Category Archives: Uncategorized

The Philippine Strategic Pivot: A 3-Year Market & Opportunity Analysis (2026-2028) – Q4 2025

This post was generated on October 31st, 2025.

The Republic of the Philippines is executing a generational strategic pivot, shifting its national security doctrine from internal security to external territorial defense. This shift, driven by escalating geopolitical tensions in the South China Sea and proximity to potential flashpoints like Taiwan, has unlocked a wave of defense and infrastructure investment from the Uniteded States, South Korea, Japan, Australia, and other allies.1

This investment surge is underpinned by two parallel engines:

  1. Allied & Domestic Defense Funding: A revitalized framework of treaties and agreements—notably the U.S. Enhanced Defense Cooperation Agreement (EDCA)—is channeling hundreds of millions of dollars into Philippine military base construction and modernization.3 Concurrently, the Philippines’ domestic “Re-Horizon 3” military modernization program outlines a 10-year, USD 35 billion ambition to acquire modern platforms, with a political push to increase defense spending to 2.0% of GDP by 2028.6
  2. A Resilient, Liberalizing Economy: This defense boom is backstopped by one of Southeast Asia’s fastest-growing economies, with GDP growth forecast to average ~6.0% through 2028.8 Crucially, the government has strategically liberalized key infrastructure sectors. The 2022 amended Public Service Act (PSA) now permits 100% foreign ownership of telecommunications, logistics, airports, and power—the very sectors required to support a 21st-century military network.11

This report projects a 3-year (2026-2028) opportunity matrix. The analysis indicates that while high-profile platform sales (Tier 1) are significant, the most scalable and immediate opportunities for private enterprise lie in Tier 2: defense-adjacent infrastructure. This includes allied-funded construction at EDCA sites, strategic logistics at hubs like Subic Bay, and 100% foreign-ownable investments in the dual-use power and telecommunications backbones required by these new strategic bases.14

The market is bifurcated by regulation: the defense sector (manufacturing, MRO) is restricted by a 40% foreign ownership cap, mandating Joint Ventures.17 In contrast, the critical support infrastructure market has been intentionally opened to 100% foreign control. This high-risk, high-reward environment demands a sophisticated, multi-track market entry strategy that aligns with the Philippines’ new “deterrence by entanglement” doctrine and its parallel economic liberalization.


Part 1: The New Strategic Calculus: Geopolitics & Defense Budgets

1.1 The Indo-Pacific Fulcrum: A New Era of External Deterrence

The fundamental driver of the Philippine investment surge is a clear and dramatic shift in its national threat perception. Under the administration of President Ferdinand Marcos Jr., the Philippines has pivoted from a decades-long focus on internal security and counter-insurgency to a new doctrine prioritizing external deterrence and territorial defense.1

This strategic pivot is a direct response to two primary geopolitical drivers:

  1. The South China Sea (SCS) Conflict: The Philippines faces escalating “gray-zone” tactics and direct aggression from Chinese maritime forces, which contest Philippine sovereignty within its own Exclusive Economic Zone (EEZ).19 China’s expansive “Nine-Dash Line” claim, which was legally invalidated by a 2016 arbitral tribunal, continues to be enforced through military and coast guard actions.19 With an estimated USD 3.36 trillion in global trade passing through the SCS annually, the security of these shipping lanes is a core interest for the Philippines and its allies, including the United States.23
  2. The Taiwan Contingency: The northernmost provinces of the Philippines, particularly Cagayan, are in close geographic proximity to Taiwan.25 This geography makes the Philippines an indispensable part of the regional security architecture in any potential Taiwan Strait conflict. This proximity is a primary factor in the selection of new military base locations for allied cooperation.25

The previous administration’s (2016-2022) diplomatic outreach to Beijing is now widely viewed as having failed to de-escalate these threats.1 In response, the Marcos government is pursuing a strategy of “deterrence by entanglement.” This strategy involves actively revitalizing, integrating, and operationalizing its security partnerships to make the Philippines a more capable and interconnected ally, thereby raising the political and military cost of any aggression against it.

1.2 The Allied Investment Framework: A Minilateral Convergence

The Philippine strategy is not reliant on a single partner. Instead, it is actively fostering a “networked” security architecture, creating a convergence of investment and cooperation from multiple allied nations.2

  • United States (The Cornerstone): The 1951 Mutual Defense Treaty (MDT) remains the bedrock of the relationship.19 This is now being operationalized through the 2014 Enhanced Defense Cooperation Agreement (EDCA), which provides the legal framework for a rotational U.S. troop presence and, critically, U.S. funding for the construction and modernization of Philippine military bases.5 This framework is backed by substantial U.S. capital, including:
  • Over USD 1.033 billion in active Foreign Military Sales (FMS) cases.28
  • A USD 500 million defense assistance package.2
  • A USD 128 million request in the FY2025 Pentagon budget specifically for EDCA infrastructure projects.3
  • A newly signed General Security of Military Information Agreement (GSOMIA), which secures the exchange of classified data and enables the transfer of high-end defense technology, such as the F-16 platform.31
  • South Korea (The Prime Contractor): The Republic of Korea (ROK) has emerged as a crucial, cost-effective, and reliable supplier of modern military platforms.6 Philippine Defense Secretary Gilberto Teodoro has stated that Korean-built systems, including frigates and FA-50 fighter jets, form the “backbone” of the Armed Forces of the Philippines’ (AFP) current capabilities.33 Recent major deals include a USD 700 million contract for 12 additional FA-50 light combat aircraft 33 and contracts for modern frigates and patrol vessels.6
  • Japan (The Strategic Neighbor): A powerful new security partnership is forming. In a historic first, Japan is transferring finished defense equipment—four air surveillance radar systems—to the Philippine Air Force.36 The two nations are also in advanced negotiations for a Reciprocal Access Agreement (RAA) (also known as an Acquisition and Cross-Servicing Agreement, or ACSA).39 This treaty-level agreement will facilitate joint training and operations and allow Japanese forces to utilize Philippine bases.
  • Australia (The Interoperable Partner): The bilateral relationship was elevated to a “Strategic Partnership” in 2023.41 This is being manifested in a significant increase in joint training activities.41 Furthermore, a new defense pact is being finalized that will, similar to EDCA, allow Australia to “construct, use, upgrade and maintain” defense infrastructure at select Philippine military sites.4

These “minilateral” relationships are being formalized through multilateral actions, including the first-ever five-country Defense Ministers’ meeting (US, ROK, Japan, Australia, Philippines) 43 and quadrilateral maritime patrols in the South China Sea.20 For businesses, the convergence of U.S., Japanese, and Australian investment in the same physical locations (the EDCA sites) creates a complex but highly lucrative opportunity for construction, engineering, and logistics firms that can navigate multi-national procurement systems and standards.

1.3 The Re-Horizon 3 Mandate: Quantifying the Market

The primary domestic demand signal for these investments is the AFP Modernization Program. In January 2024, President Marcos approved a revamped “Re-Horizon 3,” a 10-year program with a headline budget of USD 35 billion (approximately PHP 2 trillion).6

This program signals the definitive shift from internal to external defense.1 Its priorities are “long-range capabilities,” “air defense systems,” and “strategic basing infrastructure”.7 This is reinforced by the “Self-Reliant Defense Posture” (SRDP) Act, which encourages the development of a domestic defense-industrial base through technology transfer and joint ventures.6

This ambition is backed by strong political will, with the Philippine Senate finance committee chair vowing to increase annual defense spending from its current level of ~1.19% of GDP to the NATO standard of 2.0% of GDP by 2028.7

However, a sober analysis of the Philippine fiscal process is required. The USD 35 billion figure is a 10-year ambition, not a fully funded appropriation.

  1. Legacy Delays: Several modernization projects from the previous Horizon 1 and 2 phases remain incomplete due to funding delays.48
  2. Budget Risk: The FY 2026 budget for AFP Modernization, while increasing 20% to PHP 90 billion (approx. USD 1.5 billion), illustrates the risk. Of this amount, PHP 40 billion is classified as “Unprogrammed Appropriations,” meaning the funds are not guaranteed and are contingent on excess government revenue.49

This fiscal reality creates a bifurcated market.

  • 1. Major Platform Acquisitions: Large, multi-billion dollar procurements like the proposed USD 5.6 billion F-16 deal 31 will be politically protected but are long-cycle opportunities funded via Government-to-Government (G2G) loans or Foreign Military Sales (FMS).28
  • 2. Agile Capability Sales: Smaller, lower-cost, and high-tech capabilities (e.g., cybersecurity, C4ISTAR, UAVs) are better suited for Direct Commercial Sales (DCS).28 These can be funded from the more reliable programmed portion of the annual budget, offering a faster and more accessible market for entrepreneurial firms.

Part 2: The Philippine Market Environment: A Dual-Engine Economy

2.1 Macroeconomic Projections (2026-2028): The Growth Backdrop

The surge in defense spending is occurring against the backdrop of one of Asia’s most dynamic and resilient macro-economic environments. The Philippines is forecast to remain one of the fastest-growing economies in Southeast Asia, driven by strong domestic demand, robust remittances, and sustained infrastructure investment.8

  • GDP Growth: Economic forecasts from multilateral institutions are consistently strong.
  • The World Bank projects robust growth averaging 6.0% over 2024-2026.9
  • The Asian Development Bank (ADB) projects 6.0% growth in 2025 and 6.1% in 2026.8 A separate ADB report projects 5.7% in 2026.54
  • The Philippine government’s Development Budget Coordination Committee (DBCC) targets a growth band of 6.0% to 7.0% for 2026-2028.10
  • Inflation: After recent spikes, inflation is stabilizing and forecast to remain within the central bank’s (BSP) target band of 2.0% to 4.0%.8 The ADB forecasts 3.0% for 2025-2026 8, while the IMF projects 1.6% in 2025 and 5.7% in 2026.56
  • Foreign Direct Investment (FDI): Overall FDI inflows, while stable at USD 8.9 billion in 2024 17, have lagged regional peers.59 However, recent data from the Bangko Sentral ng Pilipinas shows that key defense allies—Japan, the United States, and South Korea—are consistently among the top sources of FDI equity capital.60
  • Investment Climate: Despite this positive outlook, significant challenges remain. The business environment is hampered by a “complex, slow… and sometimes corrupt judicial system” 17, regulatory inconsistencies, high power costs, and logistical bottlenecks.59

Table 1: Philippine Macroeconomic & Defense Budget Forecast (2025-2028)

Indicator2025 (Forecast/Proposed)2026 (Forecast/Proposed)2027 (Forecast)2028 (Target)
Real GDP Growth5.5% – 6.5%6.0% – 7.0%6.0% – 7.0%6.0% – 7.0%
Inflation Rate2.0% – 3.0%2.0% – 4.0%2.0% – 4.0%2.0% – 4.0%
USD/PHP Exchange Rate55 – 5855 – 5855 – 5855 – 58
National Government BudgetPHP 6.326 TrillionPHP 6.793 TrillionN/AN/A
Total Defense BudgetPHP 378.9 BillionPHP 430.9 BillionN/AN/A
AFP Modernization Budget (Total)PHP 75.0 BillionPHP 90.0 BillionN/AN/A
… (Programmed)PHP 35.0 BillionPHP 50.0 BillionN/AN/A
… (Unprogrammed)PHP 40.0 BillionPHP 40.0 BillionN/AN/A
Defense Spending as % of GDP~1.19% (Actual)~1.3% (Projected)N/A2.0% (Target)

7

2.2 The Regulatory Landscape: A Strategic Bifurcation

For foreign investors, the Philippine market is defined by a critical and deliberate regulatory split. The government has strategically “walled off” direct defense manufacturing while simultaneously prying open the critical infrastructure sectors needed to support it.

  • The Barrier: The Foreign Investment Negative List (FINL)
    The FINL outlines all sectors where foreign ownership is restricted by law.17 For the defense industry, the key restriction is a 40% cap on foreign equity in the “manufacturing of explosives, firearms, and military hardware”.17 This restriction legally forces any foreign defense contractor wishing to co-produce, assemble, or establish in-country Maintenance, Repair, and Overhaul (MRO) to do so via a Joint Venture (JV) with a 60% Filipino-owned partner. This aligns perfectly with the SRDP Act’s goal of using JVs to facilitate technology transfer to a local industrial base.6
  • The Opportunity: The Amended Public Service Act (PSA)
    This 2022 reform is a game-changer for defense-adjacent industries.68 The law re-classified several key industries, removing them from the constitutionally-limited “public utility” category (which also had a 40% foreign ownership cap). As a result, the following sectors are now open to 100% foreign ownership:
  • Telecommunications 12
  • Railways
  • Airports 68
  • Shipping and Logistics 12

This liberalization is not a coincidence. The Philippine government and its allies cannot build a 21st-century, networked military force (Re-Horizon 3) or operate from strategic bases (EDCA) using the country’s existing and oft-criticized infrastructure.59 The amended PSA, supplemented by new laws like the Konektadong Pinoy Act to accelerate data transmission infrastructure 16, is a direct invitation to foreign capital to build and own the dual-use backbone that the AFP and its allies will depend on. This creates a high-growth, non-FINL-restricted, and scalable market for infrastructure funds, telecom operators, and logistics giants.

2.3 The Base Effect: Local Economic Ecosystems

The defense investment is not abstract; it is geographically focused, creating “micro-economies” around nine specific military hubs designated under the Enhanced Defense Cooperation Agreement (EDCA).5

The 9 EDCA Sites:

  • Northern Luzon (Taiwan/SCS-facing): Naval Base Camilo Osias (Cagayan), Lal-lo Airport (Cagayan) 5, and Camp Melchor Dela Cruz (Isabela).
  • South China Sea / Palawan-facing: Antonio Bautista Air Base (Palawan) and Naval Station Narciso del Rosario (Balabac Island, Palawan).5
  • Training & Logistics Hubs: Basa Air Base (Pampanga) and Fort Magsaysay (Nueva Ecija).70
  • Central/South Hubs: Benito Ebuen Air Base (Cebu) and Lumbia Airport (Cagayan de Oro).70

The Philippine and U.S. governments have framed these sites as drivers of “economic growth and job creation” 72 and as crucial hubs for humanitarian assistance and disaster response (HADR).5 However, this narrative is not without risk. The sites face political opposition from groups concerned about resource drains on local communities (e.g., water and electricity) 73 and the risk of pulling the Philippines into a direct U.S.-China conflict.25

For entrepreneurs and investors, this dynamic creates a clear path to gaining a “social license to operate.” The most successful and politically resilient projects will be those that actively support the government’s dual-use narrative. An investment in a new warehouse, for example, is more likely to succeed if it is framed as a “Dual-Use Disaster Response Hub” (serving military logistics and civilian relief storage) rather than purely as a military facility.

Table 2: Strategic Infrastructure Hubs: Key EDCA Sites & Locations

Location (Base & Province)Strategic SignificanceIdentified Projects & Funding (U.S., AUS, JP)Key Opportunities (2026-2028)
Basa Air Base (Pampanga)Logistics Hub; Fighter BaseUSD 32M parking apron; USD 25M runway rehab; U.S. total >USD 66M [14, 77, 78]Runway/taxiway construction, fuel storage, command facilities, MRO facilities
Fort Magsaysay (Nueva Ecija)Logistics Hub; Training AreaUSD 11.4M+ allocated.78 Warehousing & training facilities [71]Warehouse construction, training/simulation centers, logistics services
Lal-lo Airport (Cagayan)N. Luzon; Taiwan StraitFuel storage & command center proposed 25Fuel depot (construction, operation), C2 facility, runway/apron upgrades
Naval Base Camilo Osias (Cagayan)N. Luzon; Taiwan StraitAirstrip repairs proposed 25Port/airstrip modernization, power/comms infrastructure
Antonio Bautista AB (Palawan)South China SeaUSD 1.8M+ allocated.78 Boat maintenance facility 79Pier/port upgrades, maintenance facilities, maritime surveillance systems
Balabac Island (Palawan)South China SeaNew site 5Port facilities, power generation, C4ISTAR infrastructure
Subic Bay (Zambales)Strategic Logistics HubU.S. Navy solicitation for 25,000 sqm warehouse 15Warehouse (Build-Operate-Lease), ship repair (SRF), logistics & maintenance
Source: 3

Part 3: Opportunity Matrix: A 3-Year Projection (2026-2028)

The confluence of allied investment, domestic modernization, and economic liberalization creates a multi-tiered opportunity set.

3.1 Tier 1: Direct Defense & Security (High-Priority Gaps)

These are high-end opportunities targeting the AFP’s most pressing capability gaps under Re-Horizon 3.6 They are primarily for established defense contractors and system integrators.

  • A. C4ISTAR Integration (The “Nervous System”)
  • The Gap: This is arguably the AFP’s single most critical deficiency. The military is acquiring modern platforms (jets, ships) but lacks the high-level, integrated network to connect them into a coherent force.47 The AFP is actively working to enhance its Command, Control, Communications, Computers, Information/Intelligence, Surveillance, Target Acquisition, and Reconnaissance (C4ISTAR) systems, but requires massive external support.82
  • The Opportunity: A “system-of-systems” integrator. This includes supplying secure datalinks (like Link 16), sensor fusion centers, battlefield management software, and the ISR platforms (such as the Hermes UAVs) that feed the network.6
  • Timeframe: Immediate & Ongoing (2026-2028).
  • B. Cybersecurity & Electronic Warfare (The “New Domain”)
  • The Gap: The Philippines is one of the most cyber-attacked countries in Southeast Asia.84 The government’s new National Cyber Security Plan (2023-2028) creates a formal procurement framework to secure critical infrastructure.84 The Philippine Army has activated a new Cyber Battalion 86, but a significant skills gap remains.85
  • The Opportunity: Solutions for critical infrastructure protection, cyber defense for new platforms (F-16s, frigates), and electronic warfare (EW) systems, which are part of the F-131 package.31 Joint allied cyber exercises 87 will accelerate demand for tools and professional training and certification.
  • Timeframe: High-Growth (2026-2028).
  • C. Multi-Role Platforms & In-Country MRO
  • The Demand: These are the big-ticket items defining Re-Horizon 3.
  • Air: A potential USD 5.6 billion FMS case for 16-20 F-16 Block 70/72 aircraft.31 A contracted USD 700 million G2G deal for 12 more FA-50 Block 20s from South Korea.33
  • Sea: Contracts for new frigates and corvettes from South Korea 6 and patrol boats from Japan.90
  • The Opportunity (Long-Term): The “Self-Reliant Defense Posture” 6 and statements from suppliers like Lockheed Martin 89 and Korea Aerospace Industries (KAI) 91 point to the critical downstream opportunity: in-country Maintenance, Repair, and Overhaul (MRO) and sustainment. KAI has already signed a Performance-Based Logistics (PBL) agreement 91, and Elbit Systems has helped set up maintenance facilities for its land systems.92 This is the primary market for the 40% FINL-restricted Joint Venture.
  • Timeframe: Procurement (2026-2027), MRO & Sustainment (2028+).

Table 3: Key AFP Procurement Pipeline (Re-Horizon 3)

DomainPlatform / SystemSupplier (Country)Est. ValueStatusKey Opportunity
AirMulti-Role Fighter (MRF)Lockheed Martin (US)USD 5.6 BillionProposed (FMS)Platform MRO, simulation & training
AirLight Combat AircraftKAI (ROK)USD 700 MillionContracted (G2G)Platform MRO, PBL, parts supply
AirAir Surveillance RadarMitsubishi (Japan)N/AContractedSustainment, integration with C4I
Air/LandAir Defense SystemsVarious (Israel)N/AContracted (Spyder)C4I integration, follow-on buys
SeaFrigates / CorvettesHD HHI (ROK)>USD 2.0 BillionContractedCombat system integration, MRO
SeaSubmarinesN/AN/AProposedPlatform, basing infrastructure, training
JointC4ISTAR SystemsVariousN/AHigh-PrioritySystem integration, software, datalinks
JointCybersecurity SystemsVariousN/AHigh-PriorityCritical infra protection, training, tools
Source: 6

3.2 Tier 2: Defense-Adjacent Infrastructure & Logistics

These are the most scalable, near-term, and (in many cases) liberalized opportunities. They are ideal for construction firms, logistics operators, and infrastructure funds.

  • A. Base Construction & Modernization
  • The Demand: This is an immediate, funded requirement. The U.S. alone has allocated over USD 100 million 5 and has USD 128 million in the FY2025 budget request for EDCA construction.3 Australia is also planning to fund and build infrastructure.4
  • The Opportunity: Prime and sub-contracting roles for specific, tendered projects, including:
  • Basa Air Base (Pampanga): A USD 32 million contract for a parking apron (awarded to Acciona CMS Philippines) 14 and a USD 25 million runway rehabilitation.78
  • Fort Magsaysay (Nueva Ecija): Construction of training and warehouse facilities.71
  • Lal-lo Airport (Cagayan): Proposed construction of a fuel storage facility and command center.25
  • Palawan: A new boat maintenance facility.79
  • Timeframe: Immediate (2026-2027).
  • B. Strategic Logistics & Warehousing
  • The Demand: A specific, massive logistics requirement has been publicly identified. The U.S. Navy has issued solicitations for a 25,000-square-meter climate-controlled warehouse and maintenance shop at the Subic Bay Freeport Zone, with a lease start planned for 2026.15
  • The Opportunity: This is a specific, actionable RFP. It represents a major anchor-tenant opportunity for a logistics or real estate developer. Establishing this hub at Subic’s strategic deep-water port creates a platform to service the entire region and the nearby EDCA sites in Pampanga and Cagayan.
  • Timeframe: Immediate (2026).
  • C. Critical Infrastructure (PSA-Liberalized)
  • The Demand: The new military hubs in relatively undeveloped areas (e.g., Cagayan, Balabac Island) 5 will be high-volume consumers of stable power and high-speed data. The existing grid is insufficient.
  • The Opportunity (100% Foreign-Owned):
  • Energy: Build, own, and operate new power generation (renewable-powered microgrids) to provide high-reliability power to bases and surrounding communities.
  • Telecommunications: Leverage the amended PSA 12 and new Konektadong Pinoy Act 16 to build, own, and operate fiber optic backbones, 5G towers, and secure data centers to service both military and civilian needs.
  • Timeframe: Mid-Term (2027-2028).

3.3 Tier 3: Ancillary & Localized Services

These are localized, service-based opportunities catering to the new “base effect” economies.

  • A. Services for Rotational Forces
  • The Demand: A sustained and increasing rotational presence of U.A_S_. 25, Australian 4, and (post-RAA) Japanese forces.39
  • The Opportunity: Base Operations Support (BOS) contracts, real estate and housing, transportation, food supply chains, and other services. These are often smaller, locally-competed contracts well-suited for agile entrepreneurial ventures.93
  • Timeframe: Ongoing (2026-2028).
  • B. Training & Simulation
  • The Demand: The AFP is acquiring complex, expensive-to-operate platforms like the F-16 and modern frigates. This creates an urgent need for advanced, cost-effective training solutions.
  • The Opportunity: Supplying air combat simulators (for F-16/FA-50), maritime bridge and combat system simulators, and “live-virtual-constructive” (LVC) training systems to link joint exercises.
  • Timeframe: Mid-Term (2027-2028).

Part 4: Market Entry Strategy & Risk Analysis

4.1 Recommended Entry Models: A Three-Track Approach

Navigating the bifurcated regulatory landscape requires a flexible, multi-track entry strategy.

  • 1. Joint Venture (JV):
  • Why: This is the only legal pathway for opportunities inside the 40% Foreign Investment Negative List cap.17
  • Applicable Sectors: Tier 1 (Defense MRO, co-production, assembly) and Tier 3 (land ownership for real estate).
  • Strategy: Partner with a large, established Filipino conglomerate. This provides not only the 60% local equity but, more importantly, the political and bureaucratic relationships necessary to navigate the system.
  • 2. Wholly-Owned Subsidiary (100% Foreign):
  • Why: This is the high-growth path created by the amended Public Service Act.11
  • Applicable Sectors: Tier 2 (Telecommunications, Logistics, Airports, Power Generation, large-scale construction, and the Subic Bay warehouse operation).
  • Strategy: This is the ideal model for infrastructure funds, large multinational logistics firms, and telecom operators. It allows full control of capital, operations, and cash flow in a newly liberalized, high-demand market.
  • 3. Government-to-Government (G2G) / Foreign Military Sales (FMS):
  • Why: This is the preferred procurement method for the Philippine government for large, strategic, high-cost platforms.51
  • Applicable Sectors: Tier 1 (F-16s, frigates, submarines).28
  • Strategy: This is a long-term, relationship-based play. The business opportunity lies in lobbying the supplier’s own government (e.g., in Washington D.C., Seoul, Tokyo) to have its product prioritized in allied defense financing and sales packages.

4.2 Risk Assessment & Mitigation

  • A. Geopolitical Risk (High):
  • Risk: An actual military skirmish with China in the South China Sea.21 Such an event could halt all commercial activity, disrupt shipping, and place investments at risk.
  • Mitigation: This is a systemic, un-hedgeable risk. Investors must price this “geopolitical premium” into their financial models and recognize they are investing in a “hot” region.
  • B. Political & Social Risk (Medium-High):
  • Risk: Local political opposition to EDCA sites, which can cause project delays.73 A future administration (post-2028) could reverse the current pro-alliance pivot.
  • Mitigation: The “Dual-Use” & “Social License” strategy is the best mitigation. Frame all investments as jointly benefiting civilian needs (disaster relief, jobs, community infrastructure) and military requirements. This builds local support and makes the project more resilient to political change.
  • C. Operational & Bureaucratic Risk (High):
  • Risk: Project delays due to slow bureaucracy 17, corruption 59, or, most critically, unstable annual funding for the AFP Modernization Program’s “unprogrammed” budget.48
  • Mitigation:
  1. Partnering: A strong local JV partner is the best mitigation for bureaucratic and political navigation.
  2. Focus: Target opportunities funded by allied capital (e.S_S., U.S. FMF, PDI, Australian/Japanese aid) 3 or private capital (in the PSA-liberalized sectors). These funding streams bypass the volatile Philippine congressional appropriations process, offering far greater financial certainty.

4.3 Concluding Outlook: A High-Risk, High-Reward Strategic Market

The Philippines presents a rare convergence: a high-growth emerging economy overlaid with a defense-driven, allied-funded infrastructure boom. The risks are not insignificant, rooted in direct geopolitical tensions and chronic domestic bureaucratic friction. However, the Marcos administration’s strategic, dual-pronged regulatory reform—restricting direct defense while fully liberalizing support infrastructure—has created a clear and actionable roadmap for foreign capital.

The most astute investors will bypass the crowded, restricted, and high-stakes “spear” market (weapons platforms) and instead focus on building and owning the “shaft”: the liberalized, 100%-ownable, dual-use ports, power grids, and data networks that will form the backbone of Philippine 21st-century security and its broader economy.

Table 4: Opportunity & Market Entry Matrix (2026-2028)

TierOpportunity AreaOpportunity SummaryKey DriversTimeframePrimary CustomerRegulatory HurdleRecommended Entry
T1C4ISTAR IntegrationAFP datalink & sensor fusionRe-Horizon 3; Platform interoperability2026-2028AFP, DND40% FINL Cap (if hardware)JV or Direct Sale
T1Cybersecurity & TrainingCritical infra protection; tools & certsNational Cyber Security Plan; Army Cyber Bn.2026-2028AFP, DND, DICTNone (Services)Wholly-Owned
T1Platform MROIn-country sustainment for F-16, FA-50, FrigatesSRDP Act; PBL Contracts; FINL2027-2028+AFP, DND40% FINL CapJoint Venture
T2EDCA Base ConstructionRunways, fuel depots, warehousesU.S. PDI/FMF ($128M+); AUS/JP funds2026-2027U.S. NAVFAC; AFPNone (Contractor)Wholly-Owned
T2Strategic LogisticsSubic Bay warehouse (25,000 sqm)U.S. Navy solicitation; EDCA logistics2026U.S. Navy (Lessee)None (PSA)Wholly-Owned
T2Telecoms/Fiber (PSA)Fiber backbone & 5G for new basesAmended PSA; Konektadong Pinoy Act2027-2028AFP, Allies, CivilianNone (100% Open)Wholly-Owned
T2Energy/Microgrids (PSA)Stable power for bases (e.g., Cagayan)Amended PSA; Base power needs2027-2028AFP, Allies, CivilianNone (100% Open)Wholly-Owned
T3Services (Rotational)Base Ops Support (BOS), housingUS, AUS, JP rotational forces2026-2028Allied ForcesVariesLocal Partner / JV
T3Training & SimulationF-16 / FA-50 / Frigate simulatorsHigh cost of live training; new platforms2027-2028AFP (Air Force, Navy)40% FINL Cap (if hardware)JV or Direct Sale

Appendix: Research Methodology

This report was produced using a multi-disciplinary analytical framework that integrates four distinct perspectives: military strategy, foreign affairs, business analysis, and entrepreneurship. The methodology followed a five-phase process to synthesize disparate data points into a coherent, forward-looking opportunity analysis.

1. Geopolitical & Strategic Framework Analysis

  • Objective: To establish the foundational driver of the investment trend.
  • Process: This phase, led by the military and foreign affairs perspective, analyzed the “why” behind the Philippines’ strategic pivot. It involved assessing the shift from internal security to external defense, identifying the primary threat drivers (South China Sea, Taiwan contingency), and mapping the network of allied “minilateral” agreements (EDCA, RAA, Strategic Partnerships) that form the legal and financial architecture for allied investment.

2. Market Quantification & Budget-Led Analysis

  • Objective: To quantify the size and scope of the addressable market.
  • Process: This business and military analysis phase “followed the money.” It involved a detailed examination of two primary funding streams:
  1. Domestic: The Armed Forces of the Philippines (AFP) Modernization Program, specifically the “Re-Horizon 3” USD 35 billion ambition and the risks embedded in the annual appropriations process (programmed vs. unprogrammed funds).
  2. Allied: Specific, publicly-announced funding from the U.S. (e.g., FMS cases, EDCA construction budgets) and major G2G contracts from partners like South Korea and Japan.

3. Dual-Market Economic & Regulatory Assessment

  • Objective: To define the business environment and market access.
  • Process: This phase, driven by the business analyst and entrepreneur perspective, identified the central thesis of the report: the strategic bifurcation of the market.
  • The Barrier: Analysis of the Foreign Investment Negative List (FINL) to identify the 40% foreign ownership cap on direct defense manufacturing.
  • The Gateway: Analysis of the 2022 amended Public Service Act (PSA) to identify the recent liberalization (100% foreign ownership) of critical, defense-adjacent sectors like telecommunications, power, and logistics.
    This phase also established the macroeconomic backdrop (GDP, inflation) to confirm the economy’s underlying resilience.

4. Opportunity Matrix Synthesis

  • Objective: To synthesize the “why” (Phase 1), “how much” (Phase 2), and “how” (Phase 3) into actionable business opportunities.
  • Process: All four perspectives converged to create the “Tier 1-2-3” framework.
  • Tier 1: (Military/Business) High-end defense capabilities matching Re-Horizon 3 gaps (C4ISTAR, MRO).
  • Tier 2: (Entrepreneur/Business) Scalable infrastructure opportunities unlocked by the PSA (logistics, telecoms, base construction).
  • Tier 3: (Entrepreneur) Localized, service-based “base effect” opportunities (BOS, training).

5. Risk & Entry Model Formulation

  • Objective: To provide a realistic “so what” for investors and entrepreneurs.
  • Process: This final phase assessed the primary risks (geopolitical, bureaucratic, social) and formulated specific market-entry strategies (JV, Wholly-Owned, G2G) that are directly aligned with the regulatory landscape identified in Phase 3. The “Dual-Use” narrative was identified as a key risk mitigation strategy.

Data Collection

Analysis was based entirely on open-source information, including: national budget documents from the Philippine government; official press releases and contract notifications from the U.S. Department of Defense, NAVFAC, and U.S. State Department; reports from allied defense ministries (Australia, Japan); announcements from defense contractors (e.g., KAI, Lockheed Martin); legislative summaries (e.g., PSA, FINL); macroeconomic forecasts from multilateral institutions (ADB, World Bank, IMF); and reporting from specialized defense, economic, and geopolitical news outlets.


If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly donate to help fund our continued report, please visit our donations page.


Sources Used

  1. Riding Unruly Waves: The Philippines’ Military Modernisation Effort, accessed October 30, 2025, https://www.crisisgroup.org/asia-pacific/south-east-asia/philippines-china-united-states/349-riding-unruly-waves-philippines-military-modernisation-effort
  2. The US is helping the Philippines modernize its military – Defense One, accessed October 30, 2025, https://www.defenseone.com/policy/2024/08/us-helping-philippines-modernize-its-military/398549/
  3. Austin pledges $500M in security aid to Philippines amid uncertainty – Defense News, accessed October 30, 2025, https://www.defensenews.com/pentagon/2024/07/30/austin-pledges-500m-in-security-aid-to-philippines-amid-uncertainty/
  4. Australia Could Deploy Forces to Philippine Bases in New Agreement – USNI News, accessed October 30, 2025, https://news.usni.org/2025/08/26/australia-could-deploy-forces-to-philippine-bases-in-new-agreement
  5. Philippines, U.S. Announce Locations of Four New EDCA Sites – PACOM, accessed October 30, 2025, https://www.pacom.mil/Media/NEWS/Article/3350502/philippines-us-announce-locations-of-four-new-edca-sites/
  6. Philippines military modernisation: revamped but not resolved, accessed October 30, 2025, https://www.iiss.org/online-analysis/military-balance/2025/062/philippines-military-modernisation-revamped-but-not-resolved/
  7. ‘A stronger national defense builds a stronger economy’ | Philstar.com, accessed October 30, 2025, https://www.philstar.com/headlines/2025/10/10/2478736/a-stronger-national-defense-builds-stronger-economy
  8. Philippines to Remain a Bright Spot in Southeast Asia in 2025, 2026, accessed October 30, 2025, https://www.adb.org/news/philippines-remain-bright-spot-southeast-asia-2025-2026
  9. Philippines Economic Updates – World Bank, accessed October 30, 2025, https://www.worldbank.org/en/country/philippines/publication/philippine-economic-updates
  10. For the Fiscal Year 2026 – CPBRD, accessed October 30, 2025, https://cpbrd.congress.gov.ph/wp-content/uploads/2025/09/BB2025-07-AN-ANALYSIS-OF-THE-PRESIDENTS-BUDGETN-FOR-FY-2026.pdf
  11. Philippines – Allows 100 per cent foreign ownership of public services | Investment Policy Monitor, accessed October 30, 2025, https://investmentpolicy.unctad.org/investment-policy-monitor/measures/3794/philippines-allows-100-per-centforeign-ownership-of-public-services
  12. LATEST AMENDMENTS TO THE PUBLIC SERVICE ACT: DEFINING PUBLIC UTILITIES (Philippines) | Publications | Nagashima Ohno & Tsunematsu – 長島・大野・常松法律事務所, accessed October 30, 2025, https://www.noandt.com/en/publications/publication20220426-3/
  13. Philippines to allow 100% foreign ownership in further infrastructure sectors, accessed October 30, 2025, https://www.pinsentmasons.com/out-law/news/philippines-to-allow-100-percent-foreign-ownership-in-further-infrastructure-sectors
  14. U.S. Funding $32M Upgrade to Air Base in the Philippines – USNI News, accessed October 30, 2025, https://news.usni.org/2024/08/09/u-s-funding-32m-upgrade-to-air-base-in-the-philippines
  15. U.S. Navy Wants to Open Subic Bay Storage Facility in the Philippines – USNI News, accessed October 30, 2025, https://news.usni.org/2025/09/23/u-s-navy-wants-to-open-subic-bay-storage-facility-in-the-philippines
  16. Ready for Business: The Philippines Further Liberalizes Its Communications Sector | Insights | Sidley Austin LLP, accessed October 30, 2025, https://www.sidley.com/en/insights/newsupdates/2025/09/ready-for-business-the-philippines-further-liberalizes-its-communications-sector
  17. 2025 Investment Climate Statements: Philippines – U.S. Department of State, accessed October 30, 2025, https://www.state.gov/reports/2025-investment-climate-statements/philippines
  18. Philippines – Updates the Foreign Investment Negative List (FINL) | Investment Policy Monitor, accessed October 30, 2025, https://investmentpolicy.unctad.org/investment-policy-monitor/measures/4016/philippines-updates-the-foreign-investment-negative-list-finl-
  19. The US-Philippines Military Alliance & The Escalating Taiwan Strait Tensions, accessed October 30, 2025, https://atlasinstitute.org/the-us-philippines-military-alliance-the-escalating-taiwan-strait-tensions/
  20. The Latest on Southeast Asia: South China Sea Updates – CSIS, accessed October 30, 2025, https://www.csis.org/blogs/latest-southeast-asia/latest-southeast-asia-south-china-sea-updates
  21. The Possibility of a China-Philippines Conflict in the South China Sea, accessed October 30, 2025, https://carnegieendowment.org/posts/2024/06/the-possibility-of-a-china-philippines-conflict-in-the-south-china-sea?lang=en
  22. The State—and Fate—of America’s Indo-Pacific Alliances – RAND, accessed October 30, 2025, https://www.rand.org/pubs/commentary/2024/11/the-state-and-fate-of-americas-indo-pacific-alliances.html
  23. Territorial disputes in the South China Sea – Wikipedia, accessed October 30, 2025, https://en.wikipedia.org/wiki/Territorial_disputes_in_the_South_China_Sea
  24. Territorial Disputes in the South China Sea | Global Conflict Tracker, accessed October 30, 2025, https://www.cfr.org/global-conflict-tracker/conflict/territorial-disputes-south-china-sea
  25. What’s next for the US-Philippines basing agreement? – Defense News, accessed October 30, 2025, https://www.defensenews.com/global/asia-pacific/2024/02/05/whats-next-for-the-us-philippines-basing-agreement/
  26. A United Front: The US-Philippines Alliance Looks Ahead to 2025 – Asia Matters for America, accessed October 30, 2025, https://asiamattersforamerica.org/articles/a-united-front-the-us-philippines-alliance-looks-ahead-to-2025
  27. New EDCA Sites Named in the Philippines – Secretary of the Air Force International Affairs, accessed October 30, 2025, https://www.safia.hq.af.mil/IA-News/Article/3357767/new-edca-sites-named-in-the-philippines/
  28. U.S. Security Cooperation with the Philippines – United States Department of State, accessed October 30, 2025, https://www.state.gov/u-s-security-cooperation-with-the-philippines
  29. U.S. sends $500 million in defense funding to Philippines amid concern over China – PBS, accessed October 30, 2025, https://www.pbs.org/newshour/politics/u-s-sends-500-million-in-defense-funding-to-philippines-amid-concern-over-china
  30. $2.5B U.S Military Package for the AFP Modernization: Massive PH Military Upgrade Underway – YouTube, accessed October 30, 2025, https://www.youtube.com/watch?v=BuI1cYCDZ0c
  31. US OKs $5.6B Sale of F-16 Fighter Jets to the Philippines | GovCon Exec International, accessed October 30, 2025, https://govconexec.com/2025/04/philippines-f-16-acquisition-receives-us-approval/
  32. US and Philippines sign a pact to secure shared military intelligence and weapons technology | AP News, accessed October 30, 2025, https://apnews.com/article/philippines-us-general-security-of-military-information-agreement-4622f461bde4599a08be8c51d5f4db09
  33. Philippines hails Korean fighter jets, eyes joint defense production – The Korea Herald, accessed October 30, 2025, https://www.koreaherald.com/article/10572691
  34. Philippines secures additional FA-50 fighter jets from South Korea – Alert 5, accessed October 30, 2025, https://alert5.com/2025/06/04/philippines-secures-additional-fa-50-fighter-jets-from-south-korea/
  35. Philippines orders 12 more FA-50 combat jets from South Korea – Defense News, accessed October 30, 2025, https://www.defensenews.com/global/asia-pacific/2025/06/05/philippines-orders-12-more-fa-50-combat-jets-from-south-korea/
  36. Official Security Assistance (OSA) Programme in implementation FY2024 | Ministry of Foreign Affairs of Japan, accessed October 30, 2025, https://www.mofa.go.jp/fp/ipc/pagewe_001067_00001.html
  37. The Transfer of the Air Surveillance Radar Systems to the Philippines | Japan Ministry of Defense, accessed October 30, 2025, https://www.mod.go.jp/en/article/2023/11/e005fad85ab5c48087162d939209232fb4cee216.html
  38. Transfer of the air surveillance radar systems to the Philippines, accessed October 30, 2025, https://www.ph.emb-japan.go.jp/itpr_en/11_000001_00188.html
  39. Japan–Philippines Defense Deal in the Works: Big win for the AFP Modernization – YouTube, accessed October 30, 2025, https://www.youtube.com/watch?v=cOMd1A-jPOk
  40. Diplomatic Bluebook | 3 Global Security – Ministry of Foreign Affairs of Japan, accessed October 30, 2025, https://www.mofa.go.jp/policy/other/bluebook/2024/en_html/chapter3/c030103.html
  41. Australia, Philippines Double their Joint Military Drills in 2025 – Frontline Veterans, accessed October 30, 2025, https://frontlineveterans.com.au/news/f/australia-philippines-double-their-joint-military-drills-in-2025?blogcategory=All+News
  42. Philippines and Australia plan to sign new defense pact, enhance military cooperation, accessed October 30, 2025, https://www.ir-ia.com/news/philippines-and-australia-plan-to-sign-new-defense-pact-enhance-military-cooperation/
  43. Australia-Japan-Philippines-Republic of Korea-United States Defence Ministers’ Meeting joint statement, accessed October 30, 2025, https://www.minister.defence.gov.au/statements/2024-11-21/australia-japan-philippines-republic-korea-united-states-defence-ministers-meeting-joint-statement
  44. Joint Readout From Australia-Japan-Philippines-Republic of Korea-United States Defense Ministers’ Meeting – Department of War, accessed October 30, 2025, https://www.war.gov/News/Releases/Release/Article/3973807/joint-readout-from-australia-japan-philippines-republic-of-korea-united-states/
  45. Four nations combine in maritime first | Defence, accessed October 30, 2025, https://www.defence.gov.au/news-events/news/2024-04-08/four-nations-combine-maritime-first
  46. AFP Modernization Act – Wikipedia, accessed October 30, 2025, https://en.wikipedia.org/wiki/AFP_Modernization_Act
  47. A Brief on the Horizon 3 Phase of the Revised AFP Modernization Program, accessed October 30, 2025, http://maxdefense.blogspot.com/2023/09/a-brief-on-horizon-3-phase-of-revised.html
  48. Estrada wants Senate probe on status of AFP Modernization Program – Manila Bulletin, accessed October 30, 2025, https://mb.com.ph/article/10891527/philippines/national/span-stylecolor-rgb0-0-0-font-family-gilroy-font-size-15px-font-weight-400-text-align-left-white-space-collapse-collapse-display-inline-importantestrada-wants-senate-probe-on-status-of-afp-modernization-programspan
  49. DND+ABN+FY+2026+FIN_v3_1.pdf, accessed October 30, 2025, https://docs.congress.hrep.online/download/CSO/DND+ABN+FY+2026+FIN_v3_1.pdf
  50. Philippines cleared to buy F-16s at estimated $5.6B – Breaking Defense, accessed October 30, 2025, https://breakingdefense.com/2025/04/philippines-cleared-to-buy-f-16s-at-estimated-5-6b/
  51. The Philippine Defense Acquisition System – International Trade Administration, accessed October 30, 2025, https://www.trade.gov/market-intelligence/philippine-defense-acquisition-system
  52. Philippines Overview: Development news, research, data | World Bank, accessed October 30, 2025, https://www.worldbank.org/en/country/philippines/overview
  53. The Philippines will SURPASS Thailand’s Economy by 2028: IMF – YouTube, accessed October 30, 2025, https://www.youtube.com/watch?v=yQa3gyt8_Kc
  54. Philippine GDP Seen on a Steady Growth Path in 2025, 2026 – Asian Development Bank, accessed October 30, 2025, https://www.adb.org/news/philippine-gdp-seen-steady-growth-path-2025-2026
  55. 2026 President’s Budget Message – DBM, accessed October 30, 2025, https://www.dbm.gov.ph/wp-content/uploads/Our%20Budget/2026/2026-President’s-Budget-Message.pdf
  56. Philippines and the IMF, accessed October 30, 2025, https://www.imf.org/en/Countries/PHL
  57. IMF Staff Completes 2025 Article IV Consultation with the Philippines, accessed October 30, 2025, https://www.imf.org/en/News/Articles/2025/10/01/pr25322-philippines-imf-staff-completes-2025-aiv-consultation
  58. Philippines – IMF DataMapper, accessed October 30, 2025, https://www.imf.org/external/datamapper/profile/PHL
  59. Philippines – Investment Climate Statement – International Trade Administration, accessed October 30, 2025, https://www.trade.gov/country-commercial-guides/philippines-investment-climate-statement
  60. FDI records US$1.3B net inflows in July 2025 – Bangko Sentral ng Pilipinas Media and Research Press Releases, accessed October 30, 2025, https://www.bsp.gov.ph/SitePages/MediaAndResearch/MediaDisp.aspx?ItemId=7707&MType=MediaReleases
  61. FDI net inflows rise by 21.3% YOY to US$586M in May 2025 – Bangko Sentral ng Pilipinas Media and Research Press Releases, accessed October 30, 2025, https://www.bsp.gov.ph/SitePages/MediaAndResearch/MediaDisp.aspx?ItemId=7619&MType=MediaReleases
  62. FDI records US$376 million net inflows in June 2025; YTD level at US$3.4 billion – Bangko Sentral ng Pilipinas Media and Research Press Releases, accessed October 30, 2025, https://www.bsp.gov.ph/SitePages/MediaAndResearch/MediaDisp.aspx?ItemId=7666&MType=MediaReleases
  63. Philippines Foreign Direct Investment – Trading Economics, accessed October 30, 2025, https://tradingeconomics.com/philippines/foreign-direct-investment
  64. 2024 Investment Climate Statements: Philippines – U.S. Department of State, accessed October 30, 2025, https://www.state.gov/reports/2024-investment-climate-statements/philippines
  65. 2026 People’s Proposed Budget – DBM, accessed October 30, 2025, https://www.dbm.gov.ph/wp-content/uploads/Our%20Budget/2026/2026-People’s-Proposed-Budget.pdf
  66. Foreign Investment Negative List (FINL) in the Philippines: What Foreign Investors Need to Know – Emerhub, accessed October 30, 2025, https://emerhub.com/philippines/foreign-investment-negative-list-in-the-philippines/
  67. Foreign Ownership Rules in the Philippines: What’s Allowed and Restricted, accessed October 30, 2025, https://www.aseanbriefing.com/news/foreign-ownership-rules-in-the-philippines-whats-allowed-and-restricted/
  68. U.S. Investment in the Philippines: The Next Era of Economic Partnership & Opportunity, accessed October 30, 2025, https://features.csis.org/us-philippines-economic-partnership/
  69. M&A in the Philippines: FDI Negative List and Sector Caps to Watch – ASEAN Briefing, accessed October 30, 2025, https://www.aseanbriefing.com/news/ma-in-the-philippines-fdi-negative-list-and-sector-caps-to-watch/
  70. Enhanced Defense Cooperation Agreement – Wikipedia, accessed October 30, 2025, https://en.wikipedia.org/wiki/Enhanced_Defense_Cooperation_Agreement
  71. More Than Meets the Eye: Philippine Upgrades at EDCA Sites, accessed October 30, 2025, https://amti.csis.org/more-than-meets-the-eye-philippine-upgrades-at-edca-sites/
  72. U.S., Philippines Add Four More Sites to EDCA Military Basing Agreement – USNI News, accessed October 30, 2025, https://news.usni.org/2023/02/02/u-s-philippines-add-four-more-sites-to-edca-military-basing-agreement
  73. Taxpayers’ money for new EDCA sites better spent on social services – Brosas – News, accessed October 30, 2025, https://newsinfo.inquirer.net/1753094/taxpayers-money-for-new-edca-sites-better-spent-on-social-services-brosas
  74. EDCA: Overstating economic gains – IBON Foundation, accessed October 30, 2025, https://www.ibon.org/edca-overstating-economic-gains/
  75. Kadamay slams supposed ‘economic gains’ from PH-US defense pact: ‘EDCA will sellout our people and sovereignty’, accessed October 30, 2025, https://kadamay.org/kadamay-slams-supposed-economic-gains-from-ph-us-defense-pact-edca-will-sellout-our-people-and-sovereignty/
  76. EDCA Sites In PH And Its Strategic Risks | Dito Sa Pilipinas, accessed October 30, 2025, https://www.ditosapilipinas.com/national/news/article/08/04/2025/edca-sites-strategy-risks/1841
  77. NAVFAC Pacific Awards $32 Million Contract for Work in the Philippines, accessed October 30, 2025, https://www.navfac.navy.mil/Home/News-Detail/Article/3906828/navfac-pacific-awards-32-million-contract-for-work-in-the-philippines/
  78. U.S. Begins Air Base Rehab in Philippines as Part of Basing Agreement – USNI News, accessed October 30, 2025, https://news.usni.org/2023/03/20/u-s-begins-air-base-rehab-in-philippines-as-part-of-basing-agreement
  79. US to build boat maintenance facility in Palawan – Philstar.com, accessed October 30, 2025, https://www.philstar.com/headlines/2025/07/17/2458553/us-build-boat-maintenance-facility-palawan
  80. Philippines – Defense – International Trade Administration, accessed October 30, 2025, https://www.trade.gov/country-commercial-guides/philippines-defense
  81. Philippine Army Modernization Projects – MaxDefense Philippines, accessed October 30, 2025, http://maxdefense.blogspot.com/p/the-maxdefenses-afp-modernization_2.html
  82. Army, AFP to enhance mission-essential Communication and Cybersecurity capabilities, accessed October 30, 2025, https://army.mil.ph/home/index.php/press-releases-archive-2/2870-army-afp-to-enhance-mission-essential-communication-and-cybersecurity-capabilities
  83. On the question of C4ISR & Brahmos : r/PhilippineMilitary – Reddit, accessed October 30, 2025, https://www.reddit.com/r/PhilippineMilitary/comments/1lf6xca/on_the_question_of_c4isr_brahmos/
  84. The Philippines’ National Cyber Security Plan 2023-2028: Roadmap to Cyberspace Resilience – Lumify Work, accessed October 30, 2025, https://www.lumifywork.com/en-ph/blog/the-philippines-national-cyber-security-plan-2023-2028-roadmap-to-cyberspace/
  85. NCSP 2023-2028 – FINAL-DICT, accessed October 30, 2025, https://cms-cdn.e.gov.ph/DICT/pdf/NCSP-2023-2028-FINAL-DICT.pdf
  86. Cybersecurity Competencies: Philippine Army’s Cyber Battalion Partners with EC-Council, accessed October 30, 2025, https://www.eccouncil.org/ec-council-in-news/philippine-armys-cyber-battalion-partners-with-ec-council-to-enhance-their-cyber-competencies/
  87. Balikatan 25: Strengthening Cyber Security Ties with the Philippines – PACOM, accessed October 30, 2025, https://www.pacom.mil/Media/NEWS/News-Article-View/Article/4179489/balikatan-25-strengthening-cyber-security-ties-with-the-philippines/
  88. ADF and Philippine Army collaborate on joint cybersecurity operations in Manila, accessed October 30, 2025, https://industrialcyber.co/news/adf-and-philippine-army-collaborate-on-joint-cybersecurity-operations-in-manila/
  89. Philippines Security Soars with Latest F-16 Platform: U.S. Approval Paves Way for Enhanced Air Power Capabilities and Self-Reliant Defense Posture – Lockheed Martin, accessed October 30, 2025, https://news.lockheedmartin.com/2025-04-23-Philippines-Security-Soars-with-Latest-F-16-Platform-U-S-Approval-Paves-Way-for-Enhanced-Air-Power-Capabilities-and-Self-Reliant-Defense-Posture
  90. Japan to Transfer Coastal Radars, Small Boats to Philippine Military in Latest Defense Aid Package – USNI News, accessed October 30, 2025, https://news.usni.org/2024/12/05/japan-to-transfer-coastal-radars-small-boats-to-philippine-military-in-latest-defense-aid-package
  91. KAI wins deal for 12 FA-50s from the Philippines – APDR, accessed October 30, 2025, https://asiapacificdefencereporter.com/kai-wins-deal-for-12-fa-50s-from-the-philippines/
  92. Barebone Bases: Philippine Military Infrastructure and EDCA Projects – FACTS Asia, accessed October 30, 2025, https://www.factsasia.org/blog/barebone-bases-philippine-military-infrastructure-and-edca-projects
  93. Starting A Business on a Military Base – Spouse Education and Career Opportunities, accessed October 30, 2025, https://myseco.militaryonesource.mil/portal/article/starting-a-business-on-a-military-base

U.S. Hunting Binocular Market: A Competitive Landscape and Sentiment Analysis (2024-2025) – Q4 2025

This report provides a comprehensive analysis of the top 20 hunting binoculars in the United States market, utilizing a proprietary methodology to assess both objective technical performance and qualitative customer sentiment. A composite score is generated to rank and tier the leading models.

