“We have craft that defy physics as we know it and are moving at speeds that are at least a hundred times faster than anything a human or robot… can produce on the planet.”
[Editor’s Note: Today’s The Convergence podcast welcomes back our very own James Gang — proclaimed Mad Scientists Dr. James Giordano and Dr.James Canton — discussing a topic featured prominently in recent news storiesand Congressional testimony: Unidentified Aerial Phenomena, or UAPs, now referred to by Drs. Giordano and Canton as Unidentified Anomalous Phenomena.
The Office of the Director of National Intelligence (ODNI) issued a preliminary assessment to Congress several years ago. This assessment documented the findings of the Department of Defense’s UAP Task Force (UAPTF) and the ODNI National Intelligence Manager for Aviation — focusing on reports that involved UAP largely witnessed firsthand by military aviators and collected from systems considered to be reliable. These reports described incidents that occurred between 2004 and 2021 — 144 reports originated from U.S. Government sources. Of these, 80 reports involved observation with multiple sensors. This preliminary assessment states:
“Most of the UAP reported probably do represent physical objects given that a majority of UAP were registered across multiple sensors, to include radar, infrared, electro-optical, weapon seekers, and visual observation.”
UAPs represent a currently unknown aspect of the Operational Environment — all the more troubling, given the possibility that they could be foreign adversarial systems, operating freely within U.S. territorial spaces. Drs. Giordano and Canton dismiss the “woo” factor often associated with this topic, describe what we do know about UAPs, and lay out three recommendations to better understand these phenomena — Enjoy!]
[If the podcast dashboard is not rendering correctly for you, please click hereto listen to the podcast.]
Proclaimed Mad Scientist Dr.James Giordano is Pellegrino Center Professor in the Departments of Neurology and Biochemistry; Chief of the Neuroethics Studies Program; and Chair of the Subprogram in Military Medical Ethics at Georgetown University Medical Center, Washington, DC. Dr. Giordano is a Bioethicist of the Defense Medical Ethics Center at the Uniformed Services University of Health Sciences; Distinguished Stockdale Fellow in Science, Technology, and Ethics at the United States Naval Academy; Senior Fellow in Biosecurity, Technology, and Ethics at the U.S. Naval War College, Newport, RI; Senior Science Advisory Fellow of the Strategic Multilayer Assessment (SMA), Joint Staff / J-39, The Pentagon; Chair Emeritus of the Neuroethics Project of the Institute of Electrical and Electronics Engineers (IEEE) Brain Initiative; and serves as Director of the Institute for Biodefense Research, a federally funded Washington, DC, think tank dedicated to addressing emerging issues at the intersection of science, technology and national defense. He previously served as Donovan Group Senior Fellow, U.S. Special Operations Command; member of the Neuroethics, Legal, and Social Issues Advisory Panel of the Defense Advanced Research Projects Agency (DARPA); and Task Leader of the Working Group on Dual-Use of the EU-Human Brain Project.
Dr. Giordano is the author of 340 peer-reviewed publications, 7 books, and 45 governmental reports on science, technology, and biosecurity, and is an elected member of the European Academy of Science and Arts, a Fellow of the Royal Society of Medicine (UK), and a Fulbright Professorial Fellow. A former U.S. Naval officer, he held designations as an aerospace physiologist and research psychologist, and served with the U.S. Navy and Marine Corps.
Proclaimed Mad Scientist Dr. James Canton is a global futurist, social scientist, author, and strategic advisor. As a former Apple Computer executive and high-tech entrepreneur, he has been insightfully forecasting the key trends and technologies that have shaped our world, including AI-nano-bio-IT-neuroquantum-
cloud. The Economistrecognizes him as one of the leading global futurists. He has advised three White House Administrations, the DoD, Intelligence Community, and over 100 companies over 30 years. Dr. Canton is CEO and Chairman of the Institute for Global Futures, a leading think tank he founded in 1990 that advises business and government.
Dr. Canton is the author of Future Smart, The Extreme Future: The Top Trends That Will Reshape the World in the Next Twenty Years, and Technofutures: How Leading-Edge Innovations Will Transform Business in the 21st Century. Dr. Canton has been a lecturer at Stanford University, the Wharton School of the University of Pennsylvania, New York University, the U.S. Army and Naval War Colleges, and the Joint Special Operations University. He has held appointments at Singularity University at NASA, the Kellogg School of Management, MIT’s Media Lab, EU, the Potomac Institute, and served on the International Advisory Council, Singapore Economic Development Board, and been an advisor to the National Science and Technology Council and the U.S. Departments of State, Defense, and Health and Human Services.
In our latest episode of The Convergence podcast, Army Mad Scientist sits down with our “James Gang” — Dr. James Giordano and Dr. James Canton — to discuss Unidentified Anomalous Phenomena (UAPs) and the potential threat they pose. The following bullet points highlight key insights from our conversation:
In an open hearing on UAP before the House Intelligence Counterterrorism, Counterintelligence, and Counterproliferation Subcommittee on May 17, 2022, Deputy Director of Naval Intelligence Mr. Scott Bray shared a video of a U.S. Naval aviator encounter with an unknown object in a fleeting pass. This image is a screen capture of the UAP observed in a video of the flyby captured by the pilot in the cockpit of a Navy fighter jet. Watch the videoto see the fleeting image of the UAP flash by, between time hack 0:08 and 0:09. / Source: U.S. Navy photo and video via DVIDS
What were once called Unidentified Aerial Phenomena, or UAPs, are now referred to as Unidentified Anomalous Phenomena as they have been witnessed in multiple dimensions and domains, including the sea. They operate at speeds that seem to defy known physics, and their origins and attribution are currently unknown.
