Category Archives: Military Analytics

Decision Dominance: AI and the Transformation of the OODA Loop in Combat

The 21st-century strategic competition is increasingly defined not by mass or industrial might, but by the speed and quality of decision-making. The foundational framework for understanding this competition is Colonel John Boyd’s OODA loop—Observe, Orient, Decide, Act. For decades, military doctrine has focused on “getting inside” an opponent’s loop, operating at a tempo that shatters their ability to cohere. Today, Artificial Intelligence (AI) is compressing this human-scale cognitive process into a machine-speed automated cycle, fundamentally altering the character of war.

This report provides a strategic analysis of this transformation. It first reviews the OODA loop as a framework for competitive advantage, clarifying that its center of gravity is not merely speed, but superior “Orientation.” It then provides an exhaustive, phase-by-phase assessment of how specific AI technologies are revolutionizing the entire combat engagement lifecycle.

The analysis finds:

  1. AI is the Engine of Modern C2: The U.S. Department of Defense’s (DoD) Joint All-Domain Command and Control (JADC2) concept is the architectural-technological manifestation of the OODA loop. Its guiding maxim—”Sense, Make Sense, Act”—is a direct map to “Observe, Orient, Act.”
  2. A “Super-OODA Loop”: AI is automating and accelerating each phase. In the Observe phase, AI-driven sensor fusion and Automated Target Recognition (ATR)—exemplified by Project Maven—solve the data-deluge bottleneck, allowing persistent, all-domain surveillance. In the Orient phase, predictive analytics and AI-curated operational pictures provide “sense-making” at a scale no human staff can match. In the Decide phase, AI tools generate thousands of optimized Courses of Action (COAs) in seconds, shifting the commander’s role from generation to judgment. In the Act phase, autonomous systems, loitering munitions, and drone swarms execute decisions with unprecedented precision and speed.
  3. The “Centaur” Imperative: The strategic objective is Decision Dominance—the ability to decide and act more effectively and rapidly than any adversary. This is not achieved by replacing humans, but by creating “Strategic Centaurs”: a hybrid-intelligence partnership where AI handles data processing and speed, freeing human commanders to provide the “appropriate human judgment” mandated by DoD policy (DoD Directive 3000.09). The common refrain of a “human-in-the-loop” is a dangerously misleading myth; the reality is a far more complex human-machine team.
  4. The Paradox of Algorithmic Warfare: This new “Super-OODA Loop” creates profound new vulnerabilities. By automating the loop, it transforms the loop itself into a high-value attack surface. The very AI models used for “Observe” and “Orient” are susceptible to adversarial attacks, such as “evasion” (hiding targets from AI) and “data poisoning” (corrupting AI’s “brain” before a conflict). In this paradigm, a faster loop can become a liability, leading to a “millisecond compromise” where a force, blinded by its own corrupted AI, simply loses faster.

The strategic imperative for the DoD is therefore twofold: first, to aggressively pursue the technical capabilities for AI-driven decision dominance, and second, to simultaneously build the adaptive doctrine, rigorous training, and resilient “Red Team” processes necessary to manage the vulnerabilities of this new algorithmic age.


Part I: The OODA Framework – A Primer on Tempo and Strategic Advantage

Introduction: The Origins and Purpose of Boyd’s Loop

To understand the revolution Artificial Intelligence (AI) is bringing to modern warfare, one must first understand the framework it is revolutionizing. This is the OODA loop, a decision-making model developed by U.S. Air Force Colonel John Boyd.1 The loop consists of four stages: Observe (absorbing new information), Orient (processing observations against a “repertoire” of experience), Decide (selecting a course of action), and Act (implementing the decision).3

Boyd, a renowned strategist and fighter pilot, developed this concept from his experiences in the Korean War and his deep research into aerial combat tactics.6 His foundational work on Energy-Maneuverability Theory modeled aircraft performance 3, but the OODA loop became his universal theory for success in any competitive, rapidly changing, or chaotic environment.2

Crucially, the OODA loop is not a simple, linear checklist. It is a highly iterative and fluid feedback model.1 Boyd’s diagrams show feedback paths from every stage to every other, emphasizing continuous adaptation and learning.1 His core concepts, disseminated primarily through his briefings “A Discourse on Winning and Losing,” have become foundational to modern military strategy, business, law enforcement, and cyberwarfare.1

The Strategic Goal: “Getting Inside the Enemy’s Decision Cycle”

The purpose of the OODA loop in a conflict setting is not merely to make a decision; it is to win. Boyd’s central thesis was that victory is achieved by “getting inside the opponent’s decision cycle”.1 This means an entity—whether a pilot, a commander, or an entire organization—that can process its entire OODA loop more quickly, more effectively, and more relevantly than its opponent gains an insuperable advantage.1

This is a psychological and temporal attack. By operating at a faster and more effective tempo, one can observe and react to unfolding events so rapidly that the opponent’s own observations become obsolete before they can act on them. The adversary’s actions, when they finally come, are out of sync with reality. Boyd described this desired end state in stark terms: to “operate inside adversary’s observation-orientation-decision-action loops to enmesh adversary in a world of uncertainty, doubt, mistrust, confusion, disorder, fear, panic, chaos”.10

The goal is to “fold adversary back inside himself so that he cannot cope with events/efforts as they unfold”.10 The opponent is forced to react to a reality that has already changed, leading to a cascading collapse of their decision-making capability. One metaphor for this process is the “OODA cable,” which visualizes decisions flowing like electrical current through the loop, with the “Observe” phase being the thickest cable, gathering the most strands of information.11 By disrupting this flow anywhere, one can short-circuit the entire system.

Orientation as the Center of Gravity (Not Just Speed)

A common and dangerous misinterpretation of the OODA loop is that it is a simple race for speed. This reductionist view—that the fastest combatant always prevails—is historically false. Speed without direction is mere haste. The ill-fated Schlieffen Plan in World War I and General MacArthur’s rapid, unsupported drive into North Korea in 1950 are prime examples where a focus on speed, at the expense of flexibility and accurate orientation, led to strategic catastrophe.6

Boyd himself did not prioritize raw speed; he prioritized Orientation. This is the “mental tapestry” (as Boyd called it) of changing intentions that harmonizes effort.2 It is the most critical and complex phase in the loop.2 While Observation is the gathering of raw data, Orientation is the “process” of turning that data into understanding.2 It involves integrating new observations with a “repertoire” of existing mental models, cultural biases, and past experiences to form an accurate perception of the world.3

This is the loop’s center of gravity. A superior orientation allows a combatant to make better decisions, not just faster ones. In fact, a combatant with a superior “orientation advantage” can actually operate at a slower tempo and still win by ensuring their actions are more relevant and more surprising.12 True mastery of the loop, which Boyd’s contemporaries called Fingerspitzengefuhl or “fingertip feeling,” comes from a deep, intuitive orientation.13 This mastery is what allows a commander to seemingly bypass the explicit “Orient” and “Decide” steps and achieve “deliberate speed”—acting almost simultaneously with observing, because the orientation is already so deeply ingrained.2

This primacy of the “Orient” phase is the single most important concept to grasp when analyzing the impact of AI. The modern battlespace is not a contest of simple speed, but a contest of orientation—and it is this cognitive phase that AI promises to, and threatens to, revolutionize.


Part II: Algorithmic Warfare: AI’s Revolution of the Combat Lifecycle

Introduction: From Cognitive Loop to Algorithmic Cycle

Artificial Intelligence is fundamentally altering the character of warfare.14 This transformation is not about a single new weapon, but about the process of combat itself. AI is injecting machine-speed computation into every phase of Boyd’s OODA loop, transforming it from a human-centric cognitive cycle to a human-machine algorithmic one.16

The U.S. Department of Defense’s (DoD) capstone concept for this new era is Joint All-Domain Command and Control (JADC2).17 JADC2 is, for all practical purposes, the DoD’s architectural and technological embodiment of the OODA loop.10 Its stated goal is to enable the Joint Force to “sense,” “make sense,” and “act” on information at the “speed of relevance”.18 This “Sense, Make Sense, Act” paradigm is a direct modernization of Boyd’s “Observe, Orient, Act”.20

The entire JADC2 strategy is built on the premise of using automation and AI to “act inside an adversary’s decision cycle”.22 The following sections will analyze, phase by phase, exactly how AI is executing this vision.

Table 1: The AI-Driven Transformation of the OODA Loop

OODA PhaseConventional Process (Human-Scale)AI-Driven Transformation (Machine-Speed)Key Enabling Technologies & Programs
OBSERVEIntermittent human-led ISR (patrols, singular sensor feeds); manual data processing.Persistent, all-domain, autonomous sensing and data exploitation.JADC2 Sensor Grid 23, AI-Enabled Sensor Fusion 24, Persistent Surveillance 25, Project Maven 26, Automated Target Recognition (ATR).27
ORIENTManual staff analysis; high “fog of war”; slow, linear planning (e.g., the Millitary Decision Making Process (MDMP)).Automated data processing; predictive sense-making; AI-curated Common Operational Picture.AI Data Analysis 14, Predictive Analytics 29, AI-Augmented MDMP 30, AI-COP.31
DECIDECommander’s deliberation based on 2-3 human-generated Courses of Action (COAs).AI-augmented decision support; real-time generation and wargaming of thousands of optimized COAs.COA-GPT 32, AI Wargaming 33, AI Decision Support Systems (DSS).31
ACTHuman-in-the-loop kinetic/non-kinetic action; pre-planned fires.Autonomous and semi-autonomous execution; coordinated swarming; “human-on-the-loop” supervision.Autonomous Weapon Systems (AWS) 36, AI-Powered Drone Swarms 37, Loitering Munitions 38, AI-Directed Electronic Warfare (EW) & Cyber.39
Note there is a glossary with all abbreviations explained

The “Observe” Phase: From Human Sentry to Omniscient Sensor Grid

In conventional warfare, the “Observe” phase is defined by bottlenecks. Platoons on patrol, single-sensor UAV feeds, and periodic satellite passes create an intermittent, incomplete, and human-intensive picture of the battlefield. The JADC2 architecture, powered by AI, seeks to shatter this paradigm by creating an integrated, persistent, and all-domain sensor grid.23

AI-Enabled Sensor Fusion

In a multi-domain battlespace, a commander is inundated with data from land, air, sea, space, and cyber sensors.41 This data is often conflicting, in different formats, and arrives at different times.31 AI’s first and most critical job in the “Observe” phase is sensor fusion: the use of algorithms to “connect information streams” 41 and “squeeze more insight” from existing assets.24 AI-enabled fusion can rapidly bring together large numbers of sensors from manned and unmanned systems 24, integrating multi-domain data 42 from RADAR, LIDAR, spectroscopy, and imagery 43 to resolve conflicting reports and create a single, clear, and accurate picture.20

Persistent, Autonomous Surveillance

AI enables a shift from “intermittent” to “persistent” observation. Autonomous systems, such as the Sentry tower, use AI-enabled edge processing and a suite of sensors to “autonomously identify, detect and track objects of interest” 24/7 across land, sea, and air.25 AI algorithms allow these systems to monitor vast areas with minimal human intervention.44 Swarms of drones, for example, can collaborate, share data, and adapt to changing environments to provide a resilient and continuous surveillance solution.44

Case Study: Project Maven (Automating Observation)

The most powerful illustration of AI in the “Observe” phase is Project Maven.47 Established as the DoD’s “pathfinder” for operational AI 48, Maven was created to solve a critical bottleneck: the “PED” (Processing, Exploitation, and Dissemination) of intelligence.49 The DoD’s ability to collect data, particularly full-motion video (FMV) from UAVs, had exponentially outpaced its ability to process it.49 There was simply “too much data for the analyst workforce to manage”.49

Project Maven employs computer vision algorithms 48 to automate this PED process. Its core technology is Automated Target Recognition (ATR).27 AI and machine learning algorithms are trained to autonomously scan FMV and satellite imagery to “detect, classify, and identify” objects of interest—such as a specific “battle tank” versus a “civilian vehicle”.26

The impact is a radical acceleration of the “Observe-to-Orient” pipeline. With Maven, AI can perform multiple steps of the “kill chain” autonomously.26 A senior targeting officer, who could previously process 30 targets per hour, can now process 80 targets per hour with AI support. Furthermore, this is achieved with a targeting cell of 20 people, whereas a comparable effort during Operation Iraqi Freedom required a staff of 2,000.26

This case study reveals the true nature of AI’s role in observation. It is not just about better cameras or more drones. It is about automating the exploitation of the data they collect. AI-driven observation, as exemplified by Maven, doesn’t just improve the OODA loop; it makes the loop possible in the modern, data-saturated battlespace. Without it, the loop would collapse under the sheer weight of its own data, which often overwhelms human staffs and creates a “fog of war” from an overabundance of information.28

The “Orient” Phase: From Fog of War to Predictive Sense-Making

The “Orient” phase, Boyd’s center of gravity, is where raw observation is turned into actionable understanding. This is the “make sense” in the JADC2 framework.18 Historically, this phase is the source of the Clausewitzian “fog of war,” where uncertainty, friction, and “cascades of information” 28 paralyze human staffs. AI offers to dispel this fog by processing data at a scale and speed that is superhuman.

Taming the Data Deluge

The modern battlespace is defined by a data deluge that can overwhelm human cognition.28 While some analysts warn that AI may simply replace the “fog of war” with a new “fog of systems” 52, the primary goal of military AI is to do the opposite. AI algorithms are designed to rapidly process and analyze “vast amounts of data” 30 from diverse sources 14 to provide commanders with a “clearer picture” 23 and “comprehensive situational awareness”.19

The AI-Curated Common Operational Picture (COP)

The key output of this process is the Common Operational Picture (COP). A conventional COP is a static, manually updated map. An AI-curated COP is a living, dynamic, and tailorable “all-domain” picture.55 AI algorithms fuse data from all domains 31 to create a real-time, shared understanding of the battlespace. This AI-enhanced awareness can be decentralized, allowing even “the smallest tactical teams and units” to maintain “excellent situational awareness” 55, enabling a new level of mission command.

Predictive Analytics: Forecasting Enemy COAs

The most revolutionary aspect of AI in the “Orient” phase is its ability to move from reaction to prediction. Using deep learning and multifactor analysis 29, AI models can be trained on adversary doctrine, historical data, and real-time intelligence to predict enemy behavior.57

These predictive models can:

  • Identify subtle enemy behavior patterns.29
  • Detect preparations for an offensive.29
  • Assess enemy combat readiness.29
  • Instantly revise an enemy’s most likely course of action based on new contact reports.59

This capability allows a commander to “outthink” the adversary 58 and begin orienting to the next fight, not the current one. This is the very definition of seizing the initiative and getting inside the enemy’s loop.

The Human Judgment Complement

However, AI is not a panacea for orientation, and this is where the “fog of systems” concern becomes relevant.52 AI is a tool for prediction, but it is not a substitute for judgment.60 As researchers from the Georgia Institute of Technology note, the “hard problems in war are strategy and uncertainty”.61 AI models are only as good as the data they are trained on.60 An adversary will, by definition, “go beyond the training set” by creating novel situations.60

In these moments of high uncertainty and novelty, human “sense-making” and “moral, ethical, and intellectual decisions” remain irreplaceable.61 The “Orient” phase therefore becomes a complex human-machine team. The human commander’s role shifts from data processor (a role the AI has taken) to chief arbiter of AI-generated insights. This new role requires a deep understanding of the AI’s limitations 63 and a new level of critical thinking 64 to know when to trust the machine and when to override it.

The “Decide” Phase: From Deliberation to Algorithmic Recommendation

The “Decide” phase is where a commander, having been “Oriented” by their staff, commits to a Course of Action (COA). The U.S. Army’s traditional Military Decision-Making Process (MDMP) is a human-staff-intensive, time-consuming, and linear process.30 In an AI-driven conflict, this legacy framework is too slow.30 AI promises to accelerate this phase from a matter of days or hours to a matter of seconds.

AI-Powered Decision Support Systems (DSS)

The most common application of AI in this phase is the Decision Support System (DSS).35 These are AI tools that ingest the fused data from the “Orient” phase, simulate outcomes 41, and provide “real-time recommendations” to human decision-makers.31 By highlighting threats, suggesting optimal weapon-target pairings, and ranking COAs, these systems “reduce cognitive burden” 41 and “reduce the mental load for operators” 66, allowing commanders to focus on the decision itself.

Automated COA Generation and Wargaming

The true leap forward is the automation of the MDMP itself. AI is being designed to augment or replace nearly every step:

  1. Mission Analysis: AI rapidly processes intelligence to provide a comprehensive understanding of the operational environment.30
  2. COA Development: Instead of a human staff laboring to create 2-3 COAs, AI can “generate a broader spectrum of COAs” 30 by considering “a greater number of factors and permutations than is feasible with traditional manual methods”.30
  3. COA Analysis (Wargaming): AI can then “wargame” these COAs iteratively to analyze potential outcomes.32
  4. Orders Production: AI can “produce and disseminate all downstream orders” automatically, saving hundreds of man-hours.30

Tools like COA-GPT leverage large language models (LLMs) to allow commanders to “input mission specifics… receiving multiple, strategically aligned COAs in a matter of seconds”.32 DARPA’s Strategic Chaos Engine for Planning, Tactics, Experimentation and Resiliency (SCEPTER) program is developing similar technologies for accelerated COA adjudication.69

The impact on tempo is staggering. An Air Force experiment (DASH 2) demonstrated that AI-enabled teams produced COA recommendations in less than ten seconds and generated 30 times more options than human-only teams. In one hour, two AI vendors produced over 6,000 solutions for roughly 20 problems, with accuracy on par with human performance.70

This changes the fundamental nature of the commander’s decision. The cognitive load is not removed; it is shifted. The commander’s task is no longer to generate a good plan. Their task is to judge between thousands of machine-optimized plans, selecting the one that best matches their human intuition, strategic intent, and risk tolerance.13 This is a high-stakes task, especially when the AI’s reasoning may be a “black box” 30, placing an even greater premium on the commander’s experience.

The “Act” Phase: From Human Trigger-Pull to Autonomous Execution

The “Act” phase is the physical implementation of the decision. AI is transforming this phase by enabling systems to “act” with unprecedented speed, precision, and coordination, often without a human directly in the decision loop at the moment of engagement.

Autonomous Weapon Systems (AWS)

An Autonomous Weapon System (AWS) is formally defined as “a weapon system that, once activated, can select and engage targets without further intervention by an operator”.73 While most current military robots are remotely piloted 36, true AWS are emerging that can execute the “Act” phase on their own, guided by AI algorithms.76

Loitering Munitions (Kamikaze Drones)

The most prevalent example of AI in the “Act” phase is the loitering munition. These systems combine the roles of surveillance and strike into a single platform.38 They can “loiter” over a target area, using their onboard AI to autonomously hunt for targets.

  • Advanced AI chips 77 enable these systems to “autonomously detect, track and engage targets” 78, reducing human workload and shortening the decision cycle.78
  • Systems like Israel’s Spike missile family 78, Harpy and Harop anti-radiation drones 79, and Turkey’s Kargu-2 37 use AI for terminal guidance, autonomous targeting, and precision strikes, even in GPS-denied environments.78

AI-Powered Drone Swarms

Perhaps the most disruptive “Act” capability is the AI-driven drone swarm. This is a new form of “mass” where “swarm intelligence”—inspired by biological systems like ants or bees 37—is used to coordinate the actions of dozens or thousands of simple, cheap, and expendable drones.37

  • AI allows these drones to collaborate, share data, and adapt to losses.37
  • A swarm can overwhelm traditional, expensive air defense systems 37 and execute missions with a high tolerance for attrition.
  • The U.S. (Pentagon’s Replicator program), China, and others are in a race to field this technology.37 This is leading to entirely new forms of combat, such as human-machine teaming (manned aircraft “quarterbacking” AI-piloted drones) 82 and the prospect of “swarm versus swarm” combat.84

Non-Kinetic Action (EW & Cyber)

The “Act” phase is not just kinetic. AI can “act” in the cyber and electromagnetic domains. Cognitive Electronic Warfare (CEW) uses AI and machine learning for “autonomous threat detection, electronic attack, and adaptive response”.40 An AI-driven EW system can, for example, detect a new, unknown enemy radar signal, classify it as a threat, and begin “adaptive jamming” against it, all without human intervention.40 Similarly, AI can be used to autonomously defend networks 41 or direct sophisticated, high-speed cyberattacks.39


Part III: Achieving Decision Dominance: The “Super-OODA Loop” and Its Consequences

The New Battle for Tempo: The “Super-OODA Loop”

The collective result of injecting AI into every phase of the OODA loop is the creation of a “Super-OODA Loop”.87 This is a decision-action cycle that operates at machine speed, capable of processing information and executing tasks “in environments requiring split-second decisions beyond human cognitive limits”.87

This new reality has ignited a 21st-century “AI arms race”.15 Adversaries, particularly China and Russia, are aggressively pursuing AI to enhance the speed, reach, and lethality of their own operations.30 The strategic prize in this new race is not territorial advantage or industrial superiority, but “Decision Dominance”.30

Decision Dominance is the ability to “analyze and contextualize vast streams of structured and unstructured data… to make the right decisions across the Kill Chain faster, more accurately, and more effectively than our adversaries”.91 It is the modern manifestation of Boyd’s “getting inside the enemy’s loop.” The side that achieves decision dominance “owns the tempo and dictates the terms of the fight”.93 This is why the DoD has made AI-enabled decision-making a top strategic priority, allocating $1.8 billion for AI programs in fiscal year 2025.92

This new, AI-driven tempo demands a fundamental shift in doctrine, moving away from slow, sequential warfare and toward “parallel and simultaneous all-domain warfare” that can “generate maximum chaos, friction, and disorientation for the adversary”.55

Redefining Command: Human Judgment in Algorithmic Warfare

The compression of the OODA loop to machine speed raises the single most important question for military strategists: What is the role of the human commander? This has led to widespread and confused discussion about “human-in-the-loop” systems.

The “Human-in-the-Loop” Myth

It is critical to correct a pervasive myth. A common refrain from defense officials is that DoD policy will “always have a human in the loop” to reassure audiences concerned about “killer robots”.94

This statement is factually incorrect. That is not DoD policy.94

The words “human in the loop” do not appear in the governing DoD directive, and this omission was intentional.73 The “loop” language is seen as a “machine-centric” and “misguided” framing 94 that “misrepresents the nature of AI warfare”.94 It creates “unnecessary confusion” 73 by implying a level of continuous tactical oversight that is not even required for existing conventional weapons (e.g., a “fire and forget” missile).73

The Real Framework: DoD Directive 3000.09 and “Appropriate Human Judgment”

The actual U.S. policy is DoD Directive 3000.09, “Autonomy in Weapon Systems” 95, which was updated in 2023.73 This policy does not require a human “in” the loop. It requires “appropriate levels of human judgment over the use of force”.73

This is a profound and crucial distinction. The policy’s focus is on accountability, not on a specific technical “loop” configuration. As former Secretary of Defense Ash Carter, who wrote the original 2012 directive, explained, the reply “the machine did it” for a tragic, unintended engagement is “unacceptable and immoral”.96 The directive is designed to ensure that a human is always accountable for the decision to employ force, even if the system itself is autonomous.97

“In” vs. “On” the Loop: A More Useful C2 Distinction

While “human-in-the-loop” is not a formal policy term, a more nuanced (though still informal) framework is used by C2 and ethics specialists to describe the actual levels of human involvement 97:

  • Human-in-the-loop: The human is a direct part of the decision cycle. The AI may identify a target, but a human operator must make the final decision to “engage” before the system can act. This preserves human judgment but is slow.
  • Human-on-the-loop: The human is a supervisor. The AI-powered system is authorized to “select and engage” targets autonomously within a set of pre-defined, human-authorized constraints (e.g., rules of engagement, geographic boundaries, target types). The human “oversees” this autonomous operation and has the ability to intervene or “call off” the system.97
  • Human-out-of-the-loop: The human defers all decisions to the autonomous system.97 This is already the standard for defensive systems where the engagement “tempo” is physically impossible for a human to manage, such as a ship’s Phalanx Close-In Weapon System (CIWS) shooting down an incoming anti-ship missile 99, or the Aegis Combat System.97 The human sets the system to “auto,” and the machine does the rest.

The “on-the-loop” model, supported by trusted and reliable AI, is seen as the most likely future for C2, as it balances the need for machine speed with the requirement for human oversight.98

This is not about “humans versus machines”.100 It is about designing smarter human-machine partnerships.19 The goal is to create what chess grandmaster Garry Kasparov called a “centaur”: a human-plus-machine team.71 Kasparov found that a good human player paired with a good AI could beat even the best “AI-only” supercomputer.

This is the “Strategic Centaur” model.93 In this model, the AI is a “computer partner” that handles the “laborious calculations” of data processing, target recognition, and COA analysis.66 This frees the human commander to “concentrate on strategic planning” 71, “creativity, judgment, innovation” 100, and the “moral, ethical, and intellectual decisions” for which they, and they alone, are responsible.61


Part IV: The Paradox of Algorithmic Warfare: New Vulnerabilities and Strategic Risks

Introduction: The OODA Loop as an Attack Surface

The pursuit of a machine-speed “Super-OODA Loop” is not without profound risks. An expert-level analysis must “red team” its own conclusions. While AI promises unprecedented “decision dominance,” it also introduces catastrophic new vulnerabilities.

By making the OODA loop faster, more complex, and more reliant on automated, algorithmic processes, we have simultaneously transformed the OODA loop itself into a single, high-value, integrated attack surface.101

The AI systems that power our “Observe” and “Orient” phases are not infallible. They are software, and software has vulnerabilities. But unlike traditional software, AI vulnerabilities are not just “bugs”; they are fundamental weaknesses in the AI’s “perception” of reality. An adversary who can exploit these weaknesses does not need to outrun our OODA loop; they can hijack it.

The “Brittleness” of AI: When Models “Go Beyond the Training Set”

The first and most fundamental vulnerability is passive: AI models are “brittle”.30 An AI model—whether for target recognition or enemy COA prediction—is only as good as the data it was trained on.104 These training sets, whether based on synthetic data or “Wikipedia battle narratives” 105, are finite.

War, by its very nature, is a chaotic, novel, and adversarial environment.60 The enemy’s job is to create a situation for which the AI has no “prior example”.60 When an AI system encounters data “outside its training distribution,” it can fail in “bizarre” 106 and unpredictable ways. This includes “hallucinations”—where a model generates plausible-sounding but factually false information.107

An AI-driven targeting system that achieves 99% accuracy in testing 107 is useless if it fails catastrophically in the 1% of combat situations that are novel and high-stakes. This “brittleness” means a commander can never be 100% certain that what their AI-driven “Orient” phase is telling them is true.

The Adversarial Loop: Actively Hacking the OODA Cycle

More dangerous than passive failure is active adversarial attack. An adversary can use “adversarial AI” techniques 108 to target specific phases of our OODA loop.

1. Attacking the “Observe” Phase (Evasion Attacks)

An “evasion attack” 109 is designed to fool an AI’s “senses.” Adversaries can analyze our AI models to find their “blind spots” and then craft “adversarial inputs” to exploit them.108

For example, researchers have famously 3D-printed a turtle with a specific pattern that a Google AI model consistently misclassified as a “rifle”.110 In a military context, an adversary could develop “adversarial patches” or camouflage patterns for their tanks that cause our AI-powered ATR systems to misidentify them as “school buses” 111 or, even worse, misidentify our own friendly vehicles as “enemy” targets.112 This attack shatters the “Observe” phase, making our forces blind to threats and friendly-fire risks. While some analysis suggests these attacks are difficult to deploy in the “real world” 110, the threat remains a critical vulnerability.

2. Attacking the “Orient” Phase (Data Poisoning)

The most insidious and strategically dangerous threat is “data poisoning”.109 This is an attack on the AI’s training data, which occurs long before a conflict ever begins.

An adversary who gains access to our training data can covertly “inject malicious data” 109 to build a “hidden weakness or backdoor” into the finished AI model.113 This compromised model may pass all standard tests, but it will have a secret vulnerability that the enemy can later exploit.

For example, an adversary could subtly “poison” years of our ISR data to teach our predictive “Orient” models that a specific “surrender” formation is actually a high-priority “attack” formation.115 In the opening hours of a conflict, the enemy would display this formation, and our own AI would confidently—and incorrectly—orient our commanders to a false reality, urging them to fall into a trap or commit a war crime. This attack creates a fundamental “mistrust” in targeting algorithms, forcing a reversion to slower, human-only processes and ceding the tempo advantage.115

The “Millisecond Compromise”

This brings the analysis to its most critical point. The entire purpose of the “Super-OODA Loop” (Part III) is to achieve speed. But as security analyst Bruce Schneier argues, this speed can itself be a vulnerability.116

AI “must compress reality into model-legible forms” 117, and that “compression” is where the adversary attacks. When an adversary controls our sensors (via evasion) or our models (via poisoning), “the speed of your OODA loop is irrelevant”.116

In fact, speed becomes a liability. “The faster the loop, the less time for verification”.116 If our “Orient” phase has been poisoned to misidentify a hospital as a high-value target, a faster OODA loop does not help. It simply means we will commit that atrocity faster. This is the “millisecond compromise”.116 We will simply lose, more efficiently and more rapidly than ever before. This new reality demands a new focus on “vigilant risk mitigation” 63 and operational AI “red teaming” to find these vulnerabilities before the enemy does.118

The New Fog of War and Uncontrolled Escalation

The strategic-level consequence of these vulnerabilities is the creation of a new, more complex “fog of war.” AI does not eliminate Clausewitzian “fog”; it creates a “fog of systems”.52 Future commanders will be wrestling not only with the enemy’s intentions, but also with the “black box” nature of their own AI 30, the unreliability of a “brittle” model 107, and the paranoia of a compromised model.

This new “fog” introduces significant “strategic risks” 119, chief among them “miscalculation and escalation”.106 The battlefield will be a confusing landscape of AI-driven misinformation campaigns 120 and autonomous cyberattacks.86

The most alarming scenario, as warned by the Center for a New American Security (CNAS), is an autonomous “flash crash”.121 Just as runaway trading algorithms have caused stock market “flash crashes,” two opposing, high-speed, AI-driven OODA loops could interact in an unforeseen, positive-feedback loop.122 This could lead to rapid, uncontrolled, and unintended escalation—potentially to the nuclear threshold—that the human “on-the-loop” supervisors cannot understand or stop in time.123 This is a new and terrifying form of escalation risk, analyzed by institutions like the RAND Corporation 103, and it may even be so destabilizing as to encourage a preventive war by one state trying to stop another from achieving a monopoly on this “AGI” (Artificial General Intelligence) capability.126


Concluding Strategic Assessment: The “Centaur” Imperative

The AI revolution in warfare is not a future prospect; it is here.14 The transformation of Boyd’s OODA loop from a cognitive, human-scale process to an algorithmic, machine-speed cycle is inevitable. The pursuit of “Decision Dominance” is therefore not a choice, but a strategic necessity for the United States and its allies to maintain a competitive edge.128

However, this analysis concludes that victory in the era of algorithmic warfare will not go to the side with the most AI, but to the side that best masters the human-machine team.65

The future of command is the “Strategic Centaur”.71 The goal must be to design systems that “augment and enhance human capabilities,” not “replace human judgment”.30 The AI should be the “co-pilot,” not the “auto-pilot” 97—a partner that frees the human commander from the “laborious calculations” of data processing so they can focus on the enduring human-centric tasks of strategy, intent, and “appropriate human judgment”.71

The central challenge for the Department of Defense is therefore twofold:

  1. The Technical Challenge: To continue building the JADC2 architecture 23 and the AI tools 67 that can successfully “sense, make sense, and act” at a tempo that seizes the initiative.
  2. The Adaptive Challenge: To simultaneously develop the doctrine 30, training 8, and C2 frameworks 100 that integrate these tools with human commanders. This requires training leaders who understand the capabilities of AI but are also deeply skeptical of its “brittleness” and vulnerabilities. It requires building robust ethical frameworks 133 and resilient, continuous AI “red teaming” processes 118 to defend our own OODA loop from the “millisecond compromise”.102

The new OODA loop is one of “hybrid intelligence”.93 The winner of the next war will not be the fastest machine, nor the wisest human, but the “centaur” force that most effectively fuses the speed and computational power of the algorithm with the enduring creativity, judgment, and strategic orientation of the human mind.


Glossary of Acronyms

  • AGI (Artificial General Intelligence): A theoretical, future form of AI that possesses the ability to understand, learn, and apply knowledge across a wide range of tasks at a human or superhuman level.
  • AI (Artificial Intelligence): The theory and development of computer systems able to perform tasks that normally require human intelligence, such as visual perception, speech recognition, and decision-making.
  • ATR (Automated Target Recognition): The use of computer processing and algorithms to automatically detect, classify, and identify targets in sensor data (like images or radar) without human intervention.
  • AWS (Autonomous Weapon System): A weapon system that, once activated, can select and engage targets without further intervention by an operator.73
  • C2 (Command and Control): The exercise of authority and direction by a designated commander over assigned forces to accomplish a mission.22
  • CEW (Cognitive Electronic Warfare): The use of AI and machine learning to enhance Electronic Warfare, allowing systems to autonomously detect, classify, and adaptively respond to new or complex electromagnetic threats.
  • CIWS (Close-In Weapon System): An autonomous defensive weapons system (like the Phalanx) used to detect and destroy short-range incoming threats, such as missiles or aircraft.99
  • CNAS (Center for a New American Security): A U.S.-based defense and national security think tank.
  • COA (Course of Action): A potential plan or line of action developed to accomplish a given mission.
  • COP (Common Operational Picture): A single, shared display of relevant operational information (like friendly and enemy force locations) used to provide situational awareness to commanders.20
  • DARPA (Defense Advanced Research Projects Agency): The U.S. DoD agency responsible for developing emerging technologies for military use.
  • DoD (Department of Defense): The executive branch department of the U.S. federal government tasked with national security and the armed forces.
  • DSS (Decision Support System): An AI-based tool that assists human commanders by processing data, analyzing options, and providing recommendations to reduce cognitive load.35
  • EW (Electronic Warfare): Military action involving the use of the electromagnetic spectrum to attack an enemy or protect friendly forces, such as jamming enemy radar or communications.
  • FMV (Full-Motion Video): Video data collected, often by UAVs, that provides real-time observation of a target area.49
  • ISR (Intelligence, Surveillance, and Reconnaissance): An integrated military function to collect, process, and disseminate information about an adversary and the operational environment.49
  • JADC2 (Joint All-Domain Command and Control): The DoD’s concept to connect sensors, systems, and forces from all military services (land, air, sea, space, cyber) into a single, resilient network to enable rapid “sense, make sense, and act” decision-making.
  • LLM (Large Language Model): A type of AI model trained on vast amounts of text data, capable of understanding and generating human-like language, used in tools like COA-GPT.72
  • MDMP (Military Decision-Making Process): The U.S. Army’s formal seven-step planning methodology used by staffs at the battalion level and higher to analyze a mission, develop and compare COAs, and produce an operation order.
  • OODA (Observe, Orient, Decide, Act): A four-stage decision-making model, developed by Col. John Boyd, that describes how an entity reacts to a competitive and changing environment.3
  • PED (Processing, Exploitation, and Dissemination): The intelligence cycle step of converting collected data (like FMV) into usable intelligence and distributing it to the forces who need it.49
  • SCEPTER (Strategic Chaos Engine for Planning, Tactics, Experimentation and Resiliency): A DARPA program developing technologies for accelerated wargaming and adjudication of COAs.69
  • UAV (Unmanned Aerial Vehicle): An aircraft without a human pilot on board, often referred to as a drone. It can be remotely piloted or fly autonomously.49

If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly contribute towards our continued reporting, please visit our funding page.


