Category Archives: Military Analytics

From the Littoral Fringe to the Asymmetric Edge: A Comprehensive Analysis of Taiwan’s Amphibious Reconnaissance and Patrol Unit

The Amphibious Reconnaissance and Patrol Unit (ARPU), known colloquially as the “Frogmen,” constitutes a Tier 1 special operations force within the Republic of China Marine Corps (ROCMC).1 This unit stands as a critical instrument of the Republic of China’s (ROC) national defense policy, and its development serves as a direct reflection of Taiwan’s shifting geopolitical and military realities. The ARPU’s history charts a course from a force posture centered on the strategic objective of mainland recovery to its current role as a linchpin of determined asymmetric defense against the formidable and ever-modernizing People’s Liberation Army (PLA).4

This report will demonstrate that the ARPU has evolved from a conventional amphibious reconnaissance unit, heavily influenced by American Cold War-era formations, into a multi-domain special operations force optimized for sea denial, counter-invasion, and asymmetric warfare. This transformation has made it a pivotal component of Taiwan’s overarching “Overall Defense Concept” (ODC).7 The unit’s continuous adaptation in tactics, organization, and equipment—driven by the escalating threat across the Taiwan Strait and a deepening, albeit unofficial, security partnership with the United States—is the central theme of this analysis.

2.0 Genesis and Formative Years (1950–1996): Forging a Littoral Reconnaissance Capability

2.1 Post-War Origins and American Doctrinal Influence

The genesis of the ARPU lies in the turbulent period between 1950 and 1955, a direct consequence of the Nationalist government’s retreat to Taiwan and the immediate, existential need to develop a specialized amphibious warfare capability.1 Following the passage of the U.S. Mutual Security Act of 1951, American military advisory presence and aid became a cornerstone of Taiwan’s defense structure.3 It was within this context of close U.S.-ROC military cooperation that the ROCMC Command, with guidance from American advisors, established its first formal reconnaissance element.3

From its inception, the unit’s doctrine was a unique and deliberate hybrid. While its organizational structure was patterned after the United States Marine Corps Amphibious Reconnaissance Battalion, its core training philosophy and skillset were explicitly modeled on the U.S. Navy’s Underwater Demolition Teams (UDTs)—the direct predecessors of the modern Navy SEALs.1 This fusion was not an arbitrary choice but a strategic necessity. The ROC’s primary strategic objective of the era was a potential amphibious counter-attack on mainland China. A pure reconnaissance force could identify landing sites, while a pure demolition unit could clear them. Facing the monumental task of an opposed landing with finite resources, the ROCMC required a single, elite formation capable of performing both functions sequentially: to clandestinely reconnoiter a potential beachhead and then clear it of obstacles for the main landing force. This created a potent “force multiplier” unit possessing a broader, more direct-action-oriented skillset than a standard reconnaissance formation, a flexibility that would prove invaluable decades later as its mission pivoted from offense to defense.

Initial missions were aligned with this offensive posture, focusing on clandestine intelligence gathering, pre-invasion hydrographic surveys, beach obstacle clearance, and identifying enemy fortifications.15 Early operators reportedly conducted covert infiltrations of PRC-held coastal areas to gather critical intelligence.15 The selection pool for this arduous duty was limited to enlisted Marines holding the rank of Sergeant or below, who were subjected to a grueling, year-long training course.1 By 1955, after the first three classes had successfully graduated, the unit had cultivated a sufficient cadre of experienced operators and instructors to become self-sufficient in its training pipeline.1

2.2 A Fragmented Organizational Evolution

During its formative decades, the unit’s structure was fluid and subordinate to the larger conventional echelons of the ROCMC. It began as a reconnaissance team directly under the Marine Corps Headquarters before being broken down into smaller detachments (偵察分隊) and assigned to the Marine Brigades.9 With the establishment of the 1st Marine Division in 1955, the unit was formalized as an Amphibious Reconnaissance Company (兩棲偵察連).9 A second company was stood up in 1966 with the formation of the 2nd Marine Division.10

A significant consolidation occurred in 1969 when the division-level reconnaissance companies were merged with the reconnaissance platoons organic to the infantry regiments. This created larger, more capable division-level Reconnaissance and Search Battalions (偵察搜索營), which centralized command and control of these specialized assets within each division.10 This period saw further organizational flux that mirrored broader changes in the ROCMC force structure, such as the creation of a reconnaissance company for the newly formed 77th Marine Division in 1979 and its subsequent disbandment in 1984.10

This long period of subordination to conventional division commands likely constrained the unit’s development as a true special operations force. As a division-level asset, its primary function was to support the division’s amphibious landing mission, not to conduct independent, strategic-level special operations. This structure would have limited its access to the specialized equipment, transportation, and intelligence assets available only at the highest levels of command. The constant reorganizations tied to the fate of its parent divisions indicate that the unit was viewed more as a specialized component of a conventional force rather than a strategic asset in its own right. This institutional mindset would have to be fundamentally overcome for the ARPU to evolve into its modern form.

3.0 The Modern Era (1997–Present): Consolidation and Doctrinal Realignment

3.1 Unification and Creation of a Strategic Asset

The year 1997 marks the birth of the modern Amphibious Reconnaissance and Patrol Unit (海軍陸戰隊兩棲偵搜大隊).3 In a pivotal reorganization, disparate special-purpose units within the ROC Navy and Marine Corps were consolidated into a single, brigade-level command reporting directly to the ROCMC Headquarters.10 This consolidation was the most critical transformation in the unit’s history, elevating it from a collection of tactical-level assets into a strategic special operations command.

The new ARPU merged the existing Amphibious Reconnaissance and Search Battalion with the 66th Division’s Reconnaissance Company and, significantly, the Marine Corps Political Warfare Company.10 The unit’s capabilities were further enhanced by absorbing the 99th Division’s Reconnaissance Company in 2001, the elite Marine Corps Special Service Company (CMC.SSC)—colloquially known as the “Black Outfit Unit”—in 2004, and finally, the Navy’s own Underwater Demolition Group in 2005.1 Before this period, reconnaissance, direct action, and UDT capabilities were stove-piped in different units with separate command chains, creating significant friction in planning and executing complex operations. By merging these elements, the ROCMC created a single command with a full-spectrum maritime special operations capability, encompassing reconnaissance, direct action, underwater operations, and unconventional warfare. This unified structure allows for streamlined command, integrated training, and the ability to tailor force packages for specific missions—a hallmark of modern SOF commands worldwide.

Time PeriodUnit Designation(s)Parent CommandKey Changes/Events
1950–1955Reconnaissance Team (偵察隊), Reconnaissance Detachment (偵察分隊)ROCMC HQ, later Marine BrigadesEstablishment with U.S. advisory input; training modeled on U.S. Navy UDTs.10
1955–1968Amphibious Reconnaissance Company (兩棲偵察連)1st & 2nd Marine DivisionsFormalized as company-sized elements organic to the newly formed Marine Divisions.10
1969–1996Reconnaissance and Search Battalion (偵察搜索營)Marine DivisionsRecon companies and regimental recon platoons merged into larger, division-level battalions.10
1997–PresentAmphibious Reconnaissance and Patrol Unit (兩棲偵搜大隊)ROCMC HeadquartersConsolidated into a single, brigade-level strategic command.10
2001Integration of 99th Division Recon CompanyARPUFurther consolidation as the 99th Division is disbanded.10
2004Integration of Marine Corps Special Service Company (CMC.SSC)ARPUUnit absorbs the ROCMC’s top-tier direct action/counter-terrorism unit.1
2005Integration of Navy Underwater Demolition GroupARPUAll primary naval special warfare capabilities unified under the ARPU command.10

3.2 The Crucible: Selection and Training

The modern pathway to becoming a Frogman is a grueling 10-week basic training course conducted at the Zuoying Naval Base in Kaohsiung.1 The course is open only to volunteers from within the ROCMC and is designed for extreme physical and psychological attrition, with a completion rate that hovers between 48% and 50%.1 The curriculum pushes candidates to their limits with endless long-distance runs, punishing calisthenics, swimming in full combat gear, small boat handling, demolitions, and guerrilla warfare tactics.15

The training regimen culminates in the “Comprehensive Test Week,” more commonly known as “Hell Week” (克難週).10 This is a six-day, five-night ordeal of continuous physical activity, with candidates permitted only one hour of rest for every six hours of exertion, pushing them to the brink of collapse.17

The final test is the iconic “Road to Heaven” (天堂路), a 50-meter crawl over a path of sharp coral rock that candidates, clad only in shorts, must traverse while performing a series of prescribed exercises.1 Instructors loom over them, shouting orders and sometimes pouring salt water onto their open wounds to amplify the pain and test their resolve.1 This highly public and brutal ritual serves a dual purpose beyond mere physical selection. It is a powerful tool for psychological conditioning and a public display of national resolve. By enduring extreme, seemingly arbitrary pain under the watchful eyes of instructors and, uniquely, their own families, candidates demonstrate an unwavering commitment that transcends physical toughness.1 This public spectacle serves as a form of strategic communication: to a domestic audience, it showcases the military’s elite standards, and to a potential adversary, it sends an unmistakable signal of the fanatical resistance an invading force would face. Upon completing the crawl, graduates are officially certified as ARPU Frogmen.1

3.3 The Shift to Asymmetric Operations and the “Overall Defense Concept”

With the formal abandonment of the strategic goal to retake mainland China, the ARPU’s mission has been completely reoriented toward the defense of Taiwan.6 This doctrinal shift aligns the unit with Taiwan’s “Overall Defense Concept” (ODC), a strategy that de-emphasizes matching the PLA symmetrically and instead focuses on leveraging the advantages of defense, ensuring survivability, and destroying an invading force in the littoral zone and on the beaches.5

The ARPU’s modern tactical employment directly reflects this new reality. Its core missions now include:

  • Sea Denial: In a conflict, ARPU teams would likely be tasked with covertly deploying from small boats under the cover of darkness to conduct reconnaissance on PLA naval formations, acting as forward observers to call in precision strikes from Taiwan’s formidable shore-based anti-ship missile batteries.17
  • Counter-Infiltration and Guerrilla Warfare: The unit serves as a high-readiness rapid reaction force, prepared to counter PLA special forces attempting to seize critical infrastructure or establish a lodgment ahead of a main invasion force.15
  • Critical Infrastructure Defense: Reflecting a shift toward homeland defense, the ARPU has been specifically tasked with defending the Tamsui River and the Port of Taipei. These are key strategic entry points to the capital, and the ARPU is expected to work in concert with the Guandu Area Command and the Coast Guard to secure them against a riverine or port assault.20
  • Joint Operations and Training: The ARPU serves as a center of excellence for special tactics within Taiwan’s security apparatus. It provides advanced training to other elite units, including the Coast Guard’s Special Task Unit (STU) and the Military Police Special Services Company (MPSSC).1

4.0 The Operator’s Arsenal: An Evolution in Small Arms

The evolution of the ARPU’s small arms is a direct reflection of Taiwan’s strategic journey from near-total dependence on the United States to a robust indigenous defense industry, and finally to a sophisticated procurement strategy that blends domestic production with best-in-class foreign systems for specialized roles.

4.1 The American Legacy (1950s–1970s): Equipping for a Counter-Invasion

In the decades following the ROC’s retreat to Taiwan, its armed forces were almost entirely equipped through U.S. military aid programs established under the Mutual Defense Treaty and later the Taiwan Relations Act.3 The standard-issue rifle for the ROCMC, and by extension its nascent frogman units, was the U.S. M1 Garand, chambered in.30-06 Springfield.23 Taiwan received well over 100,000 of these powerful and reliable semi-automatic rifles.26 The primary sidearm was the venerable Colt M1911A1 pistol in.45 ACP, the standard U.S. military sidearm of the era.26 It is important to note, however, that the ARPU’s doctrinal predecessors, the U.S. UDTs, often operated with minimal armament during pure demolition and reconnaissance missions, prioritizing stealth and explosives over firepower. Their primary tools were often a Ka-Bar combat knife and haversacks of demolition charges.28 It is highly probable that the early ROCMC frogmen adopted a similar minimalist loadout for certain mission profiles, relying on standard infantry arms only when direct combat was anticipated.

4.2 The Indigenous Drive (1970s–2000s): Forging Self-Sufficiency

The geopolitical shifts of the 1970s, particularly the U.S. normalization of relations with the People’s Republic of China, injected a profound sense of uncertainty into Taiwan’s defense planning. This spurred a national effort to develop an indigenous defense industry capable of achieving self-sufficiency in critical weapons systems.30 This period saw the development of the T65 assault rifle series by Taiwan’s 205th Armory. Finalized in 1976 and chambered in 5.56x45mm NATO, the T65 was heavily influenced by the AR-15/M16 platform but incorporated a more robust short-stroke gas piston system derived from the AR-18, a design choice that prioritized reliability.31 The T65K2 variant became the standard-issue rifle for the ROC Army and Marine Corps, and ARPU operators would have transitioned to this platform during this period.31 To replace the aging fleet of M1911A1 pistols, the 205th Armory also developed the T75 pistol, a domestic copy of the Beretta 92F chambered in 9x19mm Parabellum.35

4.3 The Contemporary ARPU Armory: A Detailed Technical Assessment

The current ARPU arsenal represents a mature and sophisticated procurement strategy. It combines advanced, cost-effective indigenous systems for general issue with carefully selected, high-performance foreign weapons for specialized special operations requirements.

4.3.1 Primary Weapon System: T91 Assault Rifle

The T91 is the standard-issue rifle for all branches of the ROC Armed Forces, including the ARPU. Adopted in 2003 to replace the T65 series, it is a modern assault rifle built around a short-stroke gas piston system that offers enhanced reliability in harsh maritime environments while retaining the familiar ergonomics and controls of the AR-15/M16 platform.38 The rifle features an integrated MIL-STD-1913 Picatinny rail on the receiver for mounting optics, a 4-position selector switch (safe, semi-auto, 3-round burst, full-auto), and a telescoping stock modeled after the M4 carbine.39 Due to the nature of their missions, ARPU operators likely make extensive use of the T91CQC variant, which features a shorter 349 mm (13.7 in) barrel for improved maneuverability in the close confines of ship-boarding or urban combat scenarios.39

4.3.2 Sidearms: T75K3 and Glock Series

The standard-issue sidearm for the ARPU is the indigenously produced T75K3 pistol.35 This is the latest evolution of the T75 (Beretta 92 clone) and features improved ergonomics and a polygonally rifled barrel, which enhances both accuracy and service life.35 In line with global special operations trends, ARPU operators also utilize Glock 17 and 19 pistols.26 The Glock 19, in particular, is a worldwide favorite among elite units for its exceptional reliability, compact size, and vast ecosystem of aftermarket support, allowing for extensive customization.42

4.3.3 Close Quarters Battle (CQB) Systems: HK MP5

Despite its age, the German-made Heckler & Koch MP5 submachine gun remains a key tool in the ARPU’s arsenal for specialized CQB roles.26 Its continued use is not a sign of obsolescence but a testament to its superior performance in its intended niche. The MP5’s roller-delayed blowback, closed-bolt action provides a level of accuracy and control in full-automatic fire that is unmatched by simpler open-bolt designs.45 For surgical precision in hostage-rescue or maritime counter-terrorism scenarios, where over-penetration is a major concern, the 9mm MP5 remains an optimal weapon system.

4.3.4 Squad Support Weapons: T75 Light Machine Gun

For squad-level suppressive fire, the ARPU employs the T75 Light Machine Gun.26 This weapon, based on the highly successful Belgian FN Minimi, is produced in Taiwan and provides a high volume of 5.56mm fire.48 It is gas-operated, fires from an open bolt, and features the crucial ability to feed from both 200-round disintegrating belts and standard 30-round T91 rifle magazines, providing critical ammunition interoperability in a firefight.48

4.3.5 Precision Engagement Platforms

The ARPU fields a sophisticated and layered inventory of sniper systems for long-range precision engagement:

  • T93 Sniper Rifle: This is the standard-issue, domestically produced bolt-action sniper rifle, chambered in 7.62×51mm NATO and closely patterned after the U.S. M24 Sniper Weapon System.50 The ROCMC was a primary customer for this rifle, ordering 179 units beginning in 2009. The rifle has an effective range of over 800 meters, and an improved T93K1 variant features a 10-round detachable box magazine for faster follow-up shots.50
  • T112 Heavy Sniper Rifle: A new indigenous anti-materiel rifle scheduled for delivery in 2025.51 Chambered in 12.7×99mm NATO (.50 BMG), this weapon will provide ARPU teams with the capability to engage and destroy high-value targets such as light armored vehicles, radar installations, and small watercraft at an effective range of 2,000 meters.51
  • Accuracy International AXMC/AX50: For the most demanding missions, the Taiwan Marine Corps Special Forces have procured top-tier sniper systems from the British firm Accuracy International.52 The
    AXMC is a multi-caliber platform, likely used in.338 Lapua Magnum for extreme-range anti-personnel work, while the AX50 is a.50 BMG anti-materiel rifle. The acquisition of these world-class systems demonstrates a commitment to providing ARPU snipers with a qualitative edge on the battlefield.
Weapon TypeModel(s)OriginCaliberActionRole
Assault RifleT91 / T91CQCTaiwan5.56×45mm NATOGas-operated, short-stroke pistonStandard issue primary weapon; CQC variant for close-quarters
PistolT75K3Taiwan9×19mm ParabellumShort recoil, DA/SAStandard issue sidearm
PistolGlock 17 / 19Austria9×19mm ParabellumStriker-firedSpecial operations sidearm
Submachine GunHK MP5A5Germany9×19mm ParabellumRoller-delayed blowbackClose Quarters Battle (CQB), Maritime Counter-Terrorism
Light Machine GunT75 LMGTaiwan5.56×45mm NATOGas-operated, open boltSquad-level suppressive fire
Sniper RifleT93 / T93K1Taiwan7.62×51mm NATOBolt-actionDesignated marksman / Sniper rifle
Heavy Sniper RifleT112Taiwan12.7×99mm NATOBolt-actionAnti-materiel, extreme long-range engagement
Sniper RifleAccuracy International AXMCUKMulti-caliber (e.g.,.338 LM)Bolt-actionSpecialized long-range anti-personnel
Heavy Sniper RifleAccuracy International AX50UK12.7×99mm NATOBolt-actionSpecialized anti-materiel

5.0 The Future Frogman: A Speculative Outlook

5.1 Deepening Integration with U.S. Special Operations Forces

The most significant factor shaping the ARPU’s future is the recently confirmed permanent stationing of U.S. Army Special Forces (Green Berets) in Taiwan for training and advisory missions.53 This deployment, authorized under the U.S. National Defense Authorization Act, represents a fundamental shift in U.S. policy, which for decades avoided a permanent military presence on the island to maintain strategic ambiguity.53 The placement of U.S. SOF on outlying islands like Kinmen, just miles from the mainland, transcends simple tactical instruction; it serves as a powerful geopolitical signal. This deployment creates a “tripwire” force, where any PLA action against these islands now carries the direct risk of causing U.S. casualties, an event that would dramatically increase the likelihood of a direct American military response and thus complicates Beijing’s invasion calculus.

For the ARPU, this “train the trainer” approach will instill the latest SOF tactics, techniques, and procedures (TTPs), particularly in areas like Joint All-Domain Command and Control (JADC2) and decentralized operations—areas where Taiwan’s traditionally hierarchical command structure has been identified as a weakness.4 This will enhance interoperability, allowing ARPU teams to seamlessly integrate with U.S. or allied forces in a conflict.

5.2 The Technological Battlespace and Asymmetric Armaments

The future ARPU operator will be equipped to maximize the lethality and survivability of small, distributed teams. This will involve the widespread adoption of advanced optics, night vision, and laser designators as standard issue. The focus will shift heavily toward man-portable asymmetric systems that allow small teams to neutralize high-value targets. This includes loitering munitions (suicide drones), such as the indigenous Flyingfish system, and advanced anti-armor missiles like the Javelin and Kestrel, which can be used to destroy landing craft, armored vehicles, and command posts.3 Furthermore, the integration of micro-UAVs like the Black Hornet Nano at the squad level will become standard, providing teams with an organic and immediate intelligence, surveillance, and reconnaissance (ISR) capability, reducing their dependence on higher-echelon assets.57

5.3 The Evolving Role in Cross-Strait Deterrence: The “Stand-In Force” Concept

In a potential conflict, the ARPU’s role will align closely with the U.S. Marine Corps’ emerging concept of “Stand-In Forces” (SIF).58 These are small, low-signature, highly mobile units designed to operate

inside the enemy’s anti-access/area denial (A2/AD) bubble.59 The ARPU’s mission will be to survive the PLA’s initial missile and air bombardment and then conduct sea denial and disruption operations along Taiwan’s coastline and outlying islands.

This represents a fundamental shift in the unit’s purpose. Historically, the ARPU was a “spearhead” intended to lead an offensive amphibious assault.15 In the future, it will function as the distributed “nervous system” of Taiwan’s defense. The “porcupine” strategy relies on a network of mobile, concealed weapon systems (like anti-ship missiles) to attrite an invading fleet.5 The primary challenge for this strategy is finding and tracking the targets amidst the chaos and electronic warfare of an invasion. ARPU teams, with their stealth, mobility, and organic ISR capabilities, are perfectly suited to act as the forward sensor nodes of this defensive network. Their future value will be measured less by the number of enemies they eliminate directly and more by the number of high-value targets—ships, command centers, logistics hubs—they enable the larger joint force to destroy. They are evolving from a kinetic tool into a critical Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) enabler, making them indispensable to the success of the Overall Defense Concept.

6.0 Conclusion

The evolutionary arc of the Amphibious Reconnaissance and Patrol Unit is a microcosm of Taiwan’s larger strategic transformation. From its origins as a U.S.-modeled reconnaissance force postured for an offensive mission that would never materialize, it has been forged by geopolitical necessity into a consolidated, multi-mission special operations command. Through a crucible of brutal selection and a pragmatic approach to armament, the ARPU has become a highly capable and professional force.

Today, the ARPU stands as a cornerstone of Taiwan’s asymmetric defense strategy. No longer a simple spearhead, its evolving doctrine positions it as a vital sensing and targeting network, designed to operate inside an enemy’s weapon engagement zone to enable the destruction of an amphibious invasion force. The unit’s advanced training, specialized equipment, and deepening integration with U.S. Special Operations Forces make it one of the most credible deterrents to a successful PLA amphibious assault. The continued modernization and effectiveness of these “Frogmen” will remain a key factor in maintaining stability in the Taiwan Strait and ensuring the defense of the Republic of China.


If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly contribute towards our continued reporting, please visit our funding page.


Sources Used

  1. Amphibious Reconnaissance and Patrol Unit – Wikipedia, accessed September 7, 2025, https://en.wikipedia.org/wiki/Amphibious_Reconnaissance_and_Patrol_Unit
  2. Special Forces: Taiwan Amphibious Recon Unit – YouTube, accessed September 7, 2025, https://www.youtube.com/watch?v=RJQPSxJyz1E
  3. Republic of China Marine Corps – Wikipedia, accessed September 7, 2025, https://en.wikipedia.org/wiki/Republic_of_China_Marine_Corps
  4. Taiwan’s Defense Policies in Evolution, accessed September 7, 2025, https://media.defense.gov/2025/Apr/24/2003696549/-1/-1/1/FEAT-JIPA-DOTSON.PDF
  5. Taiwan’s Defense Policies in Evolution – Air University, accessed September 7, 2025, https://www.airuniversity.af.edu/JIPA/Display/Article/4164821/taiwans-defense-policies-in-evolution/
  6. Republic of China Armed Forces – Wikipedia, accessed September 7, 2025, https://en.wikipedia.org/wiki/Republic_of_China_Armed_Forces
  7. The Republic of China (ROC) Marine Corps future role in Overall Defense Concept (ODC) under the threat of the PRC/PLA. – DTIC, accessed September 7, 2025, https://apps.dtic.mil/sti/pdfs/AD1177947.pdf
  8. Unveiling Taiwan’s Military Power: The Secret Tanks That震撼全球 – Cyber Innovation Hub, accessed September 7, 2025, https://6857blakley.csail.mit.edu/tanks-taiwan
  9. 兩棲偵搜大隊- 政府資訊公開- 中華民國海軍, accessed September 7, 2025, https://navy.mnd.gov.tw/policyroom/Policy_Info.aspx?ID=7&CID=30243&PID=124
  10. 中華民國海軍陸戰隊兩棲偵搜大隊- 維基百科,自由的百科全書, accessed September 7, 2025, https://zh.wikipedia.org/zh-tw/%E4%B8%AD%E8%8F%AF%E6%B0%91%E5%9C%8B%E6%B5%B7%E8%BB%8D%E9%99%B8%E6%88%B0%E9%9A%8A%E5%85%A9%E6%A3%B2%E5%81%B5%E6%90%9C%E5%A4%A7%E9%9A%8A
  11. Foreign Relations of the United States, 1955–1957, China, Volume III – Historical Documents – Office of the Historian, accessed September 7, 2025, https://history.state.gov/historicaldocuments/frus1955-57v03/d191
  12. Foreign Relations of the United States, 1952–1954, China and Japan, Volume XIV, Part 1 – Historical Documents – Office of the Historian, accessed September 7, 2025, https://history.state.gov/historicaldocuments/frus1952-54v14p1/d295
  13. 海軍陸戰隊兩棲偵搜大隊簡史- 遨翔寰宇神采飛揚 – Udn 部落格, accessed September 7, 2025, https://classic-blog.udn.com/Luke822/1523882
  14. A Brief History of Frogmen, UDTs and Navy SEALs – Zeagle, accessed September 7, 2025, https://www.zeagle.com/a-brief-history-of-frogmen-udts-and-navy-seals/
  15. Frogmen–Their Exploits Are Legend – Taiwan Panorama, accessed September 7, 2025, https://www.taiwan-panorama.com/en/Articles/Details?Guid=7eaf0f9c-4d6e-4a63-bfb3-3627c1a1d311&CatId=11&postname=Frogmen–Their%20Exploits%20Are%20Legend
  16. 中华民国海军陆战队两栖侦搜大队 – 维基百科, accessed September 7, 2025, https://wiki.zyhorg.ac.cn/wiki/%E4%B8%AD%E8%8F%AF%E6%B0%91%E5%9C%8B%E6%B5%B7%E8%BB%8D%E9%99%B8%E6%88%B0%E9%9A%8A%E5%85%A9%E6%A3%B2%E5%81%B5%E6%90%9C%E5%A4%A7%E9%9A%8A
  17. A Look Inside Taiwan’s Brutal ARP Navy Frogman Program – gCaptain, accessed September 7, 2025, https://gcaptain.com/a-look-inside-taiwans-brutal-arp-navy-frogman-program/
  18. A Test of Will: Taiwan’s Frogman Training, accessed September 7, 2025, https://www.taiwan-panorama.com/en/Articles/Details?Guid=8eb766d9-7203-4a35-96cd-bab64f2dcf47&CatId=7&postname=A%20Test%20of%20Will%3A%20Taiwan%E2%80%99s%20Frogman%20Training-Taiwan%E2%80%99s%20Frogman%20Training
  19. Inside Taiwan’s brutal navy frogmen bootcamp – YouTube, accessed September 7, 2025, https://www.youtube.com/watch?v=5XHUm10QDsQ
  20. Defense ministry deploys marines to Taipei area, accessed September 7, 2025, https://www.taipeitimes.com/News/taiwan/archives/2025/01/25/2003830818
  21. Taiwan: Major U.S. Arms Sales Since 1990 – FAS Project on Government Secrecy, accessed September 7, 2025, https://sgp.fas.org/crs/weapons/RL30957.pdf
  22. Delayed US Arms Transfers to Taiwan: Déjà Vu? – The Diplomat, accessed September 7, 2025, https://thediplomat.com/2024/07/delayed-us-arms-transfers-to-taiwan-deja-vu/
  23. Marine Corps World War II Weapons: Description, accessed September 7, 2025, https://www.usmcmuseum.com/uploads/6/0/3/6/60364049/marine_corps_weapon_descriptions.pdf
  24. M1 Garand – Wikipedia, accessed September 7, 2025, https://en.wikipedia.org/wiki/M1_Garand
  25. the M1 Garand collection – usmcweaponry.com, accessed September 7, 2025, https://usmcweaponry.com/m1-garand/
  26. List of equipment of the Republic of China Army – Wikipedia, accessed September 7, 2025, https://en.wikipedia.org/wiki/List_of_equipment_of_the_Republic_of_China_Army
  27. My M1 Garand : r/M1Rifles – Reddit, accessed September 7, 2025, https://www.reddit.com/r/M1Rifles/comments/1ktwh86/my_m1_garand/
  28. Frogmen Were the First on Iwo Jima – VFW, accessed September 7, 2025, https://www.vfw.org/media-and-events/latest-releases/archives/2020/2/frogmen-were-the-first-on-iwo-jima
  29. What weapons did the original Frogman UDTs use during WW2? : r/navyseals – Reddit, accessed September 7, 2025, https://www.reddit.com/r/navyseals/comments/6ydecl/what_weapons_did_the_original_frogman_udts_use/
  30. Defense industry of Taiwan – Wikipedia, accessed September 7, 2025, https://en.wikipedia.org/wiki/Defense_industry_of_Taiwan
  31. T65 assault rifle – Wikipedia, accessed September 7, 2025, https://en.wikipedia.org/wiki/T65_assault_rifle
  32. Taiwan’s Retro Gas Piston AR: the Type 65 – Forgotten Weapons, accessed September 7, 2025, https://www.forgottenweapons.com/taiwans-retro-gas-piston-ar-the-type-65/
  33. Taiwan’s Retro Gas Piston AR: the Type 65 – YouTube, accessed September 7, 2025, https://www.youtube.com/watch?v=Iap1d47knmI
  34. Republic of China (Taiwan) Weapons – Far East Tactical, accessed September 7, 2025, https://fareastmilsim.com/rocweapons
  35. T75 pistol – Wikipedia, accessed September 7, 2025, https://en.wikipedia.org/wiki/T75_pistol
  36. The Taiwan Army Artillery Corps uses T75 pistols (imitations of the Beretta 92 series) for shooting training. : r/ForgottenWeapons – Reddit, accessed September 7, 2025, https://www.reddit.com/r/ForgottenWeapons/comments/1j44o3f/the_taiwan_army_artillery_corps_uses_t75_pistols/
  37. Taiwan Coast Guard’s T75 pistol (a local imitation of the Beretta 92 family). – Reddit, accessed September 7, 2025, https://www.reddit.com/r/ForgottenWeapons/comments/1fgpm8g/taiwan_coast_guards_t75_pistol_a_local_imitation/
  38. T91: Taiwan’s Short-Stroke AR – YouTube, accessed September 7, 2025, https://www.youtube.com/watch?v=M3G2aKG4-5Y&pp=0gcJCfwAo7VqN5tD
  39. T91 assault rifle – Wikipedia, accessed September 7, 2025, https://en.wikipedia.org/wiki/T91_assault_rifle
  40. T91 Taiwanese 5.56mm Assault Rifle – ODIN, accessed September 7, 2025, https://odin.tradoc.army.mil/WEG/Asset/123bea4095eedd25096b5d11283d1783
  41. Military to produce more T75K3 pistols for Navy, Air Force – 僑務電子報, accessed September 7, 2025, https://ocacnews.net/article/315696
  42. Top U.S. General In Afghanistan Is Carrying A Heavily-Modified Glock With A Compensator Attached – The War Zone, accessed September 7, 2025, https://www.twz.com/39894/top-u-s-general-in-afghanistan-is-carrying-a-heavily-modified-glock-with-a-compensator-attached
  43. How Army Special Forces Worked the System to Get Glock Pistols | Coffee or Die, accessed September 7, 2025, https://www.coffeeordie.com/article/special-forces-glock-pistols
  44. Why is the Glock 19 pistol the favorite of the world’s most elite forces? – Sandboxx, accessed September 7, 2025, https://www.sandboxx.us/news/why-is-the-glock-19-the-favorite-pistol-of-special-forces/
  45. MP5 – Heckler & Koch, accessed September 7, 2025, https://www.heckler-koch.com/en/Products/Military%20and%20Law%20Enforcement/Submachine%20guns/MP5
  46. Heckler & Koch MP5 – Wikipedia, accessed September 7, 2025, https://en.wikipedia.org/wiki/Heckler_%26_Koch_MP5
  47. Was the H&K MP5 really that special of a submachine gun of its time? Or is it special because of the SAS? – Reddit, accessed September 7, 2025, https://www.reddit.com/r/WarCollege/comments/1mt4mgb/was_the_hk_mp5_really_that_special_of_a/
  48. T75 light machine gun – Wikipedia, accessed September 7, 2025, https://en.wikipedia.org/wiki/T75_light_machine_gun
  49. T75 Taiwanese 5.56mm Light Machine Gun – ODIN – OE Data Integration Network, accessed September 7, 2025, https://odin.tradoc.army.mil/WEG/Asset/d3b8969543b7c45e9a9391f262b0ad40
  50. T93 sniper rifle – Wikipedia, accessed September 7, 2025, https://en.wikipedia.org/wiki/T93_sniper_rifle
  51. Taiwan military to receive heavy sniper rifles in June | Taiwan News …, accessed September 7, 2025, https://taiwannews.com.tw/news/6024029
  52. The AXMC and AX50 sniper rifles used by Taiwan Marine Corps …, accessed September 7, 2025, https://www.reddit.com/r/ForgottenWeapons/comments/1idl8uo/the_axmc_and_ax50_sniper_rifles_used_by_taiwan/
  53. Breaking a Seven-Decade Taboo: The Deployment of US Special Forces to Kinmen, accessed September 7, 2025, https://www.hudson.org/security-alliances/breaking-seven-decade-taboo-deployment-us-special-forces-kinmen-miles-yu
  54. US Army Special Forces Train Taiwan Troops Near China’s Coast – Newsweek, accessed September 7, 2025, https://www.newsweek.com/american-special-forces-train-taiwan-soldiers-penghu-kinmen-china-coast-1868009
  55. Presence of U.S. Army Special Forces on outlying islands confirmed – Focus Taiwan, accessed September 7, 2025, https://focustaiwan.tw/politics/202403140016
  56. Analysis: Joint U.S.-Taiwan Training Needed for Incoming Weapons Systems – YouTube, accessed September 7, 2025, https://www.youtube.com/watch?v=ljH2TODfPhQ
  57. US Army Special Forces To Be Deployed on Taiwanese Island Six Miles From Mainland China | SOFREP, accessed September 7, 2025, https://sofrep.com/news/us-army-special-forces-to-be-deployed-on-taiwanese-island-six-miles-from-mainland-china/
  58. Recommendations for Improving the US Marine Corps’ Force Design, accessed September 7, 2025, https://www.usmcu.edu/Outreach/Marine-Corps-University-Press/Expeditions-with-MCUP-digital-journal/Improving-the-US-Marine-Corps-Force-Design/
  59. Marine Corps and Space Force Integration, accessed September 7, 2025, https://www.usmcu.edu/Outreach/Marine-Corps-University-Press/MCU-Journal/JAMS-vol-15-no-1/Marine-Corps-and-Space-Force-Integration/

The Unending Conflict: How the Character of Warfare Has Transformed in the 21st Century

The fundamental nature of conflict as a political instrument, a violent means to compel an adversary to fulfill one’s will, remains an immutable feature of international relations. Yet, over the past 50 years, the character of this conflict—the domains in which it is fought, the tools employed, and the very definitions of victory and defeat—has undergone a radical transformation. The global strategic landscape has shifted from a state of episodic, declared wars, punctuated by periods of discernible peace, to a condition of persistent, undeclared, multi-domain competition. The clear delineation between war and peace has not merely blurred; it has been deliberately eroded and is now actively exploited as a domain of strategic ambiguity.1

This report analyzes this fundamental evolution in the character of conflict. It begins by establishing a strategic baseline circa 1975, a world defined by the bipolar certainty of the Cold War. In that era, the existential threat of a massive conventional and nuclear exchange between two superpowers paradoxically forced competition into the shadows, creating and refining the playbook for today’s hybrid conflicts. The analysis then traces the profound technological and doctrinal shifts of the post-Cold War era, marked by the “Revolution in Military Affairs” (RMA), which cemented U.S. conventional military dominance but also accelerated the turn toward asymmetric strategies by its rivals.

Finally, the report examines the current state of international competition, arguing that the major powers are already engaged in a form of “undocumented conflict.” This conflict is waged continuously across new and expanded domains—economic, cyber, and informational—and is increasingly shaped by emerging technologies, most notably artificial intelligence (AI). The ultimate battlefield has expanded from physical territory to encompass critical infrastructure, financial systems, and the cognitive domain of public perception itself. The central challenge for national security in the 21st century is no longer simply preparing for a future war, but navigating the unending conflict that is already here.

Section I: The Cold War Baseline – A World of Bipolar Certainty (c. 1975)

Fifty years ago, the strategic environment was defined by a stark, bipolar clarity. The world was divided into two ideological blocs, led by the United States and the Soviet Union, locked in a competition underwritten by the threat of global thermonuclear war.5 This overarching threat of Mutually Assured Destruction created a paradoxical stability at the strategic level. While it made direct, large-scale conventional war between the superpowers unthinkable, it did not eliminate conflict. Instead, it channeled geopolitical competition into deniable, indirect, and asymmetric arenas, creating an incubator for the hybrid methods that define the modern era.

The Conventional Battlefield – The Fulda Gap and the North German Plain

The central front of the Cold War was Europe, where two of the most powerful military alliances in history stood poised for a cataclysmic conventional battle. Military doctrine and force posture on both sides were overwhelmingly focused on this potential high-intensity conflict.

NATO’s strategy was formally codified in 1967 as “Flexible Response.” This doctrine moved away from the previous policy of “Massive Retaliation” and envisioned a tiered response to Warsaw Pact aggression. An attack would be met first with a direct conventional defense, followed by the deliberate and controlled escalation to tactical, and finally strategic, nuclear weapons if necessary.6 The goal was to possess a credible deterrent at every level of the escalatory ladder. NATO’s planning called for its forces to be capable of sustaining a conventional defense in Central Europe for approximately 90 days against a full-scale invasion, allowing time for political negotiation or the decision to escalate.6 However, a sense of unreality pervaded these preparations; while doctrine called for a seamless transition from conventional to nuclear operations, all practical attempts to devise tactics for actually fighting and winning on a nuclear battlefield had proven futile.8

The Warsaw Pact, guided by Soviet military thought, held a fundamentally offensive-oriented doctrine. Soviet theorists believed that the defensive was an inherently weaker form of warfare and that decisive victory could only be achieved through the offense.9 Their plans were officially framed as a massive “counterattack” that would follow the repulse of an initial NATO assault. This offensive would depend on the overwhelming numerical superiority of Soviet-style forces, particularly their vast tank armies, to break through NATO lines along axes like the Fulda Gap and the North German Plain and rapidly advance deep into Western Europe.9 In 1975, the Warsaw Pact enjoyed a considerable numerical advantage in Central Europe, particularly in tanks and artillery, and held the geostrategic advantage of “interior lines,” which allowed for the rapid transfer of forces between fronts.10

This doctrinal standoff fueled an intense technological arms race in conventional weaponry. The mid-1970s saw the introduction of a new generation of military hardware. Tanks were upgraded with stabilized turrets and electronic fire controls, while armored personnel carriers evolved into heavier infantry fighting vehicles from which troops could fight.8 The development of potent anti-tank guided missiles (ATGMs) forced armored divisions to adopt closer cooperation between tanks and infantry.8 Armies on both sides became increasingly motorized and mechanized. This period also saw the first significant use of remotely piloted vehicles (RPVs), or drones, for surveillance and target acquisition, and the maturation of the attack helicopter as a dedicated “tank-busting” platform, a lesson learned from its massive use in Vietnam.8 This unprecedented faith in technology led to a battlefield where the number and quality of electronic systems became a primary index of an army’s modernity.8 For the U.S. Army, this era was one of doctrinal ferment, with its focus shifting cyclically between conventional warfare in Europe, the specter of nuclear conflict, and the immediate lessons of counterinsurgency in Vietnam, resulting in a tactical doctrine more complex than at any other point in its history.12

The Shadow War – Proxy Conflicts and Clandestine Operations

While the armies in Europe planned for a war that never came, the actual superpower conflict was being fought—brutally and continuously—in the shadows and across the developing world. The high risk of nuclear escalation made direct confrontation too dangerous, turning proxy wars and clandestine operations into the primary instruments of geopolitical competition.14

Proxy wars were the main event of the Cold War, accounting for an estimated 20 million deaths, almost all of which occurred in the “Third World”.14 These conflicts were ostensibly local or regional disputes, but they became battlegrounds for the larger ideological struggle between capitalism and communism.16 The superpowers avoided direct military clashes but fueled the fighting by providing massive amounts of funding, weaponry, training, and political backing to their respective surrogate forces.14 The Vietnam War, which saw the United States supporting South Vietnam against the Soviet- and Chinese-backed North, was the most devastating example.5 Other major proxy conflicts of the era included the Angolan Civil War, where the Soviet Union and Cuba backed the MPLA against U.S.-supported factions 18, and the Ogaden War, where the superpowers switched allegiances, with the Soviets ultimately backing Ethiopia against U.S.-supported Somalia.21 These interventions allowed the superpowers to test strategies and military hardware while avoiding a direct “hot war,” but they left a legacy of devastation and long-term instability in the regions where they were fought.16

Parallel to these overt-by-proxy conflicts was a relentless, clandestine war fought by the intelligence agencies of both blocs. The CIA and the KGB engaged in a global struggle for influence through espionage, subversion, and covert action. The CIA’s activities included political subversion, such as providing financial support to officers plotting against Chile’s Salvador Allende before the 1973 coup, and paramilitary operations, such as arming and training mujahideen guerrillas in Afghanistan in the following decade.23 The agency also engaged in numerous, and often bizarre, assassination plots against figures like Fidel Castro.23 Espionage was rampant, with both sides dedicating immense resources to stealing military-industrial secrets and recruiting high-level agents within the other’s government and intelligence services.23 The KGB was notoriously effective in this domain, having infiltrated Western intelligence agencies to the point where the CIA was often “utterly ignorant of Soviet espionage operations” against it.25

The KGB, for its part, conducted what it termed “executive actions” or “wet work” (liquidations) through its secretive 13th Department.26 These operations targeted defectors, dissidents, and other “ideological opponents” abroad with the aim of silencing anti-Soviet voices and sowing fear within émigré communities.26 To maintain plausible deniability, the KGB often employed exotic methods, such as the ricin-filled pellet fired from a modified umbrella used to kill Bulgarian dissident Georgi Markov in London in 1978, and frequently relied on the intelligence services of allied Eastern Bloc nations to carry out the “dirty work”.26 In Africa, Soviet clandestine operations were particularly large-scale, as the KGB and GRU (military intelligence) worked to counter U.S. influence, supply arms to anti-government groups, and exploit the relatively weak capabilities of local security services to establish intelligence networks.27

This history reveals a significant divergence between the war that was being planned for and the war that was actually being waged. While the formal military doctrines of both NATO and the Warsaw Pact were fixated on a decisive, large-scale conventional battle in Europe, the true character of superpower conflict was predominantly irregular, clandestine, and fought through third parties. This created a deep reservoir of institutional knowledge and operational expertise in unconventional warfare, political subversion, and deniable operations within the intelligence and special operations communities. This expertise, developed in the shadows of the Cold War, would prove highly relevant in the multipolar, ambiguous security environment that followed.

Section II: The Technological Rupture – The Revolution in Military Affairs (RMA)

Beginning in the 1970s and accelerating dramatically after the end of the Cold War, a suite of new technologies catalyzed a fundamental shift in the conduct of conventional warfare. This “Revolution in Military Affairs” (RMA) was characterized by the integration of advanced surveillance, precision-guided weaponry, and networked command and control, creating an era of unparalleled U.S. military dominance.31 However, this very dominance had a profound and unintended consequence: it rendered symmetrical, conventional warfare an untenable option for potential adversaries, thereby accelerating their pivot toward the asymmetric and hybrid methods that now define the contemporary conflict landscape.

The Dawn of Precision and Stealth

Two technologies in particular formed the core of the RMA: precision-guided munitions and stealth.

Precision-Guided Munitions (PGMs), or “smart bombs,” fundamentally altered the calculus of air power. The ability to guide a weapon to its target with a high degree of accuracy represented a quantum leap in lethality and efficiency.33 During the Vietnam War, PGMs proved to be up to 100 times more effective than their unguided “dumb bomb” counterparts.35 This was starkly illustrated by the destruction of the Thanh Hoa Bridge in North Vietnam in 1972. The bridge, a critical supply line, had withstood hundreds of sorties and the loss of numerous aircraft over several years of conventional bombing, but was finally dropped by a small number of aircraft using laser-guided bombs.33 The 1991 Persian Gulf War served as the global debut for this capability on a massive scale. Coalition forces demonstrated that PGMs could destroy Iraqi armored vehicles with pinpoint accuracy in a process pilots dubbed “tank plinking”.33 Overall, while guided munitions accounted for only 9% of the total ordnance used in the war, they were responsible for 75% of all successful hits, proving 35 times more likely to destroy their target per weapon dropped than unguided bombs.33 This shifted the logic of bombing from achieving effects through mass to achieving them through precision.34

Stealth Technology provided the means to deliver these precision weapons by rendering aircraft nearly invisible to enemy radar. Platforms like the F-117 Nighthawk and the B-2 Spirit bomber were designed with faceted shapes and coated in radar-absorbent materials to reduce their radar cross-section (RCS) by several orders of magnitude.37 This innovation effectively negated decades of investment by adversaries in sophisticated integrated air defense systems.39 Like PGMs, stealth technology had its coming-out party during the Gulf War. F-117s flew with impunity over Baghdad, one of the most heavily defended cities in the world at the time, and decimated critical Iraqi command and control nodes, air defense sites, and other high-value targets. No stealth aircraft were lost in the conflict.39

The true power of the RMA, however, lay not in these individual technologies but in their integration into a networked “System of Systems”.40 This concept linked intelligence, surveillance, and reconnaissance (ISR) platforms—such as satellites, spy planes, and drones—with command, control, and communications (C3) networks and precision-strike assets.31 This synergy created a virtuous cycle: ISR assets could find a target, the network could rapidly transmit that information to a decision-maker and a shooter, and a precision weapon could destroy the target with high probability. This integration of technology, doctrine, and organization produced a dramatic increase in military effectiveness.31

Doctrinal Transformation and Asymmetric Consequences

This technological revolution was accompanied by a doctrinal one within the U.S. military. Reeling from the experience in Vietnam and absorbing the lessons of the 1973 Yom Kippur War—where modern ATGMs and surface-to-air missiles (SAMs) inflicted heavy losses on Israeli armor and aircraft—the U.S. Army undertook a profound intellectual reassessment.41

In 1976, the Army published Field Manual 100-5, Operations, which codified a new doctrine known as “Active Defense”.44 This doctrine was a radical departure from previous thinking, focusing almost exclusively on a high-intensity, conventional battle against the Soviet Union in Europe.44 It was heavily focused on firepower, emphasizing the need to “win the first battle of the next war” by attriting the numerically superior Warsaw Pact forces with technologically advanced weaponry.45 Active Defense was controversial, however, and criticized for being too defensive and ceding the initiative to the enemy.41

This critique led to another doctrinal evolution. In 1982, the Army released a new version of FM 100-5 that introduced the concept of AirLand Battle.41 This doctrine was more aggressive and maneuver-oriented, designed specifically to defeat the Soviet operational concept of echeloned attacks.43 AirLand Battle envisioned an “extended battlefield” where U.S. forces would not just defend against the enemy’s front-line troops but would use integrated air power and long-range fires to attack and disrupt their follow-on echelons, command posts, and logistics deep in the rear.42 This required unprecedented levels of cooperation between the Army and the Air Force and was a perfect doctrinal match for the emerging technologies of the RMA.48

The stunning success of this new American way of war in the 1991 Gulf War had a chilling effect on potential adversaries. It became clear that challenging the United States in a conventional, state-on-state conflict was a recipe for swift and certain defeat. This reality, however, did not lead to a more peaceful world. Instead, it created a “compelling logic for states and non-state actors to move out of the traditional mode of war”.51 Unable to compete symmetrically, adversaries were forced to invest in asymmetric capabilities and strategies that could bypass or neutralize U.S. technological strengths.32 This strategic adaptation accelerated the global shift toward the very hybrid, irregular, and grey-zone methods that had been practiced during the Cold War. The RMA, in effect, made conventional war obsolete for most actors, thereby making unconventional conflict the new norm. The U.S. military had perfected a doctrine for fighting a specific adversary in a specific way, just as that adversary collapsed and the fundamental character of conflict was shifting beneath its feet.

Section III: The Expanded Battlefield – Hybrid Actors in New Domains

The end of the Cold War and the subsequent era of U.S. conventional military primacy did not end great power competition; it merely displaced it. Conflict migrated from the physical battlefield into non-physical and previously non-militarized domains. We have entered a state of persistent, low-level conflict where the distinction between peace and war is not simply blurred but is actively manipulated as a strategic tool. Adversaries now operate in a “grey zone,” employing hybrid methods to achieve strategic objectives without crossing the threshold of overt warfare.

The New Domains of Contestation

The modern battlefield is no longer confined to land, sea, and air. It has expanded to encompass the global economic system, digital networks, and the critical infrastructure that underpins modern society.

Economic Warfare has evolved into a primary instrument of statecraft, a sophisticated method of coercion that leverages global interdependence as a weapon.52 The “weaponization of finance” allows states, particularly the United States with its control over the global dollar-based financial system, to “cripple [countries] financially” through targeted sanctions against individuals, companies, and entire sectors of an economy.52 The unprecedented sanctions imposed on Russia following its 2022 invasion of Ukraine, which froze central bank assets and cut off major banks from international payment systems, demonstrate the power of this tool.56 Similarly, the “weaponization of trade” involves using tariffs, embargoes, and regulatory barriers to induce policy changes in a target state by exploiting economic dependencies.53 China’s campaign of economic coercion against Australia, which targeted key exports like wine, barley, and coal after Australia called for an inquiry into the origins of COVID-19, is a prime example of this strategy in action.59 Russia has also long used its position as a major energy supplier to Europe as a tool of political leverage, manipulating gas prices and threatening supply cutoffs to achieve foreign policy goals.62 This trend transforms economic interdependence from a source of mutual benefit into a critical vulnerability.55

Cyber Warfare has matured from a tool of espionage into a distinct domain of military operations. The watershed moment was the 2010 Stuxnet attack, a highly sophisticated computer worm believed to be a joint U.S.-Israeli operation. Stuxnet infiltrated Iran’s Natanz nuclear facility and caused physical damage to its uranium enrichment centrifuges, demonstrating for the first time that malicious code could produce kinetic effects.67 Since then, state-sponsored cyber operations have become commonplace. Advanced Persistent Threat (APT) groups linked to the governments of China, Russia, Iran, and North Korea now routinely conduct campaigns against adversaries.71 Their objectives range from espionage and intellectual property theft to prepositioning for future disruptive attacks on critical infrastructure, including telecommunications, energy grids, and transportation networks.74

Critical Infrastructure has become a new front line. The physical systems that support the global economy and information flow are now considered legitimate targets for grey-zone aggression. Undersea cables, which carry an estimated 99% of all transoceanic digital communications and trillions of dollars in financial transactions daily, are a point of extreme vulnerability.78 This vast network is susceptible to damage from both accidental causes, like fishing trawlers and dragging anchors, and deliberate sabotage.80 State actors, particularly Russia, are developing the capabilities to target these cables. Russia’s Main Directorate for Deep-Water Research (GUGI) operates specialized submarines and surface vessels, such as the

Yantar, which are equipped for deep-sea operations and have been observed loitering near critical cable routes.78 Recent incidents in the Baltic Sea, where data cables and a gas pipeline were damaged by a Chinese-flagged vessel dragging its anchor, have heightened concerns about coordinated hybrid attacks.83 The key strategic advantage of such attacks is the challenge of attribution. It is exceptionally difficult to prove that a cable cut by a commercial vessel was an intentional act of state-sponsored sabotage rather than an accident, providing the aggressor with plausible deniability and complicating any response by NATO or other targeted nations.78

The Doctrine of Ambiguity – Hybrid and Grey-Zone Warfare

To describe this new era of persistent, ambiguous conflict, analysts have developed two interrelated concepts: grey-zone conflict and hybrid warfare.

The Grey Zone is the conceptual space in which this competition occurs. It is defined by the Center for Strategic and International Studies (CSIS) as “the contested arena somewhere between routine statecraft and open warfare”.86 It is a realm of coercive and subversive activity deliberately designed to remain below the threshold that would provoke a conventional military response.1 In this space, revisionist powers like Russia and China use a range of non-military and quasi-military tools—including information operations, political and economic coercion, cyber operations, and the use of proxies—to gradually achieve strategic gains and weaken adversaries without triggering a full-scale war.86

Hybrid Warfare is the methodology employed within the grey zone. It is not a new form of warfare, but rather the integrated and synchronized application of multiple instruments of power—conventional and unconventional, military and non-military, overt and covert—in a unified campaign to achieve a strategic objective.89 Russia’s 2014 annexation of Crimea and subsequent intervention in the Donbas region of Ukraine is the archetypal modern example. This operation seamlessly blended the use of deniable special forces (“little green men”), local proxy militias, economic pressure, cyberattacks, and a sophisticated, multi-platform disinformation campaign to achieve its goals before the West could formulate a coherent response.51

This environment has also transformed the nature of Proxy Warfare. The Cold War model of two superpowers manipulating client states has been replaced by a far more complex, multipolar system.96 Today’s sponsors include not only great powers but also ambitious regional actors like Iran, Saudi Arabia, Turkey, and the UAE. The proxies themselves are no longer just state armies but a diverse ecosystem of non-state actors, including militias, transnational terrorist groups, private military companies, and political movements, many with their own ideologies and agendas that may diverge from those of their sponsors.96 The proliferation of advanced technology, from anti-tank missiles to armed drones and secure communications, has made these proxy forces more lethal and capable than ever before.101 Modern proxy battlefields, such as the Syrian civil war, are characterized by a dizzying array of local and international actors, with multiple sponsors backing various factions, creating a complex and brutal multi-sided conflict.14 Iran’s long-standing support for Hezbollah is a prime example of a modern proxy relationship, where financial aid, weapons, and training have cultivated a formidable non-state actor that serves as a key instrument of Iranian foreign policy.106

The defining trend of this new era is the normalization of hostile acts. Actions that would have once been considered casus belli—such as sabotage of critical national infrastructure, systemic economic coercion, or major cyberattacks against government and industry—are now treated as features of routine international competition. This has shifted the nature of conflict from an episodic state of declared war to a persistent condition of undeclared competition. In this grey zone, ambiguity is not a byproduct of conflict; it is a central objective and a strategic weapon. The ability to conduct a hostile act while making attribution difficult or impossible paralyzes the victim’s decision-making process and allows the aggressor to act with a degree of impunity.