There is an abundance of evidence to support the UAP claims, much of which comes from highly credentialed individuals in the Department of Defense and Government at-large. The corroboration of these accounts further cements the veracity that “something” is encroaching on sovereign spaces, but what that “something” is – and what its intent is – remains a mystery.
There are various potential explanations for these phenomena – ranging from the plausible to the absurd. More sober possibilities include field tests by our own Government or friendly governments that haven’t been made public, adversaries or industry showcasing new technology, or experimentation by rogue actors.
Regardless of the owner – whether that be Nation State, Government, industry, or rogue actor – the capabilities of these phenomena represent a critical and potential threat to our national security. The craft are able to maneuver in ways that significantly outpace our own technology and capabilities – as well as those of our allies and partners – and have been witnessed around critical national security assets.
Preparing for these potential threats is difficult, due to the lack of information surrounding them. Drs. Giordano and Canton provide three recommendations to help address the nature of these phenomena:
This video still taken on April 28, 2020 shows part of an unclassified video captured by U.S. Navy pilots showing an interaction with a UAP. / Source: DoD photo via VOA article.
1) The appointment of a subject matter expert on the dimensionality of these events. This individual should be able to work within a whole-of-government approach that extends internationally.
2) Increased transparency of any and all information (excluding classified information) that are relevant to public health and safety.
3) The creation of a multi-disciplinary committee that sustains oversight on actionable information acquisition, analysis, and provision of a strengthened relationship between the “boots on the ground” investigators and whole-of-nation assets – to include being read on with national security clearances.
If you enjoyed this post, check out the following previous blog posts and podcasts from our Mad Scientist “James Gang”:
Explore the TRADOC G-2‘s Operational Environment Enterprise web page, brimming with information on the Operational Environment and how our adversaries fight, including:
Our Russia Landing Zone, including the BiteSize Russiaweekly topics. If you have a CAC, you’ll be especially interested in reviewing our weeklyRUS-UKR ConflictRunning Estimates and associated Narratives, capturing what we learned about the contemporary Russian way of war in Ukraine over the past two years and the ramifications for U.S. Army modernization across DOTMLPF-P.
Our Running Estimates SharePoint site (also requires a CAC to access), containing our monthly OE Running Estimates, associated Narratives, and the 2QFY24, 3QFY24, 4QFY24, and 1QFY25OE Assessment TRADOC Intelligence Posts (TIPs).
Disclaimer: The views expressed in this blog post do not necessarily reflect those of the U.S. Department of Defense, Department of the Army, Army Futures Command (AFC), or Training and Doctrine Command (TRADOC).
[Editor’s Note: The Mad Scientist Laboratoryhas continuously tracked the rise of Artificial Intelligence (AI) since its inception in 2017. In our continuing mission to explore the evolving Operational Environment and identify the ramifications of emergent trends affecting the U.S. Army, we’ve explored how AI is an emerging game-changer, how it could affect battlefield operations, and even how our adversaries could use it to generate novel Biological/Chemical agents.
One of the most compelling near-term applications of AI is enhancing Soldiers’ intellectual performance. SGM Kyle J. Kramer made the case to “integrate AIinto Soldier training, forging a force equipped to excel on the modern battlefield.” LtCol Joe Buffamante, USMC, explored how applying human-machine teaming can enhance Professional Military Education (PME). Dr. Billy Barry and LTC Blair Wilcox recently addressed how hybrid intelligencecan amplify learning during Army wargames.
Today’s post adds to our body of knowledge on how AI can augment, enhance, and empower Soldier performance. Guest blogger Ben Van Roo explores how Generative AI (GenAI) and Large Language Models (LLMs) can amplify our Soldiers’ and Leaders’ capabilities, while “enabling TRADOC to execute its mission more effectively than ever before” — Read on!]
In an era where complexity defines the battlefield, TRADOC sits at the center of the U.S. Army’s effort to shape the fielded force. Tasked with responsibilities ranging from training Soldiers to crafting doctrine, TRADOC’s mission is both expansive and urgent. Operational environments (OEs) have never been more multifaceted, encompassing political, military, economic, and social domains, all while presenting commanders with incomplete or conflicting data. It’s a daunting challenge, but also one that aligns perfectly with the strengths of generative AI (GenAI) and large language models (LLMs).
Per NVIDIA, the AI industry’s leading chipmaker:
GenAI “enables users to quickly generate new content based on a variety of inputs. Inputs and outputs to these models can include text, images, sounds, animation, 3D models, or other types of data.”
LLMs “are deep learning algorithms that can recognize, summarize, translate, predict, and generate content using very large datasets.”
These technologies won’t replace human expertise; instead, they promise to augment it. The vision is clear: to help commanders, trainers, and planners cut through the noise, adapt to rapid change, and make better decisions, faster. Yet, as with any transformative technology, the promise of GenAI comes with significant hurdles, from technical implementation toensuring trustand accuracy. The path forward will require not only innovation but also patience and a strategic approach to integration.
Operational environments are inherently dynamic and filled with shifting variables, from geopolitical upheaval to adversarial maneuvers and civilian considerations. Preparing for these complexities requires processing a mountain of information, from intelligence reports to historical precedents and real-time updates. Traditionally, synthesizing this data can take weeks—time we often don’t have. LLMs, with their unparalleled ability to process and organize information, offer a path forward. Imagine a commander needing a comprehensive overview of tensions in Eastern Europe. An LLM could synthesize disparate reports, extract key trends, and provide actionable insights in minutes. It’s not just about speed; it’s about clarity and focus. Soldiers can engage with these models conversationally, asking natural-language questions like, “What are the key political and military risks in this region?” or “Explain how this terrain impacts our logistics.” This transforms a sprawling, overwhelming dataset into a navigable, interactive resource.
