Tag Archives: military

From Garand to GUIDON: An Analytical History of U.S. Special Operations Forces, Tactics, and Technology

This report provides an exhaustive, engineering-focused analysis of the evolution of U.S. Special Operations Forces (SOF), examining the symbiotic relationship between their organizational development, mission sets, tactical doctrine, and the small arms technology that has defined their capabilities. It traces this evolution from the ad-hoc units of World War II to the unified, technologically advanced force of the 21st century, and projects future trends.

The history of U.S. SOF is not merely a series of organizational changes but a continuous feedback loop where operational necessity drives technological innovation, which in turn enables new tactical possibilities. This evolution has been punctuated by periods of institutional neglect and catalyzed by high-profile failures, leading to a force that is today more integrated, lethal, and strategically relevant than ever before. The following table provides a foundational overview of the key progenitor units that form the lineage of modern U.S. SOF.

Table 1: Key U.S. SOF Units and Their Foundational Missions

Unit NameService BranchEra of InceptionPrimary Foundational Mission(s)
Office of Strategic Services (OSS)Joint / CivilianWorld War IIIntelligence, Unconventional Warfare, Sabotage, Psychological Operations
U.S. Army RangersU.S. ArmyWorld War IIDirect Action, Raiding, Amphibious Assault Spearhead
U.S. Marine RaidersU.S. Marine CorpsWorld War IIAmphibious Light Infantry Warfare, Raiding, Guerrilla Operations
Naval Combat Demolition Units (NCDU)U.S. NavyWorld War IIUnderwater Demolition, Obstacle Clearance for Amphibious Landings
Underwater Demolition Teams (UDT)U.S. NavyWorld War IIBeach Reconnaissance, Underwater Demolition
1st Special Service ForceJoint U.S.-CanadianWorld War IIMountain and Winter Warfare, Raiding

Section 1: Genesis – Forging Elite Forces in World War II

1.1 The Progenitors: An Environment of Necessity

The entry of the United States into World War II exposed a significant gap in its military capability: the absence of forces “specially designated, organized, selected, trained, and equipped forces using unconventional techniques and modes of employment”.1 The initial response was not a unified effort but a series of parallel, service-specific experiments driven by immediate tactical needs.2 These nascent units were often inspired by the demonstrated successes of British Commandos and the clandestine Special Operations Executive (SOE), whose effectiveness in raiding and sabotage provided a compelling model.4

This period was characterized by doctrinal improvisation. There was no overarching concept of “special operations”; instead, each service branch developed units to solve its own unique and pressing challenges. The Army needed forces to conduct raids and spearhead landings in Europe and North Africa; the Marine Corps required amphibious shock troops for island-hopping in the Pacific; and the Navy faced the deadly engineering problem of clearing heavily defended beaches.7 This divergent evolution, rooted in distinct service cultures and operational theaters, created a patchwork of elite but fragmented capabilities, a theme that would define the special operations community for the next four decades.

1.2 The Office of Strategic Services (OSS): The Blueprint for Modern SOF

Organization and Mission

Formed on June 13, 1942, the Office of Strategic Services was America’s first centralized intelligence agency, born from the intelligence failure of Pearl Harbor.11 Under the leadership of William J. Donovan, the OSS was chartered with a revolutionary dual mission: the collection and analysis of strategic intelligence and the execution of unconventional warfare (UW).13 This integrated structure, which combined espionage, analysis, sabotage, and guerrilla warfare under a single command, established the foundational blueprint for the modern Central Intelligence Agency (CIA) and U.S. Army Special Forces.13

Tactics

The OSS pioneered a range of clandestine and paramilitary tactics that are now core SOF mission sets. Its Special Operations (SO) branch, modeled on the British SOE, was tasked to “effect physical subversion of the enemy” by infiltrating occupied territory, supplying resistance movements, and conducting commando raids.14 The most famous examples were the “Jedburgh” teams, three-man international units that parachuted into France to arm and coordinate the French Resistance ahead of the Normandy landings.11 The OSS also fielded uniformed “Operational Groups,” small teams of U.S. commandos who conducted direct action missions alongside partisan forces in multiple theaters.11 Complementing these kinetic operations were the Secret Intelligence (SI) branch, which established agent networks for espionage, and the Morale Operations (MO) branch, which engaged in psychological warfare.12 This comprehensive approach to warfare, which Donovan envisioned as a way to “sow the dragon’s teeth” in enemy territory, was the first formal articulation of modern American unconventional warfare doctrine.14

Weaponry – The Engineer’s Perspective

The unique requirements of the OSS demanded a unique arsenal. Weapons had to be concealable for clandestine agents, deniable to maintain plausible deniability, and specialized to accomplish specific tasks.

  • Suppressed Pistols: The High Standard HDM was a primary tool for covert operations such as sentry removal.15 From an engineering standpoint, its selection was a pragmatic choice. The pistol chambered the.22 Long Rifle cartridge, which is typically subsonic, meaning the projectile does not break the sound barrier. This characteristic made it exceptionally easy to suppress effectively with the integral silencer technology of the era, eliminating the tell-tale “crack” of a supersonic bullet.
  • Concealable Sidearms: While the standard-issue M1911A1 pistol was available, it was often too large and conspicuous for an agent operating undercover.16 The OSS widely used the Colt M1903 Pocket Hammerless, chambered in both.32 ACP and.380 ACP.17 These calibers were ubiquitous throughout Europe, allowing agents to potentially source ammunition locally, and the pistol’s slim, hammerless design made it ideal for deep concealment in a coat pocket. Other concealable firearms issued included the Colt Detective Special and Smith & Wesson Victory revolvers.16
  • Specialized Gadgets: The OSS Research & Development branch, led by Stanley Lovell, became a real-world “Q Branch,” creating a suite of novel devices. This included the T-13 “Beano” grenade, an impact-detonating grenade shaped and weighted like a baseball to leverage the natural throwing ability of American soldiers.16 Other innovations included “Black Joe,” an explosive disguised as a lump of coal for sabotaging locomotives, silenced submachine guns, and a variety of concealable daggers hidden in pipes and pencils.19 This work established the critical principle of developing and fielding “special operations-peculiar” equipment tailored to unique mission requirements.

1.3 U.S. Army Rangers: The Tip of the Spear

Organization and Mission

Activated in Northern Ireland on June 19, 1942, the U.S. Army Rangers were directly modeled on the British Commandos.5 The six Ranger Battalions of WWII were elite, all-volunteer light infantry units created for the specific purposes of conducting raids on enemy installations and acting as a spearhead force for large-scale amphibious assaults.1 Their enduring motto, “Rangers, lead the way!”, was famously given by Brigadier General Norman Cota during the brutal landings on Omaha Beach on D-Day.5

Tactics

Ranger tactics were centered on shock, speed, and direct, overwhelming violence of action against critical enemy positions. Their most legendary operations exemplify this ethos: the audacious scaling of the 100-foot cliffs at Pointe du Hoc under fire to destroy German artillery batteries threatening the D-Day landings, and the daring raid 30 miles behind enemy lines to liberate over 500 Allied prisoners from the Japanese POW camp at Cabanatuan.1 To prepare for such missions, Rangers underwent strenuous training in amphibious operations, demolitions, and night warfare, often using live ammunition to instill a degree of realism unheard of in conventional units at the time.6

Weaponry – The Engineer’s Perspective

Ranger battalions were designed to be organizationally “lean,” sacrificing administrative and heavy support elements in favor of foot and amphibious mobility.6 Their armament reflected a need for maximum portable firepower.

  • Primary Rifles: While the standard-issue semi-automatic M1 Garand was widely used, many Rangers preferred the older, bolt-action M1903 Springfield rifle for commando-type missions, valuing its reputation for ruggedness and precision accuracy.30
  • Automatic Weapons: A significant tactical and technical divergence from standard infantry doctrine was the Ranger squad’s base of fire. The official Table of Organization and Equipment (TO&E), like that of the paratroopers, authorized the belt-fed M1919A4 machine gun at the squad level.31 This weapon provided a volume of sustained, suppressive fire far exceeding that of the M1918A2 Browning Automatic Rifle (BAR) found in regular infantry squads. However, this advantage in firepower came with a trade-off in weight and mobility. For certain operations, such as the D-Day assault where speed and maneuverability were paramount, the M1919 would sometimes be substituted for the lighter, more mobile BAR.32 This highlights a classic engineering and tactical dilemma: the choice between sustained suppressive capability and individual operator mobility.
  • Specialized Weapons: To provide organic fire support, each Ranger platoon was equipped with 60mm mortars and M1 “Bazooka” rocket launchers for indirect fire and anti-armor capability.25 For the Pointe du Hoc assault, some units also carried the British-made.55 caliber Boys Anti-Tank Rifle, a heavy, single-shot weapon, as a substitute for the Bazooka.31

1.4 U.S. Marine Raiders: Amphibious Shock Troops

Organization and Mission

Formed in February 1942, partly due to high-level pressure from President Franklin D. Roosevelt and his son, the four Marine Raider Battalions were the Marine Corps’ counterpart to the Army Rangers and British Commandos.33 They were elite units specializing in amphibious light infantry warfare, raids behind enemy lines, and guerrilla-style operations.7 The Raiders were designed to be entirely foot-mobile once ashore, relying on speed, surprise, and mobility rather than heavy firepower.33 The two most famous battalions, the 1st under Lt. Col. Merritt “Red Mike” Edson and the 2nd under Lt. Col. Evans Carlson, developed distinct tactical philosophies. Edson’s unit was a highly trained special operations force prepared for both special missions and more conventional employment, while Carlson’s unit, heavily influenced by his experiences observing Chinese Communist guerrillas, focused on infiltration and unorthodox methods.34

Tactics

The Raiders’ baptism by fire occurred during the Pacific Campaign, where they executed missions such as the submarine-launched raid on Makin Island and played pivotal roles in the brutal fighting on Guadalcanal and Bougainville.7 Their tactics were tailored for the jungle environment, emphasizing small-unit patrols, ambushes, and rapid amphibious assaults launched from high-speed destroyer transports (APDs) using 10-man rubber boats.33

Weaponry – The Engineer’s Perspective

As an elite force, the Raiders were given first priority on men and the best available equipment.35 Their weapon selection was optimized for lightweight, man-portable firepower suitable for amphibious operations.

  • Rifles: Carlson’s 2nd Raiders were among the first Marine units to be fully equipped with the new semi-automatic M1 Garand rifle, a significant firepower upgrade over the bolt-action M1903 Springfield used initially by Edson’s 1st Raiders.33 Carlson also implemented an innovative 10-man squad structure composed of three 3-man fire teams. Each fire team was equipped with an M1 Garand, a Thompson submachine gun, and a BAR, creating an exceptionally high density of automatic firepower at the smallest tactical level.38
  • Automatic Weapons: The air-cooled Browning M1919A4 machine gun was a favored support weapon due to its relatively low weight compared to water-cooled variants.41 The M1941 Johnson Light Machine Gun, a short-recoil operated weapon known for its accuracy, was also used extensively by Raider and Paramarine units.7
  • Specialized Weapons: The Raiders were distinguished by their unique edged weapons. These included the U.S. Marine Raider Stiletto, a dagger modeled closely on the British Fairbairn-Sykes fighting knife, and the Collins No. 18 “Gung Ho” Knife, a small machete that became a status symbol for the 2nd Raiders.7 They also employed the heavy.55 caliber Boys Anti-Tank rifle. While largely obsolete against German armor in Europe, the weapon proved surprisingly effective in the Pacific; during the Makin Island raid, Raiders used a Boys rifle to destroy two Japanese seaplanes in the lagoon.33

1.5 Naval Special Warfare Precursors: NCDUs and UDTs

The brutal amphibious landing at Tarawa in November 1943 served as a deadly catalyst for naval special warfare. Hundreds of Marines were killed when their landing craft were hung up on a submerged reef far from shore, forcing them to wade through withering Japanese fire.8 This disaster highlighted a critical need for accurate hydrographic reconnaissance and the ability to clear underwater obstacles before an assault.

The immediate answer was the formation of the Underwater Demolition Teams (UDTs). Preceded by the smaller Naval Combat Demolition Units (NCDUs)—six-man teams who specialized in explosives and saw heavy action and casualties clearing obstacles at Omaha and Utah beaches on D-Day—the UDTs became the Navy’s primary force for beach reconnaissance and demolition.8 These “Frogmen” pioneered the tactics of covertly swimming ashore to map beaches and plant explosives, often operating with nothing more than swim trunks, fins, a mask, and a Ka-Bar knife.45 To forge men capable of such hazardous work, LCDR Draper Kauffman instituted an intensive training program that included a grueling five-day period of constant physical and mental stress, which he dubbed “Hell Week.” This program became the foundational selection and training crucible for all future U.S. Navy special warfare operators and is the direct origin of the modern Basic Underwater Demolition/SEAL (BUD/S) course.8 The UDTs are the direct operational and spiritual ancestors of the modern Navy SEALs.8

Section 1 Analysis

The ad-hoc creation of these elite units during World War II reveals several foundational principles that would shape the future of U.S. SOF. Firstly, the units demonstrate a divergent evolution based on the distinct cultures and primary concerns of each service branch. The Army, focused on large-scale land campaigns in Europe, created Rangers for raiding and spearheading assaults like the one at Pointe du Hoc. The Marine Corps, engaged in an amphibious war across the Pacific, created the Raiders for missions like the landing at Tulagi. The Navy, tasked with delivering those forces ashore, created the UDTs to solve the specific engineering problem of clearing beach obstacles. This shows that “special operations” was not yet a coherent, unified concept, but rather a collection of service-specific solutions to difficult tactical problems. This fragmentation would become a recurring institutional challenge, ultimately necessitating the creation of a unified command decades later.

Secondly, the tactical-technical feedback loop was established in its infancy. The unique missions of these new units immediately drove a demand for specialized or modified equipment. This was not merely about acquiring the “best” gear, but the right gear for the job. The OSS, needing to operate covertly, sought out smaller, more concealable pistols like the M1903 and developed suppressed weapons like the High Standard HDM.15 The Rangers, requiring sustained suppressive fire in a light infantry package, departed from standard doctrine by adopting the belt-fed M1919 at the squad level.32 The Marine Raiders, needing a man-portable anti-armor capability for amphibious raids, adopted the otherwise outdated Boys Anti-Tank Rifle and ingeniously repurposed it against aircraft.40 This pattern—where a unique mission profile creates engineering requirements that standard-issue equipment cannot meet—forced innovation and became the central driver of SOF technological evolution.

Finally, a critical and recurring problem emerged: the misuse of special operations forces by conventional commanders. This was particularly evident with the Rangers, who were designed for special missions but were frequently employed as elite line infantry.29 Because their “lean” organization lacked the organic firepower and manpower of a regular infantry battalion, using them in sustained, conventional combat was a costly and wasteful application of a specialized asset. The disastrous defeat of three Ranger battalions at Cisterna, Italy, served as a stark example of this misunderstanding and renewed controversy over their proper role.46 This established a historical precedent for a fundamental tension between SOF and conventional forces that would persist for generations.


Section 2: The Cold War Crucible – Unconventional Warfare and the Jungles of Vietnam

2.1 The Post-WWII Lull and Rebirth

In the aftermath of World War II, the U.S. military underwent a massive demobilization, and with few exceptions, the specialized units forged in the conflict were disbanded.9 However, the dawn of the Cold War and the threat of Soviet expansion across Europe created a new strategic imperative. Military planners recognized the need for a force capable of operating behind the Iron Curtain, organizing, training, and leading local resistance movements in a potential conflict with the Warsaw Pact. This led to the creation of the U.S. Army Special Forces in 1952, a unit whose primary mission was unconventional warfare.49

The Navy’s UDTs, having proven their value, were retained and saw continued action in the Korean War.1 The true catalyst for the expansion of American SOF, however, came in the early 1960s with President John F. Kennedy. Kennedy championed the concepts of counter-insurgency (COIN) and unconventional warfare as critical tools to combat the spread of communism in the developing world. His strong support led to the expansion and popularization of the Army’s Special Forces—who adopted their distinctive “Green Beret” as a mark of excellence with his authorization—and the official establishment of the U.S. Navy SEALs (Sea, Air, and Land teams) on January 1, 1962.1

2.2 New Units, New Doctrines: Unconventional Warfare (UW) and Counter-Insurgency (COIN)

  • U.S. Army Special Forces (Green Berets): The Green Berets were organized, trained, and equipped for a primary mission of Unconventional Warfare, defined as activities conducted to “enable a resistance movement or insurgency to coerce, disrupt or overthrow an occupying power or government”.51 This was a direct doctrinal evolution of the OSS mission to support partisans in WWII. In Vietnam, this doctrine was adapted into Foreign Internal Defense (FID), where instead of fomenting an insurgency, the Green Berets were tasked with defeating one. They deployed to remote areas, establishing camps and working directly with indigenous groups, most notably the Montagnard tribes of the Central Highlands, organizing them into the Civilian Irregular Defense Group (CIDG) to fight the Viet Cong.58
  • U.S. Navy SEALs: Evolving directly from the UDTs, the SEALs were established as the Navy’s premier special warfare unit, experts in sabotage, demolition, and clandestine activities in maritime and riverine environments.54 In Vietnam, their operational focus was the dense, swampy, and canal-laced terrain of the Mekong Delta. Operating from river patrol boats and helicopters, they waged a relentless guerrilla war against the Viet Cong, conducting ambushes, hit-and-run raids, and intelligence collection patrols.52 Their use of camouflage face paint and stealthy night operations earned them a fearsome reputation among the enemy, who called them the “men with green faces”.63

2.3 The Shadow War: Military Assistance Command, Vietnam – Studies and Observations Group (MACV-SOG)

Activated in 1964, MACV-SOG was a highly classified, multi-service joint special operations task force created to conduct covert unconventional warfare operations outside the official boundaries of South Vietnam.64 It was a unique entity, combining the most elite operators from Army Special Forces, Navy SEALs, Marine Force Recon, Air Force Commandos, and the CIA under a single, deniable command.64

SOG’s primary mission was to interdict the flow of men and material down the Ho Chi Minh Trail, a complex network of roads and paths that ran through Laos and Cambodia.64 This was accomplished through a variety of high-risk, clandestine missions, including strategic reconnaissance, direct action raids, sabotage, personnel recovery of downed pilots, and psychological operations.66 The backbone of these operations were small reconnaissance teams (RTs), typically composed of two to three American Green Berets and six to nine indigenous soldiers, who were inserted by helicopter deep into enemy territory where they were often outnumbered by factors of a thousand to one.66 These missions demanded extreme stealth, innovative infiltration and exfiltration tactics, and the ability to call upon massive, coordinated air support the moment a team was compromised.66 SOG also conducted sophisticated psychological operations, such as “Project Eldest Son,” a program where enemy 7.62x39mm AK-47 and 82mm mortar rounds were covertly sabotaged with high explosives. These rounds were then re-inserted into the enemy’s supply chain, causing weapons to explode when fired. The objective was to make North Vietnamese soldiers distrust their own weapons and ammunition.70

2.4 The Vietnam Armory: Adapting to the Jungle

The operational environment of Vietnam—dense jungle, close-range engagements, and the need for deniability—drove significant evolution in SOF weaponry.

  • The M16 Rifle Family – A Problematic Start: The M16 assault rifle was adopted to replace the heavier 7.62mm M14 battle rifle, offering a lighter weapon with a higher capacity magazine and more controllable automatic fire, which was better suited for the close confines of jungle warfare.72 While early use by Special Forces was highly positive, the rifle’s widespread issuance to conventional troops in 1966 was a disaster. A combination of factors—a switch from the originally specified ammunition propellant to a “dirtier” burning ball powder, the lack of chrome-lined chambers and bores, and the failure to issue cleaning kits or proper maintenance training—led to catastrophic reliability issues, primarily failures to extract spent casings. These malfunctions cost an unknown number of American lives in combat.73
  • The CAR-15/XM177 – The First Modern SOF Carbine: The need for an even more compact weapon for recon teams and close-quarters fighting led to the development of the CAR-15 family of carbines.72
  • Engineering Analysis: The definitive version used by SOG, the XM177E2, featured an 11.5-inch barrel and a telescoping stock, making it significantly shorter and more maneuverable than the 20-inch barreled M16.76 This was a critical advantage for operators moving through dense vegetation or operating inside helicopters and other vehicles. However, this compactness came at a ballistic cost. The shorter barrel reduced the muzzle velocity of the 5.56mm M193 projectile from approximately 3,250 ft/s to 2,750 ft/s, which in turn reduced its effective range and terminal effectiveness.76 The short barrel also produced an immense muzzle flash and deafening report, which necessitated the development of a 4.25-inch “moderator.” This device, while not a true silencer, contained an expansion chamber that reduced the flash and sound to more tolerable levels.72 The CAR-15 became the iconic and preferred weapon of MACV-SOG operators.76
  • Suppressed Weapons – The Art of Silent Killing: Stealth was paramount for many SOF missions, driving the development and use of suppressed firearms.
  • Mk 22 Mod 0 ‘Hush Puppy’: Developed specifically for Navy SEALs, the “Hush Puppy” was a heavily modified Smith & Wesson Model 39 9mm pistol.15 Its key features included a threaded barrel for a suppressor, raised sights to aim over the suppressor body, and, most importantly, a slide-lock mechanism. From a technical perspective, the slide-lock was a critical innovation. When engaged, it prevented the slide from cycling, thus eliminating the mechanical noise of the action, which is often louder than the suppressed muzzle report itself. When used with specially developed 158-grain subsonic 9mm ammunition, the weapon was exceptionally quiet, making it the ideal tool for its primary purpose: the silent elimination of sentries and enemy guard dogs.15
  • Suppressed Submachine Guns: SOF units also employed suppressed versions of older submachine guns, including the M3 “Grease Gun,” the Swedish K, and the British Sten gun, for clandestine operations.78
  • Foreign and Modified Weapons: The politically sensitive and deniable nature of SOG’s cross-border missions mandated the use of “sterile” (untraceable) weapons and equipment.80 Operators often carried foreign or heavily modified firearms.
  • Primary Weapons: The 9mm Swedish K submachine gun was an early favorite for its reliability and compactness, but was often replaced by captured Chinese Type 56 assault rifles (an AK-47 variant).80 Using enemy weaponry not only provided plausible deniability but also allowed teams to replenish ammunition from enemy caches if necessary.83
  • Support Weapons: To make them more suitable for jungle warfare, SOG armorers heavily modified standard-issue weapons. The Soviet RPD light machine gun, a common enemy weapon, often had its barrel cut down to make it more compact and maneuverable for ambushes.82 Similarly, the M79 grenade launcher was frequently “sawed-off,” with its stock and a portion of its barrel removed to create a much shorter, pistol-like weapon nicknamed the “pirate gun”.81

Section 2 Analysis

The Vietnam era was a crucible that forged the identity of modern U.S. SOF, driven by new doctrines and the unique challenges of the operational environment. A key development was the way in which doctrine began to define the force. The overarching Cold War threat of Soviet expansion created a clear doctrinal need for Unconventional Warfare. This doctrine directly led to the creation and shaping of the Green Berets. Their entire structure, from the 12-man “A-Team” designed to be a self-sufficient cadre for a larger guerrilla force, to their specialized training in languages, medicine, and engineering, was a physical manifestation of UW and FID doctrine.51 This represents a significant shift from the WWII units, which were largely formed as ad-hoc solutions to immediate tactical problems. The Green Berets were the first U.S. SOF unit built from the ground up to fulfill a long-term strategic doctrine.

Furthermore, MACV-SOG represented a critical evolutionary step: the creation of a formal, multi-service command dedicated to clandestine operations that the U.S. government would officially deny. This political constraint had profound implications for tactics and technology, institutionalizing the concept of the “sterile” operator. SOG’s missions in Laos and Cambodia, where U.S. forces were not officially present, created an absolute requirement for plausible deniability.64 This drove equipment choices directly: operators wore unmarked uniforms and carried non-U.S. weapons like the Swedish K and captured AK-47s.64 This formalized the “shadow warrior” concept first seen with the OSS, but now on a larger, more structured scale, creating a force that operated outside conventional rules of engagement.

Finally, the experience in Vietnam cemented the short-barreled carbine as the quintessential special operations primary weapon. While the standard M16 was an improvement over the M14, it was still cumbersome in the dense jungle and during helicopter operations.72 The primary need for units like SOG was a compact, lightweight, and controllable weapon for the short-range, high-intensity firefights that characterized their missions.76 The CAR-15/XM177 was developed specifically to meet this need.75 Despite its technical trade-offs, such as reduced muzzle velocity, its superior handling and portability proved decisive for the types of missions SOF conducted.76 This experience created a deep-seated doctrinal preference within the SOF community for carbines over full-length rifles, a preference that continues to this day with platforms like the M4A1 and Mk18.