FeatureUnited States / WestRussian FederationPeople’s Republic of China
Doctrine NameGrey-Zone / Hybrid Warfare ResponseNew Generation Warfare / Gerasimov DoctrineThree Warfares / Systems Destruction Warfare
Primary ObjectiveMaintain status quo; deter/counter aggression; manage escalationRevise post-Cold War order; re-establish sphere of influence; destabilize adversariesAchieve regional hegemony; displace U.S. influence; unify Taiwan; secure resource access
Key Tools / MethodsSanctions; support to partners/proxies; cyber operations; special operations forces; freedom of navigation operations (FONOPs)Information-psychological warfare; cyber operations; economic coercion (esp. energy); use of deniable special forces and proxies; political subversionPublic opinion warfare; psychological warfare; legal warfare (lawfare); economic coercion (trade, investment); cyber espionage; maritime militia
Role of MilitaryPrimarily a deterrent and response force; kinetic action is a last resort, often through SOF or proxiesConcealed military means supplement non-military efforts; special forces (Spetsnaz) and conventional forces are used for intimidation and decisive actionMilitary presence (PLA) creates physical leverage; used for intimidation and coercion (grey-zone tactics); prepared for decisive conventional action if necessary
Role of InformationReactive; focus on countering disinformation and attributionCentral; aims to alter consciousness, create domestic chaos in target state, and achieve “information superiority” before kinetic actionFoundational; aims to control the narrative, shape domestic and international opinion, demoralize the adversary, and legitimize CCP actions
Sources8689111

Section IV: The Cognitive Domain – The Battle for Perception

Perhaps the most fundamental transformation in the character of conflict over the past half-century has been the elevation of the human mind and collective public perception as a primary, and often decisive, battlefield. The strategic objective is increasingly not to defeat an enemy’s military forces, but to erode their society’s cohesion, paralyze their political will, and manipulate their very understanding of reality. This is narrative warfare, and its tools have evolved from state-controlled broadcast media to a global, AI-powered, social media-driven disinformation engine.

The Weaponization of Media and Social Media

The power of modern media to shape conflict was evident throughout the late 20th century, but the rise of the internet and social media in the 21st century created a new paradigm.

The Arab Spring, beginning in late 2010, was the first major geopolitical event to showcase the power of social media as a tool for political mobilization. Activists across Tunisia, Egypt, and other nations used platforms like Facebook, Twitter, and YouTube to organize protests, share information about government brutality, and bypass state-controlled media censorship to broadcast their message to a global audience.115 In Egypt, the “We Are All Khaled Said” Facebook page became a rallying point for a movement that ultimately toppled a decades-old regime.117 This demonstrated the potential for these new platforms to empower organic, bottom-up movements and challenge authoritarian control.120

However, state actors quickly recognized the power of these tools and began to co-opt them for their own purposes, leading to the industrialization of influence operations. The most prominent example is Russia’s Internet Research Agency (IRA), a state-sponsored “troll farm” dedicated to conducting online influence operations.121 The IRA’s tactics, revealed in detail following its interference in the 2016 U.S. presidential election, involve a sophisticated, multi-layered approach. Operators create and manage vast networks of fake social media accounts, or “bots,” designed to impersonate real citizens.122 These accounts are used to amplify divisive narratives, spread disinformation, and infiltrate online communities on both the political left and right, with the overarching goal of exacerbating existing social divisions and eroding trust in democratic institutions.123 The IRA’s methods include “narrative switching,” where accounts post non-political content most of the time to build a credible persona before injecting targeted political messages, and organizing real-world events, such as opposing protests, to bring online division into the physical world.122

This weaponization of information is not merely opportunistic; it is now a core component of state military doctrine. China’s concept of the “Three Warfares” explicitly codifies this approach. It includes “public opinion warfare” to dominate narratives and ensure domestic and international support, “psychological warfare” to demoralize an adversary and weaken their will to fight, and “legal warfare” (lawfare) to use international and domestic law to challenge the legitimacy of an opponent’s actions.114 Similarly, Russia’s doctrine of

“New Generation Warfare” (often associated with General Valery Gerasimov) views “information-psychological warfare” as a critical tool for achieving strategic goals by creating domestic chaos within a target state, often before any military action is taken.3 The Syrian Civil War serves as a stark case study of this new reality, where a brutal physical conflict has been accompanied by a relentless narrative war waged by all factions—the Assad regime, various rebel groups, and their respective foreign backers (including Russia, Iran, and Western powers)—each using traditional and social media to frame the conflict, legitimize their actions, and demonize their opponents.125

The AI-Powered Disinformation Engine

If social media provided the platform for modern information warfare, artificial intelligence is now providing the engine, promising to “supercharge” disinformation campaigns by dramatically increasing their speed, scale, and sophistication.130

The most alarming development is the rise of deepfakes and other forms of synthetic media. Using advanced AI techniques like generative adversarial networks (GANs), malicious actors can now create highly realistic but entirely fabricated audio and video content.132 This technology makes it possible to convincingly impersonate political leaders, military officials, or other public figures, having them appear to say or do things they never did.134 The national security implications are profound. A well-timed deepfake video could be used to fabricate a scandal to influence an election, spread false orders to military units to create chaos, or create a fake atrocity to serve as a pretext for war.135 An AI-generated image of an explosion at the Pentagon in 2023 briefly caused a dip in the U.S. stock market, demonstrating the real-world impact of such fabrications.137

Beyond deepfakes, AI is being used to automate and personalize propaganda on an unprecedented scale. Large language models can now generate false news articles and social media posts that are often indistinguishable from human-written content.138 These tools can be used to create tailored messages designed to appeal to the specific psychological vulnerabilities of target audiences, and to automate the operation of vast bot networks that can amplify these messages across multiple platforms.130 This dramatically lowers the barrier to entry for conducting large-scale influence operations, making these powerful tools available not just to states, but to a wide range of malicious actors.138

The cumulative effect of this AI-driven information warfare is not simply the spread of more falsehoods. Its ultimate strategic objective is the erosion of trust itself. The goal is not necessarily to make people believe in a specific lie, but to destroy their confidence in all sources of information—in the media, in government institutions, in scientific experts, and ultimately, in their own ability to discern fact from fiction. This fosters a state of what can be called “epistemic exhaustion,” where citizens become so overwhelmed by the flood of conflicting information that they disengage from civic life, making them passive and more susceptible to manipulation. A population that trusts nothing cannot form the consensus required to recognize and counter a national security threat, thereby achieving an adversary’s goal of societal paralysis without firing a single shot.

Section V: The Next Revolution – The AI-Enabled Battlespace

Just as the integration of precision, stealth, and networking catalyzed a Revolution in Military Affairs at the end of the 20th century, artificial intelligence is now driving another profound transformation in the character of warfare. This emerging revolution is centered on three key elements: the compression of decision-making to machine speed, the proliferation of intelligent autonomous systems, and the dominance of data as the central resource of military power. This shift promises unprecedented efficiency but also introduces complex new risks of escalation and loss of human control.

Accelerating the Kill Chain – AI in Intelligence and C2

Modern military operations are drowning in data. A torrent of information flows from satellites, drones, ground sensors, and countless other sources, far exceeding the capacity of human analysts to process it in a timely manner.140 Artificial intelligence is becoming the essential tool for turning this data overload into a decisive advantage.

The U.S. Department of Defense’s Project Maven (officially the Algorithmic Warfare Cross-Functional Team) is a flagship initiative in this area. Launched in 2017, Maven employs machine learning algorithms to automatically analyze full-motion video from drones and other ISR platforms.142 The system can detect, classify, and track objects of interest—such as vehicles, buildings, or groups of people—freeing human analysts from the tedious task of watching countless hours of footage and allowing them to focus on higher-level analysis and decision-making.144 This capability dramatically accelerates the intelligence cycle, reducing the time it takes to find and validate a target from hours or days to minutes or even seconds.146

This accelerated intelligence is being fed into increasingly AI-enhanced Command and Control (C2) systems. The objective is to create a seamless, networked architecture that connects any sensor to any decision-maker and any weapon system on the battlefield. This concept is at the heart of the U.S. military’s overarching strategy for Joint All-Domain Command and Control (JADC2).147 AI algorithms within these C2 systems can fuse data from disparate sources to create a unified, real-time operational picture, predict enemy movements, analyze potential courses of action, and recommend optimal responses to commanders.140 The ultimate goal is to radically compress the “sensor-to-shooter” timeline, enabling forces to act at a tempo that overwhelms an adversary’s ability to react.

This pursuit of AI-driven military advantage has ignited a fierce technological competition, often described as an AI arms race, primarily between the United States and China.150 China has made AI a national priority and is pursuing a strategy of “military-civil fusion” to systematically leverage the expertise and innovation of its burgeoning private tech sector and universities for military modernization.111 Beijing’s goal is to achieve “intelligentized warfare,” using AI to achieve “decision dominance” through a highly integrated “systems warfare” approach.111 While the United States is widely seen as maintaining a lead in developing the most advanced, cutting-edge AI models, China’s state-directed approach gives it an advantage in the broad-scale adoption and practical integration of AI technologies across its military and economy.153

The Proliferation of Autonomy

The most visible and disruptive impact of AI on the battlefield is the proliferation of autonomous and semi-autonomous systems, particularly unmanned aerial vehicles (UAVs).

The drone revolution has unfolded in two parallel tracks. On one end of the spectrum are sophisticated, reusable military drones like the Turkish Bayraktar TB2. In conflicts such as the 2020 Nagorno-Karabakh war, the TB2 proved devastatingly effective, combining long-endurance surveillance with precision-guided munitions to destroy Armenian air defenses, armor, and artillery, effectively dominating the battlefield.154 On the other end of the spectrum is the widespread use of cheap, commercially available, and often disposable drones, a trend brought to the forefront by the war in Ukraine. Both sides have deployed thousands of small quadcopters for reconnaissance and, more significantly, as first-person-view (FPV) “kamikaze” drones capable of destroying multi-million-dollar tanks and other armored vehicles.157 This has created a new reality of attritional drone warfare, where the low cost and sheer quantity of these systems can overwhelm even sophisticated defenses.159

This trend points toward the next frontier of military autonomy: Lethal Autonomous Weapon Systems (LAWS), colloquially known as “killer robots.” These are weapon systems that, once activated, can independently search for, identify, target, and kill human beings without direct human control over the final lethal decision.150 The development of LAWS raises profound legal and ethical challenges. Organizations like the International Committee of the Red Cross (ICRC) have raised serious concerns about whether such systems can comply with the core principles of International Humanitarian Law (IHL), such as distinction, proportionality, and precaution.163 Key questions revolve around accountability—who is responsible when an autonomous weapon makes a mistake?—and the fundamental ethical principle of “meaningful human control” over the use of lethal force.166 In response to these concerns, the ICRC and numerous other bodies have called for the negotiation of new, legally binding international rules to prohibit unpredictable autonomous systems and those that target humans directly.162

The relentless pace of technological development is creating a strategic environment where the speed of combat is poised to exceed the limits of human cognition. As AI-enabled C2 systems compress decision cycles to seconds and autonomous weapons are designed to react instantly to threats, conflicts between two AI-enabled militaries may be fought and decided at machine speed, potentially before human commanders can fully comprehend the situation or intervene. This creates an inescapable and dangerous strategic logic: to remain competitive, militaries feel compelled to delegate more and more decision-making authority to AI systems, despite the profound ethical concerns and the immense risk of rapid, unintended escalation.171

Furthermore, the proliferation of cheap, effective, and increasingly autonomous systems is upending the traditional military-technical balance. The war in Ukraine has vividly demonstrated the problem of “cost asymmetry,” where inexpensive drones, costing only a few thousand dollars, can neutralize or destroy highly valuable military assets like tanks and warships that cost millions.158 Defending against swarms of these cheap drones with expensive, sophisticated air defense missiles is an economically unsustainable proposition.160 This challenges the entire Western military model, which has for decades relied on a relatively small number of expensive, technologically superior platforms. The future battlefield may not be dominated by the nation with the most advanced fighter jet, but by the one that can deploy the largest, most adaptable, and most intelligent swarm of inexpensive, autonomous, and attritable systems.

Conclusion: A State of Undocumented, Perpetual Conflict

The evidence of the past 50 years is conclusive: while the fundamental nature of war as a political act has not changed, its character has been irrevocably transformed. The clear, binary world of the Cold War, with its defined states of “peace” and “war,” has been replaced by a state of persistent, multi-domain competition. The lines have not just blurred; they have been erased and weaponized. The major powers are not on the brink of a new conflict; they are, and have been for some time, engaged in one. It is an undocumented, undeclared, and unending conflict fought not primarily with massed armies on physical battlefields, but with a new arsenal of hybrid tools across a vastly expanded battlespace.

This transformation has been driven by a confluence of factors. The nuclear stalemate of the Cold War forced competition into the shadows, normalizing the use of proxies, covert action, and political subversion. The subsequent Revolution in Military Affairs created such a profound U.S. advantage in conventional warfare that it compelled adversaries to abandon symmetrical competition and double down on these asymmetric, hybrid methods. The globalization of finance and information, coupled with the proliferation of cyber capabilities and advanced technologies, provided the new domains—economic, digital, and cognitive—in which this competition would be waged.

Today, Russia, China, the United States, and other powers are engaged in a constant struggle for advantage in the grey zone. This is a conflict fought with sanctions designed to cripple economies, with cyberattacks that probe critical infrastructure, with deniable sabotage of undersea cables, with proxy forces that allow for influence without attribution, and, most pervasively, with information campaigns designed to fracture societies from within.

The advent of artificial intelligence is now catalyzing the next revolution, one that promises to accelerate the speed of conflict beyond human comprehension. AI is transforming intelligence analysis, command and control, and the very nature of weaponry, pushing toward a future of algorithmic warfare and autonomous systems. This raises the specter of a battlefield where decisions are made in microseconds and escalation can occur without deliberate human intent.

In this new era, the traditional concept of “victory” is becoming obsolete. Victory is no longer solely defined by a signed treaty or a captured capital. It may be the successful paralysis of a rival’s economy through financial warfare 55; the quiet degradation of their military readiness through sustained cyber espionage 76; the fracturing of their political system through a multi-year disinformation campaign 123; or the achievement of a decisive technological breakthrough in AI that renders an adversary’s entire military doctrine irrelevant.150

The greatest danger of this new paradigm is not necessarily a deliberate, cataclysmic war, but the potential for uncontrollable escalation out of the grey zone. A miscalculation in a proxy conflict, a cyberattack with unforeseen cascading effects, or the autonomous action of an AI-powered weapon system could trigger a rapid spiral into a conventional conflict that no party initially intended. The central challenge for national security in the 21st century is therefore twofold: not only to prepare to win the wars of the future, but to learn how to successfully navigate the unending, undocumented conflict that is already here.


If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly contribute towards our continued reporting, please visit our funding page.


Sources Used

  1. Grey-zone (international relations) – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Grey-zone_(international_relations)
  2. The Blurring Of War And Peace: Hybrid Warfare – Analysis …, accessed September 30, 2025, https://www.eurasiareview.com/19042021-the-blurring-of-war-and-peace-hybrid-warfare-analysis/
  3. The Russian Understanding of War: Blurring the Lines Between War and Peace, accessed September 30, 2025, https://ndupress.ndu.edu/Media/News/News-Article-View/Article/2131233/the-russian-understanding-of-war-blurring-the-lines-between-war-and-peace/
  4. The Opposite of War is Not Peace – Futurist Speaker, accessed September 30, 2025, https://futuristspeaker.com/future-scenarios/the-opposite-of-war-is-not-peace-2/
  5. Cold War – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Cold_War
  6. Historical Documents – Office of the Historian, accessed September 30, 2025, https://history.state.gov/historicaldocuments/frus1969-76v41/d52
  7. NATO and The Cold War | Imperial War Museums, accessed September 30, 2025, https://www.iwm.org.uk/learning/resources/nato-and-the-cold-war
  8. Tactics – Conventional War, Terrorism, Strategy – Britannica, accessed September 30, 2025, https://www.britannica.com/topic/tactics/From-conventional-war-to-terrorism
  9. What was Warsaw Pact defence strategy if NATO invaded them? : r/WarCollege – Reddit, accessed September 30, 2025, https://www.reddit.com/r/WarCollege/comments/1leggj2/what_was_warsaw_pact_defence_strategy_if_nato/
  10. 13. National Intelligence Estimate 11-14-75, Washington, September 4, 1975. – Historical Documents – Office of the Historian, accessed September 30, 2025, https://history.state.gov/historicaldocuments/frus1969-76ve15p1/d13
  11. NATO and Warsaw Pact: Force Comparisons, accessed September 30, 2025, https://www.nato.int/cps/en/natohq/declassified_138256.htm
  12. The Evolution of US Army Tactical Doctrine, 1946-76, accessed September 30, 2025, https://www.armyupress.army.mil/Portals/7/combat-studies-institute/csi-books/doughty.pdf
  13. The Evolution of US Army Tactical Doctrine, 1946-76 (Leavenworth Papers, Number 1), accessed September 30, 2025, https://apps.dtic.mil/sti/citations/ADA211791
  14. Proxy wars, explained | FairPlanet, accessed September 30, 2025, https://www.fairplanet.org/story/what-are-proxy-wars-and-where-are-they-happening/
  15. Proxy war – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Proxy_war
  16. Proxy wars – (US History – 1945 to Present) – Vocab, Definition, Explanations | Fiveable, accessed September 30, 2025, https://fiveable.me/key-terms/united-states-history-since-1945/proxy-wars
  17. Eight “Hot Wars” During the Cold War | CFR Education, accessed September 30, 2025, https://education.cfr.org/learn/reading/eight-hot-wars-during-cold-war
  18. The Angolan civil war (Chapter 8) – The USSR in Third World Conflicts, accessed September 30, 2025, https://www.cambridge.org/core/books/ussr-in-third-world-conflicts/angolan-civil-war/6A98027220E926A6783DFCE2A320DB15
  19. The Angola Crisis 1974–75 – Milestones in the History of U.S. Foreign Relations – Office of the Historian, accessed September 30, 2025, https://history.state.gov/milestones/1969-1976/angola
  20. Angolan Civil War – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Angolan_Civil_War
  21. “Buried in the Sands of the Ogaden”: The Horn of Africa and SALT II, 1977–1979 – Office of the Historian, accessed September 30, 2025, https://history.state.gov/milestones/1977-1980/horn-of-africa
  22. Ogaden War Between Somalia and Ethiopia | Research Starters – EBSCO, accessed September 30, 2025, https://www.ebsco.com/research-starters/history/ogaden-war-between-somalia-and-ethiopia
  23. Central Intelligence Agency – Intelligence, Surveillance, Covert Ops …, accessed September 30, 2025, https://www.britannica.com/topic/Central-Intelligence-Agency/Activities
  24. Cold War espionage – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Cold_War_espionage
  25. During cold war both KGB and CIA had high ranking moles inside their organisations. Is it known which side did better job at infiltrating their opponent and getting sensitive information as cold war progressed? : r/AskHistorians – Reddit, accessed September 30, 2025, https://www.reddit.com/r/AskHistorians/comments/4jkybw/during_cold_war_both_kgb_and_cia_had_high_ranking/
  26. A global kill list: Inside the KGB’s secret retribution operations beyond the Iron Curtain, accessed September 30, 2025, https://theins.ru/en/history/281554
  27. COVERT OPERATIONS OF THE USSR IN AFRICA Текст научной статьи по специальности – КиберЛенинка, accessed September 30, 2025, https://cyberleninka.ru/article/n/covert-operations-of-the-ussr-in-africa
  28. Africa–Soviet Union relations – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Africa%E2%80%93Soviet_Union_relations
  29. AFRICA (SOVIET POLICY) (Hansard, 6 February 1978) – API Parliament UK, accessed September 30, 2025, https://api.parliament.uk/historic-hansard/commons/1978/feb/06/africa-soviet-policy
  30. Soviet Spies in Africa: How the KGB Strengthened Soviet Influence on the Continent During the Cold War. : r/coldwar – Reddit, accessed September 30, 2025, https://www.reddit.com/r/coldwar/comments/1n91egf/soviet_spies_in_africa_how_the_kgb_strengthened/
  31. Revolutions in Military Affairs – DTIC, accessed September 30, 2025, https://apps.dtic.mil/sti/tr/pdf/ADA360252.pdf
  32. The Revolution in Military Affairs and Conflict Short … – USAWC Press, accessed September 30, 2025, https://press.armywarcollege.edu/cgi/viewcontent.cgi?article=1893&context=monographs
  33. Precision-guided munition – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Precision-guided_munition
  34. Precision Guided Munitions and the New Era of Warfare – Military Analysis Network, accessed September 30, 2025, https://man.fas.org/dod-101/sys/smart/docs/paper53.htm
  35. Getting Closer: Precision Guided Weapons in the Southeast Asia War – Air Force Museum, accessed September 30, 2025, https://www.nationalmuseum.af.mil/Visit/Museum-Exhibits/Fact-Sheets/Display/Article/195858/getting-closer-precision-guided-weapons-in-the-southeast-asia-war/
  36. Precision Guided Munitions: Revolutionizing Warfare Accuracy, accessed September 30, 2025, https://aviationanddefensemarketreports.com/precision-guided-munitions-revolutionizing-warfare-with-accuracy/
  37. Stealth aircraft – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Stealth_aircraft
  38. Stealth technology – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Stealth_technology
  39. Lessons from Stealth for Emerging Technologies – CSET, accessed September 30, 2025, https://cset.georgetown.edu/publication/lessons-from-stealth-for-emerging-technologies/
  40. Revolution in military affairs – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Revolution_in_military_affairs
  41. From Active Defense to AirLand Battle: The Development of Army Doctrine, 1973-1982, accessed September 30, 2025, https://www.tradoc.army.mil/wp-content/uploads/2020/10/From-Active-Defense-to-AirLand-Battle.pdf
  42. What did AirLand Battle address that previous NATO Cold War strategies were failing at? : r/WarCollege – Reddit, accessed September 30, 2025, https://www.reddit.com/r/WarCollege/comments/b8q6k0/what_did_airland_battle_address_that_previous/
  43. AirLand Battle: The Development of a Doctrine – DTIC, accessed September 30, 2025, https://apps.dtic.mil/sti/pdfs/AD1119406.pdf
  44. THE POLITICAL CONTEXT OF US ARMY DOCTRINE, 1974-1976 | Small Wars Journal by Arizona State University, accessed September 30, 2025, https://smallwarsjournal.com/2020/10/29/political-context-us-army-doctrine-1974-1976/
  45. How was the Military doctrine of active defense born? : Focusing on the process of writing the FM 100-5 Operations 1976 edition – Korea Journal Central, accessed September 30, 2025, http://journal.kci.go.kr/imhc/archive/articleView?artiId=ART002939313
  46. Doctrinal Development—AirLand Battle – Army University Press, accessed September 30, 2025, https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/MR-75th-Anniversary/75th-Doctrinal-AirLand/
  47. AirLand Battle and Modern Warfare, accessed September 30, 2025, https://www.nids.mod.go.jp/english/event/forum/pdf/2014/09.pdf
  48. WAR ON THE 21ST CENTURY BATTLEFIELD: REVISITING GENERAL STARRY’S CONCEPTUAL FRAMEWORK, accessed September 30, 2025, https://warroom.armywarcollege.edu/articles/conceptual-framework/
  49. AirLand Battle Doctrine – MERIP, accessed September 30, 2025, https://merip.org/1983/01/airland-battle-doctrine/
  50. The Lessons of AirLand Battle and the 31 Initiatives for Multi-Domain Battle – RAND, accessed September 30, 2025, https://www.rand.org/content/dam/rand/pubs/perspectives/PE300/PE301/RAND_PE301.pdf
  51. Countering Hybrid Warfare: Conceptual Foundations and Implications for Defence Forces – GOV.UK, accessed September 30, 2025, https://assets.publishing.service.gov.uk/media/5da9a79ae5274a5ca507c6bb/20190401-MCDC_CHW_Information_note_-_Conceptual_Foundations.pdf
  52. Weaponization of Finance – Encyclopedia.pub, accessed September 30, 2025, https://encyclopedia.pub/entry/36941
  53. The Weaponization of Trade – Columbia SIPA – Columbia University, accessed September 30, 2025, https://www.sipa.columbia.edu/sites/default/files/migrated/downloads/Capstone%2520Report%2520%2528Eurasia%2520Group%2529.pdf
  54. Weaponizing Trade – CSIS, accessed September 30, 2025, https://www.csis.org/analysis/weaponizing-trade
  55. Weaponizing Financial and Trade Flows: The Case of Failing Western Sanctions, accessed September 30, 2025, https://internationalbanker.com/finance/weaponizing-financial-and-trade-flows-the-case-of-failing-western-sanctions/
  56. Russia Sanctions and Export Controls: U.S. Agencies Should Establish Targets to Better Assess Effectiveness, accessed September 30, 2025, https://www.gao.gov/products/gao-25-107079
  57. International sanctions during the Russo-Ukrainian War – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/International_sanctions_during_the_Russo-Ukrainian_War
  58. The Economic Impact of Russia Sanctions – Congress.gov, accessed September 30, 2025, https://www.congress.gov/crs-product/IF12092
  59. How China’s Coercive Measures Against Australia Backfired | The Heritage Foundation, accessed September 30, 2025, https://www.heritage.org/china/report/how-chinas-coercive-measures-against-australia-backfired
  60. China is still coercing Australia—with implicit threats | The Strategist, accessed September 30, 2025, https://www.aspistrategist.org.au/china-is-still-coercing-australia-with-implicit-threats/
  61. Warning from Australia: Meet the Threat of Chinese Economic Coercion to Democracy, accessed September 30, 2025, https://www.cnas.org/publications/commentary/warning-from-australia-meet-the-threat-of-chinese-economic-coercion-to-democracy
  62. Energy policy of Russia – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Energy_policy_of_Russia
  63. The Use of Energy Resources as Foreign Policy Tools: The Russian Case – ResearchGate, accessed September 30, 2025, https://www.researchgate.net/publication/344615948_The_Use_of_Energy_Resources_as_Foreign_Policy_Tools_The_Russian_Case
  64. Energy as a tool of foreign policy of authoritarian states, in particular Russia – European Parliament, accessed September 30, 2025, https://www.europarl.europa.eu/RegData/etudes/STUD/2018/603868/EXPO_STU(2018)603868_EN.pdf
  65. Russia’s Energy Diplomacy – Chatham House, accessed September 30, 2025, https://www.chathamhouse.org/sites/default/files/19352_0511bp_lough.pdf
  66. Weaponisation of finance: Regulators’ worries in a geopolitically fragile world, accessed September 30, 2025, https://www.orfonline.org/expert-speak/weaponisation-of-finance
  67. Iran’s use of cyberspace has evolved from an internal means of information control and repression to more aggressive attacks on foreign targets. The regime has been developing its own cybersecurity software and internet architecture in order to protect and insulate its networks, and it has been developing technological cyber expertise as a form of asymmetric warfare against a superior conventional US military. – Congress.gov, accessed September 30, 2025, https://www.congress.gov/crs_external_products/IF/HTML/IF11406.web.html
  68. Stuxnet | CFR Interactives, accessed September 30, 2025, https://www.cfr.org/cyber-operations/stuxnet
  69. Full article: Stuxnet, revisited (again): producing the strategic relevance of cyber operations, accessed September 30, 2025, https://www.tandfonline.com/doi/full/10.1080/23738871.2025.2492570
  70. Stuxnet: The world’s first cyber weapon – Center for International Security and Cooperation, accessed September 30, 2025, https://cisac.fsi.stanford.edu/news/stuxnet
  71. State Sponsored Cyber Warfare – Identity Management Institute®, accessed September 30, 2025, https://identitymanagementinstitute.org/state-sponsored-cyber-warfare/
  72. NSA and Others Provide Guidance to Counter China State-Sponsored Actors Targeting Critical Infrastructure Organizations – National Security Agency, accessed September 30, 2025, https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/4287371/nsa-and-others-provide-guidance-to-counter-china-state-sponsored-actors-targeti/
  73. Mutual Defense in Cyberspace: Joint Action on Attribution – CSIS, accessed September 30, 2025, https://www.csis.org/analysis/mutual-defense-cyberspace-joint-action-attribution
  74. U.S. government scrambles to stop new hacking campaign blamed on China, accessed September 30, 2025, https://www.washingtonpost.com/technology/2025/09/25/cisa-federal-hacks-cisco/
  75. What are state-sponsored cyber attacks? | F‑Secure, accessed September 30, 2025, https://www.f-secure.com/en/articles/what-are-state-sponsored-cyber-attacks
  76. Secure Cyberspace and Critical Infrastructure – Homeland Security, accessed September 30, 2025, https://www.dhs.gov/archive/secure-cyberspace-and-critical-infrastructure
  77. Countering Chinese State-Sponsored Actors Compromise of … – CISA, accessed September 30, 2025, https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-239a
  78. Submarine cable security is all at sea • The Register, accessed September 30, 2025, https://www.theregister.com/2025/09/29/submarine_cable_security_report_uk/
  79. Protection of Undersea Telecommunication Cables: Issues for Congress, accessed September 30, 2025, https://www.congress.gov/crs-product/R47648
  80. Subsea telecommunications cables: resilience and crisis preparedness – Parliament UK, accessed September 30, 2025, https://publications.parliament.uk/pa/jt5901/jtselect/jtnatsec/723/report.html
  81. International law doesn’t adequately protect undersea cables. That must change., accessed September 30, 2025, https://www.atlanticcouncil.org/content-series/hybrid-warfare-project/international-law-doesnt-adequately-protect-undersea-cables-that-must-change/
  82. Safeguarding Subsea Cables: Protecting Cyber Infrastructure amid Great Power Competition – CSIS, accessed September 30, 2025, https://www.csis.org/analysis/safeguarding-subsea-cables-protecting-cyber-infrastructure-amid-great-power-competition
  83. Hybrid Attacks Rise on Undersea Cables in Baltic and Arctic Regions – Jamestown, accessed September 30, 2025, https://jamestown.org/program/hybrid-attacks-rise-on-undersea-cables-in-baltic-and-arctic-regions/
  84. Why Russia and China May Be Cutting Europe’s Undersea Cables | WSJ – YouTube, accessed September 30, 2025, https://www.youtube.com/watch?v=pyz7nSAKF9E
  85. Risky Game: Hybrid Attack on Baltic Undersea Cables | Wilson Center, accessed September 30, 2025, https://www.wilsoncenter.org/article/risky-game-hybrid-attack-baltic-undersea-cables
  86. Gray Zone Project – CSIS, accessed September 30, 2025, https://www.csis.org/programs/gray-zone-project
  87. Gaining Competitive Advantage in the Gray Zone: Response Options for Coercive Aggression Below the Threshold of Major War – RAND, accessed September 30, 2025, https://www.rand.org/content/dam/rand/pubs/research_reports/RR2900/RR2942/RAND_RR2942.pdf
  88. Today’s wars are fought in the ‘gray zone.’ Here’s everything you need to know about it., accessed September 30, 2025, https://www.atlanticcouncil.org/blogs/new-atlanticist/todays-wars-are-fought-in-the-gray-zone-heres-everything-you-need-to-know-about-it/
  89. Defining HYBRID WARFARE, accessed September 30, 2025, https://www.marshallcenter.org/sites/default/files/files/2020-05/pC_V10N1_en_Wither.pdf
  90. NATO and Countering Hybrid Warfare – CSIS, accessed September 30, 2025, https://www.csis.org/analysis/nato-and-countering-hybrid-warfare
  91. Hybrid warfare – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Hybrid_warfare
  92. Hybrid Warfare – New Threats, Complexity, and ‘Trust’ as the Antidote – NATO, accessed September 30, 2025, https://www.nato.int/docu/review/articles/2021/11/30/hybrid-warfare-new-threats-complexity-and-trust-as-the-antidote/index.html
  93. War in Donbas – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/War_in_Donbas
  94. Russia-Ukraine War | Map, Casualties, Timeline, Death Toll, Causes, & Significance | Britannica, accessed September 30, 2025, https://www.britannica.com/event/2022-Russian-invasion-of-Ukraine
  95. Ukraine: Conflict at the Crossroads of Europe and Russia | Council on Foreign Relations, accessed September 30, 2025, https://www.cfr.org/backgrounder/ukraine-conflict-crossroads-europe-and-russia
  96. TWENTY-FIRST CENTURY PROXY WARFARE – Cloudfront.net, accessed September 30, 2025, https://d1y8sb8igg2f8e.cloudfront.net/documents/Twenty-First_Century_Proxy_Warfare_Final.pdf
  97. Twenty-First Century Proxy Warfare: Confronting Strategic Innovation in a Multipolar World Since the 2011 NATO Intervention – Cloudfront.net, accessed September 30, 2025, https://d1y8sb8igg2f8e.cloudfront.net/documents/Proxy_wars_one_pager-v2.pdf
  98. Twenty-First Century Proxy Warfare: Confronting Strategic …, accessed September 30, 2025, https://www.newamerica.org/future-security/reports/twenty-first-century-proxy-warfare-confronting-strategic-innovation-multipolar-world/a-new-age-of-proxy-warfare/
  99. Engaging non-state armed actors in state- and peace … – ICRC, accessed September 30, 2025, https://www.icrc.org/sites/default/files/external/doc/en/assets/files/review/2011/irrc-883-schneckener.pdf
  100. The role of non-state actors in building human security – Centre for Humanitarian Dialogue, accessed September 30, 2025, https://hdcentre.org/wp-content/uploads/2016/07/The-role-of-non-state-actors-in-building-human-security-May-2000.pdf
  101. Twenty-First Century Proxy Warfare: Confronting Strategic Innovation in a Multipolar World, accessed September 30, 2025, https://www.newamerica.org/future-security/reports/twenty-first-century-proxy-warfare-confronting-strategic-innovation-multipolar-world/rethinking-proxy-warfare/
  102. Twenty-First Century Proxy Warfare – New America, accessed September 30, 2025, https://www.newamerica.org/future-security/reports/twenty-first-century-proxy-warfare/
  103. Timber Sycamore – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Timber_Sycamore
  104. Full article: Disposable rebels: US military assistance to insurgents in the Syrian war, accessed September 30, 2025, https://www.tandfonline.com/doi/full/10.1080/13629395.2023.2183664
  105. America Had Already Lost Its Covert War in Syria—Now It’s Official, accessed September 30, 2025, https://tcf.org/content/commentary/america-already-lost-covert-war-syria-now-official/
  106. Hezbollah–Iran relations – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Hezbollah%E2%80%93Iran_relations
  107. Hezbollah, Hamas, and More: Iran’s Terror Network Around the Globe | AJC, accessed September 30, 2025, https://www.ajc.org/news/hezbollah-hamas-and-more-irans-terror-network-around-the-globe
  108. Understanding Iran’s Use of Terrorist Groups as Proxies – American University, accessed September 30, 2025, https://www.american.edu/sis/news/20240205-understanding-irans-use-of-terrorist-groups-as-proxies.cfm
  109. Iran’s Islamist Proxies in the Middle East – Wilson Center, accessed September 30, 2025, https://www.wilsoncenter.org/article/irans-islamist-proxies
  110. U.S. vs Russian “Hybrid Warfare” Doctrine: A Comparative Glance – Grey Dynamics, accessed September 30, 2025, https://greydynamics.com/u-s-vs-russian-hybrid-warfare-doctrine-a-comparative-glance/
  111. Russia and China Look at the Future of War, accessed September 30, 2025, https://understandingwar.org/research/future-of-war/russia-and-china-look-at-the-future-of-war-2/
  112. Gerasimov doctrine (The Russian “New Generation Warfare … – WARN, accessed September 30, 2025, https://warn-erasmus.eu/glossary/doktrina-gerasimova-rosijska-vijna-novogo-pokolinnya/
  113. en.wikipedia.org, accessed September 30, 2025, https://en.wikipedia.org/wiki/Three_warfares#:~:text=%22Three%20warfares%22%20(Chinese%3A,warfare%20(also%20termed%20lawfare).
  114. Political Warfare against Intervention Forces > Air University (AU …, accessed September 30, 2025, https://www.airuniversity.af.edu/JIPA/Display/Article/4167178/political-warfare-against-intervention-forces/
  115. sites.stedwards.edu, accessed September 30, 2025, https://sites.stedwards.edu/pangaea/the-role-of-social-media-in-the-arab-spring/#:~:text=Social%20media%20helped%20Tunisia%20and,was%20happening%20instead%20of%20organizing.
  116. Social Media And The Arab Spring By Samira F. Hassan A Capstone submitted to the Graduate School Camden Rutgers, The State Univ, accessed September 30, 2025, https://mals.camden.rutgers.edu/files/Social-Media-and-the-Arab-Spring.pdf
  117. Social media’s role in the Arab Spring – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Social_media%27s_role_in_the_Arab_Spring
  118. (Social) Media and Politics and the Arab Spring Moment – IEMed, accessed September 30, 2025, https://www.iemed.org/publication/social-media-and-politics-and-the-arab-spring-moment/
  119. The Legacy of the “Facebook Revolution”: How did the Arab Spring shape citizen use of social media? – King’s Think Tank, accessed September 30, 2025, https://kingsthinktankspectrum.wordpress.com/2025/01/30/the-legacy-of-the-facebook-revolution-how-did-the-arab-spring-shape-citizen-use-of-social-media/
  120. The Influence of Social Media in Egypt during The Arab Spring – SIT Digital Collections, accessed September 30, 2025, https://digitalcollections.sit.edu/capstones/2944/
  121. Internet Research Agency – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Internet_Research_Agency
  122. How Russia’s Internet Research Agency Built its … – -ORCA, accessed September 30, 2025, https://orca.cardiff.ac.uk/id/eprint/122489/1/Political%20Quarterly%20IRA%20Dawson%20&%20Innes.pdf
  123. Fact Sheet: What We Know about Russia’s Interference Operations – German Marshall Fund, accessed September 30, 2025, https://www.gmfus.org/news/fact-sheet-what-we-know-about-russias-interference-operations
  124. “The Tactics & Tropes of the Internet Research Agency” by Renee DiResta, Kris Shaffer et al. – UNL Digital Commons – University of Nebraska–Lincoln, accessed September 30, 2025, https://digitalcommons.unl.edu/senatedocs/2/
  125. Conflict Propaganda in Syria: Narrative Battles – 1st Edition – Oliver – Routledge, accessed September 30, 2025, https://www.routledge.com/Conflict-Propaganda-in-Syria-Narrative-Battles/Boyd-Barrett/p/book/9780367697488
  126. Syrian revolution and the conflict over narratives | SyriaUntold – حكاية ما انحكت, accessed September 30, 2025, https://syriauntold.com/2021/03/19/syrian-revolution-and-the-conflict-over-narratives/
  127. The Battle of the Narratives Around Syria | German Marshall Fund of the United States, accessed September 30, 2025, https://www.gmfus.org/news/battle-narratives-around-syria
  128. How did combatants’ narratives and social media shape Syria’s civil war? | ClarkU News, accessed September 30, 2025, https://www.clarku.edu/news/2024/02/29/how-did-combatants-narratives-social-media-shape-syrias-civil-war/
  129. LESSONS FROM SYRIA’S LOW-PROFILE NARRATIVE WAR, accessed September 30, 2025, https://warroom.armywarcollege.edu/articles/narrative-war/
  130. AI and the Future of Disinformation Campaigns | Center for Security and Emerging Technology, accessed September 30, 2025, https://cset.georgetown.edu/publication/ai-and-the-future-of-disinformation-campaigns-2/
  131. AI and the Future of Disinformation Campaigns | Center for Security and Emerging Technology – CSET, accessed September 30, 2025, https://cset.georgetown.edu/publication/ai-and-the-future-of-disinformation-campaigns/
  132. Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media – IEEE Computer Society, accessed September 30, 2025, https://www.computer.org/csdl/magazine/sp/2024/04/10552098/1XApkaTs5l6
  133. Understanding Offensive AI vs. Defensive AI in Cybersecurity – Abnormal AI, accessed September 30, 2025, https://abnormal.ai/blog/offensive-ai-defensive-ai
  134. Combatting deepfakes: Policies to address national security threats and rights violations, accessed September 30, 2025, https://arxiv.org/html/2402.09581v1
  135. Rising Threat – Deepfakes and National Security in the Age of Digital Deception, accessed September 30, 2025, https://digitalcommons.odu.edu/cgi/viewcontent.cgi?article=1078&context=covacci-undergraduateresearch
  136. NSA, U.S. Federal Agencies Advise on Deepfake Threats, accessed September 30, 2025, https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3523329/nsa-us-federal-agencies-advise-on-deepfake-threats/
  137. Crossing the Deepfake Rubicon – CSIS, accessed September 30, 2025, https://www.csis.org/analysis/crossing-deepfake-rubicon
  138. AI-driven disinformation: policy recommendations for democratic resilience – PMC, accessed September 30, 2025, https://pmc.ncbi.nlm.nih.gov/articles/PMC12351547/
  139. Weaponized storytelling: How AI is helping researchers sniff out disinformation campaigns | FIU News – Florida International University, accessed September 30, 2025, https://news.fiu.edu/2025/weaponized-storytelling-how-ai-is-helping-researchers-sniff-out-disinformation-campaigns
  140. AI-Enhanced Command & Control Systems Transforming Military – Defence Industries, accessed September 30, 2025, https://www.defence-industries.com/articles/ai-enhanced-command-and-control-c2-systems-transforming-military
  141. Enhance command and control with AI and machine learning – Microsoft Industry Blogs, accessed September 30, 2025, https://www.microsoft.com/en-us/industry/blog/government/2023/06/20/enhance-command-and-control-with-ai-and-machine-learning/
  142. Project Maven – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Project_Maven
  143. ECS’ John Heneghan on Supporting NGA’s Maven Program – ExecutiveBiz, accessed September 30, 2025, https://www.executivebiz.com/articles/ecs-john-heneghan-nga-maven-program
  144. Artificial Intelligence as a Combat Multiplier: Using AI to Unburden Army Staffs, accessed September 30, 2025, https://www.armyupress.army.mil/Journals/Military-Review/Online-Exclusive/2024-OLE/AI-Combat-Multiplier/
  145. United States’ Project Maven And The Rise Of AI-Assisted Warfare …, accessed September 30, 2025, https://defensetalks.com/united-states-project-maven-and-the-rise-of-ai-assisted-warfare/
  146. AI at the Pentagon: How Maven’s CTO Brings AI into Military Operations | IIA @MIT 2025, accessed September 30, 2025, https://www.youtube.com/watch?v=LBUKDhtlOEI
  147. Marine Corps names leadership for Project Dynamis amid push for new AI capabilities, accessed September 30, 2025, https://defensescoop.com/2025/09/23/marine-corps-project-dynamis-ai-leadership/
  148. AI-Enabled Command and Control Systems for Integrated Land, Air, and Sea Operations | by SIAM Student’s Chapter VIT Bhopal | Medium, accessed September 30, 2025, https://medium.com/@siam_VIT-B/ai-enabled-command-and-control-systems-for-integrated-land-air-and-sea-operations-ea27ed86c30d
  149. AI at War: The Next Revolution for Military and Defense | Capitol Technology University, accessed September 30, 2025, https://www.captechu.edu/blog/ai-war-next-revolution-military-and-defense
  150. Artificial intelligence arms race – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Artificial_intelligence_arms_race
  151. Essay: Reframing the U.S.-China AI “Arms Race”: Introduction – New America, accessed September 30, 2025, https://www.newamerica.org/cybersecurity-initiative/reports/essay-reframing-the-us-china-ai-arms-race/introduction/
  152. China Is Using the Private Sector to Advance Military AI | Center for …, accessed September 30, 2025, https://cset.georgetown.edu/article/china-is-using-the-private-sector-to-advance-military-ai/
  153. How the US Could Lose the AI Arms Race to China | American Enterprise Institute – AEI, accessed September 30, 2025, https://www.aei.org/op-eds/how-the-us-could-lose-the-ai-arms-race-to-china/
  154. Turkish Drones Disrupting Battlefields: A Case Study of Nagorno …, accessed September 30, 2025, https://wahacademia.com/index.php/Journal/article/download/227/186
  155. Baykar Bayraktar TB2 – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Bayraktar_TB2
  156. The Role of Turkish Drones in Azerbaijan’s Increasing Military Effectiveness: An Assessment of the Second Nagorno-Karabakh War – Insight Turkey, accessed September 30, 2025, https://www.insightturkey.com/articles/the-role-of-turkish-drones-in-azerbaijans-increasing-military-effectiveness-an-assessment-of-the-second-nagorno-karabakh-war
  157. Why lasers might be the answer to invasive drone attacks | DW News – YouTube, accessed September 30, 2025, https://www.youtube.com/watch?v=tFAZmb56ulU
  158. Ethiopian Civil War vs. Ukraine Invasion: Why TB2 Bayraktar Drones Worked For One & Failed The Other – Simple Flying, accessed September 30, 2025, https://simpleflying.com/ethiopia-vs-ukraine-why-drones-worked-failed/
  159. Drone Saturation: Russia’s Shahed Campaign – CSIS, accessed September 30, 2025, https://www.csis.org/analysis/drone-saturation-russias-shahed-campaign
  160. What Iran’s Drones in Ukraine Mean for the Future of War | The Washington Institute, accessed September 30, 2025, https://www.washingtoninstitute.org/policy-analysis/what-irans-drones-ukraine-mean-future-war
  161. David vs. Goliath: Cost Asymmetry in Warfare – RAND, accessed September 30, 2025, https://www.rand.org/pubs/commentary/2025/03/david-vs-goliath-cost-asymmetry-in-warfare.html
  162. Contribution by the International Committee of the Red Cross submitted to the Chair of the Convention on Certain Conventional Weapons (CCW, accessed September 30, 2025, https://docs-library.unoda.org/Convention_on_Certain_Conventional_Weapons_-Group_of_Governmental_Experts_on_Lethal_Autonomous_Weapons_Systems_(2021)/GGE_LAWS_-_June_2021_-_ICRC_-_written_contribution.pdf
  163. Autonomy in weapon systems | SIPRI, accessed September 30, 2025, https://www.sipri.org/research/armament-and-disarmament/emerging-military-and-security-technologies/autonomy-weapon-systems
  164. Autonomous Weapon Systems and International Humanitarian Law: Identifying Limits and the Required Type and Degree of Human–Machine Interaction | SIPRI, accessed September 30, 2025, https://www.sipri.org/publications/2021/policy-reports/autonomous-weapon-systems-and-international-humanitarian-law-identifying-limits-and-required-type
  165. Compliance with International Humanitarian Law in the Development and Use of Autonomous Weapon Systems: What Does IHL Permit, Pr – SIPRI, accessed September 30, 2025, https://www.sipri.org/sites/default/files/2023-03/ihl_and_aws.pdf
  166. Retaining Human Responsibility in the Development and Use of Autonomous Weapon Systems: On Accountability for Violations of International Humanitarian Law Involving AWS | SIPRI, accessed September 30, 2025, https://www.sipri.org/publications/2022/policy-reports/retaining-human-responsibility-development-and-use-autonomous-weapon-systems-accountability
  167. The road less travelled: ethics in the international regulatory debate on autonomous weapon systems, accessed September 30, 2025, https://blogs.icrc.org/law-and-policy/2024/04/25/the-road-less-travelled-ethics-in-the-international-regulatory-debate-on-autonomous-weapon-systems/
  168. UN and Red Cross join voices against danger of autonomous weapons – Prensa Latina, accessed September 30, 2025, https://www.plenglish.com/news/2023/10/05/un-and-red-cross-join-voices-against-danger-of-autonomous-weapons/
  169. International Committee of the Red Cross (ICRC) position on autonomous weapon systems, accessed September 30, 2025, https://www.cambridge.org/core/journals/international-review-of-the-red-cross/article/international-committee-of-the-red-cross-icrc-position-on-autonomous-weapon-systems-icrc-position-and-background-paper/32AEF7294791D19101D96970E85B0459
  170. ICRC’s Intervention on AI Based Weapon under International Humanitarian Law: A Critical Analysis – UniversePG, accessed September 30, 2025, https://www.universepg.com/public/img/storage/journal-pdf/1728999629_ICRCs_intervention_on_AI_Based_Weapon_under_international_humanitarian_law_a_critical_analysis.pdf
  171. The challenges of AI command and control | European Leadership Network, accessed September 30, 2025, https://europeanleadershipnetwork.org/commentary/the-challenges-of-ai-command-and-control/

Electromagnetic Pulse (EMP): A Strategic Assessment of the Threat to United States Critical Infrastructure and National Resilience

An Electromagnetic Pulse (EMP) is a short, intense burst of electromagnetic energy that can disrupt, damage, or destroy electronic systems over a wide area. While EMP phenomena can occur naturally, their potential as a weapon of mass disruption presents one of the most severe and asymmetric threats to the national security of the United States. The nation’s profound and growing dependence on a complex, interconnected web of electronic systems makes it uniquely vulnerable to an attack that targets this very foundation of modern society. Understanding the distinct types of EMP, their physical generation mechanisms, and the specific ways they interact with and destroy electronics is the essential first step in assessing this threat and formulating a credible national response.

Taxonomy of EMP Events

EMP events are broadly categorized by their origin: natural or man-made.1 This fundamental distinction is critical, as it defines the characteristics of the pulse, the scope of its effects, and the nature of the threat itself.

Natural vs. Man-Made

Natural EMP events are primarily the result of severe space weather. A Coronal Mass Ejection (CME) from the sun can send a wave of plasma and charged particles toward Earth, causing a Geomagnetic Disturbance (GMD).2 A historically significant example is the 1859 Carrington Event, which induced currents so powerful they set telegraph offices ablaze.4 While a modern Carrington-class event would pose a catastrophic threat to long-line infrastructure like the electric grid, its effects are primarily low-frequency and do not contain the fast, high-frequency components that directly destroy smaller electronics.5

Man-made EMPs, by contrast, are engineered to maximize destructive potential across a broad frequency spectrum. These intentional attacks are the focus of this report and are divided into two primary categories based on the energy source used to generate the pulse.3

Nuclear vs. Non-Nuclear

The most powerful and wide-ranging EMP threat comes from a nuclear detonation, specifically a high-altitude burst, which generates a Nuclear Electromagnetic Pulse (NEMP).4 A single such event, known as a High-Altitude EMP (HEMP), can blanket the entire continental United States with a complex, multi-component pulse designed for systemic destruction.3

Conversely, Non-Nuclear Electromagnetic Pulse (NNEMP) weapons, often called E-bombs, use conventional energy sources to generate a more localized but still potent EMP.4 These devices offer tactical flexibility and can be deployed without crossing the nuclear threshold, presenting a different but equally serious set of strategic challenges.4

The Physics of a High-Altitude Nuclear Detonation (HEMP)

A HEMP is the most catastrophic EMP threat due to its vast area of effect and its complex, multi-layered waveform. A single nuclear weapon with a yield of 1.4 megatons, detonated at an altitude of 250 miles over the central U.S., would affect the entire continent.9 The 1962 Starfish Prime test, a 1.4-megaton detonation 250 miles over Johnston Island, caused streetlights to fail and burglar alarms to sound in Hawaii, nearly 900 miles away, demonstrating the profound reach of the phenomenon.6

The generation of a HEMP begins in the first nanoseconds after a nuclear detonation above an altitude of 30 km.10 The explosion releases an intense, instantaneous burst of gamma rays. These high-energy photons travel outward and collide with air molecules in the upper atmosphere. Through a process known as the Compton Effect, the gamma rays strip electrons from these molecules, creating a massive cascade of high-energy “Compton electrons”.9 These electrons, traveling at relativistic speeds, are captured by the Earth’s magnetic field and forced into a spiral trajectory, creating a massive, coherent, time-varying electrical current. This current radiates a powerful electromagnetic pulse that propagates down to the Earth’s surface.12

The resulting HEMP waveform is not a single pulse but a sequence of three distinct components, designated E1, E2, and E3. These components arrive in rapid succession, each with unique characteristics tailored to attack different parts of the technological infrastructure. This is not a random side effect but a synergistic weapon system, where each component’s attack enables and amplifies the damage of the next.

The E1 Pulse (Early-Time)

The E1 component is the first, fastest, and most direct threat to modern microelectronics. It is an extremely intense electric field, reaching peaks of 50,000 volts per meter (50 kV/m), with an incredibly rapid rise time measured in mere nanoseconds.12 Its duration is brief, lasting only a few microseconds.14 The E1 pulse’s energy is spread across a very broad frequency spectrum, from direct current (DC) up to 1 GHz, which allows it to efficiently couple with small-scale conductors like the wiring in buildings, the traces on printed circuit boards, and the internal architecture of microchips.11 This component acts as the “key” that unlocks the system’s defenses. Its speed is its greatest weapon; it rises too quickly for conventional surge protectors, which typically react in milliseconds, to provide any meaningful protection.11 By inducing voltages that far exceed the breakdown threshold of delicate semiconductor junctions, E1 is capable of destroying the “brains” of modern society: computers, communication systems, industrial control systems, and sensors.9

The E2 Pulse (Intermediate-Time)

Following the E1 pulse, from about one microsecond to one second after the detonation, is the E2 component.11 Generated by scattered gamma rays and inelastic gammas from neutrons, the E2 pulse has characteristics very similar to the electromagnetic pulse produced by a nearby lightning strike.11 On its own, the E2 pulse would be a manageable threat, as much of the nation’s infrastructure has some level of lightning protection.13 However, its danger is synergistic and opportunistic. The E2 pulse acts as the “crowbar” that exploits the now-undefended system. The E1 pulse may have already damaged or destroyed the very surge protection devices and filters designed to stop a lightning-like transient. The U.S. EMP Commission concluded that this synergistic effect is the most significant risk of E2, as it allows the energy of the second component to penetrate deeply into systems whose defenses have been compromised moments before.11

The E3 Pulse (Late-Time)

The final and longest-lasting component is the E3 pulse, which begins seconds after the detonation and can persist for minutes or even longer.11 This slow, low-frequency pulse is not generated by the Compton Effect but by the large-scale distortion of the Earth’s magnetic field. The expanding nuclear fireball, a massive bubble of hot, ionized gas, effectively shoves the planet’s magnetic field lines aside. As the field slowly snaps back into place, this magnetohydrodynamic (MHD) effect induces powerful, low-frequency currents in the Earth itself.15 The E3 pulse’s characteristics are very similar to a severe GMD from a solar storm.11

This component is the “demolition charge” that targets the “muscle” of the nation’s infrastructure: the electric power grid. The slow-changing fields of E3 are perfectly suited to induce geomagnetically induced currents (GICs)—powerful, quasi-DC currents—in very long electrical conductors, such as high-voltage transmission lines, pipelines, and railway lines.14 AC power systems, particularly the massive extra-high-voltage (EHV) transformers that form the backbone of the grid, are not designed to handle these DC-like currents. The GICs cause the magnetic cores of these transformers to saturate, leading to extreme harmonic distortion, rapid overheating, and catastrophic physical destruction within minutes.13 The E3 pulse ensures that even if some electronics survive the E1 and E2 pulses, they will be without the electrical power needed to function for a very long time.