Sources Used

  1. OODA loop – Wikipedia, accessed November 16, 2025, https://en.wikipedia.org/wiki/OODA_loop
  2. The OODA Loop: How Fighter Pilots Make Fast and Accurate Decisions – Farnam Street, accessed November 16, 2025, https://fs.blog/ooda-loop/
  3. The OODA Loop – The Decision Lab, accessed November 16, 2025, https://thedecisionlab.com/reference-guide/computer-science/the-ooda-loop
  4. The OODA Loop — Observe, Orient, Decide, Act – LessWrong, accessed November 16, 2025, https://www.lesswrong.com/posts/hgttKuASB55zjoCKd/the-ooda-loop-observe-orient-decide-act
  5. OODA loop | Research Starters – EBSCO, accessed November 16, 2025, https://www.ebsco.com/research-starters/military-history-and-science/ooda-loop
  6. The OODA Loop and the Half-Beat – Canada.ca, accessed November 16, 2025, https://www.canada.ca/en/department-national-defence/maple-leaf/defence/2023/11/ooda-loop-halfbeat.html
  7. Competitive Decision-Making: Using the OODA Loop – Decisionskills.com, accessed November 16, 2025, https://www.decisionskills.com/blog/competitive-decision-making-using-the-ooda-loop
  8. A Symbiotic Relationship: The OODA Loop, Intuition, and Strategic Thought – DTIC, accessed November 16, 2025, https://apps.dtic.mil/sti/pdfs/ADA590672.pdf
  9. A Discourse on Winning and Losing – Colonel John Boyd, accessed November 16, 2025, https://www.coljohnboyd.com/static/documents/2018-03__Boyd_John_R__edited_Hammond_Grant_T__A_Discourse_on_Winning_and_Losing.pdf
  10. Colonel John Boyds Thoughts on Disruption – Marine Corps University, accessed November 16, 2025, https://www.usmcu.edu/Outreach/Marine-Corps-University-Press/MCU-Journal/JAMS-vol-14-no-1/Colonel-John-Boyds-Thoughts-on-Disruption/
  11. A Decision for Strategic Effects: A conceptual approach to effects based targeting – Air University, accessed November 16, 2025, https://www.airuniversity.af.edu/Portals/10/ASPJ/journals/Chronicles/Hill.pdf
  12. Boyd’s OODA Loop – Slightly East of New, accessed November 16, 2025, https://slightlyeastofnew.com/wp-content/uploads/2020/03/boydsoodaloopnecesse-1.pdf
  13. Revisiting John Boyd and the OODA Loop in Our Time of Transformation | www.dau.edu, accessed November 16, 2025, https://www.dau.edu/library/damag/september-october2021/revisiting-john-boyd
  14. Defence and artificial intelligence – European Parliament, accessed November 16, 2025, https://www.europarl.europa.eu/RegData/etudes/BRIE/2025/769580/EPRS_BRI(2025)769580_EN.pdf
  15. Artificial Intelligence and the Future of Warfare – Finabel, accessed November 16, 2025, https://finabel.org/wp-content/uploads/2024/07/FFT-AI-and-the-future-of-warfare-ED.pdf
  16. Air Force Doctrine Note 25-1, Artificial Intelligence (AI), accessed November 16, 2025, https://www.doctrine.af.mil/Portals/61/documents/AFDN_25-1/AFDN%2025-1%20Artificial%20Intelligence.pdf
  17. Joint All-Domain Command and Control for Modern Warfare: An Analytic Framework for Identifying and Developing Artificial Intelligence Applications | RAND, accessed November 16, 2025, https://www.rand.org/pubs/research_reports/RR4408z1.html
  18. DoD Announces Release of JADC2 Implementation Plan – Department of War, accessed November 16, 2025, https://www.war.gov/News/Releases/Release/Article/2970094/dod-announces-release-of-jadc2-implementation-plan/
  19. Transcending the fog of war? US military ‘AI’, vision, and the emergent post-scopic regime | European Journal of International Security – Cambridge University Press & Assessment, accessed November 16, 2025, https://www.cambridge.org/core/journals/european-journal-of-international-security/article/transcending-the-fog-of-war-us-military-ai-vision-and-the-emergent-postscopic-regime/35BCDEE8E28B076BCD597AFDC8976824
  20. The AI & Analytics Connectivity Imperative for JADC2 | Sigma Defense, accessed November 16, 2025, https://sigmadefense.com/blog/the-ai-and-analytics-connectivity-imperative-for-jadc2/
  21. JADC2: Accelerating the OODA Loop With AI and Autonomy – RTI, accessed November 16, 2025, https://www.rti.com/blog/jadc2-the-ooda-loop
  22. Summary of the Joint All-Domain Command and Control Strategy – DoD, accessed November 16, 2025, https://media.defense.gov/2022/Mar/17/2002958406/-1/-1/1/SUMMARY-OF-THE-JOINT-ALL-DOMAIN-COMMAND-AND-CONTROL-STRATEGY.pdf
  23. Chief Digital and Artificial Intelligence Office > Initiatives > CJADC2, accessed November 16, 2025, https://www.ai.mil/Initiatives/CJADC2/
  24. AI-Enabled Fusion for Conflicting Sensor Data – Booz Allen, accessed November 16, 2025, https://www.boozallen.com/markets/defense/indo-pacific/ai-enabled-fusion-for-conflicting-sensor-data.html
  25. Sentry | Anduril, accessed November 16, 2025, https://www.anduril.com/hardware/sentry/
  26. Project Maven – Wikipedia, accessed November 16, 2025, https://en.wikipedia.org/wiki/Project_Maven
  27. Automatic target recognition – Wikipedia, accessed November 16, 2025, https://en.wikipedia.org/wiki/Automatic_target_recognition
  28. The Coming Military AI Revolution – Army University Press, accessed November 16, 2025, https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/May-June-2024/MJ-24-Glonek/
  29. Seeing More Than the Human Eye – AI as a Battlefield Analyst | TTMS, accessed November 16, 2025, https://ttms.com/seeing-more-than-the-human-eye-ai-as-a-battlefield-analyst/
  30. Modernizing Military Decision-Making: Integrating AI into Army Planning, accessed November 16, 2025, https://www.armyupress.army.mil/Journals/Military-Review/Online-Exclusive/2025-OLE/Modernizing-Military-Decision-Making/
  31. Joint Force Coordination for Full Scale Operations – Booz Allen, accessed November 16, 2025, https://www.boozallen.com/insights/defense/c2-command-and-control/joint-force-coordination-for-full-scale-operations.html
  32. Harnessing the Algorithm: Shaping the Future of AI-Enabled Staff – AUSA, accessed November 16, 2025, https://www.ausa.org/publications/harding-paper/harnessing-the-algorithm
  33. accessed November 16, 2025, https://www.csis.org/analysis/it-time-democratize-wargaming-using-generative-ai#:~:text=Incorporating%20AI%20into%20wargames%20can,analysis%20of%20strategy%20and%20decisionmaking.&text=Analysts%20can%20train%20models%20using,datasets%20to%20represent%20different%20stakeholders.
  34. Understanding the Limits of Artificial Intelligence for Warfighters: Volume 4, Wargames, accessed November 16, 2025, https://www.rand.org/pubs/research_reports/RRA1722-4.html
  35. Artificial intelligence in military decision-making: supporting humans, not replacing them, accessed November 16, 2025, https://blogs.icrc.org/law-and-policy/2024/08/29/artificial-intelligence-in-military-decision-making-supporting-humans-not-replacing-them/
  36. Lethal autonomous weapon – Wikipedia, accessed November 16, 2025, https://en.wikipedia.org/wiki/Lethal_autonomous_weapon
  37. Drone Wars: Developments in Drone Swarm Technology – Defense Security Monitor, accessed November 16, 2025, https://dsm.forecastinternational.com/2025/01/21/drone-wars-developments-in-drone-swarm-technology/
  38. Loitering Munitions – Sightline Intelligence, accessed November 16, 2025, https://sightlineintelligence.com/loitering-munitions/
  39. The Rise of AI-Driven Warfare – Nihon Cyber Defence, accessed November 16, 2025, https://nihoncyberdefence.co.jp/en/the-rise-of-ai-driven-warfare/
  40. AI-Driven Cybersecurity & Electronic Warfare Market in Defense – MarketsandMarkets, accessed November 16, 2025, https://www.marketsandmarkets.com/ResearchInsight/ai-driven-cybersecurity-electronic-warfare-market.asp
  41. AI Impact Analysis on US Joint All Domain Command and Control (JADC2) Market Industry, accessed November 16, 2025, https://www.marketsandmarkets.com/ResearchInsight/ai-impact-analysis-on-us-joint-all-domain-command-and-control-jadc2-market-industry.asp
  42. Achieving Information Dominance in Military Applications through AI, Sensor Fusion, Networking, Precision Timing, and Advanced Computing – Trenton Systems, accessed November 16, 2025, https://www.trentonsystems.com/en-us/resource-hub/blog/achieving-information-dominance-in-military-applications-through-ai-sensor-fusion-networking-precision-timing-and-advanced-computing
  43. Aided and Automatic Target Recognition – CoVar, accessed November 16, 2025, https://covar.com/technology-area/aided-target-recognition/
  44. Autonomous Surveillance: A Game Changer for Military Intelligence – Karve International, accessed November 16, 2025, https://www.karveinternational.com/insights/autonomous-surveillance-a-game-changer-for-military-intelligence
  45. The Rise of Autonomous Security Systems: From Drones to AI, accessed November 16, 2025, https://aressecuritycorp.com/2024/11/20/autonomous-security-systems/
  46. Editorial: Applications of AI in autonomous, surveillance, and robotic systems – PMC – NIH, accessed November 16, 2025, https://pmc.ncbi.nlm.nih.gov/articles/PMC12179431/
  47. Artificial Intelligence and National Security | Congress.gov, accessed November 16, 2025, https://www.congress.gov/crs-product/R45178
  48. Project Maven: Algorithmic Warfare Doctrine – Ultra Unlimited, accessed November 16, 2025, https://www.ultra-unlimited.com/blog/project-maven-algorithmic-warfare-doctrine
  49. Big Data at War: Special Operations Forces, Project Maven, and …, accessed November 16, 2025, https://mwi.westpoint.edu/big-data-at-war-special-operations-forces-project-maven-and-twenty-first-century-warfare/
  50. Project Maven to Deploy Computer Algorithms to War Zone by Year’s End, accessed November 16, 2025, https://www.war.gov/News/News-Stories/Article/Article/1254719/project-maven-to-deploy-computer-algorithms-to-war-zone-by-years-end/
  51. Use Cases for Automatic Target Recognition in the Military – FlySight, accessed November 16, 2025, https://www.flysight.it/automatic-target-recognition-for-military-use-whats-the-potential/
  52. Fog, Friction, and Thinking Machines – War on the Rocks, accessed November 16, 2025, https://warontherocks.com/2020/03/fog-friction-and-thinking-machines/
  53. Steps toward AI governance in the military domain – Brookings Institution, accessed November 16, 2025, https://www.brookings.edu/articles/steps-toward-ai-governance-in-the-military-domain/
  54. The risks and inefficacies of AI systems in military targeting support, accessed November 16, 2025, https://blogs.icrc.org/law-and-policy/2024/09/04/the-risks-and-inefficacies-of-ai-systems-in-military-targeting-support/
  55. Reimagining Military C2 in the Age of AI – Revolution, Regression, or Evolution – Special Competitive Studies Project, accessed November 16, 2025, https://www.scsp.ai/wp-content/uploads/2024/12/DPS-Reimagining-Military-C2-in-the-Age-of-AI.pdf
  56. Joint All-Domain Command and Control for Modern Warfare: An Analytic Framework for Identifying and Developing Artificial Intelli – RAND, accessed November 16, 2025, https://www.rand.org/content/dam/rand/pubs/research_reports/RR4400/RR4408z1/RAND_RR4408z1.pdf
  57. Constructing adversarial models for threat/enemy intent prediction and inferencing – ResearchGate, accessed November 16, 2025, https://www.researchgate.net/publication/252856510_Constructing_adversarial_models_for_threatenemy_intent_prediction_and_inferencing
  58. The Predictive Turn | Preparing to Outthink Adversaries Through Predictive Analytics, accessed November 16, 2025, https://www.army.mil/article/282476/the_predictive_turn_preparing_to_outthink_adversaries_through_predictive_analytics
  59. WE NEED AN AI-BASED ENEMY ANALYSIS TOOL … NOW!, accessed November 16, 2025, https://warroom.armywarcollege.edu/articles/enemy-analysis-tool-now/
  60. Prediction and Judgment: Why Artificial Intelligence Increases the Importance of Humans in War | International Security – MIT Press Direct, accessed November 16, 2025, https://direct.mit.edu/isec/article/46/3/7/109668/Prediction-and-Judgment-Why-Artificial
  61. Georgia Tech Researcher Finds that Military Cannot Rely on AI for Strategy or Judgment, accessed November 16, 2025, https://research.gatech.edu/georgia-tech-researcher-finds-military-cannot-rely-ai-strategy-or-judgment
  62. Study: AI Will Make Human Factors More, Not Less, Critical in War | Mind Matters, accessed November 16, 2025, https://mindmatters.ai/2022/07/study-ai-will-make-human-factors-more-not-less-critical-in-war/
  63. AI for Military Decision-Making | Center for Security and Emerging Technology – CSET, accessed November 16, 2025, https://cset.georgetown.edu/publication/ai-for-military-decision-making/
  64. Warfare at the Speed of Thought: Balancing AI and Critical Thinking for the Military Leaders of Tomorrow – Modern War Institute, accessed November 16, 2025, https://mwi.westpoint.edu/warfare-at-the-speed-of-thought-balancing-ai-and-critical-thinking-for-the-military-leaders-of-tomorrow/
  65. Air Force Battle Lab advances the kill chain with AI, C2 Innovation – AF.mil, accessed November 16, 2025, https://www.af.mil/News/Article-Display/Article/4241485/air-force-battle-lab-advances-the-kill-chain-with-ai-c2-innovation/
  66. Artificial Intelligence in Modern Warfare: Strategic Innovation and Emerging Risks, accessed November 16, 2025, https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/SO-24/SO-24-Artificial-Intelligence-Strategic-Innovation-and-Emerging-Risks/
  67. AI’s New Frontier in War Planning: How AI Agents Can Revolutionize Military Decision-Making | The Belfer Center for Science and International Affairs, accessed November 16, 2025, https://www.belfercenter.org/research-analysis/ais-new-frontier-war-planning-how-ai-agents-can-revolutionize-military-decision
  68. COA-GPT: Generative Pre-trained Transformers for Accelerated Course of Action Development in Military Operations This research was sponsored by the Army Research Laboratory and was accomplished under Cooperative Agreement Number W911NF-23-2-0072. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the – arXiv, accessed November 16, 2025, https://arxiv.org/html/2402.01786v1
  69. SBIR: Improving Battle Planning through AI – DARPA, accessed November 16, 2025, https://www.darpa.mil/research/programs/improving-battle-planning-through-ai
  70. Air Force experiments with AI, boosts battle management speed and accuracy, accessed November 16, 2025, https://www.aflcmc.af.mil/NEWS/Article/4311136/air-force-experiments-with-ai-boosts-battle-management-speed-and-accuracy/
  71. Four-Dimensional Planning at the Speed of Relevance: Artificial-Intelligence-Enabled Military Decision-Making Process – Army University Press, accessed November 16, 2025, https://www.armyupress.army.mil/Portals/7/military-review/Archives/English/ND-22/Farmer/Farmer-Clausewitz%E2%80%99s-Ghost-UA.pdf
  72. AI Course of Action (COA) Generation for Defense – Seekr, accessed November 16, 2025, https://www.seekr.com/solution/coa-generation/
  73. Autonomous Weapon Systems: No Human-in-the-Loop Required …, accessed November 16, 2025, https://warontherocks.com/2025/05/autonomous-weapon-systems-no-human-in-the-loop-required-and-other-myths-dispelled/
  74. Exploring the 2023 U.S. Directive on Autonomy in Weapon Systems – CEBRI, accessed November 16, 2025, https://cebri.org/revista/en/artigo/114/exploring-the-2023-us-directive-on-autonomy-in-weapon-systems
  75. A Comparative Analysis of the Definitions of Autonomous Weapons Systems – PMC, accessed November 16, 2025, https://pmc.ncbi.nlm.nih.gov/articles/PMC9399191/
  76. RESEARCH BRIEF SENDING UP A FLARE: AUTONOMOUS WEAPONS SYSTEMS PROLIFERATION RISKS TO HUMAN RIGHTS AND INTERNATIONAL SECURITY, accessed November 16, 2025, https://www.geneva-academy.ch/joomlatools-files/docman-files/Sending%20Up%20a%20Flare%20Autonomous%20Weapons%20Systems%20Proliferation%20Risks.pdf
  77. The rise of loitering munitions in high-intensity warfare – Army Technology, accessed November 16, 2025, https://www.army-technology.com/analyst-comment/loitering-munitions-high-intensity-warfare/
  78. AI-Powered Loitering Munition Systems Set New Standard for Battlefield Autonomy, accessed November 16, 2025, https://www.autonomyglobal.co/ai-powered-loitering-munition-systems-set-new-standard-for-battlefield-autonomy/
  79. AI in warfare: Loitering Munitions – Current Applications and Legal Challenges, accessed November 16, 2025, https://mondointernazionale.org/focus-allegati/ai-in-warfare-loitering-munitions-current-applications-and-legal-challenges
  80. Loitering Munitions: The Convergence of AI, Autonomy, and Lethal Precision in Future Combat by 2029 – MarketsandMarkets, accessed November 16, 2025, https://www.marketsandmarkets.com/blog/AD/loitering-munitions-convergence-ai-autonomy-lethal-precision-future-combat
  81. Military Drone Swarm Intelligence Explained – Sentient Digital, Inc., accessed November 16, 2025, https://sdi.ai/blog/military-drone-swarm-intelligence-explained/
  82. AI in the military: Testing a new kind of air force, accessed November 16, 2025, https://www.youtube.com/watch?v=CwDSpFufs6k
  83. AI military drone maker reveals the FUTURE of warfare, accessed November 16, 2025, https://www.youtube.com/watch?v=O8SOilhEqmw
  84. AI-controlled drone swarms arms race to dominate the near-future battlefield – YouTube, accessed November 16, 2025, https://www.youtube.com/watch?v=h2O17B4R7Rc
  85. Electronic Warfare Cyberattacks, Countermeasures and Modern Defensive Strategies of UAV Avionics: A Survey – arXiv, accessed November 16, 2025, https://arxiv.org/html/2504.07358v1
  86. Navigating the AI battlefield: Opportunities and ethical frontiers – NRDC Italy, accessed November 16, 2025, https://nrdc-ita.nato.int/newsroom/insights/navigating-the-ai-battlefield-opportunities–challenges–and-ethical-frontiers-in-modern-warfare
  87. Will AI-Driven “Super-OODA Loops” Revolutionise Military Strategy and Operations? – RSIS, accessed November 16, 2025, https://rsis.edu.sg/rsis-publication/rsis/will-ai-driven-super-ooda-loops-revolutionise-military-strategy-and-operations/
  88. War, Artificial Intelligence, and the Future of Conflict – Georgetown Journal of International Affairs, accessed November 16, 2025, https://gjia.georgetown.edu/2024/07/12/war-artificial-intelligence-and-the-future-of-conflict/
  89. Achieving Decision Dominance: The Arduous Pursuit of Operationalized Data, accessed November 16, 2025, https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/January-February-2025/Decision-Dominance/
  90. Achieving Decision Dominance: Leveraging AI in Small Wars, accessed November 16, 2025, https://smallwarsjournal.com/2025/04/22/achieving-decision-dominance-leveraging-ai-in-small-wars/
  91. What is Decision Dominance, and why is it necessary in the Age of AI – Smack Technologies, accessed November 16, 2025, https://smacktechnologies.com/newsroom/what-is-decision-dominance-why-necessary-age-of-ai
  92. Decision Dominance in the Age of Agentic AI | Small Wars Journal by Arizona State University, accessed November 16, 2025, https://smallwarsjournal.com/2025/10/03/agentic-ai-decision-dominance/
  93. Strategic Centaurs: Harnessing Hybrid Intelligence for the Speed of AI-Enabled War, accessed November 16, 2025, https://mwi.westpoint.edu/strategic-centaurs-harnessing-hybrid-intelligence-for-the-speed-of-ai-enabled-war/
  94. Please Stop Saying “Human-In-The-Loop” – Institute for Future …, accessed November 16, 2025, https://www.ifc.usafa.edu/articles/please-stop-saying-human-in-the-loop
  95. DoD Directive 3000.09, “Autonomy in Weapon Systems,” January 25, 2023 – Executive Services Directorate, accessed November 16, 2025, https://www.esd.whs.mil/portals/54/documents/dd/issuances/dodd/300009p.pdf
  96. The Moral Dimension of AI-Assisted Decision-Making: Some Practical Perspectives from the Front Lines | American Academy of Arts and Sciences, accessed November 16, 2025, https://www.amacad.org/publication/daedalus/moral-dimension-ai-assisted-decision-making-some-practical-perspectives-front-lines
  97. Killer bots instead of killer robots: Updates to DoD Directive 3000.09 may create legal implications – The Cyber Defense Review, accessed November 16, 2025, https://cyberdefensereview.army.mil/Portals/6/Documents/2023_Summer/Erickson_CDR%20V8N2%20Summer%202023.pdf?ver=bIGK4_BcR8UvUwRAz69JUw%3D%3D
  98. Human-On-the-Loop – Joint Air Power Competence Centre, accessed November 16, 2025, https://www.japcc.org/essays/human-on-the-loop/
  99. Autonomous weapon systems: is a practical approach possible? – Euro-sd, accessed November 16, 2025, https://euro-sd.com/2024/04/articles/37561/autonomous-weapon-systems-is-a-practical-approach-possible/
  100. Human in the Loop vs. Human on the Loop: Navigating the Future of AI – Serco, accessed November 16, 2025, https://www.serco.com/na/media-and-news/2025/human-in-the-loop-vs-human-on-the-loop-navigating-the-future-of-ai
  101. Navigating cyber vulnerabilities in AI-enabled military systems, accessed November 16, 2025, https://europeanleadershipnetwork.org/commentary/navigating-cyber-vulnerabilities-in-ai-enabled-military-systems/
  102. Safety and War: Safety and Security Assurance of Military AI Systems – AI Now Institute, accessed November 16, 2025, https://ainowinstitute.org/publications/safety-and-war-safety-and-security-assurance-of-military-ai-systems
  103. Strategic competition in the age of AI: Emerging risks and opportunities from military use of artificial intelligence – RAND, accessed November 16, 2025, https://www.rand.org/content/dam/rand/pubs/research_reports/RRA3200/RRA3295-1/RAND_RRA3295-1.pdf
  104. Operationally Relevant Artificial Training for Machine Learning – RAND, accessed November 16, 2025, https://www.rand.org/pubs/research_reports/RRA683-1.html
  105. AI Still in Experimentation Phase for Training, Simulations – National Defense Magazine, accessed November 16, 2025, https://www.nationaldefensemagazine.org/articles/2023/11/10/ai-still-in-experimentation-phase-for-training-simulations
  106. Reducing the Risks of Artificial Intelligence for Military Decision Advantage | Center for Security and Emerging Technology – CSET, accessed November 16, 2025, https://cset.georgetown.edu/publication/reducing-the-risks-of-artificial-intelligence-for-military-decision-advantage/
  107. Rethinking Technological Readiness in the Era of AI Uncertainty – arXiv, accessed November 16, 2025, https://arxiv.org/html/2506.11001v1
  108. Adversarial AI: Understanding and Mitigating the Threat – Sysdig, accessed November 16, 2025, https://www.sysdig.com/learn-cloud-native/adversarial-ai-understanding-and-mitigating-the-threat
  109. Risks and Mitigation Strategies for Adversarial Artificial Intelligence Threats: A DHS S&T Study – Homeland Security, accessed November 16, 2025, https://www.dhs.gov/sites/default/files/2023-12/23_1222_st_risks_mitigation_strategies.pdf
  110. Operational Feasibility of Adversarial Attacks Against Artificial Intelligence – RAND, accessed November 16, 2025, https://www.rand.org/content/dam/rand/pubs/research_reports/RRA800/RRA866-1/RAND_RRA866-1.pdf
  111. Artificial Intelligence, Real Risks: Understanding—and Mitigating—Vulnerabilities in the Military Use of AI – Modern War Institute, accessed November 16, 2025, https://mwi.westpoint.edu/artificial-intelligence-real-risks-understanding-and-mitigating-vulnerabilities-in-the-military-use-of-ai/
  112. Adversarial Machine Learning – Joint Air Power Competence Centre, accessed November 16, 2025, https://www.japcc.org/essays/adversarial-machine-learning/
  113. Attacking Artificial Intelligence: AI’s Security Vulnerability and What Policymakers Can Do About It | The Belfer Center for Science and International Affairs, accessed November 16, 2025, https://www.belfercenter.org/publication/AttackingAI
  114. Securing Our Sentinels: Protecting Military AI Models from Data Poisoning, Evasion, and Extraction – AFCEA International, accessed November 16, 2025, https://events.afcea.org/Augusta25/Custom/Handout/Speaker0_Session11983_1.pdf
  115. Data Poisoning as a Covert Weapon: Securing U.S. Military Superiority in AI-Driven Warfare, accessed November 16, 2025, https://lieber.westpoint.edu/data-poisoning-covert-weapon-securing-us-military-superiority-ai-driven-warfare/
  116. Agentic AI’s OODA Loop Problem – Schneier on Security, accessed November 16, 2025, https://www.schneier.com/blog/archives/2025/10/agentic-ais-ooda-loop-problem.html
  117. Agentic AI’s OODA Loop Problem – Berkman Klein Center, accessed November 16, 2025, https://cyber.harvard.edu/story/2025-10/agentic-ais-ooda-loop-problem
  118. SABER: Securing Artificial Intelligence for Battlefield Effective Robustness – DARPA, accessed November 16, 2025, https://www.darpa.mil/research/programs/saber-securing-artificial-intelligence
  119. Military Applications of Artificial Intelligence: Ethical Concerns in an Uncertain World | RAND, accessed November 16, 2025, https://www.rand.org/pubs/research_reports/RR3139-1.html
  120. Weaponized AI: A New Era of Threats and How We Can Counter It – Ash Center, accessed November 16, 2025, https://ash.harvard.edu/articles/weaponized-ai-a-new-era-of-threats/
  121. How Adversarial Attacks Could Destabilize Military AI Systems – CNAS, accessed November 16, 2025, https://www.cnas.org/publications/commentary/how-adversarial-attacks-could-destabilize-military-ai-systems
  122. Algorithmic Stability: How AI Could Shape the Future of Deterrence – CSIS, accessed November 16, 2025, https://www.csis.org/analysis/algorithmic-stability-how-ai-could-shape-future-deterrence
  123. Algorithms of war: The use of artificial intelligence in decision making in armed conflict, accessed November 16, 2025, https://blogs.icrc.org/law-and-policy/2023/10/24/algorithms-of-war-use-of-artificial-intelligence-decision-making-armed-conflict/
  124. Strategic competition in the age of AI: Emerging risks and opportunities from military use of artificial intelligence—Summary – RAND, accessed November 16, 2025, https://www.rand.org/content/dam/rand/pubs/research_reports/RRA3200/RRA3295-1/RAND_RRA3295-1.summary.pdf
  125. An AI Revolution in Military Affairs? How Artificial Intelligence Could Reshape Future Warfare – RAND, accessed November 16, 2025, https://www.rand.org/content/dam/rand/pubs/working_papers/WRA4000/WRA4004-1/RAND_WRA4004-1.pdf
  126. Evaluating the Risks of Preventive Attack in the Race for Advanced AI – RAND, accessed November 16, 2025, https://www.rand.org/pubs/perspectives/PEA3691-13.html
  127. Human Oversight in AI-Driven Defence – at what positions do we need the Human in the Loop – NATO C2COE, accessed November 16, 2025, https://c2coe.org/download/human-oversight-in-ai-driven-defence-at-what-positions-do-we-need-the-human-in-the-loop/
  128. Achieving Decision Dominance in the Age of AI – Everfox, accessed November 16, 2025, https://www.everfox.com/blog/news/achieving-decision-dominance-in-the-age-of-ai
  129. Achieving Decision Dominance through Convergence: The U.S. Army and JADC2 | AUSA, accessed November 16, 2025, https://www.ausa.org/publications/achieving-decision-dominance-through-convergence-us-army-and-jadc2
  130. The Impact of Artificial Intelligence on Military Defence and Security – Centre for International Governance Innovation (CIGI), accessed November 16, 2025, https://www.cigionline.org/documents/2120/no.263.pdf
  131. Understanding the Limits of Artificial Intelligence for Warfighters: Volume 5, Mission Planning | RAND, accessed November 16, 2025, https://www.rand.org/pubs/research_reports/RRA1722-5.html
  132. The Impact Of Artificial Intelligence On The Military Decision-Making Process And Mission Command – The Defence Horizon Journal, accessed November 16, 2025, https://tdhj.org/blog/post/ai-military-decision-making-2/
  133. Responsible and Ethical Military AI | CSET, accessed November 16, 2025, https://cset.georgetown.edu/wp-content/uploads/CSET-Responsible-and-Ethical-Military-AI.pdf

Automated Course of Action Generation – Army SBIR|STTR Program, accessed November 16, 2025, https://armysbir.army.mil/topics/automated-course-action-generation/

The Augmented Operator: AI’s Near-Term Impact on Special Operations Forces (2025-2030)

This report assesses the near-term (2025-2030) impacts of artificial intelligence (AI) on first-world Special Operations Forces (SOF). The central finding is that the next five years will be defined not by the invention of new AI, but by its migration from centralized, high-echelon intelligence platforms to the “tactical edge”.1 This decentralization is a strategic necessity, driven by SOF’s operational requirement to function in disconnected, disrupted, intermittent, or limited (DDIL) communications environments where reliance on cloud-based processing is not viable.2

The primary operational impact will be the creation of the “augmented operator.” This operator will leverage AI as both a sensor and a weapon, processed directly on-device. This will manifest as:

  1. AI-Driven Situational Awareness (SA): Operator-worn systems will provide real-time, AI-generated overlays, identifying threats, “blue forces,” and navigational paths, even in GPS-denied environments.5
  2. On-Device Human Interface: AI will enable offline, real-time language translation 8 and multi-modal biometric identification 9, revolutionizing Foreign Internal Defense (FID) and Unconventional Warfare (UW) missions.
  3. Manned-Unmanned Teaming (MUM-T): Operators will move from controlling single drones to directing AI-coordinated swarms of loitering munitions 10 and, potentially, ground-controlled Collaborative Combat Aircraft (CCAs).12

This opportunity is mirrored by extreme, symmetric risk. The “democratization” of AI 14 means adversaries, including violent non-state actors (VNSAs), will leverage the same commercial-off-the-shelf (COTS) technologies against SOF.15 The most immediate threats are adversarial AI-powered drone swarms 16 and Generative AI (GenAI)-based deepfakes and propaganda designed to shatter trust in partner-force missions.18

The greatest dangers, however, are institutional and internal:

  • Cognitive Skill Atrophy: Over-reliance on AI planning tools (e.g., COA-GPT) risks the erosion of core staff planning and decision-making capabilities.21
  • The “Black Box” Problem: Fielding non-transparent AI for targeting creates catastrophic legal and ethical liabilities under the Law of Armed Conflict (LOAC).22
  • Accelerated, Flawed Targeting: The misuse of AI to “accelerate the kill chain” 24 at the expense of human judgment—as demonstrated in the 2021 Kabul drone strike 25—presents the single greatest risk for strategic failure and high-profile civilian harm (CIVHARM).

SOF leadership must immediately prioritize the procurement of explainable, decentralized “Edge AI” systems, mandate aggressive “Red Team” AI testing (including data poisoning) 27, and implement training protocols that actively combat skill atrophy and automation bias.

2.0. SUMMARY TABLE: AI IMPACT ON SOF CORE ACTIVITIES (2025-2030)

The following table maps projected AI impacts directly to the doctrinal core activities of first-world SOF.28

SOF Core ActivityKey AI Opportunity (Technology & Application)Operational Impact (The “So What”)Key Risk / VulnerabilityRelevant Technologies
Direct Action (DA)AI-enabled loitering munitions (LMs) and autonomous swarms.Provides scalable, overwhelming, and precise fires from a small-footprint team. A single operator can achieve the kinetic effect of a much larger unit.Adversary VNSA COTS AI swarms overwhelm SOF C-UAS and base defenses.15XTEND ACQME-DK 10, Rafael Spike family 32, Anduril YFQ-44A (CCA).33
Special Reconnaissance (SR)On-device, AI-powered Automatic Target Recognition (ATR) and pattern-of-life (PoL) analysis on small UAS (sUAS) and wearable sensors.Reduces operator cognitive load. Enables persistent, autonomous surveillance in DDIL environments. Fuses multi-sensor data into actionable intelligence at the edge.34High risk of “black box” targeting logic.22 Misidentification based on flawed PoL analysis leads to catastrophic CIVHARM and mission failure.24Anduril EagleEye 5, VIO Navigation 6, Project Maven.36
Counter-Terrorism (CT)AI-driven multi-source data fusion (e.g., SIGINT, HUMINT, ISR) for HVT targeting. Predictive analytics for threat anticipation.Fuses massive, disparate datasets 37 to unmask clandestine networks. Shifts targeting from reactive (find-fix-finish) to proactive (predict-disrupt).Data Poisoning: Adversary covertly compromises training data, causing the AI to miss threats or, worse, identify friendlies as targets.27Torch.AI ORCUS 37, Palantir AI, Reveal-tech Identifi.9
Unconventional Warfare (UW) & Foreign Internal Defense (FID)Wearable, real-time, offline language translation devices. On-device, offline multi-modal biometric identification.Dramatically enhances human interface. Allows operators to rapidly build rapport, vet partner forces, and identify insider threats without a network connection.9Adversary use of COTS AI (translation, biometrics) for counter-intelligence, building databases of SOF operators and their local partners.20Reveal-tech Identifi 9, Timekettle WT2 8, Meta Ray-Ban.8
Military Info. Support Ops (MISO)Generative AI (LLMs) for high-speed audience analysis and content generation.Overcomes MISO force capacity shortfalls.40 Enables rapid, culturally-resonant, and scalable influence campaigns to counter adversary propaganda in real time.41Adversary “deepfakes” and GenAI-powered disinformation 18 are faster and more believable, shattering trust in SOF and partner forces.COA-GPT 21, GPT-4/5 derivatives 42, Llama-series LLMs.
Civil Affairs Operations (CAO)AI-powered data-mining and sentiment analysis of local populations. LLMs for rapid generation of civil-affairs products (e.g., pamphlets, info-sheets).Provides real-time understanding of “human terrain” needs, grievances, and key nodes of influence. Allows CA teams to rapidly meet information needs.43AI hallucinations 42 or biases in the training data lead to factually incorrect or culturally offensive products, causing catastrophic loss of trust.Open-source LLMs 41, commercial translation tools.44
Logistics / ResupplyAutonomous Unmanned Ground Vehicles (A-UGVs) or “robotic mules.”Promise: Unburdens light SOF teams, provides autonomous “last-mile” resupply, and enables robotic CASEVAC.45Reality: A-UGV mobility in “complex terrain” (e.g., non-permissive routes) is an unsolved R&D problem. Over-reliance will lead to mission failure.47Rheinmetall Mission Master 45, Army S-MET.47

3.0. OPPORTUNITIES: AI INTEGRATION ACROSS SOF CORE ACTIVITIES

In the 2025-2030 timeframe, AI will not be a single technology but a new, pervasive layer of capability integrated across all SOF mission sets. Its primary value will be to compress decision cycles, augment operator perception, and scale operator effects.

3.1. Intelligence, Planning, and C5ISTAR: From “Big Data” to Decision Advantage

The core challenge for SOF intelligence is not data collection, but data sense-making. Operators and analysts are overwhelmed by fragmented feeds from sensors, ISR platforms, and electronic warfare (EW) systems.50 AI offers a direct solution to this cognitive burden by automating fusion and analysis.

AI-Driven Multi-Source Fusion

In the next five years, AI-driven data platforms will become the standard. Systems like Torch.AI’s ORCUS, which is “battle-proven” in over three dozen DoD deployments, are designed to break down information silos.37 This technology moves beyond simple data aggregation. It uses AI to autonomously integrate structured and unstructured data from multiple classified and unclassified sources—including ISR platforms, battlefield sensors, and cyber threats—in real time.37 For a SOF command, this means an intelligence analyst can receive a single, fused operational picture that correlates a SIGINT “hit,” a full-motion video (FMV) feed, and a human intelligence report, providing actionable intelligence rather than just more data.51

Predictive Analytics & Pattern-of-Life

This fused data layer enables the next step: predictive analytics. AI models, particularly machine learning and deep learning 54, excel at “pattern-of-life” (PoL) analysis.55 Where a human analyst team (e.g., in Project Maven 36) might manually tag FMV, an AI can process thousands of hours of multi-domain sensor data to identify and “learn” an adversary’s habits, schedules, and networks.57 This capability is migrating to the tactical edge.58 This will allow a SOF team to move from reacting to an HVT’s location to proactively anticipating the target’s next move, enabling threat mitigation and proactive strategy.59

Automated COA Generation

The Military Decision-Making Process (MDMP) is notoriously time- and resource-intensive, ill-suited for the “fleeting windows of opportunity” typical of SOF operations.60 AI-powered planning tools, such as the in-development Course of Action GPT (COA-GPT), promise to revolutionize this process.21 These tools leverage LLMs, military doctrine, and domain expertise to “swiftly develop valid COAs… in a matter of seconds”.61 A commander can input mission specifics (text and images) and receive multiple, strategically-aligned, and pre-wargamed COAs.61 This technology addresses a core weakness of manual MDMP, where staffs are often constrained to analyzing only the “most likely” and “most dangerous” enemy COAs.60 By using AI to generate a “broader spectrum of COAs” 60, commanders and staffs are freed from manual product generation and can focus on the higher-order cognitive tasks of analysis, comparison, and human judgment.21

3.2. Direct Action (DA) & Counter-Terrorism (CT): The AI-Enabled Kill Chain

In kinetic operations, AI will provide SOF teams with unprecedented, scalable precision and lethality. This will be most evident in the maturation of autonomous weapons systems.

Autonomous Swarms & Loitering Munitions (LMs)

This is the most significant near-term kinetic impact. The DoD is already moving to procure AI-enabled swarm systems, such as the XTEND ACQME-DK, specifically for “irregular warfare”.10 These systems are not just multiple drones; they are AI-coordinated “cohesive units”.62 AI manages the complex task delegation and swarm coordination 11, allowing a single SOF operator to deploy dozens of assets for tasks ranging from ISR and EW to overwhelming, precision strikes. This distributed, resilient approach is exceptionally difficult for an adversary to counter.64

Simultaneously, AI is enhancing individual loitering munitions. Current LMs are “man-in-the-loop.” The next generation, such as Israel’s Spike family 32 and MBDA’s Akeron 65, are “AI-in-the-loop.” These systems use onboard AI and machine learning to autonomously detect, track, and engage targets without continuous human guidance.32 This is a critical capability in a comms-denied or GPS-denied environment. The LM can be launched to “hunt” in a designated area, using its own AI to identify and engage a pre-defined target profile, immune to hostile electronic warfare.32

Manned-Unmanned Teaming (MUM-T) & Collaborative Combat Aircraft (CCAs)

AI is the cognitive “brain” that makes true Manned-Unmanned Teaming (MUM-T) possible.68 MUM-T is defined as the “synchronized employment of soldier, manned and unmanned air and ground vehicles, robotics, and sensors” to enhance lethality and survivability.69

The most revolutionary development in this area is the Collaborative Combat Aircraft (CCA) program.68 These are AI-piloted, jet-powered “loyal wingmen”.68 While often viewed as an Air Force asset to support F-35s 33, the program’s development includes “ground control interfaces”.12 This implies a profound shift for SOF: a ground-based operator, such as a SOF-qualified JTAC, could soon exercise tactical control over a CCA like the Anduril YFQ-44A “Fury”.33

This capability would fundamentally change the battlefield for a SOF team. The team’s “air support” would no longer be a temporary asset on station; it would be a persistent, autonomous platform (a “loyal wingman”) that can be tasked directly by the ground element to perform autonomous ISR, provide EW screening, or conduct precision strikes.72 This integration of SOF C5ISTAR 77 with autonomous air assets represents an asymmetric leap in kinetic power, effectively giving a small SOF team the scalable kinetic effect of a much larger conventional force.

3.3. Military Information Support Operations (MISO): GenAI and the Influence Domain

The influence domain is perhaps the area most poised for immediate disruption by Generative AI (LLMs). The Army’s PSYOP (MISO) force is currently facing “structural and capacity challenges,” unable to meet growing global demand with an understaffed force.40 GenAI offers a direct solution to this “force multiplier” problem.

MISO planning is “extraordinarily difficult,” with a standard operation taking months.42 AI can compress this timeline to minutes.

  1. Automated Audience & Sentiment Analysis: LLMs can “scrutinize” and “summarize” massive, multilingual datasets from the information environment (e.g., social media, local news) to extract an adversary’s “goals, tactics, and narrative frames”.41 This automates the most time-consuming phase of MISO (Target Audience Analysis), allowing planners to understand the information “battlespace” in real time.43
  2. Hyper-Personalized Content Generation: Once an audience is analyzed, GenAI can “generate content, such as text and images, within seconds”.42 This capability moves MISO beyond generic products (like leaflets) to hyper-personalized digital campaigns. A MISO team can use AI to rapidly generate thousands of variants of a message, each tailored to a specific cultural or demographic sub-group, and disseminate them “at the speed of conflict”.42

This industrialization of MISO allows a small PSYOP team to conduct influence operations at a scale and speed that was previously impossible. The “human quality controller” 42 remains critical, not as a content creator, but as a final editor and arbiter to prevent AI “hallucinations” 42 from causing unintended diplomatic crises.

