Category Archives: Military Analytics

An Analysis of the Evolution Iran’s 65th NOHED Brigade and IRGC-Quds Force

To comprehend the distinct roles and evolutionary trajectories of Iran’s elite special operations forces, one must first understand the unique and deliberately bifurcated structure of its national military apparatus. The armed forces of the Islamic Republic of Iran are not a monolithic entity but are composed of two powerful, parallel, and often competing institutions: the Islamic Republic of Iran Army (the Artesh) and the Islamic Revolutionary Guard Corps (Sepah-e Pasdaran-e Enghelab-e Eslami, or IRGC). Both are subordinate to a single commander-in-chief, the Supreme Leader, a structure that bypasses the elected presidency and concentrates ultimate military authority within the clerical establishment.1 This dual-military system is the foundational context in which the Artesh’s 65th NOHED Airborne Special Forces Brigade and the IRGC’s Quds Force were born and have evolved.

The Artesh is Iran’s conventional military, the inheritor of the legacy of the pre-revolutionary Imperial Iranian Armed Forces. Its constitutional mandate is the defense of Iran’s territorial integrity and national borders against external aggression.3 The Artesh comprises traditional ground, naval, air, and air defense forces and operates the majority of Iran’s heavy conventional platforms, including tanks, major surface combatants, and fighter aircraft.1 However, decades of international sanctions have severely degraded its ability to maintain and modernize this arsenal.1 Following the 1979 Islamic Revolution, the new clerical leadership under Ayatollah Ruhollah Khomeini viewed the Artesh, with its Western training and historical loyalty to the Shah, with deep suspicion.2

This distrust was the primary catalyst for the creation of the IRGC in April 1979. Established by Khomeini’s decree, the IRGC was conceived as a deeply ideological “people’s army” and a praetorian guard whose primary function was not to defend the borders, but to protect the Revolution itself from both internal and external threats.1 Its constitutional role is explicitly the preservation of the revolutionary system.4 Over the subsequent decades, the IRGC has evolved from a paramilitary militia into Iran’s dominant military, political, and economic institution, wielding immense influence across all sectors of the state.3 It is geared toward asymmetric warfare and is the primary custodian of Iran’s most critical strategic assets, including its ballistic missile and unmanned aerial vehicle (UAV) arsenals, and is responsible for managing Iran’s network of regional proxies through its expeditionary arm, the Quds Force.1

This structure is not an accident of history but a calculated strategy of institutionalized redundancy designed to ensure regime survival. By creating two powerful and parallel military organizations, each with its own command structure reporting directly to the Supreme Leader, the regime engineered a system of internal checks and balances. This arrangement effectively prevents any single military faction from accumulating sufficient power to challenge the clerical government, a lesson drawn from the 1953 coup that overthrew Prime Minister Mohammed Mossadeq and restored the Shah to power.2 This internal dynamic, characterized by competition for resources, influence, and the Supreme Leader’s favor, is a defining feature of Iran’s defense posture. The existence and divergent development of the Artesh’s 65th NOHED Brigade and the IRGC’s Quds Force are the direct manifestation of this dual-pillar strategy at the apex of Iran’s special operations capabilities.

II. The 65th NOHED Airborne Special Forces Brigade: The Artesh’s Elite Tip

The 65th NOHED Brigade represents the pinnacle of the Artesh’s special operations capabilities, a unit forged in the Western mold but tempered by decades of regional conflict and loyalty to the Islamic Republic. Its evolution from an Imperially-sponsored, US-trained commando force to a modern expeditionary unit is a testament to its institutional resilience and tactical adaptability.

Inception and Imperial Legacy: U.S. Special Forces Influence and Early Operations

The origins of the 65th NOHED Brigade are deeply rooted in the Western military tradition, a legacy that distinguishes it from its IRGC counterparts. The genesis of Iranian airborne forces began in 1953, when a contingent of ten Imperial Iranian Army officers was sent to France for parachute training.8 This led to the establishment of a formal Parachute Unit in 1955, which expanded into a Parachute Battalion by 1959.9

The pivotal year was 1959, with the establishment of the 23rd Special Forces Brigade, the direct parent unit of what would become the 65th.9 During the 1960s, this nascent force was shaped profoundly by American mentorship. Under the Shah’s pro-Western alignment, the United States dispatched advisors from the John F. Kennedy Special Warfare Center & School to train and structure Iran’s special forces.8 This American influence was not superficial; it was embedded in the unit’s DNA. The brigade adopted the iconic green beret of its American trainers, and its qualification badge was designed to be nearly identical to the US Army Special Forces’ “De oppresso liber” insignia, a clear visual marker of its doctrinal heritage.8

This Western-style training was soon put to the test. In the early 1970s, the brigade, then known as the 23rd Airborne Special Forces Brigade, received its baptism by fire in the Dhofar Rebellion in Oman.9 Deployed to assist the Sultan of Oman in combatting Marxist-Leninist guerrillas, the Iranian forces engaged in a classic counter-insurgency campaign, the very type of unconventional warfare for which their American advisors had prepared them.11 This early operational experience cemented the unit’s reputation as a capable and professional fighting force.

Post-Revolutionary Crucible: The Iran-Iraq War and the Forging of a Modern Identity

The 1979 Islamic Revolution placed the Western-trained 23rd Brigade in a precarious position. The new regime was inherently suspicious of any institution associated with the Shah and his American patrons. This distrust culminated in a call by then-parliament-member Hassan Rouhani to disband the unit following the 1980 Nojeh coup plot, in which some military elements were implicated.9 However, the unit was saved by the staunch opposition of Defense Minister Mostafa Chamran, who recognized its strategic value.9

The crucible that would reforge the unit’s identity and prove its loyalty to the new republic was the Iran-Iraq War (1980-1988). As part of the 23rd Commando Division, the brigade was deployed extensively across all fronts of the brutal, eight-year conflict.8 The war demanded a broad spectrum of skills. The unit participated in large-scale conventional battles, such as the Breaking of the Siege of Abadan and Operation Beit ol-Moqaddas, where it functioned as elite light infantry.9 Simultaneously, it was tasked with missions that leveraged its specialized training. It engaged in grueling mountain warfare, successfully holding strategic positions like the Dopaza and Laklak mountains against repeated Iraqi assaults, which included the use of chemical weapons.9 Furthermore, a select cadre of its personnel was detached to conduct clandestine special operations under the direct command of Defense Minister Chamran’s Irregular Warfare Headquarters, showcasing its dual-capability in both conventional and unconventional domains.9

Evolving Missions in the Modern Era: From Counter-Insurgency to Hybrid Warfare

The post-war reorganization of the Iranian military led to the formal establishment of the Artesh’s premier special forces unit. In 1991, the 3rd Brigade was separated from the 23rd Division to form the 65th Airborne Special Forces Brigade, commonly known by its Persian acronym NOHED (Nīrūhāye Vīzheye Havābord, or Airborne Special Forces).9

Throughout the 1990s and 2000s, the 65th NOHED Brigade became the Artesh’s go-to force for complex domestic security challenges. It was consistently deployed for counter-insurgency and counter-terrorism missions, primarily in the restive border provinces. It engaged drug trafficking syndicates and insurgent groups in Sistan and Baluchestan province and conducted operations against Kurdish separatist groups like the Party for a Free Life in Kurdistan (PJAK) in the country’s northwest.9

A fundamental strategic shift occurred in April 2016, marking a new chapter in the brigade’s history. The Iranian government officially announced that “advisors” from the 65th NOHED Brigade were being deployed to Syria to support the government of Bashar al-Assad.8 This was a landmark event, representing the first official deployment of Artesh combat troops outside Iran’s borders since the 1979 revolution. For decades, extraterritorial operations had been the exclusive domain of the IRGC and its Quds Force. The deployment of NOHED to the Syrian battlefield was a clear signal from the Artesh leadership. Facing years of receiving less funding and political favor than the IRGC, the Artesh seized the opportunity to demonstrate its own expeditionary capabilities and relevance in modern hybrid conflicts.13 By proving its utility in a complex foreign theater, the Artesh could argue for a greater share of the defense budget and a more prominent role in national security strategy, directly challenging the IRGC’s monopoly. Furthermore, leveraging the more popular and less politicized national army for a controversial foreign intervention could provide a “patriotic” veneer to the policy, potentially bolstering domestic support.11

In Syria, NOHED personnel fulfilled “advisory” and intelligence-gathering roles, primarily around Aleppo, and sustained casualties in direct combat with jihadist factions, including the al-Qaeda affiliate Jabhat al-Nusra.11

Current Doctrine, Training, and Capabilities

Today, the 65th NOHED Brigade is widely regarded as the most elite, best-trained, and best-equipped special forces unit within the Artesh.8 It is an all-professional, volunteer force, a rarity in Iran’s conscript-heavy military.13 Its unique background and continuous operational tempo have produced a force with a distinct set of capabilities.

The unit’s Western-style professional ethos and skillset, a direct legacy of its American training, remain a key differentiator. This “Western SOF DNA” provides the Iranian regime with a unique strategic tool. Unlike the Quds Force, which specializes in organizing and leading irregular militias, NOHED brings a high-level tactical and training capability geared towards professional military standards. This allows Iran to engage in different forms of military assistance simultaneously, tailoring its support to the specific needs of its allies, whether they are state or non-state actors.

Training for the brigade, nicknamed “Powerful Ghosts” within the Iranian military, is exceptionally demanding.8 Operators must master parachute operations and demonstrate proficiency in a wide array of environments. Specialized training camps are maintained for this purpose: jungle warfare in the forests of Kelardasht, snow and mountain warfare at the Emamzadeh Hashem ski resort, desert warfare near Qom, and amphibious operations at the Karaj Dam.8 The curriculum also includes espionage, reconnaissance, telecommunications, and irregular warfare, providing a robust guerrilla warfare capability.8

The brigade’s structure mirrors that of many Western special operations forces, with specialized sub-units dedicated to specific mission sets. These include a Hostage Rescue Unit (Unit-110), a psychological operations company, a support battalion, and irregular warfare teams.8 This organization grants the 65th NOHED Brigade a comprehensive skill set spanning direct action, special reconnaissance, counter-terrorism, hostage rescue, and unconventional warfare.9

III. The IRGC-Quds Force: Instrument of Extraterritorial Influence

The IRGC-Quds Force is a fundamentally different entity from the 65th NOHED Brigade. It is not a conventional special forces unit but a unique hybrid organization that blends intelligence, covert action, and unconventional warfare to function as the primary instrument of Iranian foreign policy and power projection. Its evolution has been driven by the ideological imperative to export the 1979 revolution and to build a regional security architecture favorable to Tehran’s interests.

Origins in Irregular Warfare and Formal Establishment

The Quds Force is a specialized branch of the IRGC, focused on extraterritorial operations, military intelligence, and unconventional warfare.13 It is often mischaracterized as a “commando” unit; its role is far more strategic and intelligence-driven.13 Its genesis lies in the irregular warfare directorates established during the Iran-Iraq War. Precursors included a special intelligence unit known as ‘Department 900’ and a headquarters dedicated to managing irregular operations with allied Iraqi Kurdish and Shia Arab militias fighting against Saddam Hussein’s regime.13

Following the end of the war in 1988, the IRGC underwent a significant reorganization. The various external operations and intelligence bodies were consolidated and formally established as an independent service branch: the Quds Force.13 Its name, which translates to “Jerusalem Force,” reflects its official, ideologically charged mission: the “liberation of Muslim land,” with a particular focus on Jerusalem.16 Its personnel, estimated to number between 5,000 and 20,000, are handpicked from the broader IRGC for their skill and ideological commitment.13

The Doctrine of Proxy Warfare: Cultivating the “Axis of Resistance”

The central pillar of Quds Force doctrine and strategy is the cultivation and command of a network of non-state partners and proxy forces across the Middle East. This network, which Tehran refers to as the “Axis of Resistance,” is the primary vehicle through which Iran projects power.1 The Quds Force’s core mission is to organize, train, fund, arm, and provide operational guidance to these groups.2

This strategy of proxy warfare offers several key advantages to Iran. It allows Tehran to challenge and bog down more powerful adversaries, such as the United States and Israel, in costly asymmetric conflicts. It creates a strategic buffer, enabling Iran to engage in hostilities far from its own borders. Crucially, it provides a layer of plausible deniability, allowing Iran to advance its interests while shielding the homeland from direct retaliation.18 Under the command of the late Major General Qassem Soleimani, who led the force from 1998 until his death in 2020, this doctrine was refined and perfected. Soleimani’s vision was to create a transnational movement of Shia militancy and to build proxy “deep states” in allied countries—paramilitary forces that would eventually become better armed and more organized than the host nation’s official military, while remaining loyal to Tehran.17

Operational Evolution Across Key Theaters

The Quds Force has systematically applied and evolved its proxy warfare model across numerous conflict zones over four decades.

  • Lebanon (1982-Present): The Quds Force’s first and most successful application of its doctrine came in Lebanon. Following the 1982 Israeli invasion, Quds Force operatives were deployed to the Bekaa Valley, where they were instrumental in organizing, training, and funding the nascent Shia militia that would become Hezbollah.5 Hezbollah became the template for the Quds Force’s proxy model: a highly capable, ideologically aligned force that serves as a powerful deterrent against Israel and a key node in Iran’s regional network.
  • Afghanistan (1990s): Demonstrating strategic pragmatism, the Quds Force shifted its attention to Iran’s eastern border in the 1990s. It provided support to the predominantly Sunni Northern Alliance in its fight against the Taliban, who were backed by Iran’s regional rivals, Pakistan and Saudi Arabia.5 This operation showed the Quds Force’s willingness to partner with non-Shia groups to counter a more immediate strategic threat.
  • Iraq (2003-Present): The US invasion of Iraq in 2003 created a fertile environment for Quds Force operations. It moved quickly to organize, arm, and direct a multitude of Shia militias to wage an insurgency against Coalition forces.5 The Quds Force is widely credited by US military intelligence with flooding the Iraqi theater with sophisticated weaponry, most notably Explosively Formed Projectiles (EFPs). These advanced improvised explosive devices (IEDs) were capable of penetrating armored vehicles and were responsible for a significant percentage of American combat fatalities in Iraq.2
  • Syria (2011-Present): The Syrian Civil War represents the largest and most complex intervention in the Quds Force’s history. To prevent the collapse of its key regional ally, Bashar al-Assad, the Quds Force executed a massive and multifaceted campaign. It deployed its own officers as frontline advisors and commanders, but its main effort was to build a local proxy army from the ground up.2 By one estimate from a senior Iranian general, the IRGC created 82 distinct fighting units in Syria, totaling some 70,000 armed combatants.22 These forces, along with deployed Hezbollah militants and Shia fighters recruited from Afghanistan and Pakistan, fought alongside the Syrian Arab Army to turn the tide of the war.2

A Multi-faceted Approach: Integrating Hard and Soft Power

The operational methodology of the Quds Force demonstrates that it is far more than a simple military unit; it is a comprehensive instrument of statecraft. Its structure is divided into functional branches covering not only special operations and sabotage but also intelligence, finance, politics, and foreign languages.16 This allows it to pursue a holistic strategy that integrates hard military power with sophisticated “soft power” initiatives designed to win the “hearts and minds” of local populations and embed Iranian influence deep within the social fabric of target nations.22

This approach has been on full display in Syria. In the aftermath of the devastating February 2023 earthquake, Quds Force commander Esmail Qaani personally visited Aleppo to oversee the delivery of Iranian humanitarian aid.24 Simultaneously, these aid convoys were reportedly used as cover to move military reinforcements into the area.24 The Quds Force has funded the restoration of hundreds of Syrian schools, established networks of Islamic libraries, and provided digital training, all aimed at cultivating a new generation with a pro-Iranian, Shia-centric worldview.24 Following a model inspired by Iran’s own Basij militia, Quds Force operatives organize the purchase of houses, shops, and farmland, which are then given to pro-Iranian fighters and their families. This tactic embeds them within the local community rather than isolating them in barracks, fostering human links and long-term loyalty.22 This fusion of military, economic, social, and ideological tools makes the Quds Force a uniquely effective—and uniquely challenging—actor on the international stage.

IV. Comparative Analysis: Divergent Paths to Special Operations

The 65th NOHED Brigade and the IRGC-Quds Force, while both representing the elite of Iran’s military, are fundamentally dissimilar organizations. They are products of their parent institutions—the conventional Artesh and the ideological IRGC—and their differences in mission, methods, and strategic purpose are stark. They are parallel spears in Iran’s arsenal, but they are designed for entirely different targets.

Mission Sets: Tactical Direct Action vs. Strategic Covert Influence

The core distinction lies in their respective mission sets. The 65th NOHED Brigade is a tactical and operational asset. Its purpose is to execute discrete military missions with clear objectives: conducting special reconnaissance behind enemy lines, rescuing hostages, eliminating specific high-value targets, or training allied military forces.9 Its focus is on direct action and the application of specialized combat skills to achieve a battlefield effect.

The Quds Force, in contrast, is a strategic asset. Its missions are not typically single, time-bound operations but rather long-term, open-ended political-military campaigns. Its purpose is to alter the geopolitical landscape of a region by building, managing, and directing a network of foreign proxy forces.2 Its success is measured not in hills taken or targets destroyed, but in the degree of political influence and military control its proxies can exert within their host countries.

Operational Methods: The Commando vs. The Operative

This difference in mission dictates their operational methods. The 65th NOHED Brigade operates as a uniformed military unit. Its members are commandos, trained for direct combat and leveraging their superior training and equipment to overwhelm an enemy. Their value lies in their direct proficiency as warfighters and trainers.8

The Quds Force operates primarily in the shadows. Its members are operatives, working covertly, often under diplomatic or non-official cover. They function as advisors, intelligence officers, logisticians, and political organizers. Their primary method is not to fight battles themselves, but to enable others to fight on Iran’s behalf. Their value lies in their ability to act as a force multiplier, creating armies out of local militias and providing the strategic guidance and material support necessary for them to succeed, all while maintaining plausible deniability for Tehran.13

Relationship and Deconfliction in Shared Battlefields (e.g., Syria)

The deployment of both units to the Syrian theater highlights this functional divergence. They operate under separate command structures, one answering to the Artesh and the other to the IRGC.1 While they share the overarching national objective of preserving the Assad regime, their roles on the ground appear to be complementary rather than integrated. The Quds Force’s mission was to create and lead the vast network of local and foreign militias that formed the backbone of the pro-regime ground forces.22 The 65th NOHED Brigade’s official role was “advisory,” suggesting they were likely tasked with a different mission: training and mentoring conventional units of the Syrian Arab Army, a foreign internal defense role for which their professional military background is uniquely suited.8 This indicates a deliberate division of labor, allowing Iran to support both the state and non-state pillars of Assad’s military power simultaneously.

V. Small Arms and Equipment Assessment

The small arms and individual equipment of Iran’s special operations capable forces reflect the divergent doctrines, supply chains, and operational philosophies of the Artesh and the IRGC. The 65th NOHED Brigade shows a clear trend toward modernization and alignment with international SOF standards, while the Quds Force prioritizes robust, reliable, and easily proliferated weapon systems suitable for its own operators and its vast network of proxies.

Armament of the 65th NOHED Brigade: A Blend of Legacy and Modernization

The individual kit of the 65th NOHED Brigade operator is undergoing a visible transformation. Recent imagery shows the increasing adoption of modern, Western-style personal protective equipment, including MOLLE-compatible plate carriers and FAST-type ballistic helmets, indicating a focus on operator survivability and modularity.9

Their service weapons have evolved similarly. Historically, the unit was equipped with the Iranian-made Tondar (a clone of the Heckler & Koch MP5 submachine gun) and its predecessor, the Uzi.9 The East German Mpi Kms 72, a side-folding stock variant of the AKM, was also a primary weapon for Artesh commandos.25

Today, the brigade’s arsenal is more diverse and modern. The Russian-designed AK-103, chambered in 7.62x39mm, is now in common use.9 More significantly, the unit has embraced domestically produced AR-15 pattern rifles. This includes platforms like the Masaf, a direct clone of the Heckler & Koch HK416, which utilizes a short-stroke gas piston system.25 The adoption of these modular, optics-ready 5.56x45mm platforms represents a significant leap in capability, bringing the brigade’s primary weapon systems in line with those used by many NATO special operations forces. The standard issue sidearm is reported to be the Czech-designed CZ 75 pistol.9

The brigade has also demonstrated a capacity for battlefield acquisition. Following the collapse of the Afghan National Army in 2021, NOHED units were photographed with captured US-made small arms, including M4 carbines, M16A3/A4 rifles, and M249 light machine guns, which were evidently brought into Iran by fleeing Afghan soldiers.27

The Quds Force Arsenal: Equipping the Vanguard and its Proxies

The Quds Force arsenal is a reflection of its dual role as both an elite operational unit and the primary arms supplier for the Axis of Resistance. The weapons its operators carry are often the same ones it distributes to its partners, prioritizing ruggedness, reliability, and compatibility with regional supply chains.

The backbone of the IRGC’s, and by extension the Quds Force’s, long arms inventory is the Kalashnikov platform. This includes Iranian-produced versions of the AKM (designated KLS/KLF/KLT) and licensed or reverse-engineered copies of the more modern AK-103 (designated AK-133 or KL-133).25 These 7.62x39mm rifles are ubiquitous across Middle Eastern conflict zones, making them simple to supply and maintain.

For specialized applications, particularly for its proxy forces, the Quds Force makes extensive use of the Iranian-made AM-50 Sayyad anti-materiel rifle.25 This is an unlicensed copy of the Austrian Steyr HS.50 rifle, chambered in the powerful 12.7x99mm (.50 BMG) cartridge.28 The Sayyad provides a devastating capability against light armored vehicles, fortified positions, and enemy personnel at extended ranges. It has been widely proliferated by the Quds Force and has been documented in the hands of proxy militias in Iraq, Syria, Yemen, and the Palestinian territories.28

Beyond small arms, the Quds Force is responsible for facilitating the transfer of a wide spectrum of advanced weaponry to its allies. This includes rockets, rocket-propelled grenades (RPGs), advanced IED components like EFPs, anti-aircraft weapons, and a growing arsenal of sophisticated unmanned aerial systems.7

The Role of Iran’s Domestic Defense Industry

Iran’s domestic Defense Industries Organization (DIO) is the critical enabler for arming its forces under a decades-long international sanctions regime. Unable to procure modern weapon systems from abroad, Iran has developed a robust capability for reverse-engineering and producing unlicensed copies of proven foreign designs.26

This strategy is evident across the entire small arms catalog. The PC-9 Zoaf pistol is a clone of the SIG Sauer P226.25 The Tondar SMG is a copy of the H&K MP5.25 The S-5.56 assault rifle is a copy of the Chinese Norinco CQ, which itself is a copy of the American M16A1.29 The Masaf rifle is a copy of the H&K HK416.25 This approach provides self-sufficiency but can result in inconsistent quality. The AM-50 Sayyad, for example, is noted to have a significantly worse fit and finish than the original Austrian rifle it copies.28

Not all domestic designs have been successful. The KH-2002 Khaybar, an ambitious bullpup assault rifle intended to replace the G3, proved to be a failure. During field trials in Syria, the rifle suffered from numerous jamming malfunctions and was ultimately rejected by potential foreign buyers. Production was reportedly discontinued in 2012.30 Similarly, the Fateh assault rifle, another AR-15-style platform developed by the IRGC, was introduced in 2014 but discontinued by 2016, failing to enter widespread service.32 These failures underscore the challenges Iran’s defense industry faces in moving from simple reverse-engineering to reliable, original design and mass production.

Table: Current Small Arms of Iranian Special Operations Capable Forces

Weapon TypeDesignation (Iranian)Original Design/PlatformCaliberOrigin/ProductionPrimary User(s) & Notes
PistolPC-9 ZoafSIG Sauer P2269×19mmIran (Unlicensed Copy)IRGC, Artesh. Widespread service pistol. 25
CZ 75CZ 759×19mmCzech Republic65th NOHED Brigade. 9
Submachine GunTondar (MPT-9)Heckler & Koch MP59×19mmIran (Licensed/Copy)65th NOHED (legacy), various units. 9
Assault RifleKLS/KLF/KLTAKM / Type 567.62×39mmIran (Domestic Variant)IRGC, Quds Force. Standard issue Kalashnikov variant. 25
AK-133 / KL-133AK-1037.62×39mmIran (Licensed/Copy)IRGC, Quds Force, 65th NOHED Brigade. Modernized AK platform. 9
MasafHeckler & Koch HK4165.56×45mmIran (Unlicensed Copy)65th NOHED Brigade, Artesh SOF. Represents modernization trend. 25
S-5.56Norinco CQ / M16A15.56×45mmIran (Copy of Chinese Copy)IRGC SOF units. Limited service. 25
M4 CarbineColt M45.56×45mmUnited States65th NOHED Brigade (captured from Afghan forces). 27
Battle RifleG3A6Heckler & Koch G37.62×51mmIran (Licensed)Artesh (legacy standard issue). 25
Masaf-2HK417 (platform)7.62×51mmIran (Domestic Variant)Artesh Rapid Reaction units. Intended G3 replacement. 25
Sniper / Anti-Materiel RifleAM-50 SayyadSteyr HS.5012.7×99mmIran (Unlicensed Copy)IRGC, Quds Force, and Proxies. Widely proliferated. 25
NakhjirSVD Dragunov (platform)7.62×54mmRIran (Domestic Design)Artesh, IRGC. Standard designated marksman rifle. 25
Machine GunMGA3Rheinmetall MG37.62×51mmIran (Licensed)Artesh, IRGC. Standard general-purpose machine gun. 25
PKM/PKTPKM7.62×54mmRIran (Copy)Artesh, IRGC. 25
M249FN Minimi5.56×45mmUnited States65th NOHED Brigade (captured from Afghan forces). 27

VI. Future Trajectory: Speculative Analysis

Based on established trends in doctrine, procurement, and operational employment, a speculative analysis of the future trajectories of both the 65th NOHED Brigade and the IRGC-Quds Force can be projected. Their paths will likely continue to diverge, shaped by the institutional priorities of the Artesh and the IRGC, even as they adapt to an evolving regional security landscape.

Projected Evolution of the 65th NOHED Brigade

The 65th NOHED Brigade is poised to continue its trajectory of professionalization and modernization, aiming to achieve tactical and equipment parity with other Tier 1 and Tier 2 international special operations forces. This will involve the continued adoption of modular small arms, advanced optics, encrypted communications systems, and night vision technology. The goal will be to solidify its status as a high-end direct-action and special reconnaissance force.

The experience gained in Syria is likely to have a lasting impact on the Artesh’s strategic thinking. The leadership will probably leverage NOHED’s successful deployment to advocate for a more permanent and institutionalized expeditionary role. This could see the brigade formally tasked with foreign internal defense (FID) missions, carving out a distinct niche for the Artesh in training and advising the conventional militaries of allied nations. This would complement, rather than compete with, the Quds Force’s focus on non-state actors and allow Iran to project influence through both conventional and unconventional military partnerships.

The Future of the Quds Force

The Quds Force will remain the centerpiece of Iran’s “forward defense” doctrine, which seeks to confront perceived threats far from Iran’s borders through a network of proxies.33 Its core mission of managing the Axis of Resistance will not change. However, its methods will continue to evolve. The future of Quds Force operations will see a deeper integration of technology into its proxy warfare model. This will include the continued proliferation of more advanced and precise UAVs and loitering munitions, the provision of cyber warfare capabilities to its partners, and the potential distribution of guided rockets and short-range ballistic missiles to key allies like Hezbollah.7

The primary challenge facing the Quds Force will be one of command and control. As its proxy groups mature and gain significant political and military power in their own right, they may begin to pursue local agendas that diverge from Tehran’s strategic interests.21 The long-term success of the Quds Force’s model will depend on its ability to maintain ideological alignment and operational control over an increasingly complex and geographically dispersed network of powerful non-state actors.

Potential for Inter-Service Cooperation, Competition, and Doctrinal Convergence

The future relationship between the 65th NOHED Brigade and the Quds Force will be a key barometer of the broader Artesh-IRGC dynamic. While the Supreme Leader could mandate closer cooperation in a future crisis, the more probable trajectory is one of continued institutional competition. The IRGC will likely view any expansion of the Artesh’s expeditionary role as an encroachment on its traditional domain and a threat to its primacy in foreign operations. This competition for missions, resources, and influence will continue to define their relationship.

Over time, a degree of doctrinal convergence is possible. The 65th NOHED Brigade, having been exposed to the realities of hybrid warfare in Syria, will undoubtedly incorporate lessons on operating in ambiguous, multi-actor environments into its training and doctrine. Conversely, the Quds Force may seek to instill greater professionalism and more conventional combined-arms capabilities into its most mature proxy forces, like Hezbollah, blurring the lines between irregular and conventional forces.

VII. Concluding Assessment

The Islamic Republic of Iran’s special operations capabilities are embodied by two distinct, parallel, and highly evolved instruments of national power: the Artesh’s 65th NOHED Airborne Special Forces Brigade and the IRGC’s Quds Force. They are the products of vastly different institutional cultures and historical circumstances. NOHED was born from a Western-mentored, professional military tradition and was re-forged as a loyal and capable tactical force in the fires of the Iran-Iraq War. The Quds Force was born from the ideological fervor of the 1979 revolution and the brutal necessities of irregular warfare, becoming the master of a unique and highly effective doctrine of political-military influence.

The 65th NOHED Brigade has evolved from its origins as a conventional commando unit into a modern, multi-role special operations force capable of direct action, counter-terrorism, and, as demonstrated in Syria, expeditionary advisory missions. It represents a tactical and operational spear, sharp and precise. The Quds Force has perfected a strategic methodology of proxy warfare, leveraging a network of allies and integrating the full spectrum of hard and soft power to achieve long-term geopolitical objectives far beyond Iran’s borders. It represents a strategic spear, long-reaching and patient.

Their separate evolutionary paths, distinct equipment philosophies, and divergent operational methods are a direct reflection of Iran’s dual-military structure. This system provides the Iranian regime with a flexible, resilient, and multi-layered toolkit for projecting power and ensuring its own security. Whether a mission requires the surgical precision of a commando raid or the patient cultivation of a foreign insurgency, Tehran possesses a specialized spear for the task.


If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly contribute towards our continued reporting, please visit our funding page.


Sourcs Used

  1. Explainer: The Iranian Armed Forces | American Enterprise Institute …, accessed September 6, 2025, https://www.aei.org/articles/explainer-the-iranian-armed-forces/
  2. The Islamic Revolutionary Guard Corps (IRGC) – Council on Foreign Relations, accessed September 6, 2025, https://www.cfr.org/backgrounder/irans-revolutionary-guards
  3. Strait of Hormuz – Iranian Military – The Strauss Center, accessed September 6, 2025, https://www.strausscenter.org/strait-of-hormuz-iranian-military/
  4. Islamic Revolutionary Guard Corps – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Islamic_Revolutionary_Guard_Corps
  5. Quds Force | Iran, IRGC, Meaning, History, & Israel-Hamas War …, accessed September 6, 2025, https://www.britannica.com/topic/Quds-Force
  6. Iran’s Islamic Revolutionary Guards Corps (IRGC) – Critical Threats, accessed September 6, 2025, https://www.criticalthreats.org/wp-content/uploads/2016/07/imce-imagesIRGC_CommandNetwork_context-1.pdf
  7. The 15 Deadly Weapons Of Iran – YouTube, accessed September 6, 2025, https://www.youtube.com/watch?v=Lu2t4APKFYQ
  8. NOHED Brigade: Iran’s Special Forces – Grey Dynamics, accessed September 6, 2025, https://greydynamics.com/nohed-irans-special-forces/
  9. 65th Airborne Special Forces Brigade – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/65th_Airborne_Special_Forces_Brigade
  10. 65th Airborne Special Forces Brigade – Wikiwand, accessed September 6, 2025, https://www.wikiwand.com/en/articles/65th_Airborne_Special_Forces_Brigade
  11. Iran’s Army Suffers Its First Casualties in Syria | The Washington Institute, accessed September 6, 2025, https://www.washingtoninstitute.org/policy-analysis/irans-army-suffers-its-first-casualties-syria
  12. About: 65th Airborne Special Forces Brigade – DBpedia, accessed September 6, 2025, https://dbpedia.org/page/65th_Airborne_Special_Forces_Brigade
  13. Iranian Special Forces – Центр анализа стратегий и технологий, accessed September 6, 2025, http://cast.ru/products/articles/iranian-special-forces.html
  14. en.wikipedia.org, accessed September 6, 2025, https://en.wikipedia.org/wiki/65th_Airborne_Special_Forces_Brigade#:~:text=After%20the%201979%20Revolution%20in,the%20Sistan%20and%20Baluchestan%20insurgency.
  15. Iran Military Power – Defense Intelligence Agency, accessed September 6, 2025, https://www.dia.mil/portals/110/images/news/military_powers_publications/iran_military_power_lr.pdf
  16. Quds Force – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Quds_Force
  17. The Quds Force – United Against Nuclear Iran | UANI, accessed September 6, 2025, https://www.unitedagainstnucleariran.com/report/quds-force
  18. Islamic Revolutionary Guard Corps (IRGC) – National Counterterrorism Center | Terrorist Groups, accessed September 6, 2025, https://www.dni.gov/nctc/terrorist_groups/irgc.html
  19. What is Iran’s Islamic Revolutionary Guard Corps and Why is it Designated a Terror Group by the United States? – American Jewish Committee, accessed September 6, 2025, https://www.ajc.org/news/what-is-irans-islamic-revolutionary-guard-corps
  20. Iran’s Regional Armed Network – Council on Foreign Relations, accessed September 6, 2025, https://www.cfr.org/article/irans-regional-armed-network
  21. The Limits of Iran’s Proxy Strategy: How Soleimani’s Vision Failed in Recent Conflicts, accessed September 6, 2025, https://www.meforum.org/mef-online/the-limits-of-irans-proxy-strategy-how-soleimanis-vision-failed-in-recent-conflicts
  22. The Quds Force in Syria: Combatants, Units, and Actions, accessed September 6, 2025, https://ctc.westpoint.edu/the-quds-force-in-syria-combatants-units-and-actions/
  23. Saberin Unit – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Saberin_Unit
  24. The Quds Force in Syria – Combating Terrorism Center, accessed September 6, 2025, https://ctc.westpoint.edu/wp-content/uploads/2023/06/CTC-SENTINEL-062023.pdf
  25. List of equipment of the Iranian Army – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/List_of_equipment_of_the_Iranian_Army
  26. The new Iranian standard issue chambered in 7.62×51 nato of all things – Reddit, accessed September 6, 2025, https://www.reddit.com/r/ForgottenWeapons/comments/1n8pd2h/the_new_iranian_standard_issue_chambered_in/
  27. Iranian 65th NOHED Rapid Reaction Brigade armed with US made M4,M16A3/A4 and M249 LMG which was confiscated from fleeing/surrendered Afghan National Army soldiers who fled to Iran after the fall of Kabul in 2021 : r/ForgottenWeapons – Reddit, accessed September 6, 2025, https://www.reddit.com/r/ForgottenWeapons/comments/1i77o1j/iranian_65th_nohed_rapid_reaction_brigade_armed/
  28. Steyr HS .50 / HS .460 – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Steyr_HS_.50_/_HS_.460
  29. Khaybar: Iran’s 5.56mm Assault Rifle – Guns and Ammo, accessed September 6, 2025, https://www.gunsandammo.com/editorial/khaybar-irans-5-56mm-assault-rifle/248021
  30. KH-2002 – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/KH-2002
  31. KH2002 – IOP Wiki, accessed September 6, 2025, https://iopwiki.com/index.php?title=KH2002&mobileaction=toggle_view_desktop
  32. Fateh rifle – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Fateh_rifle
  33. Iran’s Forward Defense Doctrine and the Evolution of Its “Long Arm Strategy – İRAM Center, accessed September 6, 2025, https://iramcenter.org/en/irans-forward-defense-doctrine-and-the-evolution-of-its-long-arm-strategy_en-2600
  34. Iran’s Evolving Military: Complementing Asymmetric Doctrine with Conventional Capabilities, accessed September 6, 2025, https://bisi.org.uk/reports/irans-evolving-military-complementing-asymmetric-doctrine-with-conventional-capabilities

Ronin’s Grips: Analyzing the Invisible Battlefield—Why Social Media Sentiment is the New Decisive Terrain

The character of conflict has irrevocably shifted. We are no longer operating in a world of episodic, declared wars, but in a condition of persistent, unending competition that actively exploits strategic ambiguity. For the national security community, this means the battlefield has expanded from physical territory to encompass critical infrastructure, financial systems, and, most crucially, the cognitive domain of public perception itself.