Section 3: A Phoenix from the Ashes – Post-Vietnam Reorganization and the Birth of JSOC

3.1 The Post-Vietnam Decline: The “Hollow Force”

Following the withdrawal from Vietnam, U.S. Special Operations Forces entered a period of steep decline. The broader U.S. military, scarred by the experience of counter-insurgency, aggressively refocused its doctrine, training, and procurement on the prospect of a large-scale conventional war against the Soviet Union in Europe. This new focus was codified in doctrines like “AirLand Battle,” which emphasized large, combined-arms formations and high-technology weaponry.48 Within this framework, SOF were seen as a niche capability with limited relevance. As a result, they were systematically devalued, underfunded, and in some cases, nearly eliminated from the force structure.48 This era of neglect, which affected the entire military, became known as the period of the “hollow force”.90

3.2 Operation Eagle Claw: The Catalyst of Failure

On April 24, 1980, the consequences of this neglect were laid bare on a desolate salt flat in Iran. Operation Eagle Claw, the mission to rescue 52 American hostages from the U.S. Embassy in Tehran, ended in catastrophic failure, national humiliation, and the deaths of eight servicemen.90 The mission’s collapse was a direct result of systemic flaws that had been allowed to fester within the degraded special operations community.90

  • Technical and Tactical Failures: An after-action review, known as the Holloway Report, identified a cascade of failures:
  • Command and Control: The mission was planned and led by an ad-hoc Joint Task Force with no standing headquarters, unclear lines of authority, and excessive compartmentalization that stifled coordination.90
  • Inter-Service Coordination: The various service components—Army Delta Force operators, Marine helicopter pilots, and Air Force transport crews—had never trained together as a single, cohesive unit before the mission.90 This lack of joint training led to procedural misunderstandings, such as Marine pilots misinterpreting a warning indicator on the Navy RH-53D helicopters they were flying, leading to an unnecessary mission abort.90
  • Equipment and Environment: The Navy RH-53D Sea Stallion helicopters, chosen because they could be launched from an aircraft carrier, were not designed for long-range, clandestine infiltration and were ill-suited for the mission.90 A series of mechanical failures, compounded by an unforecasted low-level dust storm known as a haboob, resulted in an insufficient number of mission-capable helicopters reaching the rendezvous point, code-named Desert One, forcing the mission commander to abort.90 The final tragedy occurred during the chaotic withdrawal, when a helicopter collided with a C-130 transport aircraft, causing a massive fire.92

3.3 The Tier 1 Solution: A Force of “Doers”

The searing failure of Eagle Claw provided the undeniable impetus for the creation of a standing, full-time, national-level counter-terrorism (CT) and hostage-rescue capability.92

  • 1st SFOD-D (Delta Force): The primary ground assault element for Eagle Claw was the U.S. Army’s 1st Special Forces Operational Detachment-Delta, which had been founded by Colonel Charles Beckwith in 1977.97 Beckwith, a veteran of the British 22 Special Air Service (SAS) Regiment, had long advocated for a U.S. unit that was not just a force of “teachers,” like the Green Berets, but a force of “doers” capable of direct action and surgical counter-terrorism missions.97 Delta Force was certified as fully mission-capable just months before the Iran hostage crisis began.97
  • SEAL Team Six (later DEVGRU): The debacle at Desert One highlighted the need for a dedicated maritime counter-terrorism counterpart to the Army’s Delta Force. In November 1980, the Navy established SEAL Team Six under the command of the controversial but visionary Richard Marcinko.98 Marcinko was given a six-month window to create the unit from scratch, and he hand-picked its founding members, or “plankowners,” from the most experienced operators in the existing UDT and SEAL community.98 He famously named it “SEAL Team Six” (when only Teams One and Two existed) to confuse Soviet intelligence about the true size of the U.S. SEAL force.98

3.4 The CQB Revolution and its Signature Weapon

The primary mission of these new “Tier 1” units was hostage rescue, a task that demanded the mastery of a highly specialized skillset: Close Quarters Battle (CQB). The core tactical principles of CQB were Surprise, Speed, and overwhelming Violence of Action, intended to seize the initiative and neutralize threats before they could harm hostages.101 This required a level of surgical marksmanship, explosive breaching, and team coordination previously unseen. Training revolved around countless hours of repetitive drills in specially constructed “shoot houses,” often using live ammunition to build trust and inoculate operators to the extreme stress of making life-or-death decisions in fractions of a second.97

  • The Heckler & Koch MP5 – An Engineering Analysis: The adoption of the German-made Heckler & Koch MP5 submachine gun by these new units was a deliberate technical choice driven by the unique demands of the CQB environment.103
  • Operating System: The MP5’s key technological advantage was its roller-delayed blowback operating system, which allows the weapon to fire from a closed bolt.105 Unlike older, open-bolt submachine guns (like the M3 Grease Gun or Uzi), where pulling the trigger releases a heavy bolt that slams forward to fire the cartridge, the MP5’s bolt is already locked in place. This provides a much more stable firing platform, making the first shot—the most critical shot in a hostage situation—significantly more accurate, akin to firing a rifle.108
  • Ergonomics and Controllability: The MP5’s design, combined with the relatively low recoil of the 9mm Parabellum cartridge and a high cyclic rate of 800 rounds per minute, made it an exceptionally controllable weapon for delivering rapid, precise bursts of fire in the tight confines of rooms and hallways.103
  • Tactical Application: For specific scenarios like a hijacked airliner, the 9mm pistol round was considered tactically superior to a 5.56mm rifle round. Its lower velocity and energy reduced the risk of over-penetration through the aircraft’s thin fuselage or through a target into a hostage positioned behind them.110
  • Variants: The modularity of the MP5 platform allowed for the adoption of specialized variants. The integrally suppressed MP5SD provided a very quiet weapon for stealth approaches, while the ultra-compact, stockless MP5K was ideal for concealed carry in close protection details.103 The Navy SEALs adopted a specialized maritime version, the MP5-N, which featured corrosion-resistant coatings and a threaded barrel for suppressors.103

Section 3 Analysis

This era reveals that failure, not success, is often the most potent catalyst for meaningful change in military institutions. Despite the proven effectiveness of SOF in Vietnam, their capabilities were allowed to wither during the post-war refocus on conventional warfare.48 It was the spectacular, public, and undeniable failure of Operation Eagle Claw that created the political and military will for true, lasting reform. The mission’s collapse was directly attributable to the very deficiencies—a lack of joint command structure, inadequate joint training, and no specialized equipment—that had been allowed to atrophy in the preceding years.93 This catastrophic failure provided an irrefutable mandate for change, leading directly to the creation of the 160th Special Operations Aviation Regiment (“Night Stalkers”) to provide dedicated aviation support, the formation of DEVGRU, and the establishment of the Joint Special Operations Command (JSOC) to oversee these national-level assets.90

This period also marks the formal divergence of what would become known as “white” and “black” SOF. Colonel Beckwith’s vision for Delta Force was explicitly for a force of “doers,” distinct from the Special Forces “teachers”.97 The mission set of direct action and counter-terrorism was fundamentally different from the long-term, low-visibility unconventional warfare mission of the Green Berets.98 This led to the creation of two distinct career paths, mission sets, and command structures. JSOC was formed to command the nation’s highest-level Special Mission Units (SMUs) for the most sensitive and clandestine missions, while the broader SOF force remained under their respective service commands. This created a formal bifurcation in the special operations world that persists today.

Finally, the adoption of the MP5 demonstrates a principle of technology being tailored to solve a singular, critical tactical problem. The choice of the MP5 was not about finding a “better” submachine gun in general; it was about finding the optimal engineering solution for the unique challenge of the hostage rescue shot. The primary threat was terrorism, and the primary mission was rescuing hostages, a task that lives or dies on the ability to make a single, precise, instantaneous shot in a chaotic environment.97 The MP5’s closed-bolt, roller-delayed action provided rifle-like first-shot accuracy in a compact, controllable package, a distinct performance advantage over existing systems for that specific task.108


Section 4: Unification and Dominance – The Goldwater-Nichols Act and the USSOCOM Era

4.1 Legislative Mandate: The Creation of USSOCOM

While JSOC addressed the immediate need for a standing joint command for Tier 1 units, the broader SOF community remained fragmented and beholden to the priorities of the conventional services. Frustrated by the Pentagon’s continued resistance to comprehensive reform after both Operation Eagle Claw and the widely reported inter-service coordination problems during the 1983 invasion of Grenada, the U.S. Congress took decisive action.84 The result was the Goldwater-Nichols Department of Defense Reorganization Act of 1986, which was amended by the Nunn-Cohen Amendment to the National Defense Authorization Act for Fiscal Year 1987.113

  • Key Provisions: This landmark legislation fundamentally restructured the entire U.S. military. It streamlined the operational chain of command, running from the President through the Secretary of Defense directly to the unified Combatant Commanders, thereby reducing the operational role of the service chiefs.115 Crucially for SOF, the legislation mandated the creation of the United States Special Operations Command (USSOCOM) as a new, unified combatant command with a four-star general at its head.116
  • Budgetary and Acquisition Autonomy: The most transformative provision of the legislation was the creation of Major Force Program 11 (MFP-11). This gave USSOCOM its own distinct budget line within the Department of Defense and the authority to develop and acquire its own “special operations-peculiar” equipment.114 For the first time, SOF was no longer dependent on the conventional-focused military services for funding and equipment. This provision finally solved the perennial problem of SOF modernization being a low priority compared to large conventional programs like aircraft carriers and tanks.89

4.2 The Post-9/11 Expansion: SOF as the Tip of the Spear

The terrorist attacks of September 11, 2001, thrust special operations forces from the shadows to the forefront of U.S. national security strategy. The nature of the enemy—a globally dispersed, non-state terrorist network—was ill-suited for conventional military formations but perfectly matched to the capabilities of SOF. In the ensuing Global War on Terror (GWOT), USSOCOM experienced an unprecedented expansion. Its manpower nearly doubled, and its budget more than tripled as it became the primary instrument for prosecuting the wars in Afghanistan, Iraq, and beyond.118 SOF conducted tens of thousands of direct action raids to capture or kill high-value targets (HVTs) and continued to perform their traditional Foreign Internal Defense missions with partner forces. This new prominence was formalized in the 2004 Unified Command Plan, which designated USSOCOM as the lead combatant command for planning and synchronizing all global operations against terrorist networks.114

4.3 The Modern Operator’s Platform: The M4A1 Carbine and the SOPMOD Program

The primary individual weapon of the GWOT-era operator was the M4A1 carbine, a direct descendant of the Vietnam-era CAR-15. It featured a 14.5-inch barrel, which offered a better compromise between compactness and the ballistic performance of the 5.56mm cartridge than its predecessor. The true revolution, however, was not the carbine itself, but the ecosystem built around it: the Special Operations Peculiar Modification (SOPMOD) program. This program was a direct and powerful result of USSOCOM’s newfound acquisition authority.

  • Engineering Analysis: The core of the SOPMOD program was the standardization of the MIL-STD-1913 “Picatinny” rail, an accessory mounting system, on the M4A1’s upper receiver and a new railed handguard. This created a universal interface, allowing operators to easily and securely attach a comprehensive menu of pre-tested and certified accessories to tailor the weapon to specific mission requirements.
  • Kit Components: The SOPMOD kit provided a suite of accessories, including the M203 grenade launcher, various optical sights (like the Aimpoint CompM2 red dot for close quarters and the Trijicon ACOG 4x scope for longer ranges), infrared laser aiming modules for use with night vision (AN/PEQ-2), vertical forward grips, and quick-detach suppressors.120
  • Tactical Impact: This modularity provided unprecedented flexibility and operator-level customization. A single carbine could be configured for a direct action CQB mission with a red dot sight and weapon light, then reconfigured in minutes for a rural reconnaissance mission with a magnified optic and IR laser. This adaptability was essential for the dynamic and varied mission sets of the GWOT. The M4A1 SOPMOD became the ubiquitous primary weapon for nearly all U.S. SOF units, a testament to the success of a system designed by operators, for operators, and funded by their own command.

Table 2: Evolution of Primary Individual Weapon Systems in U.S. SOF

EraPrimary Weapon SystemCartridgeBarrel LengthOperating PrincipleDriving Tactical Requirement
WWIIM1 Garand / M1903.30-06 Springfield24 in.Gas-Operated / Bolt-ActionGeneral purpose infantry combat; reliability and accuracy
VietnamM16A1 / CAR-15 (XM177)5.56×45mm20 in. / 11.5 in.Direct ImpingementLighter weight, higher volume of fire for jungle warfare; compactness for special operations
Post-Vietnam / CTH&K MP59×19mm Parabellum8.9 in.Roller-Delayed BlowbackSurgical precision for Close Quarters Battle (CQB) and hostage rescue; low over-penetration risk
GWOTM4A1 SOPMOD5.56×45mm14.5 in.Direct ImpingementModularity and adaptability for varied counter-terror missions (CQB, vehicle ops, medium range)
GPC (Emerging)M7 Rifle (NGSW)6.8×51mm13 in.Gas PistonDefeat of near-peer adversary body armor at extended ranges

Section 4 Analysis

The creation of USSOCOM, driven by the Goldwater-Nichols Act, represents the single most transformative event in the history of U.S. special operations. The key to this transformation was the establishment of Major Force Program 11, which granted SOF control over its own budget.114 This “power of the purse” ended decades of being underfunded and devalued by the conventional services, whose priorities naturally gravitated toward large, expensive platforms like aircraft carriers and main battle tanks.89 This budgetary autonomy was the mechanism that enabled the comprehensive modernization and professionalization of the entire SOF enterprise, making programs like SOPMOD possible.

The SOPMOD program itself represented a fundamental shift in weapons philosophy, moving the carbine from a static, factory-configured tool to a dynamic, mission-adaptable platform. The GWOT demanded that a single operator be able to perform multiple roles, often on the same mission, or deploy to vastly different environments on short notice. The Picatinny rail system of the M4A1 allowed an operator to configure their own weapon for a specific mission profile—CQB, reconnaissance, direct action—without needing an armorer.120 This operator-level modularity became a massive force multiplier, dramatically increasing the flexibility and effectiveness of small teams, and has since become the standard for virtually all modern military small arms.

Finally, the Global War on Terror elevated SOF from a specialized tactical asset to a primary instrument of U.S. military power. The nature of the enemy—a non-state, globally dispersed network—was uniquely suited to SOF capabilities, such as small-footprint operations, precision targeting, and partner force development.118 The 2004 Unified Command Plan’s designation of USSOCOM as the lead for global counter-terrorism operations formalized this paradigm shift.114 This new strategic importance led to massive growth in budget and personnel but also created immense operational strain on the force, leading to the “fraying around the edges” described by former USSOCOM Commander Admiral Eric Olson.119


Section 5: The Future of Special Operations – Great Power Competition and the Next Generation of Warfare

5.1 Doctrinal Pivot: From Counter-Terrorism to Great Power Competition (GPC)

The 2018 National Defense Strategy signaled a fundamental shift in U.S. military focus, moving away from the counter-terrorism and counter-insurgency campaigns that defined the post-9/11 era toward an era of long-term, strategic competition with near-peer adversaries, namely China and Russia.118 This pivot has prompted a re-evaluation of the role, size, and budget of U.S. SOF after two decades of unrestrained growth. The Department of Defense is now weighing force structure reductions across the command, with the Army considering cuts of up to 10% for Special Forces, primarily targeting “enabler” capabilities such as logistics, intelligence, and information support operations.121

5.2 The New Domains: The “Influence Triad”

In the context of Great Power Competition, which is often waged in the “gray zone” below the threshold of conventional armed conflict, the strategic value of SOF is shifting. Less emphasis is placed on kinetic direct action and more on their ability to enable effects in the information and cognitive domains. SOF is now seen as a critical component of the “Influence Triad,” a synergistic combination of SOF, U.S. Space Force, and U.S. Cyber Command.121 In this model, SOF provides the crucial on-the-ground access, placement, and human intelligence that allows space and cyber assets to achieve strategic effects. This doctrinal shift necessitates a greater emphasis on psychological operations, information warfare, and cyber operations within the SOF community.121

5.3 The Next Generation Armory: Engineering for Peer Conflict

The small arms of the GWOT were optimized for engagements against largely unarmored insurgents in close-quarters environments. A near-peer adversary, however, presents a fundamentally different technical challenge: soldiers equipped with advanced ceramic body armor who must be engaged at longer distances. The U.S. Army’s Next Generation Squad Weapon (NGSW) program is a direct engineering response to this new threat profile.

  • The 6.8mm Cartridge: The centerpiece of the NGSW program is a new, high-pressure 6.8x51mm common cartridge. It is designed to generate significantly higher muzzle velocities and energies than the 5.56mm NATO round, giving it the ballistic performance necessary to defeat modern military body armor at tactically relevant combat ranges.125
  • The M7 Rifle and M250 SAW: The SIG Sauer M7 rifle and M250 Squad Automatic Weapon are the platforms built around this powerful new cartridge. They are slated to replace the M4/M16 and M249 SAW in close combat units.
  • The M157 Fire Control Optic: Perhaps the most revolutionary component of the system is the M157 Fire Control optic. This is an advanced, computerized sight that integrates a laser rangefinder, ballistic calculator, and environmental sensors. It automatically calculates the proper aimpoint for the shooter, dramatically increasing the first-round hit probability at extended ranges.
  • Implications for SOF: While NGSW is a conventional Army program, its technology will inevitably be adopted and adapted by SOF. The new system presents challenges—the M7 and its ammunition are heavier than the M4, and the increased impulse will produce more recoil. However, the quantum leap in lethality and effective range against protected targets is a necessary technological evolution for confronting a peer adversary.

5.4 Speculative Evolution: The Operator of 2040

Projecting forward, the SOF operator of the future will likely be a hyper-enabled node on a vast, interconnected battlefield.

  • Technological Integration: Weapons will be fully integrated with augmented reality systems, feeding targeting data, friendly force locations, and intelligence directly into the operator’s field of view. These operators will be seamlessly networked with a host of autonomous systems—reconnaissance drones, robotic “mules” for logistical support, and unmanned weapons platforms—that they can direct and control in real-time.
  • Human Augmentation: Advances in biotechnology and pharmacology may lead to forms of human augmentation, such as pharmaceuticals to manage fatigue and enhance cognitive function, lightweight exoskeletons to increase strength and endurance, or even neural interfaces for direct, thought-based control of machines.
  • Tactical Shifts: The tactical emphasis may continue to shift from kinetic direct action toward non-kinetic effects. A future SOF mission might not be a raid, but a clandestine insertion to conduct a localized cyber or electronic warfare attack, or to subtly shape the perceptions of a population through advanced, AI-driven psychological operations. In such a scenario, the operator’s primary “weapon” may be a ruggedized tablet used to command a swarm of drones.
  • The Enduring Constant: Despite these technological advancements, the core attributes that have always defined the special operator—elite mental and physical toughness, creativity, superior problem-solving skills, and the discipline to operate with precision in ambiguous, high-stakes environments—will remain the most critical component of the force.

Section 5 Analysis

The current strategic pivot to Great Power Competition demonstrates that the historical pendulum for SOF is swinging once again. Just as special operations capabilities were downsized after Vietnam when the military’s focus returned to conventional warfare in Europe, SOF is now facing potential reductions as the strategic priority shifts from the counter-terrorism model of the GWOT to preparing for large-scale conflict.84 This suggests a recurring historical pattern: in periods where the primary threat is perceived as a conventional state actor, the Pentagon prioritizes large conventional forces and views SOF as a niche, supporting capability, often leading to budgetary and force structure reductions.

Small arms technology continues to serve as a clear barometer of this doctrinal shift. The NGSW program is the most tangible evidence of the pivot to GPC. The entire engineering effort is predicated on solving a problem—defeating near-peer adversary body armor at range—that was not a primary concern during the GWOT.125 The shift from the 5.56mm M4, a weapon optimized for the last war, to the 6.8mm M7, a weapon designed for the next one, is a direct, physical manifestation of the change in national defense strategy. The weapon itself is an artifact of the new doctrine.

Finally, the growing emphasis on the “Influence Triad” suggests that SOF’s future strategic value will be defined less by attrition and more by its ability to create effects in the information and cognitive domains.121 In the “gray zone” competition that characterizes the GPC environment, influencing populations, degrading an adversary’s will to fight, and shaping the information space are key objectives. SOF, with their unique skills in language, cultural understanding, and working with partner forces, are the ideal physical component to enable these non-kinetic effects. This implies that while the “door-kicker” will always be a necessary capability, the SOF operator of the future may spend more time enabling a cyber-attack or conducting a psychological campaign than in direct combat, representing a significant evolution in their primary strategic role.


Conclusion

The history of U.S. Special Operations Forces is a remarkable journey from a collection of disparate, service-specific raiding parties born of necessity in World War II to a unified, congressionally-mandated combatant command with global strategic responsibilities. This evolution has been marked by several key inflection points: the doctrinal birth of Unconventional Warfare during the Cold War; the tactical crucible of Vietnam that forged the modern operator; the catastrophic failure of Operation Eagle Claw that served as an undeniable catalyst for reform; the legislative revolution of the Goldwater-Nichols Act that granted SOF institutional permanence and autonomy; and the post-9/11 era that saw SOF become the nation’s primary tool in the Global War on Terror.

Throughout this journey, a constant, symbiotic relationship between tactics and technology has been evident. The evolution of the operator’s primary weapon—from the M1 Garand, to the M16, to the CAR-15, to the modular M4A1 SOPMOD, and now to the emerging M7—is a physical record of this co-dependent process. Each technological step was driven by a new set of tactical requirements dictated by a changing strategic environment.

As the U.S. military pivots toward an era of Great Power Competition, SOF faces new challenges. The force is adapting once again, shifting its focus from counter-terrorism to competition in the gray zone, where influence, information, and partnership are the new currencies of conflict. While future technology will undoubtedly provide operators with capabilities that seem like science fiction today, the fundamental requirement for highly disciplined, intelligent, and adaptable individuals will remain the immutable bedrock of U.S. Special Operations Forces. Their ability to integrate new technologies and adapt their tactics to the demands of a new strategic era will determine their continued relevance and success on the battlefields of tomorrow.



If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly donate to help fund our continued report, please visit our donations page.