3.4. Unconventional Warfare (UW) & Foreign Internal Defense (FID): AI at the Human Edge

The core of SOF’s “by, with, and through” missions 79 is the human interface: building rapport with partner forces and “knowing the human terrain.” AI, particularly at the edge, will serve as a powerful enhancement to this human-to-human mission.

Real-Time Language Translation

A fundamental SF skill is language proficiency 79, but operators rarely speak all dialects in a region. Commercial-off-the-shelf (COTS) AI-powered translation devices are now viable tactical tools.81 Wearable earbuds like the Timekettle WT2 provide “bidirectional simultaneous translation” in 40+ languages.8 Crucially, they offer offline translation packages.8 This allows an ODA operator to conduct a negotiation, train a partner force, or de-escalate a situation in real time, without relying on a human translator who can be a security risk or a cultural barrier.

On-Device Biometric Identification

“Knowing the human terrain” 9 is paramount in UW (identifying resistance members) and FID (vetting partner forces). The single greatest threat in these environments is the “insider.” The Reveal-tech “Identifi” system, developed with USSOCOM operators, represents a paradigm shift in counter-intelligence and force protection.9

Identifi is an AI-driven, multi-modal biometric (face, iris, fingerprint, voice) platform that runs “entirely offline”.9 It executes all AI matching and analysis on-device, requiring no data connection.9 This allows a SOF team in an “austere environment” 83 to:

  • Enroll and vet partner forces, creating an “on-device watchlist”.9
  • Instantly identify individuals at checkpoints or key leader engagements.
  • Securely identify high-value targets (HVTs) or CI threats without transmitting sensitive biometric data over a network.

This capability to weaponize identity at the tactical edge, completely disconnected, is a revolutionary tool for securing the mission in complex human environments.

Augmented Reality (AR) for Partner Force Training

AR systems, suchab as Anduril’s EagleEye HMD, provide an “AI partner embedded in your display”.5 While designed for C2 and SA, this technology is a powerful training tool. In an FID context, a SOF advisor can use the AR system to create a “collaborative 3D sand table” 5 or overlay digital information (routes, objectives, threat locations) onto the partner force’s view of the real world.84 This “enhanced perception” 5 dramatically improves training effectiveness and shared operational understanding.

3.5. Autonomous Logistics & CASEVAC: The “Robotic Mule”

One of the most requested AI applications is for autonomous systems to perform the “dull, dirty, and dangerous” work of logistics. The vision is for Unmanned Ground Vehicles (UGVs) like the Rheinmetall Mission Master 45 or the Army’s Small Multipurpose Equipment Transport (S-MET) 47 to serve as “robotic mules.” These systems promise to unburden dismounted SOF teams by autonomously carrying heavy equipment, conducting “last-mile resupply” to contested outposts, and performing non-medical CASEVAC.45

However, this report must be candid: this capability is one of the least operationally mature for complex SOF missions. While aerial autonomy (drones, LMs, CCAs) is advancing rapidly, autonomous ground mobility in “complex natural terrain” 49 and urban environments 86 remains an unsolved research and development problem.48

Practical experiments have produced “mixed results”.47 A 2024 US Army trial with the S-MET concluded that the unit was “unable to overcome obstacles in rough terrain,” forcing the infantry squad to “deviate from its concealed route”.47 This is not just an inconvenience; it is a tactical failure that compromises concealment and mission success. Decades of research show that AI perception for UGVs still struggles to detect “below ground obstacles” (like ditches) or correctly characterize “foliage” density.49

Therefore, in the 2025-2030 timeframe, leaders should not bank on autonomous UGVs for high-risk, dismounted missions in complex terrain. Over-reliance on this unproven “mule” 47 will create a new and critical point of mission failure.


4.0. RISKS AND VULNERABILITIES: THE AI-ENABLED THREAT MATRIX

The proliferation of AI is not a one-sided advantage. It creates new, symmetric, and asymmetric vulnerabilities. These risks must be understood as both external (adversarial use) and internal (failures of our own adoption).

4.1. External Threat: Adversarial AI (Red Team)

SOF’s traditional technological overmatch is eroding as adversaries gain access to the same COTS AI tools.

Democratization of Asymmetric Threats (VNSAs)

Violent non-state actors (VNSAs) like Hamas and the Houthis have already “revolutionized modern warfare” 15 with cheap, COTS drones. The next, immediate evolution is the integration of COTS AI.14

  • Adversarial AI Swarms: An adversary no longer needs a state-sponsor to deploy an autonomous swarm. They can use open-source AI software to manage “swarm coordination” 63 for COTS drones, creating a low-cost, high-volume, “unmanageable threat” 17 that can saturate SOF C-UAS systems.16
  • AI-Guided IEDs (“Smart Mines”): Adversaries will adapt AI technology from commercial industries (e.g., “smart mining” 89) to create the next generation of IEDs. An AI-guided munition could be trained on open-source imagery to recognize SOF-specific vehicles or even US-pattern uniforms, remaining dormant until its AI sensor makes a positive target identification.

Peer Adversary Counter-SOF (GenAI & Counter-Intel)

Peer adversaries (e.g., China, Russia) 91 will leverage AI for sophisticated counter-SOF operations.

  • GenAI Deception & Deepfakes: The greatest threat of GenAI in a UW/FID environment is deception.18 An adversary can use deepfake technology to create a realistic but false video of a SOF operator or partner force leader committing an atrocity, then use AI-driven information warfare 19 to “amplify” this message and destroy local trust, causing mission-failure.
  • COTS AI for Counter-Intelligence: This is a critical, under-appreciated threat. Adversaries can use the same COTS tools we plan to use. They can use AI-powered translation 20 to instantly analyze captured documents or radio intercepts. Most dangerously, they can use open-source AI biometric tools and “jailbroken” LLMs 38 to “scrape” public-facing internet and social media, building facial recognition databases of SOF operators and their families for targeting and blackmail.39

4.2. Internal Risk: Technical & Operational Failure (Blue Team)

The most insidious threats are the ones we introduce ourselves through flawed technology and poor adoption.

Technical Vulnerabilities: Data Poisoning

AI systems are “highly vulnerable” 95 to data-centric attacks. The most significant threat is data poisoning.27 This is a “covert weapon” 27 where an adversary gains access to and manipulates the training data for an AI model.

  • Scenario: A peer adversary covertly “poisons” the training data for our AI-powered Automatic Target Recognition (ATR) system. They feed it thousands of images where friendly vehicles (e.g., an M-ATV) are mislabeled as hostile, or where hostile vehicles are mislabeled as civilian. The “poisoned” AI is deployed. In combat, this AI, which we trust, will be rendered “ineffective”.27 It will either autonomously identify friendly forces as targets, leading to catastrophic fratricide, or deliberately filter out real threats, providing a “false positive” of a safe environment.

Operational Over-Reliance & Skill Atrophy

  • The “Atrophy” Risk: This is the most profound institutional risk. President Dwight D. Eisenhower’s dictum “plans are worthless, but planning is everything” 21 highlights that the process of planning creates “experiential learning” and “shared understanding”.21 When we outsource core cognitive tasks—like COA development—to AI planning tools (e.g., COA-GPT) 21, our staffs lose that shared understanding. Their critical thinking and planning skills “atrophy”.98 This creates a brittle force of commanders who can select an AI’s COA but cannot create one when the AI fails, is unavailable, or is compromised.
  • Over-Reliance (Automation Bias): This is the tactical risk. Over-reliance occurs when operators “accept incorrect or incomplete AI outputs”.99 An operator wearing an AR HMD 5 that “highlights” a potential target may develop “tunnel vision,” ceasing to scan un-highlighted areas.101 This “automation bias” 102 means the operator misses the actual threat that the AI failed to classify, leading to a lethal surprise.

The “Black Box” Problem (LOAC & Ethics)

  • Un-explainable Decisions: Many advanced AI models are “black boxes”.22 They provide an output (e.g., “Target X is a 95% match”) but cannot explain the logic or data used to reach that conclusion.22 This is legally and ethically catastrophic. A commander who authorizes a strike based on an AI’s “black box” recommendation cannot legally justify that action under the Law of Armed Conflict (LOAC). They cannot prove distinction or proportionality if they cannot explain the “why” behind the strike.
  • Accelerating the Kill Chain (The “Lavender” Risk): AI is not a panacea for civilian harm (CIVHARM). In fact, evidence suggests it can increase it. Reports on the Israeli military’s alleged use of AI systems like “Lavender” (to identify militants) and “Where’s Daddy?” (to predict when they are home) 24 indicate a dangerous trend. By “accelerating the kill chain” 24, the AI reportedly generated 100 targets per day, giving human officers as little as “20 seconds to verify” the AI’s recommendation.24 This prioritization of speed over judgment leads to catastrophic errors. The infamous 2021 drone strike in Kabul that killed 10 civilians was a direct result of a flawed, eight-hour “pattern-of-life” analysis that “misinterpreted the target’s behavior”.25 This is the single greatest risk of AI targeting: it scales up bad decisions and flawed intelligence at machine speed.

5.0. STRATEGIC RECOMMENDATIONS FOR SOF LEADERSHIP

To harness AI’s opportunities while mitigating its profound risks, SOF leadership must immediately adopt a deliberate, clear-eyed, and candid approach.

  1. Prioritize “Edge AI” & Operator Augmentation: Aggressively fund and field decentralized, on-device AI systems. The procurement priority must be on systems that are “ruggedized” 2 and proven to function in DDIL environments.2 Focus on:
  • Operator-worn SA/C2 HMDs (e.g., Anduril EagleEye).5
  • On-device, offline Biometrics/Intel (e.g., Reveal-tech Identifi).9
  • Resilient Navigation (VIO/LIDAR) for GPS-denied environments.6
  1. Invest in “Red Team” AI & C-AI: Establish a dedicated “Red Team” AI cell. This cell’s sole purpose must be to develop and test adversary AI TTPs against our own forces in exercises. This cell must be tasked with:
  • Weaponizing COTS AI and hardware 14 to test C-UAS and base defense protocols.
  • Conducting GenAI/Deepfake attacks 19 against our own partner-force missions (in training) to build MISO and CI resilience.
  • Actively attempting data poisoning attacks 27 against all AI systems before they are fielded to test their security and resilience.
  1. Mandate “Explainability” & “Glass Box” Targeting: Prohibit the fielding of “black box” kinetic AI systems.22
  • Mandate that all AI-assisted targeting systems be “explainable” (XAI). The system must be able to “show its work” 23 to the human operator and, crucially, to a legal reviewer. This is the only way to ensure compliance with LOAC.
  • Do not accept vendor claims of “AI magic.” Demand transparency in procurement.
  1. Redefine the “Human-in-the-Loop”: The human operator must be more than a “clicker”.24
  • Training: Modify training protocols 101 to focus on combating automation bias.99 Operators must be rigorously trained when to distrust the AI.
  • Time: Prohibit AI-accelerated “kill chains” 24 that remove human judgment. Mandate minimum human decision-time for AI-generated targets. The “20-second” verification 24 is a “never-again” lesson. The human must be a veto-wielding critical thinker, not a rubber-stamping functionary.
  1. Combat Skill Atrophy: Embrace AI planning tools (e.g., COA-GPT) 21 for speed, but retain analog planning for expertise.
  • Mandate that for every one AI-generated plan, the staff must manually produce one during training exercises.21
  • Use AI to generate options, but force humans to perform the “experiential learning” 21 of wargaming, analysis, and decision. The goal is an AI-augmented staff, not an AI-replaced staff.
  1. Manage UGV Expectations: Be candid about UGV limitations.47 Do not procure “robotic mule” 47 systems at scale until they have been independently verified to navigate complex, “off-road” terrain 48 relevant to dismounted SOF operations. Focus near-term UGV investment on simple, proven tasks (e.g., static perimeter defense, “follow-me” on established routes).

APPENDIX: METHODOLOGY

This report was compiled using a structured analytical methodology designed to provide predictive, operationally-relevant insights for senior SOF leadership.

  1. Doctrinal Scaffolding: The analysis framework was built upon the established Core Activities of first-world SOF (e.g., USSOCOM 28, NATO 30, and UKSF 105). All technological opportunities and risks were mapped directly to these doctrinal functions to ensure operational relevance.
  2. Cross-Correlated Data Synthesis: Research was clustered into key technological and thematic areas (e.g., “Edge AI,” “Autonomous Swarms,” “Generative AI,” “Operational Risks”). Insights were generated by synthesizing disparate data points, such as connecting a vendor’s technical promise for a UGV 45 with a candid field-trial failure report.47
  3. Near-Term Horizon (5-Year Scope): The analysis excluded theoretical, long-term AI (e.g., Artificial General Intelligence). It focused on technologies in advanced R&D (e.g., DARPA 107), active testing (e.g., CCA YFQ-44A 33), or existing/COTS deployment (e.g., Identifi 9, XTEND 10, GenAI 42).
  4. Candid Risk Assessment: Per the requirement for an “objective, candid” report, the analysis actively sought out contradictions, documented failures, and ethical challenges. This included analyzing documented CIVHARM incidents 24, institutional risks 21, and technical vulnerabilities 27 to provide a balanced, non-biased assessment.
  5. Second- and Third-Order Insight Generation: The methodology moved beyond descriptive analysis (what the technology does) to predictive and prescriptive analysis (what the operational implication is, and what leaders must do about it). This was achieved by identifying causal relationships and their strategic implications (e.g., The necessity of Edge AI in a DDIL environment implies the operator becomes a new C5ISTAR node, which implies a new signature vulnerability).

If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly contribute towards our continued reporting, please visit our funding page.


Sources Used

  1. Edge AI in Tactical Defense: Empowering the Future of Military and Aerospace Operations, accessed November 16, 2025, https://dedicatedcomputing.com/edge-ai-in-tactical-defense-empowering-the-future-of-military-and-aerospace-operations/
  2. From core to tactical edge: A unified platform for defense innovation – Red Hat, accessed November 16, 2025, https://www.redhat.com/en/blog/core-tactical-edge-unified-platform-defense-innovation
  3. The future of defense: AI at the edge for real-time tactical advantage, accessed November 16, 2025, https://www.washingtontechnology.com/sponsors/sponsor-content/2025/04/future-defense-ai-edge-real-time-tactical-advantage/404000/
  4. The new frontline: Winning the information war at the tactical edge | FedScoop, accessed November 16, 2025, https://fedscoop.com/the-new-frontline-winning-the-information-war-at-the-tactical-edge/
  5. Anduril’s EagleEye Puts Mission Command and AI Directly into the …, accessed November 16, 2025, https://www.anduril.com/article/anduril-s-eagleeye-puts-mission-command-and-ai-directly-into-the-warfighter-s-helmet/
  6. GPS-denied navigation expands the threshold for mission-critical drone use cases, accessed November 16, 2025, https://militaryembedded.com/comms/gps/gps-denied-navigation-expands-the-threshold-for-mission-critical-drone-use-cases
  7. HIGHLY ACCURATE GPS-DENIED PNT USING DIRECT DOPPLER LIDAR MEASUREMENTS – NDIA – Michigan, accessed November 16, 2025, https://ndia-mich.org/images/events/gvsets/2024/papers/AAIR/1%2010PM%20Highly%20Accurate%20GPS%20Denied%20PNT%20Using%20Doppler%20LIDAR%20Measurements.pdf
  8. 5 Real-Time AI Translation Devices That Will Blow Your Mind – KUDO, accessed November 16, 2025, https://kudo.ai/blog/mind-blowing-real-time-translation-devices/
  9. Identifi – Reveal Technology, accessed November 16, 2025, https://www.revealtech.ai/identifi
  10. DoD contracts Israeli drone startup XTEND for combat drones | The …, accessed November 16, 2025, https://www.jpost.com/defense-and-tech/article-873488
  11. Military Drone Swarm Intelligence Explained – Sentient Digital, Inc., accessed November 16, 2025, https://sdi.ai/blog/military-drone-swarm-intelligence-explained/
  12. Our First Look At The YFQ-44A ‘Fighter Drone’ Collaborative Combat Aircraft – The War Zone, accessed November 16, 2025, https://www.twz.com/air/our-first-look-at-yfq-44a-fighter-drone-prototype
  13. DAF begins ground testing for Collaborative Combat Aircraft, selects Beale AFB as the preferred location for aircraft readiness unit > Air Force > Article Display – AF.mil, accessed November 16, 2025, https://www.af.mil/News/Article-Display/Article/4171208/daf-begins-ground-testing-for-collaborative-combat-aircraft-selects-beale-afb-a/
  14. Democratizing harm: Artificial intelligence in the hands of nonstate actors – Brookings Institution, accessed November 16, 2025, https://www.brookings.edu/wp-content/uploads/2021/11/FP_20211122_ai_nonstate_actors_kreps.pdf
  15. The Rising Threat of Non-State Actor Commercial Drone Use …, accessed November 16, 2025, https://ctc.westpoint.edu/the-rising-threat-of-non-state-actor-commercial-drone-use-emerging-capabilities-and-threats/
  16. From Autonomy to Swarms: The Evolving Non-State Drone Threat – HSToday, accessed November 16, 2025, https://www.hstoday.us/featured/from-autonomy-to-swarms-the-evolving-non-state-drone-threat/
  17. Countering Swarms: Strategic Considerations and Opportunities in Drone Warfare, accessed November 16, 2025, https://ndupress.ndu.edu/Media/News/News-Article-View/Article/3197193/countering-swarms-strategic-considerations-and-opportunities-in-drone-warfare/
  18. Impacts of Adversarial Use of Generative AI on Homeland Security, accessed November 16, 2025, https://www.dhs.gov/sites/default/files/2025-01/25_0110_st_impacts_of_adversarial_generative_aI_on_homeland_security_0.pdf
  19. Deepfake Technology in the Age of Information Warfare – Lieber Institute West Point, accessed November 16, 2025, https://lieber.westpoint.edu/deepfake-technology-age-information-warfare/
  20. How Dangerous Is Criminal Use of AI Translation for Global Security? – Elmura Linguistics, accessed November 16, 2025, https://elmuralinguistics.com/ai-translation-criminal-use-global-security/
  21. Harnessing the Algorithm: Shaping the Future of AI-Enabled Staff …, accessed November 16, 2025, https://www.ausa.org/publications/harding-paper/harnessing-the-algorithm
  22. Common ethical challenges in AI – Human Rights and Biomedicine – The Council of Europe, accessed November 16, 2025, https://www.coe.int/en/web/human-rights-and-biomedicine/common-ethical-challenges-in-ai
  23. Risks of Gen AI: the black box problem – KWM, accessed November 16, 2025, https://www.kwm.com/au/en/insights/latest-thinking/risks-of-gen-ai-the-black-box-problem.html
  24. Does AI really reduce casualties in war? “That’s highly questionable …, accessed November 16, 2025, https://www.uu.nl/en/news/does-ai-really-reduce-casualties-in-war-thats-highly-questionable-says-lauren-gould
  25. Algorithms of war: The use of artificial intelligence in decision making in armed conflict, accessed November 16, 2025, https://blogs.icrc.org/law-and-policy/2023/10/24/algorithms-of-war-use-of-artificial-intelligence-decision-making-armed-conflict/
  26. Operational Errors and Civilian Casualties | Small Wars Journal by Arizona State University, accessed November 16, 2025, https://smallwarsjournal.com/2025/11/13/operational-errors-and-civilian-causalties/
  27. Data Poisoning as a Covert Weapon: Securing U.S. Military Superiority in AI-Driven Warfare, accessed November 16, 2025, https://lieber.westpoint.edu/data-poisoning-covert-weapon-securing-us-military-superiority-ai-driven-warfare/
  28. ​SOF Core Activ​ities – SOCOM.mil, accessed November 16, 2025, https://www.socom.mil/about/core-activities
  29. 2025 Fact Book.pdf – SOCOM.mil, accessed November 16, 2025, https://www.socom.mil/FactBook/2025%20Fact%20Book.pdf
  30. U.S. Special Operations Forces (SOF): Background and Considerations for Congress, accessed November 16, 2025, https://www.congress.gov/crs-product/RS21048
  31. The Strategic Utility Of Special Operations Forces In The U.S. Homeland Security And Defense – NATO Veterans Initiative, accessed November 16, 2025, https://nato-veterans.org/strategic-utility-of-special-operations-forces/
  32. AI-Powered Loitering Munition Systems Set New Standard for Battlefield Autonomy, accessed November 16, 2025, https://www.autonomyglobal.co/ai-powered-loitering-munition-systems-set-new-standard-for-battlefield-autonomy/
  33. Fury’s Dawn: Anduril’s AI Jet Soars into Combat Future, accessed November 16, 2025, https://www.webpronews.com/furys-dawn-andurils-ai-jet-soars-into-combat-future/
  34. [2211.05883] Open-Set Automatic Target Recognition – arXiv, accessed November 16, 2025, https://arxiv.org/abs/2211.05883
  35. Aided target recognition visual design impacts on cognition in simulated augmented reality, accessed November 16, 2025, https://www.frontiersin.org/journals/virtual-reality/articles/10.3389/frvir.2022.982010/full
  36. Big Data at War: Special Operations Forces, Project Maven, and Twenty-First-Century Warfare, accessed November 16, 2025, https://mwi.westpoint.edu/big-data-at-war-special-operations-forces-project-maven-and-twenty-first-century-warfare/
  37. Torch.AI Releases New Open-Source AI-Powered Data Orchestrator …, accessed November 16, 2025, https://www.torch.ai/newsroom/torch-ai-releases-new-open-source-ai-powered-data-orchestrator-to-transform-defense-and-national-security-operations
  38. Trend Micro State of AI Security Report 1H 2025, accessed November 16, 2025, https://www.trendmicro.com/vinfo/us/security/news/threat-landscape/trend-micro-state-of-ai-security-report-1h-2025
  39. The risks and inefficacies of AI systems in military targeting support, accessed November 16, 2025, https://blogs.icrc.org/law-and-policy/2024/09/04/the-risks-and-inefficacies-of-ai-systems-in-military-targeting-support/
  40. Press Release: Evaluation of the DoD’s Military Information Support Operations Workforce (Report No. DODIG-2024-068), accessed November 16, 2025, https://www.dodig.mil/In-the-Spotlight/Article/3719783/press-release-evaluation-of-the-dods-military-information-support-operations-wo/
  41. [2405.03688] Large Language Models Reveal Information Operation Goals, Tactics, and Narrative Frames – arXiv, accessed November 16, 2025, https://arxiv.org/abs/2405.03688
  42. Automating OIE with Large Language Models > Air University (AU) > Wild Blue Yonder, accessed November 16, 2025, https://www.airuniversity.af.edu/Wild-Blue-Yonder/Articles/Article-Display/Article/3607802/automating-oie-with-large-language-models/
  43. Acquiring Generative Artificial Intelligence to Improve U.S. Department of Defense Influence Activities – RAND, accessed November 16, 2025, https://www.rand.org/content/dam/rand/pubs/research_reports/RRA3100/RRA3157-1/RAND_RRA3157-1.pdf
  44. AI Translation & Captions for Meetings and Events | Wordly, accessed November 16, 2025, https://www.wordly.ai/
  45. Mission Master – Uncrewed Ground Vehicles family (UGV) – Rheinmetall, accessed November 16, 2025, https://www.rheinmetall.com/en/products/uncrewed-vehicles/uncrewed-ground-systems/mission-master-a-ugs
  46. The Future Of CASEVAC: Uncrewed Ground Vehicles on the Battlefield – Line of Departure, accessed November 16, 2025, https://www.lineofdeparture.army.mil/Journals/Pulse-of-Army-Medicine/Archive/July-2025/Future-Of-CASEVAC/
  47. Is drone-based resupply viable? – European Security & Defence, accessed November 16, 2025, https://euro-sd.com/2025/10/articles/armament/47250/is-drone-based-resupply-viable/
  48. The Future of Unmanned Ground Systems in the Operational Environment – Army.mil, accessed November 16, 2025, https://www.army.mil/article/238342/the_future_of_unmanned_ground_systems_in_the_operational_environment
  49. Unmanned Ground Vehicle (UGV) Lessons Learned – DTIC, accessed November 16, 2025, https://apps.dtic.mil/sti/tr/pdf/ADA495124.pdf
  50. Persistent ISR at the Tactical Edge – You Need More Than AI to Counter Today’s Threats, accessed November 16, 2025, https://clearalign.com/knowledge-center/id/24/persistent-isr-at-the-tactical-edge–you-need-more-than-ai-to-counter-todays-threats
  51. Air Force Doctrine Note 25-1, Artificial Intelligence (AI), accessed November 16, 2025, https://www.doctrine.af.mil/Portals/61/documents/AFDN_25-1/AFDN%2025-1%20Artificial%20Intelligence.pdf
  52. AI Analytics In Military Defense Market Analysis, Size, and Forecast 2025-2029 – Technavio, accessed November 16, 2025, https://www.technavio.com/report/ai-analytics-in-military-defense-market-industry-analysis
  53. Catalyst Accelerator Launches AI Cohort for Space Force ISR – ExecutiveGov, accessed November 16, 2025, https://www.executivegov.com/articles/catalyst-accelerator-cohort-ai-isr-ussf
  54. AI & Analytics in Military and Defense Market, Size Report 2034, accessed November 16, 2025, https://www.gminsights.com/industry-analysis/ai-and-analytics-in-military-and-defense-market
  55. Operationalizing Artificial Intelligence for Algorithmic Warfare – Army University Press, accessed November 16, 2025, https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/July-August-2020/Crosby-Operationalizing-AI/
  56. Artificial Intelligence Analyzing Forensic Data and Patterns of Life – Air University, accessed November 16, 2025, https://www.airuniversity.af.edu/Office-of-Sponsored-Programs/Research/Article-Display/Article/2699685/artificial-intelligence-analyzing-forensic-data-and-patterns-of-life/
  57. expert consultation report – artificial intelligence and related technologies in military decision-making on the use of force in armed conflicts, accessed November 16, 2025, https://www.geneva-academy.ch/joomlatools-files/docman-files/Artificial%20Intelligence%20And%20Related%20Technologies%20In%20Military%20Decision-Making.pdf
  58. AI in Defense Market Report 2030: Trends, Industry Insights, accessed November 16, 2025, https://www.knowledge-sourcing.com/report/ai-in-defense-market
  59. ISAAC-ISR Case Study | AI-Driven ISR Modernization Platform – i3CA, accessed November 16, 2025, https://i3ca.com/case-studies/isaac-isr-ai-driven-intelligence-modernization/
  60. Modernizing Military Decision-Making: Integrating AI into Army Planning, accessed November 16, 2025, https://www.armyupress.army.mil/Journals/Military-Review/Online-Exclusive/2025-OLE/Modernizing-Military-Decision-Making/
  61. COA-GPT: Generative Pre-trained Transformers for Accelerated Course of Action Development in Military Operations This research was sponsored by the Army Research Laboratory and was accomplished under Cooperative Agreement Number W911NF-23-2-0072. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the – arXiv, accessed November 16, 2025, https://arxiv.org/html/2402.01786v1
  62. INDUSTRY PERSPECTIVE: Autonomous Swarm Drones New Face of Warfare, accessed November 16, 2025, https://www.nationaldefensemagazine.org/articles/2023/12/13/industry-perspective-autonomous-swarm-drones-new-face-of–warfare
  63. AI in Military Drones: Transforming Modern Warfare (2025-2030) – MarketsandMarkets, accessed November 16, 2025, https://www.marketsandmarkets.com/ResearchInsight/ai-in-military-drones-transforming-modern-warfare.asp
  64. Smarter Robot Swarms Could Change Warfare – AUSA, accessed November 16, 2025, https://www.ausa.org/articles/smarter-robot-swarms-could-change-warfare
  65. SOFINS 2025 – MBDA France: the Akeron family grows with two loitering munitions, accessed November 16, 2025, https://www.edrmagazine.eu/sofins-2025-mbda-france-the-akeron-family-grows-with-two-loitering-munitions
  66. HX-2 – AI Strike Drone – Helsing, accessed November 16, 2025, https://helsing.ai/hx-2
  67. Quantum Systems Unveils Vector AI sUAS at AUSA Global Force in the US, accessed November 16, 2025, https://quantum-systems.com/us/news/quantum-systems-unveils-vector-ai/
  68. Manned-unmanned teaming – Wikipedia, accessed November 16, 2025, https://en.wikipedia.org/wiki/Manned-unmanned_teaming
  69. What is Manned-Unmanned Teaming (MUM-T)? – BAE Systems, accessed November 16, 2025, https://www.baesystems.com/en-us/definition/what-is-manned-unmanned-teaming
  70. Manned-Unmanned Teaming – Joint Air Power Competence Centre, accessed November 16, 2025, https://www.japcc.org/articles/manned-unmanned-teaming/
  71. U.S. Air Force Collaborative Combat Aircraft (CCA) – Congress.gov, accessed November 16, 2025, https://www.congress.gov/crs-product/IF12740
  72. 690: LOYAL WINGMAN CONCEPT: REDEFINING AIR COMBAT – 55 NDA Alumni, accessed November 16, 2025, https://55nda.com/blogs/anil-khosla/2025/06/29/690-loyal-wingman-concept-redefining-air-combat/
  73. Inside the race to build America’s next combat drone wingman – YouTube, accessed November 16, 2025, https://www.youtube.com/watch?v=vuR8_4Qjpuk
  74. Anduril’s YFQ-44A Begins Flight Testing for the Collaborative Combat Aircraft Program, accessed November 16, 2025, https://www.anduril.com/article/anduril-yfq-44a-begins-flight-testing-for-the-collaborative-combat-aircraft-program/
  75. Loyal Wingman, Collaborative Combat Aircraft redefine war | The Jerusalem Post, accessed November 16, 2025, https://www.jpost.com/defense-and-tech/article-865389
  76. Marines Deploy ‘Loyal Wingman’ Drone in Joint Force Test – USNI News, accessed November 16, 2025, https://news.usni.org/2024/10/22/marines-deploy-loyal-wingman-drone-in-joint-force-test
  77. Home – Combat Capabilities Development Command C5ISR Center, accessed November 16, 2025, https://c5isrcenter.devcom.army.mil/
  78. C5ISR Center research connects aided target recognition with small UAS for greater squad lethality | Article – Army.mil, accessed November 16, 2025, https://www.army.mil/article/287719/c5isr_center_research_connects_aided_target_recognition_with_small_uas_for_greater_squad_lethality
  79. United States Army Special Forces – Wikipedia, accessed November 16, 2025, https://en.wikipedia.org/wiki/United_States_Army_Special_Forces
  80. An Unconventional Warfare Mindset – The Philosophy of Special Forces Must be Sustained, accessed November 16, 2025, https://sofsupport.org/an-unconventional-warfare-mindset-the-philosophy-of-special-forces-must-be-sustained/
  81. Wearable Translator Technology: How to Choose the Best Solution – Relay, accessed November 16, 2025, https://relaypro.com/blog/wearable-translator-technology-how-to-choose-the-best-solution/
  82. AI-Generated Translation Devices: We Tested 3 So You Don’t Have To, accessed November 16, 2025, https://certifiedlanguages.com/blog/we-tested-ai-generated-translation-devices/
  83. Special Operations Doctrine: Is it Needed – DTIC, accessed November 16, 2025, https://apps.dtic.mil/sti/tr/pdf/AD1042554.pdf
  84. Augmented Reality Tool for the Situational Awareness Improvement of UAV Operators, accessed November 16, 2025, https://www.mdpi.com/1424-8220/17/2/297
  85. Artificial Intelligence in the Military – AI-Driven Decision-Making for Joint Operations – FlySight, accessed November 16, 2025, https://www.flysight.it/artificial-intelligence-in-the-military-ai-driven-decision-making-for-joint-operations/
  86. Intelligent Mobility Research at Defence R&D Canada for Autonomous UGV Mobility in Complex Terrain – NATO, accessed November 16, 2025, https://publications.sto.nato.int/publications/STO%20Meeting%20Proceedings/RTO-MP-AVT-146/MP-AVT-146-04.pdf
  87. (PDF) Reliable Operations of Unmanned Ground Vehicles: Research at the Ground Robotics Reliability Center – ResearchGate, accessed November 16, 2025, https://www.researchgate.net/publication/228583989_Reliable_Operations_of_Unmanned_Ground_Vehicles_Research_at_the_Ground_Robotics_Reliability_Center
  88. C5ISR Center Supports Border Operations with C-UAS Technology – DVIDS, accessed November 16, 2025, https://www.dvidshub.net/news/497513/c5isr-center-supports-border-operations-with-c-uas-technology
  89. AI In Mining Industry: 7 Power Trends For 2025 – Farmonaut, accessed November 16, 2025, https://farmonaut.com/mining/ai-in-mining-industry-7-power-trends-for-2025
  90. The Future of Automated Mining: Technology, AI, and Efficiency in 2025 – WunderTrading, accessed November 16, 2025, https://wundertrading.com/journal/en/learn/article/automated-mining
  91. Special Warfare – usajfkswcs, accessed November 16, 2025, https://www.swcs.mil/Portals/111/32-2_APR_JUN_2019.pdf
  92. Integrated Warfare: How U.S. Special Operations Forces Can Counter AI-Equipped Chinese Special Operations Forces – Army University Press, accessed November 16, 2025, https://www.armyupress.army.mil/Journals/Military-Review/Online-Exclusive/2024-OLE/Integrated-Warfare/
  93. The Newest Weapon in Irregular Warfare – Artificial Intelligence, accessed November 16, 2025, https://irregularwarfarecenter.org/publications/perspectives/the-newest-weapon-in-irregular-warfare-artificial-intelligence/
  94. Adversarial Misuse of Generative AI | Google Cloud Blog, accessed November 16, 2025, https://cloud.google.com/blog/topics/threat-intelligence/adversarial-misuse-generative-ai
  95. Navigating cyber vulnerabilities in AI-enabled military systems, accessed November 16, 2025, https://europeanleadershipnetwork.org/commentary/navigating-cyber-vulnerabilities-in-ai-enabled-military-systems/
  96. Risks and Mitigation Strategies for Adversarial Artificial Intelligence Threats: A DHS S&T Study – Homeland Security, accessed November 16, 2025, https://www.dhs.gov/sites/default/files/2023-12/23_1222_st_risks_mitigation_strategies.pdf
  97. When AI Trusts False Data: Exploring Data Spoofing’s Impact on Security – Defence.AI, accessed November 16, 2025, https://defence.ai/ai-security/data-spoofing-ai/
  98. AI and Software Development: Risks of Over-Reliance and How to Mitigate Them, accessed November 16, 2025, https://techtalks.qima.com/ai-and-software-development-risks-of-over-reliance-and-how-to-mitigate-them/
  99. Overreliance on AI: Risk Identification and Mitigation Framework – Microsoft Learn, accessed November 16, 2025, https://learn.microsoft.com/en-us/ai/playbook/technology-guidance/overreliance-on-ai/overreliance-on-ai
  100. The Risks of Over-Reliance on AI – Glaxit, accessed November 16, 2025, https://glaxit.com/blog/the-risks-of-over-reliance-on-ai/
  101. Enhancing Tactical Level Targeting With Artificial Intelligence – Line of Departure, accessed November 16, 2025, https://www.lineofdeparture.army.mil/Journals/Field-Artillery/FA-2024-Issue-1/Enhancing-Tactical-Level-Targeting/
  102. Depending on your AI: Risks of over-reliance from people and business – AICC, accessed November 16, 2025, https://www.aicc.co/responsible-ai-hub/keep-up-to-date-with-responsible-ai/blog-posts/depending-on-your-ai-risks-of-over-reliance-from-people-and-business
  103. Risks and Remedies for Black Box Artificial Intelligence – C3 AI, accessed November 16, 2025, https://c3.ai/blog/risks-and-remedies-for-black-box-artificial-intelligence/
  104. Black box algorithms and the rights of individuals: no easy solution to the “explainability” problem | Internet Policy Review, accessed November 16, 2025, https://policyreview.info/articles/analysis/black-box-algorithms-and-rights-individuals-no-easy-solution-explainability
  105. What are the Special Forces? | National Army Museum, accessed November 16, 2025, https://www.nam.ac.uk/explore/what-are-special-forces
  106. UKSF: The United Kingdom Special Forces – Grey Dynamics, accessed November 16, 2025, https://greydynamics.com/uksf-the-united-kingdom-special-forces/
  107. AI Next Campaign – DARPA, accessed November 16, 2025, https://www.darpa.mil/research/programs/ai-next-campaign
  108. AI Forward | DARPA, accessed November 16, 2025, https://www.darpa.mil/research/programs/ai-forward
  109. DARPA Aims to Develop AI, Autonomy Applications Warfighters Can Trust, accessed November 16, 2025, https://www.war.gov/News/News-Stories/Article/Article/3722849/darpa-aims-to-develop-ai-autonomy-applications-warfighters-can-trust/

The Evolution, Doctrine, and Armament of the Spanish Mando de Operaciones Especiales

The origins of Spain’s elite special operations forces are deeply rooted in the nation’s unique military history and the geopolitical realities of the Cold War. While Spain possesses a long and storied tradition of irregular warfare, dating back to the guerrilleros of the Peninsular War against Napoleon, the modern incarnation of its special forces was conceived in the mid-20th century. The formal proposal to create dedicated special operations units emerged in 1956, a decision influenced by the global proliferation of guerrilla conflicts and the examples set by established Western special forces, notably the United States Army’s Green Berets and the British Special Air Service (SAS).1

This initiative took concrete form in 1957 with the establishment of the first experimental “Aptitud para el Mando de Unidades Guerrilleras” (Aptitude for Command of Guerrilla Units) course at the prestigious Escuela Militar de Montaña (Military Mountain School – EMM) in Jaca.1 This venue was not incidental; it forged an inextricable link between high-altitude mountain warfare and special operations that would define the character of Spain’s elite soldiers for decades.