The Physics of Electronic Disruption

The destructive power of an EMP stems from its ability to use an electronic system’s own wiring against it. According to Maxwell’s equations, a time-varying magnetic field induces an electric field, and thus a current, in any nearby conductor.1 An EMP is an intense, rapidly changing electromagnetic field; therefore, any conductive material within its range—from a continental power line to a microscopic wire in a CPU—acts as an antenna, collecting the pulse’s energy and converting it into damaging electrical currents and voltages.18

Coupling and Induced Currents

The efficiency of this energy transfer, or “coupling,” depends on the relationship between the wavelength of the EMP’s energy and the length of the conductor. The high-frequency E1 pulse couples best with shorter conductors (a few inches to several feet), which is why it is so damaging to personal electronics and the internal components of larger systems.15 The low-frequency E3 pulse couples most efficiently with very long conductors (many miles), making the nation’s vast network of power lines the primary collector for its destructive energy.15 Once coupled, these induced currents can reach thousands of amperes, and voltages can reach hundreds of kilovolts, overwhelming circuits designed to operate on a few volts and milliamps.15

Failure Modes

The induced energy surge destroys electronics through two primary mechanisms:

  1. Dielectric Breakdown: Every electronic component contains insulating materials (dielectrics) designed to prevent current from flowing where it should not, such as the thin silicon dioxide layer that insulates the gate of a transistor. When the voltage induced by an EMP exceeds the dielectric strength of this material, the insulator permanently breaks down, creating a short circuit. This process effectively “fries” the microchip, turning a complex transistor into a useless carbon resistor.18
  2. Thermal Damage: The flow of an immense current through a tiny conductor, per Joule’s law (P=I2R), generates an incredible amount of heat in a fraction of a second. This intense local heating can melt or vaporize the delicate internal wiring of an integrated circuit, fuse transistor junctions together, or burn out components on a circuit board.9

Vulnerability of Modern Electronics

The relentless drive for smaller, faster, and more energy-efficient electronics has inadvertently made modern society exponentially more vulnerable to EMP. Solid-state microelectronics operate at very low voltages and have microscopic feature sizes, which dramatically reduces their tolerance to voltage spikes compared to older, more robust technologies like vacuum tubes.20 The very complexity and miniaturization that enable our technological prowess have become a critical vulnerability.

Non-Nuclear EMP (NNEMP) Weapons

While HEMP represents the most catastrophic threat, the development of effective NNEMP weapons has created a new class of tactical threats. These devices allow an adversary to achieve localized, debilitating electronic effects without resorting to nuclear weapons, thus occupying a dangerous strategic “gray zone”.4 An attack using an NNEMP weapon could paralyze a city’s financial district or disable an air defense network without causing direct loss of life, potentially creating confusion and plausible deniability that might delay or prevent a kinetic military response.22

Technology Overview

NNEMP weapons use conventional energy sources to generate a powerful, localized pulse. The two primary technologies are:

  • Flux Compression Generators (FCGs): An FCG uses a bank of capacitors to send a strong initial current through a coil of wire (the stator), creating an intense magnetic field. A cylinder filled with high explosives (the armature) is placed inside the coil. When the explosive is detonated, the rapidly expanding armature creates a moving short circuit with the stator, compressing the magnetic field into an ever-smaller volume. This rapid compression converts the chemical energy of the explosive into a single, massive electromagnetic pulse.23
  • High-Power Microwave (HPM) Weapons: These devices function like highly advanced, weaponized microwave ovens. They use technologies like virtual cathode oscillators (vircators) or magnetrons to generate an extremely powerful, focused beam of microwave energy.23 This directed energy can be aimed at a specific target to disrupt or destroy its internal electronics. The U.S. Air Force has successfully tested HPM weapons delivered by cruise missiles, such as the Counter-electronics High Power Microwave Advanced Missile Project (CHAMP) and its successor, the High-Powered Joint Electromagnetic Non-Kinetic Strike Weapon (HiJENKS).23

Tactical Applications

NNEMP weapons can be delivered by a variety of platforms, including cruise missiles, drones, or even ground vehicles like a van.4 Their effects are geographically constrained, ranging from a single building to several square miles, depending on the size of the weapon and its altitude.9 This makes them ideal for surgical, non-lethal (to humans) first strikes against high-value military or civilian targets. An NNEMP could be used to disable enemy command and control centers, blind air defense radars to clear a path for conventional bombers, or cripple a nation’s stock exchange to trigger economic chaos.22

Table 1: Comparison of EMP Threat Characteristics

Threat TypeHEMP (E1)HEMP (E3)NNEMP (HPM/FCG)Geomagnetic Disturbance (GMD)
Generation SourceHigh-Altitude Nuclear DetonationHigh-Altitude Nuclear DetonationConventional Explosive / Microwave GeneratorSolar Coronal Mass Ejection
Rise TimeNanoseconds (10−9 s)Seconds to MinutesNanoseconds to MicrosecondsHours to Days
DurationMicroseconds (10−6 s)Minutes to HoursMicroseconds to MillisecondsDays
Peak Field StrengthVery High (~50 kV/m)Very Low (~0.01−0.1 V/m)High (Localized)Extremely Low
Frequency SpectrumBroadband (DC – 1 GHz)Very Low Frequency (<1 Hz)Narrowband (Microwave) or BroadbandQuasi-DC
Primary CouplingShort Conductors (Circuit Boards, Wires)Long Conductors (Power Lines, Pipelines)Direct Illumination, Short ConductorsLong Conductors (Power Lines)
Primary Infrastructure TargetMicroelectronics (Computers, SCADA, Comms)EHV Transformers, Power GridTargeted Electronics (e.g., Radars, Data Centers)EHV Transformers, Power Grid

Vulnerability Assessment of U.S. Critical National Infrastructure

The United States’ civilian infrastructure is profoundly and uniquely vulnerable to an EMP attack. The Congressional EMP Commission, after years of study, concluded that the protections common during the Cold War are now “almost completely absent” in the civilian sector.25 This vulnerability is not isolated to a single area but is systemic, rooted in the interconnected nature of the 16 critical infrastructure sectors defined by the Department of Homeland Security. The failure of one foundational infrastructure—the electric power grid—would trigger a rapid, cascading collapse across all others, leading to a national catastrophe.3

The Electric Power Grid: The Linchpin of Modern Society

The electric power grid is the single most critical infrastructure in the United States. Its collapse is the primary catastrophic outcome of a widespread EMP event because all other infrastructures—telecommunications, finance, water, food, transportation, and healthcare—are entirely dependent upon it.6 A society of nearly 330 million people is not structured to provide for its basic needs without electricity.26 While other infrastructures might suffer direct damage from an EMP, only the power grid faces the prospect of a nearly complete, long-term collapse from which recovery could take years.26

EHV Transformers: The Achilles’ Heel

The most acute vulnerability in the entire U.S. infrastructure lies within the nation’s fleet of extra-high-voltage (EHV) transformers.28 These massive, house-sized devices are the backbone of the bulk power transmission system. They are also uniquely susceptible to the low-frequency E3 component of a HEMP or a severe GMD.27 The quasi-DC currents induced by these events cause the transformers’ magnetic cores to saturate, leading to extreme internal heating that can physically melt windings and destroy the unit in as little as 90 seconds, as was observed in the 1989 Quebec blackout.17

This physical vulnerability is compounded by a catastrophic logistical problem. EHV transformers are not mass-produced, off-the-shelf items. They are custom-built, weigh hundreds of tons, and have manufacturing and delivery lead times of 12 to 18 months or longer.28 Critically, there are no domestic manufacturers for the largest EHV transformers, meaning they must be sourced from overseas competitors like Germany or South Korea.28 The United States maintains an insufficient stockpile of spares, and a single HEMP event could destroy hundreds of these transformers simultaneously.27 This creates a “Recovery Paradox”: the nation’s ability to recover from a grid collapse depends on manufacturing and transporting replacements, an industrial and logistical feat that is itself impossible without a functioning power grid and global supply chain. This feedback loop means that a large-scale loss of EHV transformers would not be a temporary blackout but a potential decade-long societal shutdown. A 2008 study presented to the National Academies estimated a recovery time of 4 to 10 years and a direct economic cost of $1 to $2 trillion for such an event.27

SCADA Systems

Compounding the physical destruction of the grid’s “muscle” is the vulnerability of its “brain.” The Supervisory Control and Data Acquisition (SCADA) systems that utilities use to monitor and control the flow of power are complex networks of computers, sensors, and communication links.6 These systems are composed of modern, solid-state electronics that are highly susceptible to the fast, high-frequency E1 pulse. The destruction of SCADA systems would leave grid operators blind and unable to manage the grid, assess damage, or coordinate restoration efforts, greatly complicating any recovery attempt.6

Telecommunications and Information Networks

The telecommunications infrastructure, the nation’s nervous system, is equally vulnerable, primarily through its dependence on the electric grid. This creates the “Illusion of Resilience,” where many critical facilities believe they are protected by backup power systems. While data centers, central switching offices, and cellular towers are often equipped with diesel generators and battery backups, this resilience is measured in hours or days, not the years that would be required for grid recovery.26 The fuel for these generators is delivered by a supply chain that requires electricity for refineries, pipelines, and transport. This chain would break within days of a grid collapse, rendering the backup systems useless and exposing the true fragility of the communications network.

The Fiber Optic Paradox

It is a common misconception that the widespread use of fiber-optic cables has made telecommunications networks immune to EMP. While the glass fibers themselves are not conductive and are therefore unaffected by electromagnetic fields, the network as a whole is not immune.21 A long-haul fiber-optic cable requires electronically powered repeaters and amplifiers every 40-60 miles to boost the signal. These devices, along with the routers and switches at network nodes, are filled with vulnerable microelectronics and are powered by the electric grid.15 Even armored fiber-optic cables, designed for underground use, often contain metallic strength members or shielding layers that can act as antennas, collecting EMP energy and channeling it into the connected electronic equipment.31 Therefore, while the data-carrying medium is robust, the supporting infrastructure that makes it function is highly fragile.

The Financial Sector

The modern financial system is not merely supported by electronics; it is electronics. All transactions, records, and market operations are digital. An EMP attack would represent an existential threat to the entire banking and finance infrastructure.32 The E1 pulse could cause direct damage to servers, routers, and data storage systems within financial institutions. This could lead to irreparable hardware destruction, system latch-up, and the corruption or erasure of magnetic storage media like backup tapes.32 While major data centers are often housed in physically secure facilities with robust backup power, they are rarely shielded against a direct EMP field and remain dependent on the long-term viability of the power grid and communications networks.26 The immediate paralysis of all electronic payments, ATM withdrawals, and market trading would be catastrophic. Perhaps more damaging in the long term would be the complete loss of public trust in the security and stability of financial institutions, a foundation upon which the entire economy is built.32

Interdependent Infrastructures and Cascading Failures

An EMP attack would not be a series of isolated failures but a single, systemic collapse. The mathematical principles of network theory apply: in a highly interconnected system, the failure of a critical node—the electric grid—will trigger a rapid, cascading failure across all dependent nodes.15

  • Transportation: Modern automobiles and trucks contain dozens of vulnerable microprocessors and electronic control units (ECUs) that manage everything from engine ignition and fuel injection to braking and transmission systems.9 A HEMP event would likely render a significant fraction of post-1980s vehicles inoperable, instantly paralyzing road transport.9 The failure of electronic traffic signal systems would create gridlock, and the collapse of the fuel distribution network would halt all remaining vehicles.
  • Water and Wastewater: Municipal water systems rely on electric pumps to maintain pressure and distribute water to homes and businesses. Wastewater treatment plants are similarly dependent on electricity for all their processes.2 The failure of these systems would lead to a rapid loss of access to safe drinking water and a complete breakdown of sanitation, creating the perfect conditions for a massive public health crisis and the spread of diseases like cholera and dysentery.35
  • Food and Healthcare: The U.S. food supply operates on a “just-in-time” logistics model with minimal reserves. The paralysis of transportation, the loss of refrigeration, and the shutdown of food processing plants would mean that grocery store shelves would be empty within days.36 Simultaneously, hospitals, filled with sophisticated electronic diagnostic and life-support equipment, would be rendered technologically inert. With limited backup power, they would be overwhelmed by the public health crisis and unable to provide anything beyond the most rudimentary care.37

Strategic Attack Scenarios: Analysis and Recovery

To operationalize the preceding vulnerability assessment, this section presents three plausible attack scenarios. These scenarios are designed to illustrate the different scales of the EMP threat, from a civilization-ending catastrophe to a targeted, strategic disruption. Each scenario is analyzed in terms of the weapon system, its likely impacts, the daunting road to recovery, and potential mitigation strategies.

Table 2: Summary of Strategic Attack Scenarios
ScenarioImpact LevelWeapon SystemDelivery MethodTarget AreaScale of Infrastructure Impact
Scenario ACatastrophicSingle High-Yield (1.4 MT) “Super-EMP” HEMPIntercontinental Ballistic Missile (ICBM)Continental United States (CONUS)Total, nationwide collapse of all critical infrastructures
Scenario BRegionalSingle Low-Yield (10-20 kT) HEMPShip-launched Short-Range Ballistic Missile (SRBM)Major coastal region (e.g., Eastern Seaboard)Regional grid collapse; national economic shock; refugee crisis
Scenario CTacticalSwarm of NNEMP (HPM/FCG) cruise missilesSubmarine or aircraft launchSpecific high-value nodes (e.g., Wall Street)Localized “electronic deserts”; financial market paralysis

Scenario A (Catastrophic Impact): Coordinated HEMP Attack

This scenario represents the worst-case, existential threat to the United States.

  • Weapon & Delivery: A peer adversary, such as Russia or China, launches a single, high-yield (e.g., 1.4 Megaton) thermonuclear warhead specifically designed to maximize gamma ray output—a so-called “Super-EMP” weapon.25 The warhead is delivered via an ICBM and detonated at an optimal altitude of approximately 250 miles (400 km) over the geographic center of the country, such as Kansas.5 This attack vector is well within the known capabilities of several nations, who have reportedly integrated EMP attacks into their military doctrines as a means to defeat a technologically superior U.S. force.25
  • Impacts: The line-of-sight effects of the detonation would create an EMP field covering the entire continental United States, as well as parts of Canada and Mexico.9 The impact would be immediate and absolute.
  • Direct: The E1 pulse would instantly destroy or disrupt a significant fraction of all unhardened microelectronics nationwide. This includes computers, cell phones, SCADA systems, and the electronic controls in vehicles and aircraft. The E3 pulse would follow, inducing catastrophic GICs in the power grid, leading to the rapid, simultaneous destruction of hundreds of EHV transformers. This would trigger a cascading failure and complete collapse of all three major U.S. power interconnections (Eastern, Western, and ERCOT) within minutes.27
  • Cascading: The result would be a total, nationwide, and indefinite blackout. Every interdependent infrastructure described in Section 2.4 would fail systemically. Communications would revert to pre-industrial methods like runners and word-of-mouth, with limited connectivity from the small amateur radio community.35 The transportation network would cease to function. The water, food, and medical systems would collapse. The nation would be plunged into a pre-industrial existence but with a 21st-century population density and a near-total lack of relevant survival skills. The EMP Commission grimly warned that under such conditions, a majority of the U.S. population could perish within a year from starvation, disease, and the complete breakdown of social order.6
  • Road to Recovery: Recovery from this scenario would not be a matter of years, but of decades or generations. The primary impediment is the “Recovery Paradox” of the EHV transformers. The industrial capacity to build and transport hundreds of these massive devices would have been destroyed along with the grid itself. Recovery would depend on massive, sustained international aid, which may not be forthcoming given the global economic depression that would follow the collapse of the U.S. economy. The nation would have to be rebuilt from the ground up.
  • Mitigation: This catastrophic outcome can only be prevented through a pre-emptive, federally mandated, and funded national effort to harden the electric grid. This includes shielding all critical EHV transformers with technologies like neutral current blockers, deploying multi-stage E1/E2 protection devices on all SCADA and control systems, and establishing a large strategic reserve of spare EHV transformers.17

Scenario B (Likely/Regional Impact): Limited HEMP Attack by a Rogue State

This scenario outlines a more limited but still devastating attack, potentially executed by a rogue state or a state-sponsored terrorist organization.

  • Weapon & Delivery: An adversary with basic nuclear and missile capabilities, such as North Korea or a future nuclear-armed Iran, places a lower-yield nuclear weapon (10-20 kilotons) aboard a commercial freighter. Off the U.S. coast, the weapon is launched via a common short-range ballistic missile, like a Scud, and detonated at an altitude of 50-100 miles.5 This method of attack is particularly insidious because it could be executed with a degree of anonymity; a high-altitude burst leaves no bomb debris for forensic analysis, potentially allowing the perpetrator to escape immediate retaliation.5
  • Impacts: The effects would be confined to a regional footprint with a radius of several hundred miles, rather than continent-wide. A detonation 200 miles off the coast of Virginia, for example, could blanket the entire Eastern Seaboard from New England to the Carolinas, encompassing the nation’s political and financial capitals.
  • Direct: A regional grid collapse would ensue, plunging tens of millions of people into darkness. All unhardened electronics, communications, and transportation systems within the affected zone would fail.
  • Cascading: While the rest of the country would remain powered, it would be faced with a national emergency of unprecedented scale. The paralysis of Washington D.C., New York, and other major eastern cities would trigger an immediate and severe national economic crisis. A massive humanitarian crisis would unfold as millions of people trapped in the blackout zone attempt to flee, creating a refugee flow that would overwhelm neighboring states. The unaffected regions of the country would see their resources, from the National Guard to food and fuel supplies, stripped to support the massive relief and recovery effort.
  • Road to Recovery: The recovery of the affected region would be a multi-year national priority, likely taking 2-5 years. The EHV transformer bottleneck would still be the primary limiting factor, but the nation could, in theory, divert its entire stock of spares and prioritize new manufacturing for the stricken region. The effort would require a full-scale mobilization of federal resources, including FEMA and the Department of Defense, for security, logistics, and humanitarian aid on a scale never before seen.
  • Mitigation: In addition to the grid-hardening measures described in Scenario A, mitigation for this threat requires enhanced maritime and atmospheric surveillance to detect and interdict potential launch platforms before an attack can be executed. Furthermore, developing robust “black start” capabilities—the ability to restart isolated segments of the power grid independently without relying on the wider network—is critical for regional resilience.37

Scenario C (Tactical Impact): Coordinated NNEMP Attack

This scenario demonstrates the strategic use of non-nuclear weapons to achieve precise, debilitating effects without causing widespread destruction or loss of life.

  • Weapon & Delivery: A sophisticated adversary launches a coordinated swarm of 5 to 10 advanced cruise missiles equipped with NNEMP warheads (either HPM or FCG).4 The missiles could be launched from a submarine, long-range bomber, or even covert ground platforms, flying low to evade radar detection before striking their targets simultaneously.24
  • Targeting: The attack is surgical and not aimed at the general power grid. Instead, it targets a cluster of specific, high-value nodes within a single metropolitan area to achieve a strategic effect. A prime example would be a synchronized attack on the New York Stock Exchange, the NASDAQ data center in New Jersey, and the major clearinghouse banks in the Wall Street financial district. Other potential target sets include the data center clusters of Northern Virginia (the backbone of the internet), the port complex of Los Angeles/Long Beach (a critical national supply chain node), or a key military command and control facility.

Impacts:

  • Direct: The attack is non-kinetic and causes no direct fatalities. It does not trigger a widespread blackout. Instead, the targeted facilities are instantly transformed into “electronic deserts.” The intense microwave or radio-frequency pulses would induce currents that cause a “hard kill” on the unshielded electronics within the target buildings, destroying servers, routers, communication hubs, and data storage systems.21 The damage would be permanent, requiring the complete replacement of the affected hardware.21
  • Cascading: The immediate effect of an attack on Wall Street would be the complete paralysis of U.S. and global financial markets. The inability to access records, clear transactions, or execute trades would trigger a financial panic and economic crisis far more damaging than the physical cost of the destroyed equipment. The non-lethal, non-kinetic nature of the attack could create initial confusion, potentially being mistaken for a massive technical failure, which would delay a coherent national security response.
  • Road to Recovery: The recovery timeline would be measured in weeks to months. The primary challenge would not be grid reconstruction but the procurement and installation of highly specialized electronic equipment. An even greater challenge would be restoring domestic and international trust in the integrity and security of the U.S. financial system. The economic and psychological damage could be immense and long-lasting.
  • Mitigation: This highly targeted threat requires facility-level, not grid-level, hardening. Critical national infrastructure nodes—in finance, communications, and logistics—must be physically shielded. This involves constructing facilities that function as Faraday cages, using EMP-rated filters and surge protectors on all incoming power and data lines, and ensuring that all data connections entering or leaving the secure perimeter are fiber-optic to prevent conductive pathways for the pulse.9

U.S. Preparedness: A Tale of Two Efforts

The United States’ preparedness for an EMP attack is a study in contrasts, defined by a dangerous and growing disparity between strategic awareness and civilian vulnerability. Within the national security apparatus, the threat is well understood, and key military and governmental functions are protected. However, the vast civilian infrastructure that underpins the nation’s economy and the very survival of its population remains almost entirely exposed. This creates a strategic paradox where the government may be able to survive an attack but would be left to preside over a collapsed and non-functioning society.

The National Policy Framework: Awareness Without Action?

For over two decades, the U.S. government has been formally aware of the EMP threat, yet this awareness has not translated into meaningful, large-scale protective action for the civilian sector.

  • The EMP Commission: Established by Congress in 2001, the Commission to Assess the Threat to the United States from Electromagnetic Pulse Attack produced a series of authoritative, unclassified reports until it was disbanded in 2017.25 Its comprehensive work, involving top scientists and national security experts, unequivocally identified EMP as an existential threat and documented in detail the severe vulnerabilities of the nation’s critical infrastructures.42 The Commission’s core finding was stark: the civilian electric grid is the nation’s Achilles’ heel, and its collapse would be catastrophic.26 Despite its repeated and urgent warnings, the Commission’s recommendations for hardening were largely ignored.
  • Executive Order 13865: In March 2019, the threat was officially codified at the highest level with the signing of Executive Order 13865, “Coordinating National Resilience to Electromagnetic Pulses”.7 This order designated EMP as a national security threat and tasked the Department of Homeland Security (DHS), through its Cybersecurity and Infrastructure Security Agency (CISA), with leading a coordinated federal effort to improve resilience.7 The policy established three primary goals: improve risk awareness, enhance protection capabilities, and promote effective response and recovery efforts.7
  • The Policy-Action Gap: Despite the work of the EMP Commission and the issuance of a formal Executive Order, tangible progress on hardening the civilian grid remains minimal.6 The federal approach has been one of publishing voluntary guidelines, promoting information sharing, and encouraging public-private partnerships.7 This strategy has failed because of a fundamental misalignment of incentives. Private utility companies are primarily responsible to shareholders and are regulated by commissions that prioritize low consumer electricity rates. Investing billions of dollars to mitigate a low-probability, high-consequence event like EMP offers no short-term return on investment and would necessitate politically unpopular rate hikes.29 Without a federal mandate that either compels the expenditure or provides the funding, the economic and political incentives for private infrastructure owners are strongly aligned with inaction, leaving the nation’s most critical lifeline perilously exposed.

Current State of Readiness: A Dangerous Disparity

The current state of U.S. EMP readiness is dangerously bifurcated. Protections are in place for the continuity of the government, but not for the continuity of society.

  • Military and Government Hardening: A legacy of Cold War planning, key strategic military assets are hardened against EMP. This includes nuclear command, control, and communications (NC3) systems, strategic bomber and missile forces, and critical facilities like NORAD’s Cheyenne Mountain Complex.34 Likewise, continuity-of-government (COG) facilities and transportation assets, such as Air Force One, are shielded to ensure that the national command authority can survive an attack and direct the military response.29
  • Civilian Vulnerability: This military hardening exists in a vacuum of civilian vulnerability. The very society and industrial base that these military forces are meant to protect are completely soft targets.25 The U.S. Air Force, for example, is inextricably dependent on the civilian power grid and communications networks to operate its domestic bases.34 This creates a “Hollow Government” scenario: in the aftermath of a HEMP attack, the President may be able to issue orders from a hardened command post, but there will be no functioning civilian economy, no industrial base to mobilize, no transportation network to move resources, and no informed populace to direct. The government would survive as a hollowed-out entity, isolated from and unable to assist the collapsed nation it is meant to lead.

The Verdict: What We Are Ready For vs. What We Are Not

A candid assessment of the nation’s readiness reveals a clear and alarming picture.

  • Ready For: The United States is prepared, at a strategic command level, to withstand an EMP attack. The government can likely maintain continuity and control over its nuclear deterrent and other strategic military forces. There is a high degree of threat awareness and a solid policy framework within the national security community.
  • Not Ready For: The United States is catastrophically unprepared for the societal consequences of an EMP attack. The nation is not ready for a long-term, nationwide power outage and the subsequent, inevitable collapse of all life-sustaining critical services. We are not ready to feed, water, or provide medical care for our population in a post-EMP environment. The current “bottom-up” strategy, which relies on the voluntary and economically disincentivized actions of private infrastructure owners, has proven to be a failure and has left the American people unacceptably vulnerable to what is arguably the single greatest threat to their survival and way of life.6

A National Resilience Strategy: Recommendations for Action

Addressing the profound threat of EMP requires a fundamental shift from a strategy of awareness and voluntary guidance to one of decisive, coordinated action. True national resilience cannot be achieved through half-measures. It demands a multi-layered approach that combines top-down federal mandates for critical infrastructure with bottom-up preparedness at the community and individual levels. The following recommendations provide a framework for such a strategy.

National-Level Mitigation

The federal government must lead this effort with the urgency the threat demands. The reliance on market forces and voluntary measures has failed; legislative and executive action is now required.

  1. Mandate and Fund Grid Hardening: Congress must pass binding legislation, such as the long-proposed SHIELD Act, that directs the Federal Energy Regulatory Commission (FERC) to implement mandatory standards for EMP and GMD protection of the bulk electric grid.25 These standards must, at a minimum, require the installation of proven protective technologies, such as neutral current blockers or Faraday cage-like shielding for all EHV transformers, and the deployment of multi-stage, fast-acting surge protection devices on all critical SCADA and control systems.17 To overcome the economic disincentives, this mandate should be paired with a federal cost-sharing program or tax incentives to assist utilities with the capital investment.
  2. Establish a Strategic Transformer Reserve: The Department of Energy, in partnership with DHS, should be directed and funded to establish a national Strategic Transformer Reserve. This would involve procuring and strategically stockpiling a sufficient number of spare EHV transformers and other critical long-lead-time grid components. This reserve is the only practical way to break the “Recovery Paradox” and enable a grid restoration timeline measured in months rather than many years.
  3. Invest in Resilient Grid Technologies: Federal research and development funding should be prioritized for next-generation grid technologies that are inherently more resilient to EMP. This includes funding for the development and deployment of hardened microgrids that can “island” from the main grid to power critical local facilities, as well as research into solid-state transformers, which are less vulnerable to GIC effects than traditional designs.37
  4. Restructure Public-Private Partnerships: The role of CISA should be elevated from an advisory and information-sharing body to a central planning and operational coordination hub for infrastructure protection.7 This should involve conducting mandatory, integrated vulnerability assessments with private sector owners and developing joint, actionable plans for hardening critical nodes across all 16 infrastructure sectors.

Community and Individual Preparedness

In the event of a catastrophic HEMP attack, federal and state assistance may be unavailable for an extended period. Survival and recovery will therefore depend heavily on the resilience and preparedness of local communities and individual citizens.

State and Local Government Actions

  1. Promote and Protect Local Microgrids: State and municipal governments should identify critical local facilities—such as hospitals, water treatment plants, emergency operations centers, and food distribution hubs—and incentivize the development of EMP-protected microgrids to ensure their continued operation during a prolonged blackout.35
  2. Establish Community Stockpiles: Local emergency management agencies should plan for and maintain strategic stockpiles of essential resources, including fuel for emergency vehicles and generators, non-perishable food, and medical supplies, sufficient to sustain the community for at least 30-90 days.35
  3. Integrate EMP into Emergency Planning: EMP and long-term grid-down scenarios must be incorporated into all state and local emergency preparedness plans, training, and exercises.35 This will ensure that first responders and community leaders are prepared to operate in an environment without power, communications, or modern technology.

Individual and Family Preparedness

  1. Build a Comprehensive Emergency Kit: Every household must take responsibility for its own immediate survival. This requires building and maintaining a disaster kit with a minimum of 30 days of essential supplies, including non-perishable food, a method to purify water (at least one gallon per person per day), all necessary medications, and a robust first-aid kit.5
  2. Protect Critical Personal Electronics: Individuals can safeguard small, vital electronic devices by storing them in a makeshift Faraday cage. This can be constructed from a conductive metal container, such as a galvanized steel trash can or a military surplus ammo can, with the electronics placed inside a non-conductive inner box (e.g., cardboard) to prevent contact with the metal shell. Multiple nested layers of shielding (e.g., wrapping a device in aluminum foil, placing it in a box, and then wrapping the box in more foil) can also be effective.48 Key items to protect include a battery-powered or hand-crank shortwave radio for receiving information, a small solar charger, and a USB drive containing copies of important personal documents.
  3. Develop a Resilient Family Plan: Families must develop and practice an emergency plan that does not rely on modern technology.52 This should include pre-determined rally points, non-electronic communication methods, and a plan for shelter. Acquiring practical skills such as basic first aid, gardening and food preservation, and manual tool use will be invaluable.
  4. Foster Community Alliances: In a prolonged societal collapse, the most resilient unit will not be the isolated individual but the organized community. Building strong relationships with neighbors and forming community alliances for mutual security, resource pooling, and problem-solving is one of the most critical preparedness steps an individual can take.47

Table 3: Multi-Level Mitigation and Preparedness Framework

Stakeholder LevelPre-Event Mitigation (Hardening & Stockpiling)Immediate Response (First 72 Hours)Long-Term Recovery (Post-72 Hours)
Federal GovernmentMandate & fund grid hardening (EHV transformers, SCADA). Establish Strategic Transformer Reserve. Fund R&D in resilient grid tech.Maintain continuity of government (COG). Command & control strategic military assets. Assess nationwide damage via hardened assets.Coordinate international aid. Manage Strategic Transformer Reserve deployment. Prioritize restoration of critical national infrastructure.
State & Local GovernmentDevelop EMP-protected microgrids for critical facilities. Maintain community stockpiles of fuel, food, water. Integrate EMP into all emergency plans & exercises.Activate Emergency Operations Centers (on backup power). Establish public information points (non-electronic). Secure critical infrastructure (water plants, hospitals).Manage local resource distribution. Coordinate volunteer and mutual aid groups. Facilitate phased restoration of local services.
Critical Infrastructure Owners (Utilities, Telecom, etc.)Install EHV transformer protection (neutral blockers). Deploy E1/E2 surge protection. Maintain “black start” capability and fuel reserves.Execute damage assessment protocols. Isolate damaged grid sections to prevent cascading. Attempt to establish “islands” of power around critical loads.Coordinate with government on restoration priorities. Manage repair/replacement of damaged equipment. Re-establish network connectivity incrementally.
Individuals & FamiliesAssemble 30+ day supply kit (food, water, medicine). Protect vital small electronics in a Faraday cage. Develop a tech-free family emergency plan.Shelter in place; assess immediate safety. Conserve resources (water, food, fuel). Establish contact with neighbors for mutual support.Implement long-term survival skills (water purification, food production). Participate in community security & organization. Assist in local recovery efforts.

If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly contribute towards our continued reporting, please visit our funding page.


Sources Used

  1. Electromagnetic pulse – Wikipedia, accessed September 28, 2025, https://en.wikipedia.org/wiki/Electromagnetic_pulse
  2. Electromagnetic Pulse (EMP) | Anne Arundel County Government, accessed September 28, 2025, https://www.aacounty.org/emergency-management/disaster-preparedness/hazards/electromagnetic-pulse-emp
  3. Electromagnetic Pulse and Geomagnetic Disturbance – CISA, accessed September 28, 2025, https://www.cisa.gov/resources-tools/programs/electromagnetic-pulse-and-geomagnetic-disturbance
  4. Electromagnetic pulse – CT.gov, accessed September 28, 2025, https://portal.ct.gov/-/media/CSC/1_Dockets-medialibrary/1_MEDIA_DO500_600/DO512/MotiontoReopenCT4RT/polzin-2-of-3.pdf
  5. What Would It Take To Survive an EMP Attack? – Mind Matters, accessed September 28, 2025, https://mindmatters.ai/2022/03/what-would-it-take-to-survive-an-emp-attack/
  6. THE THREAT WE FAIL TO ADDRESS | The American Legion, accessed September 28, 2025, https://www.legion.org/information-center/news/magazine/2018/april/the-threat-we-fail-to-address
  7. Electromagnetic Pulse – CISA, accessed September 28, 2025, https://www.cisa.gov/topics/risk-management/electromagnetic-pulse
  8. Nuclear electromagnetic pulse – Wikipedia, accessed September 28, 2025, https://en.wikipedia.org/wiki/Nuclear_electromagnetic_pulse
  9. Office of Radiation … – Washington State Department of Health, accessed September 28, 2025, https://doh.wa.gov/sites/default/files/legacy/Documents/Pubs/320-090_elecpuls_fs.pdf
  10. The Early-Time (E1) High-Altitude Electromagnetic Pulse (HEMP) and Its Impact on the US Power Grid – Stanford, accessed September 28, 2025, http://large.stanford.edu/courses/2019/ph241/rogers1/docs/meta-r-320.pdf
  11. Electromagnetic Pulse or EMP and the E1, E2 and E3 Components …, accessed September 28, 2025, https://www.empshield.com/electromagnetic-pulse-or-emp-and-the-e1-e2-and-e3-components/
  12. 11.3 HEMP (High-altitude Electromagnetic Pulse) – Fiveable, accessed September 28, 2025, https://fiveable.me/electromagnetic-interference-and-compatibility/unit-11/hemp-high-altitude-electromagnetic-pulse/study-guide/8nVEzYT8oMwpRKUF
  13. What is High-Altitude Electromagnetic Pulse (HEMP)? – TSS USA Manufacturing, accessed September 28, 2025, https://www.tssusamfg.com/what-is-high-altitude-electromagnetic-pulse/
  14. What are the Three Types of EMP? – Noordin Etech, accessed September 28, 2025, https://www.emcnoordin.com/what-are-the-three-types-of-emp/
  15. Electromagnetic Pulses – Six Common Misconceptions – Domestic Preparedness, accessed September 28, 2025, https://www.domesticpreparedness.com/commentary/electromagnetic-pulses-six-common-misconceptions
  16. System Electromagnetic Pulse Survivability and Hardening – DAU, accessed September 28, 2025, https://www.dau.edu/sites/default/files/Migrated/CopDocuments/EMP%20Overview.pdf
  17. Secure the Grid Coalition – Department of Energy, accessed September 28, 2025, https://www.energy.gov/sites/default/files/2022-11/Comment%20-%20Secure%20the%20Grid%20Coalition%20-%20SEAB-Oct%202022.pdf
  18. Why does EMP fry electronics, and does turning them off actually protects them (like they do in movies)? : r/askscience – Reddit, accessed September 28, 2025, https://www.reddit.com/r/askscience/comments/3vxup1/why_does_emp_fry_electronics_and_does_turning/
  19. How exactly does an EMP damage electronics? : r/askscience – Reddit, accessed September 28, 2025, https://www.reddit.com/r/askscience/comments/lqtxz/how_exactly_does_an_emp_damage_electronics/
  20. EMP: Threats and Protection Strategies | Electromagnetic Interference Class Notes, accessed September 28, 2025, https://fiveable.me/electromagnetic-interference-and-compatibility/unit-11
  21. Improvised Electromagnetic Pulse Devices – Weapons Effects and Countermeasures, accessed September 28, 2025, https://www.defensemedianetwork.com/stories/improvised-electromagnetic-pulse-devices-4/
  22. Non-Nuclear EMP: Automating the Military May Prove a Real Threat, accessed September 28, 2025, https://irp.fas.org/agency/army/mipb/1997-1/merkle.htm
  23. Non-nuclear EMP Weapons – How Electromagnetic Pulse Attacks …, accessed September 28, 2025, https://science.howstuffworks.com/e-bomb3.htm
  24. Non-Nuclear EMP Weapons: How to Deter China’s Growing Military Might?, accessed September 28, 2025, https://nationalinterest.org/blog/buzz/non-nuclear-emp-weapons-how-deter-chinas-growing-military-might-184713
  25. EMP Commission History | High Frontier, accessed September 28, 2025, http://highfrontier.org/emp-commission-history/
  26. Report of the Commission to Assess the Threat … – EMP Commission, accessed September 28, 2025, https://www.empcommission.org/docs/A2473-EMP_Commission-7MB.pdf
  27. Electromagnetic Pulse: Effects on the U.S. Power Grid, accessed September 28, 2025, https://legacy-assets.eenews.net/open_files/assets/2011/08/26/document_gw_02.pdf
  28. US electricity grid still vulnerable to electromagnetic pulses | Physics Today – AIP Publishing, accessed September 28, 2025, https://pubs.aip.org/physicstoday/article/62/9/24/895534/US-electricity-grid-still-vulnerable-to
  29. Robert A McEntee-A1.docx – Department of Energy, accessed September 28, 2025, https://energy.gov/sites/default/files/2021-06/Robert%20A%20McEntee-A1.docx
  30. Fiber optic communications link performance in EMP and intense light transient environments. Interim report – OSTI, accessed September 28, 2025, https://www.osti.gov/biblio/7227846
  31. The interaction of Electromagnetic Pulse with buried Armoured Fiber Optic Cables, accessed September 28, 2025, https://www.researchgate.net/publication/351485580_The_interaction_of_Electromagnetic_Pulse_with_buried_Armoured_Fiber_Optic_Cables
  32. TDCC’s Security Protection Measures Against Electromagnetic Pulse Attack, accessed September 28, 2025, https://www.tdcc.com.tw/portal/en/publication/business/4028979683acb40f0183ca6ec1210019?eMNum=264
  33. The Electromagnetic Pulse (EMP) Bomb and Its Risks on Islamic Banks: A Case Study of Islamic Banks Operating in Jordan – ResearchGate, accessed September 28, 2025, https://www.researchgate.net/publication/388619717_The_Electromagnetic_Pulse_EMP_Bomb_and_Its_Risks_on_Islamic_Banks_A_Case_Study_of_Islamic_Banks_Operating_in_Jordan
  34. USAF Role in the Electromagnetic Pulse Vulnerability of the United States Critical Infrastructure > Air University (AU) > Wild Blue Yonder, accessed September 28, 2025, https://www.airuniversity.af.edu/Wild-Blue-Yonder/Articles/Article-Display/Article/3674518/usaf-role-in-the-electromagnetic-pulse-vulnerability-of-the-united-states-criti/
  35. Imagining the U.S. Without Power: A Dual-World EMP Exercise – Domestic Preparedness, accessed September 28, 2025, https://domesticpreparedness.com/articles/imagining-the-u-s-without-power-a-dual-world-emp-exercise
  36. Is it just me or is the EMP the most underutilized bomb in science fiction? – Reddit, accessed September 28, 2025, https://www.reddit.com/r/SciFiConcepts/comments/rlyjv7/is_it_just_me_or_is_the_emp_the_most/
  37. The Electromagnetic Threat to the United States: Recommendations for Consequence Management – DTIC, accessed September 28, 2025, https://apps.dtic.mil/sti/trecms/pdf/AD1164809.pdf
  38. High altitude electromagnetic pulse (EMP) attack scenario against the USA, accessed September 28, 2025, https://nuclearweaponsedproj.mit.edu/high-altitude-electromagnetic-pulse-emp-attack-scenario-against-usa/
  39. About the Electromagnetic Pulse (EMP) Mitigation Research Area – Resilient Energy Systems – Sandia National Laboratories, accessed September 28, 2025, https://www.sandia.gov/resilience/about-the-electromagnetic-pulse-emp-mitigation-research-area/
  40. Electromagnetic Pulse (EMP) Protection and Resilience Guidelines for Critical Infrastructure Equipment – CISA, accessed September 28, 2025, https://www.cisa.gov/sites/default/files/publications/19_0307_CISA_EMP-Protection-Resilience-Guidelines.pdf
  41. Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack, accessed September 28, 2025, https://www.empcommission.org/
  42. Reports | EMPCommission.org, accessed September 28, 2025, https://www.empcommission.org/reports.php
  43. Report of the Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack, accessed September 28, 2025, https://www.empcommission.org/docs/empc_exec_rpt.pdf
  44. Coordinating National Resilience to Electromagnetic Pulses – Federal Register, accessed September 28, 2025, https://www.federalregister.gov/documents/2019/03/29/2019-06325/coordinating-national-resilience-to-electromagnetic-pulses
  45. Electromagnetic Pulse Shielding Mitigations – Homeland Security, accessed September 28, 2025, https://www.dhs.gov/sites/default/files/2022-09/22_0902_st_emp_mitigation_best_practices.pdf
  46. National Preparedness | FEMA.gov, accessed September 28, 2025, https://www.fema.gov/emergency-managers/national-preparedness
  47. EMP Attack Prepping Guide – Checklist, FAQs, Novel – Treehouse Dad, accessed September 28, 2025, https://treehousedad.com/emp-attack-prepper-guide/
  48. www.jackery.com, accessed September 28, 2025, https://www.jackery.com/blogs/knowledge/how-to-protect-electronics-from-emp-electromagnetic-pulse#:~:text=An%20EMP%20can%20impact%20vulnerable,protect%20your%20electronics%20from%20EMP.
  49. How to Protect Electronics From EMP Threats – ShopSolar.com, accessed September 28, 2025, https://shopsolarkits.com/blogs/learning-center/how-to-protect-electronics-from-emp-threats
  50. EMP Survival: How to Protect Electronics In a Free DIY Faraday Cage – YouTube, accessed September 28, 2025, https://www.youtube.com/watch?v=3WTHk-tfT3I
  51. 3 Easy Ways to Protect Electronics from an Electromagnetic Pulse – wikiHow, accessed September 28, 2025, https://www.wikihow.com/Protect-Electronics-from-an-Electromagnetic-Pulse
  52. Are You Ready? An In-Depth Guide to Citizen … – Ready.gov, accessed September 28, 2025, https://www.ready.gov/sites/default/files/2021-11/are-you-ready-guide.pdf
  53. Preparedness Emergency Preparedness – Anchorage – Muni.org, accessed September 28, 2025, https://www.muni.org/Departments/OEM/Prepared/pages/default.aspx

The Unending Conflict: How the Character of Warfare Has Transformed in the 21st Century

The fundamental nature of conflict as a political instrument, a violent means to compel an adversary to fulfill one’s will, remains an immutable feature of international relations. Yet, over the past 50 years, the character of this conflict—the domains in which it is fought, the tools employed, and the very definitions of victory and defeat—has undergone a radical transformation. The global strategic landscape has shifted from a state of episodic, declared wars, punctuated by periods of discernible peace, to a condition of persistent, undeclared, multi-domain competition. The clear delineation between war and peace has not merely blurred; it has been deliberately eroded and is now actively exploited as a domain of strategic ambiguity.1

This report analyzes this fundamental evolution in the character of conflict. It begins by establishing a strategic baseline circa 1975, a world defined by the bipolar certainty of the Cold War. In that era, the existential threat of a massive conventional and nuclear exchange between two superpowers paradoxically forced competition into the shadows, creating and refining the playbook for today’s hybrid conflicts. The analysis then traces the profound technological and doctrinal shifts of the post-Cold War era, marked by the “Revolution in Military Affairs” (RMA), which cemented U.S. conventional military dominance but also accelerated the turn toward asymmetric strategies by its rivals.

Finally, the report examines the current state of international competition, arguing that the major powers are already engaged in a form of “undocumented conflict.” This conflict is waged continuously across new and expanded domains—economic, cyber, and informational—and is increasingly shaped by emerging technologies, most notably artificial intelligence (AI). The ultimate battlefield has expanded from physical territory to encompass critical infrastructure, financial systems, and the cognitive domain of public perception itself. The central challenge for national security in the 21st century is no longer simply preparing for a future war, but navigating the unending conflict that is already here.

Section I: The Cold War Baseline – A World of Bipolar Certainty (c. 1975)

Fifty years ago, the strategic environment was defined by a stark, bipolar clarity. The world was divided into two ideological blocs, led by the United States and the Soviet Union, locked in a competition underwritten by the threat of global thermonuclear war.5 This overarching threat of Mutually Assured Destruction created a paradoxical stability at the strategic level. While it made direct, large-scale conventional war between the superpowers unthinkable, it did not eliminate conflict. Instead, it channeled geopolitical competition into deniable, indirect, and asymmetric arenas, creating an incubator for the hybrid methods that define the modern era.

The Conventional Battlefield – The Fulda Gap and the North German Plain

The central front of the Cold War was Europe, where two of the most powerful military alliances in history stood poised for a cataclysmic conventional battle. Military doctrine and force posture on both sides were overwhelmingly focused on this potential high-intensity conflict.

NATO’s strategy was formally codified in 1967 as “Flexible Response.” This doctrine moved away from the previous policy of “Massive Retaliation” and envisioned a tiered response to Warsaw Pact aggression. An attack would be met first with a direct conventional defense, followed by the deliberate and controlled escalation to tactical, and finally strategic, nuclear weapons if necessary.6 The goal was to possess a credible deterrent at every level of the escalatory ladder. NATO’s planning called for its forces to be capable of sustaining a conventional defense in Central Europe for approximately 90 days against a full-scale invasion, allowing time for political negotiation or the decision to escalate.6 However, a sense of unreality pervaded these preparations; while doctrine called for a seamless transition from conventional to nuclear operations, all practical attempts to devise tactics for actually fighting and winning on a nuclear battlefield had proven futile.8

The Warsaw Pact, guided by Soviet military thought, held a fundamentally offensive-oriented doctrine. Soviet theorists believed that the defensive was an inherently weaker form of warfare and that decisive victory could only be achieved through the offense.9 Their plans were officially framed as a massive “counterattack” that would follow the repulse of an initial NATO assault. This offensive would depend on the overwhelming numerical superiority of Soviet-style forces, particularly their vast tank armies, to break through NATO lines along axes like the Fulda Gap and the North German Plain and rapidly advance deep into Western Europe.9 In 1975, the Warsaw Pact enjoyed a considerable numerical advantage in Central Europe, particularly in tanks and artillery, and held the geostrategic advantage of “interior lines,” which allowed for the rapid transfer of forces between fronts.10

This doctrinal standoff fueled an intense technological arms race in conventional weaponry. The mid-1970s saw the introduction of a new generation of military hardware. Tanks were upgraded with stabilized turrets and electronic fire controls, while armored personnel carriers evolved into heavier infantry fighting vehicles from which troops could fight.8 The development of potent anti-tank guided missiles (ATGMs) forced armored divisions to adopt closer cooperation between tanks and infantry.8 Armies on both sides became increasingly motorized and mechanized. This period also saw the first significant use of remotely piloted vehicles (RPVs), or drones, for surveillance and target acquisition, and the maturation of the attack helicopter as a dedicated “tank-busting” platform, a lesson learned from its massive use in Vietnam.8 This unprecedented faith in technology led to a battlefield where the number and quality of electronic systems became a primary index of an army’s modernity.8 For the U.S. Army, this era was one of doctrinal ferment, with its focus shifting cyclically between conventional warfare in Europe, the specter of nuclear conflict, and the immediate lessons of counterinsurgency in Vietnam, resulting in a tactical doctrine more complex than at any other point in its history.12

The Shadow War – Proxy Conflicts and Clandestine Operations

While the armies in Europe planned for a war that never came, the actual superpower conflict was being fought—brutally and continuously—in the shadows and across the developing world. The high risk of nuclear escalation made direct confrontation too dangerous, turning proxy wars and clandestine operations into the primary instruments of geopolitical competition.14

Proxy wars were the main event of the Cold War, accounting for an estimated 20 million deaths, almost all of which occurred in the “Third World”.14 These conflicts were ostensibly local or regional disputes, but they became battlegrounds for the larger ideological struggle between capitalism and communism.16 The superpowers avoided direct military clashes but fueled the fighting by providing massive amounts of funding, weaponry, training, and political backing to their respective surrogate forces.14 The Vietnam War, which saw the United States supporting South Vietnam against the Soviet- and Chinese-backed North, was the most devastating example.5 Other major proxy conflicts of the era included the Angolan Civil War, where the Soviet Union and Cuba backed the MPLA against U.S.-supported factions 18, and the Ogaden War, where the superpowers switched allegiances, with the Soviets ultimately backing Ethiopia against U.S.-supported Somalia.21 These interventions allowed the superpowers to test strategies and military hardware while avoiding a direct “hot war,” but they left a legacy of devastation and long-term instability in the regions where they were fought.16

Parallel to these overt-by-proxy conflicts was a relentless, clandestine war fought by the intelligence agencies of both blocs. The CIA and the KGB engaged in a global struggle for influence through espionage, subversion, and covert action. The CIA’s activities included political subversion, such as providing financial support to officers plotting against Chile’s Salvador Allende before the 1973 coup, and paramilitary operations, such as arming and training mujahideen guerrillas in Afghanistan in the following decade.23 The agency also engaged in numerous, and often bizarre, assassination plots against figures like Fidel Castro.23 Espionage was rampant, with both sides dedicating immense resources to stealing military-industrial secrets and recruiting high-level agents within the other’s government and intelligence services.23 The KGB was notoriously effective in this domain, having infiltrated Western intelligence agencies to the point where the CIA was often “utterly ignorant of Soviet espionage operations” against it.25

The KGB, for its part, conducted what it termed “executive actions” or “wet work” (liquidations) through its secretive 13th Department.26 These operations targeted defectors, dissidents, and other “ideological opponents” abroad with the aim of silencing anti-Soviet voices and sowing fear within émigré communities.26 To maintain plausible deniability, the KGB often employed exotic methods, such as the ricin-filled pellet fired from a modified umbrella used to kill Bulgarian dissident Georgi Markov in London in 1978, and frequently relied on the intelligence services of allied Eastern Bloc nations to carry out the “dirty work”.26 In Africa, Soviet clandestine operations were particularly large-scale, as the KGB and GRU (military intelligence) worked to counter U.S. influence, supply arms to anti-government groups, and exploit the relatively weak capabilities of local security services to establish intelligence networks.27

This history reveals a significant divergence between the war that was being planned for and the war that was actually being waged. While the formal military doctrines of both NATO and the Warsaw Pact were fixated on a decisive, large-scale conventional battle in Europe, the true character of superpower conflict was predominantly irregular, clandestine, and fought through third parties. This created a deep reservoir of institutional knowledge and operational expertise in unconventional warfare, political subversion, and deniable operations within the intelligence and special operations communities. This expertise, developed in the shadows of the Cold War, would prove highly relevant in the multipolar, ambiguous security environment that followed.

Section II: The Technological Rupture – The Revolution in Military Affairs (RMA)

Beginning in the 1970s and accelerating dramatically after the end of the Cold War, a suite of new technologies catalyzed a fundamental shift in the conduct of conventional warfare. This “Revolution in Military Affairs” (RMA) was characterized by the integration of advanced surveillance, precision-guided weaponry, and networked command and control, creating an era of unparalleled U.S. military dominance.31 However, this very dominance had a profound and unintended consequence: it rendered symmetrical, conventional warfare an untenable option for potential adversaries, thereby accelerating their pivot toward the asymmetric and hybrid methods that now define the contemporary conflict landscape.

The Dawn of Precision and Stealth

Two technologies in particular formed the core of the RMA: precision-guided munitions and stealth.

Precision-Guided Munitions (PGMs), or “smart bombs,” fundamentally altered the calculus of air power. The ability to guide a weapon to its target with a high degree of accuracy represented a quantum leap in lethality and efficiency.33 During the Vietnam War, PGMs proved to be up to 100 times more effective than their unguided “dumb bomb” counterparts.35 This was starkly illustrated by the destruction of the Thanh Hoa Bridge in North Vietnam in 1972. The bridge, a critical supply line, had withstood hundreds of sorties and the loss of numerous aircraft over several years of conventional bombing, but was finally dropped by a small number of aircraft using laser-guided bombs.33 The 1991 Persian Gulf War served as the global debut for this capability on a massive scale. Coalition forces demonstrated that PGMs could destroy Iraqi armored vehicles with pinpoint accuracy in a process pilots dubbed “tank plinking”.33 Overall, while guided munitions accounted for only 9% of the total ordnance used in the war, they were responsible for 75% of all successful hits, proving 35 times more likely to destroy their target per weapon dropped than unguided bombs.33 This shifted the logic of bombing from achieving effects through mass to achieving them through precision.34

Stealth Technology provided the means to deliver these precision weapons by rendering aircraft nearly invisible to enemy radar. Platforms like the F-117 Nighthawk and the B-2 Spirit bomber were designed with faceted shapes and coated in radar-absorbent materials to reduce their radar cross-section (RCS) by several orders of magnitude.37 This innovation effectively negated decades of investment by adversaries in sophisticated integrated air defense systems.39 Like PGMs, stealth technology had its coming-out party during the Gulf War. F-117s flew with impunity over Baghdad, one of the most heavily defended cities in the world at the time, and decimated critical Iraqi command and control nodes, air defense sites, and other high-value targets. No stealth aircraft were lost in the conflict.39

The true power of the RMA, however, lay not in these individual technologies but in their integration into a networked “System of Systems”.40 This concept linked intelligence, surveillance, and reconnaissance (ISR) platforms—such as satellites, spy planes, and drones—with command, control, and communications (C3) networks and precision-strike assets.31 This synergy created a virtuous cycle: ISR assets could find a target, the network could rapidly transmit that information to a decision-maker and a shooter, and a precision weapon could destroy the target with high probability. This integration of technology, doctrine, and organization produced a dramatic increase in military effectiveness.31

Doctrinal Transformation and Asymmetric Consequences

This technological revolution was accompanied by a doctrinal one within the U.S. military. Reeling from the experience in Vietnam and absorbing the lessons of the 1973 Yom Kippur War—where modern ATGMs and surface-to-air missiles (SAMs) inflicted heavy losses on Israeli armor and aircraft—the U.S. Army undertook a profound intellectual reassessment.41

In 1976, the Army published Field Manual 100-5, Operations, which codified a new doctrine known as “Active Defense”.44 This doctrine was a radical departure from previous thinking, focusing almost exclusively on a high-intensity, conventional battle against the Soviet Union in Europe.44 It was heavily focused on firepower, emphasizing the need to “win the first battle of the next war” by attriting the numerically superior Warsaw Pact forces with technologically advanced weaponry.45 Active Defense was controversial, however, and criticized for being too defensive and ceding the initiative to the enemy.41

This critique led to another doctrinal evolution. In 1982, the Army released a new version of FM 100-5 that introduced the concept of AirLand Battle.41 This doctrine was more aggressive and maneuver-oriented, designed specifically to defeat the Soviet operational concept of echeloned attacks.43 AirLand Battle envisioned an “extended battlefield” where U.S. forces would not just defend against the enemy’s front-line troops but would use integrated air power and long-range fires to attack and disrupt their follow-on echelons, command posts, and logistics deep in the rear.42 This required unprecedented levels of cooperation between the Army and the Air Force and was a perfect doctrinal match for the emerging technologies of the RMA.48

The stunning success of this new American way of war in the 1991 Gulf War had a chilling effect on potential adversaries. It became clear that challenging the United States in a conventional, state-on-state conflict was a recipe for swift and certain defeat. This reality, however, did not lead to a more peaceful world. Instead, it created a “compelling logic for states and non-state actors to move out of the traditional mode of war”.51 Unable to compete symmetrically, adversaries were forced to invest in asymmetric capabilities and strategies that could bypass or neutralize U.S. technological strengths.32 This strategic adaptation accelerated the global shift toward the very hybrid, irregular, and grey-zone methods that had been practiced during the Cold War. The RMA, in effect, made conventional war obsolete for most actors, thereby making unconventional conflict the new norm. The U.S. military had perfected a doctrine for fighting a specific adversary in a specific way, just as that adversary collapsed and the fundamental character of conflict was shifting beneath its feet.

