness to export drone technology highlights its pursuit of indirect conflict as a means of projecting power. Iran’s increasing reliance on China for oil exports amid sanctions is highly likely* to grant Beijing significant leverage over Tehran’s foreign policy decisions.  In exchange for regional access, Iran benefits from Russia’s military technology including advanced air defense systems, combat aircraft, and naval vessels, as well as technical assistance for civilian nuclear facilities as a diplomatic cover for possible nuclear weapons development.  Though geographically separated, Iran will foster deepened relations with North Korea to benefit from their ballistic missile technology and expertise, particularly as it applies to their nuclear program and possible technology transfers.

North Korea

North Korea announced it is building a nuclear-powered submarine in March 2025.

North Korea, despite its limited capabilities, is highly likely* to provocatively leverage its military capacity to ensure regime survival. To prevent uncontrolled escalation and destabilization in the region, China will almost certainly continue to serve as a critical trade partner to North Korea, ensuring its economic solvency.  Russia will likely* repay North Korea’s troop and munitions support through transfers of sophisticated weapons technologies for its nuclear, missile, and submarine programs, to include training and technical assistance for further weapons development. The deepening Russia-North Korea relationship will likely* weaken the United Nations’ Security Council’s enforcement mechanisms, further undermining global nonproliferation norms.  In exchange for its assistance with Iran’s missile and nuclear program, North Korea is highly likely* to seek support in drone technology and production techniques.  The converging strategies of these actors will generate a synergistic effect across multiple domains, challenging the U.S.-led international order through disruptive technologies and persistent coercion.

If you enjoyed this post, check out Axis Insight 2035‘s comprehensive Project Deterrence Final Report here.

Review the TRADOC Pamphlet 525-92, The Operational Environment 2024-2034: Large-Scale Combat Operations

Explore the TRADOC G-2‘s Operational Environment Enterprise web page, brimming with authoritative information on the Operational Environment and how our adversaries fight, including:

Our China Landing Zone, full of information regarding our pacing challenge, including ATP 7-100.3, Chinese Tactics, How China Fights in Large-Scale Combat Operations, BiteSize China weekly topics, and the People’s Liberation Army Ground Forces Quick Reference Guide.

Our Russia Landing Zone, including the BiteSize Russia weekly topics. If you have a CAC, you’ll be especially interested in reviewing our weekly RUS-UKR Conflict Running Estimates and associated Narratives, capturing what we learned about the contemporary Russian way of war in Ukraine over the past two years and the ramifications for U.S. Army modernization across DOTMLPF-P.

Our Iran Landing Zone, including the Iran Quick Reference Guide and the Iran Passive Defense Manual (both require a CAC to access).

Our North Korea Landing Zone, including Resources for Studying North Korea, Instruments of Chinese Military Influence in North Korea, and Instruments of Russian Military Influence in North Korea.

Our Running Estimates SharePoint site (also requires a CAC to access) — documenting what we’re learning about the evolving OE.  Contains our monthly OE Running Estimates, associated Narratives, and the quarterly OE Assessment TRADOC Intelligence Posts (TIPs).

Then review the following related Mad Scientist Laboratory content from several previous TRADOC G-2 sponsored USAWC projects:

Team Sullivan’s TravelsFuture Dynamics of Warfare: Everyone is a Player, Everything is a Target and their associated Final Report.

Team Techno-Warfare Group‘s What Skill Sets Will Leaders Need for Warfare in 2035? and their Techno Sentient Warfare in 2035 Final Report.

>>>>REMINDER — Only Two Days Left!!!  Learn how you can submit your entry(ies) to our Great Power Competition & Conflict writing contest by clicking here to review the contest rules We look forward to your participation and reading your thoughtful submissions! (S: Midnight, May 30, 2025).

* Kesselman List of Estimative Words:

Disclaimer: The views expressed in this blog post do not necessarily reflect those of the U.S. Department of Defense, Department of the Army, Army Futures Command (AFC), or Training and Doctrine Command (TRADOC).

535. Winning the Future: The U.S. Military’s Need for Technological Dominance and Defined Strategic Vision

Agentic warfare is here, whether we welcome it or not. The era of military planners manually gathering limited data and compiling static crisis response options on briefing slides is over.  In the next few years, the defense community will see the emergence of AI agents representing military planners, logisticians, intelligence officers, and operators that harness centuries of stored experience in real-time digital collaboration, generating uniquely effective crisis solutions for human decision-makers in seconds.  This is not just an incremental improvement — it is a seismic shift.  First-mover advantage in leveraging this capability will not merely ensure battlefield dominance — it will be overwhelmingly decisive at every level of warfare.  It could herald the dawn of a new defense paradigm, supplanting the outdated defense-industrial complex with an agile, AI-driven agentic base.  The stakes could not be higher:  If the United States and free nations do not seize this first-mover advantage, they will be outpaced and outmaneuvered by adversaries who may impose their authoritarian control on a global scale.” — Agentic Warfare Is Here. Will America Be the First Mover? War on the Rocks, 23 April 2025.

[Editor’s Note:  The article cited above predicts that agentic capabilities — i.e., those Artificial Intelligence (AI) systems that can operate independently, making decisions and executing actions without constant human supervision — when “employed by [our] adversaries… will dramatically outperform traditional Western paradigms of 24- to 72-hour decision cycles and wartime initiative.  Once adversaries learn how to employ these capabilities and move to the level of artificial general intelligence — and, eventually, superintelligence — there will be no ability to recover lost ground.

Today’s submission by returning guest blogger and proclaimed Mad Scientist Dr. James Giordano and Elise Annett explores how our Joint Force, its constituent Services, and our Allies and Partners can rise to meet this Operational Environment challenge through the “prioritized strategic integration of AI and battlefield autonomy within U.S. military systems” — tempered by “human agency and accountability.”  They astutely observe, “Decisive tactical and strategic advantage will not hinge upon massed firepower, but on cognitive speed, operational agility, and the fusion of advanced technologies with human command.”  This, in turn, will require us to transform and inculcate a culture of anticipation, innovation, and rapid technological adaptation.  Dr. Giordano and Ms. Annett provide us with three recommendations that will empower us to meet (and beat!) our adversaries — Read on!]

Charlotte Feit-Leichman’s urgent and incisive analysis — Russia and the Convergence of AI, Battlefield Autonomy, and Tactical Nuclear Weapons1highlighted a critical and destabilizing trend in modern warfare:  the convergence of AI, battlefield autonomy, and tactical nuclear weapons.  The accelerated adoption of these technologies, along with a shift in critical decision-making processes, creates an environment conducive to escalation, wherein miscalculations could lead to unpredictable consequences.

Ms. Feit-Leichman provides a strong foundation for understanding the threat posed by these technologies, and China’s engagement in these domains provides yet another example of the risk and threats posed by current peer-competitors.2   China’s strategic embrace of military and technological innovation has weaponized AI, embedding machine intelligence deep within its strategic command and control structures.3, 4  China’s quantum-secured communications signal both military preparedness and a calculated effort to outmaneuver the United States, if not the West at large.5, 6  The speed at which China has embedded AI in its military apparatus and its use of cutting-edge technologies to reshape global influence is a clear indication of their impending domination of technological warfare, and through such means, a redefinition of the global order.7  Thus, China’s success in this space underscores the necessity of rapid, integrated technological adaptation if the U.S. is to maintain any equivalence of tactical military capability, and any realistic consideration of strategic parity.

