[Editor’s Note: Mad Scientist Laboratory welcomes returning guest blogger Matthew Ader, whose submission builds upon his previous post regarding the demise of strategic and operational deception and surprise. Given the ascendancy of finders, Mr. Ader argues for the use of profoundly decisive impacts, achieved through information operations and minimal kinetic force, to “generate maximum hysteria” and bend the will of our adversaries’ populations in order to achieve our objectives.]
The future battlespace will be dominated by thefinders, not the hiders. Finder capabilities are effective and are only growing more so, leveragingcross-domain surveillance through cheap satellites,unmanned systems, and open source intelligence. This is augmented by the ongoing proliferation of precision long-range fires. In this environment, large unit manoeuvres to achieve decision favoured by the Joint Force will not be possible. Instead, kinetic action should be used to catalyse fear and dissatisfaction among the enemy civilian population, leading to pressure for a negotiated end to conflict.
Why is decisive kinetic manoeuvre no longer possible?
Logistics. Specifically, the practicalities of supplying a force in a finder dominated environment. During Operation Desert Storm, the fuel consumption rate per day for the U.S. VII and XVIII ABN Corps was about 4.5 million gallons. Ammunition requirements were about 14,000 tons a day.1 Logistics support at this scale can neither be foraged nor arranged ad-hoc. Modern warfare depends on a robust supply network to deliver the requisite food, fuel, ammunition, and spare parts, when and where they are needed, to sustain the fight. In the First Gulf War, that was achieved by a handful of well provisioned logistics bases close to the line of advance. In the Second Gulf War, logistics ran on a just in time model, with supply dependent on “frequent, reliable distribution rather than on large forward stockpiles.”
Both of these models are no longer viable in the future operating environment. Large logistics bases will be highly vulnerable to cruise, ballistic, and conventional artillery fire. Drone attacks will also pose a significant challenge, aptly demonstratedin Kalynivka, Ukraine in 2017, where a single Russian quadcopter ignited a Ukrainian depot, destroying over 83,000 tons of ammunition. Challenges to air supremacy complicate the just in time delivery model. In a situation where units have only a few days of organic fuel and ammunition, a handful of missed convoys due to enemy air interdiction would prove disastrous. The unmanned threat is also present here. Autonomous ‘mobile mines’ could be deployed by air or artillery (à la Family of Scatterable Mines or FASCAM) onto lines of communication to complicate supply efforts.
This is not to say that logistics will be impossible. Promising innovations, particularly in usingautonomous vehicles, could help with sustainment operations. Nevertheless, from a volume standpoint, thedivision-sized forces envisioned to achieve decision in a contested environment may not be viable.
What do we do instead?
War is aboutcompelling our opponent to fulfil our will. Up to this point, the most efficient way to do this in a conventional war has been, bluntly, to kill people and blow things up until the enemy government surrenders. Due to the limitations on logistics imposed by the finder’s world, this is no longer possible. We need to find a new way to compel our opponent to fulfil our will.
Luckily, modern information technology provides the Army with a new way. 51% of people with social media access (about 2.5 billion) use it as a source for news. Both of these numbers are likely to grow as connectivity increases in the developing world. However, news on social media is often accompanied and preceded by a bow wave of hysteria, rumours, and conspiracy. This can have direct real-world impact – #AllEyesOnISIS caused much of the Iraqi force defending Mosul to flee before they saw the enemy. That was a profoundly decisive impact, achieved through minimal kinetic force.
The U.S. Army currently considers information operations to be an important adjunct to kinetic action. However, in a finder dominated environment, this should be flipped on its head. Small kinetic offensives (the smaller, the easier for likely highly degraded logistics networks to support) designed to generate maximum hysteria among the enemy population should be the watchword. The result will be viral fear and significant internal pressure to accede to U.S. demands.
In the digital, connected age, all the world is a stage. The Army must learn to weaponize theatrics.
If you enjoyed this post, please also read the following:
[Editor’s Note: Mad Scientist Laboratory is pleased to present our August edition of “The Queue” – a monthly post listing the most compelling articles, books, podcasts, videos, and/or movies that the U.S. Army’s Training and Doctrine Command (TRADOC) Mad Scientist Initiative has come across during the past month. In this anthology, we address how each of these works either informs or challenges our understanding of the Future Operational Environment. We hope that you will add “The Queue” to your essential reading, listening, or watching each month!]
Gartner’s annual hype cycle highlights many of the technologies and trends explored by the Mad Scientist program over the last two years. This year’s cycle added 17 new technologies and organized them into five emerging trends: 1) Democratized Artificial Intelligence (AI), 2)Digitalized Eco-Systems, 3) Do-It-Yourself Bio-Hacking, 4) Transparently Immersive Experiences, and 5) Ubiquitous Infrastructure. Of note, many of these technologies have a 5–10 year horizon until the Plateau of Productivity. If this time horizon is accurate, we believe these emerging technologies and five trends will have a significant role in defining the Character of Future War in 2035 and should have modernization implications for the Army of 2028. For additional information on the disruptive technologies identified between now and 2035, see the Era of Accelerated Human Progress portion of ourPotential Game Changers broadsheet.
[Gartner disclaimer: Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.]
“Let’s say you’re an AI scientist, and you’ve found the holy grail of your field — you figured out how to build an artificial general intelligence (AGI). That’s a truly intelligent computer that could pass as human in terms of cognitive ability or emotional intelligence. AGI would be creative and find links between disparate ideas — things no computer can do today.
That’s great, right? Except for one big catch: your AGI system is evil or could only be used for malicious purposes.
So, now a conundrum. Do you publish your white paper and tell the world exactly how to create this unrelenting force of evil? Do you file a patent so that no one else (except for you) could bring such an algorithm into existence? Or do you sit on your research, protecting the world from your creation but also passing up on the astronomical paycheck that would surely arrive in the wake of such a discovery?”
The panel’s responses ranged from controlling — “Don’t publish it!” and treat it like a grenade, “one would not hand it to a small child, but maybe a trained soldier could be trusted with it”; to the altruistic — “publish [it]… immediately” and “there is no evil technology, but there are people who would misuse it. If that AGI algorithm was shared with the world, people might be able to find ways to use it for good”; to the entrepreneurial – “sell the evil AGI to [me]. That way, they wouldn’t have to hold onto the ethical burden of such a powerful and scary AI — instead, you could just pass it to [me and I will] take it from there.”