Section III: The Expanded Battlefield – Hybrid Actors in New Domains

The end of the Cold War and the subsequent era of U.S. conventional military primacy did not end great power competition; it merely displaced it. Conflict migrated from the physical battlefield into non-physical and previously non-militarized domains. We have entered a state of persistent, low-level conflict where the distinction between peace and war is not simply blurred but is actively manipulated as a strategic tool. Adversaries now operate in a “grey zone,” employing hybrid methods to achieve strategic objectives without crossing the threshold of overt warfare.

The New Domains of Contestation

The modern battlefield is no longer confined to land, sea, and air. It has expanded to encompass the global economic system, digital networks, and the critical infrastructure that underpins modern society.

Economic Warfare has evolved into a primary instrument of statecraft, a sophisticated method of coercion that leverages global interdependence as a weapon.52 The “weaponization of finance” allows states, particularly the United States with its control over the global dollar-based financial system, to “cripple [countries] financially” through targeted sanctions against individuals, companies, and entire sectors of an economy.52 The unprecedented sanctions imposed on Russia following its 2022 invasion of Ukraine, which froze central bank assets and cut off major banks from international payment systems, demonstrate the power of this tool.56 Similarly, the “weaponization of trade” involves using tariffs, embargoes, and regulatory barriers to induce policy changes in a target state by exploiting economic dependencies.53 China’s campaign of economic coercion against Australia, which targeted key exports like wine, barley, and coal after Australia called for an inquiry into the origins of COVID-19, is a prime example of this strategy in action.59 Russia has also long used its position as a major energy supplier to Europe as a tool of political leverage, manipulating gas prices and threatening supply cutoffs to achieve foreign policy goals.62 This trend transforms economic interdependence from a source of mutual benefit into a critical vulnerability.55

Cyber Warfare has matured from a tool of espionage into a distinct domain of military operations. The watershed moment was the 2010 Stuxnet attack, a highly sophisticated computer worm believed to be a joint U.S.-Israeli operation. Stuxnet infiltrated Iran’s Natanz nuclear facility and caused physical damage to its uranium enrichment centrifuges, demonstrating for the first time that malicious code could produce kinetic effects.67 Since then, state-sponsored cyber operations have become commonplace. Advanced Persistent Threat (APT) groups linked to the governments of China, Russia, Iran, and North Korea now routinely conduct campaigns against adversaries.71 Their objectives range from espionage and intellectual property theft to prepositioning for future disruptive attacks on critical infrastructure, including telecommunications, energy grids, and transportation networks.74

Critical Infrastructure has become a new front line. The physical systems that support the global economy and information flow are now considered legitimate targets for grey-zone aggression. Undersea cables, which carry an estimated 99% of all transoceanic digital communications and trillions of dollars in financial transactions daily, are a point of extreme vulnerability.78 This vast network is susceptible to damage from both accidental causes, like fishing trawlers and dragging anchors, and deliberate sabotage.80 State actors, particularly Russia, are developing the capabilities to target these cables. Russia’s Main Directorate for Deep-Water Research (GUGI) operates specialized submarines and surface vessels, such as the

Yantar, which are equipped for deep-sea operations and have been observed loitering near critical cable routes.78 Recent incidents in the Baltic Sea, where data cables and a gas pipeline were damaged by a Chinese-flagged vessel dragging its anchor, have heightened concerns about coordinated hybrid attacks.83 The key strategic advantage of such attacks is the challenge of attribution. It is exceptionally difficult to prove that a cable cut by a commercial vessel was an intentional act of state-sponsored sabotage rather than an accident, providing the aggressor with plausible deniability and complicating any response by NATO or other targeted nations.78

The Doctrine of Ambiguity – Hybrid and Grey-Zone Warfare

To describe this new era of persistent, ambiguous conflict, analysts have developed two interrelated concepts: grey-zone conflict and hybrid warfare.

The Grey Zone is the conceptual space in which this competition occurs. It is defined by the Center for Strategic and International Studies (CSIS) as “the contested arena somewhere between routine statecraft and open warfare”.86 It is a realm of coercive and subversive activity deliberately designed to remain below the threshold that would provoke a conventional military response.1 In this space, revisionist powers like Russia and China use a range of non-military and quasi-military tools—including information operations, political and economic coercion, cyber operations, and the use of proxies—to gradually achieve strategic gains and weaken adversaries without triggering a full-scale war.86

Hybrid Warfare is the methodology employed within the grey zone. It is not a new form of warfare, but rather the integrated and synchronized application of multiple instruments of power—conventional and unconventional, military and non-military, overt and covert—in a unified campaign to achieve a strategic objective.89 Russia’s 2014 annexation of Crimea and subsequent intervention in the Donbas region of Ukraine is the archetypal modern example. This operation seamlessly blended the use of deniable special forces (“little green men”), local proxy militias, economic pressure, cyberattacks, and a sophisticated, multi-platform disinformation campaign to achieve its goals before the West could formulate a coherent response.51

This environment has also transformed the nature of Proxy Warfare. The Cold War model of two superpowers manipulating client states has been replaced by a far more complex, multipolar system.96 Today’s sponsors include not only great powers but also ambitious regional actors like Iran, Saudi Arabia, Turkey, and the UAE. The proxies themselves are no longer just state armies but a diverse ecosystem of non-state actors, including militias, transnational terrorist groups, private military companies, and political movements, many with their own ideologies and agendas that may diverge from those of their sponsors.96 The proliferation of advanced technology, from anti-tank missiles to armed drones and secure communications, has made these proxy forces more lethal and capable than ever before.101 Modern proxy battlefields, such as the Syrian civil war, are characterized by a dizzying array of local and international actors, with multiple sponsors backing various factions, creating a complex and brutal multi-sided conflict.14 Iran’s long-standing support for Hezbollah is a prime example of a modern proxy relationship, where financial aid, weapons, and training have cultivated a formidable non-state actor that serves as a key instrument of Iranian foreign policy.106

The defining trend of this new era is the normalization of hostile acts. Actions that would have once been considered casus belli—such as sabotage of critical national infrastructure, systemic economic coercion, or major cyberattacks against government and industry—are now treated as features of routine international competition. This has shifted the nature of conflict from an episodic state of declared war to a persistent condition of undeclared competition. In this grey zone, ambiguity is not a byproduct of conflict; it is a central objective and a strategic weapon. The ability to conduct a hostile act while making attribution difficult or impossible paralyzes the victim’s decision-making process and allows the aggressor to act with a degree of impunity.

FeatureUnited States / WestRussian FederationPeople’s Republic of China
Doctrine NameGrey-Zone / Hybrid Warfare ResponseNew Generation Warfare / Gerasimov DoctrineThree Warfares / Systems Destruction Warfare
Primary ObjectiveMaintain status quo; deter/counter aggression; manage escalationRevise post-Cold War order; re-establish sphere of influence; destabilize adversariesAchieve regional hegemony; displace U.S. influence; unify Taiwan; secure resource access
Key Tools / MethodsSanctions; support to partners/proxies; cyber operations; special operations forces; freedom of navigation operations (FONOPs)Information-psychological warfare; cyber operations; economic coercion (esp. energy); use of deniable special forces and proxies; political subversionPublic opinion warfare; psychological warfare; legal warfare (lawfare); economic coercion (trade, investment); cyber espionage; maritime militia
Role of MilitaryPrimarily a deterrent and response force; kinetic action is a last resort, often through SOF or proxiesConcealed military means supplement non-military efforts; special forces (Spetsnaz) and conventional forces are used for intimidation and decisive actionMilitary presence (PLA) creates physical leverage; used for intimidation and coercion (grey-zone tactics); prepared for decisive conventional action if necessary
Role of InformationReactive; focus on countering disinformation and attributionCentral; aims to alter consciousness, create domestic chaos in target state, and achieve “information superiority” before kinetic actionFoundational; aims to control the narrative, shape domestic and international opinion, demoralize the adversary, and legitimize CCP actions
Sources8689111

Section IV: The Cognitive Domain – The Battle for Perception

Perhaps the most fundamental transformation in the character of conflict over the past half-century has been the elevation of the human mind and collective public perception as a primary, and often decisive, battlefield. The strategic objective is increasingly not to defeat an enemy’s military forces, but to erode their society’s cohesion, paralyze their political will, and manipulate their very understanding of reality. This is narrative warfare, and its tools have evolved from state-controlled broadcast media to a global, AI-powered, social media-driven disinformation engine.

The Weaponization of Media and Social Media

The power of modern media to shape conflict was evident throughout the late 20th century, but the rise of the internet and social media in the 21st century created a new paradigm.

The Arab Spring, beginning in late 2010, was the first major geopolitical event to showcase the power of social media as a tool for political mobilization. Activists across Tunisia, Egypt, and other nations used platforms like Facebook, Twitter, and YouTube to organize protests, share information about government brutality, and bypass state-controlled media censorship to broadcast their message to a global audience.115 In Egypt, the “We Are All Khaled Said” Facebook page became a rallying point for a movement that ultimately toppled a decades-old regime.117 This demonstrated the potential for these new platforms to empower organic, bottom-up movements and challenge authoritarian control.120

However, state actors quickly recognized the power of these tools and began to co-opt them for their own purposes, leading to the industrialization of influence operations. The most prominent example is Russia’s Internet Research Agency (IRA), a state-sponsored “troll farm” dedicated to conducting online influence operations.121 The IRA’s tactics, revealed in detail following its interference in the 2016 U.S. presidential election, involve a sophisticated, multi-layered approach. Operators create and manage vast networks of fake social media accounts, or “bots,” designed to impersonate real citizens.122 These accounts are used to amplify divisive narratives, spread disinformation, and infiltrate online communities on both the political left and right, with the overarching goal of exacerbating existing social divisions and eroding trust in democratic institutions.123 The IRA’s methods include “narrative switching,” where accounts post non-political content most of the time to build a credible persona before injecting targeted political messages, and organizing real-world events, such as opposing protests, to bring online division into the physical world.122

This weaponization of information is not merely opportunistic; it is now a core component of state military doctrine. China’s concept of the “Three Warfares” explicitly codifies this approach. It includes “public opinion warfare” to dominate narratives and ensure domestic and international support, “psychological warfare” to demoralize an adversary and weaken their will to fight, and “legal warfare” (lawfare) to use international and domestic law to challenge the legitimacy of an opponent’s actions.114 Similarly, Russia’s doctrine of

“New Generation Warfare” (often associated with General Valery Gerasimov) views “information-psychological warfare” as a critical tool for achieving strategic goals by creating domestic chaos within a target state, often before any military action is taken.3 The Syrian Civil War serves as a stark case study of this new reality, where a brutal physical conflict has been accompanied by a relentless narrative war waged by all factions—the Assad regime, various rebel groups, and their respective foreign backers (including Russia, Iran, and Western powers)—each using traditional and social media to frame the conflict, legitimize their actions, and demonize their opponents.125

The AI-Powered Disinformation Engine

If social media provided the platform for modern information warfare, artificial intelligence is now providing the engine, promising to “supercharge” disinformation campaigns by dramatically increasing their speed, scale, and sophistication.130

The most alarming development is the rise of deepfakes and other forms of synthetic media. Using advanced AI techniques like generative adversarial networks (GANs), malicious actors can now create highly realistic but entirely fabricated audio and video content.132 This technology makes it possible to convincingly impersonate political leaders, military officials, or other public figures, having them appear to say or do things they never did.134 The national security implications are profound. A well-timed deepfake video could be used to fabricate a scandal to influence an election, spread false orders to military units to create chaos, or create a fake atrocity to serve as a pretext for war.135 An AI-generated image of an explosion at the Pentagon in 2023 briefly caused a dip in the U.S. stock market, demonstrating the real-world impact of such fabrications.137

Beyond deepfakes, AI is being used to automate and personalize propaganda on an unprecedented scale. Large language models can now generate false news articles and social media posts that are often indistinguishable from human-written content.138 These tools can be used to create tailored messages designed to appeal to the specific psychological vulnerabilities of target audiences, and to automate the operation of vast bot networks that can amplify these messages across multiple platforms.130 This dramatically lowers the barrier to entry for conducting large-scale influence operations, making these powerful tools available not just to states, but to a wide range of malicious actors.138

The cumulative effect of this AI-driven information warfare is not simply the spread of more falsehoods. Its ultimate strategic objective is the erosion of trust itself. The goal is not necessarily to make people believe in a specific lie, but to destroy their confidence in all sources of information—in the media, in government institutions, in scientific experts, and ultimately, in their own ability to discern fact from fiction. This fosters a state of what can be called “epistemic exhaustion,” where citizens become so overwhelmed by the flood of conflicting information that they disengage from civic life, making them passive and more susceptible to manipulation. A population that trusts nothing cannot form the consensus required to recognize and counter a national security threat, thereby achieving an adversary’s goal of societal paralysis without firing a single shot.

Section V: The Next Revolution – The AI-Enabled Battlespace

Just as the integration of precision, stealth, and networking catalyzed a Revolution in Military Affairs at the end of the 20th century, artificial intelligence is now driving another profound transformation in the character of warfare. This emerging revolution is centered on three key elements: the compression of decision-making to machine speed, the proliferation of intelligent autonomous systems, and the dominance of data as the central resource of military power. This shift promises unprecedented efficiency but also introduces complex new risks of escalation and loss of human control.

Accelerating the Kill Chain – AI in Intelligence and C2

Modern military operations are drowning in data. A torrent of information flows from satellites, drones, ground sensors, and countless other sources, far exceeding the capacity of human analysts to process it in a timely manner.140 Artificial intelligence is becoming the essential tool for turning this data overload into a decisive advantage.

The U.S. Department of Defense’s Project Maven (officially the Algorithmic Warfare Cross-Functional Team) is a flagship initiative in this area. Launched in 2017, Maven employs machine learning algorithms to automatically analyze full-motion video from drones and other ISR platforms.142 The system can detect, classify, and track objects of interest—such as vehicles, buildings, or groups of people—freeing human analysts from the tedious task of watching countless hours of footage and allowing them to focus on higher-level analysis and decision-making.144 This capability dramatically accelerates the intelligence cycle, reducing the time it takes to find and validate a target from hours or days to minutes or even seconds.146

This accelerated intelligence is being fed into increasingly AI-enhanced Command and Control (C2) systems. The objective is to create a seamless, networked architecture that connects any sensor to any decision-maker and any weapon system on the battlefield. This concept is at the heart of the U.S. military’s overarching strategy for Joint All-Domain Command and Control (JADC2).147 AI algorithms within these C2 systems can fuse data from disparate sources to create a unified, real-time operational picture, predict enemy movements, analyze potential courses of action, and recommend optimal responses to commanders.140 The ultimate goal is to radically compress the “sensor-to-shooter” timeline, enabling forces to act at a tempo that overwhelms an adversary’s ability to react.

This pursuit of AI-driven military advantage has ignited a fierce technological competition, often described as an AI arms race, primarily between the United States and China.150 China has made AI a national priority and is pursuing a strategy of “military-civil fusion” to systematically leverage the expertise and innovation of its burgeoning private tech sector and universities for military modernization.111 Beijing’s goal is to achieve “intelligentized warfare,” using AI to achieve “decision dominance” through a highly integrated “systems warfare” approach.111 While the United States is widely seen as maintaining a lead in developing the most advanced, cutting-edge AI models, China’s state-directed approach gives it an advantage in the broad-scale adoption and practical integration of AI technologies across its military and economy.153

The Proliferation of Autonomy

The most visible and disruptive impact of AI on the battlefield is the proliferation of autonomous and semi-autonomous systems, particularly unmanned aerial vehicles (UAVs).

The drone revolution has unfolded in two parallel tracks. On one end of the spectrum are sophisticated, reusable military drones like the Turkish Bayraktar TB2. In conflicts such as the 2020 Nagorno-Karabakh war, the TB2 proved devastatingly effective, combining long-endurance surveillance with precision-guided munitions to destroy Armenian air defenses, armor, and artillery, effectively dominating the battlefield.154 On the other end of the spectrum is the widespread use of cheap, commercially available, and often disposable drones, a trend brought to the forefront by the war in Ukraine. Both sides have deployed thousands of small quadcopters for reconnaissance and, more significantly, as first-person-view (FPV) “kamikaze” drones capable of destroying multi-million-dollar tanks and other armored vehicles.157 This has created a new reality of attritional drone warfare, where the low cost and sheer quantity of these systems can overwhelm even sophisticated defenses.159

This trend points toward the next frontier of military autonomy: Lethal Autonomous Weapon Systems (LAWS), colloquially known as “killer robots.” These are weapon systems that, once activated, can independently search for, identify, target, and kill human beings without direct human control over the final lethal decision.150 The development of LAWS raises profound legal and ethical challenges. Organizations like the International Committee of the Red Cross (ICRC) have raised serious concerns about whether such systems can comply with the core principles of International Humanitarian Law (IHL), such as distinction, proportionality, and precaution.163 Key questions revolve around accountability—who is responsible when an autonomous weapon makes a mistake?—and the fundamental ethical principle of “meaningful human control” over the use of lethal force.166 In response to these concerns, the ICRC and numerous other bodies have called for the negotiation of new, legally binding international rules to prohibit unpredictable autonomous systems and those that target humans directly.162

The relentless pace of technological development is creating a strategic environment where the speed of combat is poised to exceed the limits of human cognition. As AI-enabled C2 systems compress decision cycles to seconds and autonomous weapons are designed to react instantly to threats, conflicts between two AI-enabled militaries may be fought and decided at machine speed, potentially before human commanders can fully comprehend the situation or intervene. This creates an inescapable and dangerous strategic logic: to remain competitive, militaries feel compelled to delegate more and more decision-making authority to AI systems, despite the profound ethical concerns and the immense risk of rapid, unintended escalation.171

Furthermore, the proliferation of cheap, effective, and increasingly autonomous systems is upending the traditional military-technical balance. The war in Ukraine has vividly demonstrated the problem of “cost asymmetry,” where inexpensive drones, costing only a few thousand dollars, can neutralize or destroy highly valuable military assets like tanks and warships that cost millions.158 Defending against swarms of these cheap drones with expensive, sophisticated air defense missiles is an economically unsustainable proposition.160 This challenges the entire Western military model, which has for decades relied on a relatively small number of expensive, technologically superior platforms. The future battlefield may not be dominated by the nation with the most advanced fighter jet, but by the one that can deploy the largest, most adaptable, and most intelligent swarm of inexpensive, autonomous, and attritable systems.

Conclusion: A State of Undocumented, Perpetual Conflict

The evidence of the past 50 years is conclusive: while the fundamental nature of war as a political act has not changed, its character has been irrevocably transformed. The clear, binary world of the Cold War, with its defined states of “peace” and “war,” has been replaced by a state of persistent, multi-domain competition. The lines have not just blurred; they have been erased and weaponized. The major powers are not on the brink of a new conflict; they are, and have been for some time, engaged in one. It is an undocumented, undeclared, and unending conflict fought not primarily with massed armies on physical battlefields, but with a new arsenal of hybrid tools across a vastly expanded battlespace.

This transformation has been driven by a confluence of factors. The nuclear stalemate of the Cold War forced competition into the shadows, normalizing the use of proxies, covert action, and political subversion. The subsequent Revolution in Military Affairs created such a profound U.S. advantage in conventional warfare that it compelled adversaries to abandon symmetrical competition and double down on these asymmetric, hybrid methods. The globalization of finance and information, coupled with the proliferation of cyber capabilities and advanced technologies, provided the new domains—economic, digital, and cognitive—in which this competition would be waged.

Today, Russia, China, the United States, and other powers are engaged in a constant struggle for advantage in the grey zone. This is a conflict fought with sanctions designed to cripple economies, with cyberattacks that probe critical infrastructure, with deniable sabotage of undersea cables, with proxy forces that allow for influence without attribution, and, most pervasively, with information campaigns designed to fracture societies from within.

The advent of artificial intelligence is now catalyzing the next revolution, one that promises to accelerate the speed of conflict beyond human comprehension. AI is transforming intelligence analysis, command and control, and the very nature of weaponry, pushing toward a future of algorithmic warfare and autonomous systems. This raises the specter of a battlefield where decisions are made in microseconds and escalation can occur without deliberate human intent.

In this new era, the traditional concept of “victory” is becoming obsolete. Victory is no longer solely defined by a signed treaty or a captured capital. It may be the successful paralysis of a rival’s economy through financial warfare 55; the quiet degradation of their military readiness through sustained cyber espionage 76; the fracturing of their political system through a multi-year disinformation campaign 123; or the achievement of a decisive technological breakthrough in AI that renders an adversary’s entire military doctrine irrelevant.150

The greatest danger of this new paradigm is not necessarily a deliberate, cataclysmic war, but the potential for uncontrollable escalation out of the grey zone. A miscalculation in a proxy conflict, a cyberattack with unforeseen cascading effects, or the autonomous action of an AI-powered weapon system could trigger a rapid spiral into a conventional conflict that no party initially intended. The central challenge for national security in the 21st century is therefore twofold: not only to prepare to win the wars of the future, but to learn how to successfully navigate the unending, undocumented conflict that is already here.


If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly contribute towards our continued reporting, please visit our funding page.


Sources Used

  1. Grey-zone (international relations) – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Grey-zone_(international_relations)
  2. The Blurring Of War And Peace: Hybrid Warfare – Analysis …, accessed September 30, 2025, https://www.eurasiareview.com/19042021-the-blurring-of-war-and-peace-hybrid-warfare-analysis/
  3. The Russian Understanding of War: Blurring the Lines Between War and Peace, accessed September 30, 2025, https://ndupress.ndu.edu/Media/News/News-Article-View/Article/2131233/the-russian-understanding-of-war-blurring-the-lines-between-war-and-peace/
  4. The Opposite of War is Not Peace – Futurist Speaker, accessed September 30, 2025, https://futuristspeaker.com/future-scenarios/the-opposite-of-war-is-not-peace-2/
  5. Cold War – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Cold_War
  6. Historical Documents – Office of the Historian, accessed September 30, 2025, https://history.state.gov/historicaldocuments/frus1969-76v41/d52
  7. NATO and The Cold War | Imperial War Museums, accessed September 30, 2025, https://www.iwm.org.uk/learning/resources/nato-and-the-cold-war
  8. Tactics – Conventional War, Terrorism, Strategy – Britannica, accessed September 30, 2025, https://www.britannica.com/topic/tactics/From-conventional-war-to-terrorism
  9. What was Warsaw Pact defence strategy if NATO invaded them? : r/WarCollege – Reddit, accessed September 30, 2025, https://www.reddit.com/r/WarCollege/comments/1leggj2/what_was_warsaw_pact_defence_strategy_if_nato/
  10. 13. National Intelligence Estimate 11-14-75, Washington, September 4, 1975. – Historical Documents – Office of the Historian, accessed September 30, 2025, https://history.state.gov/historicaldocuments/frus1969-76ve15p1/d13
  11. NATO and Warsaw Pact: Force Comparisons, accessed September 30, 2025, https://www.nato.int/cps/en/natohq/declassified_138256.htm
  12. The Evolution of US Army Tactical Doctrine, 1946-76, accessed September 30, 2025, https://www.armyupress.army.mil/Portals/7/combat-studies-institute/csi-books/doughty.pdf
  13. The Evolution of US Army Tactical Doctrine, 1946-76 (Leavenworth Papers, Number 1), accessed September 30, 2025, https://apps.dtic.mil/sti/citations/ADA211791
  14. Proxy wars, explained | FairPlanet, accessed September 30, 2025, https://www.fairplanet.org/story/what-are-proxy-wars-and-where-are-they-happening/
  15. Proxy war – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Proxy_war
  16. Proxy wars – (US History – 1945 to Present) – Vocab, Definition, Explanations | Fiveable, accessed September 30, 2025, https://fiveable.me/key-terms/united-states-history-since-1945/proxy-wars
  17. Eight “Hot Wars” During the Cold War | CFR Education, accessed September 30, 2025, https://education.cfr.org/learn/reading/eight-hot-wars-during-cold-war
  18. The Angolan civil war (Chapter 8) – The USSR in Third World Conflicts, accessed September 30, 2025, https://www.cambridge.org/core/books/ussr-in-third-world-conflicts/angolan-civil-war/6A98027220E926A6783DFCE2A320DB15
  19. The Angola Crisis 1974–75 – Milestones in the History of U.S. Foreign Relations – Office of the Historian, accessed September 30, 2025, https://history.state.gov/milestones/1969-1976/angola
  20. Angolan Civil War – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Angolan_Civil_War
  21. “Buried in the Sands of the Ogaden”: The Horn of Africa and SALT II, 1977–1979 – Office of the Historian, accessed September 30, 2025, https://history.state.gov/milestones/1977-1980/horn-of-africa
  22. Ogaden War Between Somalia and Ethiopia | Research Starters – EBSCO, accessed September 30, 2025, https://www.ebsco.com/research-starters/history/ogaden-war-between-somalia-and-ethiopia
  23. Central Intelligence Agency – Intelligence, Surveillance, Covert Ops …, accessed September 30, 2025, https://www.britannica.com/topic/Central-Intelligence-Agency/Activities
  24. Cold War espionage – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Cold_War_espionage
  25. During cold war both KGB and CIA had high ranking moles inside their organisations. Is it known which side did better job at infiltrating their opponent and getting sensitive information as cold war progressed? : r/AskHistorians – Reddit, accessed September 30, 2025, https://www.reddit.com/r/AskHistorians/comments/4jkybw/during_cold_war_both_kgb_and_cia_had_high_ranking/
  26. A global kill list: Inside the KGB’s secret retribution operations beyond the Iron Curtain, accessed September 30, 2025, https://theins.ru/en/history/281554
  27. COVERT OPERATIONS OF THE USSR IN AFRICA Текст научной статьи по специальности – КиберЛенинка, accessed September 30, 2025, https://cyberleninka.ru/article/n/covert-operations-of-the-ussr-in-africa
  28. Africa–Soviet Union relations – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Africa%E2%80%93Soviet_Union_relations
  29. AFRICA (SOVIET POLICY) (Hansard, 6 February 1978) – API Parliament UK, accessed September 30, 2025, https://api.parliament.uk/historic-hansard/commons/1978/feb/06/africa-soviet-policy
  30. Soviet Spies in Africa: How the KGB Strengthened Soviet Influence on the Continent During the Cold War. : r/coldwar – Reddit, accessed September 30, 2025, https://www.reddit.com/r/coldwar/comments/1n91egf/soviet_spies_in_africa_how_the_kgb_strengthened/
  31. Revolutions in Military Affairs – DTIC, accessed September 30, 2025, https://apps.dtic.mil/sti/tr/pdf/ADA360252.pdf
  32. The Revolution in Military Affairs and Conflict Short … – USAWC Press, accessed September 30, 2025, https://press.armywarcollege.edu/cgi/viewcontent.cgi?article=1893&context=monographs
  33. Precision-guided munition – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Precision-guided_munition
  34. Precision Guided Munitions and the New Era of Warfare – Military Analysis Network, accessed September 30, 2025, https://man.fas.org/dod-101/sys/smart/docs/paper53.htm
  35. Getting Closer: Precision Guided Weapons in the Southeast Asia War – Air Force Museum, accessed September 30, 2025, https://www.nationalmuseum.af.mil/Visit/Museum-Exhibits/Fact-Sheets/Display/Article/195858/getting-closer-precision-guided-weapons-in-the-southeast-asia-war/
  36. Precision Guided Munitions: Revolutionizing Warfare Accuracy, accessed September 30, 2025, https://aviationanddefensemarketreports.com/precision-guided-munitions-revolutionizing-warfare-with-accuracy/
  37. Stealth aircraft – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Stealth_aircraft
  38. Stealth technology – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Stealth_technology
  39. Lessons from Stealth for Emerging Technologies – CSET, accessed September 30, 2025, https://cset.georgetown.edu/publication/lessons-from-stealth-for-emerging-technologies/
  40. Revolution in military affairs – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Revolution_in_military_affairs
  41. From Active Defense to AirLand Battle: The Development of Army Doctrine, 1973-1982, accessed September 30, 2025, https://www.tradoc.army.mil/wp-content/uploads/2020/10/From-Active-Defense-to-AirLand-Battle.pdf
  42. What did AirLand Battle address that previous NATO Cold War strategies were failing at? : r/WarCollege – Reddit, accessed September 30, 2025, https://www.reddit.com/r/WarCollege/comments/b8q6k0/what_did_airland_battle_address_that_previous/
  43. AirLand Battle: The Development of a Doctrine – DTIC, accessed September 30, 2025, https://apps.dtic.mil/sti/pdfs/AD1119406.pdf
  44. THE POLITICAL CONTEXT OF US ARMY DOCTRINE, 1974-1976 | Small Wars Journal by Arizona State University, accessed September 30, 2025, https://smallwarsjournal.com/2020/10/29/political-context-us-army-doctrine-1974-1976/
  45. How was the Military doctrine of active defense born? : Focusing on the process of writing the FM 100-5 Operations 1976 edition – Korea Journal Central, accessed September 30, 2025, http://journal.kci.go.kr/imhc/archive/articleView?artiId=ART002939313
  46. Doctrinal Development—AirLand Battle – Army University Press, accessed September 30, 2025, https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/MR-75th-Anniversary/75th-Doctrinal-AirLand/
  47. AirLand Battle and Modern Warfare, accessed September 30, 2025, https://www.nids.mod.go.jp/english/event/forum/pdf/2014/09.pdf
  48. WAR ON THE 21ST CENTURY BATTLEFIELD: REVISITING GENERAL STARRY’S CONCEPTUAL FRAMEWORK, accessed September 30, 2025, https://warroom.armywarcollege.edu/articles/conceptual-framework/
  49. AirLand Battle Doctrine – MERIP, accessed September 30, 2025, https://merip.org/1983/01/airland-battle-doctrine/
  50. The Lessons of AirLand Battle and the 31 Initiatives for Multi-Domain Battle – RAND, accessed September 30, 2025, https://www.rand.org/content/dam/rand/pubs/perspectives/PE300/PE301/RAND_PE301.pdf
  51. Countering Hybrid Warfare: Conceptual Foundations and Implications for Defence Forces – GOV.UK, accessed September 30, 2025, https://assets.publishing.service.gov.uk/media/5da9a79ae5274a5ca507c6bb/20190401-MCDC_CHW_Information_note_-_Conceptual_Foundations.pdf
  52. Weaponization of Finance – Encyclopedia.pub, accessed September 30, 2025, https://encyclopedia.pub/entry/36941
  53. The Weaponization of Trade – Columbia SIPA – Columbia University, accessed September 30, 2025, https://www.sipa.columbia.edu/sites/default/files/migrated/downloads/Capstone%2520Report%2520%2528Eurasia%2520Group%2529.pdf
  54. Weaponizing Trade – CSIS, accessed September 30, 2025, https://www.csis.org/analysis/weaponizing-trade
  55. Weaponizing Financial and Trade Flows: The Case of Failing Western Sanctions, accessed September 30, 2025, https://internationalbanker.com/finance/weaponizing-financial-and-trade-flows-the-case-of-failing-western-sanctions/
  56. Russia Sanctions and Export Controls: U.S. Agencies Should Establish Targets to Better Assess Effectiveness, accessed September 30, 2025, https://www.gao.gov/products/gao-25-107079
  57. International sanctions during the Russo-Ukrainian War – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/International_sanctions_during_the_Russo-Ukrainian_War
  58. The Economic Impact of Russia Sanctions – Congress.gov, accessed September 30, 2025, https://www.congress.gov/crs-product/IF12092
  59. How China’s Coercive Measures Against Australia Backfired | The Heritage Foundation, accessed September 30, 2025, https://www.heritage.org/china/report/how-chinas-coercive-measures-against-australia-backfired
  60. China is still coercing Australia—with implicit threats | The Strategist, accessed September 30, 2025, https://www.aspistrategist.org.au/china-is-still-coercing-australia-with-implicit-threats/
  61. Warning from Australia: Meet the Threat of Chinese Economic Coercion to Democracy, accessed September 30, 2025, https://www.cnas.org/publications/commentary/warning-from-australia-meet-the-threat-of-chinese-economic-coercion-to-democracy
  62. Energy policy of Russia – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Energy_policy_of_Russia
  63. The Use of Energy Resources as Foreign Policy Tools: The Russian Case – ResearchGate, accessed September 30, 2025, https://www.researchgate.net/publication/344615948_The_Use_of_Energy_Resources_as_Foreign_Policy_Tools_The_Russian_Case
  64. Energy as a tool of foreign policy of authoritarian states, in particular Russia – European Parliament, accessed September 30, 2025, https://www.europarl.europa.eu/RegData/etudes/STUD/2018/603868/EXPO_STU(2018)603868_EN.pdf
  65. Russia’s Energy Diplomacy – Chatham House, accessed September 30, 2025, https://www.chathamhouse.org/sites/default/files/19352_0511bp_lough.pdf
  66. Weaponisation of finance: Regulators’ worries in a geopolitically fragile world, accessed September 30, 2025, https://www.orfonline.org/expert-speak/weaponisation-of-finance
  67. Iran’s use of cyberspace has evolved from an internal means of information control and repression to more aggressive attacks on foreign targets. The regime has been developing its own cybersecurity software and internet architecture in order to protect and insulate its networks, and it has been developing technological cyber expertise as a form of asymmetric warfare against a superior conventional US military. – Congress.gov, accessed September 30, 2025, https://www.congress.gov/crs_external_products/IF/HTML/IF11406.web.html
  68. Stuxnet | CFR Interactives, accessed September 30, 2025, https://www.cfr.org/cyber-operations/stuxnet
  69. Full article: Stuxnet, revisited (again): producing the strategic relevance of cyber operations, accessed September 30, 2025, https://www.tandfonline.com/doi/full/10.1080/23738871.2025.2492570
  70. Stuxnet: The world’s first cyber weapon – Center for International Security and Cooperation, accessed September 30, 2025, https://cisac.fsi.stanford.edu/news/stuxnet
  71. State Sponsored Cyber Warfare – Identity Management Institute®, accessed September 30, 2025, https://identitymanagementinstitute.org/state-sponsored-cyber-warfare/
  72. NSA and Others Provide Guidance to Counter China State-Sponsored Actors Targeting Critical Infrastructure Organizations – National Security Agency, accessed September 30, 2025, https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/4287371/nsa-and-others-provide-guidance-to-counter-china-state-sponsored-actors-targeti/
  73. Mutual Defense in Cyberspace: Joint Action on Attribution – CSIS, accessed September 30, 2025, https://www.csis.org/analysis/mutual-defense-cyberspace-joint-action-attribution
  74. U.S. government scrambles to stop new hacking campaign blamed on China, accessed September 30, 2025, https://www.washingtonpost.com/technology/2025/09/25/cisa-federal-hacks-cisco/
  75. What are state-sponsored cyber attacks? | F‑Secure, accessed September 30, 2025, https://www.f-secure.com/en/articles/what-are-state-sponsored-cyber-attacks
  76. Secure Cyberspace and Critical Infrastructure – Homeland Security, accessed September 30, 2025, https://www.dhs.gov/archive/secure-cyberspace-and-critical-infrastructure
  77. Countering Chinese State-Sponsored Actors Compromise of … – CISA, accessed September 30, 2025, https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-239a
  78. Submarine cable security is all at sea • The Register, accessed September 30, 2025, https://www.theregister.com/2025/09/29/submarine_cable_security_report_uk/
  79. Protection of Undersea Telecommunication Cables: Issues for Congress, accessed September 30, 2025, https://www.congress.gov/crs-product/R47648
  80. Subsea telecommunications cables: resilience and crisis preparedness – Parliament UK, accessed September 30, 2025, https://publications.parliament.uk/pa/jt5901/jtselect/jtnatsec/723/report.html
  81. International law doesn’t adequately protect undersea cables. That must change., accessed September 30, 2025, https://www.atlanticcouncil.org/content-series/hybrid-warfare-project/international-law-doesnt-adequately-protect-undersea-cables-that-must-change/
  82. Safeguarding Subsea Cables: Protecting Cyber Infrastructure amid Great Power Competition – CSIS, accessed September 30, 2025, https://www.csis.org/analysis/safeguarding-subsea-cables-protecting-cyber-infrastructure-amid-great-power-competition
  83. Hybrid Attacks Rise on Undersea Cables in Baltic and Arctic Regions – Jamestown, accessed September 30, 2025, https://jamestown.org/program/hybrid-attacks-rise-on-undersea-cables-in-baltic-and-arctic-regions/
  84. Why Russia and China May Be Cutting Europe’s Undersea Cables | WSJ – YouTube, accessed September 30, 2025, https://www.youtube.com/watch?v=pyz7nSAKF9E
  85. Risky Game: Hybrid Attack on Baltic Undersea Cables | Wilson Center, accessed September 30, 2025, https://www.wilsoncenter.org/article/risky-game-hybrid-attack-baltic-undersea-cables
  86. Gray Zone Project – CSIS, accessed September 30, 2025, https://www.csis.org/programs/gray-zone-project
  87. Gaining Competitive Advantage in the Gray Zone: Response Options for Coercive Aggression Below the Threshold of Major War – RAND, accessed September 30, 2025, https://www.rand.org/content/dam/rand/pubs/research_reports/RR2900/RR2942/RAND_RR2942.pdf
  88. Today’s wars are fought in the ‘gray zone.’ Here’s everything you need to know about it., accessed September 30, 2025, https://www.atlanticcouncil.org/blogs/new-atlanticist/todays-wars-are-fought-in-the-gray-zone-heres-everything-you-need-to-know-about-it/
  89. Defining HYBRID WARFARE, accessed September 30, 2025, https://www.marshallcenter.org/sites/default/files/files/2020-05/pC_V10N1_en_Wither.pdf
  90. NATO and Countering Hybrid Warfare – CSIS, accessed September 30, 2025, https://www.csis.org/analysis/nato-and-countering-hybrid-warfare
  91. Hybrid warfare – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Hybrid_warfare
  92. Hybrid Warfare – New Threats, Complexity, and ‘Trust’ as the Antidote – NATO, accessed September 30, 2025, https://www.nato.int/docu/review/articles/2021/11/30/hybrid-warfare-new-threats-complexity-and-trust-as-the-antidote/index.html
  93. War in Donbas – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/War_in_Donbas
  94. Russia-Ukraine War | Map, Casualties, Timeline, Death Toll, Causes, & Significance | Britannica, accessed September 30, 2025, https://www.britannica.com/event/2022-Russian-invasion-of-Ukraine
  95. Ukraine: Conflict at the Crossroads of Europe and Russia | Council on Foreign Relations, accessed September 30, 2025, https://www.cfr.org/backgrounder/ukraine-conflict-crossroads-europe-and-russia
  96. TWENTY-FIRST CENTURY PROXY WARFARE – Cloudfront.net, accessed September 30, 2025, https://d1y8sb8igg2f8e.cloudfront.net/documents/Twenty-First_Century_Proxy_Warfare_Final.pdf
  97. Twenty-First Century Proxy Warfare: Confronting Strategic Innovation in a Multipolar World Since the 2011 NATO Intervention – Cloudfront.net, accessed September 30, 2025, https://d1y8sb8igg2f8e.cloudfront.net/documents/Proxy_wars_one_pager-v2.pdf
  98. Twenty-First Century Proxy Warfare: Confronting Strategic …, accessed September 30, 2025, https://www.newamerica.org/future-security/reports/twenty-first-century-proxy-warfare-confronting-strategic-innovation-multipolar-world/a-new-age-of-proxy-warfare/
  99. Engaging non-state armed actors in state- and peace … – ICRC, accessed September 30, 2025, https://www.icrc.org/sites/default/files/external/doc/en/assets/files/review/2011/irrc-883-schneckener.pdf
  100. The role of non-state actors in building human security – Centre for Humanitarian Dialogue, accessed September 30, 2025, https://hdcentre.org/wp-content/uploads/2016/07/The-role-of-non-state-actors-in-building-human-security-May-2000.pdf
  101. Twenty-First Century Proxy Warfare: Confronting Strategic Innovation in a Multipolar World, accessed September 30, 2025, https://www.newamerica.org/future-security/reports/twenty-first-century-proxy-warfare-confronting-strategic-innovation-multipolar-world/rethinking-proxy-warfare/
  102. Twenty-First Century Proxy Warfare – New America, accessed September 30, 2025, https://www.newamerica.org/future-security/reports/twenty-first-century-proxy-warfare/
  103. Timber Sycamore – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Timber_Sycamore
  104. Full article: Disposable rebels: US military assistance to insurgents in the Syrian war, accessed September 30, 2025, https://www.tandfonline.com/doi/full/10.1080/13629395.2023.2183664
  105. America Had Already Lost Its Covert War in Syria—Now It’s Official, accessed September 30, 2025, https://tcf.org/content/commentary/america-already-lost-covert-war-syria-now-official/
  106. Hezbollah–Iran relations – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Hezbollah%E2%80%93Iran_relations
  107. Hezbollah, Hamas, and More: Iran’s Terror Network Around the Globe | AJC, accessed September 30, 2025, https://www.ajc.org/news/hezbollah-hamas-and-more-irans-terror-network-around-the-globe
  108. Understanding Iran’s Use of Terrorist Groups as Proxies – American University, accessed September 30, 2025, https://www.american.edu/sis/news/20240205-understanding-irans-use-of-terrorist-groups-as-proxies.cfm
  109. Iran’s Islamist Proxies in the Middle East – Wilson Center, accessed September 30, 2025, https://www.wilsoncenter.org/article/irans-islamist-proxies
  110. U.S. vs Russian “Hybrid Warfare” Doctrine: A Comparative Glance – Grey Dynamics, accessed September 30, 2025, https://greydynamics.com/u-s-vs-russian-hybrid-warfare-doctrine-a-comparative-glance/
  111. Russia and China Look at the Future of War, accessed September 30, 2025, https://understandingwar.org/research/future-of-war/russia-and-china-look-at-the-future-of-war-2/
  112. Gerasimov doctrine (The Russian “New Generation Warfare … – WARN, accessed September 30, 2025, https://warn-erasmus.eu/glossary/doktrina-gerasimova-rosijska-vijna-novogo-pokolinnya/
  113. en.wikipedia.org, accessed September 30, 2025, https://en.wikipedia.org/wiki/Three_warfares#:~:text=%22Three%20warfares%22%20(Chinese%3A,warfare%20(also%20termed%20lawfare).
  114. Political Warfare against Intervention Forces > Air University (AU …, accessed September 30, 2025, https://www.airuniversity.af.edu/JIPA/Display/Article/4167178/political-warfare-against-intervention-forces/
  115. sites.stedwards.edu, accessed September 30, 2025, https://sites.stedwards.edu/pangaea/the-role-of-social-media-in-the-arab-spring/#:~:text=Social%20media%20helped%20Tunisia%20and,was%20happening%20instead%20of%20organizing.
  116. Social Media And The Arab Spring By Samira F. Hassan A Capstone submitted to the Graduate School Camden Rutgers, The State Univ, accessed September 30, 2025, https://mals.camden.rutgers.edu/files/Social-Media-and-the-Arab-Spring.pdf
  117. Social media’s role in the Arab Spring – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Social_media%27s_role_in_the_Arab_Spring
  118. (Social) Media and Politics and the Arab Spring Moment – IEMed, accessed September 30, 2025, https://www.iemed.org/publication/social-media-and-politics-and-the-arab-spring-moment/
  119. The Legacy of the “Facebook Revolution”: How did the Arab Spring shape citizen use of social media? – King’s Think Tank, accessed September 30, 2025, https://kingsthinktankspectrum.wordpress.com/2025/01/30/the-legacy-of-the-facebook-revolution-how-did-the-arab-spring-shape-citizen-use-of-social-media/
  120. The Influence of Social Media in Egypt during The Arab Spring – SIT Digital Collections, accessed September 30, 2025, https://digitalcollections.sit.edu/capstones/2944/
  121. Internet Research Agency – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Internet_Research_Agency
  122. How Russia’s Internet Research Agency Built its … – -ORCA, accessed September 30, 2025, https://orca.cardiff.ac.uk/id/eprint/122489/1/Political%20Quarterly%20IRA%20Dawson%20&%20Innes.pdf
  123. Fact Sheet: What We Know about Russia’s Interference Operations – German Marshall Fund, accessed September 30, 2025, https://www.gmfus.org/news/fact-sheet-what-we-know-about-russias-interference-operations
  124. “The Tactics & Tropes of the Internet Research Agency” by Renee DiResta, Kris Shaffer et al. – UNL Digital Commons – University of Nebraska–Lincoln, accessed September 30, 2025, https://digitalcommons.unl.edu/senatedocs/2/
  125. Conflict Propaganda in Syria: Narrative Battles – 1st Edition – Oliver – Routledge, accessed September 30, 2025, https://www.routledge.com/Conflict-Propaganda-in-Syria-Narrative-Battles/Boyd-Barrett/p/book/9780367697488
  126. Syrian revolution and the conflict over narratives | SyriaUntold – حكاية ما انحكت, accessed September 30, 2025, https://syriauntold.com/2021/03/19/syrian-revolution-and-the-conflict-over-narratives/
  127. The Battle of the Narratives Around Syria | German Marshall Fund of the United States, accessed September 30, 2025, https://www.gmfus.org/news/battle-narratives-around-syria
  128. How did combatants’ narratives and social media shape Syria’s civil war? | ClarkU News, accessed September 30, 2025, https://www.clarku.edu/news/2024/02/29/how-did-combatants-narratives-social-media-shape-syrias-civil-war/
  129. LESSONS FROM SYRIA’S LOW-PROFILE NARRATIVE WAR, accessed September 30, 2025, https://warroom.armywarcollege.edu/articles/narrative-war/
  130. AI and the Future of Disinformation Campaigns | Center for Security and Emerging Technology, accessed September 30, 2025, https://cset.georgetown.edu/publication/ai-and-the-future-of-disinformation-campaigns-2/
  131. AI and the Future of Disinformation Campaigns | Center for Security and Emerging Technology – CSET, accessed September 30, 2025, https://cset.georgetown.edu/publication/ai-and-the-future-of-disinformation-campaigns/
  132. Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media – IEEE Computer Society, accessed September 30, 2025, https://www.computer.org/csdl/magazine/sp/2024/04/10552098/1XApkaTs5l6
  133. Understanding Offensive AI vs. Defensive AI in Cybersecurity – Abnormal AI, accessed September 30, 2025, https://abnormal.ai/blog/offensive-ai-defensive-ai
  134. Combatting deepfakes: Policies to address national security threats and rights violations, accessed September 30, 2025, https://arxiv.org/html/2402.09581v1
  135. Rising Threat – Deepfakes and National Security in the Age of Digital Deception, accessed September 30, 2025, https://digitalcommons.odu.edu/cgi/viewcontent.cgi?article=1078&context=covacci-undergraduateresearch
  136. NSA, U.S. Federal Agencies Advise on Deepfake Threats, accessed September 30, 2025, https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3523329/nsa-us-federal-agencies-advise-on-deepfake-threats/
  137. Crossing the Deepfake Rubicon – CSIS, accessed September 30, 2025, https://www.csis.org/analysis/crossing-deepfake-rubicon
  138. AI-driven disinformation: policy recommendations for democratic resilience – PMC, accessed September 30, 2025, https://pmc.ncbi.nlm.nih.gov/articles/PMC12351547/
  139. Weaponized storytelling: How AI is helping researchers sniff out disinformation campaigns | FIU News – Florida International University, accessed September 30, 2025, https://news.fiu.edu/2025/weaponized-storytelling-how-ai-is-helping-researchers-sniff-out-disinformation-campaigns
  140. AI-Enhanced Command & Control Systems Transforming Military – Defence Industries, accessed September 30, 2025, https://www.defence-industries.com/articles/ai-enhanced-command-and-control-c2-systems-transforming-military
  141. Enhance command and control with AI and machine learning – Microsoft Industry Blogs, accessed September 30, 2025, https://www.microsoft.com/en-us/industry/blog/government/2023/06/20/enhance-command-and-control-with-ai-and-machine-learning/
  142. Project Maven – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Project_Maven
  143. ECS’ John Heneghan on Supporting NGA’s Maven Program – ExecutiveBiz, accessed September 30, 2025, https://www.executivebiz.com/articles/ecs-john-heneghan-nga-maven-program
  144. Artificial Intelligence as a Combat Multiplier: Using AI to Unburden Army Staffs, accessed September 30, 2025, https://www.armyupress.army.mil/Journals/Military-Review/Online-Exclusive/2024-OLE/AI-Combat-Multiplier/
  145. United States’ Project Maven And The Rise Of AI-Assisted Warfare …, accessed September 30, 2025, https://defensetalks.com/united-states-project-maven-and-the-rise-of-ai-assisted-warfare/
  146. AI at the Pentagon: How Maven’s CTO Brings AI into Military Operations | IIA @MIT 2025, accessed September 30, 2025, https://www.youtube.com/watch?v=LBUKDhtlOEI
  147. Marine Corps names leadership for Project Dynamis amid push for new AI capabilities, accessed September 30, 2025, https://defensescoop.com/2025/09/23/marine-corps-project-dynamis-ai-leadership/
  148. AI-Enabled Command and Control Systems for Integrated Land, Air, and Sea Operations | by SIAM Student’s Chapter VIT Bhopal | Medium, accessed September 30, 2025, https://medium.com/@siam_VIT-B/ai-enabled-command-and-control-systems-for-integrated-land-air-and-sea-operations-ea27ed86c30d
  149. AI at War: The Next Revolution for Military and Defense | Capitol Technology University, accessed September 30, 2025, https://www.captechu.edu/blog/ai-war-next-revolution-military-and-defense
  150. Artificial intelligence arms race – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Artificial_intelligence_arms_race
  151. Essay: Reframing the U.S.-China AI “Arms Race”: Introduction – New America, accessed September 30, 2025, https://www.newamerica.org/cybersecurity-initiative/reports/essay-reframing-the-us-china-ai-arms-race/introduction/
  152. China Is Using the Private Sector to Advance Military AI | Center for …, accessed September 30, 2025, https://cset.georgetown.edu/article/china-is-using-the-private-sector-to-advance-military-ai/
  153. How the US Could Lose the AI Arms Race to China | American Enterprise Institute – AEI, accessed September 30, 2025, https://www.aei.org/op-eds/how-the-us-could-lose-the-ai-arms-race-to-china/
  154. Turkish Drones Disrupting Battlefields: A Case Study of Nagorno …, accessed September 30, 2025, https://wahacademia.com/index.php/Journal/article/download/227/186
  155. Baykar Bayraktar TB2 – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Bayraktar_TB2
  156. The Role of Turkish Drones in Azerbaijan’s Increasing Military Effectiveness: An Assessment of the Second Nagorno-Karabakh War – Insight Turkey, accessed September 30, 2025, https://www.insightturkey.com/articles/the-role-of-turkish-drones-in-azerbaijans-increasing-military-effectiveness-an-assessment-of-the-second-nagorno-karabakh-war
  157. Why lasers might be the answer to invasive drone attacks | DW News – YouTube, accessed September 30, 2025, https://www.youtube.com/watch?v=tFAZmb56ulU
  158. Ethiopian Civil War vs. Ukraine Invasion: Why TB2 Bayraktar Drones Worked For One & Failed The Other – Simple Flying, accessed September 30, 2025, https://simpleflying.com/ethiopia-vs-ukraine-why-drones-worked-failed/
  159. Drone Saturation: Russia’s Shahed Campaign – CSIS, accessed September 30, 2025, https://www.csis.org/analysis/drone-saturation-russias-shahed-campaign
  160. What Iran’s Drones in Ukraine Mean for the Future of War | The Washington Institute, accessed September 30, 2025, https://www.washingtoninstitute.org/policy-analysis/what-irans-drones-ukraine-mean-future-war
  161. David vs. Goliath: Cost Asymmetry in Warfare – RAND, accessed September 30, 2025, https://www.rand.org/pubs/commentary/2025/03/david-vs-goliath-cost-asymmetry-in-warfare.html
  162. Contribution by the International Committee of the Red Cross submitted to the Chair of the Convention on Certain Conventional Weapons (CCW, accessed September 30, 2025, https://docs-library.unoda.org/Convention_on_Certain_Conventional_Weapons_-Group_of_Governmental_Experts_on_Lethal_Autonomous_Weapons_Systems_(2021)/GGE_LAWS_-_June_2021_-_ICRC_-_written_contribution.pdf
  163. Autonomy in weapon systems | SIPRI, accessed September 30, 2025, https://www.sipri.org/research/armament-and-disarmament/emerging-military-and-security-technologies/autonomy-weapon-systems
  164. Autonomous Weapon Systems and International Humanitarian Law: Identifying Limits and the Required Type and Degree of Human–Machine Interaction | SIPRI, accessed September 30, 2025, https://www.sipri.org/publications/2021/policy-reports/autonomous-weapon-systems-and-international-humanitarian-law-identifying-limits-and-required-type
  165. Compliance with International Humanitarian Law in the Development and Use of Autonomous Weapon Systems: What Does IHL Permit, Pr – SIPRI, accessed September 30, 2025, https://www.sipri.org/sites/default/files/2023-03/ihl_and_aws.pdf
  166. Retaining Human Responsibility in the Development and Use of Autonomous Weapon Systems: On Accountability for Violations of International Humanitarian Law Involving AWS | SIPRI, accessed September 30, 2025, https://www.sipri.org/publications/2022/policy-reports/retaining-human-responsibility-development-and-use-autonomous-weapon-systems-accountability
  167. The road less travelled: ethics in the international regulatory debate on autonomous weapon systems, accessed September 30, 2025, https://blogs.icrc.org/law-and-policy/2024/04/25/the-road-less-travelled-ethics-in-the-international-regulatory-debate-on-autonomous-weapon-systems/
  168. UN and Red Cross join voices against danger of autonomous weapons – Prensa Latina, accessed September 30, 2025, https://www.plenglish.com/news/2023/10/05/un-and-red-cross-join-voices-against-danger-of-autonomous-weapons/
  169. International Committee of the Red Cross (ICRC) position on autonomous weapon systems, accessed September 30, 2025, https://www.cambridge.org/core/journals/international-review-of-the-red-cross/article/international-committee-of-the-red-cross-icrc-position-on-autonomous-weapon-systems-icrc-position-and-background-paper/32AEF7294791D19101D96970E85B0459
  170. ICRC’s Intervention on AI Based Weapon under International Humanitarian Law: A Critical Analysis – UniversePG, accessed September 30, 2025, https://www.universepg.com/public/img/storage/journal-pdf/1728999629_ICRCs_intervention_on_AI_Based_Weapon_under_international_humanitarian_law_a_critical_analysis.pdf
  171. The challenges of AI command and control | European Leadership Network, accessed September 30, 2025, https://europeanleadershipnetwork.org/commentary/the-challenges-of-ai-command-and-control/

Red Tide, Blue Response: A Commander’s Assessment of PLAN Maritime Strategies and U.S. Counter-Operations

This report provides a strategic assessment of the five most probable operational strategies that a commander of the People’s Liberation Army Navy (PLAN) would employ in a high-intensity maritime confrontation with United States naval forces. For each Chinese strategy, a corresponding U.S. counter-strategy is detailed, grounded in an analysis of current military doctrines, technological capabilities, and the prevailing strategic balance in the Western Pacific.