Such examples prompt the question of how should the U.S. military respond to these emerging threats upon the landscape of modern conflict?  We posit that the answer clearly points to the need for prioritized strategic integration of AI and battlefield autonomy within U.S. military systems; but we add that this must be done with unwavering commitment to ethical responsibility, human oversight, and strategic foresight.  Feit-Leichman rightly warns of the dangers posed by automated decision-making processes in nuclear command, amplifying the risk of error.  We agree and add that given the current trends in automation she describes, a prime responsibility is to ensure that these systems complement, rather than replace, human judgment.

We assert that the speeds at which autonomous systems operate obliges prioritization of human accountability.  Delegating high-consequence decisions to AI systems introduces risk that may not be fully containable.  As AI and autonomous systems reshape the battlefield, the military should revise training models to emphasize human-machine collaboration in decision-making under conditions of variable uncertainty.8   Failure to maintain human agency and accountability when integrating these technologies will surely result in tactical missteps that could incur considerable strategic risks.

Decisive tactical and strategic advantage will not hinge upon massed firepower, but on cognitive speed, operational agility, and the fusion of advanced technologies with human command.9   Thus, warfighting dominance will be secured by those who think faster, decide with greater clarity, and execute with seamless precision across domains.  This is not merely iterative modernization; rather, it is a strategic mandate for overmatch, deterrence, and survival in the face of accelerating threat trajectories.  Toward these ends the U.S. military must anticipate, adapt, and accelerate technological achievement to outpace peer and near-peer adversaries across Land, Air, Sea, Space, Cyber, and Cognitive Domains.  [N.B., while the U.S. recognizes and plans for warfighting in the first five of these domains, it is important to note:  1) we don’t recognize cognitive as a separate warfighting domain, while 2) China recognizes both the Cognitive and Electromagnetic Spectrum Domains, in addition to the first five listed here.]

To achieve this, we offer the following recommendations:

1. Innovation cannot be confined to peripheral initiatives, wargaming labs, or specialized units.  It must be institutionalized and integrated within every aspect of force design, command architecture, acquisition pipelines, and professional military education.

2. The U.S. military must evolve into a reflexively adaptive, mission-driven force that rewrites doctrine on demand, accelerates capability integration at speed, and executes operational pivots before adversaries can detect intent.  Innovation is not a supporting function—it is the primary vector of capability and operational success.  It must be acknowledged that the time for adaptation is now.  The pace and breadth of technological evolution has surpassed the many aspects of traditional military doctrine.  Our adversaries are not preparing for conventional conflict but instead are conducting hybrid highly technologically-enabled operations at present.  This acceleration in technological capabilities mandates a shift from reactive to proactive strategies; waiting to adapt is tantamount to conceding defeat.

3. The U.S. military must embrace continuous, multidomain warfare, and pivot decisively toward innovation, zero-defect adaptability, and operational supremacy.  However, supremacy can be fleeting, and thus, to maintain this edge, the military’s transformation needs to be propelled by and committed to strategic evolution.  This commitment needs to be apolitical, forward-looking, and seamlessly integrated across the Joint Force, interagency partners, the private sector, and academic institutions.  The future of warfighting demands a paradigm shift, supported by systems-level vulnerability audits and anticipatory assessments.  These processes must identify where adversaries may target and exploit seams in U.S. (technical, doctrinal and operational) capability and engage efforts to close these gaps through disruptive strategies.10

Such transformation and steps toward strategic superiority will not be achieved by platforms alone.  Rather they will require cultivation of a cognitively elite force, oriented and committed to a strategic plan, and trained in tactics, complex systems thinking, ethical foresight, and cross-domain leadership.  Moreover, such transformation must extend beyond the military, to engage national policy that supports and sustains technological development, incentivizes dual-use research, and ensures that ethical military innovation remains flexible to outpace adversarial capability.

If you enjoyed this post, review the TRADOC Pamphlet 525-92, The Operational Environment 2024-2034: Large-Scale Combat Operations

Explore the TRADOC G-2‘s Operational Environment Enterprise web page, brimming with authoritative information on the Operational Environment and how our adversaries fight, including:

Our China Landing Zone, full of information regarding our pacing challenge, including ATP 7-100.3, Chinese Tactics, How China Fights in Large-Scale Combat Operations, BiteSize China weekly topics, and the People’s Liberation Army Ground Forces Quick Reference Guide.

Our Russia Landing Zone, including the BiteSize Russia weekly topics. If you have a CAC, you’ll be especially interested in reviewing our weekly RUS-UKR Conflict Running Estimates and associated Narratives, capturing what we learned about the contemporary Russian way of war in Ukraine over the past two years and the ramifications for U.S. Army modernization across DOTMLPF-P.

Our Iran Landing Zone, including the Iran Quick Reference Guide and the Iran Passive Defense Manual (both require a CAC to access).

Our North Korea Landing Zone, including Resources for Studying North Korea, Instruments of Chinese Military Influence in North Korea, and Instruments of Russian Military Influence in North Korea.

Our Running Estimates SharePoint site (also requires a CAC to access) — documenting what we’re learning about the evolving OE.  Contains our monthly OE Running Estimates, associated Narratives, and the quarterly OE Assessment TRADOC Intelligence Posts (TIPs).

Then review the following related Mad Scientist Laboratory content addressing our need for rapid and constant innovation:

“Once More unto The Breach Dear Friends”: From English Longbows to Azerbaijani Drones, Army Modernization STILL Means More than Materiel by Ian Sullivan

China’s PLA Modernization through the DOTMLPF-P Lens and How will the RUS-UKR Conflict Impact Russia’s Military Modernization? by Dr. Jacob Barton

Other People’s Wars: The US Military and the Challenge of Learning from Foreign Conflicts and associated podcast, with Brent L. Sterling

Are We Ready for the Post-digital Hyper-war? by Capt Martin Crilly, British Army

Delta-V, by Chris Elles

Innovation at the Edge and associated podcast, with senior military leaders, field and company grade officers, and young Soldier/Innovators from the 3rd Infantry Division, 101st Airborne Division, and 18th Airborne Corps

Keeping the Razor’s Edge: 4th PSYOP Group’s Innovation and Evolution Council, by the 4th Psychological Operations Group (4th POG) Innovation and Evolution Council

The Future of Ground Warfare and associated podcast, with Proclaimed Mad Scientist COL Scott Shaw

The Case for Restructuring the Department of Defense to Fight in the 21st Century, by LTC Christopher J. Heatherly

Strategic Latency Unleashed! and Going on the Offensive in the Fight for the Future

Tactical Innovation: The Missing Piece to Enable Army Futures Command, by LTC Jim Armstrong

Mission Engineering and Prototype Warfare: Operationalizing Technology Faster to Stay Ahead of the Threat by The Strategic Cohort at the U.S. Army Tank Automotive Research, Development, and Engineering Center (TARDEC).

>>>>Reminder 1:  You are cordially invited to the Army Mad Scientist Initiative’s “Global Perspectives on the OE: Indo-Pacific” Virtual Event tonight (22 May 2025).  Partnering with our U.S. Army TRADOC Foreign Liaison Officers, this virtual event will explore our Allies and Partners’ perspectives on the Operational Environment, featuring prominent subject matter experts from some of our Allies and Partners in the Indo-Pacific theater to establish an open dialogue on their perspectives regarding the Operational Environment.  The event will be held from 6:00pm EDT to 11:30pm EDT.  Register to attend this event at the Eventbrite link here and check out the agenda here.