While no consensus of opinion was arrived at, the panel discussion served a useful exercise in illustrating how AIdiffers from previous eras’ game changing technologies. Unlike Nuclear, Biological, and Chemical weapons, no internationally agreed to and implemented control protocols can be applied to AI, as there are no analogous gas centrifuges, fissile materials, or triggering mechanisms; no restricted access pathogens; no proscribed precursor chemicals to control. Rather, when AGI is ultimately achieved, it is likely to be composed of nothing more than diffuse code; a digital will’o wisp that can permeate across the global net to other nations, non-state actors, and super-empowered individuals, with the potential to facilitate unprecedentedly disruptiveInformation Operation (IO) campaigns and Virtual Warfare, revolutionizing human affairs. The West would be best served in emulating the PRC with itsMilitary-Civil Fusion Centers and integrate the resources of the State with the innovation of industry to achieve their own AGI solutions soonest. Thedecisive edge will “accrue to the side with more autonomous decision-action concurrency on the Hyperactive Battlefield” — the best defense against a nefarious AGI is a friendly AGI!
Can justice really be blind? The International Conference on Machine Learning (ICML) was held in Stockholm, Sweden, in July 2018. This conference explored the notion of machine learning fairness and proposed new methods to help regulators provide better oversight and practitioners to develop fair and privacy-preserving data analyses. Like ethical discussions taking place within the DoD, there are rising legal concerns that commercial machine learning systems (e.g., those associated with car insurance pricing) might illegally or unfairly discriminate against certain subgroups of the population. Machine learning will play an important role in assisting battlefield decisions (e.g., the targeting cycle and commander’s decisions) – especially lethal decisions. There is a common misperception that machines will make unbiased and fair decisions, divorced from human bias. Yet the issue of machine learning bias is significant because humans, with their host of cognitive biases, code the very programming that will enable machines to learn and make decisions. Making the best, unbiased decisions will become critical in AI-assisted warfighting. We must ensure that machine-based learning outputs are veriﬁed and understood to preclude the inadvertent introduction of human biases. Read the full reporthere.
In a study published byPLOS ONE, researchers found that arobot’s personality affected a human’s decision-making. In the study, participants were asked to dialogue with a robot that was either sociable (chatty) or functional (focused). At the end of the study, the researchers let the participants know that they could switch the robot off if they wanted to. At that moment, the robot would make an impassioned plea to the participant to resist shutting them down. The participants’ actions were then recorded. Unexpectedly, there were a large number of participants who resisted shutting down the functional robots after they made their plea, as opposed to the sociable ones. This is significant. It shows, beyond the unexpected result, that decision-making is affected by robotic personality. Humans will form an emotional connection to artificial entities despite knowing they are robotic if they mimic and emulate human behavior. If the Army believes its Soldiers will beaccompanied and augmented heavily by robots in the near future, it must also understand that human-robot interaction will not be the same as human-computer interaction. The U.S. Army must explore how attain theappropriate level of trust between Soldiers and their robotic teammates on the future battlefield. Robots must be treated more like partners than tools, with trust, cooperation, and even empathy displayed.
While the advent of the Internet brought home computing and communication even deeper into global households, the revolution of smart phones brought about the concept of constant personal interconnectivity. Today and into the future, not only are humans being connected to the global commons via their smart devices, but a multitude of devices, vehicles, and various accessories are being integrated into the Internet of Things (IoT). Previously, the IoT was addressed as a game changing technology. The IoT is composed of trillions of internet-linked items, creating opportunities and vulnerabilities. There has been explosive growth in low Size Weight and Power (SWaP) and connected devices (Internet of Battlefield Things), especially for sensor applications (situational awareness).
Large companies are expected to quickly grow their spending on Internet-connected devices (i.e., appliances, home devices [such as Google Home, Alexa, etc.], various sensors) to approximately $520 billion. This is a massive investment into what will likely become the Internet of Everything (IoE). While growth is focused on known devices, it is likely that it will expand to embedded and wearable sensors – think clothing, accessories, and even sensors and communication devices embedded within the human body. This has two major implications for the Future Operational Environment (FOE):
– The U.S. military is already struggling with the balance between collecting, organizing, and using critical data, allowing service members to use personal devices, and maintaining operations and network security and integrity (see banning of personal fitness trackers recently). A segment of the IoT sensors and devices may be necessary or critical to the function and operation of many U.S. Armed Forces platforms and weapons systems, inciting some critical questions about supply chain security, system vulnerabilities, and reliance on micro sensors and microelectronics
– The U.S. Army of the future will likely have to operate in and arounddense urban environments, where IoT devices and sensors will be abundant, degrading blue force’s ability to sense the battlefield and “see” the enemy, thereby creating a veritable needle in a stack of needles.
With the possibility of a “cyber Pearl Harbor” becoming increasingly imminent, intelligence officials warn of the rising danger of cyber attacks. Effects of these attacks have already been felt around the world. They have the power to break the trust people have in institutions, companies, and governments as they act in the undefinedgray zone between peace and all-out war. The military implications are quite clear: cyber attacks can cripple the military’s ability to function from a command and control aspect to intelligence communications and materiel and personnel networks. Besides the military and government, private companies’ use of the internet must be accounted for when discussing cyber security. Some companies have felt the effects of cyber attacks, while others are reluctant to invest in cyber protection measures. In this way, civilians become affected by acts of cyber warfare, and attacks on a country may not be directed at the opposing military, but the civilian population of a state, as in the case of power and utility outages seen in eastern Europe. Any actor with access to the internet can inflict damage, and anyone connected to the internet is vulnerable to attack, so public-private cooperation is necessary to most effectively combat cyber threats.
If you read, watch, or listen to something this month that you think has the potential to inform or challenge our understanding of the Future Operational Environment, please forward it (along with a brief description of why its potential ramifications are noteworthy to the greater Mad Scientist Community of Action) to our attention at: firstname.lastname@example.org — we may select it for inclusion in our next edition of “The Queue”!
[Editor’s Note: Mad Scientist Laboratory is pleased to present today’s guest post by Ms. Taylor Galanides, TRADOC G-2 Summer Intern, exploring how the increasing momentum of human interaction, events, and actions, driven by the convergence of innovative technologies, is enabling adversaries to exploit susceptibilities and vulnerabilities to manipulate populations and undermine national interests. Ms. Galanides examines contemporary Information Operations as a harbinger of virtual warfare in the future Operational Environment.]