The Ronin’s Grips approach recognizes this shift and leverages sophisticated social media analysis to provide superior intelligence. We treat the global digital ecosystem not as noise, but as the primary center of gravity in modern, non-kinetic warfare.

Here is how our focus on social media sentiment and trends yields better analysis for military and national security decision-makers.


I. Decoding the Cognitive Battlefield

Adversaries, particularly major powers, prioritize achieving victory by disintegrating an adversary’s societal and military will to fight—the Sun Tzu ideal of “winning without fighting”. Social media is the primary vector for this attack, having fused completely with modern psychological operations (PSYOP).

Our analysis focuses on identifying large-scale, digitally-driven strategic trends:

  1. Mapping Systemic Stress and Vulnerability: We analyze social media and public discourse to identify Indicator 6: Loss of Social Cohesion & Legitimacy. Adversarial influence operations are explicitly designed to exacerbate existing social divisions and erode trust in democratic institutions. By tracking these narratives, we observe direct symptoms of internal decay, such as the alarming trend toward political polarization in the United States, where partisans view the opposing party as a “threat to the nation’s well-being”. The ultimate objective of AI-driven information warfare is the erosion of trust itself, leading to a state of “epistemic exhaustion” where coherent, collective decision-making becomes impossible.
  2. Tracking Adversary Doctrine in Real-Time: We monitor digital discourse to track the operationalization of doctrines like China’s “Three Warfares” (Public Opinion, Psychological, and Legal warfare). This doctrine uses AI and social platforms to seize control of the dominant narrative, legitimize China’s actions, and undermine alliances. Our analysis can track when a PLA commander is applying political warfare to achieve a victory before a major kinetic battle is fought, often targeting the political will of the U.S. and its allies.
  3. Predicting Disinformation Payloads: By analyzing platform architecture and psychological vulnerabilities, we identify how adversaries exploit human nature at scale. For instance, content that elicits strong, negative emotions like anger and outrage spreads faster and wider because social media algorithms are designed to maximize engagement. The analysis identifies the use of deepfakes and generative AI to create hyper-realistic, fabricated content designed to exploit sensitivities like corruption or sow distrust. This is a direct assault on the integrity of democratic processes, as seen in unconventional conflict scenarios targeting the Philippines.

Understanding Social Media Sentiment for Decision Advantage

In the 21st century, strategic competition is defined by the speed and quality of decision-making, summarized by Colonel John Boyd’s OODA loop (Observe, Orient, Decide, Act). Social media sentiment analysis significantly improves the crucial Observe and Orient phases:

  • Accelerating the PSYOP Cycle: Military Information Support Operations (MISO) planning, traditionally time-consuming, can be compressed dramatically by AI-powered analysis. Generative AI and LLMs can scrutinize massive, multilingual social media datasets in minutes to extract an adversary’s goals, tactics, and narrative frames. This instantly automates the most difficult phase—Target Audience Analysis—allowing MISO teams to generate hyper-personalized digital campaigns tailored to specific cultural or demographic sub-groups “at the speed of conflict”.
  • Targeting the Civilian Center of Gravity: The PLA employs a concept called “Social A2/AD” (Anti-Access/Area Denial), which uses non-military actions like fostering political divisions and economic dependencies to fracture American society. By analyzing sentiment and narratives, we can detect when these operations are attempting to degrade the capacity of a nation or alliance to respond effectively. For example, in the U.S.-Philippines alliance, the goal of information warfare is often to poison the perception of the alliance for years to come by eroding public trust. Ronin’s Grips tracks these vectors to provide warning.

II. Why Readers Should Value and Trust Ronin’s Grips Reports

Our primary value proposition is analytical rigor and candor in a contested information environment, setting our reports apart from simple data aggregation or biased sources.

1. Commitment to Asymmetric Insight

We reject “mirror-imaging”—the critical error of projecting U.S. strategic culture and assumptions onto adversaries like China. Instead, we use a structured analytical methodology designed to produce second- and third-order insights.

  • Beyond the Surface: We move beyond describing what an adversary is doing (e.g., “China is building a metaverse”) to analyzing the strategic implication (e.g., China’s military metaverse, or “battleverse,” is a core component of its Intelligentized Warfare, representing a priority to win future wars, potentially serving as strategic misdirection for external audiences).
  • Connecting the Dots: We connect tactical phenomena to grand strategic shifts. For instance, mapping the destruction of high-value Russian armor by low-cost Ukrainian FPV drones (a tactical observation) to its third-order implication: a systemic challenge to the Western military-industrial complex’s focus on producing exquisite, high-cost platforms (a strategic outcome).

2. Rigorous, Multi-Source Validation

Our analysis is not based on a single stream of information. We employ a multi-source collection strategy, systematically cross-referencing information from official doctrine, real-world battlefield reports, and expert third-party analysis.

  • Validation through Conflict: We rigorously cross-reference doctrine with operational efficacy. For example, a formal U.S. Army doctrine emphasizing the importance of targeting a drone’s Ground Control Station (GCS) is validated and given urgency by battlefield reports from Ukraine, confirming that drone operators are high-value targets for both sides.
  • Candor and Risk Assessment: Unlike institutions constrained by political narratives, our methodology demands a candid risk assessment. This means actively seeking out contradictions, documented failures, and technical vulnerabilities. For instance, while AI accelerates decision-making, we highlight its “brittleness”—the fact that AI models are only as good as their training data, and the enemy’s job is to create novel situations that cause models to fail in “bizarre” ways. We analyze the threat of adversarial AI attacks, such as data poisoning, which could teach predictive models to confidently orient commanders to a false reality.

3. Actionable Intelligence

Our final output is structured for utility. We synthesize complex data into clear, actionable recommendations. For military commanders operating in the hyper-lethal drone battlespace, this translates into definitive “Imperatives (Dos)” and “Prohibitions (Don’ts)” needed for survival and victory. This focus ensures that our analysis translates directly into cognitive force protection and improved decision-making capacity.


The Bottom Line: Social media is the nervous system of modern conflict, constantly broadcasting signals about political will, societal fracture, and adversarial intent. While traditional intelligence focuses on the movement of tanks and ships, Ronin’s Grips focuses on the movement of ideas and the degradation of trust. In an age where adversaries seek to win by paralyzing our C2, eroding our will, and exploiting our democratic debates, analyzing the sentiment and trends in the cognitive domain is an operational imperative. We provide the resilient, synthesized intelligence required to out-think, out-decide, and out-pace this new era of warfare.

Our reports provide the commander, policymaker, and informed citizen with the decisive edge to understand reality, not just react to noise. If the goal of the adversary is to destroy confidence in all information, our mission is to provide the validated analysis needed to restore that confidence and reinforce societal resilience.

Directorate ‘V’ TsSN FSB: An Operational History and Materiel Analysis of the Vympel Group

Directorate ‘V’ of the Special Purpose Center (TsSN) of the Russian Federal Security Service (FSB), commonly known as Vympel Group, stands as one of the Russian Federation’s most elite and secretive special operations forces. Its history represents a unique and compelling evolution, tracing a path from its origins as a clandestine instrument of Soviet foreign policy, designed for sabotage and direct action deep within enemy territory, to its current role as a key component of the modern Russian security state’s counter-terrorism and special tasks apparatus. The trajectory of Vympel is one of radical adaptation, driven by the seismic geopolitical shifts of the late 20th and early 21st centuries. Initially forged for a potential global conflict with NATO, the unit was forced to redefine its purpose after the Soviet collapse, transforming into a domestic counter-terror force. Today, it appears to be evolving once more, blending its Cold War-era clandestine skills with hard-won counter-terrorism experience to become a hybrid force adept at operating across the spectrum of conflict, from domestic security to the grey-zone battlefields of the contemporary era.

Section 1: Genesis – The KGB’s Clandestine Sword (1981-1991)

1.1. Forging the Pennant: Lineage and Establishment

The Special Operations Task Group Vympel (meaning “pennant”) was officially established on August 19, 1981, following a joint top-secret decision by the Politburo and the Central Committee of the Communist Party of the Soviet Union.1 From its inception, Vympel was an entity of the intelligence services, not the military. It was formed within the KGB’s First Chief Directorate (PGU), the arm responsible for all foreign intelligence and operations.3 Specifically, it was placed under the command of Department “S,” which managed the KGB’s overseas clandestine service, or “illegals” program, underscoring its intended role in deniable, deep-cover operations.2

The creation of Vympel was not a spontaneous decision but the culmination of lessons learned from the crucible of irregular warfare in Afghanistan. The unit was deliberately built upon the combat-experienced cadres of its precursor KGB special task groups: Zenyth, Kaskad, and Omega.1 These ad-hoc units had been active in Afghanistan since the late 1970s, with Kaskad making four operational tours between July 1980 and April 1983.1 Their experience, particularly in operations like “Storm-333″—the successful 1979 assault on the Tajbeg Palace and assassination of Afghan President Hafizullah Amin, in which KGB operators participated—demonstrated the need for a permanent, institutionalized force capable of executing such complex intelligence-led special operations.1 The formation of Vympel was a direct effort to retain the unique proficiency and tactical lessons acquired by these operators.2

The initiative was championed by Major General Yuri Ivanovich Drozdov, a senior figure in the PGU, and its founding commander was Captain 1st Rank Ewald Kozlov, a naval officer with service in the Northern and Caspian Fleets who had transferred to the KGB’s Department “S”.2 This leadership profile further distinguished Vympel from its army counterparts in the GRU (Main Intelligence Directorate).

1.2. Cold War Doctrine and Mandate: The “Special Period”

Vympel’s primary doctrine was tailored for the “special period” (особыйпериод)—the critical, pre-conflict phase when war between the Soviet Union and NATO was deemed unavoidable.2 Its mandate was unequivocally offensive and foreign-focused, designed to act as a strategic tool of state power to cripple an adversary’s ability to wage war before conventional hostilities had even begun.

The unit’s core tasks were a blend of special operations and clandestine intelligence work 1:

  • Deep Penetration and Special Reconnaissance: Infiltrating far behind enemy lines to gather critical intelligence on strategic targets.6
  • Sabotage: The destruction of strategic enemy infrastructure, with a unique and specific focus on nuclear facilities, power plants, command-and-control centers, and transportation hubs.2
  • Direct Action: Conducting assassinations of top enemy political and military leadership to decapitate the adversary’s command structure.2
  • Intelligence Operations: Conducting human intelligence (HUMINT) operations and activating pre-placed espionage cells in wartime.2
  • Ancillary Missions: Included the protection of Soviet embassies and institutions abroad and seizing enemy naval assets like surface vessels and submarines.1

This mission set placed Vympel in a distinct category from the GRU’s Spetsnaz. While GRU units were an instrument of military intelligence focused on tactical and operational disruption of enemy armed forces, Vympel was an asset of the KGB’s foreign intelligence arm, aimed at achieving strategic political and military effects by destabilizing the enemy state itself.9

1.3. The “Universal Soldier”: Selection and Training

To meet the demands of its complex mission, Vympel developed a training program of unparalleled rigor and breadth, designed to create a “universal soldier” (универсальныйсолдат).8 The process to fully train a single operative was exceptionally long and expensive, taking approximately five years and costing hundreds of thousands of dollars annually per candidate.8

The curriculum was exhaustive, intended to produce an operator who was simultaneously an elite commando, an intelligence officer, and a combat engineer. Training included 2:

  • Advanced Combat Skills: Intensive training in hand-to-hand combat, expert marksmanship with a wide array of both Soviet and foreign weapon systems, parachute training (including high-altitude techniques), diving and underwater combat, and alpine mountaineering and rope techniques.2
  • Intelligence Tradecraft: Operatives were schooled in clandestine operations, HUMINT collection, and were required to master two to three foreign languages to facilitate deep-cover operations in foreign countries.2
  • Specialized Technical Skills: A key differentiator was the advanced technical training in mining and blasting, the construction and use of improvised explosive devices (IEDs), and, most notably, the detailed study of the structure and vulnerabilities of nuclear power plants and other critical infrastructure.2

This comprehensive skill set made Vympel operatives uniquely capable of operating autonomously for extended periods deep inside hostile territory, executing missions of the highest strategic importance.

1.4. Arsenal of the Era: Tools for Clandestine Warfare

During the 1980s, Vympel’s arsenal was composed of the best available Soviet special-purpose weaponry, tailored for its clandestine mission set.

  • Primary Rifles: The standard-issue assault rifle was the AKS-74, chambered in 5.45x39mm. Its side-folding stock made it suitable for airborne operations and concealed carry.12 For extreme close-quarters work and vehicle-borne roles, the compact AKS-74U carbine was employed.13
  • Suppressed Weapon Systems: Given the emphasis on stealth, silenced weapons were critical. This included the PB suppressed pistol, based on the Makarov PM, and the PSS “Vul” silent pistol, which used a special captive-piston cartridge for nearly silent operation.13 The development of the AS Val integrally suppressed assault rifle and the VSS Vintorez suppressed sniper rifle in the late 1980s was a direct technological response to the operational needs of units like Vympel. Both platforms fired the heavy, subsonic 9x39mm armor-piercing cartridge, providing quiet lethality against protected targets.16
  • Support and Precision Weapons: The SVD Dragunov semi-automatic rifle provided designated marksman capability out to intermediate ranges.13 For squad-level fire support, the PKM general-purpose machine gun was utilized.13 Rifles were often fitted with under-barrel grenade launchers such as the BG-15.18

1.5. Global Operations: The Soviet Union’s Covert Hand

While the full operational record of Vympel during the Cold War remains highly classified, it is known that its operatives were deployed to key proxy battlegrounds around the globe. They continued the work of their predecessors in Afghanistan, conducting intelligence-reconnaissance-sabotage missions throughout the 1980s.6 Beyond Afghanistan, Vympel operators were active in advisory and potentially direct action roles in Angola, Mozambique, Nicaragua, Vietnam, and other Cold War hotspots, supporting Soviet-backed governments and revolutionary movements.8 In these theaters, their role was likely to train local special forces and execute sensitive operations that were beyond the capabilities of their allies.

Section 2: The Tumultuous Decade – Survival and Rebirth (1991-1999)

2.1. A Unit Adrift: Post-Soviet Chaos

The dissolution of the Soviet Union in December 1991 was a cataclysmic event for Vympel. Its primary mission—waging clandestine war against NATO in the “special period”—became obsolete overnight. The unit was plunged into a period of profound uncertainty, subjected to “endless re-organisation and re-definition” as the monolithic KGB was fractured into competing successor agencies.2 Vympel was passed between these new entities, first subordinated to the short-lived Security Ministry and then transferred to the GUO (Main Protection Directorate), reflecting the chaotic and often politically motivated restructuring of the Russian security services under President Boris Yeltsin.1

2.2. The 1993 Constitutional Crisis and the “Vega” Period

The unit’s existential crisis came to a head in October 1993 during the Russian constitutional crisis. A violent political standoff erupted between President Yeltsin and the Russian parliament, which had barricaded itself inside the Supreme Council building, colloquially known as the “White House.” Vympel, along with its sister unit Alpha, received direct orders to storm the building.2

In a defining moment of principle, the commanders of both units refused to carry out the assault. This refusal was not an act of simple insubordination but a manifestation of the unit’s core ethos. Trained as elite intelligence operators for clandestine warfare against foreign adversaries, the men of Vympel did not see themselves as internal troops to be used against their own countrymen in a political dispute. The order represented a fundamental violation of their professional identity, and they feared the massive civilian casualties that a full-scale assault would inevitably cause.

This act of defiance had severe repercussions. As a punitive measure, Yeltsin summarily transferred Vympel from the GUO to the command of the Ministry of Internal Affairs (MVD).1 For the elite operatives, subordination to the

militsiya (police) was a profound humiliation.2 The result was a mass exodus that nearly destroyed the unit. Of the 278 officers in Vympel at the time, only 57 consented to serve under the MVD.1 The decimated unit was stripped of its prestigious name and rebranded as “Vega”.1

2.3. Return to the Fold: Integration into the FSB TsSN

The near-destruction of Vympel was recognized as the loss of a critical national security asset. In August 1995, a presidential decree officially reinstated the unit.1 Later that year, it was removed from the MVD and integrated into the Federal Security Service (FSB), the primary domestic successor to the KGB. The FSB established a new overarching command, the Center of Special Purpose (TsSN), to house its elite special operations capabilities. Vympel was placed within the TsSN as Directorate ‘V’, alongside its sister unit, Directorate ‘A’ (Alpha).2

This move was a lifeline for the unit. The FSB provided a stable command structure, a clear (if altered) mission set, and the prestige of serving within the state’s principal security organ. For the FSB, the integration of Vympel and Alpha consolidated Russia’s premier special operations forces under a single roof, preventing their further degradation and ensuring their capabilities were available to the new security service. This symbiotic relationship secured Vympel’s survival and set the stage for its transformation into a 21st-century special operations force.

Section 3: A New Paradigm – Counter-Terrorism and Special Tasks (2000-Present)

3.1. Mission Reforged: From Sabotage to Counter-Terrorism

Under the command of the FSB TsSN, Vympel’s official mandate underwent a radical transformation. The primary mission shifted from foreign sabotage to domestic special operations, driven by the pressing security challenges facing the new Russian Federation, particularly the rise of terrorism and separatism emanating from the North Caucasus.1

The unit’s new core missions became 1:

  • Counter-Terrorism (CT) and Hostage Rescue: Becoming a primary national-level response force for high-stakes terrorist incidents.
  • Protection of Strategic Sites: Safeguarding critical national infrastructure, with a particular emphasis on nuclear power plants and related facilities. This mission was a logical evolution of their original Cold War training in nuclear sabotage, repurposing offensive knowledge for defensive ends.
  • Suppression of Terrorist Acts: Conducting proactive operations to disrupt and neutralize terrorist plots targeting Russian citizens, both domestically and abroad.

This fundamental shift in purpose is reflected in the unit’s modern motto, ‘Служить и защищать’ (Sluzhit’ i zashchishchat’), meaning “Serve and Protect”—a clear departure from its aggressive, foreign-oriented origins.1 Accordingly, the unit’s training regimen was adapted, placing a much greater emphasis on Close-Quarters Battle (CQB), advanced hostage rescue tactics, and specialized skills in dealing with the threat of improvised explosive devices (IEDs).1

3.2. Trial by Fire: The Nord-Ost and Beslan Sieges

Two horrific mass-hostage crises in the early 2000s became the defining operations of Vympel’s new counter-terrorism role. While demonstrating the unit’s capabilities, they also exposed a brutal learning curve and tactical approaches that resulted in catastrophic loss of life among the hostages.

Nord-Ost Theater Siege (October 2002): Vympel, alongside Alpha and MVD SOBR, formed the assault force tasked with resolving the seizure of the Dubrovka Theater in Moscow, where 40 Chechen terrorists held over 850 hostages.7 The tactical challenge was immense: a complex building filled with civilians and rigged with numerous IEDs by attackers who included female suicide bombers.23 The chosen tactical solution was to pump an incapacitating chemical agent—a powerful fentanyl derivative such as carfentanil mixed with remifentanil—into the theater’s ventilation system to neutralize the terrorists before the assault began.23 While the subsequent storming of the building was tactically successful, resulting in the death of all 40 terrorists, the operation was a medical disaster. A catastrophic failure to coordinate with medical services, provide the necessary antidote (naloxone), or properly manage the evacuation of hundreds of unconscious hostages led to the deaths of at least 130 civilians, who succumbed to respiratory depression caused by the opioid agent.23

Beslan School Siege (September 2004): Vympel and Alpha were again the primary response units at the seizure of School Number One in Beslan, North Ossetia. A group of over 30 terrorists held more than 1,100 hostages, including 777 children, inside the school’s gymnasium, which they had heavily mined with IEDs.29 The three-day siege ended in chaos when a series of explosions in the gym—the cause of which remains disputed—triggered a spontaneous and poorly coordinated assault by security forces.30 The operation was marked by a near-total breakdown of incident command, with armed local civilians joining the firefight.31 In the ensuing battle, security forces employed a level of firepower unprecedented in a hostage rescue scenario, including tank cannons, RPO-A Shmel thermobaric rocket launchers, and heavy machine guns, against the school building.30 The outcome was horrific, with 334 hostages killed, 186 of them children.29 The event exposed profound failures in intelligence, negotiation strategy, and tactical discipline.31

These two events, while tragic, were formative. The willingness to employ indiscriminate, area-effect weapons like chemical agents and thermobaric rockets suggests a tactical mindset that prioritized the elimination of the terrorist threat above all else, a possible holdover from the unit’s more kinetic military and sabotage origins. These operations served as a brutal lesson in the unique requirements of domestic mass-hostage rescue, where the preservation of hostage life is the paramount objective.

3.3. Modern Operations: A Return to Hybridity

Throughout the 2000s, Vympel was heavily engaged in the Second Chechen War and the long-running counter-insurgency that followed across the North Caucasus. The unit specialized in high-risk direct action missions, such as the successful capture of Chechen militant leader Salman Raduyev in March 2000.2

More recently, Vympel’s operational scope has expanded significantly, indicating a return to a more hybrid role. The unit has been documented participating in the 2022 full-scale invasion of Ukraine, engaged in high-intensity urban combat in locations such as Mariupol.34 This marks a significant deployment in a conventional military conflict. Furthermore, investigative reporting has linked operatives from the FSB’s “Department V” to clandestine foreign operations, including the 2019 assassination of a Georgian national in Berlin.11 This suggests that Vympel has not simply replaced its original mission but has added the domestic CT role to its broader repertoire. The Russian state appears to be leveraging the unit’s original PGU lineage and clandestine skillset for deniable foreign special activities, creating a dual-purpose force for both internal security and external power projection.

Section 4: The Modern Vympel Arsenal – A Fusion of Domestic and Foreign Systems

The contemporary small arms inventory of Directorate ‘V’ reflects a pragmatic, performance-driven procurement strategy. While heavily reliant on advanced Russian-made systems, the unit does not hesitate to adopt foreign materiel when it offers a distinct capability advantage. This results in a hybridized arsenal tailored for a wide spectrum of special operations.

4.1. Primary Weapon Systems (Assault Rifles & Carbines)

  • AK-105: This 5.45x39mm carbine is a favored primary weapon. As a shortened variant of the full-size AK-74M, its 314 mm barrel provides a superior balance of compactness for CQB and vehicle operations while retaining better ballistic performance than the older, shorter AKS-74U.1 It is frequently seen heavily customized with modern accessories.
  • AK-74M: The modernized, full-length 5.45x39mm assault rifle remains a standard-issue weapon. Its reliability is legendary, and Vympel operators typically outfit them with advanced optics, lasers, and furniture to meet modern operational standards.36
  • AK-12 / AK-15: As part of the Russian military’s “Ratnik” future soldier program, the newest generation of Kalashnikov rifles are being adopted. The AK-12 (5.45x39mm) and its 7.62x39mm counterpart, the AK-15, feature significantly improved ergonomics, adjustable stocks, and integrated Picatinny rails, finally bringing the Kalashnikov platform into the 21st century in its factory configuration.1

4.2. Specialized Small Arms (Suppressed & CQB)

  • AS Val & VSS Vintorez: These iconic, integrally suppressed weapon systems remain indispensable for stealth operations. Chambered for the heavy, subsonic 9x39mm cartridge, they offer quiet operation combined with excellent performance against body armor at typical engagement ranges. The AS Val serves as the compact assault rifle, while the VSS Vintorez is employed as a suppressed designated marksman rifle.1
  • PP-19-01 Vityaz-SN: This 9x19mm Parabellum submachine gun is the unit’s standard SMG. Based on the Kalashnikov operating system, it offers familiar handling, reliability, and a high degree of parts commonality with the unit’s primary rifles. It is effective, compact, and easily suppressed for CQB environments.1
  • ShAK-12: A more recent and highly specialized addition, the ShAK-12 is a bullpup assault rifle chambered in the massive 12.7x55mm subsonic cartridge. It is designed for maximum stopping power in CQB, capable of neutralizing targets behind cover or wearing heavy body armor with a single shot.36

4.3. Sidearms

  • Glock 17: The adoption of the Austrian Glock 17 is one of the most significant indicators of the unit’s pragmatic approach to equipment. It is highly valued for its exceptional reliability, ergonomic design, and the wide availability of aftermarket accessories. Russian special forces are known to use both Austrian-manufactured models and unlicensed copies produced domestically by the Orsis arms company.36
  • MP-443 Grach: The standard-issue Russian military pistol in 9x19mm, the Grach serves as a common sidearm, replacing the venerable Makarov PM.15
  • SR-1M Vektor: A powerful domestic pistol chambered in the potent 9x21mm Gyurza cartridge. It is favored by Russian special forces for its ability to fire specialized armor-piercing ammunition, offering greater penetration than standard 9x19mm rounds.1

4.4. Sniper and Designated Marksman Systems

  • SV-98: A Russian-made, bolt-action sniper rifle that provides a significant leap in precision over the older SVD. Typically chambered in 7.62x54mmR, it is based on a successful sporting rifle design and serves as the unit’s standard precision bolt-action platform.15
  • Orsis T-5000: Representing the pinnacle of modern Russian sniper rifle technology, the T-5000 has been adopted by the FSB under the designation “Tochnost” (Precision). Chambered in high-performance, long-range calibers like.338 Lapua Magnum, its accuracy and performance are competitive with top-tier Western sniper systems.46
  • Heckler & Koch MR308 (HK417): The use of this German-made 7.62x51mm NATO semi-automatic rifle as a designated marksman rifle is a clear example of procuring the best tool for the job. The MR308/HK417 platform is renowned for its accuracy, reliability, and superior ergonomics compared to domestic counterparts.36

4.5. Foreign Materiel Adoption

The composition of Vympel’s arsenal reveals two critical realities about the unit and the Russian defense industry. First, there is a clear and persistent gap in Russia’s ability to produce high-performance optics, aiming devices, and ergonomic accessories. The near-universal presence of Western-made sights (such as EOTech and Aimpoint), laser modules (like the AN/PEQ-15), and advanced furniture on Russian-made rifles is a tacit admission that domestic products do not meet the standards required by a Tier 1 special operations unit.1 This reliance on foreign electronics and accessories creates a potential supply chain vulnerability that can be exploited by international sanctions.

Second, the unit’s procurement philosophy is driven by pragmatism over dogma. The willingness to field Austrian pistols, German rifles, and potentially American carbines (as used by its sister unit, Alpha) demonstrates that operational effectiveness is the primary consideration.36 If a foreign weapon offers a tangible advantage—be it the Glock’s legendary reliability, the H&K’s precision, or the ergonomics of a Western accessory—the unit has the autonomy and budget to acquire and field it. This creates a hybridized and highly capable arsenal specifically tailored to the demands of its missions.

4.6. Ancillary Equipment

Beyond small arms, Vympel employs a range of specialized equipment. This includes heavy ballistic shields like the Vant-VM, often equipped with powerful strobing lights to disorient targets during entry.1 For breaching and delivering specialized munitions, the unit uses weapons like the GM-94 pump-action grenade launcher.1 Operations in low-light conditions are enabled by modern night vision systems, such as the Dedal-NV Gen 3+ binocular goggles.1

Table: Contemporary Directorate ‘V’ Small Arms

Weapon SystemTypeCaliberCountry of OriginKey Characteristics / Role
AK-105Carbine5.45×39mmRussiaStandard-issue carbine; balance of compactness and ballistics.
AK-74MAssault Rifle5.45×39mmRussiaModernized full-size rifle, often heavily customized.
AK-12 / AK-15Assault Rifle5.45×39mm / 7.62×39mmRussiaNew generation rifle; improved ergonomics, integrated rails.
AS ValSuppressed Assault Rifle9×39mmRussiaIntegrally suppressed for clandestine CQB and stealth operations.
PP-19-01 VityazSubmachine Gun9×19mm ParabellumRussiaStandard SMG; AK-based ergonomics, reliable, easily suppressed.
ShAK-12Bullpup Assault Rifle12.7×55mmRussiaHeavy caliber CQB weapon for defeating hard cover and body armor.
Glock 17Pistol9×19mm ParabellumAustriaPrimary sidearm; valued for exceptional reliability and ergonomics.
SR-1M VektorPistol9×21mm GyurzaRussiaHigh-power pistol capable of firing armor-piercing ammunition.
VSS VintorezSuppressed DMR9×39mmRussiaIntegrally suppressed for clandestine precision fire.
SV-98Sniper Rifle7.62×54mmRRussiaStandard bolt-action precision rifle.
Orsis T-5000Sniper Rifle.338 Lapua Magnum, etc.RussiaHigh-precision, long-range anti-personnel/anti-materiel system.
H&K MR308Designated Marksman Rifle7.62×51mm NATOGermanySemi-automatic precision rifle; valued for accuracy and reliability.

Section 5: The Future of Directorate ‘V’

5.1. Lessons from the “Transparent Battlefield” of Ukraine

The high-intensity conflict in Ukraine has created a new paradigm of warfare, often described as the “transparent battlefield.” The ubiquitous presence of unmanned aerial systems (UAS), from small FPV quadcopters to larger reconnaissance drones, has made traditional special operations tactics exceptionally hazardous.51 The historical advantage of units like Vympel—the ability to infiltrate and operate unseen—is now fundamentally challenged. Future clandestine movement, whether for domestic counter-terrorism or foreign sabotage, will be nearly impossible without sophisticated countermeasures. This reality forces a significant tactical evolution, shifting the emphasis from purely physical stealth to achieving electronic stealth. Vympel’s future success will be contingent on its ability to master the electromagnetic spectrum—blinding enemy sensors with electronic warfare (EW) while effectively employing its own UAS for intelligence, targeting, and direct action.52

5.2. Evolving Threats and a Hybrid Future

Directorate ‘V’ is unlikely to relinquish its domestic counter-terrorism and strategic site protection roles, as these remain foundational responsibilities of the FSB. However, the current geopolitical climate, characterized by renewed great-power competition, suggests that the unit’s utility in foreign “grey-zone” conflicts will expand.51 The heavy attrition suffered by Russia’s more conventional elite forces, such as the VDV (Airborne Forces) and Naval Infantry, during the war in Ukraine may increase the Kremlin’s reliance on highly skilled, surgical units like Vympel for critical future missions.54

Vympel is uniquely positioned to be a premier tool of Russian hybrid warfare. It possesses a unique combination of skills accrued over its four-decade history: the clandestine tradecraft of its KGB origins, the brutal experience of urban counter-terrorism from the North Caucasus, and now, direct combat experience in a high-intensity conventional war.2 This layered expertise allows the unit to scale its operations across the entire spectrum of conflict, from a single covert operative conducting an assassination to a fully equipped assault team supporting conventional army operations.

5.3. Technological and Organizational Imperatives

To maintain its elite status, Vympel must continue to integrate emerging technologies. Beyond UAS and EW, this will likely include the use of artificial intelligence for processing intelligence and aiding in target acquisition.51 Organizationally, the unit may need to develop dedicated sub-units focused on non-kinetic effects, such as cyber warfare and information operations, to support its physical missions.

A significant long-term challenge will be the unit’s reliance on foreign-made components, particularly high-end optics and electronics. International sanctions will make the procurement and maintenance of this equipment increasingly difficult. Vympel’s future effectiveness may therefore hinge on two factors: the ability of the Russian defense industry to finally produce domestic equivalents of sufficient quality, or the state’s ability to establish clandestine supply chains to circumvent sanctions.56

Conclusion

The four-decade history of Directorate ‘V’ is a study in transformation and resilience. Born as the KGB’s clandestine sword for a hypothetical World War III, Vympel survived the collapse of its state and the obsolescence of its mission, only to be nearly destroyed by political turmoil. It was reborn within the FSB as a shield against a new and vicious wave of domestic terrorism, a role it learned through the brutal lessons of Moscow and Beslan. Today, the unit has evolved again, emerging as a mature, dual-natured special operations force. It retains the DNA of its covert PGU origins while being fully versed in the realities of modern counter-terrorism and high-intensity warfare. Vympel now stands as a uniquely versatile instrument of Russian state power, capable of operating across the full spectrum of conflict. Its future will be defined by its capacity to adapt to the technological realities of the transparent battlefield and to serve the Kremlin’s objectives in an increasingly unstable world.


If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly contribute towards our continued reporting, please visit our funding page.