Once registered, you will receive a follow-up email with the link to the virtual event.

You must be registered in Eventbrite to receive a virtual event link!

>>>>Reminder 2:  Army Mad Scientist wants to crowdsource your thoughts on Great Power Competition & Conflict — check out the flyer describing our latest writing contest.

All entries must address one of the following writing prompts:

How are the ongoing conflicts in Ukraine, the Middle East, and Africa shaping how the U.S. Army may need to fight in 2035?

What role can the U.S. Army play in helping the U.S. counter Chinese, Russian, and Iranian influence across the Global South?

How can the U.S. Army counter growing Russian/Chinese collusion in the Arctic, and China’s growing presence in the Antarctic?

What emergent technology(ies) or convergences of technologies could disrupt Great Power dominance in 2035?  In 2050?  

We are accepting three types of submissions:

      • 1500-word Non-Fiction Essay
      • 1500-word Fictional Intelligence (FICINT) Story
      • Hybrid 1500-word submission incorporating a short FICINT vignette, with a Non-Fiction Essay expounding on the threat capabilities described in the vignette

Anyone can participate (Soldiers, Government Civilians, and all global citizens) — Multiple submissions are encouraged!

All entries are due NLT 11:59 pm Eastern on May 30, 2025 at:  madscitradoc@gmail.com

Click here for additional information on this contest — we look forward to your participation!

About Today’s Authors:

Elise Annett is the Institutional Research, Assessment, and Accreditation Associate at the Eisenhower School for National Security and Resource Strategy; and is a doctoral candidate at Georgetown University. Her work addresses operational and ethical issues of iteratively autonomous AI systems in military use.

Proclaimed Mad Scientist Dr. James Giordano is Director of the Center for Disruptive Technology and Future Warfare of the Institute for National Strategic Studies at the National Defense University, and is Professor Emeritus of Neurology, Biochemistry, and Ethics at Georgetown University Medical Center.

Disclaimer:  The views and opinions presented in this essay are those of the authors, and do not necessarily reflect those of the U.S. Government, Department of Defense, National Defense University and/or those organizations and institutions that support the authors’ work.  Additionally, they do not necessarily reflect those of the Department of the Army, Army Futures Command (AFC), or Training and Doctrine Command (TRADOC). 


1 https://madsciblog.tradoc.army.mil/532-russia-and-the-convergence-of-ai-battlefield-autonomy-and-tactical-nuclear-weapons/

2 Giordano J, Bremseth LR, DeFranco JP.  Dual- and non-kinetic use of Chinese brain science: Current activities and future implicationsIn: Petersen N. (ed.) Chinese Strategic Intentions: A Deep Dive into China’s Worldwide Activities. Department of Defense; Strategic Multilayer Assessment Group- Joint Staff/J-3/Pentagon Strategic Studies Group (November 2019).

3 DeFranco JP, Bremseth LR, DiEuliis D, Giordano J. Emerging bio-technologies for disruptive effects in grey zone engagements. In: Regan M, Sari A. (eds.) Hybrid Threats and Grey Zone Conflict. NY: Oxford University Press, (2024), pp. 237-249.

4 Giordano J, DeFranco JP, Bremseth LR. Radical Leveling and Emerging Technologies as Tools of non-Kinetic Disruption. Department of Defense; Strategic Multilayer Assessment Group- Joint Staff/J-3/Pentagon Strategic Studies Group (February 2021).

5 https://link.springer.com/article/10.1007/s11192-022-04478-4

6 https://www.researchgate.net/profile/Gui-Long/publication/225600434_Quantum_secure_direct_communication_and_deterministic_secure_quantum_communication/links/544587360cf22b3c14dde84b/Quantum-secure-direct-communication-and-deterministic-secure-quantum-communication.pdf

7 https://link.springer.com/article/10.1007/s11192-022-04478-4

8 https://doi.org/10.1080/14751798.2023.2264070

9 https://doi.org/10.1177/03058298251317205

10 https://doi.org/10.1080/14702436.2024.2365218

534. The Bolt That Broke Our Helos

At the center of Xi’s vision are what he calls China’s “new productive forces”—breakthroughs in advanced batteries, biotech, LiDAR, drones, and other emerging technologies that promise to redefine the next industrial revolution.  By dominating these sectors, Beijing aims to ensure Chinese technology is deeply embedded within critical American supply chains—everything from power grids and ports to communications networks—thereby converting China’s commercial success into a powerful geopolitical tool of leverage.” — Craig Singleton in “China’s Tech Triple Play Threatens U.S. National Security,” Real Clear Defense, 25 March 2025.

[Editor’s Note:  The article cited above addresses China’s plans to penetrate and exploit American supply chains as a non-kinetic, gray zone means of applying economic pressure to bend America’s will.  Today’s guest blog post by Lisa Morton expands on this theme to explore how our pacing threat’s intelligence services could weaponize our military supply chains against us — employing front companies and unwitting American citizens to penetrate and “poison” our critical supply chains with key subcomponents that degrade and fail over time — achieving time-delayed sabotage of our vital combat systems.

Preposterous, you say?  Another of our adversaries has reportedly already thoroughly penetrated American industry:

North Korean nationals have infiltrated the employee ranks at top global companies more so than previously thought, maintaining a pervasive and potentially widening threat against IT infrastructure and sensitive data.

There are hundreds of Fortune 500 organizations that have hired these North Korean IT workers,” Mandiant Consulting CTO Charles Carmakal said Tuesday [29 April 2025] during a media briefing at the RSAC 2025 Conference.”

“Literally every Fortune 500 company has at least dozens, if not hundreds, of applications for North Korean IT workers,” Carmakal said.  “Nearly every CISO that I’ve spoken to about the North Korean IT worker problem has admitted they’ve hired at least one North Korean IT worker, if not a dozen or a few dozen.” — Matt Kapko, “North Korean operatives have infiltrated hundreds of Fortune 500 companies,” Cyberscoop, 30APR25

Ms. Morton’s vignette and subsequent discussion offers us a disturbingly credible vision of how our critical military supply chains could be penetrated and weaponized by our adversaries as another attack surface.  Fortunately, she also offers a three-fold prescription to help us mitigate this emergent threat — Read on!]

Imagine this:  a seemingly insignificant bolt, a crucial component in a helicopter’s rotor assembly, fails mid-flight.  The result?  A catastrophic crash, loss of life, and a critical mission compromised.  This is the potential consequence of adversaries exploiting publicly available contracting data to subtly sabotage our military’s supply chain…

Crashed UH-60 Blackhawk helicopter / Image Source:  FL360aero Facebook post

It is 2030 and a UH-60 Blackhawk helicopter just crashed near the coast of Taiwan.  As soon as the crash is reported, all UH-60 operations are halted until a preliminary investigation is completed to determine what caused the incident.  Army investigators from the safety center at Fort Novosel fly to Taiwan to determine the cause of the crash.  When the safety team identifies a defective bolt as the cause, a junior officer of the People’s Liberation Army (PLA) Naval Air Force stationed on board the Fujian reads the report and senses that the PLA’s plan to sabotage American UH-60s has succeeded.