This potential is transformative, but it isn’t without its challenges. The sheer volume and diversity of content for any operational environment pose significant obstacles, even for cutting-edge AI. Training these models to prioritize what matters without overwhelming users with irrelevant details requires ongoing refinement. It’s a process that demands meticulous effort, collaboration, and feedback from Soldiers and analysts alike.
TRADOC’s Decisive Action Training Environment (DATE) is one of its most valuable tools for simulating realistic adversaries and scenarios. Yet, in a world where adversaries continuously evolve, realism is a moving target. Static training manuals and scenarios often fall short of preparing Soldiers for dynamic, unpredictable threats. Here, GenAI shines. LLMs can automate updates to the DATE Force Structure, incorporating the latest intelligence into training scenarios almost instantly. They can simulate adaptive enemy behaviors, forcing trainees to think critically and respond dynamically. Imagine a training exercise where every iteration introduces new tactics, unpredictability, and depth—just like a real adversary would. This kind of evolution keeps training relevant and Soldiers ready.
Another critical challenge TRADOC faces is the overwhelming volume of knowledge it maintains. From field manuals to intelligence reports and doctrine, this information is invaluable but often inaccessible due to its complexity and scale. Soldiers describe the experience as trying to drink from a firehose. LLMs offer a practical solution, allowing Soldiers to query this knowledge base conversationally. A Soldier could ask, “What’s the effective range of theT-90 tank’s main gun?” and receive an instant, precise answer. This isn’t just about saving time; it’s about empowerment. Soldiers can learn, adapt, and prepare on the fly, even in high-pressure situations.
LLMs also hold immense potential in building better Orders of Battle (OOB). Traditionally, OOB creation requires a meticulous analysis of enemy capabilities, positions, and likely actions—an art and science that can consume valuable time. LLMs can rapidly organize and synthesize vast amounts of information, identifying patterns and constructing plausible OOBs in minutes. This efficiency frees planners to focus on strategic decision-making rather than being bogged down by data collection. However, it’s critical to recognize that LLMs are not perfect reasoning engines. They excel at organizing information and summarizing patterns, but lack the nuanced judgment and deep strategic insights that come from years of military experience. OOB creation, like most aspects of military planning, will continue to require a mix of tools, from simulations and optimization models to human expertise.
One of the less obvious but equally transformative roles for LLMs lies in content creation. TRADOC’s content needs are immense, spanning training manuals, PMESII-PT briefs, and operational plans. Creating these materials by hand is labor-intensive and slow. GenAI offers a way to dramatically accelerate this process. It can draft detailed training scenarios, generate comprehensive analyses, and even suggest predictive questions for planners to consider. For example, in preparing for operations in a fictional conflict zone, an LLM could produce adversary profiles, environmental challenges, and even strategic contingencies. This allows human experts to shift their focus to higher-order thinking and decision-making.
The vision for GenAI and LLMs in TRADOC isn’t just about efficiency—it’s about readiness. These tools offer a way to outpace adversaries, anticipate challenges, and ensure that our Soldiers are prepared for the complexity of future conflicts. But none of this will be easy. The volume of data, the intricacies of OEs, and the precision required for military planning make this a daunting task. Still, the stakes couldn’t be higher. In a world where adaptability andinformation advantage win wars, TRADOC’s embrace of GenAI could ensure that the Army remains not just a step ahead, but miles.
The question is no longer whether GenAI and LLMs can make a difference. The question is how quickly we can make them operational and ensure they fulfill their potential. These tools won’t replace the expertise of Soldiers and Leaders, but they will amplify it, enabling TRADOC to execute its mission more effectively than ever before. The future isn’t waiting, and neither should we.
Explore the TRADOC G-2‘s Operational Environment Enterprise web page, brimming with information on the Operational Environment and how our adversaries fight, including:
Our Russia Landing Zone, including the BiteSize Russiaweekly topics. If you have a CAC, you’ll be especially interested in reviewing our weeklyRUS-UKR ConflictRunning Estimates and associated Narratives, capturing what we learned about the contemporary Russian way of war in Ukraine over the past two years and the ramifications for U.S. Army modernization across DOTMLPF-P.
About the Author:Ben Van Roo is the Co-Founder and CEO of Yurts, a generative AI company partnering with the US Department of Defense to advance mission-critical systems. He holds a PhD in Operations Research and has significant experience developing AI solutions for defense and national security applications.
Disclaimer: The views expressed in this blog post do not necessarily reflect those of the U.S. Department of Defense, Department of the Army, Army Futures Command (AFC), or Training and Doctrine Command (TRADOC).