The First “Boinas Verdes”: From UOE to COE

By the end of 1961, the EMM had graduated a sufficient cadre of specialized officers and non-commissioned officers to form the first operational units. On an experimental basis, the Ministry of Defense ordered the creation of two Unidades de Operaciones Especiales (Special Operations Units – UOEs): UOE No. 71, based in Oviedo, and UOE No. 81, in Orense. These units were mandated to be fully organized by March 1, 1962.1 From their inception, these units were composed exclusively of volunteers who had to pass a stringent selection process. Their initial armament was the standard infantry issue of the day: the robust 7.62x51mm CETME assault rifle, a service pistol, and a combat knife.1 In December 1962, UOE No. 71 formally adopted the green beret (boina verde), which would become the iconic symbol of Spanish special forces.3

The success of these two experimental UOEs prompted a significant expansion. Between 1966 and 1969, the Spanish Army established a nationwide network of Compañías de Operaciones Especiales (Special Operations Companies – COEs). These company-sized formations were attached to the various Regiments of the Brigadas de Defensa Operativa del Territorio (Territorial Operational Defense Brigades – BRIDOT), a structure that firmly embedded their primary mission within a doctrine of national territorial defense against a potential Warsaw Pact invasion.3 At their peak in 1981, there were 25 distinct COEs spread across Spain’s military regions, each with a unique numerical designation and often a historical sobriquet honoring a famous Spanish guerrilla leader.3

Doctrine, Training, and the “Guerrillero Spirit”

The foundational doctrine of the COEs was guerrilla and counter-guerrilla warfare. Their personnel were universally known as guerrilleros, a title they embraced with pride.4 The training regimen was exceptionally arduous and designed to produce soldiers of unparalleled physical and mental resilience. The curriculum was remarkably comprehensive for its era, encompassing a wide array of skills essential for operating behind enemy lines in small, autonomous teams. Subjects included advanced topography and land navigation, demolitions and explosives, instinctive and combat shooting, survival and evasion techniques, rock climbing and rappelling, specialized winter and mountain warfare including skiing, and extensive waterborne operations such as river crossings and coastal reconnaissance.4

The culmination of this grueling training was the infamous prueba de la boina (beret test). This was a continuous, multi-day field exercise that pushed candidates to their absolute limits through sleep deprivation, constant physical exertion, and a series of high-stress tests, including live-fire exercises simulating movement under enemy fire and resistance to interrogation.4 Only those who successfully completed this ordeal earned the right to wear the green beret. This process cultivated a unique ethos—the “guerrillero spirit”—a mindset characterized by extreme self-sufficiency, unwavering determination, and the conviction that no obstacle was insurmountable.4

A crucial distinction must be made, however, between the development of the mainland COEs and the special operations units of the Spanish Legion. While the COEs were training for a hypothetical, future conflict, the Legion’s Secciones de Operaciones Especiales (SOEs) were being forged in the crucible of active combat. During the 1970s, these Legion SOEs were formed to conduct counter-insurgency operations in the Spanish Sahara, specifically heliborne patrols and ambushes to control the movements of the Polisario Front and Moroccan irregulars.1 The historical record is clear that these Legion units were the only Spanish special operations forces of the era to engage in sustained combat operations and suffer casualties in action.1 This created two distinct but convergent streams of experience within Spanish SOF: the COEs, whose culture was defined by surviving one of the toughest training regimes in the world, and the Legion SOEs, whose culture was hardened by the realities of a protracted, low-intensity war. This injection of combat-proven experience would later prove invaluable to the unified command.

The armament of these early units reflected their mission. The primary individual weapon was the Spanish-designed CETME assault rifle, initially the Model B, which was replaced by the improved Model C in 1971.1 The standard sidearm evolved from the Astra 400 to the Star Model B pistol.5 For close-quarters work, the reliable Star Z-70/B submachine gun was available.11 Support weapons included the formidable MG-42/58 (a post-war variant of the German MG 42 chambered in 7.62x51mm NATO) and the Spanish-made Instalaza C90 disposable rocket launcher.1

II. Transformation and Professionalization: The GOE Era and NATO Integration (1979-1997)

The late 1970s and 1980s marked a period of profound transformation for Spain and its armed forces. The transition to democracy and the strategic decision to join the North Atlantic Treaty Organization (NATO) in 1982 acted as a powerful catalyst for military modernization. This geopolitical shift rendered the foundational doctrine of the COEs—territorial defense against a conventional invasion—effectively obsolete.3 The new strategic imperative was interoperability and the ability to deploy professional, expeditionary forces capable of operating seamlessly alongside NATO allies.

This new reality was the primary forcing function behind a complete reorganization of Spanish special operations forces. The alliance’s operational standards and doctrinal frameworks demanded a move away from a singular focus on guerrilla warfare toward a more versatile and internationally recognized mission set. This necessitated a top-down revolution in the structure, training, and purpose of Spain’s boinas verdes.3

From Companies to Groups (COE to GOE)

The organizational solution to this new doctrinal requirement was the consolidation of the disparate, company-sized COEs into larger, more capable, battalion-sized formations known as Grupos de Operaciones Especiales (Special Operations Groups – GOEs). This process began in May 1979 with the establishment of the first such unit, GOE I “Órdenes Militares,” in Colmenar Viejo, which integrated the former COE 11 and COE 12.1

Over the next decade, this consolidation continued systematically. Throughout the mid-1980s, new GOEs were formed by merging existing COEs, while others were disbanded:

  • 1984: GOE III “Valencia” was formed from COE 31 and 32.1
  • 1985: GOE II “Santa Fé” was formed in Granada, and the Legion’s special operations unit in Ronda was formally established as the Bandera de Operaciones Especiales de la Legión (BOEL) XIX, absorbing personnel and material from the dissolved COEs 21, 22, 91, and 92.1
  • 1986: GOE V “San Marcial” was created in Burgos from COE 61 and 62.1
  • 1987: GOE IV “Almogávares” was formed in Barcelona from COE 41 and 42.1
  • 1988: GOE VI “La Victoria” was established in La Coruña, incorporating the remaining COEs 71, 72, 81, and 82.1

This structural evolution from company to group provided significant advantages. It centralized command under higher-ranking officers (lieutenant colonels), streamlined logistical support, and greatly enhanced the capacity for independent operational planning and execution.1 The GOEs were structured into specialized operational teams, mirroring the organization of their NATO counterparts and facilitating easier integration into multinational command structures.6

The most fundamental change was doctrinal. The singular focus on guerrilla and counter-guerrilla tactics gave way to the standardized NATO SOF mission triad:

  • Direct Action (DA): Short-duration strikes and other small-scale offensive actions.
  • Special Reconnaissance (SR): Acquiring information concerning the capabilities, intentions, and activities of an enemy.
  • Military Assistance (MA): Training, advising, and otherwise assisting foreign military and paramilitary forces.

This doctrinal shift marked the birth of modern Spanish special operations forces, representing a deliberate and necessary break from the legacy of the territorial guerrilleros to create a professional, expeditionary force aligned with its new alliance commitments.6

Evolving Arsenal

This period of professionalization was also reflected in the force’s weaponry. While the Spanish-made CETME rifle remained in service, it underwent its own evolution with the adoption of the 5.56x45mm NATO caliber CETME Model L in the 1980s, replacing the older 7.62x51mm versions.15 More significantly, the GOEs began to acquire specialized weapon systems that were becoming the global standard for elite units. The most prominent of these was the Heckler & Koch MP5 submachine gun, particularly its suppressed variants, which offered unparalleled performance in close-quarters and counter-terrorism roles.1 The focus on NATO interoperability drove the adoption of standardized calibers and equipment interfaces, laying the groundwork for the highly advanced and modular arsenal that would be fielded in the 21st century.

III. A Unified Command: The Modern MOE (1997-Present)

The creation of the GOEs was a critical step in professionalizing Spain’s special operations capabilities, but a final piece of the command structure was needed to fully integrate these assets into the joint operational planning of the Spanish Armed Forces. To achieve this, the Mando de Operaciones Especiales (Special Operations Command – MOE) was officially created in October 1997 and became fully operational in July 1998.1

Establishment and Structure

The establishment of the MOE consolidated the remaining GOEs and the Legion’s elite BOEL under a single, unified command led by a Brigadier General. After an initial period headquartered in Jaca, the command was permanently established at the Alférez Rojas Navarrete barracks in Alicante.1 A further reorganization in 1996 had streamlined the force, dissolving GOEs I, II, V, and VI, leaving a core of highly professional units to form the new command.6

The modern structure of the MOE is lean and mission-focused, comprising:

  • Headquarters Group: Responsible for command, control, planning, and intelligence.
  • Grupo de Operaciones Especiales “Valencia” III (GOE III).
  • Grupo de Operaciones Especiales “Tercio del Ampurdán” IV (GOE IV).
  • Bandera de Operaciones Especiales “C. L. Maderal Oleaga” XIX (GOE XIX): The heir to the Legion’s combat-proven BOEL.
  • Logistics Unit: Provides dedicated logistical and maintenance support to the operational groups.3

The Modern Mission Set

The MOE fully embodies the modern, multi-faceted role of a top-tier NATO special operations force. While retaining the toughness and self-reliance of its guerrillero predecessors, its missions have evolved to meet the complex demands of contemporary conflict.20 The core tasks remain Direct Action, Special Reconnaissance, and Military Assistance, executed with surgical precision by small, highly trained operational teams.3

The MOE’s Direct Action capability was demonstrated most publicly in July 2002 during Operation Romeo-Sierra. In response to the occupation of the disputed Perejil Island by Moroccan forces, 23 operators from GOE III were inserted by helicopter, swiftly securing the island without a single shot fired and restoring Spanish sovereignty.3 This operation showcased the command’s ability to execute a high-stakes, politically sensitive mission with speed and precision.

Operational History in the Asymmetric Era

Since its formation, the MOE has been one of Spain’s most consistently deployed military assets, participating in nearly every major international mission undertaken by the Spanish Armed Forces. Operators have served in peacekeeping, stabilization, and counter-terrorism operations in Bosnia, Kosovo, Afghanistan, Iraq, Lebanon, and across the Sahel region of Africa.1

This extensive operational experience, particularly in the post-2003 asymmetric battlefields of Iraq and the Sahel, has shaped the command’s modern identity. While proficient in Direct Action, the MOE has cultivated a deep expertise in the “indirect approach” of Military Assistance. This “by, with, and through” methodology, where indigenous forces are trained and enabled to secure their own territory, has become a hallmark of modern Western SOF strategy.

In Iraq, as part of Operation Inherent Resolve, the MOE’s primary mission has been the training, advising, and assisting of the elite Iraqi Counter-Terrorism Service (CTS).23 Deployed to locations like Baghdad and Erbil, Spanish operators embed with CTS units, providing expert instruction and acting as a critical command-and-control link to the wider coalition. During CTS-led operations against Daesh remnants, the MOE’s Special Operations Task Group (SOTG) coordinates vital coalition support, including airpower, intelligence, surveillance, and reconnaissance (ISR) assets, and medical evacuation (MEDEVAC) capabilities.23 The depth of this partnership is exemplified by the fact that Iraqi K9 handlers have been trained to give their dogs commands in Spanish.23

Similarly, in the vast and unstable Sahel region, MOE teams have been instrumental in European Union and multinational training missions in countries like Mali, Mauritania, and the Central African Republic.1 In these austere environments, they work to build the capacity of local militaries to combat the spread of violent extremist organizations.25

This evolution reveals the MOE’s maturation into a sophisticated and strategically vital force. Its value to Spain and its allies is now defined as much by its ability to teach, advise, and build partner capacity as by its ability to conduct unilateral raids. This shift has profound implications for operator selection, training, and equipment, demanding skills in languages, cultural intelligence, and instruction alongside the traditional martial virtues of the commando.

IV. The Operator’s Toolkit: Contemporary Small Arms and Equipment of the MOE

The small arms inventory of the Mando de Operaciones Especiales reflects a procurement philosophy that is both pragmatic and aligned with the highest standards of modern special operations forces. The arsenal is characterized by its emphasis on proven reliability, logistical commonality with the broader Spanish Army where feasible, and complete interoperability with key NATO partners. This approach prioritizes performance and operator mastery over the adoption of unproven or niche systems. The result is a comprehensive toolkit of high-quality weapons sourced from premier European and American manufacturers, allowing MOE teams to configure their loadouts precisely for any given mission.

Sidearms

  • Heckler & Koch USP-SD: The standard-issue sidearm for the MOE is the Heckler & Koch Universelle Selbstladepistole (Universal Self-loading Pistol) in its “SD” configuration, chambered in 9x19mm Parabellum.1 This robust, polymer-framed pistol operates on a short-recoil, locked-breech principle and features a traditional double-action/single-action (DA/SA) trigger mechanism.28 The “SD” designation indicates that the barrel is extended and threaded, allowing for the direct attachment of a sound suppressor, a critical capability for clandestine operations.1 Renowned for its durability and reliability in harsh environments, the USP has served the command well for many years.

Submachine Guns & Personal Defense Weapons

  • Heckler & Koch MP5SD: For missions requiring maximum acoustic signature reduction, the MOE retains the legendary Heckler & Koch MP5SD.27 This variant of the MP5 family features an integral suppressor that is highly effective even with standard velocity 9x19mm ammunition. Its roller-delayed blowback action makes it an exceptionally smooth-shooting and accurate platform, ideal for stealthy close-quarters engagements, sentry elimination, and operations where discretion is paramount.1
  • Heckler & Koch MP7A1: A more recent addition to the inventory is the HK MP7A1 Personal Defense Weapon (PDW).1 Chambered for the high-velocity, armor-piercing 4.6x30mm cartridge, the MP7 bridges the gap between a traditional submachine gun and a carbine. Its compact, lightweight design and ability to defeat modern body armor make it an excellent choice for personal security details, vehicle crews, and close-quarters battle (CQB) scenarios where the over-penetration of a rifle round could be a liability.29

Assault Rifles & Carbines

  • Heckler & Koch G36 (K/C Variants): The primary individual weapon for most MOE operators is a variant of the Heckler & Koch G36, the standard-issue rifle of the Spanish Army.1 The MOE favors the shorter, more maneuverable G36K (Kurz/Short) and G36C (Compact) versions.1 These rifles are heavily customized to meet special operations requirements, featuring extensive MIL-STD-1913 Picatinny or similar rail systems (such as the HKey Slim Line handguard) to accommodate a full suite of mission-essential accessories, including advanced optics, laser aiming modules, and tactical lights.1 This commonality with the main army provides a significant logistical advantage, simplifying the supply of spare parts and ammunition during deployments.
  • Heckler & Koch HK416: The MOE also employs the HK416 assault rifle.1 This platform, which has become a benchmark for elite Western SOF, utilizes a short-stroke gas piston operating system. This system prevents hot propellant gases from entering the receiver, resulting in a cleaner, cooler-running weapon with enhanced reliability, particularly during suppressed fire or in austere environments like deserts or maritime settings. Its adoption ensures seamless interoperability with the most advanced NATO special operations units.

Battle Rifles & Designated Marksman Rifles (DMR)

  • Heckler & Koch G28: To provide operational teams with precision fire capability beyond the effective range of 5.56mm carbines, the MOE fields the Heckler & Koch G28.1 Based on the HK417 battle rifle, the G28 is a highly accurate semi-automatic platform chambered in the powerful 7.62x51mm NATO cartridge. It functions as a Designated Marksman Rifle (DMR), enabling a skilled shooter to rapidly engage targets out to 800 meters.31 The G28 is frequently equipped with high-magnification variable-power optics, such as the Schmidt & Bender 3-20×50 PMII, and has been documented in use as an aerial platform weapon, fired from the side doors of Spanish Army NH90 helicopters to provide precision overwatch.31

Sniper & Anti-Materiel Rifles

  • Accuracy International AXMC: For long-range anti-personnel engagements, the MOE’s primary precision weapon is the Accuracy International AXMC (AX Multi Caliber) bolt-action sniper rifle, chambered in.338 Lapua Magnum.1 This cartridge offers exceptional ballistic performance, allowing operators to accurately engage targets well beyond 1,500 meters.32 The AXMC is built on AI’s legendary chassis system, renowned for its accuracy, ruggedness, and modularity. It is typically paired with a world-class optic, such as the Schmidt & Bender 5-25×56 PMII, to maximize its extreme-range potential.1
  • Barrett M95 / M107A1: When the mission requires the engagement of hard targets, the MOE turns to the Barrett anti-materiel rifle, chambered in the formidable 12.7x99mm NATO (.50 BMG) cartridge.27 Both the bolt-action M95 and the semi-automatic M107A1 are in service.33 The role of this weapon is not anti-personnel, but rather the destruction of high-value enemy equipment, including light-skinned vehicles, communications arrays, radar installations, and ordnance, at ranges approaching 2,000 meters.33

Machine Guns

  • FN Minimi: For squad-level suppressive fire, the MOE utilizes the Belgian-designed FN Minimi light machine gun, chambered in 5.56x45mm NATO.35 This belt-fed weapon provides a high volume of fire in a relatively lightweight and portable package, allowing a small team to effectively suppress enemy positions.
  • Heckler & Koch MG5: The command is in the process of replacing its aging inventory of MG3 machine guns with the modern Heckler & Koch MG5.1 The MG5 is a general-purpose machine gun chambered in 7.62x51mm NATO. It offers significant advantages over its predecessor, including a more controllable, user-selectable rate of fire (640-800 rounds per minute), superior ergonomics, and an integrated Picatinny rail on the receiver cover for the mounting of modern optics, which greatly enhances its accuracy.36
  • Browning M2HB: For heavy, vehicle-mounted fire support, the MOE relies on the timeless Browning M2HB heavy machine gun. Chambered in.50 BMG, the M2 provides devastating firepower against both personnel and light materiel targets.1

Summary of Contemporary MOE Small Arms

Weapon SystemTypeOriginCaliberWeight (Unloaded)Length (Overall)Feed SystemPrimary Role / Remarks
Heckler & Koch USP-SDSemi-Automatic PistolGermany9x19mm0.72 kg 27194 mm 2715-round magazine 27Standard issue sidearm; threaded barrel for suppressors.
Heckler & Koch MP5SDSubmachine GunGermany9x19mm3.4 kg 27610 mm 2730-round magazine 27Integrally suppressed for clandestine CQB operations.
Heckler & Koch MP7A1Personal Defense WeaponGermany4.6x30mm< 2.0 kg 29415 mm (stock collapsed)20/30/40-round magazine 29Armor-piercing capability in a compact platform.
Heckler & Koch G36KAssault CarbineGermany5.56x45mm3.40 kg 27860 mm (stock extended) 3030-round magazine 27Primary individual weapon; shortened barrel for mobility.
Heckler & Koch HK416Assault RifleGermany5.56x45mm~3.12 kg~881 mm (14.5″ barrel)30-round STANAG magazinePiston-operated system for enhanced reliability; NATO SOF standard.
Heckler & Koch G28Designated Marksman RifleGermany7.62x51mm~5.8 kg965 mm 3110/20-round magazinePrecision semi-automatic fire to 800 meters.
FN MinimiLight Machine GunBelgium5.56x45mm~7.1 kg 351,040 mm 35Belt-fed / STANAG magazineSquad-level suppressive fire.
Heckler & Koch MG5General-Purpose Machine GunGermany7.62x51mm~11.2 kg 361,160 mm 37Belt-fed (M13 links)Replacing the MG3; controllable rate of fire and optics-ready.
Accuracy Int’l AXMCSniper RifleUnited Kingdom.338 Lapua Magnum~6.8 kg~1,250 mm10-round magazine 1Primary long-range anti-personnel system (>1500m).
Barrett M95 / M107A1Anti-Materiel RifleUSA12.7x99mm (.50 BMG)10.7 kg (M95) 341,143 mm (M95) 345/10-round magazineEngagement of hard targets (vehicles, equipment) to 2000m.
Browning M2HBHeavy Machine GunUSA12.7x99mm (.50 BMG)~38 kg~1,654 mmBelt-fed (M2/M9 links)Vehicle-mounted heavy fire support.

V. The Future Commando: MOE 2035 and Beyond

As the character of global conflict continues to evolve, the Spanish Mando de Operaciones Especiales is proactively shaping its future force structure, capabilities, and technology to maintain its edge. The command’s strategic vision is encapsulated in the “MOE-35” initiative, a comprehensive plan designed to ensure the unit is fully adapted to the multi-domain, technologically saturated battlefields of the coming decades.39

The “MOE-35” Initiative

Launched in 2020, MOE-35 is more than a simple modernization program; it is a fundamental rethinking of what a special operator is and what the command provides to the Spanish state. The plan calls for a significant expansion of the force, increasing its ranks from approximately 900 to 1,300 personnel by 2035.3 However, the core of the initiative is not merely quantitative growth but a qualitative evolution of its “human capital”.39

Recognizing that future conflicts will be won not just by kinetic force but also by influence and information, MOE-35 places a heavy emphasis on recruiting and developing operators with specialized non-kinetic skills. This includes creating teams of experts in communications, negotiation, and regional studies, possessing deep knowledge of the cultures, customs, and languages of potential operational areas.39 This focus is a direct lesson learned from the command’s extensive experience in Military Assistance missions in Iraq and the Sahel, where understanding the human terrain is as critical as mastering the physical terrain.

The Networked Operator and Future Technology

The future MOE operator will function as a fully integrated node within a networked battlespace. A key enabler of this vision is the Spanish Army’s “Future Soldier System” (SISCAP) program. This initiative aims to equip individual operators with a suite of advanced technologies, including a helmet-mounted vision system with augmented reality overlays. This will allow the operator to see real-time tactical data, the positions of friendly forces, and identified threats without looking down at a separate device.41

Furthermore, the system will integrate personal and weapon-mounted cameras (both visible and thermal), allowing an operator to share their perspective with the team and command elements. This also enables non-line-of-sight engagement, where an operator can point their weapon around a corner and use their helmet display to aim, minimizing their exposure to enemy fire.41 This constant flow of data transforms the operator from a simple combatant into a mobile sensor platform, contributing to a common operational picture shared across the force.

The integration of unmanned systems will also deepen. The command will expand its use of small, tactical Remotely Piloted Air Systems (RPAS) for organic, team-level intelligence and reconnaissance, as well as enhancing its cinology (military working dog) capabilities.21 Crucially, the MOE is developing its capacity to operate in the non-physical domains of conflict, integrating cyber and electronic warfare techniques to protect its own communications and disrupt those of its adversaries.18

Speculative Armament Evolution

While the MOE’s current arsenal is formidable, it will continue to evolve in line with technological advancements and emerging threats.

  • Sidearms: The venerable HK USP-SD, while reliable, lacks the features of more modern pistols. A future transition to a striker-fired, polymer-framed pistol with a modular optics system is highly probable. Platforms like the Glock 17 Gen5 MOS, which are becoming a de facto standard among many Western SOF units, offer superior ergonomics, trigger characteristics, and the ability to easily mount miniature red dot sights for faster target acquisition.42
  • Carbines: The 5.56x45mm cartridge, while effective, has known limitations in barrier penetration and performance against modern body armor. The MOE, along with other NATO SOF, will be closely observing the long-term results of the U.S. Army’s Next Generation Squad Weapon (NGSW) program and its adoption of the 6.8mm cartridge.45 While a complete caliber change represents a massive logistical challenge, a future adoption of a more powerful intermediate caliber for special operations use is a distinct possibility to ensure overmatch against peer adversaries.
  • Precision Weapons: The evolution in this domain will be driven by advancements in sensor and data processing technology. The integration of “smart scopes” with onboard ballistic computers, laser rangefinders, and atmospheric sensors will become standard, dramatically increasing the first-round hit probability at extreme ranges and reducing the cognitive load on the sniper.

Ultimately, the MOE-35 initiative and its associated technological programs point toward a future where the special operator is a hybrid warrior. This individual will be a master of the kinetic fight but also a sensor, a communicator, and a non-kinetic effector. They will be capable of processing vast amounts of data from the network, controlling multiple unmanned assets, and applying a precise effect—be it a rifle shot, an electronic warfare pulse, or a targeted influence message—to achieve strategic objectives. This vision ensures that the legacy of the adaptable and resilient guerrillero will continue to evolve, keeping the Mando de Operaciones Especiales at the cutting edge of modern warfare.


If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly contribute towards our continued reporting, please visit our funding page.


Sources Used

  1. Grupos de Operaciones Especiales (España) – Wikipedia, la enciclopedia libre, accessed September 6, 2025, https://es.wikipedia.org/wiki/Grupos_de_Operaciones_Especiales_(Espa%C3%B1a)
  2. Spanish Special Forces – Prov Tildic – Prezi, accessed September 6, 2025, https://prezi.com/p/ra0jpywseqas/spanish-special-forces/
  3. Mando de Operaciones Especiales (MOE): SPAIN’S ARMY SOF – Grey Dynamics, accessed September 6, 2025, https://greydynamics.com/mando-de-operaciones-especiales-moe-spains-army-sof/
  4. Boinas Verdes españoles: de las COE al MOE – Veteranos … – VetPac, accessed September 6, 2025, https://www.vetpac.es/boinas-verdes-espanoles-de-las-coe-al-moe/
  5. Compañía de Operaciones Especiales 101-7, accessed September 6, 2025, https://coebaleares.com/
  6. La evolución de las unidades de operaciones especiales …, accessed September 6, 2025, https://militaresescritores.es/noticias/la-evolucion-de-las-unidades-de-operaciones-especiales/
  7. E.T. – C.O.E.S. COMPAÑÍAS DE OPERACIONES ESPECIALES – COLECCIONISMO MILITAR, accessed September 6, 2025, http://www.coleccionismomilitar.com/2013/07/et-companias-de-operaciones-especiales.html
  8. SÍNTESIS HISTÓRICA COE 52 1967/1986 – Federación de Asociaciones de Veteranos Boinas Verdes de España, accessed September 6, 2025, https://fedavbve.com/sintesis-historica-coe-52-1967-1986/
  9. Historia y vida de la COE 61 – Federación de Asociaciones de Veteranos Boinas Verdes de España, accessed September 6, 2025, https://fedavbve.com/historia-y-vida-de-la-coe-61/
  10. BOEL: Spanish Legion’s Elite – Grey Dynamics, accessed September 6, 2025, https://greydynamics.com/boel-spanish-legions-elite/
  11. Star Z-70 Submachine Gun Review – Firearms News, accessed September 6, 2025, https://www.firearmsnews.com/editorial/star-z70-submachine-gun-review/374989
  12. SPAIN REVISITED: THE MARINES – Small Arms Review, accessed September 6, 2025, https://smallarmsreview.com/spain-revisited-the-marines/
  13. Spanish Armed Forces – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Spanish_Armed_Forces
  14. Spanish Joint Special Operations Command – NRDC Italy – NATO, accessed September 6, 2025, https://nrdc-ita.nato.int/operations/allied-reaction-force/spanish-special-operations-command
  15. CETME Model L – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/CETME_Model_L
  16. CETME L – Green – GEN 2 – MarColMar Firearms, accessed September 6, 2025, https://marcolmarfirearms.com/shop/cetme/green-cetme-l
  17. Special Operations Command (Spain) – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Special_Operations_Command_(Spain)
  18. Mando de Operaciones Especiales (MOE) – Ejercito de Tierra – Blog Prefortex, accessed September 6, 2025, https://blog.prefortex.es/mando-de-operaciones-especiales-moe-ejercito-tierra/
  19. Special Operations Groups (Spain) – Wikiwand, accessed September 6, 2025, https://www.wikiwand.com/en/articles/Special_Operations_Groups_(Spain)
  20. MOE, así son los “guerrilleros”, la temible fuerza de élite del Ejército y una de las más preparadas del mundo – La Razón, accessed September 6, 2025, https://www.larazon.es/espana/moe-asi-son-guerrillleros-temible-fuerza-elite-ejercito-mas-preparadas-mundo_202305046453f3f622859d00017f1ea0.html
  21. UNIDADES ESPECIALES: Mando de Operaciones Especiales (MOE) – Davinci, accessed September 6, 2025, https://tropaymarineria.es/unidades-especiales-mando-de-operaciones-especiales-moe/
  22. FGNE, EZAPAC y MOE, estas son las tres grandes unidades de élite de las fuerzas armadas españolas: quiénes son y qué hacen – La Razón, accessed September 6, 2025, https://www.larazon.es/espana/defensa/fgne-ezapac-moe-estas-son-tres-grandes-unidades-elite-fuerzas-armadas-espanolas-quienes-son-que-hacen_2023072967091c98596dfb00012a7b83.html
  23. Special Operations collaborate with Iraqi units in consolidating …, accessed September 6, 2025, https://emad.defensa.gob.es/en/operaciones/operaciones-en-el-exterior/10-Operacion_Inherent_Resolve/noticias/listado/250829-sotgxii-operaciones.html?__locale=en
  24. For the past ten years, members of the Spanish Special Operations …, accessed September 6, 2025, https://emad.defensa.gob.es/en/operaciones/operaciones-en-el-exterior/10-Operacion_Inherent_Resolve/noticias/listado/250113-ni-irak-aniversario-sotg.html
  25. To improve its Sahel policy, the US must update four assumptions – Atlantic Council, accessed September 6, 2025, https://www.atlanticcouncil.org/blogs/africasource/to-improve-its-sahel-policy-the-us-must-update-four-assumptions/
  26. Violent Extremism in the Sahel | Global Conflict Tracker – Council on Foreign Relations, accessed September 6, 2025, https://www.cfr.org/global-conflict-tracker/conflict/violent-extremism-sahel
  27. Mando de Operaciones Especiales – Contenido – Ejército de tierra, accessed September 6, 2025, https://ejercito.defensa.gob.es/unidades/Alicante/cg_moe/Organizacion/materiales/index.html
  28. Heckler & Koch USP – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Heckler_%26_Koch_USP
  29. Munición y accesorios para el arma más exótica del Mando de Operaciones Especiales del Ejército de Tierra – Defensa.com, accessed September 6, 2025, https://www.defensa.com/espana/municion-accesorios-para-arma-mas-exotica-mando-operaciones
  30. G36 – Heckler & Koch, accessed September 6, 2025, https://www.heckler-koch.com/en/Products/Military%20and%20Law%20Enforcement/Assault%20rifles/G36
  31. Los rifles de precisión G28 están ya operativos en el MOE – Noticias …, accessed September 6, 2025, https://www.defensa.com/espana/tiradores-mando-operaciones-especiales-disparan-desde-nh90-g28
  32. Accuracy International AWM – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Accuracy_International_AWM
  33. MOE RECIBE POTENTES FUSILES SEMIAUTOMÁTICOS DE PRECISIÓN BARRET M107, accessed September 6, 2025, https://www.youtube.com/watch?v=dU7nZwJ9AE0
  34. Barrett M95 – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Barrett_M95
  35. FN Minimi – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/FN_Minimi
  36. Nuevas ametralladoras MG5 fuerzas especiales Ejército de Tierra …, accessed September 6, 2025, https://www.defensa.com/espana/nueva-ametralladora-mg5-mando-operaciones-especiales-ejercito
  37. Heckler & Koch MG5 – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Heckler_%26_Koch_MG5
  38. MG5 – HK USA, accessed September 6, 2025, https://hk-usa.com/product/mg5/
  39. Los comandos del 2035 – Ministerio de Defensa de España, accessed September 6, 2025, https://www.defensa.gob.es/comun/slider/2020/03/040320-moe-2035.html
  40. Boinas verdes 4.0: así será en el futuro la unidad de élite del Ejército de Tierra – La Razón, accessed September 6, 2025, https://www.larazon.es/espana/20200122/wmplylgw7ja4zmmfoul75ib4k4.html
  41. The Spanish Army tests the Future Soldier System developed by Indra and GMV to enhance soldiers’ capabilities with cutting-edge technologies, accessed September 6, 2025, https://www.indracompany.com/en/noticia/spanish-army-tests-future-soldier-system-developed-indra-gmv-enhance-soldiers-capabilities
  42. G17 Gen5 MOS – Simplified mounting of optical sights – Glock, accessed September 6, 2025, https://us.glock.com/en/pistols/g17-gen5-mos-fs
  43. G17 Gen5 MOS – Simplified mounting of optical sights – GLOCK Perfection, accessed September 6, 2025, https://eu.glock.com/en/products/pistols/g17-gen5-mos
  44. G17 Gen5 – GLOCK Perfection, accessed September 6, 2025, https://eu.glock.com/en/products/pistols/g17-gen5
  45. Small Arms Market – Industry Research & Share | 2025 – 2030 – Mordor Intelligence, accessed September 6, 2025, https://www.mordorintelligence.com/industry-reports/small-arms-market
  46. NATO and the Next Generation Squad Weapon- NGSW – Wavell Room, accessed September 6, 2025, https://wavellroom.com/2024/09/17/nato-and-the-next-generation-squad-weapon-ngsw/

The White Tigers: An Analytical History and Future Assessment of the ROK 707th Special Mission Group

The creation of the Republic of Korea’s (ROK) 707th Special Mission Group, known unofficially as the “White Tigers,” was the product of a confluence of global and domestic pressures. Its origins lie in the international recognition of a new form of warfare—modern terrorism—and the volatile political landscape of South Korea during a period of authoritarian military rule. This dual impetus forged a unit designed from its inception to be both a national security instrument for external threats and a highly responsive asset for the state’s internal security concerns.

1.1 The Global Catalyst: The Munich Massacre and the Dawn of Modern Counter-Terrorism

The attack on the Israeli Olympic team at the 1972 Munich Games was a watershed moment in the history of special operations. The event, broadcast globally, demonstrated a new vulnerability for modern states and exposed the inadequacy of conventional police forces in responding to determined, well-armed terrorists.1 The botched rescue attempt by West German police, who lacked the specialized training, equipment, and doctrine for such a high-stakes hostage crisis, served as a stark lesson for governments worldwide.1

This failure created what analysts term a “critical juncture,” a pivotal event that fundamentally alters institutional development.1 For Western nations and their allies, Munich fused the concepts of counter-terrorism (CT) and military special operations forces (SOF), establishing a new “path dependency” in security doctrine.1 The emerging consensus was that such threats were not merely criminal matters but constituted a form of warfare requiring a military response characterized by surgical precision, advanced marksmanship, and sophisticated infiltration techniques. In the months and years following the massacre, numerous countries established elite military or gendarmerie units specifically for counter-terrorism and hostage rescue (HR) missions.1

For the South Korean government, this global shift in threat perception was particularly acute. With Seoul slated to host the 1986 Asian Games and, more importantly, the 1988 Summer Olympics, the possibility of a Munich-style attack on its own soil became a primary national security concern.4 The government recognized the urgent need to create a dedicated, world-class counter-terrorism unit capable of preventing or responding to such an incident, as well as countering the persistent threat of infiltration by North Korean special forces.4 This imperative, born directly from the tragedy in Munich, was the public and strategic rationale for the formation of the 707th.5

1.2 The Domestic Crucible: South Korea’s Political Instability and the Requirement for an Elite Presidential Asset

While the Munich Massacre provided the international impetus, the domestic political environment of South Korea provided a powerful, parallel motivation for the 707th’s creation. The unit was officially established by presidential executive order on April 17, 1981, a period of profound political upheaval.5 In October 1979, authoritarian President Park Chung Hee was assassinated, plunging the nation into a political vacuum.9 This was swiftly filled by Major General Chun Doo-hwan, head of the Defense Security Command, who seized control of the military in the Coup d’état of December 12, 1979.9

Chun consolidated his power with a second coup on May 17, 1980, extending martial law across the nation and suppressing political dissent.9 This act triggered the Gwangju Uprising, a pro-democracy movement that was violently crushed by ROK Army Special Warfare Command (ROK-SWC) paratroopers, resulting in hundreds of civilian deaths.10 This brutal event cemented the military’s control but also highlighted the role of special forces as instruments of state power. Within this context, the creation of a new, elite special forces unit directly under the ROK-SWC—a command whose leaders, including Chun himself, had proven political ambitions—carried significant internal implications.13

The 707th was structured from its inception to be the nation’s primary quick reaction force (QRF), noted for being the “fastest rapid response unit” and uniquely within the President’s immediate reach.5 This structure suggests a dual-purpose design. Publicly, it was the nation’s shield against terrorism for the upcoming Olympics. Internally, however, it was also a highly trained, politically reliable force available to the executive during a period of fragile authoritarian rule. This underlying purpose was starkly demonstrated decades later, on December 3, 2024, when President Yoon Suk Yeol declared martial law and deployed the 707th to the National Assembly to prevent lawmakers from overturning his decree.4 This event serves as a historical confirmation of the unit’s potential for political employment, a characteristic seemingly embedded in its organizational DNA from its founding during a military dictatorship.

1.3 Formation and Foundational Doctrine

The 707th Special Mission Battalion was officially activated under the ROK Army Special Warfare Command, an organization with its own deep history of U.S. Army Special Forces influence dating back to the Korean War and its formal establishment in 1969.4 The battalion’s initial, clearly defined missions were to provide security for the 1986 Asian Games and the 1988 Seoul Olympics, addressing the direct threat highlighted by the Munich massacre.4

The unit’s early tactical development was not conducted in isolation. A pivotal event occurred in 1984 when B Squadron of the U.S. Army’s 1st Special Forces Operational Detachment-Delta (Delta Force) traveled to South Korea to conduct training directly with the 707th.5 This engagement was more than a routine joint exercise; it represented a direct transference of doctrine and TTPs from the West’s most advanced and secretive special mission unit of the era. Delta Force had been established in the late 1970s, heavily influenced by the British Special Air Service (SAS), to provide the United States with a dedicated CT/HR capability.16

This direct mentorship from Delta Force was instrumental in shaping the 707th’s foundational doctrine. It is highly probable that this training covered the full spectrum of counter-terrorism operations, including advanced close-quarters battle (CQB) techniques, explosive breaching, sniper/observer employment, and hostage rescue planning methodologies. This established a doctrinal lineage that aligned the 707th with its U.S. counterpart from its earliest days, setting it on a developmental path to mirror the structure, standards, and operational philosophy of a Western Tier 1 unit. This foundational relationship explains why, decades later, the 707th is still frequently compared to the U.S. Army’s Combat Applications Group (the modern designation for Delta Force) and maintains its closest international ties with U.S. SOF.4

Section 2: Evolution into a Multi-Spectrum Force (1989-2018)

Following its successful role in securing the 1988 Seoul Olympics, the 707th Special Mission Battalion entered a period of significant evolution. The post-Cold War security environment presented new and diverse challenges, prompting the unit to expand its capabilities far beyond its original counter-terrorism mandate. This era saw the 707th mature from a single-mission domestic guardian into a versatile, multi-spectrum special operations force capable of operating globally, a transformation reflected in its mission set, organizational structure, and armament.

2.1 Expanding Mission Parameters Beyond Hostage Rescue

While counter-terrorism and hostage rescue remained a core competency, the 707th “morphed into a multipurpose unit capable of unconventional warfare and direct action” in both overt and covert capacities.4 The unit’s responsibilities grew to encompass the full range of special operations, including direct action raids against high-value targets, special reconnaissance, black operations, and serving as the ROK Army’s primary Quick Reaction Force for national-level emergencies.5

This expansion of the mission set was a natural development that mirrored a global trend among elite special mission units. The exceptional selection standards, intensive training, and advanced equipment required for high-stakes hostage rescue create a force with the inherent skills for other complex and dangerous operations. As the ROK government faced new security challenges—from threats to its nationals abroad to the need for a surgical strike capability against North Korean strategic assets—it logically turned to its most capable and trusted force.