Works cited

  1. Who Are the Special Operations Forces? | American Battlefield Trust, accessed August 21, 2025, https://www.battlefields.org/learn/articles/who-are-special-operations-forces
  2. U.S. Army Special Operations in World War II (CMH Pub 70-42), accessed August 21, 2025, https://history.army.mil/Publications/Publications-Catalog/US-Army-Special-Operations-in-World-War-II/
  3. special operations in world war ii – U.S. Army Center of Military History, accessed August 21, 2025, https://history.army.mil/Portals/143/Images/Publications/Publication%20By%20Title%20Images/U%20Pdf/CMH_Pub_70-42.pdf?ver=n5C544pW7cBJd-PpD6ELXA%3D%3D
  4. Office of Strategic Services – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/Office_of_Strategic_Services
  5. H.R. 3577, U.S. Army Rangers Veterans of World War II Congressional Gold Medal Act – Jason Crow, accessed August 21, 2025, https://crow.house.gov/sites/evo-subsites/crow.house.gov/files/evo-media-document/HR%203577%20-%20One%20Pager.pdf
  6. Rangers in WWII: Part I, The Formation and Early Days – ARSOF History, accessed August 21, 2025, https://arsof-history.org/articles/v2n3_rangers_wwii_page_1.html
  7. 5 Special Forces Groups of World War II – TheCollector, accessed August 21, 2025, https://www.thecollector.com/special-forces-groups-world-war-ii/
  8. History – WWII – Naval Special Warfare Command – Navy.mil, accessed August 21, 2025, https://www.nsw.navy.mil/HISTORY/WWII
  9. List of former United States special operations units – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/List_of_former_United_States_special_operations_units
  10. The Rangers of WWII: Leading the way for future generations | Article – Army.mil, accessed August 21, 2025, https://www.army.mil/article/266709/the_rangers_of_wwii_leading_the_way_for_future_generations
  11. The Office of Strategic Services: America’s First Intelligence Agency – CIA, accessed August 21, 2025, https://www.cia.gov/legacy/museum/exhibit/the-office-of-strategic-services-n-americas-first-intelligence-agency/
  12. OSS Catalogue – CIA, accessed August 21, 2025, https://www.cia.gov/static/Official-OSS-Exhibition-Catalogue.pdf
  13. Office of Strategic Services (U.S. National Park Service), accessed August 21, 2025, https://www.nps.gov/articles/office-of-strategic-services.htm
  14. The Office of Strategic Services (OSS): A Primer on the Special …, accessed August 21, 2025, https://arsof-history.org/articles/v3n4_oss_primer_page_1.html
  15. These are 6 of the weirdest suppressed weapons of … – Sandboxx, accessed August 21, 2025, https://www.sandboxx.us/news/these-are-some-of-the-weirdest-suppressed-weapons-of-vietnam/
  16. OSS Weapons – FIREARMS – U.S. Militaria Forum, accessed August 21, 2025, https://www.usmilitariaforum.com/forums/index.php?/topic/289803-oss-weapons/
  17. This is why the Colt M1903 was the pistol of choice of the OSS | Sandboxx, accessed August 21, 2025, https://www.sandboxx.us/news/the-colt-m1903-the-pistol-of-the-oss-2/
  18. Collecting Small Arms & Weapons of the Office of Strategic Services (OSS) | HCF – YouTube, accessed August 21, 2025, https://m.youtube.com/watch?v=bgIxCoUu8jE
  19. Spy Gadgets: Could You Escape and Evade Capture in WWII? – Spyscape, accessed August 21, 2025, https://spyscape.com/article/spy-gadgets-how-would-you-escape-evade-capture-in-wwii
  20. The OSS Dirty Tricks Department: Umbrella Guns, Beano Grenades & Spies – Spyscape, accessed August 21, 2025, https://spyscape.com/article/oss-umbrella-guns-beano-grenades-the-shadowy-birth-of-the-cia
  21. en.wikipedia.org, accessed August 21, 2025, https://en.wikipedia.org/wiki/Office_of_Strategic_Services#:~:text=Throughout%20the%20war%20years%2C%20the,disguised%20as%20lumps%20of%20coal%20(%22
  22. Spy Gadgets of World War II | Historical Spotlight | News – Wargaming, accessed August 21, 2025, https://wargaming.com/en/news/spy_gadgets/
  23. Cloak and Dagger Army: The OSS – America in WWII magazine, accessed August 21, 2025, http://www.americainwwii.com/articles/cloak-and-dagger-army-the-oss/
  24. U.S. Army Rangers – Overview, History, Best Ranger Competition, Army.mil, accessed August 21, 2025, https://www.army.mil/ranger/heritage.html
  25. Download the Instructor Notes – Army University Press, accessed August 21, 2025, https://www.armyupress.army.mil/Portals/7/educational-services/staff-rides/VSR/Normandy/Pointe-du-Hoc/Normandy_Pointe%20du%20Hoc_Walkbook.docx
  26. Raid at Cabanatuan – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/Raid_at_Cabanatuan
  27. HyperWar: Small Unit Actions [Point du Hoe] – Ibiblio, accessed August 21, 2025, https://www.ibiblio.org/hyperwar/USA/USA-A-Small/USA-A-Small-1.html
  28. Rescue at Cabanatuan – ARSOF History, accessed August 21, 2025, https://arsof-history.org/articles/v14n2_cabanatuan_page_1.html
  29. U.S. Army Ranger Battalion (1942-45) – Battle Order, accessed August 21, 2025, https://www.battleorder.org/usa-ranger-bn-ww2
  30. Ready for Battle: The Personal Equipment of a World War II Soldier – Army Heritage Center Foundation, accessed August 21, 2025, https://www.armyheritage.org/wp-content/uploads/2020/06/Ready_for_Battle_-_World_War_II.pdf
  31. U.S. Ranger Company Organization (1944-45) – Battle Order, accessed August 21, 2025, https://www.battleorder.org/us-rangers-1944
  32. Weapons of the U.S. Army Ranger Company in 1944-45 [2240×1578] : r/MilitaryPorn, accessed August 21, 2025, https://www.reddit.com/r/MilitaryPorn/comments/cm11qa/weapons_of_the_us_army_ranger_company_in_194445/
  33. From Makin to Bougainville: Marine Raiders in the Pacific War …, accessed August 21, 2025, https://www.nps.gov/parkhistory/online_books/wapa/extcontent/usmc/pcn-190-003130-00/sec1.htm
  34. The Marines’ Commando Experiment | Naval History Magazine – August 2014 Volume 28, Number 4, accessed August 21, 2025, https://www.usni.org/magazines/naval-history-magazine/2014/july/marines-commando-experiment
  35. Marine Raiders – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/Marine_Raiders
  36. Marine Raider Regiment – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/Marine_Raider_Regiment
  37. Special Marine Corps Units of World War II PCN 19000413200, accessed August 21, 2025, https://www.marines.mil/Portals/1/Publications/Special%20Marine%20Corps%20Units%20of%20World%20War%20II%20%20PCN%2019000413200.pdf
  38. From Makin to Bougainville: Marine Raiders in the Pacific War …, accessed August 21, 2025, https://www.nps.gov/parkhistory/online_books/wapa/extcontent/usmc/pcn-190-003130-00/sec2.htm
  39. U.S. Marine Raider Legacy – Marine Raider Foundation, accessed August 21, 2025, https://marineraiderfoundation.org/about-marsoc/u-s-marine-raider-legacy/
  40. From Makin to Bougainville: Marine Raiders in the Pacific War (Makin), accessed August 21, 2025, https://www.nps.gov/parkhistory/online_books/wapa/extcontent/usmc/pcn-190-003130-00/sec4.htm
  41. From Makin to Bougainville: Marine Raiders in the Pacific War, accessed August 21, 2025, https://www.nps.gov/parkhistory/online_books/wapa/extcontent/usmc/pcn-190-003130-00/index.htm
  42. Marine Corps World War II Weapons: Description, accessed August 21, 2025, https://www.usmcmuseum.com/uploads/6/0/3/6/60364049/marine_corps_weapon_descriptions.pdf
  43. List of weapons of the United States Marine Corps – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/List_of_weapons_of_the_United_States_Marine_Corps
  44. Marine Corps Knives Of World War II | An Official Journal Of The NRA – American Rifleman, accessed August 21, 2025, https://www.americanrifleman.org/content/marine-corps-knives-of-world-war-ii/
  45. Navy SEALs | The Complete Guide – SOFREP, accessed August 21, 2025, https://sofrep.com/specialoperations/navy-seals-the-complete-guide/
  46. “A HISTORY OF THE RANGER BATTALIONS IN WORLD WAR II” by JEROME JOSEPH HAGGERTY – Fordham Research Commons, accessed August 21, 2025, https://research.library.fordham.edu/dissertations/AAI8213242/
  47. A Timeline of U.S. Army Special Operations Forces – ARSOF History, accessed August 21, 2025, https://arsof-history.org/arsof_timeline/index.html
  48. Heritage of the Special Operations Professionals – AFSOC, accessed August 21, 2025, https://www.afsoc.af.mil/Portals/86/documents/history/heritage_special_ops_prof.pdf
  49. The Origins of the Green Berets – Ghosts of the Battlefield, accessed August 21, 2025, https://www.ghostsofthebattlefield.org/articles/the-origins-of-the-green-berets
  50. 5 Facts About the U.S. Special Forces | ASOMF, accessed August 21, 2025, https://www.asomf.org/5-facts-about-the-u-s-special-forces/
  51. Developing an Unconventional Warfare: The Creation of Special …, accessed August 21, 2025, https://www.asomf.org/developing-an-unconventional-warfare-the-creation-of-special-forces/
  52. The Role of U.S. Navy SEALs in Vietnam – USAMM, accessed August 21, 2025, https://www.usamm.com/blogs/news/navy-seals-vietnam
  53. The Myth of the Green Berets: How One Group of Soldiers Helped Sell a Nation on the Virtue of War, accessed August 21, 2025, https://digitalcommons.chapman.edu/cgi/viewcontent.cgi?article=1016&context=war_and_society_theses
  54. Week of March 10 – Vietnam War Commemoration, accessed August 21, 2025, https://www.vietnamwar50th.com/education/week_of_march_10/
  55. Vietnam War Navy Seals – Combat Veterans, accessed August 21, 2025, https://combatvets.socialwork.msu.edu/vietnam-war-navy-seals
  56. Unconventional Warfare on the Conventional Battlefield – Army University Press, accessed August 21, 2025, https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Nov-Dec-2024/Unconventional-Warfare/
  57. Unconventional warfare (United States) – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/Unconventional_warfare_(United_States)
  58. Best Practices in Counterinsurgency – Army University Press, accessed August 21, 2025, https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/COIN-Reader-1/Sepp-MJ-2005/
  59. What did the Green Berets do during the Vietnam War? Are there any major successes which can be attributable to them specifically? : r/WarCollege – Reddit, accessed August 21, 2025, https://www.reddit.com/r/WarCollege/comments/18zcgr3/what_did_the_green_berets_do_during_the_vietnam/
  60. Green Berets, Montagnard Tribesmen Formed Lasting Alliance in Vietnam, accessed August 21, 2025, https://sofmag.com/green-berets-and-montagnard-tribesmen-formed-lasting-alliance-in-vietnam/
  61. Looking back at the unconventional Green Beret tactics in Vietnam, accessed August 21, 2025, https://www.wearethemighty.com/mighty-tactical/unconventional-green-beret-tactics-in-vietnam/
  62. History – Vietnam War – Naval Special Warfare Command, accessed August 21, 2025, https://www.nsw.navy.mil/HISTORY/Vietnam-War
  63. The Men With Green Faces – National Navy UDT-SEAL Museum, accessed August 21, 2025, https://www.navysealmuseum.org/naval-special-warfare/men-green-faces
  64. MACV-SOG: The special operators who took on the Vietnam War’s most dangerous and secret missions – SOF Support Foundation, accessed August 21, 2025, https://sofsupport.org/macv-sog-the-special-operators-who-took-on-the-vietnam-wars-most-dangerous-and-secret-missions/
  65. Military Assistance Command, Vietnam – Studies and Observations Group – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/Military_Assistance_Command,_Vietnam_%E2%80%93_Studies_and_Observations_Group
  66. MACV-SOG History | Article | The United States Army, accessed August 21, 2025, https://www.army.mil/article/216498/macv_sog_history
  67. MACV-SOG: Secret Operations in Vietnam – Grey Dynamics, accessed August 21, 2025, https://greydynamics.com/macv-sog-secret-operations-in-vietnam/
  68. MACV-SOG: Vietnam War’s DEADLIEST Unit You’ve Never Heard Of – General Discharge, accessed August 21, 2025, https://gendischarge.com/blogs/news/macv-sog-vietnam-war
  69. America’s Shadow War: MACV-SOG in Vietnam – The 1440 Review, accessed August 21, 2025, https://1440review.com/2025/01/30/americas-shadow-war-macv-sog-in-vietnam/
  70. MACV-SOG’s Black Programs, accessed August 21, 2025, https://sogsite.com/macv-sogs-black-programs/
  71. The Armory Life Interviews MACV-SOG’s Major John L. Plaster, accessed August 21, 2025, https://www.thearmorylife.com/the-armory-life-interviews-major-john-l-plaster/
  72. The Famous CAR-15’s Path to Modern Combat Rifles – Firearms News, accessed August 21, 2025, https://www.firearmsnews.com/editorial/car15-vietnam-pdw/470350
  73. The M16’s Darkest Days: How the Rifle Failed Soldiers in Vietnam – 19FortyFive, accessed August 21, 2025, https://www.19fortyfive.com/2025/02/the-m16s-darkest-days-how-the-rifle-failed-soldiers-in-vietnam/
  74. M16 rifle – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/M16_rifle
  75. CAR-15 – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/CAR-15
  76. Behind Enemy Lines With The CAR-15 Rifle | An Official Journal Of …, accessed August 21, 2025, https://www.americanrifleman.org/content/behind-enemy-lines-with-the-car-15-rifle/
  77. The MK 22: AKA ‘The Hush Puppy’ – SilencerCo, accessed August 21, 2025, https://silencerco.com/blog/mk22-hush-puppy
  78. History – Hush Puppy Project, accessed August 21, 2025, https://hushpuppyproject.com/hush-puppy-history/
  79. List of weapons of the Vietnam War – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/List_of_weapons_of_the_Vietnam_War
  80. Behind Enemy Lines: Guns of Vietnam’s SOG Warriors | An Official Journal Of The NRA, accessed August 21, 2025, https://www.americanrifleman.org/content/behind-enemy-lines-guns-of-vietnam-s-sog-warriors/
  81. Brief History of MACV-SOG – Jack Carr, accessed August 21, 2025, https://www.officialjackcarr.com/brief-history-of-macv-sog/
  82. SOG Weapons – MACV-SOG, accessed August 21, 2025, https://sogsite.com/sog-weapons/
  83. The Unique Weapons of MACV-SOG’s Commandos in Vietnam | Coffee or Die, accessed August 21, 2025, https://www.coffeeordie.com/article/macv-unique-weapons
  84. The Evolution of Special Operations as a Model for Information Forces, accessed August 21, 2025, https://ndupress.ndu.edu/Media/News/News-Article-View/Article/2497069/the-evolution-of-special-operations-as-a-model-for-information-forces/
  85. An Army Transformed: The U.S. Army’s Post … – USAWC Press, accessed August 21, 2025, https://press.armywarcollege.edu/cgi/viewcontent.cgi?article=1342&context=monographs
  86. From Active Defense to AirLand Battle: The Development of Army Doctrine, 1973-1982, accessed August 21, 2025, https://www.tradoc.army.mil/wp-content/uploads/2020/10/From-Active-Defense-to-AirLand-Battle.pdf
  87. The 1970s and Early 1980s: Enabling a Military Offset – DTIC, accessed August 21, 2025, https://apps.dtic.mil/sti/tr/pdf/AD1040336.pdf
  88. Unconventional Warfare – Brookings Institution, accessed August 21, 2025, https://www.brookings.edu/books/unconventional-warfare/
  89. Air Force Special Operations Command History and Heritage – AFSOC, accessed August 21, 2025, https://www.afsoc.af.mil/About-Us/AFSOC-Heritage/
  90. Operation Eagle Claw-Lessons Learned – DTIC, accessed August 21, 2025, https://apps.dtic.mil/sti/tr/pdf/ADA402471.pdf
  91. Lessons from Operation Eagle Claw – 2331 Words | Bartleby, accessed August 21, 2025, https://www.bartleby.com/essay/Lessons-from-Operation-Eagle-Claw-P3JY8J8KD6TA
  92. History – Special Operations Warrior Foundation, accessed August 21, 2025, https://specialops.org/who-we-are/history/
  93. What Operation Eagle Claw Taught Us About Leadership and Resolve, accessed August 21, 2025, https://embleholics.com/operation-eagle-claw/
  94. 1980 – Operation Eagle Claw > Air Force Historical Support Division > Fact Sheets, accessed August 21, 2025, https://www.afhistory.af.mil/FAQs/Fact-Sheets/Article/458949/1980-operation-eagle-claw/
  95. Operation Eagle Claw – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/Operation_Eagle_Claw
  96. Operation Eagle Claw – Grey Dynamics, accessed August 21, 2025, https://greydynamics.com/operation-eagle-claw/
  97. Delta Force – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/Delta_Force
  98. SEAL Team Six – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/SEAL_Team_Six
  99. SEAL Team Six | DEVGRU – American Special Ops, accessed August 21, 2025, https://www.americanspecialops.com/devgru/
  100. SEAL Team 6 | Missions, Facts, & Description | Britannica, accessed August 21, 2025, https://www.britannica.com/topic/SEAL-Team-6
  101. “Silent, decisive power” Decoding close-quarters combat techniques …, accessed August 21, 2025, https://valortacticalstore.com/en/blogs/blog/cqb-by-delta-forces
  102. Former Delta Force Operator Explains How ‘The Unit’ Clears a …, accessed August 21, 2025, https://sofrep.com/news/nobody-clears-a-room-like-delta-force-a-cqb-attitude-primer/
  103. MP5 Sub Machine Gun | US Special Operations | Weapons, accessed August 21, 2025, https://www.americanspecialops.com/special-ops-weapons/mp5-sub-machinegun.php
  104. MP5 – Navy SEALs, accessed August 21, 2025, https://navyseals.com/weapons-demo/mp5/
  105. Heckler & Koch MP5 – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/Heckler_%26_Koch_MP5
  106. MP5 – Heckler & Koch, accessed August 21, 2025, https://www.heckler-koch.com/en/Products/Military%20and%20Law%20Enforcement/Submachine%20guns/MP5
  107. Engineering:Heckler & Koch MP5 – HandWiki, accessed August 21, 2025, https://handwiki.org/wiki/Engineering:Heckler_%26_Koch_MP5
  108. Is the HK MP5 now considered an obsolete weapon for hostage rescue? – Reddit, accessed August 21, 2025, https://www.reddit.com/r/WarCollege/comments/13ws8c6/is_the_hk_mp5_now_considered_an_obsolete_weapon/
  109. Why is the MP5 such an extremely well respected gun? – Quora, accessed August 21, 2025, https://www.quora.com/Why-is-the-MP5-such-an-extremely-well-respected-gun
  110. For that one guy who asked if CAG still uses MP5s : r/JSOCarchive – Reddit, accessed August 21, 2025, https://www.reddit.com/r/JSOCarchive/comments/xwvxlu/for_that_one_guy_who_asked_if_cag_still_uses_mp5s/
  111. Delta Force: Exploring the Elite Combat Applications Group of the U.S. Military, accessed August 21, 2025, https://greydynamics.com/delta-force-the-elite-counter-terrorism-unit-of-the-u-s-army/
  112. 1986: Goldwater-Nichols Defense Reorganization Act, accessed August 21, 2025, https://api.army.mil/e2/c/downloads/2025/04/17/32279f83/1986-goldwater-nichols-defense-reorganization-act-summary.pdf
  113. USSOCOM celebrates its 30th Anniversary, accessed August 21, 2025, https://www.socom.mil/ussocom-celebrates-its-30th-anniversary
  114. US Special Operations Command – USSOCOM, accessed August 21, 2025, https://www.socom.mil/FactBook/2006%20Fact%20Sheet.pdf
  115. Goldwater–Nichols Act – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/Goldwater%E2%80%93Nichols_Act
  116. United States Special Operations Command – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/United_States_Special_Operations_Command
  117. 2007 socom fact sheet Aug 07:Layout 1.qxd – SOCOM.mil, accessed August 21, 2025, https://www.socom.mil/FactBook/2007%20Fact%20Book.pdf
  118. Special Operations Forces in an Era of Great Power Competition …, accessed August 21, 2025, https://sais.jhu.edu/kissinger/programs-and-projects/kissinger-center-papers/special-operations-forces-era-great-power-competition
  119. US Special Operations Forces (SOF): Background and Issues for Congress, accessed August 21, 2025, https://www.history.navy.mil/browse-by-topic/ships/modern-ships/uss-cole/us-special-operations-forces-sof-background-and-issues-for-congress.html
  120. Delta Force Loadout: Gear Selection and Total Costs – Tier Three Tactical, accessed August 21, 2025, https://www.tierthreetactical.com/delta-force-loadout-gear-selection-and-total-costs/
  121. Counterpoint to U.S. Special Operations Forces Cuts – Army University Press, accessed August 21, 2025, https://www.armyupress.army.mil/Journals/Military-Review/Online-Exclusive/2023-OLE/Counterpoint/
  122. Lawmakers fearful of SOCOM cuts, possible risk to mission | Congressman Morgan Luttrell, accessed August 21, 2025, https://luttrell.house.gov/media/in-the-news/lawmakers-fearful-socom-cuts-possible-risk-mission
  123. Lawmakers fearful of SOCOM cuts, possible risk to mission – DefenseScoop, accessed August 21, 2025, https://defensescoop.com/2025/04/09/lawmakers-fearful-of-socom-cuts-and-possible-risk-to-mission/
  124. Army Special Operations Could Be Cut 10% as Military Looks to Conventional Warfare, accessed August 21, 2025, https://www.military.com/daily-news/2023/05/24/army-weighing-10-cut-special-forces-coming-years.html
  125. A Brief Look at U.S. Army Standard Service Rifles and Squad Automatic Weapons since WWII – ARSOF History, accessed August 21, 2025, https://arsof-history.org/articles/19_aug_form_follows_function_page_1.html

Fifty Years of Conflict: An Analytical Review of Lessons Learned in U.S. Military Operations 1973-2023

The history of the United States military over the past half-century is a narrative of profound transformation, marked by catastrophic failures, stunning triumphs, and the persistent, often painful, process of institutional learning. From the jungles of Vietnam to the deserts of Iraq and the mountains of Afghanistan, this period represents a continuous, and at times cyclical, effort to understand and master the application of military force in a world of ever-changing threats. This report presents an analytical review of this arc, examining the key lessons derived from major U.S. conflicts and operations since the end of American involvement in Vietnam. The central thesis of this analysis is that while the U.S. military has demonstrated a remarkable capacity for adaptation and learning at the tactical and operational levels, it has consistently struggled with the strategic dimension of warfare—specifically, the translation of battlefield success into durable and favorable political outcomes.

This 50-year period can be understood through three distinct, albeit overlapping, strategic eras. The first, the post-Vietnam reckoning, was a period of introspection and fundamental reform, driven by the institutional trauma of defeat and the near-collapse of the force. The painful lessons from Vietnam, the disastrous Iran hostage rescue attempt, and the deeply flawed intervention in Grenada were the necessary catalysts for the most significant military reforms in modern American history, forging a professional, all-volunteer, and truly joint force.

The second era, corresponding with the “unipolar moment” of the 1990s, saw this rebuilt force achieve unprecedented conventional dominance. The overwhelming victory in the 1991 Persian Gulf War seemed to vindicate the new American way of war. Yet, this decade was also marked by the messy, frustrating, and politically complex challenges of humanitarian intervention and “operations other than war” in places like Somalia, Haiti, and the Balkans. These missions exposed the limits of conventional military power and forced the U.S. to grapple with the complexities of nation-building and peacekeeping, often with ambiguous results.

The third and most recent era began with the terrorist attacks of September 11, 2001, which plunged the United States into two decades of protracted, asymmetric warfare in Afghanistan and Iraq. These “forever wars” represented a catastrophic failure to internalize or remember the core strategic lessons of Vietnam. Despite immense expenditures of blood and treasure, and despite remarkable tactical innovations in counter-insurgency, these campaigns ultimately failed to achieve their strategic objectives, leaving behind a legacy of instability and questioning the very utility of large-scale military intervention. This report will trace this arc, dissecting the key lessons—what to do and what not to do—from each major conflict, demonstrating how the lessons of one war often shaped, and sometimes misshaped, the conduct of the next.


Part I: The Post-Vietnam Reckoning and the Rebuilt Force (1975-1989)

The period between the fall of Saigon and the invasion of Panama was arguably the most transformative in the modern history of the U.S. military. It began with a “hollow force” demoralized by defeat and plagued by systemic internal problems.1 It ended with a highly professional, technologically advanced, and newly joint force poised for unprecedented conventional dominance. This transformation was not the result of a single visionary plan but was forged in the crucible of painful, often humiliating, operational failures. These failures provided the undeniable impetus for sweeping reforms that overcame decades of institutional inertia and inter-service rivalry, laying the foundation for the military that would fight and win in the decades to come.

1.1 The Enduring Shadow of Vietnam (1964-1975)

The Vietnam War serves as the foundational event for any analysis of modern U.S. military history. The American failure in Southeast Asia was not, at its core, a failure of tactical execution on the battlefield; it was a profound strategic and political miscalculation from which the military and the nation would draw lessons for generations.2 The United States intervened with a staggering ignorance of Vietnam’s history, culture, and language, fundamentally misinterpreting a nationalist civil war and social revolution as a simple front in the global Cold War against communism.3 This ignorance was compounded by an institutional arrogance—a belief that America’s overwhelming military superiority, its advanced technology and immense firepower, could compensate for a flawed political strategy and force a favorable outcome.3

This approach was doomed from the start. The United States committed its power in support of a South Vietnamese government, beginning with the Diem regime, that lacked popular legitimacy and commanded little loyalty outside a small Catholic minority.3 The war was, as some analysts have concluded, “lost politically before it ever began militarily”.3 Military action, detached from a viable political objective, proved counterproductive. The heavy-handed tactics of the Saigon regime, combined with the destructive impact of American firepower, often drove the very population the U.S. sought to win over into the arms of the National Liberation Front (NLF).3

Beyond the strategic failure, the war precipitated an existential crisis within the U.S. military itself. The pressures of a protracted and increasingly unpopular war on a conscripted, racially integrated force were immense. The military, which had prided itself on seeing only one color—olive drab—was forced to confront deep-seated racial tensions that erupted into violence on bases at home and in the field.2 The failing war effort led to a catastrophic breakdown in discipline, manifesting in high rates of soldiers going AWOL, widespread drug and alcohol abuse, and even instances of “combat refusal,” where units would not engage the enemy.2 This internal decay reached a point where it began to “challenge the ability of the US Army to fulfill its mission of national defense,” a crisis of the first order for the institution.2

The lessons drawn from this experience were deep and lasting. The so-called “Vietnam Syndrome” was not merely a public aversion to foreign entanglements; it was an institutional imperative within the military to prevent a repeat of this internal breakdown. The establishment of the All-Volunteer Force was a direct response, aimed at creating a more professional and disciplined military. Concurrently, the strategic lessons coalesced into what would later be articulated as the Powell Doctrine: the conviction that the U.S. should only commit forces to combat when vital national interests are at stake, when there are clear and achievable objectives, when there is broad public and congressional support, and when overwhelming force can be applied to achieve a decisive victory.4 This doctrine was designed not only to ensure victory but to protect the military institution itself from being gradually destroyed by another ambiguous, protracted, and politically unsupported conflict. This created a powerful and understandable institutional preference for short, decisive, high-intensity conventional wars—and a deep-seated aversion to messy, political, and open-ended counter-insurgencies. This preference, born from the trauma of Vietnam, would prove to be a strategic vulnerability when the U.S. was inevitably drawn back into precisely those kinds of conflicts decades later.

1.2 Reforming the Machine: From Desert One (1980) to Grenada (1983)

If Vietnam exposed the strategic bankruptcy of the U.S. military, two smaller operations in the following decade laid bare its profound operational and organizational dysfunction. Operation Eagle Claw, the failed 1980 attempt to rescue American hostages in Iran, and Operation Urgent Fury, the 1983 invasion of Grenada, were pivotal events. Though tactical in scale, their failures were so glaring and public that they provided the undeniable evidence needed to force fundamental, and long-overdue, structural reforms upon the Department of Defense.