“... are choosing to sidestep U.S. conventional dominance…. seek[ing] to compete in fields cheaper to cultivate and maintain —cyber, information, andartificial intelligence among them — buying time in addition to taking advantage of whatever economies this indirect approach provides.“
China’s “Three Warfares operates along three interrelated lines of effort: Media Warfare; Psychological Warfare; and Legal Warfare (sometimes called ‘lawfare’). Taken together, these provide the PLA with a capability to control perceptions and shape the narrative, while undermining those of an opponent. This likely is designed for use in competition, but becomes essential in crisis as they work to set conditions for a transition to conflict in their favor. It also may provide them with a way to maintain a narrative edge in conflict and perhaps even allow for off-ramps in China’s favor.“
Russia‘s “Information Confrontation is designed to create confusion and sow doubt in the existence of truth, complicating an adversary’s decision-making and undermining their will to fight. If done correctly, Information Confrontation keeps the Kremlin at a threshold below armed conflict, allowing it to ‘win without fighting.’ Information Confrontation offers a two-pronged pathway to secure a form of Decision Dominance over its adversaries. The first is information technical operations, designed to target, disrupt, exploit, manipulate, or destroy an adversary’s C4ISR and other systems a society needs to function. This involves a combination of cyber operations, space and counter-space efforts, andelectronic warfareat all echelons. The second is information psychological operations, designed to exploit and exacerbate pre-existing societal divisions, and affect the cognitive realm and emotions of targeted audiences and individuals.“
“The ability of adversaries to rapidly influence the information and human dimensions will challenge the Army’s ability to achieve information advantage in LSCO.“
Today’s incisive post by proclaimed Mad Scientist Vincent H. O’Neil provides us with a useful prescription to effectively counter our adversaries’ hybrid operations — Active Defense — “a proactive security program that pairs comprehensive intelligence collection with operations designed to degrade a hostile party’s offensive capabilities.” Read on to learn how the Army, Joint Force, and Intelligence Community can seize the “high ground” and neutralize our adversaries’ nefarious endeavors!]
In this era of increasing state-on-state violence and decreasing reaction times, passive defense postures may no longer be tenable. Defense strategists now need a more active approach that provides early warning and discourages attacks. This approach is called active defense.
Active defense is a proactive security program that pairs comprehensive intelligence collection with operations designed to degrade a hostile party’s offensive capabilities.
While this article discusses active defense in terms of a nation managing its security, it can apply to any group of people facing an imminent threat of organized violence. Active defense is especially useful for entities that aren’t strong enough to defeat armed aggression.
Intelligence Collection
For this discussion, intelligence is defined as raw information that has been analyzed for insights and usefulness. Active defense requires a comprehensive understanding of the hostile party and the environment in which it operates. That includes, but is not limited to, societal characteristics, political systems, economic conditions, offensive capabilities, and technological development. An effort as widespread as this will rely on numerous sources of information and multiple collection efforts.
The intelligence environment is constantly changing, so the methods for gathering information must continuously evolve. Studying entities outside the intelligence community that also gather and analyze information can help enhance existing procedures. Here are some possible sources of inspiration:
International law enforcement: These agencies leverage both electronic and human sources across the globe to surveil and infiltrate criminal organizations, an approach that fits active defense.
Corporate security forces: The full-spectrum, never-ending nature of this work is similar to a nation seeking to defend itself from external aggressors.
Private investigators: Their ability to recruit knowledgeable people willing to divulge derogatory information has similar application in active defense intelligence collection.
Establish the information’s accuracy
Verification of intelligence is crucial, and it can come from a portion of the collection effort different from the part that generated the lead. To properly vet new information, an intelligence collection effort must be put in place long before a threat gets in motion. Establishing sources during periods of peace also provides time to determine which ones are reliable and drop those which are not.
Additionally, a robust verification network can provide feedback on the effectiveness of active defense operations launched to thwart an opponent’s aggressive planning.
Keep the footprint small
Active defense works best when the opponent is unaware of it, so secrecy is key. When undercover operatives are deployed inside an adversary’s borders, their numbers should be kept to a minimum. This is especially true when it is physically, linguistically, or culturally difficult for those agents to present themselves as residents of the opponent nation. When possible, use local resources who speak the language, understand the culture, and know its politics.
Practitioners of active defense should leverage existing entities that are already a problem for a belligerent regime. Creating opposition groups in the adversary’s territory is difficult, and can be traced back to its sponsors. Shaping the conflict environment naturally, by exploiting organic entities and ongoing frictions, can help keep an active defense program hidden.
These existing groups do not necessarily have to know they are being used in this fashion.
Develop a wide range of human sources
Active defense uses the full spectrum of intelligence collection, from satellite imagery to paid informants. When practitioners lack high-tech capabilities, they may have to rely more heavily on human sources. These contacts can be found or created using techniques both new and old. For example, covert operatives can recruit members of an opponent’s government as informants or trick them into divulging secrets. Disgruntled employees and disenchanted supporters are exploitable weak spots in otherwise sound security systems.
No matter how tight a hostile party’s security might be, there are always people who know things they shouldn’t. Managers of a regime’s communications systems, maintenance and janitorial workers in government buildings, and even the family members of an opponent’s leadership can detect signs that a big operation is imminent. Active defense practitioners need to use imagination to locate and exploit such people.
Paid informants are a prime source of early warning, even when they have no direct link to the adversary regime. Some everyday citizens know the difference between routine military maneuvers and preparations for an attack. While a single individual sending a warning may not be actionable, developing a network of human sources can help confirm or disqualify that alert.
Operations based on intelligence efforts
The two pieces of active defense, intelligence collection and operations based on that effort, are in constant development and continuous consultation. As opponent weaknesses are discovered, ways to exploit them should start to manifest themselves. Here are some examples:
Promote factions: Very few regimes or organizations are uniform in their views. Even groups who espouse the same ideology will have differences of opinion. When those dissenting views are ignored, it can lead to resentment and factionalism. Leveraging that division can reduce an opponent’s ability to strike. Factions are also prime sources of intelligence because of their intimate knowledge of a regime and motivation to share information harmful to it.
Encouraging factional disputes can be passive or active. For example, an extreme dissident group might be open to an offer of monetary or technical assistance, while a more moderate faction may require a less direct approach. In both cases, it is important to conceal the presence of an active defense campaign. Here are some potential scenarios:
If the news media operates freely inside the opponent nation, encourage it to praise the dissidents or incite them to greater effort. If social media is available, use it to raise awareness of the faction and broadcast its argument. In places where news and the Internet are restricted, learn how opinions are covertly expressed. Identify the channels of dissenting opinion that have gained the public’s attention in the past, and utilize them.