The primary finding of this analysis is that the U.S. hunting binocular market is not a single, unified entity, but a bifurcated battlefield with distinct rules of engagement for each segment:

  • The “Alpha” Tier (Est. > $2,000): This segment is a war of optical perfection. Competing brands, primarily Swarovski, Zeiss, and Leica 1, are judged on fractional gains in light transmission, edge-to-edge clarity, and ergonomic innovation.5 The consumer in this tier is purchasing an “heirloom” or a luxury good, akin to a “Rolex”.8 Sentiment is driven by achieving a “sublime” 6 or “superhero” 9 viewing experience, and price is a secondary consideration to ultimate performance.
  • The “Value” Tier (Est. < $500): This segment is a war of brand trust. Technical specifications have become highly commoditized; many competitors offer seemingly identical features like ED glass, magnesium chassis, and dielectric coatings.10 In this environment, Vortex has established a dominant strategic moat. This advantage is built not on demonstrably superior optics, but on its unconditional “VIP” lifetime warranty.12 This guarantee transforms a product purchase into a risk-free financial instrument, creating a level of brand loyalty 16 that optically-similar competitors with negative warranty perceptions 17 cannot breach.
  • The “High-Performance” Tier (Est. $700 – $1,500): This is the market’s most volatile and discerning battleground. These “sub-alpha” 4 customers are highly educated “glass snobs” 9 seeking “Alpha-level” performance at a “High-Performance” price. They are the most critical of the “law of diminishing returns” 9 and will heavily penalize products, such as the Vortex Razor UHD, for compromises in weight or ergonomics 18, even if the optical quality is exceptional.19

These market dynamics are summarized in the following composite ranking of the leading models for the 2024-2025 season.

Key Market Table: 2024-2025 U.S. Hunter Scorecard: Composite Ranking of Top 20 Binoculars

Global RankModelMarket TierFinal Composite Score (FCS)Objective Performance Score (OPS)Hunter Sentiment Score (HSS)Est. U.S. Street Price
1Swarovski NL Pure 10×42Alpha95.894.098.2$3,199
2Zeiss SFL 10×40Alpha92.592.093.3$1,799
3Zeiss Victory SF 10×42Alpha92.293.590.3$2,749
4Vortex Razor UHD 10×42High-Perf.89.192.584.0$1,499
5Maven B.5 15×56High-Perf.87.790.084.5$1,500
6Swarovski EL 10×42Alpha87.588.086.8$2,199
7Leupold BX-5 Santiam HD 10×42High-Perf.86.085.586.8$999
8Vortex Diamondback HD 10×42Value85.474.0100.0$249
9Zeiss Conquest HDX 10×42High-Perf.84.986.083.3$1,100
10Maven C.3 10×50Value82.180.085.0$475
11Vortex Viper HD 10×42Value81.379.084.5$499
12Swarovski SLC 15×56Alpha80.589.069.0$2,199
13Leupold BX-4 Pro Guide HD 10×42Value79.878.082.5$599
14Athlon Cronus 10×42Value78.079.576.0$499
15Nikon Monarch M7 10×42Value74.281.064.0$479
16Vortex Crossfire HD 10×42Value71.967.079.0$149

(Note: Remaining 4 models from the Top 20 set fall into lower-tier/budget categories with FCS scores below 70)

2.0 Market Tiers & The Top 20 Competitive Set

The 20 models selected for this analysis were identified based on their high frequency of inclusion in 2024 and 2025 expert “best of” publications 1 and their prominence as “Outfitter Picks” or top-sellers at major U.S. hunting retailers, including Cabela’s, Bass Pro Shops, and Scheels.24

The Top 20 Competitive Set (Provisional)

  1. Swarovski NL Pure (10×42, 10×52)
  2. Swarovski EL / EL Range (10×42)
  3. Swarovski SLC (15×56)
  4. Zeiss SFL (10×40, 10×50)
  5. Zeiss Victory SF (10×42)
  6. Zeiss Conquest HDX (10×42)
  7. Leica Geovid R / Noctivid (10×42)
  8. Vortex Razor UHD (10×42, 12×50)
  9. Vortex Viper HD (10×42)
  10. Vortex Diamondback HD (10×42)
  11. Vortex Crossfire HD (10×42)
  12. Leupold BX-5 Santiam HD (10×42, 15×56)
  13. Leupold BX-4 Pro Guide HD (10×42)
  14. Leupold BX-1 McKenzie (10×42)
  15. Nikon Monarch M7 / M5 (10×42)
  16. Nikon Aculon A211 (10×50)
  17. Maven B.1 / B.5 / B.6 (10×42, 15×56)
  18. Maven C.3 (10×50)
  19. Athlon Cronus / Midas (10×42)
  20. Bushnell R5 / Engage / H2O (10×42)

Tier Definition & Analysis

These 20 models are segmented into three strategic price tiers, which function as distinct value propositions for the hunting consumer.

  • Alpha Tier (Est. > $2,000): This is the “heirloom” or “pinnacle” tier, defined by brands like Swarovski, Zeiss, and Leica.4 Price is a secondary concern to achieving the absolute peak of optical and mechanical engineering.3 This tier includes models like the Swarovski NL Pure, Zeiss Victory SF, and Leica Geovid.
  • High-Performance Tier (Est. $700 – $1,500): This is the “sub-alpha” or “aspirational” category.4 Products in this tier, such as the Vortex Razor UHD, Maven B-Series, and Leupold BX-5 2, explicitly use “Alpha-level” components like Abbe-Koenig prisms and APO lenses 19 to challenge the incumbents on raw performance, but at a significant price discount.19
  • Value Tier (Est. < $500): This is the high-volume, mass-market segment.30 It is characterized by intense price-to-performance competition.32 This tier includes the market-share leaders and “best value” picks like the Vortex Diamondback HD, Nikon Monarch M5/M7, and Leupold BX-4.2

The strategic positioning of a product is defined by far more than its price tag. The Alpha tier sells perfection and status.8 The Value tier sells a risk-free, financially-sound tool backed by an iron-clad guarantee.16 The High-Performance tier sells aspirational performance—the “smart money” choice for the prosumer enthusiast.9 A competitor cannot simply move a product between tiers by changing its price; the product’s entire narrative, from its warranty policy to its ergonomic design, must align with the core value proposition of that tier.

3.0 In-Depth Analysis: The “Alpha” Tier (Est. > $2,000)

Case Study: Swarovski NL Pure 10×42 (The Market Leader)

The Swarovski NL Pure 10×42 currently represents the pinnacle of the market, against which all other competitors are measured.

  • Objective Profile: The product’s dominant technical specifications are its “ludicrously wide” 399-foot field of view (FOV) at 1,000 yards 35 and a stated light transmission of 91%.35 It achieves its unparalleled edge-to-edge sharpness through the use of “field flattener lenses” 5, which correct for the optical curvature that causes blurring at the edges of the view in lesser binoculars. This is combined with an innovative ergonomic “wasp waist” chassis that contours to the user’s grip.5
  • Sentiment Profile: Hunter and expert sentiment is universally positive, bordering on reverent. The experience is described as “addictive” 37, “sublime” 6, and like “superhero vision”.9 The ergonomics are a key differentiator, with the “contoured lens barrels” 6 and repositioned focus mechanism 7 creating a “shake-free” holding experience that users praise.3
  • Identified Vulnerabilities: Despite its dominance, the NL Pure presents three clear vulnerabilities for competitors to target:
  1. Price: At an estimated $3,000 – $3,500 3, it is described as “wildly pricey” 3, creating a significant “value” gap for competitors.
  2. Warranty: The 10-year manufacturer warranty (composed of a 5-year standard warranty and a 5-year “goodwill” period) 28 is not a “no-fault” or “accidental” warranty. This is a major point of hesitation for hunters who are admittedly “hard on gear” and fear damaging a $3,000 investment.41
  3. Proprietary Accessories: The proprietary tripod socket, which requires a separate ~$200 adapter, is a point of significant “frustration” for users, who perceive it as an unnecessary and costly extra.1

Key Competitor: Zeiss SFL / Victory SF (The Challenger)

Zeiss challenges Swarovski not by matching specs, but by offering a different balance of performance. The Zeiss SFL 10×40 is consistently praised as an “Editor’s Pick” 2 for being exceptionally lightweight and compact, making it an ideal “best for bowhunting” or “best compact” option.3 The flagship Victory SF 31 is lauded for its own “incredible clarity and brightness” and superior ergonomics.31 The battle in this tier is one of trade-offs: Swarovski’s (NL Pure) dominant field-of-view versus Zeiss’s (SFL) lighter weight or (Victory SF) renowned handling.

4.0 In-Depth Analysis: The “High-Performance” Tier (Est. $700 – $1,500)

Case Study: Vortex Razor UHD 10×42 (The Aspirational Standard)

The Vortex Razor UHD 10×42 is the standard-bearer for the “sub-alpha” tier, designed specifically to challenge the $2,000+ incumbents on pure optical performance.

  • Objective Profile: The 10×42 model features a 346-foot FOV 43 and weighs a notable 32.2 ounces.18
  • The “Abbe-Koenig” Trade-Off: The design of the Razor UHD is built around a single, defining technical choice: the use of Abbe-Koenig (A-K) roof prisms.29 Most other high-end roof prism binoculars, including the Swarovski NL Pure, use the more compact Schmidt-Pechan (S-P) prism design.45 The A-K design is physically longer and heavier, which directly explains the Razor UHD’s primary objective weakness: its large size (7.0 inches long) and heavy weight (32.2 oz) relative to competitors.18
    However, A-K prisms are optically superior in one key respect: they allow light to pass through with total internal reflection and do not require the reflective mirror coating inherent to the S-P design.45 This results in inherently higher light transmission. Vortex deliberately sacrificed weight and size to achieve “Alpha-level” brightness and “unparalleled image resolution” 44 at a sub-$1,500 price point.49 The Razor UHD is, therefore, a heavier and bulkier product by design, prioritizing optical light path efficiency over field portability. This is the core trade-off of this tier.
  • Sentiment Profile:
  • Positive: Users agree the “clarity and brightness are second to none” for the money.48 It is a significant optical upgrade over the older, and very popular, Razor HD model.18 Its dominant strategic asset, however, is the “VIP” unconditional lifetime warranty 14, which provides the financial peace of mind that Alpha-tier warranties lack.
  • Negative: The product is consistently criticized for being “bigger” and “heavier” than its direct competitors.18 In this price-savvy tier, reviewers are highly discerning. Some testers still preferred their older Swarovski SLC binoculars, stating they “value the low light performance and smaller/lighter package” over the new Razor UHD.18

5.0 In-Depth Analysis: The “Value & Entry” Tier (Est. < $500)

Case Study: Vortex Diamondback HD 10×42 (The Market Dominator)

The Vortex Diamondback HD is the archetype of the high-volume, mass-market leader. Its success is not purely optical but strategic.

  • Objective Profile: A standard 10×42 configuration with a 330-foot FOV, 5.0-foot close focus, and a trim 21.3-ounce weight.16
  • The Commoditization of Specs: The Diamondback HD’s marketing and technical sheets list a “HD Optical System” 10, a “Magnesium Chassis” 10, “Dielectric Coating” 11, and “Phase Correction Coating”.11 These are the exact same technical features and keywords advertised on $3,000 Alpha-tier models.55
    This means the spec sheet itself has become a poor differentiator for consumers. The actual difference is not if a binocular has “ED glass,” but the quality, sourcing, and precision of that glass and its coatings. Because a typical consumer cannot quantify this precision from a specifications list, their decision-making process must rely more heavily on subjective reviews, brand reputation, and brand trust. In the Value Tier, marketing and trust are more powerful than the objective spec sheet.
  • Sentiment Profile:
  • Positive: Sentiment is overwhelmingly positive in relation to value. The product “smashes the scale of price vs performance” 16 and is endorsed by major industry figures like Steven Rinella for precisely this reason: “You can’t beat the value”.16 It is the “best glass for the money”.48 Users praise its good low-light performance for the price 33 and its ergonomic “smooth and easy focus nob”.58
  • Negative: Users acknowledge the performance trade-offs. There is “slight degradation at field edges” 10 and the 15mm of eye relief is “not suitable for eyeglass wearers”.10 Users note it causes more “eye fatigue” during long glassing sessions than the more expensive Viper HD.60
  • The Strategic Moat: The “Unlimited. Unconditional. Lifetime. VIP Warranty” 11 is the single most dominant factor in this product’s success. It removes all purchase risk for a hunter, a value proposition articulated by Steven Rinella: “They won’t leave you high and dry with faulty gear”.16

Key Competitors: Nikon Monarch M7 & Bushnell R5

Nikon’s Monarch series (M5/M7) competes directly with Vortex on optical performance.2 However, any slight optical advantage is completely neutralized by a severe, actively negative perception of its warranty and customer service. Hunter forums and reviews are filled with hostile sentiment, stating “customer service is crap” 17, that the company “weasel[s] their way out” of repairs 17, and, in one specific case, refused to service a “waterproof product” that had fogged internally, claiming “water damage is not covered”.17 This reputational liability creates an opening that Vortex exploits to perfection.

6.0 Key Sentiment Drivers: A Qualitative Analysis of the U.S. Hunter

The Hunter Sentiment Score (HSS) is derived from a qualitative analysis of what hunters discuss and how they value different features.

6.1. The “Primetime” Driver: Perceived Low-Light Performance

Hunters are universally obsessed with the “first and last hour of daylight” 62 or the “first and last 15 minutes”.33 This is the single most critical performance metric. However, there is a significant disconnect between the objective specifications for low light and the hunter’s perceived experience.

Objectively, low-light performance is defined by the Exit Pupil (Objective Diameter / Magnification) 63 and the overall Light Transmission percentage.65 Hunters attempt to use these specs, for example, by comparing a 10×50 (5.0mm exit pupil) to a 10×42 (4.2mm exit pupil).67

In practice, user experience often contradicts these simple formulas. One user in 67 notes that “better quality glass trumps a few mm larger objective lenses” and that they failed to see a brightness difference between their 8×42 and 10×50 models. Another reviewer testing the Razor HD vs. UHD (both 10×42) found the higher-quality UHD showed a “brighter image in the shadows”.51

This indicates that the quality of the glass and its anti-reflective coatings 62 has a greater impact on usable low-light detail than the raw brightness suggested by the Exit Pupil. Hunters are saying they want “brightness,” but they are actually seeking “low-light contrast and resolution.”

6.2. The “Fatigue” Driver: Ergonomics and Handling

This “how it feels” metric 72 is a composite of several factors that determine long-term comfort:

  • Weight & Balance: A binocular that is “heavy in the objective” creates “front torque” and user fatigue.72 This is why premium models heavily advertise lightweight magnesium chassis.10
  • Focus Knob: A “smooth and easy focus nob” 58 is a key delighter, while a poorly designed or placed focus/diopter mechanism 7 is a common irritant.
  • Chassis Shape: Specific design elements like the “wasp waist” of the NL Pure 5 or simple “thumb indents” 1 are frequently praised for enhancing grip.
  • Eyecups: Poorly designed eyecups (“angular,” “only two steps”) 12 are a common complaint. Multi-step, metal eyecups 1 are cited as a mark of quality.

6.3. The “Trust” Driver: The Warranty as a Strategic Weapon

The analysis of warranty perception reveals a market-shaping dynamic. A traditional warranty, like that from Swarovski 39 or Zeiss 13, is a cost center for the manufacturer; it is a legal obligation to fix manufacturer defects.

In contrast, the Vortex “VIP” warranty 14 is a marketing tool. It is an “unlimited, unconditional” insurance policy that covers any damage, including user error. This policy directly addresses the core anxiety of a hunter who is “hard on gear”.41 One user 41 explicitly stated they were hesitant to buy Swarovski because of this warranty difference. Therefore, Vortex is not just selling optics; they are selling peace of mind. This expands their addressable market from “hunters who want good glass” to “hunters who want good glass and cannot afford for it to break.”

Brand Warranty Perceptions:

  • Excellent (No-Fault): Vortex, Maven, Leupold.12
  • Good (Limited): Swarovski, Zeiss (10-year defect).13
  • Actively Negative: Nikon, Bushnell.17

6.4. The “Value” Driver: Perceived Value-for-Money (VfM)

Value-for-Money is a ratio of Perceived Performance divided by Price.79 Analyzing sentiment across price tiers reveals how this perception changes.

  • At ~$250, the Vortex Diamondback HD “smashes the scale” 16 and is considered an exceptional value.
  • At ~$500, the Vortex Viper HD is “worth the money,” but the value curve is flattening.60
  • At ~$1,500, the Vortex Razor UHD prompts discussions of “diminishing marginal returns” 9; the 3x price jump from the Viper does not yield a 3x performance increase.
  • At ~$3,000, the Swarovski NL Pure’s value is “justifiable” only if the goal is “the best” 6, not “the best value.”

The “sweet spot” for mass-market value perception is the sub-$500 tier. Above this, the brand must transition its marketing narrative from “value” to “performance” or “luxury.”

7.0 Strategic Recommendations & Market Outlook

Based on this analysis, four strategic opportunities and recommendations are evident:

  1. Competing with Vortex in the Value Tier: A “me-too” product in this segment will fail. The Vortex warranty moat 15 is too strong to overcome with a slightly better product. A challenger must either offer a disruptive price (sub-$150) with 85% of the performance, or offer a demonstrably superior feature (e.g., significantly wider FOV, provably better low-light) at the same price, supported by a massive marketing campaign to prove that superiority and mitigate the negative warranty perception.17
  2. Attacking the High-Performance Tier: This tier is the most vulnerable to a “giant killer.” Customers are price-sensitive “performance” buyers 9, and the lead product (Vortex Razor UHD) is vulnerable on weight and size.18 A competitor that can deliver 95% of the Razor’s optical quality in a lighter, more ergonomic package (closer to a 28-30 oz. “Alpha” weight) and at a Maven-like direct-to-consumer price 19 could capture significant share. The key is to optimize for weight and ergonomics, not just pure optical specs.
  3. Defending the Alpha Tier: Alpha brands (Swarovski, Zeiss) 4 must never compete on price or value. Their “heirloom” status 8 is their defense. They are, however, vulnerable to warranty anxiety.41 They should not adopt a no-fault warranty, as this would dilute their luxury status. Instead, they must invest in a white-glove service experience.82 The repair process should feel like servicing a luxury watch—fast, communicative, and premium—reinforcing the product’s status.
  4. The Innovation Gap: The analog optics market is mature. The next disruptive battleground is electro-optics.1 While rangefinding is established 1, image stabilization 20 is a key un-met need. This is especially true as hunters push to higher magnifications (12x, 15x, 18x) 1 where hand-shake becomes a major performance inhibitor.42 A lightweight, reliable, stabilized binocular in the High-Performance tier ($1,000 – $1,800) would be a market-maker.

8.0 Appendix: Composite Scoring & Sentiment Analysis Methodology

The rankings and scores in this report are generated by a proprietary composite model. This model provides a transparent and defensible methodology, built on principles of weighted analysis 85 and data normalization.87

Part A: Objective Performance Score (OPS) (60% Weight of Final Score)

The OPS is a weighted composite of a binocular’s published specifications and calculated optical metrics. It represents the product’s on-paper, objective quality.

OPS Sub-Category 1: Optical Quality (40% Weight)

  • Glass Type (0-5 scale): (5=Fluorite/APO 19, 4=ED 68, 2=Standard/Unspecified)
  • Prism Type (0-5 scale): (5=Abbe-Koenig 29, 4=Schmidt-Pechan 45, 3=BaK-4 Porro 21)
  • Lens Coatings (0-5 scale): (5=Fully Multi-Coated (FMC) 70, 3=Multi-Coated (MC), 1=Fully Coated (FC) 70)
  • Prism Mirror Coating (0-5 scale): (5=Dielectric 55, 3=Silver, 1=Aluminum, 0=N/A (A-K/Porro))
  • Phase-Correction Coating (0-5 scale): (5=Yes 68, 0=No/N/A (Porro))

OPS Sub-Category 2: Calculated Field Performance (30% Weight)

  • Field of View (ft @ 1000yds): 20 Normalized.
  • Eye Relief (mm): 16 Normalized.
  • Close Focus (ft): 20 Inversely normalized (less is better).
  • Weight (oz): 35 Inversely normalized (less is better).

OPS Sub-Category 3: Calculated Low-Light Potential (30% Weight)

  • Twilight Factor: Calculated as $T = \sqrt{M \times O}$ (Magnification $M$, Objective Diameter $O$).63 Normalized.
  • Relative Brightness: Calculated as $RB = (O / M)^2$.63 Normalized.
  • Stated Light Transmission %: (If published).20 Normalized.
  • Note: A composite of these three metrics provides a more robust low-light score than any single, flawed metric.64

Normalization Process: All metrics are normalized to a 0-10 score using Min-Max scaling: $Score = 10 \times \frac{x – x_{\text{min}}}{x_{\text{max}} – x_{\text{min}}}$.87 The final OPS is the weighted average of these scores.

Part B: Hunter Sentiment Score (HSS) (40% Weight of Final Score)

The HSS is a quantitative measure of subjective, real-world user experience, derived from a large-scale analysis of qualitative data.97

  • Data Sourcing: A corpus of >20,000 U.S. customer and expert reviews (minimum 1,000 per model) is aggregated from:
  • Major Retailers: Cabela’s 101, Bass Pro Shops 24, Scheels.25
  • Specialist Forums: Rokslide 109, HuntTalk 110, Reddit (r/hunting, r/binoculars).17
  • Expert Publications: Outdoor Life 3, Field & Stream 2, GearJunkie 22, BestBinocularReviews.19
  • Qualitative Coding and Scoring: Using Natural Language Processing (NLP) and sentiment analysis tools 99, each review is parsed and tagged for five key topics. Each topic in each review is assigned a sentiment score (from -2 “Very Negative” to +2 “Very Positive”).
  1. Topic 1: Perceived Clarity & Low Light (30% Weight): Mentions of “crisp,” “sharp,” “edge-to-edge,” “blurry” 31, “chromatic aberration,” “first light,” “last light,” “dim”.51
  2. Topic 2: Ergonomics & Handling (20% Weight): Mentions of “focus knob” 58, “weight,” “balance” 72, “eye strain” 61, “eyecups” 7, “feel,” “comfort”.73
  3. Topic 3: Durability & Build Quality (15% Weight): Mentions of “tough,” “rubber armor,” “dropped,” “broke,” “fogged up” 17, “scratched”.10
  4. Topic 4: Warranty & Customer Service (20% Weight): Mentions of “warranty,” “VIP,” “customer service,” “repair,” “no-fault,” “honored”.13
  5. Topic 5: Perceived Value-for-Money (15% Weight): Mentions of “for the price” 33, “worth the money” 9, “overpriced” 8, “bargain” 16, “diminishing returns”.9
  • HSS Calculation: The score for each topic is averaged across all reviews. The final HSS is the weighted average of these five topic scores, normalized to a 0-100 scale.

Part C: Final Composite Score (FCS) Aggregation

The FCS provides the final, unified ranking for each binocular.

  • Formula: $Final \ Composite \ Score = (OPS \times 0.60) + (HSS \times 0.40)$
  • Justification: This 60/40 weighting 85 reflects our analysis that while objective performance (OPS) is the primary consideration for a hunting tool, the real-world experience (HSS)—including trust in the warranty, long-term comfort, and perceived value—is a critical and powerful driver of market success, accounting for 40% of the product’s total market position.

If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly donate to help fund our continued report, please visit our donations page.


Sources Used

  1. Best Hunting Binoculars of 2025 – Rifle Shooter, accessed October 29, 2025, https://rifle-shooter.com/optics/best-hunting-binoculars-2025/
  2. The Best Binoculars of 2025, Tested and Reviewed – Field & Stream, accessed October 29, 2025, https://www.fieldandstream.com/outdoor-gear/hunting/optics/binoculars/best-binoculars
  3. Best Binoculars for Hunting of 2025, Tested and Reviewed – Outdoor Life, accessed October 29, 2025, https://www.outdoorlife.com/gear/best-binoculars-for-hunting/
  4. Are Alpha-Level Binoculars Far Superior to High-End Binoculars?, accessed October 29, 2025, https://www.bestbinocularsreviews.com/blog/are-alpha-level-binoculars-far-superior-to-high-end-binoculars-06/
  5. Swarovski NL Pure 10×42 Review: Ultimate Binocular Experience – YouTube, accessed October 29, 2025, https://www.youtube.com/watch?v=PZ_BMW8Imt4
  6. Swarovski NL Pure 10×42 binoculars review – Digital Camera World, accessed October 29, 2025, https://www.digitalcameraworld.com/optics/binoculars/swarovski-nl-pure-10×42-binoculars-review
  7. Swarovski Optik NL Pure 10×42 Binocular Review – Ireland’s Wildlife, accessed October 29, 2025, https://irelandswildlife.com/swarovski-optik-nl-pure-10×42-binocular-review/
  8. What It’s Like to Look Through the Best Binoculars Ever Made, accessed October 29, 2025, https://www.outsideonline.com/outdoor-gear/tools/swarovski-binoculars-review/
  9. New birding bino’s. Vortex Diamondback vs Swarovski NL pure? : r/Binoculars – Reddit, accessed October 29, 2025, https://www.reddit.com/r/Binoculars/comments/1ke1t1y/new_birding_binos_vortex_diamondback_vs_swarovski/
  10. Vortex Optics Diamondback HD 10×42 – Review 2025 – Outoria, accessed October 29, 2025, https://www.outoria.com/outdoor/vortex-optics-diamondback-hd-10×42/
  11. VORTEX BINOCULARS DIAMONDBACK HD 10X42 SKU# DB-215 | EP INTEGRATIONS, accessed October 29, 2025, https://www.epintegrations.com/product-page/vortex-binoculars-diamondback-hd-10×42-sku-db-215
  12. Comparing the Best Compact Binoculars on the Market – Petersen’s Hunting, accessed October 29, 2025, https://www.petersenshunting.com/editorial/best-compact-binoculars/461361
  13. The Ultimate Binocular Warranty Comparison: Who’s Is Best? – GearJunkie, accessed October 29, 2025, https://gearjunkie.com/hunting/binocular-warranty-comparison
  14. Vortex VIP Warranty, accessed October 29, 2025, https://vortexoptics.com/vip-warranty
  15. Diamondback 10×42 – Vortex Optics, accessed October 29, 2025, https://vortexoptics.com/vortex-diamondback-10×42-binocular.html
  16. Vortex Diamondback HD Binoculars 10×42 – MeatEater The Store, accessed October 29, 2025, https://store.themeateater.com/products/vortex-diamondback-hd-binoculars-10×42
  17. High-end binocular owners: What do you own, and are you satisfied? : r/birding – Reddit, accessed October 29, 2025, https://www.reddit.com/r/birding/comments/17olyoz/highend_binocular_owners_what_do_you_own_and_are/
  18. Vortex Razor UHD 10X42 Review – S&S Archery, accessed October 29, 2025, https://sandsarchery.com/blogs/backcountry-hunting/vortex-razor-uhd-10×42-review
  19. Best Binoculars for Hunting 2025 | Hunting Binocular Reviews & Awards, accessed October 29, 2025, https://www.bestbinocularsreviews.com/hunting-binoculars.php
  20. 12 Best Binoculars, Our 2025 Optics Test Winners | Outdoor Life, accessed October 29, 2025, https://www.outdoorlife.com/gear/best-binoculars-2025/
  21. 14 Best Binoculars For Hunting in 2025 – All Budgets Reviewed – Target Tamers, accessed October 29, 2025, https://www.targettamers.com/best-binoculars-for-hunting/
  22. The 7 Best Hunting Binoculars of 2025 | GearJunkie Tested, accessed October 29, 2025, https://gearjunkie.com/outdoor/hunt-fish/best-hunting-binoculars
  23. The Best Binoculars of 2025 | GearJunkie Tested, accessed October 29, 2025, https://gearjunkie.com/technology/best-binoculars
  24. Top Picks – Binoculars – Bass Pro Shops, accessed October 29, 2025, https://www.basspro.com/l/top-picks-binoculars-shop-all
  25. Best Binoculars for Hunting & Bird Watching – Scheels, accessed October 29, 2025, https://www.scheels.com/e/post/best-birding-binoculars/
  26. Binoculars for Hunting, Bird Watching & More – Scheels, accessed October 29, 2025, https://www.scheels.com/c/binoculars/
  27. Entry-level “Alpha” Bins? : r/Binoculars – Reddit, accessed October 29, 2025, https://www.reddit.com/r/Binoculars/comments/pnarz5/entrylevel_alpha_bins/
  28. Best High-End Binoculars 2025: We Check Out The Most Powerful, Highly Rated & Longest Range Bino’s – Target Tamers, accessed October 29, 2025, https://www.targettamers.com/best-high-end-binoculars/
  29. Vortex Razor UHD 10×42 Binoculars Review, accessed October 29, 2025, https://www.bestbinocularsreviews.com/Vortex-Razor-UHD-10×42-Binoculars-Review-255.htm
  30. The Best Binoculars Under $500 | MeatEater Gear, accessed October 29, 2025, https://www.themeateater.com/gear/general/the-best-binoculars-under-500
  31. The Best Binoculars of 2025 | Tested & Rated – Outdoor Gear Lab, accessed October 29, 2025, https://www.outdoorgearlab.com/topics/camping-and-hiking/best-binoculars
  32. Budget Binoculars Showdown: Vortex vs. Cabela’s | GearJunkie Tested, accessed October 29, 2025, https://gearjunkie.com/hunting/budget-binoculars-vortex-vs-cabelas
  33. Vortex Diamondback 10×42 Binoculars Review – WhitetailDNA, accessed October 29, 2025, https://www.whitetaildna.com/resources/2019/7/7/vortex-diamondback-10×42-binoculars-review
  34. The Best Binoculars for Hunting – MeatEater, accessed October 29, 2025, https://www.themeateater.com/hunt/general/best-binoculars-for-hunting
  35. NL Pure 10×42 – SWAROVSKI OPTIK, accessed October 29, 2025, https://www.swarovskioptik.com/us/en/hunting/products/binoculars/nl-pure/nl-pure-binoculars/nl-pure-10×42
  36. Swarovski NL Pure 10×42 Binocular – Outdoorsmans, accessed October 29, 2025, https://outdoorsmans.com/products/swarovski-nl-pure-10×42
  37. Swarovski NL Pure 10×42 Binoculars Review – Optics4Birding, accessed October 29, 2025, https://optics4birding.com/pages/swarovski-nl-pure-10×42-binoculars-review
  38. Swarovski NL Pure 10×42 – binoculars review – AllBinos.com, accessed October 29, 2025, https://www.allbinos.com/360-binoculars_review-Swarovski_NL_Pure_10x42.html
  39. What are SWAROVSKI OPTIK’s warranty terms?, accessed October 29, 2025, https://myservice.swarovskioptik.com/s/article/What-are-SWAROVSKI-OPTIK-s-warranty-terms
  40. Warranty Swarovski NL Pure Binoculars – Optics Trade, accessed October 29, 2025, https://www.optics-trade.eu/download/Swarovski/Warranty%20Swarovski%20NL%20Pure%20Binoculars%20-%20Optics%20Trade.pdf
  41. High quality binoculars. Swarovski vs vortex – Reddit, accessed October 29, 2025, https://www.reddit.com/r/Binoculars/comments/1m8cxsd/high_quality_binoculars_swarovski_vs_vortex/
  42. I’ve seen the Alpha light! Swarovski NL Pure and Zeiss Victory SF – Cloudy Nights, accessed October 29, 2025, https://www.cloudynights.com/forums/topic/916011-ive-seen-the-alpha-light-swarovski-nl-pure-and-zeiss-victory-sf/
  43. Vortex 10×42 Razor UHD Binoculars with GlassPak Pro RZB-1042 B&H, accessed October 29, 2025, https://www.bhphotovideo.com/c/product/1848346-REG/vortex_rzb_1042_10x42_razor_uhd_binoculars.html
  44. Razor UHD 10×42 Binocular – Vortex Optics, accessed October 29, 2025, https://vortexoptics.com/razor-uhd-1042-binocular.html
  45. Swarovski NL Pure Binoculars: Review of Main Features, accessed October 29, 2025, https://www.bestbinocularsreviews.com/blog/swarovski-nl-pure-binoculars-review-of-main-features-07/
  46. Vortex Optics Razor UHD 10×42 Binocular RZB-3102 D – AllPredatorCalls.com, accessed October 29, 2025, https://allpredatorcalls.com/vortex-optics-razor-uhd-10×42-binocular-rzb-3102-d/
  47. Vortex Razor UHD 10×42 – binoculars review – AllBinos.com, accessed October 29, 2025, https://www.allbinos.com/349-binoculars_review-Vortex_Razor_UHD_10x42.html
  48. Razor UHD 10×42 – Vortex Optics, accessed October 29, 2025, https://vortexoptics.com/razor-uhd-10×42-binocular.html
  49. Compare Vortex Razor UHD vs Swarovski EL vs Vortex Razor HD vs Swarovski NL Pure – B&H, accessed October 29, 2025, https://www.bhphotovideo.com/c/compare/Vortex_Razor+UHD_vs_Swarovski_EL_vs_Vortex_Razor+HD_vs_Swarovski_NL+Pure/BHitems/1848346-REG_1657688-REG_852113-REG_1574325-REG
  50. Vortex Razor UHD Binos – Is it Worth the Upgrade? – YouTube, accessed October 29, 2025, https://www.youtube.com/watch?v=cTaA7gytWHA
  51. Which Vortex Binos Are Worth It? | Viper vs Razor HD vs Razor UHD – YouTube, accessed October 29, 2025, https://www.youtube.com/watch?v=iTAtt8KGT_k
  52. Vortex Diamondback HD 10×42 – Feather Edge Optics, accessed October 29, 2025, https://featheredgeoptics.org/vortex-diamondback-hd-10×42/
  53. Vortex 10×42 Diamondback HD Binoculars DB-215 B&H Photo Video, accessed October 29, 2025, https://www.bhphotovideo.com/c/product/1489813-REG/vortex_db_215_10x42_diamondback_hd_binocular.html
  54. Vortex Diamondback HD 10×42 Binocular, accessed October 29, 2025, https://vortexoptics.com/vortex-diamondback-hd-10×42-binocular.html
  55. Phase Correction on Binoculars, accessed October 29, 2025, https://www.bestbinocularsreviews.com/blog/phase-correction-in-binoculars-04/
  56. Best Mid-Size Binoculars 2025 | Travel, Safaris, Birding, Hunting & Marine, accessed October 29, 2025, https://www.bestbinocularsreviews.com/best-mid-size-binoculars.php
  57. Vortex Diamondback HD Binoculars – Bass Pro Shops, accessed October 29, 2025, https://www.basspro.com/p/vortex-diamondback-hd-binoculars
  58. Vortex Diamondback HD 10×42 Binoculars DB-215 | SCHEELS.com, accessed October 29, 2025, https://www.scheels.com/p/vortex-diamondback-hd-10×42-binoculars-db-215/875874-DB-215/
  59. Vortex Diamondback HD 10×42 Review: Best Value Hunting Binoculars – Scopes Field, accessed October 29, 2025, https://scopesfield.com/vortex-diamondback-hd-10×42-review/
  60. Best Budget Binoculars? Vortex Crossfire vs Diamondback vs Viper 10X42 – YouTube, accessed October 29, 2025, https://www.youtube.com/watch?v=yk_Jqr7FWlU
  61. Vortex diamondback binoculars – The Stalking Directory, accessed October 29, 2025, https://www.thestalkingdirectory.co.uk/threads/vortex-diamondback-binoculars.264531/
  62. The Hunter’s Guide to Optics Performance: Finding Game When It Matters Most – S&S Archery, accessed October 29, 2025, https://reviews.sandsarchery.com/the-hunters-guide-to-optics-performance-finding-game-when-it-matters-most/
  63. Relative Brightness & Twilight Factors for Binoculars & Scopes – Backcountry Chronicles, accessed October 29, 2025, https://www.backcountrychronicles.com/binoculars-relative-brightness-twilight-factors/
  64. What exactly is twilight factor? : r/telescopes – Reddit, accessed October 29, 2025, https://www.reddit.com/r/telescopes/comments/156xvgb/what_exactly_is_twilight_factor/
  65. How Do Front Diameter, Light Transmission, and Exit Pupil Size Impact Your Binocular Choice for Buck Hunting? – ZEISS, accessed October 29, 2025, https://blogs.zeiss.com/sports-optics/hunting/en/front-diameter-light-transmission-exit-pupil-size-impact-your-binocular-choice/
  66. Light Transmission Rate | Optics Trade Debates, accessed October 29, 2025, https://www.optics-trade.eu/blog/light-transmission-rate/
  67. Vortex Diamondback HD 10×50 vs Viper HD 10×42 : r/Binoculars – Reddit, accessed October 29, 2025, https://www.reddit.com/r/Binoculars/comments/1gyby03/vortex_diamondback_hd_10x50_vs_viper_hd_10x42/
  68. Binoculars Lens Coatings And Glass Quality – Bird Spot, accessed October 29, 2025, https://www.birdspot.co.uk/binoculars-scopes/binoculars-lens-coatings-and-glass-quality
  69. ED Glass, HD Glass, HT Glass, What do they represent? – Academy – Vector Optics, accessed October 29, 2025, https://www.vectoroptics.com/Academy/ED-Glass-HD-Glass-HT-Glass.html
  70. Optical Coatings in Binoculars: An Analysis of Performance, Evolution, and Differentiation, accessed October 29, 2025, https://www.bestbinocularsreviews.com/blog/optical-coatings-in-binoculars-an-analysis-of-performance-evolution-and-differentiation-07/
  71. Binocular Optical System – Hawke Life, accessed October 29, 2025, https://life.hawkeoptics.com/binocular-optical-system/
  72. Reviewing Binoculars – Marc Mosko, accessed October 29, 2025, https://tear.com/2018/08/reviewing-binoculars
  73. The Cornell Lab Review: Affordable Full-Size 8×42 Binoculars | All About Birds, accessed October 29, 2025, https://www.allaboutbirds.org/news/the-cornell-lab-review-affordable-full-size-8×42-binoculars/
  74. Housings and mechanics – Astroshop.eu, accessed October 29, 2025, https://www.astroshop.eu/magazine/information/binocular-information/the-most-important-designs/housings-and-mechanics/i,1117
  75. Magnesium vs. Aluminium: opinions about Pros and cons : r/Surface – Reddit, accessed October 29, 2025, https://www.reddit.com/r/Surface/comments/6bbhpl/magnesium_vs_aluminium_opinions_about_pros_and/
  76. The B&H Binocular Buying Guide | B&H eXplora, accessed October 29, 2025, https://www.bhphotovideo.com/explora/outdoors/buying-guide/the-bh-binocular-buying-guide
  77. Vortex vs leopold : r/Hunting – Reddit, accessed October 29, 2025, https://www.reddit.com/r/Hunting/comments/17c1kx1/vortex_vs_leopold/
  78. Bushnell-poor customer service – Binoculars – Cloudy Nights, accessed October 29, 2025, https://www.cloudynights.com/forums/topic/681920-bushnell-poor-customer-service/
  79. What Are the Most Important Customer Perception Metrics? – Highlight, accessed October 29, 2025, https://help.letshighlight.com/help/customer-perception-metrics
  80. Understanding Perceived Value in Marketing: Importance and Impact – Investopedia, accessed October 29, 2025, https://www.investopedia.com/terms/p/perceived-value.asp
  81. Price-Value Perception Mapping: Measuring Customer Satisfaction in SaaS – Monetizely, accessed October 29, 2025, https://www.getmonetizely.com/articles/price-value-perception-mapping-measuring-customer-satisfaction-in-saas
  82. Guide to Getting Binoculars Repaired, accessed October 29, 2025, https://www.bestbinocularsreviews.com/binocular-repairs-service.php
  83. Best binoculars 2025: Our picks for stargazing, bird watching and observing wildlife, accessed October 29, 2025, https://www.livescience.com/best-binoculars
  84. 52mm Swarovski NL Pures? – Page 6 – Binoculars – Cloudy Nights, accessed October 29, 2025, https://www.cloudynights.com/forums/topic/923129-52mm-swarovski-nl-pures/page/6/
  85. Creating a composite measure – Cross Validated – Stack Exchange, accessed October 29, 2025, https://stats.stackexchange.com/questions/235881/creating-a-composite-measure
  86. Creating a composite score and deciding the weights? : r/analytics – Reddit, accessed October 29, 2025, https://www.reddit.com/r/analytics/comments/gzhipx/creating_a_composite_score_and_deciding_the/
  87. Numerical data: Normalization | Machine Learning – Google for Developers, accessed October 29, 2025, https://developers.google.com/machine-learning/crash-course/numerical-data/normalization
  88. Min-Max and Z-Score Normalization | Codecademy, accessed October 29, 2025, https://www.codecademy.com/article/min-max-zscore-normalization
  89. Data Normalization in Data Mining – GeeksforGeeks, accessed October 29, 2025, https://www.geeksforgeeks.org/machine-learning/data-normalization-in-data-mining/
  90. A Deepish Dive into Binocular Lens & Prism Coatings – Reddit, accessed October 29, 2025, https://www.reddit.com/r/Binoculars/comments/1dchs14/a_deepish_dive_into_binocular_lens_prism_coatings/
  91. Guide to Optical Coatings in Binoculars, accessed October 29, 2025, https://www.bestbinocularsreviews.com/blog/visual-guide-to-optical-coatings-in-binoculars/
  92. What you need to know about lens coatings – BirdWatching Magazine, accessed October 29, 2025, https://www.birdwatchingdaily.com/gear/binoculars/lens-coatings/
  93. Glossary | Binoculars | Field of view | Twilight factor – Astroshop.eu, accessed October 29, 2025, https://www.astroshop.eu/glossary/binoculars/field-of-view/twilight-factor/g,3012
  94. Twilight factor – ZEISS Hunting, accessed October 29, 2025, https://blogs.zeiss.com/sports-optics/hunting/en/twilight-factor/
  95. What is Twilight Factor and Relative Brightness and how do I Calculate – Celestron, accessed October 29, 2025, https://www.celestron.com/blogs/knowledgebase/what-is-twilight-factor-and-how-do-i-calculate-it
  96. Min-Max Normalization – by Abhinav Bandaru – Medium, accessed October 29, 2025, https://medium.com/@abhi1achiever/min-max-normalization-db1f515b08b4
  97. What Is Customer Sentiment and How Do You Measure It? – Qualtrics, accessed October 29, 2025, https://www.qualtrics.com/experience-management/customer/customer-sentiment/
  98. How can sentiment analysis be used to improve customer experience? – IBM, accessed October 29, 2025, https://www.ibm.com/think/insights/how-can-sentiment-analysis-be-used-to-improve-customer-experience
  99. How to Conduct Sentiment Analysis on Reviews [2 Methods] – SentiSum, accessed October 29, 2025, https://www.sentisum.com/library/sentiment-analysis-reviews
  100. How to Quantify Qualitative Data? | Guide & Examples – ATLAS.ti, accessed October 29, 2025, https://atlasti.com/research-hub/quantifying-qualitative-data
  101. Binoculars & Monoculars for Outdoors & Nature – Cabela’s, accessed October 29, 2025, https://www.cabelas.com/l/binoculars
  102. Cabela’s 10×42 Binoculars with Harness – Bass Pro Shops, accessed October 29, 2025, https://www.basspro.com/p/cabelas-10×42-binoculars-and-harness-combo
  103. Vortex Diamondback HD Binoculars in TrueTimber Camo – Cabela’s, accessed October 29, 2025, https://www.cabelas.com/p/vortex-diamondback-hd-binoculars-in-truetimber-strata
  104. Binoculars for Spotting Game & Scouting Outdoors – Bass Pro Shops, accessed October 29, 2025, https://www.basspro.com/l/binoculars
  105. SWAROVSKI OPTIK NL Pure Binoculars | Bass Pro Shops, accessed October 29, 2025, https://www.basspro.com/p/swarovski-nl-pure-binoculars
  106. Scheels stores | Long Range Only, accessed October 29, 2025, https://www.longrangeonly.com/forum/threads/scheels-stores.15013/
  107. Anyone else’s scheels everything overpriced? : r/Hunting – Reddit, accessed October 29, 2025, https://www.reddit.com/r/Hunting/comments/1erbsog/anyone_elses_scheels_everything_overpriced/
  108. Vortex Razor UHD 10x42mm Binoculars | SCHEELS.com, accessed October 29, 2025, https://www.scheels.com/p/vortex-razor-uhd-10x42mm-binoculars/875874-RZB-1042/
  109. Rokslide: Home, accessed October 29, 2025, https://www.rokslide.com/
  110. Hunt Talk, accessed October 29, 2025, https://www.hunttalk.com/
  111. Binoculars for Hunting – Reddit, accessed October 29, 2025, https://www.reddit.com/r/Hunting/comments/11lw5ae/binoculars_for_hunting/
  112. Low-light optics discussion : r/Hunting – Reddit, accessed October 29, 2025, https://www.reddit.com/r/Hunting/comments/5bulcz/lowlight_optics_discussion/
  113. The Best Riflescopes of 2025, Expert Tested – Field & Stream, accessed October 29, 2025, https://www.fieldandstream.com/outdoor-gear/guns/rifles/best-rifle-scopes
  114. Binoculars Ratings: How Binoculars Are Rated & the Best Rated Binoculars – Best Binocular Reviews, accessed October 29, 2025, https://www.bestbinocularsreviews.com/binoculars-ratings.php
  115. The ultimate guide to customer sentiment analysis – Clootrack, accessed October 29, 2025, https://www.clootrack.com/knowledge/customer-feedback-analysis/the-ultimate-guide-to-customer-sentiment-analysis-of-customer-feedback
  116. Bushnell customer service : r/Binoculars – Reddit, accessed October 29, 2025, https://www.reddit.com/r/Binoculars/comments/1am3h9n/bushnell_customer_service/

From the Littoral Fringe to the Asymmetric Edge: A Comprehensive Analysis of Taiwan’s Amphibious Reconnaissance and Patrol Unit

The Amphibious Reconnaissance and Patrol Unit (ARPU), known colloquially as the “Frogmen,” constitutes a Tier 1 special operations force within the Republic of China Marine Corps (ROCMC).1 This unit stands as a critical instrument of the Republic of China’s (ROC) national defense policy, and its development serves as a direct reflection of Taiwan’s shifting geopolitical and military realities. The ARPU’s history charts a course from a force posture centered on the strategic objective of mainland recovery to its current role as a linchpin of determined asymmetric defense against the formidable and ever-modernizing People’s Liberation Army (PLA).4

This report will demonstrate that the ARPU has evolved from a conventional amphibious reconnaissance unit, heavily influenced by American Cold War-era formations, into a multi-domain special operations force optimized for sea denial, counter-invasion, and asymmetric warfare. This transformation has made it a pivotal component of Taiwan’s overarching “Overall Defense Concept” (ODC).7 The unit’s continuous adaptation in tactics, organization, and equipment—driven by the escalating threat across the Taiwan Strait and a deepening, albeit unofficial, security partnership with the United States—is the central theme of this analysis.