A year earlier, he and his intelligence team formed several seemingly legitimate American businesses whose task was to find publicly available information about upcoming requirements for bolts so they could underbid American companies and potentially gain access to critical technologies.  These small business startups are now PLA insider threats targeting and exploiting the Department of Defense’s publicly available contract information and bidding on contracts, delivering the bolts on time and under budget.  The bolts pass initial quality control tests, but are subtly flawed, using inferior materials that degrade over time.  The PLA’s small businesses are virtual companies masquerading as American companies, incorporated in American cities and recruiting unknowing Americans to gather data necessary to supply the defective bolts to the U.S. Army.  These virtual companies post online job opportunities with good pay and remote work, which is advantageous to the operation and enticing to potential recruits.

UH-60 Main Rotor Head Assembly / Image Source:  Ian E. Abbott via Flickr

“Jane” is an American recruited and hired by one of these shadow PLA virtual businesses whose job is to get access to DoD’s online contract system and search for specific hardware  requirements (i.e., bolts) to bid on.  Jane diligently performs her duties, unaware that her employer is a front for a PLA intelligence agency.  Working out of her home, she dutifully searches for and reports all contract requirements for bolts.  Her employer then bids on and wins contracts to produce bolts that pass standard quality control tests but have degraded performance under stress later in their lifecycle.  By the time anyone realizes the hardware has manufacturing deficiencies, the bolts are already in DoD’s inventory and supply system, threatening readiness and posing a grave danger to U.S. forces – the small business has been paid by the Defense Finance Accounting Service (DFAS), closed up shop, and disappeared.  Jane’s searches were subtle enough to avoid notice – the Army never suspected an insider threat had penetrated its supply chain.

The DoD allocates over $456 billion annually to contracts, underscoring the vital role of a robust industrial base, including small businesses and non-traditional contractors, in safeguarding national security.  Over 200,000 companies contribute to the DoD’s needs, providing supplies, parts, manufacturing, and services.  To promote competition, contracting officers are required to publicly announce certain proposed contracts that exceed specified dollar thresholds.  These procurements are typically conducted on the open market and are often facilitated by a dedicated website.  This website serves as a central repository of information on Army requirements, including detailed descriptions of needed services (Performance Work Statements or PWS) and supplies (Statements of Work or SOW).  Registered users can access the website to identify government purchasing needs, including specifics on required products or services, timelines, and delivery locations.

This readily available information, while intended to promote transparency and competition, could also be exploited.  It’s plausible that foreign intelligence agencies have infiltrated numerous small businesses by embedding seemingly innocuous, low-level contractor employees.  Their mission could be to gather and analyze publicly available procurement data, focusing on Army purchasing activities worldwide.  By scrutinizing details such as who is buying what, from whom, when, where, and in what quantities, these operatives could identify patterns and deduce the underlying reasons for specific procurement activities.  This underscores the inherent tension between transparency in government contracting and the need to protect information that, while public, could be leveraged by adversaries.

This isn’t just a theoretical threat.  In 1979, Gen Robert H. Barrow, then commandant of the U.S. Marine Corps, stated “Amateurs talk about tactics, but professionals study logistics.”  Threats to force sustainment are real, potentially resulting in compromised equipment, mission failures, and ultimately, the loss of lives.  It is critical to ensure individuals accessing DoD contract data are properly vetted and continuously monitored to prevent adversarial exploitation of publicly available contracting data.  While federal contract regulations require that certain contract information be publicly accessible, this open access presents a significant security threat.  This transparency must be carefully balanced against protecting sensitive business information and national security interests.  Actions to counter potential threats include:

Enhanced Training and Vetting:  Rigorous security training for contracting personnel, emphasizing the risks associated with seemingly innocuous data, is crucial.  Vetting contractor ownership, especially regarding foreign influence, is also essential to prevent sabotage and intellectual property theft.  Individual contractors with access to the contract data must be thoroughly vetted.  Provide government employees with security training, while using engaging and relatable content to ensure contracting professionals are trained to recognize and mitigate threats.  Something as simple as failing to redact a signature block containing Common Access Card information on a publicly available contracting document can provide malicious actors with the keys to the kingdom, potentially compromising sensitive systems.

Aggressive “Red Teaming”:  Regular red team exercises, simulating real-world attacks on acquisition systems, can proactively identify and address vulnerabilities before they are exploited.

Cybersecurity Insurance:  Requiring government contractors to carry cybersecurity insurance, transferring some of the financial risk of a data breach to the private sector and incentivizing better security practices.

The future of warfare depends on secure and resilient supply chains.  By addressing these vulnerabilities head-on, the U.S. military can safeguard our Soldier’s readiness and protect our national security.

If you enjoyed this post, review the TRADOC Pamphlet 525-92, The Operational Environment 2024-2034: Large-Scale Combat Operations

Explore the TRADOC G-2‘s Operational Environment Enterprise web page, brimming with authoritative information on the Operational Environment and how our adversaries fight, including:

Our China Landing Zone, full of information regarding our pacing challenge, including ATP 7-100.3, Chinese Tactics, How China Fights in Large-Scale Combat Operations, BiteSize China weekly topics, and the People’s Liberation Army Ground Forces Quick Reference Guide.

Our Russia Landing Zone, including the BiteSize Russia weekly topics. If you have a CAC, you’ll be especially interested in reviewing our weekly RUS-UKR Conflict Running Estimates and associated Narratives, capturing what we learned about the contemporary Russian way of war in Ukraine over the past two years and the ramifications for U.S. Army modernization across DOTMLPF-P.

Our Iran Landing Zone, including the Iran Quick Reference Guide and the Iran Passive Defense Manual (both require a CAC to access).

Our North Korea Landing Zone, including Resources for Studying North Korea, Instruments of Chinese Military Influence in North Korea, and Instruments of Russian Military Influence in North Korea.

Our Running Estimates SharePoint site (also requires a CAC to access) — documenting what we’re learning about the evolving OE.  Contains our monthly OE Running Estimates, associated Narratives, and the quarterly OE Assessment TRADOC Intelligence Posts (TIPs).

Then review the following related Mad Scientist Laboratory content addressing sustainment issues:

Weapons on Demand: How 3D Printing Will Revolutionize Military Sustainment, by Scott Pettigrew

Sinews of War: Innovating the Future of Sustainment by then MSG Donald R. Cullen, MSG Timothy D. Roberts, MSG Jessica Cho, and MSG Johanny Ortega

The 4th Industrial Revolution, Additive Manufacturing, and the Operational Environment by Jeremy McLain

The Hard Part of Fighting a War: Contested Logistics

>>>>Announcement:  You are cordially invited to the Army Mad Scientist Initiative’s “Global Perspectives on the OE: Indo-Pacific” Virtual Event on the 22nd of May 2025.  Partnering with our U.S. Army TRADOC Foreign Liaison Officers, this virtual event will explore our Allies and Partners’ perspectives on the Operational Environment, featuring prominent subject matter experts from some of our Allies and Partners in the Indo-Pacific theater to establish an open dialogue on their perspectives regarding the Operational Environment.  The event will be held from 6:00pm EDT to 11:30pm EDT.  Register to attend this event at the Eventbrite link here and check out the draft agenda here.

Once registered, you will receive a follow-up email with the link to the virtual event.