The battalion’s internal structure reflected this diversification. Prior to its 2019 reorganization, the unit was organized into specialized teams, including not only a Counter-Terrorism Team but also a Maritime-Operations Team and an Air-Assault Team.5 The existence of these specialized elements is clear evidence of a mission set that had grown far beyond urban CT. A dedicated maritime team indicates a capability to conduct operations at sea, such as vessel takedowns (Visit, Board, Search, and Seizure – VBSS), while an air-assault team points to a focus on helicopter-borne infiltration for direct action raids, capabilities not strictly required for a purely domestic HR unit but essential for a multi-domain special mission force.

2.2 From Domestic Guardian to Global Trainer: The ‘Akh Unit’

A defining moment in the 707th’s evolution was its first major, long-term overseas deployment. Since 2011, the unit has maintained a continuous rotational presence in the United Arab Emirates (UAE) as a core component of the ROK Special Forces contingent known as the ‘Akh Unit’ (meaning ‘Brother’ in Arabic).5 The primary mission of this deployment is to train local UAE special forces, building partner capacity and strengthening the strategic relationship between the two nations.5

The Akh Unit deployment represents a significant maturation in South Korea’s use of its military as an instrument of foreign policy and defense diplomacy. It marks a strategic shift from using a Tier 1 SOF unit solely for kinetic operations to employing it for persistent, long-term engagement to achieve national objectives abroad. This “by, with, and through” approach, a cornerstone of U.S. SOF doctrine, allows South Korea to project influence, build strong alliances in a strategically vital region, and protect its economic interests, such as the security of commercial vessels navigating the Persian Gulf.4

Furthermore, the deployment provides the 707th with invaluable operational experience in a desert environment, a stark contrast to the mountainous and temperate climate of the Korean Peninsula. This long-term exposure to different operational conditions, cultures, and partner forces enhances the unit’s adaptability and global readiness, transforming it from a force focused solely on the Korean theater into one with proven expeditionary capabilities.

2.3 Organizational and Armament Shifts

The unit’s internal structure and equipment also evolved during this period to reflect its changing roles. An early, unique feature of the 707th was an all-female company, tasked with low-visibility operations and providing close protection for dignitaries.5 This company was deactivated in 2014, a move that suggests a doctrinal shift towards a more conventional SOF structure focused on standardized male-only direct action teams, aligning the unit more closely with its Western counterparts like Delta Force and the SAS.5

This period also marked the beginning of a critical divergence between the armament of the 707th and that of the conventional ROK Army. In its early years, the unit was armed with domestically produced Daewoo Precision Industries firearms, such as the K1A carbine (adopted in 1981) and the K2 assault rifle (adopted in 1985).20 These were robust and reliable weapons designed for a large conscript army, prioritizing ease of mass production and general-purpose utility.

However, as the 707th’s focus on specialized missions like CQB intensified, the limitations of these general-issue rifles became apparent. The unit began to procure foreign weapon systems better suited to its specific requirements. The Heckler & Koch MP5 submachine gun, with its controllable roller-delayed blowback action and compact size, became the global standard for CT units and was adopted by the 707th.23 This move signaled a fundamental recognition within the ROK defense establishment: the needs of a Tier 1 special mission unit are distinct from those of the general army, justifying the procurement of specialized, often foreign-made, equipment to ensure maximum operational effectiveness. This philosophy of prioritizing capability over domestic industrial preference would come to define the unit’s modern arsenal.

Section 3: The Modern 707th Special Mission Group (2019-Present)

The contemporary era for the 707th is defined by its elevation to a group-level command and an expansion of its strategic importance. This period has seen the unit solidify its role as a multi-purpose, Tier 1 asset central to South Korea’s national defense strategy. This enhanced status was underscored by its controversial involvement in the 2024 martial law crisis, an event that tested the unit’s professional identity and highlighted its unique position within the ROK’s power structure.

3.1 The 2019 Reorganization: A Strategic Expansion

On March 18, 2019, the 707th Special Mission Battalion was officially reorganized and expanded into the 707th Special Mission Group.4 This was a significant structural change, not merely an administrative redesignation. The Ministry of National Defence stated the reorganization was necessary to expand the unit’s manpower and capabilities in response to emerging threats.4 The expansion included additional personnel and equipment to ensure a higher state of readiness, and, critically, the unit’s command was elevated from a Lieutenant Colonel to a full Colonel.4

This upgrade from a battalion to a group signifies a fundamental shift in the unit’s role from a primarily tactical entity to a strategic national asset. In most military hierarchies, a battalion is a tactical formation, whereas a group or regiment often holds broader operational or strategic responsibilities. The promotion of the commander to Colonel grants the unit’s leader greater authority and influence, placing them on a more equal footing with commanders of conventional brigades and senior staff officers within the ROK-SWC and the Ministry of National Defence.

This formal expansion provided the necessary institutional framework to support the 707th’s diverse and demanding mission set, which had outgrown the capacity of its original 200-person battalion structure.5 The group structure is better suited to manage the complex requirements of maintaining readiness for counter-terrorism, direct action, overseas partner training via the Akh Unit, and its role in South Korea’s strategic deterrence plans, including potential “decapitation missions” against the North Korean leadership.10

3.2 Case Study: The 2024 Martial Law Incident

The 707th’s most prominent and controversial public appearance occurred on December 3, 2024. Following President Yoon Suk Yeol’s surprise declaration of martial law, he mobilized the 707th SMG to secure the National Assembly building in Seoul.4 The stated objective was to physically prevent lawmakers from convening to vote on a motion to overturn the martial law decree.4

Operators from the unit inserted by UH-60P Black Hawk helicopters and attempted to force their way into the main hall, leading to scuffles with legislators, their staff, and protestors who blocked their entry.4 A critical detail observed during the confrontation was that at least some of the operators were carrying rifles loaded with non-lethal simunition rounds rather than live ammunition.5 Ultimately, the National Assembly was able to convene and voted overwhelmingly to nullify the martial law decree. Following the vote, the 707th personnel withdrew from the premises, with some soldiers reportedly apologizing to citizens as they left.26 The unit’s commander, Colonel Kim Hyun-Tae, publicly assumed full responsibility for his unit’s actions.4

This incident placed the 707th at the center of a national constitutional crisis, forcing its operators into a mission for which they were never intended: the coercion of their own country’s democratic institutions. The deployment of a “surgical scalpel” of national security as a blunt instrument of political will represented a profound misapplication of the unit’s purpose.14 The decision by the chain of command to issue simunitions was pivotal; it suggests a desire to intimidate and obstruct without causing mass casualties, but it may also indicate a reluctance at some level—perhaps within the unit’s own leadership—to use lethal force against unarmed civilians and politicians. This internal conflict between following a legally dubious order and upholding democratic principles appears to be reflected in the soldiers’ reported apologies upon withdrawal. The 2024 incident has undoubtedly triggered a deep re-evaluation of the legal and ethical guardrails governing the domestic deployment of such an elite unit, with lasting implications for civil-military relations in South Korea.

3.3 Current Training Doctrine and Interoperability

To maintain its status as a Tier 1 force, the 707th employs one of the most demanding selection and training pipelines in any military. The initial selection process is exceptionally rigorous, with a 10-day evaluation that eliminates approximately 90% of all applicants.5 Candidates are drawn from volunteers across all branches of the ROK Armed Forces, with some being handpicked by their superiors for their potential.4

Those who pass selection undergo a grueling training regimen. All members must become qualified in both airborne operations (including advanced High Altitude, Low Opening [HALO] jumps) and combat diving (SCUBA), skills which are mandatory for a multi-domain SOF unit.4 The training is legendary for its difficulty, reportedly including daily calisthenics in snow and sub-zero temperatures and swimming in frozen lakes without thermal protection to build extreme physical and mental resilience.5

Crucially, the 707th’s doctrine is continuously refined through close relationships and interoperability drills with its most advanced allied counterparts. The unit maintains its strongest ties with U.S. SOF, particularly Delta Force and the 1st Special Forces Group (Airborne), but also trains with elite units like the Australian SASR and Singapore’s STAR.4 The 707th is a regular participant in large-scale combined ROK-U.S. exercises such as the annual Freedom Shield series, where its teams hone skills in direct action, special reconnaissance, and countering weapons of mass destruction alongside U.S. special operators.27 This constant, high-level engagement is not merely for diplomatic purposes; it is essential for ensuring that the 707th’s TTPs, communications protocols, and operational standards remain aligned with its most likely coalition partners in any future regional contingency, representing a critical force multiplier for the ROK-U.S. alliance.

Section 4: Technical Analysis of Current Small Arms Arsenal

The small arms inventory of the 707th Special Mission Group reflects a mature procurement philosophy that prioritizes mission-specific capability over logistical uniformity. The unit has largely eschewed standard-issue domestic firearms in favor of a diverse and highly specialized arsenal of best-in-class weapon systems sourced from premier international manufacturers. This approach is a hallmark of a well-funded, top-tier special mission unit with the autonomy to select the precise tools required to maintain a tactical edge.

4.1 Primary Carbines: A Trifecta of Western Excellence

The 707th’s primary individual weapon is the assault carbine, and the unit has been observed employing a trio of elite, foreign-made systems. This diverse inventory allows for continuous evaluation and fielding of the most advanced platforms available.

  • FN SCAR-L: For over a decade, the Belgian-made FN SCAR-L has been the dominant carbine within the unit.23 Chambered in 5.56x45mm NATO, its key feature is a short-stroke gas piston operating system. This mechanism prevents hot propellant gases from entering the receiver, resulting in a cleaner, cooler, and theoretically more reliable action under sustained fire compared to direct impingement systems. This high degree of reliability was a major factor in its adoption by USSOCOM and subsequently by many allied SOF units, including the 707th.31
  • Knight’s Armament Company (KAC) KS-3: A more recent and limited acquisition, the KAC KS-3 represents the pinnacle of the direct impingement AR-15/M4 platform.27 Manufactured in the United States, its standout feature is the proprietary E3.2 bolt. This advanced bolt design incorporates radiused lugs to reduce stress fractures, dual ejectors for more reliable ejection with short barrels and suppressors, and an improved extractor design, all of which significantly enhance durability and lifespan over a standard Mil-Spec bolt.33 The KS-3 offers exceptional ergonomics, accuracy, and modularity in a lightweight package.34
  • Noveske N4: Also seen in use is the Noveske N4, another high-end American AR-15 variant.4 Noveske Rifleworks is renowned in the industry for the quality and accuracy of its barrels, which are often considered among the best available. The N4 provides operators with a highly reliable and exceptionally accurate carbine, particularly in short-barreled configurations suited for CQB and vehicle operations.35

The concurrent use of these three distinct systems demonstrates a procurement strategy focused on capability above all else. It allows the unit to leverage the unique strengths of each platform while continuously evaluating the state-of-the-art in carbine technology, ensuring its operators are never at a material disadvantage.

4.2 Close Quarters Battle (CQB) Weaponry: Compact and Specialized

For operations in confined spaces where a carbine may be too cumbersome, the 707th employs a range of submachine guns (SMGs) and personal defense weapons (PDWs).

  • Brügger & Thomet (B&T) MP9 and APC9K Pro: The Swiss-made B&T MP9 is an extremely compact and lightweight machine pistol, weighing only 1.4 kg.23 Its small size makes it ideal for concealed carry in low-visibility roles or for use within vehicles. In 2023, the unit also adopted the B&T APC9K Pro, a slightly larger but still very compact SMG that has been selected by the U.S. Army for its Sub Compact Weapon program.38 This adoption demonstrates the unit’s commitment to continuous modernization of its CQB arsenal.
  • Heckler & Koch (H&K) MP7A1: The German H&K MP7 offers a unique capability. It fires a proprietary high-velocity, small-caliber 4.6x30mm cartridge designed to defeat modern body armor at close ranges—a task for which traditional 9mm SMGs are ill-suited.4 This makes the MP7 a critical tool for engaging near-peer adversaries who are likely to be equipped with personal armor.
  • Heckler & Koch MP5: While a legacy design, the H&K MP5 remains in the 707th’s inventory.4 Its roller-delayed blowback operating system is famously smooth, producing very little recoil and allowing for highly accurate and controllable fire, particularly in semi-automatic or short bursts.24 It continues to be a viable and effective tool for precision CQB engagements.

4.3 Sidearms: A Diverse Toolkit

The 707th employs a wide variety of 9x19mm Parabellum sidearms, suggesting a mix of legacy systems, mission-specific selections, and a degree of operator preference.

  • Striker-Fired: The Austrian Glock 17 is a primary sidearm, reflecting its global dominance as a reliable, simple, and effective striker-fired pistol.4
  • Hammer-Fired (DA/SA): A significant number of operators use traditional double-action/single-action (DA/SA) pistols. The German/Swiss SIG Sauer P226 is a legendary combat handgun, renowned for its accuracy, reliability, and adoption by units like the U.S. Navy SEALs.4 The German H&K USP is another robust, service-proven design known for its durability.4 Italian pistols, including the iconic Beretta 92FS (the former U.S. M9) and the more modern, polymer-framed Beretta Px4 Storm with its rotating barrel action, are also in use.4 The Israeli IWI Jericho 941, a design based on the venerable CZ-75 system, rounds out the inventory.4

4.4 Precision Engagement Systems: Long-Range Dominance

To control the battlefield at extended ranges, 707th sniper teams are equipped with a modern, multi-caliber suite of precision rifles.

  • Knight’s Armament M110 SASS: For the semi-automatic sniper system (SASS) role, the unit uses the U.S.-made KAC M110.4 Chambered in 7.62x51mm NATO, this AR-10-based platform allows for rapid engagement of multiple targets at intermediate ranges (out to 800-1000 meters) and is often employed in a designated marksman or overwatch role.49
  • Accuracy International AWSM: For extreme long-range anti-personnel engagements, the 707th fields the British-made Accuracy International Arctic Warfare Super Magnum (AWSM).4 This bolt-action rifle is chambered in.338 Lapua Magnum, a specialized cartridge designed to provide accurate and effective fire on human-sized targets well beyond 1,500 meters.51
  • Barrett MRAD: The U.S.-made Barrett Multi-Role Adaptive Design (MRAD) rifle provides the unit with ultimate flexibility.4 This modern bolt-action platform features a user-changeable barrel system, allowing operators to quickly switch between various calibers (such as 7.62x51mm NATO,.300 Winchester Magnum, or.338 Lapua Magnum) in the field to best suit the mission requirements.53 This adaptability makes it an exceptionally versatile tool for a special mission unit.

Table 4.1: Current Small Arms of the 707th Special Mission Group

Weapon CategoryModel NameCountry of OriginCaliberActionKey Specifications (Weight / Barrel Length / Rate of Fire)
Assault CarbineFN SCAR-LBelgium5.56×45mm NATOShort-Stroke Gas Piston3.5 kg / 368 mm / 550-650 RPM 31
Assault CarbineKAC KS-3USA5.56×45mm NATODirect Impingement2.79 kg / 292 mm / ~700-900 RPM 33
Assault CarbineNoveske N4USA5.56×45mm NATODirect Impingement~2.7 kg / 267 mm / ~700-900 RPM 35
SMG / PDWB&T MP9Switzerland9×19mm ParabellumShort Recoil, Rotating Barrel1.4 kg / 130 mm / 900 RPM 36
SMG / PDWB&T APC9K ProSwitzerland9×19mm ParabellumStraight Blowback2.5 kg / 110 mm / 1080 RPM 38
SMG / PDWH&K MP7A1Germany4.6×30mmGas-Operated, Rotating Bolt1.5 kg / 180 mm / 950 RPM 39
SMGH&K MP5A5Germany9×19mm ParabellumRoller-Delayed Blowback2.88 kg / 225 mm / 800 RPM 24
SidearmGlock 17 Gen5Austria9×19mm ParabellumStriker-Fired630 g / 114 mm / N/A 42
SidearmSIG Sauer P226Germany/Switzerland9×19mm ParabellumDA/SA964 g / 112 mm / N/A 43
Sniper RifleAI AWSMUnited Kingdom.338 Lapua MagnumBolt-Action6.9 kg / 686 mm / N/A 51
SASSKAC M110USA7.62×51mm NATODirect Impingement6.23 kg / 508 mm / N/A 49
Sniper RifleBarrett MRADUSAMulti-CaliberBolt-Action~6.3 kg / 508-660 mm / N/A 53

Section 5: The Future of the White Tigers: A Speculative Forecast

The future trajectory of the 707th Special Mission Group will be shaped by three primary drivers: the rapid modernization of South Korea’s defense capabilities, the evolving nature of the threat posed by North Korea, and the technological and doctrinal shifts occurring within its key ally, the United States. The unit will continue to serve as the tip of the spear for the ROK military, adopting new technologies and refining its tactics to address the complex challenges of the 21st-century battlefield.

5.1 Armament for 2030 and Beyond: Domestic Innovation and Allied Influence

The next generation of the 707th’s primary carbine is already being determined. The ROK military has initiated the “Special Operations Submachinegun Type I” program to find a modern replacement for the aging Daewoo K1A carbines used by its wider special forces community.56 The main competitors are two domestic firms: Dasan Machineries with its AR-15-derived DSAR-15PQ, and S&T Motiv (the successor to Daewoo) with its K13 carbine (also known as the STC-16).56 While the 707th currently uses foreign carbines, the outcome of this program will influence its future procurement, as it may be directed to adopt the winning domestic platform.

However, a far more significant strategic question looms: the U.S. Army’s adoption of the Next Generation Squad Weapon (NGSW) system.58 This program introduces a new, high-pressure 6.8mm common cartridge designed to defeat modern body armor at extended ranges, a paradigm shift away from the 5.56mm NATO standard that has defined the alliance for decades.60 The ROK-U.S. military alliance is the cornerstone of South Korean defense, and interoperability is paramount. The prospect of U.S. and ROK infantry forces using different standard rifle ammunition in a major conflict on the peninsula presents a significant logistical challenge.

This creates a powerful “interoperability dilemma” for Seoul. In the short term, adopting a new 5.56mm carbine from the domestic competition is the simplest path. In the long term, however, the pressure to align with the new U.S. standard will be immense, especially for a Tier 1 unit like the 707th that works more closely with U.S. SOF than any other ROK unit. South Korean industry is already anticipating this shift, with S&T Motiv having displayed a prototype 6.8mm rifle.62 It is therefore highly probable that by the 2030s, the 707th will be testing, if not actively fielding, a 6.8mm platform to ensure seamless integration with its American counterparts in a future conflict.

5.2 Force Modernization: The “Warrior Platform” and “Defense Innovation 4.0”

The individual 707th operator will be a key beneficiary of South Korea’s ambitious force modernization plans. The “Defense Innovation 4.0” initiative is a national strategy to leverage advanced technology—including artificial intelligence, robotics, and big data—to create a smaller, smarter, and more lethal military capable of offsetting the country’s declining population and shrinking pool of conscripts.63

For the individual soldier, this translates into the “Warrior Platform” program, an effort to equip troops with integrated high-tech gear such as advanced ballistic helmets, next-generation night vision devices, and networked communication and targeting systems.64 For the 707th, this means the operator of the future will evolve from being simply a highly skilled shooter into a networked sensor and effector on the battlefield. Their small arms will become integrated weapon systems, likely equipped with sophisticated fire control optics similar to the U.S. Army’s XM157.61 These devices integrate a variable-power optic with a laser rangefinder, ballistic computer, and atmospheric sensors, providing the operator with a calculated aiming point that dramatically increases first-round hit probability at all ranges.

Furthermore, the unit’s tactics will increasingly incorporate manned-unmanned teaming. Operators will not just infiltrate an objective; they will orchestrate an array of effects, using networked devices to direct swarms of small reconnaissance drones, command robotic platforms for breaching or clearing rooms, and designate targets for loitering munitions, all while maintaining cognitive overmatch through AI-assisted decision-making tools.66

5.3 Evolving Threat Scenarios and Future Roles

While the 707th will retain its capabilities for a range of contingencies, its primary focus will continue to be sharpened by the evolving threat from North Korea. Pyongyang maintains one of the world’s largest special operations forces, estimated at up to 200,000 personnel, and is actively modernizing its own tactics based on lessons from modern conflicts like the war in Ukraine.67 Plausible future war scenarios involve not just a conventional attack across the DMZ, but a simultaneous, massive infiltration of North Korean SOF into the South’s rear areas via tunnels, semi-submersibles, and other covert means to create a “second front” designed to paralyze the ROK’s command and control and logistical networks.68

In this context, the 707th’s future role will likely pivot towards two critical, high-stakes missions that transcend traditional counter-terrorism:

  1. Counter-SOF Operations: The 707th will be the premier force tasked with hunting and neutralizing the most critical elements of a North Korean SOF incursion. This mission requires a higher level of skill, intelligence integration, and lethality than that of general-purpose forces, making the 707th the ideal tool to counter the most dangerous threats in the rear area.
  2. Strategic Deterrence and Retaliation: The unit is a key component of South Korea’s “Korea Massive Punishment and Retaliation” (KMPR) strategy, a core pillar of the ROK’s “three-axis” system designed to deter North Korean aggression.25 The KMPR doctrine relies on the credible threat of surgical strikes against the North Korean leadership and its key command-and-control facilities in the event of a major attack. Executing these “decapitation missions” is arguably the most demanding and highest-risk direct action scenario conceivable. The 707th is the only ROK unit with the specialized training, advanced equipment, and deep interoperability with U.S. assets required to plausibly execute such a mission.

Therefore, the future development of the White Tigers—their training, procurement, and doctrine—will be increasingly optimized for success in these two vital national security roles. The unit has evolved far beyond its origins as an Olympic security force into an indispensable strategic asset, central to South Korea’s ability to deter and, if necessary, prevail in a future conflict on the Korean Peninsula.


If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly contribute towards our continued reporting, please visit our funding page.


Sources Used

  1. Full article: The Munich massacre and the proliferation of counterterrorism special operation forces, accessed September 6, 2025, https://www.tandfonline.com/doi/full/10.1080/13537121.2022.2088134
  2. The Munich massacre and the proliferation of counterterrorism special operation forces, accessed September 6, 2025, https://www.tandfonline.com/doi/abs/10.1080/13537121.2022.2088134
  3. Marshall Center counterterrorism students delve into ‘Munich Massacre’ lessons learned, accessed September 6, 2025, https://www.army.mil/article/164020/marshall_center_counterterrorism_students_delve_into_munich_massacre_lessons_learned
  4. 707th Special Mission Group: The South Korean Delta Force – Grey Dynamics, accessed September 6, 2025, https://greydynamics.com/707th-special-mission-group-the-south-korean-delta-force/
  5. 707th Special Mission Group – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/707th_Special_Mission_Group
  6. 707th SMB – The Tom Clancy Wiki, accessed September 6, 2025, https://tomclancy.wiki.gg/wiki/707th_SMB
  7. Special Forces Brigades of the Republic of Korea Army – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Special_Forces_Brigades_of_the_Republic_of_Korea_Army
  8. 707th Special Mission Group – Wikiwand, accessed September 6, 2025, https://www.wikiwand.com/en/articles/707th_Special_Mission_Group
  9. Coup d’état of May Seventeenth – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Coup_d%27%C3%A9tat_of_May_Seventeenth
  10. Republic of Korea Army Special Warfare Command – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Republic_of_Korea_Army_Special_Warfare_Command
  11. Gi-Wook Shin on Gwangju and South Korea’s Democracy | FSI, accessed September 6, 2025, https://fsi.stanford.edu/news/gi-wook-shin-gwangju-and-south-korea%E2%80%99s-democracy
  12. Politics and Protest in South Korea Timeline | East Asian Studies Center – The Ohio State University, accessed September 6, 2025, https://easc.osu.edu/resources/k-16/film-guides/taxi-driver/historical-context/timeline
  13. Special Forces Detachment 39 – ARSOF History, accessed September 6, 2025, https://arsof-history.org/articles/v2n1_detachment_39_page_1.html
  14. More footage of 707th SMG during the declared martial law : r/SpecOpsArchive – Reddit, accessed September 6, 2025, https://www.reddit.com/r/SpecOpsArchive/comments/1h6b5d1/more_footage_of_707th_smg_during_the_declared/
  15. en.wikipedia.org, accessed September 6, 2025, https://en.wikipedia.org/wiki/Republic_of_Korea_Army_Special_Warfare_Command#:~:text=The%20command%20includes%20six%20special,which%20was%20established%20in%201969.
  16. The U.S. Army’s Delta Force: How This Secret Group of Deadly Soldiers Came to Be, accessed September 6, 2025, https://nationalinterest.org/blog/buzz/us-armys-delta-force-how-secret-group-deadly-soldiers-came-be-55057
  17. 22 SAS influence on Delta Force in the 70s? : r/JSOCarchive – Reddit, accessed September 6, 2025, https://www.reddit.com/r/JSOCarchive/comments/riua6t/22_sas_influence_on_delta_force_in_the_70s/
  18. South Korean 707th Special Mission Group members inside an elevator [750 x 566] – Reddit, accessed September 6, 2025, https://www.reddit.com/r/MilitaryPorn/comments/10zurfc/south_korean_707th_special_mission_group_members/
  19. U.S. Special Operations Forces (SOF): Background and Considerations for Congress, accessed September 6, 2025, https://www.congress.gov/crs-product/RS21048
  20. Weapons of the Republic of Korea Marine Corps – Small Arms Defense Journal, accessed September 6, 2025, https://sadefensejournal.com/weapons-of-the-republic-of-korea-marine-corps/
  21. en.wikipedia.org, accessed September 6, 2025, https://en.wikipedia.org/wiki/Daewoo_Precision_Industries_K1
  22. Daewoo Precision Industries K2 – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Daewoo_Precision_Industries_K2
  23. List of equipment of the Republic of Korea Armed Forces – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/List_of_equipment_of_the_Republic_of_Korea_Armed_Forces
  24. Heckler & Koch MP5 (& variants) – Small Arms Survey, accessed September 6, 2025, https://www.smallarmssurvey.org/sites/default/files/SAS-weapons-sub-machine-guns-Heckler-Koch-MP5.pdf
  25. S. Korean commandos sharpen special operations capabilities amid NK threats, accessed September 6, 2025, https://www.koreatimes.co.kr/southkorea/defense/20240623/s-korean-commandos-enhance-special-operations-amid-north-korean-threats
  26. Korean 707th Special Mission Group confronts a fire extinguisher during the protest. [708×497] : r/MilitaryPorn – Reddit, accessed September 6, 2025, https://www.reddit.com/r/MilitaryPorn/comments/1h5tgc2/korean_707th_special_mission_group_confronts_a/
  27. 707th Special Mission Group training in Seoul, South Korea : r/tacticalgear – Reddit, accessed September 6, 2025, https://www.reddit.com/r/tacticalgear/comments/1b801av/707th_special_mission_group_training_in_seoul/
  28. U.S. and ROK special operations forces conduct routine combined training during exercise Freedom Shield 2025 – United States Forces Korea, accessed September 6, 2025, https://www.usfk.mil/Media/Newsroom/News/Article/4127793/us-and-rok-special-operations-forces-conduct-routine-combined-training-during-e/
  29. South Korea’s Elite 707th Special Mission Group Counter-Terrorism Demonstration | June, 2019 – YouTube, accessed September 6, 2025, https://www.youtube.com/watch?v=BFhULsbTn0k
  30. South Korean 707th Special Mission Group members armed with FN SCAR-L and KAC KS-3 carbines [1500 x 1000] : r/MilitaryPorn – Reddit, accessed September 6, 2025, https://www.reddit.com/r/MilitaryPorn/comments/1b8029q/south_korean_707th_special_mission_group_members/
  31. FN SCAR® 16S | FN® Firearms, accessed September 6, 2025, https://fnamerica.com/products/discontinued-rifles/fn-scar-16s/
  32. FN SCAR – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/FN_SCAR
  33. KAC Knight’s Armament Company KS-3 – NS Armory, accessed September 6, 2025, https://nsarmory.us/kac-knights-armament-company-ks-3/
  34. KS-3 – Knight’s Armament Company, accessed September 6, 2025, https://www.knightarmco.com/28959/shop/military/ks/ks-3
  35. N4 SHORTY 10.5″ | Noveske Rifleworks, accessed September 6, 2025, https://noveske.com/products/10-5-gen-4-shorty-rifle/
  36. Brügger & Thomet MP9 – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Br%C3%BCgger_%26_Thomet_MP9
  37. MP9 – B&T USA, accessed September 6, 2025, https://bt-usa.com/products/mp9/
  38. Brügger & Thomet APC – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Br%C3%BCgger_%26_Thomet_APC
  39. MP7 | Heckler & Koch, accessed September 6, 2025, https://www.heckler-koch.com/en/Products/Military%20and%20Law%20Enforcement/Submachine%20guns/MP7
  40. Heckler & Kock HK MP7A1 Submachine Gun (Germany) 8 | PDF | Projectiles | Weapon Design – Scribd, accessed September 6, 2025, https://www.scribd.com/document/191549851/Heckler-Kock-HK-MP7A1-Submachine-Gun-Germany-8
  41. MP5 9mm – Australian Army, accessed September 6, 2025, https://www.army.gov.au/equipment/small-arms/mp5-9mm
  42. Glock 17 Gen 5 Review (SECOND Most Popular Glock Model) – YouTube, accessed September 6, 2025, https://www.youtube.com/watch?v=j9uZk-LNQ9E
  43. SIG P226 Reviewed – Shooters Report, accessed September 6, 2025, https://www.shootersreport.com/pistol/9mm-Shoot-Out-SIG-P226.htm
  44. SIG Sauer P226 Handgun – rdctd, accessed September 6, 2025, https://rdctd.pro/sig-sauer-p226-firearm-review/
  45. Before You Buy – Heckler & Koch USP – Falco Holsters, accessed September 6, 2025, https://www.falcoholsters.com/blog/before-you-buy-heckler-koch-usp
  46. 92FS Inox – Beretta, accessed September 6, 2025, https://www.beretta.com/en-us/product/92fs-inox-FA0173
  47. Beretta PX4 Storm Review: Unveil Its Full Potential | Craft Holsters, accessed September 6, 2025, https://www.craftholsters.com/beretta-px4-storm-review-unveiling-range-performance-features
  48. IWI Jericho 941 Review : Quality, Reliability, and Performance – Gun University, accessed September 6, 2025, https://gununiversity.com/iwi-jericho-941-review/
  49. U.S. ARMY M110 SASS – Sniper Central, accessed September 6, 2025, https://snipercentral.com/u-s-army-m110-sass/
  50. M110 – Knight’s Armament, accessed September 6, 2025, https://www.knightarmco.com/12016/shop/military/m110/m110
  51. Accuracy International AWM – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Accuracy_International_AWM
  52. Accuracy International Super Magnum – Sniper Central, accessed September 6, 2025, https://snipercentral.com/pm_sm.htm
  53. MRAD® – Barrett Firearms, accessed September 6, 2025, https://barrett.net/products/firearms/mrad-standard/
  54. Barrett MRAD – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Barrett_MRAD
  55. FN HERSTAL SCAR L STD CAL. 5,56×45 – TR Equipement, accessed September 6, 2025, https://www.tr-equipement.com/en/our-products/armement/armes/43-fn-herstal-scar-l-std-cal-556×45.html
  56. Dasan Shows Wares at Seoul ADEX 2023 – Small Arms Defense Journal, accessed September 6, 2025, https://sadefensejournal.com/dasan-shows-wares-at-seoul-adex-2023/
  57. Dasan Machineries DSAR-15 – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Dasan_Machineries_DSAR-15
  58. Next Generation Squad Weapons (NGSW) Program – PEO Soldier – Army.mil, accessed September 6, 2025, https://www.peosoldier.army.mil/Equipment/Equipment-Portfolio/Project-Manager-Soldier-Lethality-Portfolio/Next-Generation-Squad-Weapons-Program/
  59. Army’s Next Generation Squad Weapon – Combat Veterans, accessed September 6, 2025, https://combatvets.socialwork.msu.edu/armys-next-generation-squad-weapon
  60. NATO and the Next Generation Squad Weapon- NGSW – Wavell Room, accessed September 6, 2025, https://wavellroom.com/2024/09/17/nato-and-the-next-generation-squad-weapon-ngsw/
  61. Upcoming Changes to Military Small Arms – SilencerCo, accessed September 6, 2025, https://silencerco.com/blog/upcoming-changes-military-small-arms
  62. SNT Motiv From South Korea Working On 6.8mm Caliber Assault Rifle – CORE Survival, accessed September 6, 2025, https://www.coresurvival.com/core-news/snt-motiv-from-south-korea-working-on-68mm-caliber-assault-rifle
  63. South Korea – Defense Industry Equipment – International Trade Administration, accessed September 6, 2025, https://www.trade.gov/country-commercial-guides/south-korea-defense-industry-equipment
  64. S. Korean Army launches futuristic demonstration combat team equipped with AI and drones, accessed September 6, 2025, https://www.youtube.com/watch?v=DOBxrb7enKo
  65. Small arms sights and fire control systems developments – European Security & Defence, accessed September 6, 2025, https://euro-sd.com/2025/02/articles/42724/small_arms_sights_and_fire_control_systems/
  66. The Future of the Battlefield – Office of the Director of National Intelligence – Global Trends, accessed September 6, 2025, https://www.dni.gov/index.php/gt2040-home/gt2040-deeper-looks/future-of-the-battlefield
  67. The North Korean Special Purpose Forces an Assessment of the Threat. – DTIC, accessed September 6, 2025, https://apps.dtic.mil/sti/tr/pdf/ADA297448.pdf
  68. Preparing for the Silent Surge: Countering North Korea’s Gambit in a Dual Contingency, accessed September 6, 2025, https://irregularwarfare.org/articles/north-korean-irregular-warfare-dual-contingency/
  69. South Korea’s Offensive Military Strategy and Its Dilemma – Daniel K. Inouye Asia-Pacific Center for Security Studies, accessed September 6, 2025, https://dkiapcss.edu/south-koreas-offensive-military-strategy-and-its-dilemma/

The Dual Guardians: Iran’s Parallel Military Structure (Artesh vs. IRGC)

Iran’s dual-military structure, comprising the conventional Artesh (the regular army) and the ideological Islamic Revolutionary Guard Corps (IRGC), is not an accident of history or a sign of dysfunction. It is a deliberate, core feature of the Islamic Republic’s political architecture, designed to prioritize regime survival above all else. This system is a sophisticated “coup-proofing” strategy 1 that, by design, values ideological purity and asymmetric deterrence over conventional military efficiency.

This structure has created two fundamentally different organizations with asymmetric missions, power, and resources. The IRGC, the regime’s “praetorian guard” 2, has evolved into the state’s political, economic, and military center of gravity, with a constitutional mandate to protect the Revolution.3 In contrast, the Artesh is a “marginalized” 5 conventional force, constitutionally tasked with the traditional defense of Iran’s national sovereignty and borders.6

This report analyzes the architecture, function, and long-term viability of this split. It finds that while the dual structure is operationally inefficient and fosters resource-wasting competition 1, it is highly effective at its primary goals: insulating the Supreme Leader from internal military threats and providing a flexible, deniable, and potent asymmetric capability to project power abroad. The system is therefore highly sustainable. Analysis indicates the IRGC’s deep-state power ensures it will emerge as the undisputed “kingmaker” and primary guarantor of state continuity in any post-Khamenei succession scenario.9

Part 1: Architecture of a Divided Force: Origins and Command

To understand Iran’s military capabilities, one must first understand that its security apparatus was designed from its inception to serve two masters: the ideological Revolution and the territorial State. This duality is the central pillar of its defense doctrine.

1.1 Ideological Origins of the Split (1979 Revolution)

The dual-military system was born from the foundational mistrust of the 1979 Islamic Revolution.10 The revolutionary leadership, led by Ayatollah Ruhollah Khomeini, was deeply suspicious of the existing “Imperial Army,” which it viewed as a pillar of the toppled Shah’s regime and potentially loyal to the exiled monarch.10 Despite the Artesh’s February 11, 1979, declaration of neutrality, the new regime saw it as a potential counter-revolutionary threat.10

Consequently, the regime initiated brutal purges, executing and exiling senior military officials and experienced personnel.4 This “ravaged” the Artesh 5, draining its manpower by an estimated 40-60 percent and leaving it “ill equipped”.4 Simultaneously, Khomeini, fearing a future coup, created a parallel force.3 In May 1979, the Islamic Revolutionary Guard Corps (IRGC) was formally established, consolidating several Islamist militias loyal to the revolution.3

The IRGC’s purpose was explicitly political and ideological: to serve as a “counterweight” to the regular military 11, to thwart potential coups by the Artesh 3, and to act as an ideologically pure “praetorian guard” 2 loyal not to the nation, but to the revolution’s clerical leadership and the doctrine of Velayat-e-faqih (Guardianship of the Jurist).3 This foundational act baked institutional rivalry, resource competition, and doctrinal differences into the DNA of the Islamic Republic’s security apparatus.10 This rivalry was not a flaw; it was the central feature.

The 1980-1988 Iran-Iraq War was not the cause of the split, but its crucible.13 The Iraqi invasion in 1980 exposed the weakness of the purged Artesh, which was unable to repel the invasion on its own.4 This military necessity forced the rapid professionalization of the IRGC.7 The war gave the IRGC a platform to prove its ideological zeal and military value, creating a powerful “sacred defense” narrative that the Artesh, as the Shah’s remnant, could never claim.14 This conflict cemented the IRGC’s status and entrenched its doctrinal focus on asymmetric warfare, proxy warfare, and ballistic missiles as tools of survival and deterrence.15

1.2 Constitutional Division of Labor: A Mandate for Asymmetry

The 1979 Constitution formally codifies the dual structure, creating a deliberate and profound asymmetry in mission.

  • Article 143 (Artesh): The Artesh, as the national armed forces, is tasked first and foremost with “defending Iran’s independence and sovereignty” and its territorial integrity.6 This is a classical, national defense mission focused on external borders.10
  • Article 150 (IRGC): The IRGC is tasked with the “guarding of the Revolution and its achievements”.3

This seemingly subtle distinction is, in practice, a vast chasm in mandate. The Artesh’s mission is finite, clear, and conventional (defend the borders). The IRGC’s mission is ambiguous, ideological, and borderless. This “seemingly more rewarding job” 6 is interpreted as an all-encompassing legal mandate for the IRGC to intervene in any sphere to “guard the revolution.” This includes preventing foreign interference 3, thwarting internal coups 3, crushing “deviant movements” 3 and domestic dissent 4, and exporting the revolution’s ideology.4 This constitutional ambiguity in Article 150 legally justifies the IRGC’s pervasive intervention in domestic politics, foreign policy, the economy, and internal security 2, far exceeding the mandate of a traditional military.