2.0 Genesis and Formative Years (1950–1996): Forging a Littoral Reconnaissance Capability

2.1 Post-War Origins and American Doctrinal Influence

The genesis of the ARPU lies in the turbulent period between 1950 and 1955, a direct consequence of the Nationalist government’s retreat to Taiwan and the immediate, existential need to develop a specialized amphibious warfare capability.1 Following the passage of the U.S. Mutual Security Act of 1951, American military advisory presence and aid became a cornerstone of Taiwan’s defense structure.3 It was within this context of close U.S.-ROC military cooperation that the ROCMC Command, with guidance from American advisors, established its first formal reconnaissance element.3

From its inception, the unit’s doctrine was a unique and deliberate hybrid. While its organizational structure was patterned after the United States Marine Corps Amphibious Reconnaissance Battalion, its core training philosophy and skillset were explicitly modeled on the U.S. Navy’s Underwater Demolition Teams (UDTs)—the direct predecessors of the modern Navy SEALs.1 This fusion was not an arbitrary choice but a strategic necessity. The ROC’s primary strategic objective of the era was a potential amphibious counter-attack on mainland China. A pure reconnaissance force could identify landing sites, while a pure demolition unit could clear them. Facing the monumental task of an opposed landing with finite resources, the ROCMC required a single, elite formation capable of performing both functions sequentially: to clandestinely reconnoiter a potential beachhead and then clear it of obstacles for the main landing force. This created a potent “force multiplier” unit possessing a broader, more direct-action-oriented skillset than a standard reconnaissance formation, a flexibility that would prove invaluable decades later as its mission pivoted from offense to defense.

Initial missions were aligned with this offensive posture, focusing on clandestine intelligence gathering, pre-invasion hydrographic surveys, beach obstacle clearance, and identifying enemy fortifications.15 Early operators reportedly conducted covert infiltrations of PRC-held coastal areas to gather critical intelligence.15 The selection pool for this arduous duty was limited to enlisted Marines holding the rank of Sergeant or below, who were subjected to a grueling, year-long training course.1 By 1955, after the first three classes had successfully graduated, the unit had cultivated a sufficient cadre of experienced operators and instructors to become self-sufficient in its training pipeline.1

2.2 A Fragmented Organizational Evolution

During its formative decades, the unit’s structure was fluid and subordinate to the larger conventional echelons of the ROCMC. It began as a reconnaissance team directly under the Marine Corps Headquarters before being broken down into smaller detachments (偵察分隊) and assigned to the Marine Brigades.9 With the establishment of the 1st Marine Division in 1955, the unit was formalized as an Amphibious Reconnaissance Company (兩棲偵察連).9 A second company was stood up in 1966 with the formation of the 2nd Marine Division.10

A significant consolidation occurred in 1969 when the division-level reconnaissance companies were merged with the reconnaissance platoons organic to the infantry regiments. This created larger, more capable division-level Reconnaissance and Search Battalions (偵察搜索營), which centralized command and control of these specialized assets within each division.10 This period saw further organizational flux that mirrored broader changes in the ROCMC force structure, such as the creation of a reconnaissance company for the newly formed 77th Marine Division in 1979 and its subsequent disbandment in 1984.10

This long period of subordination to conventional division commands likely constrained the unit’s development as a true special operations force. As a division-level asset, its primary function was to support the division’s amphibious landing mission, not to conduct independent, strategic-level special operations. This structure would have limited its access to the specialized equipment, transportation, and intelligence assets available only at the highest levels of command. The constant reorganizations tied to the fate of its parent divisions indicate that the unit was viewed more as a specialized component of a conventional force rather than a strategic asset in its own right. This institutional mindset would have to be fundamentally overcome for the ARPU to evolve into its modern form.

3.0 The Modern Era (1997–Present): Consolidation and Doctrinal Realignment

3.1 Unification and Creation of a Strategic Asset

The year 1997 marks the birth of the modern Amphibious Reconnaissance and Patrol Unit (海軍陸戰隊兩棲偵搜大隊).3 In a pivotal reorganization, disparate special-purpose units within the ROC Navy and Marine Corps were consolidated into a single, brigade-level command reporting directly to the ROCMC Headquarters.10 This consolidation was the most critical transformation in the unit’s history, elevating it from a collection of tactical-level assets into a strategic special operations command.

The new ARPU merged the existing Amphibious Reconnaissance and Search Battalion with the 66th Division’s Reconnaissance Company and, significantly, the Marine Corps Political Warfare Company.10 The unit’s capabilities were further enhanced by absorbing the 99th Division’s Reconnaissance Company in 2001, the elite Marine Corps Special Service Company (CMC.SSC)—colloquially known as the “Black Outfit Unit”—in 2004, and finally, the Navy’s own Underwater Demolition Group in 2005.1 Before this period, reconnaissance, direct action, and UDT capabilities were stove-piped in different units with separate command chains, creating significant friction in planning and executing complex operations. By merging these elements, the ROCMC created a single command with a full-spectrum maritime special operations capability, encompassing reconnaissance, direct action, underwater operations, and unconventional warfare. This unified structure allows for streamlined command, integrated training, and the ability to tailor force packages for specific missions—a hallmark of modern SOF commands worldwide.

Time PeriodUnit Designation(s)Parent CommandKey Changes/Events
1950–1955Reconnaissance Team (偵察隊), Reconnaissance Detachment (偵察分隊)ROCMC HQ, later Marine BrigadesEstablishment with U.S. advisory input; training modeled on U.S. Navy UDTs.10
1955–1968Amphibious Reconnaissance Company (兩棲偵察連)1st & 2nd Marine DivisionsFormalized as company-sized elements organic to the newly formed Marine Divisions.10
1969–1996Reconnaissance and Search Battalion (偵察搜索營)Marine DivisionsRecon companies and regimental recon platoons merged into larger, division-level battalions.10
1997–PresentAmphibious Reconnaissance and Patrol Unit (兩棲偵搜大隊)ROCMC HeadquartersConsolidated into a single, brigade-level strategic command.10
2001Integration of 99th Division Recon CompanyARPUFurther consolidation as the 99th Division is disbanded.10
2004Integration of Marine Corps Special Service Company (CMC.SSC)ARPUUnit absorbs the ROCMC’s top-tier direct action/counter-terrorism unit.1
2005Integration of Navy Underwater Demolition GroupARPUAll primary naval special warfare capabilities unified under the ARPU command.10

3.2 The Crucible: Selection and Training

The modern pathway to becoming a Frogman is a grueling 10-week basic training course conducted at the Zuoying Naval Base in Kaohsiung.1 The course is open only to volunteers from within the ROCMC and is designed for extreme physical and psychological attrition, with a completion rate that hovers between 48% and 50%.1 The curriculum pushes candidates to their limits with endless long-distance runs, punishing calisthenics, swimming in full combat gear, small boat handling, demolitions, and guerrilla warfare tactics.15

The training regimen culminates in the “Comprehensive Test Week,” more commonly known as “Hell Week” (克難週).10 This is a six-day, five-night ordeal of continuous physical activity, with candidates permitted only one hour of rest for every six hours of exertion, pushing them to the brink of collapse.17

The final test is the iconic “Road to Heaven” (天堂路), a 50-meter crawl over a path of sharp coral rock that candidates, clad only in shorts, must traverse while performing a series of prescribed exercises.1 Instructors loom over them, shouting orders and sometimes pouring salt water onto their open wounds to amplify the pain and test their resolve.1 This highly public and brutal ritual serves a dual purpose beyond mere physical selection. It is a powerful tool for psychological conditioning and a public display of national resolve. By enduring extreme, seemingly arbitrary pain under the watchful eyes of instructors and, uniquely, their own families, candidates demonstrate an unwavering commitment that transcends physical toughness.1 This public spectacle serves as a form of strategic communication: to a domestic audience, it showcases the military’s elite standards, and to a potential adversary, it sends an unmistakable signal of the fanatical resistance an invading force would face. Upon completing the crawl, graduates are officially certified as ARPU Frogmen.1

3.3 The Shift to Asymmetric Operations and the “Overall Defense Concept”

With the formal abandonment of the strategic goal to retake mainland China, the ARPU’s mission has been completely reoriented toward the defense of Taiwan.6 This doctrinal shift aligns the unit with Taiwan’s “Overall Defense Concept” (ODC), a strategy that de-emphasizes matching the PLA symmetrically and instead focuses on leveraging the advantages of defense, ensuring survivability, and destroying an invading force in the littoral zone and on the beaches.5

The ARPU’s modern tactical employment directly reflects this new reality. Its core missions now include:

  • Sea Denial: In a conflict, ARPU teams would likely be tasked with covertly deploying from small boats under the cover of darkness to conduct reconnaissance on PLA naval formations, acting as forward observers to call in precision strikes from Taiwan’s formidable shore-based anti-ship missile batteries.17
  • Counter-Infiltration and Guerrilla Warfare: The unit serves as a high-readiness rapid reaction force, prepared to counter PLA special forces attempting to seize critical infrastructure or establish a lodgment ahead of a main invasion force.15
  • Critical Infrastructure Defense: Reflecting a shift toward homeland defense, the ARPU has been specifically tasked with defending the Tamsui River and the Port of Taipei. These are key strategic entry points to the capital, and the ARPU is expected to work in concert with the Guandu Area Command and the Coast Guard to secure them against a riverine or port assault.20
  • Joint Operations and Training: The ARPU serves as a center of excellence for special tactics within Taiwan’s security apparatus. It provides advanced training to other elite units, including the Coast Guard’s Special Task Unit (STU) and the Military Police Special Services Company (MPSSC).1

4.0 The Operator’s Arsenal: An Evolution in Small Arms

The evolution of the ARPU’s small arms is a direct reflection of Taiwan’s strategic journey from near-total dependence on the United States to a robust indigenous defense industry, and finally to a sophisticated procurement strategy that blends domestic production with best-in-class foreign systems for specialized roles.

4.1 The American Legacy (1950s–1970s): Equipping for a Counter-Invasion

In the decades following the ROC’s retreat to Taiwan, its armed forces were almost entirely equipped through U.S. military aid programs established under the Mutual Defense Treaty and later the Taiwan Relations Act.3 The standard-issue rifle for the ROCMC, and by extension its nascent frogman units, was the U.S. M1 Garand, chambered in.30-06 Springfield.23 Taiwan received well over 100,000 of these powerful and reliable semi-automatic rifles.26 The primary sidearm was the venerable Colt M1911A1 pistol in.45 ACP, the standard U.S. military sidearm of the era.26 It is important to note, however, that the ARPU’s doctrinal predecessors, the U.S. UDTs, often operated with minimal armament during pure demolition and reconnaissance missions, prioritizing stealth and explosives over firepower. Their primary tools were often a Ka-Bar combat knife and haversacks of demolition charges.28 It is highly probable that the early ROCMC frogmen adopted a similar minimalist loadout for certain mission profiles, relying on standard infantry arms only when direct combat was anticipated.

4.2 The Indigenous Drive (1970s–2000s): Forging Self-Sufficiency

The geopolitical shifts of the 1970s, particularly the U.S. normalization of relations with the People’s Republic of China, injected a profound sense of uncertainty into Taiwan’s defense planning. This spurred a national effort to develop an indigenous defense industry capable of achieving self-sufficiency in critical weapons systems.30 This period saw the development of the T65 assault rifle series by Taiwan’s 205th Armory. Finalized in 1976 and chambered in 5.56x45mm NATO, the T65 was heavily influenced by the AR-15/M16 platform but incorporated a more robust short-stroke gas piston system derived from the AR-18, a design choice that prioritized reliability.31 The T65K2 variant became the standard-issue rifle for the ROC Army and Marine Corps, and ARPU operators would have transitioned to this platform during this period.31 To replace the aging fleet of M1911A1 pistols, the 205th Armory also developed the T75 pistol, a domestic copy of the Beretta 92F chambered in 9x19mm Parabellum.35

4.3 The Contemporary ARPU Armory: A Detailed Technical Assessment

The current ARPU arsenal represents a mature and sophisticated procurement strategy. It combines advanced, cost-effective indigenous systems for general issue with carefully selected, high-performance foreign weapons for specialized special operations requirements.

4.3.1 Primary Weapon System: T91 Assault Rifle

The T91 is the standard-issue rifle for all branches of the ROC Armed Forces, including the ARPU. Adopted in 2003 to replace the T65 series, it is a modern assault rifle built around a short-stroke gas piston system that offers enhanced reliability in harsh maritime environments while retaining the familiar ergonomics and controls of the AR-15/M16 platform.38 The rifle features an integrated MIL-STD-1913 Picatinny rail on the receiver for mounting optics, a 4-position selector switch (safe, semi-auto, 3-round burst, full-auto), and a telescoping stock modeled after the M4 carbine.39 Due to the nature of their missions, ARPU operators likely make extensive use of the T91CQC variant, which features a shorter 349 mm (13.7 in) barrel for improved maneuverability in the close confines of ship-boarding or urban combat scenarios.39

4.3.2 Sidearms: T75K3 and Glock Series

The standard-issue sidearm for the ARPU is the indigenously produced T75K3 pistol.35 This is the latest evolution of the T75 (Beretta 92 clone) and features improved ergonomics and a polygonally rifled barrel, which enhances both accuracy and service life.35 In line with global special operations trends, ARPU operators also utilize Glock 17 and 19 pistols.26 The Glock 19, in particular, is a worldwide favorite among elite units for its exceptional reliability, compact size, and vast ecosystem of aftermarket support, allowing for extensive customization.42

4.3.3 Close Quarters Battle (CQB) Systems: HK MP5

Despite its age, the German-made Heckler & Koch MP5 submachine gun remains a key tool in the ARPU’s arsenal for specialized CQB roles.26 Its continued use is not a sign of obsolescence but a testament to its superior performance in its intended niche. The MP5’s roller-delayed blowback, closed-bolt action provides a level of accuracy and control in full-automatic fire that is unmatched by simpler open-bolt designs.45 For surgical precision in hostage-rescue or maritime counter-terrorism scenarios, where over-penetration is a major concern, the 9mm MP5 remains an optimal weapon system.

4.3.4 Squad Support Weapons: T75 Light Machine Gun

For squad-level suppressive fire, the ARPU employs the T75 Light Machine Gun.26 This weapon, based on the highly successful Belgian FN Minimi, is produced in Taiwan and provides a high volume of 5.56mm fire.48 It is gas-operated, fires from an open bolt, and features the crucial ability to feed from both 200-round disintegrating belts and standard 30-round T91 rifle magazines, providing critical ammunition interoperability in a firefight.48

4.3.5 Precision Engagement Platforms

The ARPU fields a sophisticated and layered inventory of sniper systems for long-range precision engagement:

  • T93 Sniper Rifle: This is the standard-issue, domestically produced bolt-action sniper rifle, chambered in 7.62×51mm NATO and closely patterned after the U.S. M24 Sniper Weapon System.50 The ROCMC was a primary customer for this rifle, ordering 179 units beginning in 2009. The rifle has an effective range of over 800 meters, and an improved T93K1 variant features a 10-round detachable box magazine for faster follow-up shots.50
  • T112 Heavy Sniper Rifle: A new indigenous anti-materiel rifle scheduled for delivery in 2025.51 Chambered in 12.7×99mm NATO (.50 BMG), this weapon will provide ARPU teams with the capability to engage and destroy high-value targets such as light armored vehicles, radar installations, and small watercraft at an effective range of 2,000 meters.51
  • Accuracy International AXMC/AX50: For the most demanding missions, the Taiwan Marine Corps Special Forces have procured top-tier sniper systems from the British firm Accuracy International.52 The
    AXMC is a multi-caliber platform, likely used in.338 Lapua Magnum for extreme-range anti-personnel work, while the AX50 is a.50 BMG anti-materiel rifle. The acquisition of these world-class systems demonstrates a commitment to providing ARPU snipers with a qualitative edge on the battlefield.
Weapon TypeModel(s)OriginCaliberActionRole
Assault RifleT91 / T91CQCTaiwan5.56×45mm NATOGas-operated, short-stroke pistonStandard issue primary weapon; CQC variant for close-quarters
PistolT75K3Taiwan9×19mm ParabellumShort recoil, DA/SAStandard issue sidearm
PistolGlock 17 / 19Austria9×19mm ParabellumStriker-firedSpecial operations sidearm
Submachine GunHK MP5A5Germany9×19mm ParabellumRoller-delayed blowbackClose Quarters Battle (CQB), Maritime Counter-Terrorism
Light Machine GunT75 LMGTaiwan5.56×45mm NATOGas-operated, open boltSquad-level suppressive fire
Sniper RifleT93 / T93K1Taiwan7.62×51mm NATOBolt-actionDesignated marksman / Sniper rifle
Heavy Sniper RifleT112Taiwan12.7×99mm NATOBolt-actionAnti-materiel, extreme long-range engagement
Sniper RifleAccuracy International AXMCUKMulti-caliber (e.g.,.338 LM)Bolt-actionSpecialized long-range anti-personnel
Heavy Sniper RifleAccuracy International AX50UK12.7×99mm NATOBolt-actionSpecialized anti-materiel

5.0 The Future Frogman: A Speculative Outlook

5.1 Deepening Integration with U.S. Special Operations Forces

The most significant factor shaping the ARPU’s future is the recently confirmed permanent stationing of U.S. Army Special Forces (Green Berets) in Taiwan for training and advisory missions.53 This deployment, authorized under the U.S. National Defense Authorization Act, represents a fundamental shift in U.S. policy, which for decades avoided a permanent military presence on the island to maintain strategic ambiguity.53 The placement of U.S. SOF on outlying islands like Kinmen, just miles from the mainland, transcends simple tactical instruction; it serves as a powerful geopolitical signal. This deployment creates a “tripwire” force, where any PLA action against these islands now carries the direct risk of causing U.S. casualties, an event that would dramatically increase the likelihood of a direct American military response and thus complicates Beijing’s invasion calculus.

For the ARPU, this “train the trainer” approach will instill the latest SOF tactics, techniques, and procedures (TTPs), particularly in areas like Joint All-Domain Command and Control (JADC2) and decentralized operations—areas where Taiwan’s traditionally hierarchical command structure has been identified as a weakness.4 This will enhance interoperability, allowing ARPU teams to seamlessly integrate with U.S. or allied forces in a conflict.

5.2 The Technological Battlespace and Asymmetric Armaments

The future ARPU operator will be equipped to maximize the lethality and survivability of small, distributed teams. This will involve the widespread adoption of advanced optics, night vision, and laser designators as standard issue. The focus will shift heavily toward man-portable asymmetric systems that allow small teams to neutralize high-value targets. This includes loitering munitions (suicide drones), such as the indigenous Flyingfish system, and advanced anti-armor missiles like the Javelin and Kestrel, which can be used to destroy landing craft, armored vehicles, and command posts.3 Furthermore, the integration of micro-UAVs like the Black Hornet Nano at the squad level will become standard, providing teams with an organic and immediate intelligence, surveillance, and reconnaissance (ISR) capability, reducing their dependence on higher-echelon assets.57

5.3 The Evolving Role in Cross-Strait Deterrence: The “Stand-In Force” Concept

In a potential conflict, the ARPU’s role will align closely with the U.S. Marine Corps’ emerging concept of “Stand-In Forces” (SIF).58 These are small, low-signature, highly mobile units designed to operate

inside the enemy’s anti-access/area denial (A2/AD) bubble.59 The ARPU’s mission will be to survive the PLA’s initial missile and air bombardment and then conduct sea denial and disruption operations along Taiwan’s coastline and outlying islands.

This represents a fundamental shift in the unit’s purpose. Historically, the ARPU was a “spearhead” intended to lead an offensive amphibious assault.15 In the future, it will function as the distributed “nervous system” of Taiwan’s defense. The “porcupine” strategy relies on a network of mobile, concealed weapon systems (like anti-ship missiles) to attrite an invading fleet.5 The primary challenge for this strategy is finding and tracking the targets amidst the chaos and electronic warfare of an invasion. ARPU teams, with their stealth, mobility, and organic ISR capabilities, are perfectly suited to act as the forward sensor nodes of this defensive network. Their future value will be measured less by the number of enemies they eliminate directly and more by the number of high-value targets—ships, command centers, logistics hubs—they enable the larger joint force to destroy. They are evolving from a kinetic tool into a critical Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) enabler, making them indispensable to the success of the Overall Defense Concept.

6.0 Conclusion

The evolutionary arc of the Amphibious Reconnaissance and Patrol Unit is a microcosm of Taiwan’s larger strategic transformation. From its origins as a U.S.-modeled reconnaissance force postured for an offensive mission that would never materialize, it has been forged by geopolitical necessity into a consolidated, multi-mission special operations command. Through a crucible of brutal selection and a pragmatic approach to armament, the ARPU has become a highly capable and professional force.

Today, the ARPU stands as a cornerstone of Taiwan’s asymmetric defense strategy. No longer a simple spearhead, its evolving doctrine positions it as a vital sensing and targeting network, designed to operate inside an enemy’s weapon engagement zone to enable the destruction of an amphibious invasion force. The unit’s advanced training, specialized equipment, and deepening integration with U.S. Special Operations Forces make it one of the most credible deterrents to a successful PLA amphibious assault. The continued modernization and effectiveness of these “Frogmen” will remain a key factor in maintaining stability in the Taiwan Strait and ensuring the defense of the Republic of China.


If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly donate to help fund our continued report, please visit our donations page.


Sources Used

  1. Amphibious Reconnaissance and Patrol Unit – Wikipedia, accessed September 7, 2025, https://en.wikipedia.org/wiki/Amphibious_Reconnaissance_and_Patrol_Unit
  2. Special Forces: Taiwan Amphibious Recon Unit – YouTube, accessed September 7, 2025, https://www.youtube.com/watch?v=RJQPSxJyz1E
  3. Republic of China Marine Corps – Wikipedia, accessed September 7, 2025, https://en.wikipedia.org/wiki/Republic_of_China_Marine_Corps
  4. Taiwan’s Defense Policies in Evolution, accessed September 7, 2025, https://media.defense.gov/2025/Apr/24/2003696549/-1/-1/1/FEAT-JIPA-DOTSON.PDF
  5. Taiwan’s Defense Policies in Evolution – Air University, accessed September 7, 2025, https://www.airuniversity.af.edu/JIPA/Display/Article/4164821/taiwans-defense-policies-in-evolution/
  6. Republic of China Armed Forces – Wikipedia, accessed September 7, 2025, https://en.wikipedia.org/wiki/Republic_of_China_Armed_Forces
  7. The Republic of China (ROC) Marine Corps future role in Overall Defense Concept (ODC) under the threat of the PRC/PLA. – DTIC, accessed September 7, 2025, https://apps.dtic.mil/sti/pdfs/AD1177947.pdf
  8. Unveiling Taiwan’s Military Power: The Secret Tanks That震撼全球 – Cyber Innovation Hub, accessed September 7, 2025, https://6857blakley.csail.mit.edu/tanks-taiwan
  9. 兩棲偵搜大隊- 政府資訊公開- 中華民國海軍, accessed September 7, 2025, https://navy.mnd.gov.tw/policyroom/Policy_Info.aspx?ID=7&CID=30243&PID=124
  10. 中華民國海軍陸戰隊兩棲偵搜大隊- 維基百科,自由的百科全書, accessed September 7, 2025, https://zh.wikipedia.org/zh-tw/%E4%B8%AD%E8%8F%AF%E6%B0%91%E5%9C%8B%E6%B5%B7%E8%BB%8D%E9%99%B8%E6%88%B0%E9%9A%8A%E5%85%A9%E6%A3%B2%E5%81%B5%E6%90%9C%E5%A4%A7%E9%9A%8A
  11. Foreign Relations of the United States, 1955–1957, China, Volume III – Historical Documents – Office of the Historian, accessed September 7, 2025, https://history.state.gov/historicaldocuments/frus1955-57v03/d191
  12. Foreign Relations of the United States, 1952–1954, China and Japan, Volume XIV, Part 1 – Historical Documents – Office of the Historian, accessed September 7, 2025, https://history.state.gov/historicaldocuments/frus1952-54v14p1/d295
  13. 海軍陸戰隊兩棲偵搜大隊簡史- 遨翔寰宇神采飛揚 – Udn 部落格, accessed September 7, 2025, https://classic-blog.udn.com/Luke822/1523882
  14. A Brief History of Frogmen, UDTs and Navy SEALs – Zeagle, accessed September 7, 2025, https://www.zeagle.com/a-brief-history-of-frogmen-udts-and-navy-seals/
  15. Frogmen–Their Exploits Are Legend – Taiwan Panorama, accessed September 7, 2025, https://www.taiwan-panorama.com/en/Articles/Details?Guid=7eaf0f9c-4d6e-4a63-bfb3-3627c1a1d311&CatId=11&postname=Frogmen–Their%20Exploits%20Are%20Legend
  16. 中华民国海军陆战队两栖侦搜大队 – 维基百科, accessed September 7, 2025, https://wiki.zyhorg.ac.cn/wiki/%E4%B8%AD%E8%8F%AF%E6%B0%91%E5%9C%8B%E6%B5%B7%E8%BB%8D%E9%99%B8%E6%88%B0%E9%9A%8A%E5%85%A9%E6%A3%B2%E5%81%B5%E6%90%9C%E5%A4%A7%E9%9A%8A
  17. A Look Inside Taiwan’s Brutal ARP Navy Frogman Program – gCaptain, accessed September 7, 2025, https://gcaptain.com/a-look-inside-taiwans-brutal-arp-navy-frogman-program/
  18. A Test of Will: Taiwan’s Frogman Training, accessed September 7, 2025, https://www.taiwan-panorama.com/en/Articles/Details?Guid=8eb766d9-7203-4a35-96cd-bab64f2dcf47&CatId=7&postname=A%20Test%20of%20Will%3A%20Taiwan%E2%80%99s%20Frogman%20Training-Taiwan%E2%80%99s%20Frogman%20Training
  19. Inside Taiwan’s brutal navy frogmen bootcamp – YouTube, accessed September 7, 2025, https://www.youtube.com/watch?v=5XHUm10QDsQ
  20. Defense ministry deploys marines to Taipei area, accessed September 7, 2025, https://www.taipeitimes.com/News/taiwan/archives/2025/01/25/2003830818
  21. Taiwan: Major U.S. Arms Sales Since 1990 – FAS Project on Government Secrecy, accessed September 7, 2025, https://sgp.fas.org/crs/weapons/RL30957.pdf
  22. Delayed US Arms Transfers to Taiwan: Déjà Vu? – The Diplomat, accessed September 7, 2025, https://thediplomat.com/2024/07/delayed-us-arms-transfers-to-taiwan-deja-vu/
  23. Marine Corps World War II Weapons: Description, accessed September 7, 2025, https://www.usmcmuseum.com/uploads/6/0/3/6/60364049/marine_corps_weapon_descriptions.pdf
  24. M1 Garand – Wikipedia, accessed September 7, 2025, https://en.wikipedia.org/wiki/M1_Garand
  25. the M1 Garand collection – usmcweaponry.com, accessed September 7, 2025, https://usmcweaponry.com/m1-garand/
  26. List of equipment of the Republic of China Army – Wikipedia, accessed September 7, 2025, https://en.wikipedia.org/wiki/List_of_equipment_of_the_Republic_of_China_Army
  27. My M1 Garand : r/M1Rifles – Reddit, accessed September 7, 2025, https://www.reddit.com/r/M1Rifles/comments/1ktwh86/my_m1_garand/
  28. Frogmen Were the First on Iwo Jima – VFW, accessed September 7, 2025, https://www.vfw.org/media-and-events/latest-releases/archives/2020/2/frogmen-were-the-first-on-iwo-jima
  29. What weapons did the original Frogman UDTs use during WW2? : r/navyseals – Reddit, accessed September 7, 2025, https://www.reddit.com/r/navyseals/comments/6ydecl/what_weapons_did_the_original_frogman_udts_use/
  30. Defense industry of Taiwan – Wikipedia, accessed September 7, 2025, https://en.wikipedia.org/wiki/Defense_industry_of_Taiwan
  31. T65 assault rifle – Wikipedia, accessed September 7, 2025, https://en.wikipedia.org/wiki/T65_assault_rifle
  32. Taiwan’s Retro Gas Piston AR: the Type 65 – Forgotten Weapons, accessed September 7, 2025, https://www.forgottenweapons.com/taiwans-retro-gas-piston-ar-the-type-65/
  33. Taiwan’s Retro Gas Piston AR: the Type 65 – YouTube, accessed September 7, 2025, https://www.youtube.com/watch?v=Iap1d47knmI
  34. Republic of China (Taiwan) Weapons – Far East Tactical, accessed September 7, 2025, https://fareastmilsim.com/rocweapons
  35. T75 pistol – Wikipedia, accessed September 7, 2025, https://en.wikipedia.org/wiki/T75_pistol
  36. The Taiwan Army Artillery Corps uses T75 pistols (imitations of the Beretta 92 series) for shooting training. : r/ForgottenWeapons – Reddit, accessed September 7, 2025, https://www.reddit.com/r/ForgottenWeapons/comments/1j44o3f/the_taiwan_army_artillery_corps_uses_t75_pistols/
  37. Taiwan Coast Guard’s T75 pistol (a local imitation of the Beretta 92 family). – Reddit, accessed September 7, 2025, https://www.reddit.com/r/ForgottenWeapons/comments/1fgpm8g/taiwan_coast_guards_t75_pistol_a_local_imitation/
  38. T91: Taiwan’s Short-Stroke AR – YouTube, accessed September 7, 2025, https://www.youtube.com/watch?v=M3G2aKG4-5Y&pp=0gcJCfwAo7VqN5tD
  39. T91 assault rifle – Wikipedia, accessed September 7, 2025, https://en.wikipedia.org/wiki/T91_assault_rifle
  40. T91 Taiwanese 5.56mm Assault Rifle – ODIN, accessed September 7, 2025, https://odin.tradoc.army.mil/WEG/Asset/123bea4095eedd25096b5d11283d1783
  41. Military to produce more T75K3 pistols for Navy, Air Force – 僑務電子報, accessed September 7, 2025, https://ocacnews.net/article/315696
  42. Top U.S. General In Afghanistan Is Carrying A Heavily-Modified Glock With A Compensator Attached – The War Zone, accessed September 7, 2025, https://www.twz.com/39894/top-u-s-general-in-afghanistan-is-carrying-a-heavily-modified-glock-with-a-compensator-attached
  43. How Army Special Forces Worked the System to Get Glock Pistols | Coffee or Die, accessed September 7, 2025, https://www.coffeeordie.com/article/special-forces-glock-pistols
  44. Why is the Glock 19 pistol the favorite of the world’s most elite forces? – Sandboxx, accessed September 7, 2025, https://www.sandboxx.us/news/why-is-the-glock-19-the-favorite-pistol-of-special-forces/
  45. MP5 – Heckler & Koch, accessed September 7, 2025, https://www.heckler-koch.com/en/Products/Military%20and%20Law%20Enforcement/Submachine%20guns/MP5
  46. Heckler & Koch MP5 – Wikipedia, accessed September 7, 2025, https://en.wikipedia.org/wiki/Heckler_%26_Koch_MP5
  47. Was the H&K MP5 really that special of a submachine gun of its time? Or is it special because of the SAS? – Reddit, accessed September 7, 2025, https://www.reddit.com/r/WarCollege/comments/1mt4mgb/was_the_hk_mp5_really_that_special_of_a/
  48. T75 light machine gun – Wikipedia, accessed September 7, 2025, https://en.wikipedia.org/wiki/T75_light_machine_gun
  49. T75 Taiwanese 5.56mm Light Machine Gun – ODIN – OE Data Integration Network, accessed September 7, 2025, https://odin.tradoc.army.mil/WEG/Asset/d3b8969543b7c45e9a9391f262b0ad40
  50. T93 sniper rifle – Wikipedia, accessed September 7, 2025, https://en.wikipedia.org/wiki/T93_sniper_rifle
  51. Taiwan military to receive heavy sniper rifles in June | Taiwan News …, accessed September 7, 2025, https://taiwannews.com.tw/news/6024029
  52. The AXMC and AX50 sniper rifles used by Taiwan Marine Corps …, accessed September 7, 2025, https://www.reddit.com/r/ForgottenWeapons/comments/1idl8uo/the_axmc_and_ax50_sniper_rifles_used_by_taiwan/
  53. Breaking a Seven-Decade Taboo: The Deployment of US Special Forces to Kinmen, accessed September 7, 2025, https://www.hudson.org/security-alliances/breaking-seven-decade-taboo-deployment-us-special-forces-kinmen-miles-yu
  54. US Army Special Forces Train Taiwan Troops Near China’s Coast – Newsweek, accessed September 7, 2025, https://www.newsweek.com/american-special-forces-train-taiwan-soldiers-penghu-kinmen-china-coast-1868009
  55. Presence of U.S. Army Special Forces on outlying islands confirmed – Focus Taiwan, accessed September 7, 2025, https://focustaiwan.tw/politics/202403140016
  56. Analysis: Joint U.S.-Taiwan Training Needed for Incoming Weapons Systems – YouTube, accessed September 7, 2025, https://www.youtube.com/watch?v=ljH2TODfPhQ
  57. US Army Special Forces To Be Deployed on Taiwanese Island Six Miles From Mainland China | SOFREP, accessed September 7, 2025, https://sofrep.com/news/us-army-special-forces-to-be-deployed-on-taiwanese-island-six-miles-from-mainland-china/
  58. Recommendations for Improving the US Marine Corps’ Force Design, accessed September 7, 2025, https://www.usmcu.edu/Outreach/Marine-Corps-University-Press/Expeditions-with-MCUP-digital-journal/Improving-the-US-Marine-Corps-Force-Design/
  59. Marine Corps and Space Force Integration, accessed September 7, 2025, https://www.usmcu.edu/Outreach/Marine-Corps-University-Press/MCU-Journal/JAMS-vol-15-no-1/Marine-Corps-and-Space-Force-Integration/

The Unending Conflict: How the Character of Warfare Has Transformed in the 21st Century

The fundamental nature of conflict as a political instrument, a violent means to compel an adversary to fulfill one’s will, remains an immutable feature of international relations. Yet, over the past 50 years, the character of this conflict—the domains in which it is fought, the tools employed, and the very definitions of victory and defeat—has undergone a radical transformation. The global strategic landscape has shifted from a state of episodic, declared wars, punctuated by periods of discernible peace, to a condition of persistent, undeclared, multi-domain competition. The clear delineation between war and peace has not merely blurred; it has been deliberately eroded and is now actively exploited as a domain of strategic ambiguity.1

This report analyzes this fundamental evolution in the character of conflict. It begins by establishing a strategic baseline circa 1975, a world defined by the bipolar certainty of the Cold War. In that era, the existential threat of a massive conventional and nuclear exchange between two superpowers paradoxically forced competition into the shadows, creating and refining the playbook for today’s hybrid conflicts. The analysis then traces the profound technological and doctrinal shifts of the post-Cold War era, marked by the “Revolution in Military Affairs” (RMA), which cemented U.S. conventional military dominance but also accelerated the turn toward asymmetric strategies by its rivals.

Finally, the report examines the current state of international competition, arguing that the major powers are already engaged in a form of “undocumented conflict.” This conflict is waged continuously across new and expanded domains—economic, cyber, and informational—and is increasingly shaped by emerging technologies, most notably artificial intelligence (AI). The ultimate battlefield has expanded from physical territory to encompass critical infrastructure, financial systems, and the cognitive domain of public perception itself. The central challenge for national security in the 21st century is no longer simply preparing for a future war, but navigating the unending conflict that is already here.

Section I: The Cold War Baseline – A World of Bipolar Certainty (c. 1975)

Fifty years ago, the strategic environment was defined by a stark, bipolar clarity. The world was divided into two ideological blocs, led by the United States and the Soviet Union, locked in a competition underwritten by the threat of global thermonuclear war.5 This overarching threat of Mutually Assured Destruction created a paradoxical stability at the strategic level. While it made direct, large-scale conventional war between the superpowers unthinkable, it did not eliminate conflict. Instead, it channeled geopolitical competition into deniable, indirect, and asymmetric arenas, creating an incubator for the hybrid methods that define the modern era.

The Conventional Battlefield – The Fulda Gap and the North German Plain

The central front of the Cold War was Europe, where two of the most powerful military alliances in history stood poised for a cataclysmic conventional battle. Military doctrine and force posture on both sides were overwhelmingly focused on this potential high-intensity conflict.

NATO’s strategy was formally codified in 1967 as “Flexible Response.” This doctrine moved away from the previous policy of “Massive Retaliation” and envisioned a tiered response to Warsaw Pact aggression. An attack would be met first with a direct conventional defense, followed by the deliberate and controlled escalation to tactical, and finally strategic, nuclear weapons if necessary.6 The goal was to possess a credible deterrent at every level of the escalatory ladder. NATO’s planning called for its forces to be capable of sustaining a conventional defense in Central Europe for approximately 90 days against a full-scale invasion, allowing time for political negotiation or the decision to escalate.6 However, a sense of unreality pervaded these preparations; while doctrine called for a seamless transition from conventional to nuclear operations, all practical attempts to devise tactics for actually fighting and winning on a nuclear battlefield had proven futile.8

The Warsaw Pact, guided by Soviet military thought, held a fundamentally offensive-oriented doctrine. Soviet theorists believed that the defensive was an inherently weaker form of warfare and that decisive victory could only be achieved through the offense.9 Their plans were officially framed as a massive “counterattack” that would follow the repulse of an initial NATO assault. This offensive would depend on the overwhelming numerical superiority of Soviet-style forces, particularly their vast tank armies, to break through NATO lines along axes like the Fulda Gap and the North German Plain and rapidly advance deep into Western Europe.9 In 1975, the Warsaw Pact enjoyed a considerable numerical advantage in Central Europe, particularly in tanks and artillery, and held the geostrategic advantage of “interior lines,” which allowed for the rapid transfer of forces between fronts.10

This doctrinal standoff fueled an intense technological arms race in conventional weaponry. The mid-1970s saw the introduction of a new generation of military hardware. Tanks were upgraded with stabilized turrets and electronic fire controls, while armored personnel carriers evolved into heavier infantry fighting vehicles from which troops could fight.8 The development of potent anti-tank guided missiles (ATGMs) forced armored divisions to adopt closer cooperation between tanks and infantry.8 Armies on both sides became increasingly motorized and mechanized. This period also saw the first significant use of remotely piloted vehicles (RPVs), or drones, for surveillance and target acquisition, and the maturation of the attack helicopter as a dedicated “tank-busting” platform, a lesson learned from its massive use in Vietnam.8 This unprecedented faith in technology led to a battlefield where the number and quality of electronic systems became a primary index of an army’s modernity.8 For the U.S. Army, this era was one of doctrinal ferment, with its focus shifting cyclically between conventional warfare in Europe, the specter of nuclear conflict, and the immediate lessons of counterinsurgency in Vietnam, resulting in a tactical doctrine more complex than at any other point in its history.12

The Shadow War – Proxy Conflicts and Clandestine Operations

While the armies in Europe planned for a war that never came, the actual superpower conflict was being fought—brutally and continuously—in the shadows and across the developing world. The high risk of nuclear escalation made direct confrontation too dangerous, turning proxy wars and clandestine operations into the primary instruments of geopolitical competition.14

Proxy wars were the main event of the Cold War, accounting for an estimated 20 million deaths, almost all of which occurred in the “Third World”.14 These conflicts were ostensibly local or regional disputes, but they became battlegrounds for the larger ideological struggle between capitalism and communism.16 The superpowers avoided direct military clashes but fueled the fighting by providing massive amounts of funding, weaponry, training, and political backing to their respective surrogate forces.14 The Vietnam War, which saw the United States supporting South Vietnam against the Soviet- and Chinese-backed North, was the most devastating example.5 Other major proxy conflicts of the era included the Angolan Civil War, where the Soviet Union and Cuba backed the MPLA against U.S.-supported factions 18, and the Ogaden War, where the superpowers switched allegiances, with the Soviets ultimately backing Ethiopia against U.S.-supported Somalia.21 These interventions allowed the superpowers to test strategies and military hardware while avoiding a direct “hot war,” but they left a legacy of devastation and long-term instability in the regions where they were fought.16

Parallel to these overt-by-proxy conflicts was a relentless, clandestine war fought by the intelligence agencies of both blocs. The CIA and the KGB engaged in a global struggle for influence through espionage, subversion, and covert action. The CIA’s activities included political subversion, such as providing financial support to officers plotting against Chile’s Salvador Allende before the 1973 coup, and paramilitary operations, such as arming and training mujahideen guerrillas in Afghanistan in the following decade.23 The agency also engaged in numerous, and often bizarre, assassination plots against figures like Fidel Castro.23 Espionage was rampant, with both sides dedicating immense resources to stealing military-industrial secrets and recruiting high-level agents within the other’s government and intelligence services.23 The KGB was notoriously effective in this domain, having infiltrated Western intelligence agencies to the point where the CIA was often “utterly ignorant of Soviet espionage operations” against it.25

The KGB, for its part, conducted what it termed “executive actions” or “wet work” (liquidations) through its secretive 13th Department.26 These operations targeted defectors, dissidents, and other “ideological opponents” abroad with the aim of silencing anti-Soviet voices and sowing fear within émigré communities.26 To maintain plausible deniability, the KGB often employed exotic methods, such as the ricin-filled pellet fired from a modified umbrella used to kill Bulgarian dissident Georgi Markov in London in 1978, and frequently relied on the intelligence services of allied Eastern Bloc nations to carry out the “dirty work”.26 In Africa, Soviet clandestine operations were particularly large-scale, as the KGB and GRU (military intelligence) worked to counter U.S. influence, supply arms to anti-government groups, and exploit the relatively weak capabilities of local security services to establish intelligence networks.27

This history reveals a significant divergence between the war that was being planned for and the war that was actually being waged. While the formal military doctrines of both NATO and the Warsaw Pact were fixated on a decisive, large-scale conventional battle in Europe, the true character of superpower conflict was predominantly irregular, clandestine, and fought through third parties. This created a deep reservoir of institutional knowledge and operational expertise in unconventional warfare, political subversion, and deniable operations within the intelligence and special operations communities. This expertise, developed in the shadows of the Cold War, would prove highly relevant in the multipolar, ambiguous security environment that followed.

Section II: The Technological Rupture – The Revolution in Military Affairs (RMA)

Beginning in the 1970s and accelerating dramatically after the end of the Cold War, a suite of new technologies catalyzed a fundamental shift in the conduct of conventional warfare. This “Revolution in Military Affairs” (RMA) was characterized by the integration of advanced surveillance, precision-guided weaponry, and networked command and control, creating an era of unparalleled U.S. military dominance.31 However, this very dominance had a profound and unintended consequence: it rendered symmetrical, conventional warfare an untenable option for potential adversaries, thereby accelerating their pivot toward the asymmetric and hybrid methods that now define the contemporary conflict landscape.

The Dawn of Precision and Stealth

Two technologies in particular formed the core of the RMA: precision-guided munitions and stealth.

Precision-Guided Munitions (PGMs), or “smart bombs,” fundamentally altered the calculus of air power. The ability to guide a weapon to its target with a high degree of accuracy represented a quantum leap in lethality and efficiency.33 During the Vietnam War, PGMs proved to be up to 100 times more effective than their unguided “dumb bomb” counterparts.35 This was starkly illustrated by the destruction of the Thanh Hoa Bridge in North Vietnam in 1972. The bridge, a critical supply line, had withstood hundreds of sorties and the loss of numerous aircraft over several years of conventional bombing, but was finally dropped by a small number of aircraft using laser-guided bombs.33 The 1991 Persian Gulf War served as the global debut for this capability on a massive scale. Coalition forces demonstrated that PGMs could destroy Iraqi armored vehicles with pinpoint accuracy in a process pilots dubbed “tank plinking”.33 Overall, while guided munitions accounted for only 9% of the total ordnance used in the war, they were responsible for 75% of all successful hits, proving 35 times more likely to destroy their target per weapon dropped than unguided bombs.33 This shifted the logic of bombing from achieving effects through mass to achieving them through precision.34

Stealth Technology provided the means to deliver these precision weapons by rendering aircraft nearly invisible to enemy radar. Platforms like the F-117 Nighthawk and the B-2 Spirit bomber were designed with faceted shapes and coated in radar-absorbent materials to reduce their radar cross-section (RCS) by several orders of magnitude.37 This innovation effectively negated decades of investment by adversaries in sophisticated integrated air defense systems.39 Like PGMs, stealth technology had its coming-out party during the Gulf War. F-117s flew with impunity over Baghdad, one of the most heavily defended cities in the world at the time, and decimated critical Iraqi command and control nodes, air defense sites, and other high-value targets. No stealth aircraft were lost in the conflict.39

The true power of the RMA, however, lay not in these individual technologies but in their integration into a networked “System of Systems”.40 This concept linked intelligence, surveillance, and reconnaissance (ISR) platforms—such as satellites, spy planes, and drones—with command, control, and communications (C3) networks and precision-strike assets.31 This synergy created a virtuous cycle: ISR assets could find a target, the network could rapidly transmit that information to a decision-maker and a shooter, and a precision weapon could destroy the target with high probability. This integration of technology, doctrine, and organization produced a dramatic increase in military effectiveness.31

Doctrinal Transformation and Asymmetric Consequences

This technological revolution was accompanied by a doctrinal one within the U.S. military. Reeling from the experience in Vietnam and absorbing the lessons of the 1973 Yom Kippur War—where modern ATGMs and surface-to-air missiles (SAMs) inflicted heavy losses on Israeli armor and aircraft—the U.S. Army undertook a profound intellectual reassessment.41

In 1976, the Army published Field Manual 100-5, Operations, which codified a new doctrine known as “Active Defense”.44 This doctrine was a radical departure from previous thinking, focusing almost exclusively on a high-intensity, conventional battle against the Soviet Union in Europe.44 It was heavily focused on firepower, emphasizing the need to “win the first battle of the next war” by attriting the numerically superior Warsaw Pact forces with technologically advanced weaponry.45 Active Defense was controversial, however, and criticized for being too defensive and ceding the initiative to the enemy.41

This critique led to another doctrinal evolution. In 1982, the Army released a new version of FM 100-5 that introduced the concept of AirLand Battle.41 This doctrine was more aggressive and maneuver-oriented, designed specifically to defeat the Soviet operational concept of echeloned attacks.43 AirLand Battle envisioned an “extended battlefield” where U.S. forces would not just defend against the enemy’s front-line troops but would use integrated air power and long-range fires to attack and disrupt their follow-on echelons, command posts, and logistics deep in the rear.42 This required unprecedented levels of cooperation between the Army and the Air Force and was a perfect doctrinal match for the emerging technologies of the RMA.48

The stunning success of this new American way of war in the 1991 Gulf War had a chilling effect on potential adversaries. It became clear that challenging the United States in a conventional, state-on-state conflict was a recipe for swift and certain defeat. This reality, however, did not lead to a more peaceful world. Instead, it created a “compelling logic for states and non-state actors to move out of the traditional mode of war”.51 Unable to compete symmetrically, adversaries were forced to invest in asymmetric capabilities and strategies that could bypass or neutralize U.S. technological strengths.32 This strategic adaptation accelerated the global shift toward the very hybrid, irregular, and grey-zone methods that had been practiced during the Cold War. The RMA, in effect, made conventional war obsolete for most actors, thereby making unconventional conflict the new norm. The U.S. military had perfected a doctrine for fighting a specific adversary in a specific way, just as that adversary collapsed and the fundamental character of conflict was shifting beneath its feet.