More information is available than ever before. Recent and extensive developments in technology, media, communication, and culture – such as the advent of social media, 24-hour news coverage, and smart devices – allow people to closely monitor domestic and foreign affairs. In the coming decades, the increased speed of engagements, as well as the precise and pervasive targeting of both civilian and military populations, means that these populations and their respective nations will be even more vulnerable to influence and manipulation attempts, misinformation, and cyber-attacks from foreign adversaries.
The value of influencing and shaping the perceptions of foreign and domestic populations in order to pursue national and military interests has long been recognized. This can be achieved through the employment of information operations, which seek to affect the decision-making process of adversaries. The U.S. Army views information operations as an instrumental part of the broader effort to maintain an operational advantage over adversaries. Information operations is specifically defined by the U.S. Army as “The integrated employment, during military operations, of information-related capabilities in concert with other lines of operation to influence, disrupt, corrupt, or usurp the decision-making of adversaries and potential adversaries while protecting our own.”
The U.S. Army Training and Doctrine Command (TRADOC) G-2’s The Operational Environment and the Changing Character of Future Warfare further emphasizes this increased attention to the information and cognitive domains in the future – in the Era of Contested Equality (2035 through 2050). As a result, it has been predicted that no single nation will hold hegemony over its adversaries, and major powers and non-state actors alike “… will engage in a fight for information on a global scale.” Winning preemptively in the competitive dimension before escalation into armed conflict through the use of information and psychological warfare will become key.
Part of the driving force that is changing the character of warfare includes the rise ofinnovative technologiessuch as computer bots, artificial intelligence, and smart devices. Such emerging and advancing technologies have facilitated the convergence of new susceptibilities to individual and international security; as such, it will become increasingly more important to employ defensive and counter information operations to avoid forming misperceptions or being deceived.
Harbinger of the Future: Information Operations in Crimea
Russia’s invasion of eastern Ukraine and subsequent annexation of Crimea in 2014 effectively serve as cautionary examples of Russia’s evolving information operations and their perception-shaping capabilities. In Crimea, Russia sought to create a “hallucinating fog of war” in an attempt to alter the analytical judgments and perceptions of its adversaries. With the additional help of computer hackers, bots, trolls, and television broadcasts, the Russian government was able to create a manipulated version of reality that claimed Russian intervention in Crimea was not only necessary, but humanitarian, in order to protect Russian speakers. Additionally, Russian cyberespionage efforts included the jamming or shutting down of telecommunication infrastructures, important Ukrainian websites, and cell phones of key officials prior to the invasion. Through the use of large demonstrations called “snap exercises,” the Russians were able to mask military buildups along the border, as well as its political and military intentions. Russia further disguised their intentions and objectives by claiming adherence to international law, while also claiming victimization from the West’s attempts to destabilize, subvert, and undermine their nation.
By denying any involvement in Crimea until after the annexation was complete, distorting the facts surrounding the situation, and refraining from any declaration of war, Russia effectively infiltrated the international information domain and shaped the decision-making process of NATO countries to keep them out of the conflict. NATO nations ultimately chose minimal intervention despite specific evidence of Russia’s deliberate intervention in order to keep the conflict de-escalated. Despite the West’s refusal to acknowledge the annexation of Crimea, it could be argued that Russia achieved their objective of expanding its sphere of influence.
Vulnerabilities and Considerations
Russia is the U.S.’ current pacing threat, and China is projected to overtake Russia as the Nation’s primary threat as early as 2035. It is important to continue to evaluate the way that the U.S. and its Army respond to adversaries’ increasingly technological attempts to influence, in order to maintain the information and geopolitical superiority of the Nation. For example, the U.S. possesses different moral and ethical standards that restrict the use of information operations. However, because adversarial nations like Russia and China pervasively employ influence and deceptive measures in peacetime, the U.S. and its Army could benefit from developing alternative methods for maintaining an operational advantage against its adversaries.
Adversarial nations can also take advantage of “the[Western] media’swillingness to seek hard evidence and listen to both sides of an argument before coming to a conclusion” by “inserting fabricated or prejudicial information into Western analysis and blocking access to evidence.” The West’s free press will continue to be the primary counter to constructed narratives. Additionally,extensive training of U.S. military and Government personnel, in conjunction with educating its civilian population about Russia and China’s deceitful narratives may decrease the likelihood of perceptions being manipulated: “If the nation can teach the media to scrutinize the obvious, understand the military, and appreciate the nuances of deception, it may become less vulnerable to deception.” Other ways to exploit Russian and Chinese vulnerabilities could include taking advantage of poor operations security, as well as the use and analysis ofgeotags to refute and discredit Russian and Chinese propaganda narratives.
A final consideration involves the formation of an interagency committee, similar to theActive Measures Working Group from the 1980s, for the identification and countering of adversarial disinformation and propaganda. The coordination of the disinformation efforts by manipulative countries like Russia is pervasive and exhaustive. Thus, coordination of information operations and counter-propaganda efforts is likewise important between the U.S. Government, the Army, and the rest of the branches of the military. The passing of theCountering Foreign Propaganda and Disinformation Act, part of the 2017 National Defense Authorization Act, was an important first step in the continuing fight to counter foreign information and influence operations that seek to manipulate the U.S. and its decision-makers and undermine its national interests.
For more information on how adversaries will seek to shape perception in the Future Operational Environment, read the following related blog posts:
Taylor Galanides is a Junior at The College of William and Mary in Virginia, studying Psychology. She is currently interning at Headquarters, U.S. Army Training and Doctrine Command (TRADOC) with the G-2 Futures team.
On 19-20 June 2018, the U.S. Army Training and Doctrine Command (TRADOC) Mad Scientist Initiative co-hosted the Installations of the Future Conference with the Office of the Assistant Secretary of the Army for Installations, Energy and Environment (OASA (IE&E)) and Georgia Tech Research Institute (GTRI). Emerging technologies supporting the hyper-connectivity revolution will enable improved training capabilities, security, readiness support (e.g., holistic medical facilities and brain gyms), and quality of life programs at Army installations. Our concepts and emerging doctrine for multi-domain operations recognizes this as increasingly important by including Army installations in the Strategic Support Area. Installations of the Future will serve as mission command platforms to project virtual power and expertise as well as Army formations directly to the battlefield.
We have identified the following “Top 10” takeaways related to our future installations:
1. Threats and Tensions. “Army Installations are no longer sanctuaries” — Mr. Richard G. Kidd IV, Deputy Assistant Secretary of the Army, Strategic Integration. There is a tension between openness and security that will need balancing to take advantage of smart technologies at our Army installations. The revolution in connected devices and the ability to virtually project power and expertise will increase the potential for adversaries to target our installations. Hyper-connectivity increases the attack surface for cyber-attacks and the access to publicly available information on our Soldiers and their families, making personalized warfare and the use ofpsychological attacks and deep fakes likely.