If a faction is openly publicizing its views, boost that signal. If they aren’t speaking out, do it for them. Use all available means of communication, from the Internet to word of mouth, to let people know there is an alternative to the regime or its policies.
Promote factions externally through diplomacy. Raise their status by insisting that dissenting parties are named and included in negotiations. Refer to them as serious players in public statements, and convince other nations to show them respect.
Be careful not to promote a dissident group that is more extreme than the current regime. With that said, encouraging factions can distract an opponent’s leadership and even open the way for a more peaceful government.
Encourage rivalries: This potential weakness exists on at least two levels: 1) inside the hostile regime where leaders may be feuding, and 2) outside the opponent nation where competitors oppose its aims.
For internal rivalries, consider relative position. If one of the competitors outranks the other, the subordinate may be jealous while the senior feels insecure. Use news reports, official statements, intentionally leaked intelligence estimates, and rumors to praise one competitor and prod the other into greater activity.
For threats from a completely different entity, aggravate the major points of contention. If the conflict is existential, both parties will have to dedicate time and resources to defending themselves. Provide the rival with key intelligence, improved technology, or material support to force an adversary to reorient its focus on that danger.
Disrupt logistics: Even when a hostile party appears to be self-sustaining, there is always something they get from somewhere else. It may be a service, such as processing a resource they can’t refine. It may be technological, in the form of products or expertise from a third party. Close examination of supply chains can point out key flaws such as a single source for crucial items, funding for a large part of the budget, or a fragile chain of handlers passing vital materials.
Leverage the law. If any of a hostile party’s suppliers or supporters are breaking any law in any way, collect evidence and report them. Get international bodies involved, to confuse the adversary about who is disrupting the supply lines and raise a public outcry against their misdeeds. Threaten their access to the electronic money transfer system to complicate payments and convince legitimate suppliers to stop supporting them.
Make simple things hurt. When supply lines can’t be severed, rendering them less accessible or more expensive still harms the recipient. An active defense program includes numerous campaigns operating on different lines, so forcing an adversary to wait longer and pay more for needed assistance can complement other efforts.
Increase doubts. If a hostile party’s supply chain is open to physical interference, add substandard items to that flow. The receipt of dud ammunition, faulty electronics, or half-empty crates may generate accusations and denials. If these disputes create enough mutual distrust, it may end the entire relationship.
Shape perceptions: A hostile regime or organization that actively promotes a narrative about itself may live in fear of the truth. Spotlighting contradictions between the image and the reality can give voice to alternative movements or leadership.
Combat lies with facts. A belligerent regime will often run a propaganda campaign to make itself look better and blame the conflict on its intended victim. The ongoing collection of intelligence in active defense should provide evidence to the contrary. Publicize derogatory information about the opponent, along with proof, to help show the propaganda is not true.
Sway public opinion among the adversary’s constituents. If the regime forces its people to live in austerity while funding military needs, popular disapproval should already exist. The intelligence assessment of the society inside the hostile party’s borders should indicate which means (social media, word of mouth, or some other method) can be used to fan this discontent. Base this approach in the truth, but don’t forget there is a role for satire as well. Regimes that rule by fear are greatly threatened by public ridicule.
Some regimes base their legitimacy on the promised defeat of another entity. Disrupting their attack plans and snarling their logistics can cause postponement after postponement. In the face of such prolonged inaction, the regime may find itself endangered by demands for a change in policy. While such a development is a goal of active defense, it is important to remember that an opponent facing internal dissent may launch an attack just to stay in power. Never assume a hostile party is a rational actor.
Take charge of the threat environment
Active defense shapes the environment in which a nation’s protectors operate. By seizing the initiative, it prevents opponents from preparing at their leisure and attacking when they choose. While it cannot take the place of an armed force trained and ready to oppose aggression, it can greatly assist that security effort.
Because an active defense program is based on the specific circumstances of a given conflict, there are few rules about its employment. However, practitioners should keep the following suggestions in mind:
Create a self-verifying intelligence effort long before potential hostilities.
Seek inspiration from actors outside traditional defense organizations.
Look beyond obvious sources of information.
Conceal the campaign by leveraging local entities and frictions.
Evolve new techniques to stay ahead of the changing environment.
A successful active defense program can create real security and possibly lead to peace. By creating a detailed intelligence picture of the opponent and the factors that influence it, active defense provides crucial information and insights on an adversary. By degrading an aggressor’s ability to attack, it alters the operational landscape. By promoting dissenting voices, it offers an alternative to a hostile regime.
Our Russia Landing Zone, including the BiteSize Russiaweekly topics. If you have a CAC, you’ll be especially interested in reviewing our weeklyRUS-UKR ConflictRunning Estimates and associated Narratives, capturing what we learned about the contemporary Russian way of war in Ukraine over the past two years and the ramifications for U.S. Army modernization across DOTMLPF-P.
About the Author: Vincent H. O’Neil is an award-winning novelist in the mystery and science fiction genres. He holds a master’s degree in international relations from The Fletcher School and a bachelor’s degree from West Point. He is also a graduate of the Defense Language Institute’s Mandarin Chinese program and the U.S. Army Command & General Staff College. His website is www.vincenthoneil.com.
Disclaimer: The views expressed in this blog post do not necessarily reflect those of the U.S. Department of Defense, Department of the Army, Army Futures Command (AFC), or Training and Doctrine Command (TRADOC).
[Editor’s Note: Lest our readers think Army Mad Scientist is now pandering to the steamy novel set, today’s blog post by returning guest blogger Dr. Robert E. Smith, Science and Technology Advisor to USARPAC, explores the vital role “gray zone,” i.e., non-lethal, activities now play in the Operational Environment.