Operation Eagle Claw was an unmitigated disaster that starkly revealed the decrepitude of the post-Vietnam “hollow force”.1 The mission, though courageous in its conception, was plagued by a cascade of failures. An ad-hoc command structure was created for the mission, bypassing established contingency planning staffs in the name of security. This resulted in ill-defined lines of authority and a complete lack of a coherent joint training plan.1 The obsession with operational security (OPSEC) became self-defeating; information was so tightly compartmentalized that planners could not conduct independent reviews, and the various service components never conducted a full, integrated rehearsal before launching the mission.1 This lack of coordination proved fatal at the Desert One staging area in Iran. Equipment, particularly the RH-53D helicopters that were not designed for such a mission, failed under operational stress.1 Communications between services were fractured, and when a collision between a helicopter and a C-130 transport aircraft caused a fire, the chaotic scene lacked a clear on-scene commander to restore order.1 The mission was aborted in tragedy, leaving behind dead servicemen, abandoned aircraft, and compromised classified materials.1

Three years later, the invasion of Grenada, while ultimately successful in achieving its objectives, was another showcase of inter-service dysfunction. The operation was marred by “persistent interservice rivalries; flawed communications; excessive secrecy; and… ‘unforgivable blunders’ in vital intelligence-gathering”.6 There was virtually no intelligence available on the island; the CIA had no assets on the ground, and the only maps available to invading forces were tourist maps lacking precise military grid coordinates.6 The command-and-control structure was convoluted and improvised at the last minute.6 Communication systems between the services were incompatible, leading to an Army unit being unable to call for naval gunfire support and resorting to using a commercial AT&T credit card to call back to Fort Bragg to request air support.6 In a now-infamous incident that epitomized the depth of the problem, a senior Marine officer initially refused a request to transport Army Rangers on Marine helicopters, relenting only after being directly ordered to do so by a higher authority.6

These two operations, though small, were disproportionately influential because their flaws were so fundamental and undeniable. They demonstrated that the U.S. armed services, as structured, could not effectively fight together as a coherent team. The public humiliation of Desert One and the near-disaster in Grenada created the political will in Congress to overcome decades of entrenched service parochialism and resistance from the Pentagon. The direct result was the landmark Goldwater-Nichols Department of Defense Reorganization Act of 1986. This legislation fundamentally reshaped the military by strengthening the authority of the Chairman of the Joint Chiefs of Staff and the unified combatant commanders, forcing the services to operate jointly. In parallel, the lessons from Eagle Claw gave direct impetus to the creation of the U.S. Special Operations Command (USSOCOM) in 1987, unifying the various special operations forces under a single command with its own budget and authority.1 These reforms were not merely bureaucratic shuffling; they were the essential bedrock upon which the operational successes of the next decade, particularly in Panama and the Persian Gulf, were built. The hard-won lesson was that jointness was not an optional extra or a matter of preference; it was an absolute prerequisite for success in modern warfare.

1.3 Limited Force and Ambiguous Missions: Lebanon (1982-84), Libya (1986), and the Iran-Iraq War (1980s)

The 1980s also saw the United States engage in a series of interventions and proxy engagements that highlighted the immense difficulty of applying limited military force to achieve complex and often ambiguous political objectives. These operations in Lebanon, Libya, and the Persian Gulf provided cautionary lessons about mission clarity, the nature of peacekeeping, and the unintended long-term consequences of strategic choices.

The deployment of U.S. Marines to Beirut in 1982 as part of a Multinational Force is a tragic case study in the failure of peacekeeping without a peace to keep.9 The Marines were inserted into the maelstrom of the Lebanese Civil War with an “unclear mandate”.10 Initially tasked with overseeing the withdrawal of the Palestine Liberation Organization (PLO), their mission evolved, but their status remained ambiguous. The Reagan administration misread the complex sectarian dynamics, viewing the conflict through a simplistic Cold War lens and backing the pro-Israeli Christian factions, which fatally compromised the U.S. force’s neutrality.11 As a result, the Marines went from being perceived as neutral peacekeepers to being seen as active participants in the conflict, making them a target for factions backed by Syria and Iran.10 This culminated in the catastrophic bombing of the Marine barracks on October 23, 1983, which killed 241 American servicemen. The U.S. subsequently withdrew its forces, leaving behind a power vacuum that was filled by Syria and its Iranian-backed proxy, Hezbollah, which evolved from a small terrorist cell into a formidable regional power.10 The primary lesson from Lebanon was stark: a military force deployed with an ambiguous mission into a multi-sided civil war, without the political leverage or will to impose a settlement, will inevitably become a target and its mission will fail.

In contrast, the 1986 bombing of Libya, Operation El Dorado Canyon, was a mission with a much clearer, albeit limited, objective: to punish the Qaddafi regime for its role in the bombing of a Berlin discotheque frequented by U.S. service members and to deter future acts of state-sponsored terrorism.12 The operation was a remarkable feat of military logistics and execution. Denied overflight rights by key European allies like France and Spain, U.S. Air Force F-111s based in the United Kingdom had to fly a grueling 6,400-mile round trip, requiring multiple aerial refuelings, to strike targets in Tripoli and Benghazi alongside Navy aircraft from carriers in the Mediterranean.13 The strikes were judged to be a tactical success and did lead to a reduction in Libyan-sponsored terrorism against American targets in the short term.12 However, the operation also highlighted the political costs of unilateralism and provoked asymmetric retaliation, including the murder of American and British hostages in Lebanon and the alleged Libyan involvement in the later bombing of Pan Am Flight 103.14 The lesson was that while punitive strikes can achieve short-term deterrence, they do not resolve the underlying political conflict and can invite retaliation through unconventional means.

Perhaps the most consequential U.S. involvement of the decade was its indirect role in the Iran-Iraq War. Following the Iranian Revolution and the hostage crisis, U.S. policy was driven by the imperative to prevent an Iranian victory and the expansion of Ayatollah Khomeini’s revolutionary theocracy.15 This led the Reagan administration to “tilt” toward Saddam Hussein’s Iraq, providing Baghdad with billions in economic aid, dual-use technology, and critical satellite intelligence to thwart Iranian offensives.15 This was a brutally pragmatic policy, choosing to back one dictator to contain another in a war where there were no “good guys”.15 This support was instrumental in preventing an Iraqi collapse and enabling Saddam to fight Iran to a stalemate. However, the policy had severe long-term consequences. It empowered Saddam Hussein, whose military emerged from the war as one of the largest and most battle-hardened in the region.17 The immense debt Iraq incurred during the war, combined with this newfound military power and a sense of grievance against its neighbors, were direct contributing factors to its decision to invade Kuwait in 1990.17 The U.S. policy in the 1980s thus provides a textbook example of “blowback,” demonstrating that the strategic partner of today can, as a direct result of that partnership, become the primary adversary of tomorrow.

1.4 A Paradigm of Decisive Force? Operation Just Cause, Panama (1989)

The U.S. invasion of Panama in December 1989, Operation Just Cause, stands as the capstone of the military’s post-Vietnam transformation. It was the first large-scale combat test of the joint force forged by the Goldwater-Nichols reforms and was widely seen as a resounding success, a model of how to apply military power effectively to achieve clear political aims.18 The operation was launched with four unambiguous and limited objectives: to safeguard the lives of American citizens, to restore the democratically elected government, to apprehend dictator Manuel Noriega on drug trafficking charges, and to protect the integrity of the Panama Canal Treaty.20

The execution of the operation was a testament to the new emphasis on jointness and planning. It was a complex, multi-service assault involving nearly 27,000 troops, with airborne, air-assault, and special operations forces striking two dozen targets simultaneously across the country in a classic coup de main.18 The planning was extensive and detailed, and the forces were well-rehearsed, contributing to a swift and decisive military victory.18 The combat phase was largely over within a matter of days, achieving its objectives at a relatively low cost of 23 American combat deaths.22

Operation Just Cause was hailed as the ultimate vindication of the post-Vietnam reforms. It was everything that Vietnam, Eagle Claw, and Grenada were not: swift, decisive, overwhelmingly powerful, and successful in achieving its stated political goals in the short term.22 The operation appeared to offer a new paradigm for the post-Cold War era: the clean, surgical application of military force to remove a rogue regime and restore democracy.

However, the very success of Operation Just Cause embedded a dangerous and misleading lesson. The operation took place in a uniquely permissive and favorable environment. The U.S. military had a massive pre-existing presence in Panama, deep familiarity with the terrain, and extensive intelligence on the Panamanian Defense Forces (PDF), which it had trained for years.21 The PDF was a small and relatively weak adversary, and crucially, the Panamanian population largely welcomed the American intervention and offered no resistance.21 It was a unilateral operation, unencumbered by the complexities of coalition warfare.21

The danger was that U.S. military and political leaders mistook an operational success in a uniquely favorable context for a universally applicable strategic template. The “Panama model” reinforced the institutional preference for using overwhelming force to achieve rapid regime change, creating an illusion that such interventions could be quick, low-cost, and decisive. This model heavily influenced the mindset that planned the 1991 Gulf War and, more catastrophically, shaped the fatally optimistic assumptions for the 2003 invasion of Iraq. In that later conflict, the U.S. would discover that the post-conflict environment was infinitely more complex and hostile, and that the welcoming crowds of Panama City would not be replicated in Baghdad. The lesson taken from Panama was that overwhelming force works; the critical lesson that was missed was that the unique political and social conditions of the battlespace are often more decisive than the balance of military power.


Part II: The “New World Order” and Its Discontents (1990-2001)

The collapse of the Soviet Union left the United States as the world’s sole superpower, ushering in a decade of American military primacy. This period, often termed the “unipolar moment,” was defined by a stark contrast in the application of U.S. military power. It began with the spectacular conventional triumph of the First Gulf War, which seemed to confirm the dominance of the American way of war. However, the remainder of the decade was dominated by messy, frustrating, and politically fraught humanitarian interventions. These “Operations Other Than War” in Somalia, Haiti, and the Balkans challenged the neat paradigms of the Powell Doctrine and forced a reluctant U.S. military to grapple with the ambiguous challenges of peacekeeping, stability operations, and coercive diplomacy, generating a new set of complex and often contradictory lessons.

2.1 The Powell Doctrine Vindicated: The First Gulf War (1991)

Operation Desert Storm, the U.S.-led campaign to liberate Kuwait from Iraqi occupation, was the textbook application and triumphant vindication of the military doctrine forged in the ashes of Vietnam.4 Every element of the Powell Doctrine was meticulously implemented. The objective was clear, limited, and broadly supported: the expulsion of the Iraqi army from Kuwait, not the overthrow of Saddam Hussein.4 An immense international coalition of 34 nations was painstakingly assembled, securing legitimacy through the United Nations and ensuring that the burden was shared.4 Widespread domestic public and congressional support was cultivated and maintained throughout the crisis.4 Finally, and most critically, overwhelming military force was deployed to the theater before hostilities began, ensuring a decisive advantage.4

The 100-hour ground war was a stunning demonstration of the effectiveness of the reformed, joint U.S. military. The technological superiority of American weapon systems—from stealth fighters and cruise missiles to GPS navigation and advanced sensors—was on full display, leading many to herald a “Revolution in Military Affairs”.24 The seamless coordination of air, land, and sea forces, a direct result of the Goldwater-Nichols reforms, allowed the coalition to execute a complex “left hook” maneuver that enveloped and destroyed the Iraqi army in Kuwait with remarkably few coalition casualties.24 The campaign adhered strictly to its pre-defined exit strategy: once Kuwait was liberated, major combat operations ceased.4

Yet, the very scale of this success embedded two flawed and consequential lessons that would profoundly, and negatively, shape U.S. military thought for the next two decades. The first was an over-learning of the role of technology. The lightning victory created a powerful narrative that future wars could be won cleanly and decisively through “exquisite and precise munitions” and information dominance.25 This belief in a technology-driven “Revolution in Military Affairs” led to a strategic focus on concepts like “shock and awe” and “effects-based operations,” which privileged top-down, precision targeting over all else. This, in turn, justified a continued reduction in the size of the force, particularly the Army, creating a military that was optimized for short, high-tech conventional wars but lacked the mass and manpower required for the labor-intensive stability and counter-insurgency operations that would define the post-9/11 era.25

The second flawed lesson stemmed from the decision not to continue the advance to Baghdad and remove Saddam Hussein from power. At the time, this decision was strategically sound; it was consistent with the limited UN mandate, was essential for holding the fragile Arab coalition together, and avoided the “mission creep” the Powell Doctrine was designed to prevent.4 However, it was a decision born of operational considerations, not long-term strategic foresight. Leaving Saddam in power resulted in a decade of costly containment, including the enforcement of no-fly zones and crippling sanctions, and created the “unfinished business” that served as a primary justification for the 2003 invasion.17 The legacy of Desert Storm is therefore deeply dualistic. It was a brilliant operational success that validated the post-Vietnam reforms, but it also fostered a dangerous strategic hubris. It taught the U.S. military how to win a conventional war perfectly, but in doing so, it also taught the wrong lessons about the nature of future conflicts and reinforced the critical distinction between defining a military end state—the liberation of Kuwait—and achieving a durable political outcome.

2.2 The Quagmire of Humanitarian Intervention: Somalia (1992-93)

The U.S. intervention in Somalia began as a mission of mercy and ended as a strategic cautionary tale that would haunt American foreign policy for a decade. In late 1992, President George H.W. Bush launched Operation Restore Hope, a U.S.-led intervention to secure humanitarian corridors and end a devastating famine caused by civil war.26 The initial phase of the operation was a success; U.S. forces secured the ports and airfields, allowing for the delivery of massive amounts of food aid that saved an estimated quarter of a million lives.27

The problems began in 1993, when the mission was handed over to the United Nations Operation in Somalia (UNOSOM II). The mandate shifted from humanitarian relief to a far more ambitious and ambiguous project of nation-building, which included disarming the Somali warlords.27 This “mission creep” fundamentally altered the nature of the intervention. U.S. forces, now operating in support of the UN, were drawn into a conflict with the powerful faction of warlord Mohamed Farah Aidid.29 The mission escalated from protecting food convoys to actively hunting Aidid and his lieutenants.

This new phase culminated in the disastrous Battle of Mogadishu on October 3, 1993, an event seared into public consciousness as “Black Hawk Down.” A raid by U.S. Army Rangers and Delta Force operators to capture two of Aidid’s top aides went horribly wrong when two Black Hawk helicopters were shot down by rocket-propelled grenades.30 The ensuing 18-hour firefight in the streets of Mogadishu resulted in 18 American deaths and 73 wounded.30 The mission suffered from critical planning failures; commanders on the ground had requested heavy armor and AC-130 gunship support for such operations, but these requests were denied at higher levels in Washington.30 The U.S. forces, overly confident in their technological superiority, had dangerously underestimated the enemy’s capabilities and will to fight.30

The strategic fallout from this tactical engagement was immense and immediate. The graphic television images of a dead American soldier being dragged through the streets by a jubilant mob created a powerful political backlash in the United States.29 Public support for the mission evaporated overnight, and President Clinton quickly announced a withdrawal of all U.S. forces. The lesson learned by a generation of policymakers was not how to conduct complex stability operations more effectively, but to avoid them entirely, especially in places deemed of peripheral strategic interest. This “Mogadishu effect” or “Black Hawk Down syndrome” created a profound aversion to committing U.S. ground troops and accepting casualties in humanitarian crises. This policy of risk-aversion had direct and tragic consequences, most notably influencing the Clinton administration’s decision to actively avoid intervention during the 1994 Rwandan genocide, where U.S. officials refused to even use the word “genocide” for fear it would create a moral obligation to act.32 The Somalia experience powerfully demonstrated how a single, televised tactical event, amplified by the “CNN effect,” could dramatically constrain U.S. foreign policy and dictate grand strategy for years to come.29

2.3 Coercive Diplomacy and Permissive Entry: Haiti (1994)

The 1994 U.S. intervention in Haiti, Operation Uphold Democracy, offered a stark contrast to the bloody debacle in Somalia and appeared to present a more successful model for post-Cold War crisis management. The mission’s objective was to oust the military junta that had overthrown the democratically elected president, Jean-Bertrand Aristide, in 1991 and restore him to power.33 The Clinton administration pursued a dual-track strategy: engaging in diplomatic efforts while simultaneously preparing for a full-scale military invasion.33

The military preparations were extensive. An invasion force of nearly 25,000 personnel from all services, backed by two aircraft carriers, was assembled and made ready to launch.33 The threat of this overwhelming force was made credible and explicit to the Haitian junta. As the invasion was literally in the air, a last-ditch diplomatic mission to Haiti led by former President Jimmy Carter, Senator Sam Nunn, and General Colin Powell succeeded in convincing the junta leaders to step down and allow U.S. forces to enter peacefully.33 This eleventh-hour agreement required remarkable discipline and flexibility from the invading force, which had to pivot “from a war mentality to a peacekeeping mindset overnight”.36

In its immediate aims, the operation was a clear success. The junta was removed, President Aristide was restored to power, and it was all accomplished with no U.S. casualties.37 The operation was widely seen as a masterclass in coercive diplomacy, demonstrating the powerful synergy that can be achieved when diplomatic engagement is backed by a credible and imminent threat of military force.35

However, the long-term legacy of the intervention is far more ambiguous and serves as a cautionary tale about the limits of external power in nation-building. While the U.S. military could successfully change the government in Port-au-Prince, it could not fundamentally alter the deep-seated political, social, and economic problems that have plagued Haiti for centuries. The intervention was described by one key participant as a “short-lived success” that “achieved all of its objectives with no casualties within a very short time-frame. But it didn’t take hold”.37 More critical analyses argue that the operation was a “major failure” in the long run, as it did not democratize Haiti and may have contributed to its enduring problems.37 American support for Aristide’s return was made contingent on his acceptance of structural adjustment policies from the IMF and World Bank, which opened Haiti’s fragile economy to foreign competition and arguably deepened its economic dependency.37 Ten years later, in 2004, the U.S. was involved in another international intervention after Aristide was again overthrown.37 The lesson from Haiti is that while the military can effectively create a secure and permissive environment for political change, it cannot impose that change from the outside. The “success” of the operation, defined by its low cost and lack of casualties, masked the underlying strategic failure of the nation-building project. This created a dangerous illusion that military intervention could be a clean, surgical, and politically palatable tool for democracy promotion, an idea that ignored the deep, resource-intensive, and generational commitment that such transformations actually require.

2.4 The Balkans: The Challenge of Graduated Escalation (Bosnia 1995, Kosovo 1999)

The brutal wars of Yugoslav succession in the 1990s presented the United States and its NATO allies with their most significant security challenge in Europe since the end of the Cold War. The response was characterized by years of hesitation, half-measures, and a gradual, reluctant escalation that ultimately led to two major military interventions, each providing distinct and crucial lessons about the use of force.

For over three years, the international response to the war in Bosnia was one of “muddling through,” marked by a lack of political will to intervene decisively.38 The United Nations Protection Force (UNPROFOR) was deployed as a traditional peacekeeping force, but it was lightly armed, had a restrictive mandate, and was wholly unsuited for a situation where there was no peace to keep.38 It proved ineffective at stopping the widespread ethnic cleansing and, in late May 1995, nearly 400 UN peacekeepers were taken hostage by Bosnian Serb forces after limited NATO air strikes, effectively neutralizing the UN force.38 The turning point came in July 1995 with the Srebrenica massacre, the single worst act of genocide in Europe since World War II, which shamed the West into action.38 The U.S. finally took a leadership role, spearheading a new strategy that combined a decisive, three-week NATO air campaign (Operation Deliberate Force) with a major ground offensive by the Croatian and Bosnian armies. This combined military pressure forced the Serbs to the negotiating table and led to the Dayton Peace Accords.38 The lessons from Bosnia were clear and painful: “early intervention may be more politically difficult in the short term, but is much less costly in the long run,” and “when you do intervene, there is no point in being half-hearted”.39

The intervention in Bosnia also led to a long, costly, and open-ended peacekeeping mission (IFOR, later SFOR) involving 60,000 troops, including 20,000 Americans.32 This experience solidified what became known as the “Pottery Barn Rule” of intervention (“You break it, you own it”), a concept articulated by then-General Colin Powell to President George W. Bush before the 2003 Iraq War.32 The lesson was that military intervention creates an implicit ownership of the post-conflict outcome and requires a long-term commitment to stabilization and rebuilding.

This realization, combined with the casualty-aversion stemming from Somalia, heavily influenced the U.S. and NATO approach to the Kosovo crisis in 1999. To stop Serbian ethnic cleansing of Kosovar Albanians, NATO launched Operation Allied Force, a 78-day air campaign conducted without the commitment of ground troops.41 The campaign was a “victory without triumph”.41 It ultimately succeeded in its primary political objective of forcing Slobodan Milosevic to withdraw his forces from Kosovo, and it did so with zero NATO combat fatalities.41 However, the air-only strategy was unable to prevent the humanitarian catastrophe on the ground; in fact, the Serbian campaign of murder and expulsion accelerated dramatically after the bombing began.41 The campaign also exposed a massive and alarming capabilities gap between the United States, which conducted the vast majority of precision strikes, and its European allies, who lacked critical assets like precision-guided munitions, electronic jamming aircraft, and strategic airlift.41

The Balkan wars thus produced a complex and somewhat contradictory set of lessons. Bosnia taught that half-measures fail and that intervention incurs a long-term ground commitment. Kosovo, however, seemed to offer a seductive new model: the achievement of major political objectives through standoff precision airpower alone, with no friendly casualties. This “Kosovo model” appeared to be the perfect solution, a way to circumvent both the quagmire of Vietnam and the casualty-aversion of Mogadishu. It represented a quest for a cost-free, risk-free form of warfare. This, however, was a strategic illusion that discounted the unique circumstances of the conflict and the fact that the air campaign’s success was heavily dependent on the concurrent threat of a ground invasion and the actions of the Kosovo Liberation Army on the ground. This flawed model of airpower-led regime change would be disastrously misapplied in Libya a decade later.


Part III: The Post-9/11 Era and the “Forever Wars” (2001-Present)

The terrorist attacks of September 11, 2001, fundamentally reoriented American grand strategy and inaugurated a new era of military conflict. The ensuing “Global War on Terrorism” led to the two longest wars in U.S. history, in Afghanistan and Iraq. These campaigns, defined by protracted counter-insurgency, ambitious nation-building, and ambiguous outcomes, represented a catastrophic failure to heed the most vital strategic lessons learned over the preceding 50 years. Despite immense sacrifices and unprecedented expenditure, these wars failed to achieve their ultimate political goals, forcing a painful reassessment of the limits of American military power. The subsequent evolution of the fight against jihadist groups in Libya and Syria reflects a difficult, ongoing attempt to apply these hard-won lessons.

3.1 Afghanistan (2001-2021): The Longest War

The war in Afghanistan began as a swift, decisive, and widely supported response to the 9/11 attacks. Operation Enduring Freedom, launched in October 2001, combined U.S. special operations forces and CIA paramilitary officers with the local Northern Alliance, all supported by overwhelming American airpower. This model of warfare proved spectacularly successful in its initial phase, leading to the collapse of the Taliban regime in a matter of weeks.42

However, in the immediate aftermath of this victory, the United States made its first critical strategic error. Between late 2001 and 2004, with the Taliban defeated and scattered, dozens of its senior leaders offered various forms of surrender and reconciliation in exchange for amnesty. The Bush administration, however, rejected these overtures, choosing to exclude the Taliban from the new political order being forged in Kabul.42 This decision, made at the moment of America’s maximum military and political leverage, squandered a crucial opportunity to end the war on favorable terms and may have been the single most significant factor in ensuring the conflict would last for two decades.

Following this missed opportunity, the U.S. mission in Afghanistan suffered from what has been termed “strategic drift”.43 The initial, limited counter-terrorism objective of destroying Al-Qaeda expanded into a massive, unfocused, and open-ended nation-building and counter-insurgency campaign with no clear, coherent, or consistently applied strategy.44 The entire effort was crippled by a staggering and willful ignorance of Afghan history, culture, and political dynamics—a direct and tragic echo of the central failure in Vietnam.3 The U.S. and its coalition partners attempted to impose a centralized, Western-style democratic government on a country that had never had one, empowering a government in Kabul that was seen by many Afghans as corrupt and illegitimate.44 Unchecked corruption, much of it fueled by vast injections of American aid, fatally undermined the Afghan government’s credibility and became a key driver of the resurgent Taliban insurgency.44

The 20-year effort was further hobbled by systemic institutional flaws. Politically driven timelines for troop surges and withdrawals, often dictated by U.S. domestic election cycles, consistently undermined military efforts on the ground.44 The constant turnover of U.S. military and civilian personnel—a phenomenon known as the “annual lobotomy”—drained the mission of institutional knowledge and continuity, ensuring that the same mistakes were made year after year.44 Throughout the conflict, U.S. leaders consistently and publicly overestimated the capabilities and cohesion of the Afghan National Security Forces, using flawed metrics that painted a misleading picture of progress.42 When the U.S. finally withdrew its forces in August 2021, that same Afghan army and government collapsed with a speed that shocked policymakers but was predictable to many who had observed the deep-seated flaws of the entire enterprise.