2. Exclusion vs. Inclusion. The role of and access to future Army installations depends on the balance between these two extremes. The connections between local communities and Army installations will increase potential threat vectors, but resilience might depend on expanding inclusion. Additionally, access to specialized expertise inrobotics, autonomy, and information technologies will require increased connections with outside-the-gate academic institutions and industry.
3. Infrastructure Sensorization. Increased sensorization of infrastructure runs the risk of driving efficiencies to the point of building in unforeseen risks. In the business world, these efficiencies are profit-driven, with clearer risks and rewards. Use of table top exercises can explore hidden risks and help Garrison Commanders to build resilient infrastructure and communities. Automation can causecascading failures as people begin to fall “out of the loop.”
4. Army Modernization Challenge. Installations of the Future is a microcosm of overarching Army Modernization challenges. We are simultaneously invested in legacy infrastructure that we need to upgrade, and making decisions to build new smart facilities. Striking an effective and efficient balance will start with public-private partnerships to capture the expertise that exists in our universities and in industry. The expertise needed to succeed in this modernization effort does not exist in the Army. There are significant opportunities for Army Installations to participate in ongoing consortiums like the “Middle Georgia” Smart City Community and the Global Cities Challenge to pilot innovations in spaces such as energy resilience.
5. Technology is outpacing regulations and policy. The sensorization and available edge analytics in our public space offers improved security but might be perceived as decreasing personal privacy. While we give up some personal privacy when we live and work on Army installations, this collection of data will require active engagement with our communities. We studied an ongoing Unmanned Aerial System (UAS) supportconcept to detect gunshot incidents in Louisville, KY, to determine the need to involve legislatures, local political leaders, communities, and multiple layers of law enforcement.
6. Synthetic Training Environment. The Installation of the Future offers the Army significant opportunities to divest itself of large brick and mortar training facilities and stove-piped, contractor support-intensive Training Aids, Devices, Simulations, and Simulators (TADSS). MG Maria Gervais, Deputy Commanding General, Combined Arms Center – Training (DCG, CAC-T), presented the Army’sSynthetic Training Environment (STE), incorporating Virtual Reality (VR), “big box” open-architecture simulations using a One World Terrain database, and reduced infrastructure and contractor-support footprints to improve Learning and Training. The STE, delivering high-fidelity simulations and the opportunity for our Soldiers and Leaders to exercise all Warfighting Functions across the full Operational Environment with greater repetitions at home station, will complement the Live Training Environment and enhance overall Army readiness.
7. Security Technologies. Many of the security-oriented technologies (autonomous drones, camera integration, facial recognition, edge analytics, and Artificial Intelligence) that triage and fuse information will also improve our deployed Intelligence, Surveillance, and Reconnaissance (ISR) capabilities. The Chinese lead the world in these technologies today.
8. Virtual Prototyping. The U.S. Army Engineer Research and Development Center (ERDC) is developing a computational testbed using virtual prototypingto determine the best investments for future Army installations. The four drivers in planning for Future Installations are: 1) Initial Maneuver Platform (Force Projection); 2) Resilient Installations working with their community partners; 3) Warfighter Readiness; and 4) Cost effectiveness in terms of efficiency and sustainability.
9. Standard Approach to Smart Installations. A common suite of tools is needed to integrate smart technologies onto installations. While Garrison Commanders need mission command to take advantage of the specific cultures of their installations and surrounding communities, the Army cannot afford to have installations going in different directions on modernization efforts. A method is needed to rapidly pilot prototypes and then determine whether and how to scale the technologies across Army installations.
10. “Low Hanging Fruit.” There are opportunities for Army Installations to lead their communities in tech integration. Partnerships in energy savings, waste management, and early 5G infrastructure provide the Army with early adopter opportunities for collaboration with local communities, states, and across the nation. We must educate contracting officers and Government consumers to look for and seize upon these opportunities.
Videos from each of the Installations of the Future Conference presentations are posted here. The associated slides will be postedhere within the week on the Mad Scientist All Partners Access Network site.
If you enjoyed this post, check out the following:
[Editor’s Note: Mad Scientist Laboratory is pleased to publish the following guest blog post by Mr. Lewis Jones. Originally a “Letter Home” submission to theCall for Ideasassociated with the Mad Scientist Installations of the Future Conference (see more information about this event at the end of this post), we hope that you will enjoy Mr. Jones’ vision of a mid-Twenty First Century forward deployed base.]
Hey Dad, guess who got new PCS orders! From March 2042 I’ll be assigned to Joint Base Harris in Japan. You spent your early career in Japan, right? I’ll never forget your stories about Camp Zama, a sprawling installation housing hundreds of soldiers and civilians. I used to love hearing about the 2020s, when enemy sensors, drones, and artificial intelligence first wreaked havoc on operations there.
Remember the Garrison commander whose face was 3D-scanned by a rigged vending machine near the gate? The enemy released that humiliating videoright before a major bilateral operation. By the time we proved it was fake, our partners had already withdrawn.
What about the incident at the intel battalion’s favorite TDY hotel with a pool-side storage safe? Soldiers went swimming and tossed their wallets into the safe, unaware that anembedded scanner would clone their SIPR tokens. To make matters worse, the soldiers secured the safe with a four digit code… using the same numbers as their token PIN.
Oh, and remember the Prankenstein A.I. attack? It scanned social media to identify Army personnel living off-base, then called local law enforcement with fake complaints. The computer-generated voice was very convincing, even giving physical descriptions based on soldier’s actual photos. You said that one soured host-nation relations for years!
Or the drones that hovered over Camp Zama, broadcasting fake Wi-Fi hotspots. The enemy scooped up so much intelligence and — ah, you get the picture. Overseas bases were so vulnerable back then.
Well, the S1 sent me a virtual tour and the new base is completely different. When U.S. Forces Japan rebuilt its installations, those wide open bases were replaced by miniature, self-contained fortresses. Joint Base Harris, for example, was built inside a refurbished shopping mall: an entire installation, compressed into a single building!
Here’s what I saw on my virtual tour:
• The roof has solar panels and battery banks for independent power. There’s also an enormous greenhouse, launch pads for drones and helos, and a running trail.
• The ground level contains a water plant that extracts and purifies groundwater, along with indoor hydroponic farms. Special filtration units scrub the air; they’re even rated against CBRN threats.