According to DoD Directive 3000.03E, DoD Executive Agent for Non-Lethal Weapons (NLW), and NLW Policy, the Department of Defense defines non-lethal weapons as weapons, devices, and munitions that are explicitly designed and primarily employed to incapacitate targeted personnel or materiel immediately, while minimizing fatalities, permanent injury to personnel, and undesired damage to property in the target area or environment. Non-lethal weapons are intended to have reversible effects on personnel and materiel. The Joint Immediate Force Capabilities Office (JIFCO) oversees the Department of Defense Non-Lethal Weapons Program.
To date, we’ve seen this competition space dominated by our adversaries. In today’s Fictional Intelligence (FICINT) submission, Dr. Smith explores how seizing the non-lethal “high ground” could effectively thwart our adversaries’ aggressive behaviors, with Taiwan resiliently asserting itself in response to China’s bullying tactics in the South China Sea — all without firing a shot! The U.S. Army (and especially its Transportation Corps’ fleet of watercraft) should take note — not every problem presented in the Operational Environment is a “nail” requiring lethal blows from a “hammer” — Read on!]
Chapter 1: Shades of Gray – The Coast Guard Standoff
Taiwan Coast Guard Vessel “Resolute”
Captain Lin Wei stood resolutely on the bridge of the Taiwan Coast Guard vessel “Resolute,” his eyes scanning the choppy waters around the Kinmen Islands. The wind whipped his face, bringing the salty tang of the Taiwan Strait, and the tension in the air was palpable. Reports had come in of two Chinese Coast Guard ships deploying floating barriers into the restricted waters surrounding Kinmen, a territory hotly contested by Taiwan and China. His orders were crystal clear: deter their advance without escalating to lethal force.
Chinese Coast Guard boats close to the floating barrier are pictured on September 20, 2023, near the Scarborough Shoal in the South China Sea, in this handout image released by the Philippine Coast Guard
Wei had family who were fishermen, and he knew China had a regular habit of trying to redraw exclusive economic zones by disrupting fishing boats using floating barriers. The barriers would entangle fishing boats’ propellers or just catch hulls. The PRC coast guard liked to wait until there were many fishermen in an area typically around fertile shoals, and then box them in. Rarely was there a loss of life. It was essentially gray-terror where effective fear could be achieved without shedding blood.
China Coast Guard ships (left and right) deploy water cannons at the Philippine military-chartered civilian boat Unaizah May 4 (center) during its supply mission near Second Thomas Shoal in the disputed South China Sea in this frame grab from aerial video footage taken on March 5, 2024.
Observing the Philippine Coast Guard endure relentless Chinese water cannon assaults and dangerous maneuvers had steeled Taiwan’s resolve to adapt. Captain Lin Wei, with his neatly cropped hair already flecked with gray from years of service, felt a knot of anxiety tighten in his stomach. These brand-new, untested non-lethal technologies were his arsenal today. Each maneuver was a calculated response to years of observation and Taiwan’s own engagements with China. Now, facing two Chinese ships, he felt like as an egg trying to strike a rock. This was bolstered by China having tried some new innovations last week — dumping large numbers of used fishing nets around the shoals in the Philippines. The cleanup was more annoying than floating barrier removals. Wei pondered if the goal was controlling fishing resources, but his mind leaned towards China just being arrogant bullies.
The constant centerline crossings or harassing of Taiwan’s waters was a probing test of Taiwan’s resolve and readiness. With the United States far away, Taiwan needed to deter these incremental encroachments to gain early warnings of potential invasion – especially for the outlying islands which only a mile from mainland China. The “Resolute” had been upgraded with state-of-the-art technologies, but Lin couldn’t shake the fear of waking a giant with these unproven tools. His jaw tightened, and his voice, though steady, carried an underlying tension.
Megaphone Loudspeaker for Splash Drone
As the Chinese vessels loomed closer, their gray hulls cutting through the waves with ominous precision, Wei signaled for the ship’s UAS (Unmanned Aerial System) to take flight. The small drone buzzed into the air, its rotors humming softly against the backdrop of the sea’s roar. The megaphone on the drone crackled to life. “Attention, Chinese Coast Guard vessels. You are violating Taiwan’s territory. Turn back immediately,” it blared, the command echoing across the water.
“Activate the P-trap device,” Lin ordered.
P-trap Swivel Boom System
The P-trap (Propeller Trap) system was ingeniously simple in its design. The “Resolute” deployed arms on both sides, releasing multiple trailing cables into the water. These cables were designed to entangle the propellers of any approaching vessel, preventing them from getting too close. The lines were virtually invisible to the naked eye since they floated just below the surface, but they were extremely effective. Wei had seen a demonstration of the system in calm waters; now it was time to see it in action under pressure.
The Resolute’s capabilities, though impressive, were not entirely state-of-the-art. The United States had been hesitant to transfer its most advanced technology, fearing sensitive information might leak to China. Wei knew about the U.S. Joint Intermediate Force Capabilities Office (JIFCO) and their cutting-edge developments, like the Active Denial System, which used millimeter waves to induce an intense burning sensation on targets. JIFCO had also pioneered electronic warfare technologies capable of disabling engines and electronics on ships and vehicles. These were powerful tools, but ones that had not been shared with Taiwan.
Wei’s feelings were a mix of gratitude and frustration. The lack of complete trust from the U.S. stung, but he was also deeply appreciative of the support they did provide. He longed for the U.S. to abandon its policy of strategic ambiguity and offer more direct backing. As he watched the Chinese ships approach, their presence a stark reminder of the ever-present threat, he pushed these thoughts aside. His focus was on the task at hand.