1.3 The Supreme Leader’s Command and Control (C2) Architecture

The command and control (C2) structure is the primary mechanism for the regime’s political control and coup-proofing.

  1. Supreme Leader as Commander-in-Chief: The Supreme Leader (Ayatollah Ali Khamenei) is the Commander-in-Chief of all armed forces.7 He has the sole authority to declare war and peace and makes all final security policy decisions.7
  2. Sidelining the Elected Government: The elected government is deliberately excluded from the military chain of command. The President of Iran has “relatively few powers,” does not control any armed forces, and is not in the C2 chain.7 The Ministry of Defense and Armed Forces Logistics (MODAFL) is purely an administrative body for R&D, production, and procurement, not a policy or command institution.7
  3. Parallel Chains of Command: Both the Artesh and the IRGC report directly and separately to the Supreme Leader.7 This C2 architecture is designed for political loyalty, not operational efficiency. By having all military chains terminate only with him, the Supreme Leader ensures their primary loyalty is personal (to the Vali-ye Faqih) and not institutional.
  4. Coordinating Bodies: The Supreme Leader uses two primary bodies to coordinate—but explicitly not unify—the parallel forces:
  • Armed Forces General Staff (AFGS): The senior-most military body, setting policy and strategic guidance. Its chief (currently an IRGC officer) is tasked with overseeing and coordinating both forces.7
  • Khatemolanbia Central Headquarters (KCHQ): The top operational headquarters, responsible for operational C2 and coordinating joint military operations.7
  1. Bypassing the Structure: This formal structure is often subverted. The Supreme Leader frequently bypasses the AFGS and KCHQ to issue orders directly to lower-level commanders.7 Furthermore, high-priority branches, most notably the IRGC-Quds Force, have their own privileged, direct line of communication to the Supreme Leader.7

This C2 architecture is the central nervous system of the coup-proofing strategy.1 A successful coup would require the coordination of both the Artesh and the IRGC. The system is designed to make this impossible. With separate C2 chains 1, separate logistics networks 1, separate intelligence services 7, and pervasive counterintelligence bodies 17 loyal only to the Supreme Leader’s office, the two militaries are institutionally incapable of coordinating against him.


Table 1: The Artesh vs. IRGC: Foundational Comparison

MetricArtesh (Conventional Military)IRGC (Revolutionary Guard)
Constitutional MandateArticle 143: Defend national sovereignty & territorial integrity.6Article 150: “Guard the Revolution and its achievements”.3
Primary MissionNational Defense (external). Conventional border security.5Regime Security (internal & external). Internal suppression, border control (volatile areas), exporting revolution.3
Ideological Role“Apolitical,” national, professional.10 Loyal to the nation.Deeply ideological (Khomeinism, Shia Islamism).3 “Praetorian Guard”.2 Loyal to the Supreme Leader.
Political Influence“Marginalized”.5 “Forced to remain apolitical”.2 Wields “very little influence”.5“Immense”.12 A “central player in Iran’s domestic politics”.12 Former commanders populate parliament & government.10
Budgetary AccessSignificantly smaller official budget (e.g., 1/3 of IRGC in 2018).6 “Not as well-funded”.10Larger official budget.7 Direct access to foreign exchange reserves.10
Economic Role“Limited to several chain stores”.10 A “military-bonyad complex” entity but minor.19A “business empire”.3 Controls vast economic sectors via Khatam al-Anbiya 10 and illicit smuggling.21 Generates massive off-budget revenue.22

Part 2: Comparative Analysis: Doctrines and Capabilities

The divergent missions of the Artesh and IRGC manifest in a practical division of labor, equipment, and areas of responsibility. Both forces maintain complete, parallel ground, naval, and air components, but they are optimized for entirely different types of conflict.7

2.1 Naval Forces: Blue-Water Ambition vs. Asymmetric Swarm

The naval split is the clearest example of Iran’s hybrid doctrine. The two forces have overlapping functions but are “distinct” in training, equipment, and “how they fight”.3

  • Artesh Navy (IRIN): The IRIN is Iran’s “strategic force” 7, with a traditional, conventional doctrine.7 It is tasked with projecting “blue-water” power into the Gulf of Oman, the Caspian Sea, and the high seas of the Indian Ocean.7 It operates Iran’s largest, most conventional (though “aging” 16) platforms: larger surface combatants like the Jamaran-class frigate 10, corvettes, and the core submarine fleet, including Russian-built Kilo-class submarines and domestically produced midget subs.7
  • IRGC Navy (IRGCN): The IRGCN employs a “revolutionary” 24 asymmetric doctrine.7 It is a “guerrilla force at sea” 3 whose primary Area of Responsibility (AOR) is the “Persian Gulf” 7 and the critical chokepoint of the Strait of Hormuz 25, which it is expected to control in a conflict.3 The IRGCN specializes in “hit-and-run” 3 and “swarming tactics” 27, maintaining a massive inventory of “hundreds” 7 of small, fast attack craft armed with guns, rockets, torpedoes, and missiles.3 It also controls large arsenals of coastal defense anti-ship cruise missiles (ASCMs) and naval mines.3

This structure is a purpose-built, hybrid naval solution. The IRIN is for prestige and conventional state-on-state presence. The IRGCN is the actual war-fighting and deterrent force, designed to counter a technologically superior navy (i.e., the United States) in the “shallow and confined waterways” of the Strait of Hormuz.7 This doctrine was forged by failure; “a series of naval battles with the U.S. Navy in April 1988” during the Iran-Iraq War taught Iran that its “large naval vessels are vulnerable to air and missile attacks”.28 That experience directly “confirmed the efficacy of small boat operations” and “spurred interest in missile-armed fast-attack craft,” forming the foundation of the IRGCN’s swarming doctrine today.28

2.2 Air and Aerospace Forces: Conventional Atrophy vs. Strategic Strike

The split in the air domain highlights the regime’s strategic priorities: asymmetric strike over conventional air superiority.

  • Artesh Air Force (IRIAF): This is a conventional air force tasked with defensive roles, such as supporting the national integrated air defense system and providing combat support to ground forces.16 However, it is widely considered Iran’s “most critical weakness” 29 and a “key structural deficiency”.30 The IRIAF is a “badly dated service” 16 operating a “shrinking and unrenewable air fleet” 31 of aging 1970s/80s-era American (F-14, F-4) and Soviet/Russian (MiG-29, Su-24) airframes.16 It is “vastly inferior” to its adversaries and suffers from high accident rates and crippling budgetary disadvantages.16
  • IRGC Aerospace Force (IRGCASF): Renamed from “Air Force” in 2009 32, this move signaled its true mission: strategic deterrence.32 This force is the regime’s “crown jewel”.16 It does not compete with the IRIAF in conventional air-to-air combat. Instead, it controls all of Iran’s most important strategic strike assets:
  1. Ballistic Missiles: The IRGC-ASF is the “primary body responsible” 33 for Iran’s “formidable” 12 and “large” 7 ballistic missile arsenal, the largest in the Middle East.16 This program, born from the “war of the cities” with Iraq, is the “centerpiece” of Iran’s deterrence doctrine.15
  2. UAV (Drone) Program: The IRGC-ASF controls the lethal, “game-changer” 35 drone arsenal.16 This program, originating in the 1980s 35, has become a core strategic asset. Its R&D arm, the Self-Sufficiency Jihad Organization (SSJO), has reverse-engineered captured technology (like the U.S. RQ-170) to create the Shahed family of UAVs.36
  3. Space Program: The IRGC-ASF also runs Iran’s military space force and satellite-launch (SLV) program.7

The regime has made a conscious strategic and budgetary choice. It has allowed the IRIAF to atrophy 31 because it is not cost-effective against U.S. or Israeli airpower. Instead, it has built an “asymmetric air force” composed of ballistic missiles and swarms of attack drones.35 This force is cheaper, has a longer reach, is deniable when used by proxies, and provides the strategic deterrence 15 that the IRIAF’s aging fighters cannot. The IRGC-ASF’s total control of this portfolio makes it arguably the single most powerful military branch in Iran.

2.3 Ground Forces: Border Defense vs. Internal Security

The ground forces reveal the regime’s “geography of trust.”

  • Artesh Ground Force (IRIGF): This is the numerically larger force, with 350,000 personnel to the IRGC-GF’s 150,000.7 Its primary mission is conventional territorial defense against a state-level invasion.5 It is “avowedly apolitical” 18 and controls the “preponderance of heavy ground armor” (tanks).18 It is largely “sidelined” 5 from the regime’s core security concerns.
  • IRGC Ground Force (IRGCGF): This force is focused on regime security.
  1. Internal Security: Its primary role is acting as the regime’s “Praetorian Guard” 2 to suppress domestic dissent.3
  2. Volatile Border Control: The IRGC-GF has taken over primary security responsibility from the Artesh in the most “volatile border provinces,” such as Kurdistan, Sistan va Baluchestan, and West Azerbaijan, which face active insurgencies.5
  3. Expeditionary Role: The IRGC-GF has deployed to foreign theaters like Syria and Iraq to support Quds Force operations.6
  4. Basij Organization: The IRGC-GF also controls the Basij, a massive volunteer paramilitary militia with 90,000 active members and 300,000 reservists.3 The Basij is the primary tool for internal suppression, “policing morals,” and acting as a mass mobilization reserve.7

The deployment map reveals the regime’s priorities. The “unreliable” but conventional Artesh 10 is placed on the external borders to face external state enemies.38 The “loyal” IRGC 5 is deployed internally in cities and in the most sensitive, ethnically volatile border provinces 5 to protect the regime from its own citizens and separatist threats. The Artesh defends Iran; the IRGC defends the Islamic Republic.

While Artesh special forces (the 65th Airborne Brigade) have been deployed to Syria 6, this is not a sign of integration. They were deployed as “individual advisor-observers” 6 and, critically, “under the auspices of IRGC’s Qods Force”.6 This appears to be a token deployment by the Artesh to “ensure its continued relevance” 6 and prove its loyalty, rather than a genuine shift in mission. Distrust between the services remains “relatively strong,” and the Artesh continues to be the “subordinate force”.15

2.4 Air Defense: The One Domain of Integration

Air defense is the single, critical exception to the rule of parallel, rivalrous forces. A divided air defense is operationally suicidal, as it would lead to fratricide and catastrophic failure against a coordinated air and missile strike.

In 2008, the Artesh Air Defense Force (IRIADF) was split from the Air Force (IRIAF) to become its own separate, fourth branch, controlling the country’s military radar network.41 In 2019, the Supreme Leader established the Khatam ol Anbia Air Defense Headquarters (KADHQ).7

This KADHQ is a national command that oversees and integrates all air defense assets (radars, surface-to-air missiles, anti-aircraft artillery) from both the Artesh Air Defense Force (IRIADF) and the IRGC Aerospace Force (IRGCASF).16

Crucially, this KADHQ is “always commanded by a senior Artesh officer”.16 This is a significant, unspoken concession. The regime, prioritizing operational necessity over ideological purity in this single domain, places its trust in Artesh competence. The Artesh, as the legacy Imperial military, retained the institutional knowledge and “classical doctrine” 10 for running a complex, networked, conventional Integrated Air Defense System (IADS)—a core competency the asymmetrically-focused IRGC lacked.

2.5 Intelligence and Cyber Warfare: The New Asymmetric Domains

The dual-force concept extends into the non-kinetic domains. Iran has multiple, overlapping intelligence services, including the Ministry of Intelligence (MOIS), the IRGC Intelligence Organization (IRGC-IO), and the Artesh Directorate for Intelligence (J2).7 This “overlapping missions” structure “fuel[s] competition”.7 The IRGC-IO is described as the “foremost military intelligence service”.7

In cyber warfare, the IRGC is the dominant player.43 The IRGC, the Basij (managing tens of thousands of “cyberwar volunteers” 43), and the Passive Defense Organization (NPDO) are the three leading military organizations in cyber operations.43 Iran’s cyber capabilities originated from domestic needs: surveillance and control of its own population during the 2009 “Green Revolution”.43 These tools were then turned outward.

Iran sees cyberattacks as a key part of its asymmetric military capability.43 It is low-cost, high-impact, and deniable.45 The IRGC’s dominance here is a natural extension of its doctrine: just as it uses swarm boats and missiles to counter U.S. naval and air supremacy, it uses cyber to counter U.S. economic and military power. The intelligence rivalry, like the military rivalry, is a “coup-proofing” feature, not a bug. By having multiple agencies spying on each other 17 as much as on external foes, the regime prevents any one from becoming powerful enough to challenge the Supreme Leader.


Table 2: Comparative Capability Analysis by Domain

DomainArtesh (Conventional Force)IRGC (Revolutionary Force)
NavalArtesh Navy (IRIN)IRGC Navy (IRGCN)
Mission:Conventional coastal defense; “blue-water” power projection.7Asymmetric “guerilla” warfare; sea denial; chokepoint control.3
AOR:Gulf of Oman, Caspian Sea, Indian Ocean (High Seas).7Persian Gulf, Strait of Hormuz.7
Key Assets:Large surface ships (frigates, corvettes), Kilo-class submarines, midget subs.7Hundreds of small, fast attack craft; swarming boats; naval mines; coastal anti-ship missiles.3
Air / AerospaceArtesh Air Force (IRIAF)IRGC Aerospace Force (IRGCASF)
Mission:Defensive air-to-air, support for IADS, ground support.16Strategic deterrence; strategic strike.32
Key Assets:“Badly dated” 16 fleet of aging 1970s/80s US/Soviet fighter jets (F-14, F-4, MiG-29, Su-24).30Total control of Iran’s:
1. Ballistic Missile Arsenal 12
2. Strategic UAV (Drone) Program 16
3. Military Space Program.32
GroundArtesh Ground Force (IRIGF)IRGC Ground Force (IRGCGF)
Mission:Conventional territorial defense 6; “apolitical” national defense.18Internal regime security; counter-insurgency; rapid reaction; suppression of dissent.4
AOR:National borders.5Internal provinces; volatile border regions (Sistan, Kurdistan) 5; foreign expeditionary.6
Key Assets:Largest force by manpower (350k) 7; preponderance of heavy armor/tanks.18150k troops 7; Basij Organization (paramilitary militia) 3; light infantry; domestic surveillance tools.
Air DefenseArtesh Air Defense (IRIADF)IRGC Aerospace Force (IRGCASF)
Mission:Operates national radar network 41 and IADS components.16Operates its own air defense assets (SAMs, radars).16
Command:INTEGRATED: Both forces’ assets are integrated under the Khatam ol Anbia Air Defense HQ 16, which is commanded by an Artesh officer.16

Part 3: The IRGC as a “State Within a State”

The massive disparity in power between the Artesh and the IRGC cannot be explained by their military roles alone. The IRGC’s power transcends the purely military domain, making it the true center of gravity of the regime. It has become a “state within a state,” with dominant, independent roles in foreign policy, the economy, and domestic politics.

3.1 The Quds Force (IRGC-QF): Architect of the “Axis of Resistance”

The IRGC-Quds Force (IRGC-QF) is the “expeditionary arm” 12 and “clandestine external operations element” 7 of the IRGC, established in 1990.7 Its primary mission is to “export the revolution” 16 by managing and supporting Iran’s network of foreign proxies and partners, known as the “Axis of Resistance”.7

The Quds Force provides leadership, funding, training, intelligence, and materiel 7 to a myriad of non-state groups, including Hezbollah in Lebanon, Hamas in Gaza, the Houthis in Yemen, and various Shia militias in Iraq and Syria.12

The IRGC-QF is Iran’s primary and most effective foreign policy tool, representing its “comparative advantage” in statecraft.39 It uses an irregular 39 “network-building approach” 49 to project power, achieve strategic depth 50, and bog down adversaries 44 on a budget. This is a mission the conventional, “apolitical” Artesh 18 is ideologically and structurally incapable of performing. The Quds Force holds a “special place” 16 in the regime, with a separate line of communication to the Supreme Leader 7 that bypasses the regular C2 structure and even gives it more influence in some countries than Iran’s own Ministry of Foreign Affairs.7

3.2 The Economic Empire: Funding the Praetorians

The IRGC is not just a military, but a “business empire” 3 and “industrial empire with political clout”.3 Its economic power is vast, unaccountable, and controlled only by the Supreme Leader.13

  • Khatam al-Anbiya (KAA): This is the IRGC’s massive engineering and construction arm 10, established after the Iran-Iraq War to help rebuild the country.20 It has since grown into “the most notable financial institution of the IRGC”.20 It dominates huge sectors of the economy—oil and gas, road construction, housing, water management, and agriculture 10—and has been awarded tens of billions in no-bid contracts.10
  • Off-Budget Funding: The IRGC uses its political influence 22 to generate income 54 to fund its own operations.51 It has direct access to Iran’s foreign exchange reserve (from which the Artesh is barred) 10 and engages in large-scale illicit activities, including smuggling 10 and using front companies to circumvent international sanctions.12

In contrast, the Artesh is barred from these lucrative revenue streams.10 Its economic activities are “limited to several chain stores”.10 This is the fundamental difference: the Artesh is a traditional military—a pure cost center that drains the national budget. The IRGC is a hybrid military-conglomerate that generates its own revenue.

This economic autonomy makes the IRGC financially independent and “sanction-proof.” When international sanctions 55 cripple Iran’s official economy, the IRGC thrives by controlling the smuggling routes 21 and the black market. This perversely strengthens its relative power versus the Artesh 55 and the civilian government. This economic dominance is the engine of its political and military superiority.

3.3 Political and Social Dominance: The “Deep State”

The IRGC is “a central player in Iran’s domestic politics”.12 Supreme Leader Khamenei has appointed numerous former IRGC commanders to top political posts, and former guards in parliament advocate for hard-line policies.12 All parliamentarians with a military background are veterans of the IRGC or Basij.10 In contrast, the Artesh is “avowedly apolitical” 18, “forced to remain apolitical” 2, and has virtually no influence in the “regime’s political centers of power”.5

Socially, the IRGC (through the Basij) is the primary tool for suppressing domestic protests.3 It also controls its own media (Sepah News) 3 and a vast “ideological-political organization” (IPO) to ensure the indoctrination of its forces and the public.57 The regime’s “Sacred Defense Cinema” glorifies the IRGC as the victor of the Iran-Iraq War, while largely ignoring the Artesh’s sacrifices, thus cementing its own prestige while diminishing its rival’s.10

The Artesh is merely “hardware”—tanks and ships for a limited function. The IRGC is both the “hardware” (missiles, boats) and the “software” (ideology, politics, media) of the regime. The Artesh is an employee of the state; the IRGC is a shareholder and “kingmaker”.3

Part 4: Net Assessment: Strengths, Weaknesses, and Sustainability

This dual-military structure, while appearing inefficient from a conventional military perspective, is a rational and highly effective system when viewed through the lens of the regime’s unique strategic goals.

4.1 Strengths of the Dual System (From the Regime’s Perspective)

  1. Highly Effective “Coup-Proofing”: This is the system’s primary strength and purpose. By “counterbalancing” 1 the Artesh with the IRGC, the regime creates parallel forces with separate C2 chains 1, separate logistics 1, and institutionalized rivalry.10 This is reinforced by “pervasive surveillance” from independent counterintelligence organizations.17 This structure makes a coordinated military coup against the Supreme Leader a practical impossibility.
  2. Potent Asymmetric Deterrence: The system allows Iran to “employ a hybrid approach to warfare”.45 The IRGC’s focus on asymmetric capabilities—ballistic missiles, drones, proxies, and naval swarms 7—provides a potent, cost-effective, and deniable deterrent 15 against conventionally superior foes.
  3. Flexible, Deniable Power Projection: The IRGC-QF’s proxy network (“Axis of Resistance”) 16 allows Iran to “export its revolutionary ideology” 16 and wage “war by proxy” 15 across the Middle East 44, giving it strategic depth far from its borders.

This system is perfectly tailored to the regime’s two grand strategic goals: 1) Survive internally, and 2) Deter and resist externally.16 A single, unified, conventional military might be better at fighting a conventional war, but it would be worse at both of the regime’s core tasks. It would be a coup risk 3 and would lack the ideological zeal and asymmetric doctrine to run a global proxy network.

4.2 Weaknesses of the Dual System (From a Military Effectiveness Perspective)

  1. Gross Operational Inefficiency: The dual structure is explicitly listed by the U.S. Defense Intelligence Agency as a “Key Vulnerability”.7 The lack of coordination, separate C2, and rivalrous information-hoarding create massive conventional inefficiency and “informational compartmentalization”.1
  2. “Disastrous Results”: This inefficiency is not theoretical. During the Iran-Iraq War, the disjointed command led to “disastrous results” 1, including accounts of IRGC and Artesh soldiers firing on each other.1
  3. Resource Competition & Wasteful Duplication: The system creates “fierce rivalry” 10 for funding, recruits, and materiel 10, leading to an “ineffective use of resources” 8 and wasteful duplication (e.g., two navies, two air arms).
  4. Conventional Atrophy: The regime’s prioritization of the IRGC has “marginalized” 5 the Artesh. This has hollowed out Iran’s conventional capabilities, leaving it with a “deficit in advanced conventional weaponry” 29 and an air force that is “ill-prepared for modern combat”.16
  5. Systemic Corruption & Public Resentment: The IRGC’s unaccountable economic power 13 fosters massive corruption 53, which hollows out the civilian economy and breeds deep “discontent” 60 and resentment among the population 61, a long-term vulnerability.

The sum of these weaknesses is that Iran has a military structure that is not designed to win a conventional, state-on-state war against a peer or near-peer competitor. It is designed to survive, deter, and protract conflict through asymmetric means. The system sacrifices war-winning capability for regime-survival capability.

4.3 Assessment of Sustainability and Future Trajectory

The dual-military structure, despite its inefficiencies, is an “inherent feature” 15 of the regime and is highly sustainable. The rivalry is intentionally maintained by the leadership 10 precisely because it serves the regime’s primary goal: survival.45

The central challenge to this system’s stability is the eventual succession of the Supreme Leader.4 Supreme Leader Khamenei is the “unifying force” 4 who has a “mutually beneficial relationship” 12 with the IRGC. Any potential successor is seen as lacking Khamenei’s stature, popularity, and religious credentials.9

As a result, any new Supreme Leader “will have no choice but to rely on the IRGC”.9 In a post-Khamenei era, the new leader’s reliance on the IRGC will increase, while the IRGC’s dependence on the new leader will decrease.9

This dynamic will make the IRGC the “military-security guarantor” 9 and “kingmaker” 21 of the post-Khamenei regime. It will likely consolidate its power even further 9, transforming the state into a “military-theocratic order” 63 with the IRGC as the undisputed “center of gravity”.63 Khamenei, with his revolutionary authority, controls the IRGC; his successor, who will likely owe their position to the IRGC’s support, will be managed by it.

In this future, the Artesh’s marginalization 5 will only accelerate. The IRGC, as the “kingmaker,” will ensure its rival remains subordinate 15 and on the periphery.5 The dual system is sustainable, but not as a balance of rivals. It will sustain as an increasingly unequal partnership, with the IRGC effectively absorbing the state and the Artesh relegated to a hollow, ceremonial role as a “national” border guard. The system’s inefficiency is its sustainability, as it guarantees the survival of the ruling ideology, which is its one and only true purpose.


If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly contribute towards our continued reporting, please visit our funding page.


Sources Used

  1. (PDF) Relationship between Coup-proofing and Counterinsurgency …, accessed November 14, 2025, https://www.researchgate.net/publication/369082254_Relationship_between_Coup-proofing_and_Counterinsurgency_Insights_from_Iran
  2. The 2010s shifts between IRGC and Artesh: How false nationalism gave hope for an IRGC coup : r/NewIran – Reddit, accessed November 14, 2025, https://www.reddit.com/r/NewIran/comments/15ax1pm/the_2010s_shifts_between_irgc_and_artesh_how/
  3. Islamic Revolutionary Guard Corps – Wikipedia, accessed November 14, 2025, https://en.wikipedia.org/wiki/Islamic_Revolutionary_Guard_Corps
  4. IRGC History and Role in Iranian Statecraft – AHS – Alexander Hamilton Society, accessed November 14, 2025, https://alexanderhamiltonsociety.org/security-strategy/issue-one/irgc-history-and-role-in-iranian-statecraft/
  5. The Artesh: Iran’s Marginalized and Under-Armed Conventional …, accessed November 14, 2025, https://www.mei.edu/publications/artesh-irans-marginalized-and-under-armed-conventional-military
  6. Iran’s National Army Reorganizes | The Washington Institute, accessed November 14, 2025, https://www.washingtoninstitute.org/policy-analysis/irans-national-army-reorganizes
  7. Iran Military Power – Defense Intelligence Agency, accessed November 14, 2025, https://www.dia.mil/portals/110/images/news/military_powers_publications/iran_military_power_lr.pdf
  8. Soviet, Russian, and Israeli Assessments of Iran’s Nuclear Strategic Culture – Executive Services Directorate, accessed November 14, 2025, https://www.esd.whs.mil/Portals/54/Documents/FOID/Reading%20Room/Litigation_Release/Litigation%20Release%20-%20Soviet,%20Russian,%20and%20Israeli%20Assessments%20of%20Iran’s%20Nuclear%20Strategic%20Culture%20%20200909.pdf
  9. Moving to a post-Khamenei era: The role of the IRGC and the clergy …, accessed November 14, 2025, https://www.mei.edu/publications/moving-post-khamenei-era-role-irgc-and-clergy
  10. Eternal Rivals? The Artesh and the IRGC | American Enterprise Institute – AEI, accessed November 14, 2025, https://www.aei.org/articles/eternal-rivals-the-artesh-and-the-irgc/
  11. Islamic Revolutionary Guard Corps (IRGC) | History, Growth, & Sanctions – Britannica, accessed November 14, 2025, https://www.britannica.com/topic/Islamic-Revolutionary-Guard-Corps
  12. The Islamic Revolutionary Guard Corps (IRGC) – Council on Foreign Relations, accessed November 14, 2025, https://www.cfr.org/backgrounder/irans-revolutionary-guards
  13. Khatam al-Anbyia – United Against Nuclear Iran, accessed November 14, 2025, https://www.unitedagainstnucleariran.com/ideological-expansion/khatam-al-anbyia
  14. Guarding History – Joint Chiefs of Staff, accessed November 14, 2025, https://www.jcs.mil/Portals/36/Documents/History/Monographs/Iran_study_complete.pdf
  15. The Strategic Foundations of Iran’s Military Doctrine, accessed November 14, 2025, https://www.iiss.org/globalassets/media-library—content–migration/images/comment/analysis/2017/december/2-mcinnis2125.pdf
  16. Explainer: The Iranian Armed Forces | American Enterprise Institute – AEI, accessed November 14, 2025, https://www.aei.org/articles/explainer-the-iranian-armed-forces/
  17. THE ISLAMIC REPUBLIC’S ART of SURVIVAL: – The Washington Institute, accessed November 14, 2025, https://www.washingtoninstitute.org/media/3027
  18. The Politics of Iran’s Regular Army | Middle East Institute, accessed November 14, 2025, https://www.mei.edu/publications/politics-irans-regular-army
  19. Beyond the IRGC: The rise of Iran’s military-bonyad complex | Clingendael, accessed November 14, 2025, https://www.clingendael.org/publication/beyond-irgc-rise-irans-military-bonyad-complex
  20. The Khatam al-Anbiya company and the future of the IRGC empire – JNS.org, accessed November 14, 2025, https://www.jns.org/the-khatam-al-anbiya-company-and-the-future-of-the-irgc-empire/
  21. The Iranian Islamic Revolutionary Guard Corps (IRGC) from an Iraqi View – a Lost Role or a Bright Future? – CSIS, accessed November 14, 2025, https://www.csis.org/analysis/iranian-islamic-revolutionary-guard-corps-irgc-iraqi-view-lost-role-or-bright-future
  22. Decoding Iran’s defence spending: pitfalls and new pointers, accessed November 14, 2025, https://www.iiss.org/online-analysis/military-balance/2018/11/decode-iran-defence-spending/
  23. The Iranian Maritime Challenge – DTIC, accessed November 14, 2025, https://apps.dtic.mil/sti/trecms/pdf/AD1200387.pdf
  24. Eternal Rivals? The Artesh and the IRGC – Middle East Institute, accessed November 14, 2025, https://www.mei.edu/publications/eternal-rivals-artesh-and-irgc
  25. Iran 022217SP.pdf – ONI.Navy.mil, accessed November 14, 2025, https://www.oni.navy.mil/Portals/12/Intel%20agencies/iran/Iran%20022217SP.pdf
  26. Iranian Naval Strategy: The Domestic Roots of Iran’s Asymmetric Warfare, accessed November 14, 2025, https://gulfif.org/iranian-naval-strategy-the-domestic-roots-of-irans-asymmetric-warfare/
  27. Iranian Naval “Swarming” Tactics – CNAS, accessed November 14, 2025, https://www.cnas.org/publications/blog/iranian-naval-swarming-tactics
  28. Iran’s Doctrine of Asymmetric Naval Warfare | The Washington Institute, accessed November 14, 2025, https://www.washingtoninstitute.org/policy-analysis/irans-doctrine-asymmetric-naval-warfare
  29. Iran’s Conventional Military Capabilities – New Lines Institute, accessed November 14, 2025, https://newlinesinstitute.org/strategic-competition/irans-conventional-military-capabilities/
  30. Iran’s Airpower Mirage: Why New Jets Won’t Fix a Broken System?, accessed November 14, 2025, https://researchcentre.trtworld.com/publications/analysis/irans-airpower-mirage-why-new-jets-wont-fix-a-broken-system/
  31. Iran’s Air Force Overshadowed by the IRGC – The Washington Institute, accessed November 14, 2025, https://www.washingtoninstitute.org/policy-analysis/irans-air-force-overshadowed-irgc
  32. Islamic Revolutionary Guard Corps Aerospace Force – Wikipedia, accessed November 14, 2025, https://en.wikipedia.org/wiki/Islamic_Revolutionary_Guard_Corps_Aerospace_Force
  33. accessed November 14, 2025, https://www.aei.org/articles/explainer-the-iranian-armed-forces/#:~:text=The%20IRGC%20is%20the%20primary,Aerospace%20Force%2C%20and%20Quds%20Force.
  34. How IRGC Manages Iran’s Strategic Missiles | Defense.info, accessed November 14, 2025, https://defense.info/global-dynamics/2023/07/how-irgc-manages-irans-strategic-missiles/
  35. Iran’s low-cost drones have shifted regional balance, senior Guards commander says, accessed November 14, 2025, https://www.iranintl.com/en/202511119726
  36. Iran’s Game of Drones | The Washington Institute, accessed November 14, 2025, https://www.washingtoninstitute.org/policy-analysis/irans-game-drones
  37. Islamic Revolutionary Guard Corps (IRGC) Aerospace Force Self-Sufficiency Jihad Organization | Iran Watch, accessed November 14, 2025, https://www.iranwatch.org/iranian-entities/islamic-revolutionary-guard-corps-irgc-aerospace-force-self-sufficiency-jihad-organization
  38. Iran’s Security Policy in the Post-Revolutionary Era – RAND, accessed November 14, 2025, https://www.rand.org/content/dam/rand/pubs/monograph_reports/MR1320/RAND_MR1320.pdf
  39. War by Proxy: Iran’s Growing Footprint in the Middle East – CSIS, accessed November 14, 2025, https://www.csis.org/analysis/war-proxy-irans-growing-footprint-middle-east
  40. Iran after Sanctions: Military Procurement and Force-Structure Decisions – The International Institute for Strategic Studies, accessed November 14, 2025, https://www.iiss.org/globalassets/media-library—content–migration/images/comment/analysis/2017/december/3-eisenstadt2125.pdf
  41. Islamic Republic of Iran Air Defense Force – Wikipedia, accessed November 14, 2025, https://en.wikipedia.org/wiki/Islamic_Republic_of_Iran_Air_Defense_Force
  42. Iran Ballistic Missile Procurement Advisory – Office of Foreign Assets Control, accessed November 14, 2025, https://ofac.treasury.gov/media/932206/download?inline
  43. Iran and Cyber Power – CSIS, accessed November 14, 2025, https://www.csis.org/analysis/iran-and-cyber-power
  44. Strategic Competition With Iran: The Military Dimension – CSIS, accessed November 14, 2025, https://www.csis.org/analysis/strategic-competition-iran-military-dimension
  45. Iran Military Power Report Statement – Department of War, accessed November 14, 2025, https://www.war.gov/News/Releases/Release/Article/2021009/iran-military-power-report-statement/
  46. Forecasting Iranian Government Responses to Cyberattacks – Marine Corps University, accessed November 14, 2025, https://www.usmcu.edu/Outreach/Marine-Corps-University-Press/MCU-Journal/JAMS-vol-13-no-1/Forecasting-Iranian-Government-Responses-to-Cyberattacks/
  47. Iran’s Revolutionary Guards, the Al Quds Force, and Other Intelligence and Paramilitary Forces – CSIS, accessed November 14, 2025, https://www.csis.org/analysis/irans-revolutionary-guards-al-quds-force-and-other-intelligence-and-paramilitary-forces
  48. The IRGC-Quds Force: Iran’s Secret Military Empire – YouTube, accessed November 14, 2025, https://www.youtube.com/watch?v=gu3i5FJ_iPM
  49. Iranian Networks in the Middle East – CSIS, accessed November 14, 2025, https://www.csis.org/analysis/iranian-networks-middle-east
  50. Iran After the Battle | Carnegie Endowment for International Peace, accessed November 14, 2025, https://carnegieendowment.org/middle-east/diwan/2025/07/iran-after-the-battle?lang=en
  51. Treasury Targets Iran’s Islamic Revolutionary Guard Corps, accessed November 14, 2025, https://home.treasury.gov/news/press-releases/tg539
  52. The Economic Empire of the Revolutionary Guards in Iran – Gulf International Forum, accessed November 14, 2025, https://gulfif.org/the-economic-empire-of-the-revolutionary-guards-in-iran/
  53. Economic activities of the Iranian Revolutionary Guard Corps – Wikipedia, accessed November 14, 2025, https://en.wikipedia.org/wiki/Economic_activities_of_the_Iranian_Revolutionary_Guard_Corps
  54. A United States Marine’s View of the Artesh and IRGC | Middle East Institute, accessed November 14, 2025, https://www.mei.edu/publications/united-states-marines-view-artesh-and-irgc
  55. Sanctioning Iran’s Military-Industrial Complex | Middle East Institute, accessed November 14, 2025, https://www.mei.edu/publications/sanctioning-irans-military-industrial-complex
  56. IRGC and Terrorism-Related Sanctions: Why They Fail, What They Achieve | Middle East Briefs | Publications – Brandeis University, accessed November 14, 2025, https://www.brandeis.edu/crown/publications/middle-east-briefs/meb160.html
  57. Beyond Borders: the Expansionist Ideology of Iran’s Islamic Revolutionary Guard Corps, accessed November 14, 2025, https://institute.global/insights/geopolitics-and-security/beyond-borders-expansionist-ideology-irans-islamic-revolutionary-guard-corps
  58. Iran: Background and U.S. Policy – Congress.gov, accessed November 14, 2025, https://www.congress.gov/crs-product/R47321
  59. Iran: More War(s) In the Middle East? There Still May Be Options. – CSIS, accessed November 14, 2025, https://www.csis.org/analysis/iran-more-wars-middle-east-there-still-may-be-options
  60. The Islamic Revolutionary Guard Corps: Military and Political Influence in Today’s Iran, accessed November 14, 2025, https://www.brookings.edu/events/the-islamic-revolutionary-guard-corps-military-and-political-influence-in-todays-iran/
  61. Iran’s foreign policy weaknesses, and opportunities to exploit them – Brookings Institution, accessed November 14, 2025, https://www.brookings.edu/articles/irans-foreign-policy-weaknesses-and-opportunities-to-exploit-them/
  62. Adversaries and the Future of Competition – CSIS, accessed November 14, 2025, https://www.csis.org/analysis/chapter-1-adversaries-and-future-competition
  63. THE DOSSIER – Post-Khamenei Iran: The Future of Evolutionary Regime Change – New Lines Institute, accessed November 14, 2025, https://newlinesinstitute.org/wp-content/uploads/20240423-Dossier-Iran-Future-NLISAP-1-1.pdf

An Analysis of the Evolution Iran’s 65th NOHED Brigade and IRGC-Quds Force

To comprehend the distinct roles and evolutionary trajectories of Iran’s elite special operations forces, one must first understand the unique and deliberately bifurcated structure of its national military apparatus. The armed forces of the Islamic Republic of Iran are not a monolithic entity but are composed of two powerful, parallel, and often competing institutions: the Islamic Republic of Iran Army (the Artesh) and the Islamic Revolutionary Guard Corps (Sepah-e Pasdaran-e Enghelab-e Eslami, or IRGC). Both are subordinate to a single commander-in-chief, the Supreme Leader, a structure that bypasses the elected presidency and concentrates ultimate military authority within the clerical establishment.1 This dual-military system is the foundational context in which the Artesh’s 65th NOHED Airborne Special Forces Brigade and the IRGC’s Quds Force were born and have evolved.

The Artesh is Iran’s conventional military, the inheritor of the legacy of the pre-revolutionary Imperial Iranian Armed Forces. Its constitutional mandate is the defense of Iran’s territorial integrity and national borders against external aggression.3 The Artesh comprises traditional ground, naval, air, and air defense forces and operates the majority of Iran’s heavy conventional platforms, including tanks, major surface combatants, and fighter aircraft.1 However, decades of international sanctions have severely degraded its ability to maintain and modernize this arsenal.1 Following the 1979 Islamic Revolution, the new clerical leadership under Ayatollah Ruhollah Khomeini viewed the Artesh, with its Western training and historical loyalty to the Shah, with deep suspicion.2

This distrust was the primary catalyst for the creation of the IRGC in April 1979. Established by Khomeini’s decree, the IRGC was conceived as a deeply ideological “people’s army” and a praetorian guard whose primary function was not to defend the borders, but to protect the Revolution itself from both internal and external threats.1 Its constitutional role is explicitly the preservation of the revolutionary system.4 Over the subsequent decades, the IRGC has evolved from a paramilitary militia into Iran’s dominant military, political, and economic institution, wielding immense influence across all sectors of the state.3 It is geared toward asymmetric warfare and is the primary custodian of Iran’s most critical strategic assets, including its ballistic missile and unmanned aerial vehicle (UAV) arsenals, and is responsible for managing Iran’s network of regional proxies through its expeditionary arm, the Quds Force.1

This structure is not an accident of history but a calculated strategy of institutionalized redundancy designed to ensure regime survival. By creating two powerful and parallel military organizations, each with its own command structure reporting directly to the Supreme Leader, the regime engineered a system of internal checks and balances. This arrangement effectively prevents any single military faction from accumulating sufficient power to challenge the clerical government, a lesson drawn from the 1953 coup that overthrew Prime Minister Mohammed Mossadeq and restored the Shah to power.2 This internal dynamic, characterized by competition for resources, influence, and the Supreme Leader’s favor, is a defining feature of Iran’s defense posture. The existence and divergent development of the Artesh’s 65th NOHED Brigade and the IRGC’s Quds Force are the direct manifestation of this dual-pillar strategy at the apex of Iran’s special operations capabilities.