Section III: The Expanded Battlefield – Hybrid Actors in New Domains

The end of the Cold War and the subsequent era of U.S. conventional military primacy did not end great power competition; it merely displaced it. Conflict migrated from the physical battlefield into non-physical and previously non-militarized domains. We have entered a state of persistent, low-level conflict where the distinction between peace and war is not simply blurred but is actively manipulated as a strategic tool. Adversaries now operate in a “grey zone,” employing hybrid methods to achieve strategic objectives without crossing the threshold of overt warfare.

The New Domains of Contestation

The modern battlefield is no longer confined to land, sea, and air. It has expanded to encompass the global economic system, digital networks, and the critical infrastructure that underpins modern society.

Economic Warfare has evolved into a primary instrument of statecraft, a sophisticated method of coercion that leverages global interdependence as a weapon.52 The “weaponization of finance” allows states, particularly the United States with its control over the global dollar-based financial system, to “cripple [countries] financially” through targeted sanctions against individuals, companies, and entire sectors of an economy.52 The unprecedented sanctions imposed on Russia following its 2022 invasion of Ukraine, which froze central bank assets and cut off major banks from international payment systems, demonstrate the power of this tool.56 Similarly, the “weaponization of trade” involves using tariffs, embargoes, and regulatory barriers to induce policy changes in a target state by exploiting economic dependencies.53 China’s campaign of economic coercion against Australia, which targeted key exports like wine, barley, and coal after Australia called for an inquiry into the origins of COVID-19, is a prime example of this strategy in action.59 Russia has also long used its position as a major energy supplier to Europe as a tool of political leverage, manipulating gas prices and threatening supply cutoffs to achieve foreign policy goals.62 This trend transforms economic interdependence from a source of mutual benefit into a critical vulnerability.55

Cyber Warfare has matured from a tool of espionage into a distinct domain of military operations. The watershed moment was the 2010 Stuxnet attack, a highly sophisticated computer worm believed to be a joint U.S.-Israeli operation. Stuxnet infiltrated Iran’s Natanz nuclear facility and caused physical damage to its uranium enrichment centrifuges, demonstrating for the first time that malicious code could produce kinetic effects.67 Since then, state-sponsored cyber operations have become commonplace. Advanced Persistent Threat (APT) groups linked to the governments of China, Russia, Iran, and North Korea now routinely conduct campaigns against adversaries.71 Their objectives range from espionage and intellectual property theft to prepositioning for future disruptive attacks on critical infrastructure, including telecommunications, energy grids, and transportation networks.74

Critical Infrastructure has become a new front line. The physical systems that support the global economy and information flow are now considered legitimate targets for grey-zone aggression. Undersea cables, which carry an estimated 99% of all transoceanic digital communications and trillions of dollars in financial transactions daily, are a point of extreme vulnerability.78 This vast network is susceptible to damage from both accidental causes, like fishing trawlers and dragging anchors, and deliberate sabotage.80 State actors, particularly Russia, are developing the capabilities to target these cables. Russia’s Main Directorate for Deep-Water Research (GUGI) operates specialized submarines and surface vessels, such as the

Yantar, which are equipped for deep-sea operations and have been observed loitering near critical cable routes.78 Recent incidents in the Baltic Sea, where data cables and a gas pipeline were damaged by a Chinese-flagged vessel dragging its anchor, have heightened concerns about coordinated hybrid attacks.83 The key strategic advantage of such attacks is the challenge of attribution. It is exceptionally difficult to prove that a cable cut by a commercial vessel was an intentional act of state-sponsored sabotage rather than an accident, providing the aggressor with plausible deniability and complicating any response by NATO or other targeted nations.78

The Doctrine of Ambiguity – Hybrid and Grey-Zone Warfare

To describe this new era of persistent, ambiguous conflict, analysts have developed two interrelated concepts: grey-zone conflict and hybrid warfare.

The Grey Zone is the conceptual space in which this competition occurs. It is defined by the Center for Strategic and International Studies (CSIS) as “the contested arena somewhere between routine statecraft and open warfare”.86 It is a realm of coercive and subversive activity deliberately designed to remain below the threshold that would provoke a conventional military response.1 In this space, revisionist powers like Russia and China use a range of non-military and quasi-military tools—including information operations, political and economic coercion, cyber operations, and the use of proxies—to gradually achieve strategic gains and weaken adversaries without triggering a full-scale war.86

Hybrid Warfare is the methodology employed within the grey zone. It is not a new form of warfare, but rather the integrated and synchronized application of multiple instruments of power—conventional and unconventional, military and non-military, overt and covert—in a unified campaign to achieve a strategic objective.89 Russia’s 2014 annexation of Crimea and subsequent intervention in the Donbas region of Ukraine is the archetypal modern example. This operation seamlessly blended the use of deniable special forces (“little green men”), local proxy militias, economic pressure, cyberattacks, and a sophisticated, multi-platform disinformation campaign to achieve its goals before the West could formulate a coherent response.51

This environment has also transformed the nature of Proxy Warfare. The Cold War model of two superpowers manipulating client states has been replaced by a far more complex, multipolar system.96 Today’s sponsors include not only great powers but also ambitious regional actors like Iran, Saudi Arabia, Turkey, and the UAE. The proxies themselves are no longer just state armies but a diverse ecosystem of non-state actors, including militias, transnational terrorist groups, private military companies, and political movements, many with their own ideologies and agendas that may diverge from those of their sponsors.96 The proliferation of advanced technology, from anti-tank missiles to armed drones and secure communications, has made these proxy forces more lethal and capable than ever before.101 Modern proxy battlefields, such as the Syrian civil war, are characterized by a dizzying array of local and international actors, with multiple sponsors backing various factions, creating a complex and brutal multi-sided conflict.14 Iran’s long-standing support for Hezbollah is a prime example of a modern proxy relationship, where financial aid, weapons, and training have cultivated a formidable non-state actor that serves as a key instrument of Iranian foreign policy.106

The defining trend of this new era is the normalization of hostile acts. Actions that would have once been considered casus belli—such as sabotage of critical national infrastructure, systemic economic coercion, or major cyberattacks against government and industry—are now treated as features of routine international competition. This has shifted the nature of conflict from an episodic state of declared war to a persistent condition of undeclared competition. In this grey zone, ambiguity is not a byproduct of conflict; it is a central objective and a strategic weapon. The ability to conduct a hostile act while making attribution difficult or impossible paralyzes the victim’s decision-making process and allows the aggressor to act with a degree of impunity.

FeatureUnited States / WestRussian FederationPeople’s Republic of China
Doctrine NameGrey-Zone / Hybrid Warfare ResponseNew Generation Warfare / Gerasimov DoctrineThree Warfares / Systems Destruction Warfare
Primary ObjectiveMaintain status quo; deter/counter aggression; manage escalationRevise post-Cold War order; re-establish sphere of influence; destabilize adversariesAchieve regional hegemony; displace U.S. influence; unify Taiwan; secure resource access
Key Tools / MethodsSanctions; support to partners/proxies; cyber operations; special operations forces; freedom of navigation operations (FONOPs)Information-psychological warfare; cyber operations; economic coercion (esp. energy); use of deniable special forces and proxies; political subversionPublic opinion warfare; psychological warfare; legal warfare (lawfare); economic coercion (trade, investment); cyber espionage; maritime militia
Role of MilitaryPrimarily a deterrent and response force; kinetic action is a last resort, often through SOF or proxiesConcealed military means supplement non-military efforts; special forces (Spetsnaz) and conventional forces are used for intimidation and decisive actionMilitary presence (PLA) creates physical leverage; used for intimidation and coercion (grey-zone tactics); prepared for decisive conventional action if necessary
Role of InformationReactive; focus on countering disinformation and attributionCentral; aims to alter consciousness, create domestic chaos in target state, and achieve “information superiority” before kinetic actionFoundational; aims to control the narrative, shape domestic and international opinion, demoralize the adversary, and legitimize CCP actions
Sources8689111

Section IV: The Cognitive Domain – The Battle for Perception

Perhaps the most fundamental transformation in the character of conflict over the past half-century has been the elevation of the human mind and collective public perception as a primary, and often decisive, battlefield. The strategic objective is increasingly not to defeat an enemy’s military forces, but to erode their society’s cohesion, paralyze their political will, and manipulate their very understanding of reality. This is narrative warfare, and its tools have evolved from state-controlled broadcast media to a global, AI-powered, social media-driven disinformation engine.

The Weaponization of Media and Social Media

The power of modern media to shape conflict was evident throughout the late 20th century, but the rise of the internet and social media in the 21st century created a new paradigm.

The Arab Spring, beginning in late 2010, was the first major geopolitical event to showcase the power of social media as a tool for political mobilization. Activists across Tunisia, Egypt, and other nations used platforms like Facebook, Twitter, and YouTube to organize protests, share information about government brutality, and bypass state-controlled media censorship to broadcast their message to a global audience.115 In Egypt, the “We Are All Khaled Said” Facebook page became a rallying point for a movement that ultimately toppled a decades-old regime.117 This demonstrated the potential for these new platforms to empower organic, bottom-up movements and challenge authoritarian control.120

However, state actors quickly recognized the power of these tools and began to co-opt them for their own purposes, leading to the industrialization of influence operations. The most prominent example is Russia’s Internet Research Agency (IRA), a state-sponsored “troll farm” dedicated to conducting online influence operations.121 The IRA’s tactics, revealed in detail following its interference in the 2016 U.S. presidential election, involve a sophisticated, multi-layered approach. Operators create and manage vast networks of fake social media accounts, or “bots,” designed to impersonate real citizens.122 These accounts are used to amplify divisive narratives, spread disinformation, and infiltrate online communities on both the political left and right, with the overarching goal of exacerbating existing social divisions and eroding trust in democratic institutions.123 The IRA’s methods include “narrative switching,” where accounts post non-political content most of the time to build a credible persona before injecting targeted political messages, and organizing real-world events, such as opposing protests, to bring online division into the physical world.122

This weaponization of information is not merely opportunistic; it is now a core component of state military doctrine. China’s concept of the “Three Warfares” explicitly codifies this approach. It includes “public opinion warfare” to dominate narratives and ensure domestic and international support, “psychological warfare” to demoralize an adversary and weaken their will to fight, and “legal warfare” (lawfare) to use international and domestic law to challenge the legitimacy of an opponent’s actions.114 Similarly, Russia’s doctrine of

“New Generation Warfare” (often associated with General Valery Gerasimov) views “information-psychological warfare” as a critical tool for achieving strategic goals by creating domestic chaos within a target state, often before any military action is taken.3 The Syrian Civil War serves as a stark case study of this new reality, where a brutal physical conflict has been accompanied by a relentless narrative war waged by all factions—the Assad regime, various rebel groups, and their respective foreign backers (including Russia, Iran, and Western powers)—each using traditional and social media to frame the conflict, legitimize their actions, and demonize their opponents.125

The AI-Powered Disinformation Engine

If social media provided the platform for modern information warfare, artificial intelligence is now providing the engine, promising to “supercharge” disinformation campaigns by dramatically increasing their speed, scale, and sophistication.130

The most alarming development is the rise of deepfakes and other forms of synthetic media. Using advanced AI techniques like generative adversarial networks (GANs), malicious actors can now create highly realistic but entirely fabricated audio and video content.132 This technology makes it possible to convincingly impersonate political leaders, military officials, or other public figures, having them appear to say or do things they never did.134 The national security implications are profound. A well-timed deepfake video could be used to fabricate a scandal to influence an election, spread false orders to military units to create chaos, or create a fake atrocity to serve as a pretext for war.135 An AI-generated image of an explosion at the Pentagon in 2023 briefly caused a dip in the U.S. stock market, demonstrating the real-world impact of such fabrications.137

Beyond deepfakes, AI is being used to automate and personalize propaganda on an unprecedented scale. Large language models can now generate false news articles and social media posts that are often indistinguishable from human-written content.138 These tools can be used to create tailored messages designed to appeal to the specific psychological vulnerabilities of target audiences, and to automate the operation of vast bot networks that can amplify these messages across multiple platforms.130 This dramatically lowers the barrier to entry for conducting large-scale influence operations, making these powerful tools available not just to states, but to a wide range of malicious actors.138

The cumulative effect of this AI-driven information warfare is not simply the spread of more falsehoods. Its ultimate strategic objective is the erosion of trust itself. The goal is not necessarily to make people believe in a specific lie, but to destroy their confidence in all sources of information—in the media, in government institutions, in scientific experts, and ultimately, in their own ability to discern fact from fiction. This fosters a state of what can be called “epistemic exhaustion,” where citizens become so overwhelmed by the flood of conflicting information that they disengage from civic life, making them passive and more susceptible to manipulation. A population that trusts nothing cannot form the consensus required to recognize and counter a national security threat, thereby achieving an adversary’s goal of societal paralysis without firing a single shot.

Section V: The Next Revolution – The AI-Enabled Battlespace

Just as the integration of precision, stealth, and networking catalyzed a Revolution in Military Affairs at the end of the 20th century, artificial intelligence is now driving another profound transformation in the character of warfare. This emerging revolution is centered on three key elements: the compression of decision-making to machine speed, the proliferation of intelligent autonomous systems, and the dominance of data as the central resource of military power. This shift promises unprecedented efficiency but also introduces complex new risks of escalation and loss of human control.

Accelerating the Kill Chain – AI in Intelligence and C2

Modern military operations are drowning in data. A torrent of information flows from satellites, drones, ground sensors, and countless other sources, far exceeding the capacity of human analysts to process it in a timely manner.140 Artificial intelligence is becoming the essential tool for turning this data overload into a decisive advantage.

The U.S. Department of Defense’s Project Maven (officially the Algorithmic Warfare Cross-Functional Team) is a flagship initiative in this area. Launched in 2017, Maven employs machine learning algorithms to automatically analyze full-motion video from drones and other ISR platforms.142 The system can detect, classify, and track objects of interest—such as vehicles, buildings, or groups of people—freeing human analysts from the tedious task of watching countless hours of footage and allowing them to focus on higher-level analysis and decision-making.144 This capability dramatically accelerates the intelligence cycle, reducing the time it takes to find and validate a target from hours or days to minutes or even seconds.146

This accelerated intelligence is being fed into increasingly AI-enhanced Command and Control (C2) systems. The objective is to create a seamless, networked architecture that connects any sensor to any decision-maker and any weapon system on the battlefield. This concept is at the heart of the U.S. military’s overarching strategy for Joint All-Domain Command and Control (JADC2).147 AI algorithms within these C2 systems can fuse data from disparate sources to create a unified, real-time operational picture, predict enemy movements, analyze potential courses of action, and recommend optimal responses to commanders.140 The ultimate goal is to radically compress the “sensor-to-shooter” timeline, enabling forces to act at a tempo that overwhelms an adversary’s ability to react.

This pursuit of AI-driven military advantage has ignited a fierce technological competition, often described as an AI arms race, primarily between the United States and China.150 China has made AI a national priority and is pursuing a strategy of “military-civil fusion” to systematically leverage the expertise and innovation of its burgeoning private tech sector and universities for military modernization.111 Beijing’s goal is to achieve “intelligentized warfare,” using AI to achieve “decision dominance” through a highly integrated “systems warfare” approach.111 While the United States is widely seen as maintaining a lead in developing the most advanced, cutting-edge AI models, China’s state-directed approach gives it an advantage in the broad-scale adoption and practical integration of AI technologies across its military and economy.153

The Proliferation of Autonomy

The most visible and disruptive impact of AI on the battlefield is the proliferation of autonomous and semi-autonomous systems, particularly unmanned aerial vehicles (UAVs).

The drone revolution has unfolded in two parallel tracks. On one end of the spectrum are sophisticated, reusable military drones like the Turkish Bayraktar TB2. In conflicts such as the 2020 Nagorno-Karabakh war, the TB2 proved devastatingly effective, combining long-endurance surveillance with precision-guided munitions to destroy Armenian air defenses, armor, and artillery, effectively dominating the battlefield.154 On the other end of the spectrum is the widespread use of cheap, commercially available, and often disposable drones, a trend brought to the forefront by the war in Ukraine. Both sides have deployed thousands of small quadcopters for reconnaissance and, more significantly, as first-person-view (FPV) “kamikaze” drones capable of destroying multi-million-dollar tanks and other armored vehicles.157 This has created a new reality of attritional drone warfare, where the low cost and sheer quantity of these systems can overwhelm even sophisticated defenses.159

This trend points toward the next frontier of military autonomy: Lethal Autonomous Weapon Systems (LAWS), colloquially known as “killer robots.” These are weapon systems that, once activated, can independently search for, identify, target, and kill human beings without direct human control over the final lethal decision.150 The development of LAWS raises profound legal and ethical challenges. Organizations like the International Committee of the Red Cross (ICRC) have raised serious concerns about whether such systems can comply with the core principles of International Humanitarian Law (IHL), such as distinction, proportionality, and precaution.163 Key questions revolve around accountability—who is responsible when an autonomous weapon makes a mistake?—and the fundamental ethical principle of “meaningful human control” over the use of lethal force.166 In response to these concerns, the ICRC and numerous other bodies have called for the negotiation of new, legally binding international rules to prohibit unpredictable autonomous systems and those that target humans directly.162

The relentless pace of technological development is creating a strategic environment where the speed of combat is poised to exceed the limits of human cognition. As AI-enabled C2 systems compress decision cycles to seconds and autonomous weapons are designed to react instantly to threats, conflicts between two AI-enabled militaries may be fought and decided at machine speed, potentially before human commanders can fully comprehend the situation or intervene. This creates an inescapable and dangerous strategic logic: to remain competitive, militaries feel compelled to delegate more and more decision-making authority to AI systems, despite the profound ethical concerns and the immense risk of rapid, unintended escalation.171

Furthermore, the proliferation of cheap, effective, and increasingly autonomous systems is upending the traditional military-technical balance. The war in Ukraine has vividly demonstrated the problem of “cost asymmetry,” where inexpensive drones, costing only a few thousand dollars, can neutralize or destroy highly valuable military assets like tanks and warships that cost millions.158 Defending against swarms of these cheap drones with expensive, sophisticated air defense missiles is an economically unsustainable proposition.160 This challenges the entire Western military model, which has for decades relied on a relatively small number of expensive, technologically superior platforms. The future battlefield may not be dominated by the nation with the most advanced fighter jet, but by the one that can deploy the largest, most adaptable, and most intelligent swarm of inexpensive, autonomous, and attritable systems.

Conclusion: A State of Undocumented, Perpetual Conflict

The evidence of the past 50 years is conclusive: while the fundamental nature of war as a political act has not changed, its character has been irrevocably transformed. The clear, binary world of the Cold War, with its defined states of “peace” and “war,” has been replaced by a state of persistent, multi-domain competition. The lines have not just blurred; they have been erased and weaponized. The major powers are not on the brink of a new conflict; they are, and have been for some time, engaged in one. It is an undocumented, undeclared, and unending conflict fought not primarily with massed armies on physical battlefields, but with a new arsenal of hybrid tools across a vastly expanded battlespace.

This transformation has been driven by a confluence of factors. The nuclear stalemate of the Cold War forced competition into the shadows, normalizing the use of proxies, covert action, and political subversion. The subsequent Revolution in Military Affairs created such a profound U.S. advantage in conventional warfare that it compelled adversaries to abandon symmetrical competition and double down on these asymmetric, hybrid methods. The globalization of finance and information, coupled with the proliferation of cyber capabilities and advanced technologies, provided the new domains—economic, digital, and cognitive—in which this competition would be waged.

Today, Russia, China, the United States, and other powers are engaged in a constant struggle for advantage in the grey zone. This is a conflict fought with sanctions designed to cripple economies, with cyberattacks that probe critical infrastructure, with deniable sabotage of undersea cables, with proxy forces that allow for influence without attribution, and, most pervasively, with information campaigns designed to fracture societies from within.

The advent of artificial intelligence is now catalyzing the next revolution, one that promises to accelerate the speed of conflict beyond human comprehension. AI is transforming intelligence analysis, command and control, and the very nature of weaponry, pushing toward a future of algorithmic warfare and autonomous systems. This raises the specter of a battlefield where decisions are made in microseconds and escalation can occur without deliberate human intent.

In this new era, the traditional concept of “victory” is becoming obsolete. Victory is no longer solely defined by a signed treaty or a captured capital. It may be the successful paralysis of a rival’s economy through financial warfare 55; the quiet degradation of their military readiness through sustained cyber espionage 76; the fracturing of their political system through a multi-year disinformation campaign 123; or the achievement of a decisive technological breakthrough in AI that renders an adversary’s entire military doctrine irrelevant.150

The greatest danger of this new paradigm is not necessarily a deliberate, cataclysmic war, but the potential for uncontrollable escalation out of the grey zone. A miscalculation in a proxy conflict, a cyberattack with unforeseen cascading effects, or the autonomous action of an AI-powered weapon system could trigger a rapid spiral into a conventional conflict that no party initially intended. The central challenge for national security in the 21st century is therefore twofold: not only to prepare to win the wars of the future, but to learn how to successfully navigate the unending, undocumented conflict that is already here.


If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly donate to help fund our continued report, please visit our donations page.


Sources Used

  1. Grey-zone (international relations) – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Grey-zone_(international_relations)
  2. The Blurring Of War And Peace: Hybrid Warfare – Analysis …, accessed September 30, 2025, https://www.eurasiareview.com/19042021-the-blurring-of-war-and-peace-hybrid-warfare-analysis/
  3. The Russian Understanding of War: Blurring the Lines Between War and Peace, accessed September 30, 2025, https://ndupress.ndu.edu/Media/News/News-Article-View/Article/2131233/the-russian-understanding-of-war-blurring-the-lines-between-war-and-peace/
  4. The Opposite of War is Not Peace – Futurist Speaker, accessed September 30, 2025, https://futuristspeaker.com/future-scenarios/the-opposite-of-war-is-not-peace-2/
  5. Cold War – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Cold_War
  6. Historical Documents – Office of the Historian, accessed September 30, 2025, https://history.state.gov/historicaldocuments/frus1969-76v41/d52
  7. NATO and The Cold War | Imperial War Museums, accessed September 30, 2025, https://www.iwm.org.uk/learning/resources/nato-and-the-cold-war
  8. Tactics – Conventional War, Terrorism, Strategy – Britannica, accessed September 30, 2025, https://www.britannica.com/topic/tactics/From-conventional-war-to-terrorism
  9. What was Warsaw Pact defence strategy if NATO invaded them? : r/WarCollege – Reddit, accessed September 30, 2025, https://www.reddit.com/r/WarCollege/comments/1leggj2/what_was_warsaw_pact_defence_strategy_if_nato/
  10. 13. National Intelligence Estimate 11-14-75, Washington, September 4, 1975. – Historical Documents – Office of the Historian, accessed September 30, 2025, https://history.state.gov/historicaldocuments/frus1969-76ve15p1/d13
  11. NATO and Warsaw Pact: Force Comparisons, accessed September 30, 2025, https://www.nato.int/cps/en/natohq/declassified_138256.htm
  12. The Evolution of US Army Tactical Doctrine, 1946-76, accessed September 30, 2025, https://www.armyupress.army.mil/Portals/7/combat-studies-institute/csi-books/doughty.pdf
  13. The Evolution of US Army Tactical Doctrine, 1946-76 (Leavenworth Papers, Number 1), accessed September 30, 2025, https://apps.dtic.mil/sti/citations/ADA211791
  14. Proxy wars, explained | FairPlanet, accessed September 30, 2025, https://www.fairplanet.org/story/what-are-proxy-wars-and-where-are-they-happening/
  15. Proxy war – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Proxy_war
  16. Proxy wars – (US History – 1945 to Present) – Vocab, Definition, Explanations | Fiveable, accessed September 30, 2025, https://fiveable.me/key-terms/united-states-history-since-1945/proxy-wars
  17. Eight “Hot Wars” During the Cold War | CFR Education, accessed September 30, 2025, https://education.cfr.org/learn/reading/eight-hot-wars-during-cold-war
  18. The Angolan civil war (Chapter 8) – The USSR in Third World Conflicts, accessed September 30, 2025, https://www.cambridge.org/core/books/ussr-in-third-world-conflicts/angolan-civil-war/6A98027220E926A6783DFCE2A320DB15
  19. The Angola Crisis 1974–75 – Milestones in the History of U.S. Foreign Relations – Office of the Historian, accessed September 30, 2025, https://history.state.gov/milestones/1969-1976/angola
  20. Angolan Civil War – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Angolan_Civil_War
  21. “Buried in the Sands of the Ogaden”: The Horn of Africa and SALT II, 1977–1979 – Office of the Historian, accessed September 30, 2025, https://history.state.gov/milestones/1977-1980/horn-of-africa
  22. Ogaden War Between Somalia and Ethiopia | Research Starters – EBSCO, accessed September 30, 2025, https://www.ebsco.com/research-starters/history/ogaden-war-between-somalia-and-ethiopia
  23. Central Intelligence Agency – Intelligence, Surveillance, Covert Ops …, accessed September 30, 2025, https://www.britannica.com/topic/Central-Intelligence-Agency/Activities
  24. Cold War espionage – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Cold_War_espionage
  25. During cold war both KGB and CIA had high ranking moles inside their organisations. Is it known which side did better job at infiltrating their opponent and getting sensitive information as cold war progressed? : r/AskHistorians – Reddit, accessed September 30, 2025, https://www.reddit.com/r/AskHistorians/comments/4jkybw/during_cold_war_both_kgb_and_cia_had_high_ranking/
  26. A global kill list: Inside the KGB’s secret retribution operations beyond the Iron Curtain, accessed September 30, 2025, https://theins.ru/en/history/281554
  27. COVERT OPERATIONS OF THE USSR IN AFRICA Текст научной статьи по специальности – КиберЛенинка, accessed September 30, 2025, https://cyberleninka.ru/article/n/covert-operations-of-the-ussr-in-africa
  28. Africa–Soviet Union relations – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Africa%E2%80%93Soviet_Union_relations
  29. AFRICA (SOVIET POLICY) (Hansard, 6 February 1978) – API Parliament UK, accessed September 30, 2025, https://api.parliament.uk/historic-hansard/commons/1978/feb/06/africa-soviet-policy
  30. Soviet Spies in Africa: How the KGB Strengthened Soviet Influence on the Continent During the Cold War. : r/coldwar – Reddit, accessed September 30, 2025, https://www.reddit.com/r/coldwar/comments/1n91egf/soviet_spies_in_africa_how_the_kgb_strengthened/
  31. Revolutions in Military Affairs – DTIC, accessed September 30, 2025, https://apps.dtic.mil/sti/tr/pdf/ADA360252.pdf
  32. The Revolution in Military Affairs and Conflict Short … – USAWC Press, accessed September 30, 2025, https://press.armywarcollege.edu/cgi/viewcontent.cgi?article=1893&context=monographs
  33. Precision-guided munition – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Precision-guided_munition
  34. Precision Guided Munitions and the New Era of Warfare – Military Analysis Network, accessed September 30, 2025, https://man.fas.org/dod-101/sys/smart/docs/paper53.htm
  35. Getting Closer: Precision Guided Weapons in the Southeast Asia War – Air Force Museum, accessed September 30, 2025, https://www.nationalmuseum.af.mil/Visit/Museum-Exhibits/Fact-Sheets/Display/Article/195858/getting-closer-precision-guided-weapons-in-the-southeast-asia-war/
  36. Precision Guided Munitions: Revolutionizing Warfare Accuracy, accessed September 30, 2025, https://aviationanddefensemarketreports.com/precision-guided-munitions-revolutionizing-warfare-with-accuracy/
  37. Stealth aircraft – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Stealth_aircraft
  38. Stealth technology – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Stealth_technology
  39. Lessons from Stealth for Emerging Technologies – CSET, accessed September 30, 2025, https://cset.georgetown.edu/publication/lessons-from-stealth-for-emerging-technologies/
  40. Revolution in military affairs – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Revolution_in_military_affairs
  41. From Active Defense to AirLand Battle: The Development of Army Doctrine, 1973-1982, accessed September 30, 2025, https://www.tradoc.army.mil/wp-content/uploads/2020/10/From-Active-Defense-to-AirLand-Battle.pdf
  42. What did AirLand Battle address that previous NATO Cold War strategies were failing at? : r/WarCollege – Reddit, accessed September 30, 2025, https://www.reddit.com/r/WarCollege/comments/b8q6k0/what_did_airland_battle_address_that_previous/
  43. AirLand Battle: The Development of a Doctrine – DTIC, accessed September 30, 2025, https://apps.dtic.mil/sti/pdfs/AD1119406.pdf
  44. THE POLITICAL CONTEXT OF US ARMY DOCTRINE, 1974-1976 | Small Wars Journal by Arizona State University, accessed September 30, 2025, https://smallwarsjournal.com/2020/10/29/political-context-us-army-doctrine-1974-1976/
  45. How was the Military doctrine of active defense born? : Focusing on the process of writing the FM 100-5 Operations 1976 edition – Korea Journal Central, accessed September 30, 2025, http://journal.kci.go.kr/imhc/archive/articleView?artiId=ART002939313
  46. Doctrinal Development—AirLand Battle – Army University Press, accessed September 30, 2025, https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/MR-75th-Anniversary/75th-Doctrinal-AirLand/
  47. AirLand Battle and Modern Warfare, accessed September 30, 2025, https://www.nids.mod.go.jp/english/event/forum/pdf/2014/09.pdf
  48. WAR ON THE 21ST CENTURY BATTLEFIELD: REVISITING GENERAL STARRY’S CONCEPTUAL FRAMEWORK, accessed September 30, 2025, https://warroom.armywarcollege.edu/articles/conceptual-framework/
  49. AirLand Battle Doctrine – MERIP, accessed September 30, 2025, https://merip.org/1983/01/airland-battle-doctrine/
  50. The Lessons of AirLand Battle and the 31 Initiatives for Multi-Domain Battle – RAND, accessed September 30, 2025, https://www.rand.org/content/dam/rand/pubs/perspectives/PE300/PE301/RAND_PE301.pdf
  51. Countering Hybrid Warfare: Conceptual Foundations and Implications for Defence Forces – GOV.UK, accessed September 30, 2025, https://assets.publishing.service.gov.uk/media/5da9a79ae5274a5ca507c6bb/20190401-MCDC_CHW_Information_note_-_Conceptual_Foundations.pdf
  52. Weaponization of Finance – Encyclopedia.pub, accessed September 30, 2025, https://encyclopedia.pub/entry/36941
  53. The Weaponization of Trade – Columbia SIPA – Columbia University, accessed September 30, 2025, https://www.sipa.columbia.edu/sites/default/files/migrated/downloads/Capstone%2520Report%2520%2528Eurasia%2520Group%2529.pdf
  54. Weaponizing Trade – CSIS, accessed September 30, 2025, https://www.csis.org/analysis/weaponizing-trade
  55. Weaponizing Financial and Trade Flows: The Case of Failing Western Sanctions, accessed September 30, 2025, https://internationalbanker.com/finance/weaponizing-financial-and-trade-flows-the-case-of-failing-western-sanctions/
  56. Russia Sanctions and Export Controls: U.S. Agencies Should Establish Targets to Better Assess Effectiveness, accessed September 30, 2025, https://www.gao.gov/products/gao-25-107079
  57. International sanctions during the Russo-Ukrainian War – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/International_sanctions_during_the_Russo-Ukrainian_War
  58. The Economic Impact of Russia Sanctions – Congress.gov, accessed September 30, 2025, https://www.congress.gov/crs-product/IF12092
  59. How China’s Coercive Measures Against Australia Backfired | The Heritage Foundation, accessed September 30, 2025, https://www.heritage.org/china/report/how-chinas-coercive-measures-against-australia-backfired
  60. China is still coercing Australia—with implicit threats | The Strategist, accessed September 30, 2025, https://www.aspistrategist.org.au/china-is-still-coercing-australia-with-implicit-threats/
  61. Warning from Australia: Meet the Threat of Chinese Economic Coercion to Democracy, accessed September 30, 2025, https://www.cnas.org/publications/commentary/warning-from-australia-meet-the-threat-of-chinese-economic-coercion-to-democracy
  62. Energy policy of Russia – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Energy_policy_of_Russia
  63. The Use of Energy Resources as Foreign Policy Tools: The Russian Case – ResearchGate, accessed September 30, 2025, https://www.researchgate.net/publication/344615948_The_Use_of_Energy_Resources_as_Foreign_Policy_Tools_The_Russian_Case
  64. Energy as a tool of foreign policy of authoritarian states, in particular Russia – European Parliament, accessed September 30, 2025, https://www.europarl.europa.eu/RegData/etudes/STUD/2018/603868/EXPO_STU(2018)603868_EN.pdf
  65. Russia’s Energy Diplomacy – Chatham House, accessed September 30, 2025, https://www.chathamhouse.org/sites/default/files/19352_0511bp_lough.pdf
  66. Weaponisation of finance: Regulators’ worries in a geopolitically fragile world, accessed September 30, 2025, https://www.orfonline.org/expert-speak/weaponisation-of-finance
  67. Iran’s use of cyberspace has evolved from an internal means of information control and repression to more aggressive attacks on foreign targets. The regime has been developing its own cybersecurity software and internet architecture in order to protect and insulate its networks, and it has been developing technological cyber expertise as a form of asymmetric warfare against a superior conventional US military. – Congress.gov, accessed September 30, 2025, https://www.congress.gov/crs_external_products/IF/HTML/IF11406.web.html
  68. Stuxnet | CFR Interactives, accessed September 30, 2025, https://www.cfr.org/cyber-operations/stuxnet
  69. Full article: Stuxnet, revisited (again): producing the strategic relevance of cyber operations, accessed September 30, 2025, https://www.tandfonline.com/doi/full/10.1080/23738871.2025.2492570
  70. Stuxnet: The world’s first cyber weapon – Center for International Security and Cooperation, accessed September 30, 2025, https://cisac.fsi.stanford.edu/news/stuxnet
  71. State Sponsored Cyber Warfare – Identity Management Institute®, accessed September 30, 2025, https://identitymanagementinstitute.org/state-sponsored-cyber-warfare/
  72. NSA and Others Provide Guidance to Counter China State-Sponsored Actors Targeting Critical Infrastructure Organizations – National Security Agency, accessed September 30, 2025, https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/4287371/nsa-and-others-provide-guidance-to-counter-china-state-sponsored-actors-targeti/
  73. Mutual Defense in Cyberspace: Joint Action on Attribution – CSIS, accessed September 30, 2025, https://www.csis.org/analysis/mutual-defense-cyberspace-joint-action-attribution
  74. U.S. government scrambles to stop new hacking campaign blamed on China, accessed September 30, 2025, https://www.washingtonpost.com/technology/2025/09/25/cisa-federal-hacks-cisco/
  75. What are state-sponsored cyber attacks? | F‑Secure, accessed September 30, 2025, https://www.f-secure.com/en/articles/what-are-state-sponsored-cyber-attacks
  76. Secure Cyberspace and Critical Infrastructure – Homeland Security, accessed September 30, 2025, https://www.dhs.gov/archive/secure-cyberspace-and-critical-infrastructure
  77. Countering Chinese State-Sponsored Actors Compromise of … – CISA, accessed September 30, 2025, https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-239a
  78. Submarine cable security is all at sea • The Register, accessed September 30, 2025, https://www.theregister.com/2025/09/29/submarine_cable_security_report_uk/
  79. Protection of Undersea Telecommunication Cables: Issues for Congress, accessed September 30, 2025, https://www.congress.gov/crs-product/R47648
  80. Subsea telecommunications cables: resilience and crisis preparedness – Parliament UK, accessed September 30, 2025, https://publications.parliament.uk/pa/jt5901/jtselect/jtnatsec/723/report.html
  81. International law doesn’t adequately protect undersea cables. That must change., accessed September 30, 2025, https://www.atlanticcouncil.org/content-series/hybrid-warfare-project/international-law-doesnt-adequately-protect-undersea-cables-that-must-change/
  82. Safeguarding Subsea Cables: Protecting Cyber Infrastructure amid Great Power Competition – CSIS, accessed September 30, 2025, https://www.csis.org/analysis/safeguarding-subsea-cables-protecting-cyber-infrastructure-amid-great-power-competition
  83. Hybrid Attacks Rise on Undersea Cables in Baltic and Arctic Regions – Jamestown, accessed September 30, 2025, https://jamestown.org/program/hybrid-attacks-rise-on-undersea-cables-in-baltic-and-arctic-regions/
  84. Why Russia and China May Be Cutting Europe’s Undersea Cables | WSJ – YouTube, accessed September 30, 2025, https://www.youtube.com/watch?v=pyz7nSAKF9E
  85. Risky Game: Hybrid Attack on Baltic Undersea Cables | Wilson Center, accessed September 30, 2025, https://www.wilsoncenter.org/article/risky-game-hybrid-attack-baltic-undersea-cables
  86. Gray Zone Project – CSIS, accessed September 30, 2025, https://www.csis.org/programs/gray-zone-project
  87. Gaining Competitive Advantage in the Gray Zone: Response Options for Coercive Aggression Below the Threshold of Major War – RAND, accessed September 30, 2025, https://www.rand.org/content/dam/rand/pubs/research_reports/RR2900/RR2942/RAND_RR2942.pdf
  88. Today’s wars are fought in the ‘gray zone.’ Here’s everything you need to know about it., accessed September 30, 2025, https://www.atlanticcouncil.org/blogs/new-atlanticist/todays-wars-are-fought-in-the-gray-zone-heres-everything-you-need-to-know-about-it/
  89. Defining HYBRID WARFARE, accessed September 30, 2025, https://www.marshallcenter.org/sites/default/files/files/2020-05/pC_V10N1_en_Wither.pdf
  90. NATO and Countering Hybrid Warfare – CSIS, accessed September 30, 2025, https://www.csis.org/analysis/nato-and-countering-hybrid-warfare
  91. Hybrid warfare – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Hybrid_warfare
  92. Hybrid Warfare – New Threats, Complexity, and ‘Trust’ as the Antidote – NATO, accessed September 30, 2025, https://www.nato.int/docu/review/articles/2021/11/30/hybrid-warfare-new-threats-complexity-and-trust-as-the-antidote/index.html
  93. War in Donbas – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/War_in_Donbas
  94. Russia-Ukraine War | Map, Casualties, Timeline, Death Toll, Causes, & Significance | Britannica, accessed September 30, 2025, https://www.britannica.com/event/2022-Russian-invasion-of-Ukraine
  95. Ukraine: Conflict at the Crossroads of Europe and Russia | Council on Foreign Relations, accessed September 30, 2025, https://www.cfr.org/backgrounder/ukraine-conflict-crossroads-europe-and-russia
  96. TWENTY-FIRST CENTURY PROXY WARFARE – Cloudfront.net, accessed September 30, 2025, https://d1y8sb8igg2f8e.cloudfront.net/documents/Twenty-First_Century_Proxy_Warfare_Final.pdf
  97. Twenty-First Century Proxy Warfare: Confronting Strategic Innovation in a Multipolar World Since the 2011 NATO Intervention – Cloudfront.net, accessed September 30, 2025, https://d1y8sb8igg2f8e.cloudfront.net/documents/Proxy_wars_one_pager-v2.pdf
  98. Twenty-First Century Proxy Warfare: Confronting Strategic …, accessed September 30, 2025, https://www.newamerica.org/future-security/reports/twenty-first-century-proxy-warfare-confronting-strategic-innovation-multipolar-world/a-new-age-of-proxy-warfare/
  99. Engaging non-state armed actors in state- and peace … – ICRC, accessed September 30, 2025, https://www.icrc.org/sites/default/files/external/doc/en/assets/files/review/2011/irrc-883-schneckener.pdf
  100. The role of non-state actors in building human security – Centre for Humanitarian Dialogue, accessed September 30, 2025, https://hdcentre.org/wp-content/uploads/2016/07/The-role-of-non-state-actors-in-building-human-security-May-2000.pdf
  101. Twenty-First Century Proxy Warfare: Confronting Strategic Innovation in a Multipolar World, accessed September 30, 2025, https://www.newamerica.org/future-security/reports/twenty-first-century-proxy-warfare-confronting-strategic-innovation-multipolar-world/rethinking-proxy-warfare/
  102. Twenty-First Century Proxy Warfare – New America, accessed September 30, 2025, https://www.newamerica.org/future-security/reports/twenty-first-century-proxy-warfare/
  103. Timber Sycamore – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Timber_Sycamore
  104. Full article: Disposable rebels: US military assistance to insurgents in the Syrian war, accessed September 30, 2025, https://www.tandfonline.com/doi/full/10.1080/13629395.2023.2183664
  105. America Had Already Lost Its Covert War in Syria—Now It’s Official, accessed September 30, 2025, https://tcf.org/content/commentary/america-already-lost-covert-war-syria-now-official/
  106. Hezbollah–Iran relations – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Hezbollah%E2%80%93Iran_relations
  107. Hezbollah, Hamas, and More: Iran’s Terror Network Around the Globe | AJC, accessed September 30, 2025, https://www.ajc.org/news/hezbollah-hamas-and-more-irans-terror-network-around-the-globe
  108. Understanding Iran’s Use of Terrorist Groups as Proxies – American University, accessed September 30, 2025, https://www.american.edu/sis/news/20240205-understanding-irans-use-of-terrorist-groups-as-proxies.cfm
  109. Iran’s Islamist Proxies in the Middle East – Wilson Center, accessed September 30, 2025, https://www.wilsoncenter.org/article/irans-islamist-proxies
  110. U.S. vs Russian “Hybrid Warfare” Doctrine: A Comparative Glance – Grey Dynamics, accessed September 30, 2025, https://greydynamics.com/u-s-vs-russian-hybrid-warfare-doctrine-a-comparative-glance/
  111. Russia and China Look at the Future of War, accessed September 30, 2025, https://understandingwar.org/research/future-of-war/russia-and-china-look-at-the-future-of-war-2/
  112. Gerasimov doctrine (The Russian “New Generation Warfare … – WARN, accessed September 30, 2025, https://warn-erasmus.eu/glossary/doktrina-gerasimova-rosijska-vijna-novogo-pokolinnya/
  113. en.wikipedia.org, accessed September 30, 2025, https://en.wikipedia.org/wiki/Three_warfares#:~:text=%22Three%20warfares%22%20(Chinese%3A,warfare%20(also%20termed%20lawfare).
  114. Political Warfare against Intervention Forces > Air University (AU …, accessed September 30, 2025, https://www.airuniversity.af.edu/JIPA/Display/Article/4167178/political-warfare-against-intervention-forces/
  115. sites.stedwards.edu, accessed September 30, 2025, https://sites.stedwards.edu/pangaea/the-role-of-social-media-in-the-arab-spring/#:~:text=Social%20media%20helped%20Tunisia%20and,was%20happening%20instead%20of%20organizing.
  116. Social Media And The Arab Spring By Samira F. Hassan A Capstone submitted to the Graduate School Camden Rutgers, The State Univ, accessed September 30, 2025, https://mals.camden.rutgers.edu/files/Social-Media-and-the-Arab-Spring.pdf
  117. Social media’s role in the Arab Spring – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Social_media%27s_role_in_the_Arab_Spring
  118. (Social) Media and Politics and the Arab Spring Moment – IEMed, accessed September 30, 2025, https://www.iemed.org/publication/social-media-and-politics-and-the-arab-spring-moment/
  119. The Legacy of the “Facebook Revolution”: How did the Arab Spring shape citizen use of social media? – King’s Think Tank, accessed September 30, 2025, https://kingsthinktankspectrum.wordpress.com/2025/01/30/the-legacy-of-the-facebook-revolution-how-did-the-arab-spring-shape-citizen-use-of-social-media/
  120. The Influence of Social Media in Egypt during The Arab Spring – SIT Digital Collections, accessed September 30, 2025, https://digitalcollections.sit.edu/capstones/2944/
  121. Internet Research Agency – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Internet_Research_Agency
  122. How Russia’s Internet Research Agency Built its … – -ORCA, accessed September 30, 2025, https://orca.cardiff.ac.uk/id/eprint/122489/1/Political%20Quarterly%20IRA%20Dawson%20&%20Innes.pdf
  123. Fact Sheet: What We Know about Russia’s Interference Operations – German Marshall Fund, accessed September 30, 2025, https://www.gmfus.org/news/fact-sheet-what-we-know-about-russias-interference-operations
  124. “The Tactics & Tropes of the Internet Research Agency” by Renee DiResta, Kris Shaffer et al. – UNL Digital Commons – University of Nebraska–Lincoln, accessed September 30, 2025, https://digitalcommons.unl.edu/senatedocs/2/
  125. Conflict Propaganda in Syria: Narrative Battles – 1st Edition – Oliver – Routledge, accessed September 30, 2025, https://www.routledge.com/Conflict-Propaganda-in-Syria-Narrative-Battles/Boyd-Barrett/p/book/9780367697488
  126. Syrian revolution and the conflict over narratives | SyriaUntold – حكاية ما انحكت, accessed September 30, 2025, https://syriauntold.com/2021/03/19/syrian-revolution-and-the-conflict-over-narratives/
  127. The Battle of the Narratives Around Syria | German Marshall Fund of the United States, accessed September 30, 2025, https://www.gmfus.org/news/battle-narratives-around-syria
  128. How did combatants’ narratives and social media shape Syria’s civil war? | ClarkU News, accessed September 30, 2025, https://www.clarku.edu/news/2024/02/29/how-did-combatants-narratives-social-media-shape-syrias-civil-war/
  129. LESSONS FROM SYRIA’S LOW-PROFILE NARRATIVE WAR, accessed September 30, 2025, https://warroom.armywarcollege.edu/articles/narrative-war/
  130. AI and the Future of Disinformation Campaigns | Center for Security and Emerging Technology, accessed September 30, 2025, https://cset.georgetown.edu/publication/ai-and-the-future-of-disinformation-campaigns-2/
  131. AI and the Future of Disinformation Campaigns | Center for Security and Emerging Technology – CSET, accessed September 30, 2025, https://cset.georgetown.edu/publication/ai-and-the-future-of-disinformation-campaigns/
  132. Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media – IEEE Computer Society, accessed September 30, 2025, https://www.computer.org/csdl/magazine/sp/2024/04/10552098/1XApkaTs5l6
  133. Understanding Offensive AI vs. Defensive AI in Cybersecurity – Abnormal AI, accessed September 30, 2025, https://abnormal.ai/blog/offensive-ai-defensive-ai
  134. Combatting deepfakes: Policies to address national security threats and rights violations, accessed September 30, 2025, https://arxiv.org/html/2402.09581v1
  135. Rising Threat – Deepfakes and National Security in the Age of Digital Deception, accessed September 30, 2025, https://digitalcommons.odu.edu/cgi/viewcontent.cgi?article=1078&context=covacci-undergraduateresearch
  136. NSA, U.S. Federal Agencies Advise on Deepfake Threats, accessed September 30, 2025, https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3523329/nsa-us-federal-agencies-advise-on-deepfake-threats/
  137. Crossing the Deepfake Rubicon – CSIS, accessed September 30, 2025, https://www.csis.org/analysis/crossing-deepfake-rubicon
  138. AI-driven disinformation: policy recommendations for democratic resilience – PMC, accessed September 30, 2025, https://pmc.ncbi.nlm.nih.gov/articles/PMC12351547/
  139. Weaponized storytelling: How AI is helping researchers sniff out disinformation campaigns | FIU News – Florida International University, accessed September 30, 2025, https://news.fiu.edu/2025/weaponized-storytelling-how-ai-is-helping-researchers-sniff-out-disinformation-campaigns
  140. AI-Enhanced Command & Control Systems Transforming Military – Defence Industries, accessed September 30, 2025, https://www.defence-industries.com/articles/ai-enhanced-command-and-control-c2-systems-transforming-military
  141. Enhance command and control with AI and machine learning – Microsoft Industry Blogs, accessed September 30, 2025, https://www.microsoft.com/en-us/industry/blog/government/2023/06/20/enhance-command-and-control-with-ai-and-machine-learning/
  142. Project Maven – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Project_Maven
  143. ECS’ John Heneghan on Supporting NGA’s Maven Program – ExecutiveBiz, accessed September 30, 2025, https://www.executivebiz.com/articles/ecs-john-heneghan-nga-maven-program
  144. Artificial Intelligence as a Combat Multiplier: Using AI to Unburden Army Staffs, accessed September 30, 2025, https://www.armyupress.army.mil/Journals/Military-Review/Online-Exclusive/2024-OLE/AI-Combat-Multiplier/
  145. United States’ Project Maven And The Rise Of AI-Assisted Warfare …, accessed September 30, 2025, https://defensetalks.com/united-states-project-maven-and-the-rise-of-ai-assisted-warfare/
  146. AI at the Pentagon: How Maven’s CTO Brings AI into Military Operations | IIA @MIT 2025, accessed September 30, 2025, https://www.youtube.com/watch?v=LBUKDhtlOEI
  147. Marine Corps names leadership for Project Dynamis amid push for new AI capabilities, accessed September 30, 2025, https://defensescoop.com/2025/09/23/marine-corps-project-dynamis-ai-leadership/
  148. AI-Enabled Command and Control Systems for Integrated Land, Air, and Sea Operations | by SIAM Student’s Chapter VIT Bhopal | Medium, accessed September 30, 2025, https://medium.com/@siam_VIT-B/ai-enabled-command-and-control-systems-for-integrated-land-air-and-sea-operations-ea27ed86c30d
  149. AI at War: The Next Revolution for Military and Defense | Capitol Technology University, accessed September 30, 2025, https://www.captechu.edu/blog/ai-war-next-revolution-military-and-defense
  150. Artificial intelligence arms race – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Artificial_intelligence_arms_race
  151. Essay: Reframing the U.S.-China AI “Arms Race”: Introduction – New America, accessed September 30, 2025, https://www.newamerica.org/cybersecurity-initiative/reports/essay-reframing-the-us-china-ai-arms-race/introduction/
  152. China Is Using the Private Sector to Advance Military AI | Center for …, accessed September 30, 2025, https://cset.georgetown.edu/article/china-is-using-the-private-sector-to-advance-military-ai/
  153. How the US Could Lose the AI Arms Race to China | American Enterprise Institute – AEI, accessed September 30, 2025, https://www.aei.org/op-eds/how-the-us-could-lose-the-ai-arms-race-to-china/
  154. Turkish Drones Disrupting Battlefields: A Case Study of Nagorno …, accessed September 30, 2025, https://wahacademia.com/index.php/Journal/article/download/227/186
  155. Baykar Bayraktar TB2 – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Bayraktar_TB2
  156. The Role of Turkish Drones in Azerbaijan’s Increasing Military Effectiveness: An Assessment of the Second Nagorno-Karabakh War – Insight Turkey, accessed September 30, 2025, https://www.insightturkey.com/articles/the-role-of-turkish-drones-in-azerbaijans-increasing-military-effectiveness-an-assessment-of-the-second-nagorno-karabakh-war
  157. Why lasers might be the answer to invasive drone attacks | DW News – YouTube, accessed September 30, 2025, https://www.youtube.com/watch?v=tFAZmb56ulU
  158. Ethiopian Civil War vs. Ukraine Invasion: Why TB2 Bayraktar Drones Worked For One & Failed The Other – Simple Flying, accessed September 30, 2025, https://simpleflying.com/ethiopia-vs-ukraine-why-drones-worked-failed/
  159. Drone Saturation: Russia’s Shahed Campaign – CSIS, accessed September 30, 2025, https://www.csis.org/analysis/drone-saturation-russias-shahed-campaign
  160. What Iran’s Drones in Ukraine Mean for the Future of War | The Washington Institute, accessed September 30, 2025, https://www.washingtoninstitute.org/policy-analysis/what-irans-drones-ukraine-mean-future-war
  161. David vs. Goliath: Cost Asymmetry in Warfare – RAND, accessed September 30, 2025, https://www.rand.org/pubs/commentary/2025/03/david-vs-goliath-cost-asymmetry-in-warfare.html
  162. Contribution by the International Committee of the Red Cross submitted to the Chair of the Convention on Certain Conventional Weapons (CCW, accessed September 30, 2025, https://docs-library.unoda.org/Convention_on_Certain_Conventional_Weapons_-Group_of_Governmental_Experts_on_Lethal_Autonomous_Weapons_Systems_(2021)/GGE_LAWS_-_June_2021_-_ICRC_-_written_contribution.pdf
  163. Autonomy in weapon systems | SIPRI, accessed September 30, 2025, https://www.sipri.org/research/armament-and-disarmament/emerging-military-and-security-technologies/autonomy-weapon-systems
  164. Autonomous Weapon Systems and International Humanitarian Law: Identifying Limits and the Required Type and Degree of Human–Machine Interaction | SIPRI, accessed September 30, 2025, https://www.sipri.org/publications/2021/policy-reports/autonomous-weapon-systems-and-international-humanitarian-law-identifying-limits-and-required-type
  165. Compliance with International Humanitarian Law in the Development and Use of Autonomous Weapon Systems: What Does IHL Permit, Pr – SIPRI, accessed September 30, 2025, https://www.sipri.org/sites/default/files/2023-03/ihl_and_aws.pdf
  166. Retaining Human Responsibility in the Development and Use of Autonomous Weapon Systems: On Accountability for Violations of International Humanitarian Law Involving AWS | SIPRI, accessed September 30, 2025, https://www.sipri.org/publications/2022/policy-reports/retaining-human-responsibility-development-and-use-autonomous-weapon-systems-accountability
  167. The road less travelled: ethics in the international regulatory debate on autonomous weapon systems, accessed September 30, 2025, https://blogs.icrc.org/law-and-policy/2024/04/25/the-road-less-travelled-ethics-in-the-international-regulatory-debate-on-autonomous-weapon-systems/
  168. UN and Red Cross join voices against danger of autonomous weapons – Prensa Latina, accessed September 30, 2025, https://www.plenglish.com/news/2023/10/05/un-and-red-cross-join-voices-against-danger-of-autonomous-weapons/
  169. International Committee of the Red Cross (ICRC) position on autonomous weapon systems, accessed September 30, 2025, https://www.cambridge.org/core/journals/international-review-of-the-red-cross/article/international-committee-of-the-red-cross-icrc-position-on-autonomous-weapon-systems-icrc-position-and-background-paper/32AEF7294791D19101D96970E85B0459
  170. ICRC’s Intervention on AI Based Weapon under International Humanitarian Law: A Critical Analysis – UniversePG, accessed September 30, 2025, https://www.universepg.com/public/img/storage/journal-pdf/1728999629_ICRCs_intervention_on_AI_Based_Weapon_under_international_humanitarian_law_a_critical_analysis.pdf
  171. The challenges of AI command and control | European Leadership Network, accessed September 30, 2025, https://europeanleadershipnetwork.org/commentary/the-challenges-of-ai-command-and-control/