Sources Used

  1. FSB Vympel: Russia’s Secretive Unit – Grey Dynamics, accessed September 6, 2025, https://greydynamics.com/fsb-vympel-russias-secretive-unit/
  2. Vympel – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Vympel
  3. First Chief Directorate – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/First_Chief_Directorate
  4. KGB FOREIGN INTELLIGENCE ROLE – Russia / Soviet Intelligence Agencies, accessed September 6, 2025, https://irp.fas.org/world/russia/kgb/su0521.htm
  5. en.wikipedia.org, accessed September 6, 2025, https://en.wikipedia.org/wiki/Vympel#:~:text=The%20unit%20was%20formed%20in,activation%20in%20case%20of%20war.
  6. Team from Group SpetsNaz “Vympel” of KGB in Afghanistan, during the 80s. “Vympel” was part of Foreign Intelligence Directorate (1st Main Directorate) of the KGB and its main missions were Intelligence-Reconnaissance-Sabotage operations [1280X841] – Reddit, accessed September 6, 2025, https://www.reddit.com/r/MilitaryPorn/comments/hiouno/team_from_group_spetsnaz_vympel_of_kgb_in/
  7. Russian Special Forces | What Are Spetsnaz? – SOFREP, accessed September 6, 2025, https://sofrep.com/news/russian-special-forces-what-are-spetsnaz/
  8. “Vimpel” super soldiers of KGB. Documentary Film. English Subtitles – YouTube, accessed September 6, 2025, https://www.youtube.com/watch?v=fhSgKZY-YHw
  9. Spetsnaz GRU – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Spetsnaz_GRU
  10. SPETsNAZ: A Soviet Sabotage Threat. – DTIC, accessed September 6, 2025, https://apps.dtic.mil/sti/tr/pdf/ADA168375.pdf
  11. “V” For “Vympel”: FSB’s Secretive Department “V” Behind Assassination Of Georgian Asylum Seeker In Germany – bellingcat, accessed September 6, 2025, https://www.bellingcat.com/news/uk-and-europe/2020/02/17/v-like-vympel-fsbs-secretive-department-v-behind-assassination-of-zelimkhan-khangoshvili/
  12. What was the standard weapon of a Russian soldier in Afghanistan? – Quora, accessed September 6, 2025, https://www.quora.com/What-was-the-standard-weapon-of-a-Russian-soldier-in-Afghanistan
  13. List of equipment of the Soviet Ground Forces – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/List_of_equipment_of_the_Soviet_Ground_Forces
  14. List of military equipment used by the mujahideen during the Soviet–Afghan War – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/List_of_military_equipment_used_by_the_mujahideen_during_the_Soviet%E2%80%93Afghan_War
  15. List of equipment of the Russian Ground Forces – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/List_of_equipment_of_the_Russian_Ground_Forces
  16. What was the intended deign use of the VSS Vintorez & AS-Val & why has no one else done something similar? : r/WarCollege – Reddit, accessed September 6, 2025, https://www.reddit.com/r/WarCollege/comments/qxwnbr/what_was_the_intended_deign_use_of_the_vss/
  17. AS Val and VSS Vintorez – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/AS_Val_and_VSS_Vintorez
  18. The War in Afghanistan (1979-1989) History, Tactics, Weapons, accessed September 6, 2025, http://www.anistor.gr/english/enback/e001.htm
  19. Russian Spetsnaz Special Forces [RHS] – Steam Community, accessed September 6, 2025, https://steamcommunity.com/sharedfiles/filedetails/?l=finnish&id=895826156
  20. Russian Vympel and Alpha group spetsnaz operators overlooking the white house building during the Russian constitutional crisis, October 4, 1993. [2048 × 1355] : r/MilitaryPorn – Reddit, accessed September 6, 2025, https://www.reddit.com/r/MilitaryPorn/comments/1m3urhr/russian_vympel_and_alpha_group_spetsnaz_operators/
  21. Spetsnaz – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Spetsnaz
  22. greydynamics.com, accessed September 6, 2025, https://greydynamics.com/fsb-vympel-russias-secretive-unit/#:~:text=Originally%2C%20the%20unit%20prioritised%20covert,terrorism%20and%20enforcing%20nuclear%20safety.
  23. Moscow theater hostage crisis – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Moscow_theater_hostage_crisis
  24. The Moscow Theater Hostage Crisis: The Perpetrators, their Tactics, and the Russian Response – ResearchGate, accessed September 6, 2025, https://www.researchgate.net/publication/233509130_The_Moscow_Theater_Hostage_Crisis_The_Perpetrators_their_Tactics_and_the_Russian_Response
  25. Moscow Theater Hostage Crisis – Encyclopedia.pub, accessed September 6, 2025, https://encyclopedia.pub/entry/33143
  26. Hostage crisis in Moscow theater | October 23, 2002 – History.com, accessed September 6, 2025, https://www.history.com/this-day-in-history/october-23/hostage-crisis-in-moscow-theater
  27. Nord-Ost: Russia’s Medical Failure in the 2002 Crisis – ResearchGate, accessed September 6, 2025, https://www.researchgate.net/publication/376033725_Nord-Ost_Russia’s_Medical_Failure_in_the_2002_Crisis
  28. THE LONG SHADOW OF ―NORD OST‖ By David Satter, accessed September 6, 2025, https://www.files.ethz.ch/isn/162079/Satter_-_Shadow_of_Nord_Ost.pdf
  29. Beslan school siege – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Beslan_school_siege
  30. Beslan school attack | Siege, Massacre, & Aftermath – Britannica, accessed September 6, 2025, https://www.britannica.com/event/Beslan-school-attack
  31. Beslan: Counter-terrorism Incident Command: Lessons Learned …, accessed September 6, 2025, https://www.hsaj.org/articles/162
  32. 20 years after Beslan ‘special operation,’ a legacy of violence, lies and dead children persists – VOA, accessed September 6, 2025, https://www.voanews.com/a/years-after-beslan-special-operation-a-legacy-of-violence-lies-and-dead-children-persists/7773668.html
  33. TsSN FSB Management “V” (aka Vympel) SpetsNaz infront of a Grozny’s town sign. circa 2000. During Second Chechen Campaign. 19 August is Creation Date of Vympel within Foreign Intel Department of KGB 39 years ago. [1029X663] : r/MilitaryPorn – Reddit, accessed September 6, 2025, https://www.reddit.com/r/MilitaryPorn/comments/iczm4o/tssn_fsb_management_v_aka_vympel_spetsnaz_infront/
  34. FSB TssN Vympel Combat Footage in Mariupol around 2022 : r/SpecOpsArchive – Reddit, accessed September 6, 2025, https://www.reddit.com/r/SpecOpsArchive/comments/1f39ip9/fsb_tssn_vympel_combat_footage_in_mariupol_around/
  35. What is the purpose of Russia’s FSB Vympel? – Quora, accessed September 6, 2025, https://www.quora.com/What-is-the-purpose-of-Russias-FSB-Vympel
  36. Weapons of the Russian Special Forces | Navy SEALs, accessed September 6, 2025, https://navyseals.com/5283/weapons-of-the-russian-special-forces/
  37. AK105 capabilities || Kalashnikov Media, accessed September 6, 2025, https://en.kalashnikovgroup.ru/media/ttkh-2019/ttkh-ak-105
  38. AK-105 – Kalashnikov Group, accessed September 6, 2025, https://en.kalashnikovgroup.ru/catalog/boevoe-strelkovoe-oruzhie/avtomaty/avtomat-kalashnikova-ak105
  39. AK-74M – Kalashnikov Group, accessed September 6, 2025, https://en.kalashnikovgroup.ru/catalog/boevoe-strelkovoe-oruzhie/avtomaty/avtomat-kalashnikova-ak74m
  40. Kalashnikov AK-74M – Weaponsystems.net, accessed September 6, 2025, https://weaponsystems.net/system/1036-Kalashnikov+AK-74M
  41. PP-19-01 Vityaz – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/PP-19-01_Vityaz
  42. Russian FSB Operatives Love these Western Weapons – The National Interest, accessed September 6, 2025, https://nationalinterest.org/blog/buzz/russian-fsb-operatives-love-these-western-weapons-199147
  43. SV-98 Russian 7.62mm Sniper Rifle – ODIN, accessed September 6, 2025, https://odin.tradoc.army.mil/WEG/Asset/4a1628052f94de01def7d289a1c661c7
  44. SV-98 – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/SV-98
  45. Russian SV-98 – Sniper Central, accessed September 6, 2025, https://snipercentral.com/sv98.htm
  46. The KSSO: Russia’s Special Operations Command – Grey Dynamics, accessed September 6, 2025, https://greydynamics.com/the-ksso-russias-special-operations-command/
  47. ORSIS T-5000 – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Orsis_T-5000
  48. ORSIS T-5000 – Weaponsystems.net, accessed September 6, 2025, https://weaponsystems.net/system/700-AA05%20-%20T-5000
  49. ORSIS T-5000: New Name in Precision Rifles – Small Arms Defense Journal, accessed September 6, 2025, https://sadefensejournal.com/orsis-t-5000-new-name-in-precision-rifles/
  50. Operators from Directorate Alfa of the FSB Special Purpose Center, also known as Spetsgruppa Alfa, armed with AS Val assault rifles and MP-443 Grach sidearms during a hostage rescue exercise in 2009 [1513×1016] – Reddit, accessed September 6, 2025, https://www.reddit.com/r/MilitaryPorn/comments/1j7njb/operators_from_directorate_alfa_of_the_fsb/
  51. Russian Concepts of Future Warfare Based on Lessons from the Ukraine War | CNA, accessed September 6, 2025, https://www.cna.org/analyses/2025/08/russian-concepts-of-future-warfare-based-on-lessons-from-the-ukraine-war
  52. Russian Drone Innovations are Likely Achieving Effects of Battlefield Air Interdiction in Ukraine | Institute for the Study of War, accessed September 6, 2025, https://understandingwar.org/backgrounder/russian-drone-innovations-are-likely-achieving-effects-battlefield-air-interdiction
  53. Lessons from the Ukraine Conflict: Modern Warfare in the Age of Autonomy, Information, and Resilience – CSIS, accessed September 6, 2025, https://www.csis.org/analysis/lessons-ukraine-conflict-modern-warfare-age-autonomy-information-and-resilience
  54. Russian Offensive Campaign Assessment, September 1, 2025 | ISW, accessed September 6, 2025, https://www.understandingwar.org/backgrounder/russian-offensive-campaign-assessment-september-1-2025
  55. The West must study the success of Ukraine’s Special Operations Forces – Atlantic Council, accessed September 6, 2025, https://www.atlanticcouncil.org/blogs/ukrainealert/the-west-must-study-the-success-of-ukraines-special-operations-forces/
  56. Russia’s struggle to modernize its military industry | Identifying the weaknesses in Russia’s military-industrial complex – Chatham House, accessed September 6, 2025, https://www.chathamhouse.org/2025/07/russias-struggle-modernize-its-military-industry/identifying-weaknesses-russias-military

Red Dragon, Blue Response: An Operational Assessment of PLAAF Air Combat Strategies and USAF Counter-Maneuvers

The strategic landscape of the Indo-Pacific is being fundamentally reshaped by the modernization of the People’s Liberation Army (PLA). China’s military doctrine has undergone a profound evolution, shifting from a posture focused on “local wars” on its periphery to preparing for high-intensity, multi-domain conflict against a peer competitor. This transformation is driven by a central concept that redefines modern warfare: the PLA no longer views conflict as a contest between individual platforms but as a “systems confrontation” between opposing operational networks. At the heart of this doctrine is the goal of waging “systems destruction warfare,” a concept predicated on achieving victory not through the simple attrition of enemy forces, but by inducing the catastrophic collapse of an adversary’s ability to sense, communicate, command, and control its forces.

This doctrinal shift towards “informatized” and “intelligentized” warfare mandates the deep integration of cyber, space, information, and autonomous platforms into all PLA operations, with the People’s Liberation Army Air Force (PLAAF) positioned as a primary instrument for executing both kinetic and non-kinetic effects. The objective is to shape the battlespace and achieve a swift, decisive victory by paralyzing the enemy’s decision-making cycle.

In response, the United States has embarked on its own doctrinal revolution. The development of Agile Combat Employment (ACE) and Joint All-Domain Command and Control (JADC2) represents a fundamental redesign of the U.S. force posture and command architecture. ACE seeks to mitigate vulnerability through dispersal and maneuver, while JADC2 aims to create a resilient, decentralized network that can withstand and fight through a systems-destruction attack. This emerging strategic dynamic is therefore a clash of competing philosophies: China’s effort to find and destroy the centralized nodes of our system versus our effort to decentralize and make that system inherently resilient.

It is critical to recognize that the PLA is not blind to its own limitations. Internal PLA assessments acknowledge significant gaps in the complex integration and joint capabilities required to fully realize their system-of-systems concept. This self-awareness drives them to pursue asymmetric strategies designed to exploit perceived U.S. dependencies and vulnerabilities, rather than engaging in a symmetric, platform-for-platform fight. The following analysis identifies the five most probable and impactful air combat strategies a PLAAF commander will employ to execute this doctrine and outlines the corresponding USAF counter-maneuvers designed to defeat them.

Table 1: Comparative Analysis of Key 5th-Generation Air Combat Platforms

FeatureF-22 RaptorF-35 Lightning IIChengdu J-20 Mighty Dragon
Primary RoleAir Dominance / Offensive Counter-AirMultirole Strike Fighter / ISR & C2 NodeAir Superiority Interceptor / Forward Sensor & Strike Platform
Key Stealth FeaturesPlanform alignment, continuous curvature, internal weapons bays, advanced coatings, thrust-vectoring nozzles.Aligned edges, radar absorbent coating, internal weapons bays, reduced engine signature, embedded sensors.Blended fuselage, canard-delta configuration, diverterless supersonic inlets, internal weapons bays, serrated exhaust nozzles.
Avionics/Sensor SuiteAN/APG-77 AESA radar, advanced electronic warfare suite, sensor fusion. Modernization includes IRST pods and enhanced radar capabilities.AN/APG-81 AESA radar, Electro-Optical Targeting System (EOTS), 360° Distributed Aperture System (DAS), advanced sensor fusion.KLJ-5 AESA radar, chin-mounted IRST, passive electro-optical detection system with 360° coverage, advanced sensor fusion.
Standard Internal A/A Armament6x AIM-120 AMRAAM, 2x AIM-9 Sidewinder.4x AIM-120 AMRAAM.4x PL-15 (long-range), 2x PL-10 (short-range).
Network Integration Role“Hunter-Killer” that receives data from the network to find and destroy high-end threats. Limited data-out capability compared to F-35.“Quarterback of the Skies.” Gathers, fuses, and distributes data across the joint force, acting as a forward, survivable C2 and ISR node.Forward battle manager and sensor node. Uses LPI data links to cue non-stealthy shooters. J-20S variant enhances UAS control and C2.

Section 1: Strategy I – Systems Destruction: The Decapitation Strike

Adversary TTPs

The purest expression of the PLA’s “systems destruction warfare” doctrine is a multi-domain, synchronized decapitation strike executed in the opening moments of a conflict. The objective is not merely to inflict damage but to induce systemic paralysis by severing the command, control, and communications (C3) pathways that constitute the “brain and nervous system” of U.S. and allied forces. The PLAAF commander’s primary goal will be to collapse our ability to direct a coherent defense, creating chaos and decision-making paralysis that can be exploited by follow-on forces.

This attack will be meticulously planned and executed across multiple domains simultaneously. Kinetically, the PLA Rocket Force (PLARF) will launch waves of long-range precision-strike munitions, including theater ballistic and cruise missiles, against fixed, high-value C2 nodes such as Combined Air Operations Centers (CAOCs), major headquarters, and key satellite ground stations. Concurrently, the PLA’s Cyberspace Force (CSF) will unleash a barrage of offensive cyber operations designed to disrupt, degrade, and corrupt our command networks from within. This “information offense” is intended to destroy the integrity of our data and undermine trust in our own systems. In the electromagnetic spectrum, PLA electronic warfare (EW) assets will conduct widespread jamming of satellite communications and GPS signals, aiming to isolate deployed forces and sever their links to strategic command.

This physical and virtual assault will be augmented by operations in the space and cognitive domains. The PLA Aerospace Force (ASF) will likely employ a range of anti-satellite (ASAT) capabilities, from co-orbital kinetic kill vehicles to ground-based directed energy weapons, to blind our ISR satellites and degrade our PNT (positioning, navigation, and timing) constellations. Finally, a sophisticated cognitive warfare campaign will be launched, disseminating targeted disinformation to sow confusion among decision-makers and fracture the political will of the U.S. and its allies to respond effectively. This concept of “Social A2/AD” seeks to defeat a response before it can even be mounted by compromising the socio-political fabric of the target nation.

USAF Counter-Maneuver: The Resilient Network

The U.S. counter to a decapitation strategy is not to build thicker walls around our command centers but to eliminate them as single points of failure. The doctrinal response is rooted in the principles of decentralization and resilience, embodied by the Joint All-Domain Command and Control (JADC2) framework. JADC2 is designed to create a distributed, self-healing, and resilient network that can absorb an initial blow and continue to function effectively, moving both data and decision-making authority to the tactical edge. If a primary C2 node is destroyed, its functions are seamlessly transferred to subordinate or alternate nodes across the network, ensuring operational continuity.

In this construct, the F-35 Lightning II fleet becomes a pivotal asset. With its advanced sensor fusion capabilities and robust, low-probability-of-intercept data links, a flight of F-35s can function as a forward-deployed, airborne C2 and ISR node. These aircraft can collect, process, and disseminate a comprehensive battlespace picture to other assets in the theater, effectively acting as the “quarterback of the skies” even if their connection to rear-echelon command has been severed. They transform from being mere strike platforms into the distributed “brain” of the combat force.

This distributed C2 architecture will be supported by a multi-layered and redundant communications network, leveraging proliferated low-Earth orbit (LEO) satellite constellations, resilient line-of-sight data links, and emerging technologies designed to operate in a heavily contested electromagnetic environment. Critically, this technological resilience is matched by a philosophical shift in command: the empowerment of tactical leaders through the principle of “mission command.” A key enabler of Agile Combat Employment, mission command grants subordinate commanders the authority to make decisions based on their understanding of the higher commander’s intent, rather than waiting for explicit instructions from a centralized headquarters. This accelerates our decision-making cycle, allowing us to operate inside the adversary’s, and turns the PLA’s attack on our physical C2 infrastructure into a strike against a target that is no longer there.

Section 2: Strategy II – The Long-Range Attrition Campaign: Hunting the Enablers

Adversary TTPs

Recognizing that U.S. airpower in the vast Indo-Pacific theater is critically dependent on a logistical backbone of high-value airborne assets (HVAAs), a PLAAF commander will execute a long-range attrition campaign designed to cripple our operational endurance and reach. The primary targets of this campaign are not our frontline fighters, but the “enablers” that support them: aerial refueling tankers (KC-46, KC-135), ISR platforms (AWACS, Rivet Joint), and other specialized support aircraft. By destroying these assets, the PLA can effectively ground entire fighter wings and achieve area denial without needing to win a direct confrontation.

The key instrument for this strategy is the combination of the J-20 stealth fighter and the PL-15 very-long-range air-to-air missile (AAM). The PLAAF will employ J-20s to leverage their low-observable characteristics, allowing them to bypass our fighter screens and penetrate deep into what we consider “safe” airspace. Their mission is not to engage in dogfights with F-22s, but to achieve a firing solution on HVAAs operating hundreds of miles behind the main line of conflict.

The PL-15 missile, with its estimated operational range of 200-300 km and a dual-pulsed rocket motor that provides a terminal energy boost, is purpose-built for this task. The missile’s capability allows a J-20 to launch from well beyond the engagement range of our own fighters’ AAMs, creating a significant standoff threat. As demonstrated in the 2025 India-Pakistan conflict, the effective range of the PL-15 can be dangerously underestimated, providing adversary pilots with a false sense of security and leading to catastrophic losses. A salvo of PL-15s fired at a tanker formation forces a stark choice: abort the refueling mission and concede operational reach, or risk destruction. This targeting process will be enabled by a networked system of sensors, including over-the-horizon radars and satellites, which can provide cuing data to the J-20s, allowing them to remain passive and undetected for as long as possible.

USAF Counter-Maneuver: The Layered Shield

Countering this long-range threat requires extending our integrated air defense far beyond the immediate combat zone to protect the logistical and ISR assets that form the foundation of our air campaign. This cannot be a purely defensive posture; it must be a proactive, multi-layered shield designed to hunt the archer before he can release his arrow.

The F-22 Raptor is the centerpiece of this counter-maneuver. Its primary mission in this scenario is offensive counter-air, specifically to hunt and destroy the J-20s that threaten our HVAAs. With its superior stealth characteristics, supercruise capability, and powerful AN/APG-77 AESA radar, the F-22 is the asset best equipped to detect, track, and engage a J-20 before it can reach its PL-15 launch parameters. Continuous modernization of the F-22 fleet, including upgraded sensors, software, and potentially podded IRST systems, is therefore a strategic imperative to maintain this critical qualitative edge.

Operating in coordination with the F-22s, flights of F-35s will act as a forward “sanitizer” screen for the HVAAs. Using their powerful, networked sensors like the Distributed Aperture System (DAS) to passively scan vast volumes of airspace, the F-35s will serve as a persistent early warning layer. They can detect the faint signatures of inbound stealth threats and use their data links to vector F-22s for the intercept, creating a networked hunter-killer team. This layered defense will be augmented by dedicated fighter escorts for HVAAs, a departure from recent operational norms. Furthermore, we must accelerate the development of next-generation, low-observable tankers and unmanned ISR platforms that can operate with greater survivability in contested environments. Finally, HVAAs themselves must adopt more dynamic and unpredictable operational patterns, employing strict emissions control (EMCON) and randomized orbits to complicate the PLA’s targeting problem.

Section 3: Strategy III – The A2/AD Saturation Attack: Overwhelming the Bubble

Adversary TTPs

A central pillar of China’s military strategy is the creation of a formidable Anti-Access/Area Denial (A2/AD) capability designed to make it prohibitively costly for U.S. forces to operate within the First and Second Island Chains. In a conflict, a PLAAF commander will leverage this capability to execute a massive, synchronized, multi-domain saturation attack aimed at overwhelming the defensive capacity of a key operational hub, such as a Carrier Strike Group (CSG) or a major airbase like Kadena or Andersen.

The execution of this strategy will involve coordinated waves of aircraft designed to saturate defenses through sheer mass. J-20s, potentially operating in a “beast mode” configuration with externally mounted munitions, will sacrifice some stealth for overwhelming firepower to engage defending fighters and suppress air defenses. They will be followed by large formations of J-16 strike fighters and H-6 bombers launching salvos of advanced munitions, including the YJ-12 supersonic anti-ship cruise missile. These manned platforms will be augmented by swarms of unmanned combat aerial vehicles (UCAVs) and smaller drones, which will be used to confuse and saturate defensive radars, act as decoys, conduct electronic jamming, and carry out their own kinetic strikes against critical defensive systems like radar arrays and missile launchers.

This aerial assault will occur simultaneously with a multi-axis missile barrage from other domains. The PLA Rocket Force will launch salvos of DF-21D and DF-26 “carrier killer” anti-ship ballistic missiles (ASBMs), while PLA Navy warships and coastal defense batteries contribute their own volleys of cruise missiles. The entire operation is designed to present a defending force with an insurmountable number of threats arriving from multiple vectors—high and low, supersonic and subsonic, stealthy and conventional—in an extremely compressed timeframe. This complex strike package is enabled and coordinated by a vast C4ISR network of satellites, over-the-horizon radars, and forward-deployed sensors that provide the real-time targeting data necessary to find, fix, and engage U.S. forces.

USAF Counter-Maneuver: Agile Combat Employment (ACE)

The doctrinal counter to a saturation attack is not to build an impenetrable shield, but to deny the adversary a concentrated target. Agile Combat Employment (ACE) is the USAF’s operational concept for maneuver and dispersal, designed to fundamentally break the adversary’s targeting model by complicating it to the point of failure. ACE shifts air operations from large, centralized, and vulnerable Main Operating Bases (MOBs) to a distributed network of smaller, dispersed locations.

Instead of concentrating combat power on a few well-known airfields, ACE prescribes the dispersal of forces into smaller, more agile packages across a wide array of locations, including allied military bases, smaller contingency airfields, and even civilian airports in a “hub-and-spoke” model. This forces the PLA to divide its limited inventory of high-end munitions against dozens of potential targets rather than a few, drastically diluting the effectiveness of a saturation strike. ACE, however, is not static dispersal; it is a “proactive and reactive operational scheme of maneuver”. Force packages will constantly shift between these dispersed locations based on threat assessments and operational needs, making it impossible for the PLA to predict where U.S. combat power will be generated from at any given time.

This operational concept is enabled by two key innovations: Multi-Capable Airmen (MCAs) and pre-positioned materiel. MCAs are personnel trained in multiple skill sets outside their primary specialty, such as aircraft refueling, re-arming, and basic security. This allows a small, lean team to deploy to an austere location, rapidly service and relaunch aircraft, and then redeploy, minimizing the logistical footprint and personnel vulnerability at any single site. To support these rapid “turn and burn” operations, the “posture” element of ACE requires the pre-positioning of fuel, munitions, and essential equipment at these dispersed locations. By transforming our airpower from a fixed, predictable target into a distributed, mobile, and resilient force, ACE imposes immense cost, complexity, and uncertainty onto the adversary’s targeting cycle.

Section 4: Strategy IV – The Stealth Quarterback: J-20 as a Forward Battle Manager

Adversary TTPs

Beyond its role as an interceptor, the PLAAF is developing sophisticated tactics to leverage the J-20’s stealth and advanced sensors as a forward battle manager, enabling strikes by a network of non-stealthy platforms. This represents a mature application of their “network-centric warfare” concept, mirroring some of the most advanced U.S. operational constructs. The objective is to use the J-20 as a survivable, forward-deployed sensor to create a high-fidelity targeting picture deep within contested airspace, which is then used to direct standoff attacks from “arsenal planes.”

In this scenario, a small element of J-20s would penetrate U.S. and allied air defenses, employing strict EMCON procedures. They would use their suite of passive and low-emission sensors—including their AESA radar in a low-probability-of-intercept mode, their chin-mounted IRST, and their 360-degree electro-optical systems—to build a detailed, real-time picture of our force disposition without emitting signals that would betray their own position.

Once high-value targets are identified and tracked, the J-20 acts as a “quarterback,” using a secure, LPI data link to transmit precise targeting information to shooters operating outside the range of our primary air defenses. These shooters could be J-16 strike fighters laden with long-range air-to-air or anti-ship missiles, or even PLA Navy surface combatants. The introduction of the twin-seat J-20S variant is a significant force multiplier for this tactic. It is not a trainer; it is a dedicated combat aircraft where the second crew member can act as a weapons systems officer and battle manager, focused on processing sensor data, controlling unmanned “loyal wingman” drones, and managing the flow of targeting data to the network. This frees the pilot to concentrate on the demanding tasks of flying and surviving in a high-threat environment and signals a clear commitment to advanced, “intelligentized” manned-unmanned teaming.

USAF Counter-Maneuver: Shattering the Network

Defeating the “stealth quarterback” strategy requires attacking the entire kill chain, not just the platform itself. The counter-maneuver must focus on both detecting the J-20 and, just as critically, severing the fragile data links that connect the forward sensor to its shooters.

Detecting a low-observable platform like the J-20 requires a multi-spectrum, networked approach to counter-stealth. No single sensor is likely to maintain a consistent track. Instead, a composite track file will be built by fusing intermittent data from a distributed network of sensors. This network includes the F-35’s 360-degree DAS, the F-22’s powerful AESA radar, space-based infrared warning systems, and naval assets like Aegis-equipped destroyers. Once the network establishes a probable track of a hostile stealth aircraft, the F-22 Raptor is vectored to prosecute the target. As the premier air dominance fighter, the F-22’s unique combination of stealth, speed, and advanced avionics makes it the most effective platform for the lethal end of the counter-stealth mission: hunting and destroying other stealth aircraft.

Simultaneously, U.S. electronic warfare assets, such as the EA-18G Growler, will focus on jamming and disrupting the specific LPI data links the J-20 relies on to communicate with its network of shooters. If this link can be broken, the J-20 is transformed from a potent battle manager into an isolated sensor, unable to guide weapons to their targets. This EW assault will be complemented by the use of sophisticated decoys and deception techniques. By feeding the J-20’s advanced sensors with false targets and conflicting information, we can sow confusion, cause it to misdirect its shooters, or force it to emit more powerful radar signals to verify the data, thereby revealing its own position. This creates a complex battle of stealthy networks, where victory belongs to the side that can best manage its own signature while detecting and disrupting the enemy’s.

Section 5: Strategy V – Vertical Envelopment: The Airfield Seizure

Adversary TTPs

In a potential conflict over Taiwan, a high-risk, high-reward strategy available to the PLA is a vertical envelopment operation using airborne forces to rapidly seize critical infrastructure. The objective would be to capture key airports or seaports, bypassing Taiwan’s heavily defended coastal landing zones. This would create a strategic lodgment for the rapid introduction of follow-on forces and supplies, potentially unhinging the island’s entire defense plan. This is a fundamentally joint operation in which the PLAAF serves as the critical enabler.

The execution would involve the PLAAF’s growing fleet of Y-20 strategic transport aircraft, tasked with airlifting elements of the PLAAF Airborne Corps. These airborne units are no longer lightly armed paratroopers; they have been modernized into combined-arms brigades equipped with their own light armored fighting vehicles, artillery, and drones. Furthermore, they have benefited from Russian training in advanced airborne command and control systems, enhancing their operational effectiveness.

Such an operation is only feasible if the PLAAF can establish and maintain a temporary bubble of local air superiority over the designated landing zones. This implies that the preceding strategies—the decapitation strike and A2/AD saturation attack—must have been at least partially successful in degrading or suppressing Taiwanese and U.S. air defense capabilities. The slow and vulnerable Y-20 transports would require a heavy fighter escort of J-20s, J-16s, and J-10s to fend off interceptors, along with dedicated Suppression of Enemy Air Defenses (SEAD) and EW aircraft to neutralize any remaining surface-to-air missile (SAM) threats.

USAF Counter-Maneuver: Interdicting the Assault

Countering a vertical envelopment presents a time-critical targeting problem. The transport aircraft must be engaged and destroyed before they can land and disgorge their troops and equipment. Failure to interdict this force in transit could dramatically and perhaps decisively alter the course of the ground campaign.

The first priority is to engage the transport force at the maximum possible range. U.S. stealth fighters, the F-22 and F-35, will be tasked with penetrating the Chinese fighter escort screen to target the high-value Y-20s. The transports themselves are large, non-maneuvering targets, making them ideal for long-range AAM engagements. The success of this interdiction mission hinges on our ability to win the preceding battle for air superiority, creating windows of opportunity for our fighters to strike.

This mission cannot be undertaken by the USAF alone; it demands seamless coordination with allied forces. The Republic of China Air Force (ROCAF) and the Japan Air Self-Defense Force (JASDF) would form crucial layers of the defense, engaging the transport force as it approaches the island. Beyond air assets, U.S. Navy submarines can play a vital role by launching precision cruise missile strikes against the designated landing airfields on Taiwan. By cratering the runways, these strikes could prevent the Y-20s from landing even if they manage to penetrate the air defenses. Finally, if ISR capabilities permit, long-range strikes will be launched against the airfields on the mainland from which the airborne assault is being staged, aiming to destroy the transports on the ground before they can even take off. This brittle but powerful PLA operation represents a strategic center of gravity; its decisive defeat would have a disproportionate psychological and operational impact on the entire invasion effort.

Conclusion: Winning the Contest of Speed and Resilience

An air confrontation with the People’s Liberation Army Air Force will not be a simple contest of platform versus platform. It will be a dynamic and complex struggle between two highly capable, networked, and intelligent military systems, each guided by a distinct and coherent operational doctrine. The PLAAF’s strategies are not merely a collection of tactics; they are an integrated approach designed to execute a “systems destruction” campaign aimed at the core tenets of traditional American power projection: our centralized command, our logistical reach, and our forward-based posture.

Victory in this new era of air combat will not be determined by marginal advantages in aircraft performance or weapon range. It will be decided by which side can more effectively execute its core doctrine under the immense pressures of multi-domain conflict. The central questions are clear: Can the PLA successfully orchestrate the immense complexity of a synchronized, multi-domain “systems destruction” strike? And conversely, can the United States successfully execute a distributed, resilient, and agile “systems preservation” and counter-attack through the principles of ACE and JADC2?

The ultimate U.S. advantage in this contest lies not in any single piece of hardware, but in the synergistic combination of our advanced technology, our evolving doctrine, and our unmatched network of capable allies and partners. While the PLA has made enormous strides, it remains a force that would largely fight alone in a major conflict. In contrast, U.S. operational plans are deeply integrated with the formidable capabilities of allies such as Japan, Australia, and South Korea. This coalition creates a strategic dilemma for China that is exponentially more complex than a simple bilateral confrontation. The integrated power of this combined, networked, and resilient joint force remains our most potent and enduring advantage in the contest for air dominance.


If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly contribute towards our continued reporting, please visit our funding page.


Sources Used

  1. Mapping the Recent Trends in China’s Military Modernisation – 2025, accessed October 3, 2025, https://www.orfonline.org/research/mapping-the-recent-trends-in-china-s-military-modernisation-2025
  2. The Cognitive Crucible Episode #113 Jeff Engstrom on Chinese Systems Warfare, accessed October 3, 2025, https://information-professionals.org/episode/cognitive-crucible-episode-113/
  3. Gaining Victory in Systems Warfare: China’s Perspective on the U.S. …, accessed October 3, 2025, https://www.rand.org/pubs/research_reports/RRA1535-1.html
  4. Gaining Victory in Systems Warfare (China’s Perspective on the U.S.-China Military Balance) – RAND Corp : r/CredibleDefense – Reddit, accessed October 3, 2025, https://www.reddit.com/r/CredibleDefense/comments/11s2fnv/gaining_victory_in_systems_warfare_chinas/
  5. Finding the Right Model: The Joint Force, the People’s Liberation Army, and Information Warfare – Air University, accessed October 3, 2025, https://www.airuniversity.af.edu/JIPA/Display/Article/3371164/finding-the-right-model-the-joint-force-the-peoples-liberation-army-and-informa/
  6. Defense Primer: Agile Combat Employment (ACE) Concept – Congress.gov, accessed October 3, 2025, https://www.congress.gov/crs_external_products/IF/PDF/IF12694/IF12694.4.pdf
  7. Joint All-Domain Command and Control – Wikipedia, accessed October 3, 2025, https://en.wikipedia.org/wiki/Joint_All-Domain_Command_and_Control
  8. Defense Primer: Agile Combat Employment (ACE) Concept – Congress.gov, accessed October 3, 2025, https://www.congress.gov/crs-product/IF12694
  9. Summary of the Joint All-Domain Command and Control Strategy – DoD, accessed October 3, 2025, https://media.defense.gov/2022/Mar/17/2002958406/-1/-1/1/SUMMARY-OF-THE-JOINT-ALL-DOMAIN-COMMAND-AND-CONTROL-STRATEGY.pdf
  10. Lockheed Martin F-22 Raptor – Wikipedia, accessed October 3, 2025, https://en.wikipedia.org/wiki/Lockheed_Martin_F-22_Raptor
  11. F-22 Raptor – Lockheed Martin, accessed October 3, 2025, https://www.lockheedmartin.com/en-us/products/f-22.html
  12. About the F-35, accessed October 3, 2025, https://www.f35.com/f35/about.html
  13. 5th Gen Capabilities – F-35 Lightning II, accessed October 3, 2025, https://www.f35.com/f35/about/5th-gen-capabilities.html
  14. J-20 Mighty Dragon vs. the World: 5 Strengths That Make China’s Stealth Jet a Problem, accessed October 3, 2025, https://nationalsecurityjournal.org/j-20-mighty-dragon-vs-the-world-5-strengths-that-make-chinas-stealth-jet-a-problem/
  15. Chengdu J-20 – Wikipedia, accessed October 3, 2025, https://en.wikipedia.org/wiki/Chengdu_J-20
  16. Lockheed Eyes Upgrades For Oldest F-22 Raptors – The War Zone, accessed October 3, 2025, https://www.twz.com/air/lockheed-eyes-upgrades-for-oldest-f-22-raptors
  17. AIR COMBAT COMMAND – AF.mil, accessed October 3, 2025, https://www.388fw.acc.af.mil/Portals/103/F35A_LightningII_ACC%20Fact%20Sheet.pdf
  18. F-35A Lightning II > Air Force > Fact Sheet Display – AF.mil, accessed October 3, 2025, https://www.af.mil/About-Us/Fact-Sheets/Display/Article/478441/f-35a-lightning-ii/
  19. Does China’s J-20 Rival Other Stealth Fighters? | ChinaPower Project, accessed October 3, 2025, https://chinapower.csis.org/china-chengdu-j-20/
  20. F-35 Lightning II | Lockheed Martin, accessed October 3, 2025, https://www.lockheedmartin.com/en-us/products/f-35.html
  21. PL-15 (Thunderbolt-15) Chinese Active Radar-Guided Very Long Range Air-to-Air Missile, accessed October 3, 2025, https://odin.tradoc.army.mil/WEG/Asset/PL-15_(Thunderbolt-15)_Chinese_Active_Radar-Guided_Very_Long_Range_Air-to-Air_Missile
  22. GAO-23-105495, BATTLE MANAGEMENT: DOD and Air Force Continue to Define Joint Command and Control Efforts, accessed October 3, 2025, https://www.gao.gov/assets/gao-23-105495.pdf
  23. China’s J-20S Stealth Fighter Explained in 3 Words – The National Interest, accessed October 3, 2025, https://nationalinterest.org/blog/buzz/chinas-j-20s-stealth-fighter-explained-3-words-213676
  24. Anti-access/area denial – Wikipedia, accessed October 3, 2025, https://en.wikipedia.org/wiki/Anti-access/area_denial
  25. Chinese information operations and information warfare – Wikipedia, accessed October 3, 2025, https://en.wikipedia.org/wiki/Chinese_information_operations_and_information_warfare
  26. The Challenge of Dis-Integrating A2/AD Zone: How Emerging Technologies Are Shifting the Balance Back to the Defense – NDU Press, accessed October 3, 2025, https://ndupress.ndu.edu/Media/News/News-Article-View/Article/2106488/the-challenge-of-dis-integrating-a2ad-zone-how-emerging-technologies-are-shifti/
  27. Social Antiaccess/Area-Denial (Social A2/AD) – Marine Corps University, accessed October 3, 2025, https://www.usmcu.edu/Outreach/Marine-Corps-University-Press/MCU-Journal/JAMS-vol-12-no-1/Social-Antiaccess-Area-Denial-Social-A2-AD/
  28. Joint All-Domain Command and Control – JADC2 – SAIC, accessed October 3, 2025, https://www.saic.com/what-we-do/mission-it/jadc2
  29. Pathways to Implementing Comprehensive and Collaborative JADC2 – CSIS, accessed October 3, 2025, https://www.csis.org/analysis/pathways-implementing-comprehensive-and-collaborative-jadc2
  30. AGILE COMBAT EMPLOYMENT – Air Force Doctrine, accessed October 3, 2025, https://www.doctrine.af.mil/Portals/61/documents/AFDN_1-21/AFDN%201-21%20ACE.pdf
  31. PL-15 Abaddon Missile – CAT-UXO, accessed October 3, 2025, https://cat-uxo.com/explosive-hazards/missiles/pl-15-missile
  32. PL-15 – Wikipedia, accessed October 3, 2025, https://en.wikipedia.org/wiki/PL-15
  33. India Paid the Price for Underestimating China’s PL-15 Missiles …, accessed October 3, 2025, https://nationalinterest.org/blog/buzz/india-paid-price-underestimating-chinas-pl-15-missiles-ps-080625
  34. We Know Why the Air Force is Pouring Money Into the F-22 Raptor, accessed October 3, 2025, https://nationalsecurityjournal.org/we-know-why-the-air-force-is-pouring-money-into-the-f-22-raptor/
  35. China’s A2/AD strategy – Fly a jet fighter, accessed October 3, 2025, https://www.flyajetfighter.com/chinas-a2-ad-strategy/
  36. China’s Anti-Access/Area-Denial Strategy – TDHJ.org, accessed October 3, 2025, https://tdhj.org/blog/post/china-a2ad-strategy/
  37. China’s J-20 Flying in ‘Beast Mode’ Again with Eight Air-to-Air Missiles – The Aviationist, accessed October 3, 2025, https://theaviationist.com/2025/09/29/china-j-20-beast-mode-again/
  38. YJ-12 | Weaponsystems.net, accessed October 3, 2025, https://weaponsystems.net/system/1221-YJ-12
  39. China builds smaller but more capable air force – Defence Blog, accessed October 3, 2025, https://defence-blog.com/china-builds-smaller-but-more-capable-air-force/
  40. Attaining All-domain Control: China’s Anti-Access/Area Denial (A2/AD) Capabilities in the South China Sea – Pacific Forum, accessed October 3, 2025, https://pacforum.org/publications/issues-insights-issues-and-insights-volume-25-wp-2-attaining-all-domain-control-chinas-anti-access-area-denial-a2-ad-capabilities-in-the-south-china-sea/
  41. Agile Combat Employment Interoperability and Integration – Air University, accessed October 3, 2025, https://www.airuniversity.af.edu/Wild-Blue-Yonder/Articles/Article-Display/Article/4008841/agile-combat-employment-interoperability-and-integration/
  42. Agile Combat Employment – Joint Air Power Competence Centre, accessed October 3, 2025, https://www.japcc.org/articles/agile-combat-employment/
  43. CSAF signs Agile Combat Employment doctrine note – Joint Base Charleston, accessed October 3, 2025, https://www.jbcharleston.jb.mil/News/Article/2887386/csaf-signs-agile-combat-employment-doctrine-note/
  44. Russia quietly arming China’s paratroopers for Taiwan fight – Asia Times, accessed October 3, 2025, https://asiatimes.com/2025/10/russia-quietly-arming-chinas-paratroopers-for-taiwan-fight/

Russia is helping prepare China to attack Taiwan, documents suggest, accessed October 3, 2025, https://www.washingtonpost.com/world/2025/09/26/russia-china-weapons-sales-air-assault/

From Frogmen to Commandos: An Analytical History of the Philippine Naval Special Operations Command

This report provides a comprehensive analysis of the Philippine Naval Special Operations Command (NAVSOCOM), documenting its evolution from a small, specialized unit into a command-level strategic asset for the Armed Forces of the Philippines (AFP). The command’s history is a direct reflection of the Philippines’ shifting national security priorities, beginning with a focus on maritime law enforcement and internal security, maturing through decades of intense counter-insurgency and counter-terrorism campaigns, and now pivoting towards external territorial defense.