The war in Afghanistan stands as the ultimate testament to the failure of American institutional memory. The core strategic lessons of Vietnam—the primacy of politics over military force, the absolute necessity of a legitimate and viable local partner, and the requirement for deep cultural and historical understanding—were almost entirely disregarded. The U.S. military proved itself to be a learning organization at the tactical level, developing and implementing sophisticated counter-insurgency doctrine. Yet, this tactical proficiency could not salvage a fundamentally broken grand strategy. The tragedy of Afghanistan is that its outcome was not a surprise; it was the predictable result of ignoring the most painful lessons of the nation’s past conflicts.

3.2 Iraq (2003-2011): A War of Choice and Consequence

The 2003 invasion of Iraq, Operation Iraqi Freedom, represents the most controversial and consequential U.S. military action of the post-9/11 era. Launched on the basis of flawed and exaggerated intelligence regarding weapons of mass destruction and alleged links to Al-Qaeda, the war was a strategic choice rather than a necessity.47 The initial invasion was a stunning display of the U.S. military’s conventional prowess, toppling Saddam Hussein’s regime in just three weeks. However, this tactical success was immediately followed by a catastrophic failure of strategic planning for the post-conflict phase.

The Bush administration and military planners went to war with the fatally optimistic assumption that Iraq’s sophisticated state institutions would remain intact after the regime was “decapitated,” ready to be used by a new, friendly government.49 This assumption was shattered by the widespread looting and collapse of civil order that followed the fall of Baghdad. This initial failure was compounded by two disastrous policy decisions made by the Coalition Provisional Authority (CPA). The first was the order to disband the entire Iraqi military, which put hundreds of thousands of armed, trained, and suddenly unemployed men on the street with no stake in the new Iraq.49 The second was the sweeping de-Ba’athification policy, which purged experienced technocrats from the government ministries, crippling the state’s ability to function. Together, these decisions created a security vacuum, alienated the Sunni minority, and directly fueled a virulent insurgency.49

For several years, the U.S. pursued a flawed counter-insurgency strategy predicated on the idea that political progress and the transfer of sovereignty would drive security gains. The reality on the ground proved the opposite to be true: in a situation of dramatic physical insecurity, sectarian and tribal identities trumped national ones, and violence spiraled into a vicious civil war by 2006.49 The turning point came in 2007 with the implementation of the “Surge.” This represented a major strategic adaptation, involving the deployment of five additional U.S. combat brigades and, more importantly, a fundamental shift in doctrine to a population-centric counter-insurgency strategy focused on providing security for the Iraqi people.49 The Surge, combined with the “Anbar Awakening” of Sunni tribes against Al-Qaeda in Iraq, dramatically reduced violence and pulled the country back from the brink of collapse.49

The Surge demonstrated that the U.S. military is a formidable learning institution, capable of dramatic and successful adaptation even in the midst of a failing war. However, it also highlighted the limits of military power. The tactical success of the Surge created a window of opportunity for political reconciliation among Iraq’s sectarian factions, but that window was not seized by Iraq’s political leaders. The U.S. withdrawal in 2011, dictated by a previously negotiated agreement, left behind a fragile political settlement that soon frayed. The sectarian policies of Prime Minister Nouri al-Maliki alienated Sunnis, creating the conditions for the spectacular rise of the Islamic State of Iraq and Syria (ISIS), which seized a third of the country in 2014. The war, launched to eliminate a non-existent threat, ultimately resulted in the empowerment of Iran, America’s primary regional adversary, which became the dominant external actor in Baghdad.50 The ultimate lesson of Iraq is that winning the war is only the first, and often the easiest, step. Regime change is not a discrete event but the beginning of a long, complex, and resource-intensive process of nation-building. The failure to plan for this “Phase IV” was a failure of policy and imagination at the highest levels of government, one for which no amount of subsequent military adaptation could fully compensate.

3.3 The Evolving Fight: Libya (2011) and Counter-ISIS Operations (2014-Present)

The military operations of the 2010s in Libya and against the Islamic State (ISIS) reflect a direct and evolving response to the painful experiences of the long wars in Iraq and Afghanistan. The intervention in Libya represented a catastrophic application of the worst lessons of the previous two decades, while the subsequent campaign against ISIS demonstrated a conscious attempt to develop a more sustainable and limited model of intervention.

The 2011 NATO intervention in Libya, Operation Odyssey Dawn, was framed under the international norm of the “Responsibility to Protect” (R2P), with the stated goal of preventing a threatened massacre of civilians in Benghazi by the forces of Muammar al-Qaddafi.51 The Obama administration, wary of another large-scale ground commitment, adopted a “lead from behind” posture, providing unique U.S. assets like intelligence, surveillance, reconnaissance (ISR), and aerial refueling to enable European allies and rebel forces on the ground.52 The air campaign was successful in its military objectives: it prevented an attack on Benghazi and ultimately led to the collapse of the Qaddafi regime with no NATO casualties.53

However, the intervention was a strategic disaster, described by some analysts as a “model of failure”.51 The mission rapidly morphed from civilian protection to outright regime change, a goal that went beyond the UN mandate.54 Most critically, the U.S. and its allies willfully ignored the central lesson of Iraq: the absolute necessity of planning for post-conflict stabilization. Having enabled the overthrow of the regime, the international community largely disengaged, leaving Libya to descend into state collapse, years of brutal civil war between rival militias, and a humanitarian crisis.55 The resulting power vacuum turned Libya into a safe haven for terrorist groups and a major source of weapons proliferation across North Africa and the Sahel, destabilizing neighboring countries like Mali.54 Libya represents the disastrous convergence of the most flawed lessons of the 1990s and 2000s: the Kosovo model of “zero-casualty” airpower-led regime change, combined with the complete abdication of post-conflict responsibility that characterized the initial failure in Iraq.

In stark contrast, the campaign against ISIS, launched in 2014 as Operation Inherent Resolve, can be seen as a direct, corrective response to the failures in Iraq, Afghanistan, and Libya. Faced with the collapse of the Iraqi army and the seizure of major cities by ISIS, the U.S. adopted a “by, with, and through” strategy.56 This model explicitly sought to avoid a large-scale American ground war. Instead, the U.S. assembled a broad international coalition to provide critical support—primarily airpower, intelligence, special operations forces, and training—to local partner forces who would do the bulk of the fighting and dying on the ground.57 In Iraq, the primary partner was the rebuilt Iraqi Security Forces; in Syria, it was the Kurdish-led Syrian Democratic Forces (SDF).

This approach proved highly effective in achieving its limited military objective: the destruction of the physical ISIS “caliphate.” Coalition airpower was decisive in halting ISIS advances, attriting its forces and finances, and enabling partner forces to retake territory, including major urban battles in Mosul and Raqqa.57 This was accomplished at a fraction of the cost in American lives and treasure compared to the previous wars.56 The counter-ISIS campaign represents a more pragmatic and sustainable model for counter-terrorism, one that acknowledges the limits of American power and seeks to avoid the open-ended nation-building quagmires of the past. However, this model is not without significant risks. Its success is contingent on the competence, reliability, and political agendas of local partners, which can often be at odds with U.S. interests. It is a model of “limited liability” that successfully addresses the military threat of a terrorist group but does not, and cannot, solve the underlying political and sectarian grievances that allowed the group to rise in the first place.


Conclusion: Enduring Lessons and Future Challenges

A half-century of continuous conflict has etched a series of powerful, often painful, lessons into the institutional consciousness of the United States military and the nation’s policymakers. While the context of each conflict is unique, the analysis of this period reveals several overarching, enduring truths about the nature of war and the application of American power. The consistent failure to adhere to these fundamental lessons has been the most common precursor to strategic failure.

First and foremost is the primacy of politics. Time and again, from Vietnam to Afghanistan, the U.S. has demonstrated that tactical and operational military success is ultimately meaningless if it is not tethered to a coherent, viable, and achievable political strategy. Military force can create conditions for political success, but it cannot be a substitute for it. Wars are won not merely when the enemy’s army is defeated, but when a sustainable and more favorable political order is established.

Second is the imperative to know thy enemy, thyself, and the terrain. Repeated failures have stemmed from a profound lack of deep cultural, historical, and political understanding of the societies in which the U.S. has intervened.3 This ignorance, often coupled with an arrogant assumption that American models of governance can be universally applied, has led to strategic miscalculations and counterproductive outcomes. Understanding the human and political terrain is as critical as understanding the physical terrain.

Third is the lesson of the indispensable local partner. No amount of external military power can create a stable and lasting outcome without a legitimate, competent, and credible local partner who commands the support and trust of their own population.3 Propping up illegitimate or corrupt regimes, as in Vietnam and Afghanistan, is a recipe for strategic failure, as the external force becomes inextricably linked to a government that cannot survive on its own.

Fourth, the conflicts of the 1990s and 2000s have exposed the illusion of “immaculate intervention.” The quest for a low-cost, risk-free way to wage war through standoff technologies, airpower alone, or proxy forces is a dangerous fallacy. While these tools can reduce American casualties and political risk in the short term, they cannot eliminate strategic risk. As seen in Kosovo and Libya, they can create unintended consequences, fail to solve underlying political problems, and lead to disastrous second- and third-order effects.41

Finally, there is a crucial distinction between adaptation and strategy. The U.S. military has proven to be a remarkable learning institution, capable of profound adaptation at the operational and tactical levels. The post-Vietnam reforms, the development of joint warfare, and the evolution of counter-insurgency doctrine during the Surge in Iraq are powerful testaments to this capacity. However, this operational adaptability cannot compensate for a flawed or absent grand strategy. Tactical brilliance in the service of a strategically bankrupt policy leads only to a more efficient and costly failure.

As the United States pivots its strategic focus toward an era of great power competition with near-peer adversaries like China and Russia, these lessons remain more relevant than ever. The challenges of understanding an adversary’s political will, managing escalation in a complex global environment, defining realistic and achievable political objectives, and maintaining domestic and international support will be paramount. The past 50 years have shown that the most decisive battlefield is often not one of territory, but of strategy, will, and understanding. Forgetting these hard-won lessons is a luxury the nation cannot afford.


Appendix: Summary Table of Conflicts and Key Lessons

Conflict / OperationDatesKey ObjectivesLessons Learned: What to DoLessons Learned: What Not to Do
Vietnam War1964-1975Contain Communism; Preserve a non-Communist South Vietnam.Maintain public and political support; ensure military objectives are tied to a viable political strategy; foster a professional, disciplined force.2Underestimate the enemy’s political and military will; believe technology can substitute for strategy; ignore local culture/politics; prop up an illegitimate local partner.3
Op. Eagle Claw (Iran)1980Rescue U.S. hostages.Conduct rigorous, integrated, full-mission-profile rehearsals; ensure clear and unified command and control for joint operations.1Allow excessive OPSEC to cripple planning and information flow; use ad-hoc command structures; fail to ensure equipment interoperability and suitability.1
Op. Urgent Fury (Grenada)1983Rescue U.S. citizens; restore democratic government.Apply overwhelming force to achieve limited objectives quickly; recognize the need for joint interoperability as a prerequisite for success.6Operate without adequate intelligence or maps; allow interservice rivalries to impede operations; deploy with incompatible communication systems.6
Lebanon Intervention1982-1984Peacekeeping; stabilize the country.Ensure force has a clear, achievable mandate and robust rules of engagement; maintain neutrality to be an effective peacekeeper.10Deploy a “peacekeeping” force where there is no peace to keep; become a party to a multi-sided civil war; withdraw without a stabilization plan, creating a vacuum.10
Op. El Dorado Canyon (Libya)1986Punish Libya for terrorism; deter future attacks.Demonstrate long-range strike capability and political resolve; coordinate joint air and naval assets effectively.12Assume punitive strikes will solve underlying political issues; act unilaterally without allied support if it can be avoided; underestimate potential for asymmetric retaliation.12
Op. Just Cause (Panama)1989Safeguard U.S. lives; capture Noriega; restore democracy.Use overwhelming, well-rehearsed joint force for clear, limited objectives; leverage the credible threat of force as a tool of coercive diplomacy.18Mistake success in a uniquely permissive environment (welcoming population, known terrain) for a universally applicable strategic template for regime change.21
Op. Desert Storm (Gulf War I)1990-1991Liberate Kuwait; defend Saudi Arabia.Build a broad international coalition; secure public support; use overwhelming force for clear, limited goals; have a clear military exit strategy.4Fail to plan for the long-term political aftermath of the conflict; allow a tactical victory to create strategic hubris about the nature of future wars (e.g., over-reliance on technology).4
Somalia Intervention1992-1993Humanitarian relief; restore order.Clearly define the mission and resist “mission creep” from humanitarianism to nation-building; ensure forces are properly equipped for the evolving threat.27Underestimate local adversaries’ capabilities and will to fight; allow tactical events and media coverage to dictate strategic withdrawal; create a policy of risk-aversion for future crises.29
Op. Uphold Democracy (Haiti)1994Restore democratically elected government.Use the credible threat of force as a tool of coercive diplomacy; demonstrate operational flexibility to shift from combat to peacekeeping.33Confuse short-term operational success (restoring a leader) with long-term strategic success (building a stable democracy); fail to commit to the long-term resources nation-building requires.37
Balkan Wars (Bosnia/Kosovo)1995-1999Stop ethnic cleansing; stabilize the region.Intervene decisively and early to prevent greater cost later; use airpower in concert with local ground forces; maintain alliance cohesion.38Engage in half-measures and incremental escalation; believe airpower alone can stop atrocities on the ground without risk; ignore the long-term responsibility of post-conflict stabilization (“Pottery Barn Rule”).32
Op. Enduring Freedom (Afghanistan)2001-2021Destroy Al-Qaeda; remove Taliban; build a stable, democratic Afghanistan.Adapt tactically to counter-insurgency warfare; leverage special forces and local partners for initial regime change.42Allow “strategic drift” without clear, consistent objectives; ignore lessons of Vietnam (culture, local partner legitimacy); impose politically-driven timelines; fail to address corruption and sanctuaries.43
Op. Iraqi Freedom (Iraq)2003-2011Remove Saddam Hussein (WMD threat); establish a democratic Iraq.Adapt to insurgency (e.g., the Surge); recognize that security is the essential precondition for political progress.49Go to war on flawed intelligence; fail to plan for post-conflict stabilization (“Phase IV”); dismantle state institutions without a viable replacement; underestimate the complexity of nation-building.49
Op. Odyssey Dawn (Libya)2011Protect civilians (R2P); enforce no-fly zone.Build international consensus for limited action; utilize a “lead from behind” model to enable allies and partners.52Allow a humanitarian mission to morph into regime change without a plan for the aftermath; ignore the lessons of Iraq, leading to state collapse and regional chaos.51
Op. Inherent Resolve (Counter-ISIS)2014-PresentDegrade and defeat ISIS; destroy the “caliphate.”Employ a sustainable “by, with, and through” model; leverage local partners with coalition air/intel/SOF support to limit U.S. footprint.56Become overly dependent on the political reliability and competing agendas of local proxy forces; assume the territorial defeat of a group equals its ideological destruction.56


If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly donate to help fund our continued report, please visit our donations page.


Works cited

  1. Operation Eagle Claw-Lessons Learned – DTIC, accessed August 22, 2025, https://apps.dtic.mil/sti/tr/pdf/ADA402471.pdf
  2. A Half Century Later: Understanding the Impact of the Vietnam War | Vassar College, accessed August 22, 2025, https://www.vassar.edu/news/a-half-century-later-understanding-the-impact-of-the-vietnam-war
  3. The Vietnam War: Lessons Unlearned | Peace Policy, accessed August 22, 2025, https://peacepolicy.nd.edu/2015/05/18/the-vietnam-war-lessons-unlearned/
  4. Desert War Taught Lessons In How Superpower Uses Force | AUSA, accessed August 22, 2025, https://www.ausa.org/articles/desert-war-taught-lessons-how-superpower-uses-force
  5. What Operation Eagle Claw Taught Us About Leadership and Resolve, accessed August 22, 2025, https://embleholics.com/operation-eagle-claw/
  6. Fortunate Victory | Naval History Magazine – October 2023, Volume …, accessed August 22, 2025, https://www.usni.org/magazines/naval-history-magazine/2023/october/fortunate-victory-0
  7. Grenada: Operation Urgent Fury – Naval History and Heritage Command – Navy.mil, accessed August 22, 2025, https://www.history.navy.mil/research/library/online-reading-room/title-list-alphabetically/g/grenada-operation-urgent-fury.html
  8. Operation Eagle Claw-Lessons Learned – DTIC, accessed August 22, 2025, https://apps.dtic.mil/sti/citations/ADA402471
  9. Lebanon—They Came in Peace – Naval History and Heritage Command, accessed August 22, 2025, https://www.history.navy.mil/browse-by-topic/wars-conflicts-and-operations/middle-east/lebanon.html
  10. Lessons from American Diplomacy Toward Lebanon | Wilson Center, accessed August 22, 2025, https://www.wilsoncenter.org/article/lessons-american-diplomacy-toward-lebanon
  11. Stew in Their Own Juice: Reagan, Syria and Lebanon, 1981–1984* | Diplomatic History, accessed August 22, 2025, https://academic.oup.com/dh/article/44/4/664/5865464
  12. US Operation Eldorado Canyon – Walter Dorn, accessed August 22, 2025, https://www.walterdorn.net/212
  13. Air Force and Navy aircraft crossed Qaddafi’s “Line of Death” to strike the terrorist state of Libya. – El Dorado Canyon – Department of Defense, accessed August 22, 2025, https://media.defense.gov/2016/Mar/09/2001475953/-1/-1/0/0399CANYON.PDF
  14. 1986 United States bombing of Libya – Wikipedia, accessed August 22, 2025, https://en.wikipedia.org/wiki/1986_United_States_bombing_of_Libya
  15. Lessons from America’s First Conflict with Iran – Brookings Institution, accessed August 22, 2025, https://www.brookings.edu/articles/lessons-from-americas-first-war-with-iran/
  16. United States support for Iraq during the Iran–Iraq War – Wikipedia, accessed August 22, 2025, https://en.wikipedia.org/wiki/United_States_support_for_Iraq_during_the_Iran%E2%80%93Iraq_War
  17. Lessons Learned: The Iran-Iraq War – DTIC, accessed August 22, 2025, https://apps.dtic.mil/sti/tr/pdf/ADA232451.pdf
  18. Operation Just Cause: the Invasion of Panama, December 1989 | Article – Army.mil, accessed August 22, 2025, https://www.army.mil/article/14302/operation_just_cause_the_invasion_of_panama_december_1989
  19. The United States 1989 military intervention in Panama: a just cause? – LSU Scholarly Repository, accessed August 22, 2025, https://repository.lsu.edu/cgi/viewcontent.cgi?article=3883&context=gradschool_theses
  20. NSIAD-91-174FS Panama: Issues Relating to the U.S. Invasion – GAO, accessed August 22, 2025, https://www.gao.gov/assets/nsiad-91-174fs.pdf
  21. Operation Just Cause: Lessons for Operations Other Than War – RAND, accessed August 22, 2025, https://www.rand.org/content/dam/rand/pubs/monograph_reports/2007/MR569.pdf
  22. Extracts from Lessons Unlearned – Columbia International Affairs Online, accessed August 22, 2025, https://ciaotest.cc.columbia.edu/olj/ni/ni_00dot01.html
  23. Mission Command in Operation Just Cause | Small Wars Journal by …, accessed August 22, 2025, https://smallwarsjournal.com/2023/02/19/mission-command-operation-just-cause/
  24. Desert Storm—Early Gulf War Lessons | Proceedings – U.S. Naval Institute, accessed August 22, 2025, https://www.usni.org/magazines/proceedings/1991/march/desert-storm-early-gulf-war-lessons
  25. The Pentagon has been learning the wrong lessons for three decades – Defense One, accessed August 22, 2025, https://www.defenseone.com/ideas/2024/01/pentagon-has-been-learning-wrong-lessons-three-decades/393765/
  26. Full article: Pragmatism over principle: US intervention and burden shifting in Somalia, 1992–1993, accessed August 22, 2025, https://www.tandfonline.com/doi/full/10.1080/01402390.2018.1441712
  27. Readings | Ambush in Mogadishu | FRONTLINE – PBS, accessed August 22, 2025, https://www.pbs.org/wgbh/pages/frontline/shows/ambush/readings/lessons.html
  28. Somalia: Drawing the Right Lesson From “Black Hawk Down” – International Peace Institute, accessed August 22, 2025, https://www.ipinst.org/2011/08/somalia-drawing-the-right-lesson-from-black-hawk-down
  29. From Nation-Building to Black Hawk Down: U.S. Peacekeeping in Somalia – ADST.org, accessed August 22, 2025, https://adst.org/2014/09/from-nation-building-to-black-hawk-down-u-s-peacekeeping-in-somalia/
  30. Battle of Mogadishu – Army University Press – Army.mil, accessed August 22, 2025, https://www.armyupress.army.mil/Journals/NCO-Journal/Archives/2022/February/Battle-of-Mogadishu/
  31. Retiree reflects on Mogadishu: Former Ranger shares lessons learned during ‘Black Hawk Down’ | Article | The United States Army, accessed August 22, 2025, https://www.army.mil/article/120372/retiree_reflects_on_mogadishu_former_ranger_shares_lessons_learned_during_black_hawk_down
  32. Bosnia Remembered – Part III: The Lessons of Bosnia – Foreign Policy Research Institute, accessed August 22, 2025, https://www.fpri.org/article/2012/12/bosnia-remembered-part-iii-the-lessons-of-bosnia/
  33. Intervention in Haiti, 1994–1995 – Milestones in the History of U.S. Foreign Relations – Office of the Historian, accessed August 22, 2025, https://history.state.gov/milestones/1993-2000/haiti
  34. Operation Uphold Democracy – Wikipedia, accessed August 22, 2025, https://en.wikipedia.org/wiki/Operation_Uphold_Democracy
  35. Operation Uphold Democracy: Military Support for Democracy in Haiti – DTIC, accessed August 22, 2025, https://apps.dtic.mil/sti/tr/pdf/ADA394191.pdf
  36. Eyewitness to Chaos – UNL Digital Commons, accessed August 22, 2025, https://digitalcommons.unl.edu/context/unpresssamples/article/1342/viewcontent/9781612348681.pdf
  37. How Operation Uphold Democracy Still Affects Life … – Time Magazine, accessed August 22, 2025, https://time.com/5682135/haiti-military-anniversary/
  38. Decision to Intervene: How the War in Bosnia Ended – Brookings Institution, accessed August 22, 2025, https://www.brookings.edu/articles/decision-to-intervene-how-the-war-in-bosnia-ended/
  39. The Lessons of Bosnia, Ten Years On | International Crisis Group, accessed August 22, 2025, https://www.crisisgroup.org/europe-central-asia/balkans/bosnia-and-herzegovina/lessons-bosnia-ten-years
  40. Peace support operations in Bosnia and Herzegovina (1995-2004) – NATO, accessed August 22, 2025, https://www.nato.int/cps/en/natohq/topics_52122.htm
  41. [1999-09-16] Roth Floor Statement on Lessons Learned in Kosovo …, accessed August 22, 2025, https://www.finance.senate.gov/chairmans-news/roth-floor-statement-on-lessons-learned-in-kosovo-conflict
  42. Learning from Failed Peace Efforts in Afghanistan, accessed August 22, 2025, https://www.usip.org/publications/2023/10/learning-failed-peace-efforts-afghanistan
  43. Veterans’ voices shape a report on the Afghanistan War’s lessons and impact, accessed August 22, 2025, https://apnews.com/article/veterans-afghanistan-war-commission-report-9e2e759132eef92c382c40527f5acc75
  44. – U.S. LESSONS LEARNED IN AFGHANISTAN – GovInfo, accessed August 22, 2025, https://www.govinfo.gov/content/pkg/CHRG-116hhrg38915/html/CHRG-116hhrg38915.htm
  45. Timeline: The U.S. War in Afghanistan – Council on Foreign Relations, accessed August 22, 2025, https://www.cfr.org/timeline/us-war-afghanistan
  46. SIGAR 25-05 Staffing the Mission: Lessons from the U.S. …, accessed August 22, 2025, https://www.sigar.mil/Portals/147/Files/Reports/lessons-learned/SIGAR-25-05-LL.pdf
  47. Lessons From History Series: The U.S. Invasion of Iraq—Twenty Years Later, accessed August 22, 2025, https://www.cfr.org/event/lessons-history-series-us-invasion-iraq-twenty-years-later
  48. The Iraq War | George W. Bush Library, accessed August 22, 2025, https://www.georgewbushlibrary.gov/research/topic-guides/the-iraq-war
  49. Lessons Learned: The Iraq Invasion | The Belfer Center for Science and International Affairs, accessed August 22, 2025, https://www.belfercenter.org/publication/lessons-learned-iraq-invasion
  50. How Iran Won Our Iraq War | Tufts Now, accessed August 22, 2025, https://now.tufts.edu/2019/03/26/how-iran-won-our-iraq-war
  51. A Model Humanitarian Intervention? Reassessing NATO’s Libya Campaign – Belfer Center, accessed August 22, 2025, https://www.belfercenter.org/publication/model-humanitarian-intervention-reassessing-natos-libya-campaign
  52. Lessons of the Libya Intervention – Brookings Institution, accessed August 22, 2025, https://www.brookings.edu/articles/lessons-of-the-libya-intervention/
  53. The Lessons of Libya – Army University Press, accessed August 22, 2025, https://www.armyupress.army.mil/Portals/7/military-review/Archives/English/MilitaryReview_20120229_art011.pdf
  54. Lessons from Libya: How Not to Intervene | The Belfer Center for …, accessed August 22, 2025, https://www.belfercenter.org/publication/lessons-libya-how-not-intervene
  55. Lessons from Libya: 5 Developments that Should be Remembered when Approaching the Question of Coups in Africa | Wilson Center, accessed August 22, 2025, https://www.wilsoncenter.org/blog-post/lessons-libya-5-developments-should-be-remembered-when-approaching-question-coups-africa
  56. A New Approach to Defeating an Old Enemy: Army Special Operations Forces in Operation INHERENT RESOLVE | Article – Army.mil, accessed August 22, 2025, https://www.army.mil/article/280128/a_new_approach_to_defeating_an_old_enemy_army_special_operations_forces_in_operation_inherent_resolve
  57. The Role of U.S. Airpower in Defeating ISIS | RAND, accessed August 22, 2025, https://www.rand.org/pubs/research_briefs/RBA388-1.html
  58. Operation Inherent Resolve – Wikipedia, accessed August 22, 2025, https://en.wikipedia.org/wiki/Operation_Inherent_Resolve
  59. Five Operational Lessons from the Battle for Mosul – Army University Press, accessed August 22, 2025, https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Jan-Feb-2019/Arnold-Mosul/
  60. U.S. Diplomacy before the Kosovo War – Brookings Institution, accessed August 22, 2025, https://www.brookings.edu/articles/u-s-diplomacy-before-the-kosovo-war/
  61. Inherent Resolve Mission in Iraq and Syria Transitioning – Department of Defense, accessed August 22, 2025, https://www.defense.gov/News/News-Stories/Article/Article/3920032/inherent-resolve-mission-in-iraq-and-syria-transitioning/

The New Battlespace: Gray Zone Conflict in an Era of Great Power Competition

The primary arena for great power competition has shifted from conventional military confrontation to a persistent, multi-domain struggle in the “gray zone” between peace and war. This report provides a comprehensive analysis of the alternative forms of conflict employed by the United States, the Russian Federation, and the People’s Republic of China. It moves beyond theoretical frameworks to assess the practical application and effectiveness of economic warfare, cyber operations, information warfare, proxy conflicts, and legal warfare (“lawfare”). The analysis reveals distinct strategic approaches: the United States acts primarily as a defender of the existing international order, using its systemic advantages for targeted coercion; Russia operates as a strategic disrupter, employing asymmetric tools to generate chaos and undermine Western cohesion; and China functions as a systemic revisionist, patiently executing a long-term strategy to displace U.S. influence and reshape global norms in its favor.