• What was once a multi-floor parking garage is now a motor pool, firing range, and fitness complex. The gym walls are smart-screens, so you can work out in a different environment every day.
• Communications are encrypted and routed through a satellite uplink. The base even has its own cellphone tower. Special mesh in the walls prevent anybody outside from eavesdropping on emissions— the entire base is a SCIF.
• The mall’s shops and food court were replaced by all the features and functions of a normal base: nearly 2,000 Army, Air and Cyber Force troops living, working, and training inside. They even have a kitchen-bot in the chow hall that can produce seven custom meals per minute!
• Supposedly, the base extends several floors underground, but the tour didn’t show that. I guess that’s where the really secret stuff happens.
By the way, don’t worry about me feeling cooped up: Soldiers are assigned top-notch VR specs during in-processing. During the duty day, they’re only for training simulations. Once you’re off, personal use is authorized. I’ll be able to play virtual games, take virtual tours… MWR even lets you link with telepresence robots to “visit” family back home.
The sealed, self-contained footprint of this new base is far easier to defend in today’s high-tech threat environment. Some guys complain about being stuck inside, but you know what I think? If Navy sailors can spend months at sea in self-contained bases, then there’s no reason the Army can’t do the same on land!
If you were intrigued by this vision of a future Army installation, please plan on joining us virtually at the Mad Scientist Installations of the Future Conference, co-sponsored by the Office of the Assistant Secretary of the Army for Installations, Energy and Environment (OASA (IE&E)); Georgia Tech Research Institute (GTRI); and Headquarters, U.S. Army Training and Doctrine Command (TRADOC), at GTRI in Atlanta, Georgia, on 19-20 June 2018. Clickhere to learn more about the conference and then participate in the live-streamed proceedings, starting at 0830 EDT on 19 June 2018.
Lewis Jones is an Army civilian with nearly 15 years of experience in the Indo-Pacific region. In addition to his Japanese and Chinese language studies, he has earned a Masters in Diplomacy and International Conflict Management from Norwich University. He has worked as a headhunter for multinational investment banks in Tokyo, as a business intelligence analyst for a DOD contractor, and has supported the Army with cybersecurity program management and contract administration. Lewis writes about geopolitics, international relations, U.S. national security, and the effects of rapid advances in technology.
[Editor’s Note: The Operational Environment (OE) is the start point for Army Readiness – now and in the Future. The OE answers the question, “What is the Army ready for?” Without the OE in training and Leader development, Soldiers and Leaders are “practicing” in a benign condition, without the requisite rigor to forge those things essential for winning in a complex, multi-domain battlefield. Building the Army’s future capabilities, a critical component of future readiness, requires this same start point. The assumptions the Army makes about the Future OE are the sine qua non start point for developing battlefield systems — these assumptions must be at the forefront of decision-making for all future investments.]
There are no facts about the future. Leaders interested in building future ready organizations must develop assumptions about possible futures and these assumptions require constant scrutiny. Leaders must also make decisions based on these assumptions to posture organizations to take advantage of opportunities and to mitigate risks. Making these decisions is fundamental to building future readiness.
1. Contested in all domains (air, land, sea, space, and cyber). Increased lethality, by virtue of ubiquitous sensors, proliferated precision, high kinetic energy weapons and advanced area munitions, further enabled by autonomy, robotics, andArtificial Intelligence (AI)with an increasing potential for overmatch. Adversaries will restrict us to temporary windows of advantage with periods of physical and electronic isolation.
2. Concealment is difficult on the future battlefield. Hiding from advanced sensors — where practicable — will require dramatic reduction of heat, electromagnetic, and optical signatures. Traditional hider techniques such as camouflage, deception, and concealment will have to extend to “cross-domain obscuration” in the cyber domain and the electromagnetic spectrum. Canny competitors will monitor their own emissions in real-time to understand and mitigate their vulnerabilities in the “battle of signatures.” Alternately, “hiding in the open” within complex terrain clutter and near-constant relocation might be feasible, provided such relocation could outpace future recon / strike targeting cycles. Adversaries will operate among populations in complex terrain, including dense urban areas.
3. Trans-regional, gray zone, and hybrid strategies with both regular and irregular forces, criminal elements, and terrorists attacking our weaknesses and mitigating our advantages. The ensuing spectrum of competition will range from peaceful, legal activities through violent, mass upheavals and civil wars to traditional state-on-state, unlimited warfare.
4. Adversaries include states, non-state actors, and super-empowered individuals, with non-state actors and super empowered individuals now having access to Weapons of Mass Effect (WME), cyber, space, and Nuclear/Biological/ Chemical (NBC) capabilities. Their operational reach will range from tactical to global, and the application of their impact from one domain into another will be routine. These advanced engagements will also be interactive across the multiple dimensions of conflict, not only across every domain in the physical dimension, but also the cognitive dimension of information operations, and even the moral dimension of belief and values.
5. Increased speed of human interaction, events and action withdemocratized and rapidly proliferating capabilities means constant co-evolution between competitors. Recon / Strike effectiveness is a function of its sensors, shooters, their connections, and the targeting process driving decisions. Therefore, in a contest between peer competitors with comparable capabilities, advantage will fall to the one that is better integrated and makes better and faster decisions.
These assumptions become useful when they translate to potential decision criteria for Leaders to rely on when evaluating systems being developed for the future battlefield. Each of the following questions are fundamental to ensuring the Army is prepared to operate in the future.
1. How will this system operate when disconnected from a network? Units will be disconnected from their networks on future battlefields. Capabilities that require constant timing and precision geo-locational data will be prioritized for disruption by adversaries with capable EW systems.
2. What signature does this system present to an adversary? It is difficult to hide on the future battlefield and temporary windows of advantage will require formations to reduce their battlefield signatures. Capabilities that require constant multi-directional broadcast and units with large mission command centers will quickly be targeted and neutralized.
3. How does this system operate in dense urban areas? The physical terrain in dense urban areas and megacities creates concrete canyons isolating units electronically and physically. Automated capabilities operating in dense population areas might also increase the rate of false signatures, confusing, rather than improving, Commander decision-making. New capabilities must be able to operate disconnected in this terrain. Weapons systems must be able to slew and elevate rapidly to engage vertical targets. Automated systems and sensors will require significant training sets to reduce the rate of false signatures.
4. How does this system take advantage of open and modular architectures? The rapid rate of technological innovations will offer great opportunities to militaries capable of rapidly integrating prototypes into formations. Capabilities developed with open and modular architectures can be upgraded with autonomous and AI enablers as they mature. Early investment in closed-system capabilities will freeze Armies in a period of rapid co-evolution and lead to overmatch.