You must be registered in Eventbrite to receive a virtual event link!  Stay tuned to all Army Mad Scientist social media and the Mad Scientist Laboratory for further updates!

>>>>Reminder:  Army Mad Scientist wants to crowdsource your thoughts on Great Power Competition & Conflict — check out the flyer describing our latest writing contest.

All entries must address one of the following writing prompts:

How are the ongoing conflicts in Ukraine, the Middle East, and Africa shaping how the U.S. Army may need to fight in 2035?

What role can the U.S. Army play in helping the U.S. counter Chinese, Russian, and Iranian influence across the Global South?

How can the U.S. Army counter growing Russian/Chinese collusion in the Arctic, and China’s growing presence in the Antarctic?

What emergent technology(ies) or convergences of technologies could disrupt Great Power dominance in 2035?  In 2050?  

We are accepting three types of submissions:

      • 1500-word Non-Fiction Essay
      • 1500-word Fictional Intelligence (FICINT) Story
      • Hybrid 1500-word submission incorporating a short FICINT vignette, with a Non-Fiction Essay expounding on the threat capabilities described in the vignette

Anyone can participate (Soldiers, Government Civilians, and all global citizens) — Multiple submissions are encouraged!

All entries are due NLT 11:59 pm Eastern on May 30, 2025 at:  madscitradoc@gmail.com

Click here for additional information on this contest — we look forward to your participation!

About the Author:  Lisa Morton, a Navy procurement professional and participant in the Naval Supply Systems Command (NAVSUP) Leadership Development Program (NLDP), expanded her understanding of threats in the operational environment during a 2025 developmental assignment with the U.S. Army TRADOC Mad Scientist Initiative.

Disclaimer:  The views expressed in this blog post do not necessarily reflect those of the U.S. Department of Defense, Department of the Army, Army Futures Command (AFC), or Training and Doctrine Command (TRADOC).

533. How China Fights in Large-Scale Combat Operations

[Editor’s Note:  The U.S. Army Training and Doctrine Command (TRADOC) released the first in its series of new publications focusing on the United States’ key potential state adversaries – China, Russia, Iran, and North Korea – and how they fight at the operational level of warfare.  Beginning with the most capable and formidable of the four, How China Fights in Large-Scale Combat Operations is a comprehensive analysis of the People’s Liberation Army’s (PLA’s) modern operational strategy and capabilities.

The publication describes China’s military philosophy, details the structure of the PLA and its Joint Theater Commands, and examines the PLA’s approach to operations across all domains, its critical capabilities, and specifically addresses the role of ground forces in Large-Scale Combat Operations.  It concludes with two ground force-focused vignettes:  an island seizure operation and an island defense.  This paper offers the U.S. Army and Joint force an effective starting point for visualizing the potential fight in the Indo-Pacific.

TRADOC G-2 will release the next paper in the series — How Russia Fights in Large-Scale Combat Operation — in July 2025, to be followed by subsequent publications focusing on Iran and North Korea.   Stay tuned to the Mad Scientist Laboratory for more information regarding these publications.  In the meantime, check out today’s post excerpting the Foreword and Executive Summary from How China Fights in Large-Scale Combat Operations — Enjoy!]

Foreword

As the Deputy Chief of Staff, G-2 for the U.S. Army’s Training and Doctrine Command (TRADOC), I am pleased to introduce this timely paper, How China Fights in Large-Scale Combat Operations. This will be the first of a series of papers focusing on our key potential adversaries—China, Russia, Iran, and North Korea—and we chose to start with the most capable and formidable of the four. In an article I wrote for Military Review, I argue that large-scale combat operations (LSCO) will be won and lost at the operational level of warfare.  Understanding how China fights at the operational level is the first step in ensuring that the Army will be prepared for any conflict in the Indo-Pacific theater.  It is my hope that this paper fills a key gap in our understanding of how the Chinese PLA approaches warfare.

This document builds upon two seminal TRADOC G-2 publications. The first is TRADOC Pamphlet 525-92, The Operational Environment 2024-2034: Large-Scale Combat Operations, which addresses 12 key conditions we assess are present in LSCO and adds another five implications for the U.S. Army when contemplating LSCO.  The second is Army Techniques Publication 7-100.3, Chinese Tactics, which describes China’s military strategy, operational concepts, and the likely characteristics of future PLA operations. This new paper sheds light on how the Chinese Communist Party views its security environment and how this perception shapes the PLA’s approach to warfighting, particularly its emphasis on “active defense” and “systems confrontation.”  The insights presented here are not merely academic; they are essential for informing our training methodologies and force development initiatives.

This paper will be disseminated across the Army, the Joint Force, the Intelligence Community, and to our allies and partners to promote a deeper understanding of Chinese military thought and operational practices. It will drive curriculum development at our schools and centers, inform professional military education, support the writing of Army doctrine, and enhance the realism and relevance of U.S. Army training scenarios at Combat Training Centers.  By incorporating the PLA’s operational doctrine, tactics, and technological capabilities into our opposing force representation, we can also better prepare our Soldiers and leaders for the challenges they would face in a potential conflict in the Indo-Pacific theater.  It will help us fulfill our primary mission, which is to know our potential adversaries, and to ensure that our key customers do too.

I encourage all members of the Army community to engage with this material and consider its implications.  If we are to visualize how the Army will participate as part of a Joint, Combined, and interagency team in a future conflict in the Indo-Pacific, then we must begin with an understanding of our potential adversary.  This paper offers a fine starting point for that visualization. — Ian Sullivan, Deputy Chief of Staff, G-2, U.S. Army TRADOC 

Executive Summary

How China Fights in Large-Scale Combat Operations provides a detailed assessment of China’s military strategy, operational concepts, and the anticipated characteristics of the PLA ground forces employed in conflict. As China is designated as the United States’ pacing threat, the U.S. Army must understand how China fights at the operational level to ensure readiness for potential conflicts in the Indo-Pacific theater. This document builds upon foundational material presented in TRADOC Pamphlet 525-92, The Operational Environment 2024-2034: Large-Scale Combat Operations and Army Techniques Publication 7-100.3, Chinese Tactics. TRADOC Pamphlet 525-92 identifies the key Operational Environment conditions that will define LSCO for the foreseeable future, while ATP 7-100.3 provides insights into PLA tactics. Together, these resources offer a comprehensive foundation for understanding the PLA’s approach to conflict and its implications to U.S. Army training and education.

The PLA’s Anti-Access/Area Denial (A2/AD) capabilities are robust within the First Island Chain (shown here in blue), and China seeks to strengthen its capabilities to reach farther into the Pacific Ocean (the Second Island Chain is shown here in red). / Source:  China Military Power Modernizing a Force to Fight and Win, DIA, 2019.

China’s leadership perceives the global security envi­ronment as increasingly complex and dangerous, with the United States viewed as a primary adversary. The Chinese Communist Party is focused on safeguarding its core interests, including China’s internal stability and economic development, while expanding its focus to include overseas interests. Taiwan remains a central point of contention, with China rejecting the possibility of foreign interference on this issue.  As a result, China’s military strategy is rooted in ‘active defense,’ combining a strategically defensive posture with offensive operational and tactical capabilities.  This strategy has resulted in power projection beyond China’s borders, sophisticated anti-access/area-denial capabilities, and other modernization initiatives designed to counter potential interference with its strategic objectives.