The analysis reveals a fundamental dichotomy in operational philosophy. The PLAN’s strategies are overwhelmingly optimized for a decisive, system-dependent, and centrally controlled initial blow, designed to achieve a rapid fait accompli by shattering U.S. operational capability and political will. These strategies—ranging from a massive missile saturation strike to a multi-domain C5ISR blackout—rely on the seamless integration of a complex but potentially brittle system-of-systems. Conversely, U.S. counter-strategies, rooted in the doctrine of Distributed Maritime Operations (DMO), are designed for systemic resilience, allied integration, and victory in a chaotic, degraded, and protracted conflict. U.S. responses prioritize dis-integrating the adversary’s kill web before launch, leveraging a superior command-and-control philosophy based on decentralized execution, and exploiting China’s grand strategic vulnerabilities.

The five core strategic interactions analyzed are:

  1. The Saturation Strike: A multi-domain, massed missile attack aimed at overwhelming the defenses of a U.S. Carrier Strike Group (CSG). The U.S. response focuses on proactively degrading the PLAN’s C5ISR “kill web” through non-kinetic means while employing a layered, networked defense (NIFC-CA) and operational dispersal (DMO) to survive and retaliate.
  2. The Gray-Zone Squeeze: The use of paramilitary and non-military assets (Maritime Militia and Coast Guard) to assert control over disputed waters below the threshold of war. The U.S. counter involves “assertive transparency” to strip away plausible deniability, a “like-for-like” response using law enforcement assets, and bolstering allied maritime domain awareness and resilience.
  3. The Undersea Ambush: The deployment of a large and quiet conventional submarine force to interdict sea lanes and hold U.S. surface assets at risk within the First Island Chain. The U.S. response leverages its technologically superior nuclear submarine force and a coordinated, multi-domain Anti-Submarine Warfare (ASW) network to seize and maintain undersea dominance, which is the decisive enabling campaign for all other naval operations.
  4. The C5ISR Blackout: A synchronized attack across the space, cyber, and electromagnetic domains to paralyze U.S. command, control, communications, computers, intelligence, surveillance, and reconnaissance. The U.S. response is twofold: building technical resilience through hardened, redundant networks (Project Overmatch) and leveraging doctrinal resilience through a culture of mission command that empowers decentralized execution in a degraded environment.
  5. The War of Attrition: A strategy to leverage China’s superior industrial capacity to absorb and replace combat losses at a rate the U.S. cannot sustain in a protracted conflict. The U.S. counter is to reject a war of attrition by targeting China’s grand strategic vulnerabilities—namely its dependence on seaborne trade—and integrating the formidable industrial and military power of its allies to offset the PLAN’s numerical advantage.

The overarching conclusion is that a naval conflict in the Western Pacific would be a contest between a Chinese force built for a perfect, centrally-scripted punch and a U.S. force designed to fight and win in the ensuing chaos. Victory for the U.S. commander will hinge on the successful implementation of DMO, enabled by resilient networking, and founded upon the U.S. Navy’s most durable asymmetric advantage: a command culture that trusts and empowers its people to take disciplined initiative in the face of uncertainty.

Introduction: The Contested Waters of the Western Pacific

The contemporary maritime environment, particularly in the Western Pacific, is defined by a direct and intensifying strategic competition between the United States and the People’s Republic of China (PRC). This is not merely a contest of naval platforms but a fundamental clash of national wills, technological trajectories, and operational doctrines. At the heart of this competition is the dramatic transformation of the People’s Liberation Army Navy (PLAN). Over the past three decades, the PLAN has evolved from a coastal “brown-water” navy, whose primary mission was to “resist invasions and defend the homeland” , into a formidable “blue-water” force with global ambitions. This shift, accelerated under Xi Jinping’s “China Dream” of national rejuvenation , represents a deliberate effort to project power, secure China’s maritime interests, and challenge the United States’ long-standing maritime supremacy. The PLAN’s growth is not just quantitative—it is now the world’s largest navy by number of ships—but also qualitative, with the introduction of advanced surface combatants, aircraft carriers, and a modernizing submarine force.

This naval build-up underpins a profound clash of operational philosophies, setting the stage for any potential confrontation. China’s military strategy is anchored in the concept of Anti-Access/Area Denial (A2/AD). This is a layered, defense-in-depth posture designed to deter, and if necessary, defeat U.S. military intervention within the First and Second Island Chains. By combining long-range precision-strike weapons, a dense network of sensors, and a growing fleet, China seeks to make military operations by foreign forces prohibitively costly and difficult in areas it considers vital to its national interests, such as the Taiwan Strait and the South China Sea. A2/AD is fundamentally the strategy of a continental power seeking to establish and enforce control over its maritime periphery, effectively turning its near seas into a strategic bastion.

In direct response to this challenge, the United States Navy has adopted Distributed Maritime Operations (DMO) as its foundational operating concept. DMO is designed explicitly to counter peer adversaries in a contested A2/AD environment. It seeks to turn the adversary’s strength—a reliance on finding and targeting concentrated U.S. forces—into a critical weakness. DMO achieves this by dispersing U.S. naval forces over vast geographic areas, complicating the adversary’s targeting problem, while concentrating lethal and non-lethal effects from multiple domains and vectors through resilient, long-range networking. It is a conceptual shift away from the carrier-centric battle group of the post-Cold War era toward a more adaptable, resilient, and distributed fleet architecture capable of seizing the initiative and prevailing in a high-end fight.

This report will dissect this strategic competition by analyzing the five most likely operational strategies a PLAN commander will employ in a maritime confrontation. For each Chinese strategy, a corresponding U.S. counter-strategy will be presented, providing a comprehensive assessment for the U.S. commander tasked with maintaining maritime superiority and upholding the international rules-based order in the contested waters of the Western Pacific.

I. The Saturation Strike: Overwhelming the Shield

The kinetic culmination of decades of Chinese investment in A2/AD capabilities is the Saturation Strike. This strategy is not merely an attack but a highly synchronized, multi-domain, system-of-systems operation aimed at delivering a decisive and politically shattering blow against the centerpiece of U.S. naval power projection: the Carrier Strike Group (CSG).

The Chinese Commander’s Strategy

The PLAN commander’s primary strategic objective in executing a Saturation Strike is to achieve a mission-kill or hard-kill on a U.S. aircraft carrier and its principal escorts, such as its Aegis cruisers and destroyers. The intended effect is twofold: operationally, to eliminate the CSG’s ability to project air power, thereby establishing uncontested sea and air control within the A2/AD envelope; and strategically, to inflict a shocking loss that breaks U.S. political will to continue the conflict.

This strategy is not executed by simply launching missiles; it requires the activation of a complex and highly integrated C5ISR (Command, Control, Communications, Computers, Cyber, Intelligence, Surveillance, and Reconnaissance) architecture that Chinese doctrine conceptualizes as a “kill web”. This architecture is designed to execute every step of the targeting process—Find, Fix, Track, Target, Engage, and Assess (F2T2EA)—against mobile, high-value U.S. naval assets. The sensor layer of this kill web is a multi-domain, redundant grid. It comprises space-based assets, including ISR satellites for imagery and electronic intelligence and the Beidou satellite navigation system for precision timing and location ; land-based over-the-horizon (OTH) radars to detect naval formations at long ranges; airborne platforms like Airborne Warning and Control System (AWACS) aircraft and long-endurance Unmanned Aerial Vehicles (UAVs); and the organic sensors of the PLAN’s own surface ships and submarines. The purpose of this dense sensor network is to create a persistent, fused, and reliable picture of the battlespace, ensuring that a U.S. CSG can be continuously tracked once detected.

The kinetic effectors of this strategy are a diverse and numerous arsenal of missiles, designed to attack the CSG from multiple axes and at different altitudes simultaneously, thereby overwhelming its layered defenses through sheer volume and complexity. The primary threat to the aircraft carrier itself comes from Anti-Ship Ballistic Missiles (ASBMs). These are road-mobile systems that can be hidden inland and launched on short notice. The key systems are the DF-21D, known as the “carrier-killer” with a range of approximately 1,500 km, and the DF-26, an intermediate-range ballistic missile dubbed the “Guam-killer” with a range of approximately 4,000 km, capable of striking both land bases and naval targets. These missiles attack from a near-space apogee at hypersonic speeds (estimated at up to Mach 10 upon reentry), and are believed to be equipped with Maneuverable Reentry Vehicles (MaRVs) that can make terminal adjustments to their trajectory, significantly complicating interception by U.S. defensive systems.

A more recent and sophisticated threat is posed by Hypersonic Glide Vehicles (HGVs), such as the DF-ZF HGV launched by the DF-17 missile. Unlike a ballistic missile, an HGV is released from its booster rocket and then “skips” along the upper atmosphere on a relatively flat, non-ballistic trajectory. This flight profile, combined with its ability to maneuver at speeds exceeding Mach 5, makes it exceptionally difficult for traditional ballistic missile defense radars and interceptors to track and engage.

To saturate the CSG’s mid- and inner-tier defenses, the ASBM and HGV attack will be synchronized with a massive volley of Anti-Ship Cruise Missiles (ASCMs). These will include both sea-skimming subsonic and supersonic variants, like the YJ-18, launched from a wide array of platforms to create a multi-axis threat picture that overloads the Aegis Combat System’s fire control channels. The platforms tasked with launching these weapons are themselves diverse. The PLAN’s modern surface combatants, particularly the formidable Type 055 (Renhai-class) cruiser and the capable Type 052D destroyers, serve as primary launch platforms. The Type 055, with its 112 Vertical Launch System (VLS) cells and advanced dual-band AESA radars, is a critical node in both the sensor and shooter network. Concurrently, PLAN Air Force H-6 bombers, armed with long-range ASCMs, will conduct standoff attacks from the periphery of the CSG’s air defense bubble. Finally, PLAN submarines, both conventional and nuclear, will be pre-positioned along expected U.S. approach vectors to launch submerged attacks, adding another, often unseen, axis of attack.

A deeper analysis of this strategy reveals that its immense power is predicated on the seamless functioning of a highly complex, centrally controlled C5ISR architecture. It is designed as a perfectly synchronized, overwhelming blow, but this optimization for a “best-case” scenario, where its network operates unimpeded, creates an inherent brittleness. The entire kill chain, from satellite detection to missile impact, depends on a series of critical nodes—a specific satellite, a data fusion center on the mainland, a secure communication link. The failure of any one of these nodes, whether through technical malfunction or enemy action, could cause the entire targeting solution to collapse, rendering the missiles ineffective. Furthermore, the nature of the primary threat systems suggests the attack will be “pulsed” rather than continuous. The logistical and C5ISR effort required to coordinate mobile land-based launchers and generate a high-fidelity targeting solution for a moving CSG means the PLAN cannot maintain a constant stream of ASBM fire. Instead, they will seek to create a “targeting window” and launch a massive, all-at-once strike to maximize the probability of success. This operational tempo, however, creates windows of opportunity for U.S. forces to act and disrupt the cycle between these offensive pulses.

The U.S. Commander’s Response

The U.S. commander’s strategic objective is to defeat the PLAN’s Saturation Strike by actively dis-integrating the Chinese kill web before missiles are launched, defending against any weapons that do get through, and maintaining the combat effectiveness of the CSG to retaliate decisively. This multi-phased response is the practical application of Distributed Maritime Operations.

The primary effort, designated here as Phase 0, is focused on non-kinetic warfare to prevent the PLAN from generating a clean targeting solution in the first place. This is a proactive campaign to attack the adversary’s C5ISR system. Coordinated through U.S. Cyber Command and theater assets, U.S. forces will conduct offensive cyber and Electronic Warfare (EW) operations targeting the nodes of the PLAN’s kill web. This includes jamming and spoofing ISR and navigation satellites, disrupting data links between platforms, attacking ground-based OTH radars, and penetrating the command and data networks that connect sensors to shooters. The goal is to sow friction, doubt, and blindness within the Chinese commander’s decision-making cycle, degrading their situational awareness and confidence in their targeting data. Simultaneously, the CSG will employ a sophisticated suite of deception tactics, including advanced electronic decoys that mimic the signature of high-value ships and strict emissions control (EMCON) procedures to reduce the CSG’s own electronic signature, thereby confusing PLAN sensors and creating a multitude of false targets.

Should the PLAN manage to launch a strike, Phase 1—the kinetic shield—is activated. This is a layered, hard-kill defense system designed to engage and destroy incoming threats at successively closer ranges. The heart of this defense is the Aegis Combat System, deployed on Ticonderoga-class cruisers and Arleigh Burke-class destroyers. Aegis, with its powerful AN/SPY series radars, provides 360-degree, all-weather detection, tracking, and engagement capabilities against the full spectrum of aerial threats.

The critical enabler that extends this shield beyond the horizon is Naval Integrated Fire Control-Counter Air (NIFC-CA). This revolutionary network allows different platforms to share sensor data and engage targets cooperatively. In a typical NIFC-CA engagement, an E-2D Advanced Hawkeye aircraft, acting as an elevated sensor and communications node, detects an incoming wave of cruise missiles or a terminally descending ASBM far beyond the ship’s own radar horizon. It then transmits this targeting data via a high-capacity data link to an Aegis ship, which can launch an SM-6 missile to intercept the threat, with the E-2D providing mid-course guidance updates. This “launch-on-remote” or “engage-on-remote” capability dramatically expands the CSG’s defensive battlespace and is a crucial counter to saturation tactics.

The CSG’s interceptor arsenal is multi-tiered to handle the diverse threat axis. The outer tier, focused on Ballistic Missile Defense (BMD), employs the Standard Missile-3 (SM-3) for exo-atmospheric “hit-to-kill” interception of ballistic missiles during their mid-course phase of flight. The mid-tier is the domain of the highly versatile Standard Missile-6 (SM-6), the workhorse of NIFC-CA. The SM-6 is capable of engaging ballistic missiles in their terminal phase (endo-atmospheric) as well as advanced air-breathing threats like cruise missiles and aircraft at extended ranges. The inner tier consists of the Standard Missile-2 (SM-2) and the Evolved Sea Sparrow Missile (ESSM), providing high-volume defense against cruise missiles and aircraft at shorter ranges.

Crucially, the CSG will not operate in a tightly clustered, easily targetable formation that plays to the strengths of the PLAN’s A2/AD system. Instead, it will adopt a DMO posture. Assets will be geographically dispersed over hundreds of miles, forcing the PLAN to search a much larger area and expend significantly more ISR resources to find and identify high-value targets. The key technological enabler for this dispersal is Project Overmatch, the Navy’s contribution to the broader Department of Defense’s Combined Joint All-Domain Command and Control (CJADC2) effort. Project Overmatch is developing a suite of resilient networks, secure data architectures, and AI-powered decision aids designed to connect the dispersed fleet. This allows widely separated units to share sensor data and coordinate fires seamlessly, even in a heavily contested electromagnetic environment, creating a resilient and lethal U.S. “kill web” of its own.

This U.S. response is fundamentally proactive, not reactive. The primary effort is focused on the “left side of the kill chain”—degrading the enemy’s ability to target in the first place by attacking its vulnerable C2 and sensor networks. The kinetic shield of missiles is the final line of defense, not the first. DMO turns the tables on the A2/AD concept. The A2/AD strategy is predicated on holding a concentrated, high-value U.S. force at risk. By refusing to present a concentrated force, DMO breaks the fundamental logic of the PLAN’s targeting model. It disperses U.S. combat power across numerous manned and unmanned platforms, creating dozens of potential targets. This forces the Chinese commander into an untenable dilemma: either expend their limited inventory of high-end munitions, like ASBMs, on lower-value targets, or dedicate an enormous and unsustainable amount of ISR assets to correctly identify the high-value units within the distributed formation, making their sensor network even more vulnerable to U.S. non-kinetic attack.

FeatureUSN Arleigh Burke-class (Flight III)PLAN Type 055 (Renhai-class)
TypeGuided-Missile DestroyerGuided-Missile Cruiser
Displacement~9,700 tons~13,000 tons
VLS Cells96 Mk 41 VLS112 GJB 5860-2006 VLS
Primary RadarAN/SPY-6(V)1 AMDRType 346B (S- and X-band AESA)
Primary AAW MissileSM-6, SM-2, ESSMHHQ-9B
ASuW MissileMaritime Strike Tomahawk, LRASMYJ-18A, YJ-21 ASBM
Land Attack MissileTomahawk Land Attack MissileCJ-10
Data compiled from sources.

II. The Gray-Zone Squeeze: Winning Without Fighting

Beyond high-end kinetic conflict, the PLAN commander will employ a sophisticated and persistent strategy of coercion in the “gray zone”—the contested space between peace and war. This strategy involves the calibrated use of non-military and paramilitary forces to achieve strategic objectives, such as asserting de facto sovereignty over disputed waters, without triggering a conventional military response from the United States or its allies.

The Chinese Commander’s Strategy

The strategic objective of the Gray-Zone Squeeze is to establish “facts on the water” that normalize Chinese administrative control and territorial claims, primarily in the South China Sea and East China Sea. This is achieved by harassing U.S. or allied vessels, intimidating regional claimants, and gradually eroding the international rules-based order, all while maintaining plausible deniability and carefully managing the escalation ladder to avoid open warfare.

The operational manifestation of this strategy is a layered, three-tiered force structure, often referred to as the “cabbage strategy,” where each layer provides a different level of coercion and deniability. The innermost layer, and the vanguard of any gray-zone operation, is the People’s Armed Forces Maritime Militia (PAFMM). This is a state-organized and controlled force composed of a large swarm of vessels, many of which are disguised as civilian fishing trawlers but are, in fact, purpose-built for paramilitary missions with reinforced hulls and powerful water cannons. The PAFMM is used for initial harassment, blockading strategic features like the Second Thomas Shoal, and employing “swarm” tactics to intimidate smaller vessels from nations like the Philippines or Vietnam. Their civilian appearance is the key to the strategy, as it makes a forceful, kinetic response from a professional navy politically risky and easy for Beijing to portray as an act of aggression against fishermen.

The middle layer consists of the China Coast Guard (CCG). The CCG operates larger, more capable, and often heavily armed cutters, many of which are former PLAN frigates. The CCG’s role is to escalate the pressure beyond what the militia can achieve. They employ dangerous but nominally non-lethal tactics, including ramming, shouldering, using high-pressure water cannons, and aiming military-grade lasers at the bridges of opposing ships to blind their crews. By operating under the guise of maritime law enforcement, the CCG further complicates the Rules of Engagement (ROE) for U.S. naval forces, creating a legal and diplomatic shield for their coercive actions.

The outermost layer is composed of the People’s Liberation Army Navy (PLAN) itself. In a typical gray-zone scenario, PLAN warships will remain “over the horizon,” visible on radar but not directly involved in the immediate confrontation. Their presence serves as a powerful and unambiguous military backstop. It sends a clear signal to the U.S. commander that any attempt to escalate and use lethal force against the CCG or PAFMM will cross the threshold into a conventional military conflict with the full might of the PLAN.

The core of this entire strategy is to present the U.S. commander with an operational dilemma, a “lose-lose” scenario. The first option is to do nothing, which results in ceding the contested area, allowing China to achieve its objective, and signaling to regional allies that U.S. security guarantees are hollow. The second option is to escalate and use lethal force against the PAFMM or CCG. This would play directly into China’s hands, allowing Beijing to win the information and legal war (“lawfare”) by painting the U.S. as the aggressor attacking “civilians” or “law enforcement” personnel in waters China claims as its own.

These gray-zone operations are not random acts of maritime bullying; they are a form of pre-conflict battlefield shaping. They are a systematic, long-term campaign to establish positional advantage, test U.S. resolve, and normalize Chinese presence and control in strategically vital waterways. The militarized artificial islands in the South China Sea, for example, serve as forward operating bases that enable and sustain these gray-zone actions, extending China’s A2/AD bubble and limiting U.S. operational freedom long before any shots are fired. The strategy’s center of gravity is not firepower but ambiguity and narrative control. Its effectiveness hinges on China’s ability to control the international perception of events and exploit the legal and political seams in the international order. If this ambiguity is stripped away and the state-directed nature of the coercion is laid bare, the strategy loses much of its power, as it can no longer be credibly separated from an act of military aggression.

The U.S. Commander’s Response

The U.S. commander’s strategic objective is to effectively counter Chinese gray-zone coercion without escalating to armed conflict. This requires a multi-faceted approach aimed at exposing the state-directed nature of the PAFMM and CCG, neutralizing China’s narrative advantage, and reassuring allies of unwavering U.S. commitment to a free and open Indo-Pacific.

The primary line of effort is “Assertive Transparency,” a strategy designed to win the information war by systematically stripping away the ambiguity upon which the Chinese strategy relies. This involves the use of a persistent and comprehensive ISR network—including satellites, long-endurance UAVs like the MQ-4C Triton and MQ-9 Reaper, and other intelligence platforms—to continuously monitor, document, and collect irrefutable evidence of PAFMM and CCG activities. This evidence, including imagery of unprofessional maneuvers, communications intercepts proving coordination with the PLAN, and data showing militia vessels disabling their automatic identification systems (AIS), must be rapidly declassified and publicly released. By publicizing Beijing’s malign behavior, the U.S. and its allies can impose significant reputational costs, forcing China to either accept international condemnation or disavow its own paramilitary forces.

The second line of effort is to employ a calibrated force posture that controls the escalation ladder. Instead of meeting paramilitary aggression with high-end naval combatants, the U.S. will pursue a “like-for-like” response. This involves deploying U.S. Coast Guard (USCG) cutters to the region to counter the CCG directly. This places the confrontation in a law-enforcement-versus-law-enforcement context, which neutralizes China’s narrative that it is being bullied by the U.S. Navy. It also leverages the USCG’s expertise in maritime law enforcement and professional conduct to highlight the unprofessional and dangerous behavior of the CCG. In this posture, U.S. Navy destroyers would be positioned in an overwatch role, similar to the PLAN’s own posture. This demonstrates military resolve and establishes clear red lines—for example, that lethal force used against a U.S. or allied vessel will be met with a decisive military response—without being the primary instrument of engagement in the gray-zone incident itself.

The third, and perhaps most critical, line of effort is building allied resilience. The primary targets of China’s gray-zone pressure are often U.S. allies and partners like the Philippines, Vietnam, and Malaysia. The most effective long-term counter is to empower these nations to resist coercion themselves. This involves significant investment in capacity building, such as enhancing their maritime domain awareness, C5ISR capabilities, and coast guard forces so they can better monitor and respond to gray-zone threats within their own exclusive economic zones (EEZs). Furthermore, conducting joint naval and coast guard patrols with allies in disputed areas serves to demonstrate collective resolve, reinforce international law like the UN Convention on the Law of the Sea (UNCLOS), and show that China’s claims are not accepted by the international community.

This counter-strategy deliberately targets the adversary’s decision-making process, not just their physical assets. A purely physical response, such as trying to block militia boats with a destroyer, is tactically difficult and strategically unwise, as it plays directly into China’s escalation trap. The key is to create unacceptable political and reputational costs for the Chinese Communist Party leadership. By shifting the conflict from the physical domain, where China can leverage its numerical advantage in small vessels, to the information and political domains, the U.S. and its allies can leverage the power of truth, international law, and collective action. It must be understood that gray-zone challenges cannot be “solved” in a single engagement. China’s strategy is one of persistence and incrementalism. Therefore, the U.S. response must also be persistent. Transitory operations like Freedom of Navigation Operations (FONOPs), while necessary, are insufficient on their own to deter this long-term campaign. The ultimate winner in the gray zone will be the side that can most effectively and efficiently sustain its presence and its political will over time.

ForceCommand & ControlTypical VesselsTypical Armament/TacticsPlausible Deniability
People’s Liberation Army Navy (PLAN)Military (Central Military Commission)Destroyers, Frigates, CruisersLethal (Missiles, Guns); Provides military overwatchZero
China Coast Guard (CCG)Paramilitary (People’s Armed Police)Large patrol cutters (often ex-PLAN)Water cannons, acoustic devices, ramming, lasers, deck guns; Enforces domestic law in disputed watersLow
People’s Armed Forces Maritime Militia (PAFMM)Military Auxiliary (Local PAFDs, PLAN)Converted trawlers, purpose-built vessels with reinforced hullsSwarming, shouldering, blocking, intelligence gatheringHigh (claimed to be “fishermen”)
Data compiled from sources.

III. The Undersea Ambush: War for the Deeps

Leveraging the inherent stealth of the submarine, the PLAN commander’s third major strategy is to wage war from beneath the waves. The Undersea Ambush is designed to challenge U.S. sea control at its foundation, targeting not only high-value military assets but also the vulnerable logistical lifeline that sustains any forward-deployed U.S. force. This is a battle for the undersea domain, where victory or defeat can enable or cripple all other operations.

The Chinese Commander’s Strategy

The strategic objectives of the Undersea Ambush are multifaceted: to interdict U.S. and allied sea lines of communication (SLOCs), disrupting the flow of reinforcements and supplies into the theater; to conduct covert intelligence, surveillance, and reconnaissance (ISR) deep within the U.S. defensive perimeter; to hold high-value surface assets like aircraft carriers and amphibious ships at risk; and to contest the undersea domain, denying U.S. submarines the sanctuary they have long enjoyed, particularly within the strategically critical waters of the first island chain.

To execute this strategy, the PLAN commander will employ a two-tiered submarine force, with different classes of submarines tailored for different operational environments and missions. The first tier, and arguably the most dangerous in a regional conflict, is the PLAN’s large and increasingly quiet fleet of conventional diesel-electric submarines (SSKs). This force includes Russian-built Kilo-class submarines and a growing number of indigenous Song- and Yuan-class boats. A significant and growing portion of the Yuan-class fleet is equipped with Air-Independent Propulsion (AIP), a technology that allows a non-nuclear submarine to operate without surfacing to snorkel for extended periods, potentially for weeks at a time. This capability makes AIP-equipped SSKs extremely difficult to detect in the noisy and acoustically complex littoral environments of the South and East China Seas, where they can lie in wait in ambush positions.

The second tier is the PLAN’s growing force of nuclear-powered attack submarines (SSNs), primarily the Shang-class (Type 093) and its improved variants, with the next-generation Type 095 expected to be a significant leap in capability. While generally still considered acoustically inferior (i.e., louder) than their U.S. counterparts, the newest Shang-class variants show significant improvements in quieting and are equipped with vertical launch systems (VLS) capable of firing land-attack and anti-ship cruise missiles. These SSNs provide the PLAN with a blue-water, long-endurance capability to threaten U.S. rear-area bases, strike targets on land, and hunt U.S. naval forces beyond the first island chain.

The key missions assigned to this submarine force will be diverse. The numerous SSKs will be deployed as “picket fences” across key maritime chokepoints, such as the Strait of Malacca, the Sunda Strait, and the Luzon Strait, with the primary mission of hunting for U.S. logistics shipping, amphibious vessels, and surface combatants transiting into the theater. Submarines are also the ideal platform for covertly deploying advanced sea mines near allied ports (e.g., in Japan or the Philippines) and along strategic waterways, creating no-go zones that can disrupt naval movements and bottle up surface fleets. Meanwhile, the quietest SSKs and the more capable SSNs will be tasked with the high-risk, high-reward mission of hunting High-Value Units (HVUs), specifically U.S. aircraft carriers, large-deck amphibious assault ships, and critical underway replenishment vessels.

The logic of this undersea strategy is fundamentally asymmetric and geographically focused. The PLAN leadership understands that it cannot currently compete with the U.S. Navy in a global, blue-water submarine-on-submarine conflict. Its strategy, therefore, is to leverage the numerical strength of its large SSK fleet in the defensive acoustic terrain of its near seas. The complex sound propagation, high shipping density, and variable water conditions of the East and South China Seas provide an ideal hiding ground for quiet conventional submarines. The most rational and dangerous approach for the PLAN commander is not to send their SSNs on duels in the open Pacific, but to use their SSK advantage to turn the first island chain into a lethal ambush zone.

However, this potent offensive strategy is undermined by a significant and acknowledged PLAN weakness: its own Anti-Submarine Warfare (ASW) capabilities. For decades, the PLAN underinvested in the complex art of ASW, lacking the advanced platforms, integrated sensor networks, and, most importantly, the deep institutional experience that the U.S. Navy has cultivated since the Cold War. While China is now rapidly fielding more capable ASW platforms, such as the KQ-200 maritime patrol aircraft and surface ships with advanced sonars, mastering ASW is not a “turnkey” capability; it requires years of training and cultural integration. This creates a critical strategic dilemma for the PLAN commander: while their submarines pose a grave threat to U.S. surface ships, the waters in which they operate are not a sanctuary for them. They are, in fact, highly vulnerable to the apex predators of the undersea domain—U.S. nuclear attack submarines. Every PLAN submarine deployed on an offensive mission is simultaneously a high-value target for U.S. SSNs, forcing the Chinese commander to risk their own most potent asymmetric assets in a domain where their adversary remains superior.

The U.S. Commander’s Response

The U.S. commander’s strategic objective is to seize and maintain dominance in the undersea domain, neutralizing the PLAN submarine threat and thereby ensuring freedom of maneuver for all U.S. and allied forces. The undersea battle is the decisive enabling campaign of any maritime conflict in the Pacific.

The cornerstone of the U.S. response is its own profound asymmetric advantage: a technologically superior, all-nuclear attack submarine (SSN) force, composed of the Virginia-class and the exceptionally quiet Seawolf-class submarines. These platforms are the most capable submarines in the world, and their primary wartime mission will be to conduct hunter-killer operations against PLAN submarines. Their superior acoustic quieting, advanced sonar suites, and the exceptional training and proficiency of their crews give them a decisive advantage in submarine-on-submarine engagements. Beyond their hunter-killer role, U.S. SSNs are premier ISR platforms, capable of penetrating deep within the A2/AD bubble to conduct covert surveillance, collect critical intelligence, provide targeting data for the joint force, and deploy special operations forces (SOF).

U.S. SSNs, however, do not operate in isolation. They are the leading edge of a coordinated, multi-layered, theater-wide ASW network. This network includes Maritime Patrol and Reconnaissance Aircraft (MPRA), primarily the P-8A Poseidon. The P-8A is the world’s premier aerial ASW platform, capable of rapidly searching vast areas of ocean, deploying extensive fields of advanced sonobuoys to detect and track submarine contacts, and prosecuting those contacts with lightweight torpedoes. Surface combatants, including Aegis destroyers and cruisers, are also critical nodes in the ASW network. They are equipped with powerful hull-mounted and towed-array sonars and embark MH-60R Seahawk helicopters, which are themselves potent ASW platforms equipped with dipping sonars and torpedoes.

This network of kinetic platforms is cued and supported by a web of undersea surveillance systems. This includes fixed acoustic arrays laid on the seabed in strategic locations, mobile surveillance platforms like the Surveillance Towed Array Sensor System (SURTASS) ships, and a growing fleet of unmanned underwater vehicles (UUVs). Together, these systems provide persistent, wide-area surveillance of key transit lanes and operating areas, detecting the faint acoustic signatures of PLAN submarines and passing that information to the hunter-killer platforms.

The U.S. response will also actively exploit the PLAN’s vulnerabilities. U.S. submarines are ideal platforms for offensive minelaying, capable of covertly deploying advanced mines in strategic locations, such as the approaches to PLAN naval bases, to bottle up the Chinese fleet and turn China’s geography into a liability. Furthermore, U.S. forces will employ tactics designed to impose uncertainty and disrupt the PLAN’s more rigid, top-down command and control structure. By creating unpredictable and complex tactical situations, U.S. forces can exploit the superior training and doctrinal empowerment of their own crews.

The undersea battle is arguably the decisive campaign in a potential conflict. If the U.S. can successfully neutralize the PLAN submarine threat, its surface fleet and critical logistics train can operate with much greater freedom of maneuver, making the entire DMO concept fully viable. Conversely, if PLAN submarines can successfully interdict U.S. forces and logistics, the U.S. will be unable to sustain a high-intensity fight in the Western Pacific. Therefore, the U.S. commander’s first and most critical priority must be to win the war for the deeps.

Beyond technology, the U.S. Navy’s most significant and durable advantage in the undersea domain is the human factor. U.S. submarine doctrine is built upon the philosophy of “mission command,” which grants unparalleled autonomy to commanding officers. They are expected to understand the commander’s intent and then exercise disciplined initiative to achieve it, even—and especially—when operating alone and out of communication. The PLAN, by contrast, is known for a more centralized, top-down C2 structure that can be rigid and slow to adapt in a dynamic environment. In the complex, uncertain, and communications-denied battlespace of undersea warfare, the ability of a U.S. submarine commander to make rapid, independent, and intent-driven decisions will be a decisive advantage over a PLAN counterpart who may be waiting for permission from a distant, and potentially unreachable, headquarters. This cultural and doctrinal difference is a true force multiplier.

IV. The C5ISR Blackout: The Multi-Domain Blitz

Preceding or concurrent with any major kinetic operation, the PLAN commander will almost certainly execute a multi-domain blitz aimed at achieving a “systemic paralysis” of U.S. forces. The C5ISR Blackout is a strategy that focuses on non-kinetic means to render U.S. forces deaf, dumb, and blind at the outset of a conflict, thereby severing the digital connective tissue that enables modern, networked warfare.

The Chinese Commander’s Strategy

The strategic objective of the C5ISR Blackout is to disrupt, degrade, and destroy U.S. command, control, communications, computers, cyber, intelligence, surveillance, and reconnaissance capabilities across the space, cyber, and electromagnetic domains. By attacking the nervous system of the U.S. military, the PLAN aims to prevent the U.S. from conducting effective, coordinated joint operations, thereby isolating individual units and making them vulnerable to follow-on kinetic attacks. This strategy is the direct embodiment of the PLA’s concept of “system destruction warfare,” which posits that victory in modern conflict is achieved not by destroying every enemy platform, but by causing a cascading collapse of the adversary’s operational system.

This mission falls primarily to the PLA’s specialized information warfare units, which were centralized under the Strategic Support Force (SSF) in 2015 and are now being reorganized into more focused entities like the Cyberspace Force and Aerospace Force. These forces are tasked with planning and executing a synchronized, multi-domain attack targeting the foundational pillars of U.S. networked operations.

The key attack vectors are threefold. The first is space warfare, which will target the critical U.S. satellite constellations that provide Position, Navigation, and Timing (PNT) via the Global Positioning System (GPS), global communications (SATCOM), and ISR. The PLA has developed a suite of anti-satellite (ASAT) capabilities to achieve this, ranging from direct-ascent kinetic kill vehicles to co-orbital robotic satellites that can jam, spoof, or physically disable U.S. assets in orbit. They can also employ ground-based directed energy weapons (lasers) to dazzle or damage satellite sensors and conduct cyberattacks against satellite ground control stations.

The second vector is cyber warfare. The PLA will launch large-scale cyberattacks aimed at both military and civilian targets. Military targets will include command and control networks, logistics and maintenance databases, and weapon system software. The goal is to corrupt data, deny access to critical systems, inject malware, and generally sow chaos and confusion within the U.S. command structure. Civilian targets will include critical infrastructure in the U.S. homeland and at forward operating bases, such as power grids, transportation networks, and financial systems, with the aim of disrupting U.S. mobilization and creating domestic political pressure.

The third vector is Electronic Warfare (EW). The PLA will conduct widespread and intensive jamming of the electromagnetic spectrum. This will target critical U.S. military communications links, such as Link-16, which connects aircraft, ships, and ground forces. It will also involve broad-area jamming of GPS signals to disrupt navigation and the guidance of precision munitions. Additionally, PLA EW assets will target U.S. radar systems on ships and aircraft to degrade their ability to detect and track incoming threats. The PLA views the integration of cyber and EW, what it calls “integrated network electronic warfare,” as a core component of its information-centric strategy.

China views the achievement of information dominance as an essential prerequisite for kinetic success. A PLAN commander is highly unlikely to launch a major operation like the Saturation Strike (Strategy I) without first attempting to degrade U.S. defenses through a C5ISR Blackout. The two strategies are inextricably linked. The effectiveness of key U.S. defensive systems like NIFC-CA and the entire DMO concept depends absolutely on robust, resilient networking. PLA doctrine explicitly identifies these networks as a primary target, aiming to “paralyze the enemy’s operational system-of-systems” in the initial stages of a conflict. Therefore, the C5ISR attack is not an ancillary operation; it is the opening move of the campaign, designed to “soften up” the battlespace and create the conditions for the kinetic strike to succeed. This strategy is enabled by China’s policy of “Military-Civil Fusion,” which legally mandates that civilian entities, including tech companies, universities, and individual hackers, support the state’s national security objectives. This “whole-of-society” approach provides the PLA with a massive pool of talent, resources, and attack vectors for its cyber operations.

The U.S. Commander’s Response

The U.S. commander’s strategic objective is not merely to survive a C5ISR Blackout, but to fight through it and win in a degraded and contested information environment. This is achieved by building both technical and doctrinal resilience and by leveraging a superior command and control philosophy that thrives in chaos.

The first line of effort is building architectural resilience into the U.S. C5ISR infrastructure. A core goal of Project Overmatch is to create a resilient, self-healing network that is “transport agnostic,” meaning it can dynamically route data through multiple pathways—satellite, line-of-sight radio, mobile mesh networks, laser communications—to bypass jammed or destroyed links. The U.S. is also actively developing and deploying redundant systems to reduce single points of failure. This includes proliferating large constellations of smaller, cheaper satellites in low-earth orbit (LEO), which are more difficult for an adversary to target and destroy wholesale than a few large, exquisite satellites in higher orbits. It also involves developing alternative PNT sources to reduce the force’s critical dependency on GPS. In the cyber domain, the response is proactive. U.S. Cyber Command conducts “hunt forward” operations, where cyber defense teams work with allies to identify and neutralize adversary malware and tools within foreign networks before they can be used against the U.S..

However, technology alone is an insufficient defense. The U.S. Navy’s greatest strength in a blackout scenario is its doctrinal resilience, rooted in its command and control philosophy. Unlike the PLA’s highly centralized, top-down C2 structure, the U.S. Navy operates on the principle of mission command. Commanders are given the “what” (the objective and the commander’s intent) but are not micromanaged on the “how.” Subordinate commanders at the tactical edge—a ship’s captain, a squadron leader—are trusted and empowered to take disciplined initiative to achieve that intent, even when they are cut off from higher headquarters. This is not an ad-hoc response; it is a deeply ingrained cultural trait. U.S. forces regularly and rigorously train in communications-denied environments to practice decentralized operations. This builds the trust, confidence, and procedural knowledge necessary for the force to continue to function effectively even when the network fails.

Finally, the U.S. will not simply absorb information warfare attacks passively. It will retaliate in kind, imposing costs by targeting the critical nodes of China’s own C5ISR architecture and its deeply intertwined military-civilian infrastructure.

This confrontation is ultimately a clash of cultures and philosophies. China is betting on technology to enable and enforce centralized control. The United States is betting on its people to enable decentralized execution. In a successful C5ISR Blackout scenario, where networks are severely degraded, the Chinese system, which requires constant, high-bandwidth connectivity to function as designed, would likely grind to a halt. Tactical units would be left waiting for orders they cannot receive. The U.S. system, while also degraded, is designed to continue functioning. Individual ship and squadron commanders, operating on their last received commander’s intent, would continue to fight and make decisions. In such an environment, the force that can continue to observe, orient, decide, and act—even while “blind”—will win. This threat environment also accelerates the imperative to develop a “hybrid fleet” of manned and unmanned systems. Unmanned platforms can serve as resilient, low-cost, and attritable sensor and communication nodes, extending the network in a contested environment and conducting high-risk missions like EW or deception, thereby preserving more valuable manned platforms. Initiatives like Project Overmatch are explicitly designed to provide the robust command and control necessary for this future hybrid fleet. The response to the blackout threat is therefore not just to protect the current force, but to evolve into a more resilient, distributed, and ultimately more lethal force structure.

V. The War of Attrition: The Industrial Gambit

Should the initial, high-intensity phases of a conflict fail to produce a decisive outcome, the PLAN commander may pivot to a strategy designed to leverage China’s most profound and asymmetric advantage: its immense industrial capacity. The War of Attrition is a strategy that looks beyond the first battle to win a protracted conflict by replacing combat losses of ships, munitions, and personnel at a rate that the United States and its allies cannot match, ultimately grinding down the U.S. Navy’s material capacity and political will to continue the fight.

The Chinese Commander’s Strategy

The strategic objective of the War of Attrition is to win a long war by transforming the conflict from a contest of tactical and operational skill into a contest of industrial output and national resolve. The foundation of this strategy is China’s unparalleled dominance in global manufacturing and, specifically, shipbuilding. China possesses the world’s largest shipbuilding industry, with a capacity that is estimated to be over 230 times greater than that of the United States. In a protracted conflict, China’s numerous and massive shipyards could be fully mobilized for military purposes, allowing it to repair damaged warships and construct new ones at a pace that the strained U.S. industrial base simply cannot equal.

This industrial might underpins the PLAN’s numerical superiority. The PLAN is already the world’s largest navy by ship count and is rapidly closing the gap in high-end combatants and VLS cells. This larger force structure allows the PLAN to absorb combat losses that would be crippling for the smaller U.S. fleet. As one wargaming analysis concluded, even after suffering catastrophic losses, the PLAN could still have more surface warships remaining than the U.S. Navy and would be able to continue the naval battle.

The operational concept flowing from this reality is one of accepting, and even planning for, a high rate of attrition. The Chinese commander, backed by the political will of the Chinese Communist Party (CCP), may have a much higher tolerance for combat losses than their U.S. counterpart. They may view their ships and sailors as expendable assets in service of the ultimate strategic goal of victory. Operationally, this could manifest as a willingness to “trade” assets—for example, sacrificing a Type 052D destroyer to create an opportunity to score a hit on a U.S. high-value asset like a carrier or a logistics ship, confident in their ability to replace their loss more easily. The overarching goal is to force a high rate of attrition on the smaller, more technologically complex, more expensive, and slower-to-replace U.S. fleet, particularly its limited number of forward-based assets and its vulnerable logistics and support ships.

This strategy effectively turns time into China’s greatest ally. In a short, decisive conflict, U.S. advantages in technology, training, and doctrine might carry the day. However, in a long, grinding war of industrial attrition, China’s manufacturing might becomes the decisive factor. The longer the conflict lasts, the more the material balance of power will shift in China’s favor. Therefore, the Chinese commander’s strategic imperative is to survive the initial U.S. blows and drag the conflict into a protracted struggle where their industrial advantage can be brought to bear.

However, there is a significant and untested variable in this calculus: China’s actual societal risk tolerance. While the authoritarian state can theoretically absorb massive losses, the modern PLA, largely composed of soldiers from single-child families, has no experience with the brutal realities of high-intensity combat. The CCP’s domestic legitimacy rests heavily on its projection of strength, competence, and national success. Unlike the U.S. military, which has been engaged in continuous combat operations for over two decades, the PLA has not fought a major war in over forty years. A series of humiliating naval defeats, with catastrophic casualties broadcast in the modern information age, could pose a significant threat to the CCP’s domestic stability. This could mean that Beijing’s actual tolerance for attrition is far lower than its industrial capacity might suggest.

The U.S. Commander’s Response

The U.S. commander’s response to the threat of a war of attrition must be to reject its premise entirely. The United States cannot win a war of industrial attrition against China; therefore, it must not fight one. The U.S. strategy must be designed to achieve decisive effects early in the conflict, targeting critical Chinese vulnerabilities and leveraging the full weight of allied power to prevent the conflict from devolving into a grinding slugging match.

The primary line of effort is to fight a decisive campaign that avoids a simple ship-for-ship exchange rate. This involves targeting China’s critical strategic vulnerabilities. Instead of trying to sink every PLAN warship, U.S. forces, particularly its stealthy submarine fleet, will be tasked with attacking China’s strategic Achilles’ heel: its profound dependence on seaborne imports of energy (oil and natural gas), food, and industrial raw materials. The U.S. Navy’s global reach and undersea dominance are perfectly suited to imposing a distant blockade on key maritime chokepoints far from China’s shores, such as the Strait of Malacca, the Lombok Strait, the Strait of Hormuz, and the Bab el-Mandeb. Such a campaign could cripple the Chinese economy and its ability to sustain a war effort without having to fight through the heart of the heavily defended A2/AD bubble. This shifts the battlefield from the tactical and operational levels, where China has numerical advantages, to the grand strategic level, where the U.S. holds a decisive advantage.

The second critical component of the U.S. response is the full integration of its allies, who serve as a powerful force multiplier that negates China’s numerical advantage. The United States does not fight alone. The naval power of key allies like the Japan Maritime Self-Defense Force (JMSDF), the Royal Australian Navy (RAN), and the Republic of Korea Navy is substantial. When integrated into a combined operational plan, this allied force helps to offset the PLAN’s numbers and presents the Chinese commander with a multi-front, multi-national threat that vastly complicates their strategic calculus. Furthermore, allies like Japan and the Philippines provide indispensable geographic access, allowing U.S. and allied forces to operate from dispersed land bases within the first island chain. This enables a more effective counter-A2/AD posture, including the use of land-based anti-ship missiles to contest key waterways.

Finally, the U.S. is beginning to counter China’s industrial mass with a different kind of mass: attritable, autonomous systems. The Department of Defense’s Replicator Initiative is a direct response to the attrition problem. This initiative aims to field thousands of low-cost, autonomous, and “attritable” systems—unmanned ships, submarines, and aircraft—that can be produced quickly and in large numbers. These systems can be used to absorb enemy fire, saturate defenses, conduct high-risk surveillance missions, and deliver ordnance, all while preserving the more valuable, and difficult to replace, high-end manned fleet.

The U.S. response, therefore, is profoundly asymmetric. It trades China’s tactical and operational strength (ship numbers and industrial capacity) for its grand strategic weakness (dependence on maritime trade). It recognizes that while the U.S. industrial base may be outmatched by China’s alone, the combined industrial and military power of the United States and its global network of allies is not. In a long war, the ability to draw on the shipbuilding, maintenance facilities, and combat power of allies like Japan and South Korea is a massive force multiplier that China, with few powerful military allies of its own, cannot match. The U.S. commander’s most critical task in preparing for a potential protracted conflict is not just managing U.S. forces, but effectively leading and integrating a multinational coalition. This alliance network is the United States’ true strategic center of gravity and the ultimate counter to China’s industrial gambit.

Conclusion: The Commander’s Imperatives for Maintaining Maritime Superiority

The analysis of these five strategic pairings reveals a clear and consistent pattern. The naval confrontation in the Western Pacific is fundamentally a contest between two opposing paradigms of warfare: a highly integrated, centrally controlled, but potentially brittle Chinese system designed to deliver a decisive first blow, and a U.S. operational model predicated on decentralized execution, systemic resilience, and allied integration, designed to absorb that initial blow and prevail in the ensuing chaos. The PLAN’s strategies rely on achieving information dominance and executing a perfectly synchronized plan. The U.S. Navy’s DMO concept assumes that information will be contested, networks will be degraded, and plans will be disrupted. The side that can more effectively operate and adapt within that chaotic reality will hold the decisive advantage.

Victory for the U.S. commander in such a conflict is not preordained. It will depend on achieving and maintaining superiority in three key, interrelated areas that form a triad of victory for modern naval warfare.

First is Superior Technology. This does not simply mean having better individual platforms, but rather fielding a superior network that enables the entire force. The full realization of a resilient, multi-pathway, and secure network, as envisioned by Project Overmatch, is the essential technical foundation for Distributed Maritime Operations. It is the digital backbone that will allow a dispersed force to concentrate its effects, share targeting data in a contested environment, and execute complex, multi-domain operations at a tempo the adversary cannot match.

Second is Superior Doctrine. Technology is only as effective as the concepts that govern its use. The complete operationalization of DMO across the fleet is paramount. This requires moving beyond theory and wargames to make decentralized, multi-domain operations the default mode of thinking and operating for every strike group, every ship, and every squadron. It demands a mastery of fighting as a networked but dispersed force, comfortable with ambiguity and empowered to act on mission intent.

Third, and most important, is Superior People. In the final analysis, the U.S. Navy’s most significant and durable asymmetric advantage is its command culture. The principle of mission command—of empowering sailors and junior officers, of trusting subordinate commanders to take disciplined initiative, and of fostering a culture of creative problem-solving at the tactical edge—is the ultimate counter to a rigid, top-down, and centrally controlled adversary. In a conflict characterized by C5ISR blackouts and the fog of war, the side that trusts its people will out-think, out-maneuver, and out-fight the side that does not.

From this analysis, three high-level imperatives emerge for the U.S. commander and the naval service as a whole:

  1. Accelerate DMO Enablers: The highest priority for investment and fielding must be the technologies that make DMO a reality. This includes the rapid, fleet-wide deployment of Project Overmatch networking capabilities, the procurement and stockpiling of long-range precision munitions (such as the Maritime Strike Tomahawk and LRASM), and the large-scale integration of unmanned and autonomous systems to provide attritable mass and extend the reach of the manned fleet.
  2. Deepen Allied Integration: U.S. alliances are its greatest strategic asset and the definitive counter to China’s numerical and industrial advantages. The U.S. Navy must move beyond simple interoperability—the ability for systems to exchange data—to true integration of command and control, operational planning, logistics, and targeting with key allies, particularly the Japan Maritime Self-Defense Force. This means training, planning, and operating as a single, combined fleet.
  3. Double Down on Mission Command: The cultural advantage of decentralized command must be relentlessly reinforced. This requires investing in realistic, stressful, and large-scale training scenarios that force commanders to operate in communications-denied environments. The Navy must continue to select, train, and promote leaders who demonstrate the character, competence, and judgment to act decisively in the face of uncertainty. The side that can better harness the cognitive power of its people at every level of command will prevail.

If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly contribute towards our continued reporting, please visit our funding page.