The Border Patrol Tactical Unit (BORTAC): An Operational and Strategic Assessment

Executive Summary

The U.S. Border Patrol Tactical Unit (BORTAC) represents the premier special operations component of the U.S. Border Patrol (USBP) and a critical national security asset for the Department of Homeland Security (DHS). This report provides a comprehensive analysis of BORTAC, examining its origins, mission evolution, current capabilities, and strategic significance. Initially conceived for a narrow civil disturbance role, the unit has transformed into a highly versatile tactical force with a global reach. Its mission set now encompasses counter-terrorism, high-threat law enforcement, active shooter response, and international capacity building, reflecting an operational scope that extends far beyond its parent agency’s traditional border-centric mandate.

Key findings indicate that BORTAC’s evolution has been largely reactive, shaped by national crises such as the War on Drugs, the 9/11 terrorist attacks, and domestic civil unrest. This adaptability is underpinned by one of the most rigorous selection and training courses in federal law enforcement, designed to produce operators capable of executing “zero-failure” missions under extreme duress. The unit’s operational history is marked by high-profile, and often controversial, deployments, from the 2000 raid to seize Elián González to its decisive intervention in the 2022 Uvalde school shooting and its contentious use during civil protests. BORTAC thus embodies a dual identity: it is both a specialized tool for border enforcement and a national-level rapid response unit, providing DHS with a capability akin to the military’s special operations forces. This dualism is both its greatest strength and the source of significant debate regarding its appropriate use and jurisdiction.

Genesis and Doctrinal Evolution

A. Inception (1984): A Response to Civil Disturbance

The Border Patrol Tactical Unit was established in 1984 with a singular, well-defined purpose: to serve as a specialized civil disturbance and riot control team for the legacy Immigration and Naturalization Service (INS).1 Its primary mission was to respond to and quell riots and other large-scale disturbances occurring within INS detention facilities.1 This origin reflects a reactive law enforcement function designed to handle a specific internal threat. In a clear sign of the unit’s subsequent evolution, this founding mission is no longer within BORTAC’s purview; it is now the responsibility of U.S. Immigration and Customs Enforcement (ICE) Enforcement and Removal Operations (ERO) Special Response Teams (SRT).4

B. The 1980s-1990s: Mission Expansion and Early Deployments

Almost immediately after its formation, BORTAC’s capabilities were recognized as being applicable to a wider range of high-risk scenarios. During the 1980s, the unit was leveraged for the burgeoning “War on Drugs,” deploying to South America to conduct counter-narcotics operations alongside the Drug Enforcement Administration (DEA) as part of the wider “Operation Snowcap”.4 This marked its first major mission expansion into international operations and collaboration with other federal agencies in a non-immigration context.

A pivotal moment in establishing its domestic role occurred in 1992, when BORTAC was deployed to California as part of a 1,000-agent federal contingent tasked with helping local law enforcement quell the Los Angeles riots.4 This deployment demonstrated the federal government’s willingness to use the unit as a tool for restoring civil order far from any international border, establishing a precedent for its future, and often controversial, domestic missions.3 The distinctive patches and unit insignia from this era mark this formative period in its history.1

C. Post-9/11: The Counter-Terrorism Imperative and Formalization

The terrorist attacks of September 11, 2001, fundamentally reshaped the American national security landscape and catalyzed the most significant transformation in BORTAC’s history. The mission of the U.S. Border Patrol was immediately and profoundly expanded to include a primary focus on preventing terrorists and their weapons from entering the United States.5 Consequently, BORTAC’s mandate was officially redefined to reflect this new reality. Its mission became “to respond to terrorist threats of all types anywhere in the world in order to protect our nation’s homeland”.4 This officially recast the unit from a specialized domestic team into a globally deployable counter-terrorism asset.

This evolution was formalized in 2007 with the creation of the U.S. Border Patrol’s Special Operations Group (SOG), headquartered in El Paso, Texas.1 This organizational restructuring placed BORTAC and its counterpart, the Border Patrol Search, Trauma, and Rescue (BORSTAR) unit, under a single, unified command.4 This move was designed to centralize command and control, streamline logistics, and enhance the rapid-response capabilities of DHS’s elite tactical and rescue assets.6 BORTAC’s history is not one of a static, pre-ordained purpose, but of continuous adaptation. Its demonstrated proficiency in one crisis consistently led to its application in new, often broader, mission sets. This pattern of “doctrinal creep”—from prison riots to counter-narcotics, to urban riot control, to global counter-terrorism—was driven by the demands of external events, making the unit a versatile, go-to tactical solution for the federal government.

Mission Framework and Core Capabilities

BORTAC’s mission set is exceptionally broad, reflecting its evolution into one of the federal government’s most versatile tactical units. Its operational footprint is not defined by geographic proximity to a border but by the nature of the threat, giving it a remarkable “jurisdictional elasticity” that allows it to function as a national and global response asset for DHS.

A. Primary Mission: Counter-Terrorism

The unit’s official post-9/11 mission is to counter global terrorist threats.4 In this capacity, BORTAC is deployed to secure high-risk areas and provide a tactical security overlay for high-profile national events. Notable examples include helping to secure venues at the 2002 Winter Olympics in Salt Lake City and providing security for events such as the Super Bowl, with the objective of preventing and responding to potential terrorist attacks.3

B. Core Law Enforcement and Interdiction Capabilities

BORTAC serves as the tactical spearhead for the Border Patrol, executing missions that are beyond the scope of regular agents.

  • High-Risk Operations: The unit specializes in conducting high-risk warrant service, executing drug raids on high-value targets associated with transnational criminal organizations, and dismantling human and narcotics smuggling rings.2
  • Specialized Environment Operations: Operators are experts at functioning in austere and difficult-to-access environments, from remote desert and mountain terrain to dense urban settings. Core skills include advanced reconnaissance, surveillance, and interdiction patrols.2
  • Airmobile and Maritime Operations: BORTAC maintains a high degree of proficiency in airmobile tactics, including fast-roping and helicopter insertion/extraction techniques, often utilizing CBP Air and Marine Operations (AMO) assets like the UH-60 Black Hawk helicopter.9 The unit is also trained for maritime interdiction operations.2

C. National Response and Support Capabilities

BORTAC provides a critical tactical response capability for crises across the country, often in support of other federal, state, or local agencies.

  • Active Threat Response: The unit is a proven and effective active shooter response force. This capability was demonstrated most decisively during the 2022 Robb Elementary School shooting in Uvalde, Texas, where a BORTAC team breached the classroom where the shooter was barricaded and neutralized him, ending the attack.4
  • Disaster Response and Civil Order: BORTAC can be deployed to natural disaster zones to provide security and ensure civil order does not break down. For example, personnel were sent to the Gulf Coast to provide law enforcement support in the aftermath of Hurricane Katrina.4
  • Fugitive Apprehension: The unit is frequently called upon for high-profile manhunts. In 2015, BORTAC operators were instrumental in the search for two escaped murderers from the Clinton Correctional Facility in New York, ultimately locating and killing one of the fugitives.3 More recently, in 2023, a BORTAC team assisted in the capture of escaped killer Danelo Cavalcante in Pennsylvania.11

D. International Engagement and Capacity Building

Unique among many domestic law enforcement tactical units, BORTAC has a global response capability and has operated in at least 28 countries.4 As part of joint programs with the Departments of State and Justice, BORTAC provides advanced tactical and counter-narcotics training to foreign police and paramilitary units, such as El Salvador’s elite Grupo de Respuesta Policial (GRP).4 This role as an exporter of tactical expertise serves U.S. foreign policy and security interests abroad. Furthermore, the unit has provided support for U.S. military operations, including Operation Iraqi Freedom and Operation Enduring Freedom, blurring the traditional lines between law enforcement and military functions.2

Organizational Structure and Command

BORTAC’s organizational structure is a hybrid model designed for maximum operational flexibility, combining centralized command for ensuring high standards with decentralized assets for rapid response.

A. Chain of Command

The unit’s formal chain of command resides within the Department of Homeland Security. It flows from DHS to U.S. Customs and Border Protection (CBP), then to the U.S. Border Patrol (USBP), and finally to the Special Operations Group (SOG).1 SOG, co-located with BORTAC headquarters at Biggs Army Airfield within Fort Bliss in El Paso, Texas, serves as the overarching command element.1 It provides unified command, intelligence support, and logistics for both BORTAC and its sister unit, BORSTAR.4 A key component of SOG is its in-house Intelligence Unit (SOG IU), which provides mission-critical, actionable intelligence directly to deploying tactical assets.6

B. Unit Composition and Deployment Model

BORTAC employs a two-tiered staffing model to ensure both a core of expertise and a nationwide footprint. This consists of:

  1. A cadre of full-time operators who are permanently assigned to the El Paso headquarters. This group likely forms the nucleus of major deployments and serves as the primary training and standards body.2
  2. Non-full-time members who are dispersed throughout various Border Patrol sectors across the United States.2

This distributed model is a significant force multiplier. It allows BORTAC to respond rapidly to regional crises by mobilizing teams that are already strategically positioned nearby, reducing deployment times.1 These decentralized elements can be the first on-scene for an emerging threat or can be surged to augment a larger national-level deployment initiated from the El Paso headquarters. In addition, BORTAC is responsible for training and equipping Sector Special Operations Detachments, which provide individual Border Patrol Sector Chiefs with their own localized rapid-response tactical capability, further enhancing this layered defense and response posture.2

Personnel: The BORTAC Operator

The effectiveness of BORTAC rests entirely on the quality of its individual operators, who are selected and trained through a process designed to identify and cultivate the most physically and mentally resilient agents in the U.S. Border Patrol.

A. Recruitment and Prerequisites

Entry into BORTAC is not open to the public. Candidates must be active U.S. Border Patrol agents who have served a minimum of two years with the agency.1 Before they can even apply for the selection course, these agents must pass a rigorous initial screening that includes advanced standards for physical fitness and marksmanship.13

B. The BORTAC Selection and Training Course (BSTC): A Trial by Fire

The BSTC is a multi-phase indoctrination lasting over a month, with a curriculum and intensity level intentionally designed to mirror those of U.S. military Special Operations Forces selection courses.2 The process is a deliberate forging mechanism intended to produce operators with a “zero-failure” mindset. The extreme stress is not merely a filter; it is a tool to break down candidates to their core, revealing their true character and ability to function when exhausted and under duress.

  • Phase 1: Selection: The course begins with a brutal initial phase known as “Breakout,” characterized by non-stop physical and mental challenges, coupled with severe sleep and food deprivation.13 This phase includes a battery of physical tests that must be passed: push-ups, sit-ups, pull-ups, a timed 1.5-mile run, and a pistol qualification. Those who pass must then complete a timed 6-mile ruck march with a weighted pack, followed by aquatic tests including swimming, treading water, and drown-proofing exercises.2 The attrition rate is exceptionally high, often around 70 percent. It is not uncommon for a class of 75 candidates to be whittled down to 20, or in some cases, as few as three graduates.10 This extreme selectivity is a feature of the course, ensuring that only the most suitable individuals advance.

C. Phase 2: Certification and Skill Development

Candidates who successfully complete the selection phase move on to the certification course. This multi-week phase involves intensive, hands-on training in the specialized skills required of a BORTAC operator.13 The curriculum is comprehensive and covers a wide range of advanced tactical disciplines, including:

  • Small Unit Tactics
  • Close Quarter Combat (CQC)
  • Advanced Weapon Skills and Marksmanship
  • Operational Planning and Mission Leadership
  • Airmobile Operations (e.g., fast-roping)
  • Vehicle Assaults and High-Risk Interdictions
  • Surveillance and Counter-Surveillance Techniques
  • Assault Climber and Rappelling Techniques
  • Defensive Tactics
  • Level 1 Breaching, including ballistic (shotgun), mechanical (ram/tools), and exothermic (torch) methods.2

D. Desired Operator Attributes

The selection and training process is designed to identify and cultivate a specific set of attributes. BORTAC seeks individuals who possess an uncommon combination of physical toughness, unwavering determination (“heart”), high intelligence, and unimpeachable integrity.13 Most critically, the process identifies agents who can maintain cognitive function under extreme stress and are empowered to rapidly observe a chaotic situation, make a sound tactical decision, and act decisively—skills that are paramount in the life-or-death situations the unit is expected to resolve.13

Logistics, Funding, and Materiel

A. Funding and Budget

BORTAC does not possess a distinct, publicly available line-item in the federal budget. Instead, its funding is allocated from within the larger appropriations for its parent agencies.1 The unit is financed through the CBP “Operations and Support” appropriation, specifically falling under the “Border Security Operations” Program, Project, or Activity (PPA), which funds the U.S. Border Patrol.15

This structure provides CBP leadership with significant flexibility to direct resources toward its elite unit based on operational tempo and emerging threats. However, it also reduces public transparency, making it difficult for external analysts to determine the precise cost of BORTAC’s training and deployments. To provide context for the scale of available funding, the FY2023 budget provided $16.464 billion in base discretionary funding for CBP, of which $7.153 billion was allocated to the U.S. Border Patrol.16 The FY2024 budget request for CBP was $19.6 billion, and the President’s FY2025 budget requests $15.9 billion for CBP Operations and Support.17

B. Small Arms and Weapon Systems

BORTAC’s arsenal is diverse and robust, reflecting the varied nature of its missions, from long-range precision engagement to dynamic close-quarters combat. The table below outlines the primary weapon systems known to be used by the unit. This armament provides operators with tactical flexibility to address a wide spectrum of threats.

Weapon CategoryModel(s)CaliberRole
Carbine / RifleM4A1, M16A1/A2, HK33A2, HK535.56mmStandard Operator Weapon
Battle RifleM-147.62mmDesignated Marksman
Sniper RifleRemington 700 / M40, Steyr SSG.308 WinPrecision Marksman / Sniper
Submachine GunHK UMP40, HK MP5.40 S&W, 9mmClose Quarters Combat (CQC)
ShotgunRemington 870 (modified)12 GaugeBreaching, CQC
PistolBeretta 96D, HK USP40, SIG P229.40 S&W, 9mmStandard Sidearm
Grenade LauncherM79, M20340mmLess-Lethal, Area Denial
Sources: 1

C. Personal Equipment, Uniforms, and Vehicles

BORTAC operators are equipped with state-of-the-art personal protective gear, including Kevlar ballistic helmets and armored assault vests or plate carriers to provide protection during high-risk operations.1 Their operational attire is mission-dependent. Operators may wear desert khaki or foliage-colored flight suits, or combat uniforms in various patterns such as Multicam.4 The choice of uniform is often dictated by the operational environment and the need to maintain uniformity with partner units, such as regular Border Patrol agents or AMO personnel.4 While specific ground vehicles are not publicly detailed, the unit’s emphasis on airmobility means it frequently integrates with CBP AMO aviation assets, particularly the UH-60 Black Hawk helicopter, for rapid insertion and extraction.1 For ground mobility, especially in austere border regions, the unit has access to the full range of USBP vehicles, including off-road capable ATVs and dirt bikes.20

Operational History: Select Case Studies

BORTAC’s operational history illustrates its evolution from a specialized riot-control squad to a multi-faceted national security tool. The following case studies highlight the diversity of its missions and the strategic implications of its deployments.

A. Case Study 1: Civil Disturbance (1992 Los Angeles Riots)

In response to widespread rioting and a breakdown of civil order in Los Angeles, BORTAC was deployed as a key component of a 1,000-strong federal law enforcement task force.4 Its mission was to assist state and local authorities in restoring order. This operation was a significant early test of the unit’s capabilities outside its original mandate and solidified its role as a federal asset for quelling large-scale domestic civil disturbances, setting a crucial precedent for its use far from the U.S. border.3

B. Case Study 2: High-Stakes Federal Intervention (2000 Elián González Raid)

Perhaps the mission that brought BORTAC into the national consciousness was the seizure of six-year-old Cuban refugee Elián González. Following the failure of negotiations in a highly politicized international custody battle, Attorney General Janet Reno ordered federal agents to take the child into custody.22 BORTAC was tasked with executing a pre-dawn raid on the Miami home where the boy was staying.4 The mission, codenamed “Operation Reunion,” required immense precision, speed, and the careful handling of a child in a potentially hostile environment.4 The successful execution of this politically sensitive, “no-fail” mission demonstrated BORTAC’s capability to act as a direct instrument of federal authority at the highest levels.1

C. Case Study 3: Active Threat Response (2022 Uvalde School Shooting)

During the active shooter incident at Robb Elementary School in Uvalde, Texas, the local law enforcement response had stalled for over an hour while the gunman was barricaded inside a classroom with students and teachers.3 A BORTAC team, which had been conducting unrelated operations nearby, responded to the scene.3 Upon arrival, the team immediately organized an ad-hoc entry team, breached the classroom door, engaged the shooter, and neutralized him, ending the massacre.4 One BORTAC operator was wounded by a graze to the head during the exchange of fire.4 This event starkly highlighted BORTAC’s critical function as a de facto super-SWAT team for regions where local tactical capabilities may be overwhelmed by an extreme event.

D. Case Study 4: International Operations (Operation Snowcap & Foreign Training)

BORTAC’s international footprint demonstrates its utility as a tool of U.S. foreign policy. Beginning in the 1980s with Operation Snowcap, the unit deployed to South America to conduct dangerous counter-narcotics missions with the DEA.4 Since then, its international role has expanded significantly. BORTAC has operated in 28 countries, primarily in a capacity-building role, providing advanced tactical and law enforcement training to partner nations’ security forces.4 This function, which advances U.S. security interests abroad by enhancing the capabilities of allies, is a role more typically associated with military special operations forces than a domestic law enforcement entity.

E. Case Study 5: Domestic Law Enforcement & Civil Unrest (2020 Deployments)

In 2020, BORTAC was deployed in two highly controversial domestic roles. First, as part of the Trump administration’s “Protecting American Communities Task Force,” operators were sent to Portland, Oregon, during sustained protests against police brutality.4 This deployment led to widespread criticism from state and local officials and a lawsuit alleging that federal agents were engaging in unlawful detainments of protestors in unmarked vehicles.4 Second, BORTAC teams were sent to several so-called “sanctuary cities”—including Chicago, New York, and Los Angeles—to augment ICE interior immigration enforcement operations.25 These deployments sparked outrage from local leaders, who argued that a militarized border unit was being inappropriately used for routine immigration arrests and to intimidate communities.24 This case study highlights the significant political friction and complex legal questions that arise from the unit’s broad and flexible “jurisdictional elasticity.”

Strategic Analysis and Future Outlook

A. BORTAC’s Strategic Value Proposition

BORTAC provides the Department of Homeland Security with a critical force multiplier and a level of tactical capability that is unique within its component agencies. It is one of a very small number of federal tactical teams outside the Department of Justice (e.g., FBI HRT) and the Department of Defense (e.g., JSOC) capable of conducting high-risk special operations both domestically and abroad. Its hybrid nature, possessing both civilian law enforcement authorities and military-style tactical skills, makes it an exceptionally valuable asset for addressing complex threats that occupy the gray zone between transnational crime and national security.

B. Challenges and Controversies

The unit’s formidable capabilities are also the source of significant controversy. Its SOF-style training, advanced weaponry, and history of overseas deployments have fueled a persistent debate about the “militarization” of federal law enforcement.2 This concern is most acute when BORTAC is deployed within the United States for missions that are perceived as being outside its core border security mandate. The 2020 deployments to Portland for protest control and to sanctuary cities for immigration enforcement raised profound constitutional and jurisdictional questions about the appropriate use of such a unit against American citizens and within American communities.24 These actions blur the lines between federal and local law enforcement and risk eroding public trust, particularly when justifications for deployment appear politically motivated rather than operationally necessary.26

C. Future Trajectory and Expected Capabilities

The demand for a unit with BORTAC’s unique skill set is unlikely to diminish. As national security threats—including terrorism, transnational organized crime, and cyber-physical attacks—become more diffuse and complex, the need for a highly trained, rapidly deployable unit that can operate across domestic and international boundaries will likely grow. It is expected that DHS will continue to invest in BORTAC’s capabilities, focusing on advanced technology, enhanced intelligence integration through the SOG Intelligence Unit, and continued joint training with military special operations forces and other federal tactical teams.

The central challenge for policymakers moving forward will be to balance the clear operational benefits of leveraging BORTAC’s capabilities against the need for well-defined legal and policy guardrails governing its deployment. Establishing a clear doctrine for its use, particularly for domestic operations, will be essential to ensure this elite unit remains a strategic asset for national security rather than a source of political and jurisdictional conflict.


If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly donate to help fund our continued report, please visit our donations page.


Sources Used

  1. BORTAC: The US Border Patrol Tactical Unit – Grey Dynamics, accessed September 14, 2025, https://greydynamics.com/bortac-the-us-border-patrol-tactical-unit/
  2. Border Patrol Tactical Unit (BORTAC), accessed September 14, 2025, https://www.cbp.gov/sites/default/files/documents/Border%20Patrol%20Tactical%20Unit.pdf
  3. 6 things to know about BORTAC: The U.S. Border Patrol Tactical Unit – Police1, accessed September 14, 2025, https://www.police1.com/terrorism/articles/5-things-to-know-about-bortac-aZj4JOJInigKo18g/
  4. BORTAC – Wikipedia, accessed September 14, 2025, https://en.wikipedia.org/wiki/BORTAC
  5. United States Border Patrol – Wikipedia, accessed September 14, 2025, https://en.wikipedia.org/wiki/United_States_Border_Patrol
  6. Border Patrol Special Operations Group (SOG) – U.S. Customs and …, accessed September 14, 2025, https://www.cbp.gov/sites/default/files/documents/Border%20Patrol%20Special%20Operations%20Group.pdf
  7. ‘Mission is zero fail’: Exclusive look into the Border Patrol’s cartel fight – YouTube, accessed September 14, 2025, https://www.youtube.com/watch?v=Wvrkrx5jLlA
  8. BORTAC – Border Patrol Tactical Unit | Mike Drop Clip – Episode 145 – YouTube, accessed September 14, 2025, https://www.youtube.com/watch?v=iOrB1ZDmlzs
  9. Fast Rope Proficiency Training – Border Patrol Tactical Unit (BORTAC) | CBP – YouTube, accessed September 14, 2025, https://www.youtube.com/shorts/e1isNBYQmVw
  10. (PDF) Peculiarities of Professional Training of the us Border Patrol Special Operations Group’s Agents – ResearchGate, accessed September 14, 2025, https://www.researchgate.net/publication/321014244_Peculiarities_of_Professional_Training_of_the_us_Border_Patrol_Special_Operations_Group’s_Agents
  11. Manhunt of Danelo Cavalcante – Border Patrol Tactical Unit (BORTAC) Assist in Apprehension | CBP – YouTube, accessed September 14, 2025, https://www.youtube.com/shorts/2LWlXbTTXk8
  12. Border Patrol Special Operations Group, accessed September 14, 2025, https://www.hsdl.org/c/view?docid=29217
  13. BORTAC Conducts Selection and Certification Course – HS Today, accessed September 14, 2025, https://www.hstoday.us/subject-matter-areas/border-security/bortac-conducts-selection-and-certification-course/
  14. From the Army to the Tactical Team, a Chronicle of Commitment, accessed September 14, 2025, https://d34w7g4gy10iej.cloudfront.net/pubs/pdf_30839.pdf
  15. U.S. Customs and Border Protection Budget Overview – Homeland Security, accessed September 14, 2025, https://www.dhs.gov/sites/default/files/2022-03/U.S.%20Customs%20and%20Border%20Protection_Remediated.pdf
  16. HOMELAND SECURITY, 2023 – Senate Appropriations Committee, accessed September 14, 2025, https://www.appropriations.senate.gov/download/fy23-dhs
  17. HOMELAND SECURITY, 2024 – $61.84 billion in total base discretionary funding – Senate Appropriations Committee, accessed September 14, 2025, https://www.appropriations.senate.gov/imo/media/doc/Homeland%20Security%20FY24%20Bill%20Highlights.pdf
  18. U.S. Customs and Border Protection Budget Overview – Homeland Security, accessed September 14, 2025, https://www.dhs.gov/sites/default/files/2024-04/2024_0314_us_customs_and_border_protection.pdf
  19. Weapons | Border Patrol Museum, accessed September 14, 2025, https://borderpatrolmuseum.com/exhibits/weapons/
  20. Border Patrol Agent – CBP Careers, accessed September 14, 2025, https://careers.cbp.gov/s/career-paths/usbp/bpa
  21. What Equipment Do Border Patrol Agents Use? | CountyOffice News – YouTube, accessed September 14, 2025, https://www.youtube.com/watch?v=r_w0KYE5hec
  22. Elián González affair | Research Starters – EBSCO, accessed September 14, 2025, https://www.ebsco.com/research-starters/law/elian-gonzalez-affair
  23. Elián González – Wikipedia, accessed September 14, 2025, https://en.wikipedia.org/wiki/Eli%C3%A1n_Gonz%C3%A1lez
  24. Border Patrol Gloating On Twitter About Being Deployed to Clamp Down on Protesters, accessed September 14, 2025, https://www.southernborder.org/border_patrol_gloating_on_twitter_about_being_deployed_to_clamp_down_on_protesters
  25. Untitled – Senator Elizabeth Warren, accessed September 14, 2025, https://www.warren.senate.gov/download/cbp-deployment
  26. ‘Sanctuary’ cities focus of new ICE deployment – Los Angeles Times – eNewspaper, accessed September 14, 2025, https://enewspaper.latimes.com/infinity/article_share.aspx?guid=f075e777-6af8-4892-b52b-28aaec4d08b0
  27. The Legacy of Racism within the US Border Patrol | American Immigration Council, accessed September 14, 2025, https://www.americanimmigrationcouncil.org/wp-content/uploads/2025/04/the_legacy_of_racism_within_the_u.s._border_patrol.pdf
  28. How BORTAC captured the ‘Devil in the Ozarks’ | NewsNation Now – YouTube, accessed September 14, 2025, https://www.youtube.com/watch?v=vugsFw_mQeE
  29. History of the U.S. Border Patrol: From 1924 to Present – Texas State Historical Association, accessed September 14, 2025, https://www.tshaonline.org/handbook/entries/united-states-border-patrol
  30. Border Patrol History, accessed September 14, 2025, https://borderpatrolmuseum.com/history/
  31. Border Patrol Tactical Unit (BORTAC), accessed September 14, 2025, https://www.cbp.gov/document/fact-sheets/border-patrol-tactical-unit-bortac
  32. BORTAC Spec Ops Marine Erin ‘Jammer’ Switzer – Part Two | Mike Ritland Podcast Episode 146 – YouTube, accessed September 14, 2025, https://www.youtube.com/watch?v=H7fC1X5V3uk
  33. FACT SHEET: The President’s Budget Secures Our Border, Combats Fentanyl Trafficking, and Calls on Congress to Enact Critical Immigration Reform – Biden White House, accessed September 14, 2025, https://bidenwhitehouse.archives.gov/omb/briefing-room/2024/03/11/fact-sheet-the-presidents-budget-secures-our-border-combats-fentanyl-trafficking-and-calls-on-congress-to-enact-critical-immigration-reform/
  34. Fiscal Year 2026 Budget Request for the U.S. Customs and Border Protection, accessed September 14, 2025, https://www.nteu.org/legislative-action/congressional-testimony/CBP%20FISCAL%20YEAR%202026
  35. Use of Force Policy Handbook – Public Intelligence, accessed September 14, 2025, https://info.publicintelligence.net/CBP-ForcePolicyHandbook.pdf
  36. MCDP 1-0 Marine Corps Operations – Training Command, accessed September 14, 2025, https://www.trngcmd.marines.mil/Portals/207/Docs/TBS/MCDP%201-0%20Marine%20Corps%20Operations.pdf
  37. A Chronology Of The Elian Gonzalez Saga | Saving Elian | FRONTLINE – PBS, accessed September 14, 2025, https://www.pbs.org/wgbh/pages/frontline/shows/elian/etc/eliancron.html
  38. Counternarcotics and Stabilization Policy – OUSD Policy Home – Department of Defense, accessed September 14, 2025, https://policy.defense.gov/OUSDP-Offices/ASD-for-Special-Operations-Low-Intensity-Conflict/Counternarcotics-and-Stabilization-Policy/
  39. Department of State, Foreign Operations, and Related Programs: FY2023 Budget and Appropriations | Congress.gov, accessed September 14, 2025, https://www.congress.gov/crs-product/R47070
  40. Defense Budget Overview, accessed September 14, 2025, https://comptroller.defense.gov/Portals/45/Documents/defbudget/FY2023/FY2023_Budget_Request_Overview_Book.pdf
  41. The Cost of Immigration Enforcement and Border Security, accessed September 14, 2025, https://www.americanimmigrationcouncil.org/wp-content/uploads/2025/01/cost_of_immigration_enforcement_factsheet_2024.pdf
  42. Fiscal Year 2023 Expenditure Plan: Border Management Title V, Section 546 – Homeland Security, accessed September 14, 2025, https://www.dhs.gov/sites/default/files/2023-06/OCFO%20-%20Section%20546%20Border%20Management%20FY%202023%20Spend%20Plan%20%281%29.pdf
  43. Special Units | Border Patrol Museum, accessed September 14, 2025, https://borderpatrolmuseum.com/exhibits/special-units/
  44. US Border Patrol Tactical Unit BORTAC USBP Agent Qual. Pin, Medium 1.25″ | eBay, accessed September 14, 2025, https://www.ebay.com/itm/203060860935
  45. A Day In The Life – U.S. Border Patrol Agent | CBP – YouTube, accessed September 14, 2025, https://www.youtube.com/watch?v=bDB1h2Glvac
  46. US Border Patrol Tactical Unit BORTAC USBP Qualification Pin, Large 1-3/4″ | eBay, accessed September 14, 2025, https://www.ebay.com/itm/203028725292
  47. U.S. Border Patrol Authorized Devices – HONOR FIRST, accessed September 14, 2025, https://www.honorfirst.com/us-border-patrol-authorized-devices.html
  48. department of homeland security – Budget of the United States Government, Fiscal Year 2025, accessed September 14, 2025, https://www.govinfo.gov/content/pkg/BUDGET-2025-BUD/pdf/BUDGET-2025-BUD-11.pdf
  49. WHAT THEY ARE SAYING: Homeland Republicans Advance a “Bold Push” for Border Security Funding, Democrats Offer “Muted” Response, accessed September 14, 2025, https://homeland.house.gov/2025/04/30/what-they-are-saying-homeland-republicans-advance-a-bold-push-for-border-security-funding-democrats-offer-muted-response/
  50. socom op-5 – Fiscal Year 2025 Budget Estimates, accessed September 14, 2025, https://comptroller.defense.gov/Portals/45/Documents/defbudget/FY2025/budget_justification/pdfs/01_Operation_and_Maintenance/O_M_VOL_1_PART_1/SOCOM_OP-5.pdf
  51. accessed December 31, 1969, https://www.hsdl.org/?abstract&did=29217

A Comprehensive Analysis of the Shotgun Slug: From “Pumpkin Ball” to Precision Projectile

This report provides a detailed technical and market analysis of the evolution of the shotgun slug. The development of the slug was a direct engineering response to a significant performance gap inherent in early smoothbore shotgun ammunition. Standard buckshot loads, while devastating at close quarters, suffered from dramatic pattern dispersal, limiting their effective range to under 30 yards. Conversely, single round balls, or “pumpkin balls,” were notoriously inaccurate beyond 50 yards due to a complete lack of in-flight stabilization. This created a critical capabilities void for both hunters and tactical users.

The first successful solutions to this problem emerged with two foundational full-bore designs: the German Brenneke slug (1898) and the American Foster slug (1931). Though born from different design philosophies, both achieved aerodynamic stability in smoothbore barrels, reliably extending the shotgun’s effective range to the 75-100 yard mark. The next paradigm shift came with the concurrent development of saboted projectiles and fully rifled shotgun barrels. This combination introduced gyroscopic stabilization, transforming the shotgun platform into a short-range rifle capable of accurate fire out to 200 yards.

This technological evolution has created a bifurcated market. On one hand, the civilian hunting market, largely driven by regulations mandating shotgun use in densely populated areas, has pushed the development of increasingly accurate and powerful saboted slugs. On the other hand, the tactical market for law enforcement and military use has leveraged slug technology for extended range, enhanced barrier penetration, and specialized applications. The modern shotgun platform’s unparalleled versatility, capable of firing everything from lethal hunting projectiles to specialized breaching and less-lethal rounds, is a direct result of the continuous innovation of the single-projectile slug.

1.0 The Performance Gap: The Problem Slugs Were Engineered to Solve

To understand the genesis of the shotgun slug, one must first analyze the inherent limitations of the ammunition available for smoothbore firearms prior to its development. The slug was not an incremental improvement but a purpose-built solution to a well-defined performance deficiency.

1.1 The Era of the Smoothbore: From Blunderbuss to “Scattergun”

The shotgun’s lineage traces back to early smoothbore firearms like the blunderbuss, which were valued for their ability to project a wide pattern of shot at close range.1 By the late 19th and early 20th centuries, the breechloading shotgun, or “scattergun,” had become a common tool for hunting birds and small game.2 Its primary design function was to fire a shotshell containing multiple small pellets, increasing the probability of hitting fast-moving targets.2 The development of the self-contained shotshell—evolving from early paper and brass hulls with black powder to modern plastic cases with efficient smokeless powders—created a reliable and versatile ammunition platform.3 However, this platform was fundamentally optimized for projecting a pattern of shot, a design that presented significant limitations when engaging larger targets at distance.

1.2 The Limitations of Buckshot: Range, Patterning, and Terminal Ballistics

For engaging larger targets, buckshot was the standard load. A single shell could deliver eight to twelve lead balls, each roughly the size of a pistol bullet, into a target with one pull of the trigger, making it an immensely devastating close-quarters load.6 However, this effectiveness was confined to a very narrow engagement window.

The primary limitation of buckshot is pattern spread. As a general rule, a buckshot pattern from a cylinder-bore shotgun spreads approximately one inch for every yard of travel.6 This means that while the pattern may be only a few inches wide at contact distance, it can be over 20 inches wide at 20 yards. Beyond this range, pellets begin to miss a human-sized target, and by 30 yards, a shooter would be fortunate to place half the payload on target.6

Terminal performance could also be inconsistent. While a tight cluster of pellets in a vital area is a definitive fight-stopper, a spread-out pattern at longer ranges may only inflict multiple shallow wounds.6 If major organs or the central nervous system are not struck, bleeding can be slow, creating a significant risk of wounding game animals that later escape and perish unethically.7 A historical military attempt to mitigate these issues was the “buck and ball” load, which combined a single large-caliber musket ball with three or more buckshot pellets. This provided both the spread of shot for close-range encounters and the mass of a single projectile for volley fire at ranges approaching 100 yards, but it was a compromise, not a precision solution.8

1.3 The Inaccuracy of the Round Ball: The “Pumpkin Ball” Problem

Before the advent of modern slugs, the only option for firing a single projectile from a shotgun was a simple, spherical lead ball, colloquially known as a “pumpkin ball”.10 While heavier than a buckshot pellet, the round ball suffered from crippling inaccuracy.

A smooth, spherical projectile fired from a smoothbore barrel has no stabilizing forces acting upon it. It is not aerodynamically shaped to fly nose-forward, nor is it spun by rifling to achieve gyroscopic stability. The result is a highly unpredictable flight path, often described as a “knuckleball” effect, which becomes progressively worse with distance.11 While a round ball might be acceptably accurate at 25 yards, its point of impact becomes entirely unpredictable at 50 yards and beyond.11 This rendered the smoothbore shotgun with a round ball a weapon of last resort for large game, far inferior to the rifled muskets that had already demonstrated the superiority of spin-stabilized projectiles.12

The combination of these factors created a significant capabilities gap. Buckshot was a reliable tool inside of 30 yards. Rifles were effective well beyond 100 yards. In the critical engagement window between 30 and 75 yards, the shotgun offered no reliable, accurate projectile. A hunter facing a deer at 60 yards or a lawman confronting a threat across a street was equipped with a tool that was ill-suited for the task. This “75-Yard Problem” established a clear engineering imperative for a new type of ammunition: a single, stabilized projectile that could be fired accurately from a smoothbore shotgun.

2.0 The Genesis of the Modern Slug: Early Full-Bore Innovations

The first two successful solutions to the accuracy problem of single projectiles in smoothbore shotguns came from two different continents and were driven by distinct motivations. Yet, both arrived at the same fundamental principle: aerodynamic stabilization.

2.1 The Brenneke Slug (1898): A European Solution for Humane, Effective Hunting

The first truly effective modern shotgun slug was developed in Germany in 1898 by the brilliant gun and ammunition designer Wilhelm Brenneke.10 Brenneke’s work was not driven by military application but by an ethical imperative. As an avid hunter, he was deeply dissatisfied with the ammunition of his day, which he felt was underpowered and led to the wounding and suffering of game animals.15 His goal was to engineer a projectile with vastly superior accuracy and stopping power to ensure a quick, humane harvest.15

The resulting design was a masterpiece of ballistic engineering. The Brenneke slug is a solid, full-bore lead projectile with two key features. First, it has a wad—originally made of felt or cellulose fiber, now often plastic—attached to its flat base with a screw.10 This attached wad remains with the slug in flight and acts as a tail, creating drag at the rear of the projectile. This drag stabilization, much like the fletching on an arrow, guarantees the slug flies nose-forward and prevents it from tumbling.10 Second, the slug has a series of angled ribs cast onto its exterior. These ribs allow the solid projectile to safely swage, or compress, as it passes through the narrow constriction of a shotgun’s choke without damaging the barrel.10 Because it is a solid projectile made of a hard lead alloy, the Brenneke slug is renowned for its ability to penetrate deeply through bone and muscle with minimal deformation, making it a favored choice for tough, heavy game like wild boar and for defense against dangerous animals.16

2.2 The Foster Slug (1931): An American Answer for the Everyman Hunter

More than three decades after Brenneke’s invention, an American solution emerged from a very different context. The Foster slug, often called the “American Slug,” was invented by Karl M. Foster in 1931.14 Its origins were socio-economic, born from the hardships of the Great Depression. Foster sought an inexpensive and effective way to turn the common, affordable smoothbore shotgun into a capable deer rifle for families struggling to put food on the table.18

The technical design of the Foster slug was heavily inspired by the revolutionary Minié ball of the mid-19th century.10 Its defining characteristic is a deep hollow cavity in the base, which places the slug’s center of mass far forward, close to its nose.10 This “weight-forward” design provides aerodynamic stability through a different mechanism than the Brenneke. If the slug begins to yaw or tumble in flight, aerodynamic forces acting on the lighter, hollow rear push it back into alignment, creating a self-stabilizing effect much like a badminton shuttlecock.18 Made of a softer lead than the Brenneke, the Foster slug also features exterior ribs (often misleadingly called “rifling”) that serve the same purpose: allowing the slug to safely pass through a choke.19

After perfecting his design, which he initially made by hand in his garage, Foster presented it to Remington, who surprisingly passed on the idea.14 He then took it to Winchester, who recognized its potential and brought the first factory-loaded Foster slugs to the retail market in 1936. Remington, realizing its error, introduced its own version just one year later.14

These two foundational designs represent divergent engineering paths to a convergent solution. Brenneke, focused on terminal performance for tough European game, created a solid, assembled projectile (slug, wad, and screw) that achieves stability via an attached drag-stabilizing tail. Foster, focused on affordability for American deer hunters, created a monolithic projectile whose stability is derived purely from its geometry. This resulted in a classic performance trade-off that persists today: the Brenneke design generally offers superior penetration, while the simpler, softer Foster design is less expensive and expands more readily on lighter game. Both, however, successfully solved the “75-Yard Problem,” transforming the smoothbore shotgun into a viable tool for hunting big game.

3.0 A Paradigm Shift: The Advent of Saboted Slugs and Rifled Barrels

The development of the Brenneke and Foster slugs was a revolutionary step, but it was one that operated within the physical constraints of a smoothbore barrel. The next great leap in slug performance would require a fundamental change to the firearm itself, moving from the principles of aerodynamics to the superior science of gyroscopic stabilization.