5. How does this capability help win in competition short of conflict with a near peer competitor? Near peer competitors will seek to achieve limited objectives short of direct conflict with the U.S. Army. Capabilities will need to be effective at operating in the gray zone as well as serving as deterrence. They will need to be capable of strategic employment from CONUS-based installations.
If you enjoyed this post, check out the following items of interest:
Join SciTech Futures‘ community of experts, analysts, and creatives on 11-18 June 2018 as they discuss the logistical challenges of urban campaigns, both today and on into 2035. What disruptive technologies and doctrines will blue (and red) forces have available in 2035? Are unconventional forces the future of urban combat? Their next ideation exercise goes live 11 June 2018 — click here to learn more!
[Editor’s Note: Mad Scientist Laboratory is pleased to present the following guest blog post by MAJ Chris Telley, U.S. Army, assigned to the Naval Postgraduate School, addressing how Artificial Intelligence (AI) must be understood as an Information Operations (IO) tool if U.S. defense professionals are to develop effective countermeasures and ensure our resilience to its employment by potential adversaries.]
AI-enabled IO present a more pressing strategic threat than the physical hazards ofslaughter-bots or even algorithmically-escalatednuclear war. IO areefforts to “influence, disrupt, corrupt, or usurp the decision-making of adversaries and potential adversaries;” here, we’re talking about using AI to do so. AI-guided IO tools can empathize with an audience to say anything, in any way needed, to change the perceptions that drive those physical weapons. Future IO systems will be able to individually monitor and affecttens of thousands of people at once. Defense professionals must understand the fundamental influence potential of these technologies if they are to drive security institutions to counter malign AI use in the information environment.
Programmatic marketing, using consumer’s data habits to drive real time automated bidding onpersonalized advertising, has been used for a few years now. Cambridge Analytica’sFacebooktargeting made international headlines using similar techniques, but digital electioneering is just the tip of the iceberg. An AI trained with data from users’ social media accounts, economic media interactions (Uber, Applepay, etc.), and their devices’ positional data can infer predictive knowledge of its targets. With that knowledge, emerging tools — likeReplika — can truly befriend a person, allowing it to train that individual, for good or ill.
Substantive feedback is required to train an individual’s response; humans tend to respond best to content and feedback with which they agree. That content can be algorithmically mass produced. For years, Narrative Science tools have helped writers create sports stories and stock summaries, but it’s just as easy to use them to create disinformation. That’s just text, though; today, the AI can create fake video. A recent warning, ostensibly from former President Obama, provides an entertaining yet frightening demonstration of how Deepfakes will challenge our presumptions about truth in the coming years. The Defense Advanced Research Projects Agency (DARPA) is funding aproject this summer to determine whether AI-generated Deepfakes will become impossible to distinguish from the real thing, even using other AI systems.
Given that malign actors can now employ AI to lie “at machine speed,” they still have to get the story to an audience. Russianbot armies continue to make headlines doing this very thing. The New York Times maintains about a dozen Twitter feeds and produces around 300 tweets a day, but Russia’s Internet Research Agency (IRA) regularly puts out25,000 tweets in the same twenty-four hours. The IRA’sbots are really just low-tech curators; they collect, interpret, and display desired information to promote the Kremlin’s narratives.
Next-generation bot armies will employ far faster computing techniques and profit from an order of magnitudegreater network speedwhen 5G services are fielded. If “Repetition is a key tenet ofIO execution,” then this machine gun-like ability to fire information at an audience will, with empathetic precision and custom content, provide the means to change a decisive audience’s very reality. No breakthrough science is needed, no bureaucratic project office required. These pieces arealready there, waiting for an adversary to put them together.
The DoD is looking at AI but remains focused on image classificationandswarming quadcopterswhile ignoring the convergent possibilities of predictive audience understanding, tailored content production, and massive scale dissemination. What little digital IO we’ve done, sometimes called social media “WebOps,” has been contractor heavy and prone to naïve missteps. However, groups like USSOCOM’sSOFWERX and the students at the Naval Postgraduate School are advancing the state of our art. At NPS, future senior leaders are working on AI, now. A half-dozen of the school’s departments have stood up classes and events specifically aimed at operationalizing advanced computing. The young defense professionals currently working on AI should grapple with emerging influence tools and form the foundation of the DoD’s future institutional capabilities.
MAJ Chris Telley is an Army information operations officer assigned to the Naval Postgraduate School. His assignments have included theater engagement at U.S. Army Japan and advanced technology integration with the U.S. Air Force. Chris commanded in Afghanistan and served in Iraq as a United States Marine. He tweets at @chris_telley.
This blog post represents the opinions of the author and do not reflect the position of the Army or the United States Government.
[Editor’s Note: The following post addresses the Era of Contested Equality (2035-2050) and is extracted from the U.S. Army Training and Doctrine Command (TRADOC) G-2’s The Operational Environment and the Changing Character of Future Warfare, published last summer. This seminal document provides the U.S. Army with a holistic and heuristic approach to projecting and anticipating both transformational and enduring trends that will lend themselves to the depiction of the future.]
Changes encountered during the Future Operational Environment’s Era of Accelerated Human Progress (the present through 2035) begin a process that will re-shape the global security situation and fundamentally alter the character of warfare. While its nature remains constant, the speed, automation, ranges, both broad and narrow effects, its increasingly integrated multi-domain conduct, and thecomplexityof the terrain and social structures in which it occurs will make mid-century warfare both familiar and utterly alien.
During the Era of Contested Equality (2035-2050), great powers and rising challengers have converted hybrid combinations of economic power, technological prowess, andvirulent, cyber-enabled ideologiesinto effective strategic strength. They apply this strength to disrupt or defend the economic, social, and cultural foundations of the old Post-World War II liberal order and assert or dispute regional alternatives to established global norms. State and non-state actors compete for power and control, often below the threshold of traditional armed conflict – or shield and protect their activities under the aegis of escalatory WMD, cyber, or long-range conventional options and doctrines.
It is not clear whether the threatsfaced in the preceding Era of Accelerated Human Progress persist, although it is likely that China and Russia will remain key competitors, and that some form of non-state ideologically motivated extremist groups will exist. Other threats may have fundamentally changed their worldviews, or may not even exist by mid-Century, while other states, and combinations of states will rise and fall as challengers during the 2035-2050 timeframe. The security environment in this period will be characterized by conditions that will facilitate competition and conflict among rivals, and lead to endemic strife and warfare, and will have several defining features.