Established in 1956 as the Underwater Operations Team (UOT), the unit’s initial mandate was limited to traditional combat diver and underwater demolition tasks. However, driven by the operational demands of persistent internal conflicts, its mission set, organizational structure, and capabilities expanded significantly over the subsequent decades. This culminated in its elevation to a full command in 2020, granting it co-equal status with major AFP units and formally recognizing its strategic importance. Throughout its history, NAVSOCOM’s doctrine, training, and equipment have been profoundly influenced by its close relationship with United States Naval Special Warfare, resulting in a high degree of interoperability with its U.S. Navy SEAL counterparts.

Today, NAVSOCOM stands as a battle-hardened, multi-mission special operations force and a key component of the AFP’s Joint Special Operations Command (JSOC). Its operators are equipped with a modern arsenal of specialized small arms, differentiating them from conventional forces. As the AFP implements its ambitious ‘Re-Horizon 3′ modernization program and the new Comprehensive Archipelagic Defense Concept (CADC), NAVSOCOM is poised for another significant transformation. Its future role is projected to expand beyond direct action and counter-terrorism to become a critical enabler for the Philippines’ archipelagic defense strategy, undertaking missions such as special reconnaissance, support to subsurface warfare, and anti-access/area denial (A2/AD) operations in a complex maritime environment.

Section 1: Genesis and Organizational Evolution (1956-Present)

The organizational development of the Philippine Naval Special Operations Command is a direct barometer of the nation’s security challenges. Its progression from a small team focused on basic maritime tasks to a full-fledged command mirrors the Philippines’ journey from post-war maritime policing to fighting prolonged internal insurgencies and, more recently, confronting state-based threats in its maritime domain.

1.1 The Underwater Operations Team: Forging a Capability in the Post-War Navy (1956-1960s)

The conceptual origins of NAVSOCOM lie in the operational imperatives of the newly formed Philippine Navy in the mid-1950s. The unit was conceived by then-Lieutenant Ramon N. Baluyot during naval operations in the Sulu Sea Frontier, a region rife with dissidence and piracy.1 This context highlights that the requirement was born from a tangible internal security and maritime law enforcement need.

Based on Headquarters Philippine Navy (HPN) General Orders No. 17, the Underwater Operations Team (UOT) was officially activated on November 5, 1956.1 The initial force was modest, comprising just one officer and six enlisted personnel.1 From its inception, the unit’s doctrinal foundation was uniquely hybrid. It was patterned after both the United States Navy’s Underwater Demolition Teams (UDT), the direct predecessors to the SEALs specializing in hydrographic reconnaissance and demolition, and Italy’s famed

Decima Flottiglia MAS, renowned for unconventional warfare and sabotage against naval targets.1 This dual influence suggests a foundational vision that was more ambitious than a simple combat diver team, establishing a conceptual framework that embraced both conventional support and asymmetric warfare. This foresight facilitated its later, seamless transition into a full-spectrum special operations force.

The UOT’s initial mission set was clearly defined, focusing on underwater operations in support of the fleet, including underwater explosive ordnance disposal (EOD), mine countermeasures, salvage operations, and search and rescue.2 An early indicator of the Navy’s commitment to this specialized capability was the procurement in 1961-62 of three Italian-made Cosmos CE2F/X60 Swimmer Delivery Vehicles (SDVs), a sophisticated technology for the era.1

1.2 A Period of Growth and Redesignation (1970s-2000s)

As the AFP became more deeply embroiled in combating the communist insurgency led by the New People’s Army (NPA) and the Islamic separatist movements in Mindanao, the UOT’s role and structure evolved to meet these expanding threats. This period was characterized by a series of redesignations that reflected the unit’s growing size and broadening mission scope beyond purely underwater tasks.

The key organizational changes were 1:

  • Underwater Operations Unit (UOU): Redesignated in 1959, marking an expansion from a team to a formal unit.
  • Underwater Operations Group (UOG): Evolved into a group-level organization in the years following 1964.
  • Special Warfare Group (SWAG): Renamed in 1983, a significant shift in nomenclature indicating a formal expansion into unconventional warfare.
  • Naval Special Warfare Group (NSWG): Adopted in the 1990s, aligning its designation more closely with its U.S. counterpart, the Naval Special Warfare Command.
  • Naval Special Operations Group (NAVSOG): Redesignated on May 30, 2005.

This progression of names is not merely administrative; it tracks the doctrinal shift from a specialized support element to a dedicated special operations force capable of operating across the domains of sea, air, and land—the core tenet of a SEAL unit.

1.3 The Birth of a Command: NAVSOCOM (2020-Present)

The most significant organizational milestone occurred on July 7, 2020, when the unit was elevated to the Naval Special Operations Command (NAVSOCOM).2 This was a landmark event, separating NAVSOCOM from the administrative control of the Philippine Fleet and establishing it as a regular combat support command. This structural change formally recognized the unit as a strategic asset for the entire AFP, capable of independent planning and operations across the full spectrum of conflict.

The current command structure is headquartered at Naval Base Heracleo Alano, Sangley Point, Cavite, and comprises six functional Type Groups 2:

  • SEAL Group (SEALG)
  • Special Boat Group (SBG)
  • Naval Diving Group (NDG)
  • Naval Explosive Ordnance Disposal Group (NEODG)
  • Combat Service Support Group (CSSG)
  • NAVSPECOPNS Training and Doctrine Center (NSOTDC)

Operationally, NAVSOCOM is a component of the AFP Joint Special Operations Command (JSOC). This places it within a unified structure alongside the AFP’s other elite units, including the Philippine Army’s Light Reaction Regiment, Special Forces Regiment, and 1st Scout Ranger Regiment, and the Philippine Marine Corps’ Marine Special Operations Group (MARSOG).2 This integration ensures that NAVSOCOM’s unique maritime and riverine capabilities can be effectively synchronized with the land-based expertise of its sister services during joint operations.

Section 2: The Evolution of Doctrine, Tactics, and Operations

NAVSOCOM’s tactical and operational history has been forged in the crucible of real-world combat, evolving from a niche support element to a versatile and decisive special operations force. Its doctrinal development has been shaped by decades of counter-insurgency, high-intensity urban counter-terrorism, and a deep, continuous partnership with U.S. Naval Special Warfare.

2.1 Early Engagements: From Underwater Demolition to Counter-Insurgency Support (1960s-1980s)

In its early years as the UOU, the unit’s primary tactical function was to support larger conventional amphibious operations conducted by the Philippine Marine Corps. This role was demonstrated in two key operations in 1973 against Moro insurgents. During Operation Pamukpok (July 1973) and Operation Batikus (September 1973), UOU teams were attached to Marine landing forces, tasked with conducting pre-assault reconnaissance and clearing underwater obstacles, textbook UDT missions.1

However, the unit quickly demonstrated its capacity for more complex direct-action missions. A notable example occurred on March 5, 1975, during an amphibious landing in Tuburan, Basilan. A UOU team led by Ensign Renato A. Caspillo was tasked with a deep penetration and reconnaissance mission up the Kandiis River to locate and destroy an enemy arms cache. After successfully completing the mission, the team came under heavy fire during withdrawal. Ensign Caspillo was wounded but continued to provide covering fire, ordering the recovery boat to “Recover all Divers, never mind me.” His actions, which saved his team at the cost of his own life, exemplified the combat leadership and direct-action capability that would become hallmarks of the unit.1

2.2 The Counter-Terrorism Crucible: Zamboanga and Marawi (1990s-2017)

The battles for Zamboanga City in 2013 and Marawi City in 2017 served as tactical and doctrinal inflection points for the command. These prolonged, high-intensity urban conflicts forced NAVSOCOM (then NAVSOG) to rapidly evolve beyond its traditional maritime skill set and develop proficiency in sustained urban warfare.

  • Zamboanga Siege (2013): When hundreds of Moro National Liberation Front (MNLF) fighters infiltrated and occupied coastal districts of Zamboanga City, NAVSOG was among the first elite units to respond. The initial engagement of the crisis was a sea encounter between rebels and operators from Naval Special Operations Unit Six (NAVSOU 6).7 Subsequently, four NAVSOG units were deployed to establish a naval blockade, preventing MNLF reinforcements from arriving by sea, and to engage in house-to-house fighting alongside the Army’s Light Reaction Battalion (LRB).7 Operating under the Joint Special Operations Group (JSOG), NAVSOG’s expertise in waterborne operations complemented the LRB’s premier close-quarters combat (CQC) skills, proving the value of joint SOF operations in a complex urban-littoral environment.9
  • Battle of Marawi (2017): The five-month siege of Marawi by thousands of ISIS-affiliated militants presented an even greater challenge. While Army and Marine units bore the brunt of the block-by-block clearing, NAVSOCOM provided a unique and strategically critical capability: control of Lake Lanao.2 Operators patrolled the lake, which bordered the main battle area, interdicting enemy fighters attempting to use the waterway to escape, resupply, or reinforce their positions.11 This proactive application of core maritime skills to solve a critical problem in a land-locked, urban campaign demonstrated remarkable adaptability. This experience created a valuable and rare doctrine for riverine and littoral control in support of large-scale urban combat, a capability few special operations forces in the world possess.

2.3 Modern Engagements: Maritime Security and Territorial Defense (2018-Present)

Following the conclusion of major combat operations in Marawi, NAVSOCOM’s focus began to pivot in alignment with the AFP’s broader shift from internal security to external territorial defense. This has led to the command’s employment in a new and strategically significant role: asserting Philippine sovereignty in the contested waters of the South China Sea.

This shift is most evident in the use of NAVSOCOM operators and their Rigid-Hulled Inflatable Boats (RHIBs) during resupply missions to the BRP Sierra Madre, the Philippine outpost at Second Thomas Shoal (Ayungin Shoal).13 Historically, such missions were conducted by civilian or Philippine Coast Guard vessels. The deliberate inclusion of naval special forces marks a militarization of the Philippine response to gray zone coercion tactics. This new mission is not a traditional special operation; it is a high-visibility sovereignty patrol where the primary objective is presence and resolve. This places operators in a high-stakes environment where tactical actions have immediate geopolitical consequences, requiring a different mindset focused on rules of engagement, de-escalation, and operating under intense international scrutiny. The high physical and political risks of this new role were underscored in a June 2024 incident where a NAVSOCOM operator was severely injured during a confrontation with the China Coast Guard.2

Concurrently, the command continues to refine its tactics for littoral interdiction and the protection of critical maritime infrastructure, such as offshore gas and oil platforms, a key component of national economic security.13

2.4 The U.S. Influence: Joint Training and Interoperability

The evolution of NAVSOCOM’s doctrine and tactics cannot be understood without acknowledging the profound and continuous influence of its U.S. counterparts. The unit is officially described as being “heavily influenced by the United States Navy SEALs”.2 This relationship is maintained and strengthened through a consistent tempo of advanced, bilateral training exercises.

Annual exercises such as Balikatan and more specialized Joint Combined Exchange Training (JCET) events are critical for honing advanced skills and ensuring interoperability.14 These engagements provide NAVSOCOM operators with opportunities to train alongside U.S. Navy SEALs in complex scenarios, including maritime counter-terrorism, advanced CQC, small unit tactics in jungle and maritime settings, and specialized tasks like Gas and Oil Platform (GOPLAT) recovery.14 The result of this decades-long partnership is a high degree of shared tactics, techniques, and procedures (TTPs), allowing for seamless integration during combined operations and ensuring that NAVSOCOM’s capabilities remain aligned with the highest international special operations standards.14

Section 3: Armament and Technology: From Frogman’s Kit to Tier 1 Arsenal

NAVSOCOM’s small arms inventory reflects its status as an elite special operations force, demonstrating a procurement philosophy that prioritizes best-in-class, specialized platforms over the standard-issue equipment of the wider AFP. This approach ensures a qualitative edge in high-risk operations and reflects the strong influence of its U.S. counterparts. The command’s arsenal has evolved from utilizing modified service rifles to fielding a suite of modern weapons comparable to those used by top-tier international SOF units.

3.1 Legacy Systems and the Shift to Modern Platforms

In its early days, the unit relied on specialized equipment like the Cosmos SDVs for clandestine underwater insertion.1 Its small arms were largely drawn from the standard AFP inventory, primarily the M16A1 rifle and the M14 battle rifle. A crucial early development, born out of operational need and fiscal constraints, was the creation of the Marine Scout Sniper Rifle (MSSR). This program took existing M16A1 receivers and heavily modified them with new barrels, triggers, and optics to create an effective 5.56mm designated marksman rifle, demonstrating an early drive for specialized precision firepower.17

3.2 Current Small Arms Inventory: A Detailed Analysis

NAVSOCOM’s current arsenal is a mix of high-end imported firearms and proven, indigenously adapted systems. This pragmatic approach provides operators with reliable, state-of-the-art tools tailored to their diverse mission set.

3.2.1 Primary Carbines

The command employs a two-tiered approach to its primary carbines. This allows it to field premier platforms for specialized tasks while maintaining logistical commonality with the broader AFP.

  • Heckler & Koch HK416: This is a primary assault rifle for NAVSOCOM SEAL teams.2 Manufactured in Germany, the HK416 is a 5.56x45mm NATO carbine that utilizes a short-stroke gas piston system, a design renowned for its high reliability, especially in maritime environments and when suppressed. Its adoption signifies a deliberate choice to align with premier SOF units like U.S. DEVGRU and Delta Force, which favor the platform. NAVSOCOM is known to use variants with both 11-inch and 14.5-inch barrels, allowing for optimization between maneuverability in CQC and effective range.19
  • Remington R4: This carbine, based on the M4A1 platform, is also in service with the unit.2 As a U.S.-made, direct impingement gas-operated rifle chambered in 5.56x45mm NATO, the R4 (specifically the R4A3 model) was part of a major AFP-wide acquisition to replace aging M16 rifles.23 NAVSOCOM’s use of this platform ensures interoperability and shared logistics with conventional forces, though their carbines are typically outfitted with a higher grade of accessories, including advanced optics, aiming lasers, and illuminators.

3.2.2 Sidearms

  • Glock 17 Gen4: The standard sidearm for NAVSOCOM is the Glock 17 Gen4.19 This Austrian-made, striker-fired pistol chambered in 9x19mm Luger was adopted as part of a large-scale, AFP-wide pistol acquisition project that replaced the venerable M1911.25 Its selection of a polymer-framed, high-capacity, and exceptionally reliable pistol aligns with global military and law enforcement standards.26

3.2.3 Support Weapons

  • M60E4/E6 General Purpose Machine Gun (GPMG): For squad-level suppressive fire, NAVSOCOM utilizes modernized variants of the American M60 machine gun, chambered in 7.62x51mm NATO.2 The M60E4 and the more recent M60E6 are significant improvements over the Vietnam-era design, featuring enhanced reliability, reduced weight, improved ergonomics, and integrated Picatinny rails for mounting optics and other accessories.29 This weapon provides operators with a proven and powerful medium machine gun capability that is lighter than the M240, the standard GPMG in U.S. service.

3.2.4 Precision Rifles

NAVSOCOM’s inventory of precision rifles demonstrates a sophisticated, multi-platform approach to long-range engagement, blending a high-end semi-automatic system with a versatile, locally-developed rifle.

  • Knight’s Armament Company M110A2 SASS: The M110A2 Semi-Automatic Sniper System is a key precision weapon for the command.2 This U.S.-made rifle is chambered in 7.62x51mm NATO and provides the ability to engage multiple targets or deliver rapid follow-up shots, a critical advantage in both urban combat and maritime interdiction scenarios where targets may be fleeting. The A2 is an improved variant of the standard M110 SASS.32
  • Marine Scout Sniper Rifle (MSSR): NAVSOCOM continues to use a specialized variant of the indigenously developed MSSR.17 While based on a modified M16A1 receiver, the rifle is a purpose-built precision weapon. The variant developed for NAVSOCOM features a 20-inch barrel, shorter than the 24-inch barrel of the Marine Corps version, optimizing it for maneuverability.17 Chambered in 5.56x45mm NATO, it provides a lightweight, cost-effective solution for designated marksman roles at intermediate ranges common in archipelagic and jungle environments. The
    Night Fighting Weapon System (NFWS), a derivative with an integral sound suppressor, was also developed for and issued to NAVSOCOM and Marine Force Recon units.18

3.3 Specialized Equipment: Enablers of Modern Naval Special Warfare

Beyond firearms, NAVSOCOM employs critical technology that acts as a force multiplier.

  • Night Vision Devices (NVDs): The ability to operate effectively at night is crucial. The command uses standard PVS-14 monoculars and PVS-31 binocular systems. Notably, some operators have been observed with advanced Elbit Systems XACT NVGs, indicating an effort to acquire and field cutting-edge night-fighting equipment.2
  • Watercraft: Mobility and insertion capability are provided by a fleet of specialized watercraft. The acquisition of 10 new fast boats in December 2020 significantly enhanced the capabilities of the Special Boat Group.2 These, along with RHIBs, are essential for missions ranging from coastal raids to the high-profile resupply operations in the South China Sea.13

Section 4: The Future of NAVSOCOM: Projections and Analysis

The Philippine Naval Special Operations Command is at a strategic crossroads. Driven by a fundamental shift in national defense policy and underwritten by the most ambitious military modernization program in the nation’s history, NAVSOCOM is poised to evolve from a force primarily focused on internal security to a critical instrument of external territorial defense. Its future roles, tactics, and technology will be shaped by the geopolitical realities of the Indo-Pacific and the specific requirements of safeguarding a vast archipelago.

4.1 The Impact of ‘Re-Horizon 3’ Modernization

In January 2024, the Philippine government approved “Re-Horizon 3,” a revamped and expanded 10-year modernization plan for the AFP with a budget of approximately US$35 billion.37 This program prioritizes the development of a credible defense posture and a self-reliant defense industry. While specific procurement lines for NAVSOCOM are not publicly detailed, the program’s overarching focus on acquiring advanced naval, air, and C4ISTAR (Command, Control, Communications, Computers, Intelligence, Surveillance, Target Acquisition, and Reconnaissance) capabilities will create a new operational ecosystem in which NAVSOCOM’s skills will be indispensable.39 The acquisition of new frigates, offshore patrol vessels, submarines, and shore-based anti-ship missile systems will fundamentally change how the AFP operates, and NAVSOCOM will be a key enabler for these new platforms.

4.2 Evolving Roles in Archipelagic Defense

The strategic guidance for this modernization is the new Comprehensive Archipelagic Defense Concept (CADC), which formally shifts the AFP’s focus from internal counter-insurgency to external defense of the nation’s territory and exclusive economic zone (EEZ).39 Within this framework, NAVSOCOM’s future missions are likely to expand and evolve significantly. The command is on a trajectory to transform from a primarily direct-action force into a critical enabler for the AFP’s joint, multi-domain A2/AD strategy. Its future value will be measured less by kinetic actions alone and more by its ability to provide clandestine access, intelligence, and targeting for other strategic assets.

Potential new and expanded roles include:

  • Maritime Special Reconnaissance (SR): NAVSOCOM is the ideal force to conduct clandestine surveillance and reconnaissance of contested maritime features and adversary naval movements within the Philippine archipelago. Its operators can be inserted stealthily via sea (diving, SDVs, fast boats) or air to establish observation posts, place unattended ground sensors, and provide real-time intelligence to the fleet and joint headquarters.15 This “eyes-on-target” capability will be vital for the effective employment of the Marines’ new shore-based BrahMos anti-ship missile batteries.
  • Support to Subsurface Warfare: The planned acquisition of a submarine force under Re-Horizon 3 will create a host of new requirements for which NAVSOCOM is uniquely suited.39 These missions could include submarine search and rescue, and clandestine insertion and extraction of personnel or equipment via submarine, a classic SEAL mission set.
  • Anti-Access/Area Denial (A2/AD) Operations: In a conflict scenario, NAVSOCOM could be tasked with conducting direct action against adversary assets to deny them freedom of movement within Philippine waters. This could include sabotage of naval platforms, seizure of key maritime infrastructure, and securing vital chokepoints and sea lanes of communication.40

4.3 Technological Integration and Future Challenges

To execute these future missions, NAVSOCOM will need to integrate emerging military technologies. Based on global special operations trends, this will likely include unmanned systems, such as small Unmanned Aerial Vehicles (UAVs) for team-level overwatch and Unmanned Surface Vessels (USVs) for reconnaissance and decoy operations.45 The integration of AI-driven tools for processing intelligence data gathered during SR missions will also be a key force multiplier.47

However, the realization of this future vision is not without significant challenges. The greatest threat to NAVSOCOM’s development is not a specific adversary, but the programmatic and budgetary risks inherent in the AFP modernization program. The program has a history of being delayed and underfunded due to shifting political priorities and national fiscal constraints.37 NAVSOCOM’s future roles are symbiotically linked to the success of the entire Re-Horizon 3 plan; it cannot provide support to a submarine force that is never procured or provide targeting data for missile systems that are not fielded. A failure in the broader program would risk relegating NAVSOCOM to its legacy counter-terrorism role, limiting its strategic potential.

Furthermore, as equipment becomes more technologically advanced, the human factor remains paramount. The command must continue to invest heavily in its rigorous selection and training pipeline to produce operators who not only possess the physical and mental toughness to be a SEAL but also the technical acumen to operate and maintain complex modern systems in high-stress environments.47

Conclusion

The Philippine Naval Special Operations Command has traversed a remarkable evolutionary path, from its humble origins as a seven-man Underwater Operations Team to its current status as a command-level component of the Armed Forces of the Philippines. Forged in the fires of decades-long internal conflicts and honed by a deep and enduring partnership with United States Naval Special Warfare, NAVSOCOM has proven itself to be a highly professional, combat-effective, and strategically vital asset for the Republic of the Philippines.

The command’s history of adaptation—from amphibious support to jungle warfare, and from high-intensity urban combat in Zamboanga and Marawi to gray zone confrontations in the South China Sea—demonstrates a culture of resilience and innovation. Its pragmatic approach to armament, blending top-tier imported weapons with effective, indigenously developed systems, further underscores its maturity as a special operations force.

Today, NAVSOCOM stands at the precipice of its most significant transformation. As the Philippines shifts its defense posture to address the challenges of external territorial security under the Comprehensive Archipelagic Defense Concept, NAVSOCOM will be central to this new strategy. Its future will be defined not only by its proven capacity for direct action but by its expanding role as a key enabler of joint, multi-domain operations, providing the critical intelligence, reconnaissance, and clandestine access required for the nation’s defense in the 21st century. The successful realization of this future will depend on sustained national commitment to modernizing the entire armed forces, ensuring that this elite unit has the strategic assets to support and the advanced tools to maintain its edge.

Appendix

Table 1: Current Known Small Arms of the Philippine Naval Special Operations Command (NAVSOCOM)

Weapon SystemTypeCaliberCountry of OriginPrimary Role / Remarks
Heckler & Koch HK416Assault Rifle / Carbine5.56x45mm NATOGermanyStandard primary weapon for SEAL teams. Gas-piston system offers high reliability in maritime environments. Used in 11″ and 14.5″ barrel configurations.19
Remington R4Assault Rifle / Carbine5.56x45mm NATOUnited StatesSecondary primary weapon, ensuring commonality with standard AFP forces. Based on the M4A1 platform with a direct impingement gas system.19
Glock 17 Gen4Semi-Automatic Pistol9x19mm LugerAustriaStandard-issue sidearm for all operators. A high-capacity, striker-fired, polymer-framed pistol adopted across the AFP.19
M60E4/E6General Purpose Machine Gun7.62x51mm NATOUnited StatesPrimary squad automatic weapon. Modernized variants of the M60 provide a relatively lightweight medium machine gun capability with improved reliability and ergonomics.2
KAC M110A2 SASSSemi-Automatic Sniper System7.62x51mm NATOUnited StatesPrimary long-range precision rifle. Valued for its ability to deliver rapid, accurate follow-up shots against multiple or moving targets.2
Marine Scout Sniper Rifle (MSSR)Designated Marksman Rifle5.56x45mm NATOPhilippinesIndigenous precision rifle based on a modified M16A1. NAVSOCOM uses a variant with a 20″ barrel for intermediate-range engagements. The integrally suppressed NFWS variant is also used.17

If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly contribute towards our continued reporting, please visit our funding page.


Sources Used

  1. A Brief History of the Philippine Navy Seals From the Underwater Operations Team to the Naval Special Operations Command – The Maritime Review, accessed September 6, 2025, https://maritimereview.ph/a-brief-history-of-the-philippine-navy-seals-from-the-underwater-operations-team-to-the-naval-special-operations-command/
  2. Naval Special Operations Command – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Naval_Special_Operations_Command
  3. United States Naval Special Warfare Command – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/United_States_Naval_Special_Warfare_Command
  4. Philippine Naval Special Warfare Group (NSWG) – Boot Camp & Military Fitness Institute, accessed September 6, 2025, https://bootcampmilitaryfitnessinstitute.com/elite-special-forces/philippine-elite-special-forces/philippine-naval-special-warfare-group-nswg/
  5. Philippine Navy – Philippine Fleet History | PDF | Military Units And Formations – Scribd, accessed September 6, 2025, https://www.scribd.com/document/531039/Philippine-Navy-Philippine-Fleet-History
  6. Special Operations Command (Philippines) – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Special_Operations_Command_(Philippines)
  7. NAVSOU | Center for International Maritime Security, accessed September 6, 2025, https://cimsec.org/tag/navsou/
  8. Zamboanga City crisis – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Zamboanga_City_crisis
  9. Zamboanga siege: Tales from the combat zone – Rappler, accessed September 6, 2025, https://www.rappler.com/newsbreak/68885-zamboanga-siege-light-reaction-battalion/
  10. Siege of Marawi – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Siege_of_Marawi
  11. Philippines: Navy Seals battle Maute group on Lake Lanao – YouTube, accessed September 6, 2025, https://www.youtube.com/watch?v=FpcetHtZE1I
  12. Philippine Navy Seals Overlooking Marawi City During Night-Time Patrols to Prevent Terrorists from Fleeing Marawi 2017. (717×399) : r/MilitaryPorn – Reddit, accessed September 6, 2025, https://www.reddit.com/r/MilitaryPorn/comments/10slcy3/philippine_navy_seals_overlooking_marawi_city/
  13. Philippine Watercraft Operations in the South China Sea – Naval News, accessed September 6, 2025, https://www.navalnews.com/naval-news/2025/08/philippine-watercraft-operations-in-the-south-china-sea/
  14. U.S. Naval Special Warfare, Philippines NAVSOU Conduct Joint Combined Training Exchange – PACOM, accessed September 6, 2025, https://www.pacom.mil/Media/NEWS/News-Article-View/Article/4121327/us-naval-special-warfare-philippines-navsou-conduct-joint-combined-training-exc/
  15. Philippine Navy Maritime Situational Awareness System: Current Situation, Gaps, and Potential Role of Maritime Special Operation – DTIC, accessed September 6, 2025, https://apps.dtic.mil/sti/trecms/pdf/AD1126784.pdf
  16. US Navy SEALs, Philippine Special Operations strengthen military tactics, accessed September 6, 2025, https://www.marforpac.marines.mil/Media-Room/Pacific-Marines-Stories/Article/Article/3388635/us-navy-seals-philippine-special-operations-strengthen-military-tactics/
  17. Marine Scout Sniper Rifle – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Marine_Scout_Sniper_Rifle
  18. Converting M16A1s into sniper rifles: the story of the Philippine …, accessed September 6, 2025, https://www.reddit.com/r/ForgottenWeapons/comments/k6mvfo/converting_m16a1s_into_sniper_rifles_the_story_of/
  19. Armed Forces of the Philippines Weapons – Far East Tactical, accessed September 6, 2025, https://fareastmilsim.com/afp-weapons
  20. Heckler & Koch HK416 – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Heckler_%26_Koch_HK416
  21. HK416 | Delta Force – American Special Ops, accessed September 6, 2025, https://www.americanspecialops.com/delta-force/weapons/hk416.php
  22. Philippine Navy SEALs from Naval Special Operations Group (NAVSOG) participating in a VBSS training drill : r/SpecOpsArchive – Reddit, accessed September 6, 2025, https://www.reddit.com/r/SpecOpsArchive/comments/kny03v/philippine_navy_seals_from_naval_special/
  23. Remington R4 – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/Remington_R4
  24. R4 COMPLETE SYSTEM – Remington, accessed September 6, 2025, http://oshocorp.com/vsalute/86612.php
  25. The AFP-wide Pistol Project – Pres. Duterte’s Promised Handguns for the Filipino Soldier, accessed September 6, 2025, http://maxdefense.blogspot.com/2017/05/the-afp-wide-pistol-project-pres.html
  26. Glock 17 Gen 4 Reviewed – Shooters Report, accessed September 6, 2025, https://www.shootersreport.com/pistol/9mm-Shoot-Out-Glock-17.htm
  27. G17 Gen4 – GLOCK Perfection, accessed September 6, 2025, https://eu.glock.com/en/products/pistols/g17-gen4
  28. Bacarro is now a Navy SEAL – Manila Bulletin, accessed September 6, 2025, https://mb.com.ph/2022/11/20/bacarro-is-now-a-navy-seal
  29. M60E6 | Weapons – US Ordnance, accessed September 6, 2025, https://www.usord.com/weapons/m60e6
  30. M60E6 – US Ordnance, accessed September 6, 2025, http://www.usord.com/content/docs/datasheets/USORD_M60E6_10.17.pdf
  31. M60 machine gun – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/M60_machine_gun
  32. M110A2 – Knight’s Armament, accessed September 6, 2025, https://www.knightarmco.com/wp-content/uploads/2018/02/m110A2.pdf
  33. M110A2 – North East Technologies, accessed September 6, 2025, https://www.ne-tech.co.il/m110a2/
  34. Portfolio – PM SL – M110 7.62mm Semi-Automatic Sniper System (SASS) – PEO Soldier, accessed September 6, 2025, https://www.peosoldier.army.mil/Equipment/Equipment-Portfolio/Project-Manager-Soldier-Lethality-Portfolio/M110-Semi-Automatic-Sniper-System/
  35. Last year I wrote a piece for r/ForgottenWeapons about the PMC’s Marine Scout Sniper Rifle – Reddit, accessed September 6, 2025, https://www.reddit.com/r/PhilippineMilitary/comments/y3ubst/last_year_i_wrote_a_piece_for_rforgottenweapons/
  36. That’s a long tube: the Night Fighting Weapons System (NFWS) used by Philippine Marine Force Recon and Navy SEALs [1080×1411] – Reddit, accessed September 6, 2025, https://www.reddit.com/r/MilitaryPorn/comments/sx73mz/thats_a_long_tube_the_night_fighting_weapons/
  37. AFP Modernization Act – Wikipedia, accessed September 6, 2025, https://en.wikipedia.org/wiki/AFP_Modernization_Act
  38. Philippines military modernisation: revamped but not resolved, accessed September 6, 2025, https://www.iiss.org/online-analysis/military-balance/2025/062/philippines-military-modernisation-revamped-but-not-resolved/
  39. The Philippines’ Horizon 3 Military Modernisation Programme – MP-IDSA, accessed September 6, 2025, https://www.idsa.in/publisher/issuebrief/the-philippines-horizon-3-military-modernisation-programme
  40. A Brief on the Horizon 3 Phase of the Revised AFP Modernization Program, accessed September 6, 2025, http://maxdefense.blogspot.com/2023/09/a-brief-on-horizon-3-phase-of-revised.html
  41. Philippines Starts Latest Naval Modernization Attempt Amid South China Sea Tensions, accessed September 6, 2025, https://news.usni.org/2024/02/28/philippines-starts-latest-naval-modernization-attempt-amid-south-china-sea-tensions
  42. U.S. INFLUENCE Philippines Military Modernization aims to Deter CHINA’s AGGRESSION in Indo-Pacific – YouTube, accessed September 6, 2025, https://www.youtube.com/watch?v=edLlfZjGOOs
  43. Philippine Navy Modernization: 3rd Horizon Infographic : r/PhilippineMilitary – Reddit, accessed September 6, 2025, https://www.reddit.com/r/PhilippineMilitary/comments/1iqk6xi/philippine_navy_modernization_3rd_horizon/
  44. New Philippine naval bases mark strategic pivot – Indo-Pacific Defense FORUM, accessed September 6, 2025, https://ipdefenseforum.com/2025/07/new-philippine-naval-bases-mark-strategic-pivot/
  45. Defence 2025: Key Trends Driving Innovation, accessed September 6, 2025, https://mssdefence.com/blog/defence-2025-key-trends-driving-innovation/
  46. Top 10 Military Technology Trends & Innovations for 2025 – StartUs Insights, accessed September 6, 2025, https://www.startus-insights.com/innovators-guide/top-10-military-technology-trends-2022/
  47. Exploring the Future of Special Operations at SOF Week 2025 – Satellite World, accessed September 6, 2025, https://satelliteworldtoday.com/exploring-the-future-of-special-operations-at-sof-week-2025/
  48. EDCA Refocus: Eyes on the AFP’s Modernization Program | Asia Maritime Transparency Initiative, accessed September 6, 2025, https://amti.csis.org/edca-refocus-eyes-on-the-afps-modernization-program/

European Nuclear Posture: Sovereign Arsenals, Shared Deterrence, and Geopolitical Alignments

The European security landscape is defined by a complex, multi-layered nuclear deterrent posture designed to preserve peace and deter aggression. This posture is composed of two distinct but complementary elements: the sovereign, independent nuclear arsenals of the United Kingdom and France, and the extended deterrence framework of the North Atlantic Treaty Organization (NATO), which includes the forward-deployment of United States tactical nuclear weapons on the territory of five allied nations. This report provides a comprehensive analysis of these components, detailing the capabilities, doctrines, command structures, and geopolitical alignments of the relevant European states.

The United Kingdom maintains a singular, sea-based deterrent through its policy of Continuous At-Sea Deterrence (CASD). Its four Vanguard-class ballistic missile submarines, armed with U.S.-sourced Trident II D5 missiles, provide a secure second-strike capability. In a significant policy shift reflecting a deteriorating security environment, the UK has reversed a decades-long disarmament trend by announcing an increase to its nuclear warhead stockpile cap. While operationally sovereign, the UK’s deterrent is technologically intertwined with the United States and doctrinally committed to the defense of NATO.

France, in contrast, adheres to a doctrine of staunch strategic autonomy for its Force de dissuasion. Its nuclear dyad, comprising sea-based M51 ballistic missiles and air-launched ASMPA cruise missiles, operates entirely outside of NATO’s integrated military command. Governed by a principle of “strict sufficiency,” France’s arsenal is designed to protect its vital interests, which it has increasingly stated possess a “European dimension.” This has opened a strategic dialogue with European partners who are reassessing their security architecture amid questions about the long-term reliability of the U.S. security guarantee.

The most tangible expression of this guarantee is NATO’s nuclear sharing program. An estimated 100 U.S. B61 tactical gravity bombs are hosted at six air bases in Belgium, Germany, Italy, the Netherlands, and Turkey. While host nations provide dual-capable aircraft and participate in consultations through the Nuclear Planning Group, the United States retains absolute custody and control of the weapons. This arrangement serves not only as a military deterrent but also as a critical tool for alliance cohesion and non-proliferation. The strategic environment has been further complicated by Russia’s forward-deployment of nuclear weapons in Belarus, a direct counter to NATO’s posture, and the return of U.S. nuclear weapons to the United Kingdom, re-establishing a layered deterrent posture in Northern Europe.