3.1 The Sabot Concept: Unlocking Rifle-Like Performance

The key to this transformation was the sabot (pronounced “SAY-bo”), a French term for a type of wooden shoe.22 In ballistics, a sabot is a lightweight carrier, typically made of plastic, that surrounds a projectile smaller than the bore diameter—a sub-caliber projectile.23 The sabot serves several critical functions: it fills the bore to create an effective gas seal behind the projectile, and its outer surface engages the rifling in the barrel.23 As the sabot and projectile exit the muzzle, aerodynamic pressure causes the sabot petals to peel away and discard, leaving the sub-caliber projectile to fly to the target unimpeded.18

This design offers a profound engineering advantage. By using a smaller-diameter projectile, designers can create a slug with a much more aerodynamic shape and a higher ballistic coefficient than a blunt, full-bore projectile.25 A higher ballistic coefficient means the projectile is less affected by air resistance, allowing it to maintain its velocity for a longer time, fly a flatter trajectory, and deliver more energy at extended ranges.26

3.2 The Symbiotic Relationship with Rifled Barrels

The sabot concept is inextricably linked to the use of a fully rifled shotgun barrel. While Foster and Brenneke slugs are designed for smoothbores, sabot slugs are designed exclusively for rifled barrels.23 The plastic sabot is what grips the lands and grooves of the rifling, imparting a rapid spin to the projectile within. This gyroscopic stabilization is far more effective and consistent than the aerodynamic stabilization of full-bore slugs.

This creates a critical point of incompatibility. Firing a traditional lead Foster or Brenneke slug through a rifled barrel provides no accuracy benefit and will quickly and severely foul the rifling with lead deposits, degrading performance.18 Conversely, firing a sabot slug through a smoothbore barrel is a recipe for inaccuracy. Without the rifling to impart spin, the sub-caliber projectile will tumble uncontrollably upon leaving the muzzle.28 The development of rifled shotgun barrels and sabot slugs was therefore a concurrent and symbiotic process; the barrel was created to unlock the potential of the ammunition, and the ammunition was designed to leverage the capabilities of the barrel.19

3.3 Ballistic Superiority: Trajectory, Velocity, and Extended Range

The combination of a saboted slug and a rifled barrel effectively turned the shotgun into a large-caliber, short-to-medium range rifle. The performance gains were immense. While a well-sighted smoothbore shotgun with Foster slugs is considered a 75- to 100-yard firearm, a dedicated rifled-barrel shotgun firing modern sabot slugs can achieve consistent accuracy out to 200 yards and beyond.19 The projectiles themselves can be engineered like modern centerfire rifle bullets, often incorporating polymer tips for improved aerodynamics (like the Remington AccuTip) or being constructed from monolithic copper for deep penetration and high weight retention.23

This technological leap created a fundamental bifurcation in the shotgun market and its identity. Previously, a shotgun was a single, versatile firearm capable of firing all types of shells through its smooth barrel. The advent of the sabot/rifled barrel system forced a choice. A user could maintain a general-purpose smoothbore or invest in a specialized “slug gun” with a dedicated rifled barrel. This gave rise to a new class of shotguns—often heavy-barreled bolt-actions or pump-actions with rifle-style sights or scope mounts—that were shotguns in name and regulation only. In function and performance, they were rifles, a development driven almost entirely by the desire of hunters in “shotgun-only” states to achieve rifle-like performance.

4.0 A Taxonomy of Modern Shotgun Slugs

The modern market for shotgun slugs is diverse, with designs optimized for different firearms, ranges, and applications. They can be broadly categorized into full-bore slugs for smoothbore barrels, sub-caliber slugs for rifled barrels, and highly specialized projectiles.

4.1 Full-Bore Slugs (For Smoothbore Barrels)

These slugs are designed to the full diameter of the shotgun’s bore and rely on aerodynamic stabilization.

  • Brenneke-Type: This classic design remains a top choice for applications requiring deep penetration. It is a solid lead or hard lead-alloy projectile with a wad attached to the base that acts as a tail for drag stabilization. Its solid construction ensures high weight retention and a devastating wound channel, making it a preferred option for hunting tough game or for defense against dangerous animals like bears.13
  • Foster-Type (“Rifled Slug”): This is the most common and generally most affordable type of shotgun slug in the United States. It is made of soft lead and features a deep hollow in the base, creating a weight-forward design for aerodynamic stability. It is an effective projectile for deer-sized game within 100 yards.13
  • Wad Slugs: This category represents an evolution of the Foster design, aiming to improve accuracy by enhancing the gas seal and the way the slug centers in the barrel. The most prominent example is Federal’s TruBall system. This design places a hard polymer ball into the hollow cavity at the base of a Foster-style slug. This ball, pushed by the wad, forces the slug to center perfectly in the bore before it exits the barrel, resulting in dramatically more consistent and tighter groups than standard Foster slugs.20

4.2 Sub-Caliber Slugs (For Rifled Barrels)

These slugs are smaller than the bore diameter and require a rifled barrel to function correctly.

  • Saboted Slugs: This is the pinnacle of shotgun slug technology for accuracy and range. The projectile, which often resembles a large pistol or rifle bullet, is held in a plastic sabot that engages the barrel’s rifling to impart a gyroscopic spin.18 This spin stabilization provides superior accuracy, a flatter trajectory, and extended effective range. The projectiles can be made from a variety of materials, including lead, copper, and brass, and often feature advanced aerodynamic designs like polymer tips to maximize their ballistic coefficient.23

4.3 Specialized Slugs

Beyond conventional hunting and tactical slugs, a range of projectiles exist for highly specific tasks. These include frangible, breaching, and less-lethal slugs, which are designed to fundamentally alter the shotgun’s application on a shell-by-shell basis. These will be explored in detail in Section 7.0.

The following table provides a summary of the primary slug categories for quick comparison.

Slug TypeCore Design PrincipleIntended BarrelTypical Max Effective RangePrimary Application
Foster (“American Rifled”)Aerodynamic Stability (Weight-Forward)Smoothbore~75-100 yardsGeneral Purpose Hunting (Deer)
Brenneke (“European”)Aerodynamic Stability (Drag-Stabilized)Smoothbore~100 yardsHunting Tough/Dangerous Game
Wad Slug (e.g., TruBall)Enhanced Gas Seal & CenteringSmoothbore~100-125 yardsPrecision Smoothbore Hunting
Sabot SlugGyroscopic Stability (Spin-Stabilized)Fully Rifled~150-200+ yardsLong-Range Hunting (Rifle Replacement)

5.0 Ballistic & Terminal Performance Analysis

A quantitative comparison of slug types reveals the significant performance gains achieved through successive design innovations. The differences in external ballistics (how the slug flies) and terminal ballistics (what the slug does on impact) are stark.

5.1 External Ballistics: Comparing Velocity, Energy, and Trajectory

The primary limitation of traditional full-bore slugs is their poor aerodynamic shape, which results in a low ballistic coefficient and rapid energy loss.

  • A standard 1-ounce (438-grain) 12-gauge Foster slug, such as the Remington Slugger, leaves the muzzle at approximately 1,600-1,680 feet per second (fps) with around 2,500 foot-pounds (ft⋅lbs) of muzzle energy.13 However, due to high air resistance, it slows quickly, losing more than half of its kinetic energy by the 100-yard mark.13 Its trajectory is decidedly arched, often described as being like a “thrown pumpkin,” requiring significant holdover for shots beyond 75 yards.31
  • Modern saboted slugs offer vastly superior external ballistics. A 385-grain Remington AccuTip 12-gauge sabot slug exits the muzzle at a blistering 1,850-1,900 fps, generating over 2,900-3,000 ft⋅lbs of energy.35 Because its projectile is more streamlined, it retains velocity and energy far more efficiently. The AccuTip still carries over 2,300
    ft⋅lbs of energy at 100 yards—nearly as much as the Foster slug had at the muzzle.35 This results in a much flatter trajectory, allowing a hunter to hold dead-on a target out to 150 yards with minimal drop.35

5.2 Terminal Ballistics: Penetration vs. Expansion

The construction of a slug dictates its performance upon impact with a target.

  • Foster Slugs: Made of soft lead with a hollow base, these slugs are designed to expand dramatically upon impact. This rapid expansion creates a wide wound channel and transfers energy quickly, which is highly effective on thin-skinned medium game like whitetail deer. However, this same characteristic means they often fragment and offer limited penetration, making them a poor choice for tougher animals or for shooting through intermediate barriers.20
  • Brenneke Slugs: Constructed from a harder lead alloy and featuring a solid design, Brenneke slugs are engineered to resist deformation. They expand very little, if at all, ensuring the slug maintains its mass and momentum to drive deep into a target.16 Independent ballistic gelatin tests have shown Brenneke slugs can achieve penetration depths exceeding 34 inches, making them exceptionally well-suited for dangerous game where breaking heavy bone and reaching deep vitals is paramount.16
  • Saboted Slugs: These projectiles can be engineered for specific terminal effects, much like modern rifle bullets. Many designs, like the Remington AccuTip, are bonded and feature spiral nose cuts to initiate controlled expansion. They are designed to mushroom perfectly while retaining over 95% of their original weight, combining deep penetration with a massive wound channel for devastating effect on game.32

The following table provides a direct comparison of representative loads from each major slug category.

Load TypeMuzzle Velocity (fps)Muzzle Energy (ft-lbs)Velocity @ 100 yds (fps)Energy @ 100 yds (ft-lbs)
Remington 1oz Slugger (Foster)1,6802,630 (est.)~1,100~1,180 (est.)
Federal 1oz TruBall (Wad)1,6002,485997970
Brenneke 1 1/8oz Classic Magnum1,5102,460~1,100~1,300 (est.)
Remington 385gr AccuTip (Sabot)1,9003,0861,6562,344
Note: Estimated values are calculated based on available data and typical performance for the slug type.

6.0 Application & Market Analysis: A Tale of Two Use Cases

The development and diversification of shotgun slugs have been driven by the distinct needs of two primary markets: civilian hunting and tactical/defensive applications. While there is technological crossover, the end-use requirements have created parallel evolutionary paths.

6.1 The Hunter’s Tool: Slugs in the Field and the Impact of Regulation

The single largest driver of the modern shotgun slug market in North America is hunting regulation. In many densely populated states, particularly in the Midwest and Northeast, hunters are restricted to using shotguns, muzzleloaders, or, more recently, straight-walled cartridge rifles for hunting deer.13 These “shotgun-only zones” were established due to concerns that high-velocity, bottlenecked rifle cartridges could travel for miles, posing a safety risk in settled areas.39

Historically, these regulations also served as a wildlife management tool. In the mid-20th century, when deer populations were low in some regions, limiting hunters to less accurate and shorter-ranged shotguns was a deliberate strategy to reduce harvest efficiency and allow herds to recover.40 This regulatory landscape created a captive market. Hunters in these zones needed a projectile that could ethically and effectively harvest a deer at ranges beyond the capability of buckshot. The Foster slug was the initial answer, but the relentless pursuit of rifle-like performance within these legal constraints fueled the entire development cycle of dedicated slug guns, rifled barrels, and high-performance sabot ammunition.13

6.2 The Tactical Implement: Law Enforcement, Military, and Defensive Applications

While buckshot remains the primary choice for close-quarters combat and home defense due to its massive terminal effect and hit probability at short range, the slug provides a critical extension of the shotgun’s capabilities for tactical users.44 Its applications are distinct:

  • Extended Range and Precision: A slug allows a skilled operator to engage a single, specific threat with precision out to 100 yards or more.13 This is invaluable for a patrol officer who may need to neutralize a threat at the end of a long corridor, across a parking lot, or in a situation where buckshot would be too indiscriminate.
  • Barrier Penetration: A typical 1-ounce 12-gauge slug weighs 437.5 grains. This immense mass, combined with its large frontal area, makes it exceptionally effective at defeating intermediate barriers like vehicle doors, automotive glass, and standard interior walls that would stop pistol rounds or buckshot pellets.
  • Target-Specific Engagement vs. Overpenetration Risk: In tactical scenarios with bystanders, a single, precisely aimed slug eliminates the risk of errant buckshot pellets causing unintended harm.13 However, this precision comes with a significant trade-off: a high risk of overpenetration. The same mass that allows a slug to defeat intermediate barriers also means it will likely pass through a target and multiple interior walls while retaining lethal energy, posing a significant danger to anyone on the other side.57 This makes the slug a specialized tool, where the need for range and barrier penetration must be carefully weighed against the substantial risk of overpenetration in a home defense or dense urban environment.57

The hunting and tactical markets have a symbiotic relationship. The drive for accuracy in the hunting market led to innovations like the Federal TruBall system, which was then adapted into a “Tactical TruBall” load for law enforcement, offering superior accuracy from standard smoothbore police shotguns.45 However, the needs also diverge. Tactical users often prefer reduced-recoil loads for faster follow-up shots, a feature less critical to a hunter taking a single shot at game.46 This has led to a diverse marketplace where the same core technology is optimized for different performance envelopes.

7.0 Specialized Projectiles: Niche Applications and Advanced Designs

The development of the single-projectile slug concept has enabled the shotgun to evolve into a highly modular launch platform, capable of firing ammunition designed for very specific and often non-traditional tasks.

7.1 Breaching Rounds: The Sintered Metal “Master Key”

Breaching rounds are a highly specialized form of frangible slug designed for a single purpose: ballistic door breaching.47 These rounds are fired at extremely close range (typically inches) into a door’s locking mechanism or hinges. They are constructed from a sintered material—powdered metal such as copper, zinc, or steel held together by a binder like wax.47 Upon impact, the round transfers an immense amount of focused energy to destroy the lock or hinge and then immediately disintegrates into a fine, relatively harmless powder. This design is a critical safety feature, preventing the projectile from ricocheting or continuing through the door with lethal energy, protecting team members and any individuals on the other side.47 Though designed to be “safe” in this context, a breaching round is absolutely lethal if fired directly at a person.47

7.2 Frangible Slugs: Safe Training and Reduced-Risk Engagements

Distinct from breaching rounds, frangible slugs are designed to be lethal against soft targets but to break apart upon striking a hard surface.50 Typically made from compressed copper powder in a polymer binder, they serve two main functions.51 First, they are an ideal training tool, allowing law enforcement and military personnel to practice on steel targets at close range without the danger of ricochet or splash-back.50 Second, they are a tactical solution for environments where over-penetration is a primary concern, such as inside buildings, aboard ships, or on aircraft. A frangible slug can neutralize a threat but will disintegrate on a wall or bulkhead, minimizing the risk to bystanders in adjacent rooms.50

7.3 Less-Lethal Options: Crowd Control and De-escalation Tools

The shotgun platform’s versatility is perhaps best demonstrated by its ability to fire a wide array of less-lethal projectiles. These rounds are designed to incapacitate through pain compliance and blunt impact trauma rather than by causing lethal injury.54 The most common types include:

  • Bean Bag Rounds: A fabric pouch or “sock” filled with lead shot, designed to deliver a wide, stunning blow.55
  • Rubber Slugs/Balls: Solid projectiles made of hard rubber or polymer that deliver focused impact energy.54
  • Specialty Projectiles: Innovative designs like the Lightfield “Star” projectile, which is a flexible, multi-pronged round designed to spread its impact over a larger surface area to reduce the chance of serious injury.54

These munitions are primarily used by law enforcement for crowd control, riot suppression, and managing dangerous individuals when lethal force is not justified. They are intended to be aimed at large muscle groups, such as the legs and abdomen, to avoid striking the head, neck, or chest, which could result in serious or fatal injuries.54

The existence of these highly specialized rounds cements the modern shotgun’s status not just as a firearm, but as a modular weapons system. No other shoulder-fired weapon can be transformed from a long-range hunting tool to a door-breaching device to a less-lethal crowd control implement simply by changing the ammunition in its chamber. This extreme versatility is entirely enabled by the evolution of the single-projectile slug concept.

8.0 Conclusion: The Enduring Versatility and Future of the Shotgun Slug

The evolution of the shotgun slug is a clear case of necessity driving innovation. From its inception, the slug was engineered to solve a critical performance deficiency, transforming the smoothbore shotgun from a short-range “scattergun” into a viable medium-range firearm. The initial aerodynamic designs of Brenneke and Foster successfully bridged the gap between the limited range of buckshot and the precision of a rifle, making the common shotgun a capable tool for big-game hunting.

The subsequent development of the sabot and rifled barrel system marked a paradigm shift, elevating the shotgun platform to near-rifle levels of accuracy and power. This technological leap was driven largely by regulatory pressures in the civilian hunting market but was quickly adopted for tactical applications, cementing the slug’s dual-use role. Today, the slug is the foundation upon which the shotgun’s ultimate versatility is built. The ability to chamber specialized rounds for breaching, safe training, and less-lethal applications makes the modern shotgun one of the most adaptable weapon systems available to military, law enforcement, and civilian users.

Looking forward, the evolution of the shotgun slug will likely continue along several key vectors. The push for non-toxic materials, driven by environmental regulations, will see further development of slugs made from copper, tin, and other lead-free alloys.16 Ballistic performance will continue to be refined, with increasingly aerodynamic projectile designs and advanced sabot systems that further flatten trajectories and extend effective range. As this evolution continues, the shotgun slug will ensure that its host platform, the venerable shotgun, remains a potent and relevant tool for the foreseeable future.

Image source

The main blog image was generated by Gemini but the source photo of the slugs was obtained from Wikimedia  on September 30, 2025. The original image’s author is Jason Wimbiscus.


If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly donate to help fund our continued report, please visit our donations page.


Sources Used

  1. Shotgun – Wikipedia, accessed September 27, 2025, https://en.wikipedia.org/wiki/Shotgun
  2. The History of Shotguns in the United States – Blog, accessed September 27, 2025, https://blog.keltecweapons.com/history-of-shotguns-united-states
  3. Evolution of The American Hunting Shotshell – Apex Ammunition, accessed September 27, 2025, https://apexmunition.com/evolution-of-the-american-hunting-shotshell/
  4. Historical Evolution of Shotgun Shells | Powder Valley Outdoors, accessed September 27, 2025, https://www.powdervalley.com/history-of-ammunition/historical-evolution-of-shotgun-shells/
  5. HISTORY AND EVOLUTION OF SHOTGUN CARTRIDGES – Corsivia, accessed September 27, 2025, https://corsivia.com/en/2022/09/13/history-and-evolution-of-shotgun-cartridges/
  6. Buckshot Basics | An Official Journal Of The NRA – Shooting Illustrated, accessed September 27, 2025, https://www.shootingillustrated.com/content/buckshot-basics/
  7. Terminal Performance of Buckshot on Deer – Discussion Forums, accessed September 27, 2025, https://www.ballisticstudies.com/Resources/Discussion+Forums/x_forum/17/thread/17213.html
  8. Thoughts on Buck and Ball : r/WarOfRights – Reddit, accessed September 27, 2025, https://www.reddit.com/r/WarOfRights/comments/1jcnwfo/thoughts_on_buck_and_ball/
  9. Buck and Ball “Testing” Results : r/WarOfRights – Reddit, accessed September 27, 2025, https://www.reddit.com/r/WarOfRights/comments/12jmbn4/buck_and_ball_testing_results/
  10. The History of the Shotgun Slug – Angelfire, accessed September 27, 2025, https://www.angelfire.com/tx/ShotGun/INFO/slughist.html
  11. Accuracy relationship of round ball dia vs wad thickness – American Longrifles, accessed September 27, 2025, https://americanlongrifles.org/forum/index.php?topic=30547.0
  12. Round balls in shotgun | Shooters’ Forum, accessed September 27, 2025, https://forum.accurateshooter.com/threads/round-balls-in-shotgun.4058588/
  13. Shotgun slug – Wikipedia, accessed September 27, 2025, https://en.wikipedia.org/wiki/Shotgun_slug
  14. . Crime Laboratory, 1)igest – Office of Justice Programs, accessed September 27, 2025, https://www.ojp.gov/pdffiles1/Digitization/132229NCJRS.pdf
  15. Hunting | BRENNEKE USA – Ammunition, accessed September 27, 2025, https://www.brennekeusa.com/range/brenneke-and/hunting
  16. A DEER’S WORST NIGHTMARE SINCE 1898. SHOTGUN SLUGS …, accessed September 27, 2025, https://www.brennekeusa.com/fileadmin/user_upload/downloads/usa/HuntingCatalog2024.pdf
  17. Brenneke Slug Review – Dedicated to the Smallbore Shotgun, accessed September 27, 2025, https://smallboreshotgun.com/2009/05/04/brenneke-slug-review/
  18. Ammunition: Shotgun Slugs 101 – Gun Digest, accessed September 27, 2025, https://gundigest.com/gear-ammo/ammunition/ammunition-shotgun-slugs-101
  19. Slug It Out | Whitetails Unlimited, accessed September 27, 2025, https://www.whitetailsunlimited.com/hunting-tip/slug-it-out/
  20. The Rifled Slug – That Shotgun Blog, accessed September 27, 2025, https://thatshotgunblog.wordpress.com/2021/11/01/the-rifled-slug/
  21. 12 gauge slugs – BudsGunShop.com, accessed September 27, 2025, https://www.budsgunshop.com/community.php/q/view/q_id/84908
  22. What are Sabot Slugs? | True Shot Ammo, accessed September 27, 2025, https://trueshotammo.com/academy/what-are-sabot-slugs/
  23. A Brief Guide to Shotgun Slugs – Blog.GritrSports.com, accessed September 27, 2025, https://blog.gritrsports.com/shotgun-slugs-selection-guide/
  24. Sabot (firearms) – Wikipedia, accessed September 27, 2025, https://en.wikipedia.org/wiki/Sabot_(firearms)
  25. Slug It Out: Best 12 Gauge Slugs – Recoil Magazine, accessed September 27, 2025, https://www.recoilweb.com/slug-it-out-best-12-gauge-slugs-176854.html
  26. Sabot Slugs vs. Rifled Slugs – The Broad Side – Target Barn, accessed September 27, 2025, https://www.targetbarn.com/broad-side/sabot-slugs-vs-rifled-slugs/
  27. Shotgun Slugs: Different Types and Their Practical Uses – Wide Open Spaces, accessed September 27, 2025, https://www.wideopenspaces.com/shotgun-slugs/
  28. Sabot Slug Bullets Explained – Ammo.com, accessed September 27, 2025, https://ammo.com/bullet-type/sabot-slug
  29. The Truth About Shotgun Slugs | An Official Journal Of The NRA – Shooting Illustrated, accessed September 27, 2025, https://www.shootingillustrated.com/content/the-truth-about-shotgun-slugs/
  30. What is the maximum effective range of a 12-gauge shotgun slug? – Quora, accessed September 27, 2025, https://www.quora.com/What-is-the-maximum-effective-range-of-a-12-gauge-shotgun-slug
  31. Federal’s New Take on Deer Hunting Shotgun Sabot: Freight Train – Game & Fish, accessed September 27, 2025, https://www.gameandfishmag.com/editorial/federal-freight-train-slug/536504
  32. Premier AccuTip Sabot Slug – Remington, accessed September 27, 2025, https://www.remington.com/premier-accutip-sabot-slug.html
  33. Slugger Rifled Slug, 12 Gauge, 438 Grain, 2-3/4 in, 1680 fps – Remington, accessed September 27, 2025, https://www.remington.com/shotshell/slugger-rifled-slug/29-20302.html
  34. Realistic distance to shoot 12 gauge slugs, smooth bore? : r/Hunting – Reddit, accessed September 27, 2025, https://www.reddit.com/r/Hunting/comments/z8s0xe/realistic_distance_to_shoot_12_gauge_slugs_smooth/
  35. Remington Premier AccuTip Sabot Slug 12ga 3″ 385gr | Clinton Sporting Goods, accessed September 27, 2025, https://clintonsporting.com/product/remington-premier-accutip-sabot-slug-12-ga-3-385-grain/
  36. 12 Gauge Ammo – 5 Rounds of 385 Grain Sabot Slug by Remington, accessed September 27, 2025, https://www.ammunitiontogo.com/5rds-12-gauge-remington-premier-accutip-2-34-385gr-bonded-sabot-slug-ammo
  37. Buy Accutip Sabot Slug, 20 Gauge, 260 Grain, 3 in, 1900 fps | Remington, accessed September 27, 2025, https://www.remington.com/shotshell/accutip-sabot-slug/29-20498.html
  38. Remington Premier AccuTip Bonded Sabot Slug – 20 Gauge 2-3/4 – Bass Pro Shops, accessed September 27, 2025, https://www.basspro.ca/p/remington-premier-accutip-bonded-sabot-slug
  39. Shotgun only zone for deer repealed in Minnesota. Rifles will be allowed now. – Reddit, accessed September 27, 2025, https://www.reddit.com/r/minnesota/comments/1ljc6vi/shotgun_only_zone_for_deer_repealed_in_minnesota/
  40. History of the shotgun zone – GovDelivery, accessed September 27, 2025, https://content.govdelivery.com/accounts/MNDNR/bulletins/3e50669
  41. Deer Impacts: Hunting Chronology – Wisconsin Council on Forestry, accessed September 27, 2025, https://councilonforestry.wi.gov/Pages/DeerImpacts/HuntingChronology.aspx
  42. General Hunting Laws | U.S. Fish & Wildlife Service, accessed September 27, 2025, https://www.fws.gov/law/general-hunting-laws
  43. Shotguns: Rules and Regulations – Hunter Ed, accessed September 27, 2025, https://www.hunter-ed.com/washington/studyGuide/Shotguns-Rules-and-Regulations/20105003_146592/
  44. COMBATIVE SHOTGUN – Police and Security News, accessed September 27, 2025, https://policeandsecuritynews.com/2019/07/22/combative-shotgun/
  45. Tactical® TruBall® Rifled Slug 12 Gauge – Law Enforcement, accessed September 27, 2025, https://le.vistaoutdoor.com/ammunition/federal/slug/details.aspx?id=704
  46. Federal 12 Gauge Tactical TruBall Rifled Slug – Ammunition – Streicher’s, accessed September 27, 2025, https://www.streichers.com/federal-12-gauge-tactical-truball-rifled-slug
  47. Breaching round – Wikipedia, accessed September 27, 2025, https://en.wikipedia.org/wiki/Breaching_round
  48. TKO 12-Gauge Breaching Round – Defense Technology, accessed September 27, 2025, https://www.defense-technology.com/product/tko-12-gauge-breaching-round/
  49. 12 Gauge Breaching Round Basics – YouTube, accessed September 27, 2025, https://www.youtube.com/watch?v=iNhGnuBrids
  50. Winchester Ranger Frangible Rifled Slug 12 Gauge Ammo 25 Round Box – Buds Gun Shop, accessed September 27, 2025, https://www.budsgunshop.com/product_info.php/products_id/411560407/winchester+ranger+low+recoil+12+ga+2-3+4+frangible+slug+25rd+box
  51. Range Report: Federal BallistiClean — Frangible Buckshot – The Shooter’s Log, accessed September 27, 2025, https://blog.cheaperthandirt.com/range-report-federal-frangible-buckshot/
  52. Federal Premium Law Enforcement Offers BallistiClean Frangible Slug & Buckshot, accessed September 27, 2025, https://www.federalpremium.com/federal-le-offers-ballisticclean.html
  53. ¾ oz Slug TAP® ENTRY – Hornady Law Enforcement, accessed September 27, 2025, https://www.hornadyle.com/shotgun-ammunition/12-ga-3/4-oz-slug-tap-entry
  54. Law Enforcement | Lightfield Ammunition, accessed September 27, 2025, https://www.litfld.com/products/less-lethal/
  55. 12 Gauge Less Lethal – American Specialty Ammo, accessed September 27, 2025, http://americanspecialtyammo.com/products/12-gauge-less-lethal/
  56. Lightfield Home Defender Less Lethal 12 Ga Rubber Slug 2-3/4 130 Grain – MidwayUSA, accessed September 27, 2025, https://www.midwayusa.com/product/1002100435
  57. Should You Use Shotgun Slugs For Self-Defense? Let’s Find Out. – Guns and Ammo, accessed September 27, 2025, https://www.gunsandammo.com/editorial/slugs-for-self-defense/514380
  58. How Does Home Defense Shotgun Ammo Really Penetrate Walls? – YouTube, accessed September 27, 2025, https://www.youtube.com/watch?v=b9wn5L_8sPg
  59. Birdshot vs. Buckshot vs. Slugs | The Differences of Shotgun Ammo – Liberty Safe, accessed September 27, 2025, https://www.libertysafe.com/blogs/the-vault/birdshot-vs-buckshot-vs-slugs
  60. Shotgun Slugs for Home Defense – Lucky Gunner Lounge, accessed September 27, 2025, https://www.luckygunner.com/lounge/shotgun-slugs-home-defense/
  61. Shotgun slugs for home defence? : r/guns – Reddit, accessed September 27, 2025, https://www.reddit.com/r/guns/comments/1j9ukfr/shotgun_slugs_for_home_defence/

Electromagnetic Pulse (EMP): A Strategic Assessment of the Threat to United States Critical Infrastructure and National Resilience

An Electromagnetic Pulse (EMP) is a short, intense burst of electromagnetic energy that can disrupt, damage, or destroy electronic systems over a wide area. While EMP phenomena can occur naturally, their potential as a weapon of mass disruption presents one of the most severe and asymmetric threats to the national security of the United States. The nation’s profound and growing dependence on a complex, interconnected web of electronic systems makes it uniquely vulnerable to an attack that targets this very foundation of modern society. Understanding the distinct types of EMP, their physical generation mechanisms, and the specific ways they interact with and destroy electronics is the essential first step in assessing this threat and formulating a credible national response.

Taxonomy of EMP Events

EMP events are broadly categorized by their origin: natural or man-made.1 This fundamental distinction is critical, as it defines the characteristics of the pulse, the scope of its effects, and the nature of the threat itself.

Natural vs. Man-Made

Natural EMP events are primarily the result of severe space weather. A Coronal Mass Ejection (CME) from the sun can send a wave of plasma and charged particles toward Earth, causing a Geomagnetic Disturbance (GMD).2 A historically significant example is the 1859 Carrington Event, which induced currents so powerful they set telegraph offices ablaze.4 While a modern Carrington-class event would pose a catastrophic threat to long-line infrastructure like the electric grid, its effects are primarily low-frequency and do not contain the fast, high-frequency components that directly destroy smaller electronics.5

Man-made EMPs, by contrast, are engineered to maximize destructive potential across a broad frequency spectrum. These intentional attacks are the focus of this report and are divided into two primary categories based on the energy source used to generate the pulse.3

Nuclear vs. Non-Nuclear

The most powerful and wide-ranging EMP threat comes from a nuclear detonation, specifically a high-altitude burst, which generates a Nuclear Electromagnetic Pulse (NEMP).4 A single such event, known as a High-Altitude EMP (HEMP), can blanket the entire continental United States with a complex, multi-component pulse designed for systemic destruction.3

Conversely, Non-Nuclear Electromagnetic Pulse (NNEMP) weapons, often called E-bombs, use conventional energy sources to generate a more localized but still potent EMP.4 These devices offer tactical flexibility and can be deployed without crossing the nuclear threshold, presenting a different but equally serious set of strategic challenges.4

The Physics of a High-Altitude Nuclear Detonation (HEMP)

A HEMP is the most catastrophic EMP threat due to its vast area of effect and its complex, multi-layered waveform. A single nuclear weapon with a yield of 1.4 megatons, detonated at an altitude of 250 miles over the central U.S., would affect the entire continent.9 The 1962 Starfish Prime test, a 1.4-megaton detonation 250 miles over Johnston Island, caused streetlights to fail and burglar alarms to sound in Hawaii, nearly 900 miles away, demonstrating the profound reach of the phenomenon.6

The generation of a HEMP begins in the first nanoseconds after a nuclear detonation above an altitude of 30 km.10 The explosion releases an intense, instantaneous burst of gamma rays. These high-energy photons travel outward and collide with air molecules in the upper atmosphere. Through a process known as the Compton Effect, the gamma rays strip electrons from these molecules, creating a massive cascade of high-energy “Compton electrons”.9 These electrons, traveling at relativistic speeds, are captured by the Earth’s magnetic field and forced into a spiral trajectory, creating a massive, coherent, time-varying electrical current. This current radiates a powerful electromagnetic pulse that propagates down to the Earth’s surface.12

The resulting HEMP waveform is not a single pulse but a sequence of three distinct components, designated E1, E2, and E3. These components arrive in rapid succession, each with unique characteristics tailored to attack different parts of the technological infrastructure. This is not a random side effect but a synergistic weapon system, where each component’s attack enables and amplifies the damage of the next.

The E1 Pulse (Early-Time)

The E1 component is the first, fastest, and most direct threat to modern microelectronics. It is an extremely intense electric field, reaching peaks of 50,000 volts per meter (50 kV/m), with an incredibly rapid rise time measured in mere nanoseconds.12 Its duration is brief, lasting only a few microseconds.14 The E1 pulse’s energy is spread across a very broad frequency spectrum, from direct current (DC) up to 1 GHz, which allows it to efficiently couple with small-scale conductors like the wiring in buildings, the traces on printed circuit boards, and the internal architecture of microchips.11 This component acts as the “key” that unlocks the system’s defenses. Its speed is its greatest weapon; it rises too quickly for conventional surge protectors, which typically react in milliseconds, to provide any meaningful protection.11 By inducing voltages that far exceed the breakdown threshold of delicate semiconductor junctions, E1 is capable of destroying the “brains” of modern society: computers, communication systems, industrial control systems, and sensors.9

The E2 Pulse (Intermediate-Time)

Following the E1 pulse, from about one microsecond to one second after the detonation, is the E2 component.11 Generated by scattered gamma rays and inelastic gammas from neutrons, the E2 pulse has characteristics very similar to the electromagnetic pulse produced by a nearby lightning strike.11 On its own, the E2 pulse would be a manageable threat, as much of the nation’s infrastructure has some level of lightning protection.13 However, its danger is synergistic and opportunistic. The E2 pulse acts as the “crowbar” that exploits the now-undefended system. The E1 pulse may have already damaged or destroyed the very surge protection devices and filters designed to stop a lightning-like transient. The U.S. EMP Commission concluded that this synergistic effect is the most significant risk of E2, as it allows the energy of the second component to penetrate deeply into systems whose defenses have been compromised moments before.11

The E3 Pulse (Late-Time)

The final and longest-lasting component is the E3 pulse, which begins seconds after the detonation and can persist for minutes or even longer.11 This slow, low-frequency pulse is not generated by the Compton Effect but by the large-scale distortion of the Earth’s magnetic field. The expanding nuclear fireball, a massive bubble of hot, ionized gas, effectively shoves the planet’s magnetic field lines aside. As the field slowly snaps back into place, this magnetohydrodynamic (MHD) effect induces powerful, low-frequency currents in the Earth itself.15 The E3 pulse’s characteristics are very similar to a severe GMD from a solar storm.11

This component is the “demolition charge” that targets the “muscle” of the nation’s infrastructure: the electric power grid. The slow-changing fields of E3 are perfectly suited to induce geomagnetically induced currents (GICs)—powerful, quasi-DC currents—in very long electrical conductors, such as high-voltage transmission lines, pipelines, and railway lines.14 AC power systems, particularly the massive extra-high-voltage (EHV) transformers that form the backbone of the grid, are not designed to handle these DC-like currents. The GICs cause the magnetic cores of these transformers to saturate, leading to extreme harmonic distortion, rapid overheating, and catastrophic physical destruction within minutes.13 The E3 pulse ensures that even if some electronics survive the E1 and E2 pulses, they will be without the electrical power needed to function for a very long time.

The Physics of Electronic Disruption

The destructive power of an EMP stems from its ability to use an electronic system’s own wiring against it. According to Maxwell’s equations, a time-varying magnetic field induces an electric field, and thus a current, in any nearby conductor.1 An EMP is an intense, rapidly changing electromagnetic field; therefore, any conductive material within its range—from a continental power line to a microscopic wire in a CPU—acts as an antenna, collecting the pulse’s energy and converting it into damaging electrical currents and voltages.18

Coupling and Induced Currents

The efficiency of this energy transfer, or “coupling,” depends on the relationship between the wavelength of the EMP’s energy and the length of the conductor. The high-frequency E1 pulse couples best with shorter conductors (a few inches to several feet), which is why it is so damaging to personal electronics and the internal components of larger systems.15 The low-frequency E3 pulse couples most efficiently with very long conductors (many miles), making the nation’s vast network of power lines the primary collector for its destructive energy.15 Once coupled, these induced currents can reach thousands of amperes, and voltages can reach hundreds of kilovolts, overwhelming circuits designed to operate on a few volts and milliamps.15

Failure Modes

The induced energy surge destroys electronics through two primary mechanisms:

  1. Dielectric Breakdown: Every electronic component contains insulating materials (dielectrics) designed to prevent current from flowing where it should not, such as the thin silicon dioxide layer that insulates the gate of a transistor. When the voltage induced by an EMP exceeds the dielectric strength of this material, the insulator permanently breaks down, creating a short circuit. This process effectively “fries” the microchip, turning a complex transistor into a useless carbon resistor.18
  2. Thermal Damage: The flow of an immense current through a tiny conductor, per Joule’s law (P=I2R), generates an incredible amount of heat in a fraction of a second. This intense local heating can melt or vaporize the delicate internal wiring of an integrated circuit, fuse transistor junctions together, or burn out components on a circuit board.9

Vulnerability of Modern Electronics

The relentless drive for smaller, faster, and more energy-efficient electronics has inadvertently made modern society exponentially more vulnerable to EMP. Solid-state microelectronics operate at very low voltages and have microscopic feature sizes, which dramatically reduces their tolerance to voltage spikes compared to older, more robust technologies like vacuum tubes.20 The very complexity and miniaturization that enable our technological prowess have become a critical vulnerability.

Non-Nuclear EMP (NNEMP) Weapons

While HEMP represents the most catastrophic threat, the development of effective NNEMP weapons has created a new class of tactical threats. These devices allow an adversary to achieve localized, debilitating electronic effects without resorting to nuclear weapons, thus occupying a dangerous strategic “gray zone”.4 An attack using an NNEMP weapon could paralyze a city’s financial district or disable an air defense network without causing direct loss of life, potentially creating confusion and plausible deniability that might delay or prevent a kinetic military response.22

Technology Overview

NNEMP weapons use conventional energy sources to generate a powerful, localized pulse. The two primary technologies are:

  • Flux Compression Generators (FCGs): An FCG uses a bank of capacitors to send a strong initial current through a coil of wire (the stator), creating an intense magnetic field. A cylinder filled with high explosives (the armature) is placed inside the coil. When the explosive is detonated, the rapidly expanding armature creates a moving short circuit with the stator, compressing the magnetic field into an ever-smaller volume. This rapid compression converts the chemical energy of the explosive into a single, massive electromagnetic pulse.23
  • High-Power Microwave (HPM) Weapons: These devices function like highly advanced, weaponized microwave ovens. They use technologies like virtual cathode oscillators (vircators) or magnetrons to generate an extremely powerful, focused beam of microwave energy.23 This directed energy can be aimed at a specific target to disrupt or destroy its internal electronics. The U.S. Air Force has successfully tested HPM weapons delivered by cruise missiles, such as the Counter-electronics High Power Microwave Advanced Missile Project (CHAMP) and its successor, the High-Powered Joint Electromagnetic Non-Kinetic Strike Weapon (HiJENKS).23

Tactical Applications

NNEMP weapons can be delivered by a variety of platforms, including cruise missiles, drones, or even ground vehicles like a van.4 Their effects are geographically constrained, ranging from a single building to several square miles, depending on the size of the weapon and its altitude.9 This makes them ideal for surgical, non-lethal (to humans) first strikes against high-value military or civilian targets. An NNEMP could be used to disable enemy command and control centers, blind air defense radars to clear a path for conventional bombers, or cripple a nation’s stock exchange to trigger economic chaos.22

Table 1: Comparison of EMP Threat Characteristics

Threat TypeHEMP (E1)HEMP (E3)NNEMP (HPM/FCG)Geomagnetic Disturbance (GMD)
Generation SourceHigh-Altitude Nuclear DetonationHigh-Altitude Nuclear DetonationConventional Explosive / Microwave GeneratorSolar Coronal Mass Ejection
Rise TimeNanoseconds (10−9 s)Seconds to MinutesNanoseconds to MicrosecondsHours to Days
DurationMicroseconds (10−6 s)Minutes to HoursMicroseconds to MillisecondsDays
Peak Field StrengthVery High (~50 kV/m)Very Low (~0.01−0.1 V/m)High (Localized)Extremely Low
Frequency SpectrumBroadband (DC – 1 GHz)Very Low Frequency (<1 Hz)Narrowband (Microwave) or BroadbandQuasi-DC
Primary CouplingShort Conductors (Circuit Boards, Wires)Long Conductors (Power Lines, Pipelines)Direct Illumination, Short ConductorsLong Conductors (Power Lines)
Primary Infrastructure TargetMicroelectronics (Computers, SCADA, Comms)EHV Transformers, Power GridTargeted Electronics (e.g., Radars, Data Centers)EHV Transformers, Power Grid

Vulnerability Assessment of U.S. Critical National Infrastructure

The United States’ civilian infrastructure is profoundly and uniquely vulnerable to an EMP attack. The Congressional EMP Commission, after years of study, concluded that the protections common during the Cold War are now “almost completely absent” in the civilian sector.25 This vulnerability is not isolated to a single area but is systemic, rooted in the interconnected nature of the 16 critical infrastructure sectors defined by the Department of Homeland Security. The failure of one foundational infrastructure—the electric power grid—would trigger a rapid, cascading collapse across all others, leading to a national catastrophe.3

The Electric Power Grid: The Linchpin of Modern Society

The electric power grid is the single most critical infrastructure in the United States. Its collapse is the primary catastrophic outcome of a widespread EMP event because all other infrastructures—telecommunications, finance, water, food, transportation, and healthcare—are entirely dependent upon it.6 A society of nearly 330 million people is not structured to provide for its basic needs without electricity.26 While other infrastructures might suffer direct damage from an EMP, only the power grid faces the prospect of a nearly complete, long-term collapse from which recovery could take years.26

EHV Transformers: The Achilles’ Heel

The most acute vulnerability in the entire U.S. infrastructure lies within the nation’s fleet of extra-high-voltage (EHV) transformers.28 These massive, house-sized devices are the backbone of the bulk power transmission system. They are also uniquely susceptible to the low-frequency E3 component of a HEMP or a severe GMD.27 The quasi-DC currents induced by these events cause the transformers’ magnetic cores to saturate, leading to extreme internal heating that can physically melt windings and destroy the unit in as little as 90 seconds, as was observed in the 1989 Quebec blackout.17

This physical vulnerability is compounded by a catastrophic logistical problem. EHV transformers are not mass-produced, off-the-shelf items. They are custom-built, weigh hundreds of tons, and have manufacturing and delivery lead times of 12 to 18 months or longer.28 Critically, there are no domestic manufacturers for the largest EHV transformers, meaning they must be sourced from overseas competitors like Germany or South Korea.28 The United States maintains an insufficient stockpile of spares, and a single HEMP event could destroy hundreds of these transformers simultaneously.27 This creates a “Recovery Paradox”: the nation’s ability to recover from a grid collapse depends on manufacturing and transporting replacements, an industrial and logistical feat that is itself impossible without a functioning power grid and global supply chain. This feedback loop means that a large-scale loss of EHV transformers would not be a temporary blackout but a potential decade-long societal shutdown. A 2008 study presented to the National Academies estimated a recovery time of 4 to 10 years and a direct economic cost of $1 to $2 trillion for such an event.27

SCADA Systems

Compounding the physical destruction of the grid’s “muscle” is the vulnerability of its “brain.” The Supervisory Control and Data Acquisition (SCADA) systems that utilities use to monitor and control the flow of power are complex networks of computers, sensors, and communication links.6 These systems are composed of modern, solid-state electronics that are highly susceptible to the fast, high-frequency E1 pulse. The destruction of SCADA systems would leave grid operators blind and unable to manage the grid, assess damage, or coordinate restoration efforts, greatly complicating any recovery attempt.6

Telecommunications and Information Networks

The telecommunications infrastructure, the nation’s nervous system, is equally vulnerable, primarily through its dependence on the electric grid. This creates the “Illusion of Resilience,” where many critical facilities believe they are protected by backup power systems. While data centers, central switching offices, and cellular towers are often equipped with diesel generators and battery backups, this resilience is measured in hours or days, not the years that would be required for grid recovery.26 The fuel for these generators is delivered by a supply chain that requires electricity for refineries, pipelines, and transport. This chain would break within days of a grid collapse, rendering the backup systems useless and exposing the true fragility of the communications network.

The Fiber Optic Paradox

It is a common misconception that the widespread use of fiber-optic cables has made telecommunications networks immune to EMP. While the glass fibers themselves are not conductive and are therefore unaffected by electromagnetic fields, the network as a whole is not immune.21 A long-haul fiber-optic cable requires electronically powered repeaters and amplifiers every 40-60 miles to boost the signal. These devices, along with the routers and switches at network nodes, are filled with vulnerable microelectronics and are powered by the electric grid.15 Even armored fiber-optic cables, designed for underground use, often contain metallic strength members or shielding layers that can act as antennas, collecting EMP energy and channeling it into the connected electronic equipment.31 Therefore, while the data-carrying medium is robust, the supporting infrastructure that makes it function is highly fragile.

The Financial Sector

The modern financial system is not merely supported by electronics; it is electronics. All transactions, records, and market operations are digital. An EMP attack would represent an existential threat to the entire banking and finance infrastructure.32 The E1 pulse could cause direct damage to servers, routers, and data storage systems within financial institutions. This could lead to irreparable hardware destruction, system latch-up, and the corruption or erasure of magnetic storage media like backup tapes.32 While major data centers are often housed in physically secure facilities with robust backup power, they are rarely shielded against a direct EMP field and remain dependent on the long-term viability of the power grid and communications networks.26 The immediate paralysis of all electronic payments, ATM withdrawals, and market trading would be catastrophic. Perhaps more damaging in the long term would be the complete loss of public trust in the security and stability of financial institutions, a foundation upon which the entire economy is built.32

Interdependent Infrastructures and Cascading Failures

An EMP attack would not be a series of isolated failures but a single, systemic collapse. The mathematical principles of network theory apply: in a highly interconnected system, the failure of a critical node—the electric grid—will trigger a rapid, cascading failure across all dependent nodes.15

  • Transportation: Modern automobiles and trucks contain dozens of vulnerable microprocessors and electronic control units (ECUs) that manage everything from engine ignition and fuel injection to braking and transmission systems.9 A HEMP event would likely render a significant fraction of post-1980s vehicles inoperable, instantly paralyzing road transport.9 The failure of electronic traffic signal systems would create gridlock, and the collapse of the fuel distribution network would halt all remaining vehicles.
  • Water and Wastewater: Municipal water systems rely on electric pumps to maintain pressure and distribute water to homes and businesses. Wastewater treatment plants are similarly dependent on electricity for all their processes.2 The failure of these systems would lead to a rapid loss of access to safe drinking water and a complete breakdown of sanitation, creating the perfect conditions for a massive public health crisis and the spread of diseases like cholera and dysentery.35
  • Food and Healthcare: The U.S. food supply operates on a “just-in-time” logistics model with minimal reserves. The paralysis of transportation, the loss of refrigeration, and the shutdown of food processing plants would mean that grocery store shelves would be empty within days.36 Simultaneously, hospitals, filled with sophisticated electronic diagnostic and life-support equipment, would be rendered technologically inert. With limited backup power, they would be overwhelmed by the public health crisis and unable to provide anything beyond the most rudimentary care.37

Strategic Attack Scenarios: Analysis and Recovery

To operationalize the preceding vulnerability assessment, this section presents three plausible attack scenarios. These scenarios are designed to illustrate the different scales of the EMP threat, from a civilization-ending catastrophe to a targeted, strategic disruption. Each scenario is analyzed in terms of the weapon system, its likely impacts, the daunting road to recovery, and potential mitigation strategies.

Table 2: Summary of Strategic Attack Scenarios
ScenarioImpact LevelWeapon SystemDelivery MethodTarget AreaScale of Infrastructure Impact
Scenario ACatastrophicSingle High-Yield (1.4 MT) “Super-EMP” HEMPIntercontinental Ballistic Missile (ICBM)Continental United States (CONUS)Total, nationwide collapse of all critical infrastructures
Scenario BRegionalSingle Low-Yield (10-20 kT) HEMPShip-launched Short-Range Ballistic Missile (SRBM)Major coastal region (e.g., Eastern Seaboard)Regional grid collapse; national economic shock; refugee crisis
Scenario CTacticalSwarm of NNEMP (HPM/FCG) cruise missilesSubmarine or aircraft launchSpecific high-value nodes (e.g., Wall Street)Localized “electronic deserts”; financial market paralysis

Scenario A (Catastrophic Impact): Coordinated HEMP Attack

This scenario represents the worst-case, existential threat to the United States.