In LSCO, China would employ a whole-of-nation approach, integrating military and civilian capabilities to secure its national interests.  This approach would feature operations characterized by joint multidomain integration, prioritization of information dominance, and preparation for potentially protracted conflicts.  Central to this strategy is ‘systems confrontation,’ where the PLA will leverage its offensive capabilities to paralyze enemy systems across multiple domains.  Systems confrontation focuses on targeting interconnected systems—such as command and control, intelligence networks, logistics functions, information systems, and fire-support systems—to neutralize an adversary’s ability to wage war effectively.

China’s emphasis on all-domain warfare underscores its focus on joint multidomain integration and information dominance. The PLA leverages advanced technologies such as artificial intelligence, cyber capabilities, and elec­tronic warfare to achieve decisive victories by exploiting vulnerabilities in enemy systems through precision strikes coordinated across services and domains. This concept is embodied in Multidomain Precision Warfare, the PLA’s core operational concept that integrates operations across all domains to fuse information from all services and launch effects against identified enemy vulnerabilities.

Anticipating foreign intervention in the Pacific theater, China has developed a comprehensive joint counter-intervention complex aimed at deterring, delaying, and defeating enemy forces before they can arrive in theater at full strength.  This campaign involves information operations to disrupt enemy decision-making processes, air and sea dominance efforts to control critical theaters, and joint firepower strikes targeting deployment routes and logistics hubs.  PLA ground forces will play an integral role in these campaigns through amphibious assaults, airborne maneuvers, strategic defenses, and counterattacks—all fully integrated into joint operations.

Ground forces, which are often underestimated in discus­sions about Pacific conflicts dominated by air and naval operations, play a critical role in countering China’s strat­egies. The PLA’s reliance on ground forces for amphibious assaults, airborne operations, and strategic counterattacks demonstrates their integral role in achieving operational objectives.  Similarly, U.S. ground forces are essential for securing key terrain, enabling joint operations, and disrupting adversary systems in contested environments.  As the Indo-Pacific theater presents unique challenges due to its geography and the multidomain nature of modern warfare, the U.S. Army must ensure its ground forces are prepared to operate effectively alongside other components of the Joint Force.  This preparation is vital not only for deterring aggression but also for ensuring victory in any potential conflict with China.

If you enjoyed this post, check out the comprehensive How China Fights in Large-Scale Combat Operations

Review the TRADOC Pamphlet 525-92, The Operational Environment 2024-2034: Large-Scale Combat Operations

Explore the TRADOC G-2‘s Operational Environment Enterprise web page, brimming with authoritative information on the Operational Environment and how our adversaries fight, including:

Our China Landing Zone, full of information regarding our pacing challenge, including ATP 7-100.3, Chinese Tactics, BiteSize China weekly topics, and the People’s Liberation Army Ground Forces Quick Reference Guide.

Our Russia Landing Zone, including the BiteSize Russia weekly topics. If you have a CAC, you’ll be especially interested in reviewing our weekly RUS-UKR Conflict Running Estimates and associated Narratives, capturing what we learned about the contemporary Russian way of war in Ukraine over the past two years and the ramifications for U.S. Army modernization across DOTMLPF-P.

Our Iran Landing Zone, including the Iran Quick Reference Guide and the Iran Passive Defense Manual (both require a CAC to access).

Our Running Estimates SharePoint site (also requires a CAC to access) — documenting what we’re learning about the evolving OE.  Contains our monthly OE Running Estimates, associated Narratives, and the quarterly OE Assessment TRADOC Intelligence Posts (TIPs).

Then review the following China-related Mad Scientist Laboratory content:

“No Option is Excluded” — Using Wargaming to Envision a Chinese Assault on Taiwan, Three Dates, Three Windows, and All of DOTMLPF-P, China and Russia: Achieving Decision Dominance and Information Advantage, and Seven Reflections of a “Red Commander” — Lessons Learned Playing the Adversary in DoD Wargames, by Ian Sullivan

The Most Consequential Adversaries and associated podcast, with GEN Charles A. Flynn (USA-Ret.)

Volatility in the Pacific: China, Resilience, and the Human Dimension and associated podcast, with General Robert Brown (USA-Ret.)

How China Fights and associated podcast

Fait Accompli: China’s Non-War Military Operations (NWMO) and Taiwan, by SGT Michael A. Cappelli II

Operation Northeast Monsoon: The Reunification of Taiwan, by Sherman Barto

Flash-Mob Warfare: Whispers in the Digital Sandstorm (Parts 1 and 2), by Dr. Robert E. Smith

China’s PLA Modernization through the DOTMLPF-P Lens, by Dr. Jacob Barton

The PLA and UAVs – Automating the Battlefield and Enhancing Training

A Chinese Perspective on Future Urban Unmanned Operations

China: “New Concepts” in Unmanned Combat and Cyber and Electronic Warfare

The PLA: Close Combat in the Information Age and the “Blade of Victory”

China: Building Regional Hegemony

Intelligentization and the PLA’s Strategic Support Force, by Col (s) Dorian Hatcher 

“Intelligentization” and a Chinese Vision of Future War

>>>>Announcement:  You are cordially invited to the Army Mad Scientist Initiative’s “Global Perspectives on the OE: Indo-Pacific” Virtual Event on the 22nd of May 2025.  Partnering with our U.S. Army TRADOC Foreign Liaison Officers, this virtual event will explore our Allies and Partners’ perspectives on the Operational Environment, featuring prominent subject matter experts from some of our Allies and Partners in the Indo-Pacific theater to establish an open dialogue on their perspectives regarding the Operational Environment.  The event will be held from 6:00pm EDT to 11:30pm EDT.  Register to attend this event at the Eventbrite link here

Once registered, you will receive a follow-up email with the link to the virtual event.  A final agenda will be distributed to those who are registered in the coming weeks.

You must be registered in Eventbrite to receive a virtual event link!  Stay tuned to all Army Mad Scientist social media and the Mad Scientist Laboratory for further updates!

>>>>Reminder:  Army Mad Scientist wants to crowdsource your thoughts on Great Power Competition & Conflict — check out the flyer describing our latest writing contest.

All entries must address one of the following writing prompts:

How are the ongoing conflicts in Ukraine, the Middle East, and Africa shaping how the U.S. Army may need to fight in 2035?

What role can the U.S. Army play in helping the U.S. counter Chinese, Russian, and Iranian influence across the Global South?

How can the U.S. Army counter growing Russian/Chinese collusion in the Arctic, and China’s growing presence in the Antarctic?

What emergent technology(ies) or convergences of technologies could disrupt Great Power dominance in 2035?  In 2050?  

We are accepting three types of submissions:

      • 1500-word Non-Fiction Essay
      • 1500-word Fictional Intelligence (FICINT) Story
      • Hybrid 1500-word submission incorporating a short FICINT vignette, with a Non-Fiction Essay expounding on the threat capabilities described in the vignette

Anyone can participate (Soldiers, Government Civilians, and all global citizens) — Multiple submissions are encouraged!

All entries are due NLT 11:59 pm Eastern on May 30, 2025 at:  madscitradoc@gmail.com

Click here for additional information on this contest — we look forward to your participation!