Geopolitically, all European nuclear-armed and host nations are firmly aligned with the United States within the NATO framework, with their collective posture oriented against the primary threat posed by the Russian Federation. The relationship with China is more complex, characterized by a dichotomy of economic interdependence and systemic rivalry, but it does not supersede the primary transatlantic security alignment. The central dynamic shaping the future of European security is the burgeoning debate over “strategic autonomy,” driven by concerns over the durability of the U.S. nuclear umbrella. This has prompted an unprecedented discussion about a more independent European deterrent, a development that signals the end of the post-Cold War security order and will define the continent’s strategic trajectory for decades to come.

Part I: Sovereign European Nuclear Arsenals

Two European nations, the United Kingdom and France, possess independent, sovereign nuclear arsenals. As recognized nuclear-weapon states under the Treaty on the Non-Proliferation of Nuclear Weapons (NPT), their forces represent distinct centers of nuclear decision-making on the continent.1 While both contribute to the overall deterrence posture of the North Atlantic Treaty Organization (NATO), they operate under unique national doctrines and command and control structures that reflect different strategic traditions and philosophies.

The United Kingdom’s Continuous At-Sea Deterrent (CASD)

The United Kingdom’s nuclear strategy is defined by the principle of “minimal credible deterrence,” a posture designed to be the smallest and most cost-effective force capable of deterring a major attack by inflicting a level of damage that any potential aggressor would deem unacceptable.3 This doctrine is executed through a singular, sea-based delivery system governed by a policy of “Continuous At-Sea Deterrence” (CASD), an operational imperative known as Operation Relentless.3 This posture ensures that at least one of the Royal Navy’s nuclear-armed ballistic missile submarines (SSBNs) is on patrol, submerged and undetected, at all times. This provides a highly survivable, guaranteed second-strike capability, meaning the UK can retaliate even after absorbing a surprise first strike. The UK is the only one of the five officially recognized nuclear-weapon states to have consolidated its deterrent into a single system, having retired its air-delivered tactical nuclear weapons in 1998.3

A unique feature of the UK’s doctrine is that its nuclear forces are explicitly assigned to the defense of NATO, a commitment dating back to 1962.3 While the ultimate decision to launch remains a sovereign act of the British Prime Minister, this doctrinal integration underscores the UK’s deep commitment to the transatlantic alliance. In line with this, the UK does not adhere to a ‘no-first use’ policy. Instead, it maintains a posture of deliberate ambiguity regarding the precise circumstances under which it would employ its nuclear arsenal, stating only that it would be in “extreme circumstances of self defence, including the defence of NATO allies”.4

The physical manifestation of this deterrent is centered on a fleet of four Vanguard-class SSBNs, which are based at Her Majesty’s Naval Base Clyde in Scotland.1 These submarines are armed with the Trident II D5 submarine-launched ballistic missile (SLBM), a weapon system manufactured in the United States and procured through the deep technological and strategic partnership between the two nations.4 While each submarine is capable of carrying up to sixteen missiles, as a disarmament measure, the number of operational missiles per patrol has been reduced to eight.4 The Trident II D5 missile has an intercontinental range of approximately 12,000 km, allowing it to hold targets at risk from vast, remote patrol areas in the Atlantic Ocean.5

The nuclear warheads atop these missiles are designed and manufactured indigenously by the UK’s Atomic Weapons Establishment.5 As of early 2025, the UK’s total military stockpile is estimated at approximately 225 warheads, with an operational ceiling of 120 available for deployment on the SSBN fleet.1 Each deployed Trident missile can be equipped with up to eight Multiple Independently Targetable Re-entry Vehicles (MIRVs), enabling a single missile to strike multiple targets. However, in practice, the number of warheads loaded per submarine has been reduced from a maximum of 48 to 40 as part of past disarmament commitments.4

The United Kingdom is in the midst of a comprehensive, multi-decade modernization of its nuclear deterrent to ensure its viability well into the mid-21st century. The cornerstone of this effort is the Dreadnought program, which will see the four Vanguard-class submarines replaced by a new class of four Dreadnought-class SSBNs, scheduled to begin entering service in the early 2030s.3 Concurrently, the UK is participating in the U.S.-led service-life extension program for the Trident II D5 missile and is actively developing a new, replacement nuclear warhead to maintain the credibility of the system against evolving adversary defenses.3

This modernization program is occurring alongside a significant shift in the UK’s nuclear posture. The 2021 Integrated Review of Security, Defence, Development and Foreign Policy marked a formal end to the UK’s post-Cold War trajectory of gradual disarmament. Citing a worsening global security environment, the review announced that the UK would no longer pursue a previously stated goal of reducing its stockpile to 180 warheads. Instead, it raised the ceiling on its total warhead stockpile to no more than 260.3 Simultaneously, the government declared it would no longer provide public figures on its operational stockpile of warheads or deployed missiles, reversing a long-standing transparency policy.3 This decision predated Russia’s full-scale invasion of Ukraine but clearly reflected a strategic reassessment of the threat posed by a resurgent Russia and the proliferation of advanced military technologies. In this sense, the UK’s policy reversal can be seen as a strategic bellwether for Europe. It signaled that a major European power, one with deep intelligence and security ties to the United States, had concluded that the era of post-Cold War optimism was over and that a more robust and opaque nuclear posture was necessary. This shift helped legitimize and likely foreshadowed the broader turn toward hard-power security policies and increased defense spending seen across the continent in subsequent years.

The structure of the UK’s deterrent reveals a strategic paradox of interdependent sovereignty. Legally and operationally, the deterrent is entirely sovereign; the British Prime Minister alone holds the authority to authorize a launch, a power symbolized by the “letters of last resort” carried on board each SSBN. This sovereign capability is a cornerstone of the UK’s status as a major global actor.5 However, the deterrent’s technological foundation is deeply dependent on the United States. The Trident II D5 missiles are procured from and maintained with the support of the U.S. Navy under the terms of the Polaris Sales Agreement.5 This deep integration means that while the UK provides NATO with a valuable separate center of decision-making that complicates an adversary’s strategic calculations, the long-term viability of its nuclear force is inextricably linked to the health of the US-UK “Special Relationship” and the broader transatlantic alliance. A severe political rupture with Washington could, over time, jeopardize the very sustainability of the UK’s independent deterrent, a reality that stands in stark contrast to the French model of complete strategic autonomy.

France’s Force de Dissuasion

France’s nuclear doctrine is rooted in the Gaullist tradition of absolute national independence and strategic autonomy.9 The country’s nuclear arsenal, known as the Force de dissuasion (Deterrent Force), was developed in the 1960s to ensure France could defend itself and deter a major-power aggressor without relying on the security guarantees of other nations, particularly the United States.9

The primary purpose of the force is to deter a state-level attack on France’s “vital interests” (intérêts vitaux). This term is deliberately left undefined in public doctrine to create uncertainty in the mind of a potential adversary and thereby enhance the deterrent effect by complicating their risk calculations.10

The French posture is governed by the principle of “strict sufficiency” (stricte suffisance), which dictates that the arsenal should be maintained at the lowest possible level necessary to inflict damage so catastrophic as to be unacceptable to any aggressor, thereby deterring an attack in the first place.12 In sharp contrast to the United Kingdom, France’s nuclear forces are not integrated into NATO’s military command structure. France does not participate in the Alliance’s Nuclear Planning Group, a decision that preserves the absolute and unilateral authority of the French President to order the use of nuclear weapons.10

France currently maintains a nuclear dyad, having dismantled its land-based missile silos at the Plateau d’Albion in 1996.12 The two remaining components are:

  1. The Sea-Based Component (Force Océanique Stratégique – FOST): This is the backbone of the French deterrent, providing a permanent, survivable, and secure second-strike capability. It consists of a fleet of four Triomphant-class SSBNs, which ensures that at least one submarine is on patrol at all times, with a second often able to deploy on short notice.12 These submarines are armed with the domestically developed M51 SLBM. The M51 is a modern, solid-fueled missile with a range reported to be over 9,000 km and is capable of carrying up to six MIRVed warheads.14 This sea-based leg accounts for the vast majority of France’s nuclear firepower, with approximately 83 percent of its warheads assigned to the FOST.15
  2. The Air-Based Component (Forces Aériennes Stratégiques – FAS): This component provides the French President with greater strategic flexibility, including the ability to conduct a single, limited strike known as the ultime avertissement (final warning). This doctrinal concept envisions a carefully calibrated nuclear strike intended to demonstrate resolve and signal the unacceptable cost of continued aggression, thereby restoring deterrence before a full-scale strategic exchange. The delivery platforms are the Dassault Rafale multirole fighter aircraft. The French Air and Space Force operates nuclear-capable Rafale BF3/4 aircraft from land bases, while the French Navy operates a squadron of carrier-based Rafale MF3/4 aircraft from the nuclear-powered aircraft carrier Charles de Gaulle.1 These aircraft are armed with the ASMPA (
    Air-Sol Moyenne Portée-Amélioré) medium-range, ramjet-powered supersonic cruise missile. The ASMPA has a range of approximately 600 km and is armed with a 300-kiloton thermonuclear warhead.15

France possesses the world’s fourth-largest nuclear arsenal. Its stockpile has remained remarkably stable for several decades, currently estimated at approximately 290 operational warheads, with no weapons held in reserve.1 This reflects the doctrine of strict sufficiency, which does not require a large arsenal for counterforce targeting but rather a survivable force sufficient for a counter-value (city-targeting) retaliatory strike.

Like the UK, France is engaged in a comprehensive modernization of its deterrent. The M51 SLBM is being progressively upgraded, with the M51.3 variant expected to be operational by 2025.13 A new class of third-generation SSBNs (SNLE 3G) is under development to begin replacing the Triomphant-class in the 2030s.12 The air-based component is also being enhanced, with a program underway to develop a next-generation hypersonic air-launched missile, the ASN4G, to replace the ASMPA.

While fiercely protective of its strategic independence, France has in recent years begun to cautiously evolve its declaratory policy. Successive French presidents have stated that France’s vital interests have a “European dimension”.10 This concept was given more substance in 2020 when President Emmanuel Macron formally invited European partners to engage in a “strategic dialogue” on the role of the French deterrent in their collective security.11 This dialogue is not an offer to share command and control, which remains a sovereign prerogative of the French President. Rather, it is an effort to build a common strategic culture and understanding of the deterrent’s contribution to European stability. This has led to symbolic but significant gestures of cooperation, such as the participation of an Italian air-to-air refueling tanker in a French FAS nuclear exercise.11

This evolution in French policy can be understood as a cautious pivot from a purely national sanctuary to a potential European umbrella. Historically, the Force de dissuasion was conceived solely to guarantee the inviolability of French territory.9 However, the contemporary security environment, marked by a newly aggressive Russia and growing doubts about the long-term reliability of the U.S. security guarantee for Europe, has created a potential strategic vacuum.17 As the European Union’s only sovereign nuclear power, France is uniquely positioned to address this void.9 President Macron’s rhetoric is a calculated and incremental response to this new reality, signaling a willingness to extend the deterrent’s protective logic beyond France’s borders. This is a profound strategic development, but one that faces significant hurdles. France’s categorical refusal to share nuclear decision-making means that any French guarantee would be unilateral. This raises questions of credibility for potential beneficiary states, who may be hesitant to rely on a guarantee over which they have no influence. Nonetheless, this strategic dialogue represents the first, tentative step in a long and complex process of building the political trust that would be necessary for a credible, French-led European deterrent to emerge.

Part II: NATO’s Extended Deterrence and Nuclear Sharing

A cornerstone of the transatlantic alliance’s collective defense is the framework for U.S. nuclear weapons hosted on European soil. This posture, a direct legacy of the Cold War, is the most tangible expression of the U.S. “nuclear umbrella” over Europe. It is designed not only as a military deterrent but also as a critical political instrument for maintaining alliance cohesion and preventing nuclear proliferation among member states.

Framework and Strategic Rationale

Nuclear sharing is a unique arrangement within NATO whereby non-nuclear member states participate directly in the Alliance’s nuclear mission.19 This participation involves two key commitments from the host nations: allowing the United States to store nuclear weapons on their territory and maintaining fleets of national aircraft, known as dual-capable aircraft (DCA), that are certified to deliver these weapons in the event of a conflict.19 The underlying logic of this program is threefold and has remained consistent for decades.21

First and foremost is deterrence. The forward-deployment of U.S. tactical nuclear weapons on the continent is intended to deter aggression, principally from the Russian Federation. It signals to any potential adversary that a major conflict in Europe could cross the nuclear threshold, thereby ensuring the direct and immediate involvement of the United States’ strategic forces. This coupling of European security with American nuclear might is meant to raise the perceived costs of aggression to an unacceptably high level.

Second is alliance cohesion. By sharing the risks, responsibilities, and political burdens of nuclear deterrence, the program binds the alliance together. It provides the non-nuclear host nations with a direct role and a “seat at the table” in the formulation of NATO’s nuclear policy, primarily through their participation in the Nuclear Planning Group (NPG).19 This sense of shared ownership reinforces the principle of collective defense and demonstrates transatlantic unity and resolve.

Third is non-proliferation. Historically, the nuclear sharing program was a critical tool to dissuade key allies, notably West Germany, from pursuing their own indigenous nuclear weapons programs during the Cold War.22 By providing a credible security guarantee and a role within the NATO nuclear framework, the U.S. obviated the need for these states to develop their own arsenals. This function remains relevant today, as the presence of the U.S. nuclear umbrella is seen as a key factor in preventing further nuclear proliferation in Europe.19

The legality of these arrangements under the NPT has been a subject of debate since the treaty’s inception. Articles I and II of the NPT prohibit the transfer of nuclear weapons from nuclear-weapon states to non-nuclear-weapon states.25 NATO and the United States argue that the sharing program is fully compliant with the treaty based on a specific legal interpretation: in peacetime, the U.S. maintains absolute and exclusive custody and control of the weapons. No “transfer” of weapons or control over them occurs. The scenario in which a transfer might take place—a decision to go to war—is considered a circumstance under which the treaty’s peacetime constraints would no longer be controlling.16 While this interpretation was understood and accepted by the Soviet Union during the NPT negotiations, it remains a point of contention for many non-aligned states and disarmament advocates who view the practice as a violation of the spirit, if not the letter, of the treaty.

Host Nations and Forward-Deployed Assets

The sole type of U.S. nuclear weapon currently deployed in Europe under the sharing arrangement is the B61 tactical gravity bomb.1 These weapons are undergoing a comprehensive Life Extension Program to modernize them into the B61-12 variant. This new version is a significant upgrade; it incorporates a new tail kit that provides GPS guidance, dramatically increasing its accuracy and allowing it to be used against a wider range of targets. It also features a variable-yield capability, allowing its explosive power to be dialed down for more limited, tactical strikes or up for greater effect, making it a more flexible and, in the view of some strategists, a more “usable” weapon.28

An estimated 100 of these U.S.-owned B61 bombs are stored in highly secure underground WS3 vaults at six air bases across five NATO host nations.1 The table below provides a consolidated overview of these deployments.

Host NationAir BaseEstimated U.S. B61 WarheadsHost Nation Dual-Capable Aircraft (Current/Planned)
BelgiumKleine Brogel10–15F-16 Fighting Falcon (being replaced by F-35A)
GermanyBüchel10–15PA-200 Tornado (being replaced by F-35A)
ItalyAviano & Ghedi30–45 (total)PA-200 Tornado (at Ghedi, being replaced by F-35A)
NetherlandsVolkel10–15F-16 Fighting Falcon (replaced by F-35A)
TurkeyIncirlik20–30F-16 Fighting Falcon (Note: Turkey removed from F-35 program)
Data compiled from sources 1, and.25

The modernization of the host nations’ DCA fleets is a critical component of maintaining the credibility of the sharing program. Belgium, Germany, Italy, and the Netherlands are all in the process of procuring the nuclear-capable F-35A Lightning II stealth fighter to replace their aging F-16 and Tornado aircraft.27 This transition to a 5th-generation platform significantly enhances the survivability of the delivery mission against modern air defense systems. Turkey’s participation has been complicated by its removal from the F-35 program in 2019 following its purchase of the Russian S-400 air defense system, leaving its future role in the nuclear mission reliant on its existing F-16 fleet.27

Command, Control, and Consultation

The command and control structure for NATO’s shared nuclear weapons is designed to ensure absolute political control and safety. Despite the weapons being hosted on allied territory and designated for delivery by allied aircraft, the United States maintains absolute and unilateral custody and control over them at all times during peacetime.6 The security of the weapons on the ground is handled by U.S. Air Force personnel. Crucially, the Permissive Action Link (PAL) codes, which are sophisticated cryptographic locks required to arm the weapons, remain exclusively in American hands.28 Without these codes, the bombs are inert.

The term “dual-key” is often used to describe the arrangement, but this can be misleading. It does not refer to a physical system where two parties must turn a key simultaneously. Instead, it represents the dual political authority required for any use of the weapons. Any decision to employ a shared nuclear weapon would require explicit authorization from the President of the United States. This presidential authorization would only be given following a collective political decision reached through intense consultation among the allies within NATO’s highest nuclear policy body, the Nuclear Planning Group (NPG).19 In a conflict scenario, following such a dual political decision, U.S. personnel would release the armed weapon to the host nation’s certified DCA crew for the delivery mission.

The NPG is the primary consultative body for all matters concerning NATO’s nuclear policy and posture. All NATO allies are members with the notable exception of France, which has chosen to remain outside this structure to preserve its strategic independence.6 The NPG provides the formal forum where non-nuclear allies, particularly the host nations, can participate in shaping the Alliance’s nuclear strategy, doctrine, and operational planning. It is the institutional heart of the political dimension of nuclear sharing.19

The persistence and modernization of the nuclear sharing program, despite ongoing debates about the military utility of air-delivered gravity bombs against an adversary with sophisticated air defenses like Russia, points to its deeper strategic value.31 While some strategists question whether a non-stealthy aircraft could successfully penetrate Russian airspace to deliver a B61 bomb, the program’s political and symbolic importance to the Alliance is consistently emphasized by NATO officials.19 The program is a prime example of a military posture whose political value is arguably greater than its purely operational utility. The physical presence of U.S. weapons and personnel on European soil serves as the ultimate “tripwire,” a tangible commitment that inextricably links America’s security to that of its European allies. It is this political act of sharing the nuclear burden and risk that binds the alliance, making the program a vital instrument of transatlantic cohesion, irrespective of the evolving military-technological landscape.

Part III: The Broader European Nuclear Landscape

Beyond the sovereign arsenals of the UK and France and the formal NATO nuclear sharing arrangements, several other crucial developments shape the European nuclear environment. These elements, occurring both as a direct counter to and as an evolution of the established NATO posture, are reshaping the strategic calculus and introducing new complexities to deterrence and stability on the continent.

The Russian Counterpart: Nuclear Basing in Belarus

In a significant strategic development that alters the post-Cold War security architecture, the Russian Federation has forward-deployed tactical nuclear weapons onto the territory of its ally, Belarus.2 Moscow has explicitly framed this action as a direct and symmetric response to NATO’s long-standing nuclear sharing arrangements, arguing that it is merely mirroring a practice the West has engaged in for decades.2 This move, however, carries profound strategic implications that extend far beyond simple reciprocity.

Geographically, placing nuclear assets in Belarus moves them significantly closer to NATO’s eastern flank. This positioning drastically reduces warning times for potential targets and holds key political centers, military bases, and critical infrastructure in Poland, the Baltic States, and even eastern Germany at greater risk. The deployment provides Russia with additional, more flexible options for nuclear signaling or limited use in a regional conflict. It complicates NATO’s defense planning and escalation management by creating new attack vectors and forcing the Alliance to account for nuclear threats originating from outside Russian sovereign territory.

Furthermore, the deployment serves as a powerful tool of political subjugation. It effectively cements Belarus’s status as a military client state of Russia, stripping Minsk of any remaining strategic autonomy and transforming its territory into a forward operating base for Russian power projection. This move is not merely a tactical repositioning of military assets; it is a deliberate political act designed to dismantle a key pillar of the post-Cold War European security order. Following the collapse of the Soviet Union, the 1991 Presidential Nuclear Initiatives led to a mutual, albeit informal, withdrawal of thousands of tactical nuclear weapons from forward deployments by both the United States and Russia. Former Soviet republics like Ukraine, Kazakhstan, and Belarus voluntarily returned their inherited nuclear weapons to Russia, establishing a de facto norm against the stationing of Russian nuclear weapons outside its own borders.2 The deployment to Belarus shatters this three-decade-old norm, signaling Russia’s definitive rejection of past arms control conventions and its intent to pursue a more confrontational, nuclear-backed coercive diplomacy against NATO.

A Special Case: U.S. Nuclear Weapons in the United Kingdom

The nuclear landscape in Europe is further layered by the unique situation in the United Kingdom. After being withdrawn in 2008, marking the end of a 50-year presence, U.S. nuclear weapons are confirmed to be returning to the Royal Air Force (RAF) base at Lakenheath.5 It is anticipated that these weapons will be the modernized B61-12 gravity bombs, intended for delivery by U.S. Air Force F-35A aircraft stationed at the base.20

This deployment is strategically distinct from the NATO nuclear sharing program. The UK is a sovereign nuclear-weapon state in its own right. The weapons at Lakenheath will be stored, maintained, and, if ever used, delivered by U.S. forces, not by RAF pilots.5 This arrangement does not involve the “sharing” of nuclear burdens with a non-nuclear host but rather the forward-basing of U.S. assets on the territory of a nuclear-armed ally.

The rationale for this move is multifaceted. Operationally, it provides the U.S. and NATO with an additional, highly secure forward-basing location in Northern Europe. This increases the survivability of the tactical nuclear force by dispersing the assets and enhances operational flexibility. Politically, the move is a powerful reaffirmation of the unique US-UK “Special Relationship” in defense and security matters. It creates a multi-layered nuclear deterrent posture on British soil, combining the UK’s sovereign sea-based deterrent with hosted U.S. air-delivered assets. Most importantly, the return of U.S. nuclear weapons to a location from which they were previously removed sends an unambiguous signal to Moscow. It demonstrates a heightened threat perception and a renewed, long-term commitment to nuclear deterrence in Europe in response to Russian aggression.

This development signifies a full-circle return to a more robust and complex deterrence architecture reminiscent of the Cold War. During that era, the UK hosted a vast array of U.S. nuclear systems, including gravity bombs, missiles, and artillery, in addition to its own sovereign force, creating a dense, “layered” deterrent posture.5 The post-Cold War period saw a dramatic consolidation and reduction of this presence, culminating in the 2008 withdrawal.25 The decision to return U.S. weapons to Lakenheath, coupled with the UK’s own arsenal modernization and its recent decision to acquire F-35As to contribute to the NATO nuclear mission, effectively re-establishes this layered model.3 This suggests that strategic planners in Washington and London have concluded that a single deterrent system is no longer sufficient to address the current threat environment. The new posture aims to maximize complexity for Russian military planners by creating multiple, redundant, and geographically dispersed nuclear options under different command structures (USAFE and UK sovereign), thereby strengthening the overall credibility and resilience of NATO’s deterrent posture.

Part IV: Geopolitical Alignment and Strategic Imperatives

The technical details and operational doctrines of Europe’s nuclear forces are underpinned by a clear and deeply entrenched geopolitical alignment. This section synthesizes the preceding analysis into a broader assessment of the strategic posture of European nuclear actors, the overarching purpose of their capabilities, and the emerging dynamics that will shape the future of deterrence on the continent.

Unaltered Alignment within the Transatlantic Alliance

The geopolitical posture of all European nations possessing or hosting nuclear weapons—the United Kingdom, France, Belgium, Germany, Italy, the Netherlands, and Turkey—is fundamentally and unequivocally aligned with the United States through their membership in the North Atlantic Treaty Organization (NATO).24 This alliance forms the bedrock of their national security policies. Their collective defense posture, including its nuclear dimension, is explicitly oriented against the primary perceived military and existential threat from the Russian Federation.

Russia’s full-scale invasion of Ukraine in 2022 served as a powerful and clarifying event, forcing a hard realignment of European security policy and dispelling any lingering post-Cold War illusions about a potential partnership with Moscow. The war effectively terminated decades of policies predicated on economic engagement, such as Germany’s Ostpolitik (Eastern Policy) and the concept of Wandel durch Handel (change through trade), which posited that economic interdependence would lead to political moderation.34 Across the continent, from Rome to Brussels, national governments subordinated economic interests to the overriding imperative of collective defense against Russian aggression.37

Even France, which maintains a posture of strategic independence from NATO’s integrated military command, remains a core political member of the Alliance. Its independent deterrent is widely understood, both in Paris and within NATO, to contribute significantly to the overall security of the Alliance. By creating a second, sovereign center of nuclear decision-making, France complicates the strategic calculations of any potential adversary, thereby strengthening NATO’s overall deterrent effect.6

Navigating the China Challenge

The relationship of these European nations with the People’s Republic of China is significantly more nuanced and complex. For all European capitals, China represents a multifaceted challenge, simultaneously acting as a vital economic partner, a formidable technological competitor, and a systemic rival that promotes an alternative vision of global governance that challenges the Western-led, rules-based international order.35

This has led to the adoption of a strategy broadly defined as “de-risking, not decoupling”.40 This approach seeks to reduce critical strategic dependencies on Chinese supply chains—particularly in sensitive areas like rare earth minerals, semiconductors, and pharmaceuticals—without completely severing the deep economic ties that are vital to European prosperity.41 This creates a persistent tension within European policymaking, as governments attempt to balance pressing economic interests against long-term security concerns.

However, despite these deep economic entanglements, the primary security alignment of European nations remains firmly with the United States. In the face of a direct military threat, there is no ambiguity. European nations are increasingly coordinating with Washington on strategic challenges posed by China, including through increased naval presence in the Indo-Pacific and stricter controls on technology transfers. Nevertheless, this relationship lacks the formal, treaty-based collective defense obligation that defines their posture towards Russia. In the strategic hierarchy of European capitals, China is a long-term, systemic challenge; Russia is a direct and present existential threat.

Strategic Implications and Future Trajectories

The core strategic purpose of Europe’s multifaceted nuclear posture remains threefold. First is deterrence: to prevent a major conventional or nuclear attack by the Russian Federation by ensuring the costs of such aggression would be unacceptably high. Second is reassurance: to assure non-nuclear NATO allies that they are protected under a credible nuclear umbrella, thereby obviating any incentive for them to develop their own nuclear weapons and preventing proliferation on the continent. Third is political solidarity: to serve as the ultimate symbol of the transatlantic security bond, demonstrating that an attack on one member is an attack on all.

The central dynamic shaping the future of European nuclear policy is a growing crisis of confidence in the long-term reliability and durability of the U.S. security guarantee.16 This uncertainty is driven by a perception of a long-term U.S. strategic pivot towards Asia to counter China, as well as by concerns about American political volatility and the potential for a future administration to adopt a more isolationist or transactional foreign policy.17

This crisis of confidence has ignited an unprecedented and increasingly mainstream debate across Europe about the need for greater “strategic autonomy” and the potential development of a more independent European nuclear deterrent.7 This discussion, once confined to academic circles, is now being publicly broached by senior political leaders. Proposals range from the more plausible, such as extending the existing French and/or British deterrents to formally cover other allies, to more radical and complex ideas of a “Eurobomb” with shared financing, command, and control.23 Key nations like Germany and Poland, which have historically been the primary beneficiaries of and strongest advocates for the U.S. nuclear umbrella, are now openly engaging in strategic dialogues with France about these very options.10 This emerging debate confronts Europe with a fundamental strategic trilemma: accept a future of potential vulnerability under a possibly wavering U.S. guarantee; pursue a collective European deterrent that would require an unprecedented ceding of national sovereignty over matters of ultimate survival; or risk a future of uncontrolled national proliferation as individual states seek their own security solutions.42

These developments collectively signal the definitive end of the post-Cold War interregnum. For three decades following the fall of the Berlin Wall, the European security order was predicated on a set of assumptions: the unchallenged military and political supremacy of the U.S./NATO alliance, the relative weakness and integration of Russia, and the primacy of economic interdependence as a guarantor of peace. Nuclear weapons were often viewed as a legacy issue, their relevance fading in a new era of cooperation. Russia’s revanchist war in Ukraine, China’s rise as a systemic rival, and a perception of U.S. strategic retrenchment have shattered all three of these foundational pillars. As a result, nuclear deterrence has returned to the forefront of European strategic thought for the first time in a generation.7 Europe is at the end of a historical interregnum and is being forced to fundamentally re-architect its security framework. The current nuclear posture is a product of the Cold War. The ongoing debates about extending the French deterrent, the return of U.S. nuclear weapons to the UK, and Russia’s forward-deployment in Belarus are not isolated events but symptoms of a system in profound flux. The key strategic question for the next decade is whether the existing transatlantic framework will be reinforced and adapted, or if it will be supplemented—or even partially replaced—by a new, more distinctly European nuclear deterrent structure. The outcome of this debate will define the continent’s security landscape for the 21st century.

Summary of European Nuclear Deployments

Table 1: Sovereign European Nuclear Arsenals

This table details the nuclear arsenals under the independent, sovereign control of European nations.

CountryEstimated Total WarheadsPrimary Locations / Delivery Systems
United Kingdom~225 1Sea-based: Four Vanguard-class ballistic missile submarines operating from HMNB Clyde, Scotland, armed with Trident II D5 missiles.5
France~290 2Sea-based: Four Triomphant-class ballistic missile submarines armed with M51 missiles.12
Air-based: Rafale fighter aircraft (land and carrier-based) armed with ASMPA cruise missiles.12

Table 2: U.S. Forward-Deployed Nuclear Weapons in Europe

This table details the U.S.-owned B61 tactical nuclear bombs deployed in Europe under NATO’s nuclear sharing program and other bilateral agreements. The U.S. retains absolute custody and control of these weapons.6

Host NationAir Base(s)Estimated U.S. B61 Warheads
BelgiumKleine Brogel 110–15 20
GermanyBüchel 110–15 20
ItalyAviano & Ghedi 130–45 20
NetherlandsVolkel 110–15 20
TurkeyIncirlik 120–30 20
United Kingdom*RAF Lakenheath 525–30 20

*Note: The deployment to the UK is distinct from the NATO nuclear sharing program. The weapons are for delivery by U.S. forces stationed at the base, not RAF pilots.5

Table 3: Combined Summary of All Nuclear Weapons in Europe

This table provides a consolidated overview of all known nuclear weapons physically located in Europe, combining sovereign arsenals and U.S. forward-deployed assets.

CountryArsenal TypeEstimated Warhead CountLocation(s) / Base(s)
FranceSovereign~290Sea-based (SSBNs) & Air-based (Rafale aircraft) 12
United KingdomSovereign~225HMNB Clyde (Sea-based SSBNs) 5
ItalyHosted U.S.30–45Aviano & Ghedi Air Bases 1
United KingdomHosted U.S.25–30RAF Lakenheath 5
TurkeyHosted U.S.20–30Incirlik Air Base 1
BelgiumHosted U.S.10–15Kleine Brogel Air Base 1
GermanyHosted U.S.10–15Büchel Air Base 1
NetherlandsHosted U.S.10–15Volkel Air Base 1
Total Estimated~620–685

Conclusion

The nuclear posture in Europe is a complex tapestry woven from sovereign capabilities, alliance commitments, and a shared perception of threat. It is not a monolithic entity but a dynamic, multi-layered system with distinct centers of command and diverse strategic logics. The independent arsenals of the United Kingdom and France provide two sovereign pillars of deterrence. The UK’s sea-based force is technologically linked to the United States and doctrinally integrated with NATO, while France’s dyad stands as a testament to the enduring Gaullist ideal of strategic autonomy. Complementing these is the NATO nuclear sharing arrangement, a Cold War legacy that remains a potent symbol of transatlantic cohesion and the ultimate guarantee of the U.S. commitment to European security.

All European nations involved in this nuclear architecture—whether as sovereign powers or as hosts for U.S. weapons—are firmly aligned within the transatlantic security framework. Their collective deterrent is unambiguously aimed at countering the primary threat posed by the Russian Federation, a reality that has been starkly reinforced by the war in Ukraine. While navigating a complex economic relationship with China, their fundamental security orientation remains fixed on the Euro-Atlantic area.

However, this long-standing architecture is now facing its most significant challenge since the end of the Cold War. A crisis of confidence in the long-term reliability of the U.S. nuclear umbrella has forced European nations to confront uncomfortable questions about their own security. The resulting debate on strategic autonomy and the potential for a more independent European deterrent marks a pivotal moment. The decisions made in the coming years in Paris, London, Berlin, and Warsaw will determine whether the continent reinforces its reliance on the transatlantic partnership or begins to forge a new, more autonomous path. The nuclear landscape in Europe, stable for decades, has entered a period of profound and consequential transformation.


If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly contribute towards our continued reporting, please visit our funding page.