Chinese Coast Guard Vessel “Haijing 5203”
Captain Zhang Liang stood on the bridge of the “Haijing 5203,” his gaze drifting over the Taiwanese cutter ahead. The salty sea air filled his lungs as he gripped the railing, a practiced calm masking the underlying tension of China’s strict oversight. His demeanor was almost bored; these standoffs had become routine. Harassing fishing vessels was easier, though the Taiwan Coast Guard was always more stubborn. So far, no ships had ever been sunk.
The Taiwanese drone buzzed overhead, its warnings growing more insistent. Liang flicked his wrist dismissively, as if swatting a fly. “Ignore the warning,” he said, his tone flat. “Continue our approach.”
The Chinese vessels pressed forward, unfazed by the drone. Zhang’s face remained a mask of indifference, but his eyes briefly flashed with irritation as the drone persisted. He smoothed it away, focusing on his role—China was the rightful authority here, and Taiwan, a mere irritant. He straightened his posture, projecting an air of unquestioned dominance.
Taiwan Coast Guard Vessel “Resolute”
Wei watched the Chinese ships maintain their course, his hands tightening around the binoculars. The tension was palpable on the bridge. “Refit the drones with payload 2,” he ordered. His crew moved swiftly, launching several drones, each armed with an unconventional payload.
Drones can be configured to deliver a wide array of payloads — humanitarian, non-lethal, and lethal. Here, Soomvi’s rescue drone drops a life preserver to a drowning person during a service simulation event held at Eurwangni Beach in Incheon.
The first wave of drones flew towards the Chinese ships and dropped tennis balls onto their decks. The bright yellow balls bounced harmlessly but proved the point as a visual testament to Taiwan’s resolve.
“Captain, they’re not backing off,” Lieutenant Chen reported, his voice strained. Wei nodded, his eyes narrowing. “Deploy the glue payload.”
The drones flew out again, this time spraying streams of sticky adhesive across the cameras and windows of the first Chinese ship. The glue splattered and spread, coating everything it touched, making movement treacherous and vision nearly impossible.
Chinese Coast Guard Vessel “Haijing 5203”
Liang shielded his eyes reflexively as the glue splattered across the bridge windows, obscuring his view. Frustration boiled over. “Spray those drones out of the sky!” he shouted.
The “Haijing 5203” activated its water cannon briefly, blasting a drone. Zhang’s lips curled into a smirk of satisfaction, but it was short-lived as another drone swiftly replaced the fallen one.
Taiwan Coast Guard Vessel “Resolute”
Wei watched as one of his drones was taken down. He felt a surge of determination. “Release the backup drones. Load them with payload 3 – methyl cellulose.” Normally a powder, when mixed with water methyl cellulose creates hazardous slippery, viscous solutions making deck movement nearly impossible.
The next wave of drones dropped balls of methyl cellulose onto the second Chinese vessel.
Despite these efforts, the Chinese ships kept coming. One vessel aimed to ram Wei’s ship bow- on-bow. The P-trap devices had made a side-by-side approach impossible, but an off-angle bow-on-bow collision was still a threat.
“Deploy the WHAACK system,” Wei commanded.
The WHAACK (Watercraft Hull Active Armor Collison Kit) system, inspired by reactive armor on tanks and commercial airbags, was a cutting-edge defense mechanism developed after winning an ArmyxTech search prize competition. His crew quickly unrolled a lightweight Kevlar-based inflatable over the ship’s rails. At the touch of a button, the airbag inflated. Inside, titanium spikes were reoriented from a flat position by the outer surface of the airbag as it inflated to a more ominous, outward facing shape. Each spike had reactive explosives that would drive home damage into the opposing ship without damaging the friendly vessel. As the Chinese ship made contact, the spikes ripped small holes in its hull, and a payload of pepper spray was released inside the “Haijing 5203.” Wei thought, “I hope they cry all the way home.”
But Wei wasn’t done. He fired a low-tech rocket equipped with spider wire into the water across the bow of the retreating “Haijing 5203.” The wire tangled around the Chinese ship’s propellers, disabling it completely.
Taiwan’s National Chung-Shan institute had created this capability using a fully 3D-printed body, a hobby store rocket motor, and SpiderWire fishing line in spiral packs with a few styrofoam fishing floats. The launcher used a simple android phone that talked to the ships navionics over Bluetooth to get weather and speed data and then used a commercial digital range finder and the phone camera to compute exactly where to launch the wire and land the rocket body.
The “Ningbo” is a Russian-built Type 956E Class (Hangzhou Class) Chinese Guided Missile Destroyer
As the Chinese ships edged closer, Wei couldn’t help but recall an incident involving Australian divers. Just a few months ago, the Chinese navy destroyer “Ningbo” had allegedly used its active sonar, injuring Australian navy divers who were clearing fishing nets from their propellers. Wei vividly remembered reading the reports: how the Ningbo had approached the Australian frigate HMAS Toowoomba despite being warned about the divers in the water, and then activated its powerful hull-mounted sonar system. The sonar pulses had caused minor injuries to the divers, leading to international condemnation of China’s unsafe and unprofessional conduct.
One Chinese ship remained. Wei knew they would try to use their water cannon since the P-trap would prevent them from getting too close. He vividly remembered the news images in Liberty Times of the aftermath of the Chinese assault on a Philippine resupply vessel. The sustained blasts from the water cannons had caused severe structural damage, bent railings, and shorn canopies. Navigation and communication equipment had been drenched and rendered inoperative, while the force of the water dislodged and washed away smaller equipment on deck. The vessel had been left crippled and vulnerable, a sobering testament to the power of those cannons.