532. Russia and the Convergence of AI, Battlefield Autonomy, and Tactical Nuclear Weapons

“Russia’s vast arsenal of non-strategic nuclear weapons helps it to offset Western conventional superiority and provide formidable escalation management options in theater war scenarios.” — Annual Threat Assessment of the U.S. Intelligence Community, March 2025

[Editor’s Note:  Army Mad Scientist and the TRADOC G-2 continue to benefit from an enduring and successful record of collaboration with students from The College of William and Mary.  Today’s post by summer e-intern Charlotte Feit-Leichman is just the latest in a long line of insightful submissions the Mad Scientist Laboratory has had the privilege of publishing — helping to broaden our understanding of the Operational Environment.

Ms. Feit-Leichman explores how the advent of battlefield autonomy, the integration of artificial intelligence to facilitate decision making at machine speed, and the loosening of Russia’s nuclear command authority could converge to increase the possibility of the unthinkable — either the intentional or the accidental, erroneous, or hacked release of Russia’s tactical nuclear weapons.  During the height of the Cold War, the U.S. Army trained and prepared to fight and win decisively in a nuclear-contaminated environment.  Ms. Feit-Leichman presents a convincing case for the Army to return to this level of heightened readiness — Read on!]

Russia’s convergence of artificial intelligence (AI) and autonomous systems could signal an increase in the risk of tactical nuclear weapons being used on the battlefield.  AI weapons systems use computer algorithms to attack a target without the manual control of a human operator.1  AI introduces the element of machine learning that predicts how to use data and processes in the future.2  The advent of battlefield autonomous systems enables lower echelon units and individuals to deliver lethal fires more quickly, with greater precision, over longer distances.  Russia’s rapid integration of AI into these autonomous weapons systems coupled with its military leadership suggesting loosening its nuclear command authority presents the possibility that tactical nuclear weapons could be present and employed on the battlefield.3  The shortening of Russia’s nuclear command chain increases the risk of accidents as the time to identify and prevent machine errors decreases with automation.  The convergence of AI, battlefield autonomy, and tactical nuclear weapons under Russia’s loosened nuclear command authority poses a destabilizing threat in the Operational Environment and is a possible indicator that the U.S. Army should resume training and preparing to fight and win decisively in a nuclear environment.

Russia’s President Putin / Source: www.kremlin.ru, via Wikimedia Commons, Creative Commons Attribution 4.0

Russia has repeatedly stressed the importance of AI integration in its military technology.  President Vladimir Putin has stated that the leader in AI development will become “the ruler of the world,” making leadership in AI technology a facet of Russia’s battle for global power with the West.4  There has been a rapid convergence of AI technology with Russian weapons systems throughout the war in Ukraine.  One example is the development of autonomous one-way attack drones that employ machine vision as a counter to electronic warfare.5  The convergence of military technology with AI produces unique effects such as unmanned weapons impervious to signal jamming, faster response times due to quick and efficient data sorting, and identification of patterns that human analysts might not recognize, making it advantageous on the battlefield.   AI integration into Russian nuclear weapons systems and its consequences may quickly become a reality as the pace of technological development and Russia’s nuclear doctrine evolve.

Russia fired a conventionally armed (but MIRV’ed) IRBM — based on an RS-26 Rubezh (Yars-M) missile — against Ukraine on 20 Nov 2024 / Source:  TRADOC G-2‘s OE Data Integration Network (ODIN) Worldwide Equipment Guide (WEG)

Russia’s changing nuclear command authority suggests a devolution in nuclear authority to tactical commanders, raising the risk of nuclear weapons use in the operational environment.  The Russian Deputy Foreign Minister Sergei Ryabkov told a Russian foreign affairs magazine “conceptual additions and amendments” must be made to the doctrine that calls for nuclear weapons use if there is a perceived threat to “sovereignty and territorial integrity.”6  President Putin has also stated that he “will not rule out lowering the threshold for using nuclear weapons in Russia’s nuclear posture.”7  These statements increase the likelihood of Russian tactical nuclear weapon use, which has been further elevated given the tactical nuclear weapon drills that have begun with Russian and Belarussian troops.8

Russia has also announced its efforts to integrate AI into the operations of its Strategic Rocket Forces.  Sergei Karakayev, commander of the Strategic Rocket Forces, stated that “automated security systems of all mobile and stationary strategic missile complexes that will be placed on combat duty around 2030 will include robotic systems and use AI.”9  This introduces a host of risks ranging from possible accidents to cyberattack vulnerabilities.

An image of a younger Lt Col Stanislav Petrov from a family album / Source:  New York Times via Statement Film

Shortening the decision-making process involved in nuclear release with the introduction of AI systems increases the likelihood of miscalculation and the potential for rapid escalation.  Autonomous systems are not immune to error — and human judgement, particularly in nuclear weapons systems’ command and control, is necessary to prevent catastrophic accidents as reflected by the “Petrov incident.”10  In 1983, a Soviet satellite falsely reported a large nuclear missile attack in-bound on the Russian homeland.  Without Lt Col Petrov’s “gut instinct” that something was wrong, a misinformed and disastrous nuclear counterstrike on the US could have occurred.11  The catastrophic effects of this technological error were avoided through human judgement, which could be supplanted in automated decision-making processes.

The decision-making process involved in launching a nuclear attack can be explained through the OODA loop model, consisting of observe, orient, decide, and act.12 At the orient stage, AI sifts through large amounts of information to determine what is most important within that context.  For example, an AI system could take information from a variety of sensors to determine if an attack is being launched.  Such systems reduce the amount of staff that monitor and contextualize data which could cause human  analytical skills to atrophy and result in the amplification of decision-making biases.13  AI systems assimilate the information decision-makers feed them — if they learn risky and aggressive behaviors from Russian leadership, they could replicate these biases, further entrenching them in future decision-making.  Even where human judgement remains in the OODA loop, the integration of AI reduces human judgement to a “cog in an automatic, regimented system” raising the risk of automation bias.14

Automation bias is when humans become conditioned to the repeated success of algorithms causing cognitive offloading and complete trust in the machine — even when a non-biased human might recognize that the machine is reporting incorrect information.15  As AI is further integrated, there is not only an increased risk of error due to shorter decision making cycles but also a greater risk that human judgement will not be able to detect errors, including those caused by cyberattacks.

An AI-augmented nuclear command system would create new threat vectors and attack surfaces for hackers, ones that “are highly vulnerable to cyberattacks in ways that traditional military platforms are not.”16  Integrity attacks that manipulate AI learning to teach it incorrect information are the most prevalent.17  Third parties and adversaries of both Russia and the US could take advantage of these new vulnerabilities to launch a nuclear attack on the US and its allies via Russia, muddying the waters of responsibility and providing them with deniability.18  Overall, the integration of AI into Russian nuclear weapons systems threatens the heightened potential for accidental, erroneous, or hacked nuclear release, requiring greater nuclear preparedness for the U.S. Army.

Increased coordination with the Joint Program Executive Office for Chemical, Biological, Radiological, and Nuclear Defense (JPEO-CBRND) through the Army Technology Transfer Program (T2) can increase the U.S. Army’s resiliency and ability to “fight and win unencumbered in a nuclear environment.”19  JPEO-CBRND sources and distributes sensors, specialized equipment, and medical technologies that will make monitoring more precise and arm Soldiers with the requisite gear for operating in a nuclear contaminated environment.20   JPEO-CBRND will provide U.S. Army Soldiers with protective clothing and decontamination equipment to mitigate the effects of fighting in a nuclear-contaminated environment.  The U.S. Army may also need to resume training on how to properly implement them across its individual Soldier, Crew, and Collective tasks and battle drills, as well as incorporate simulated nuclear contamination conditions into both home station training exercises and Combat Training Center rotations.