II. The 65th NOHED Airborne Special Forces Brigade: The Artesh’s Elite Tip

The 65th NOHED Brigade represents the pinnacle of the Artesh’s special operations capabilities, a unit forged in the Western mold but tempered by decades of regional conflict and loyalty to the Islamic Republic. Its evolution from an Imperially-sponsored, US-trained commando force to a modern expeditionary unit is a testament to its institutional resilience and tactical adaptability.

Inception and Imperial Legacy: U.S. Special Forces Influence and Early Operations

The origins of the 65th NOHED Brigade are deeply rooted in the Western military tradition, a legacy that distinguishes it from its IRGC counterparts. The genesis of Iranian airborne forces began in 1953, when a contingent of ten Imperial Iranian Army officers was sent to France for parachute training.8 This led to the establishment of a formal Parachute Unit in 1955, which expanded into a Parachute Battalion by 1959.9

The pivotal year was 1959, with the establishment of the 23rd Special Forces Brigade, the direct parent unit of what would become the 65th.9 During the 1960s, this nascent force was shaped profoundly by American mentorship. Under the Shah’s pro-Western alignment, the United States dispatched advisors from the John F. Kennedy Special Warfare Center & School to train and structure Iran’s special forces.8 This American influence was not superficial; it was embedded in the unit’s DNA. The brigade adopted the iconic green beret of its American trainers, and its qualification badge was designed to be nearly identical to the US Army Special Forces’ “De oppresso liber” insignia, a clear visual marker of its doctrinal heritage.8

This Western-style training was soon put to the test. In the early 1970s, the brigade, then known as the 23rd Airborne Special Forces Brigade, received its baptism by fire in the Dhofar Rebellion in Oman.9 Deployed to assist the Sultan of Oman in combatting Marxist-Leninist guerrillas, the Iranian forces engaged in a classic counter-insurgency campaign, the very type of unconventional warfare for which their American advisors had prepared them.11 This early operational experience cemented the unit’s reputation as a capable and professional fighting force.

Post-Revolutionary Crucible: The Iran-Iraq War and the Forging of a Modern Identity

The 1979 Islamic Revolution placed the Western-trained 23rd Brigade in a precarious position. The new regime was inherently suspicious of any institution associated with the Shah and his American patrons. This distrust culminated in a call by then-parliament-member Hassan Rouhani to disband the unit following the 1980 Nojeh coup plot, in which some military elements were implicated.9 However, the unit was saved by the staunch opposition of Defense Minister Mostafa Chamran, who recognized its strategic value.9

The crucible that would reforge the unit’s identity and prove its loyalty to the new republic was the Iran-Iraq War (1980-1988). As part of the 23rd Commando Division, the brigade was deployed extensively across all fronts of the brutal, eight-year conflict.8 The war demanded a broad spectrum of skills. The unit participated in large-scale conventional battles, such as the Breaking of the Siege of Abadan and Operation Beit ol-Moqaddas, where it functioned as elite light infantry.9 Simultaneously, it was tasked with missions that leveraged its specialized training. It engaged in grueling mountain warfare, successfully holding strategic positions like the Dopaza and Laklak mountains against repeated Iraqi assaults, which included the use of chemical weapons.9 Furthermore, a select cadre of its personnel was detached to conduct clandestine special operations under the direct command of Defense Minister Chamran’s Irregular Warfare Headquarters, showcasing its dual-capability in both conventional and unconventional domains.9

Evolving Missions in the Modern Era: From Counter-Insurgency to Hybrid Warfare

The post-war reorganization of the Iranian military led to the formal establishment of the Artesh’s premier special forces unit. In 1991, the 3rd Brigade was separated from the 23rd Division to form the 65th Airborne Special Forces Brigade, commonly known by its Persian acronym NOHED (Nīrūhāye Vīzheye Havābord, or Airborne Special Forces).9

Throughout the 1990s and 2000s, the 65th NOHED Brigade became the Artesh’s go-to force for complex domestic security challenges. It was consistently deployed for counter-insurgency and counter-terrorism missions, primarily in the restive border provinces. It engaged drug trafficking syndicates and insurgent groups in Sistan and Baluchestan province and conducted operations against Kurdish separatist groups like the Party for a Free Life in Kurdistan (PJAK) in the country’s northwest.9

A fundamental strategic shift occurred in April 2016, marking a new chapter in the brigade’s history. The Iranian government officially announced that “advisors” from the 65th NOHED Brigade were being deployed to Syria to support the government of Bashar al-Assad.8 This was a landmark event, representing the first official deployment of Artesh combat troops outside Iran’s borders since the 1979 revolution. For decades, extraterritorial operations had been the exclusive domain of the IRGC and its Quds Force. The deployment of NOHED to the Syrian battlefield was a clear signal from the Artesh leadership. Facing years of receiving less funding and political favor than the IRGC, the Artesh seized the opportunity to demonstrate its own expeditionary capabilities and relevance in modern hybrid conflicts.13 By proving its utility in a complex foreign theater, the Artesh could argue for a greater share of the defense budget and a more prominent role in national security strategy, directly challenging the IRGC’s monopoly. Furthermore, leveraging the more popular and less politicized national army for a controversial foreign intervention could provide a “patriotic” veneer to the policy, potentially bolstering domestic support.11

In Syria, NOHED personnel fulfilled “advisory” and intelligence-gathering roles, primarily around Aleppo, and sustained casualties in direct combat with jihadist factions, including the al-Qaeda affiliate Jabhat al-Nusra.11

Current Doctrine, Training, and Capabilities

Today, the 65th NOHED Brigade is widely regarded as the most elite, best-trained, and best-equipped special forces unit within the Artesh.8 It is an all-professional, volunteer force, a rarity in Iran’s conscript-heavy military.13 Its unique background and continuous operational tempo have produced a force with a distinct set of capabilities.

The unit’s Western-style professional ethos and skillset, a direct legacy of its American training, remain a key differentiator. This “Western SOF DNA” provides the Iranian regime with a unique strategic tool. Unlike the Quds Force, which specializes in organizing and leading irregular militias, NOHED brings a high-level tactical and training capability geared towards professional military standards. This allows Iran to engage in different forms of military assistance simultaneously, tailoring its support to the specific needs of its allies, whether they are state or non-state actors.

Training for the brigade, nicknamed “Powerful Ghosts” within the Iranian military, is exceptionally demanding.8 Operators must master parachute operations and demonstrate proficiency in a wide array of environments. Specialized training camps are maintained for this purpose: jungle warfare in the forests of Kelardasht, snow and mountain warfare at the Emamzadeh Hashem ski resort, desert warfare near Qom, and amphibious operations at the Karaj Dam.8 The curriculum also includes espionage, reconnaissance, telecommunications, and irregular warfare, providing a robust guerrilla warfare capability.8

The brigade’s structure mirrors that of many Western special operations forces, with specialized sub-units dedicated to specific mission sets. These include a Hostage Rescue Unit (Unit-110), a psychological operations company, a support battalion, and irregular warfare teams.8 This organization grants the 65th NOHED Brigade a comprehensive skill set spanning direct action, special reconnaissance, counter-terrorism, hostage rescue, and unconventional warfare.9

III. The IRGC-Quds Force: Instrument of Extraterritorial Influence

The IRGC-Quds Force is a fundamentally different entity from the 65th NOHED Brigade. It is not a conventional special forces unit but a unique hybrid organization that blends intelligence, covert action, and unconventional warfare to function as the primary instrument of Iranian foreign policy and power projection. Its evolution has been driven by the ideological imperative to export the 1979 revolution and to build a regional security architecture favorable to Tehran’s interests.

Origins in Irregular Warfare and Formal Establishment

The Quds Force is a specialized branch of the IRGC, focused on extraterritorial operations, military intelligence, and unconventional warfare.13 It is often mischaracterized as a “commando” unit; its role is far more strategic and intelligence-driven.13 Its genesis lies in the irregular warfare directorates established during the Iran-Iraq War. Precursors included a special intelligence unit known as ‘Department 900’ and a headquarters dedicated to managing irregular operations with allied Iraqi Kurdish and Shia Arab militias fighting against Saddam Hussein’s regime.13

Following the end of the war in 1988, the IRGC underwent a significant reorganization. The various external operations and intelligence bodies were consolidated and formally established as an independent service branch: the Quds Force.13 Its name, which translates to “Jerusalem Force,” reflects its official, ideologically charged mission: the “liberation of Muslim land,” with a particular focus on Jerusalem.16 Its personnel, estimated to number between 5,000 and 20,000, are handpicked from the broader IRGC for their skill and ideological commitment.13

The Doctrine of Proxy Warfare: Cultivating the “Axis of Resistance”

The central pillar of Quds Force doctrine and strategy is the cultivation and command of a network of non-state partners and proxy forces across the Middle East. This network, which Tehran refers to as the “Axis of Resistance,” is the primary vehicle through which Iran projects power.1 The Quds Force’s core mission is to organize, train, fund, arm, and provide operational guidance to these groups.2

This strategy of proxy warfare offers several key advantages to Iran. It allows Tehran to challenge and bog down more powerful adversaries, such as the United States and Israel, in costly asymmetric conflicts. It creates a strategic buffer, enabling Iran to engage in hostilities far from its own borders. Crucially, it provides a layer of plausible deniability, allowing Iran to advance its interests while shielding the homeland from direct retaliation.18 Under the command of the late Major General Qassem Soleimani, who led the force from 1998 until his death in 2020, this doctrine was refined and perfected. Soleimani’s vision was to create a transnational movement of Shia militancy and to build proxy “deep states” in allied countries—paramilitary forces that would eventually become better armed and more organized than the host nation’s official military, while remaining loyal to Tehran.17

Operational Evolution Across Key Theaters

The Quds Force has systematically applied and evolved its proxy warfare model across numerous conflict zones over four decades.

  • Lebanon (1982-Present): The Quds Force’s first and most successful application of its doctrine came in Lebanon. Following the 1982 Israeli invasion, Quds Force operatives were deployed to the Bekaa Valley, where they were instrumental in organizing, training, and funding the nascent Shia militia that would become Hezbollah.5 Hezbollah became the template for the Quds Force’s proxy model: a highly capable, ideologically aligned force that serves as a powerful deterrent against Israel and a key node in Iran’s regional network.
  • Afghanistan (1990s): Demonstrating strategic pragmatism, the Quds Force shifted its attention to Iran’s eastern border in the 1990s. It provided support to the predominantly Sunni Northern Alliance in its fight against the Taliban, who were backed by Iran’s regional rivals, Pakistan and Saudi Arabia.5 This operation showed the Quds Force’s willingness to partner with non-Shia groups to counter a more immediate strategic threat.
  • Iraq (2003-Present): The US invasion of Iraq in 2003 created a fertile environment for Quds Force operations. It moved quickly to organize, arm, and direct a multitude of Shia militias to wage an insurgency against Coalition forces.5 The Quds Force is widely credited by US military intelligence with flooding the Iraqi theater with sophisticated weaponry, most notably Explosively Formed Projectiles (EFPs). These advanced improvised explosive devices (IEDs) were capable of penetrating armored vehicles and were responsible for a significant percentage of American combat fatalities in Iraq.2
  • Syria (2011-Present): The Syrian Civil War represents the largest and most complex intervention in the Quds Force’s history. To prevent the collapse of its key regional ally, Bashar al-Assad, the Quds Force executed a massive and multifaceted campaign. It deployed its own officers as frontline advisors and commanders, but its main effort was to build a local proxy army from the ground up.2 By one estimate from a senior Iranian general, the IRGC created 82 distinct fighting units in Syria, totaling some 70,000 armed combatants.22 These forces, along with deployed Hezbollah militants and Shia fighters recruited from Afghanistan and Pakistan, fought alongside the Syrian Arab Army to turn the tide of the war.2

A Multi-faceted Approach: Integrating Hard and Soft Power

The operational methodology of the Quds Force demonstrates that it is far more than a simple military unit; it is a comprehensive instrument of statecraft. Its structure is divided into functional branches covering not only special operations and sabotage but also intelligence, finance, politics, and foreign languages.16 This allows it to pursue a holistic strategy that integrates hard military power with sophisticated “soft power” initiatives designed to win the “hearts and minds” of local populations and embed Iranian influence deep within the social fabric of target nations.22

This approach has been on full display in Syria. In the aftermath of the devastating February 2023 earthquake, Quds Force commander Esmail Qaani personally visited Aleppo to oversee the delivery of Iranian humanitarian aid.24 Simultaneously, these aid convoys were reportedly used as cover to move military reinforcements into the area.24 The Quds Force has funded the restoration of hundreds of Syrian schools, established networks of Islamic libraries, and provided digital training, all aimed at cultivating a new generation with a pro-Iranian, Shia-centric worldview.24 Following a model inspired by Iran’s own Basij militia, Quds Force operatives organize the purchase of houses, shops, and farmland, which are then given to pro-Iranian fighters and their families. This tactic embeds them within the local community rather than isolating them in barracks, fostering human links and long-term loyalty.22 This fusion of military, economic, social, and ideological tools makes the Quds Force a uniquely effective—and uniquely challenging—actor on the international stage.

IV. Comparative Analysis: Divergent Paths to Special Operations

The 65th NOHED Brigade and the IRGC-Quds Force, while both representing the elite of Iran’s military, are fundamentally dissimilar organizations. They are products of their parent institutions—the conventional Artesh and the ideological IRGC—and their differences in mission, methods, and strategic purpose are stark. They are parallel spears in Iran’s arsenal, but they are designed for entirely different targets.

Mission Sets: Tactical Direct Action vs. Strategic Covert Influence

The core distinction lies in their respective mission sets. The 65th NOHED Brigade is a tactical and operational asset. Its purpose is to execute discrete military missions with clear objectives: conducting special reconnaissance behind enemy lines, rescuing hostages, eliminating specific high-value targets, or training allied military forces.9 Its focus is on direct action and the application of specialized combat skills to achieve a battlefield effect.

The Quds Force, in contrast, is a strategic asset. Its missions are not typically single, time-bound operations but rather long-term, open-ended political-military campaigns. Its purpose is to alter the geopolitical landscape of a region by building, managing, and directing a network of foreign proxy forces.2 Its success is measured not in hills taken or targets destroyed, but in the degree of political influence and military control its proxies can exert within their host countries.

Operational Methods: The Commando vs. The Operative

This difference in mission dictates their operational methods. The 65th NOHED Brigade operates as a uniformed military unit. Its members are commandos, trained for direct combat and leveraging their superior training and equipment to overwhelm an enemy. Their value lies in their direct proficiency as warfighters and trainers.8

The Quds Force operates primarily in the shadows. Its members are operatives, working covertly, often under diplomatic or non-official cover. They function as advisors, intelligence officers, logisticians, and political organizers. Their primary method is not to fight battles themselves, but to enable others to fight on Iran’s behalf. Their value lies in their ability to act as a force multiplier, creating armies out of local militias and providing the strategic guidance and material support necessary for them to succeed, all while maintaining plausible deniability for Tehran.13

Relationship and Deconfliction in Shared Battlefields (e.g., Syria)

The deployment of both units to the Syrian theater highlights this functional divergence. They operate under separate command structures, one answering to the Artesh and the other to the IRGC.1 While they share the overarching national objective of preserving the Assad regime, their roles on the ground appear to be complementary rather than integrated. The Quds Force’s mission was to create and lead the vast network of local and foreign militias that formed the backbone of the pro-regime ground forces.22 The 65th NOHED Brigade’s official role was “advisory,” suggesting they were likely tasked with a different mission: training and mentoring conventional units of the Syrian Arab Army, a foreign internal defense role for which their professional military background is uniquely suited.8 This indicates a deliberate division of labor, allowing Iran to support both the state and non-state pillars of Assad’s military power simultaneously.

V. Small Arms and Equipment Assessment

The small arms and individual equipment of Iran’s special operations capable forces reflect the divergent doctrines, supply chains, and operational philosophies of the Artesh and the IRGC. The 65th NOHED Brigade shows a clear trend toward modernization and alignment with international SOF standards, while the Quds Force prioritizes robust, reliable, and easily proliferated weapon systems suitable for its own operators and its vast network of proxies.

Armament of the 65th NOHED Brigade: A Blend of Legacy and Modernization

The individual kit of the 65th NOHED Brigade operator is undergoing a visible transformation. Recent imagery shows the increasing adoption of modern, Western-style personal protective equipment, including MOLLE-compatible plate carriers and FAST-type ballistic helmets, indicating a focus on operator survivability and modularity.9

Their service weapons have evolved similarly. Historically, the unit was equipped with the Iranian-made Tondar (a clone of the Heckler & Koch MP5 submachine gun) and its predecessor, the Uzi.9 The East German Mpi Kms 72, a side-folding stock variant of the AKM, was also a primary weapon for Artesh commandos.25

Today, the brigade’s arsenal is more diverse and modern. The Russian-designed AK-103, chambered in 7.62x39mm, is now in common use.9 More significantly, the unit has embraced domestically produced AR-15 pattern rifles. This includes platforms like the Masaf, a direct clone of the Heckler & Koch HK416, which utilizes a short-stroke gas piston system.25 The adoption of these modular, optics-ready 5.56x45mm platforms represents a significant leap in capability, bringing the brigade’s primary weapon systems in line with those used by many NATO special operations forces. The standard issue sidearm is reported to be the Czech-designed CZ 75 pistol.9

The brigade has also demonstrated a capacity for battlefield acquisition. Following the collapse of the Afghan National Army in 2021, NOHED units were photographed with captured US-made small arms, including M4 carbines, M16A3/A4 rifles, and M249 light machine guns, which were evidently brought into Iran by fleeing Afghan soldiers.27

The Quds Force Arsenal: Equipping the Vanguard and its Proxies

The Quds Force arsenal is a reflection of its dual role as both an elite operational unit and the primary arms supplier for the Axis of Resistance. The weapons its operators carry are often the same ones it distributes to its partners, prioritizing ruggedness, reliability, and compatibility with regional supply chains.

The backbone of the IRGC’s, and by extension the Quds Force’s, long arms inventory is the Kalashnikov platform. This includes Iranian-produced versions of the AKM (designated KLS/KLF/KLT) and licensed or reverse-engineered copies of the more modern AK-103 (designated AK-133 or KL-133).25 These 7.62x39mm rifles are ubiquitous across Middle Eastern conflict zones, making them simple to supply and maintain.

For specialized applications, particularly for its proxy forces, the Quds Force makes extensive use of the Iranian-made AM-50 Sayyad anti-materiel rifle.25 This is an unlicensed copy of the Austrian Steyr HS.50 rifle, chambered in the powerful 12.7x99mm (.50 BMG) cartridge.28 The Sayyad provides a devastating capability against light armored vehicles, fortified positions, and enemy personnel at extended ranges. It has been widely proliferated by the Quds Force and has been documented in the hands of proxy militias in Iraq, Syria, Yemen, and the Palestinian territories.28

Beyond small arms, the Quds Force is responsible for facilitating the transfer of a wide spectrum of advanced weaponry to its allies. This includes rockets, rocket-propelled grenades (RPGs), advanced IED components like EFPs, anti-aircraft weapons, and a growing arsenal of sophisticated unmanned aerial systems.7

The Role of Iran’s Domestic Defense Industry

Iran’s domestic Defense Industries Organization (DIO) is the critical enabler for arming its forces under a decades-long international sanctions regime. Unable to procure modern weapon systems from abroad, Iran has developed a robust capability for reverse-engineering and producing unlicensed copies of proven foreign designs.26

This strategy is evident across the entire small arms catalog. The PC-9 Zoaf pistol is a clone of the SIG Sauer P226.25 The Tondar SMG is a copy of the H&K MP5.25 The S-5.56 assault rifle is a copy of the Chinese Norinco CQ, which itself is a copy of the American M16A1.29 The Masaf rifle is a copy of the H&K HK416.25 This approach provides self-sufficiency but can result in inconsistent quality. The AM-50 Sayyad, for example, is noted to have a significantly worse fit and finish than the original Austrian rifle it copies.28

Not all domestic designs have been successful. The KH-2002 Khaybar, an ambitious bullpup assault rifle intended to replace the G3, proved to be a failure. During field trials in Syria, the rifle suffered from numerous jamming malfunctions and was ultimately rejected by potential foreign buyers. Production was reportedly discontinued in 2012.30 Similarly, the Fateh assault rifle, another AR-15-style platform developed by the IRGC, was introduced in 2014 but discontinued by 2016, failing to enter widespread service.32 These failures underscore the challenges Iran’s defense industry faces in moving from simple reverse-engineering to reliable, original design and mass production.

Table: Current Small Arms of Iranian Special Operations Capable Forces

Weapon TypeDesignation (Iranian)Original Design/PlatformCaliberOrigin/ProductionPrimary User(s) & Notes
PistolPC-9 ZoafSIG Sauer P2269×19mmIran (Unlicensed Copy)IRGC, Artesh. Widespread service pistol. 25
CZ 75CZ 759×19mmCzech Republic65th NOHED Brigade. 9
Submachine GunTondar (MPT-9)Heckler & Koch MP59×19mmIran (Licensed/Copy)65th NOHED (legacy), various units. 9
Assault RifleKLS/KLF/KLTAKM / Type 567.62×39mmIran (Domestic Variant)IRGC, Quds Force. Standard issue Kalashnikov variant. 25
AK-133 / KL-133AK-1037.62×39mmIran (Licensed/Copy)IRGC, Quds Force, 65th NOHED Brigade. Modernized AK platform. 9
MasafHeckler & Koch HK4165.56×45mmIran (Unlicensed Copy)65th NOHED Brigade, Artesh SOF. Represents modernization trend. 25
S-5.56Norinco CQ / M16A15.56×45mmIran (Copy of Chinese Copy)IRGC SOF units. Limited service. 25
M4 CarbineColt M45.56×45mmUnited States65th NOHED Brigade (captured from Afghan forces). 27
Battle RifleG3A6Heckler & Koch G37.62×51mmIran (Licensed)Artesh (legacy standard issue). 25
Masaf-2HK417 (platform)7.62×51mmIran (Domestic Variant)Artesh Rapid Reaction units. Intended G3 replacement. 25
Sniper / Anti-Materiel RifleAM-50 SayyadSteyr HS.5012.7×99mmIran (Unlicensed Copy)IRGC, Quds Force, and Proxies. Widely proliferated. 25
NakhjirSVD Dragunov (platform)7.62×54mmRIran (Domestic Design)Artesh, IRGC. Standard designated marksman rifle. 25
Machine GunMGA3Rheinmetall MG37.62×51mmIran (Licensed)Artesh, IRGC. Standard general-purpose machine gun. 25
PKM/PKTPKM7.62×54mmRIran (Copy)Artesh, IRGC. 25
M249FN Minimi5.56×45mmUnited States65th NOHED Brigade (captured from Afghan forces). 27

VI. Future Trajectory: Speculative Analysis

Based on established trends in doctrine, procurement, and operational employment, a speculative analysis of the future trajectories of both the 65th NOHED Brigade and the IRGC-Quds Force can be projected. Their paths will likely continue to diverge, shaped by the institutional priorities of the Artesh and the IRGC, even as they adapt to an evolving regional security landscape.

Projected Evolution of the 65th NOHED Brigade

The 65th NOHED Brigade is poised to continue its trajectory of professionalization and modernization, aiming to achieve tactical and equipment parity with other Tier 1 and Tier 2 international special operations forces. This will involve the continued adoption of modular small arms, advanced optics, encrypted communications systems, and night vision technology. The goal will be to solidify its status as a high-end direct-action and special reconnaissance force.

The experience gained in Syria is likely to have a lasting impact on the Artesh’s strategic thinking. The leadership will probably leverage NOHED’s successful deployment to advocate for a more permanent and institutionalized expeditionary role. This could see the brigade formally tasked with foreign internal defense (FID) missions, carving out a distinct niche for the Artesh in training and advising the conventional militaries of allied nations. This would complement, rather than compete with, the Quds Force’s focus on non-state actors and allow Iran to project influence through both conventional and unconventional military partnerships.

The Future of the Quds Force

The Quds Force will remain the centerpiece of Iran’s “forward defense” doctrine, which seeks to confront perceived threats far from Iran’s borders through a network of proxies.33 Its core mission of managing the Axis of Resistance will not change. However, its methods will continue to evolve. The future of Quds Force operations will see a deeper integration of technology into its proxy warfare model. This will include the continued proliferation of more advanced and precise UAVs and loitering munitions, the provision of cyber warfare capabilities to its partners, and the potential distribution of guided rockets and short-range ballistic missiles to key allies like Hezbollah.7

The primary challenge facing the Quds Force will be one of command and control. As its proxy groups mature and gain significant political and military power in their own right, they may begin to pursue local agendas that diverge from Tehran’s strategic interests.21 The long-term success of the Quds Force’s model will depend on its ability to maintain ideological alignment and operational control over an increasingly complex and geographically dispersed network of powerful non-state actors.

Potential for Inter-Service Cooperation, Competition, and Doctrinal Convergence

The future relationship between the 65th NOHED Brigade and the Quds Force will be a key barometer of the broader Artesh-IRGC dynamic. While the Supreme Leader could mandate closer cooperation in a future crisis, the more probable trajectory is one of continued institutional competition. The IRGC will likely view any expansion of the Artesh’s expeditionary role as an encroachment on its traditional domain and a threat to its primacy in foreign operations. This competition for missions, resources, and influence will continue to define their relationship.

Over time, a degree of doctrinal convergence is possible. The 65th NOHED Brigade, having been exposed to the realities of hybrid warfare in Syria, will undoubtedly incorporate lessons on operating in ambiguous, multi-actor environments into its training and doctrine. Conversely, the Quds Force may seek to instill greater professionalism and more conventional combined-arms capabilities into its most mature proxy forces, like Hezbollah, blurring the lines between irregular and conventional forces.

VII. Concluding Assessment

The Islamic Republic of Iran’s special operations capabilities are embodied by two distinct, parallel, and highly evolved instruments of national power: the Artesh’s 65th NOHED Airborne Special Forces Brigade and the IRGC’s Quds Force. They are the products of vastly different institutional cultures and historical circumstances. NOHED was born from a Western-mentored, professional military tradition and was re-forged as a loyal and capable tactical force in the fires of the Iran-Iraq War. The Quds Force was born from the ideological fervor of the 1979 revolution and the brutal necessities of irregular warfare, becoming the master of a unique and highly effective doctrine of political-military influence.

The 65th NOHED Brigade has evolved from its origins as a conventional commando unit into a modern, multi-role special operations force capable of direct action, counter-terrorism, and, as demonstrated in Syria, expeditionary advisory missions. It represents a tactical and operational spear, sharp and precise. The Quds Force has perfected a strategic methodology of proxy warfare, leveraging a network of allies and integrating the full spectrum of hard and soft power to achieve long-term geopolitical objectives far beyond Iran’s borders. It represents a strategic spear, long-reaching and patient.

Their separate evolutionary paths, distinct equipment philosophies, and divergent operational methods are a direct reflection of Iran’s dual-military structure. This system provides the Iranian regime with a flexible, resilient, and multi-layered toolkit for projecting power and ensuring its own security. Whether a mission requires the surgical precision of a commando raid or the patient cultivation of a foreign insurgency, Tehran possesses a specialized spear for the task.


If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly contribute towards our continued reporting, please visit our funding page.


Sourcs Used

  1. Explainer: The Iranian Armed Forces | American Enterprise Institute …, accessed September 6, 2025, https://www.aei.org/articles/explainer-the-iranian-armed-forces/
  2. The Islamic Revolutionary Guard Corps (IRGC) – Council on Foreign Relations, accessed September 6, 2025, https://www.cfr.org/backgrounder/irans-revolutionary-guards
  3. Strait of Hormuz – Iranian Military – The Strauss Center, accessed September 6, 2025, https://www.strausscenter.org/strait-of-hormuz-iranian-military/
  4. Islamic Revolutionary Guard Corps – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Islamic_Revolutionary_Guard_Corps
  5. Quds Force | Iran, IRGC, Meaning, History, & Israel-Hamas War …, accessed September 6, 2025, https://www.britannica.com/topic/Quds-Force
  6. Iran’s Islamic Revolutionary Guards Corps (IRGC) – Critical Threats, accessed September 6, 2025, https://www.criticalthreats.org/wp-content/uploads/2016/07/imce-imagesIRGC_CommandNetwork_context-1.pdf
  7. The 15 Deadly Weapons Of Iran – YouTube, accessed September 6, 2025, https://www.youtube.com/watch?v=Lu2t4APKFYQ
  8. NOHED Brigade: Iran’s Special Forces – Grey Dynamics, accessed September 6, 2025, https://greydynamics.com/nohed-irans-special-forces/
  9. 65th Airborne Special Forces Brigade – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/65th_Airborne_Special_Forces_Brigade
  10. 65th Airborne Special Forces Brigade – Wikiwand, accessed September 6, 2025, https://www.wikiwand.com/en/articles/65th_Airborne_Special_Forces_Brigade
  11. Iran’s Army Suffers Its First Casualties in Syria | The Washington Institute, accessed September 6, 2025, https://www.washingtoninstitute.org/policy-analysis/irans-army-suffers-its-first-casualties-syria
  12. About: 65th Airborne Special Forces Brigade – DBpedia, accessed September 6, 2025, https://dbpedia.org/page/65th_Airborne_Special_Forces_Brigade
  13. Iranian Special Forces – Центр анализа стратегий и технологий, accessed September 6, 2025, http://cast.ru/products/articles/iranian-special-forces.html
  14. en.wikipedia.org, accessed September 6, 2025, https://en.wikipedia.org/wiki/65th_Airborne_Special_Forces_Brigade#:~:text=After%20the%201979%20Revolution%20in,the%20Sistan%20and%20Baluchestan%20insurgency.
  15. Iran Military Power – Defense Intelligence Agency, accessed September 6, 2025, https://www.dia.mil/portals/110/images/news/military_powers_publications/iran_military_power_lr.pdf
  16. Quds Force – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Quds_Force
  17. The Quds Force – United Against Nuclear Iran | UANI, accessed September 6, 2025, https://www.unitedagainstnucleariran.com/report/quds-force
  18. Islamic Revolutionary Guard Corps (IRGC) – National Counterterrorism Center | Terrorist Groups, accessed September 6, 2025, https://www.dni.gov/nctc/terrorist_groups/irgc.html
  19. What is Iran’s Islamic Revolutionary Guard Corps and Why is it Designated a Terror Group by the United States? – American Jewish Committee, accessed September 6, 2025, https://www.ajc.org/news/what-is-irans-islamic-revolutionary-guard-corps
  20. Iran’s Regional Armed Network – Council on Foreign Relations, accessed September 6, 2025, https://www.cfr.org/article/irans-regional-armed-network
  21. The Limits of Iran’s Proxy Strategy: How Soleimani’s Vision Failed in Recent Conflicts, accessed September 6, 2025, https://www.meforum.org/mef-online/the-limits-of-irans-proxy-strategy-how-soleimanis-vision-failed-in-recent-conflicts
  22. The Quds Force in Syria: Combatants, Units, and Actions, accessed September 6, 2025, https://ctc.westpoint.edu/the-quds-force-in-syria-combatants-units-and-actions/
  23. Saberin Unit – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Saberin_Unit
  24. The Quds Force in Syria – Combating Terrorism Center, accessed September 6, 2025, https://ctc.westpoint.edu/wp-content/uploads/2023/06/CTC-SENTINEL-062023.pdf
  25. List of equipment of the Iranian Army – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/List_of_equipment_of_the_Iranian_Army
  26. The new Iranian standard issue chambered in 7.62×51 nato of all things – Reddit, accessed September 6, 2025, https://www.reddit.com/r/ForgottenWeapons/comments/1n8pd2h/the_new_iranian_standard_issue_chambered_in/
  27. Iranian 65th NOHED Rapid Reaction Brigade armed with US made M4,M16A3/A4 and M249 LMG which was confiscated from fleeing/surrendered Afghan National Army soldiers who fled to Iran after the fall of Kabul in 2021 : r/ForgottenWeapons – Reddit, accessed September 6, 2025, https://www.reddit.com/r/ForgottenWeapons/comments/1i77o1j/iranian_65th_nohed_rapid_reaction_brigade_armed/
  28. Steyr HS .50 / HS .460 – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Steyr_HS_.50_/_HS_.460
  29. Khaybar: Iran’s 5.56mm Assault Rifle – Guns and Ammo, accessed September 6, 2025, https://www.gunsandammo.com/editorial/khaybar-irans-5-56mm-assault-rifle/248021
  30. KH-2002 – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/KH-2002
  31. KH2002 – IOP Wiki, accessed September 6, 2025, https://iopwiki.com/index.php?title=KH2002&mobileaction=toggle_view_desktop
  32. Fateh rifle – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Fateh_rifle
  33. Iran’s Forward Defense Doctrine and the Evolution of Its “Long Arm Strategy – İRAM Center, accessed September 6, 2025, https://iramcenter.org/en/irans-forward-defense-doctrine-and-the-evolution-of-its-long-arm-strategy_en-2600
  34. Iran’s Evolving Military: Complementing Asymmetric Doctrine with Conventional Capabilities, accessed September 6, 2025, https://bisi.org.uk/reports/irans-evolving-military-complementing-asymmetric-doctrine-with-conventional-capabilities

Ronin’s Grips: Analyzing the Invisible Battlefield—Why Social Media Sentiment is the New Decisive Terrain

The character of conflict has irrevocably shifted. We are no longer operating in a world of episodic, declared wars, but in a condition of persistent, unending competition that actively exploits strategic ambiguity. For the national security community, this means the battlefield has expanded from physical territory to encompass critical infrastructure, financial systems, and, most crucially, the cognitive domain of public perception itself.

The Ronin’s Grips approach recognizes this shift and leverages sophisticated social media analysis to provide superior intelligence. We treat the global digital ecosystem not as noise, but as the primary center of gravity in modern, non-kinetic warfare.

Here is how our focus on social media sentiment and trends yields better analysis for military and national security decision-makers.


I. Decoding the Cognitive Battlefield

Adversaries, particularly major powers, prioritize achieving victory by disintegrating an adversary’s societal and military will to fight—the Sun Tzu ideal of “winning without fighting”. Social media is the primary vector for this attack, having fused completely with modern psychological operations (PSYOP).

Our analysis focuses on identifying large-scale, digitally-driven strategic trends:

  1. Mapping Systemic Stress and Vulnerability: We analyze social media and public discourse to identify Indicator 6: Loss of Social Cohesion & Legitimacy. Adversarial influence operations are explicitly designed to exacerbate existing social divisions and erode trust in democratic institutions. By tracking these narratives, we observe direct symptoms of internal decay, such as the alarming trend toward political polarization in the United States, where partisans view the opposing party as a “threat to the nation’s well-being”. The ultimate objective of AI-driven information warfare is the erosion of trust itself, leading to a state of “epistemic exhaustion” where coherent, collective decision-making becomes impossible.
  2. Tracking Adversary Doctrine in Real-Time: We monitor digital discourse to track the operationalization of doctrines like China’s “Three Warfares” (Public Opinion, Psychological, and Legal warfare). This doctrine uses AI and social platforms to seize control of the dominant narrative, legitimize China’s actions, and undermine alliances. Our analysis can track when a PLA commander is applying political warfare to achieve a victory before a major kinetic battle is fought, often targeting the political will of the U.S. and its allies.
  3. Predicting Disinformation Payloads: By analyzing platform architecture and psychological vulnerabilities, we identify how adversaries exploit human nature at scale. For instance, content that elicits strong, negative emotions like anger and outrage spreads faster and wider because social media algorithms are designed to maximize engagement. The analysis identifies the use of deepfakes and generative AI to create hyper-realistic, fabricated content designed to exploit sensitivities like corruption or sow distrust. This is a direct assault on the integrity of democratic processes, as seen in unconventional conflict scenarios targeting the Philippines.

Understanding Social Media Sentiment for Decision Advantage

In the 21st century, strategic competition is defined by the speed and quality of decision-making, summarized by Colonel John Boyd’s OODA loop (Observe, Orient, Decide, Act). Social media sentiment analysis significantly improves the crucial Observe and Orient phases:

  • Accelerating the PSYOP Cycle: Military Information Support Operations (MISO) planning, traditionally time-consuming, can be compressed dramatically by AI-powered analysis. Generative AI and LLMs can scrutinize massive, multilingual social media datasets in minutes to extract an adversary’s goals, tactics, and narrative frames. This instantly automates the most difficult phase—Target Audience Analysis—allowing MISO teams to generate hyper-personalized digital campaigns tailored to specific cultural or demographic sub-groups “at the speed of conflict”.
  • Targeting the Civilian Center of Gravity: The PLA employs a concept called “Social A2/AD” (Anti-Access/Area Denial), which uses non-military actions like fostering political divisions and economic dependencies to fracture American society. By analyzing sentiment and narratives, we can detect when these operations are attempting to degrade the capacity of a nation or alliance to respond effectively. For example, in the U.S.-Philippines alliance, the goal of information warfare is often to poison the perception of the alliance for years to come by eroding public trust. Ronin’s Grips tracks these vectors to provide warning.

II. Why Readers Should Value and Trust Ronin’s Grips Reports

Our primary value proposition is analytical rigor and candor in a contested information environment, setting our reports apart from simple data aggregation or biased sources.

1. Commitment to Asymmetric Insight

We reject “mirror-imaging”—the critical error of projecting U.S. strategic culture and assumptions onto adversaries like China. Instead, we use a structured analytical methodology designed to produce second- and third-order insights.

  • Beyond the Surface: We move beyond describing what an adversary is doing (e.g., “China is building a metaverse”) to analyzing the strategic implication (e.g., China’s military metaverse, or “battleverse,” is a core component of its Intelligentized Warfare, representing a priority to win future wars, potentially serving as strategic misdirection for external audiences).
  • Connecting the Dots: We connect tactical phenomena to grand strategic shifts. For instance, mapping the destruction of high-value Russian armor by low-cost Ukrainian FPV drones (a tactical observation) to its third-order implication: a systemic challenge to the Western military-industrial complex’s focus on producing exquisite, high-cost platforms (a strategic outcome).