Sources Used

  1. The Evolution of China’s Naval Strategy – Mapping China’s Strategic …, accessed October 3, 2025, https://strategicspace.nbr.org/the-evolution-of-chinas-naval-strategy/
  2. People’s Liberation Army Navy – Wikipedia, accessed October 3, 2025, https://en.wikipedia.org/wiki/People%27s_Liberation_Army_Navy
  3. GREY ZONE WARFARE IN CHINA’S STALLED SOUTH CHINA SEA AMBITIONS, accessed October 3, 2025, https://www.cyfirma.com/research/grey-zone-warfare-in-chinas-stalled-south-china-sea-ambitions/
  4. China’s A2/AD strategy – Fly a jet fighter, accessed October 3, 2025, https://www.flyajetfighter.com/chinas-a2-ad-strategy/
  5. Anti-access/area denial – Wikipedia, accessed October 3, 2025, https://en.wikipedia.org/wiki/Anti-access/area_denial
  6. Anti-Access Strategies in the Pacific: The United States and China – USAWC Press, accessed October 3, 2025, https://press.armywarcollege.edu/cgi/viewcontent.cgi?article=2859&context=parameters
  7. Attaining All-domain Control: China’s Anti-Access/Area Denial (A2/AD) Capabilities in the South China Sea – Pacific Forum, accessed October 3, 2025, https://pacforum.org/publications/issues-insights-issues-and-insights-volume-25-wp-2-attaining-all-domain-control-chinas-anti-access-area-denial-a2-ad-capabilities-in-the-south-china-sea/
  8. China’s Anti-Access/Area-Denial Strategy – TDHJ.org, accessed October 3, 2025, https://tdhj.org/blog/post/china-a2ad-strategy/
  9. The Challenge of Dis-Integrating A2/AD Zone: How Emerging Technologies Are Shifting the Balance Back to the Defense – NDU Press, accessed October 3, 2025, https://ndupress.ndu.edu/Media/News/News-Article-View/Article/2106488/the-challenge-of-dis-integrating-a2ad-zone-how-emerging-technologies-are-shifti/
  10. Defense Primer: Navy Distributed Maritime Operations (DMO …, accessed October 3, 2025, https://www.congress.gov/crs-product/IF12599
  11. Defense Primer: Navy Distributed Maritime Operations (DMO) Concept – Congress.gov, accessed October 3, 2025, https://www.congress.gov/crs_external_products/IF/PDF/IF12599/IF12599.2.pdf
  12. DISTRIBUTED MARITIME OPERATIONS Solving what problems and seizing which opportunities? | Atlantic Council, accessed October 3, 2025, https://www.atlanticcouncil.org/wp-content/uploads/2024/06/Distributed-Maritime-Operations-Solving-what-problems-and-seizing-which-opportunities.pdf
  13. Sustaining the Fight: Challenges of Distributed Maritime Operations, accessed October 3, 2025, https://centerformaritimestrategy.org/publications/sustaining-the-fight-challenges-of-distributed-maritime-operations/
  14. Defense Primer: Navy Distributed Maritime Operations Concept – USNI News, accessed October 3, 2025, https://news.usni.org/2025/09/12/defense-primer-navy-distributed-maritime-operations-concept
  15. How China’s DF-26D Missile Tilts the Balance of Power in the Indo-Pacific, accessed October 3, 2025, https://nationalinterest.org/blog/buzz/how-chinas-df-26d-missile-tilts-balance-power-indo-pacific-bw-082825
  16. DF-21 – Wikipedia, accessed October 3, 2025, https://en.wikipedia.org/wiki/DF-21
  17. DF-21 (CSS-5) – Missile Threat – CSIS, accessed October 3, 2025, https://missilethreat.csis.org/missile/df-21/
  18. Chinese Anti-Ship Ballistic Missile Development: Drivers, Trajectories and Strategic Implications – The Jamestown Foundation, accessed October 3, 2025, https://jamestown.org/product/chinese-anti-ship-ballistic-missile-development-drivers-trajectories-and-strategic-implications/
  19. DF-26 (Dongfeng 26) Chinese Intermediate-Range Ballistic Missile – ODIN – OE Data Integration Network, accessed October 3, 2025, https://odin.tradoc.army.mil/WEG/Asset/DF-26_(Dongfeng_26)_Chinese_Intermediate-Range_Ballistic_Missile
  20. China’s ‘Carrier Killers’: How DF-21D and DF-26B Missiles Threaten U.S. Navy, accessed October 3, 2025, https://nationalinterest.org/blog/buzz/chinas-carrier-killers-how-df-21d-and-df-26b-missiles-threaten-us-navy-207372
  21. Built to Sink Aircraft Carriers: China’s DF-21D Missile Is a Game Changer, accessed October 3, 2025, https://nationalsecurityjournal.org/built-to-sink-aircraft-carriers-chinas-df-21d-missile-is-a-game-changer/
  22. [Question] Anyone knows how Chinese Anti-ship Ballistic Missile terminal phase guidance works? : r/geopolitics – Reddit, accessed October 3, 2025, https://www.reddit.com/r/geopolitics/comments/ob0fus/question_anyone_knows_how_chinese_antiship/
  23. China’s Hypersonic Weapons | GJIA – Georgetown University, accessed October 3, 2025, https://gjia.georgetown.edu/2021/01/27/chinas-hypersonic-weapons/
  24. China’s Hypersonic Missiles Summed Up in 4 Words – National Security Journal, accessed October 3, 2025, https://nationalsecurityjournal.org/chinas-hypersonic-missiles-summed-up-in-4-words/
  25. Hypersonic Weapons: Background and Issues for Congress, accessed October 3, 2025, https://www.congress.gov/crs-product/R45811
  26. China Showcases Hypersonic Weapon Near Taiwan, U.S. Tests | Arms Control Association, accessed October 3, 2025, https://www.armscontrol.org/act/2022-09/news/china-showcases-hypersonic-weapon-near-taiwan-us-tests
  27. Hypersonic Weapons Development in China, Russia and the United States – AUSA, accessed October 3, 2025, https://www.ausa.org/sites/default/files/publications/LWP-143-Hypersonic-Weapons-Development-in-China-Russia-and-the-United-States.pdf
  28. Type 055 destroyer – Wikipedia, accessed October 3, 2025, https://en.wikipedia.org/wiki/Type_055_destroyer
  29. Type 055 Renhai-class Cruiser: China’s Premier Surface Combatant – U.S. Naval Institute, accessed October 3, 2025, https://www.usni.org/magazines/proceedings/2023/march/type-055-renhai-class-cruiser-chinas-premier-surface-combatant
  30. Type 055 Class (Renhai Class) Chinese Guided Missile Cruiser – ODIN – OE Data Integration Network, accessed October 3, 2025, https://odin.tradoc.army.mil/WEG/Asset/Type_055-Class_(Renhai_Class)_Chinese_Guided_Missile_Cruiser
  31. World’s Biggest Submarine Fleet! China Poised To Outsize U.S. Navy By 2030; Will PLA-N Dominate The Deep? – EurAsian Times, accessed October 3, 2025, https://www.eurasiantimes.com/china-to-surpass-us-in-submarine/
  32. Chinese Anti-Ship Ballistic Missile (ASBM) Development – Brookings Institution, accessed October 3, 2025, https://www.brookings.edu/books/chinese-anti-ship-ballistic-missile-asbm-development/
  33. People’s Liberation Army Strategic Support Force – Wikipedia, accessed October 3, 2025, https://en.wikipedia.org/wiki/People%27s_Liberation_Army_Strategic_Support_Force
  34. China’s Strategic Support Force: A Force for a New Era – Digital Commons @ NDU, accessed October 3, 2025, https://digitalcommons.ndu.edu/china-strategic-perspectives/6/
  35. (U) CHINA: CA-BDE ELECTRONIC WARFARE OPERATIONS, accessed October 3, 2025, https://g2webcontent.z2.web.core.usgovcloudapi.net/OEE/China%20Landing%20Zone/PLAA-Combined-Arms-Brigade-Electronic-Warfare-Operations.pdf
  36. Chapter 8 – China’s Evolving Counter-Intervention Capabilities and the Role of Indo-Pacific Allies, accessed October 3, 2025, https://www.uscc.gov/sites/default/files/2024-11/Chapter_8–Chinas_Evolving_Counter-Intervention_Capabilities.pdf
  37. Electronic Warfare and Signals Intelligence; South China Sea Military Capability Series – DTIC, accessed October 3, 2025, https://apps.dtic.mil/sti/trecms/pdf/AD1128255.pdf
  38. Securing Cyber and Space: How the United States Can Disrupt China’s Blockade Plans, accessed October 3, 2025, https://www.csis.org/analysis/securing-cyber-and-space-how-united-states-can-disrupt-chinas-blockade-plans
  39. Aegis Combat System | Lockheed Martin, accessed October 3, 2025, https://www.lockheedmartin.com/en-us/products/aegis-combat-system.html
  40. Aegis Combat System – Wikipedia, accessed October 3, 2025, https://en.wikipedia.org/wiki/Aegis_Combat_System
  41. Naval Integrated Fire Control – Counter Air Systems Engineering – HigherGov, accessed October 3, 2025, https://www.highergov.com/budget/naval-integrated-fire-control-counter-air-systems-engineering-375cb8a/
  42. Cooperative Engagement Capability – Wikipedia, accessed October 3, 2025, https://en.wikipedia.org/wiki/Cooperative_Engagement_Capability
  43. CEC Cooperative Engagement Capability – ASSISTANT …, accessed October 3, 2025, https://www.secnav.navy.mil/rda/Pages/Programs/CEC.aspx
  44. Missiles Won’t Make It Past The Navy’s Upgraded Interceptor – The National Interest, accessed October 3, 2025, https://nationalinterest.org/blog/buzz/missiles-wont-make-it-past-navys-upgraded-interceptor-205041/
  45. The Aegis Warship: Joint Force Linchpin for IAMD and Access Control – NDU Press, accessed October 3, 2025, https://ndupress.ndu.edu/Media/News/Article/643226/the-aegis-warship-joint-force-linchpin-for-iamd-and-access-control/
  46. Aegis Modernization Program – Director Operational Test and Evaluation, accessed October 3, 2025, https://www.dote.osd.mil/Portals/97/pub/reports/FY2022/navy/2022aegis.pdf?ver=jROFsqvJIr88Il-32-ffUA%3D%3D
  47. Project Overmatch Discussion, accessed October 3, 2025, https://www.ndia-sd.org/wp-content/uploads/2025/02/13-Feb-2025-QBOB-Overmatch-Brief-Nic-Bergeron.pdf
  48. Department of Defense Successfully Deploys Commercial AI Solutions for Critical Maritime Domain Awareness, Project Common Operational Database (COD), accessed October 3, 2025, https://www.diu.mil/latest/department-of-defense-successfully-deploys-commercial-ai-solutions-for
  49. Project Overmatch Achieves Historic Milestone with Five Eyes …, accessed October 3, 2025, https://www.navwar.navy.mil/Media/Article-Display/Article/4077984/project-overmatch-achieves-historic-milestone-with-five-eyes-agreement/
  50. Navy’s Project Overmatch steams ahead at RIMPAC – DefenseScoop, accessed October 3, 2025, https://defensescoop.com/2024/08/15/navy-project-overmatch-rimpac-2024-steams-ahead/
  51. Understanding and Countering China’s Maritime Gray Zone … – RAND, accessed October 3, 2025, https://www.rand.org/content/dam/rand/pubs/research_reports/RRA2900/RRA2954-1/RAND_RRA2954-1.pdf
  52. “Narrowing “The Gap”: Counter Gray Zone Operations” by Raul (Pete) Pedrozo, accessed October 3, 2025, https://digital-commons.usnwc.edu/ils/vol103/iss1/11/
  53. Combating the Gray Zone: Examining Chinese Threats to the Maritime Domain, accessed October 3, 2025, https://carnegieendowment.org/posts/2024/06/combating-the-gray-zone-examining-chinese-threats-to-the-maritime-domain?lang=en
  54. China’s Evolving Risk Tolerance and Gray-Zone Operations: From the East China Sea to the South Pacific | The Heritage Foundation, accessed October 3, 2025, https://www.heritage.org/defense/report/chinas-evolving-risk-tolerance-and-gray-zone-operations-the-east-china-sea-the-south
  55. Decoding Beijing’s Gray Zone Tactics: China Coast Guard Activities and the Redefinition of Conflict in the Taiwan Strait, accessed October 3, 2025, https://globaltaiwan.org/2024/03/decoding-beijings-gray-zone-tactics-china-coast-guard-activities-and-the-redefinition-of-conflict-in-the-taiwan-strait/
  56. Maritime Militia – Wikipedia, accessed October 3, 2025, https://en.wikipedia.org/wiki/Maritime_Militia
  57. The role of the People’s Armed Forces Maritime Militia: Implications for Maritime Security and European interests – EuroHub4Sino, accessed October 3, 2025, https://eh4s.eu/publication/the-role-of-the-peoples-armed-forces-maritime-militia-implications-for-maritime-security-and-european-interests
  58. A Short History of China’s Fishing Militia and What It May Tell Us | RAND, accessed October 3, 2025, https://www.rand.org/pubs/commentary/2020/04/a-short-history-of-chinas-fishing-militia-and-what.html
  59. China’s Maritime Militia – CNA.org., accessed October 3, 2025, https://www.cna.org/archive/CNA_Files/pdf/chinas-maritime-militia.pdf
  60. Maritime Malitias – Marine Corps University, accessed October 3, 2025, https://www.usmcu.edu/Outreach/Marine-Corps-University-Press/MCU-Journal/JAMS-vol-15-no-2/Maritime-Militias/
  61. China’s Maritime Militia and Fishing Fleets – Army University Press, accessed October 3, 2025, https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/January-February-2021/Panter-Maritime-Militia/
  62. Develop Strategies to Counter China’s Gray Zone Tactics, accessed October 3, 2025, https://cimsec.org/develop-strategies-to-counter-chinas-gray-zone-tactics/
  63. Understanding China’s Submarine Capabilities – CeSCube, accessed October 3, 2025, https://www.cescube.com/vp-understanding-china-s-submarine-capabilities
  64. China’s massive submarine build-up | The Australian Naval Institute, accessed October 3, 2025, https://navalinstitute.com.au/chinas-massive-submarine-build-up/
  65. QUICK LOOK REPORT “CHINESE UNDERSEA WARFARE: DEVELOPMENT, CAPABILITIES, TRENDS” – NET, accessed October 3, 2025, https://dnnlgwick.blob.core.windows.net/portals/0/NWCDepartments/China%20Maritime%20Studies%20Institute/Naval%20War%20College_China%20Maritime%20Studies%20Institute_CHINESE%20UNDERSEA%20WARFARE_CONFERENCE%20SUMMARY_20230505.pdf?sv=2017-04-17&sr=b&si=DNNFileManagerPolicy&sig=aNjd0oSuWH9ZfwETOtw9vMrKXstS4%2F%2BN%2FAavMj9pASg%3D
  66. Submarines Will Reign in a War with China | Proceedings – U.S. Naval Institute, accessed October 3, 2025, https://www.usni.org/magazines/proceedings/2023/march/submarines-will-reign-war-china
  67. COMMANDER’S INTENT 4.0, accessed October 3, 2025, https://www.csp.navy.mil/Portals/2/documents/about/commandersintent4.0.pdf
  68. Anti-Submarine Warfare | Office of Naval Research, accessed October 3, 2025, https://www.onr.navy.mil/organization/departments/code-32/division-321/anti-submarine-warfare
  69. China is Preparing to Counter U.S. Submarine Surveillance System, accessed October 3, 2025, https://maritime-executive.com/editorials/china-is-preparing-to-counter-u-s-submarine-surveillance-system
  70. Sinking feeling engulfs China submarine program – Asia Times, accessed October 3, 2025, https://asiatimes.com/2024/10/sinking-feeling-engulfs-china-submarine-program/
  71. A DESIGN FOR MAINTAINING MARITIME SUPERIORITY, accessed October 3, 2025, https://media.defense.gov/2020/May/18/2002301999/-1/-1/1/DESIGN_2.0.PDF
  72. The Creation of the PLA Strategic Support Force and Its Implications for Chinese Military Space Operations | RAND, accessed October 3, 2025, https://www.rand.org/pubs/research_reports/RR2058.html
  73. The PLA’s Strategic Support Force and AI Innovation – Brookings Institution, accessed October 3, 2025, https://www.brookings.edu/articles/the-plas-strategic-support-force-and-ai-innovation-china-military-tech/
  74. Chapter 8 – Cyber Warfare Capabilities of the PLA Strategic Support Force (SSF), accessed October 3, 2025, https://indsr.org.tw/uploads/enindsr/files/202206/64b998f3-d906-46a4-b78e-08c06eb28c3e.pdf
  75. SECTION 2: CHINA’S CYBER CAPABILITIES: WARFARE, ESPIONAGE, AND IMPLICATIONS FOR THE UNITED STATES Abstract, accessed October 3, 2025, https://www.uscc.gov/sites/default/files/2022-11/Chapter_3_Section_2–Chinas_Cyber_Capabilities.pdf
  76. “War Without Harm”: China’s Hybrid Warfare Playbook Against Taiwan | Geopolitical Monitor, accessed October 3, 2025, https://www.geopoliticalmonitor.com/war-without-harm-chinas-hybrid-warfare-playbook-against-taiwan/
  77. Navy Contracts Small Tech Firm to Research Alternative Battle Networks for Project Overmatch – USNI News, accessed October 3, 2025, https://news.usni.org/2024/10/03/navy-contracts-small-tech-firm-to-research-alternative-battle-networks-for-project-overmatch
  78. Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System | CISA, accessed October 3, 2025, https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-239a
  79. People’s Republic of China Threat Overview and Advisories – CISA, accessed October 3, 2025, https://www.cisa.gov/topics/cyber-threats-and-advisories/nation-state-cyber-actors/china
  80. House Republicans reintroduce bill to counter Chinese cyber threats to critical infrastructure, accessed October 3, 2025, https://industrialcyber.co/regulation-standards-and-compliance/house-republicans-reintroduce-bill-to-counter-chinese-cyber-threats-to-critical-infrastructure/
  81. Understanding the U.S. Navy’s New Navigation Plan – Second Line of Defense, accessed October 3, 2025, https://sldinfo.com/2024/11/understanding-the-u-s-navys-new-navigation-plan/
  82. China’s shipbuilding dominance a national security risk for US: Report – Defense News, accessed October 3, 2025, https://www.defensenews.com/global/asia-pacific/2025/03/11/chinas-shipbuilding-dominance-a-national-security-risk-for-us-report/
  83. Unpacking China’s Naval Buildup – CSIS, accessed October 3, 2025, https://www.csis.org/analysis/unpacking-chinas-naval-buildup
  84. Closing the gap: China homes in on US Navy VLS advantage, accessed October 3, 2025, https://www.iiss.org/online-analysis/military-balance/2024/12/closing-the-gap-china-homes-in-on-us-navy-vls-advantage/
  85. Chinese and US navies compared | The Australian Naval Institute, accessed October 3, 2025, https://navalinstitute.com.au/chinese-and-us-navies-compared/
  86. China vs. U.S. Navy: Which Fighting Force on the Water Is Stronger? – The National Interest, accessed October 3, 2025, https://nationalinterest.org/blog/buzz/china-vs-us-navy-which-fighting-force-water-stronger-212291
  87. Exploiting China’s Maritime Vulnerability | Proceedings – U.S. Naval Institute, accessed October 3, 2025, https://www.usni.org/magazines/proceedings/2023/april/exploiting-chinas-maritime-vulnerability
  88. The Unsinkable Aircraft Carrier: An American Response to the Chinese Anti-Access/Area Denial (A2/AD) Challenge – DTIC, accessed October 3, 2025, https://apps.dtic.mil/sti/tr/pdf/AD1023223.pdf

Threat Assessment and Counter-Strategies for an Air-Sea Confrontation in the Western Pacific

A potential high-intensity conflict in the Western Pacific would represent the most significant military challenge for the United States in generations. It would not be a simple contest of platforms—ship versus ship or aircraft versus aircraft—but a fundamental confrontation between two opposing military philosophies, doctrines, and operational systems. The People’s Liberation Army (PLA) has spent three decades developing a comprehensive warfighting approach designed specifically to counter U.S. power projection. This approach is rooted in the concept of “Systems Confrontation” , a doctrine aimed at paralyzing an adversary’s entire operational architecture rather than attriting its forces piece by piece. This doctrine is operationalized through a formidable Anti-Access/Area Denial (A2/AD) fortress, a multi-layered network of sensors and long-range precision weapons intended to make the seas and skies within the First and Second Island Chains prohibitively dangerous for U.S. forces.

The U.S. response to this challenge is not to match the PLA system for system, but to counter with a doctrine based on resilience, agility, and networked lethality. The core tenets of this counter-strategy are Distributed Maritime Operations (DMO) and Joint All-Domain Command and Control (JADC2). DMO seeks to enhance survivability and combat power by dispersing naval forces over wide areas while concentrating their effects through networking. JADC2 is the technological and doctrinal framework intended to create a resilient, self-healing, “any sensor, any shooter” network that connects the entire joint force across all domains—sea, air, land, space, and cyberspace.

From a commander’s perspective, the central problem is how to maintain combat effectiveness and project power when faced with a PLA strategy explicitly designed to sever command and control (C2) linkages, hold high-value assets like aircraft carriers at extreme risk, and overwhelm conventional defenses with massed fires. In this environment, victory will not be determined by material superiority alone. It will be decided by which side can achieve and maintain “decision advantage”—the ability to sense, make sense, decide, and act faster and more effectively than the adversary across the entire battlespace. This assessment identifies the five most probable and impactful strategies a PLA commander will employ and outlines the corresponding U.S. operational responses required to seize the initiative and prevail.

Warfighting FunctionU.S. Doctrine/ConceptPLA Doctrine/Concept
Command & ControlJoint All-Domain Command & Control (JADC2)Systems Destruction Warfare / Informatized Warfare
Force EmploymentDistributed Maritime Operations (DMO)Anti-Access/Area Denial (A2/AD)
Strategic GoalEscalation Dominance / DeterrenceDissipative Warfare / Winning Without Fighting
Technological EdgeHuman-Machine Teaming / AI AugmentationIntelligentized Warfare / AI-Driven C2
Operational MethodIntegrated, All-Domain ManeuverConcentrated Kinetic Pulse / Annihilation by Mass

I. PLA Strategy 1: The System-Centric Opening Salvo – Paralyze Before You Annihilate

The Chinese Commander’s Approach: Systems Destruction Warfare in Practice

The PLA’s “basic operational method” for modern warfare is “Systems Confrontation,” a concept that views military forces not as collections of individual units but as integrated “systems of systems”. The PLA’s theory of victory, therefore, is “Systems Destruction Warfare,” which prioritizes fragmenting the adversary’s operational system into isolated, ineffective components, thereby achieving a state where the whole is less than the sum of its parts—making “1+1<2”. This doctrine, developed from meticulous observation of U.S. network-centric military victories in the 1990s, is designed to turn a core American strength—our reliance on information networks—into a critical vulnerability. The objective of the opening salvo is not annihilation but paralysis: to degrade the U.S. OODA (Observe, Orient, Decide, Act) loop, sow confusion, and achieve decision paralysis before the main kinetic battle is joined.

This initial assault will be a simultaneous, multi-domain attack targeting the central nervous system of U.S. forces in the theater. The PLA’s organizational reforms, particularly the 2015 creation of the Strategic Support Force (SSF) to unify space, cyber, and electronic warfare capabilities, provide concrete evidence that this is not an abstract theory but a core, operationalized warfighting concept. The attack vectors will include:

  • Cyber Domain: In line with its doctrine of “informatized warfare,” the PLA will execute a sophisticated campaign of offensive cyber operations. The primary targets will be the command and control networks that enable joint operations, as well as logistics databases and information systems architectures. The goal is to corrupt data, disrupt communications, and inject malware that degrades the reliability of the information upon which commanders depend, creating widespread confusion and mistrust in our own systems.
  • Space Domain: The PLA recognizes U.S. dependency on space-based assets for C4ISR, precision navigation, and timing. The opening moves of a conflict will almost certainly include attacks on this architecture. These attacks will be both kinetic, using anti-satellite (ASAT) missiles to physically destroy key nodes, and non-kinetic, employing jamming and cyberattacks to temporarily disable or deceive our satellites. The objective is to blind our long-range sensors and sever the satellite communication (SATCOM) links that are the backbone of our networked force, effectively isolating combatant formations from each other and from strategic command.
  • Electromagnetic Spectrum: A pervasive electronic warfare (EW) campaign will seek to establish dominance in the electromagnetic spectrum. Specialized aircraft, such as the J-16D, will be deployed to jam U.S. radars, datalinks like Link-16, and GPS signals. This creates a “complex electromagnetic environment” designed to degrade situational awareness, disrupt weapon guidance systems, and sever the tactical data links between platforms, preventing them from operating as a cohesive force.
  • Targeting Key Physical Nodes: This non-kinetic assault will be complemented by precision strikes against the physical infrastructure of our command and control system. Using their arsenal of conventional ballistic and cruise missiles, the PLA will target fixed, high-value C2 nodes such as regional Air Operations Centers, major headquarters, and critical communications hubs located on U.S. and allied bases throughout the theater.

U.S. Commander’s Response: JADC2 and Doctrinal Resilience

The U.S. counter to a system-centric attack is not to build an impenetrable shield, but to field a system that is inherently resilient, adaptable, and capable of operating effectively even when degraded. This is the core purpose of the Joint All-Domain Command and Control (JADC2) concept. JADC2 is not a single piece of hardware but an overarching approach to creating a secure, cloud-like environment for the joint force, enabling any sensor to connect to any shooter. The immediate operational priority is to fight through the initial salvo by assuming that some networks will fail and that communications will be contested.

  • Activating the Resilient Network: The JADC2 framework must be designed for failure. It cannot be a brittle, centralized system. It must incorporate redundant communication pathways, including line-of-sight datalinks, laser communications, and dispersed satellite constellations, to ensure that multiple routes exist for critical data. The principle is to create a “self-healing” network that can automatically re-route traffic around damaged or jammed nodes.
  • Decentralization and Edge Processing: A key enabler of resilience is the principle of decentralization, a core tenet of Distributed Maritime Operations. Commanders at the tactical edge must be trained and equipped to operate with mission-type orders, empowered to make decisions based on the commander’s intent even when cut off from higher headquarters. This requires “edge computing” capabilities, where data is processed and analyzed locally on ships and aircraft, allowing them to generate targeting solutions and continue the fight without constant connectivity to a central command node.
  • Leveraging Survivable Nodes: Stealth platforms are critical to this resilient architecture. An F-35, for example, is far more than a strike fighter; it is a flying sensor-fusion engine and a survivable, forward-deployed node in the JADC2 network. Operating within contested airspace, F-35s can use their passive sensors to collect vast amounts of intelligence on enemy dispositions, process that data onboard, and securely share it with other assets—both airborne and surface—to create a localized, ad-hoc battle network that can bypass jammed satellite links or compromised command centers.
  • Proactive Defense (“Defend Forward”): U.S. cyber forces will not be in a passive, defensive posture. In accordance with the “defend forward” doctrine, U.S. Cyber Command will be continuously engaged within adversary networks, seeking to understand their intentions, disrupt their C2 processes, and counter their offensive operations at or before the point of origin. This is a critical element of imposing friction and cost on the PLA’s system as they attempt to do the same to ours, turning the initial phase of the conflict into a contested cyber and electronic battle for information dominance.

II. PLA Strategy 2: The A2/AD Fortress – Forcing a Standoff

The Chinese Commander’s Approach: Operationalizing the “Keep-Out Zone”

The operational centerpiece of the PLA’s strategy is its Anti-Access/Area Denial (A2/AD) system. This is not a simple wall of defenses but a sophisticated, layered defense-in-depth designed to make military operations within the First and Second Island Chains prohibitively costly, thereby deterring U.S. intervention or defeating it if it occurs. The effectiveness of the A2/AD bubble does not rely on any single weapon but on the integrated “system of systems” that connects long-range sensors to long-range shooters. The entire kill chain—from detection and tracking to targeting and engagement—is the true center of gravity of this strategy. The PLA’s militarization of artificial islands in the South China Sea serves as a crucial geographic enabler, creating unsinkable forward bases that extend the reach of their sensor networks and missile coverage, creating overlapping fields of fire that are difficult to circumvent.

The A2/AD fortress is composed of distinct but overlapping layers of kinetic threats:

  • Long-Range Fires (Anti-Access): The outer layer is designed to prevent U.S. forces, particularly Carrier Strike Groups and air assets, from entering the theater of operations. This mission is primarily assigned to the PLA Rocket Force (PLARF). Its key systems include the DF-21D anti-ship ballistic missile (ASBM), with a range of approximately 1,500 km, and the DF-26 intermediate-range ballistic missile, dubbed the “Guam Killer,” with a range of at least 3,000 km. These weapons are designed to strike large, moving targets like aircraft carriers. This layer is increasingly augmented by hypersonic weapons, such as the DF-17, which carries a hypersonic glide vehicle (HGV). The extreme speed (Mach 5-10) and unpredictable, maneuvering trajectory of the HGV are designed to defeat existing U.S. missile defense systems like Aegis and THAAD.
  • Theater-Range Fires (Area Denial): The inner layers of the A2/AD bubble are designed to limit the freedom of action of any U.S. forces that manage to penetrate the outer screen. This involves a dense and redundant network of advanced anti-ship cruise missiles (ASCMs), such as the supersonic YJ-12 and the subsonic, sea-skimming YJ-18. These missiles can be launched from a wide variety of platforms, creating a multi-axis threat: from mobile land-based launchers, from H-6K bombers, from surface combatants like the Type 055 destroyer, and from submarines, including the Type 093 nuclear attack submarine.
  • The Protective IADS Umbrella: The PLA’s offensive missile forces are protected by one of the world’s most robust and modern Integrated Air Defense Systems (IADS). This system combines advanced Russian-made S-400 and S-300 long-range surface-to-air missile (SAM) systems with domestically produced systems like the HQ-9, HQ-22, and the newer, exo-atmospheric HQ-29 interceptor. This network of SAMs is linked by an extensive array of ground-based radars and airborne early warning and control (AEW&C) aircraft, such as the KJ-500A and KJ-600, giving it the capability to detect, track, and engage a wide spectrum of aerial threats, from cruise missiles to 5th-generation stealth aircraft.
System DesignationTypeEstimated Range (km)Launch PlatformsPrimary Role/Target
DF-26Intermediate-Range Ballistic Missile (IRBM)3,000+Transporter Erector Launcher (TEL)U.S. Carrier Strike Groups, U.S. Bases (Guam)
DF-21DAnti-Ship Ballistic Missile (ASBM)1,500-1,700TELU.S. Carrier Strike Groups
DF-17Medium-Range Ballistic Missile w/ HGV1,800-2,500TELHigh-Value U.S. Assets (Carriers, Bases, C2 Nodes)
YJ-18Anti-Ship Cruise Missile (ASCM)~540Type 055/052D Destroyers, SubmarinesU.S. Surface Combatants
YJ-12Supersonic ASCM~400H-6K Bombers, J-16 Fighters, DestroyersU.S. Surface Combatants
S-400 TriumfLong-Range Surface-to-Air Missile (SAM)40-400 (missile dependent)TELU.S. 4th/5th Gen Aircraft, Bombers, Support Aircraft
HQ-9CLong-Range SAM300+TELU.S. 4th/5th Gen Aircraft, Cruise Missiles

U.S. Commander’s Response: Multi-Domain Disintegration of the A2/AD Network

A direct, frontal assault on a mature A2/AD system would be prohibitively costly. The U.S. response must therefore be an indirect, multi-domain campaign designed to systematically dis-integrate the A2/AD network by attacking its critical nodes and severing the links of its kill chain. The goal is not to destroy the entire system at once, but to create temporary and localized corridors of air and sea control, allowing our forces to project power for specific objectives. This campaign will unfold in phases.

  • Phase 1: Blinding the Enemy. The initial focus will be on dismantling the A2/AD C3ISR architecture, rendering the PLA’s long-range shooters ineffective.
  • Subsurface Operations: Our nuclear-powered attack and guided missile submarines (SSNs and SSGNs) are our most survivable and potent assets for this phase. Operating undetected deep inside the A2/AD bubble, they will conduct covert intelligence, surveillance, and reconnaissance (ISR) to map the enemy’s network. They will then use their significant payload of Tomahawk Land Attack Missiles to execute precision strikes against critical C3ISR nodes, such as coastal over-the-horizon radar sites, satellite ground stations, and hardened command bunkers.
  • Penetrating Air Operations: Stealth aircraft are essential for creating the initial breaches in the formidable IADS. Long-range B-2 and B-21 bombers, escorted by F-22 Raptors providing air superiority, will prosecute the most heavily defended, high-value targets, such as S-400 batteries and key command centers. F-35s will leverage their advanced sensor suites to passively locate and map enemy air defense emitters, feeding this real-time data back into the JADC2 network to enable dynamic re-tasking and follow-on strikes by other assets.
  • Phase 2: Rolling Back the Threat. Once the IADS umbrella has been degraded in specific corridors, we can begin to attrit the PLA’s offensive missile launchers with a lower degree of risk.
  • Standoff Strikes: Carrier Strike Groups and land-based bombers, operating from safer standoff distances outside the densest threat rings, will launch large volleys of long-range, stealthy weapons like the Long Range Anti-Ship Missile (LRASM) and the Joint Air-to-Surface Standoff Missile (JASSM). These weapons will be used to destroy the now-exposed and less-defended mobile launchers for the DF-21D, DF-26, and ASCMs.
  • Non-Kinetic Suppression: Throughout these operations, EA-18G Growler electronic attack aircraft will provide crucial support. They will jam enemy early warning and fire control radars, disrupt communications between command posts and launch units, and protect our strike packages from residual air defense threats, further contributing to the dis-integration of the A2/AD network.

By executing this phased campaign, we can systematically dismantle the A2/AD fortress, creating breaches that allow for the projection of decisive combat power.

III. PLA Strategy 3: The Overwhelming Kinetic Pulse – Annihilation by Mass

The Chinese Commander’s Approach: The Decisive Attack

While the PLA has embraced sophisticated, system-centric warfare, this has not replaced its foundational belief in the importance of mass and annihilation. A core PLA tactical principle, influenced by both Soviet and historical Chinese military thought, is to concentrate overwhelming power at a decisive point and time to annihilate the enemy force—to “use ten against one”. The “Systems Destruction” opening is the shaping operation designed to isolate and weaken a U.S. force element, such as a Carrier Strike Group. The overwhelming kinetic pulse is the decisive operation intended to destroy that isolated element. By degrading the CSG’s long-range sensors and disrupting its datalinks, the PLA hopes to force it into a reactive, close-in fight where numerical superiority can be brought to bear with devastating effect.

A PLA commander will leverage the sheer size of the PLA Navy—the world’s largest by number of ships—and the PLA Air Force to execute a massive, coordinated, multi-axis saturation attack designed to overwhelm the defensive capacity of a CSG. This attack will be characterized by:

  • Massed Missile Strikes: The assault will involve synchronized volleys of missiles from every domain to complicate our defensive problem. This will include waves of H-6K bombers launching long-range ASCMs from the air ; Surface Action Groups led by Type 055 and Type 052D destroyers firing their own large complements of YJ-18 ASCMs ; and covert strikes from submarines, such as the Type 093 SSN, firing submerged-launched cruise missiles.
  • Contesting Air Superiority: The PLA’s J-20 stealth fighters will be tasked with a critical enabling mission: hunting and destroying U.S. high-value air assets. Their primary targets will not be our fighters, but our force multipliers: the E-2D Hawkeye AEW&C aircraft that act as the eyes and ears of the fleet, and the KC-135/KC-46 tankers that are the lifeline for our combat aircraft in the vast Pacific theater. The J-20, with its combination of stealth, speed, and long-range air-to-air missiles, is purpose-built for this “airborne sniper” role. In a less-contested environment, where stealth is not the primary concern, J-20s may be flown in “beast mode,” carrying additional missiles on external pylons to function as highly capable missile trucks.
  • Leveraging a Robust Industrial Base: The PLA commander will operate with the knowledge that China’s defense industrial base has a significantly greater capacity to replace losses in ships, aircraft, and munitions than the United States. This allows the PLA to plan for and accept a higher rate of attrition, potentially trading less-advanced platforms to exhaust our limited stocks of high-end defensive munitions.

U.S. Commander’s Response: The Integrated Defense of the Distributed Fleet

The U.S. counter to a strategy of annihilation by mass cannot be to simply absorb the blow. It must be to deny the PLA the opportunity to concentrate its forces against a single, high-value target. This is the central defensive logic of Distributed Maritime Operations.

  • DMO as a Counter to Saturation: By dispersing the fleet’s combat power across numerous manned and unmanned platforms over a wide geographic area, we fundamentally alter the PLA’s targeting problem. Instead of one lucrative target—the aircraft carrier—they are faced with dozens of smaller, more mobile, and harder-to-find targets. This forces them to divide their reconnaissance and strike assets, diluting the mass of their attack and preventing them from achieving overwhelming local superiority.
  • Layered, Coordinated Defense: The Carrier Strike Group, while operating as part of a distributed fleet, will still execute its well-honed “defense-in-depth” doctrine to defeat any incoming threats that leak through. This is a multi-layered, integrated system:
  • Outer Layer: The E-2D Hawkeye will detect incoming threats at long range and vector F/A-18 and F-35 combat air patrols to engage enemy bombers and fighters before they can launch their weapons.
  • Middle Layer: The Aegis Combat System on the CSG’s cruiser and destroyer escorts will track and engage incoming cruise missiles with long-range Standard Missiles (SM-6 and SM-2).
  • Inner Layer: For any missiles that penetrate the outer layers, terminal defense is provided by shorter-range missiles like the Evolved Sea Sparrow Missile (ESSM) and the Phalanx Close-In Weapon System (CIWS).
  • Concentrating Fires from Dispersed Platforms: DMO is not merely about scattering for survival; it is about networking these dispersed assets to concentrate lethal effects. Under the JADC2 framework, an Aegis destroyer operating 100 nautical miles from the carrier can receive targeting data from the carrier’s E-2D and launch its own SM-6 missiles to defend the carrier. Unmanned Surface Vessels (LUSVs), acting as remote, floating missile magazines, can be positioned to contribute to the defensive screen, increasing the fleet’s overall defensive capacity without putting more sailors at risk. This allows the fleet to absorb a larger attack by distributing the defensive burden across a wider array of platforms.
  • Protecting the Enablers: Recognizing the PLA’s strategy of targeting our high-value air assets, a dedicated contingent of our premier air superiority fighters, the F-22 Raptors, must be assigned to the counter-air mission of protecting our tankers and AEW&C aircraft. Their combination of stealth, supercruise, and advanced sensors makes them the ideal platform to establish a protective screen, actively hunting the PLA’s J-20s and other interceptors that threaten our operational backbone.

IV. PLA Strategy 4: The Dissipative Campaign – Attacking Will and Sustainment

The Chinese Commander’s Approach: Winning Without a Decisive Battle

Should a rapid, decisive victory prove elusive, the PLA is prepared to engage in a protracted conflict designed to erode U.S. operational endurance and political will. This approach is conceptualized in emerging PLA writings as “Dissipative Warfare”. Designed for the “AI era” and conducted under the shadow of nuclear deterrence, this strategy shifts the focus from physical attrition to systemic disruption. The goal is to continuously increase the “entropy,” or disorder, of the adversary’s entire warfighting system—military, political, economic, and social—while maintaining order and cohesion within one’s own. This form of warfare reduces the level of overt bloodshed but intensifies political isolation, economic blockades, and diplomatic strangulation. It is a strategy of patience and asymmetry, leveraging China’s centralized, authoritarian system against our decentralized, democratic one. The PLA is betting that it can win a war of endurance by making the cost of conflict politically unacceptable for the United States long before a decisive military outcome is reached.

The primary tools for this dissipative campaign are the PLA’s long-standing “Three Warfares” doctrine, which will be integrated with persistent, lower-intensity military operations :

  • Public Opinion Warfare: This involves a global information campaign to shape the narrative of the conflict. The PLA will seek to portray U.S. actions as aggressive, imperialistic, and illegitimate, while casting China as the defender of its sovereignty. The goal is to erode support for the war among the American public, create rifts between the U.S. and its allies, and garner sympathy from neutral nations.
  • Psychological Warfare: This campaign will directly target the morale and will to fight of U.S. forces, political leaders, and the public. It will employ sophisticated disinformation, amplify messages of defeatism and war-weariness, issue threats of devastating economic or military consequences, and use advanced technologies to manipulate perceptions and decision-making.
  • Legal Warfare (“Lawfare”): The PLA will use international and domestic legal systems to constrain U.S. military options and legitimize its own actions. This can include challenging the legality of U.S. operations in international forums, promoting interpretations of maritime law that favor China’s claims, and encouraging legal challenges within the U.S. system to slow or halt military deployments.
  • “Social A2/AD”: This broader concept describes how China’s non-military actions—such as creating economic dependencies, fostering political divisions, and conducting massive cyber espionage—are designed to fracture American society and compromise our national resolve. In a conflict, these pre-existing vulnerabilities would be exploited to degrade our capacity to mobilize and respond effectively, creating a form of A2/AD that targets our political will rather than our military platforms.

U.S. Commander’s Response: Contested Logistics and Counter-Coercion

To defeat a strategy of exhaustion, the United States must demonstrate the capacity and the will to endure. This requires a two-pronged response: first, ensuring the sustainment of our own distributed forces in a contested environment, and second, turning the dissipative strategy back against the PLA by targeting its own critical systemic vulnerabilities.

  • Sustaining the Distributed Force: A distributed fleet can only be effective if it can be sustained. A protracted conflict will place immense strain on our logistics train. We must therefore prioritize the development of a robust and resilient logistics network capable of rearming, refueling, and repairing a widely dispersed fleet under constant threat. This involves not only protecting our large, vulnerable supply ships but also fielding new, more survivable logistics platforms, such as the Medium Landing Ship (LSM) and smaller, more numerous oilers (TAOLs), which can service a distributed force without creating large, concentrated targets. Forward-basing of munitions and supplies at secure, dispersed allied locations will also be critical.
  • Turning the Tables: Exploiting China’s SLOC Vulnerability: The most effective way to counter a dissipative strategy is to impose unbearable costs and create systemic disorder within the adversary’s own system. China’s greatest strategic vulnerability is its profound dependence on maritime Sea Lines of Communication (SLOCs) for the importation of energy (oil and natural gas), raw materials, and food, as well as for its export-driven economy. Unlike the United States, which is largely self-sufficient, China’s economy and social stability are critically dependent on the free flow of maritime commerce. Furthermore, China’s economic centers of gravity are heavily concentrated along its vulnerable coastline.
  • A Campaign of Interdiction: The primary instrument for this counter-dissipative campaign will be the U.S. submarine force. Operating covertly and with near-impunity on the high seas, far from the PLA’s A2/AD bubble, our SSNs will conduct a sustained campaign of commerce raiding against Chinese-flagged merchant shipping. This campaign would not need to sink every ship; the mere presence of a credible threat would drive insurance rates to prohibitive levels, forcing ships to remain in port and effectively implementing a distant blockade. This would impose direct, crippling economic costs on the Chinese state, creating internal pressure, disrupting industrial production, and generating the very systemic entropy that their dissipative strategy seeks to inflict upon us.
  • Information Dominance: Concurrently, we must wage our own information campaign. This involves aggressively countering the “Three Warfares” by systematically exposing PLA disinformation, clearly articulating the legal basis for our actions under international law, and maintaining a strong, consistent narrative of defending a free and open international order. This is essential for solidifying allied cohesion and maintaining the domestic political will necessary to see the conflict through to a successful conclusion.

V. PLA Strategy 5: The Intelligentized Gambit – Seizing the Initiative Through Asymmetry

The Chinese Commander’s Approach: Seeking a Paradigm Shift

The PLA is not content to simply master the current paradigm of “informatized” warfare; its leadership is aggressively pursuing what they see as the next military revolution: “intelligentized warfare”. This concept is centered on the integration of artificial intelligence (AI), big data, and autonomous systems into every aspect of military operations. The ultimate goal is to achieve a decisive advantage in the speed and quality of decision-making, creating an AI-driven command and control system that can operate inside an adversary’s human-centric OODA loop, rendering their command structures obsolete. A PLA commander, confident in these emerging capabilities, might employ them to create an asymmetric shock, seeking to achieve a rapid victory or create unforeseen tactical dilemmas that shatter our operational plans.

While many of these capabilities are still developmental, a PLA commander could employ several “intelligentized” gambits:

  • Autonomous Swarms: The deployment of large, coordinated swarms of low-cost, attritable unmanned air and sea vehicles. Directed by a central AI, these swarms could be used to saturate the defenses of a high-value asset like a destroyer, conduct complex, distributed ISR missions, or act as decoys to draw out our limited defensive munitions.
  • AI-Driven Command and Control: The PLA is working towards an AI-powered battle management system that can fuse data from thousands of sensors in real-time, identify and prioritize targets, and automatically recommend the optimal engagement solution to commanders. A mature version of this system could shrink the PLA’s decision cycle from minutes to seconds, allowing them to execute complex, multi-domain attacks at a speed that human staffs cannot possibly match.
  • “Battleverse” and Synthetic Warfare: The PLA is exploring the concept of a “military metaverse” or “battleverse”. This virtual environment would be used to train AI algorithms on millions of simulated combat scenarios, allowing them to learn, adapt, and develop novel tactics that are non-intuitive and unpredictable to human opponents. This could lead to the employment of battlefield strategies that we have never seen or prepared for.
  • Advanced Human-Machine Teaming: PLA research includes concepts like “simulacrums”—humanoid or bionic robots controlled in real-time by human operators using brain-computer interfaces or other advanced controls. These could be used for dangerous tasks like special operations, damage control on stricken ships, or operating in chemically or radiologically contaminated environments, creating a new type of combat unit with unique capabilities and risk profiles.

The greatest danger posed by “intelligentized warfare” is not any single piece of hardware, but the potential for an AI-driven C2 system to achieve a speed of decision and action that makes our own command processes a critical liability. The conflict could transform into a battle of algorithms, where the side with the faster, more adaptive AI gains an insurmountable advantage. However, this also introduces the risk of “brittle” AI. A system trained on simulated data may perform brilliantly within its parameters but could fail catastrophically or act in bizarre, unpredictable ways when faced with the chaos and friction of real combat. A PLA commander, overly confident in their AI, might initiate an action based on a flawed algorithmic calculation that leads to rapid, unintended escalation that neither side can easily control.

U.S. Commander’s Response: Adaptive Force Employment and Escalation Dominance

The U.S. response to the “intelligentized” threat must be to embrace our own technological advantages while mitigating the unique risks posed by AI-driven warfare. It requires a combination of technological counter-measures, doctrinal flexibility, and a firm grasp of escalation management.

  • Human-Machine Teaming: The U.S. approach to AI in warfare must be to augment, not replace, the human commander. We will employ AI and machine learning as powerful tools to filter the massive volumes of data on the modern battlefield, identify patterns and threats, and present prioritized options to human decision-makers. This will accelerate our own OODA loop, allowing us to keep pace with an AI-driven adversary without sacrificing the crucial elements of human judgment, intuition, and ethical oversight.
  • Counter-AI Operations: We must develop and field capabilities designed specifically to defeat intelligentized systems. This includes advanced EW capabilities to jam the datalinks that coordinate drone swarms, rendering them ineffective. It also requires sophisticated cyber operations designed to attack the AI systems themselves—either by corrupting the training data they rely on (“poisoning the well”) or by exploiting algorithmic biases to manipulate their decision-making in our favor.
  • Empowering Subordinate Initiative (Mission Command): A rigid, centralized command structure is a death sentence in a high-speed, AI-driven battle. The U.S. must fully embrace the doctrine of mission command, empowering junior officers at the tactical edge to exercise disciplined initiative. Commanders must be trained to understand the overall intent of the operation and be given the freedom to adapt their actions to rapidly changing, unforeseen circumstances created by enemy AI, without waiting for permission from a higher headquarters. This doctrinal flexibility is a key asymmetric advantage against a more rigid, top-down command culture.
  • Maintaining Escalation Dominance: The ultimate backstop against a destabilizing, asymmetric “intelligentized” gambit is our ability to control the ladder of escalation. We must maintain and clearly signal a credible capability to respond to any level of attack with a response that imposes unacceptable costs on the PLA and the Chinese state. This ensures that the PLA commander always understands that the risks of deploying their most novel, unpredictable, and potentially destabilizing weapons far outweigh any potential tactical or operational reward, thereby deterring their use in the first place.

Conclusion: The Commander’s Synthesis – Achieving Decision Advantage

The strategic challenge posed by the PLA in the Western Pacific is formidable, built on a foundation of doctrinally coherent, technologically advanced, and multi-layered warfighting concepts. The PLA’s strategies—from the opening system-centric salvo to the potential for an “intelligentized” gambit—are designed to counter traditional U.S. military strengths and exploit perceived vulnerabilities in our networked way of war.

However, these strategies are not insurmountable. Victory in this modern, high-intensity conflict will not be achieved by winning a simple war of attrition or a platform-for-platform exchange. It will be achieved by winning the information and decision contest. The full and integrated implementation of Distributed Maritime Operations and Joint All-Domain Command and Control is the key to building a joint force that is more resilient, agile, lethal, and adaptable than the adversary. By achieving and maintaining “decision advantage,” the U.S. can seize the initiative, dictate the tempo of operations, and ultimately prevail.

For the U.S. commander tasked with this mission, five imperatives are paramount:

  1. Assume Day One is Degraded: We must train, equip, and plan for a conflict in which our space and cyber assets are under immediate and sustained attack. Our ability to fight effectively in a degraded C2 environment is a prerequisite for survival and success.
  2. Dismantle, Don’t Destroy: The focus of our initial campaign must be on the dis-integration of the enemy’s A2/AD system by targeting its C3ISR kill chain, rather than attempting to attrite every missile and launcher.
  3. Deny the Decisive Battle: We must use the principles of distribution and dispersal inherent in DMO to deny the PLA the force concentration it requires to execute its preferred strategy of a decisive battle of annihilation.
  4. Wage a Counter-Campaign: In a protracted conflict, we must actively target the adversary’s own systemic vulnerabilities. A sustained campaign to interdict China’s critical maritime SLOCs is our most potent tool for imposing unacceptable costs and winning a war of endurance.
  5. Out-Adapt, Don’t Just Out-Fight: We must embrace our own AI-enabled capabilities within a framework of human-machine teaming and foster a culture of mission command that empowers our forces to adapt faster than an adversary who may become overly reliant on rigid, AI-driven systems. By doing so, we can counter their gambits and maintain the initiative.

If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly contribute towards our continued reporting, please visit our funding page.


Sources Used

  1. Systems Confrontation and System Destruction Warfare: How the Chinese People’s Liberation Army Seeks to Wage Modern Warfare | RAND, accessed October 3, 2025, https://www.rand.org/pubs/research_reports/RR1708.html
  2. PLA Reform and Systems Attack – Capstone, accessed October 3, 2025, https://capstone.ndu.edu/Portals/83/Wed%20-%20PLA%20Systems%20Attack%20-%20Saunders.pdf
  3. Systems Confrontation and System Destruction Warfare – RAND, accessed October 3, 2025, https://www.rand.org/content/dam/rand/pubs/research_reports/RR1700/RR1708/RAND_RR1708.pdf
  4. Anti-access/area denial – Wikipedia, accessed October 3, 2025, https://en.wikipedia.org/wiki/Anti-access/area_denial
  5. China’s A2/AD strategy – Fly a jet fighter, accessed October 3, 2025, https://www.flyajetfighter.com/chinas-a2-ad-strategy/
  6. Defense Primer: Navy Distributed Maritime Operations (DMO …, accessed October 3, 2025, https://www.congress.gov/crs-product/IF12599
  7. Defense Primer: Navy Distributed Maritime Operations (DMO) Concept – Congress.gov, accessed October 3, 2025, https://www.congress.gov/crs_external_products/IF/PDF/IF12599/IF12599.2.pdf
  8. Joint All-Domain Command and Control (JADC2) – Congress.gov, accessed October 3, 2025, https://www.congress.gov/crs_external_products/IF/PDF/IF11493/IF11493.10.pdf
  9. Summary of the Joint All-Domain Command and Control … – DoD, accessed October 3, 2025, https://media.defense.gov/2022/Mar/17/2002958406/-1/-1/1/SUMMARY-OF-THE-JOINT-ALL-DOMAIN-COMMAND-AND-CONTROL-STRATEGY.pdf
  10. SPECIAL REPORT: Joint All-Domain Command, Control A Journey, Not a Destination, accessed October 3, 2025, https://www.nationaldefensemagazine.org/articles/2023/7/10/joint-all-domain-command-control-a-journey-not-a-destination
  11. What You Should Know About China’s “Destruction Warfare” Doctrine – OODAloop, accessed October 3, 2025, https://oodaloop.com/analysis/ooda-original/what-you-should-know-about-chinas-destruction-warfare-doctrine/
  12. Political Warfare against Intervention Forces – Air University, accessed October 3, 2025, https://www.airuniversity.af.edu/JIPA/Display/Article/4167178/political-warfare-against-intervention-forces/
  13. Rightsizing the PLA Air Force: Revisiting an Analytic Framework – NDU Press, accessed October 3, 2025, https://ndupress.ndu.edu/Media/News/News-Article-View/Article/4244397/rightsizing-the-pla-air-force-revisiting-an-analytic-framework/
  14. Chinese information operations and information warfare – Wikipedia, accessed October 3, 2025, https://en.wikipedia.org/wiki/Chinese_information_operations_and_information_warfare
  15. Finding the Right Model: The Joint Force, the People’s Liberation Army, and Information Warfare – Air University, accessed October 3, 2025, https://www.airuniversity.af.edu/JIPA/Display/Article/3371164/finding-the-right-model-the-joint-force-the-peoples-liberation-army-and-informa/
  16. China’s Anti-Access/Area-Denial Strategy – TDHJ.org, accessed October 3, 2025, https://tdhj.org/blog/post/china-a2ad-strategy/
  17. People’s Liberation Army Air Force – Wikipedia, accessed October 3, 2025, https://en.wikipedia.org/wiki/People%27s_Liberation_Army_Air_Force
  18. Commander’s Toolkit: PLAAF – Air University, accessed October 3, 2025, https://www.airuniversity.af.edu/Portals/10/CASI/documents/Toolkit%20presentations/1%20CASI%20Commanders%20Toolkit-%20PLAAF.pdf
  19. Are there flaws in the US Navy’s distributed maritime operations? – Defense News, accessed October 3, 2025, https://www.defensenews.com/opinion/commentary/2023/01/23/are-there-flaws-in-the-us-navys-distributed-maritime-operations/
  20. Elevating Non-Kinetic Effects to Kinetic Reliability – Fed Gov Today, accessed October 3, 2025, https://fedgovtoday.com/innovation-in-govt/elevating-non-kinetic-effects-to-kinetic-reliability
  21. F-35 Lightning II | Lockheed Martin, accessed October 3, 2025, https://www.lockheedmartin.com/en-us/products/f-35.html
  22. F-35A Lightning II > Air Force > Fact Sheet Display – AF.mil, accessed October 3, 2025, https://www.af.mil/About-Us/Fact-Sheets/Display/Article/478441/f-35a-lightning-ii/
  23. Lockheed Martin F-35 Lightning II – Wikipedia, accessed October 3, 2025, https://en.wikipedia.org/wiki/Lockheed_Martin_F-35_Lightning_II
  24. Cyberwarfare and the United States – Wikipedia, accessed October 3, 2025, https://en.wikipedia.org/wiki/Cyberwarfare_and_the_United_States
  25. Command History – U.S. Cyber Command, accessed October 3, 2025, https://www.cybercom.mil/About/History/
  26. China’s Carrier Killer: Threat and Theatrics – Air & Space Forces Magazine, accessed October 3, 2025, https://www.airandspaceforces.com/PDF/MagazineArchive/Documents/2013/December%202013/1213china.pdf
  27. DF-21 – Wikipedia, accessed October 3, 2025, https://en.wikipedia.org/wiki/DF-21
  28. DF-21 (CSS-5) – Missile Threat – CSIS, accessed October 3, 2025, https://missilethreat.csis.org/missile/df-21/
  29. China’s DF-17 Hypersonic Weapon is the Ultimate Checkmate for …, accessed October 3, 2025, https://nationalinterest.org/blog/buzz/chinas-df-17-hypersonic-weapon-ultimate-checkmate-us-military-power-bw-092925
  30. China’s Hypersonic Weapons | GJIA – Georgetown University, accessed October 3, 2025, https://gjia.georgetown.edu/2021/01/27/chinas-hypersonic-weapons/
  31. China Latest Air Defence System: A Deep Dive into Advancement, accessed October 3, 2025, https://www.pw.live/defence/exams/china-latest-air-defence-system
  32. HQ-22 – Wikipedia, accessed October 3, 2025, https://en.wikipedia.org/wiki/HQ-22
  33. Nuclear submarine – Wikipedia, accessed October 3, 2025, https://en.wikipedia.org/wiki/Nuclear_submarine
  34. Diving Deep: 70-Plus Years of Nuclear-Powered Subs – War.gov, accessed October 3, 2025, https://www.war.gov/News/Feature-Stories/Story/Article/1736610/diving-deep-70-plus-years-of-nuclear-powered-subs/
  35. Submarine Facts, accessed October 3, 2025, https://www.sublant.usff.navy.mil/About-Us/Submarine-Facts/
  36. F-22 Raptor > Air Force > Fact Sheet Display – AF.mil, accessed October 3, 2025, https://www.af.mil/About-Us/Fact-Sheets/Display/Article/104506/f-22-raptor/
  37. Stealth aircraft – Wikipedia, accessed October 3, 2025, https://en.wikipedia.org/wiki/Stealth_aircraft
  38. Carrier strike group – Wikipedia, accessed October 3, 2025, https://en.wikipedia.org/wiki/Carrier_strike_group
  39. carrier strike groups: – the formation of seapower, accessed October 3, 2025, https://www.acibc.org/wp-content/uploads/2019/09/Strike-Group-Infographic.pdf
  40. What do we know about Chinese military culture and doctrine? The PLA is large and well equipped and used mainly for internal security. The last near peer war was fought against Vietnam in 1979 : r/WarCollege – Reddit, accessed October 3, 2025, https://www.reddit.com/r/WarCollege/comments/vf9sbz/what_do_we_know_about_chinese_military_culture/
  41. China’s J-20 Flying in ‘Beast Mode’ Again with Eight Air-to-Air Missiles – The Aviationist, accessed October 3, 2025, https://theaviationist.com/2025/09/29/china-j-20-beast-mode-again/
  42. J-20 Mighty Dragon vs. the World: 5 Strengths That Make China’s …, accessed October 3, 2025, https://nationalsecurityjournal.org/j-20-mighty-dragon-vs-the-world-5-strengths-that-make-chinas-stealth-jet-a-problem/
  43. Sustaining the Fight: Challenges of Distributed Maritime Operations, accessed October 3, 2025, https://centerformaritimestrategy.org/publications/sustaining-the-fight-challenges-of-distributed-maritime-operations/
  44. Dissipative Warfare: The PLA’s Potential New Strategy in the AI Era – Jamestown, accessed October 3, 2025, https://jamestown.org/program/dissipative-warfare-the-plas-potential-new-strategy-in-the-ai-era/
  45. Dissipative Warfare: The PLA’s Potential New Strategy in the AI Era – Indian Strategic Studies, accessed October 3, 2025, https://www.strategicstudyindia.com/2025/09/dissipative-warfare-plas-potential-new.html
  46. To Win without Fighting – Marine Corps University, accessed October 3, 2025, https://www.usmcu.edu/Outreach/Marine-Corps-University-Press/Expeditions-with-MCUP-digital-journal/To-Win-without-Fighting/
  47. Winning Without Fighting: The Chinese Psychological Warfare Challenge | The Heritage Foundation, accessed October 3, 2025, https://www.heritage.org/global-politics/report/winning-without-fighting-the-chinese-psychological-warfare-challenge
  48. Chinese Next-Generation Psychological Warfare – RAND, accessed October 3, 2025, https://www.rand.org/pubs/research_reports/RRA853-1.html
  49. Social Antiaccess/Area-Denial (Social A2/AD) – Marine Corps University, accessed October 3, 2025, https://www.usmcu.edu/Outreach/Marine-Corps-University-Press/MCU-Journal/JAMS-vol-12-no-1/Social-Antiaccess-Area-Denial-Social-A2-AD/
  50. Exploiting China’s Maritime Vulnerability | Proceedings – U.S. Naval Institute, accessed October 3, 2025, https://www.usni.org/magazines/proceedings/2023/april/exploiting-chinas-maritime-vulnerability
  51. The U.S. Needs an Integrated Approach to Counter China’s Anti-Access/Area Denial Strategy | The Heritage Foundation, accessed October 3, 2025, https://www.heritage.org/defense/report/the-us-needs-integrated-approach-counter-chinas-anti-accessarea-denial-strategy
  52. The Path to China’s Intelligentized Warfare: Converging on the …, accessed October 3, 2025, https://cyberdefensereview.army.mil/Portals/6/Documents/2024-Fall/Baughman_CDRV9N3-Fall-2024.pdf
  53. PLA’s Perception about the Impact of AI on Military Affairs*, accessed October 3, 2025, https://www.nids.mod.go.jp/english/publication/security/pdf/2022/01/04.pdf
  54. China Military Studies Review – Marine Corps University, accessed October 3, 2025, https://www.usmcu.edu/Outreach/Marine-Corps-University-Press/China-Military-Studies-Review/CMSR-2025-Understanding-Weishe/

Introduction: The Differences and Risks in U.S.-China Military Crisis Management and Response – National Bureau of Asian Research, accessed October 3, 2025, https://www.nbr.org/publication/introduction-the-differences-and-risks-in-u-s-china-military-crisis-management-and-response/

More Than a Vest: An Analyst’s Report on U.S. Military Personal Body Armor

Personal body armor is an indispensable component of the modern warfighter’s ensemble, a critical layer of technology standing between the soldier and the lethal threats of the battlefield. Its presence is so ubiquitous that it has become an icon of contemporary warfare. However, the story of military body armor is not one of simple technological triumph. It is a narrative defined by a perpetual and complex engineering conflict: the goal of absolute protection versus the non-negotiable demand for operational effectiveness. Every ounce of weight added in the name of survivability is paid for with a corresponding decrease in mobility, endurance, and, ultimately, lethality. This report provides an in-depth analysis of personal body armor systems used by the United States military. It traces the reactive evolution of these systems, delves into the materials science that makes them possible, details the capabilities and philosophies of current-issue equipment, and dissects the inescapable trade-offs that engineers and commanders must navigate. This is a story of constant adaptation, where technology races to counter evolving threats, always constrained by the physical limits of the human soldier.