Determined to spare the “Resolute” a similar fate, Wei steeled himself. “Activate the autonomous water cannon,” he ordered. The new system could track a designated point on a monitor to counter the Chinese water cannon no matter how the ships rolled in the waves. As the Chinese ship fired its cannon, Wei’s vessel matched it, stream for stream. The water jets collided mid-air, creating a chaotic spray that drenched the decks but left the critical equipment intact.
Wei’s vessel had a secret weapon. The nozzle on his water cannon had a sliding door and a venturi that allowed hard polymer balls to be injected into the stream. The first ball was deflected as the cannons canceled each other out, but Wei adjusted the cannon’s aim slightly. The next ball snapped off the Chinese ship’s nozzle, causing it to flood its own deck.
Wei watched as the enemy vessel struggled, its crew scrambling to regain control. The memory of the Philippine vessel’s damage fueled his resolve. He wouldn’t let the “Resolute” suffer the same fate. As the Chinese ship limped away, Wei’s heart pounded with a mix of relief and pride. They had defended their waters without resorting to lethal force, and for now, the “Resolute” remained unscathed.
Both Chinese ships were now limping away. Wei’s heart raced, each beat pounding like a drum in his chest as relief washed over him. They had defended their waters without resorting to lethal force. The crew erupted in subdued cheers, their faces reflecting the tension of the encounter and the triumph of their success.
Lynk Global provides satellite-direct-to-standard-phone service (sat2phone). They have current customers across the Indo-Pacific. AST is another company on the cutting edge of Non-Terrestrial Networks.
High above, filming drones captured every moment of the incident. Using Lynk’s Proliferated Low Earth Orbit (PLEO) constellation, they live- streamed the entire event across the world, showcasing Taiwan’s resolve and ingenuity in defending its sovereignty.
The Black Hornet Nano drones buzzed silently, their tiny frames blending into the sky. They captured every moment, lenses glinting in the sunlight. Data streamed from the drones to the “Resolute,” and a simple cell phone used Lynk’s “cell tower in space” constellation. Lynk allowed direct satellite-to-mobile communication, with no extra equipment needed. Real-time footage flowed seamlessly to viewers worldwide. In the past, static images or videos uploaded hours after events were not nearly as effective. They gave China time to ramp up its AI-powered propaganda machines, but live video is worth a thousand belligerent statements.
Developed by Teledyne FLIR, the Black Hornet is a fielded capability. At 6.6 inches in length and weighing under 33 ounces, it is easily deployable by a Soldier. These are small enough they could even fly into threat ship openings (hatches, portals) and disperse pepper spray.
The Black Hornet Nanos, deployed at the start of the confrontation, hovered with near-silent efficiency. Measuring just 16 x 2.5 cm (6 x 1 inch) and weighing 18 grams (0.7 oz), they were practically invisible, with a flight duration of up to 25 minutes. Wei marveled at their stealth, though he wished every fishing vessel could have one despite the cost.
Chinese Coast Guard Vessel “Haijing 5203”
Captain Zhang Liang gripped the railing of his ship, frustration boiling beneath his calm exterior. The Taiwanese were proving to be more resilient and innovative than he had anticipated. His ship was coated in glue, making movement and visibility nearly impossible. The water cannon had been their best hope, but even that had been neutralized by the Taiwanese vessel’s advanced systems.
When his ship’s propellers became tangled in the spider wire, Zhang knew the mission was over. “Retreat,” he ordered through gritted teeth.
As his vessel limped away, Zhang couldn’t help but feel a grudging respect for the Taiwanese captain. This encounter had been a test of wits and technology, and today, Taiwan had won.
The above fictitious patch was adapted to fit this story. Taiwan Air Force pilot patches depict a Formosan black bear punching Winnie the Pooh — representing Chinese President Xi Jinping — as a defiant symbol of the island’s resistance to Chinese war games.
Liang already know that China would predictably respond with theatrical accusations. State media would claim the footage proved the US was stirring up troubles inside China with the “rogue state” Taiwan and expressed great sympathy for the families of the Chinese coast guard personnel supposedly injured in the “Taiwan attacks.” No doubt some of Liang’s crew would be asked to flood their social media with images of broken bones and cuts.
China’s rhetoric blamed Washington, insisting the video footage of the incident was fake. But the real-time footage, broadcast through Lynk made a mockery of such claims. The world’s eyes were on them, seeing the truth unfold.
Our Russia Landing Zone, including the BiteSize Russiaweekly topics. If you have a CAC, you’ll be especially interested in reviewing our weeklyRUS-UKR ConflictRunning Estimates and associated Narratives, capturing what we learned about the contemporary Russian way of war in Ukraine over the past two years and the ramifications for U.S. Army modernization across DOTMLPF-P.
About the Author: Dr. Robert E. Smith is the Army Futures Command International Science Advisor to U.S. Army Pacific Command. Previously he worked in the Ground Vehicles Systems Center doing research centered early synthetic prototyping and extracting tactics from gaming data. His career includes experience at Ford Motor Co., Whirlpool Corp., and General Dynamics Land Systems. He holds a Ph.D. in Mechanical Engineering from Michigan Technological University with a focus on AI and Machine Learning.
Disclaimer: The views expressed in this blog post do not necessarily reflect those of the U.S. Department of Defense, Department of the Army, Army Futures Command (AFC), or Training and Doctrine Command (TRADOC).
Check out TRADOC’s new The Operational Environment 2024-2034: Large-Scale Combat Operations — now published as TRADOC Pamphlet 525-92. As such, this new publication serves as TRADOC’s informational publication defining the Operational Environment and is applicable command-wide.