  • Weapon & Delivery: A peer adversary, such as Russia or China, launches a single, high-yield (e.g., 1.4 Megaton) thermonuclear warhead specifically designed to maximize gamma ray output—a so-called “Super-EMP” weapon.25 The warhead is delivered via an ICBM and detonated at an optimal altitude of approximately 250 miles (400 km) over the geographic center of the country, such as Kansas.5 This attack vector is well within the known capabilities of several nations, who have reportedly integrated EMP attacks into their military doctrines as a means to defeat a technologically superior U.S. force.25
  • Impacts: The line-of-sight effects of the detonation would create an EMP field covering the entire continental United States, as well as parts of Canada and Mexico.9 The impact would be immediate and absolute.
  • Direct: The E1 pulse would instantly destroy or disrupt a significant fraction of all unhardened microelectronics nationwide. This includes computers, cell phones, SCADA systems, and the electronic controls in vehicles and aircraft. The E3 pulse would follow, inducing catastrophic GICs in the power grid, leading to the rapid, simultaneous destruction of hundreds of EHV transformers. This would trigger a cascading failure and complete collapse of all three major U.S. power interconnections (Eastern, Western, and ERCOT) within minutes.27
  • Cascading: The result would be a total, nationwide, and indefinite blackout. Every interdependent infrastructure described in Section 2.4 would fail systemically. Communications would revert to pre-industrial methods like runners and word-of-mouth, with limited connectivity from the small amateur radio community.35 The transportation network would cease to function. The water, food, and medical systems would collapse. The nation would be plunged into a pre-industrial existence but with a 21st-century population density and a near-total lack of relevant survival skills. The EMP Commission grimly warned that under such conditions, a majority of the U.S. population could perish within a year from starvation, disease, and the complete breakdown of social order.6
  • Road to Recovery: Recovery from this scenario would not be a matter of years, but of decades or generations. The primary impediment is the “Recovery Paradox” of the EHV transformers. The industrial capacity to build and transport hundreds of these massive devices would have been destroyed along with the grid itself. Recovery would depend on massive, sustained international aid, which may not be forthcoming given the global economic depression that would follow the collapse of the U.S. economy. The nation would have to be rebuilt from the ground up.
  • Mitigation: This catastrophic outcome can only be prevented through a pre-emptive, federally mandated, and funded national effort to harden the electric grid. This includes shielding all critical EHV transformers with technologies like neutral current blockers, deploying multi-stage E1/E2 protection devices on all SCADA and control systems, and establishing a large strategic reserve of spare EHV transformers.17

Scenario B (Likely/Regional Impact): Limited HEMP Attack by a Rogue State

This scenario outlines a more limited but still devastating attack, potentially executed by a rogue state or a state-sponsored terrorist organization.

  • Weapon & Delivery: An adversary with basic nuclear and missile capabilities, such as North Korea or a future nuclear-armed Iran, places a lower-yield nuclear weapon (10-20 kilotons) aboard a commercial freighter. Off the U.S. coast, the weapon is launched via a common short-range ballistic missile, like a Scud, and detonated at an altitude of 50-100 miles.5 This method of attack is particularly insidious because it could be executed with a degree of anonymity; a high-altitude burst leaves no bomb debris for forensic analysis, potentially allowing the perpetrator to escape immediate retaliation.5
  • Impacts: The effects would be confined to a regional footprint with a radius of several hundred miles, rather than continent-wide. A detonation 200 miles off the coast of Virginia, for example, could blanket the entire Eastern Seaboard from New England to the Carolinas, encompassing the nation’s political and financial capitals.
  • Direct: A regional grid collapse would ensue, plunging tens of millions of people into darkness. All unhardened electronics, communications, and transportation systems within the affected zone would fail.
  • Cascading: While the rest of the country would remain powered, it would be faced with a national emergency of unprecedented scale. The paralysis of Washington D.C., New York, and other major eastern cities would trigger an immediate and severe national economic crisis. A massive humanitarian crisis would unfold as millions of people trapped in the blackout zone attempt to flee, creating a refugee flow that would overwhelm neighboring states. The unaffected regions of the country would see their resources, from the National Guard to food and fuel supplies, stripped to support the massive relief and recovery effort.
  • Road to Recovery: The recovery of the affected region would be a multi-year national priority, likely taking 2-5 years. The EHV transformer bottleneck would still be the primary limiting factor, but the nation could, in theory, divert its entire stock of spares and prioritize new manufacturing for the stricken region. The effort would require a full-scale mobilization of federal resources, including FEMA and the Department of Defense, for security, logistics, and humanitarian aid on a scale never before seen.
  • Mitigation: In addition to the grid-hardening measures described in Scenario A, mitigation for this threat requires enhanced maritime and atmospheric surveillance to detect and interdict potential launch platforms before an attack can be executed. Furthermore, developing robust “black start” capabilities—the ability to restart isolated segments of the power grid independently without relying on the wider network—is critical for regional resilience.37

Scenario C (Tactical Impact): Coordinated NNEMP Attack

This scenario demonstrates the strategic use of non-nuclear weapons to achieve precise, debilitating effects without causing widespread destruction or loss of life.

  • Weapon & Delivery: A sophisticated adversary launches a coordinated swarm of 5 to 10 advanced cruise missiles equipped with NNEMP warheads (either HPM or FCG).4 The missiles could be launched from a submarine, long-range bomber, or even covert ground platforms, flying low to evade radar detection before striking their targets simultaneously.24
  • Targeting: The attack is surgical and not aimed at the general power grid. Instead, it targets a cluster of specific, high-value nodes within a single metropolitan area to achieve a strategic effect. A prime example would be a synchronized attack on the New York Stock Exchange, the NASDAQ data center in New Jersey, and the major clearinghouse banks in the Wall Street financial district. Other potential target sets include the data center clusters of Northern Virginia (the backbone of the internet), the port complex of Los Angeles/Long Beach (a critical national supply chain node), or a key military command and control facility.

Impacts:

  • Direct: The attack is non-kinetic and causes no direct fatalities. It does not trigger a widespread blackout. Instead, the targeted facilities are instantly transformed into “electronic deserts.” The intense microwave or radio-frequency pulses would induce currents that cause a “hard kill” on the unshielded electronics within the target buildings, destroying servers, routers, communication hubs, and data storage systems.21 The damage would be permanent, requiring the complete replacement of the affected hardware.21
  • Cascading: The immediate effect of an attack on Wall Street would be the complete paralysis of U.S. and global financial markets. The inability to access records, clear transactions, or execute trades would trigger a financial panic and economic crisis far more damaging than the physical cost of the destroyed equipment. The non-lethal, non-kinetic nature of the attack could create initial confusion, potentially being mistaken for a massive technical failure, which would delay a coherent national security response.
  • Road to Recovery: The recovery timeline would be measured in weeks to months. The primary challenge would not be grid reconstruction but the procurement and installation of highly specialized electronic equipment. An even greater challenge would be restoring domestic and international trust in the integrity and security of the U.S. financial system. The economic and psychological damage could be immense and long-lasting.
  • Mitigation: This highly targeted threat requires facility-level, not grid-level, hardening. Critical national infrastructure nodes—in finance, communications, and logistics—must be physically shielded. This involves constructing facilities that function as Faraday cages, using EMP-rated filters and surge protectors on all incoming power and data lines, and ensuring that all data connections entering or leaving the secure perimeter are fiber-optic to prevent conductive pathways for the pulse.9

U.S. Preparedness: A Tale of Two Efforts

The United States’ preparedness for an EMP attack is a study in contrasts, defined by a dangerous and growing disparity between strategic awareness and civilian vulnerability. Within the national security apparatus, the threat is well understood, and key military and governmental functions are protected. However, the vast civilian infrastructure that underpins the nation’s economy and the very survival of its population remains almost entirely exposed. This creates a strategic paradox where the government may be able to survive an attack but would be left to preside over a collapsed and non-functioning society.

The National Policy Framework: Awareness Without Action?

For over two decades, the U.S. government has been formally aware of the EMP threat, yet this awareness has not translated into meaningful, large-scale protective action for the civilian sector.

  • The EMP Commission: Established by Congress in 2001, the Commission to Assess the Threat to the United States from Electromagnetic Pulse Attack produced a series of authoritative, unclassified reports until it was disbanded in 2017.25 Its comprehensive work, involving top scientists and national security experts, unequivocally identified EMP as an existential threat and documented in detail the severe vulnerabilities of the nation’s critical infrastructures.42 The Commission’s core finding was stark: the civilian electric grid is the nation’s Achilles’ heel, and its collapse would be catastrophic.26 Despite its repeated and urgent warnings, the Commission’s recommendations for hardening were largely ignored.
  • Executive Order 13865: In March 2019, the threat was officially codified at the highest level with the signing of Executive Order 13865, “Coordinating National Resilience to Electromagnetic Pulses”.7 This order designated EMP as a national security threat and tasked the Department of Homeland Security (DHS), through its Cybersecurity and Infrastructure Security Agency (CISA), with leading a coordinated federal effort to improve resilience.7 The policy established three primary goals: improve risk awareness, enhance protection capabilities, and promote effective response and recovery efforts.7
  • The Policy-Action Gap: Despite the work of the EMP Commission and the issuance of a formal Executive Order, tangible progress on hardening the civilian grid remains minimal.6 The federal approach has been one of publishing voluntary guidelines, promoting information sharing, and encouraging public-private partnerships.7 This strategy has failed because of a fundamental misalignment of incentives. Private utility companies are primarily responsible to shareholders and are regulated by commissions that prioritize low consumer electricity rates. Investing billions of dollars to mitigate a low-probability, high-consequence event like EMP offers no short-term return on investment and would necessitate politically unpopular rate hikes.29 Without a federal mandate that either compels the expenditure or provides the funding, the economic and political incentives for private infrastructure owners are strongly aligned with inaction, leaving the nation’s most critical lifeline perilously exposed.

Current State of Readiness: A Dangerous Disparity

The current state of U.S. EMP readiness is dangerously bifurcated. Protections are in place for the continuity of the government, but not for the continuity of society.

  • Military and Government Hardening: A legacy of Cold War planning, key strategic military assets are hardened against EMP. This includes nuclear command, control, and communications (NC3) systems, strategic bomber and missile forces, and critical facilities like NORAD’s Cheyenne Mountain Complex.34 Likewise, continuity-of-government (COG) facilities and transportation assets, such as Air Force One, are shielded to ensure that the national command authority can survive an attack and direct the military response.29
  • Civilian Vulnerability: This military hardening exists in a vacuum of civilian vulnerability. The very society and industrial base that these military forces are meant to protect are completely soft targets.25 The U.S. Air Force, for example, is inextricably dependent on the civilian power grid and communications networks to operate its domestic bases.34 This creates a “Hollow Government” scenario: in the aftermath of a HEMP attack, the President may be able to issue orders from a hardened command post, but there will be no functioning civilian economy, no industrial base to mobilize, no transportation network to move resources, and no informed populace to direct. The government would survive as a hollowed-out entity, isolated from and unable to assist the collapsed nation it is meant to lead.

The Verdict: What We Are Ready For vs. What We Are Not

A candid assessment of the nation’s readiness reveals a clear and alarming picture.

  • Ready For: The United States is prepared, at a strategic command level, to withstand an EMP attack. The government can likely maintain continuity and control over its nuclear deterrent and other strategic military forces. There is a high degree of threat awareness and a solid policy framework within the national security community.
  • Not Ready For: The United States is catastrophically unprepared for the societal consequences of an EMP attack. The nation is not ready for a long-term, nationwide power outage and the subsequent, inevitable collapse of all life-sustaining critical services. We are not ready to feed, water, or provide medical care for our population in a post-EMP environment. The current “bottom-up” strategy, which relies on the voluntary and economically disincentivized actions of private infrastructure owners, has proven to be a failure and has left the American people unacceptably vulnerable to what is arguably the single greatest threat to their survival and way of life.6

A National Resilience Strategy: Recommendations for Action

Addressing the profound threat of EMP requires a fundamental shift from a strategy of awareness and voluntary guidance to one of decisive, coordinated action. True national resilience cannot be achieved through half-measures. It demands a multi-layered approach that combines top-down federal mandates for critical infrastructure with bottom-up preparedness at the community and individual levels. The following recommendations provide a framework for such a strategy.

National-Level Mitigation

The federal government must lead this effort with the urgency the threat demands. The reliance on market forces and voluntary measures has failed; legislative and executive action is now required.

  1. Mandate and Fund Grid Hardening: Congress must pass binding legislation, such as the long-proposed SHIELD Act, that directs the Federal Energy Regulatory Commission (FERC) to implement mandatory standards for EMP and GMD protection of the bulk electric grid.25 These standards must, at a minimum, require the installation of proven protective technologies, such as neutral current blockers or Faraday cage-like shielding for all EHV transformers, and the deployment of multi-stage, fast-acting surge protection devices on all critical SCADA and control systems.17 To overcome the economic disincentives, this mandate should be paired with a federal cost-sharing program or tax incentives to assist utilities with the capital investment.
  2. Establish a Strategic Transformer Reserve: The Department of Energy, in partnership with DHS, should be directed and funded to establish a national Strategic Transformer Reserve. This would involve procuring and strategically stockpiling a sufficient number of spare EHV transformers and other critical long-lead-time grid components. This reserve is the only practical way to break the “Recovery Paradox” and enable a grid restoration timeline measured in months rather than many years.
  3. Invest in Resilient Grid Technologies: Federal research and development funding should be prioritized for next-generation grid technologies that are inherently more resilient to EMP. This includes funding for the development and deployment of hardened microgrids that can “island” from the main grid to power critical local facilities, as well as research into solid-state transformers, which are less vulnerable to GIC effects than traditional designs.37
  4. Restructure Public-Private Partnerships: The role of CISA should be elevated from an advisory and information-sharing body to a central planning and operational coordination hub for infrastructure protection.7 This should involve conducting mandatory, integrated vulnerability assessments with private sector owners and developing joint, actionable plans for hardening critical nodes across all 16 infrastructure sectors.

Community and Individual Preparedness

In the event of a catastrophic HEMP attack, federal and state assistance may be unavailable for an extended period. Survival and recovery will therefore depend heavily on the resilience and preparedness of local communities and individual citizens.

State and Local Government Actions

  1. Promote and Protect Local Microgrids: State and municipal governments should identify critical local facilities—such as hospitals, water treatment plants, emergency operations centers, and food distribution hubs—and incentivize the development of EMP-protected microgrids to ensure their continued operation during a prolonged blackout.35
  2. Establish Community Stockpiles: Local emergency management agencies should plan for and maintain strategic stockpiles of essential resources, including fuel for emergency vehicles and generators, non-perishable food, and medical supplies, sufficient to sustain the community for at least 30-90 days.35
  3. Integrate EMP into Emergency Planning: EMP and long-term grid-down scenarios must be incorporated into all state and local emergency preparedness plans, training, and exercises.35 This will ensure that first responders and community leaders are prepared to operate in an environment without power, communications, or modern technology.

Individual and Family Preparedness

  1. Build a Comprehensive Emergency Kit: Every household must take responsibility for its own immediate survival. This requires building and maintaining a disaster kit with a minimum of 30 days of essential supplies, including non-perishable food, a method to purify water (at least one gallon per person per day), all necessary medications, and a robust first-aid kit.5
  2. Protect Critical Personal Electronics: Individuals can safeguard small, vital electronic devices by storing them in a makeshift Faraday cage. This can be constructed from a conductive metal container, such as a galvanized steel trash can or a military surplus ammo can, with the electronics placed inside a non-conductive inner box (e.g., cardboard) to prevent contact with the metal shell. Multiple nested layers of shielding (e.g., wrapping a device in aluminum foil, placing it in a box, and then wrapping the box in more foil) can also be effective.48 Key items to protect include a battery-powered or hand-crank shortwave radio for receiving information, a small solar charger, and a USB drive containing copies of important personal documents.
  3. Develop a Resilient Family Plan: Families must develop and practice an emergency plan that does not rely on modern technology.52 This should include pre-determined rally points, non-electronic communication methods, and a plan for shelter. Acquiring practical skills such as basic first aid, gardening and food preservation, and manual tool use will be invaluable.
  4. Foster Community Alliances: In a prolonged societal collapse, the most resilient unit will not be the isolated individual but the organized community. Building strong relationships with neighbors and forming community alliances for mutual security, resource pooling, and problem-solving is one of the most critical preparedness steps an individual can take.47

Table 3: Multi-Level Mitigation and Preparedness Framework

Stakeholder LevelPre-Event Mitigation (Hardening & Stockpiling)Immediate Response (First 72 Hours)Long-Term Recovery (Post-72 Hours)
Federal GovernmentMandate & fund grid hardening (EHV transformers, SCADA). Establish Strategic Transformer Reserve. Fund R&D in resilient grid tech.Maintain continuity of government (COG). Command & control strategic military assets. Assess nationwide damage via hardened assets.Coordinate international aid. Manage Strategic Transformer Reserve deployment. Prioritize restoration of critical national infrastructure.
State & Local GovernmentDevelop EMP-protected microgrids for critical facilities. Maintain community stockpiles of fuel, food, water. Integrate EMP into all emergency plans & exercises.Activate Emergency Operations Centers (on backup power). Establish public information points (non-electronic). Secure critical infrastructure (water plants, hospitals).Manage local resource distribution. Coordinate volunteer and mutual aid groups. Facilitate phased restoration of local services.
Critical Infrastructure Owners (Utilities, Telecom, etc.)Install EHV transformer protection (neutral blockers). Deploy E1/E2 surge protection. Maintain “black start” capability and fuel reserves.Execute damage assessment protocols. Isolate damaged grid sections to prevent cascading. Attempt to establish “islands” of power around critical loads.Coordinate with government on restoration priorities. Manage repair/replacement of damaged equipment. Re-establish network connectivity incrementally.
Individuals & FamiliesAssemble 30+ day supply kit (food, water, medicine). Protect vital small electronics in a Faraday cage. Develop a tech-free family emergency plan.Shelter in place; assess immediate safety. Conserve resources (water, food, fuel). Establish contact with neighbors for mutual support.Implement long-term survival skills (water purification, food production). Participate in community security & organization. Assist in local recovery efforts.

If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly donate to help fund our continued report, please visit our donations page.


Sources Used

  1. Electromagnetic pulse – Wikipedia, accessed September 28, 2025, https://en.wikipedia.org/wiki/Electromagnetic_pulse
  2. Electromagnetic Pulse (EMP) | Anne Arundel County Government, accessed September 28, 2025, https://www.aacounty.org/emergency-management/disaster-preparedness/hazards/electromagnetic-pulse-emp
  3. Electromagnetic Pulse and Geomagnetic Disturbance – CISA, accessed September 28, 2025, https://www.cisa.gov/resources-tools/programs/electromagnetic-pulse-and-geomagnetic-disturbance
  4. Electromagnetic pulse – CT.gov, accessed September 28, 2025, https://portal.ct.gov/-/media/CSC/1_Dockets-medialibrary/1_MEDIA_DO500_600/DO512/MotiontoReopenCT4RT/polzin-2-of-3.pdf
  5. What Would It Take To Survive an EMP Attack? – Mind Matters, accessed September 28, 2025, https://mindmatters.ai/2022/03/what-would-it-take-to-survive-an-emp-attack/
  6. THE THREAT WE FAIL TO ADDRESS | The American Legion, accessed September 28, 2025, https://www.legion.org/information-center/news/magazine/2018/april/the-threat-we-fail-to-address
  7. Electromagnetic Pulse – CISA, accessed September 28, 2025, https://www.cisa.gov/topics/risk-management/electromagnetic-pulse
  8. Nuclear electromagnetic pulse – Wikipedia, accessed September 28, 2025, https://en.wikipedia.org/wiki/Nuclear_electromagnetic_pulse
  9. Office of Radiation … – Washington State Department of Health, accessed September 28, 2025, https://doh.wa.gov/sites/default/files/legacy/Documents/Pubs/320-090_elecpuls_fs.pdf
  10. The Early-Time (E1) High-Altitude Electromagnetic Pulse (HEMP) and Its Impact on the US Power Grid – Stanford, accessed September 28, 2025, http://large.stanford.edu/courses/2019/ph241/rogers1/docs/meta-r-320.pdf
  11. Electromagnetic Pulse or EMP and the E1, E2 and E3 Components …, accessed September 28, 2025, https://www.empshield.com/electromagnetic-pulse-or-emp-and-the-e1-e2-and-e3-components/
  12. 11.3 HEMP (High-altitude Electromagnetic Pulse) – Fiveable, accessed September 28, 2025, https://fiveable.me/electromagnetic-interference-and-compatibility/unit-11/hemp-high-altitude-electromagnetic-pulse/study-guide/8nVEzYT8oMwpRKUF
  13. What is High-Altitude Electromagnetic Pulse (HEMP)? – TSS USA Manufacturing, accessed September 28, 2025, https://www.tssusamfg.com/what-is-high-altitude-electromagnetic-pulse/
  14. What are the Three Types of EMP? – Noordin Etech, accessed September 28, 2025, https://www.emcnoordin.com/what-are-the-three-types-of-emp/
  15. Electromagnetic Pulses – Six Common Misconceptions – Domestic Preparedness, accessed September 28, 2025, https://www.domesticpreparedness.com/commentary/electromagnetic-pulses-six-common-misconceptions
  16. System Electromagnetic Pulse Survivability and Hardening – DAU, accessed September 28, 2025, https://www.dau.edu/sites/default/files/Migrated/CopDocuments/EMP%20Overview.pdf
  17. Secure the Grid Coalition – Department of Energy, accessed September 28, 2025, https://www.energy.gov/sites/default/files/2022-11/Comment%20-%20Secure%20the%20Grid%20Coalition%20-%20SEAB-Oct%202022.pdf
  18. Why does EMP fry electronics, and does turning them off actually protects them (like they do in movies)? : r/askscience – Reddit, accessed September 28, 2025, https://www.reddit.com/r/askscience/comments/3vxup1/why_does_emp_fry_electronics_and_does_turning/
  19. How exactly does an EMP damage electronics? : r/askscience – Reddit, accessed September 28, 2025, https://www.reddit.com/r/askscience/comments/lqtxz/how_exactly_does_an_emp_damage_electronics/
  20. EMP: Threats and Protection Strategies | Electromagnetic Interference Class Notes, accessed September 28, 2025, https://fiveable.me/electromagnetic-interference-and-compatibility/unit-11
  21. Improvised Electromagnetic Pulse Devices – Weapons Effects and Countermeasures, accessed September 28, 2025, https://www.defensemedianetwork.com/stories/improvised-electromagnetic-pulse-devices-4/
  22. Non-Nuclear EMP: Automating the Military May Prove a Real Threat, accessed September 28, 2025, https://irp.fas.org/agency/army/mipb/1997-1/merkle.htm
  23. Non-nuclear EMP Weapons – How Electromagnetic Pulse Attacks …, accessed September 28, 2025, https://science.howstuffworks.com/e-bomb3.htm
  24. Non-Nuclear EMP Weapons: How to Deter China’s Growing Military Might?, accessed September 28, 2025, https://nationalinterest.org/blog/buzz/non-nuclear-emp-weapons-how-deter-chinas-growing-military-might-184713
  25. EMP Commission History | High Frontier, accessed September 28, 2025, http://highfrontier.org/emp-commission-history/
  26. Report of the Commission to Assess the Threat … – EMP Commission, accessed September 28, 2025, https://www.empcommission.org/docs/A2473-EMP_Commission-7MB.pdf
  27. Electromagnetic Pulse: Effects on the U.S. Power Grid, accessed September 28, 2025, https://legacy-assets.eenews.net/open_files/assets/2011/08/26/document_gw_02.pdf
  28. US electricity grid still vulnerable to electromagnetic pulses | Physics Today – AIP Publishing, accessed September 28, 2025, https://pubs.aip.org/physicstoday/article/62/9/24/895534/US-electricity-grid-still-vulnerable-to
  29. Robert A McEntee-A1.docx – Department of Energy, accessed September 28, 2025, https://energy.gov/sites/default/files/2021-06/Robert%20A%20McEntee-A1.docx
  30. Fiber optic communications link performance in EMP and intense light transient environments. Interim report – OSTI, accessed September 28, 2025, https://www.osti.gov/biblio/7227846
  31. The interaction of Electromagnetic Pulse with buried Armoured Fiber Optic Cables, accessed September 28, 2025, https://www.researchgate.net/publication/351485580_The_interaction_of_Electromagnetic_Pulse_with_buried_Armoured_Fiber_Optic_Cables
  32. TDCC’s Security Protection Measures Against Electromagnetic Pulse Attack, accessed September 28, 2025, https://www.tdcc.com.tw/portal/en/publication/business/4028979683acb40f0183ca6ec1210019?eMNum=264
  33. The Electromagnetic Pulse (EMP) Bomb and Its Risks on Islamic Banks: A Case Study of Islamic Banks Operating in Jordan – ResearchGate, accessed September 28, 2025, https://www.researchgate.net/publication/388619717_The_Electromagnetic_Pulse_EMP_Bomb_and_Its_Risks_on_Islamic_Banks_A_Case_Study_of_Islamic_Banks_Operating_in_Jordan
  34. USAF Role in the Electromagnetic Pulse Vulnerability of the United States Critical Infrastructure > Air University (AU) > Wild Blue Yonder, accessed September 28, 2025, https://www.airuniversity.af.edu/Wild-Blue-Yonder/Articles/Article-Display/Article/3674518/usaf-role-in-the-electromagnetic-pulse-vulnerability-of-the-united-states-criti/
  35. Imagining the U.S. Without Power: A Dual-World EMP Exercise – Domestic Preparedness, accessed September 28, 2025, https://domesticpreparedness.com/articles/imagining-the-u-s-without-power-a-dual-world-emp-exercise
  36. Is it just me or is the EMP the most underutilized bomb in science fiction? – Reddit, accessed September 28, 2025, https://www.reddit.com/r/SciFiConcepts/comments/rlyjv7/is_it_just_me_or_is_the_emp_the_most/
  37. The Electromagnetic Threat to the United States: Recommendations for Consequence Management – DTIC, accessed September 28, 2025, https://apps.dtic.mil/sti/trecms/pdf/AD1164809.pdf
  38. High altitude electromagnetic pulse (EMP) attack scenario against the USA, accessed September 28, 2025, https://nuclearweaponsedproj.mit.edu/high-altitude-electromagnetic-pulse-emp-attack-scenario-against-usa/
  39. About the Electromagnetic Pulse (EMP) Mitigation Research Area – Resilient Energy Systems – Sandia National Laboratories, accessed September 28, 2025, https://www.sandia.gov/resilience/about-the-electromagnetic-pulse-emp-mitigation-research-area/
  40. Electromagnetic Pulse (EMP) Protection and Resilience Guidelines for Critical Infrastructure Equipment – CISA, accessed September 28, 2025, https://www.cisa.gov/sites/default/files/publications/19_0307_CISA_EMP-Protection-Resilience-Guidelines.pdf
  41. Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack, accessed September 28, 2025, https://www.empcommission.org/
  42. Reports | EMPCommission.org, accessed September 28, 2025, https://www.empcommission.org/reports.php
  43. Report of the Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack, accessed September 28, 2025, https://www.empcommission.org/docs/empc_exec_rpt.pdf
  44. Coordinating National Resilience to Electromagnetic Pulses – Federal Register, accessed September 28, 2025, https://www.federalregister.gov/documents/2019/03/29/2019-06325/coordinating-national-resilience-to-electromagnetic-pulses
  45. Electromagnetic Pulse Shielding Mitigations – Homeland Security, accessed September 28, 2025, https://www.dhs.gov/sites/default/files/2022-09/22_0902_st_emp_mitigation_best_practices.pdf
  46. National Preparedness | FEMA.gov, accessed September 28, 2025, https://www.fema.gov/emergency-managers/national-preparedness
  47. EMP Attack Prepping Guide – Checklist, FAQs, Novel – Treehouse Dad, accessed September 28, 2025, https://treehousedad.com/emp-attack-prepper-guide/
  48. www.jackery.com, accessed September 28, 2025, https://www.jackery.com/blogs/knowledge/how-to-protect-electronics-from-emp-electromagnetic-pulse#:~:text=An%20EMP%20can%20impact%20vulnerable,protect%20your%20electronics%20from%20EMP.
  49. How to Protect Electronics From EMP Threats – ShopSolar.com, accessed September 28, 2025, https://shopsolarkits.com/blogs/learning-center/how-to-protect-electronics-from-emp-threats
  50. EMP Survival: How to Protect Electronics In a Free DIY Faraday Cage – YouTube, accessed September 28, 2025, https://www.youtube.com/watch?v=3WTHk-tfT3I
  51. 3 Easy Ways to Protect Electronics from an Electromagnetic Pulse – wikiHow, accessed September 28, 2025, https://www.wikihow.com/Protect-Electronics-from-an-Electromagnetic-Pulse
  52. Are You Ready? An In-Depth Guide to Citizen … – Ready.gov, accessed September 28, 2025, https://www.ready.gov/sites/default/files/2021-11/are-you-ready-guide.pdf
  53. Preparedness Emergency Preparedness – Anchorage – Muni.org, accessed September 28, 2025, https://www.muni.org/Departments/OEM/Prepared/pages/default.aspx

The Unending Conflict: How the Character of Warfare Has Transformed in the 21st Century

The fundamental nature of conflict as a political instrument, a violent means to compel an adversary to fulfill one’s will, remains an immutable feature of international relations. Yet, over the past 50 years, the character of this conflict—the domains in which it is fought, the tools employed, and the very definitions of victory and defeat—has undergone a radical transformation. The global strategic landscape has shifted from a state of episodic, declared wars, punctuated by periods of discernible peace, to a condition of persistent, undeclared, multi-domain competition. The clear delineation between war and peace has not merely blurred; it has been deliberately eroded and is now actively exploited as a domain of strategic ambiguity.1

This report analyzes this fundamental evolution in the character of conflict. It begins by establishing a strategic baseline circa 1975, a world defined by the bipolar certainty of the Cold War. In that era, the existential threat of a massive conventional and nuclear exchange between two superpowers paradoxically forced competition into the shadows, creating and refining the playbook for today’s hybrid conflicts. The analysis then traces the profound technological and doctrinal shifts of the post-Cold War era, marked by the “Revolution in Military Affairs” (RMA), which cemented U.S. conventional military dominance but also accelerated the turn toward asymmetric strategies by its rivals.

Finally, the report examines the current state of international competition, arguing that the major powers are already engaged in a form of “undocumented conflict.” This conflict is waged continuously across new and expanded domains—economic, cyber, and informational—and is increasingly shaped by emerging technologies, most notably artificial intelligence (AI). The ultimate battlefield has expanded from physical territory to encompass critical infrastructure, financial systems, and the cognitive domain of public perception itself. The central challenge for national security in the 21st century is no longer simply preparing for a future war, but navigating the unending conflict that is already here.

Section I: The Cold War Baseline – A World of Bipolar Certainty (c. 1975)

Fifty years ago, the strategic environment was defined by a stark, bipolar clarity. The world was divided into two ideological blocs, led by the United States and the Soviet Union, locked in a competition underwritten by the threat of global thermonuclear war.5 This overarching threat of Mutually Assured Destruction created a paradoxical stability at the strategic level. While it made direct, large-scale conventional war between the superpowers unthinkable, it did not eliminate conflict. Instead, it channeled geopolitical competition into deniable, indirect, and asymmetric arenas, creating an incubator for the hybrid methods that define the modern era.

The Conventional Battlefield – The Fulda Gap and the North German Plain

The central front of the Cold War was Europe, where two of the most powerful military alliances in history stood poised for a cataclysmic conventional battle. Military doctrine and force posture on both sides were overwhelmingly focused on this potential high-intensity conflict.

NATO’s strategy was formally codified in 1967 as “Flexible Response.” This doctrine moved away from the previous policy of “Massive Retaliation” and envisioned a tiered response to Warsaw Pact aggression. An attack would be met first with a direct conventional defense, followed by the deliberate and controlled escalation to tactical, and finally strategic, nuclear weapons if necessary.6 The goal was to possess a credible deterrent at every level of the escalatory ladder. NATO’s planning called for its forces to be capable of sustaining a conventional defense in Central Europe for approximately 90 days against a full-scale invasion, allowing time for political negotiation or the decision to escalate.6 However, a sense of unreality pervaded these preparations; while doctrine called for a seamless transition from conventional to nuclear operations, all practical attempts to devise tactics for actually fighting and winning on a nuclear battlefield had proven futile.8

The Warsaw Pact, guided by Soviet military thought, held a fundamentally offensive-oriented doctrine. Soviet theorists believed that the defensive was an inherently weaker form of warfare and that decisive victory could only be achieved through the offense.9 Their plans were officially framed as a massive “counterattack” that would follow the repulse of an initial NATO assault. This offensive would depend on the overwhelming numerical superiority of Soviet-style forces, particularly their vast tank armies, to break through NATO lines along axes like the Fulda Gap and the North German Plain and rapidly advance deep into Western Europe.9 In 1975, the Warsaw Pact enjoyed a considerable numerical advantage in Central Europe, particularly in tanks and artillery, and held the geostrategic advantage of “interior lines,” which allowed for the rapid transfer of forces between fronts.10

This doctrinal standoff fueled an intense technological arms race in conventional weaponry. The mid-1970s saw the introduction of a new generation of military hardware. Tanks were upgraded with stabilized turrets and electronic fire controls, while armored personnel carriers evolved into heavier infantry fighting vehicles from which troops could fight.8 The development of potent anti-tank guided missiles (ATGMs) forced armored divisions to adopt closer cooperation between tanks and infantry.8 Armies on both sides became increasingly motorized and mechanized. This period also saw the first significant use of remotely piloted vehicles (RPVs), or drones, for surveillance and target acquisition, and the maturation of the attack helicopter as a dedicated “tank-busting” platform, a lesson learned from its massive use in Vietnam.8 This unprecedented faith in technology led to a battlefield where the number and quality of electronic systems became a primary index of an army’s modernity.8 For the U.S. Army, this era was one of doctrinal ferment, with its focus shifting cyclically between conventional warfare in Europe, the specter of nuclear conflict, and the immediate lessons of counterinsurgency in Vietnam, resulting in a tactical doctrine more complex than at any other point in its history.12

The Shadow War – Proxy Conflicts and Clandestine Operations

While the armies in Europe planned for a war that never came, the actual superpower conflict was being fought—brutally and continuously—in the shadows and across the developing world. The high risk of nuclear escalation made direct confrontation too dangerous, turning proxy wars and clandestine operations into the primary instruments of geopolitical competition.14

Proxy wars were the main event of the Cold War, accounting for an estimated 20 million deaths, almost all of which occurred in the “Third World”.14 These conflicts were ostensibly local or regional disputes, but they became battlegrounds for the larger ideological struggle between capitalism and communism.16 The superpowers avoided direct military clashes but fueled the fighting by providing massive amounts of funding, weaponry, training, and political backing to their respective surrogate forces.14 The Vietnam War, which saw the United States supporting South Vietnam against the Soviet- and Chinese-backed North, was the most devastating example.5 Other major proxy conflicts of the era included the Angolan Civil War, where the Soviet Union and Cuba backed the MPLA against U.S.-supported factions 18, and the Ogaden War, where the superpowers switched allegiances, with the Soviets ultimately backing Ethiopia against U.S.-supported Somalia.21 These interventions allowed the superpowers to test strategies and military hardware while avoiding a direct “hot war,” but they left a legacy of devastation and long-term instability in the regions where they were fought.16

Parallel to these overt-by-proxy conflicts was a relentless, clandestine war fought by the intelligence agencies of both blocs. The CIA and the KGB engaged in a global struggle for influence through espionage, subversion, and covert action. The CIA’s activities included political subversion, such as providing financial support to officers plotting against Chile’s Salvador Allende before the 1973 coup, and paramilitary operations, such as arming and training mujahideen guerrillas in Afghanistan in the following decade.23 The agency also engaged in numerous, and often bizarre, assassination plots against figures like Fidel Castro.23 Espionage was rampant, with both sides dedicating immense resources to stealing military-industrial secrets and recruiting high-level agents within the other’s government and intelligence services.23 The KGB was notoriously effective in this domain, having infiltrated Western intelligence agencies to the point where the CIA was often “utterly ignorant of Soviet espionage operations” against it.25

The KGB, for its part, conducted what it termed “executive actions” or “wet work” (liquidations) through its secretive 13th Department.26 These operations targeted defectors, dissidents, and other “ideological opponents” abroad with the aim of silencing anti-Soviet voices and sowing fear within émigré communities.26 To maintain plausible deniability, the KGB often employed exotic methods, such as the ricin-filled pellet fired from a modified umbrella used to kill Bulgarian dissident Georgi Markov in London in 1978, and frequently relied on the intelligence services of allied Eastern Bloc nations to carry out the “dirty work”.26 In Africa, Soviet clandestine operations were particularly large-scale, as the KGB and GRU (military intelligence) worked to counter U.S. influence, supply arms to anti-government groups, and exploit the relatively weak capabilities of local security services to establish intelligence networks.27

This history reveals a significant divergence between the war that was being planned for and the war that was actually being waged. While the formal military doctrines of both NATO and the Warsaw Pact were fixated on a decisive, large-scale conventional battle in Europe, the true character of superpower conflict was predominantly irregular, clandestine, and fought through third parties. This created a deep reservoir of institutional knowledge and operational expertise in unconventional warfare, political subversion, and deniable operations within the intelligence and special operations communities. This expertise, developed in the shadows of the Cold War, would prove highly relevant in the multipolar, ambiguous security environment that followed.

Section II: The Technological Rupture – The Revolution in Military Affairs (RMA)

Beginning in the 1970s and accelerating dramatically after the end of the Cold War, a suite of new technologies catalyzed a fundamental shift in the conduct of conventional warfare. This “Revolution in Military Affairs” (RMA) was characterized by the integration of advanced surveillance, precision-guided weaponry, and networked command and control, creating an era of unparalleled U.S. military dominance.31 However, this very dominance had a profound and unintended consequence: it rendered symmetrical, conventional warfare an untenable option for potential adversaries, thereby accelerating their pivot toward the asymmetric and hybrid methods that now define the contemporary conflict landscape.

The Dawn of Precision and Stealth

Two technologies in particular formed the core of the RMA: precision-guided munitions and stealth.

Precision-Guided Munitions (PGMs), or “smart bombs,” fundamentally altered the calculus of air power. The ability to guide a weapon to its target with a high degree of accuracy represented a quantum leap in lethality and efficiency.33 During the Vietnam War, PGMs proved to be up to 100 times more effective than their unguided “dumb bomb” counterparts.35 This was starkly illustrated by the destruction of the Thanh Hoa Bridge in North Vietnam in 1972. The bridge, a critical supply line, had withstood hundreds of sorties and the loss of numerous aircraft over several years of conventional bombing, but was finally dropped by a small number of aircraft using laser-guided bombs.33 The 1991 Persian Gulf War served as the global debut for this capability on a massive scale. Coalition forces demonstrated that PGMs could destroy Iraqi armored vehicles with pinpoint accuracy in a process pilots dubbed “tank plinking”.33 Overall, while guided munitions accounted for only 9% of the total ordnance used in the war, they were responsible for 75% of all successful hits, proving 35 times more likely to destroy their target per weapon dropped than unguided bombs.33 This shifted the logic of bombing from achieving effects through mass to achieving them through precision.34

Stealth Technology provided the means to deliver these precision weapons by rendering aircraft nearly invisible to enemy radar. Platforms like the F-117 Nighthawk and the B-2 Spirit bomber were designed with faceted shapes and coated in radar-absorbent materials to reduce their radar cross-section (RCS) by several orders of magnitude.37 This innovation effectively negated decades of investment by adversaries in sophisticated integrated air defense systems.39 Like PGMs, stealth technology had its coming-out party during the Gulf War. F-117s flew with impunity over Baghdad, one of the most heavily defended cities in the world at the time, and decimated critical Iraqi command and control nodes, air defense sites, and other high-value targets. No stealth aircraft were lost in the conflict.39

The true power of the RMA, however, lay not in these individual technologies but in their integration into a networked “System of Systems”.40 This concept linked intelligence, surveillance, and reconnaissance (ISR) platforms—such as satellites, spy planes, and drones—with command, control, and communications (C3) networks and precision-strike assets.31 This synergy created a virtuous cycle: ISR assets could find a target, the network could rapidly transmit that information to a decision-maker and a shooter, and a precision weapon could destroy the target with high probability. This integration of technology, doctrine, and organization produced a dramatic increase in military effectiveness.31

Doctrinal Transformation and Asymmetric Consequences

This technological revolution was accompanied by a doctrinal one within the U.S. military. Reeling from the experience in Vietnam and absorbing the lessons of the 1973 Yom Kippur War—where modern ATGMs and surface-to-air missiles (SAMs) inflicted heavy losses on Israeli armor and aircraft—the U.S. Army undertook a profound intellectual reassessment.41

In 1976, the Army published Field Manual 100-5, Operations, which codified a new doctrine known as “Active Defense”.44 This doctrine was a radical departure from previous thinking, focusing almost exclusively on a high-intensity, conventional battle against the Soviet Union in Europe.44 It was heavily focused on firepower, emphasizing the need to “win the first battle of the next war” by attriting the numerically superior Warsaw Pact forces with technologically advanced weaponry.45 Active Defense was controversial, however, and criticized for being too defensive and ceding the initiative to the enemy.41

This critique led to another doctrinal evolution. In 1982, the Army released a new version of FM 100-5 that introduced the concept of AirLand Battle.41 This doctrine was more aggressive and maneuver-oriented, designed specifically to defeat the Soviet operational concept of echeloned attacks.43 AirLand Battle envisioned an “extended battlefield” where U.S. forces would not just defend against the enemy’s front-line troops but would use integrated air power and long-range fires to attack and disrupt their follow-on echelons, command posts, and logistics deep in the rear.42 This required unprecedented levels of cooperation between the Army and the Air Force and was a perfect doctrinal match for the emerging technologies of the RMA.48

The stunning success of this new American way of war in the 1991 Gulf War had a chilling effect on potential adversaries. It became clear that challenging the United States in a conventional, state-on-state conflict was a recipe for swift and certain defeat. This reality, however, did not lead to a more peaceful world. Instead, it created a “compelling logic for states and non-state actors to move out of the traditional mode of war”.51 Unable to compete symmetrically, adversaries were forced to invest in asymmetric capabilities and strategies that could bypass or neutralize U.S. technological strengths.32 This strategic adaptation accelerated the global shift toward the very hybrid, irregular, and grey-zone methods that had been practiced during the Cold War. The RMA, in effect, made conventional war obsolete for most actors, thereby making unconventional conflict the new norm. The U.S. military had perfected a doctrine for fighting a specific adversary in a specific way, just as that adversary collapsed and the fundamental character of conflict was shifting beneath its feet.

Section III: The Expanded Battlefield – Hybrid Actors in New Domains

The end of the Cold War and the subsequent era of U.S. conventional military primacy did not end great power competition; it merely displaced it. Conflict migrated from the physical battlefield into non-physical and previously non-militarized domains. We have entered a state of persistent, low-level conflict where the distinction between peace and war is not simply blurred but is actively manipulated as a strategic tool. Adversaries now operate in a “grey zone,” employing hybrid methods to achieve strategic objectives without crossing the threshold of overt warfare.

The New Domains of Contestation

The modern battlefield is no longer confined to land, sea, and air. It has expanded to encompass the global economic system, digital networks, and the critical infrastructure that underpins modern society.

Economic Warfare has evolved into a primary instrument of statecraft, a sophisticated method of coercion that leverages global interdependence as a weapon.52 The “weaponization of finance” allows states, particularly the United States with its control over the global dollar-based financial system, to “cripple [countries] financially” through targeted sanctions against individuals, companies, and entire sectors of an economy.52 The unprecedented sanctions imposed on Russia following its 2022 invasion of Ukraine, which froze central bank assets and cut off major banks from international payment systems, demonstrate the power of this tool.56 Similarly, the “weaponization of trade” involves using tariffs, embargoes, and regulatory barriers to induce policy changes in a target state by exploiting economic dependencies.53 China’s campaign of economic coercion against Australia, which targeted key exports like wine, barley, and coal after Australia called for an inquiry into the origins of COVID-19, is a prime example of this strategy in action.59 Russia has also long used its position as a major energy supplier to Europe as a tool of political leverage, manipulating gas prices and threatening supply cutoffs to achieve foreign policy goals.62 This trend transforms economic interdependence from a source of mutual benefit into a critical vulnerability.55

Cyber Warfare has matured from a tool of espionage into a distinct domain of military operations. The watershed moment was the 2010 Stuxnet attack, a highly sophisticated computer worm believed to be a joint U.S.-Israeli operation. Stuxnet infiltrated Iran’s Natanz nuclear facility and caused physical damage to its uranium enrichment centrifuges, demonstrating for the first time that malicious code could produce kinetic effects.67 Since then, state-sponsored cyber operations have become commonplace. Advanced Persistent Threat (APT) groups linked to the governments of China, Russia, Iran, and North Korea now routinely conduct campaigns against adversaries.71 Their objectives range from espionage and intellectual property theft to prepositioning for future disruptive attacks on critical infrastructure, including telecommunications, energy grids, and transportation networks.74

Critical Infrastructure has become a new front line. The physical systems that support the global economy and information flow are now considered legitimate targets for grey-zone aggression. Undersea cables, which carry an estimated 99% of all transoceanic digital communications and trillions of dollars in financial transactions daily, are a point of extreme vulnerability.78 This vast network is susceptible to damage from both accidental causes, like fishing trawlers and dragging anchors, and deliberate sabotage.80 State actors, particularly Russia, are developing the capabilities to target these cables. Russia’s Main Directorate for Deep-Water Research (GUGI) operates specialized submarines and surface vessels, such as the

Yantar, which are equipped for deep-sea operations and have been observed loitering near critical cable routes.78 Recent incidents in the Baltic Sea, where data cables and a gas pipeline were damaged by a Chinese-flagged vessel dragging its anchor, have heightened concerns about coordinated hybrid attacks.83 The key strategic advantage of such attacks is the challenge of attribution. It is exceptionally difficult to prove that a cable cut by a commercial vessel was an intentional act of state-sponsored sabotage rather than an accident, providing the aggressor with plausible deniability and complicating any response by NATO or other targeted nations.78

The Doctrine of Ambiguity – Hybrid and Grey-Zone Warfare

To describe this new era of persistent, ambiguous conflict, analysts have developed two interrelated concepts: grey-zone conflict and hybrid warfare.

The Grey Zone is the conceptual space in which this competition occurs. It is defined by the Center for Strategic and International Studies (CSIS) as “the contested arena somewhere between routine statecraft and open warfare”.86 It is a realm of coercive and subversive activity deliberately designed to remain below the threshold that would provoke a conventional military response.1 In this space, revisionist powers like Russia and China use a range of non-military and quasi-military tools—including information operations, political and economic coercion, cyber operations, and the use of proxies—to gradually achieve strategic gains and weaken adversaries without triggering a full-scale war.86

Hybrid Warfare is the methodology employed within the grey zone. It is not a new form of warfare, but rather the integrated and synchronized application of multiple instruments of power—conventional and unconventional, military and non-military, overt and covert—in a unified campaign to achieve a strategic objective.89 Russia’s 2014 annexation of Crimea and subsequent intervention in the Donbas region of Ukraine is the archetypal modern example. This operation seamlessly blended the use of deniable special forces (“little green men”), local proxy militias, economic pressure, cyberattacks, and a sophisticated, multi-platform disinformation campaign to achieve its goals before the West could formulate a coherent response.51

This environment has also transformed the nature of Proxy Warfare. The Cold War model of two superpowers manipulating client states has been replaced by a far more complex, multipolar system.96 Today’s sponsors include not only great powers but also ambitious regional actors like Iran, Saudi Arabia, Turkey, and the UAE. The proxies themselves are no longer just state armies but a diverse ecosystem of non-state actors, including militias, transnational terrorist groups, private military companies, and political movements, many with their own ideologies and agendas that may diverge from those of their sponsors.96 The proliferation of advanced technology, from anti-tank missiles to armed drones and secure communications, has made these proxy forces more lethal and capable than ever before.101 Modern proxy battlefields, such as the Syrian civil war, are characterized by a dizzying array of local and international actors, with multiple sponsors backing various factions, creating a complex and brutal multi-sided conflict.14 Iran’s long-standing support for Hezbollah is a prime example of a modern proxy relationship, where financial aid, weapons, and training have cultivated a formidable non-state actor that serves as a key instrument of Iranian foreign policy.106

The defining trend of this new era is the normalization of hostile acts. Actions that would have once been considered casus belli—such as sabotage of critical national infrastructure, systemic economic coercion, or major cyberattacks against government and industry—are now treated as features of routine international competition. This has shifted the nature of conflict from an episodic state of declared war to a persistent condition of undeclared competition. In this grey zone, ambiguity is not a byproduct of conflict; it is a central objective and a strategic weapon. The ability to conduct a hostile act while making attribution difficult or impossible paralyzes the victim’s decision-making process and allows the aggressor to act with a degree of impunity.