• The nation-state perseveres. The nation-state will remain the primary actor in the international system, but it will be weaker both domestically and globally than it was at the start of the century. Trends of fragmentation, competition, and identity politics will challenge global governance and broader globalization, with both collective security and globalism in decline. States share their strategic environments with networked societies which increasingly circumvent governments unresponsive to their citizens’ needs. Many states will face challenges from insurgents and global identity networks – ethnic, religious, regional, social, or economic – which either resist state authority or ignore it altogether.
• Super-Power Diminishes. Early-century great powers will lose their dominance in command and control, surveillance, and precision-strike technologies as even non-state actors will acquire and refine their own application of thesetechnologies in conflict and war. Rising competitors will be able to acquire capabilities through a broad knowledge diffusion, cyber intellectual property theft, and their own targeted investments without having to invest into massive “sunken” research costs. This diffusion of knowledge and capability and the aforementioned erosion of long-term collective security will lead to the formation ofad hoc communities of interest. The costs of maintaining global hegemony at the mid-point of the century will be too great for any single power, meaning that the world will be multi-polar and dominated by complex combinations of short-term alliances, relations, and interests.
This era will be marked by contested norms and persistent disorder, where multiple state and non-state actors assert alternative rules and norms, which when contested, will use military force, often in a dimension short of traditional armed conflict.
For additional information on the Future Operational Environment and the Era of Contested Equality:
• Listen to Modern War Institute‘spodcast where Retired Maj. Gen. David Fastabend and Mr. Ian Sullivan address Technology and the Future of Warfare
The Mad Scientist Initiative brings together cutting-edge leaders and thinkers from the technology industry, research laboratories, academia, and across the military and Government to explore the impact of potentially disruptive technologies. Much like Johannes Gutenberg’s moveable type (illustrated above), these transformational game changers have the potential to impact how we live, create, think, and prosper. Understanding their individual and convergent impacts is essential to continued battlefield dominance in the Future Operational Environment. In accordance with The Operational Environment and the Changing Character of Future Warfare, we have divided this continuum into two distinct timeframes:
The Era of Accelerated Human Progress (Now through 2035):
The period where our adversaries can take advantage of new technologies, new doctrine, and revised strategic concepts to effectively challenge U.S. military forces across multiple domains. Game changers during this era include:
• Robotics: Forty plus countries develop military robots with some level of autonomy. Impact on society, employment. Vulnerable: To Cyber/Electromagnetic (EM) disruption, battery life, ethics without man in the loop. Formats: Unmanned/Autonomous; ground/air vehicles/subsurface/sea systems. Nano-weapons. Examples: (Air) Hunter/killer Unmanned Aerial Vehicle (UAV) swarms; (Ground) Russian Uran: Recon, ATGMs, SAMs.
• Artificial Intelligence: Human-Agent Teaming, where humans and intelligent systems work together to achieve either a physical or mental task. The human and the intelligent system will trade-off cognitive and physical loads in a collaborative fashion.
• Swarms/Semi Autonomous: Massed, coordinated, fast, collaborative, small, stand-off. Overwhelm target systems. Mass or disaggregate.
• Internet of Things (IoT): Trillions of internet linked items create opportunities and vulnerabilities. Explosive growth in low Size Weight and Power (SWaP) connected devices (Internet of Battlefield Things), especially for sensor applications (situational awareness). Greater than 100 devices per human. Significant end device processing (sensor analytics, sensor to shooter, supply chain management). Vulnerable: To Cyber/EM/Power disruption. Privacy concerns regarding location and tracking. Sensor to shooter: Accelerate kill chain, data processing, and decision-making.
• Space: Over 50 nations operate in space, increasingly congested and difficult to monitor, endanger Positioning, Navigation, and Timing (PNT)
GPS Jamming/Spoofing: Increasingly sophisticated, used successfully in Ukraine. Anti Satellite: China has tested two direct ascent anti-satellite missiles.
The Era of Contested Equality (2035 through 2050):
The period marked by significant breakthroughs in technology and convergences in terms of capabilities, which lead to significant changes in the character of warfare. During this period, traditional aspects of warfare undergo dramatic, almost revolutionary changes which at the end of this timeframe may even challenge the very nature of warfare itself. Game changers during this era include:
• Hyper Velocity Weapons: Rail Guns (Electrodynamic Kinetic Energy Weapons): Electromagnetic projectile launchers. High velocity/energy and space (Mach 5 or higher). Not powered by explosive. No Propellant: Easier to store and handle. Lower Cost Projectiles: Potentially. Extreme G-force requires sturdy payloads. Limiting factors: Power. Significant IR signature. Materials science. Hyper Glide Vehicles: Less susceptible to anti-ballistic missile countermeasures.
• Directed Energy Weapons: Signature not visible without technology, must dwell on target. Power requirements currently problematic. Potential: Tunable, lethal, and non-lethal. Laser: Directed energy damages intended target. Targets: Counter Aircraft, UAS, Missiles, Projectiles, Sensors, Swarms. Radio Frequency (RF): Attack targets across the frequency spectrum. Targets: Not just RF; Microwave weapons “cook targets,” people, electronics.
• Synthetic Biology: Engineering / modification of biological entities Increased Crop Yield: Potential to reduce food scarcity. Weaponization: Potential for micro-targeting, Seek & destroy microbes that can target DNA. Potentially accessible to super-empowered individuals. Medical Advances: Enhance soldier survivability. Genetic Modification: Disease resistant, potentially designer babies and super athletes/soldiers. Synthetic DNA stores digital data. Data can be used for micro-targeting. CRISPR: Genome editing.
• Information Environment: Use IoT and sensors to harness the flow of information for situational understanding and decision-making advantage.
In envisioning Future Operational Environment possibilities, the Mad Scientist Initiative employs a number of techniques. We have found Crowdsourcing (i.e., the gathering of ideas, thoughts, and concepts from a wide variety of interested individuals assists us in diversifying thoughts and challenging conventional assumptions) to be a particularly effective technique. To that end, we have published our latest, 2-page compendium of Potential Game Changershere — we would like to hear your feedback regarding them. Please let us know your thoughts / observations by posting them in this blog post’s Comment box (found below, in the Leave a Reply section). Alternatively, you can also submit them to us via email at: email@example.com. Thank you in advance for your contributions!