The key finding of this report is that while these gray zone methods have proven effective at achieving discrete objectives and managing escalation, their long-term strategic success is mixed. Critically, they often produce significant unintended consequences that are actively reshaping the global security and economic order. The use of broad economic sanctions and tariffs, for example, has accelerated the formation of an alternative, non-Western economic bloc and spurred efforts to de-dollarize international trade. Similarly, persistent cyber and information attacks, while achieving tactical surprise and disruption, have hardened defenses and eroded the trust necessary for international cooperation. The gray zone is not a temporary state of affairs but the new, permanent battlespace where the future of the international order will be decided. Navigating this environment requires a fundamental shift in strategy from crisis response to one of perpetual, integrated competition across all instruments of national power.

Section I: The Strategic Environment: Redefining Conflict in the 21st Century

From Open War to Pervasive Competition

The 21st-century strategic landscape is defined by a distinct shift away from the paradigm of declared, conventional warfare between major powers. The overwhelming military and technological superiority of the United States and its alliance network has created a powerful disincentive for peer competitors to engage in direct armed conflict.1 Consequently, rivals such as Russia and China have adapted by developing and refining a sophisticated toolkit of alternative conflict methods. These strategies are designed to challenge the U.S.-led international order, erode its influence, and achieve significant strategic gains without crossing the unambiguous threshold of armed aggression that would trigger a conventional military response from the United States and its allies.1 This evolution does not signify an era of peace, but rather a transformation in the character of conflict to a state of persistent, pervasive competition waged across every domain of state power, from the economic and digital to the informational and legal.

Anatomy of the Gray Zone

This new era of competition is primarily conducted within a strategically ambiguous space known as the “gray zone.” The United States Special Operations Command defines this arena as “competitive interactions among and within state and non-state actors that fall between the traditional war and peace duality”.3 The central characteristic of gray zone operations is the deliberate calibration of actions to remain below the threshold of what could be legally and politically defined as a use of force warranting a conventional military response under international law (jus ad bellum).2

Ambiguity and plausible deniability are the currency of the gray zone. Actions are designed to be difficult to attribute and interpret, thereby creating confusion and sowing hesitation within an adversary’s decision-making cycle.4 This calculated ambiguity is particularly effective against democratic nations. The legal and bureaucratic structures of democracies are often optimized for a clear distinction between peace and war, making them slow to recognize and counter threats that defy this binary.3 This can lead to policy paralysis or responses that are either disproportionately escalatory or strategically insignificant, a vulnerability that actors like Russia and China consistently exploit.3 The toolkit for gray zone operations is extensive, including but not limited to information operations, political coercion, economic pressure, cyberattacks, support for proxies, and provocations by state-controlled forces.1 While many of these tactics are as old as statecraft itself, their integrated and synergistic application, amplified by modern information and communication technologies, represents a distinct evolution in the nature of conflict.1

The Hybrid Warfare Playbook

If the gray zone is the strategic arena, “hybrid warfare” is the tactical playbook used to compete within it. While not a formally defined term in international law, it is widely understood to describe the synchronized use of multiple instruments of power—military and non-military, conventional and unconventional, overt and covert—to destabilize an adversary and achieve strategic objectives.2 The objective is to create synergistic effects where the whole of the campaign is greater than the sum of its parts.2

The Russian strategic approach, often associated with Chief of the General Staff Valery Gerasimov, explicitly elevates the role of non-military means, viewing them as often more effective than armed force in achieving political and strategic goals.5 This doctrine was vividly demonstrated in the lead-up to the full-scale invasion of Ukraine, where Russia combined a massive military buildup with a sophisticated disinformation campaign, cyberattacks, economic pressure on European energy markets, and nuclear blackmail to shape the strategic environment.2

It is essential to distinguish between these two concepts: the gray zone describes the operational space where competition occurs, while hybrid warfare describes the methods employed within that space.2 Most hybrid tactics are deliberately applied in the gray zone precisely to exploit its ambiguity and avoid triggering a formal state of armed conflict as defined by international humanitarian law.3 This strategic choice is not an accident but a calculated effort to wage conflict in a manner that neutralizes the primary strengths of a conventionally superior adversary. The gray zone is, therefore, an asymmetric battlespace, deliberately crafted to turn the foundational pillars of the liberal international order—its commitment to the rule of law, open economies, and freedom of information—into exploitable vulnerabilities.

Section II: The Economic Arsenal: Geopolitics by Other Means

The US-China Tariff War: A Case Study in Economic Coercion

The economic competition between the United States and China escalated into open economic conflict in 2018, providing a clear case study in the use, effectiveness, and limitations of tariffs as a tool of modern statecraft.

Goals vs. Reality

The Trump administration initiated the trade war with a set of clearly articulated objectives: to force fundamental changes to what it termed China’s “longstanding unfair trade practices,” to halt the systemic theft of U.S. intellectual property, and to significantly reduce the large bilateral trade deficit.8 Beginning in January 2018 with tariffs on solar panels and washing machines, the conflict rapidly escalated. The U.S. imposed successive rounds of tariffs, eventually covering hundreds of billions of dollars of Chinese goods, citing Section 301 of the Trade Act of 1974 as its legal justification.8 China responded with immediate and symmetrical retaliation, targeting key U.S. exports with high political sensitivity, such as soybeans, pork, and automobiles, directly impacting the agricultural and manufacturing heartlands of the United States.8 This tit-for-tat escalation continued through 2019, culminating in a tense “Phase One” agreement in January 2020 that sought to de-escalate the conflict.8

Effectiveness Assessment: A Blunt Instrument

Despite the scale of the tariffs, the trade war largely failed to achieve its primary stated goals. The purchase commitments made by China in the Phase One deal were never fulfilled, with Beijing ultimately buying none of the additional $200 billion in U.S. exports it had pledged.8 Rigorous economic analysis has demonstrated that the economic burden of the tariffs was borne almost entirely by U.S. firms and consumers, not by Chinese exporters.11 This resulted in higher prices for a wide range of goods and was estimated to have reduced U.S. real income by $1.4 billion per month by the end of 2018.12

Furthermore, the pervasive policy uncertainty generated by the conflict had a chilling effect on global business investment and economic growth.13 Companies, unable to predict the future of the world’s most important trade relationship, delayed capital expenditures, disrupting global supply chains and slowing economic activity far beyond the borders of the two belligerents.13 The trade war thus serves as a powerful example of how broad-based tariffs function as a blunt and costly instrument, inflicting significant self-harm while yielding limited strategic gains.

Unintended Consequences

The most profound and lasting impacts of the trade war were not its intended effects but its unintended consequences. Rather than forcing a rebalancing of the U.S.-China economic relationship, the conflict accelerated a process of strategic decoupling. It compelled multinational corporations to begin the costly and complex process of diversifying their supply chains away from China, a trend that benefited manufacturing hubs in other parts of Asia, particularly Vietnam.15

Perhaps more significantly, the trade war reinforced Beijing’s conviction that it could not rely on an open, rules-based global economic system dominated by the United States. In response, China has intensified its national drive for technological self-sufficiency in critical sectors like semiconductors, a move that could, in the long term, diminish U.S. technological and economic leverage.16 By sidelining the World Trade Organization (WTO) in favor of unilateral action, the United States also weakened the very multilateral institutions it had built, encouraging a global shift toward protectionism and regional trade blocs.14

The Sanctions Regime Against Russia: Testing Economic Containment

The Western response to Russia’s 2022 full-scale invasion of Ukraine represents the most comprehensive and coordinated use of economic sanctions against a major power in modern history. This campaign serves as a critical test of the efficacy of economic containment in the 21st century.

Targeting the War Machine

The sanctions regime implemented by the United States and a broad coalition of allies was designed with a clear purpose: to cripple the Russian Federation’s ability to finance and technologically sustain its war of aggression.19 The measures were unprecedented in their scope and speed, targeting the core pillars of the Russian economy. Key actions included freezing hundreds of billions of dollars of the Russian Central Bank’s foreign reserves, disconnecting major Russian banks from the SWIFT financial messaging system, imposing a near-total ban on the export of high-technology goods like semiconductors, and implementing a novel price cap on Russian seaborne crude oil exports.21 This multi-pronged assault aimed to deny Moscow the revenue, financing, and technology essential for its military-industrial complex.20

The Limits of Efficacy and Russian Adaptation

While the sanctions have inflicted undeniable and significant damage on the Russian economy, they have failed to deliver a knockout blow or compel a change in Moscow’s strategic objectives. Estimates suggest that Russia’s GDP is now 10-12% smaller than it would have been without the invasion and subsequent sanctions.22 However, the Russian economy has proven far more resilient than initially expected.19

Moscow’s adaptation has been threefold. First, it transitioned its economy onto a full war footing, with massive increases in defense spending fueling industrial production and stimulating GDP growth, albeit in an unsustainable manner.19 Second, it proved adept at sanctions evasion. Russia successfully rerouted the majority of its energy exports from Europe to new markets in China and India, often selling at a discount but still generating substantial revenue.21 It also developed a “shadow fleet” of oil tankers operating outside of Western insurance and financial systems to circumvent the G7 price cap.22 Third, and most critically, it leveraged its partnership with China to procure essential dual-use technologies, such as microelectronics and machine tools, that were cut off by Western export controls.20

Strategic Realignment

The most significant long-term consequence of the sanctions regime has been a fundamental and likely irreversible strategic realignment of the Russian economy. Forced out of Western markets and financial systems, Moscow has dramatically deepened its economic, technological, and financial integration with China. Bilateral trade has surged to record levels, and the Chinese yuan has increasingly replaced the U.S. dollar in Russia’s trade and foreign reserves.17 This has accelerated the consolidation of a powerful Eurasian economic bloc positioned as a direct counterweight to the U.S.-led financial and trade system. The sanctions, intended to isolate Russia, have inadvertently catalyzed the creation of a more robust and resilient alternative economic architecture, thereby spurring global de-dollarization efforts and potentially weakening the long-term efficacy of U.S. financial power.19

This dynamic illustrates a central paradox of modern economic warfare: the aggressive use of systemic economic power, while effective at inflicting short-term pain, simultaneously provides a powerful incentive for adversaries to build parallel systems designed to be immune to that very power. Each application of sanctions against Russia or tariffs against China acts as a catalyst for the construction of an alternative global economic order, eroding the foundations of U.S. leverage over time.

China’s Belt and Road Initiative: Influence Through Investment

China’s Belt and Road Initiative (BRI) is a cornerstone of its foreign policy and a primary instrument of its economic statecraft. While often portrayed through a simplistic lens, its strategic function is nuanced and far-reaching.

Beyond the “Debt-Trap” Narrative

In Western strategic discourse, the BRI is frequently characterized as a form of “debt-trap diplomacy”.27 This narrative posits that China intentionally extends unsustainable loans to developing nations for large-scale infrastructure projects. When these nations inevitably default, Beijing allegedly seizes control of the strategic assets—such as ports or railways—thereby expanding its geopolitical and military footprint.27 The case of Sri Lanka’s Hambantota Port is consistently cited as the primary evidence for this strategy.27

A Nuanced Reality

A detailed examination of the Hambantota Port case, however, reveals a more complex reality that undermines the simplistic debt-trap thesis. The proposal for the port originated with the Sri Lankan government, not with Beijing, as part of a long-standing domestic development agenda.27 Furthermore, Sri Lanka’s severe debt crisis in the mid-2010s was not primarily caused by Chinese lending, but by excessive borrowing from Western-dominated international capital markets and unsustainable domestic fiscal policies.27 Chinese loans constituted a relatively small portion of Sri Lanka’s overall foreign debt.27

Crucially, the port was not seized in a debt-for-equity swap. Instead, facing a balance of payments crisis, the Sri Lankan government chose to lease a majority stake in the port’s operations to a Chinese state-owned enterprise for 99 years in exchange for $1.1 billion in hard currency.27 These funds were then used to shore up Sri Lanka’s foreign reserves and service its more pressing debts to Western creditors.27

While the debt-trap narrative is an oversimplification, it does not mean the BRI is benign. It is a powerful instrument of geoeconomic influence. By becoming the primary financier and builder of critical infrastructure across the developing world, China creates long-term economic dependencies, secures access to resources, opens new markets for its companies, and builds political goodwill that can be translated into diplomatic support on the international stage.30 The BRI allows China to systematically expand its global footprint and embed its economic and, increasingly, technological standards across Asia, Africa, and Latin America, thereby challenging the post-Cold War economic order.

Section III: The Digital Frontlines: Cyber and Electronic Warfare

The cyber domain has emerged as a central theater for great power competition, offering a low-cost, high-impact, and plausibly deniable means of projecting power and undermining adversaries. Russia and China have both developed sophisticated cyber capabilities, but they employ them in pursuit of distinct strategic objectives, reflecting their different geopolitical positions and long-term goals.

Russia’s Doctrine of Disruption

Russia’s approach to cyber warfare is fundamentally asymmetric and disruptive, designed to compensate for its relative weakness in the conventional military and economic domains. Its cyber operations prioritize psychological impact and the creation of societal chaos over permanent destruction.

This doctrine has been demonstrated through a series of high-profile operations against the United States. The cyberattacks on the Democratic National Committee (DNC) in 2015-2016 were not merely an act of espionage but an influence operation designed to disrupt the U.S. presidential election and erode public trust in the democratic process.32 The 2020 SolarWinds supply chain attack represented a new level of sophistication, compromising the networks of numerous U.S. government agencies and thousands of private sector companies by inserting malicious code into a trusted software update.34 This operation provided Russia with widespread, persistent access for espionage and potential future disruption. Similarly, the 2021 ransomware attack on Colonial Pipeline, while attributed to a criminal group, highlighted the profound vulnerability of U.S. critical infrastructure to disruptive cyberattacks, causing widespread fuel shortages along the East Coast.34

The strategic objective underpinning these actions is the generation of uncertainty and the degradation of an adversary’s will to act.37 By demonstrating the vulnerability of critical infrastructure and democratic institutions, Russia aims to create a psychological effect that far exceeds the direct technical damage, sowing division and decision-making paralysis within the target nation.37 Joint advisories from the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI) repeatedly confirm that Russian state-sponsored actors are persistently targeting U.S. critical infrastructure sectors, including energy, finance, and defense, for both espionage and disruptive purposes.38

China’s Strategy of Espionage and Exploitation

In contrast to Russia’s disruptive tactics, China’s cyber strategy is characterized by its industrial scale, persistence, and systematic focus on long-term intelligence gathering and intellectual property (IP) theft. It is not primarily a tool of chaos but a core component of China’s comprehensive national strategy to supplant the United States as the world’s leading economic and military power.

The People’s Liberation Army (PLA) maintains dedicated units, such as the infamous Unit 61398 (also known as APT1), tasked with conducting large-scale cyber espionage campaigns against foreign targets.42 These operations have successfully exfiltrated vast quantities of sensitive data from the United States. Notable examples include the systematic theft of design data for numerous advanced U.S. weapons systems, including the F-35 Joint Strike Fighter, the F-22 Raptor, and the Patriot missile system.34 This stolen IP directly fuels China’s own military modernization, allowing it to reverse-engineer and replicate advanced technologies, thereby leapfrogging decades of costly research and development and rapidly eroding America’s qualitative military edge.34

Beyond military secrets, China’s cyber espionage targets a wide array of sectors to advance its economic goals. This includes the theft of trade secrets from leading U.S. companies in industries ranging from energy to pharmaceuticals.34 The massive 2015 breach of the U.S. Office of Personnel Management (OPM), which compromised the sensitive personal data of over 21 million current and former federal employees, provided Beijing with an invaluable database for identifying, targeting, and recruiting intelligence assets for decades to come.34 Recent intelligence reports indicate a dramatic surge in Chinese cyber espionage operations, with a 150% increase in 2024 alone, highlighting the unabated intensity of this campaign.44

Effectiveness and Asymmetry

Both Russia and China have successfully weaponized the cyber domain as a highly effective asymmetric tool. It allows them to contest U.S. power and impose significant costs while operating below the threshold of armed conflict and maintaining a degree of plausible deniability.45 The difficulty of definitive, public attribution for cyberattacks creates a permissive environment for aggression, allowing state sponsors to operate with relative impunity.45

This reality reveals a critical divergence in strategic timelines. Russia’s cyber doctrine is optimized for the short term, employing disruptive attacks to achieve immediate political and psychological effects that can shape a specific crisis or event. China, in contrast, is waging a long-term, strategic campaign of attrition. Its patient, industrial-scale espionage is designed to fundamentally alter the global balance of technological, economic, and military power over the course of decades. The United States, therefore, faces a dual cyber threat: Russia’s acute, shock-and-awe style disruptions and China’s chronic, corrosive campaign of exploitation. Effectively countering these divergent threats requires distinct strategies, mindsets, and capabilities.

Section IV: The War for Minds: Information and Influence Operations

In the gray zone, the cognitive domain is a primary battlefield. The strategic manipulation of information to shape perceptions, control narratives, and undermine societal cohesion has become a central pillar of modern conflict. Russia and China, while often collaborating in this space, pursue fundamentally different long-term objectives with their information and influence operations.

Russia’s “Active Measures 2.0”

Russia’s contemporary information warfare is a direct evolution of the Soviet Union’s “active measures,” updated for the digital age.37 The core strategy is not to persuade foreign audiences of the superiority of the Russian model, but to degrade and disrupt the political systems of its adversaries from within.37

The 2016 U.S. presidential election serves as the canonical example of this doctrine in practice. The operation, directed by President Vladimir Putin, was multifaceted, combining the cyber theft of sensitive information with a sophisticated social media campaign.33 The GRU, Russia’s military intelligence agency, hacked the computer networks of the DNC and Clinton campaign officials, subsequently leaking the stolen emails through fronts like Guccifer 2.0 and platforms like WikiLeaks to generate damaging news cycles.33

Simultaneously, the St. Petersburg-based Internet Research Agency (IRA), a state-sponsored “troll farm,” created thousands of fake social media accounts to impersonate American citizens and political groups.33 The IRA’s primary tactic was not to spread pro-Russian propaganda, but to identify and inflame existing societal fault lines in the United States, particularly those related to race, gun control, immigration, and religion.50 By creating and amplifying hyper-partisan content on both the far-left (e.g., supporting Black Lives Matter) and the far-right (e.g., supporting secessionist movements), the IRA’s goal was to deepen polarization, foster distrust in institutions, suppress voter turnout among targeted demographics, and ultimately undermine faith in the American democratic process itself.50 This approach is highly effective because it acts as a social parasite, feeding on and magnifying organic divisions within an open society, making it difficult for citizens and policymakers to distinguish foreign manipulation from authentic domestic discourse.37

China’s Quest for “Discourse Power”

China’s information strategy is more systematic, ambitious, and long-term than Russia’s. It is explicitly guided by the doctrine of the “Three Warfares”: public opinion warfare (shaping public perception), psychological warfare (influencing the cognition and decision-making of adversaries), and legal warfare (using law to seize the “legal high ground”).54 The ultimate goal of this integrated strategy is to achieve what the Chinese Communist Party (CCP) calls “discourse power” (话语权).56

Discourse power is the ability to shape global norms, values, and narratives to create consensus around a new, China-led international order.56 This involves a multi-pronged effort to legitimize China’s authoritarian governance model and present it as a superior alternative to what it portrays as the chaotic and declining system of Western liberal democracy.56 The CCP pursues this goal through several mechanisms:

  • Massive Investment in State Media: Beijing has poured billions of dollars into expanding the global reach of its state-controlled media outlets, such as CGTN and Xinhua, to broadcast the CCP’s narratives directly to international audiences.54
  • United Front Work: The CCP’s United Front Work Department orchestrates a vast, global effort to co-opt and influence foreign elites, including politicians, academics, business leaders, and media figures, to advocate for China’s interests and silence criticism.54
  • Digital Dominance: China seeks to shape the global digital ecosystem by exporting its model of “cyber sovereignty,” which prioritizes state control over the free flow of information, and by promoting its own technical standards for next-generation technologies like 5G and AI.56

While Russia’s information operations are often opportunistic and focused on tactical disruption, China’s are patient, strategic, and aimed at a fundamental, long-term revision of the global information order.58 Russia seeks to burn down the existing house; China seeks to build a new one in its place, with itself as the architect.

The U.S. Response: Public Diplomacy

The primary instrument for the United States in the information domain is public diplomacy, executed largely through the U.S. Agency for Global Media (USAGM). The USAGM oversees a network of broadcasters, including Voice of America (VOA), Radio Free Europe/Radio Liberty (RFE/RL), and Radio Free Asia (RFA).60 The stated mission of these entities is to provide accurate, objective, and comprehensive news and information to audiences in countries where a free press is restricted, thereby serving as a counterweight to state propaganda and supporting the principles of freedom and democracy.60 However, the USAGM has historically faced challenges, including internal political disputes and questions regarding its strategic effectiveness in a modern, saturated, and highly fragmented digital media landscape.61

This reveals a fundamental divergence in strategic approaches. Russian information warfare is a strategy of cognitive disruption, designed to confuse, divide, and ultimately paralyze an opponent by turning its own open information environment against it. Chinese information warfare is a strategy of cognitive displacement, a long-term project aimed at methodically replacing the norms, values, and narratives of the liberal international order with its own. Countering the former requires tactical resilience and societal inoculation against division, while countering the latter requires a sustained, global competition of ideas and a compelling reaffirmation of the value of the democratic model.

Section V: Conflict by Other Means: Proxies and Lawfare

Beyond the economic and digital realms, great powers continue to engage in conflict through indirect means, leveraging third-party actors and legal frameworks to advance their interests while avoiding direct confrontation. Proxy warfare and lawfare are two prominent tools in the gray zone playbook, used to alter the strategic landscape and impose costs on adversaries without resorting to open hostilities.

The Modern Proxy War

Proxy warfare, a hallmark of the Cold War, has been adapted to the contemporary environment. States support and direct non-state or third-party state actors to wage conflict, allowing the sponsoring power to achieve strategic objectives with limited direct risk and cost.