FeatureUnited States / WestRussian FederationPeople’s Republic of China
Doctrine NameGrey-Zone / Hybrid Warfare ResponseNew Generation Warfare / Gerasimov DoctrineThree Warfares / Systems Destruction Warfare
Primary ObjectiveMaintain status quo; deter/counter aggression; manage escalationRevise post-Cold War order; re-establish sphere of influence; destabilize adversariesAchieve regional hegemony; displace U.S. influence; unify Taiwan; secure resource access
Key Tools / MethodsSanctions; support to partners/proxies; cyber operations; special operations forces; freedom of navigation operations (FONOPs)Information-psychological warfare; cyber operations; economic coercion (esp. energy); use of deniable special forces and proxies; political subversionPublic opinion warfare; psychological warfare; legal warfare (lawfare); economic coercion (trade, investment); cyber espionage; maritime militia
Role of MilitaryPrimarily a deterrent and response force; kinetic action is a last resort, often through SOF or proxiesConcealed military means supplement non-military efforts; special forces (Spetsnaz) and conventional forces are used for intimidation and decisive actionMilitary presence (PLA) creates physical leverage; used for intimidation and coercion (grey-zone tactics); prepared for decisive conventional action if necessary
Role of InformationReactive; focus on countering disinformation and attributionCentral; aims to alter consciousness, create domestic chaos in target state, and achieve “information superiority” before kinetic actionFoundational; aims to control the narrative, shape domestic and international opinion, demoralize the adversary, and legitimize CCP actions
Sources8689111

Section IV: The Cognitive Domain – The Battle for Perception

Perhaps the most fundamental transformation in the character of conflict over the past half-century has been the elevation of the human mind and collective public perception as a primary, and often decisive, battlefield. The strategic objective is increasingly not to defeat an enemy’s military forces, but to erode their society’s cohesion, paralyze their political will, and manipulate their very understanding of reality. This is narrative warfare, and its tools have evolved from state-controlled broadcast media to a global, AI-powered, social media-driven disinformation engine.

The Weaponization of Media and Social Media

The power of modern media to shape conflict was evident throughout the late 20th century, but the rise of the internet and social media in the 21st century created a new paradigm.

The Arab Spring, beginning in late 2010, was the first major geopolitical event to showcase the power of social media as a tool for political mobilization. Activists across Tunisia, Egypt, and other nations used platforms like Facebook, Twitter, and YouTube to organize protests, share information about government brutality, and bypass state-controlled media censorship to broadcast their message to a global audience.115 In Egypt, the “We Are All Khaled Said” Facebook page became a rallying point for a movement that ultimately toppled a decades-old regime.117 This demonstrated the potential for these new platforms to empower organic, bottom-up movements and challenge authoritarian control.120

However, state actors quickly recognized the power of these tools and began to co-opt them for their own purposes, leading to the industrialization of influence operations. The most prominent example is Russia’s Internet Research Agency (IRA), a state-sponsored “troll farm” dedicated to conducting online influence operations.121 The IRA’s tactics, revealed in detail following its interference in the 2016 U.S. presidential election, involve a sophisticated, multi-layered approach. Operators create and manage vast networks of fake social media accounts, or “bots,” designed to impersonate real citizens.122 These accounts are used to amplify divisive narratives, spread disinformation, and infiltrate online communities on both the political left and right, with the overarching goal of exacerbating existing social divisions and eroding trust in democratic institutions.123 The IRA’s methods include “narrative switching,” where accounts post non-political content most of the time to build a credible persona before injecting targeted political messages, and organizing real-world events, such as opposing protests, to bring online division into the physical world.122

This weaponization of information is not merely opportunistic; it is now a core component of state military doctrine. China’s concept of the “Three Warfares” explicitly codifies this approach. It includes “public opinion warfare” to dominate narratives and ensure domestic and international support, “psychological warfare” to demoralize an adversary and weaken their will to fight, and “legal warfare” (lawfare) to use international and domestic law to challenge the legitimacy of an opponent’s actions.114 Similarly, Russia’s doctrine of

“New Generation Warfare” (often associated with General Valery Gerasimov) views “information-psychological warfare” as a critical tool for achieving strategic goals by creating domestic chaos within a target state, often before any military action is taken.3 The Syrian Civil War serves as a stark case study of this new reality, where a brutal physical conflict has been accompanied by a relentless narrative war waged by all factions—the Assad regime, various rebel groups, and their respective foreign backers (including Russia, Iran, and Western powers)—each using traditional and social media to frame the conflict, legitimize their actions, and demonize their opponents.125

The AI-Powered Disinformation Engine

If social media provided the platform for modern information warfare, artificial intelligence is now providing the engine, promising to “supercharge” disinformation campaigns by dramatically increasing their speed, scale, and sophistication.130

The most alarming development is the rise of deepfakes and other forms of synthetic media. Using advanced AI techniques like generative adversarial networks (GANs), malicious actors can now create highly realistic but entirely fabricated audio and video content.132 This technology makes it possible to convincingly impersonate political leaders, military officials, or other public figures, having them appear to say or do things they never did.134 The national security implications are profound. A well-timed deepfake video could be used to fabricate a scandal to influence an election, spread false orders to military units to create chaos, or create a fake atrocity to serve as a pretext for war.135 An AI-generated image of an explosion at the Pentagon in 2023 briefly caused a dip in the U.S. stock market, demonstrating the real-world impact of such fabrications.137

Beyond deepfakes, AI is being used to automate and personalize propaganda on an unprecedented scale. Large language models can now generate false news articles and social media posts that are often indistinguishable from human-written content.138 These tools can be used to create tailored messages designed to appeal to the specific psychological vulnerabilities of target audiences, and to automate the operation of vast bot networks that can amplify these messages across multiple platforms.130 This dramatically lowers the barrier to entry for conducting large-scale influence operations, making these powerful tools available not just to states, but to a wide range of malicious actors.138

The cumulative effect of this AI-driven information warfare is not simply the spread of more falsehoods. Its ultimate strategic objective is the erosion of trust itself. The goal is not necessarily to make people believe in a specific lie, but to destroy their confidence in all sources of information—in the media, in government institutions, in scientific experts, and ultimately, in their own ability to discern fact from fiction. This fosters a state of what can be called “epistemic exhaustion,” where citizens become so overwhelmed by the flood of conflicting information that they disengage from civic life, making them passive and more susceptible to manipulation. A population that trusts nothing cannot form the consensus required to recognize and counter a national security threat, thereby achieving an adversary’s goal of societal paralysis without firing a single shot.

Section V: The Next Revolution – The AI-Enabled Battlespace

Just as the integration of precision, stealth, and networking catalyzed a Revolution in Military Affairs at the end of the 20th century, artificial intelligence is now driving another profound transformation in the character of warfare. This emerging revolution is centered on three key elements: the compression of decision-making to machine speed, the proliferation of intelligent autonomous systems, and the dominance of data as the central resource of military power. This shift promises unprecedented efficiency but also introduces complex new risks of escalation and loss of human control.

Accelerating the Kill Chain – AI in Intelligence and C2

Modern military operations are drowning in data. A torrent of information flows from satellites, drones, ground sensors, and countless other sources, far exceeding the capacity of human analysts to process it in a timely manner.140 Artificial intelligence is becoming the essential tool for turning this data overload into a decisive advantage.

The U.S. Department of Defense’s Project Maven (officially the Algorithmic Warfare Cross-Functional Team) is a flagship initiative in this area. Launched in 2017, Maven employs machine learning algorithms to automatically analyze full-motion video from drones and other ISR platforms.142 The system can detect, classify, and track objects of interest—such as vehicles, buildings, or groups of people—freeing human analysts from the tedious task of watching countless hours of footage and allowing them to focus on higher-level analysis and decision-making.144 This capability dramatically accelerates the intelligence cycle, reducing the time it takes to find and validate a target from hours or days to minutes or even seconds.146

This accelerated intelligence is being fed into increasingly AI-enhanced Command and Control (C2) systems. The objective is to create a seamless, networked architecture that connects any sensor to any decision-maker and any weapon system on the battlefield. This concept is at the heart of the U.S. military’s overarching strategy for Joint All-Domain Command and Control (JADC2).147 AI algorithms within these C2 systems can fuse data from disparate sources to create a unified, real-time operational picture, predict enemy movements, analyze potential courses of action, and recommend optimal responses to commanders.140 The ultimate goal is to radically compress the “sensor-to-shooter” timeline, enabling forces to act at a tempo that overwhelms an adversary’s ability to react.

This pursuit of AI-driven military advantage has ignited a fierce technological competition, often described as an AI arms race, primarily between the United States and China.150 China has made AI a national priority and is pursuing a strategy of “military-civil fusion” to systematically leverage the expertise and innovation of its burgeoning private tech sector and universities for military modernization.111 Beijing’s goal is to achieve “intelligentized warfare,” using AI to achieve “decision dominance” through a highly integrated “systems warfare” approach.111 While the United States is widely seen as maintaining a lead in developing the most advanced, cutting-edge AI models, China’s state-directed approach gives it an advantage in the broad-scale adoption and practical integration of AI technologies across its military and economy.153

The Proliferation of Autonomy

The most visible and disruptive impact of AI on the battlefield is the proliferation of autonomous and semi-autonomous systems, particularly unmanned aerial vehicles (UAVs).

The drone revolution has unfolded in two parallel tracks. On one end of the spectrum are sophisticated, reusable military drones like the Turkish Bayraktar TB2. In conflicts such as the 2020 Nagorno-Karabakh war, the TB2 proved devastatingly effective, combining long-endurance surveillance with precision-guided munitions to destroy Armenian air defenses, armor, and artillery, effectively dominating the battlefield.154 On the other end of the spectrum is the widespread use of cheap, commercially available, and often disposable drones, a trend brought to the forefront by the war in Ukraine. Both sides have deployed thousands of small quadcopters for reconnaissance and, more significantly, as first-person-view (FPV) “kamikaze” drones capable of destroying multi-million-dollar tanks and other armored vehicles.157 This has created a new reality of attritional drone warfare, where the low cost and sheer quantity of these systems can overwhelm even sophisticated defenses.159

This trend points toward the next frontier of military autonomy: Lethal Autonomous Weapon Systems (LAWS), colloquially known as “killer robots.” These are weapon systems that, once activated, can independently search for, identify, target, and kill human beings without direct human control over the final lethal decision.150 The development of LAWS raises profound legal and ethical challenges. Organizations like the International Committee of the Red Cross (ICRC) have raised serious concerns about whether such systems can comply with the core principles of International Humanitarian Law (IHL), such as distinction, proportionality, and precaution.163 Key questions revolve around accountability—who is responsible when an autonomous weapon makes a mistake?—and the fundamental ethical principle of “meaningful human control” over the use of lethal force.166 In response to these concerns, the ICRC and numerous other bodies have called for the negotiation of new, legally binding international rules to prohibit unpredictable autonomous systems and those that target humans directly.162

The relentless pace of technological development is creating a strategic environment where the speed of combat is poised to exceed the limits of human cognition. As AI-enabled C2 systems compress decision cycles to seconds and autonomous weapons are designed to react instantly to threats, conflicts between two AI-enabled militaries may be fought and decided at machine speed, potentially before human commanders can fully comprehend the situation or intervene. This creates an inescapable and dangerous strategic logic: to remain competitive, militaries feel compelled to delegate more and more decision-making authority to AI systems, despite the profound ethical concerns and the immense risk of rapid, unintended escalation.171

Furthermore, the proliferation of cheap, effective, and increasingly autonomous systems is upending the traditional military-technical balance. The war in Ukraine has vividly demonstrated the problem of “cost asymmetry,” where inexpensive drones, costing only a few thousand dollars, can neutralize or destroy highly valuable military assets like tanks and warships that cost millions.158 Defending against swarms of these cheap drones with expensive, sophisticated air defense missiles is an economically unsustainable proposition.160 This challenges the entire Western military model, which has for decades relied on a relatively small number of expensive, technologically superior platforms. The future battlefield may not be dominated by the nation with the most advanced fighter jet, but by the one that can deploy the largest, most adaptable, and most intelligent swarm of inexpensive, autonomous, and attritable systems.

Conclusion: A State of Undocumented, Perpetual Conflict

The evidence of the past 50 years is conclusive: while the fundamental nature of war as a political act has not changed, its character has been irrevocably transformed. The clear, binary world of the Cold War, with its defined states of “peace” and “war,” has been replaced by a state of persistent, multi-domain competition. The lines have not just blurred; they have been erased and weaponized. The major powers are not on the brink of a new conflict; they are, and have been for some time, engaged in one. It is an undocumented, undeclared, and unending conflict fought not primarily with massed armies on physical battlefields, but with a new arsenal of hybrid tools across a vastly expanded battlespace.

This transformation has been driven by a confluence of factors. The nuclear stalemate of the Cold War forced competition into the shadows, normalizing the use of proxies, covert action, and political subversion. The subsequent Revolution in Military Affairs created such a profound U.S. advantage in conventional warfare that it compelled adversaries to abandon symmetrical competition and double down on these asymmetric, hybrid methods. The globalization of finance and information, coupled with the proliferation of cyber capabilities and advanced technologies, provided the new domains—economic, digital, and cognitive—in which this competition would be waged.

Today, Russia, China, the United States, and other powers are engaged in a constant struggle for advantage in the grey zone. This is a conflict fought with sanctions designed to cripple economies, with cyberattacks that probe critical infrastructure, with deniable sabotage of undersea cables, with proxy forces that allow for influence without attribution, and, most pervasively, with information campaigns designed to fracture societies from within.

The advent of artificial intelligence is now catalyzing the next revolution, one that promises to accelerate the speed of conflict beyond human comprehension. AI is transforming intelligence analysis, command and control, and the very nature of weaponry, pushing toward a future of algorithmic warfare and autonomous systems. This raises the specter of a battlefield where decisions are made in microseconds and escalation can occur without deliberate human intent.

In this new era, the traditional concept of “victory” is becoming obsolete. Victory is no longer solely defined by a signed treaty or a captured capital. It may be the successful paralysis of a rival’s economy through financial warfare 55; the quiet degradation of their military readiness through sustained cyber espionage 76; the fracturing of their political system through a multi-year disinformation campaign 123; or the achievement of a decisive technological breakthrough in AI that renders an adversary’s entire military doctrine irrelevant.150

The greatest danger of this new paradigm is not necessarily a deliberate, cataclysmic war, but the potential for uncontrollable escalation out of the grey zone. A miscalculation in a proxy conflict, a cyberattack with unforeseen cascading effects, or the autonomous action of an AI-powered weapon system could trigger a rapid spiral into a conventional conflict that no party initially intended. The central challenge for national security in the 21st century is therefore twofold: not only to prepare to win the wars of the future, but to learn how to successfully navigate the unending, undocumented conflict that is already here.


If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly donate to help fund our continued report, please visit our donations page.


Sources Used

  1. Grey-zone (international relations) – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Grey-zone_(international_relations)
  2. The Blurring Of War And Peace: Hybrid Warfare – Analysis …, accessed September 30, 2025, https://www.eurasiareview.com/19042021-the-blurring-of-war-and-peace-hybrid-warfare-analysis/
  3. The Russian Understanding of War: Blurring the Lines Between War and Peace, accessed September 30, 2025, https://ndupress.ndu.edu/Media/News/News-Article-View/Article/2131233/the-russian-understanding-of-war-blurring-the-lines-between-war-and-peace/
  4. The Opposite of War is Not Peace – Futurist Speaker, accessed September 30, 2025, https://futuristspeaker.com/future-scenarios/the-opposite-of-war-is-not-peace-2/
  5. Cold War – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Cold_War
  6. Historical Documents – Office of the Historian, accessed September 30, 2025, https://history.state.gov/historicaldocuments/frus1969-76v41/d52
  7. NATO and The Cold War | Imperial War Museums, accessed September 30, 2025, https://www.iwm.org.uk/learning/resources/nato-and-the-cold-war
  8. Tactics – Conventional War, Terrorism, Strategy – Britannica, accessed September 30, 2025, https://www.britannica.com/topic/tactics/From-conventional-war-to-terrorism
  9. What was Warsaw Pact defence strategy if NATO invaded them? : r/WarCollege – Reddit, accessed September 30, 2025, https://www.reddit.com/r/WarCollege/comments/1leggj2/what_was_warsaw_pact_defence_strategy_if_nato/
  10. 13. National Intelligence Estimate 11-14-75, Washington, September 4, 1975. – Historical Documents – Office of the Historian, accessed September 30, 2025, https://history.state.gov/historicaldocuments/frus1969-76ve15p1/d13
  11. NATO and Warsaw Pact: Force Comparisons, accessed September 30, 2025, https://www.nato.int/cps/en/natohq/declassified_138256.htm
  12. The Evolution of US Army Tactical Doctrine, 1946-76, accessed September 30, 2025, https://www.armyupress.army.mil/Portals/7/combat-studies-institute/csi-books/doughty.pdf
  13. The Evolution of US Army Tactical Doctrine, 1946-76 (Leavenworth Papers, Number 1), accessed September 30, 2025, https://apps.dtic.mil/sti/citations/ADA211791
  14. Proxy wars, explained | FairPlanet, accessed September 30, 2025, https://www.fairplanet.org/story/what-are-proxy-wars-and-where-are-they-happening/
  15. Proxy war – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Proxy_war
  16. Proxy wars – (US History – 1945 to Present) – Vocab, Definition, Explanations | Fiveable, accessed September 30, 2025, https://fiveable.me/key-terms/united-states-history-since-1945/proxy-wars
  17. Eight “Hot Wars” During the Cold War | CFR Education, accessed September 30, 2025, https://education.cfr.org/learn/reading/eight-hot-wars-during-cold-war
  18. The Angolan civil war (Chapter 8) – The USSR in Third World Conflicts, accessed September 30, 2025, https://www.cambridge.org/core/books/ussr-in-third-world-conflicts/angolan-civil-war/6A98027220E926A6783DFCE2A320DB15
  19. The Angola Crisis 1974–75 – Milestones in the History of U.S. Foreign Relations – Office of the Historian, accessed September 30, 2025, https://history.state.gov/milestones/1969-1976/angola
  20. Angolan Civil War – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Angolan_Civil_War
  21. “Buried in the Sands of the Ogaden”: The Horn of Africa and SALT II, 1977–1979 – Office of the Historian, accessed September 30, 2025, https://history.state.gov/milestones/1977-1980/horn-of-africa
  22. Ogaden War Between Somalia and Ethiopia | Research Starters – EBSCO, accessed September 30, 2025, https://www.ebsco.com/research-starters/history/ogaden-war-between-somalia-and-ethiopia
  23. Central Intelligence Agency – Intelligence, Surveillance, Covert Ops …, accessed September 30, 2025, https://www.britannica.com/topic/Central-Intelligence-Agency/Activities
  24. Cold War espionage – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Cold_War_espionage
  25. During cold war both KGB and CIA had high ranking moles inside their organisations. Is it known which side did better job at infiltrating their opponent and getting sensitive information as cold war progressed? : r/AskHistorians – Reddit, accessed September 30, 2025, https://www.reddit.com/r/AskHistorians/comments/4jkybw/during_cold_war_both_kgb_and_cia_had_high_ranking/
  26. A global kill list: Inside the KGB’s secret retribution operations beyond the Iron Curtain, accessed September 30, 2025, https://theins.ru/en/history/281554
  27. COVERT OPERATIONS OF THE USSR IN AFRICA Текст научной статьи по специальности – КиберЛенинка, accessed September 30, 2025, https://cyberleninka.ru/article/n/covert-operations-of-the-ussr-in-africa
  28. Africa–Soviet Union relations – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Africa%E2%80%93Soviet_Union_relations
  29. AFRICA (SOVIET POLICY) (Hansard, 6 February 1978) – API Parliament UK, accessed September 30, 2025, https://api.parliament.uk/historic-hansard/commons/1978/feb/06/africa-soviet-policy
  30. Soviet Spies in Africa: How the KGB Strengthened Soviet Influence on the Continent During the Cold War. : r/coldwar – Reddit, accessed September 30, 2025, https://www.reddit.com/r/coldwar/comments/1n91egf/soviet_spies_in_africa_how_the_kgb_strengthened/
  31. Revolutions in Military Affairs – DTIC, accessed September 30, 2025, https://apps.dtic.mil/sti/tr/pdf/ADA360252.pdf
  32. The Revolution in Military Affairs and Conflict Short … – USAWC Press, accessed September 30, 2025, https://press.armywarcollege.edu/cgi/viewcontent.cgi?article=1893&context=monographs
  33. Precision-guided munition – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Precision-guided_munition
  34. Precision Guided Munitions and the New Era of Warfare – Military Analysis Network, accessed September 30, 2025, https://man.fas.org/dod-101/sys/smart/docs/paper53.htm
  35. Getting Closer: Precision Guided Weapons in the Southeast Asia War – Air Force Museum, accessed September 30, 2025, https://www.nationalmuseum.af.mil/Visit/Museum-Exhibits/Fact-Sheets/Display/Article/195858/getting-closer-precision-guided-weapons-in-the-southeast-asia-war/
  36. Precision Guided Munitions: Revolutionizing Warfare Accuracy, accessed September 30, 2025, https://aviationanddefensemarketreports.com/precision-guided-munitions-revolutionizing-warfare-with-accuracy/
  37. Stealth aircraft – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Stealth_aircraft
  38. Stealth technology – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Stealth_technology
  39. Lessons from Stealth for Emerging Technologies – CSET, accessed September 30, 2025, https://cset.georgetown.edu/publication/lessons-from-stealth-for-emerging-technologies/
  40. Revolution in military affairs – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Revolution_in_military_affairs
  41. From Active Defense to AirLand Battle: The Development of Army Doctrine, 1973-1982, accessed September 30, 2025, https://www.tradoc.army.mil/wp-content/uploads/2020/10/From-Active-Defense-to-AirLand-Battle.pdf
  42. What did AirLand Battle address that previous NATO Cold War strategies were failing at? : r/WarCollege – Reddit, accessed September 30, 2025, https://www.reddit.com/r/WarCollege/comments/b8q6k0/what_did_airland_battle_address_that_previous/
  43. AirLand Battle: The Development of a Doctrine – DTIC, accessed September 30, 2025, https://apps.dtic.mil/sti/pdfs/AD1119406.pdf
  44. THE POLITICAL CONTEXT OF US ARMY DOCTRINE, 1974-1976 | Small Wars Journal by Arizona State University, accessed September 30, 2025, https://smallwarsjournal.com/2020/10/29/political-context-us-army-doctrine-1974-1976/
  45. How was the Military doctrine of active defense born? : Focusing on the process of writing the FM 100-5 Operations 1976 edition – Korea Journal Central, accessed September 30, 2025, http://journal.kci.go.kr/imhc/archive/articleView?artiId=ART002939313
  46. Doctrinal Development—AirLand Battle – Army University Press, accessed September 30, 2025, https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/MR-75th-Anniversary/75th-Doctrinal-AirLand/
  47. AirLand Battle and Modern Warfare, accessed September 30, 2025, https://www.nids.mod.go.jp/english/event/forum/pdf/2014/09.pdf
  48. WAR ON THE 21ST CENTURY BATTLEFIELD: REVISITING GENERAL STARRY’S CONCEPTUAL FRAMEWORK, accessed September 30, 2025, https://warroom.armywarcollege.edu/articles/conceptual-framework/
  49. AirLand Battle Doctrine – MERIP, accessed September 30, 2025, https://merip.org/1983/01/airland-battle-doctrine/
  50. The Lessons of AirLand Battle and the 31 Initiatives for Multi-Domain Battle – RAND, accessed September 30, 2025, https://www.rand.org/content/dam/rand/pubs/perspectives/PE300/PE301/RAND_PE301.pdf
  51. Countering Hybrid Warfare: Conceptual Foundations and Implications for Defence Forces – GOV.UK, accessed September 30, 2025, https://assets.publishing.service.gov.uk/media/5da9a79ae5274a5ca507c6bb/20190401-MCDC_CHW_Information_note_-_Conceptual_Foundations.pdf
  52. Weaponization of Finance – Encyclopedia.pub, accessed September 30, 2025, https://encyclopedia.pub/entry/36941
  53. The Weaponization of Trade – Columbia SIPA – Columbia University, accessed September 30, 2025, https://www.sipa.columbia.edu/sites/default/files/migrated/downloads/Capstone%2520Report%2520%2528Eurasia%2520Group%2529.pdf
  54. Weaponizing Trade – CSIS, accessed September 30, 2025, https://www.csis.org/analysis/weaponizing-trade
  55. Weaponizing Financial and Trade Flows: The Case of Failing Western Sanctions, accessed September 30, 2025, https://internationalbanker.com/finance/weaponizing-financial-and-trade-flows-the-case-of-failing-western-sanctions/
  56. Russia Sanctions and Export Controls: U.S. Agencies Should Establish Targets to Better Assess Effectiveness, accessed September 30, 2025, https://www.gao.gov/products/gao-25-107079
  57. International sanctions during the Russo-Ukrainian War – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/International_sanctions_during_the_Russo-Ukrainian_War
  58. The Economic Impact of Russia Sanctions – Congress.gov, accessed September 30, 2025, https://www.congress.gov/crs-product/IF12092
  59. How China’s Coercive Measures Against Australia Backfired | The Heritage Foundation, accessed September 30, 2025, https://www.heritage.org/china/report/how-chinas-coercive-measures-against-australia-backfired
  60. China is still coercing Australia—with implicit threats | The Strategist, accessed September 30, 2025, https://www.aspistrategist.org.au/china-is-still-coercing-australia-with-implicit-threats/
  61. Warning from Australia: Meet the Threat of Chinese Economic Coercion to Democracy, accessed September 30, 2025, https://www.cnas.org/publications/commentary/warning-from-australia-meet-the-threat-of-chinese-economic-coercion-to-democracy
  62. Energy policy of Russia – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Energy_policy_of_Russia
  63. The Use of Energy Resources as Foreign Policy Tools: The Russian Case – ResearchGate, accessed September 30, 2025, https://www.researchgate.net/publication/344615948_The_Use_of_Energy_Resources_as_Foreign_Policy_Tools_The_Russian_Case
  64. Energy as a tool of foreign policy of authoritarian states, in particular Russia – European Parliament, accessed September 30, 2025, https://www.europarl.europa.eu/RegData/etudes/STUD/2018/603868/EXPO_STU(2018)603868_EN.pdf
  65. Russia’s Energy Diplomacy – Chatham House, accessed September 30, 2025, https://www.chathamhouse.org/sites/default/files/19352_0511bp_lough.pdf
  66. Weaponisation of finance: Regulators’ worries in a geopolitically fragile world, accessed September 30, 2025, https://www.orfonline.org/expert-speak/weaponisation-of-finance
  67. Iran’s use of cyberspace has evolved from an internal means of information control and repression to more aggressive attacks on foreign targets. The regime has been developing its own cybersecurity software and internet architecture in order to protect and insulate its networks, and it has been developing technological cyber expertise as a form of asymmetric warfare against a superior conventional US military. – Congress.gov, accessed September 30, 2025, https://www.congress.gov/crs_external_products/IF/HTML/IF11406.web.html
  68. Stuxnet | CFR Interactives, accessed September 30, 2025, https://www.cfr.org/cyber-operations/stuxnet
  69. Full article: Stuxnet, revisited (again): producing the strategic relevance of cyber operations, accessed September 30, 2025, https://www.tandfonline.com/doi/full/10.1080/23738871.2025.2492570
  70. Stuxnet: The world’s first cyber weapon – Center for International Security and Cooperation, accessed September 30, 2025, https://cisac.fsi.stanford.edu/news/stuxnet
  71. State Sponsored Cyber Warfare – Identity Management Institute®, accessed September 30, 2025, https://identitymanagementinstitute.org/state-sponsored-cyber-warfare/
  72. NSA and Others Provide Guidance to Counter China State-Sponsored Actors Targeting Critical Infrastructure Organizations – National Security Agency, accessed September 30, 2025, https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/4287371/nsa-and-others-provide-guidance-to-counter-china-state-sponsored-actors-targeti/
  73. Mutual Defense in Cyberspace: Joint Action on Attribution – CSIS, accessed September 30, 2025, https://www.csis.org/analysis/mutual-defense-cyberspace-joint-action-attribution
  74. U.S. government scrambles to stop new hacking campaign blamed on China, accessed September 30, 2025, https://www.washingtonpost.com/technology/2025/09/25/cisa-federal-hacks-cisco/
  75. What are state-sponsored cyber attacks? | F‑Secure, accessed September 30, 2025, https://www.f-secure.com/en/articles/what-are-state-sponsored-cyber-attacks
  76. Secure Cyberspace and Critical Infrastructure – Homeland Security, accessed September 30, 2025, https://www.dhs.gov/archive/secure-cyberspace-and-critical-infrastructure
  77. Countering Chinese State-Sponsored Actors Compromise of … – CISA, accessed September 30, 2025, https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-239a
  78. Submarine cable security is all at sea • The Register, accessed September 30, 2025, https://www.theregister.com/2025/09/29/submarine_cable_security_report_uk/
  79. Protection of Undersea Telecommunication Cables: Issues for Congress, accessed September 30, 2025, https://www.congress.gov/crs-product/R47648
  80. Subsea telecommunications cables: resilience and crisis preparedness – Parliament UK, accessed September 30, 2025, https://publications.parliament.uk/pa/jt5901/jtselect/jtnatsec/723/report.html
  81. International law doesn’t adequately protect undersea cables. That must change., accessed September 30, 2025, https://www.atlanticcouncil.org/content-series/hybrid-warfare-project/international-law-doesnt-adequately-protect-undersea-cables-that-must-change/
  82. Safeguarding Subsea Cables: Protecting Cyber Infrastructure amid Great Power Competition – CSIS, accessed September 30, 2025, https://www.csis.org/analysis/safeguarding-subsea-cables-protecting-cyber-infrastructure-amid-great-power-competition
  83. Hybrid Attacks Rise on Undersea Cables in Baltic and Arctic Regions – Jamestown, accessed September 30, 2025, https://jamestown.org/program/hybrid-attacks-rise-on-undersea-cables-in-baltic-and-arctic-regions/
  84. Why Russia and China May Be Cutting Europe’s Undersea Cables | WSJ – YouTube, accessed September 30, 2025, https://www.youtube.com/watch?v=pyz7nSAKF9E
  85. Risky Game: Hybrid Attack on Baltic Undersea Cables | Wilson Center, accessed September 30, 2025, https://www.wilsoncenter.org/article/risky-game-hybrid-attack-baltic-undersea-cables
  86. Gray Zone Project – CSIS, accessed September 30, 2025, https://www.csis.org/programs/gray-zone-project
  87. Gaining Competitive Advantage in the Gray Zone: Response Options for Coercive Aggression Below the Threshold of Major War – RAND, accessed September 30, 2025, https://www.rand.org/content/dam/rand/pubs/research_reports/RR2900/RR2942/RAND_RR2942.pdf
  88. Today’s wars are fought in the ‘gray zone.’ Here’s everything you need to know about it., accessed September 30, 2025, https://www.atlanticcouncil.org/blogs/new-atlanticist/todays-wars-are-fought-in-the-gray-zone-heres-everything-you-need-to-know-about-it/
  89. Defining HYBRID WARFARE, accessed September 30, 2025, https://www.marshallcenter.org/sites/default/files/files/2020-05/pC_V10N1_en_Wither.pdf
  90. NATO and Countering Hybrid Warfare – CSIS, accessed September 30, 2025, https://www.csis.org/analysis/nato-and-countering-hybrid-warfare
  91. Hybrid warfare – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Hybrid_warfare
  92. Hybrid Warfare – New Threats, Complexity, and ‘Trust’ as the Antidote – NATO, accessed September 30, 2025, https://www.nato.int/docu/review/articles/2021/11/30/hybrid-warfare-new-threats-complexity-and-trust-as-the-antidote/index.html
  93. War in Donbas – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/War_in_Donbas
  94. Russia-Ukraine War | Map, Casualties, Timeline, Death Toll, Causes, & Significance | Britannica, accessed September 30, 2025, https://www.britannica.com/event/2022-Russian-invasion-of-Ukraine
  95. Ukraine: Conflict at the Crossroads of Europe and Russia | Council on Foreign Relations, accessed September 30, 2025, https://www.cfr.org/backgrounder/ukraine-conflict-crossroads-europe-and-russia
  96. TWENTY-FIRST CENTURY PROXY WARFARE – Cloudfront.net, accessed September 30, 2025, https://d1y8sb8igg2f8e.cloudfront.net/documents/Twenty-First_Century_Proxy_Warfare_Final.pdf
  97. Twenty-First Century Proxy Warfare: Confronting Strategic Innovation in a Multipolar World Since the 2011 NATO Intervention – Cloudfront.net, accessed September 30, 2025, https://d1y8sb8igg2f8e.cloudfront.net/documents/Proxy_wars_one_pager-v2.pdf
  98. Twenty-First Century Proxy Warfare: Confronting Strategic …, accessed September 30, 2025, https://www.newamerica.org/future-security/reports/twenty-first-century-proxy-warfare-confronting-strategic-innovation-multipolar-world/a-new-age-of-proxy-warfare/
  99. Engaging non-state armed actors in state- and peace … – ICRC, accessed September 30, 2025, https://www.icrc.org/sites/default/files/external/doc/en/assets/files/review/2011/irrc-883-schneckener.pdf
  100. The role of non-state actors in building human security – Centre for Humanitarian Dialogue, accessed September 30, 2025, https://hdcentre.org/wp-content/uploads/2016/07/The-role-of-non-state-actors-in-building-human-security-May-2000.pdf
  101. Twenty-First Century Proxy Warfare: Confronting Strategic Innovation in a Multipolar World, accessed September 30, 2025, https://www.newamerica.org/future-security/reports/twenty-first-century-proxy-warfare-confronting-strategic-innovation-multipolar-world/rethinking-proxy-warfare/
  102. Twenty-First Century Proxy Warfare – New America, accessed September 30, 2025, https://www.newamerica.org/future-security/reports/twenty-first-century-proxy-warfare/
  103. Timber Sycamore – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Timber_Sycamore
  104. Full article: Disposable rebels: US military assistance to insurgents in the Syrian war, accessed September 30, 2025, https://www.tandfonline.com/doi/full/10.1080/13629395.2023.2183664
  105. America Had Already Lost Its Covert War in Syria—Now It’s Official, accessed September 30, 2025, https://tcf.org/content/commentary/america-already-lost-covert-war-syria-now-official/
  106. Hezbollah–Iran relations – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Hezbollah%E2%80%93Iran_relations
  107. Hezbollah, Hamas, and More: Iran’s Terror Network Around the Globe | AJC, accessed September 30, 2025, https://www.ajc.org/news/hezbollah-hamas-and-more-irans-terror-network-around-the-globe
  108. Understanding Iran’s Use of Terrorist Groups as Proxies – American University, accessed September 30, 2025, https://www.american.edu/sis/news/20240205-understanding-irans-use-of-terrorist-groups-as-proxies.cfm
  109. Iran’s Islamist Proxies in the Middle East – Wilson Center, accessed September 30, 2025, https://www.wilsoncenter.org/article/irans-islamist-proxies
  110. U.S. vs Russian “Hybrid Warfare” Doctrine: A Comparative Glance – Grey Dynamics, accessed September 30, 2025, https://greydynamics.com/u-s-vs-russian-hybrid-warfare-doctrine-a-comparative-glance/
  111. Russia and China Look at the Future of War, accessed September 30, 2025, https://understandingwar.org/research/future-of-war/russia-and-china-look-at-the-future-of-war-2/
  112. Gerasimov doctrine (The Russian “New Generation Warfare … – WARN, accessed September 30, 2025, https://warn-erasmus.eu/glossary/doktrina-gerasimova-rosijska-vijna-novogo-pokolinnya/
  113. en.wikipedia.org, accessed September 30, 2025, https://en.wikipedia.org/wiki/Three_warfares#:~:text=%22Three%20warfares%22%20(Chinese%3A,warfare%20(also%20termed%20lawfare).
  114. Political Warfare against Intervention Forces > Air University (AU …, accessed September 30, 2025, https://www.airuniversity.af.edu/JIPA/Display/Article/4167178/political-warfare-against-intervention-forces/
  115. sites.stedwards.edu, accessed September 30, 2025, https://sites.stedwards.edu/pangaea/the-role-of-social-media-in-the-arab-spring/#:~:text=Social%20media%20helped%20Tunisia%20and,was%20happening%20instead%20of%20organizing.
  116. Social Media And The Arab Spring By Samira F. Hassan A Capstone submitted to the Graduate School Camden Rutgers, The State Univ, accessed September 30, 2025, https://mals.camden.rutgers.edu/files/Social-Media-and-the-Arab-Spring.pdf
  117. Social media’s role in the Arab Spring – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Social_media%27s_role_in_the_Arab_Spring
  118. (Social) Media and Politics and the Arab Spring Moment – IEMed, accessed September 30, 2025, https://www.iemed.org/publication/social-media-and-politics-and-the-arab-spring-moment/
  119. The Legacy of the “Facebook Revolution”: How did the Arab Spring shape citizen use of social media? – King’s Think Tank, accessed September 30, 2025, https://kingsthinktankspectrum.wordpress.com/2025/01/30/the-legacy-of-the-facebook-revolution-how-did-the-arab-spring-shape-citizen-use-of-social-media/
  120. The Influence of Social Media in Egypt during The Arab Spring – SIT Digital Collections, accessed September 30, 2025, https://digitalcollections.sit.edu/capstones/2944/
  121. Internet Research Agency – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Internet_Research_Agency
  122. How Russia’s Internet Research Agency Built its … – -ORCA, accessed September 30, 2025, https://orca.cardiff.ac.uk/id/eprint/122489/1/Political%20Quarterly%20IRA%20Dawson%20&%20Innes.pdf
  123. Fact Sheet: What We Know about Russia’s Interference Operations – German Marshall Fund, accessed September 30, 2025, https://www.gmfus.org/news/fact-sheet-what-we-know-about-russias-interference-operations
  124. “The Tactics & Tropes of the Internet Research Agency” by Renee DiResta, Kris Shaffer et al. – UNL Digital Commons – University of Nebraska–Lincoln, accessed September 30, 2025, https://digitalcommons.unl.edu/senatedocs/2/
  125. Conflict Propaganda in Syria: Narrative Battles – 1st Edition – Oliver – Routledge, accessed September 30, 2025, https://www.routledge.com/Conflict-Propaganda-in-Syria-Narrative-Battles/Boyd-Barrett/p/book/9780367697488
  126. Syrian revolution and the conflict over narratives | SyriaUntold – حكاية ما انحكت, accessed September 30, 2025, https://syriauntold.com/2021/03/19/syrian-revolution-and-the-conflict-over-narratives/
  127. The Battle of the Narratives Around Syria | German Marshall Fund of the United States, accessed September 30, 2025, https://www.gmfus.org/news/battle-narratives-around-syria
  128. How did combatants’ narratives and social media shape Syria’s civil war? | ClarkU News, accessed September 30, 2025, https://www.clarku.edu/news/2024/02/29/how-did-combatants-narratives-social-media-shape-syrias-civil-war/
  129. LESSONS FROM SYRIA’S LOW-PROFILE NARRATIVE WAR, accessed September 30, 2025, https://warroom.armywarcollege.edu/articles/narrative-war/
  130. AI and the Future of Disinformation Campaigns | Center for Security and Emerging Technology, accessed September 30, 2025, https://cset.georgetown.edu/publication/ai-and-the-future-of-disinformation-campaigns-2/
  131. AI and the Future of Disinformation Campaigns | Center for Security and Emerging Technology – CSET, accessed September 30, 2025, https://cset.georgetown.edu/publication/ai-and-the-future-of-disinformation-campaigns/
  132. Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media – IEEE Computer Society, accessed September 30, 2025, https://www.computer.org/csdl/magazine/sp/2024/04/10552098/1XApkaTs5l6
  133. Understanding Offensive AI vs. Defensive AI in Cybersecurity – Abnormal AI, accessed September 30, 2025, https://abnormal.ai/blog/offensive-ai-defensive-ai
  134. Combatting deepfakes: Policies to address national security threats and rights violations, accessed September 30, 2025, https://arxiv.org/html/2402.09581v1
  135. Rising Threat – Deepfakes and National Security in the Age of Digital Deception, accessed September 30, 2025, https://digitalcommons.odu.edu/cgi/viewcontent.cgi?article=1078&context=covacci-undergraduateresearch
  136. NSA, U.S. Federal Agencies Advise on Deepfake Threats, accessed September 30, 2025, https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3523329/nsa-us-federal-agencies-advise-on-deepfake-threats/
  137. Crossing the Deepfake Rubicon – CSIS, accessed September 30, 2025, https://www.csis.org/analysis/crossing-deepfake-rubicon
  138. AI-driven disinformation: policy recommendations for democratic resilience – PMC, accessed September 30, 2025, https://pmc.ncbi.nlm.nih.gov/articles/PMC12351547/
  139. Weaponized storytelling: How AI is helping researchers sniff out disinformation campaigns | FIU News – Florida International University, accessed September 30, 2025, https://news.fiu.edu/2025/weaponized-storytelling-how-ai-is-helping-researchers-sniff-out-disinformation-campaigns
  140. AI-Enhanced Command & Control Systems Transforming Military – Defence Industries, accessed September 30, 2025, https://www.defence-industries.com/articles/ai-enhanced-command-and-control-c2-systems-transforming-military
  141. Enhance command and control with AI and machine learning – Microsoft Industry Blogs, accessed September 30, 2025, https://www.microsoft.com/en-us/industry/blog/government/2023/06/20/enhance-command-and-control-with-ai-and-machine-learning/
  142. Project Maven – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Project_Maven
  143. ECS’ John Heneghan on Supporting NGA’s Maven Program – ExecutiveBiz, accessed September 30, 2025, https://www.executivebiz.com/articles/ecs-john-heneghan-nga-maven-program
  144. Artificial Intelligence as a Combat Multiplier: Using AI to Unburden Army Staffs, accessed September 30, 2025, https://www.armyupress.army.mil/Journals/Military-Review/Online-Exclusive/2024-OLE/AI-Combat-Multiplier/
  145. United States’ Project Maven And The Rise Of AI-Assisted Warfare …, accessed September 30, 2025, https://defensetalks.com/united-states-project-maven-and-the-rise-of-ai-assisted-warfare/
  146. AI at the Pentagon: How Maven’s CTO Brings AI into Military Operations | IIA @MIT 2025, accessed September 30, 2025, https://www.youtube.com/watch?v=LBUKDhtlOEI
  147. Marine Corps names leadership for Project Dynamis amid push for new AI capabilities, accessed September 30, 2025, https://defensescoop.com/2025/09/23/marine-corps-project-dynamis-ai-leadership/
  148. AI-Enabled Command and Control Systems for Integrated Land, Air, and Sea Operations | by SIAM Student’s Chapter VIT Bhopal | Medium, accessed September 30, 2025, https://medium.com/@siam_VIT-B/ai-enabled-command-and-control-systems-for-integrated-land-air-and-sea-operations-ea27ed86c30d
  149. AI at War: The Next Revolution for Military and Defense | Capitol Technology University, accessed September 30, 2025, https://www.captechu.edu/blog/ai-war-next-revolution-military-and-defense
  150. Artificial intelligence arms race – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Artificial_intelligence_arms_race
  151. Essay: Reframing the U.S.-China AI “Arms Race”: Introduction – New America, accessed September 30, 2025, https://www.newamerica.org/cybersecurity-initiative/reports/essay-reframing-the-us-china-ai-arms-race/introduction/
  152. China Is Using the Private Sector to Advance Military AI | Center for …, accessed September 30, 2025, https://cset.georgetown.edu/article/china-is-using-the-private-sector-to-advance-military-ai/
  153. How the US Could Lose the AI Arms Race to China | American Enterprise Institute – AEI, accessed September 30, 2025, https://www.aei.org/op-eds/how-the-us-could-lose-the-ai-arms-race-to-china/
  154. Turkish Drones Disrupting Battlefields: A Case Study of Nagorno …, accessed September 30, 2025, https://wahacademia.com/index.php/Journal/article/download/227/186
  155. Baykar Bayraktar TB2 – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Bayraktar_TB2
  156. The Role of Turkish Drones in Azerbaijan’s Increasing Military Effectiveness: An Assessment of the Second Nagorno-Karabakh War – Insight Turkey, accessed September 30, 2025, https://www.insightturkey.com/articles/the-role-of-turkish-drones-in-azerbaijans-increasing-military-effectiveness-an-assessment-of-the-second-nagorno-karabakh-war
  157. Why lasers might be the answer to invasive drone attacks | DW News – YouTube, accessed September 30, 2025, https://www.youtube.com/watch?v=tFAZmb56ulU
  158. Ethiopian Civil War vs. Ukraine Invasion: Why TB2 Bayraktar Drones Worked For One & Failed The Other – Simple Flying, accessed September 30, 2025, https://simpleflying.com/ethiopia-vs-ukraine-why-drones-worked-failed/
  159. Drone Saturation: Russia’s Shahed Campaign – CSIS, accessed September 30, 2025, https://www.csis.org/analysis/drone-saturation-russias-shahed-campaign
  160. What Iran’s Drones in Ukraine Mean for the Future of War | The Washington Institute, accessed September 30, 2025, https://www.washingtoninstitute.org/policy-analysis/what-irans-drones-ukraine-mean-future-war
  161. David vs. Goliath: Cost Asymmetry in Warfare – RAND, accessed September 30, 2025, https://www.rand.org/pubs/commentary/2025/03/david-vs-goliath-cost-asymmetry-in-warfare.html
  162. Contribution by the International Committee of the Red Cross submitted to the Chair of the Convention on Certain Conventional Weapons (CCW, accessed September 30, 2025, https://docs-library.unoda.org/Convention_on_Certain_Conventional_Weapons_-Group_of_Governmental_Experts_on_Lethal_Autonomous_Weapons_Systems_(2021)/GGE_LAWS_-_June_2021_-_ICRC_-_written_contribution.pdf
  163. Autonomy in weapon systems | SIPRI, accessed September 30, 2025, https://www.sipri.org/research/armament-and-disarmament/emerging-military-and-security-technologies/autonomy-weapon-systems
  164. Autonomous Weapon Systems and International Humanitarian Law: Identifying Limits and the Required Type and Degree of Human–Machine Interaction | SIPRI, accessed September 30, 2025, https://www.sipri.org/publications/2021/policy-reports/autonomous-weapon-systems-and-international-humanitarian-law-identifying-limits-and-required-type
  165. Compliance with International Humanitarian Law in the Development and Use of Autonomous Weapon Systems: What Does IHL Permit, Pr – SIPRI, accessed September 30, 2025, https://www.sipri.org/sites/default/files/2023-03/ihl_and_aws.pdf
  166. Retaining Human Responsibility in the Development and Use of Autonomous Weapon Systems: On Accountability for Violations of International Humanitarian Law Involving AWS | SIPRI, accessed September 30, 2025, https://www.sipri.org/publications/2022/policy-reports/retaining-human-responsibility-development-and-use-autonomous-weapon-systems-accountability
  167. The road less travelled: ethics in the international regulatory debate on autonomous weapon systems, accessed September 30, 2025, https://blogs.icrc.org/law-and-policy/2024/04/25/the-road-less-travelled-ethics-in-the-international-regulatory-debate-on-autonomous-weapon-systems/
  168. UN and Red Cross join voices against danger of autonomous weapons – Prensa Latina, accessed September 30, 2025, https://www.plenglish.com/news/2023/10/05/un-and-red-cross-join-voices-against-danger-of-autonomous-weapons/
  169. International Committee of the Red Cross (ICRC) position on autonomous weapon systems, accessed September 30, 2025, https://www.cambridge.org/core/journals/international-review-of-the-red-cross/article/international-committee-of-the-red-cross-icrc-position-on-autonomous-weapon-systems-icrc-position-and-background-paper/32AEF7294791D19101D96970E85B0459
  170. ICRC’s Intervention on AI Based Weapon under International Humanitarian Law: A Critical Analysis – UniversePG, accessed September 30, 2025, https://www.universepg.com/public/img/storage/journal-pdf/1728999629_ICRCs_intervention_on_AI_Based_Weapon_under_international_humanitarian_law_a_critical_analysis.pdf
  171. The challenges of AI command and control | European Leadership Network, accessed September 30, 2025, https://europeanleadershipnetwork.org/commentary/the-challenges-of-ai-command-and-control/