The Evolution of Soldier Protection

The development of U.S. military body armor is not a proactive story of technological pursuit, but a reactive one, driven almost exclusively by the changing threat profile of the nation’s most recent major conflict. Each significant leap in armor technology can be directly mapped to a specific, dominant threat that emerged in the preceding war, demonstrating a consistent pattern of adaptation in response to battlefield realities.

From Flak to Fiber: Early Ballistic Protection in the 20th Century

While armor has been part of warfare for millennia, the modern era of personal ballistic protection for the U.S. military began in earnest during World War II. Earlier attempts during World War I to create armor from metal plates proved largely ineffective; the lightest models were still excessively heavy, impeding movement, and were too expensive to produce on a wide scale.1 The primary threats were not just small arms fire but, more pervasively, the deadly fragmentation from artillery shells.

The true genesis of modern U.S. military armor emerged from the skies over Europe. Under the direction of Colonel Malcolm C. Grow, the U.S. Army Eighth Air Force pioneered the development of the “flak jacket” in 1943 to protect bomber crews from shrapnel produced by exploding anti-aircraft shells.2 These early vests consisted of two-inch square manganese steel plates sewn into a canvas vest. The technology was rudimentary, but it proved the concept. A 1944 study of battle casualties reported that the use of this body armor led to a dramatic reduction in fatalities from chest wounds, from 36% down to 8%.2 This period established the initial purpose of modern military body armor: fragmentation protection, not stopping direct rifle fire. It was a crucial proof-of-concept that demonstrated armor could save lives, setting the stage for future investment and development.

The Nylon & Fiberglass Era: Korea and Vietnam

The lessons from WWII carried into the conflicts of the mid-20th century. The Korean War saw the introduction of two key designs that moved beyond simple steel plates. The first was the M-1951 “Marine Vest,” a joint Army-Marine Corps development that incorporated layers of nylon and Doron, a laminated fiberglass material developed during WWII.2 This was followed by the Army’s M-1952A Body Armor, an 8.5-pound vest made up of twelve layers of flexible, laminated nylon. The M-1952A and its successors, such as the M-69 Body Armor, Fragmentation Protective Vest, became standard issue through the Vietnam War.2

This era represents the maturation of the “soft armor” concept using early polymers. While still designed primarily to protect against fragmentation and low-velocity projectiles, these vests were significantly lighter and more flexible than their WWII predecessors. They marked a critical step in the ongoing negotiation between protection and mobility, solidifying the role of a fragmentation vest as a standard piece of a soldier’s equipment.

The Kevlar Revolution: The Personnel Armor System for Ground Troops (PASGT)

The 1970s witnessed a monumental leap in materials science that would redefine personal protection for decades. In 1965, chemist Stephanie Kwolek at DuPont accidentally discovered a para-aramid synthetic fiber with a molecular structure of incredibly strong, inter-chain bonds.3 The resulting material, Kevlar, possessed a tensile strength up to ten times that of steel on an equal weight basis.3

In the 1980s, the U.S. Army adopted this revolutionary material for its new armor system: the Personnel Armor System for Ground Troops (PASGT). The PASGT system included both a new helmet and a vest made of Kevlar. Although the vest weighed around 9 pounds, slightly more than the M-69 it replaced, it offered vastly superior protection against shell fragments.6 The adoption of Kevlar was a paradigm shift. It moved body armor from a specialized item to a standard-issue system that provided a meaningful level of protection without an unacceptable mobility penalty. The PASGT system became the iconic look of the American soldier for nearly two decades, defining personal protection through the end of the Cold War and into the 1990s.

A New Era of Warfare: The Interceptor Body Armor (IBA) and the Dawn of Modularity

The post-9/11 conflicts in Iraq and Afghanistan fundamentally changed the American way of war and the threats faced by its troops. The battlefield was no longer dominated by the threat of conventional artillery fragmentation but by high-velocity rifle fire from weapons like the AK-47 and the devastating effects of Improvised Explosive Devices (IEDs). The PASGT vest, a pure soft armor system, was dangerously insufficient against these threats.

In response, the military fielded the Interceptor Body Armor (IBA) system, which had been in development since the late 1990s.6 The IBA’s core was the Outer Tactical Vest (OTV), a carrier made of advanced Kevlar KM2 soft armor. Its truly revolutionary feature, however, was the integration of front and back pockets designed to hold rigid hard armor plates. These Small Arms Protective Inserts (SAPI) were made of ceramic composite and were capable of stopping 7.62mm rifle rounds, a level of protection previously unavailable to the average soldier.7

The IBA system also introduced the concept of modularity. The base vest could be augmented with attachable protectors for the groin, throat, and upper arms (deltoids).7 Furthermore, the exterior of the OTV was covered in Pouch Attachment Ladder System (PALS) webbing, allowing soldiers to customize the placement of ammunition pouches and equipment directly on their armor.7 The IBA represents the birth of modern military body armor philosophy. It was the first widely issued system designed from the ground up to be a scalable, multi-threat platform capable of defeating both fragmentation and rifle fire. This modularity was a fundamental acknowledgment that not all threats are equal and that protection could be tailored to the mission, marking a definitive break from the one-size-fits-all vests of the past.

System NameEra / ConflictPrimary Material(s)Key Innovation
Flak Jacket (M1/M2)World War IIManganese Steel Plates, CanvasFirst widespread use of body armor for fragmentation protection.2
M-1952A VestKorean & Vietnam WarsLaminated Nylon, Fiberglass (Doron)Lighter, more flexible soft armor for fragmentation.2
PASGT VestCold War / Gulf WarKevlar (Para-Aramid Fiber)Revolutionary material providing superior fragmentation protection.6
Interceptor Body Armor (IBA)Global War on TerrorKevlar KM2, Ceramic Plates (SAPI)First integrated, modular system combining soft armor with hard plates for rifle protection.7

The Science of Defeating a Projectile

Modern body armor is a product of advanced materials science, employing distinct physical mechanisms to defeat different types of ballistic threats. The distinction between how soft armor “catches” a projectile and how hard armor “shatters” it is fundamental to understanding why military armor systems are designed the way they are. The unique capabilities and vulnerabilities of each type create a natural synergy, making a hybrid system the most effective solution for the varied threats of modern warfare.

Soft Armor Mechanics: The Woven Energy Web of Para-Aramids

Soft armor, made from tightly woven layers of para-aramid fibers like Kevlar, does not function by deflecting a bullet in the way a steel plate would. Instead, its mechanism is better described as “catching” the projectile in a multi-layered energy-absorbing web.11

Kevlar’s extraordinary strength originates at the molecular level. Its structure consists of long, rigid polymer chains that are highly aligned and cross-linked by powerful hydrogen bonds.3 When a relatively blunt projectile, such as a handgun bullet, strikes the vest, its tip cannot easily push aside the fibers. Instead, it engages a vast network of these incredibly strong fibers across multiple layers of fabric. The fibers are forced to stretch, a process that requires a tremendous amount of energy. This action absorbs the projectile’s kinetic energy and dissipates it radially outward from the point of impact through the “web” of the fabric.12 This rapid energy transfer slows the bullet to a complete stop, ideally before it can penetrate the vest and harm the wearer.

This mechanism, however, has a critical vulnerability. It is highly susceptible to pointed or sharp-edged threats like knives, ice picks, or arrows. A sharp point can find the microscopic gaps between the woven fibers and, with sufficient force, push the individual fibers aside rather than engaging the entire network. This allows the blade to slip through the weave, defeating the armor.14 This is why ballistic vests are not inherently “stab-proof” unless they are specifically designed and rated for that threat.

Hard Armor Mechanics: The Three-Phase Defeat of Ceramic Composites

To defeat the immense, focused energy of a high-velocity rifle round, a different mechanism is required. Hard armor plates, such as the military’s SAPI series, are sophisticated composite systems that defeat projectiles through a multi-stage, sacrificial process.15

  1. Phase 1: Shatter and Erode. The outermost layer of the plate is an extremely hard “strike face,” typically made of a ceramic material like boron carbide or silicon carbide.8 When a rifle bullet impacts this surface, two things happen almost simultaneously. First, the hardness of the ceramic fractures and blunts the projectile, deforming its shape. Second, the ceramic itself shatters at the point of impact in a process known as comminution, absorbing a significant amount of the bullet’s initial kinetic energy.16 As the now-deformed projectile core attempts to push through this field of shattered ceramic fragments, it is effectively sandblasted—a process of erosion that further reduces its mass, velocity, and energy.15
  2. Phase 2: Absorb and Catch. Bonded directly behind the ceramic strike face is a backing layer made of a ductile material with high tensile strength, most commonly Ultra-High-Molecular-Weight Polyethylene (UHMWPE), often marketed under trade names like Spectra or Dyneema.8 This backer has two critical jobs. It must first absorb the remaining kinetic energy of the slowed, eroded projectile. Second, it must “catch” the blunted projectile remnant and any ceramic fragments that were propelled inward by the impact, preventing them from becoming secondary projectiles that could injure the wearer.8

This composite, sacrificial system is the only known method to defeat high-energy rifle threats within the weight and thickness constraints of man-portable armor. It highlights that the plate is a system, not a single material; the ceramic strike face and the polymer backer are equally critical and must work in concert to successfully defeat the threat.

Contemporary U.S. Military Body Armor Systems

The modern body armor systems used by the U.S. Armed Forces are the result of decades of battlefield experience and technological advancement. While all branches share the same fundamental goal of protecting their personnel, the specific systems they field reveal differing institutional priorities and risk calculations. The Army’s equipment reflects a need for scalability across a vast force, the Marine Corps’ gear prioritizes the mobility of the expeditionary rifleman, and SOCOM’s kits are tailored for the peak performance of the elite operator.

U.S. Army Systems: The Path to Scalability

The U.S. Army, as the nation’s primary land force, requires armor systems that can be adapted for a wide variety of roles, from a vehicle driver to a dismounted infantryman. This has driven a clear evolution away from a single, heavy vest toward a highly modular and scalable philosophy.

  • Improved Outer Tactical Vest (IOTV): Fielded in 2007 to replace the OTV of the IBA system, the IOTV was a significant step forward. It provided a larger area of soft armor coverage, featured a single-pull quick-release system for emergency doffing, and incorporated an internal waistband that helped shift the armor’s weight from the shoulders to the waist and hips, improving comfort over long periods.19 The IOTV has gone through multiple generations (Gen I through IV), with successive versions improving ergonomics, reducing weight, and enhancing modularity.21 However, when fully configured with soft armor, ESAPI plates, side plates, and ancillary protectors (groin, collar, deltoid), a medium IOTV can weigh over 30 pounds, contributing significantly to the soldier’s overall load.20
  • Soldier Plate Carrier System (SPCS): The high weight of the IOTV in the mountainous terrain of Afghanistan led to a demand for a lighter option. The SPCS was adopted as a direct result. It is a minimalist plate carrier designed to hold front, back, and side hard armor plates but with significantly less integrated soft armor coverage than the IOTV.23 This prioritizes vital organ protection from rifle fire while sacrificing some fragmentation protection for a major gain in mobility and weight reduction. A medium SPCS with a full plate load weighs approximately 22 pounds, a substantial savings over a fully loaded IOTV.23
  • Modular Scalable Vest (MSV): Introduced in 2018, the MSV is the Army’s current-generation system and the centerpiece of the broader Soldier Protection System (SPS). The MSV is the culmination of lessons learned from both the IOTV and SPCS. It is approximately 26% lighter than the IOTV, with a fully loaded medium vest weighing around 25 pounds.24 Its defining feature is true scalability. The system can be configured in multiple ways depending on the mission: as a low-profile carrier with only soft armor, as a plate carrier with only hard plates, or as a full tactical vest combining both, along with all ancillary components.26 This allows commanders and individual soldiers to tailor their protection level precisely to the anticipated threat, balancing protection and mobility like never before.

U.S. Marine Corps Systems: Prioritizing Mobility

The Marine Corps, as an expeditionary force-in-readiness, has a doctrine that places a premium on speed, agility, and the effectiveness of the individual rifleman. This institutional bias is clearly reflected in their rapid adoption of lighter, more mobile armor systems.

  • Modular Tactical Vest (MTV): Adopted in 2006 to replace the IBA, the MTV offered better protection and a more effective weight distribution system. However, at 30 pounds, it was heavier than its predecessor and was often criticized by Marines in the field as being too bulky and restrictive, especially in the intense heat of Iraq.28
  • Plate Carrier (PC) Series: In response to the feedback on the MTV and the demands of combat in Afghanistan, the Marine Corps quickly pivoted to lighter systems. They fielded the Scalable Plate Carrier (SPC) and have continued to refine this concept.29 The current system is the
    Plate Carrier Generation III (PC Gen III), which began fielding in 2020. This system is a purpose-built, lightweight plate carrier that is nearly 25% lighter than the legacy PC it replaced. Key design improvements include removing excess material, cutting out the shoulder areas for a better rifle stock weld, and offering a much wider range of sizes to properly fit more Marines, including women.30 The PC Gen III represents the Marine Corps’ institutional choice to prioritize mobility and lethality, accepting a trade-off in the form of reduced soft armor coverage compared to a larger vest like the IOTV.

U.S. Special Operations Command (SOCOM) Systems: The Tip of the Spear

U.S. Special Operations Command units operate under unique mission sets with more flexible procurement authority. As such, they are often the early adopters of cutting-edge commercial designs that prioritize weight savings and ergonomics above all else. SOCOM operators frequently use plate carriers from companies like Crye Precision and First Spear, which are known for their innovative, lightweight designs that often influence the next generation of general-issue military gear.32 These carriers are paired with specialized, high-performance plates built to SOCOM standards, which often exceed the performance of general-issue plates in terms of weight and multi-hit capability against advanced threats.34 SOCOM effectively serves as a high-speed testbed for the future of body armor, with their equipment choices often foreshadowing broader trends across the conventional forces.

Service BranchSystem NameFull System Weight (Approx.)Core Philosophy
U.S. ArmyModular Scalable Vest (MSV)25 lbsScalability: Adaptable to a wide range of missions and roles.24
U.S. Marine CorpsPlate Carrier (PC) Gen III< 22 lbs (est.)Mobility: Lightweight design to maximize speed and agility for expeditionary forces.31

The Heart of the System: A Technical Review of SAPI, ESAPI, and XSAPI Plates

The hard armor plates are the core of every modern military body armor system, providing the essential protection against the most lethal battlefield threat: rifle fire. The evolution of these plates is a clear illustration of the arms race between protective equipment and ammunition technology.

  • SAPI (Small Arms Protective Insert): This was the original plate fielded with the IBA system. Made of a boron carbide or silicon carbide ceramic strike face with a UHMWPE backer, the SAPI plate is rated to stop up to three rounds of 7.62x51mm M80 Ball ammunition traveling at approximately 2,750 feet per second.8
  • ESAPI (Enhanced Small Arms Protective Insert): Introduced in 2005 in response to the growing threat of armor-piercing ammunition, the ESAPI plate offers a significantly higher level of protection. Made of boron carbide, it is thicker and heavier than the SAPI plate.37 ESAPI plates are tested to military specifications that require them to stop.30-06 M2 Armor-Piercing (AP) rounds, a performance level roughly equivalent to the civilian NIJ Level IV standard.8
  • XSAPI (X Threat Small Arms Protective Insert): Developed in response to intelligence about potential next-generation armor-piercing threats, the XSAPI represents the highest level of protection currently in the inventory. Heavier and thicker still than the ESAPI, these plates were designed to defeat even more potent projectiles, believed to be tungsten-core AP rounds like the 7.62mm M993.8 While over 120,000 sets were procured, the anticipated threat did not materialize on a large scale in Iraq or Afghanistan, and many of these plates were placed into storage.8

Defining Protection: Military vs. Law Enforcement Standards

A critical and often misunderstood aspect of body armor is the distinction between the standards used for civilian law enforcement and those used by the military. While the underlying science is the same, the testing protocols, threat profiles, and design philosophies are fundamentally different. The failure to appreciate this distinction can lead to flawed comparisons and incorrect assumptions about armor performance.

The NIJ Framework: A Standard for Domestic Threats

The National Institute of Justice (NIJ), an agency of the U.S. Department of Justice, has been setting voluntary performance standards for body armor since 1972.42 The NIJ standard is the only nationally accepted benchmark for body armor worn by U.S. law enforcement and corrections officers. Its primary purpose is to provide a reliable, consistent framework for agencies to purchase armor that protects against the most common threats faced in a domestic policing environment.44

The NIJ standard categorizes armor into distinct levels based on the specific handgun and rifle ammunition it can defeat in a controlled laboratory setting.

  • Soft Armor Levels (Handgun): Levels IIA, II, and IIIA are designed to stop progressively more powerful handgun rounds, from common 9mm and.40 S&W up to.357 SIG and.44 Magnum.46
  • Hard Armor Levels (Rifle): Level III is tested against 7.62mm M80 ball ammunition, while Level IV is tested against a single.30-06 M2 armor-piercing round.46

A crucial component of NIJ testing is the measurement of Back-Face Deformation (BFD), the indentation the armor makes into a block of ballistic clay upon impact. To pass certification, the BFD must not exceed 44mm.48 The new NIJ Standard 0101.07 refines these categories into more descriptive HG (Handgun) and RF (Rifle) levels, but the core philosophy remains the same: standardization against known, prevalent threats.47

Military-Specific Protocols: Why SAPI Plates Are Not “NIJ Rated”

Contrary to a common misconception, military armor plates like SAPI, ESAPI, and XSAPI are not certified to NIJ standards.8 The Department of Defense (DoD) employs its own set of specific, and often classified, testing protocols tailored to the unique threats of the battlefield. These military standards are not necessarily “better” or “worse” than the NIJ’s; they are simply different, designed for a different purpose.

Military testing calls for survivability against specific military-grade projectiles at specified velocities. For example, the SAPI standard requires defeating multiple hits of 7.62mm M80 ball, while the ESAPI standard requires defeating.30-06 M2 AP rounds.8 The multi-hit requirement, in particular, can be more rigorous than the single-shot test for NIJ Level IV. Furthermore, military procurement involves extensive durability and environmental testing that goes beyond the NIJ’s scope. A 2009 DoD Inspector General report even highlighted that there was no single standardized testing criteria across the department, with the Army and U.S. Special Operations Command (USSOCOM) having developed separate ballistic testing protocols.50

This distinction is not merely academic. It means that the terms are not interchangeable. A commercial “NIJ Level IV” plate is certified to a public, standardized test. A military “ESAPI” plate is built to meet a government contract with a specific, non-public set of requirements. This is why the term “Mil-Spec” can be misleading in the consumer market; it signifies adherence to a different set of rules, not necessarily a superior product in all metrics.

Rating / NameTest Projectile(s)Key Performance StandardPrimary User
NIJ Level III7.62x51mm M80 BallDefeats common lead-core rifle rounds with BFD < 44mm.46Law Enforcement / Civilian
SAPI7.62x51mm M80 BallDefeats multiple hits of specific military ball ammunition.8U.S. Military
NIJ Level IV.30-06 M2 Armor Piercing (AP)Defeats a single armor-piercing rifle round with BFD < 44mm.46Law Enforcement / Civilian
ESAPI.30-06 M2 Armor Piercing (AP)Defeats specific military armor-piercing ammunition, often with multi-hit requirements.8U.S. Military

Mission Drives Design: Contrasting Military and Law Enforcement Armor Philosophies

The differences in standards are a direct reflection of the vastly different operational environments and threat profiles of soldiers and police officers.

  • Law Enforcement: The primary ballistic threat faced by a patrol officer is from handguns.44 Armor is typically worn for an entire 8-12 hour shift, often under a uniform shirt. Therefore, the design priorities are comfort, flexibility, and concealability. This leads to the overwhelming preference for lightweight, soft armor vests rated at NIJ Level II or IIIA.46 Hard armor plates are generally reserved for tactical (SWAT) teams or are kept in patrol vehicles as part of “active shooter kits” to be donned over a soft vest in high-risk situations.52
  • Military: For a soldier in combat, the primary threats are high-velocity rifle fire and fragmentation from explosive devices.52 Armor is worn overtly and must serve as a platform for carrying a full combat load of ammunition, communications equipment, and supplies. Concealability is irrelevant. The design priorities are maximum practical protection against military-grade threats and robust load-bearing capability. This dictates the use of a system combining a soft armor carrier with hard armor plates equivalent to or exceeding NIJ Level IV protection.47

Ultimately, the equipment reflects the job. A police officer’s armor is designed for daily wear and protection against criminal threats. A soldier’s armor is designed for the acute, high-intensity violence of the battlefield.

The Hidden Dangers: Limitations and Vulnerabilities of Modern Armor

The term “bulletproof” is a dangerous misnomer. No body armor provides absolute protection. It is a piece of equipment with a specific performance envelope, a limited lifespan, and inherent vulnerabilities. Understanding these limitations is as crucial as understanding its capabilities. Body armor does not make a soldier invincible; it is a tool that favorably alters the statistics of survival by mitigating the most probable and most lethal threats to the torso.

Beyond Penetration: The Threat of Back-Face Deformation and Blunt Trauma

One of the most critical and least understood limitations of body armor is the danger that persists even when a bullet is stopped. When a projectile strikes armor, the armor material deforms inward toward the wearer’s body. This phenomenon is known as Back-Face Deformation (BFD), or back-face signature.48 The NIJ standard allows for up to 44mm (1.73 inches) of deformation into a clay backing that simulates the human torso.48

This rapid and violent inward deformation transfers a massive amount of the bullet’s kinetic energy directly to the wearer’s body, resulting in Behind Armor Blunt Trauma (BABT).60 The mechanism of injury is a combination of high-pressure stress waves and the gross deflection of the body wall, which can cause shear forces on internal organs.60 BABT can result in severe bruising, cracked or broken ribs, internal bleeding, and damage to vital organs like the heart, lungs, and liver. In extreme cases, particularly with high-energy rifle impacts, BABT can be lethal even though the projectile never penetrated the armor.59

This risk is why being shot while wearing armor is a significant medical event, not a minor inconvenience. To mitigate this danger, operators often wear trauma pads—non-ballistic pads made of energy-absorbing foam or other materials—inserted between the armor plate and the body. These pads help cushion the impact and dissipate the energy transfer, reducing the severity of BFD and the resulting blunt force trauma.62

Material Weaknesses and Threat Limitations

All armor materials have inherent weaknesses that define their limitations and proper use.

  • Degradation: The para-aramid fibers in soft armor, like Kevlar, are susceptible to long-term degradation from exposure to moisture and ultraviolet (UV) light. This is why most manufacturers specify a 5-year service life for their vests, after which the ballistic integrity can no longer be guaranteed.66
  • Brittleness and Multi-Hit Capability: Ceramic hard armor plates, while extremely effective at shattering projectiles, are inherently brittle. They can be cracked or damaged if dropped or subjected to rough handling, which can compromise their protective capability.66 This brittleness also affects their multi-hit performance. While a plate may be rated to stop multiple rounds, its ability to defeat subsequent impacts is severely degraded in the immediate area of a previous hit where the ceramic has been shattered and compromised. A tight grouping of shots can defeat a plate that would have stopped those same shots had they been spread out.68
  • Armor-Piercing (AP) Rounds: The constant arms race between armor and ammunition is most evident with AP rounds. These projectiles are specifically designed with hardened penetrators made of steel or tungsten carbide to defeat armor systems. Standard Level III plates, effective against lead-core ball ammunition, are generally ineffective against these threats. This necessitates the development and use of heavier, more advanced Level IV and ESAPI plates with ceramic strike faces hard enough to fracture these hardened cores.70

The Anatomy of Risk: Gaps in Coverage

Perhaps the most obvious limitation of body armor is that it only protects the areas it covers. While modern systems prioritize coverage of the vital organs in the thoracic cavity (the “cardiac box”), significant portions of the body remain vulnerable. The head, neck, shoulders, armpits (axillary region), lower abdomen, and groin are all areas where a wound can be fatal.54

Ancillary armor components exist to cover many of these areas, such as the Deltoid and Axillary Protector System (DAPS), throat protectors, and groin protectors.7 However, each additional piece adds weight and bulk, which directly restricts movement and increases fatigue. This creates an inescapable trade-off between total body coverage and the soldier’s mobility and combat effectiveness. The design of a body armor system is therefore a deliberate exercise in risk management, accepting vulnerability in some areas to maintain essential function in others.

The Engineer’s Dilemma: An Analysis of Inescapable Trade-Offs

The design of military body armor is a master class in engineering compromise. There is no single “best” solution, only a series of carefully calculated trade-offs aimed at optimizing a soldier’s survivability and effectiveness within the unforgiving constraints of physics and human physiology. Every design choice is governed by a complex interplay of competing priorities.

The Iron Triangle: Balancing Protection, Mobility, and Lethality

A foundational concept in military hardware design, from tanks to individual soldiers, is the “Iron Triangle.” The three vertices of this triangle are Protection, Mobility, and Lethality.75 For a dismounted soldier, who is limited by what they can physically carry, these three factors are inextricably linked in a zero-sum relationship.

  • Increasing Protection by adding heavier or more extensive armor directly adds weight.
  • This added weight inevitably reduces Mobility, making the soldier slower and more easily fatigued.
  • A slow, fatigued soldier has reduced Lethality; their reaction times are slower, their aim is less steady, and their ability to maneuver on the battlefield is compromised.

To regain mobility, a soldier must shed weight, but this typically comes at the cost of either protection (lighter armor) or lethality (less ammunition, water, or other mission-essential gear). The soldier is perpetually “trapped” within this triangle, and the goal of the armor designer is to find the optimal balance point for a given mission and doctrine.

The Human Factor: Quantifying the Cost of Weight, Bulk, and Thermal Load

Body armor is often described as “parasitic weight”—it contributes nothing to a soldier’s operational effectiveness until the precise moment it is struck by a projectile.75 Until that moment, it only imposes penalties. These penalties are not abstract; they are measurable degradations of combat performance.

  • Weight and Mobility: Dismounted ground troops in recent conflicts have carried combat loads ranging from 90 to 140 pounds, with body armor comprising a significant portion of that.75 Studies have quantified the impact of such loads, showing that for every 1 kilogram (2.2 lbs) of external weight, there is an average performance loss of 1% in military tasks like sprinting, jumping, and obstacle course completion.77 The weight and bulk of armor also demonstrably reduce a soldier’s range of motion and increase the time it takes to acquire and engage targets.75
  • Fatigue and Cognition: Heavy loads accelerate fatigue. A fatigued soldier suffers from diminished cognitive function, reduced situational awareness, and impaired decision-making capabilities.75
  • Thermal Load: Body armor is an excellent insulator. It traps body heat and severely impedes the body’s natural cooling mechanism: the evaporation of sweat. This creates a hot, humid microclimate between the vest and the torso, dramatically increasing the soldier’s thermal load and the risk of heat stress or heat stroke, particularly during strenuous activity in hot environments.79 This is not a new problem; studies from the Vietnam War on the M1955 vest showed that wearing armor was equivalent to a 5°F increase in the Wet-Bulb Globe Temperature (WBGT), a measure of environmental heat stress.81

This analysis reveals a critical, counter-intuitive truth: the pursuit of maximum protection can lead to a point of diminishing returns. An overloaded, overheated, and exhausted soldier is a less effective and more vulnerable soldier. This has led to the realization that optimal armor design may actually involve reducing passive protection (armor coverage) to increase active protection (mobility and endurance). A soldier who can move more quickly from cover to cover is less likely to be hit in the first place. The military-wide shift from heavy, full-coverage vests like the IOTV toward lighter plate carriers is an institutional acknowledgment of this principle, a calculated trade-off designed to enhance overall survivability.

The Pentagon of Priorities: A Deeper Look at Weight, Performance, Thickness, Comfort, and Cost

The Iron Triangle provides a useful strategic framework, but the tactical, day-to-day decisions of an armor engineer involve a more complex, five-point trade-space.82

  1. Weight vs. Performance: The classic trade-off, balancing the mass of the armor against its ability to stop threats.
  2. Thickness vs. Performance: Thinner armor is less bulky, which improves mobility in confined spaces like vehicles and doorways and allows for a better-shouldered rifle. Advanced materials like UHMWPE have enabled thinner profiles without sacrificing performance.82
  3. Comfort vs. Performance: An uncomfortable armor system that creates painful hot spots, chafes, or improperly distributes weight will be worn incorrectly or even discarded by troops in the field, completely negating its protective value. Ergonomics, fit, and ventilation are critical design factors.78
  4. Cost vs. Performance: The highest-performing materials are often exponentially more expensive. Boron carbide ceramics and advanced composites offer incredible protection at a low weight, but their cost can be prohibitive for equipping a force of hundreds of thousands. Procurement officials must balance per-unit capability against the total cost of fielding a system at scale.82

This pentagon provides a more complete picture of the engineering process. A technically brilliant armor solution is a failure if it is too expensive to buy, too thick to wear inside a vehicle, or too uncomfortable for a soldier to tolerate on a 12-hour patrol.

The Future of Personal Protection

The future of body armor is being shaped by a relentless pursuit of materials and technologies that can break the constraints of the engineer’s dilemma. The ultimate goal of this research is to make protection effectively “disappear” from the soldier’s perspective—either by making it so lightweight and flexible that its presence is unnoticeable, or by making its weight “earn its keep” through the integration of active technologies that enhance, rather than degrade, combat effectiveness.

Next-Generation Materials: Advanced Composites, Graphene, and Nanotechnology

The most direct path to solving the weight-versus-performance problem is through revolutionary materials science.

  • Advanced Composites: Research is ongoing into hybrid composites that combine existing materials in novel ways. This includes layering aramid and UHMWPE fibers to optimize their respective strengths, or embedding rubber particles within polymer composites to improve energy absorption and reduce the effects of blunt force trauma.84
  • Graphene and Carbon Nanotubes: Graphene, a single-atom-thick sheet of carbon arranged in a hexagonal lattice, possesses extraordinary tensile strength for its weight. The primary challenge and focus of research is on how to effectively integrate these nanomaterials into macro-scale composite structures to create armor that is dramatically lighter and stronger than current systems.87
  • Novel Polymers: In a significant breakthrough, researchers have created a 2D mechanically interlocked polymer. This material functions like chainmail at a nanoscale, where interlocked molecular rings can slide and shift to dissipate force, offering a unique combination of strength and flexibility that could be a blueprint for future soft armor.89

Emerging Concepts: Liquid Armor and Smart Systems

Beyond passive materials, a philosophical shift is underway to create adaptive and active protection systems.

  • Liquid Armor: This promising field of research involves impregnating a fabric like Kevlar with a non-Newtonian Shear Thickening Fluid (STF).90 An STF, typically a colloid of silica nanoparticles suspended in polyethylene glycol, behaves like a liquid under normal movement but becomes nearly solid for a few milliseconds when subjected to the high shear force of a ballistic impact.92 This instantaneous hardening dramatically increases the armor’s resistance to penetration, after which it immediately returns to a flexible state. The technology could enable armor that is significantly thinner, lighter, and more flexible than what is possible today.94
  • Smart Armor: This concept involves transforming the vest from a piece of passive, parasitic weight into an active, data-providing component of the soldier’s combat system. This is achieved by integrating wearable technology directly into the armor, including embedded sensors for real-time health monitoring (heart rate, core temperature, impact detection), integrated communication systems that eliminate the need for separate radios, and even connections to augmented reality displays for enhanced situational awareness.74

The Path Forward: The Quest for Lighter, Stronger, and More Integrated Protection

The overarching goals for the future of body armor are clear and consistent with the lessons of the past. The primary drivers of research and development will continue to be the reduction of weight, the improvement of comfort and ergonomics (particularly through better thermal management), the enhancement of multi-hit capabilities, and the quest to provide better coverage for currently vulnerable areas without imposing unacceptable mobility penalties.74 The future of personal protection is not just a better vest, but a holistic “Soldier Protection System” where armor is one seamlessly integrated part of a network of sensors, communications, and life-support technologies designed to maximize both survivability and lethality.

Conclusion

The development of personal body armor for the U.S. military is a dynamic and unending process, a microcosm of the larger defense innovation cycle. It is a story of action and reaction, where the threats of the last war dictate the protective solutions for the next. From the simple steel plates of the flak jacket to the scalable, multi-threat modular vests of today, the evolution has been one of increasing complexity, capability, and an ever-deepening understanding of the human cost of protection.

The analysis reveals that body armor is defined by a series of inescapable trade-offs—a constant negotiation between weight, protection, mobility, comfort, and cost. There is no perfect solution, only an optimized compromise tailored to the specific doctrines and anticipated battlefields of the different service branches. The science of stopping a bullet is now well understood, but the science of doing so without overburdening the soldier remains the central challenge. Even the most advanced armor has limitations; it degrades, it can be defeated, and it cannot protect the entire body. Its true function is not to grant invincibility, but to favorably alter the grim probabilities of the battlefield.

Looking forward, the pursuit continues for materials and technologies that can transcend these traditional trade-offs. The promise of nanotechnology, liquid armor, and integrated smart systems points toward a future where protection is lighter, more adaptive, and contributes actively to a soldier’s mission effectiveness. The ideal of a perfectly protected yet completely unburdened soldier remains the “holy grail” of this field of military engineering—a distant but essential goal that drives continuous advancement in a domain where the stakes are, quite literally, life and death.


If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly contribute towards our continued reporting, please visit our funding page.


Sources Used

  1. The History and Evolution of Body Armor | Atomic Defense, accessed September 30, 2025, https://www.atomicdefense.com/blogs/news/history-of-body-armor
  2. US Army Body Armor from World War II to Present – ARSOF-History.org, accessed September 30, 2025, https://arsof-history.org/articles/pdf/19oct_body_armor.pdf
  3. What is Kevlar®? – DuPont, accessed September 30, 2025, https://www.dupont.com/what-is-kevlar.html
  4. How One “Failure” Changed the World: The Story of Kevlar | The Edge of Yesterday, accessed September 30, 2025, https://www.edgeofyesterday.com/time-travelers/how-one-failure-changed-the-world-the-story-of-kevlar
  5. Kevlar – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Kevlar
  6. Armour – Ballistic, Kevlar, Plates – Britannica, accessed September 30, 2025, https://www.britannica.com/topic/armour-protective-clothing/Modern-body-armour-systems
  7. Interceptor multi-threat body armor system – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Interceptor_multi-threat_body_armor_system
  8. Small Arms Protective Insert – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Small_Arms_Protective_Insert
  9. Body Armor – DLA, accessed September 30, 2025, https://www.dla.mil/Disposition-Services/DDSR/Turn-In/Turn-In-Toolbox/Body-Armor/
  10. USMC Flack Jacket – Military Body Armor Kevlar Vest (Size XL) – Devil Dog Depot, accessed September 30, 2025, https://www.devildogdepot.com/product/interceptor-body-armor-outer-tactical-vest-soft-armor/
  11. www.dupont.com, accessed September 30, 2025, https://www.dupont.com/what-is-kevlar.html#:~:text=When%20a%20bullet%20or%20other,absorbing%20and%20dissipating%20its%20energy.&text=Due%20to%20the%20fully%20extended,against%20slashes%2C%20cuts%20and%20punctures.
  12. How Does Kevlar Work? | How Is Kevlar Able To Stop A Bullet? – Body Armor News, accessed September 30, 2025, https://www.bodyarmornews.com/how-does-kevlar-work/
  13. How do bulletproof vests work? – Max G. Levy – YouTube, accessed September 30, 2025, https://www.youtube.com/watch?v=HsaSaYcnTKg
  14. Why do Kevlar vests protect from bullets but not knives? – Quora, accessed September 30, 2025, https://www.quora.com/Why-do-Kevlar-vests-protect-from-bullets-but-not-knives
  15. Ceramic armor – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Ceramic_armor
  16. en.wikipedia.org, accessed September 30, 2025, https://en.wikipedia.org/wiki/Ceramic_armor#:~:text=Ceramic%20armor%20systems%20defeat%20small,a%20phenomenon%20known%20as%20dwell.
  17. The Science Behind Ceramic Body Armor: How It Works, accessed September 30, 2025, https://www.spartanarmorsystems.com/how-ceramic-body-armor-works
  18. How does ceramic armor work? : r/DiscoElysium – Reddit, accessed September 30, 2025, https://www.reddit.com/r/DiscoElysium/comments/17ccf78/how_does_ceramic_armor_work/
  19. Improved Outer Tactical Vest – CIE Hub, accessed September 30, 2025, https://ciehub.info/equipment/protective/IBA/IOTV.html
  20. Improved Outer Tactical Vest – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Improved_Outer_Tactical_Vest
  21. IOTV GEN 4 – Point Blank Enterprises, accessed September 30, 2025, https://www.pointblankenterprises.com/protective-products-enterprises/iotv.html
  22. Improved Outer Tactical Vest Generation II – CIE Hub, accessed September 30, 2025, https://ciehub.info/equipment/protective/IBA/IOTV/Gen2.html
  23. Soldier Plate Carrier System – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Soldier_Plate_Carrier_System
  24. Portfolio – PM SSV – Modular Scalable Vest (MSV) – PEO Soldier, accessed September 30, 2025, https://www.peosoldier.army.mil/Equipment/Equipment-Portfolio/Project-Manager-Soldier-Survivability-Portfolio/Modular-Scalable-Vest/
  25. Modular Scalable Vest – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Modular_Scalable_Vest
  26. Modular Scalable Vest (MSV) – HigherGov, accessed September 30, 2025, https://www.highergov.com/vehicle/modular-scalable-vest-msv-1974/
  27. MSV GEN II – Armor Express, accessed September 30, 2025, https://www.armorexpress.com/product/msv-gen-ii/
  28. Modular Tactical Vest – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Modular_Tactical_Vest
  29. What Body Armor Does the Military Use?, accessed September 30, 2025, https://premierbodyarmor.com/blogs/pba/what-body-armor-does-the-military-use
  30. USMC PLATE CARRIER – Armor Express, accessed September 30, 2025, https://www.armorexpress.com/product/usmc-plate-carrier/
  31. Corps fields next-generation body armor to Marines > United States …, accessed September 30, 2025, https://www.marines.mil/News/News-Display/Article/2140099/corps-fields-next-generation-body-armor-to-marines/
  32. From IOTV to MSV: The Evolution of Military Body Armor – AET gear, accessed September 30, 2025, https://www.aetgear.com/from-iotv-to-msv-the-evolution-of-military-body-armor/
  33. Plate Carriers & Vests – Agilite, accessed September 30, 2025, https://agilitegear.com/collections/plate-carriers
  34. LTC 28590 Level IV Gen V SOCOM Plate Set | Midwest Armor, accessed September 30, 2025, https://midwestarmor.com/products/ltc-28590-level-iv-gen-v-socom-plate-set/
  35. What are SAPI Plates? – Armored Republic, accessed September 30, 2025, https://www.ar500armor.com/sapi_consumer_armor/
  36. Understanding the Materials Used in SAPI Plates – H Win, accessed September 30, 2025, https://www.hwinbulletproof.com/understanding-the-materials-used-in-sapi-plates/
  37. What are SAPI Plates? AKA Small Arms Protective Inserts – Tacticon Armament, accessed September 30, 2025, https://tacticon.com/tactical-products-know-how/what-are-small-arms-protective-inserts-sapi/
  38. Armor plates SAPI and ESAPI | Differences, sizes, history – Velmet, accessed September 30, 2025, https://velmet.ua/en/broneplastini_sapi_esapi.html
  39. SAPI Vs. ESAPI Plates: Which Body Armor Style Is Best?, accessed September 30, 2025, https://premierbodyarmor.com/blogs/pba/sapi-vs-esapi-body-armor-plates
  40. www.hardshell.ae, accessed September 30, 2025, https://www.hardshell.ae/blog/sapi-vs-esapi-body-armor-difference/
  41. TM 10-8470-208-10 – Army.mil, accessed September 30, 2025, https://www.benning.army.mil/tenant/LRC/content/pdf/TM%2010-8470-208-10%20IOTV%20GEN%20I%20&%20II.pdf
  42. Exploring Historical Events that Shaped Body Armor Development – Uprise Armory LLC, accessed September 30, 2025, https://uprisearmoryllc.com/blogs/armor-education/exploring-historical-events-that-shaped-body-armor-development
  43. Body Armor Performance Standards and Compliance Testing – National Institute of Justice, accessed September 30, 2025, https://nij.ojp.gov/topics/equipment-and-technology/body-armor/performance-standards-and-compliance-testing
  44. Body Armor: Protecting Our Nation’s Officers From Ballistic Threats – California Department of Justice, accessed September 30, 2025, https://oag.ca.gov/system/files/media/pba-protecting-our-officers-from-ballistic-threats-journal.pdf
  45. Body Armor: Protecting Our Nation’s Officers From Ballistic Threats, accessed September 30, 2025, https://nij.ojp.gov/topics/articles/body-armor-protecting-our-nations-officers-ballistic-threats
  46. Complete Body Armor Guide | Types, NIJ Levels & Protection, accessed September 30, 2025, https://usarmor.com/body-armor-guide/
  47. Body Armor Levels Guide | Qore Performance Blog, accessed September 30, 2025, https://www.qoreperformance.com/blogs/military-insights/body-armor-levels-guide
  48. Backface Deformation in Body Armor – Premier Body Armor, accessed September 30, 2025, https://premierbodyarmor.com/blogs/pba/backface-deformation-in-body-armor
  49. Ballistic Resistance of Body Armor, NIJ Standard 0101.07 – National Institute of Justice, accessed September 30, 2025, https://nij.ojp.gov/topics/equipment-and-technology/ballistic-resistance-body-armor-nij-standard-010107
  50. DoD Testing Requirements for Body Armor, accessed September 30, 2025, https://media.defense.gov/2009/Jan/29/2001712184/-1/-1/1/09-047.pdf
  51. 45 Important Facts About Body Armor, accessed September 30, 2025, https://www.bodyarmornews.com/all-about-body-armor-43-facts/
  52. Body Armor Levels: The Ultimate Guide – USAMM, accessed September 30, 2025, https://www.usamm.com/blogs/news/body-armor-levels-guide
  53. Bulletproof Vests vs Plate Carriers: A Comparison – Pivotal Body Armor, accessed September 30, 2025, https://pivotalbodyarmor.com/blogs/body-armor-guides/bulletproof-vests-vs-plate-carriers-a-comparison
  54. Modern armour – Ballistic, Military, Combat – Britannica, accessed September 30, 2025, https://www.britannica.com/topic/armour-protective-clothing/Modern-armour
  55. Bulletproof vest – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Bulletproof_vest
  56. Body Armor For Civilians vs. Military Use – Chase Tactical, accessed September 30, 2025, https://www.chasetactical.com/guides/body-armor-for-civilians-vs-military-use
  57. Back Face Deformation | Armored Republic, accessed September 30, 2025, https://www.ar500armor.com/knowledge-base/what-is-back-face-deformation/
  58. What is Backface Signature (BFS) & Blunt Force Trauma? – Citizen Armor, accessed September 30, 2025, https://citizenarmor.com/blogs/blog/what-is-backface-signature-bfs-blunt-force-trauma
  59. Back Face Deformation: Understanding Risks and Mitigation – Tacticon Armament, accessed September 30, 2025, https://tacticon.com/tactical-products-know-how/back-face-deformation-understanding-risks-and-mitigation/
  60. (PDF) Behind Armour Blunt Trauma – an emerging problem, accessed September 30, 2025, https://www.researchgate.net/publication/12026274_Behind_Armour_Blunt_Trauma_-_an_emerging_problem
  61. Blunt Force Trauma Risks and Retrofitting Armour for Modern Threats – Biokinetics, accessed September 30, 2025, https://biokinetics.com/blunt-force-trauma-risks-and-retrofitting-armour-for-modern-threats/
  62. What is Backface Deformation? – BulletSafe Bulletproof Vests, accessed September 30, 2025, https://bulletsafe.com/blogs/news/what-is-backface-deformation
  63. Blunt Force Trauma | Body Armor 101, accessed September 30, 2025, https://www.spartanarmorsystems.com/blunt-force-trauma
  64. Which Body Armor Provides The Most Blunt Force Trauma Protection?, accessed September 30, 2025, https://www.spartanarmorsystems.com/which-body-armor-provides-the-most-blunt-force-trauma-protection
  65. How Trauma Pads Reduce Blunt Force Impact in Body Armor – Chase Tactical, accessed September 30, 2025, https://www.chasetactical.com/guides/how-trauma-pads-reduce-blunt-force-impact-in-body-armor
  66. Best Bulletproof Vest Materials: Pros, Cons & Uses – Shanghai H Win, accessed September 30, 2025, https://www.hwinbulletproof.com/pros-and-cons-of-ballistic-vest-materials/
  67. BULLETPROOF BETRAYAL: The British Army’s Body Armor Scandal Exposes Deadly Flaws, accessed September 30, 2025, https://www.bodyarmornews.com/bulletproof-betrayal-the-british-armys-body-armor-scandal-exposes-deadly-flaws/
  68. Why ceramic armor plates are the future of personal protection, accessed September 30, 2025, https://acelinkarmor.com/why-ceramic-armor-plates-are-the-future-of-personal-protection
  69. Can you defeat modern body armor by repeatedly shooting it with non-armor piercing rounds? : r/WarCollege – Reddit, accessed September 30, 2025, https://www.reddit.com/r/WarCollege/comments/1l94lwj/can_you_defeat_modern_body_armor_by_repeatedly/
  70. The Science Behind Body Armor Penetration: Understanding Protection and Vulnerabilities, accessed September 30, 2025, https://lifeproshield.com/blog/the-science-behind-body-armor-penetration-understanding-protection-and-vulnerabilities-38d976/
  71. Ceramic Vs. Steel Body Armor – Which Offers the Best Protection?, accessed September 30, 2025, https://premierbodyarmor.com/blogs/pba/ceramic-vs-steel-plates
  72. Steel vs. Ceramic Body Armor: Which Is Right For You? | Chase Tactical, accessed September 30, 2025, https://www.chasetactical.com/guides/steel-vs-ceramic-body-armor
  73. A Deep Dive into Ceramic & UHMWPE Body Armor – Tacticon Armament, accessed September 30, 2025, https://tacticon.com/tactical-products-know-how/a-deep-dive-into-ceramic-uhmwpe-body-armor/
  74. Current and Future Research on Body Armor | National Institute of Justice, accessed September 30, 2025, https://nij.ojp.gov/topics/articles/current-and-future-research-body-armor
  75. The Soldier’s Heavy Load | CNAS, accessed September 30, 2025, https://www.cnas.org/publications/reports/the-soldiers-heavy-load-1
  76. Real-World Data on the Effects of Weight on Combat Effectiveness (USMC, US ARMY, et. al.) : r/EscapefromTarkov – Reddit, accessed September 30, 2025, https://www.reddit.com/r/EscapefromTarkov/comments/fi07ss/realworld_data_on_the_effects_of_weight_on_combat/
  77. The effect of a tiered body armour system on soldier physical mobility, accessed September 30, 2025, https://ro.uow.edu.au/articles/report/The_effect_of_a_tiered_body_armour_system_on_soldier_physical_mobility/27701508
  78. (PDF) Effects of Body Armor Fit on Warfighter Mobility as Measured by Range of Motion (ROM) – ResearchGate, accessed September 30, 2025, https://www.researchgate.net/publication/325997950_Effects_of_Body_Armor_Fit_on_Warfighter_Mobility_as_Measured_by_Range_of_Motion_ROM
  79. (PDF) Heat Stress When Wearing Body Armor – ResearchGate, accessed September 30, 2025, https://www.researchgate.net/publication/235035042_Heat_Stress_When_Wearing_Body_Armor
  80. Biophysical Assessment and Predicted Thermophysiologic Effects of Body Armor – PMC, accessed September 30, 2025, https://pmc.ncbi.nlm.nih.gov/articles/PMC4511810/
  81. BODY ARMOR IN A HOT HUMID ENVIRONMENT. PART 2. STUDIES IN HEAT ACCLIMATIZED MEN – DTIC, accessed September 30, 2025, https://apps.dtic.mil/sti/tr/pdf/AD0682689.pdf
  82. The Evolution of Body Armor Design: Beyond the Triangle to a …, accessed September 30, 2025, https://intelalytic.com/insights/the-evolution-of-body-armor-design-beyond-the-triangle-to-a-pentagon-of-priorities
  83. Defense Industrial Base: Acquisition Program Case History – DAU, accessed September 30, 2025, https://www.dau.edu/sites/default/files/2024-03/ARJ_106-Defense%20Industrial%20Base-508.pdf
  84. What Composite Materials Are Used in Body Armor? – AZoM, accessed September 30, 2025, https://www.azom.com/article.aspx?ArticleID=23392
  85. Ballistic Composites Guide, accessed September 30, 2025, https://bulknano.com/blog/ballistic-composites-guide
  86. Advanced Composite Materials – Reinforced Plastic Composites – Avient, accessed September 30, 2025, https://www.avient.com/products/advanced-composites
  87. Advancements In Body Armor Technology: What’s New In 2024?, accessed September 30, 2025, https://www.chasetactical.com/guides/advancements-in-body-armor-technology
  88. Advanced Materials and Composites Revolutionizing Bullet-Resistant Vests – Preprints.org, accessed September 30, 2025, https://www.preprints.org/manuscript/202507.1313/v1/download
  89. Chainmail-like polymer could be the future of body armor – NSF, accessed September 30, 2025, https://www.nsf.gov/news/chainmail-polymer-could-be-future-body-armor
  90. Liquid armor – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Liquid_armor
  91. Fabric Impregnation with Shear Thickening Fluid for Ballistic Armor Polymer Composites: An Updated Overview – PMC, accessed September 30, 2025, https://pmc.ncbi.nlm.nih.gov/articles/PMC9611053/
  92. Liquid Armor: University of Delaware’s innovation, accessed September 30, 2025, https://www.bodyarmornews.com/liquid-armor-university-delawares-innovation/
  93. Liquid Body Armor – Sites at Dartmouth, accessed September 30, 2025, https://sites.dartmouth.edu/dujs/2013/11/19/liquid-body-armor/
  94. Cadet, professor improve body armor technology • United States Air Force Academy, accessed September 30, 2025, https://www.usafa.edu/cadet-professor-improve-body-armor-technology/
  95. Future-Proofing Body Armor: Anticipating the Next 50 Years, accessed September 30, 2025, https://www.customarmorgroup.com/blogs/news/future-proofing-body-armor-anticipating-the-next-50-years
  96. Next Generation Body Armour Takes The Load Off Soldiers, accessed September 30, 2025, https://www.bodyarmornews.com/next-generation-body-armour/

Analysis of the U.S. Coast Guard Maritime Security Response Team (MSRT): A National Security Asset

This report provides a comprehensive analysis of the United States Coast Guard’s Maritime Security Response Teams (MSRT), the nation’s premier domestic maritime counter-terrorism (CT) force. Forged in the crucible of the September 11, 2001 attacks, the MSRT was established to fill a critical capabilities gap between traditional federal law enforcement and military special operations. It represents a fundamental evolution in the Coast Guard’s mission, institutionalizing a high-end national security function within a service historically celebrated for its humanitarian and regulatory roles. The MSRT is a short-notice, globally deployable force tasked with the most complex and dangerous maritime threats, including opposed vessel boardings, hostage rescue, and response to incidents involving Chemical, Biological, Radiological, Nuclear, or Explosive (CBRNE) materials.