Syria as a Microcosm

The Syrian Civil War serves as a stark example of modern, multi-layered proxy conflict. The Russian Federation intervened militarily in 2015 with the explicit goal of preserving the regime of its client, Bashar al-Assad, which was on the verge of collapse.63 This intervention was a direct pushback against U.S. and Western influence, as it placed Russian forces and their proxies, including the Wagner Group, in direct opposition to various Syrian opposition groups that were receiving support from the United States and its regional partners.63 This created a complex and dangerous battlespace where the proxies of two nuclear powers were engaged in active combat. Throughout this period, the People’s Republic of China played a crucial supporting role for Russia, using its position on the UN Security Council to provide diplomatic cover. Beijing repeatedly joined Moscow in vetoing resolutions that would have condemned or sanctioned the Assad regime, demonstrating a coordinated Sino-Russian effort to thwart Western policy objectives in the Middle East.65

Ukraine and the “Proxy Supporter” Model

The war in Ukraine represents a different but equally significant model of proxy conflict. The United States and its NATO allies are engaged in a classic proxy war, providing massive military, financial, and intelligence support to Ukraine to enable its defense against direct Russian aggression.25 A critical evolution in this conflict is the role played by China as a “proxy supporter” for Russia. While Beijing has refrained from providing large quantities of direct lethal aid, its comprehensive economic and technological support has been indispensable to sustaining Russia’s war effort.25 China has become the primary destination for sanctioned Russian energy, the main supplier of critical dual-use components like microelectronics for Russia’s military-industrial complex, and a key diplomatic partner in shielding Moscow from international condemnation.17 This support, while falling short of a formal military alliance, effectively makes China a co-belligerent in a gray-zone context. The dynamic is further complicated by North Korea’s role as a direct arms supplier to Russia, providing vast quantities of artillery shells and even troops, illustrating a multi-layered proxy network designed to sustain Russia’s war and bleed Western resources.25

China’s Lawfare in the South China Sea

“Lawfare” is the strategic use of legal processes and instruments to achieve operational or geopolitical objectives.69 China has masterfully employed lawfare in the South China Sea as a primary tool to assert its expansive territorial claims and challenge the existing international maritime order.

Challenging the International Order

China’s strategy is centered on enforcing its “nine-dash line” claim, which encompasses nearly the entire South China Sea. This claim was authoritatively invalidated in 2016 by an arbitral tribunal under the United Nations Convention on the Law of the Sea (UNCLOS), a ruling that Beijing has rejected and ignored.69 China’s lawfare is a systematic effort to create a new legal reality that conforms to its territorial ambitions.

Tactics of Creeping Jurisdiction

Beijing’s lawfare tactics are methodical and multi-faceted, designed to create a state of perpetual contestation and gradually normalize its control:

  1. Domestic Legislation as International Law: China passes domestic laws that treat the international waters of the South China Sea as its own sovereign territory. For example, its 2021 Coast Guard Law authorizes its forces to use “all necessary means,” including lethal force, against foreign vessels in waters it claims, in direct contravention of UNCLOS.70
  2. Creating “Facts on the Water”: China has engaged in a massive campaign of land reclamation, building and militarizing artificial islands on submerged reefs and shoals. These outposts serve as forward operating bases for its military, coast guard, and maritime militia, allowing it to project power and physically enforce its claims.69
  3. Reinterpreting Legal Norms: China actively seeks to redefine long-standing principles of international law. It argues that the right to “freedom of navigation” applies only to commercial vessels and does not permit foreign military activities within its claimed Exclusive Economic Zone (EEZ), a position contrary to the consensus interpretation of UNCLOS.70

This strategy of lawfare is not merely a legal or diplomatic maneuver; it is a foundational element of China’s gray zone strategy. By passing domestic laws that criminalize the lawful activities of other nations in international waters, China is attempting to create the legal and political pretext for future military action. This approach aims to reframe a potential act of aggression—such as firing on a Philippine or Vietnamese vessel—not as a violation of international law, but as a legitimate domestic law enforcement action within what it defines as its own jurisdiction. This calculated ambiguity is designed to paralyze the decision-making of adversaries and their allies, most notably the United States, thereby achieving a key objective of gray zone conflict.

Section VI: Strategic Assessment and Outlook

The preceding analysis demonstrates that the contemporary security environment is characterized by persistent, multi-domain competition in the gray zone. The United States, Russia, and China have each developed distinct doctrines and toolkits to navigate this new battlespace, with varying degrees of success and significant long-term consequences for the international order.

Comparative Analysis of National Strategies

The strategic approaches of the three major powers can be synthesized into a comparative framework that highlights their overarching goals and preferred methods across the key domains of conflict. The United States generally acts to preserve the existing international system from which it derives significant benefit, using its power for targeted enforcement and coercion. Russia, as a declining power with significant conventional limitations, acts as a disrupter, seeking to create chaos and exploit divisions to weaken its adversaries. China, as a rising and patient power, acts as a systemic revisionist, seeking to methodically build an alternative order and displace U.S. leadership over the long term.

Conflict DomainUnited States ApproachRussian ApproachChinese Approach
EconomicSystemic dominance (dollar, SWIFT), targeted sanctions, alliance-based trade pressure.Asymmetric coercion (energy), sanctions evasion, strategic pivot to China, weaponization of food/commodities.Systemic competition (BRI), supply chain dominance, technological self-sufficiency, targeted economic coercion.
CyberIntelligence gathering, offensive/defensive operations, alliance-based threat sharing.Disruption of critical infrastructure, sowing chaos, psychological impact, election interference.Industrial-scale espionage for economic/military gain, IP theft, strategic pre-positioning in critical networks (Volt Typhoon).
InformationPublic diplomacy (USAGM), countering disinformation, promoting democratic values.“Active Measures 2.0”: Exploiting and amplifying existing societal divisions, tactical disinformation.“Discourse Power”: Long-term narrative shaping, censorship, promoting authoritarian model, co-opting elites.
ProxySupport for state/non-state partners (e.g., Ukraine, Syrian opposition) to uphold international order.Direct intervention with proxies (Wagner) and state forces to prop up clients and challenge U.S. influence.Economic/military support to partners (e.g., Russia), avoiding direct military entanglement, using proxies for resource access.
LegalUpholding international law (e.g., FONOPs), use of legal frameworks for sanctions.Manipulation of legal norms, undermining international bodies, using legal pretexts for aggression.“Lawfare”: Using domestic law to rewrite international law, creating new “facts on the ground” to legitimize claims.

What Works, What Doesn’t, and Why

A critical assessment of these strategies reveals clear patterns of effectiveness and failure.

What Works:

  • Asymmetric and Low-Cost Tools: For Russia and China, gray zone tools like cyber operations, information warfare, and the use of proxies have proven highly effective. They impose significant strategic, economic, and political costs on the United States and its allies at a relatively low cost and risk to the aggressor.73 These methods are particularly potent because they are designed to exploit the inherent openness and legal constraints of democratic societies.
  • Incrementalism and Patience: China’s strategy of “creeping” aggression, particularly its lawfare and island-building campaign in the South China Sea, has been effective at changing the physical and strategic reality on the ground. By avoiding any single, dramatic action that would demand a forceful response, Beijing has incrementally advanced its position over years, achieving a significant strategic gain through a thousand small cuts.74
  • Targeted, Multilateral Coercion: For the United States, economic and diplomatic actions are most effective when they are targeted, multilateral, and leverage the collective weight of its alliance network. The initial shock of the coordinated financial sanctions against Russia demonstrated the immense power of this collective approach, even if its long-term coercive power has been blunted by Russian adaptation.19

What Doesn’t Work:

  • Broad, Unilateral Economic Pressure: The U.S.-China trade war demonstrated that broad, unilateral tariffs are a blunt instrument that often inflicts more economic pain on the imposing country than on the target, while failing to achieve its core strategic objectives and producing negative unintended consequences for the global trading system.12
  • A Purely Defensive Posture: A reactive and defensive strategy is insufficient to deter persistent gray zone aggression. Russia’s continued campaign of sabotage and subversion in Europe, despite heightened defensive measures, indicates that without the credible threat of proactive and costly consequences, adversaries will continue to operate in the gray zone with relative impunity.47
  • Building Compelling Alternative Narratives: While Russia is effective at disruptive information warfare and China is effective at censorship and control, both have largely failed to build a compelling, positive narrative that resonates with audiences in democratic nations. Their influence operations are most successful when they are parasitic on existing grievances rather than when they attempt to promote their own models.59

Recommendations for the United States

To compete more effectively in this new battlespace, the United States must adapt its strategic posture. The following recommendations are derived from the analysis in this report:

  1. Embrace Pervasive Competition: The U.S. national security apparatus must shift from a traditional crisis-response model to a posture of continuous, proactive competition across all domains. This requires institutional and cultural changes that recognize the gray zone as the primary arena of conflict.
  2. Strengthen Societal Resilience: The most effective defense against information warfare and foreign influence is a resilient society. This requires a national effort to enhance media literacy, secure critical election infrastructure, and address the deep-seated domestic social and political divisions that adversaries so effectively exploit.
  3. Integrate All Instruments of National Power: Gray zone threats are inherently multi-domain; the response must be as well. The U.S. must break down bureaucratic silos and develop a national strategy that seamlessly integrates economic, financial, intelligence, diplomatic, legal, and military tools to impose coordinated costs on adversaries.
  4. Leverage Alliances Asymmetrically: The U.S. alliance network remains its greatest asymmetric advantage. This network must be leveraged not just for conventional military deterrence, but for gray zone competition. This includes building coalitions for coordinated cyber defense, developing joint strategies for economic security and supply chain resilience, and crafting unified diplomatic and informational campaigns to counter authoritarian narratives.

Future Trajectory of Conflict

The trends identified in this report are likely to accelerate and intensify. The proliferation of advanced technologies, particularly artificial intelligence, will supercharge gray zone conflict. AI will enable the creation of hyper-personalized disinformation campaigns, deepfakes, and autonomous cyber weapons at a scale and speed that will overwhelm current defenses.58 The ongoing fragmentation of the global economic and technological landscape will create more clearly defined blocs, turning the economic domain into an even more central and contentious battlefield. The gray zone is not a passing phase of international relations. It is the new, enduring reality of great power competition, a permanent battlespace where ambiguity is the weapon, attribution is the prize, and the contest for influence is constant.



If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly donate to help fund our continued report, please visit our donations page.


Works cited

  1. Gray Zone Project | CSIS, accessed August 22, 2025, https://www.csis.org/programs/gray-zone-project
  2. Metaphors, Rules and War: Making Sense of Hybrid Threats and Grey Zone Conflict, accessed August 22, 2025, https://www.ejiltalk.org/metaphors-rules-and-war-making-sense-of-hybrid-threats-and-grey-zone-conflict/
  3. Grey-zone (international relations) – Wikipedia, accessed August 22, 2025, https://en.wikipedia.org/wiki/Grey-zone_(international_relations)
  4. ‘Hybrid threats’, ‘grey zones’, ‘competition’, and ‘proxies’: When is it …, accessed August 22, 2025, https://blogs.icrc.org/law-and-policy/2025/01/16/hybrid-threats-grey-zones-competition-and-proxies-when-is-it-actually-war/
  5. Hybrid Warfare: Aggression and Coercion in the Gray Zone | ASIL, accessed August 22, 2025, https://www.asil.org/insights/volume/21/issue/14/hybrid-warfare-aggression-and-coercion-gray-zone
  6. “Hybrid Warfare: How to Escape the Conceptual Gray-Zone” by …, accessed August 22, 2025, https://digitalcommons.usf.edu/jss/vol17/iss1/1/
  7. Russia’s hybrid war against the West – NATO Review, accessed August 22, 2025, https://www.nato.int/docu/review/articles/2024/04/26/russias-hybrid-war-against-the-west/index.html
  8. China–United States trade war – Wikipedia, accessed August 22, 2025, https://en.wikipedia.org/wiki/China%E2%80%93United_States_trade_war
  9. A Timeline of the U.S.-China Trade War During Trump’s Second Term – Time Magazine, accessed August 22, 2025, https://time.com/7292207/us-china-trade-war-trump-tariffs-timeline/
  10. US-China Trade War | PIIE, accessed August 22, 2025, https://www.piie.com/research/trade-investment/us-china-trade-war
  11. Trade Wars: History, Pros & Cons, and U.S.-China Example – Investopedia, accessed August 22, 2025, https://www.investopedia.com/terms/t/trade-war.asp
  12. The Impact of the 2018 Trade War on U.S. Prices and Welfare – National Bureau of Economic Research, accessed August 22, 2025, https://www.nber.org/system/files/working_papers/w25672/w25672.pdf
  13. Five Economists Explain: Impacts of the U.S.-China Trade War – NCUSCR, accessed August 22, 2025, https://www.ncuscr.org/podcast/economists-explain-trade-war/
  14. The global costs of the US-China tariff war are mounting. And the worst may be yet to come – Down To Earth, accessed August 22, 2025, https://www.downtoearth.org.in/economy/the-global-costs-of-the-us-china-tariff-war-are-mounting-and-the-worst-may-be-yet-to-come
  15. Four years into the trade war, are the US and China decoupling? | PIIE, accessed August 22, 2025, https://www.piie.com/blogs/realtime-economics/2022/four-years-trade-war-are-us-and-china-decoupling
  16. The New U.S.-China Trade War: Strategic Motives, Domestic Consequences, and Global Ramifications | Beyond the Horizon ISSG, accessed August 22, 2025, https://behorizon.org/the-new-u-s-china-trade-war-strategic-motives-domestic-consequences-and-global-ramifications/
  17. A Protracted U.S.-China Trade War Would Be a Gift to Moscow, accessed August 22, 2025, https://carnegieendowment.org/russia-eurasia/politika/2025/05/russia-china-trade-wars-opportunities?lang=en
  18. Trade War – CEPR, accessed August 22, 2025, https://cepr.org/system/files/publication-files/60137-trade_war_the_clash_of_economic_systems_threatening_global_prosperity.pdf
  19. The Economic Impact of Russia Sanctions – Congress.gov, accessed August 22, 2025, https://www.congress.gov/crs-product/IF12092
  20. How Sanctions Have Reshaped Russia’s Future – CSIS, accessed August 22, 2025, https://www.csis.org/analysis/how-sanctions-have-reshaped-russias-future
  21. Three Years of War in Ukraine: Are Sanctions Against Russia Making a Difference?, accessed August 22, 2025, https://www.cfr.org/in-brief/three-years-war-ukraine-are-sanctions-against-russia-making-difference
  22. Sanctions effectiveness: what lessons three years into the war on Ukraine?, accessed August 22, 2025, https://www.economicsobservatory.com/sanctions-effectiveness-what-lessons-three-years-into-the-war-on-ukraine
  23. US sanctions against Russia – Brookings Institution, accessed August 22, 2025, https://www.brookings.edu/collection/us-sanctions-against-russia/
  24. Sanctions and Russia’s War: Limiting Putin’s Capabilities | U.S. Department of the Treasury, accessed August 22, 2025, https://home.treasury.gov/news/featured-stories/sanctions-and-russias-war-limiting-putins-capabilities
  25. Ukraine Is Now a Proxy War for Asian Powers – RAND, accessed August 22, 2025, https://www.rand.org/pubs/commentary/2024/11/ukraine-is-now-a-proxy-war-for-asian-powers.html
  26. How the Latest Sanctions Will Impact Russia—and the World …, accessed August 22, 2025, https://carnegieendowment.org/russia-eurasia/politika/2024/06/finance-sanctions-russia-currency?lang=en
  27. Debunking the Myth of ‘Debt-trap Diplomacy’ | 4. Sri Lanka and the BRI, accessed August 22, 2025, https://www.chathamhouse.org/2020/08/debunking-myth-debt-trap-diplomacy/4-sri-lanka-and-bri
  28. China’s Debt-Trap Diplomacy in Central Asia – CACI Analyst, accessed August 22, 2025, https://www.cacianalyst.org/publications/analytical-articles/item/13823-chinas-debt-trap-diplomacy-in-central-asia.html
  29. Full article: Chinese debt trap diplomacy: reality or myth? – Taylor & Francis Online, accessed August 22, 2025, https://www.tandfonline.com/doi/full/10.1080/19480881.2023.2195280
  30. Debt Distress on the Road to “Belt and Road” – Wilson Center, accessed August 22, 2025, https://www.wilsoncenter.org/blog-post/debt-distress-road-belt-and-road
  31. Belt and Road Initiative – Wikipedia, accessed August 22, 2025, https://en.wikipedia.org/wiki/Belt_and_Road_Initiative
  32. Democratic National Committee cyber attacks – Wikipedia, accessed August 22, 2025, https://en.wikipedia.org/wiki/Democratic_National_Committee_cyber_attacks
  33. Russian interference in the 2016 United States elections – Wikipedia, accessed August 22, 2025, https://en.wikipedia.org/wiki/Russian_interference_in_the_2016_United_States_elections
  34. Cyber Clash with China (NSC) | CFR Education – Council on Foreign Relations, accessed August 22, 2025, https://education.cfr.org/learn/simulation/cyber-clash-china-nsc/background
  35. CrowdStrike Chaos Highlights Key Cyber Vulnerabilities with Software Updates | U.S. GAO, accessed August 22, 2025, https://www.gao.gov/blog/crowdstrike-chaos-highlights-key-cyber-vulnerabilities-software-updates
  36. Russian Cyber Threats to U.S. Critical Infrastructure – SecuLore, accessed August 22, 2025, https://seculore.com/resources/russian-cyber-threats-to-u-s-critical-infrastructure/
  37. Russian Cyber Information Warfare – Marine Corps University, accessed August 22, 2025, https://www.usmcu.edu/Outreach/Marine-Corps-University-Press/MCU-Journal/JAMS-vol-12-no-1/Russian-Cyber-Information-Warfare/
  38. Russia Threat Overview and Advisories | CISA, accessed August 22, 2025, https://www.cisa.gov/topics/cyber-threats-and-advisories/advanced-persistent-threats/russia
  39. Russia State-Sponsored Cyber Threat: Advisories – CISA, accessed August 22, 2025, https://www.cisa.gov/topics/cyber-threats-and-advisories/nation-state-cyber-actors/russia/publications
  40. Russian Military Cyber Actors Target US and Global Critical Infrastructure – CISA, accessed August 22, 2025, https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-249a
  41. Russian Military Cyber Actors Target U.S. and Global Critical Infrastructure – Department of Defense, accessed August 22, 2025, https://media.defense.gov/2024/Sep/05/2003537870/-1/-1/0/CSA-Russian-Military-Cyber-Target-US-Global-CI.PDF
  42. Cyberwarfare and China – Wikipedia, accessed August 22, 2025, https://en.wikipedia.org/wiki/Cyberwarfare_and_China
  43. A Discussion on the Defense Department’s 2024 China Military Power Report – CSIS, accessed August 22, 2025, https://www.csis.org/analysis/discussion-defense-departments-2024-china-military-power-report
  44. Significant Cyber Incidents | Strategic Technologies Program | CSIS, accessed August 22, 2025, https://www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents
  45. Cyberwarfare and the United States – Wikipedia, accessed August 22, 2025, https://en.wikipedia.org/wiki/Cyberwarfare_and_the_United_States
  46. CYBER THREATS FROM CHINA, RUSSIA, AND IRAN: PROTECTING AMERICAN CRITICAL INFRASTRUCTURE | Congress.gov, accessed August 22, 2025, https://www.congress.gov/event/113th-congress/house-event/LC801/text
  47. Russia’s Shadow War Against the West – CSIS, accessed August 22, 2025, https://www.csis.org/analysis/russias-shadow-war-against-west
  48. Background to “Assessing Russian Activities and Intentions in Recent US Elections”: The Analytic Process and Cyber Incident – DNI.gov, accessed August 22, 2025, https://www.dni.gov/files/documents/ICA_2017_01.pdf
  49. Report on the Investigation into Russian Interference in the 2016 Presidential Election – Department of Justice, accessed August 22, 2025, https://www.justice.gov/archives/sco/file/1373816/dl?inline=
  50. Fact Sheet: What We Know about Russia’s Interference Operations – German Marshall Fund, accessed August 22, 2025, https://www.gmfus.org/news/fact-sheet-what-we-know-about-russias-interference-operations
  51. The IRA and Political Polarization in the United States – DemTech, accessed August 22, 2025, https://demtech.oii.ox.ac.uk/research/posts/the-ira-and-political-polarization-in-the-united-states/
  52. New Evidence Shows How Russia’s Election Interference Has Gotten More Brazen, accessed August 22, 2025, https://www.brennancenter.org/our-work/analysis-opinion/new-evidence-shows-how-russias-election-interference-has-gotten-more
  53. What’s Old Is New Again: Cold War Lessons for Countering Disinformation, accessed August 22, 2025, https://tnsr.org/2022/09/whats-old-is-new-again-cold-war-lessons-for-countering-disinformation/
  54. To Win without Fighting – Marine Corps University, accessed August 22, 2025, https://www.usmcu.edu/Outreach/Marine-Corps-University-Press/Expeditions-with-MCUP-digital-journal/To-Win-without-Fighting/
  55. Political Warfare against Intervention Forces – Air University, accessed August 22, 2025, https://www.airuniversity.af.edu/JIPA/Display/Article/4167178/political-warfare-against-intervention-forces/
  56. CHINESE DISCOURSE POWER: AMBITIONS AND REALITY IN THE DIGITAL DOMAIN – Atlantic Council, accessed August 22, 2025, https://www.atlanticcouncil.org/wp-content/uploads/2022/11/Chinese-Discourse-Power-Ambitions-and-Reality-in-the-Digital-Domain.pdf
  57. Asked and Answered: China’s Strategy of Political Warfare – CSIS, accessed August 22, 2025, https://www.csis.org/analysis/asked-and-answered-chinas-strategy-political-warfare
  58. Chinese information operations and information warfare – Wikipedia, accessed August 22, 2025, https://en.wikipedia.org/wiki/Chinese_information_operations_and_information_warfare
  59. Sino-Russian Convergence in Foreign Information Manipulation and Interference: A Global Threat to the US and Its Allies – CEPA, accessed August 22, 2025, https://cepa.org/comprehensive-reports/sino-russian-convergence-in-foreign-information-manipulation-and-interference/
  60. United States Agency for Global Media – U.S. Government Manual, accessed August 22, 2025, https://www.usgovernmentmanual.gov/Agency?EntityId=oPpn5fYQYfM=&ParentEId=+klubNxgV0o=&EType=jY3M4CTKVHY=
  61. United States Agency for Global Media – Wikipedia, accessed August 22, 2025, https://en.wikipedia.org/wiki/United_States_Agency_for_Global_Media
  62. U.S. Agency for Global Media: Background, Governance, and Issues for Congress, accessed August 22, 2025, https://www.congress.gov/crs-product/R46968
  63. Russian intervention in the Syrian civil war – Wikipedia, accessed August 22, 2025, https://en.wikipedia.org/wiki/Russian_intervention_in_the_Syrian_civil_war
  64. Russia’s Strategic Success in Syria and the Future of Moscow’s Middle East Policy, accessed August 22, 2025, https://www.washingtoninstitute.org/policy-analysis/russias-strategic-success-syria-and-future-moscows-middle-east-policy
  65. China’s Role in the Middle East, accessed August 22, 2025, https://www.mei.edu/events/chinas-role-middle-east
  66. China’s Evolving Stance on Syria – Middle East Institute, accessed August 22, 2025, https://www.mei.edu/publications/chinas-evolving-stance-syria
  67. The potential and limitations of Russia-China cooperation in the Middle East, accessed August 22, 2025, https://www.mei.edu/publications/potential-and-limitations-russia-china-cooperation-middle-east
  68. US ambassador: China believes it is waging a proxy war through Russia – Atlantic Council, accessed August 22, 2025, https://www.atlanticcouncil.org/blogs/ukrainealert/us-ambassador-china-believes-it-is-waging-a-proxy-war-through-russia/
  69. What Has China’s Lawfare Achieved in the South China Sea? – ISEAS-Yusof Ishak Institute, accessed August 22, 2025, https://www.iseas.edu.sg/wp-content/uploads/2023/06/ISEAS_Perspective_2023_51.pdf
  70. Lawfare: China’s new gambit for global power – Universidad de Navarra, accessed August 22, 2025, https://www.unav.edu/web/global-affairs/lawfare-china-s-new-gambit-for-global-power
  71. 2023/51 “What Has China’s Lawfare Achieved in the South China Sea?” by Christian Schultheiss – ISEAS-Yusof Ishak Institute, accessed August 22, 2025, https://www.iseas.edu.sg/articles-commentaries/iseas-perspective/2023-51-what-has-chinas-lawfare-achieved-in-the-south-china-sea-by-christian-schultheiss/
  72. Chinese Lawfare in the South China Sea | Journal of Political Risk, accessed August 22, 2025, https://www.jpolrisk.com/chinese-lawfare-in-the-south-china-sea-a-threat-to-global-interdependence-and-regional-stability/
  73. Hybrid warfare – Wikipedia, accessed August 22, 2025, https://en.wikipedia.org/wiki/Hybrid_warfare
  74. The Changing Face of Conflict: What is Hybrid Warfare? – Global Security Review, accessed August 22, 2025, https://globalsecurityreview.com/hybrid-and-non-linear-warfare-systematically-erases-the-divide-between-war-peace/
  75. Russia is Winning the Global Information War | Royal United Services Institute – RUSI, accessed August 22, 2025, https://www.rusi.org/explore-our-research/publications/commentary/russia-winning-global-information-war
  76. how the US, China, and Russia are using artificial intelligence in their information warfare and influence operations – ResearchGate, accessed August 22, 2025, https://www.researchgate.net/publication/378764079_Artificial_intelligence_and_information_warfare_in_major_power_states_how_the_US_China_and_Russia_are_using_artificial_intelligence_in_their_information_warfare_and_influence_operations

Small Arms of the People’s Republic of China: A Technical and Strategic Assessment

The People’s Liberation Army (PLA) of the People’s Republic of China is currently executing the most comprehensive and technologically ambitious small arms modernization program in its history. This transformation is centered on the system-wide adoption of the QBZ-191 modular weapon family, a development that signifies a profound strategic and doctrinal evolution. The prevailing trend is a decisive pivot away from the isolated, proprietary, and ergonomically challenged designs of the past, most notably the bullpup QBZ-95 family. In its place, the PLA is embracing a design philosophy rooted in modularity, superior ergonomics, and the seamless integration of advanced electro-optics and accessories, aligning Chinese infantry weapons with global design paradigms for the first time.