Sources Used

  1. Nuclear Weapons: Who Has What at a Glance – Arms Control Association, accessed September 26, 2025, https://www.armscontrol.org/factsheets/nuclear-weapons-who-has-what-glance
  2. List of states with nuclear weapons – Wikipedia, accessed September 26, 2025, https://en.wikipedia.org/wiki/List_of_states_with_nuclear_weapons
  3. Nuclear weapons profile: United Kingdom – The House of Commons Library, accessed September 26, 2025, https://commonslibrary.parliament.uk/research-briefings/cbp-9077/
  4. Nuclear Disarmament United Kingdom – Nuclear Threat Initiative (NTI), accessed September 26, 2025, https://www.nti.org/analysis/articles/united-kingdom-nuclear-disarmament/
  5. Nuclear weapons of the United Kingdom – Wikipedia, accessed September 26, 2025, https://en.wikipedia.org/wiki/Nuclear_weapons_of_the_United_Kingdom
  6. NATO’s nuclear deterrence policy and forces, accessed September 26, 2025, https://www.nato.int/cps/en/natohq/topics_50068.htm
  7. Taking the Pulse: Can Europeans Build Their Independent Extended Nuclear Deterrent?, accessed September 26, 2025, https://carnegieendowment.org/europe/strategic-europe/2025/04/taking-the-pulse-can-europeans-build-their-independent-extended-nuclear-deterrent?lang=en
  8. en.wikipedia.org, accessed September 26, 2025, https://en.wikipedia.org/wiki/Nuclear_weapons_of_the_United_Kingdom#:~:text=As%20of%202025%2C%20the%20UK,at%20RAF%20Lakenheath%20since%202025.
  9. France and weapons of mass destruction – Wikipedia, accessed September 26, 2025, https://en.wikipedia.org/wiki/France_and_weapons_of_mass_destruction
  10. Can Europe Build Its Own Nuclear Umbrella? | Carnegie …, accessed September 26, 2025, https://carnegieendowment.org/emissary/2025/04/can-europe-build-its-own-nuclear-umbrella?lang=en
  11. The French nuclear deterrent in a changing strategic environment :: Note de la FRS, accessed September 26, 2025, https://www.frstrategie.org/en/publications/notes/french-nuclear-deterrent-changing-strategic-environment-2025
  12. France – Nuclear Threat Initiative (NTI), accessed September 26, 2025, https://www.nti.org/countries/france/
  13. Nuclear Disarmament France, accessed September 26, 2025, https://www.nti.org/analysis/articles/france-nuclear-disarmament/
  14. France’s Nuclear Inventory – Center for Arms Control and Non-Proliferation, accessed September 26, 2025, https://armscontrolcenter.org/wp-content/uploads/2020/03/France.pdf
  15. Arms Control and Proliferation Profile: France, accessed September 26, 2025, https://www.armscontrol.org/factsheets/arms-control-and-proliferation-profile-france
  16. Can France and the United Kingdom Replace the U.S. Nuclear …, accessed September 26, 2025, https://www.csis.org/analysis/can-france-and-united-kingdom-replace-us-nuclear-umbrella
  17. US Extended Nuclear Deterrence in Europe: Three Scenarios …, accessed September 26, 2025, https://www.swp-berlin.org/publikation/us-extended-nuclear-deterrence-in-europe-three-scenarios
  18. The Trump card: What could US abandonment of Europe look like?, accessed September 26, 2025, https://www.iss.europa.eu/publications/briefs/trump-card-what-could-us-abandonment-europe-look
  19. NATO’s Nuclear Sharing Arrangements, accessed September 26, 2025, https://www.nato.int/nato_static_fl2014/assets/pdf/2022/2/pdf/220204-factsheet-nuclear-sharing-arrange.pdf
  20. Nuclear sharing – Wikipedia, accessed September 26, 2025, https://en.wikipedia.org/wiki/Nuclear_sharing
  21. 11. Nuclear Sharing and NATO as a ‘Nuclear Alliance’ – Egmont Institute, accessed September 26, 2025, https://www.egmontinstitute.be/app/uploads/2021/12/ch11.pdf?type=pdf
  22. Articulating the logic of nuclear-sharing – Egmont Institute, accessed September 26, 2025, https://www.egmontinstitute.be/app/uploads/2019/09/SPB116.pdf
  23. European Nuclear Weapons – Verfassungsblog, accessed September 26, 2025, https://verfassungsblog.de/nuclear-weapons/
  24. Six of the ten locations with nuclear weapons in Europe are American – Reddit, accessed September 26, 2025, https://www.reddit.com/r/nuclearweapons/comments/1glpjv8/six_of_the_ten_locations_with_nuclear_weapons_in/
  25. United States nuclear weapons in Europe | CND, accessed September 26, 2025, https://cnduk.org/wp/wp-content/uploads/2018/02/US-nuclear-weapons-in-Europe.pdf
  26. NATO: Nuclear Sharing or Proliferation?, accessed September 26, 2025, https://www.files.ethz.ch/isn/90409/05-04%20NATO%20Nuclear%20Sharing%20or%20Proliferation.pdf
  27. Nuclear Disarmament NATO, accessed September 26, 2025, https://www.nti.org/analysis/articles/nato-nuclear-disarmament/
  28. Fact Sheet: U.S. Nuclear Weapons in Europe, accessed September 26, 2025, https://armscontrolcenter.org/fact-sheet-u-s-nuclear-weapons-in-europe/
  29. Countries with nuclear weapons – ICAN, accessed September 26, 2025, https://www.icanw.org/nuclear_arsenals
  30. COMMANDING AND CONTROLLING NUCLEAR WEAPONS – Program on Science and Global Security, accessed September 26, 2025, https://sgs.princeton.edu/sites/default/files/2020-01/mian-2012b.pdf
  31. Reconsidering U.S. nuclear weapons in Europe – Defense Priorities, accessed September 26, 2025, https://www.defensepriorities.org/reports/reconsidering-us-nuclear-weapons-in-europe/
  32. More investment in nuclear deterrence will not make Europe safer | SIPRI, accessed September 26, 2025, https://www.sipri.org/commentary/essay/2023/more-investment-nuclear-deterrence-will-not-make-europe-safer
  33. Turkiye And The West: Between Geopolitical Risks And Strategic Roots – Hoover Institution, accessed September 26, 2025, https://www.hoover.org/research/turkiye-and-west-between-geopolitical-risks-and-strategic-roots
  34. Germany–Russia relations – Wikipedia, accessed September 26, 2025, https://en.wikipedia.org/wiki/Germany%E2%80%93Russia_relations
  35. Germany’s Continued Illusions About China and Russia, accessed September 26, 2025, https://carnegieendowment.org/europe/strategic-europe/2022/10/germanys-continued-illusions-about-china-and-russia?lang=en
  36. Russian Geopolitical Challenges: Economic Relations with Germany | Defense.info, accessed September 26, 2025, https://defense.info/global-dynamics/2025/08/russian-geopolitical-challenges-economic-relations-with-germany/
  37. Belgium–Russia relations – Wikipedia, accessed September 26, 2025, https://en.wikipedia.org/wiki/Belgium%E2%80%93Russia_relations
  38. Italy’s challenging divorce from Russia | ECFR – European Council on Foreign Relations, accessed September 26, 2025, https://ecfr.eu/article/italys-challenging-divorce-from-russia/
  39. The ambassador – Russian Federation – Netherlandsandyou.nl, accessed September 26, 2025, https://www.netherlandsandyou.nl/web/russian-federation/about-us/ambassador
  40. Why we won’t abandon China | FPS Foreign Affairs – Foreign Trade and Development Cooperation – Belgium.be, accessed September 26, 2025, http://diplomatie.belgium.be/en/policy/policy-areas/highlighted/why-we-wont-abandon-china
  41. Germany’s China Policy: Has It Learned From Its Dependency on Russia?, accessed September 26, 2025, https://www.cfr.org/in-brief/germanys-china-policy-has-it-learned-its-dependency-russia
  42. How can Europe’s nuclear deterrence trilemma be resolved? – Bruegel, accessed September 26, 2025, https://www.bruegel.org/working-paper/how-can-europes-nuclear-deterrence-trilemma-be-resolved
  43. Europe’s Nuclear Deterrent: The Here and Now, accessed September 26, 2025, https://www.iiss.org/online-analysis/survival-online/2025/06/europes-nuclear-deterrent-the-here-and-now/

The Unmanned Leviathan: A Comparative Analysis of Drone Swarm Strategies in Modern Warfare

The character of modern warfare is undergoing a fundamental transformation, driven by the rapid proliferation and operationalization of unmanned aerial systems (UAS), particularly in the form of autonomous swarms. This report provides a comprehensive analysis of the strategic, doctrinal, and technological approaches to drone swarm warfare being pursued by the United States, the People’s Republic of China, the Russian Federation, and Ukraine. The analysis reveals a strategic divergence in development and employment philosophies. The United States and its allies are pursuing a technologically-driven approach, developing high-cost, deeply integrated “quality” swarms designed to function as collaborative extensions of exquisite manned platforms, emphasizing human-on-the-loop control. In contrast, observations from the Russo-Ukrainian War and analysis of Chinese military doctrine point toward a strategy centered on “quantity”—the mass employment of low-cost, attritable, and rapidly iterated drones to achieve victory through saturation and an advantageous cost-exchange ratio.

The conflict in Ukraine serves as a crucible for these concepts, demonstrating the devastating effectiveness of both bottom-up, adaptive swarm tactics and sophisticated, top-down combined-arms saturation attacks. It has exposed the critical importance of the electromagnetic spectrum as the primary battleground for swarm conflict and has accelerated a relentless cycle of innovation in both drone capabilities and counter-UAS (C-UAS) measures. China’s doctrine of “intelligentized warfare” represents the most structured pursuit of this new paradigm, viewing autonomous swarms not as a support tool but as the decisive element of future conflict.

This report concludes that the rise of the drone swarm erodes the concept of the rear-area sanctuary, democratizes precision strike capabilities, and forces a re-evaluation of traditional military force structures and procurement models. The future security landscape will likely be defined by a bifurcation of military power: a high-tech competition in fully autonomous swarm warfare among major powers, and a proliferation of low-cost, attritable swarm capabilities among smaller states and non-state actors, each presenting distinct and formidable challenges.

Section 1: The Anatomy of a Swarm: Foundational Concepts and Technologies

To comprehend the strategic implications of drone swarms, it is essential to first dissect their foundational technical and conceptual underpinnings. A swarm is not merely a multitude of drones; it is a complex, cohesive entity defined by its internal communication, collective intelligence, and degree of autonomy. This section establishes the core principles that differentiate a true swarm from a simple multi-drone formation.

1.1 Defining the Swarm: From Multi-Drone Operations to Collective Intelligence

A drone swarm is a system of interconnected agents that exhibit collective, emergent behavior through autonomous coordination.1 The U.S. Government Accountability Office (GAO) formally defines a swarm as a coordinated system of at least three drones capable of performing missions with minimal human oversight.3 This stands in stark contrast to “multiple drone operation,” a distinct concept where several drones fly independent, predefined routes under the management of a single operator, without the inter-agent communication and collaboration that defines a swarm.2

The principle animating this collective behavior is “swarm intelligence,” which posits that a group of simple agents, each following a basic set of rules, can collectively perform complex tasks and exhibit intelligence beyond the capabilities of any single member.5 This concept, inspired by the emergent behavior of natural systems like ant colonies, schools of fish, and flocks of birds, holds that the whole is greater than the sum of its parts.5 This emergent behavior is typically governed by three fundamental rules, first modeled by Craig Reynolds, which are applied to each individual drone in relation to its neighbors:

  • Separation: Maintain a minimum distance to avoid collisions.6
  • Alignment: Adjust heading to match the average direction of nearby drones.6
  • Cohesion: Move toward the average position of the group to maintain unity.5

These simple, localized interactions generate sophisticated, coordinated global behavior without requiring a central leader or controller. Despite the clear military significance of this technology, the U.S. Department of Defense (DOD) currently lacks a standardized joint definition for “swarm” in its doctrinal lexicon. This omission hinders the development of a common operational picture, impedes acquisition efficiency, and complicates interoperability among allied forces.9 The urgent need for a formal definition is underscored by rapid adversarial advancements and the DOD’s own strategic initiatives, such as Replicator, which are centered on deploying autonomous systems at scale.9

1.2 Command, Control, and Communication (C3): The Swarm’s Nervous System

The command, control, and communication (C3) architecture forms the nervous system of a swarm, dictating how it processes information and coordinates action. These architectures exist on a spectrum between two principal models, the choice of which carries profound strategic implications.

The first model is centralized control, where a single ground control station (GCS) or a designated “leader” drone serves as the central brain, processing all sensor data and issuing specific commands to each “follower” drone in the swarm.2 While this leader-follower structure is simpler to design and implement, it is inherently “brittle.” The central node represents a critical single point of failure; its neutralization through kinetic attack or electronic warfare can cause the catastrophic collapse of the entire swarm’s operational capability.6

The second, more advanced model is decentralized (or distributed) control. In this paradigm, each drone is an autonomous agent equipped with its own processing capabilities. They share information across the network, collaboratively build a shared understanding of the environment, and make collective decisions based on local data and overarching mission objectives.2 This architecture is fundamentally more “resilient.” The loss of one or even several drones does not compromise the mission, as the remaining agents can adapt and continue to operate, exhibiting the “self-healing” properties demonstrated in early U.S. tests.1 A nation’s capacity to field these truly resilient swarms is therefore a direct function of its software prowess in artificial intelligence and edge computing, not merely its drone manufacturing output.

This resilience is enabled by a wireless mesh network topology, where each drone functions as a communication node, relaying data for the entire network.13 This creates redundant communication paths and allows the network to dynamically reconfigure around damaged or jammed nodes.13 However, maintaining these links in a contested electromagnetic environment is the single greatest challenge in swarm warfare. Protocols such as MQTT and UDP are used to ensure the low-latency data exchange essential for real-time coordination, but adversaries will aggressively target these links with jamming, spoofing, and cyber-attacks.15

Consequently, the development of robust anti-jamming (AJ) and resilient communication techniques is a primary focus of military research. This has spurred significant investment in countermeasures that move beyond traditional frequency hopping (FHSS).19 Advanced methods include:

  • Directional Communications: Using smart, beam-steering antennas to create narrow, focused data links that are difficult for an enemy to detect and disrupt, while simultaneously creating “nulls” in the direction of jamming sources.18
  • Optical Communication: Employing laser-based systems for inter-drone communication, which are inherently resistant to radio frequency (RF) jamming and interception due to their high bandwidth and narrow, directional beams.23
  • AI-Driven Spectrum Management: Using reinforcement learning algorithms to enable the swarm to autonomously sense the electromagnetic environment, identify jammed frequencies, and dynamically switch channels or reroute data to maintain connectivity.20

This intense focus on communications reveals that the primary battleground for swarm warfare will be the electromagnetic spectrum. A swarm whose C3 links are severed is no longer a cohesive weapon but a collection of isolated, ineffective drones. The decisive action in a future swarm engagement may not be a kinetic dogfight, but a battle of electronic warfare to control the network itself.

1.3 The Engine of Autonomy: Swarm Intelligence and AI

The behavior of a swarm is orchestrated by a sophisticated suite of algorithms that govern everything from basic flight to complex tactical decision-making.25 These include algorithms for path planning, obstacle avoidance, task allocation, and maintaining specific geometric formations (e.g., line, grid, V-shape) optimized for different missions like search or attack.1

Central to decentralized operation are consensus algorithms, such as Raft, which are drawn from the field of distributed computing.15 These protocols allow all drones in the swarm to agree on a single, consistent state—such as the location of a newly detected threat or the position of a friendly unit—without a central authority. This capability is critical for maintaining coherence and enabling autonomous operation in environments where GPS or communication with a ground station may be denied.28

Artificial intelligence (AI) and machine learning (ML) are the key technologies that elevate a swarm from a pre-programmed formation to a truly adaptive and intelligent system.4 Deep Reinforcement Learning (DRL), for example, allows drones to learn optimal behaviors through trial-and-error interaction with a simulated or real environment, enabling them to devise novel tactics for complex, unpredictable scenarios without explicit programming.2

In modern military concepts, particularly in the U.S., the ultimate goal is not full autonomy but effective human-machine teaming. In this model, AI handles the computationally intensive tasks—processing vast sensor datasets, optimizing flight paths for hundreds of drones, and identifying potential targets—while a human operator provides high-level commander’s intent, sets mission objectives, and defines the rules of engagement.5 This synergistic structure leverages the speed and data-processing power of AI while retaining the contextual understanding and ethical judgment of a human commander.

Section 2: The Vanguard of Autonomy: United States Swarm Doctrine and Programs

The United States military’s approach to swarm warfare is characterized by a top-down, technology-centric strategy, driven by well-funded, long-term research and development programs. The overarching goal is to create highly capable, “exquisite” swarms that are deeply integrated with existing force structures and function as autonomous extensions of the human warfighter, enhancing the lethality and survivability of high-value platforms.

2.1 Department of Defense Strategic Framework

The Department of Defense’s official strategy for countering unmanned systems explicitly acknowledges that future adversaries will employ networked, autonomous swarms and that U.S. forces must be prepared for “stressing cases,” such as attacks involving large numbers of increasingly capable systems.31 The U.S. response is twofold: developing its own offensive swarm capabilities while simultaneously fielding a robust, multi-layered defense.

A cornerstone of this strategy is the Replicator Initiative, announced in 2023. This program aims to field thousands of small, attritable, autonomous systems across multiple domains by August 2025, with the explicit goal of countering the numerical mass of potential adversaries, particularly the People’s Republic of China.9 This initiative represents a significant acknowledgment at the highest levels of the Pentagon that technological superiority alone may be insufficient and must be complemented by scalable mass.

On the defensive side, the DOD’s counter-UAS (C-UAS) strategy emphasizes that drone defense is the responsibility of the entire Joint Force, not just specialized air defense units.33 It calls for a layered defense integrating both active systems (interceptors, directed energy) and passive measures (camouflage, hardening), with significant investment in emerging technologies like high-power microwaves (HPM) deemed essential for defeating swarm attacks.33

2.2 The DARPA Engine: Pioneering Swarm Concepts

The Defense Advanced Research Projects Agency (DARPA) has been the primary engine for innovation in U.S. swarm technology, laying the conceptual and technological groundwork that service-level programs now build upon.

The seminal program was the OFFensive Swarm-Enabled Tactics (OFFSET) initiative, which ran from 2017 to 2021.30 OFFSET’s vision was to enable small infantry units to command heterogeneous swarms of up to 250 air and ground robots in complex urban environments.30 The program’s key technological thrusts were not just the drones themselves, but the human-swarm interface. It pioneered the use of immersive technologies like virtual and augmented reality (VR/AR), as well as voice and gesture controls, to allow a single operator to manage a large swarm by communicating high-level intent rather than micromanaging individual drones.30 By creating a virtual “wargaming” environment and an open systems architecture, OFFSET fostered a community of developers to rapidly create and test new swarm tactics, proving the feasibility of the human-swarm teaming model.35

Other foundational DARPA efforts validated key enabling capabilities. The Perdix program famously demonstrated the launch of 103 micro-drones from canisters ejected by F/A-18 fighter jets. The drones then autonomously formed a swarm, demonstrating collective decision-making and “self-healing” behaviors when individual units failed.1 The Gremlins program explored the more complex concept of launching and recovering drone swarms in mid-air from a mothership aircraft, tackling the challenge of reusable swarm assets.9

2.3 Service-Specific Applications and Platforms

Building on DARPA’s research, each U.S. military service is developing swarm capabilities tailored to its unique operational domains and doctrinal concepts.

U.S. Air Force: Collaborative Munitions and Autonomous Wingmen

The Air Force is focused on integrating swarming and autonomy into its air superiority and strike missions. The Golden Horde program, one of the service’s priority Vanguard initiatives, seeks to network munitions together into a collaborative swarm.38 By modifying weapons like the GBU-39 Small Diameter Bomb (SDB) and the ADM-160 Miniature Air-Launched Decoy (MALD) with a collaborative autonomy payload, the program enables them to communicate with each other after launch.39 This allows the swarm of weapons to share sensor data, autonomously re-allocate targets based on battlefield developments (e.g., a higher-priority target appearing), and cooperatively defeat enemy defenses without real-time input from the launch aircraft.40

On a larger scale, the Collaborative Combat Aircraft (CCA) program is developing attritable, autonomous drones designed to operate as robotic wingmen for manned fighters like the F-22 and F-35.41 While a single CCA is not a swarm, Air Force doctrine envisions these platforms operating in teams and potentially swarms, extending the sensor and weapons reach of manned formations and absorbing risk in highly contested airspace.41 This deep integration of autonomy is forcing the service’s doctrinal thinkers in the Air Force Doctrine 2035 (AFD35) initiative to fundamentally reassess core concepts of air superiority and airspace control in an era of “proliferated autonomous drones”.42

U.S. Navy & Marine Corps: Distributed Lethality and Expeditionary Warfare

For the maritime services, swarms offer a means to distribute offensive and defensive capabilities across the fleet. Early work by the Office of Naval Research (ONR) in the LOCUST (Low-Cost UAV Swarming Technology) program demonstrated the ability to rapidly launch swarms of tube-launched drones, like the Coyote, from ships to overwhelm adversary defenses.43 More recently, the Silent Swarm exercise has shifted focus to using swarms of air and surface drones for non-kinetic effects, such as distributed electronic warfare (EW) and deception, to control the electromagnetic spectrum and create tactical advantages for the fleet.45

The U.S. Marine Corps views swarming drones as a “critical” enabler for its Expeditionary Advanced Base Operations (EABO) doctrine.46 EABO envisions small, mobile, and low-signature Marine units operating from austere, temporary bases within an adversary’s weapons engagement zone. Air-launched swarms, designated Long-Range Attack Munitions (LRAMs), launched from platforms like MV-22 Ospreys or F-35Bs, would provide these dispersed units with organic, long-range intelligence, surveillance, and reconnaissance (ISR), electronic warfare, and precision strike capabilities, dramatically increasing their lethality and survivability.46

U.S. Army: Swarms for the Combined Arms Fight

The U.S. Army is exploring swarm applications to enhance its ground combat operations. The annual Project Convergence experiment serves as a primary venue for testing how swarms can act as a “bridge across domains,” linking ground-based sensors to air- and sea-based shooters, coordinating EW effects, and accelerating the joint kill chain.48 The Army is also investigating practical applications for sustainment operations, such as using autonomous drone swarms to provide a persistent ISR “bubble” for convoy security and to monitor the perimeters of large support areas, compensating for personnel shortfalls and providing early warning of threats.37 The Army’s draft UAS strategy reflects this broader shift, emphasizing the need for autonomous systems that can understand and execute a commander’s intent rather than requiring continuous, hands-on piloting.50

A consistent theme across all U.S. development is the doctrinal insistence on maintaining a “human on the loop” for lethal decision-making.51 While ethically and legally crucial, this framework introduces a potential “decision-speed mismatch.” A U.S. swarm that must await human authorization for each engagement could be tactically outpaced by a fully autonomous adversary swarm capable of executing the entire kill chain at machine speed. This places U.S. doctrine in a difficult position, balancing the imperative for ethical control against the demands of tactical effectiveness in a future, high-speed conflict.

Section 3: The Dragon’s Swarm: China’s Doctrine of “Intelligentized Warfare”

The People’s Liberation Army (PLA) is pursuing a comprehensive, state-directed strategy for swarm warfare that is deeply integrated into its national military modernization goals. Unlike the U.S. model, which often treats swarms as a supporting capability, China’s emerging doctrine of “intelligentized warfare” positions autonomous systems and swarm intelligence as a central, and potentially decisive, feature of future conflict. This approach leverages a whole-of-nation effort, including a robust civil-military fusion strategy, to achieve both technological superiority and overwhelming mass.

3.1 From Informatization to Intelligentization: A New Theory of Victory

The PLA’s modernization framework has progressed through three distinct, overlapping phases: first Mechanization, then Informatization (信息化), and now Intelligentization (智能化).52 “Intelligentized warfare” is the PLA’s conceptual answer to future conflict, a theory of victory predicated on the pervasive use of artificial intelligence, big data, and autonomous systems to gain and maintain a decisive advantage on the battlefield.53

Within this doctrine, the PLA outlines a clear technological and conceptual progression for the employment of unmanned systems 56:

  1. Fleet Operations: The initial stage, analogous to mechanization, where combat power is generated by the sheer quantity of drones operating with limited coordination.
  2. Group Operations: The informatized stage, where drones are networked under a unified command structure and operate as a single, cohesive group to achieve a common task.
  3. Swarm Operations: The ultimate, intelligentized stage, characterized by a group of autonomous, networked UAVs that are decentralized, self-organizing, and exhibit emergent group intelligence. PLA strategists believe this capability will “subvert traditional warfare concepts” through autonomous self-adaptation, self-coordination, and self-decision making.56

PLA research on human-machine collaboration (人机协同) mirrors this progression, envisioning a future where human input is reduced to high-level command, such as launch and recovery, while the swarm itself handles complex coordination and execution autonomously.58 This doctrinal embrace of full autonomy aims to create a military that can leapfrog traditional Western advantages in areas like manned air superiority by shifting the paradigm of conflict to one of intelligent mass and machine-speed decision-making.

3.2 Key Platforms and Industrial Actors

China’s rapid progress in swarm technology is fueled by its national strategy of Civil-Military Fusion (军民融合), which systematically breaks down barriers between the defense and commercial technology sectors.59 This allows the PLA to rapidly identify and militarize cutting-edge commercial innovations. A prime example is the containerized mass launch-and-recovery system developed by DAMODA, a company specializing in drone light shows. This system, capable of deploying thousands of quadcopters with the push of a button, has obvious and direct military applications for launching saturation attacks.61 This fusion creates an unpredictable innovation cycle, presenting a significant challenge for Western intelligence, which must now monitor a vast commercial ecosystem for breakthrough technologies that could be weaponized with little warning.

Key industrial players in China’s swarm ecosystem include:

  • State-Owned Defense Giants:
  • China Electronics Technology Group Corporation (CETC): A leader in military swarm R&D, CETC has conducted multiple record-breaking tests with fixed-wing drone swarms of up to 200 units.62 It has also demonstrated mature, truck-mounted, 48-tube launchers for deploying swarms of loitering munitions.64
  • AVIC and CAAA: These corporations produce the widely exported Wing Loong and Caihong (CH) series of combat drones, which serve as foundational platforms for more advanced capabilities.65
  • Private and Dual-Use Companies:
  • Ziyan: This company develops and markets advanced unmanned helicopter drones, such as the Blowfish A3. These platforms are explicitly advertised with the capability to form intelligent swarms of up to 10 units for coordinated strikes, carrying mixed payloads including machine guns, grenade launchers, and mortars.67
  • The “Mothership” Concept: China is actively developing large unmanned “mothership” aircraft, such as the 10-ton Jiu Tian. These platforms are designed to carry and deploy swarms of smaller drones deep into contested airspace, dramatically extending their operational range and providing a survivable launch mechanism far from enemy defenses.32

3.3 Strategic Application: The Taiwan Scenario

Analysis of PLA doctrinal writings and technical papers reveals a central organizing principle for its swarm development: solving the immense military challenge of a potential invasion of Taiwan.72 In this context, the PLA envisions using swarms to execute several critical missions:

  • Suppression of Enemy Air Defenses (SEAD): The PLA plans to use massed swarms of “suicide drones” and decoys to saturate and overwhelm Taiwan’s sophisticated, but numerically limited, air defense network.75 This could involve using large numbers of converted legacy fighter jets, like the J-6, as large, fast decoys or crude cruise missiles to absorb interceptors ahead of more advanced strikes.75
  • Amphibious Assault Support: PLA simulations and exercises depict a phased attack where drone swarms first neutralize enemy radar and command centers, followed by saturation strikes from anti-ship missiles to isolate the island, and finally, precision strikes from loitering munitions to support landing forces.70
  • Anti-Access/Area Denial (A2/AD): In a broader conflict, the PLA would likely deploy swarms from land, air, and sea-based platforms to conduct anti-ship missions, targeting U.S. and allied naval forces attempting to intervene.73

3.4 Global Proliferation and Export Strategy

China has leveraged its massive industrial base to become the world’s leading exporter of combat drones, selling systems like the Wing Loong and CH-4 to at least 17 countries, many of which are denied access to comparable Western technology.65 This success is driven by a combination of significantly lower costs, “good enough” capabilities that meet the needs of many regional powers, flexible financing, and fewer end-use restrictions.65

This export strategy extends to counter-swarm systems as well. Norinco is actively marketing its “Bullet Curtain” system, a 35mm cannon designed specifically to defeat swarm attacks by firing airburst munitions that create a dense cloud of sub-projectiles.53 By exporting both swarm and counter-swarm technologies, China is positioning itself as an indispensable defense partner for a growing number of nations and shaping the global landscape of unmanned warfare.

Section 4: The Crucible of Combat: Lessons from the Russo-Ukrainian War

The Russo-Ukrainian War has become the world’s foremost laboratory for drone warfare, providing an unprecedented volume of real-world data on the employment, limitations, and rapid evolution of unmanned systems. The conflict serves as a practical crucible, testing theoretical concepts and forcing a relentless pace of innovation from both sides. It demonstrates a clear bifurcation in approach: Ukraine’s bottom-up, asymmetric strategy versus Russia’s top-down, increasingly sophisticated use of massed drone attacks.

4.1 Ukraine’s “Drone Wall”: Asymmetric Innovation at Scale

Facing a numerically and technologically superior adversary, Ukraine has embraced a strategy of asymmetric warfare heavily reliant on drones. This effort is characterized by rapid, decentralized, and battlefield-driven innovation, fueled by a unique ecosystem of state funding, extensive volunteer networks, and direct feedback from frontline units.78 This has enabled the domestic production and deployment of millions of First-Person View (FPV) drones.78

This mass deployment has given rise to the “Drone Wall” or “Drone Line” concept—a defensive strategy designed to compensate for critical shortages in conventional artillery and trained infantry.79 This doctrine envisions a 10-15 kilometer-deep “kill zone” along the front, saturated with a layered network of FPV strike drones, reconnaissance drones, interceptors, and electronic warfare systems. The objective is to attrit any and all Russian activity, preventing enemy forces from massing for assaults and effectively holding the line with technology rather than manpower.78

While often not constituting a true “intelligent swarm” with full autonomy, Ukrainian FPV operators employ sophisticated coordinated tactics. Using “wolfpack” or sequential attacks, multiple drones are directed at a single high-value target, such as a tank. The first drone might be used to disable the tank’s protective “cope cage” armor or its electronic warfare jammer, creating a vulnerability for subsequent drones to exploit with a direct, disabling hit.81 This tactical coordination has made FPV drones the primary source of Russian casualties on the battlefield.78

This innovative spirit extends to the maritime domain. Ukraine has used swarms of MAGURA V5 unmanned surface vessels (USVs) to inflict devastating losses on the Russian Black Sea Fleet. These attacks typically involve packs of 6-10 USVs approaching a target warship from multiple axes in sequential waves.82 The primary tactic is to achieve a single successful impact, which slows or disables the vessel, rendering it a stationary target for follow-on strikes from the rest of the swarm.82 This strategy has been remarkably successful, neutralizing approximately one-third of the Black Sea Fleet and sinking or heavily damaging numerous vessels, including the missile corvette Ivanovets and the patrol ship Sergey Kotov.83 This has effectively broken Russia’s naval blockade without a conventional navy.

Furthermore, the MAGURA platform has evolved into a multi-purpose “mothership.” Ukrainian forces have adapted these USVs to launch FPV drones against coastal targets and have even armed them with modified R-73 air-to-air missiles, successfully shooting down Russian helicopters and Su-30 fighter jets over the Black Sea.84 This tactical validation of the mothership concept—using a larger platform to extend the range of smaller unmanned systems—is a significant development being implemented with low-cost, rapidly iterated technology.

4.2 Russia’s Evolving Swarm Tactics: From Uncoordinated to Sophisticated

Russia’s employment of drones has evolved dramatically throughout the conflict. Its primary tactical loitering munition is the domestically produced ZALA Lancet, a precision weapon used to strike high-value Ukrainian targets like artillery systems, air defenses, and command vehicles, typically cued by a separate reconnaissance drone.87 For long-range strategic attacks, Russia relies heavily on the Iranian-designed Shahed-136 (localized as the Geran-2), targeting Ukrainian energy infrastructure and cities.88

The tactics for employing these strategic drones have progressed through several distinct phases 89:

  1. Initial Phase (2022): Uncoordinated, individual drones were launched during the day, often following predictable low-altitude flight paths, making them vulnerable to interception.
  2. Second Phase (Early 2023): Russia shifted to simple nighttime “swarm attacks,” launching small groups of 6-8 drones simultaneously to complicate defensive efforts.
  3. Current Phase (Late 2023-Present): Russia now employs highly sophisticated, combined-arms saturation attacks. A typical strike package begins with waves of cheap Gerbera decoy drones, which have no warhead but are designed to trigger Ukrainian air defense radars. This allows Russia to map the location and activity of the defensive network. This is followed by multiple, coordinated waves of Shahed drones and conventional cruise and ballistic missiles, timed to arrive at their targets simultaneously from different directions and altitudes. This complex tactic is designed to confuse, saturate, and ultimately overwhelm Ukraine’s entire air defense system.

Russia is also beginning to integrate AI into its newest drone models. The latest Shahed variants reportedly use AI to coordinate their terminal attacks, gathering near a target area and then striking in a synchronized swarm to overload point-defense systems, a development that has reportedly decreased Ukrainian interception success rates from 95% down to 70-85%.90

4.3 The Electronic Battlefield: The Constant War of Measures and Countermeasures

The Russo-Ukrainian War has unequivocally demonstrated that the electromagnetic spectrum is a decisive domain in modern conflict. The battlefield is saturated with powerful electronic warfare (EW) systems from both sides, creating a highly contested environment where drone command, video, and navigation links are under constant attack.80 This has led to extremely high attrition rates for drones, with some estimates suggesting that 60-80% of Ukrainian FPV strikes fail due to Russian jamming.78

This intense electronic battle has ignited a rapid and relentless innovation-adaptation cycle:

  • Widespread Russian jamming of common drone frequencies prompted Ukrainian developers to shift to different, less-congested frequency bands and incorporate frequency-hopping capabilities.92
  • As EW systems became more sophisticated and broad-spectrum, both sides began developing and deploying fiber-optic-guided drones. These drones are physically tethered to their operator by a long, thin fiber-optic cable, making their command link immune to RF jamming.80
  • The RF emissions from drone operators’ control stations became a liability, as Russian forces began using signals intelligence to triangulate their positions and target them with artillery, glide bombs, and other drones. This has made the human drone operator a high-value target, leading to a significant increase in casualties among these skilled personnel.91
  • To counter both EW and the threat to operators, the latest evolutionary step is the integration of AI-powered terminal guidance and machine vision. This allows a drone to autonomously lock onto and home in on a target even if the connection to its operator is severed by jamming in the final phase of its attack.94

This cycle reveals a critical shift in battlefield calculus. In many situations, it is now more effective to target the human operator than the drone itself. This reality forces a doctrinal focus on operator survivability, demanding mobile tactics, hardened control stations, and the development of longer-range, more autonomous systems that allow operators to be positioned further from the front lines.

Section 5: Breaking the Swarm: A Multi-Layered Approach to Counter-UAS

The proliferation of drone swarms has catalyzed a global effort to develop effective counter-unmanned aerial system (C-UAS) technologies and tactics. Defeating a swarm presents a unique challenge distinct from countering a single, sophisticated aircraft; it requires a defense capable of handling overwhelming mass and a severe cost imbalance. The most effective strategies employ a layered, “system of systems” approach that integrates kinetic effectors, directed energy weapons, electronic warfare, and passive measures.

5.1 Kinetic Defeat Mechanisms: Interceptors and Guns

Kinetic solutions aim to physically destroy incoming drones. The leading concept is “it takes a swarm to kill a swarm,” which involves using dedicated interceptor drones to engage attackers.96

  • Interceptor Drones: The Raytheon Coyote is a premier C-UAS effector in the U.S. arsenal, adopted by both the Army and Navy.97 The Coyote Block 2 is a tube-launched, jet-powered interceptor with a blast-fragmentation warhead, designed for high-speed engagements against single drones and swarms.99 It is the primary kinetic effector for the U.S. Army’s Low, slow, small-unmanned aircraft Integrated Defeat System (LIDS), where it is cued by the Ku-band Radio Frequency Sensor (KuRFS) radar.97 The U.S. Army has committed to multi-billion dollar contracts for Coyote systems, signaling its importance in their C-UAS architecture.102 Other dedicated interceptors are also in development, such as Anduril’s Roadrunner.96
  • Gun Systems: Conventional air defense artillery offers a cost-effective solution. Ammunition is cheap and widely available, making gun systems an efficient tool against low-cost drone threats.33 Systems like the 35mm Gepard self-propelled anti-aircraft gun have proven highly effective in Ukraine against Shahed drones.90 China has developed a purpose-built anti-swarm weapon, the “Bullet Curtain,” a 35mm gun system that fires programmable airburst munitions designed to create a dense cloud of sub-projectiles, emphasizing area saturation over single-target precision.53

The fundamental challenge for all kinetic defenses is the cost-exchange ratio. Employing a multi-million-dollar surface-to-air missile, like an SM-2, to intercept a $35,000 Shahed drone is economically unsustainable in a protracted conflict.32 This adverse asymmetry is the primary driver for developing low-cost kinetic solutions like the Coyote (with a unit cost around $100,000) and revitalizing gun-based air defense.104

5.2 Directed Energy and Non-Kinetic Effectors: Lasers and Microwaves

Directed Energy Weapons (DEWs) offer a transformative solution to the cost and magazine depth problems of kinetic interceptors.

  • High-Energy Lasers (HEL): HEL systems use a focused beam of light to burn through a drone’s airframe or disable its optical sensors.107 They provide speed-of-light engagement, extreme precision, and a near-zero cost-per-shot, limited only by the availability of electrical power.107 Key developmental systems include the U.S. Army’s DE M-SHORAD, a 50 kW-class laser mounted on a Stryker vehicle, and the British Royal Navy’s DragonFire, a 50 kW-class naval laser weapon.107 However, HELs are generally single-target engagement systems, making them less suited for defeating a dense, simultaneous swarm attack, and their effectiveness can be degraded by adverse atmospheric conditions like rain, fog, or smoke.108
  • High-Power Microwaves (HPM): HPM systems are widely considered the most promising technology for defeating swarm attacks.33 Instead of destroying targets one by one, an HPM weapon emits a wide cone of intense microwave radiation that disrupts or permanently disables the unshielded electronics of multiple drones simultaneously.110 The leading U.S. system is the Air Force Research Laboratory’s THOR (Tactical High-power Operational Responder). THOR is a containerized system designed for base defense that can be rapidly deployed and can neutralize a swarm with an instantaneous, silent burst of energy.110 The development of HPM systems signifies a critical shift in defensive thinking, moving from single-target interception to area-effect neutralization.

The rise of DEWs fundamentally alters the concept of “magazine depth.” For traditional air defense, it is a physical limit—the number of missiles in a launcher. For DEWs, it is an electrical limit—the capacity and resilience of the power source.107 This shifts the logistical focus for air defense from resupplying munitions to ensuring robust, high-output mobile power generation on the battlefield.

5.3 Passive and Integrated Defense

No active defense system is infallible. Therefore, a comprehensive C-UAS strategy must include passive measures and an integrated command structure.

  • Passive Defense: When active defenses are saturated or fail, passive measures are essential for survival. These include traditional military arts like camouflage, concealment, and dispersal of forces, as well as physical hardening of critical infrastructure.33 On the modern battlefield, this has also led to the widespread adoption of simple but effective measures like anti-drone netting and vehicle-mounted “cope cages” designed to prematurely detonate the warhead of an FPV drone.87
  • Integrated, AI-Enabled C2: Effectively countering a swarm requires a “system of systems” approach that fuses data from diverse sensors—including radar, electro-optical/infrared (EO/IR) cameras, and RF detectors—into a single common operating picture.113 AI and machine learning are critical to this process. AI algorithms can rapidly process fused sensor data to detect and classify threats within a swarm, assess their trajectory and level of threat, and automatically assign the most appropriate and cost-effective effector (jamming, HPM, laser, interceptor, or gun) to each target.33 This automation is essential to accelerate the kill chain to a speed capable of coping with a high-volume swarm attack. This necessity is forcing a convergence of the historically separate disciplines of air defense (kinetic effects) and electronic warfare (spectrum control), requiring future air defenders to be proficient in managing both the physical and electromagnetic domains.101

Section 6: Strategic Implications and Future Outlook

The ascent of drone swarm technology is not merely an incremental improvement in military capability; it represents a paradigm shift with profound implications for the calculus of attrition, military doctrine, and the very character of future conflict. As swarms become more autonomous, interconnected, and prevalent, they will reshape the strategic landscape, challenge established military hierarchies, and force a fundamental rethinking of force design and investment priorities.