2. Rigorous, Multi-Source Validation

Our analysis is not based on a single stream of information. We employ a multi-source collection strategy, systematically cross-referencing information from official doctrine, real-world battlefield reports, and expert third-party analysis.

  • Validation through Conflict: We rigorously cross-reference doctrine with operational efficacy. For example, a formal U.S. Army doctrine emphasizing the importance of targeting a drone’s Ground Control Station (GCS) is validated and given urgency by battlefield reports from Ukraine, confirming that drone operators are high-value targets for both sides.
  • Candor and Risk Assessment: Unlike institutions constrained by political narratives, our methodology demands a candid risk assessment. This means actively seeking out contradictions, documented failures, and technical vulnerabilities. For instance, while AI accelerates decision-making, we highlight its “brittleness”—the fact that AI models are only as good as their training data, and the enemy’s job is to create novel situations that cause models to fail in “bizarre” ways. We analyze the threat of adversarial AI attacks, such as data poisoning, which could teach predictive models to confidently orient commanders to a false reality.

3. Actionable Intelligence

Our final output is structured for utility. We synthesize complex data into clear, actionable recommendations. For military commanders operating in the hyper-lethal drone battlespace, this translates into definitive “Imperatives (Dos)” and “Prohibitions (Don’ts)” needed for survival and victory. This focus ensures that our analysis translates directly into cognitive force protection and improved decision-making capacity.


The Bottom Line: Social media is the nervous system of modern conflict, constantly broadcasting signals about political will, societal fracture, and adversarial intent. While traditional intelligence focuses on the movement of tanks and ships, Ronin’s Grips focuses on the movement of ideas and the degradation of trust. In an age where adversaries seek to win by paralyzing our C2, eroding our will, and exploiting our democratic debates, analyzing the sentiment and trends in the cognitive domain is an operational imperative. We provide the resilient, synthesized intelligence required to out-think, out-decide, and out-pace this new era of warfare.

Our reports provide the commander, policymaker, and informed citizen with the decisive edge to understand reality, not just react to noise. If the goal of the adversary is to destroy confidence in all information, our mission is to provide the validated analysis needed to restore that confidence and reinforce societal resilience.

Directorate ‘V’ TsSN FSB: An Operational History and Materiel Analysis of the Vympel Group

Directorate ‘V’ of the Special Purpose Center (TsSN) of the Russian Federal Security Service (FSB), commonly known as Vympel Group, stands as one of the Russian Federation’s most elite and secretive special operations forces. Its history represents a unique and compelling evolution, tracing a path from its origins as a clandestine instrument of Soviet foreign policy, designed for sabotage and direct action deep within enemy territory, to its current role as a key component of the modern Russian security state’s counter-terrorism and special tasks apparatus. The trajectory of Vympel is one of radical adaptation, driven by the seismic geopolitical shifts of the late 20th and early 21st centuries. Initially forged for a potential global conflict with NATO, the unit was forced to redefine its purpose after the Soviet collapse, transforming into a domestic counter-terror force. Today, it appears to be evolving once more, blending its Cold War-era clandestine skills with hard-won counter-terrorism experience to become a hybrid force adept at operating across the spectrum of conflict, from domestic security to the grey-zone battlefields of the contemporary era.

Section 1: Genesis – The KGB’s Clandestine Sword (1981-1991)

1.1. Forging the Pennant: Lineage and Establishment

The Special Operations Task Group Vympel (meaning “pennant”) was officially established on August 19, 1981, following a joint top-secret decision by the Politburo and the Central Committee of the Communist Party of the Soviet Union.1 From its inception, Vympel was an entity of the intelligence services, not the military. It was formed within the KGB’s First Chief Directorate (PGU), the arm responsible for all foreign intelligence and operations.3 Specifically, it was placed under the command of Department “S,” which managed the KGB’s overseas clandestine service, or “illegals” program, underscoring its intended role in deniable, deep-cover operations.2

The creation of Vympel was not a spontaneous decision but the culmination of lessons learned from the crucible of irregular warfare in Afghanistan. The unit was deliberately built upon the combat-experienced cadres of its precursor KGB special task groups: Zenyth, Kaskad, and Omega.1 These ad-hoc units had been active in Afghanistan since the late 1970s, with Kaskad making four operational tours between July 1980 and April 1983.1 Their experience, particularly in operations like “Storm-333″—the successful 1979 assault on the Tajbeg Palace and assassination of Afghan President Hafizullah Amin, in which KGB operators participated—demonstrated the need for a permanent, institutionalized force capable of executing such complex intelligence-led special operations.1 The formation of Vympel was a direct effort to retain the unique proficiency and tactical lessons acquired by these operators.2

The initiative was championed by Major General Yuri Ivanovich Drozdov, a senior figure in the PGU, and its founding commander was Captain 1st Rank Ewald Kozlov, a naval officer with service in the Northern and Caspian Fleets who had transferred to the KGB’s Department “S”.2 This leadership profile further distinguished Vympel from its army counterparts in the GRU (Main Intelligence Directorate).

1.2. Cold War Doctrine and Mandate: The “Special Period”

Vympel’s primary doctrine was tailored for the “special period” (особыйпериод)—the critical, pre-conflict phase when war between the Soviet Union and NATO was deemed unavoidable.2 Its mandate was unequivocally offensive and foreign-focused, designed to act as a strategic tool of state power to cripple an adversary’s ability to wage war before conventional hostilities had even begun.

The unit’s core tasks were a blend of special operations and clandestine intelligence work 1:

  • Deep Penetration and Special Reconnaissance: Infiltrating far behind enemy lines to gather critical intelligence on strategic targets.6
  • Sabotage: The destruction of strategic enemy infrastructure, with a unique and specific focus on nuclear facilities, power plants, command-and-control centers, and transportation hubs.2
  • Direct Action: Conducting assassinations of top enemy political and military leadership to decapitate the adversary’s command structure.2
  • Intelligence Operations: Conducting human intelligence (HUMINT) operations and activating pre-placed espionage cells in wartime.2
  • Ancillary Missions: Included the protection of Soviet embassies and institutions abroad and seizing enemy naval assets like surface vessels and submarines.1

This mission set placed Vympel in a distinct category from the GRU’s Spetsnaz. While GRU units were an instrument of military intelligence focused on tactical and operational disruption of enemy armed forces, Vympel was an asset of the KGB’s foreign intelligence arm, aimed at achieving strategic political and military effects by destabilizing the enemy state itself.9

1.3. The “Universal Soldier”: Selection and Training

To meet the demands of its complex mission, Vympel developed a training program of unparalleled rigor and breadth, designed to create a “universal soldier” (универсальныйсолдат).8 The process to fully train a single operative was exceptionally long and expensive, taking approximately five years and costing hundreds of thousands of dollars annually per candidate.8

The curriculum was exhaustive, intended to produce an operator who was simultaneously an elite commando, an intelligence officer, and a combat engineer. Training included 2:

  • Advanced Combat Skills: Intensive training in hand-to-hand combat, expert marksmanship with a wide array of both Soviet and foreign weapon systems, parachute training (including high-altitude techniques), diving and underwater combat, and alpine mountaineering and rope techniques.2
  • Intelligence Tradecraft: Operatives were schooled in clandestine operations, HUMINT collection, and were required to master two to three foreign languages to facilitate deep-cover operations in foreign countries.2
  • Specialized Technical Skills: A key differentiator was the advanced technical training in mining and blasting, the construction and use of improvised explosive devices (IEDs), and, most notably, the detailed study of the structure and vulnerabilities of nuclear power plants and other critical infrastructure.2

This comprehensive skill set made Vympel operatives uniquely capable of operating autonomously for extended periods deep inside hostile territory, executing missions of the highest strategic importance.

1.4. Arsenal of the Era: Tools for Clandestine Warfare

During the 1980s, Vympel’s arsenal was composed of the best available Soviet special-purpose weaponry, tailored for its clandestine mission set.

  • Primary Rifles: The standard-issue assault rifle was the AKS-74, chambered in 5.45x39mm. Its side-folding stock made it suitable for airborne operations and concealed carry.12 For extreme close-quarters work and vehicle-borne roles, the compact AKS-74U carbine was employed.13
  • Suppressed Weapon Systems: Given the emphasis on stealth, silenced weapons were critical. This included the PB suppressed pistol, based on the Makarov PM, and the PSS “Vul” silent pistol, which used a special captive-piston cartridge for nearly silent operation.13 The development of the AS Val integrally suppressed assault rifle and the VSS Vintorez suppressed sniper rifle in the late 1980s was a direct technological response to the operational needs of units like Vympel. Both platforms fired the heavy, subsonic 9x39mm armor-piercing cartridge, providing quiet lethality against protected targets.16
  • Support and Precision Weapons: The SVD Dragunov semi-automatic rifle provided designated marksman capability out to intermediate ranges.13 For squad-level fire support, the PKM general-purpose machine gun was utilized.13 Rifles were often fitted with under-barrel grenade launchers such as the BG-15.18

1.5. Global Operations: The Soviet Union’s Covert Hand

While the full operational record of Vympel during the Cold War remains highly classified, it is known that its operatives were deployed to key proxy battlegrounds around the globe. They continued the work of their predecessors in Afghanistan, conducting intelligence-reconnaissance-sabotage missions throughout the 1980s.6 Beyond Afghanistan, Vympel operators were active in advisory and potentially direct action roles in Angola, Mozambique, Nicaragua, Vietnam, and other Cold War hotspots, supporting Soviet-backed governments and revolutionary movements.8 In these theaters, their role was likely to train local special forces and execute sensitive operations that were beyond the capabilities of their allies.

Section 2: The Tumultuous Decade – Survival and Rebirth (1991-1999)

2.1. A Unit Adrift: Post-Soviet Chaos

The dissolution of the Soviet Union in December 1991 was a cataclysmic event for Vympel. Its primary mission—waging clandestine war against NATO in the “special period”—became obsolete overnight. The unit was plunged into a period of profound uncertainty, subjected to “endless re-organisation and re-definition” as the monolithic KGB was fractured into competing successor agencies.2 Vympel was passed between these new entities, first subordinated to the short-lived Security Ministry and then transferred to the GUO (Main Protection Directorate), reflecting the chaotic and often politically motivated restructuring of the Russian security services under President Boris Yeltsin.1

2.2. The 1993 Constitutional Crisis and the “Vega” Period

The unit’s existential crisis came to a head in October 1993 during the Russian constitutional crisis. A violent political standoff erupted between President Yeltsin and the Russian parliament, which had barricaded itself inside the Supreme Council building, colloquially known as the “White House.” Vympel, along with its sister unit Alpha, received direct orders to storm the building.2

In a defining moment of principle, the commanders of both units refused to carry out the assault. This refusal was not an act of simple insubordination but a manifestation of the unit’s core ethos. Trained as elite intelligence operators for clandestine warfare against foreign adversaries, the men of Vympel did not see themselves as internal troops to be used against their own countrymen in a political dispute. The order represented a fundamental violation of their professional identity, and they feared the massive civilian casualties that a full-scale assault would inevitably cause.

This act of defiance had severe repercussions. As a punitive measure, Yeltsin summarily transferred Vympel from the GUO to the command of the Ministry of Internal Affairs (MVD).1 For the elite operatives, subordination to the

militsiya (police) was a profound humiliation.2 The result was a mass exodus that nearly destroyed the unit. Of the 278 officers in Vympel at the time, only 57 consented to serve under the MVD.1 The decimated unit was stripped of its prestigious name and rebranded as “Vega”.1

2.3. Return to the Fold: Integration into the FSB TsSN

The near-destruction of Vympel was recognized as the loss of a critical national security asset. In August 1995, a presidential decree officially reinstated the unit.1 Later that year, it was removed from the MVD and integrated into the Federal Security Service (FSB), the primary domestic successor to the KGB. The FSB established a new overarching command, the Center of Special Purpose (TsSN), to house its elite special operations capabilities. Vympel was placed within the TsSN as Directorate ‘V’, alongside its sister unit, Directorate ‘A’ (Alpha).2

This move was a lifeline for the unit. The FSB provided a stable command structure, a clear (if altered) mission set, and the prestige of serving within the state’s principal security organ. For the FSB, the integration of Vympel and Alpha consolidated Russia’s premier special operations forces under a single roof, preventing their further degradation and ensuring their capabilities were available to the new security service. This symbiotic relationship secured Vympel’s survival and set the stage for its transformation into a 21st-century special operations force.

Section 3: A New Paradigm – Counter-Terrorism and Special Tasks (2000-Present)

3.1. Mission Reforged: From Sabotage to Counter-Terrorism

Under the command of the FSB TsSN, Vympel’s official mandate underwent a radical transformation. The primary mission shifted from foreign sabotage to domestic special operations, driven by the pressing security challenges facing the new Russian Federation, particularly the rise of terrorism and separatism emanating from the North Caucasus.1

The unit’s new core missions became 1:

  • Counter-Terrorism (CT) and Hostage Rescue: Becoming a primary national-level response force for high-stakes terrorist incidents.
  • Protection of Strategic Sites: Safeguarding critical national infrastructure, with a particular emphasis on nuclear power plants and related facilities. This mission was a logical evolution of their original Cold War training in nuclear sabotage, repurposing offensive knowledge for defensive ends.
  • Suppression of Terrorist Acts: Conducting proactive operations to disrupt and neutralize terrorist plots targeting Russian citizens, both domestically and abroad.

This fundamental shift in purpose is reflected in the unit’s modern motto, ‘Служить и защищать’ (Sluzhit’ i zashchishchat’), meaning “Serve and Protect”—a clear departure from its aggressive, foreign-oriented origins.1 Accordingly, the unit’s training regimen was adapted, placing a much greater emphasis on Close-Quarters Battle (CQB), advanced hostage rescue tactics, and specialized skills in dealing with the threat of improvised explosive devices (IEDs).1

3.2. Trial by Fire: The Nord-Ost and Beslan Sieges

Two horrific mass-hostage crises in the early 2000s became the defining operations of Vympel’s new counter-terrorism role. While demonstrating the unit’s capabilities, they also exposed a brutal learning curve and tactical approaches that resulted in catastrophic loss of life among the hostages.

Nord-Ost Theater Siege (October 2002): Vympel, alongside Alpha and MVD SOBR, formed the assault force tasked with resolving the seizure of the Dubrovka Theater in Moscow, where 40 Chechen terrorists held over 850 hostages.7 The tactical challenge was immense: a complex building filled with civilians and rigged with numerous IEDs by attackers who included female suicide bombers.23 The chosen tactical solution was to pump an incapacitating chemical agent—a powerful fentanyl derivative such as carfentanil mixed with remifentanil—into the theater’s ventilation system to neutralize the terrorists before the assault began.23 While the subsequent storming of the building was tactically successful, resulting in the death of all 40 terrorists, the operation was a medical disaster. A catastrophic failure to coordinate with medical services, provide the necessary antidote (naloxone), or properly manage the evacuation of hundreds of unconscious hostages led to the deaths of at least 130 civilians, who succumbed to respiratory depression caused by the opioid agent.23

Beslan School Siege (September 2004): Vympel and Alpha were again the primary response units at the seizure of School Number One in Beslan, North Ossetia. A group of over 30 terrorists held more than 1,100 hostages, including 777 children, inside the school’s gymnasium, which they had heavily mined with IEDs.29 The three-day siege ended in chaos when a series of explosions in the gym—the cause of which remains disputed—triggered a spontaneous and poorly coordinated assault by security forces.30 The operation was marked by a near-total breakdown of incident command, with armed local civilians joining the firefight.31 In the ensuing battle, security forces employed a level of firepower unprecedented in a hostage rescue scenario, including tank cannons, RPO-A Shmel thermobaric rocket launchers, and heavy machine guns, against the school building.30 The outcome was horrific, with 334 hostages killed, 186 of them children.29 The event exposed profound failures in intelligence, negotiation strategy, and tactical discipline.31

These two events, while tragic, were formative. The willingness to employ indiscriminate, area-effect weapons like chemical agents and thermobaric rockets suggests a tactical mindset that prioritized the elimination of the terrorist threat above all else, a possible holdover from the unit’s more kinetic military and sabotage origins. These operations served as a brutal lesson in the unique requirements of domestic mass-hostage rescue, where the preservation of hostage life is the paramount objective.

3.3. Modern Operations: A Return to Hybridity

Throughout the 2000s, Vympel was heavily engaged in the Second Chechen War and the long-running counter-insurgency that followed across the North Caucasus. The unit specialized in high-risk direct action missions, such as the successful capture of Chechen militant leader Salman Raduyev in March 2000.2

More recently, Vympel’s operational scope has expanded significantly, indicating a return to a more hybrid role. The unit has been documented participating in the 2022 full-scale invasion of Ukraine, engaged in high-intensity urban combat in locations such as Mariupol.34 This marks a significant deployment in a conventional military conflict. Furthermore, investigative reporting has linked operatives from the FSB’s “Department V” to clandestine foreign operations, including the 2019 assassination of a Georgian national in Berlin.11 This suggests that Vympel has not simply replaced its original mission but has added the domestic CT role to its broader repertoire. The Russian state appears to be leveraging the unit’s original PGU lineage and clandestine skillset for deniable foreign special activities, creating a dual-purpose force for both internal security and external power projection.

Section 4: The Modern Vympel Arsenal – A Fusion of Domestic and Foreign Systems

The contemporary small arms inventory of Directorate ‘V’ reflects a pragmatic, performance-driven procurement strategy. While heavily reliant on advanced Russian-made systems, the unit does not hesitate to adopt foreign materiel when it offers a distinct capability advantage. This results in a hybridized arsenal tailored for a wide spectrum of special operations.

4.1. Primary Weapon Systems (Assault Rifles & Carbines)

  • AK-105: This 5.45x39mm carbine is a favored primary weapon. As a shortened variant of the full-size AK-74M, its 314 mm barrel provides a superior balance of compactness for CQB and vehicle operations while retaining better ballistic performance than the older, shorter AKS-74U.1 It is frequently seen heavily customized with modern accessories.
  • AK-74M: The modernized, full-length 5.45x39mm assault rifle remains a standard-issue weapon. Its reliability is legendary, and Vympel operators typically outfit them with advanced optics, lasers, and furniture to meet modern operational standards.36
  • AK-12 / AK-15: As part of the Russian military’s “Ratnik” future soldier program, the newest generation of Kalashnikov rifles are being adopted. The AK-12 (5.45x39mm) and its 7.62x39mm counterpart, the AK-15, feature significantly improved ergonomics, adjustable stocks, and integrated Picatinny rails, finally bringing the Kalashnikov platform into the 21st century in its factory configuration.1

4.2. Specialized Small Arms (Suppressed & CQB)

  • AS Val & VSS Vintorez: These iconic, integrally suppressed weapon systems remain indispensable for stealth operations. Chambered for the heavy, subsonic 9x39mm cartridge, they offer quiet operation combined with excellent performance against body armor at typical engagement ranges. The AS Val serves as the compact assault rifle, while the VSS Vintorez is employed as a suppressed designated marksman rifle.1
  • PP-19-01 Vityaz-SN: This 9x19mm Parabellum submachine gun is the unit’s standard SMG. Based on the Kalashnikov operating system, it offers familiar handling, reliability, and a high degree of parts commonality with the unit’s primary rifles. It is effective, compact, and easily suppressed for CQB environments.1
  • ShAK-12: A more recent and highly specialized addition, the ShAK-12 is a bullpup assault rifle chambered in the massive 12.7x55mm subsonic cartridge. It is designed for maximum stopping power in CQB, capable of neutralizing targets behind cover or wearing heavy body armor with a single shot.36

4.3. Sidearms

  • Glock 17: The adoption of the Austrian Glock 17 is one of the most significant indicators of the unit’s pragmatic approach to equipment. It is highly valued for its exceptional reliability, ergonomic design, and the wide availability of aftermarket accessories. Russian special forces are known to use both Austrian-manufactured models and unlicensed copies produced domestically by the Orsis arms company.36
  • MP-443 Grach: The standard-issue Russian military pistol in 9x19mm, the Grach serves as a common sidearm, replacing the venerable Makarov PM.15
  • SR-1M Vektor: A powerful domestic pistol chambered in the potent 9x21mm Gyurza cartridge. It is favored by Russian special forces for its ability to fire specialized armor-piercing ammunition, offering greater penetration than standard 9x19mm rounds.1

4.4. Sniper and Designated Marksman Systems

  • SV-98: A Russian-made, bolt-action sniper rifle that provides a significant leap in precision over the older SVD. Typically chambered in 7.62x54mmR, it is based on a successful sporting rifle design and serves as the unit’s standard precision bolt-action platform.15
  • Orsis T-5000: Representing the pinnacle of modern Russian sniper rifle technology, the T-5000 has been adopted by the FSB under the designation “Tochnost” (Precision). Chambered in high-performance, long-range calibers like.338 Lapua Magnum, its accuracy and performance are competitive with top-tier Western sniper systems.46
  • Heckler & Koch MR308 (HK417): The use of this German-made 7.62x51mm NATO semi-automatic rifle as a designated marksman rifle is a clear example of procuring the best tool for the job. The MR308/HK417 platform is renowned for its accuracy, reliability, and superior ergonomics compared to domestic counterparts.36

4.5. Foreign Materiel Adoption

The composition of Vympel’s arsenal reveals two critical realities about the unit and the Russian defense industry. First, there is a clear and persistent gap in Russia’s ability to produce high-performance optics, aiming devices, and ergonomic accessories. The near-universal presence of Western-made sights (such as EOTech and Aimpoint), laser modules (like the AN/PEQ-15), and advanced furniture on Russian-made rifles is a tacit admission that domestic products do not meet the standards required by a Tier 1 special operations unit.1 This reliance on foreign electronics and accessories creates a potential supply chain vulnerability that can be exploited by international sanctions.

Second, the unit’s procurement philosophy is driven by pragmatism over dogma. The willingness to field Austrian pistols, German rifles, and potentially American carbines (as used by its sister unit, Alpha) demonstrates that operational effectiveness is the primary consideration.36 If a foreign weapon offers a tangible advantage—be it the Glock’s legendary reliability, the H&K’s precision, or the ergonomics of a Western accessory—the unit has the autonomy and budget to acquire and field it. This creates a hybridized and highly capable arsenal specifically tailored to the demands of its missions.

4.6. Ancillary Equipment

Beyond small arms, Vympel employs a range of specialized equipment. This includes heavy ballistic shields like the Vant-VM, often equipped with powerful strobing lights to disorient targets during entry.1 For breaching and delivering specialized munitions, the unit uses weapons like the GM-94 pump-action grenade launcher.1 Operations in low-light conditions are enabled by modern night vision systems, such as the Dedal-NV Gen 3+ binocular goggles.1

Table: Contemporary Directorate ‘V’ Small Arms

Weapon SystemTypeCaliberCountry of OriginKey Characteristics / Role
AK-105Carbine5.45×39mmRussiaStandard-issue carbine; balance of compactness and ballistics.
AK-74MAssault Rifle5.45×39mmRussiaModernized full-size rifle, often heavily customized.
AK-12 / AK-15Assault Rifle5.45×39mm / 7.62×39mmRussiaNew generation rifle; improved ergonomics, integrated rails.
AS ValSuppressed Assault Rifle9×39mmRussiaIntegrally suppressed for clandestine CQB and stealth operations.
PP-19-01 VityazSubmachine Gun9×19mm ParabellumRussiaStandard SMG; AK-based ergonomics, reliable, easily suppressed.
ShAK-12Bullpup Assault Rifle12.7×55mmRussiaHeavy caliber CQB weapon for defeating hard cover and body armor.
Glock 17Pistol9×19mm ParabellumAustriaPrimary sidearm; valued for exceptional reliability and ergonomics.
SR-1M VektorPistol9×21mm GyurzaRussiaHigh-power pistol capable of firing armor-piercing ammunition.
VSS VintorezSuppressed DMR9×39mmRussiaIntegrally suppressed for clandestine precision fire.
SV-98Sniper Rifle7.62×54mmRRussiaStandard bolt-action precision rifle.
Orsis T-5000Sniper Rifle.338 Lapua Magnum, etc.RussiaHigh-precision, long-range anti-personnel/anti-materiel system.
H&K MR308Designated Marksman Rifle7.62×51mm NATOGermanySemi-automatic precision rifle; valued for accuracy and reliability.

Section 5: The Future of Directorate ‘V’

5.1. Lessons from the “Transparent Battlefield” of Ukraine

The high-intensity conflict in Ukraine has created a new paradigm of warfare, often described as the “transparent battlefield.” The ubiquitous presence of unmanned aerial systems (UAS), from small FPV quadcopters to larger reconnaissance drones, has made traditional special operations tactics exceptionally hazardous.51 The historical advantage of units like Vympel—the ability to infiltrate and operate unseen—is now fundamentally challenged. Future clandestine movement, whether for domestic counter-terrorism or foreign sabotage, will be nearly impossible without sophisticated countermeasures. This reality forces a significant tactical evolution, shifting the emphasis from purely physical stealth to achieving electronic stealth. Vympel’s future success will be contingent on its ability to master the electromagnetic spectrum—blinding enemy sensors with electronic warfare (EW) while effectively employing its own UAS for intelligence, targeting, and direct action.52

5.2. Evolving Threats and a Hybrid Future

Directorate ‘V’ is unlikely to relinquish its domestic counter-terrorism and strategic site protection roles, as these remain foundational responsibilities of the FSB. However, the current geopolitical climate, characterized by renewed great-power competition, suggests that the unit’s utility in foreign “grey-zone” conflicts will expand.51 The heavy attrition suffered by Russia’s more conventional elite forces, such as the VDV (Airborne Forces) and Naval Infantry, during the war in Ukraine may increase the Kremlin’s reliance on highly skilled, surgical units like Vympel for critical future missions.54

Vympel is uniquely positioned to be a premier tool of Russian hybrid warfare. It possesses a unique combination of skills accrued over its four-decade history: the clandestine tradecraft of its KGB origins, the brutal experience of urban counter-terrorism from the North Caucasus, and now, direct combat experience in a high-intensity conventional war.2 This layered expertise allows the unit to scale its operations across the entire spectrum of conflict, from a single covert operative conducting an assassination to a fully equipped assault team supporting conventional army operations.

5.3. Technological and Organizational Imperatives

To maintain its elite status, Vympel must continue to integrate emerging technologies. Beyond UAS and EW, this will likely include the use of artificial intelligence for processing intelligence and aiding in target acquisition.51 Organizationally, the unit may need to develop dedicated sub-units focused on non-kinetic effects, such as cyber warfare and information operations, to support its physical missions.

A significant long-term challenge will be the unit’s reliance on foreign-made components, particularly high-end optics and electronics. International sanctions will make the procurement and maintenance of this equipment increasingly difficult. Vympel’s future effectiveness may therefore hinge on two factors: the ability of the Russian defense industry to finally produce domestic equivalents of sufficient quality, or the state’s ability to establish clandestine supply chains to circumvent sanctions.56

Conclusion

The four-decade history of Directorate ‘V’ is a study in transformation and resilience. Born as the KGB’s clandestine sword for a hypothetical World War III, Vympel survived the collapse of its state and the obsolescence of its mission, only to be nearly destroyed by political turmoil. It was reborn within the FSB as a shield against a new and vicious wave of domestic terrorism, a role it learned through the brutal lessons of Moscow and Beslan. Today, the unit has evolved again, emerging as a mature, dual-natured special operations force. It retains the DNA of its covert PGU origins while being fully versed in the realities of modern counter-terrorism and high-intensity warfare. Vympel now stands as a uniquely versatile instrument of Russian state power, capable of operating across the full spectrum of conflict. Its future will be defined by its capacity to adapt to the technological realities of the transparent battlefield and to serve the Kremlin’s objectives in an increasingly unstable world.


If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly contribute towards our continued reporting, please visit our funding page.


Sources Used

  1. FSB Vympel: Russia’s Secretive Unit – Grey Dynamics, accessed September 6, 2025, https://greydynamics.com/fsb-vympel-russias-secretive-unit/
  2. Vympel – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Vympel
  3. First Chief Directorate – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/First_Chief_Directorate
  4. KGB FOREIGN INTELLIGENCE ROLE – Russia / Soviet Intelligence Agencies, accessed September 6, 2025, https://irp.fas.org/world/russia/kgb/su0521.htm
  5. en.wikipedia.org, accessed September 6, 2025, https://en.wikipedia.org/wiki/Vympel#:~:text=The%20unit%20was%20formed%20in,activation%20in%20case%20of%20war.
  6. Team from Group SpetsNaz “Vympel” of KGB in Afghanistan, during the 80s. “Vympel” was part of Foreign Intelligence Directorate (1st Main Directorate) of the KGB and its main missions were Intelligence-Reconnaissance-Sabotage operations [1280X841] – Reddit, accessed September 6, 2025, https://www.reddit.com/r/MilitaryPorn/comments/hiouno/team_from_group_spetsnaz_vympel_of_kgb_in/
  7. Russian Special Forces | What Are Spetsnaz? – SOFREP, accessed September 6, 2025, https://sofrep.com/news/russian-special-forces-what-are-spetsnaz/
  8. “Vimpel” super soldiers of KGB. Documentary Film. English Subtitles – YouTube, accessed September 6, 2025, https://www.youtube.com/watch?v=fhSgKZY-YHw
  9. Spetsnaz GRU – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Spetsnaz_GRU
  10. SPETsNAZ: A Soviet Sabotage Threat. – DTIC, accessed September 6, 2025, https://apps.dtic.mil/sti/tr/pdf/ADA168375.pdf
  11. “V” For “Vympel”: FSB’s Secretive Department “V” Behind Assassination Of Georgian Asylum Seeker In Germany – bellingcat, accessed September 6, 2025, https://www.bellingcat.com/news/uk-and-europe/2020/02/17/v-like-vympel-fsbs-secretive-department-v-behind-assassination-of-zelimkhan-khangoshvili/
  12. What was the standard weapon of a Russian soldier in Afghanistan? – Quora, accessed September 6, 2025, https://www.quora.com/What-was-the-standard-weapon-of-a-Russian-soldier-in-Afghanistan
  13. List of equipment of the Soviet Ground Forces – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/List_of_equipment_of_the_Soviet_Ground_Forces
  14. List of military equipment used by the mujahideen during the Soviet–Afghan War – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/List_of_military_equipment_used_by_the_mujahideen_during_the_Soviet%E2%80%93Afghan_War
  15. List of equipment of the Russian Ground Forces – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/List_of_equipment_of_the_Russian_Ground_Forces
  16. What was the intended deign use of the VSS Vintorez & AS-Val & why has no one else done something similar? : r/WarCollege – Reddit, accessed September 6, 2025, https://www.reddit.com/r/WarCollege/comments/qxwnbr/what_was_the_intended_deign_use_of_the_vss/
  17. AS Val and VSS Vintorez – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/AS_Val_and_VSS_Vintorez
  18. The War in Afghanistan (1979-1989) History, Tactics, Weapons, accessed September 6, 2025, http://www.anistor.gr/english/enback/e001.htm
  19. Russian Spetsnaz Special Forces [RHS] – Steam Community, accessed September 6, 2025, https://steamcommunity.com/sharedfiles/filedetails/?l=finnish&id=895826156
  20. Russian Vympel and Alpha group spetsnaz operators overlooking the white house building during the Russian constitutional crisis, October 4, 1993. [2048 × 1355] : r/MilitaryPorn – Reddit, accessed September 6, 2025, https://www.reddit.com/r/MilitaryPorn/comments/1m3urhr/russian_vympel_and_alpha_group_spetsnaz_operators/
  21. Spetsnaz – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Spetsnaz
  22. greydynamics.com, accessed September 6, 2025, https://greydynamics.com/fsb-vympel-russias-secretive-unit/#:~:text=Originally%2C%20the%20unit%20prioritised%20covert,terrorism%20and%20enforcing%20nuclear%20safety.
  23. Moscow theater hostage crisis – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Moscow_theater_hostage_crisis
  24. The Moscow Theater Hostage Crisis: The Perpetrators, their Tactics, and the Russian Response – ResearchGate, accessed September 6, 2025, https://www.researchgate.net/publication/233509130_The_Moscow_Theater_Hostage_Crisis_The_Perpetrators_their_Tactics_and_the_Russian_Response
  25. Moscow Theater Hostage Crisis – Encyclopedia.pub, accessed September 6, 2025, https://encyclopedia.pub/entry/33143
  26. Hostage crisis in Moscow theater | October 23, 2002 – History.com, accessed September 6, 2025, https://www.history.com/this-day-in-history/october-23/hostage-crisis-in-moscow-theater
  27. Nord-Ost: Russia’s Medical Failure in the 2002 Crisis – ResearchGate, accessed September 6, 2025, https://www.researchgate.net/publication/376033725_Nord-Ost_Russia’s_Medical_Failure_in_the_2002_Crisis
  28. THE LONG SHADOW OF ―NORD OST‖ By David Satter, accessed September 6, 2025, https://www.files.ethz.ch/isn/162079/Satter_-_Shadow_of_Nord_Ost.pdf
  29. Beslan school siege – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Beslan_school_siege
  30. Beslan school attack | Siege, Massacre, & Aftermath – Britannica, accessed September 6, 2025, https://www.britannica.com/event/Beslan-school-attack
  31. Beslan: Counter-terrorism Incident Command: Lessons Learned …, accessed September 6, 2025, https://www.hsaj.org/articles/162
  32. 20 years after Beslan ‘special operation,’ a legacy of violence, lies and dead children persists – VOA, accessed September 6, 2025, https://www.voanews.com/a/years-after-beslan-special-operation-a-legacy-of-violence-lies-and-dead-children-persists/7773668.html
  33. TsSN FSB Management “V” (aka Vympel) SpetsNaz infront of a Grozny’s town sign. circa 2000. During Second Chechen Campaign. 19 August is Creation Date of Vympel within Foreign Intel Department of KGB 39 years ago. [1029X663] : r/MilitaryPorn – Reddit, accessed September 6, 2025, https://www.reddit.com/r/MilitaryPorn/comments/iczm4o/tssn_fsb_management_v_aka_vympel_spetsnaz_infront/
  34. FSB TssN Vympel Combat Footage in Mariupol around 2022 : r/SpecOpsArchive – Reddit, accessed September 6, 2025, https://www.reddit.com/r/SpecOpsArchive/comments/1f39ip9/fsb_tssn_vympel_combat_footage_in_mariupol_around/
  35. What is the purpose of Russia’s FSB Vympel? – Quora, accessed September 6, 2025, https://www.quora.com/What-is-the-purpose-of-Russias-FSB-Vympel
  36. Weapons of the Russian Special Forces | Navy SEALs, accessed September 6, 2025, https://navyseals.com/5283/weapons-of-the-russian-special-forces/
  37. AK105 capabilities || Kalashnikov Media, accessed September 6, 2025, https://en.kalashnikovgroup.ru/media/ttkh-2019/ttkh-ak-105
  38. AK-105 – Kalashnikov Group, accessed September 6, 2025, https://en.kalashnikovgroup.ru/catalog/boevoe-strelkovoe-oruzhie/avtomaty/avtomat-kalashnikova-ak105
  39. AK-74M – Kalashnikov Group, accessed September 6, 2025, https://en.kalashnikovgroup.ru/catalog/boevoe-strelkovoe-oruzhie/avtomaty/avtomat-kalashnikova-ak74m
  40. Kalashnikov AK-74M – Weaponsystems.net, accessed September 6, 2025, https://weaponsystems.net/system/1036-Kalashnikov+AK-74M
  41. PP-19-01 Vityaz – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/PP-19-01_Vityaz
  42. Russian FSB Operatives Love these Western Weapons – The National Interest, accessed September 6, 2025, https://nationalinterest.org/blog/buzz/russian-fsb-operatives-love-these-western-weapons-199147
  43. SV-98 Russian 7.62mm Sniper Rifle – ODIN, accessed September 6, 2025, https://odin.tradoc.army.mil/WEG/Asset/4a1628052f94de01def7d289a1c661c7
  44. SV-98 – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/SV-98
  45. Russian SV-98 – Sniper Central, accessed September 6, 2025, https://snipercentral.com/sv98.htm
  46. The KSSO: Russia’s Special Operations Command – Grey Dynamics, accessed September 6, 2025, https://greydynamics.com/the-ksso-russias-special-operations-command/
  47. ORSIS T-5000 – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Orsis_T-5000
  48. ORSIS T-5000 – Weaponsystems.net, accessed September 6, 2025, https://weaponsystems.net/system/700-AA05%20-%20T-5000
  49. ORSIS T-5000: New Name in Precision Rifles – Small Arms Defense Journal, accessed September 6, 2025, https://sadefensejournal.com/orsis-t-5000-new-name-in-precision-rifles/
  50. Operators from Directorate Alfa of the FSB Special Purpose Center, also known as Spetsgruppa Alfa, armed with AS Val assault rifles and MP-443 Grach sidearms during a hostage rescue exercise in 2009 [1513×1016] – Reddit, accessed September 6, 2025, https://www.reddit.com/r/MilitaryPorn/comments/1j7njb/operators_from_directorate_alfa_of_the_fsb/
  51. Russian Concepts of Future Warfare Based on Lessons from the Ukraine War | CNA, accessed September 6, 2025, https://www.cna.org/analyses/2025/08/russian-concepts-of-future-warfare-based-on-lessons-from-the-ukraine-war
  52. Russian Drone Innovations are Likely Achieving Effects of Battlefield Air Interdiction in Ukraine | Institute for the Study of War, accessed September 6, 2025, https://understandingwar.org/backgrounder/russian-drone-innovations-are-likely-achieving-effects-battlefield-air-interdiction
  53. Lessons from the Ukraine Conflict: Modern Warfare in the Age of Autonomy, Information, and Resilience – CSIS, accessed September 6, 2025, https://www.csis.org/analysis/lessons-ukraine-conflict-modern-warfare-age-autonomy-information-and-resilience
  54. Russian Offensive Campaign Assessment, September 1, 2025 | ISW, accessed September 6, 2025, https://www.understandingwar.org/backgrounder/russian-offensive-campaign-assessment-september-1-2025
  55. The West must study the success of Ukraine’s Special Operations Forces – Atlantic Council, accessed September 6, 2025, https://www.atlanticcouncil.org/blogs/ukrainealert/the-west-must-study-the-success-of-ukraines-special-operations-forces/
  56. Russia’s struggle to modernize its military industry | Identifying the weaknesses in Russia’s military-industrial complex – Chatham House, accessed September 6, 2025, https://www.chathamhouse.org/2025/07/russias-struggle-modernize-its-military-industry/identifying-weaknesses-russias-military