The Mad Scientist Initiative recently facilitated a workshop with thought leaders from across the Department of Defense, the Intelligence Community, other Government agencies, industry, and academia to address the unknown, unknowns (i.e., Black Swans) and the known, knowns (i.e., Pink Flamingos) to synthesize cross-agency thinking about possible disruptions to the Future Operational Environment.
Black Swans: In Nassim Nicholas Taleb’s original context, a black swan (unknown, unknowns) is an event or situation which is unpredictable, but has a major effect. For this conference, we used a looser definition, identifying possibilities that are not likely, but might have significant impacts on how we think about warfighting and security.
Pink Flamingos: Defined by Frank Hoffman, Pink Flamingos are the known, knowns that are often discussed, but ignored by Leaders trapped by organizational cultures and rigid bureaucratic decision-making structures. Peter Schwartz further describes Pink Flamingos as the “inevitable surprise.” Digital photography was a pink flamingo to Kodak.
At the workshop, attendees identified the following Black Swans:
• Naturally Occurring Disaster: These events (i.e., Carrington Event — solar flare frying solid state electronics, super volcano eruptions, earthquake swarms, etc.) would have an enormous impact on the Army and its ability to continue to operate and defend the nation and support national recovery operations. While warning times have increased for many of these events, there are limited measures that can be implemented to mitigate the devastating effects of these events.
• Virtual Nations: While the primacy of Westphalian borders has been challenged and the power of traditional nation-states has been waning over the last decade, some political scientists have assumed that supranational organizations and non-state actors would take their place. One potential black swan is the emergence of virtual nations due to the convergence of blockchain technologies, crypto-currency, and the ability to project power and legitimacy through the virtual world. Virtual nations could be organized based on ideologies, business models, or single interests. Virtual nations could supersede, supplement, or compete with traditional, physical nations. The Army of the future may not be prepared to interact and compete with virtual nations.
• Competition in Venues Other than Warfare (Economic, Technological, Demographic, etc.) Achieving Primacy: In the near future, war in the traditional sense may be less prevalent, while competitions in other areas may be the driving forces behind national oppositions. How does the Army need to prepare for an eventuality where armed conflict is not as important as it once was?
• Alternate Internet — “Alternet”: A distinct entity, separate from the general commercial internet, only accessible with specific corresponding hardware. This technology would allow for unregulated and unmonitored communication and commerce, potentially granting safe haven to criminal and terrorist activities.
At the workshop, attendees identified the following Pink Flamingos:
• Safe at Home: Army installations are no longer the sanctuaries they once were, as adversaries will be able to attack Soldiers and families through social media and other cyberspace means. Additionally, installations no longer merely house, train, and deploy Soldiers — unmanned combat systems are controlled from home installations -— a trend in virtual power that will increase in the future. The Army needs a plan to harden our installations and train Soldiers and families to be resilient for this eventuality.
• Hypersonics: High speed (Mach 5 or higher) and highly maneuverable missiles or glide vehicles that can defeat our air defense systems. The speed of these weapons is unmatched and their maneuverability allows them to keep their targets unknown until only seconds before impact, negating current countermeasures.
• Generalized, Operationalized Artificial Intelligence (AI):Artificial intelligence is one of the most prominent pink flamingos throughout global media and governments. Narrow artificial intelligence is being addressed as rapidly as possible through ventures such as Project MAVEN. However, generalized and operationalized artificial intelligence – that can think, contextualize, and operate like a human – has the potential to disrupt not only operations, but also the military at its very core and foundation.
• Space/Counterspace: Space is becoming increasingly congested, commercialized, and democratized. Disruption, degradation, and denial in space threatens to cripple multi-domain warfare operations. States and non-state actors alike are exploring options to counter one another, compete, and potentially even fight in space.
• Quantum Sciences: Quantum science – communication, computing, and sensing – has the potential to solve some intractable but very specific problem sets. Quantum technology remains in its infancy. However, as the growth of qubits in quantum computing continues to expand, so does the potentiality of traditional encryption being utterly broken. Quantum sensing can allow for much more precise atomic clocks surpassing the precision timing of GPS, as well as quantum imaging that provides better results than classical imaging in a variety of wavelengths.
• Bioweapons/Biohacking: The democratization of bio technology will mean that super-empowered individuals as well as nation states will have the ability to engineer weapons and hacks that can augment friendly human forces or target and degrade enemy human forces (e.g., targeted disease or genetic modifications).
• Personalized Warfare: Warfare is now waged on a personal level, where adversaries can attack the bank accounts of Soldiers’ families, infiltrate their social media, or even target them specifically by their genetics. The Army needs to understand that the individual Soldier can be exploited in many different ways, often through information publicly provided or stolen.
• Deep Fakes/Information Warfare: Information warfare and “fake news” have played a prominent role in global politics over the last several years and could dominate the relationship between societies, governments, politicians, and militaries in the future operational environment. Information operations, thanks to big data and humanity’s ever-growing digital presence, are targeted at an extremely personal and specific level. One of the more concerning aspects of this is an artificial intelligence-based human image/voice synthesis technique known as deep fakes. Deep fakes can essentially put words in the mouths of prominent or trusted politicians and celebrities.
• Multi-Domain Swarming: Swarming is often thought about in terms of unmanned aerial systems (UAS), but one significant pink flamingo is swarming taking place across multiple domains with self-organizing, autonomous aerial, ground, maritime (sub and surface), and even subterranean unmanned systems. U.S. defense systems on a linear modernization and development model will not be capable of dealing with the saturation and complexity issues arising from these multi-domain swarms.
• Lethal Autonomy: An autonomous system with the ability to track, target, and fire without the supervision or authority of a human in/on the loop. The U.S. Army will have to examine its own policy regarding these issues as well as our adversaries, who may be less deterred by ethical/policy issues.
• Tactical Nuclear Exchange: While strategic nuclear war and mutually assured destruction have been discussed and addressed ad nauseam, not enough attention has been given to the potential of a tactical nuclear exchange between state actors. One tactical nuclear attack, while not guaranteeing a nuclear holocaust, would bring about a myriad of problems for U.S. forces worldwide (e.g., the potential for escalation, fallout, contamination of water and air, and disaster response). Additionally, a high altitude nuclear burst’s electromagnetic pulse has the potential to fry solid state electronics across a wide-area, with devastating results to the affected nation’s electrical grid, essential government services, and food distribution networks.
Leaders must anticipate these future possibilities in determining the character of future conflicts and in force design and equipping decisions. Using a mental model of black swans and pink flamingos provides a helpful framework for assessing the risks associated with these decisions.