6.1 The New Calculus of Attrition: Mass Over Exquisiteness

The most significant strategic impact of drone swarms is the “democratization of precision strike”.31 The availability of cheap yet highly effective unmanned systems allows smaller nations and even non-state actors to wield the kind of massed, precision-fire capabilities that were once the exclusive domain of major military powers.

This trend is driven by cost-asymmetry as a strategic weapon. The core principle of swarm warfare is to force a technologically superior adversary into an economically unsustainable exchange: trading swarms of low-cost, attritable offensive drones for the adversary’s limited stocks of high-cost, exquisite defensive munitions.32 A successful attrition strategy can deplete an opponent’s advanced air defense arsenal, rendering them vulnerable to subsequent attacks by more conventional and valuable platforms like manned aircraft or ballistic missiles.

This strategy necessitates a profound cultural and doctrinal shift toward an attritable mindset. The resilience of a decentralized swarm is predicated on the idea that the loss of individual units is not only acceptable but expected.6 The swarm’s strength lies in the collective, not the individual platform. This directly challenges the traditional Western military focus on force preservation, where every platform, from a fighter jet to a main battle tank, is a high-value asset whose loss is significant.

6.2 Doctrinal and Organizational Imperatives

Adapting to the reality of swarm warfare requires significant changes to military doctrine, training, and organization.

  • Force-Wide Training: Counter-UAS can no longer be the exclusive responsibility of specialized air defense units. Every military unit, from a frontline infantry squad to a rear-area logistics convoy, must be trained and equipped for self-protection against drone threats.33 This may necessitate the creation of new military occupational specialties (MOS) dedicated to drone operations and C-UAS, as the U.S. Army is currently exploring.50
  • Agile Acquisition: The rapid, iterative innovation cycles observed in the Russo-Ukrainian War, where new drone variants and countermeasures appear in a matter of months, render traditional, multi-year defense acquisition processes obsolete.83 Militaries must adopt more agile procurement models that can rapidly identify, fund, and field new technologies, with a greater emphasis on leveraging the commercial sector and open-systems architectures.116
  • The Imperative for Mass: For decades, Western military philosophy has prioritized small numbers of technologically superior platforms over numerical mass. The swarm paradigm challenges this assumption. Initiatives like the U.S. DOD’s Replicator are a direct response to this challenge, but fully embracing the need for mass will require a fundamental transformation in procurement philosophy, industrial base capacity, and a willingness to field “good enough” systems in large numbers.32

6.3 The Future Trajectory of Swarm Warfare

The evolution of swarm technology is proceeding along several key vectors that will further intensify its impact on the battlefield.

  • Increasing Autonomy: The clear trend is toward greater autonomy, with advancements in AI and ML enabling swarms to conduct increasingly complex missions with progressively less human intervention. The ultimate goal for nations like China is to shorten the “observe-orient-decide-act” (OODA) loop to machine speed, creating fully autonomous swarms that can execute kill chains faster than a human-in-the-loop system can react.56
  • Cross-Domain Integration: The future of swarm warfare lies in integrated, cross-domain operations. A single commander will likely orchestrate swarms operating simultaneously in the air, on land, and at sea.44 For example, aerial drones could provide ISR and electronic warfare cover for a swarm of unmanned ground vehicles seizing an objective, while unmanned surface vessels provide perimeter security.
  • The Proliferation of “Motherships”: The use of large platforms—manned aircraft, large drones, ships, or even ground vehicles—to transport, launch, and potentially recover swarms of smaller drones will become a standard tactic.71 This concept overcomes the range and endurance limitations of small drones, enabling their deployment deep within contested territory and fundamentally altering concepts of standoff distance and force projection.

The proliferation of long-range swarms effectively marks the end of the “sanctuary.” Rear-area logistics hubs, airbases, and command-and-control centers, once considered safe from direct attack, are now vulnerable to persistent, low-cost, high-volume threats.37 This reality erodes the distinction between the front line and the rear, forcing a doctrinal shift toward dispersal, mobility, and hardening for all elements of a military force.

Ultimately, the high technological barrier to entry for developing exquisite, AI-driven swarms (the U.S./China model) compared to the low barrier for fielding massed, simpler drones (the Ukraine/Russia model) may lead to a bifurcation of global military power. Future great-power conflicts may be defined by contests between highly autonomous, intelligent swarms. Simultaneously, the majority of regional conflicts will likely be dominated by the kind of attritional, grinding warfare demonstrated in Ukraine, enabled by the widespread proliferation of low-cost, commercially-derived drone technology. To remain effective, modern militaries must develop the force structures, technologies, and doctrines necessary to compete and win in both of these distinct environments.

Summary Table

Table 1: Comparative Analysis of National Drone Swarm Strategies

MetricUnited StatesPeople’s Republic of ChinaRussian FederationUkraine
Core Doctrinal ConceptManned-Unmanned Teaming (MUM-T) / Collaborative Platforms: Swarms as force multipliers and enablers for exquisite platforms, with a human-on-the-loop.118Intelligentized Warfare (智能化战争): Swarms as a central, decisive component of future warfare, leveraging AI and autonomy to achieve victory through intelligent mass.53Asymmetric Saturation & Attrition: Use of massed, low-cost drones in combined arms operations to overwhelm, deplete, and map enemy air defenses for follow-on strikes.89Asymmetric Defense / “Drone Wall”: Use of massed, low-cost FPV and naval drones to offset conventional disadvantages in artillery and manpower, creating deep attritional zones.79
Development & Innovation ModelTop-Down, R&D-Driven: Led by agencies like DARPA and service research labs; long development cycles focused on technological overmatch.30State-Directed, Civil-Military Fusion: Centralized planning leveraging both state-owned defense giants and the commercial tech sector for rapid, dual-use innovation.59State-Directed Adaptation & Import: Initial reliance on imported technology (e.g., Iranian Shaheds), now shifting to domestic mass production and tactical innovation based on battlefield lessons.89Bottom-Up, Battlefield-Driven: Decentralized, rapid innovation cycle fueled by volunteer networks, commercial off-the-shelf tech, and direct feedback from frontline units.78
Key Platforms / Programs– Air Force: Golden Horde (Collaborative Munitions), CCA 39- Navy/USMC: Silent Swarm (EW), LRAM for EABO 45- Army: Project Convergence experiments 48– CETC: Truck-launched loitering munition swarms 64- Ziyan: Blowfish A3 helicopter drone swarms 69- AVIC/CAAA: Wing Loong / Caihong series 66- Jiu Tian: “Mothership” drone carrier 71– ZALA Lancet: Tactical loitering munition 87- Shahed-136 / Geran-2: Long-range strike drone 89- Gerbera: Decoy drone 89– FPV Drones: Mass-produced, modified commercial quadcopters 78- MAGURA V5: Unmanned Surface Vessel (USV) 84- “Mothership” Drones: Fixed-wing carriers for FPVs 95
C2 PhilosophyDecentralized Execution with Human-in-the-Loop: Focus on intent-based command where operators manage swarms, but humans retain lethal authority.30Pursuit of Full Autonomy: Doctrine aims for self-organizing, self-coordinating, and self-decision-making swarms as the ultimate goal of “intelligentization”.56Centralized Planning, Pre-Programmed Execution: Attacks are centrally planned and coordinated, with drones often following pre-set routes, but evolving toward on-board AI for terminal guidance/coordination.89Decentralized, Operator-Centric: Primarily direct, real-time human control of individual FPVs, but developing AI for terminal guidance and exploring true swarm capabilities.78
Primary Application FocusEnabling Operations: SEAD/DEAD, ISR, Electronic Warfare, and deception to create advantages for manned platforms.40Decisive Operations: SEAD/DEAD, amphibious assault support, anti-ship saturation attacks, and achieving battlefield dominance through intelligent mass.73Strategic & Operational Attrition: Degrading enemy air defenses, destroying high-value targets (artillery, C2), and striking critical infrastructure.87Tactical Attrition & Area Denial: Destroying armored vehicles and infantry at the front line; achieving sea denial against a superior naval force.78
Counter-Swarm FocusLayered, Technology-Centric Defense: Investment in a “system of systems” including kinetic interceptors (Coyote), HPM (THOR), and Lasers (DE M-SHORAD).33Integrated & Volumetric Defense: Development of systems like the “Bullet Curtain” gun system, combined with EW and investment in directed energy.53Electronic Warfare Dominance: Heavy reliance on a dense, layered network of mobile and fixed EW systems to jam and disrupt drone operations.91EW and Kinetic Interceptors: Development of domestic EW systems and reliance on Western-supplied air defense systems (e.g., Gepard) and development of interceptor drones.90

Appendix: Data Collection and Assessment Methodology

This appendix documents the systematic methodology employed to gather, process, and analyze the information presented in this report, ensuring transparency and analytical rigor.

A.1 Phase 1: Scoping and Keyword Definition

The initial phase involved defining the scope of the analysis and establishing a consistent lexicon. Key search terms and concepts were defined, including “drone swarm,” “swarm intelligence,” “manned-unmanned teaming,” “collaborative autonomy,” “loitering munition,” “counter-UAS (C-UAS),” and “intelligentized warfare” (and its Chinese equivalent, 智能化战争). This ensured a focused and consistent data collection process.

A.2 Phase 2: Source Identification and Collection

A multi-source collection strategy was employed, focusing on authoritative and recent information (primarily from 2017-2025) from the four specified countries of interest: the United States, Ukraine, Russia, and China.

  • Source Categories:
  • Official Government & Military Documents: U.S. DOD strategy documents, GAO reports, DARPA program descriptions, service branch (Army, Navy, Air Force, Marines) publications, and official press releases.
  • Military Journals and Academic Publications: Papers from institutions like the U.S. Army War College (e.g., Military Review), National Defense University (e.g., JFQ), technical papers from journals (e.g., MDPI, IEEE), and Chinese academic sources (e.g., 航空学报).
  • Think Tank and Research Institute Reports: In-depth analyses from organizations such as the RAND Corporation, Center for a New American Security (CNAS), Center for Strategic and International Studies (CSIS), Royal United Services Institute (RUSI), Jamestown Foundation, and the Institute for the Study of War (ISW).
  • Specialized Defense and Technology News Outlets: Reporting from reputable sources like Defense News, The War Zone (TWZ), Breaking Defense, DefenseScoop, and others that provide timely information on program developments, tests, and battlefield applications.
  • State-Affiliated Media (for Russia and China): Sources such as CCTV, Global Times, and Voennoe Delo were consulted to understand official narratives and publicly disclosed capabilities, while maintaining awareness of inherent state bias.

A.3 Phase 3: Data Extraction and Thematic Categorization

All collected data was systematically reviewed and tagged based on a thematic framework aligned with the report’s structure.

  • Primary Themes:
  1. Foundational Technology: C3 architectures, communication protocols, AI algorithms.
  2. National Doctrine: Official strategies, conceptual frameworks, and military writings.
  3. Platforms & Programs: Specific drone systems, munitions, and development programs.
  4. Tactics & Employment: Observed or documented methods of use in exercises and combat.
  5. Counter-Measures: Defensive systems and tactics (kinetic, non-kinetic, passive).
  6. Country of Origin/Focus: US, China, Russia, Ukraine.

A.4 Phase 4: Comparative Analysis and Insight Generation

This phase involved synthesizing the categorized data to identify patterns, contrasts, and causal relationships. The methodology focused on moving beyond first-order observations (e.g., “China is developing swarms”) to second and third-order insights (e.g., “China’s civil-military fusion doctrine accelerates its swarm development by allowing rapid militarization of commercial tech, creating a shorter warning cycle for Western intelligence”).

The analysis was guided by key questions:

  • How do the doctrinal approaches of the four nations differ, and what drives these differences (e.g., strategic culture, technological base, perceived threats)?
  • What is the relationship between technological capabilities and tactical employment observed in combat?
  • What are the key feedback loops in the innovation-counter-innovation cycle, particularly in the Russo-Ukrainian War?
  • What are the strategic implications of the emerging cost-asymmetry in swarm vs. counter-swarm warfare?

A.5 Phase 5: Validation and Bias Mitigation

Information was cross-referenced across multiple source types to validate claims and identify consensus findings. For example, a capability mentioned in a state media report was considered more credible if also analyzed in a Western think tank report or observed in combat footage. An awareness of source bias was maintained throughout. Information from state-controlled media (Russia, China) was treated as indicative of official messaging and intended perception, while analysis from independent think tanks and battlefield reporting was used to assess actual capabilities and effectiveness. Contradictory information was noted and analyzed as part of the complex information environment surrounding this topic.


If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly contribute towards our continued reporting, please visit our funding page.


Sources Used

  1. What Are Drone Swarms? | Built In, accessed October 23, 2025, https://builtin.com/articles/drone-swarm
  2. Learn about Commercial Drone Swarms | Droneii 2025, accessed October 23, 2025, https://droneii.com/commercial-use-of-drone-swarms
  3. dsm.forecastinternational.com, accessed October 23, 2025, https://dsm.forecastinternational.com/2025/01/21/drone-wars-developments-in-drone-swarm-technology/#:~:text=%E2%80%9CDrone%20swarms%E2%80%9D%2C%20as%20defined,autonomously%20with%20minimal%20human%20oversight.
  4. GAO-23-106930, SCIENCE & TECH SPOTLIGHT: DRONE SWARM TECHNOLOGIES, accessed October 23, 2025, https://www.gao.gov/assets/gao-23-106930.pdf
  5. Military Drone Swarm Intelligence Explained – Sentient Digital, Inc., accessed October 23, 2025, https://sdi.ai/blog/military-drone-swarm-intelligence-explained/
  6. Drone Swarms: Collective Intelligence in Action, accessed October 23, 2025, https://scalastic.io/en/drone-swarms-collective-intelligence/
  7. From animal collective behaviors to swarm robotic cooperation – PMC – PubMed Central, accessed October 23, 2025, https://pmc.ncbi.nlm.nih.gov/articles/PMC10089591/
  8. Multi-Agent Systems and Swarm Intelligence for Autonomous Drone Coordination | Scientific Research Journal of Engineering and Computer Sciences – iarconsortium, accessed October 23, 2025, https://www.iarconsortium.org/srjecs/178/2899/multi-agent-systems-and-swarm-intelligence-for-autonomous-drone-coordination-4985/
  9. Defining Swarm: A Critical Step Toward Harnessing the Power of …, accessed October 23, 2025, https://www.armyupress.army.mil/journals/military-review/online-exclusive/2025-ole/defining-swarm/
  10. UAV swarm communication and control architectures: a review, accessed October 23, 2025, https://cdnsciencepub.com/doi/10.1139/juvs-2018-0009
  11. Review of Unmanned Aerial Vehicle Swarm Communication … – MDPI, accessed October 23, 2025, https://www.mdpi.com/2076-3417/10/10/3661
  12. Drone Swarm Coordination – Meegle, accessed October 23, 2025, https://www.meegle.com/en_us/topics/autonomous-drones/drone-swarm-coordination
  13. Swarm Communication. Before looking at why and what drones… | by Aaron Sempf | CӔLUS Concept | Medium, accessed October 23, 2025, https://medium.com/c%D3%95lus-concept/swarm-communication-33cffc47db6d
  14. A Secure Communication Framework for Drone Swarms in Autonomous Surveillance Operations – Scientific Research Publishing, accessed October 23, 2025, https://www.scirp.org/journal/paperinformation?paperid=137084
  15. SWARM: Pioneering The Future of Autonomous Drone Operations and Electronic Warfare, accessed October 23, 2025, https://www.cyberdefensemagazine.com/swarm-pioneering-the-future-of-autonomous-drone-operations-and-electronic-warfare/
  16. Low-Latency Communication Protocols for Drone IFF: Ensuring Swift and Secure Identification – Decent Cybersecurity, accessed October 23, 2025, https://decentcybersecurity.eu/low-latency-communication-protocols-for-drone-iff-ensuring-swift-and-secure-identification/
  17. Secure Communication and Dynamic Formation Control of Intelligent Drone Swarms Using Blockchain Technology – MDPI, accessed October 23, 2025, https://www.mdpi.com/2078-2489/16/9/768
  18. A Genetic Algorithm Approach to Anti-Jamming UAV Swarm Behavior This work was supported by national funds through FCT, Fundação para a Ciência e a Tecnologia, under project UIDB/50021/2020 – arXiv, accessed October 23, 2025, https://arxiv.org/html/2510.07292v1
  19. Jamming-Resistant UAV Communications: A Multichannel-Aided Approach – arXiv, accessed October 23, 2025, https://arxiv.org/html/2507.14945v1
  20. Anti-Jamming Communications in UAV Swarms: A Reinforcement Learning Approach, accessed October 23, 2025, https://www.researchgate.net/publication/338145158_Anti-Jamming_Communications_in_UAV_Swarms_A_Reinforcement_Learning_Approach
  21. Reliable Communication Systems for Long-Range Drone Operations – XRAY, accessed October 23, 2025, https://xray.greyb.com/drones/communication-protocols-long-range-drone-networks
  22. A Genetic Algorithm Approach to Anti-Jamming UAV Swarm … – arXiv, accessed October 23, 2025, https://arxiv.org/pdf/2510.07292
  23. (PDF) Application of Optical Communication Technology for UAV …, accessed October 23, 2025, https://www.researchgate.net/publication/389582917_Application_of_Optical_Communication_Technology_for_UAV_Swarm
  24. Joint Communication and Action Learning in Multi-Target Tracking of UAV Swarms with Deep Reinforcement Learning – MDPI, accessed October 23, 2025, https://www.mdpi.com/2504-446X/6/11/339
  25. Innovations in Drone Swarm Technology – XRAY – GreyB, accessed October 23, 2025, https://xray.greyb.com/drones/coordination-of-multiple-drones
  26. Swarm Intelligence and Multi-Drone Coordination With Edge AI | Request PDF, accessed October 23, 2025, https://www.researchgate.net/publication/391548696_Swarm_Intelligence_and_Multi-Drone_Coordination_With_Edge_AI
  27. Advancement Challenges in UAV Swarm Formation Control: A Comprehensive Review, accessed October 23, 2025, https://www.mdpi.com/2504-446X/8/7/320
  28. SwarnRaft: Leveraging Consensus for Robust Drone Swarm Coordination in GNSS-Degraded Environments – arXiv, accessed October 23, 2025, https://arxiv.org/html/2508.00622v1
  29. Special Issue : Swarm Intelligence in Multi-UAVs – Drones – MDPI, accessed October 23, 2025, https://www.mdpi.com/journal/drones/special_issues/R4521UCCA1
  30. OFFensive Swarm-Enabled Tactics – DARPA, accessed October 23, 2025, https://www.darpa.mil/research/programs/offensive-swarm-enabled-tactics
  31. Fact Sheet: DoD Strategy for Countering Unmanned Systems, accessed October 23, 2025, https://media.defense.gov/2024/Dec/05/2003599149/-1/-1/0/FACT-SHEET-STRATEGY-FOR-COUNTERING-UNMANNED-SYSTEMS.PDF
  32. Drone Wars: Developments in Drone Swarm Technology – Defense Security Monitor, accessed October 23, 2025, https://dsm.forecastinternational.com/2025/01/21/drone-wars-developments-in-drone-swarm-technology/
  33. Countering the Swarm | CNAS, accessed October 23, 2025, https://www.cnas.org/publications/reports/countering-the-swarm
  34. OFFensive Swarm-Enabled Tactics (OFFSET) Sixth Field Experiment – YouTube, accessed October 23, 2025, https://www.youtube.com/watch?v=W34NPbGkLGI
  35. OFFSET Swarms Take Flight in Final Field Experiment – DARPA, accessed October 23, 2025, https://www.darpa.mil/news/2021/offset-swarms-take-flight
  36. DARPA OFFSET: Autonomous Drone Swarms for Warfighters – DSIAC, accessed October 23, 2025, https://dsiac.dtic.mil/articles/darpa-offset-autonomous-drone-swarms-for-warfighters/
  37. Swarm Technology in Sustainment Operations | Article | The United …, accessed October 23, 2025, https://www.army.mil/article/282467/swarm_technology_in_sustainment_operations
  38. Air Force Drone Swarm Program Entering Virtual Phase – National Defense Magazine, accessed October 23, 2025, https://www.nationaldefensemagazine.org/articles/2021/9/21/air-force-drone-swarm-program-entering-virtual-phase
  39. Golden Horde Swarming Munitions Program Back On Target After …, accessed October 23, 2025, https://www.twz.com/39581/golden-horde-swarming-munitions-program-back-on-target-after-second-round-of-tests
  40. US Air Force’s ‘Golden Horde’ swarming munitions program to get second chance, accessed October 23, 2025, https://www.defensenews.com/air/2021/02/04/air-forces-golden-horde-swarming-munitions-program-to-get-a-second-chance-this-month/
  41. Swarm Clouds on the Horizon? Exploring the Future of Drone Swarm Proliferation – Modern War Institute, accessed October 23, 2025, https://mwi.westpoint.edu/swarm-clouds-on-the-horizon-exploring-the-future-of-drone-swarm-proliferation/
  42. Air Force Doctrine 2035, accessed October 23, 2025, https://www.doctrine.af.mil/home/AFD35/
  43. Swarm of small UAVs are used in Navy’s LOCUST demonstrations, accessed October 23, 2025, https://militaryembedded.com/unmanned/sensors/swarm-of-small-uavs-are-used-in-navys-locust-demonstrations
  44. Robotic Swarms in Offensive Maneuver – NDU Press, accessed October 23, 2025, https://ndupress.ndu.edu/Media/News/News-Article-View/Article/1326017/robotic-swarms-in-offensive-maneuver/
  45. Silent Swarm Exercise Accelerates Navy’s Path To Distributed …, accessed October 23, 2025, https://www.twz.com/sea/silent-swarm-exercise-accelerates-navys-path-to-distributed-electronic-warfare-future
  46. Marines Betting Big On “Critical” Air-Launched Swarming Drones, accessed October 23, 2025, https://www.twz.com/marines-betting-big-on-critical-air-launched-swarming-drones
  47. Marines Test New Drone Swarms a Single Operator Can Control | Military.com, accessed October 23, 2025, https://www.military.com/defensetech/2018/07/23/marines-test-new-drone-swarms-single-operator-can-control.html
  48. Project Convergence | U.S. Department of War, accessed October 23, 2025, https://www.war.gov/Spotlights/Project-Convergence/
  49. Let Them Fly: To Generate Drone Combat Readiness, Army Installations Must Step Up, accessed October 23, 2025, https://mwi.westpoint.edu/let-them-fly-to-generate-drone-combat-readiness-army-installations-must-step-up/
  50. The Army wants drones that understand ‘commander’s intent’ – Defense One, accessed October 23, 2025, https://www.defenseone.com/technology/2025/10/army-wants-drones-understand-commanders-intent/408953/
  51. Drone swarms with 1,000 unmanned aircraft could be possible within 5 years, DARPA leader says | FedScoop, accessed October 23, 2025, https://fedscoop.com/darpa-drone-swarms-with-1000-unmanned-aircraft-within-5-years/
  52. The Path to China’s Intelligentized Warfare: Converging on the …, accessed October 23, 2025, https://cyberdefensereview.army.mil/Portals/6/Documents/2024-Fall/Baughman_CDRV9N3-Fall-2024.pdf
  53. The ‘Bullet Curtain’: China’s Answer to the Growing Drone Swarm Threat – SVI, accessed October 23, 2025, https://thesvi.org/the-bullet-curtain-chinas-answer-to-the-growing-drone-swarm-threat/
  54. PLA’s Perception about the Impact of AI on Military Affairs* – IIDA Masafumi, accessed October 23, 2025, https://www.nids.mod.go.jp/english/publication/security/pdf/2022/01/04.pdf
  55. PLA’s Intelligentized Warfare: The Politics on China’s Military Strategy*, accessed October 23, 2025, https://www.nids.mod.go.jp/english/publication/security/pdf/2022/01/05.pdf
  56. 352. The PLA and UAVs – Automating the Battlefield and Enhancing Training, accessed October 23, 2025, https://madsciblog.tradoc.army.mil/352-the-pla-and-uavs-automating-the-battlefield-and-enhancing-training/
  57. Swarms at War: Chinese Advances in Swarm Intelligence – The Jamestown Foundation, accessed October 23, 2025, https://jamestown.org/program/swarms-war-chinese-advances-swarm-intelligence/
  58. 有人/无人机协同作战:概念、技术与挑战 – 航空学报 – 北京航空航天大学, accessed October 23, 2025, https://hkxb.buaa.edu.cn/CN/10.7527/S1000-6893.2023.29653
  59. The Chinese Swarming Programme – Part Three of Three – The Security Distillery, accessed October 23, 2025, https://thesecuritydistillery.org/all-articles/the-chinese-swarming-programme-part-three-of-three
  60. Swarms at War: Chinese Advances in Swarm Intelligence …, accessed October 23, 2025, https://www.realcleardefense.com/articles/2017/07/12/swarms_at_war_chinese_advances_in_swarm_intelligence_111785.html
  61. “They Pushed One Button”: China’s New Drone System Can Launch Thousands at Once—and the World’s Militaries Are Alarmed – Energy Reporters, accessed October 23, 2025, https://www.energy-reporters.com/news/they-pushed-one-button-chinas-new-drone-system-can-launch-thousands-at-once-and-the-worlds-militaries-are-alarmed/
  62. CETC Breaks Record for Biggest Fixed-Wing Drone Swarm – Yicai Global, accessed October 23, 2025, https://www.yicaiglobal.com/news/cetc-breaks-record-for-biggest-fixed-wing-drone-swarm
  63. China launches world-record swarm of 119 drones – CGTN, accessed October 23, 2025, https://news.cgtn.com/news/3d4d6a4e3049444e/share.html
  64. China Conducts Test Of Massive Suicide Drone Swarm Launched …, accessed October 23, 2025, https://www.twz.com/37062/china-conducts-test-of-massive-suicide-drone-swarm-launched-from-a-box-on-a-truck
  65. How China became the world’s leading exporter of combat drones …, accessed October 23, 2025, https://www.aljazeera.com/news/2023/1/24/how-china-became-the-worlds-leading-exporter-of-combat-drones
  66. All the drone companies in China — a guide to the 22 top players in …, accessed October 23, 2025, https://thechinaproject.com/2021/06/18/all-the-drone-companies-in-china-a-guide-to-the-22-top-players-in-the-chinese-uav-industry/
  67. Company Overview – ZIYAN UAS – Professional UAV Helicopter Manufacturer | Military & Civilian Drone Solutions, accessed October 23, 2025, https://www.ziyanuas.com/abouta/about
  68. Ziyan Develops High-Performance Electric Unmanned Helicopters & Avionics | UST, accessed October 23, 2025, https://www.unmannedsystemstechnology.com/2020/11/ziyan-develops-high-performance-electric-unmanned-helicopters-avionics/
  69. Chinese helicopter drones capable of intelligent swarm attacks …, accessed October 23, 2025, http://en.people.cn/n3/2019/0509/c90000-9576712.html
  70. Autonomous Battlefield: PLA Lessons from Russia’s Invasion of …, accessed October 23, 2025, https://jamestown.org/program/autonomous-battlefield-pla-lessons-from-russias-invasion-of-ukraine/
  71. China has developed the largest drone carrier in the world — and it’s getting ready for takeoff | Live Science, accessed October 23, 2025, https://www.livescience.com/technology/engineering/china-has-developed-the-largest-drone-carrier-in-the-world-and-its-getting-ready-for-takeoff
  72. China Readies Drone Swarms for Future War | CNA, accessed October 23, 2025, https://www.cna.org/our-media/indepth/2025/09/china-readies-drone-swarms-for-future-war
  73. PRC Concepts for UAV Swarms in Future Warfare | CNA, accessed October 23, 2025, https://www.cna.org/analyses/2025/07/prc-concepts-for-uav-swarms-in-future-warfare
  74. PRC Concepts for UAV Swarms in Future Warfare | CNA Corporation, accessed October 23, 2025, https://www.cna.org/reports/2025/07/PRC-Concepts-for-UAV-Swarms-in-Future-Warfare.pdf
  75. The PLA’s Unmanned Aerial Systems – Air University, accessed October 23, 2025, https://www.airuniversity.af.edu/Portals/10/CASI/documents/Research/PLAAF/2018-08-29%20PLAs_Unmanned_Aerial_Systems.pdf
  76. A Plague on the Horizon: Concerns on the Proliferation of Drone Swarms, accessed October 23, 2025, https://www.orfonline.org/research/a-plague-on-the-horizon-concerns-on-the-proliferation-of-drone-swarms
  77. The ‘Bullet Curtain’: China’s Answer to the Growing Drone Swarm …, accessed October 23, 2025, https://thediplomat.com/2025/05/the-bullet-curtain-chinas-answer-to-the-growing-drone-swarm-threat/
  78. Game of drones: the production and use of Ukrainian battlefield …, accessed October 23, 2025, https://www.osw.waw.pl/en/publikacje/osw-commentary/2025-10-14/game-drones-production-and-use-ukrainian-battlefield-unmanned
  79. How Ukraine’s Data-Driven Approach is Impacting the War Effort, accessed October 23, 2025, https://voxukraine.org/en/how-ukraine-s-data-driven-approach-is-impacting-the-war-effort
  80. Russia Assails Ukraine’s Drone Wall – CEPA, accessed October 23, 2025, https://cepa.org/article/russia-assails-ukraines-drone-wall/
  81. Russian Fpv drone finishes Two Ukrainian soldiers hiding in trench in city of Lyman (Oct 15, 2025) : r/CombatFootage – Reddit, accessed October 23, 2025, https://www.reddit.com/r/CombatFootage/comments/1o7cmj9/russian_fpv_drone_finishes_two_ukrainian_soldiers/
  82. Analysis: An Operational View on the USV Attacks in the Black Sea …, accessed October 23, 2025, https://www.navalnews.com/naval-news/2024/02/analysis-an-operational-view-on-the-usv-attacks-in-the-black-sea-from-an-admirals-eyes/
  83. Ukraine’s Drone War Over the Black Sea Is Heating Up – The National Interest, accessed October 23, 2025, https://nationalinterest.org/feature/ukraines-drone-war-over-the-black-sea-is-heating-up
  84. Ukraine’s Magura Sea Drone, the Last Thing a Russian Warship Wants to See, accessed October 23, 2025, https://united24media.com/war-in-ukraine/ukraines-magura-sea-drone-the-last-thing-a-russian-warship-wants-to-see-12586
  85. Ukraine’s Magura Naval Drones: Black Sea Equalizers | Proceedings, accessed October 23, 2025, https://www.usni.org/magazines/proceedings/2025/september/ukraines-magura-naval-drones-black-sea-equalizers
  86. MAGURA V5 – Wikipedia, accessed October 23, 2025, https://en.wikipedia.org/wiki/MAGURA_V5
  87. ZALA Lancet – Wikipedia, accessed October 23, 2025, https://en.wikipedia.org/wiki/ZALA_Lancet
  88. The war in Ukraine shows the game-changing effect of drones depends on the game, accessed October 23, 2025, https://www.tandfonline.com/doi/full/10.1080/00963402.2023.2178180
  89. Russia’s Changes in the Conduct of War Based on Lessons from …, accessed October 23, 2025, https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/September-October-2025/Lessons-from-Ukraine/
  90. Ukraine. Russia relies on swarms and AI in drone warfare, accessed October 23, 2025, https://militaeraktuell.at/en/long-range-drone-war-russia-relies-on-swarms-ai-and-more-lethal-warheads/
  91. NATO Should Not Replace Traditional Firepower with ‘Drones …, accessed October 23, 2025, https://www.rusi.org/explore-our-research/publications/rusi-defence-systems/nato-should-not-replace-traditional-firepower-drones
  92. Ukraine’s 40+ km Strike Drones vs Russian Electronic Warfare. Inside Brave1’s Test Range, accessed October 23, 2025, https://www.youtube.com/watch?v=ubLTNs2sdy8
  93. Russian Offensive Campaign Assessment, August 12, 2025 – Institute for the Study of War, accessed October 23, 2025, https://understandingwar.org/research/russia-ukraine/russian-offensive-campaign-assessment-august-12-2025/
  94. The Battlefield AI Revolution Is Not Here Yet: the Status of Russian …, accessed October 23, 2025, https://understandingwar.org/research/russia-ukraine/the-battlefield-ai-revolution-is-not-here-yet-the-status-of-current-russian-and-ukrainian-ai-drone-efforts/
  95. The Russia-Ukraine Drone War: Innovation on the Frontlines and Beyond – CSIS, accessed October 23, 2025, https://www.csis.org/analysis/russia-ukraine-drone-war-innovation-frontlines-and-beyond
  96. Counterswarming Is Imperative | Proceedings – August 2024 Vol. 150/8/1,458, accessed October 23, 2025, https://www.usni.org/magazines/proceedings/2024/august/counterswarming-imperative
  97. Coyote | Raytheon – RTX, accessed October 23, 2025, https://www.rtx.com/raytheon/what-we-do/integrated-air-and-missile-defense/coyote
  98. Coyote UAS | Raytheon – RTX, accessed October 23, 2025, https://www.rtx.com/raytheon/lang/ro/capabilities/products/counter-uas/effectors/coyote
  99. Raytheon Coyote – Wikipedia, accessed October 23, 2025, https://en.wikipedia.org/wiki/Raytheon_Coyote
  100. Raytheon Displays Coyote Block 2+ C-UAS Interceptor – TURDEF, accessed October 23, 2025, https://turdef.com/article/raytheon-displays-coyote-block-2-c-uas-interceptor
  101. LIDS-Family-of-Systems-Brochure.pdf – SRC, Inc., accessed October 23, 2025, https://www.srcinc.com/pdf/LIDS-Family-of-Systems-Brochure.pdf
  102. Contracts For Sept. 29, 2025 – > U.S. Department of War > Contract, accessed October 23, 2025, https://www.war.gov/News/Contracts/Contract/Article/4317777/
  103. Army announces rapid acquisition authority contract for Coyote Interceptors, accessed October 23, 2025, https://www.army.mil/article/273625/army_announces_rapid_acquisition_authority_contract_for_coyote_interceptors
  104. Coyote Loitering Drone Interceptors Have Arrived On U.S. Navy Destroyers – The War Zone, accessed October 23, 2025, https://www.twz.com/sea/coyote-loitering-drone-interceptors-have-arrived-on-us-navy-destroyers
  105. Military Drones | RAND, accessed October 23, 2025, https://www.rand.org/topics/military-drones.html
  106. U.S. Navy destroyer equipped with Raytheon Coyote anti-drone interceotprs in major upgrade – Defence Industry Europe, accessed October 23, 2025, https://defence-industry.eu/u-s-navy-destroyer-equipped-with-raytheon-coyote-anti-drone-interceotprs-in-major-upgrade/
  107. High-Energy Lasers | Raytheon – RTX, accessed October 23, 2025, https://www.rtx.com/raytheon/what-we-do/integrated-air-and-missile-defense/lasers
  108. C-UAS Directed Energy Weapons – Unmanned Systems Technology, accessed October 23, 2025, https://www.unmannedsystemstechnology.com/expo/directed-energy-weapons/
  109. DragonFire (weapon) – Wikipedia, accessed October 23, 2025, https://en.wikipedia.org/wiki/DragonFire_(weapon)
  110. THOR (weapon) – Wikipedia, accessed October 23, 2025, https://en.wikipedia.org/wiki/THOR_(weapon)
  111. Electromagnetic Weapons Seen as Key Against Ukraine’s Drone Swarms, accessed October 23, 2025, https://voennoedelo.com/en/posts/id1236-electromagnetic-weapons-seen-as-key-against-ukraine-s-drone-swarms
  112. THOR: AFRL Electromagnetic counter-swarm drone weapon, accessed October 23, 2025, https://ledrones.org/thor-electromagnetic-counter-swarm-drone-weapon/
  113. Swarm Warning: The Future of Unmanned Aerial Systems | Article | The United States Army, accessed October 23, 2025, https://www.army.mil/article/239210/swarm_warning_the_future_of_unmanned_aerial_systems
  114. Ukraine’s New VAMPIRE Family Just Got More Bite | by Wes O’Donnell – Medium, accessed October 23, 2025, https://wesodonnell.medium.com/ukraines-new-vampire-family-just-got-more-bite-4c785246c99b
  115. Why the Army may need a specialized counter-drone MOS, accessed October 23, 2025, https://www.armytimes.com/news/your-army/2025/10/20/why-the-army-may-need-a-specialized-counter-drone-mos/
  116. Hegseth directive on ‘unleashing U.S. military drone dominance’ includes deadlines for major overhauls | DefenseScoop, accessed October 23, 2025, https://defensescoop.com/2025/07/10/hegseth-memo-unleashing-us-military-drone-dominance-deadlines/
  117. Countering Swarms: Strategic Considerations and … – NDU Press, accessed October 23, 2025, https://ndupress.ndu.edu/Portals/68/Documents/jfq/jfq-107/jfq-107_4-14_Bell.pdf?ver=mvjNNii9AA2OUQau2KBWTA%3D%3D
  118. Cooperative Threat Engagement Using Drone Swarms – ResearchGate, accessed October 23, 2025, https://www.researchgate.net/publication/367447433_Cooperative_Threat_Engagement_Using_Drone_Swarms
  119. Designing for Doctrine: Decentralized Execution in Unmanned Swarms – Air University, accessed October 23, 2025, https://www.airuniversity.af.edu/Wild-Blue-Yonder/Articles/Article-Display/Article/2703656/designing-for-doctrine-decentralized-execution-in-unmanned-swarms/
  120. Swarm Talk: Understanding Drone Typology – Modern War Institute, accessed October 23, 2025, https://mwi.westpoint.edu/swarm-talk-understanding-drone-typology/
  121. Russia Revives Old Battlefield Tactics to Evade Ukrainian Drones, accessed October 23, 2025, https://voennoedelo.com/en/posts/id2188-russia-revives-old-battlefield-tactics-to-evade-ukrainian-drones

Hollywood vs. The Unit: An Analytical Review of Inaccuracies in the Portrayal of U.S. Tier One Special Operations Forces

The entertainment industry has long been fascinated by the world of elite military units, crafting narratives of heroism and action around the shadowy figures who operate at the “tip of the spear.” Central to this modern mythology is the concept of the “Tier One” operator—a term that has entered the public lexicon to signify the absolute pinnacle of the special operations community. However, the cinematic portrayal of these forces, driven by the demands of spectacle and simplified storytelling, often diverges sharply from the complex reality of their composition, culture, and conduct. This report provides an analytical review of the ten most significant areas where Hollywood and the entertainment complex misrepresent U.S. Tier One Special Operations Forces, according to the testimony of former operators and corroborated by authoritative military doctrine and documentation.