Organized into two bicoastal commands, MSRT East and MSRT West, the unit is composed of highly specialized elements, including Direct Action Sections for assault, Precision Marksman Observer Teams for overwatch, and Tactical Delivery Teams for covert insertion. Its operators are selected from the Coast Guard’s most experienced maritime law enforcement personnel and undergo a grueling training pipeline, centered on the Basic Tactical Operations Course (BTOC), which instills advanced skills in combat marksmanship and Close Quarters Combat (CQC). The MSRT’s doctrine, tactics, and armament are closely aligned with U.S. Special Operations Command (SOCOM), and the unit maintains a high degree of interoperability through constant joint training with elite DoD and federal agency partners.

While founded with a homeland defense focus, the MSRT’s operational tempo is driven by both domestic security for National Special Security Events and overseas contingency operations, where it provides a unique law enforcement authority that enables high-stakes interdictions in support of DoD combatant commands. The forthcoming implementation of the Coast Guard’s Force Design 2028 initiative, which includes the establishment of a permanent, flag-level Deployable Specialized Forces Command, signals the final maturation of the MSRT. This strategic reorganization will solidify its status as a permanent, core component of the service’s warfighting capability, ensuring it is properly resourced, commanded, and integrated to meet the evolving maritime threats of the 21st century. The MSRT is a critical, and often unseen, national asset, providing the United States with a flexible and potent response option for the most complex threats in the maritime domain.

Section 1: Genesis of a New Capability: The Post-9/11 Maritime Threat

1.1 The Pre-9/11 Security Posture and Identified Gaps

Prior to the terrorist attacks of September 11, 2001, the security of U.S. ports, waterways, and coastlines was maintained through a framework designed for traditional law enforcement and safety missions. The U.S. Coast Guard, the principal federal agency for maritime security, executed its duties primarily through a network of boat stations and cutters.1 The service’s focus was on a well-established set of responsibilities, including customs and tariff enforcement dating back to its origins as the Revenue Cutter Service in 1790, search and rescue, illegal drug interdiction, and fisheries management.2 While proficient in these areas, the prevailing security posture was not structured to counter a sophisticated, well-planned, and military-style terrorist attack originating from the maritime domain. There existed no dedicated, standing tactical force within the Coast Guard specifically trained and equipped for high-threat counter-terrorism operations in a complex maritime environment.

The 9/11 attacks starkly exposed this vulnerability. The National Commission on Terrorist Attacks Upon the United States (the 9/11 Commission) later assessed that the risk of terrorism involving the maritime sector was equal to or greater than that of civilian aviation.5 The nation’s 360-plus seaports, which handle 95 percent of overseas trade, were recognized as sprawling, accessible, and economically vital gateways, presenting attractive targets for attack or conduits for the smuggling of weapons of mass destruction.5 This realization created an urgent imperative to develop a new layer of security.

A significant capabilities gap existed between the roles of traditional law enforcement and military special operations for a domestic maritime threat. The Federal Bureau of Investigation (FBI), as the lead agency for domestic counter-terrorism, began efforts to enhance its maritime Special Weapons and Tactics (SWAT) capabilities but faced jurisdictional and operational challenges in the unique maritime environment.5 Conversely, the deployment of Department of Defense (DoD) Special Operations Forces (SOF) for a domestic law enforcement scenario is legally and politically constrained by the Posse Comitatus Act, which generally prohibits the use of the U.S. military for domestic law enforcement purposes.7 The Coast Guard, as both a military service and a law enforcement agency within the Department of Homeland Security (DHS), is uniquely positioned to operate in this seam. It possesses the legal authorities for law enforcement that DoD lacks, and the advanced tactical capabilities that most civilian agencies do not maintain.8 The MSRT was purpose-built to fill this critical niche, providing a SOF-level tactical response that could operate legally and effectively within the domestic maritime domain.

1.2 Legislative Drivers: The Maritime Transportation Security Act (MTSA) of 2002

The immediate aftermath of 9/11 saw a rapid reallocation of Coast Guard resources to bolster maritime security, but a more permanent and structured solution was required.1 The legislative centerpiece of this transformation was the Maritime Transportation Security Act (MTSA), signed into law in 2002.1 This landmark legislation served as the foundational mandate for a new era of maritime security. The MTSA explicitly required the Coast Guard to establish new types of specialized forces with the capabilities to deter, protect against, and respond to the threat of a terrorist attack in the maritime environment.5

The Act was a key component of the new layered security strategy under the recently formed Department of Homeland Security.1 It compelled the Coast Guard to undertake its greatest organizational transformation since World War II, fundamentally altering its mission profile from one of primarily safety and traditional law enforcement to one that included high-stakes homeland security and counter-terrorism.1 This domestic legislative action was mirrored by a global shift in maritime security consciousness, exemplified by the development of the International Ship and Port Facility Security (ISPS) Code, which created a standardized international framework for assessing and mitigating maritime security risks.13 The MTSA was the domestic engine driving the creation of the forces that would become the MSRT.

1.3 Evolutionary Path: From MSST and TACLET to a Dedicated Counter-Terrorism Force

The Coast Guard’s initial response to the MTSA mandate was the creation of Maritime Safety and Security Teams (MSSTs) in 2002.1 These units were established in the nation’s most critical ports to provide an immediate anti-terrorism and force protection presence, closing a critical security gap.7 MSSTs specialized in waterside security, enforcing security zones, and protecting critical infrastructure.1 While they provided a necessary non-compliant vessel boarding capability, their posture was primarily defensive.16

It soon became clear that a more offensively-oriented, direct-action capability was needed to fully address the spectrum of potential terrorist threats. This led to a pivotal decision in 2004, when Coast Guard leadership merged two distinct types of units to create a new, more potent force.1 MSST-91102, based in Chesapeake, Virginia, was combined with Tactical Law Enforcement Team (TACLET)-North.1 The TACLETs, first established in the 1980s for counter-drug operations, were composed of highly skilled personnel expert in advanced interdiction and high-risk boarding operations.7 This merger was a crucial evolutionary step, blending the port security and anti-terrorism focus of the MSSTs with the advanced tactical law enforcement and offensive boarding skills of the TACLETs. This synthesis of defensive security and offensive tactical proficiency laid the conceptual and operational groundwork for a true maritime counter-terrorism unit.

1.4 Formal Establishment and Bicoastal Expansion

The new hybrid unit created in 2004 was initially designated Security Response Team One (SRT-1) and later renamed the Enhanced-MSST.1 In 2006, this capability was formally established and commissioned as the Maritime Security Response Team (MSRT), cementing its role as the Coast Guard’s premier counter-terrorism response force.1

Recognizing the need for a rapid response capability to threats on both U.S. coasts, the Coast Guard moved to expand the MSRT concept. In 2013, the service began the transformation of San Diego’s MSST-91109 into a second MSRT.1 This unit was officially designated MSRT-West in 2017, complementing the original Chesapeake-based unit, now known as MSRT-East.17 This bicoastal stationing provides operational commanders with a dedicated, high-readiness counter-terrorism asset capable of responding to incidents anywhere in the Atlantic or Pacific maritime approaches to the United States, completing the initial vision for a national-level maritime tactical response capability.

Section 2: Mission Profile and Operational Mandate

2.1 Core Mission: Maritime Counter-Terrorism and High-Threat Law Enforcement

The fundamental mission of the Maritime Security Response Team is to serve as the U.S. Coast Guard’s lead direct-action unit, specializing in maritime counter-terrorism and the resolution of high-risk law enforcement threats.19 The MSRT is organized, trained, and equipped to provide a short-notice, threat-tailored response force to deter, protect against, and respond to maritime terrorism.20 Its mandate is to execute security actions against armed, hostile, or non-compliant adversaries on the water or in a port environment.18 This places the MSRT at the apex of the Coast Guard’s law enforcement and security capabilities, reserved for the most dangerous and complex scenarios that exceed the capacity of standard units. Unlike other special operations forces, MSRTs are uniquely empowered to operate inside U.S. waters with law enforcement authority, making them the nation’s first line of defense against a maritime terrorist incident.23

2.2 Deter, Protect, Respond: A Proactive and Reactive Mandate

The MSRT’s operational mandate is multifaceted, encompassing both reactive and proactive functions. While it is trained to be the first response unit to a potential or actual terrorist incident, its mission extends beyond simple reaction.18 The teams are tasked with denying preemptive terrorist actions, meaning they can be deployed to interdict threats before they materialize.18 Furthermore, MSRTs provide an overt and highly capable security presence for high-threat events, such as National Special Security Events (NSSEs), where their presence serves as a powerful deterrent.1 This dual posture allows operational commanders to employ the MSRT across a spectrum of operations, from providing a visible deterrent and protective overwatch to executing a high-risk, kinetic assault. This flexibility makes the MSRT an exceptionally versatile instrument for national security.

2.3 Scope of Operations: Domestic and Global Deployment Authority

While the MSRT’s primary focus is the safety and security of the U.S. homeland, its operational reach is global.16 The unit is explicitly designed and maintained to be capable of rapid worldwide deployment in response to incidents, supporting both Coast Guard operational commanders and Department of Defense (DoD) combatant commanders.1 This global deployment authority is a critical component of its strategic value. It allows the United States to project the MSRT’s unique blend of elite tactical skills and law enforcement authority into international waters and foreign theaters of operation.16

This capability has proven to be a powerful tool for foreign policy and international security. U.S. Navy vessels, bound by international norms and policy, are generally prohibited from conducting law enforcement boardings of foreign-flagged vessels on the high seas, as such an action could be perceived as an act of war.7 To navigate this legal complexity, Navy ships frequently embark Coast Guard teams, often composed of MSRT personnel operating as Advanced Interdiction Teams (AITs).18 During these operations, the Coast Guard team is technically in command of the boarding, acting under its unique law enforcement authority.24 This provides a legal and diplomatic framework for conducting high-stakes interdictions, such as seizing illicit weapons shipments from stateless vessels in the Persian Gulf, that DoD assets could not execute alone.24 In this role, the MSRT’s mission transcends counter-terrorism, serving as a critical enabler for projecting national power in a legally and diplomatically nuanced manner.

2.4 Distinction from other Deployable Specialized Forces (DSF)

The MSRT is the most specialized unit within the Coast Guard’s Deployable Specialized Forces (DSF), a collection of units that provide unique capabilities to operational commanders. It is essential to distinguish the MSRT’s role from that of its sister units.

  • Maritime Safety and Security Teams (MSSTs): The primary distinction lies in their operational posture. MSSTs are proactive anti-terrorism units focused on force protection, waterside security, and enforcing security zones around critical infrastructure or high-value assets.16 The MSRT, in contrast, is a reactive counter-terrorism unit designed for direct action against an identified threat.16 In simple terms, an MSST protects a potential target, while an MSRT assaults a target that has been compromised or poses an imminent threat.
  • Tactical Law Enforcement Teams (TACLETs): While both units conduct high-risk boardings, their primary missions differ. TACLETs, through their Law Enforcement Detachments (LEDETs), are primarily focused on the counter-narcotics mission, interdicting drug smugglers in major transit zones.16 The MSRT’s focus is squarely on counter-terrorism, hostage rescue, and threats involving weapons of mass destruction.
  • Port Security Units (PSUs): PSUs are expeditionary forces designed to provide sustained port security and force protection, primarily in overseas locations in support of U.S. military operations.19 They establish and maintain security in a port, whereas an MSRT would be called in to resolve a specific, high-level threat within that port.

The MSRT sits at the top of this force structure, representing the Coast Guard’s highest level of tactical capability, reserved for the most complex and dangerous threats facing the nation in the maritime domain.

Section 3: Organizational Framework and Force Structure

3.1 Command and Control: From the DOG to Area Commands

The command and control (C2) architecture for the MSRT and other DSF units has undergone significant evolution, reflecting a persistent organizational effort to best manage these unique, high-demand assets. In 2007, the Coast Guard established the Deployable Operations Group (DOG) to consolidate all DSF units under a single, unified command.1 The intent was to enhance operational effectiveness, standardize tactics, techniques, and procedures (TTPs), and create a centralized process for allocating these specialized forces based on their specific capabilities rather than as monolithic units.25 The creation of the DOG was a significant step toward professionalizing and integrating these new forces into the broader Coast Guard.

However, in 2013, the DOG was decommissioned, and operational and tactical control of the DSF, including the MSRTs, reverted to the bicoastal Area Commands (Atlantic Area and Pacific Area).1 This move was intended to better align the specialized forces with the regional operational commanders who would employ them. This oscillation between centralized and decentralized control highlights an enduring tension within the service: how to manage national-level, “elite” assets while preserving the authority of traditional, geographically-based operational commanders. The 2019 Government Accountability Office (GAO) report on the DSF noted potential inefficiencies under the decentralized Area Command model, including periods of underutilization for some units while others were declining missions due to a lack of personnel.10 This history suggests that neither the fully centralized nor the fully decentralized model was an optimal, long-term solution for managing these critical forces.

3.2 Unit Composition: MSRT East and MSRT West

The MSRT force is composed of two primary commands strategically located to provide national coverage. MSRT East is based in Chesapeake, Virginia, and falls under the operational control of the Atlantic Area Commander. MSRT West is based in San Diego, California, under the Pacific Area Commander.1 This bicoastal posture ensures that a highly trained maritime counter-terrorism force can be rapidly deployed to address threats emerging on either U.S. coast or their respective international areas of responsibility.

3.3 Internal Elements

An MSRT is not a monolithic entity but a composite organization comprising several specialized elements that work in synergy to accomplish the mission. Each element provides a distinct capability, and together they form a comprehensive tactical system.

ElementPrimary FunctionKey Capabilities
Direct Action Section (DAS)Primary assault and entry element.Close Quarters Combat (CQC); Advanced Interdiction; Hostage Rescue; Tactical Facility Entry; High-Risk Boarding (Level III/IV VBSS). 7
Precision Marksman Observer Team (PMOT)Provides overwatch, intelligence gathering, and precision fire support.Long-range precision marksmanship; Target observation and reporting; Airborne Use of Force (AUF) to disable vessel engines or neutralize threats. 16
Tactical Delivery Team (TDT)Provides maritime insertion and extraction for the DAS.Covert insertion/extraction using high-speed Rigid Hull Inflatable Boats (RHIBs); Advanced vessel handling and navigation; Stealthy approach on moving targets. 7
CBRNE SectionDetects, identifies, and provides initial response to Chemical, Biological, Radiological, Nuclear, and Explosive threats.Operations in contaminated environments; Use of specialized detection equipment; Counter-proliferation; Underwater Port Security (MSRT West only). 3

The Direct Action Section forms the core of the MSRT’s tactical capability, composed of operators who are the “tip of the spear” in neutralizing hostile threats.19 They are supported by the PMOTs, who provide critical situational awareness and the ability to engage targets from a distance, and the TDTs, who are masters of the high-risk task of delivering the assault force onto its objective. The CBRNE section provides a unique and vital capability, allowing the MSRT to operate in threat environments that would incapacitate most other tactical teams.3

3.4 Staffing and Funding Analysis

An analysis of the MSRT’s resources reveals a growing force with significant investment in training and operations. According to a November 2019 GAO report, the number of personnel assigned to the MSRTs grew steadily from 379 in fiscal year 2016 to a planned 463 in fiscal year 2019.10 During this period, annual operating costs fluctuated but were planned at over $2.3 million for 2019, with training costs consistently exceeding $1.2 million per year.10

However, the same GAO report raised critical questions about the Coast Guard’s overall management of its Deployable Specialized Forces. The report found that the Coast Guard had not conducted a comprehensive assessment of its DSF workforce needs, a key practice for organizational management.10 This lack of a formal needs assessment meant the service could not be certain it had the right number of personnel with the right skills in the right units. The report noted that officials from some DSF units reported periods of underutilization, while other units had to decline operational requests—approximately 5% of total requests for DSF assistance went unfulfilled—due to a lack of available personnel.10

This finding of potential underutilization at a strategic level appears to conflict with anecdotal reports from operators describing a high operational tempo, with some MSRT members deployed for five to eight months out of the year.29 This discrepancy suggests a potential data fidelity problem or a mismatch in how “operational employment” is defined and tracked. The formal “resource hours expended” captured in strategic-level data may not fully account for the entire deployment cycle, which includes transit time, pre-deployment training, and on-station standby periods. This disconnect could lead to strategic resource and manning decisions being made based on an incomplete understanding of the MSRT’s true operational demands. The GAO recommended a full workforce analysis, a step the Department of Homeland Security concurred with, to better align resources with mission requirements.10

Section 4: The MSRT Operator: Selection and Training Pipeline

4.1 Recruitment: Sourcing from Experienced Maritime Law Enforcement

An assignment to an MSRT is not an entry-level position within the U.S. Coast Guard. The unit actively recruits its candidates from the ranks of experienced maritime law enforcement personnel, ensuring a baseline of maturity, professionalism, and operational knowledge.18 The primary source for MSRT operators is the Maritime Enforcement Specialist (ME) rating, the service’s dedicated law enforcement specialists.30 Candidates are also frequently selected from other DSF units, such as MSSTs and Tactical Law Enforcement Teams (TACLETs).18

This selection model, which prioritizes demonstrated experience over raw potential, is a key characteristic of the MSRT. A typical candidate has already completed basic training, served at one or more operational units, and possesses a strong foundation in maritime law, use of force policy, and basic boarding procedures.32 This pre-screening through real-world operational experience likely reduces attrition rates in the subsequent formal training pipeline and produces an operator who already understands the unique legal and environmental complexities of the maritime domain—a critical foundation for the MSRT’s high-stakes mission.

4.2 The Tactical Operator (TO) Screener: Gateway to the Pipeline

The first formal step for a prospective MSRT candidate is to volunteer for and successfully complete the Tactical Operator (TO) Screener.31 This intensive evaluation process serves as the gateway to the training pipeline and is designed to identify candidates with the physical and mental attributes necessary to succeed.31 The screener is a multi-day event that includes a formal application, a thorough medical review, and a required endorsement from the candidate’s current command.31

The evaluation itself is a grueling series of events designed to test candidates in areas of historically high attrition. It includes classroom instruction, weapons handling, and physically demanding events on land, in the water, and at height on towers.31 A core component is the Maritime Law Enforcement Physical Fitness Assessment, which candidates must pass upon arrival. Additionally, they must be capable of completing a minimum of 5 chin-ups and 5 pull-ups; failure in these physical standards results in immediate removal from the screener.31 The screener culminates in boarding scenarios that simulate the challenges of the full qualification course. A board of senior representatives from the MSRT, TACLET, and headquarters staff evaluates each candidate’s performance and makes a recommendation for assignment.31

4.3 The Crucible: The Basic Tactical Operations Course (BTOC)

Candidates selected for assignment to an MSRT must attend and graduate from the Basic Tactical Operations Course (BTOC). This intensive eight-week (40-day) course is the crucible in which MSRT operators are forged and is designated as High Risk Training.33 Conducted at the Coast Guard’s Special Missions Training Center (SMTC) located aboard Marine Corps Base Camp Lejeune, North Carolina, BTOC is designed to develop the fundamental skills necessary to function as a DSF assault team member.33 The strategic co-location of the SMTC on a major Marine Corps installation is a deliberate choice. It fosters a martial mindset and provides MSRT candidates with access to premier military training infrastructure, including advanced live-fire shoot houses and extensive ranges, that are not typically available at Coast Guard facilities.34 The course curriculum is divided into two primary phases:

  • Advanced Combat Marksmanship (Weeks 1-4): This phase is dedicated to developing expert-level proficiency with the unit’s primary weapon systems. Students fire thousands of rounds, progressing from basic marksmanship fundamentals to advanced techniques such as shooting while moving, engaging multiple targets, and transitioning between their primary carbine (MK18) and secondary pistol (Glock 19).34
  • Close Quarters Combat (CQC) (Weeks 5-8): The second phase moves from the flat range into complex shoot houses. Here, students learn the core principles of CQC, including dynamic room entry, team-based movement, progressive breaching, and surgical application of force in confined spaces.33

Throughout the course, students are constantly evaluated on their performance, safety, and decision-making. They must achieve a minimum score of 80% on all written exams and receive a “GO” on all pass/fail performance criteria to graduate.33

4.4 Advanced Skills and Joint Training: Ensuring Interoperability

Graduation from BTOC marks the beginning, not the end, of an operator’s training. Once assigned to their team, members attend a variety of advanced skills courses to qualify for specialized roles within the unit, such as precision marksman, breacher, canine handler, or diver.16

A hallmark of the MSRT’s training philosophy is its deep and continuous integration with the broader U.S. special operations community. MSRT operators routinely train alongside an array of elite DoD and federal partners, including U.S. Navy SEALs and Special Warfare Combatant-Craft Crewmen (SWCC), U.S. Army Special Forces and the 75th Ranger Regiment, the 160th Special Operations Aviation Regiment (SOAR), and the FBI’s Hostage Rescue Team and BORTAC.16 These joint training exercises are critical for ensuring seamless interoperability, standardizing procedures, and building the personal relationships necessary to function effectively during a complex, multi-agency crisis response.22

4.5 Sustaining Readiness: The Continuous Training Cycle

The advanced tactical skills required of an MSRT operator are highly perishable. Consequently, when the teams are not deployed on operational missions, the vast majority of their time is dedicated to a continuous and rigorous training cycle to maintain peak readiness.16 This relentless focus on training ensures that every operator and every team element remains proficient in the full spectrum of their required capabilities, from marksmanship and CQC to fast-roping and tactical medicine, living up to the Coast Guard’s motto:

Semper Paratus—Always Ready.

PhaseLocationDurationKey Objectives & Skills
Initial EligibilityVarious Coast Guard Units2-4+ YearsGain operational experience in the Maritime Enforcement Specialist (ME) rating or other Deployable Specialized Forces (DSF) units (e.g., MSST, TACLET). 18
Tactical Operator (TO) ScreenerSpecial Missions Training Center (SMTC), Camp Lejeune, NC~1 WeekPhysical and mental assessment to identify candidates with high potential for success. Includes PFA, water survival, weapons handling, and team events. 31
Basic Tactical Operations Course (BTOC)SMTC, Camp Lejeune, NC8 WeeksCore qualification course. Develops baseline skills in advanced combat marksmanship, Close Quarters Combat (CQC), and progressive breaching. 33
Advanced Skills TrainingVarious LocationsVariableSpecialized training for specific team roles, such as Precision Marksman (PM-C), Breacher, K-9 Handler, Tactical Boat Coxswain, or Diver. 16
Joint Training ExercisesCONUS / OCONUSContinuousIntegration with DoD SOF (SEALs, Rangers), federal LE (FBI), and other partners to ensure tactical and procedural interoperability. 22

Section 5: Advanced Capabilities and Tactical Doctrine

5.1 Visit, Board, Search, and Seizure (VBSS): Executing Level III and IV Opposed Boardings

The MSRT is the Coast Guard’s authority on the most dangerous and complex form of maritime interdiction: Visit, Board, Search, and Seizure (VBSS).8 While standard Coast Guard boarding teams are trained to handle compliant or passively non-compliant vessels, the MSRT specializes in scenarios where significant resistance is expected. Their expertise lies in executing Level III (non-compliant vessel, crew is not hostile but refuses to stop) and Level IV (opposed/hostile vessel, crew has demonstrated hostile intent) boardings.18 These operations are inherently high-risk and require a level of tactical proficiency, equipment, and aggression that falls outside the scope of conventional maritime law enforcement. The MSRT’s ability to successfully conduct opposed boardings against determined adversaries is a core component of its counter-terrorism and counter-proliferation missions.18

5.2 Close Quarters Combat (CQC): Principles of Speed, Surprise, and Violence of Action

The tactical doctrine underpinning MSRT operations is Close Quarters Combat (CQC), a methodology for fighting in confined spaces such as the narrow corridors and cluttered compartments of a ship.27 MSRT CQC doctrine is founded on three core principles: speed, surprise, and controlled violence of action.34

  • Speed: This does not imply reckless haste, but rather a “careful hurry”.46 Teams move with deliberate and rapid action to overwhelm an adversary’s decision-making cycle, preventing them from mounting an effective defense.43
  • Surprise: Gaining the element of surprise, even for a few seconds, is paramount. This is achieved through stealthy insertion methods, deception, or the use of diversionary devices to disorient the enemy at the point of entry.45
  • Violence of Action: This principle dictates the overwhelming and decisive application of force to neutralize threats and dominate the engagement space. It is a mindset of complete control, ensuring that hostile personnel are eliminated or secured before they can inflict friendly casualties.43

By mastering these principles, MSRT assault teams are trained to systematically clear and secure vessels, neutralizing all threats with precision and efficiency.41

5.3 Insertion and Extraction Methods

A critical element of MSRT tactical proficiency is the ability to board a target vessel under a variety of conditions. The teams are expert in two primary insertion methods:

  • Vertical Insertion (VI): This involves fast-roping from a helicopter directly onto the deck of a target vessel, which may be underway at speed.25 This high-risk technique requires exceptional skill, physical courage, and seamless coordination with aviation assets, often from the U.S. Navy or the Coast Guard’s own Helicopter Interdiction Tactical Squadron (HITRON).22 Vertical insertion is not merely a tactical skill but a strategic capability; it allows the MSRT to project force onto a target in sea conditions where a surface approach would be impossible or too slow, effectively negating a target’s speed and maneuverability advantage and dramatically expanding the team’s operational envelope.23
  • Surface Assault: The more conventional method involves a high-speed approach using the TDT’s specialized Rigid Hull Inflatable Boats (RHIBs). These boats are designed for stealthy approaches and stability in various sea states. The assault team then boards the target vessel using methods such as caving ladders, grappling hooks, or other specialized climbing techniques.23

5.4 Specialized Capabilities

Beyond their core CQC and VBSS skills, MSRT operators possess a suite of specialized capabilities that enhance their operational effectiveness:

  • Hostage Rescue and Personnel Recovery: As a dedicated counter-terrorism unit, the MSRT is trained and equipped to conduct complex hostage rescue operations in the maritime environment.16
  • Airborne Use of Force (AUF): MSRT Precision Marksmen are trained to deliver disabling fire from helicopters.18 Using large-caliber anti-materiel rifles, they can disable the engines of a non-compliant vessel, stopping it in the water and allowing the assault team to conduct a boarding.48
  • K-9 Explosives Detection: The MSRT integrates highly trained canine teams into its operations. These K-9 units can be inserted with the assault force to rapidly search a vessel for explosive devices or materials, a critical capability when dealing with potential terrorist threats.16

5.5 CBRNE Threat Response Protocols

Perhaps the most unique and critical capability of the MSRT is its ability to conduct its full range of tactical operations within a Chemical, Biological, Radiological, Nuclear, or Explosive (CBRNE) contaminated environment.3 Few tactical teams in the world are trained and equipped for this contingency. MSRT operators train to board vessels, clear compartments, and engage hostile threats while wearing cumbersome personal protective equipment (PPE) and using specialized detection devices.16 The Department of Homeland Security’s Science and Technology Directorate actively works to develop and field improved protective equipment specifically for MSRT operators to enhance their endurance and effectiveness during high-stress opposed boardings in a CBRNE environment.51 This capability ensures that the United States has a credible response option for one of the most catastrophic potential forms of maritime terrorism.

Section 6: Armament, Weapon Systems, and Equipment

6.1 Personal Defense Weapons

The standard issue sidearm for MSRT operators, and the Coast Guard as a whole, is the Glock 19 Gen5 pistol, chambered in 9mm.48 This marked a significant transition, which began in 2023, from the SIG Sauer P229R-DAK pistol chambered in.40 S&W that had been in service for nearly two decades.8 The move to the Glock 19 was intended to align the Coast Guard with other Department of Homeland Security partner agencies and was expected to increase shooter comfort and performance due to the 9mm caliber’s lighter recoil and the pistol’s ergonomics.52

6.2 Primary Carbines

The primary weapon system for MSRT Direct Action Section operators is a variant of the M4 carbine, typically the MK18, which features a Close Quarters Battle Receiver (CQBR) with a 10.3-inch barrel.26 This compact weapon, chambered in 5.56x45mm NATO, is optimized for the tight confines of a ship’s interior, where a longer rifle would be unwieldy. The selection of the MK18 is not coincidental; it is the same platform standardized by U.S. Naval Special Warfare (e.g., Navy SEALs) for maritime CQC. This deliberate commonality ensures seamless interoperability in training, doctrine, ammunition, and accessories during joint operations. The MSRT’s choice of armament is a physical manifestation of its doctrine of deep integration with its DoD SOF counterparts.

6.3 Specialized Weaponry

To address a range of tactical challenges, the MSRT employs a variety of specialized weapon systems:

  • Shotguns: For breaching doors and as a devastatingly effective close-range weapon, operators utilize 12-gauge shotguns, including the pump-action Remington M870P and the semi-automatic Saiga-12.8
  • Designated Marksman/Sniper Rifles: Precision Marksman Observer Teams are equipped with semi-automatic rifles chambered in 7.62x51mm NATO, such as the Mk 11 Mod 0 and the MK14 Enhanced Battle Rifle (EBR). These weapons provide accurate, long-range suppressive fire and the ability to neutralize specific threats from overwatch positions.48
  • Anti-Materiel Rifles: For the Airborne Use of Force mission, MSRT marksmen employ heavy-caliber sniper rifles like the Barrett M82/M107 and the Robar RC-50, both chambered in.50 BMG.48 Fired from a helicopter, these powerful rifles are capable of disabling a vessel’s engines, effectively stopping it for a boarding team.

6.4 Support Systems and Equipment

The effectiveness of an MSRT operator depends as much on their support equipment as their weapons. Operators are outfitted with a full suite of modern tactical gear, including ballistic helmets, body armor with plate carriers, night vision devices, and secure communications systems.26 They also employ a variety of specialized tools for breaching, including rams, pry bars, and explosives. This comprehensive loadout ensures operators are protected, can communicate effectively, and have the necessary tools to gain access to and control any part of a target vessel, day or night.54

Weapon SystemCaliberTypePrimary Tactical Role
Glock 19 Gen59mmPistolSecondary/Personal Defense Weapon 48
MK18 / CQBR5.56x45mm NATOCarbine / Assault RiflePrimary weapon for Close Quarters Combat (CQC) 26
Remington M870P12-gaugeShotgunBallistic Breaching, Close-Range Engagement 34
Saiga-1212-gaugeShotgunClose-Range Engagement 48
Mk 11 Mod 07.62x51mm NATODesignated Marksman RiflePrecision fire support from overwatch 48
MK14 EBR7.62x51mm NATODesignated Marksman RiflePrecision fire support from overwatch 48
Barrett M107 / M82.50 BMGAnti-Materiel Sniper RifleAirborne Use of Force (AUF) for engine disabling 48
Robar RC-50.50 BMGAnti-Materiel Sniper RifleAirborne Use of Force (AUF) for engine disabling 48
M240B7.62x51mm NATOMedium Machine GunSupport weapon, typically boat-mounted 48

Section 7: Operational Employment and Mission Analysis

7.1 National Special Security Events (NSSEs)

A primary and highly visible domestic role for the MSRT is providing enhanced security for National Special Security Events (NSSEs). These are large-scale, high-profile events such as presidential inaugurations, the Super Bowl, United Nations General Assemblies, and major international economic summits.1 During these events, MSRTs deploy to provide a robust waterside security presence and serve as a dedicated counter-assault team.16 Their presence acts as a significant deterrent, and they remain on high alert, ready to respond immediately to any potential terrorist incident in the maritime approaches to the event venue.

7.2 Overseas Contingency Operations

While the MSRT’s foundational purpose is homeland defense, its operational record indicates that its most significant kinetic actions often occur overseas in support of DoD objectives. MSRTs frequently deploy globally, operating as Advanced Interdiction Teams (AITs) embarked on U.S. Navy and allied warships.18 In theaters such as the Persian Gulf and the waters off the Horn of Africa, these teams have been instrumental in counter-proliferation and anti-piracy missions.16

Publicly available information, though limited, points to the MSRT’s key role in the seizure of illicit weapons from stateless dhows and other vessels in the Middle East.24 In these scenarios, the MSRT provides the specialized boarding capability and, crucially, the law enforcement authority that allows the U.S. Navy to interdict such shipments without escalating the encounter to a military-on-military confrontation.24 This demonstrates a significant perception gap: while often viewed as a domestic SWAT-style team, the MSRT in reality functions as a de facto maritime special operations force in active theaters abroad. The operational tempo for these deployments is reportedly high, with some sources indicating that operators can be deployed for five to eight months per year.29

7.3 Interagency Collaboration and Exercises

To maintain its high level of readiness and ensure seamless integration during a crisis, the MSRT participates in frequent and realistic joint training exercises. These exercises bring together the MSRT with its key partners, including DoD SOF units like Navy SEALs and Army Rangers, federal law enforcement such as the FBI, and other DHS components.5 These events are crucial for refining and standardizing TTPs, testing interoperability of communications and equipment, and resolving potential command-and-control conflicts before a real-world incident occurs.5 A notable example was a 2018 exercise off the coast of San Diego, where MSRT West operators assaulted a commercial cruise ship to neutralize a simulated terrorist threat, demonstrating their capability to handle a complex, large-scale hostage scenario.56 Another training event in 2021 saw MSRT members partnering with U.S. Army Airborne Rangers and U.S. Navy aviation assets to hone ship-board CQC tactics aboard a decommissioned ship at Fort Eustis, Virginia.22

7.4 Case Studies and Illustrative Deployments

Due to the sensitive nature of their missions, detailed after-action reports and specifics of MSRT operations are rarely made public.57 Most of their work is conducted with little to no public fanfare, reinforcing their reputation as “quiet professionals”.24 However, some operational details have emerged through open-source channels. One widely cited, though unconfirmed, operation reportedly occurred in 2010 when an MSRT team intercepted a cargo ship off the coast of Africa suspected of carrying illegal weapons. The team is said to have secured the vessel and detained the crew within minutes without firing a shot.23 More concretely, official press releases from the U.S. Navy regarding large weapons seizures in the Middle East often mention the presence of an “embarked Coast Guard Advanced Interdiction Team,” which is typically composed of MSRT personnel.24 While the full scope of their operational history remains classified, the available evidence points to a highly active and effective force that is routinely engaged in critical national security missions both at home and abroad.

Section 8: Future Outlook: The MSRT in an Evolving Security Environment

8.1 Impact of Force Design 2028

The future of the MSRT and all Coast Guard Deployable Specialized Forces will be profoundly shaped by the service’s ambitious modernization initiative, Force Design 2028 (FD28).60 This initiative represents a revolutionary effort to restructure, recapitalize, and modernize the Coast Guard to meet the threats of the coming decades. A key organizational change under FD28 is the establishment of a permanent, dedicated Deployable Specialized Forces Command, to be led by a Rear Admiral.60

This development marks the final institutional maturation of the MSRT and its sister units. Born from the urgent necessity of the post-9/11 era, the DSF’s command structure has been subject to experimentation, shifting between centralized and decentralized models.1 The creation of a permanent, flag-level command signals that these specialized forces are no longer viewed as an emergency measure but as a permanent, core component of the Coast Guard’s identity and future warfighting capability. This high-level command will provide the MSRT with a powerful institutional advocate for budget, personnel, and equipment priorities. It will also likely lead to more streamlined command and control, better integration into the service’s strategic planning, and enhanced oversight, ensuring the unit’s unique capabilities are sustained and developed for the long term.

8.2 Technological Integration

Under FD28, the Coast Guard is committed to becoming a leader in the adoption and use of advanced technology.61 For the MSRT, this will involve the integration of emerging technologies to enhance situational awareness and operational effectiveness. This includes leveraging artificial intelligence (AI) and deep learning algorithms to process vast amounts of data from surveillance assets to detect threats and anomalies in the maritime domain.67 The development of a “Coastal Sentinel” next-generation surveillance capability, which aims to create a robust and integrated sensor network, will provide MSRT planners with unprecedented real-time data to inform operations.66 Furthermore, the establishment of a Rapid Response Prototype Team under FD28 is designed to streamline the acquisition process and get cutting-edge capabilities—such as improved sensors, communications gear, and unmanned systems (UxVs)—into the hands of operators more quickly.66

8.3 Adapting to Emerging Threats

While the MSRT was created to counter the non-state terrorist threat that defined the post-9/11 era, its elite skill set is highly adaptable to the emerging challenges of great power competition. In an environment characterized by “gray zone” conflict—actions that fall below the threshold of conventional warfare—the MSRT’s unique status as a law enforcement and military entity makes it an ideal tool. Its expertise in advanced interdiction and opposed boardings could be employed to enforce international sanctions, interdict state-sponsored illicit trafficking, or counter the use of civilian or paramilitary vessels for aggressive military purposes. The MSRT provides the U.S. with a scalable and legally defensible option to respond to provocations in the maritime domain without resorting to an overt act of war.

8.4 Analysis and Recommendations for Sustained Capability

The MSRT has proven itself to be a vital national security asset over the past two decades. To ensure its continued effectiveness, several actions should be prioritized. First, under the new Deployable Specialized Forces Command, the Coast Guard should fully implement the GAO’s 2019 recommendation to conduct a comprehensive workforce needs analysis for the MSRT.10 This analysis is critical to definitively align staffing levels, deployment cycles, and resource allocation with the unit’s true high operational tempo and complex global mission set, resolving the data discrepancies between strategic reporting and tactical reality.

Second, investment in continuous modernization must be a priority. This includes not only the adoption of new technologies but also the recapitalization of existing platforms, such as the Tactical Delivery Teams’ RHIBs, and ensuring operators are equipped with the most advanced personal protective equipment, weapons, and sensors available. Finally, the deep commitment to joint training with DoD SOF and interagency partners must be sustained and expanded. This interoperability is the bedrock of the MSRT’s effectiveness and its ability to seamlessly integrate into any national-level response. By taking these steps, the Coast Guard will ensure that the MSRT remains a relevant, ready, and decisive force capable of confronting the nation’s most serious maritime threats for decades to come.

Conclusion

The journey of the Maritime Security Response Team from a concept born in the aftermath of national tragedy to a world-class maritime tactical unit is a testament to the U.S. Coast Guard’s adaptability and commitment to its security mission. The MSRT occupies a unique and indispensable position within the U.S. national security framework, possessing the tactical acumen and operational intensity of military special operations while wielding the legal authority of federal law enforcement. This combination allows it to operate effectively across a spectrum of conflict where other units cannot. It is a “quiet professional” force, whose most critical contributions often go unseen by the public but are essential to the safety and security of the nation. The MSRT is a critical national asset, providing the United States with a flexible, precise, and potent response option for the most complex threats in the maritime domain. The strategic vision outlined in Force Design 2028 promises to enhance and solidify this vital role, ensuring the MSRT is always ready to answer the call.


If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly contribute towards our continued reporting, please visit our funding page.


Sources Used

  1. MSSTs and MSRTs — forged in the crucible of 9/11 – MyCG.uscg.mil – Coast Guard, accessed September 14, 2025, https://www.mycg.uscg.mil/News/Article/4067812/mssts-and-msrts-forged-in-the-crucible-of-911/
  2. U.S. Coast Guard Missions: A Historical Timeline – Department of Defense, accessed September 14, 2025, https://media.defense.gov/2021/Jun/04/2002735330/-1/-1/0/USCGMISSIONSTIMELINE.PDF
  3. 235 Years of US Coast Guard History and Untold Stories – GreaterGood, accessed September 14, 2025, https://greatergood.com/blogs/news/cw-years-of-us-coast-guard-history-and
  4. Coast Guard Missions | United States Coast Guard, accessed September 14, 2025, https://www.gocoastguard.com/about/missions
  5. OIG Audit Report 06-26, accessed September 14, 2025, https://oig.justice.gov/reports/FBI/a0626/exec.htm
  6. GAO-08-126T, Maritime Security: The SAFE Port Act: Status and Implementation One Year Later, accessed September 14, 2025, https://www.gao.gov/assets/a118330.html
  7. History – Coast Guard Tactical Law Enforcement Association, accessed September 14, 2025, https://www.cgtle.org/history
  8. Visit, board, search, and seizure – Wikipedia, accessed September 14, 2025, https://en.wikipedia.org/wiki/Visit,_board,_search,_and_seizure
  9. VBSS: A Navy SEAL explains how to board enemy ships | Sandboxx, accessed September 14, 2025, https://www.sandboxx.us/news/career/training-and-promotion/vbss-a-navy-seal-walks-you-through-boarding-an-enemy-ship/
  10. GAO-20-33, Accessible Version, COAST GUARD: Assessing Deployable Specialized Forces’ Workforce Needs Could Improve Efficiency, accessed September 14, 2025, https://www.gao.gov/assets/710/706468.pdf
  11. GAO-20-33, Coast Guard Assessing Deployable Specialized Forces’ Workforce Needs Could Improve Efficiency and Reduce Potential, accessed September 14, 2025, https://www.gao.gov/assets/gao-20-33.pdf
  12. Maritime Transportation System Security Recommendations, accessed September 14, 2025, https://www.dhs.gov/sites/default/files/publications/HSPD_MTSSPlan_0.pdf
  13. Frequently Asked Questions on Maritime Security, accessed September 14, 2025, https://www.imo.org/en/OurWork/Security/Pages/FAQ.aspx
  14. Reorganizing Coast Guard Deployable Specialized Forces Capability to Meet National Requirements, accessed September 14, 2025, https://www.hsdl.org/c/view?docid=825406
  15. Maritime Safety and Security Team – Wikipedia, accessed September 14, 2025, https://en.wikipedia.org/wiki/Maritime_Safety_and_Security_Team
  16. Every U.S. Coast Guard Special Operations Unit Explained – General Discharge, accessed September 14, 2025, https://gendischarge.com/blogs/news/coast-guard-special-operations
  17. The Long Blue Line: MSSTs and MSRTs—forged in the crucible of 9/11, accessed September 14, 2025, https://www.history.uscg.mil/Research/THE-LONG-BLUE-LINE/Article/2934256/the-long-blue-line-mssts-and-msrtsforged-in-the-crucible-of-911/
  18. Deployable Specialized Forces – Wikipedia, accessed September 14, 2025, https://en.wikipedia.org/wiki/Deployable_Specialized_Forces
  19. Coast Guard Special Operations | Deployable Operations Group – American Special Ops, accessed September 14, 2025, https://www.americanspecialops.com/coast-guard/
  20. MSRT Tactical Delivery Team – DVIDS, accessed September 14, 2025, https://www.dvidshub.net/image/1102808/msrt-tactical-delivery-team
  21. US COAST GUARD’S ELITE: MARITIME SECURITY RESPONSE TEAMS (MSRT), accessed September 14, 2025, https://www.youtube.com/watch?v=ZTnsn9-Fc1U
  22. Coast Guard MSRT teams conduct training at Fort Eustis, Virginia – DVIDS, accessed September 14, 2025, https://www.dvidshub.net/video/828916/coast-guard-msrt-teams-conduct-training-fort-eustis-virginia
  23. The US Coast Guard MSRT explained in 1 Minute 20s🎖️ – YouTube, accessed September 14, 2025, https://www.youtube.com/watch?v=rtDu5yl5ayg
  24. MSRT Missions : r/uscg – Reddit, accessed September 14, 2025, https://www.reddit.com/r/uscg/comments/13a76qu/msrt_missions/
  25. GAO-10-433R, Coast Guard: Deployable Operations Group Achieving Organizational Benefits, but Challenges Remain, accessed September 14, 2025, https://www.gao.gov/assets/a96652.html
  26. Maritime Security Response Team (MSRT) – American Special Ops, accessed September 14, 2025, https://www.americanspecialops.com/coast-guard/msrt/
  27. MSRT CQC Training – American Special Ops, accessed September 14, 2025, https://www.americanspecialops.com/photos/coast-guard/msrt-cqc.php
  28. Coast Guard History, accessed September 14, 2025, https://wow.uscgaux.info/content.php?unit=070-08-02&category=coast-guard-history
  29. Are MSRT actively doing missions or training : r/uscg – Reddit, accessed September 14, 2025, https://www.reddit.com/r/uscg/comments/1mgkuzu/are_msrt_actively_doing_missions_or_training/
  30. Maritime Enforcement Specialist | United States Coast Guard, accessed September 14, 2025, https://www.gocoastguard.com/careers/enlisted/me
  31. ALCGPSC 079/24 – AY25 TACTICAL OPERATOR SCREENER …, accessed September 14, 2025, https://content.govdelivery.com/accounts/USDHSCG/bulletins/3a1c53a
  32. If I’m looking to go into the coast guard and plan on becoming an ME, how can I increase my chances of joining a TACLET or MSRT team during my contract? – Quora, accessed September 14, 2025, https://www.quora.com/If-I-m-looking-to-go-into-the-coast-guard-and-plan-on-becoming-an-ME-how-can-I-increase-my-chances-of-joining-a-TACLET-or-MSRT-team-during-my-contract
  33. Basic Tactical Operations Course (BTOC) – forcecom.uscg.mil – Coast Guard, accessed September 14, 2025, https://www.forcecom.uscg.mil/Our-Organization/FORCECOM-UNITS/SMTC/Training/Basic-Tactical-Operations-Course-BTOC/
  34. BTOC prepares maritime law enforcement specialists > Marine …, accessed September 14, 2025, https://www.lejeune.marines.mil/News/Article/Article/512624/btoc-prepares-maritime-law-enforcement-specialists/
  35. Basic Tactical Operations Course – Marines.mil, accessed September 14, 2025, https://www.marines.mil/News/Marines-TV/?videoid=360019&dvpTag=definition
  36. All clear! Coast Guardsmen train in Basic Tactical Operations – DVIDS, accessed September 14, 2025, https://www.dvidshub.net/news/141400/all-clear-coast-guardsmen-train-basic-tactical-operations
  37. special missions training center (smtc) – forcecom.uscg.mil – Coast Guard, accessed September 14, 2025, https://www.forcecom.uscg.mil/Our-Organization/FORCECOM-UNITS/SMTC/Training/
  38. Coast Guard MSRT: The Special Forces of Maritime Security – YouTube, accessed September 14, 2025, https://www.youtube.com/watch?v=guvr_SgSuSk
  39. Semper Paratus and Special Forces: Why the Coast Guard Should be Part of the SOCOM Enterprise | Small Wars Journal by Arizona State University, accessed September 14, 2025, https://smallwarsjournal.com/2025/03/21/semper-paratus-and-special-forces-why-the-coast-guard-should-be-part-of-the-socom-enterprise/
  40. U.S. Navy SEALs, U.S. Coast Guard MSRT West conduct VBSS during AE25 [Image 3 of 7], accessed September 14, 2025, https://www.dvidshub.net/image/9253590/us-navy-seals-us-coast-guard-msrt-west-conduct-vbss-during-ae25
  41. ‘The Night Is Ours:’ Inside the Elite World of Coast Guard Ship-Boarding Teams | Military.com, accessed September 14, 2025, https://www.military.com/daily-news/2019/04/04/night-ours-inside-elite-world-coast-guard-ship-boarding-teams.html
  42. Close-quarters battle – Wikipedia, accessed September 14, 2025, https://en.wikipedia.org/wiki/Close-quarters_battle
  43. Core Tactical Principles and Strategies in CQB – Trango Systems, accessed September 14, 2025, https://www.trango-sys.com/tactical-principles-and-strategies-in-cqb/
  44. Close Quarters Combat: Tactical Precision in Confined Spaces – The Ranch TX, accessed September 14, 2025, https://ranchtx.org/blog/f/close-quarters-combat-tactical-precision-in-confined-spaces
  45. Perform Effective Close Quarters Combat (CQB) – Army Flashcards, accessed September 14, 2025, https://armyflashcards.com/blogs/blog/perform-effective-close-quarters-combat-cqb
  46. CLOSE QUARTERS COMBAT TECHNIQUES – Textfiles, accessed September 14, 2025, http://pdf.textfiles.com/manuals/MILITARY/united_states_army_fm_90-10×1%20-%2012_may_1993%20-%20part09.pdf
  47. Chronology of Coast Guard History, accessed September 14, 2025, https://www.history.uscg.mil/research/chronology/
  48. List of equipment of the United States Coast Guard – Wikipedia, accessed September 14, 2025, https://en.wikipedia.org/wiki/List_of_equipment_of_the_United_States_Coast_Guard
  49. First Army > Units > Divisions > Division West, accessed September 14, 2025, https://www.first.army.mil/Units/Divisions/Division-West/?videoid=731247&dvpTag=MSRT
  50. Coast Guard Maritime Security Response Team East K-9 Unit conducts training – Innovation – The National Guard, accessed September 14, 2025, https://www.nationalguard.mil/Development/Innovation/?dvpTag=Bill
  51. Response and Recovery | Homeland Security, accessed September 14, 2025, https://www.dhs.gov/science-and-technology/response-and-recovery-0
  52. After 20 years the Coast Guard is changing their Personal Defense Weapon – MyCG.uscg.mil, accessed September 14, 2025, https://www.mycg.uscg.mil/News/Article/3607044/after-20-years-the-coast-guard-is-changing-their-personal-defense-weapon/
  53. US Coast Guard MSRT members armed with MK18 Mod 0 carbines, January 2024 [3015 x 5359] – Reddit, accessed September 14, 2025, https://www.reddit.com/r/MilitaryPorn/comments/1bpmitq/us_coast_guard_msrt_members_armed_with_mk18_mod_0/
  54. Deployable Operations Group Tactical Operator Inspection DISCLAIMER – forcecom.uscg.mil, accessed September 14, 2025, https://www.forcecom.uscg.mil/Portals/3/Documents/SMTC/2013%20Tactical%20Operator%20Inspection.pdf?ver=2017-02-23-111812-050
  55. USCG load outs valid? : r/QualityTacticalGear – Reddit, accessed September 14, 2025, https://www.reddit.com/r/QualityTacticalGear/comments/1062h19/uscg_load_outs_valid/
  56. Coast Guard MSRT West team members conduct counterterrorism exercise – DVIDS, accessed September 14, 2025, https://www.dvidshub.net/video/604946/coast-guard-msrt-west-team-members-conduct-counterterrorism-exercise
  57. MWR AFTER ACTION REPORT – NAS Corpus Christi, accessed September 14, 2025, https://www.navymwrcorpuschristi.com/modules/media/?do=download&id=f89e59be-e7aa-4adc-99ed-f454508378b9
  58. After Action Report – Template – PAVILION | DINFOS Online Learning, accessed September 14, 2025, https://pavilion.dinfos.edu/Template/Article/2471043/after-action-report/
  59. COAST GUARD AFTER ACTION PROGRAM (CGAAP) AND CORRECTIVE ACTION PROGRAM (CAP), COMDTINST 3010.19E – DoD, accessed September 14, 2025, https://media.defense.gov/2023/Mar/16/2003180439/-1/-1/0/CI_3010_19E.PDF
  60. After decades of underinvestment and severe readiness challenges, the President and Secretary of Homeland Security have directed Force Design 2028 to renew the Coast Guard to become a more agile, capable, and responsive fighting force. Here is our plan., accessed September 14, 2025, https://www.uscg.mil/Leadership/Commandants-Initiatives/ForceDesign2028/mod/42239/player/0/video/966544
  61. USCG Force Design 2028, accessed September 14, 2025, https://www.uscg.mil/leadership/commandants-initiatives/forcedesign2028/
  62. The Way Forward- Force Design 2028 – YouTube, accessed September 14, 2025, https://www.youtube.com/watch?v=r-lRM1ZQj3E
  63. Coast Guard shares execution plan for Force Design 2028, accessed September 14, 2025, https://www.mycg.uscg.mil/News/Article/4256392/coast-guard-shares-execution-plan-for-force-design-2028/
  64. CMC Receipt of Destruction – DoD, accessed September 14, 2025, https://media.defense.gov/2025/Jul/25/2003761706/-1/-1/0/FD28%20EXECUTION%20PLAN%20SUMMARY.PDF
  65. USCG Force Design 2028 Executive Report – DoD, accessed September 14, 2025, https://media.defense.gov/2025/May/27/2003724531/-1/-1/0/REPORT%20-%20FD28%20EXECUTIVE%20REPORT%20_1166_V14.PDF
  66. Coast Guard Force Design 2028 – Technology, accessed September 14, 2025, https://www.uscg.mil/ForceDesign2028/Technology/
  67. AI in Maritime Security: Applications, Challenges, Future Directions, and Key Data Sources, accessed September 14, 2025, https://www.mdpi.com/2078-2489/16/8/658
  68. Restructure the Coast Guard Reserves into Support Roles – USNI Blog, accessed September 14, 2025, https://blog.usni.org/posts/2018/04/24/restructure-the-coast-guard-reserves-into-support-roles