Increasing the frequency of radiological response exercises on strategic, operational, and tactical levels will improve the U.S. Army’s nuclear response capabilities by providing feedback data to help mitigate potential complications in an actual nuclear battlespace.21  Current U.S. Army nuclear response training is relatively fragmented by agencies and units which threaten the effectiveness of the overall response.  Successfully operating in a nuclear contaminated battlespace will involve preparedness achieved through “multi-echelon training” at least once a year.22  By taking measures to strengthen our ability to operate in a nuclear-contaminated environment, the U.S. Army can prepare to fight and win decisively should the unthinkable result from Russia’s (or any other adversary’s) convergence of AI, battlefield autonomy, and tactical nuclear weapons.

If you enjoyed this post, review the TRADOC Pamphlet 525-92, The Operational Environment 2024-2034: Large-Scale Combat Operations

Explore the TRADOC G-2‘s Operational Environment Enterprise web page, brimming with authoritative information on the Operational Environment and how our adversaries fight, including:

Our China Landing Zone, full of information regarding our pacing challenge, including ATP 7-100.3, Chinese Tactics, BiteSize China weekly topics, People’s Liberation Army Ground Forces Quick Reference Guide, and our thirty-plus snapshots captured to date addressing what China is learning about the Operational Environment from Russia’s war against Ukraine (note that a DoD Common Access Card [CAC] is required to access this last link).

Our Russia Landing Zone, including the BiteSize Russia weekly topics. If you have a CAC, you’ll be especially interested in reviewing our weekly RUS-UKR Conflict Running Estimates and associated Narratives, capturing what we learned about the contemporary Russian way of war in Ukraine over the past two years and the ramifications for U.S. Army modernization across DOTMLPF-P.

Our Iran Landing Zone, including the Iran Quick Reference Guide and the Iran Passive Defense Manual (both require a CAC to access).

Our Running Estimates SharePoint site (also requires a CAC to access) — documenting what we’re learning about the evolving OE.  Contains our monthly OE Running Estimates, associated Narratives, and the 2QFY24, 3QFY24, 4QFY24, and 1QFY25 and 2QFY25 OE Assessment TRADOC Intelligence Posts (TIPs).

Then review the following related Mad Scientist Laboratory content:

Unmanned Capabilities in Today’s Battlespace

Revolutionizing 21st Century Warfighting: UAVs and C-UAS

The Operational Environment’s Increased Lethality

WMD Threat: Now and in the Future

Why the Next “Cuban Missile Crisis” Might Not End Well: Cyberwar and Nuclear Crisis Management, by Dr. Stephen J. Cimbala

An Appropriate Level of Trust…

The Future of the Cyber Domain

>>>>Reminder:  Army Mad Scientist wants to crowdsource your thoughts on Great Power Competition & Conflict — check out the flyer describing our latest writing contest.

All entries must address one of the following writing prompts:

How are the ongoing conflicts in Ukraine, the Middle East, and Africa shaping how the U.S. Army may need to fight in 2035?

What role can the U.S. Army play in helping the U.S. counter Chinese, Russian, and Iranian influence across the Global South?

How can the U.S. Army counter growing Russian/Chinese collusion in the Arctic, and China’s growing presence in the Antarctic?

What emergent technology(ies) or convergences of technologies could disrupt Great Power dominance in 2035?  In 2050?  

We are accepting three types of submissions:

      • 1500-word Non-Fiction Essay
      • 1500-word Fictional Intelligence (FICINT) Story
      • Hybrid 1500-word submission incorporating a short FICINT vignette, with a Non-Fiction Essay expounding on the threat capabilities described in the vignette

Anyone can participate (Soldiers, Government Civilians, and all global citizens) — Multiple submissions are encouraged!

All entries are due NLT 11:59 pm Eastern on May 30, 2025 at:  madscitradoc@gmail.com

Click here for additional information on this contest — we look forward to your participation!

About the Author:  Charlotte Feit-Leichman e-interned with Army Mad Scientist during the summer of 2024.  Ms. Feit-Leichman is a third year International Relations student in the St. Andrews and William & Mary Joint Degree Program.  Ms. Feit-Leichman has also worked as an intelligence intern with TRADOC G-2 in which she conducted research on the implications of the space domain for the Army. 

Disclaimer: The views expressed in this blog post do not necessarily reflect those of the U.S. Department of Defense, Department of the Army, Army Futures Command (AFC), or Training and Doctrine Command (TRADOC).


1 https://crsreports.congress.gov/product/pdf/IF/IF11150

2 https://www.businessnewsdaily.com/10352-machine-learning-vs-automation.html

3 https://www.europeanleadershipnetwork.org/wp-content/uploads/2023/11/Russian-bibliography.pdf

4 https://www.economist.com/business/2024/02/08/vladimir-putin-wants-to-catch-up-with-the-west-in-ai

5 https://warontherocks.com/2024/03/drones-are-transforming-the-battlefield-in-ukraine-but-in-an-evolutionary-fashion/

6 https://www.newsweek.com/russia-ryabkov-putin-nuclear-doctrine-1921849

7 https://www.armscontrol.org/act/2024-07/news/russian-nuclear-posture-may-change-putin-says

8 https://apnews.com/article/russia-belarus-nuclear-drills-ukraine-1a601fd9de0c32158278851cc153c2ce

9 https://www.europeanleadershipnetwork.org/wp-content/uploads/2023/11/Russian-bibliography.pdf

10 https://www.sipri.org/sites/default/files/2019-05/sipri1905-ai-strategic-stability-nuclear-risk.pdf

11 https://www.sipri.org/sites/default/files/2019-05/sipri1905-ai-strategic-stability-nuclear-risk.pdf

12 https://madsciblog.tradoc.army.mil/198-integrating-artificial-intelligence-into-military-operations/

13 https://madsciblog.tradoc.army.mil/198-integrating-artificial-intelligence-into-military-operations/

14 https://www.sipri.org/sites/default/files/2019-05/sipri1905-ai-strategic-stability-nuclear-risk.pdf

15 https://www.sipri.org/sites/default/files/2019-05/sipri1905-ai-strategic-stability-nuclear-risk.pdf

16 https://europeanleadershipnetwork.org/commentary/navigating-cyber-vulnerabilities-in-ai-enabled-military-systems/

17 https://europeanleadershipnetwork.org/commentary/navigating-cyber-vulnerabilities-in-ai-enabled-military-systems/

18 https://www.sipri.org/sites/default/files/2019-05/sipri1905-ai-strategic-stability-nuclear-risk.pdf

19 https://www.jpeocbrnd.osd.mil

20 https://www.t2.army.mil/T2-Laboratories/Designated-Laboratories/Joint-Program-Executive-Office-for-Chemical-Biological-Radiological-and-Nuclear-Defense/

21 https://www.jtfcs.northcom.mil/MEDIA/NEWS-ARTICLES/Article/3796491/critical-change-before-the-disaster-the-necessity-of-modernizing-the-approach-t/

22 https://www.jtfcs.northcom.mil/MEDIA/NEWS-ARTICLES/Article/3796491/critical-change-before-the-disaster-the-necessity-of-modernizing-the-approach-t/