The units in question are formally designated as Special Mission Units (SMUs), the U.S. military’s most elite, secretive, and highly resourced forces, tasked with the most complex, covert, and dangerous missions under the direction of the national command authority.1 These SMUs operate under the Joint Special Operations Command (JSOC), a joint headquarters established to ensure interoperability, standardize techniques, and conduct joint special operations.3 The primary SMUs include the U.S. Army’s 1st Special Forces Operational Detachment-Delta (Delta Force), the U.S. Navy’s Naval Special Warfare Development Group (DEVGRU, formerly SEAL Team Six), the U.S. Air Force’s 24th Special Tactics Squadron (24th STS), and the U.S. Army’s Intelligence Support Activity (ISA).2

The very term “Tier One” is itself a source of public misconception. While pop culture presents it as a qualitative ranking—a simple label for “the best”—the tier system is an unofficial classification that originated from bureaucratic and budgetary priorities within the U.S. Special Operations Command (SOCOM).5 Tier One simply designates the SMUs that fall under JSOC’s direct command and receive priority funding for their specific, high-stakes mission sets. This initial disconnect between a popular, simplistic label and a more nuanced administrative reality is a microcosm of the broader chasm between Hollywood’s fiction and the operational truth.

Section I: The Operator: Deconstructing the Myth of the Super-Soldier

The foundation of any military unit is its people. In cinematic portrayals, the Tier One operator is often a one-dimensional archetype. The reality is that of a complex, mature, and highly disciplined professional whose defining characteristics are frequently the opposite of those depicted on screen.

Myth 1: The Invincible, Emotionless Warrior

The most pervasive cinematic trope is that of the operator as an unflinching “terminator robot,” a war machine who is impervious to physical harm, psychological trauma, and personal cost.7 This character processes violence without emotional consequence and is defined almost exclusively by his combat prowess.

The operational reality is profoundly different. Former operators from the most elite units speak openly about the severe psychological toll of their service, including struggles with alcohol abuse, post-traumatic stress disorder (PTSD), and suicidal ideation.9 Their accounts reveal that the battles fought off-screen, against their own trauma and personal demons, are often as challenging as any combat mission. Recovery is not a matter of cinematic vengeance but of therapy, spiritual surrender, and a deep, often painful, personal reckoning.10 Furthermore, survival in combat is not guaranteed by skill alone. Luck is a massive and universally acknowledged factor. As one former Delta Force operator recounted, a simple slip on a hill could have resulted in a fatal injury from a sharp tree root, a random event that skill could not mitigate.13 The job also exacts a heavy toll on families, a reality starkly absent from most action films. As former Navy SEAL Jocko Willink emphasizes, the true sacrifices are made not just by the operators but by the families at home who must live with the consequences of loss and trauma.7

This myth of the invincible warrior is not merely an inaccuracy; it is a harmful fiction. By erasing the psychological and personal costs of service, it perpetuates a societal stigma that can discourage real veterans from seeking necessary mental health support. The cinematic archetype creates a false standard of toughness that even the most elite operators do not and cannot live up to, potentially leading veterans to view their own very human struggles as a form of personal failure.

Myth 2: The Young, Impulsive Gunfighter

Hollywood narratives frequently center on protagonists in their early-to-mid 20s, relying on raw physical talent and aggressive, impulsive instincts to succeed. This portrayal is a fundamental misunderstanding of the selection criteria and demographic reality of Tier One units.

The average age of an operator in an SMU is significantly higher than in conventional forces. While the influx of 18X candidates (who enlist directly for Special Forces) has lowered the average age on a Green Beret Operational Detachment Alpha (ODA) to the late 20s, the average age at Delta Force is approximately 35 or 36.14 Official recruitment notices for Delta specify a minimum age of 22 and require years of prior military service.16 This is because operators are selected from the best of the Tier Two units, such as the Green Berets, the 75th Ranger Regiment, and the Navy SEALs.5 A candidate attempting selection for Delta or DEVGRU has likely already spent several years and completed multiple combat deployments in another elite unit. The path to even be considered can take between eight and twelve years of dedicated service.5

This age and experience requirement is a direct function of the mission’s complexity. Tier One operations are not simply about marksmanship; they are about sophisticated problem-solving under extreme duress, strategic thinking, and, at times, diplomacy. The selection process favors psychological maturity, resilience, adaptability, and high conscientiousness over raw aggression.19 The youngest individual on a 12-man Special Forces A-Team is often the officer, who is typically between 25 and 27 years old, while the average age of the enlisted members is in the mid-30s.21 Hollywood’s “young gun” trope fundamentally misrepresents the primary skillset required for the job, which is cognitive and emotional maturity forged through years of experience, not just youthful physical prowess.

Myth 3: The Lone Wolf Who Bucks the System

A classic Hollywood narrative arc involves a maverick hero who succeeds by disobeying orders, breaking protocol, and acting alone. This character is celebrated for “bucking the system” to save the day.8 Examples range from a soldier going AWOL on a personal revenge mission to an operator single-handedly taking on an enemy force against the orders of his command.22

This portrayal is the most profound misunderstanding of the special operations ethos. In reality, the team is the single most important entity. The culture is one of “quiet professionals” whose primary allegiance is to their unit and their teammates.23 An operator’s ego is subordinate to the mission; it is humility, not arrogance, that makes one a true asset to the team.24 The “system” that the movie hero defies is, in reality, a lifeline. It consists of a vast support structure, including detailed planning staffs, critical intelligence provided by units like ISA 4, and life-saving capabilities from “enablers” like the 24th STS.25 A lone operator is an ineffective and likely deceased operator.

These units are defined by extreme discipline and professionalism. An act like going AWOL in a combat zone, as depicted in The Hurt Locker, would result in immediate prosecution under the Uniform Code of Military Justice (UCMJ).22 The entire selection and training pipeline is designed to break down individualism and forge a cohesive, interdependent team. An individual who “bucks the system” would be identified and removed during selection because they represent an unacceptable risk to the mission and to the lives of their teammates. The very personality type that Hollywood celebrates as a hero is the exact personality type the real-world special operations community identifies as a liability and actively rejects.

Section II: The Operation: The Unseen World of Process and Procedure

Cinematic storytelling, by its nature, must condense time and simplify complexity. In doing so, it almost universally omits the rigorous procedural, legal, and command frameworks that govern every real-world special operation. This omission presents a distorted picture of how missions are planned, authorized, and executed.

Myth 4: The Instant Mission Briefing

In film, mission planning is often reduced to a single, dramatic scene: a commander points to a satellite image on a screen, delivers a five-minute briefing, and the team is on a helicopter within the hour.27 This trope sacrifices the procedural reality for narrative expediency.

Real-world mission planning is a formal, intellectually demanding, and often lengthy process. For battalion-level and higher echelons, this is governed by the Military Decision-Making Process (MDMP), a systematic, seven-step methodology.28 This process involves a detailed Mission Analysis, the development of multiple Courses of Action (COAs), rigorous wargaming of those COAs against anticipated enemy actions, comparison of the COAs, and the production of a comprehensive operations order (OPORD).28 For the most critical missions, teams are placed in “isolation,” a classic Special Forces technique where the unit is completely cut off from the outside world to focus exclusively on mission planning and rehearsals. This period of intense preparation can last for days or even weeks, not hours.21 The entire process is driven by a continuous cycle of intelligence gathering and analysis, provided by specialized units like ISA and the JSOC Intelligence Brigade (JIB), which is used to frame the operational environment and define the problem long before a solution is developed.30

By omitting this intensive planning phase, films remove the primary intellectual and analytical component of an operator’s job. It reduces them from strategic problem-solvers to mere tactical executors. A significant portion of their time is spent engaged in tasks that more closely resemble the work of intelligence analysts, logicians, and project managers—a reality far removed from the non-stop action hero archetype. The focus on the “kinetic” 1% of the mission completely misrepresents the cerebral nature of the other 99% of the work.

A common and dangerous cinematic trope portrays Tier One units as operating in a legal vacuum, acting as assassins or extra-legal enforcers who are not bound by the laws of war that govern conventional forces.

In reality, all U.S. military personnel are rigorously trained in and strictly bound by the Law of Armed Conflict (LOAC), also known as International Humanitarian Law.33 This body of law, codified in treaties like the Geneva and Hague Conventions, governs the conduct of hostilities. It is built on core principles such as military necessity, humanity (preventing unnecessary suffering), distinction (discriminating between combatants and non-combatants), and proportionality (ensuring that collateral damage is not excessive in relation to the military advantage gained).36 Furthermore, every mission is governed by specific Rules of Engagement (ROE), which are directives issued by a competent military authority that delineate the circumstances and limitations under which force can be used.36 ROE are often more restrictive than the LOAC and are tailored to the specific political and strategic context of an operation. Every service member has a personal responsibility to comply with these laws, obey only lawful orders, and report any violations.33

The portrayal of operators as extra-legal actors fundamentally undermines the concept of the professional soldier. Adherence to LOAC and ROE is a core tenet of their professionalism and is what legally and ethically distinguishes them from the unlawful combatants or terrorists they are fighting. Hollywood’s trope of the “lawless hero” dangerously blurs this critical distinction and feeds a false narrative that the nation’s most difficult missions can only be accomplished by breaking the very laws the nation purports to uphold.

Myth 6: The Interchangeable “Special Ops” Team

In films, a “Special Ops” team is often depicted as a generic collection of commandos, where unit distinctions are blurred or ignored. A Green Beret, a SEAL, and a Delta operator are all shown performing the same function: direct action assault. An Air Force special operator, if present, is often just another trigger-puller who happens to have some knowledge of aircraft.

This depiction completely misses the foundational principle of JSOC: the integration of highly specialized, non-interchangeable units.3 Within JSOC, Delta Force and DEVGRU are the primary direct-action SMUs, the “assaulters” who specialize in missions like counter-terrorism and hostage rescue.23 The 24th Special Tactics Squadron, however, plays a unique and critical role as an “enabler”.25 Its operators—Combat Controllers (CCTs), Pararescuemen (PJs), Special Reconnaissance (SR), and Tactical Air Control Party (TACP) personnel—are attached individually or in small teams to Delta and DEVGRU assault squadrons.26 They do not deploy as a standalone 24th STS unit for direct action missions.26 A CCT is not just another shooter; he is the expert responsible for controlling the airspace over the target and directing precision airstrikes. A PJ is not just a medic; he is an advanced combat trauma specialist capable of performing battlefield surgery and personnel recovery.25

By treating all operators as interchangeable shooters, Hollywood erases the concept of combined arms and interoperability at the highest tactical level. It fails to show that the lethality of a Delta or DEVGRU team is exponentially magnified by the unique capabilities of the Air Force CCT or PJ attached to them. This misrepresentation under-appreciates the complexity of modern special operations and the truly “joint” nature of JSOC, where the seamless integration of specialists from different services at the lowest tactical level is what makes the whole far greater than the sum of its parts.

Section III: The Arsenal: The Reality of Tools and Tactics

The tools of the trade—weapons, equipment, and explosives—are central to the action genre. However, their capabilities and tactical employment are frequently exaggerated for dramatic effect, creating a fundamental misunderstanding of the physics and realities of combat.

Myth 7: The “Hollywood Quiet” Suppressor

A staple of cinematic espionage and special operations is the firearm suppressor, often incorrectly called a “silencer.” In films, a suppressor renders a gunshot nearly silent, emitting a soft “pew” or “thwip” that allows for multiple, undetected shots in close proximity to the enemy.

This is a complete fiction. Suppressors do not silence a firearm; they reduce the decibel level of the gunshot, typically by an average of 20-35 decibels ($dB$).42 A suppressed firearm remains dangerously loud. For example, an unsuppressed 9mm pistol produces a sound of approximately 160 $dB$. A suppressed 9mm pistol still produces a sound of around 127-132 $dB$.44 For context, this is louder than a jackhammer (110 $dB$) or an ambulance siren (120 $dB$).42 The primary function of a suppressor is to reduce the sound signature to below the 140 $dB$ threshold for instantaneous, permanent hearing damage, making it “hearing safe,” not “silent”.45 Furthermore, unless specialized subsonic ammunition is used, the bullet itself will create a loud “crack” as it breaks the sound barrier, regardless of whether the firearm is suppressed.44

True stealth is not the product of a magical piece of technology, but of immense skill and discipline in personal noise mitigation. Operators achieve stealth by taping up rattling metal gear, modifying Velcro closures to be less audible, and practicing meticulous light and noise discipline in their movements.47 Hollywood externalizes this skill onto a piece of equipment, thereby misrepresenting the profound discipline that stealth operations actually require.

Myth 8: The Bottomless Magazine and the Feather-Light Load

Cinematic heroes often fire their weapons on full-auto for extended periods without reloading, seemingly possessing bottomless magazines.48 They run, jump, and climb with the agility of an unburdened athlete, their combat equipment having no apparent weight or bulk.

This portrayal ignores the brutal physics of a real combat load. While a standard infantry soldier may carry 50-70 pounds of gear, a special operations operator on an extended mission can carry upwards of 120 pounds, and in some cases, over 150 pounds.49 This load includes body armor (20-30 lbs), a helmet (3-5 lbs), a primary weapon (7-10 lbs), ammunition (a standard load of 210 rounds weighs about 10 lbs), water, communications equipment, medical supplies, explosives, and night vision systems.49 Ammunition is a finite, heavy, and carefully managed resource; operators train extensively on weapons mechanics and efficient magazine changes to conserve it.51 Carrying such a heavy load severely degrades mobility and endurance, leading to fatigue and an increased risk of musculoskeletal injuries.49

By ignoring the realities of weight and ammunition capacity, Hollywood removes the critical elements of endurance, logistics, and resource management from the combat equation. It transforms warfare from a grueling test of physical and mental stamina into a clean, athletic contest, erasing the constant, attritional effect that the combat load has on an operator’s body, movements, and decision-making.

Myth 9: The Fiery, Harmless Explosion

In film, explosions are typically depicted as massive, slow-moving fireballs that characters can outrun or dive away from at the last second.27 The lethal effects of concussion and fragmentation are often downplayed or ignored entirely.

Real explosions are characterized by a near-instantaneous and violent shockwave and high-velocity fragmentation, not a slow-burning fireball. Most military explosives are largely flameless unless a specific accelerant is involved.27 An artillery round landing nearby does not create a cinematic fireball; its shockwave and shrapnel are what cause catastrophic injury.27 Similarly, a fragmentation grenade produces a sharp, loud pop that kicks up dust and smoke, not a miniature fuel-air bomb.48 Furthermore, the danger of back blast from shoulder-fired weapons like the M72 LAW or an RPG is frequently disregarded. In Rambo: First Blood Part II, the protagonist fires a LAW from inside a helicopter—an act that in reality would have produced a lethal back blast extending up to 130 feet, killing everyone on board.22

The visual language of explosions in Hollywood is designed for spectacle, not realism. This misrepresentation creates a false sense of survivability around explosive weapons, teaching the audience that the danger is the visible fire, which can be avoided, rather than the invisible but far more deadly shockwave and fragmentation.

Section IV: The Culture: Misinterpreting the SOF Ethos

Perhaps the most significant and consistent error made by the entertainment industry is the failure to understand and differentiate the unique cultures and mission sets of the various units that fall under the umbrella of “Special Operations.”

Myth 10: The Monolithic “Special Forces” Commando

In movies and television, the terms “Special Forces,” “SEALs,” “Delta,” and “Rangers” are often used interchangeably to describe any elite soldier. The mission is almost invariably direct action: rescuing a hostage, assassinating a high-value target, or conducting a raid. This conflation ignores the fact that these units have vastly different primary missions, which in turn shape their distinct cultures, training pipelines, and strategic purposes.

The reality is one of specialization:

  • U.S. Army Special Forces (The Green Berets): Their doctrinal mission is Unconventional Warfare (UW) and Foreign Internal Defense (FID).21 They are “masters of unconventional warfare,” specifically organized, trained, and equipped to work with and through indigenous forces.54 As actor Chris Hemsworth noted when preparing to portray a Green Beret in 12 Strong, their job is to “embed themselves in a community over a course of months or years,” functioning as diplomats and relationship-builders as much as warriors.55 They are the military’s premier “teachers.”
  • Tier One SMUs (Delta Force/DEVGRU): Their primary mission is counter-terrorism (CT), direct action (DA), and hostage rescue.4 They are the nation’s “doers,” not its teachers.16 Their operations are typically short-duration, high-intensity, surgical strikes that Hollywood often refers to as “smash-and-grab” missions.55
  • The 75th Ranger Regiment: This is the U.S. Army’s premier light infantry special operations force. They specialize in large-scale direct action raids and airfield seizures and often serve as a larger supporting element for JSOC missions, providing security or a larger assault force when needed.4

Conflating these distinct units is more than a simple mistake in nomenclature; it is a failure to grasp the different strategic purposes of the nation’s Special Operations Forces. It is the difference between employing a scalpel (Delta/DEVGRU), a force multiplier that enables a partner nation to conduct its own surgery (Green Berets), and a larger rapid-assault force (Rangers). This cinematic flattening of SOF capabilities creates a one-dimensional public perception where the only tool in the special operations toolbox is a hammer (direct action). This misunderstanding can lead to a poor public and political appreciation of how and when to appropriately deploy these highly specialized and valuable national assets, ignoring the more nuanced and often more strategically impactful capabilities of units like the Green Berets.

Conclusion: Bridging the Gap Between Spectacle and Reality

The analysis of these ten key areas reveals a consistent pattern: Hollywood, in its pursuit of compelling narrative and visual spectacle, systematically erases the core elements that define U.S. Tier One Special Operations Forces. The human cost of service is replaced by invincible archetypes; the intellectual rigor of planning and the constraints of law are omitted for pacing; the physics of combat are altered for dramatic effect; and the nuanced, specialized cultures of distinct units are flattened into a monolithic “commando” stereotype.

While the entertainment industry’s primary goal is not documentary realism, these inaccuracies have tangible real-world implications. They shape public perception of military operations, creating unrealistic expectations of what is possible and at what cost. They influence the identity of veterans, who may find themselves measured against fictional super-soldiers, exacerbating the challenges of transitioning to civilian life. They provide a distorted view to potential recruits, who may be drawn to the fantasy rather than the demanding reality of service.

The ultimate irony is that the truth of these units is, in many ways, more compelling than the fiction. The reality is not one of loud superheroes but of quiet professionals. It is a story of immense discipline, intellectual acuity, unwavering teamwork, and an adherence to a professional and legal ethos under the most extreme pressure imaginable. It is a story of ordinary human beings who train relentlessly to do the extraordinary, not because they are without fear or beyond the reach of trauma, but precisely because they are not. Bridging the gap between spectacle and reality requires an appreciation for this more complex and profound truth.

Summary Table: Hollywood Myth vs. Operator Reality

Cinematic MythOperator Reality
1. The Invincible Warrior: Operators are emotionless “terminator robots” immune to physical and psychological harm.Operators are human beings who suffer from PTSD, addiction, and personal loss; survival often depends as much on luck as on skill.
2. The Young Gunfighter: Operators are in their early 20s, relying on raw talent and aggression.Operators are mature professionals, typically in their mid-30s, with 8-12 years of prior elite experience, selected for judgment and resilience.
3. The Lone Wolf: The hero succeeds by disobeying orders and “bucking the system.”The team is paramount; individualism is a liability. The “system” of planning and support is a lifeline, not an obstacle.
4. The Instant Briefing: Missions are planned in minutes based on a few satellite photos.Missions involve a rigorous, multi-day Military Decision-Making Process (MDMP), often conducted in complete isolation and involving extensive rehearsals.
5. No Legal Restraint: Tier One units operate outside the Law of Armed Conflict (LOAC) and Rules of Engagement (ROE).All operations are strictly governed by LOAC and mission-specific ROE; adherence to the law is a core tenet of their professionalism.
6. The Interchangeable Team: All “Special Ops” soldiers are generic commandos who perform the same direct-action role.JSOC units are highly specialized (e.g., assaulters vs. enablers); their effectiveness comes from the seamless integration of different service capabilities.
7. The “Silent” Suppressor: Suppressors make firearms almost silent, emitting a soft “pew.”Suppressors reduce sound to “hearing safe” levels (still louder than a jackhammer), but do not eliminate the supersonic crack of the bullet.
8. The Feather-Light Load: Operators move with athletic ease, unburdened by their gear, and have infinite ammunition.Operators carry 70-120+ pounds of equipment, which severely impacts mobility and endurance; ammunition is finite and carefully managed.
9. The Harmless Fireball: Explosions are slow-moving fireballs that can be outrun, with minimal concussive or back blast effects.Real explosions are instantaneous, violent events defined by a lethal shockwave and fragmentation; back blast is a critical danger.
10. The Monolithic Culture: “Special Forces” is a catch-all term for any elite unit that conducts raids.Different SOF units have distinct missions and cultures (e.g., Green Berets as trainers/advisors vs. SMUs as direct-action assaulters).

Appendix: Methodology

This report was compiled using a structured, multi-source analytical methodology designed to contrast popular cultural depictions with documented operational reality. The process involved three key phases: source selection and vetting, thematic analysis, and a dialectical “myth vs. reality” framework.

Source Selection and Vetting

Sources were categorized to ensure a balanced and evidence-based analysis:

  • Primary Sources (Operator Testimony): This category includes public-facing content from verified former operators of U.S. Special Operations units, particularly those from Tier One SMUs and Army Special Forces. Sources include podcast interviews (e.g., The Shawn Ryan Show, Cleared Hot), media appearances (e.g., GQ’s “The Breakdown” series with Jocko Willink), and published memoirs. These sources were utilized to establish the cultural, psychological, and experiential “ground truth” of service in these units.
  • Authoritative Sources (Factual Corroboration): This category includes official U.S. Government and Department of Defense publications and websites, such as those from USSOCOM, the U.S. Army, and the Joint Chiefs of Staff. It also encompasses doctrinal manuals (e.g., Field Manuals on the Military Decision-Making Process, the Law of Armed Conflict Deskbook) and peer-reviewed studies on topics such as operator psychology and equipment performance. These sources were used to substantiate factual claims regarding processes, laws, demographics, and the technical specifications of weapons and equipment.
  • Secondary Sources (Contextual Analysis): This category includes articles from reputable defense-focused news outlets, military-centric websites, and social media aggregators (e.g., Reddit). These sources were used to identify common cinematic tropes and public misconceptions, providing the “Hollywood” side of the comparison and reflecting the consensus of the broader military community’s critique of the entertainment industry.

Thematic Analysis Framework

All collected source materials were reviewed to identify recurring themes of inaccuracy. These themes were then categorized according to the core components of the user query: the people (psychology, age, ethos), the processes (planning, legal oversight), the culture (unit distinctions, teamwork), and the tools/weapons (equipment capabilities, tactical employment). This process allowed for the consolidation of disparate data points into ten distinct, overarching “myths” that form the structure of this report.

“Myth vs. Reality” Structure

The analytical approach for each of the ten points was dialectical. First, the cinematic trope (“the myth”) was clearly defined and articulated, using examples from secondary sources and operator commentary on specific films. Second, this myth was systematically deconstructed (“the reality”) using direct evidence from both primary operator testimony and authoritative doctrinal and technical sources. This structured approach ensures that each argument is clear, logical, and substantiated by credible evidence, providing a rigorous and objective analysis of the gap between fiction and fact.


If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly contribute towards our continued reporting, please visit our funding page.


Sources Used

  1. en.wikipedia.org, accessed October 23, 2025, https://en.wikipedia.org/wiki/Delta_Force#:~:text=Delta%20Force%2C%20along%20with%20the,dangerous%20missions%20directed%20by%20the
  2. Special mission unit – Wikipedia, accessed October 23, 2025, https://en.wikipedia.org/wiki/Special_mission_unit
  3. Joint Special Operations Command – Wikipedia, accessed October 23, 2025, https://en.wikipedia.org/wiki/Joint_Special_Operations_Command
  4. 5-Tier 1 Operators / Special Mission Units Explained – Operation Military Kids, accessed October 23, 2025, https://www.operationmilitarykids.org/5-tier-1-operators-special-mission-units-explained/
  5. Are there any military units above tier 1 units : r/WarCollege – Reddit, accessed October 23, 2025, https://www.reddit.com/r/WarCollege/comments/1e88zkh/are_there_any_military_units_above_tier_1_units/
  6. Guide :: Tier 1, 2 & 3 Explained… – Steam Community, accessed October 23, 2025, https://steamcommunity.com/sharedfiles/filedetails/?l=german&id=2651594499
  7. Navy SEAL Jocko Willink Breaks Down Combat Scenes From Movies | GQ – YouTube, accessed October 23, 2025, https://www.youtube.com/watch?v=-L7o6HtX8Vg
  8. What Hollywood Gets Wrong About Veterans, Military – AARP, accessed October 23, 2025, https://www.aarp.org/veterans/hollywood-veterans-military/
  9. John “Tig” Tiegen – The Haunting Truth About Delta Force’s Actions in Benghazi | SRS #235, accessed October 23, 2025, https://www.youtube.com/watch?v=YszyGzqjuLE
  10. NAVY SEAL TEAM 6 DEVGRU TIER 1 OPERATOR: ‘The Moment that CHANGED my life’, accessed October 23, 2025, https://www.youtube.com/watch?v=rNcK30vtxmA
  11. The True Story Of SEAL Team 6 / DEVGRU Operator : DJ Shipley | Mulligan Brothers Documentary – YouTube, accessed October 23, 2025, https://www.youtube.com/watch?v=oJBN0BN5oC4
  12. How Veteran Mike Glover Took Control of His PTSD – Skillset Magazine, accessed October 23, 2025, https://skillsetmag.com/article/veteran-mike-glover-ptsd/
  13. Ep 235: Tyler Grey on Serving in Delta Force and the Warrior’s Journey – YouTube, accessed October 23, 2025, https://www.youtube.com/watch?v=MciHGQ9zGuw
  14. Average age of special operations soldiers? : r/specialforces – Reddit, accessed October 23, 2025, https://www.reddit.com/r/specialforces/comments/1dpwhlc/average_age_of_special_operations_soldiers/
  15. How long would it realistically take someone who wanted to go from the Rangers to Special Forces to Delta Force? – Reddit, accessed October 23, 2025, https://www.reddit.com/r/JSOCarchive/comments/1hodz4l/how_long_would_it_realistically_take_someone_who/
  16. Delta Force – Wikipedia, accessed October 23, 2025, https://en.wikipedia.org/wiki/Delta_Force
  17. Inside Delta Force: America’s Most Elite Special Mission Unit – SOFREP, accessed October 23, 2025, https://sofrep.com/specialoperations/delta-force-the-complete-guide/
  18. The U.S. Military’s Elite Tier 1, Tier 2, and Tier 3 Units Explained – General Discharge, accessed October 23, 2025, https://gendischarge.com/blogs/news/3-tiers
  19. Personality Traits of Special Forces Operators: Comparing Commandos, Candidates, and Controls – Gwern.net, accessed October 23, 2025, https://gwern.net/doc/psychology/personality/conscientiousness/2022-huijzer.pdf
  20. An Exploration of the Psychological Traits Deemed Crucial for Success in UK Special Forces Operators – PubMed Central, accessed October 23, 2025, https://pmc.ncbi.nlm.nih.gov/articles/PMC12466407/
  21. On The Ground – What Are The Special Forces? | Campaign Against Terror | FRONTLINE | PBS, accessed October 23, 2025, https://www.pbs.org/wgbh/pages/frontline/shows/campaign/ground/specialforces.html
  22. 9 military movie scenes where Hollywood got it totally wrong, accessed October 23, 2025, https://www.wearethemighty.com/mighty-movies/hollywood-military-movie-errors/
  23. 5 Key Differences Between Delta Force and SEAL Team 6 | Military.com, accessed October 23, 2025, https://www.military.com/off-duty/2020/02/03/5-key-differences-between-delta-force-and-seal-team-6.html
  24. Do You Have the Right Psychology for Special Operations? – YouTube, accessed October 23, 2025, https://www.youtube.com/watch?v=t_jSPlZ9J3w
  25. 24th Special Tactics Squadron: Spear of the Sky – Grey Dynamics, accessed October 23, 2025, https://greydynamics.com/24th-special-tactics-squadron-spear-of-the-sky/
  26. The Air Force’s 24th Special Tactics Squadron is an elite special operations unit like no other | Sandboxx, accessed October 23, 2025, https://www.sandboxx.us/news/the-air-forces-24th-special-tactics-squadron-is-an-elite-special-operations-unit-like-no-other/
  27. What are some things the movie industry gets wrong with the armed …, accessed October 23, 2025, https://www.reddit.com/r/Military/comments/bppfcr/what_are_some_things_the_movie_industry_gets/
  28. Military Decision Making Process – Wikipedia, accessed October 23, 2025, https://en.wikipedia.org/wiki/Military_Decision_Making_Process
  29. Welcome to the Military Decision Making Process Lesson, accessed October 23, 2025, https://challenge2050.files.wordpress.com/2013/08/raun-p920-mdmp-version-13-01-attp-ay-11-121.pdf
  30. No. 15-06 MDMP MAR 15 – Army University, accessed October 23, 2025, https://armyuniversity.edu/cgsc/cgss/files/15-06_0.pdf
  31. Design and Planning – Joint Chiefs of Staff, accessed October 23, 2025, https://www.jcs.mil/Portals/36/Documents/Doctrine/fp/design_and_planning_fp.pdf
  32. JSOC: America’s Joint Special Operations Command – SOF Support Foundation, accessed October 23, 2025, https://sofsupport.org/jsoc-americas-joint-special-operations-command/
  33. INTRODUCTION TO THE LAW OF ARMED CONFLICT-BASIC KNOWLEDGE – ICRC, accessed October 23, 2025, https://www.icrc.org/sites/default/files/external/doc/en/assets/files/other/law1_final.pdf
  34. LAW OF ARMED CONFLICT DESKBOOK – JAGCNet, accessed October 23, 2025, https://www.jagcnet.army.mil/Sites%5C%5Cio.nsf/EEF9422EB2C293B68525805A0063ABED/%24File/LOAC%20Deskbook%20final%20with%202016%20index%20%2820%20Sep%29.pdf
  35. Department of Defense Law of War Manual – DoD OGC, accessed October 23, 2025, https://ogc.osd.mil/Portals/99/department_of_defense_law_of_war_manual.pdf
  36. LAW OF WAR/ INTRODUCTION TO RULES OF ENGAGEMENT B130936 STUDENT HANDOUT – Training Command, accessed October 23, 2025, https://www.trngcmd.marines.mil/Portals/207/Docs/TBS/B130936%20Law%20of%20War%20and%20Rules%20Of%20Engagement.pdf
  37. 105 Chapter 5 Rules of Engagement RULES OF ENGAGEMENT I. INTRODUCTION The primary source document and current version of the SR – Sites@Duke Express, accessed October 23, 2025, https://sites.duke.edu/lawfire/files/2020/10/ROEOperational-Law-Handbook-2020.pdf
  38. United States Special Operations Command – Wikipedia, accessed October 23, 2025, https://en.wikipedia.org/wiki/United_States_Special_Operations_Command
  39. 24th Special Tactics Squadron – Wikipedia, accessed October 23, 2025, https://en.wikipedia.org/wiki/24th_Special_Tactics_Squadron
  40. en.wikipedia.org, accessed October 23, 2025, https://en.wikipedia.org/wiki/24th_Special_Tactics_Squadron#:~:text=As%20the%20Air%20Force’s%20Tier,Tactical%20Air%20Control%20Party%20personnel.
  41. Special Tactics Home, accessed October 23, 2025, https://www.airforcespecialtactics.af.mil/
  42. Firearm Suppressors – Congressional Sportsmen’s Foundation, accessed October 23, 2025, https://congressionalsportsmen.org/policy/firearm-suppressors/
  43. HEARING PROTECTION – American Suppressor Association, accessed October 23, 2025, https://americansuppressorassociation.com/education/hearing-protection
  44. Do Gun Silencers Really Work? – SilencerCo, accessed October 23, 2025, https://silencerco.com/blog/do-gun-silencers-really-work
  45. A Look At Our Suppressors’ Decibel Reduction – Ranked – Silencer Central, accessed October 23, 2025, https://www.silencercentral.com/blog/suppressors-decibel-reduction/
  46. Silencer Guide with Decibel Level Testing – Ammo To Go, accessed October 23, 2025, https://www.ammunitiontogo.com/lodge/silencer-guide-with-decibel-level-testing/
  47. Special Forces Rate 55 Special Forces Movie Scenes | How Real Is It? | Insider – YouTube, accessed October 23, 2025, https://www.youtube.com/watch?v=eyhQFNdMuqE
  48. 10 Things Movies Always Get Wrong About War – Screen Rant, accessed October 23, 2025, https://screenrant.com/movies-get-wrong-war/
  49. How Much Does Military Gear Weigh? A Comprehensive Guide to Combat Loadouts and Their Implications | Crate Club, accessed October 23, 2025, https://crateclub.com/blogs/loadout/how-much-does-military-gear-weigh-a-comprehensive-guide-to-combat-loadouts-and-their-implications
  50. List of equipment of the United States Army – Wikipedia, accessed October 23, 2025, https://en.wikipedia.org/wiki/List_of_equipment_of_the_United_States_Army
  51. Army Firearms Specialist Rates Gun Technique In 13 Movies | How Real Is It? | Insider, accessed October 23, 2025, https://www.youtube.com/watch?v=P0PD8mW-lVw
  52. Special Forces – US Army Special Operations Recruiting, accessed October 23, 2025, https://www.goarmysof.army.mil/SF/
  53. Special Forces – US Army, accessed October 23, 2025, https://www.goarmy.com/careers-and-jobs/specialty-careers/special-ops/special-forces
  54. American Special Ops, accessed October 23, 2025, https://www.americanspecialops.com/
  55. How 12 Strong Differs From Most Special Forces Movies, According To Chris Hemsworth, accessed October 23, 2025, https://www.cinemablend.com/news/1715380/how-12-strong-differs-from-most-special-forces-movies-according-to-chris-hemsworth
  56. Army special operator rates 10 Delta Force and special forces scenes in movies and TV – video Dailymotion, accessed October 23, 2025, https://www.dailymotion.com/video/x9h5hce