This report provides a detailed technical and strategic assessment of the small arms currently in service across all branches of China’s armed forces, including the PLA Ground Force (PLAGF), Navy (PLAN), Air Force (PLAAF), the paramilitary People’s Armed Police (PAP), and the China Coast Guard (CCG). The analysis indicates that the current modernization is far more than a simple equipment upgrade. It is a direct reflection of a deeper doctrinal shift towards information-centric, combined-arms warfare, where the individual soldier is a networked sensor and shooter. The new generation of weapons is engineered to enhance the lethality, tactical flexibility, and operational sustainability of small units, empowering them to fight and win on a complex, multi-domain battlefield.

While the new QBZ-191 system is being prioritized for frontline combat units, a vast inventory of legacy weapons, including millions of QBZ-95 family rifles and a significant reserve of Type 81 rifles, remains in service. This demonstrates a pragmatic, tiered, and cost-conscious approach to modernization. Equipment is cascaded from elite units to second-line troops, reserves, and internal security forces, maximizing the combat effectiveness of the entire force structure within realistic fiscal and logistical constraints. This report will dissect each major weapon system, analyze its role within the PLA’s evolving doctrine, and provide a concluding assessment of China’s defense-industrial capacity and the future trajectory of its small arms development.

II. The New Generation: The QBZ-191 Modular Weapon System

The centerpiece of the PLA’s infantry modernization is the weapon family officially designated the QBZ-191. Its introduction marks a definitive break with the preceding generation of bullpup rifles and represents a wholesale adoption of contemporary, conventional rifle design principles. This shift is not merely stylistic; it is a fundamental realignment of the infantryman’s weapon with the demands of modern, informationized warfare.

This is a photo of a QBZ-191 taken at the 2021 China Airshow. Photo by: By Dan3031949 – Own work, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=112466629

Core Design Philosophy and Doctrinal Shift

The QBZ-191 (191式自动步枪, 191 Shì Zìdòng Bùqiāng, Type 191 Automatic Rifle) family abandons the bullpup configuration of its QBZ-95 predecessor in favor of a conventional layout. Mechanically, it operates on a short-stroke gas piston and rotating bolt system, a mechanism renowned for its reliability and adopted by many of the world’s most advanced assault rifles, such as the Heckler & Koch HK416 and the FN SCAR. The weapon’s architecture includes features now considered standard for a modern military rifle: a multi-position adjustable stock, improved ergonomics for varied shooting positions, and fully ambidextrous controls, including the fire selector and magazine release.

The decision to abandon the bullpup layout, after investing heavily in it for over two decades with the QBZ-95, is the most telling aspect of the new design philosophy. The QBZ-95, while offering the benefit of a long barrel in a compact overall length, was plagued by inherent design flaws that became increasingly untenable. These included a notoriously heavy and imprecise trigger due to the long linkage from the trigger to the rear-mounted action, awkward magazine changes that required breaking a firing grip, and ejection ports located close to the user’s face, making off-hand shooting difficult. Most critically, however, the QBZ-95 was a product of a different doctrinal era.

The most significant physical feature of the QBZ-191, and the clearest indicator of the new doctrine, is its full-length, monolithic MIL-STD-1913 Picatinny rail along the top of the receiver and handguard. The QBZ-95 featured only a short, proprietary dovetail mount that was poorly suited for mounting anything other than a single, specific optic. The adoption of the universal Picatinny standard is a revolutionary step for the PLA. This rail provides ample space for the flexible mounting of a suite of accessories in various combinations—for example, a variable-power magnified optic paired with a clip-on thermal or night vision sight, a laser aiming module, and backup iron sights. This physical change is the direct consequence of a profound doctrinal evolution. The PLA no longer views advanced optics as specialist equipment for designated marksmen but as standard-issue equipment for the common infantryman. This signals a massive parallel investment in the domestic electro-optics industry and a fundamental shift in training methodology. The PLA is moving from an “iron sights first” mentality to an “optics first” doctrine, aiming to increase the effective engagement range, first-hit probability, and all-weather, day/night fighting capability of every soldier. This, in turn, enhances small-unit lethality, situational awareness, and autonomy on the battlefield.

Ammunition: The DBP-191 5.8x42mm Cartridge

The development of the QBZ-191 rifle is inextricably linked to the simultaneous development of a new generation of ammunition: the DBP-191 5.8x42mm cartridge. The weapon and the cartridge were designed as a single, integrated system, with each component optimized to enhance the performance of the other. This holistic approach is a hallmark of a mature and sophisticated research and development process.

The original 5.8x42mm cartridge, DBP-87, was developed in the 1980s and was a contemporary of the 5.56x45mm NATO and 5.45x39mm Soviet rounds. While adequate for its time, it and its successor, the DBP-10, lacked the performance of modern intermediate cartridges, particularly at extended ranges. The DBP-191 was specifically designed to overcome these deficiencies. It features a heavier, longer, and more streamlined projectile with a superior ballistic coefficient. This results in a flatter trajectory, reduced wind drift, and greater retained energy at medium and long ranges. The projectile construction includes a hardened steel core for improved penetration against body armor and light barriers.

In weapons design, the internal and external ballistics of the cartridge are the foundational elements that dictate critical design parameters of the rifle, including barrel length, rifling twist rate, gas system tuning, and the practical effective range of the platform. The PLA’s ordnance establishment clearly identified a performance deficit in its existing 5.8mm ammunition and understood that a new rifle alone could not solve the problem. By developing a new, higher-performance round and then engineering a family of weapons optimized to fire it, they have achieved a synergistic leap in capability. The superior performance of the DBP-191 cartridge is precisely what enables the Designated Marksman Rifle variant of the family, the QBU-191, to be effective out to ranges of 600-800 meters and what gives the standard QBZ-191 rifle a tangible performance advantage over its predecessor.

System Variants

The QBZ-191 was designed from the outset as a modular family of weapons, sharing a common receiver and operating mechanism, to fulfill multiple battlefield roles.

  • QBZ-191 (191式自动步枪, 191 Shì Zìdòng Bùqiāng, Type 191 Automatic Rifle): This is the standard infantry rifle and the core of the family. It features a 14.5-inch (368mm) barrel, providing a good balance between ballistic performance and maneuverability. It is slated to become the most widely issued variant, systematically replacing the QBZ-95-1 in frontline PLAGF combined arms brigades and PLAN Marine Corps units.
  • QBZ-192 (192式短自动步枪, 192 Shì Duǎn Zìdòng Bùqiāng, Type 192 Short Automatic Rifle): This is the compact carbine variant, equipped with a shorter 10.5-inch (267mm) barrel. The reduced length makes it ideal for personnel operating in confined spaces, such as vehicle crews, special forces conducting close-quarters battle (CQB), and naval personnel aboard ships. It serves the same role as the American Mk 18 or the Russian AK-105.
  • QBU-191 (191式精确射手步枪, 191 Shì Jīngquè Shèshǒu Bùqiāng, Type 191 Precision Marksman Rifle): This is the Designated Marksman Rifle (DMR) variant of the family. It is designed to provide accurate semi-automatic fire at the squad level beyond the effective range of standard assault rifles. It achieves this through a longer, heavier, free-floated barrel for enhanced accuracy and consistency, an improved trigger mechanism, and the standard issuance of a new 3-8.6x variable power magnified optic, the QMK-191. The QBU-191 is specifically designed to leverage the superior long-range ballistic performance of the new DBP-191 ammunition, enabling effective engagements out to 600-800 meters.
  • QJB-201 (201式班用机枪, 201 Shì Bānyòng Jīqiāng, Type 201 Squad Machine Gun): While not officially designated as part of the ‘191’ family, the QJB-201 is a new-generation 5.8x42mm light machine gun whose development was concurrent with and complementary to the QBZ-191 program. It is designed to replace the magazine-fed QJB-95-1 Squad Automatic Weapon. The most significant improvement is its switch to a belt-feed mechanism, allowing for a much higher volume of sustained suppressive fire. This addresses a major deficiency of its predecessor and provides PLA squads with a true light machine gun capability comparable to the FN Minimi/M249.

III. Prevalent Service Rifles and Carbines: The QBZ-95 Era

Despite the rollout of the QBZ-191, the incumbent QBZ-95 family of bullpup rifles remains the most numerous and widely distributed weapon system in the PLA’s inventory. Its vast numbers ensure that it will continue to see service for at least another decade, particularly with second-line units, reserves, and the People’s Armed Police, as the PLA undertakes its phased modernization.

QBZ-95/95-1 Family (95/95-1式枪族, 95/95-1 Shì Qiāngzú, Type 95/95-1 Gun Family)

Introduced in the late 1990s to coincide with the handover of Hong Kong, the QBZ-95 was a radical departure for the PLA. It was a gas-operated, bullpup rifle chambered for the then-new, domestically developed 5.8x42mm DBP-87 cartridge. This move represented a major technological leap, transitioning the PLA from its lineage of 7.62x39mm Kalashnikov-derived platforms (the Type 56 and Type 81) to a proprietary design utilizing a modern small-caliber, high-velocity round. The bullpup configuration, placing the action and magazine behind the trigger, allowed for a full-length 18.2-inch barrel in an overall package shorter than many carbines, a significant advantage for mechanized infantry.

Around 2010, an upgraded version, the QBZ-95-1, was introduced. This model addressed some of the original’s ergonomic flaws, most notably by relocating the safety selector from the rear of the stock to a more accessible position above the pistol grip. It also featured a heavier barrel and was chambered for the improved DBP-10 ammunition, which used a heavier projectile for better long-range performance.

The rapid and expensive decision by the PLA to abandon the entire bullpup concept after only one major upgrade suggests that the perceived flaws of the QBZ-95 were not minor but fundamental to its design. The platform’s legacy is therefore complex. It should not be viewed simply as a failed rifle, but rather as a crucial and necessary transitional system. The QBZ-95 project achieved its primary strategic objective: it forced the Chinese defense industry to master modern rifle manufacturing techniques, including the use of engineering polymers, and successfully introduced a proprietary small-caliber cartridge, breaking the PLA’s long-standing dependence on Soviet calibers and designs. In this, it was an unqualified success. Its secondary goal, to be a world-class fighting rifle, was only partially met. The institutional flexibility demonstrated by the PLA and Norinco in critically evaluating their own flagship product and making the bold decision to replace it entirely is a sign of a mature and pragmatic military-industrial complex, one that prioritizes combat capability over institutional prestige.

  • Variants in Service:
  • QBZ-95/95-1: The standard rifle variant. For two decades, it has been the primary individual weapon of the PLAGF, PAP, and other branches.
  • QBZ-95B/95B-1: A compact carbine version with a significantly shorter barrel. It has been used by special forces, vehicle crews, and naval boarding parties, but its utility was hampered by a severe muzzle blast, flash, and a significant reduction in projectile velocity and effective range.
  • QJB-95/95-1: The Squad Automatic Weapon (SAW) variant. It is essentially a heavy-barreled version of the rifle, designed to be fed from a 75-round drum magazine. While providing more sustained fire capability than a standard rifle, it is not a true light machine gun. It is prone to overheating during prolonged firing and lacks the advantages of a quick-change barrel or a belt-feed system.

Legacy Systems in Reserve/Second-Line Service

The Type 81 (81式自动步枪, 81 Shì Zìdòng Bùqiāng) rifle, a 7.62x39mm weapon system, continues to serve with reserve formations, militia units, and some border defense forces. The Type 81, while visually resembling the Kalashnikov, is a distinct design featuring a short-stroke gas piston system (unlike the AK’s long-stroke piston), which contributed to its improved accuracy over the Type 56 (a direct Chinese copy of the AK-47). It is a robust, reliable, and simple weapon that remains effective for its intended role.

Tyoe 81 Rifle. By Tyg728 – Own work, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=114962053

The continued presence of the Type 81 and the gradual displacement of the QBZ-95 is not an indication of logistical failure or economic hardship, but rather the product of a deliberate and cost-effective strategy of tiered modernization. Equipping the entirety of China’s massive armed forces—including millions of active duty personnel, PAP, and reservists—with the latest QBZ-191 system simultaneously is financially prohibitive and logistically unfeasible. Instead, the PLA employs a cascading procurement model. New QBZ-191 systems are fielded to high-readiness, frontline combat brigades. Their displaced QBZ-95-1 rifles are then refurbished and re-issued to second-line units, garrison troops, or the PAP. This pushes older but still serviceable weapons like the Type 81 further down the chain to reserve and militia units. This methodical approach maximizes the overall combat power of the force structure by ensuring that even lower-tier units receive upgraded equipment, all while managing the immense cost of a full-scale re-equipment program.

IV. Precision Fire Systems: From Marksman to Anti-Materiel

The PLA has made significant strides in developing and fielding a range of precision fire systems, recognizing the critical importance of engaging targets accurately at ranges beyond that of a standard service rifle. This capability area has evolved from rudimentary sniper rifles to a sophisticated ecosystem of designated marksman, bolt-action sniper, and heavy anti-materiel systems.

Designated Marksman Rifles (DMRs)

  • QBU-191: As detailed previously, the QBU-191 is the PLA’s newest DMR and represents the future of squad-level precision fire. It is being fielded as an integral part of the new modular weapon family.
  • QBU-88 (Type 88) (88式狙击步枪, 88 Shì Jūjí Bùqiāng, Type 88 Sniper Rifle): The QBU-88 was the PLA’s first purpose-built DMR, introduced alongside the QBZ-95 family. It is a semi-automatic, bullpup rifle chambered for the 5.8x42mm “heavy round” (a predecessor to the DBP-10). While officially designated a “sniper rifle,” its performance characteristics and intended role place it squarely in the DMR category. For its time, the QBU-88 was a revolutionary concept for the PLA, introducing the principle of a squad-level precision rifle. However, it is based on the QBZ-95 action and suffers from many of the same limitations, including poor ergonomics, a heavy trigger, and inadequate provisions for mounting modern optics. Its accuracy is considered adequate for its role but is surpassed by more modern designs. The QBU-88 is being actively replaced by the superior QBU-191.

Bolt-Action Sniper Rifles

  • CS/LR4 (and variants): The CS/LR4 represents a significant departure in PLA small arms procurement philosophy. It is a modern, high-precision bolt-action sniper rifle system chambered in 7.62x51mm NATO. This system, used by PLAGF special operations forces and elite PAP counter-terrorism units like the Snow Leopard Commando Unit, is a direct equivalent to Western precision rifles like the Remington M24 or Accuracy International Arctic Warfare.
One of the Norinco NSG-1 / CS-LR4 Sniper Rifles that China donated to the Philippine armed forces last June 2017. Photo taken during the Philippine Army’s 121st Anniversary Exhibit at the Bonifacio High Street Activity Center. By Rhk111 – Own work, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=67238847

The adoption of a foreign, NATO-standard caliber for a premier sniper rifle is a highly revealing decision. It breaks with the PLA’s long-standing doctrine of logistical self-sufficiency and reliance on domestic calibers. This choice was not made lightly. It indicates that the performance requirements for high-precision, long-range sniping—specifically, consistent sub-Minute of Angle (MOA) accuracy—were so stringent that existing domestic cartridges, such as the 5.8mm or the legacy 7.62x54mmR, were deemed insufficient. The PLA’s ordnance experts and procurement officers made a pragmatic choice, recognizing that the global commercial and military ecosystem for high-quality, match-grade 7.62x51mm ammunition was far more mature and offered superior performance compared to any domestic equivalent. This prioritization of raw capability over logistical purity for a specialized, high-value role suggests a sophisticated, two-tiered approach to ammunition philosophy. For general-issue weapons, domestic calibers are paramount for strategic independence during a major conflict. For elite, special-purpose units where mission success hinges on the highest possible performance, they will adopt the best available global standard.

Anti-Materiel Rifles

  • QBU-10 (10式大口径狙击步枪, 10 Shì Dàkǒujìng Jūjí Bùqiāng, Type 10 Large-Caliber Sniper Rifle): The QBU-10 is a semi-automatic anti-materiel rifle chambered in the powerful 12.7x108mm cartridge, the Eastern Bloc equivalent of the.50 BMG. This is a heavy, team-served weapon, typically deployed on a tripod or mounted on a vehicle. Its purpose is to engage and destroy high-value materiel targets at very long ranges (up to 1,500 meters), such as light armored vehicles, radar and communications equipment, parked aircraft, and enemy personnel behind substantial cover. A key feature of the QBU-10 system is its sophisticated, integrated day/night optic, which reportedly incorporates a laser rangefinder and a ballistic computer to aid the gunner in achieving first-round hits at extreme distances. This weapon provides PLA infantry units with an organic capability to defeat targets that would otherwise require dedicated anti-tank guided missiles or heavier fire support, making it a key asset for long-range interdiction and battlefield dominance.
A Chinese marine holding a QBU-10 in a Ghillie Suit. By Mil.ru, CC BY 4.0, https://commons.wikimedia.org/w/index.php?curid=109882081

V. Sidearms and Close-Quarters Systems

This category includes weapons designed for personal defense, urban combat, and special operations, where compactness, rate of fire, and specialized capabilities like sound suppression are paramount. Recent developments in this area show a clear trend towards standardization on globally accepted calibers.

Pistols (手枪, Shǒuqiāng)

  • QSZ-92 (92式手枪, 92 Shì Shǒuqiāng, Type 92 Pistol): The QSZ-92 has been the standard service pistol for the PLA and PAP for over two decades. It is a polymer-framed, short-recoil-operated pistol. Uniquely, it was produced in two distinct caliber variants. The primary military version fires the proprietary 5.8x21mm DAP-92 armor-piercing cartridge, issued to officers and combat troops. A second version, chambered in the ubiquitous 9x19mm Parabellum, was produced primarily for PAP units and for export. The 5.8mm version was designed with the specific doctrinal goal of defeating enemy body armor, a concept shared by the Western FN 5.7x28mm. However, like its Western counterparts, the small-caliber pistol round concept has been widely criticized for having questionable terminal ballistics and stopping power against unarmored targets compared to larger, heavier conventional pistol rounds.
QSZ92 Pistol. By Tyg728 – Own work, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=62580963
  • QSZ-193 (193式手枪, 193 Shì Shǒuqiāng, Type 193 Pistol): The QSZ-193 is a new, compact, striker-fired pistol that has been observed in service with PLAAF pilots and special forces units. Crucially, it is chambered in 9x19mm Parabellum. The emergence of this new 9mm pistol as the apparent next-generation sidearm for specialized roles effectively signals the end of the PLA’s two-decade experiment with the 5.8x21mm pistol cartridge. The decision to standardize on the globally dominant 9x19mm caliber for its new sidearm indicates that the PLA has reached the same conclusion as many Western militaries: modern 9mm ammunition, particularly with advanced hollow-point or controlled-expansion projectiles, offers a superior overall balance of terminal performance, magazine capacity, and controllability, while the perceived advantage of armor penetration from small-caliber pistol rounds is marginal in most real-world scenarios.

Submachine Guns (冲锋枪, Chōngfēngqiāng)

  • QCQ-171 (171式冲锋枪, 171 Shì Chōngfēngqiāng, Type 171 Submachine Gun): A modern, lightweight submachine gun (SMG) chambered in 9x19mm, the QCQ-171 is being issued to special operations forces and other units with a specific requirement for a compact, high-rate-of-fire weapon for close-quarters combat. It features a telescopic stock, accessory rails for optics and lights, and appears to be a direct competitor to Western designs like the Heckler & Koch MP5 or B&T APC9.
  • QCW-05 (05式轻型冲锋枪, 05 Shì Qīngxíng Chōngfēngqiāng, Type 05 Light Submachine Gun): The QCW-05 is a unique bullpup SMG chambered in the proprietary 5.8x21mm pistol cartridge. Its most notable feature is its large, integral sound suppressor, which makes the weapon very quiet. It is fed from a 50-round, four-column “quad-stack” magazine located in the pistol grip. While effective in its niche role for stealth operations, it suffers from the same ballistic limitations as the QSZ-92 pistol in the same caliber. Its use is primarily confined to PLA special forces and PAP counter-terrorism units. The fielding of the 9mm QCQ-171 in many frontline SOF roles further reinforces the PLA’s strategic move away from the 5.8x21mm cartridge ecosystem.
QCW-5 Bullpup Submachine Gun. By Tyg728 – Own work, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=62566026

VI. Crew-Served and Support Weapons

These weapons provide sustained fire support at the platoon and company level, giving infantry units the ability to suppress and destroy enemy positions and light vehicles. This category includes machine guns and automatic grenade launchers.

Machine Guns (机枪, Jīqiāng)

  • QJY-88 (88式通用机枪, 88 Shì Tōngyòng Jīqiāng, Type 88 General Purpose Machine Gun): The QJY-88 was developed as the PLA’s first true General Purpose Machine Gun (GPMG), intended to be fired from a bipod in the light machine gun role or from a tripod in the sustained-fire medium machine gun role. It was designed to replace the aging 7.62x54mmR Type 67 machine gun. However, in a highly unusual design choice, the QJY-88 was chambered in the 5.8x42mm “heavy round”. This decision represents a rare doctrinal mismatch in PLA weapon development. The GPMG concept, epitomized by the German MG3, the American M240, and the Russian PKM, is predicated on the use of a full-power rifle cartridge (e.g., 7.62x51mm or 7.62x54mmR). These powerful rounds are essential for providing effective, long-range suppressive fire and for penetrating cover, light vehicles, and field fortifications. By chambering their GPMG in an intermediate cartridge, even a heavy-for-caliber one, the PLA created a weapon that lacked a significant performance advantage in range and barrier penetration over a modern squad automatic weapon, yet was heavier and more cumbersome. The weapon has been widely criticized as being underpowered for its intended role, and the notable lack of a clear successor suggests that the PLA is re-evaluating its entire machine gun doctrine.
  • QJZ-89 (89式重机枪, 89 Shì Zhòng Jīqiāng, Type 89 Heavy Machine Gun): The QJZ-89 is the PLA’s standard heavy machine gun (HMG), chambered in 12.7x108mm. Its most remarkable feature is its exceptionally low weight. At approximately 26 kg (57 lbs) for the gun and tripod combined, it is the lightest HMG in service anywhere in the world, weighing significantly less than the American M2 Browning or the Russian Kord. This light weight is achieved through the use of advanced alloys and a hybrid direct-impingement/short-stroke piston operating system. This makes it more man-portable than its peers, allowing infantry units to reposition it on the battlefield more rapidly. It is used in both tripod-mounted infantry support roles and as a primary or secondary armament on a wide variety of PLA vehicles.

Automatic Grenade Launchers (榴弹发射器, Liúdàn Fāshèqì)

  • QLZ-87/11 (87/11式榴弹发射器, 87/11 Shì Liúdàn Fāshèqì, Type 87/11 Grenade Launcher): The QLZ-87 is a 35mm automatic grenade launcher (AGL) that provides devastating anti-personnel and light anti-materiel fire support for infantry units. It is a selectively-fired weapon that can be fired from an integral bipod in a direct-fire role or from a tripod for indirect fire. It is fed from 6- or 15-round drum magazines. The newer QLZ-11 is a lightened and improved version of the design. The 35mm grenades provide a significant area-effect capability, allowing a small infantry unit to suppress and neutralize enemy troops in trenches, behind cover, or in the open at ranges out to 1,700 meters.

VII. Armament by Service Branch: A Comparative Analysis

While there is increasing standardization around the new QBZ-191 family, the specific small arms loadouts vary between the different branches of China’s armed forces, reflecting their unique operational requirements and mission sets.

PLA Ground Force (PLAGF) (中国人民解放军陆军, Zhōngguó Rénmín Jiěfàngjūn Lùjūn)

  • Standard Infantry: The PLAGF’s frontline combined arms brigades are at the forefront of the modernization effort. Standard infantry squads are actively transitioning from the QBZ-95-1 to the new QBZ-191 as their primary service rifle. A typical squad will be augmented with the QBU-191 for designated marksman duties and the new belt-fed QJB-201 as the squad’s light machine gun. Officers and vehicle crews are typically issued the QSZ-92 pistol for personal defense. Second-line and garrison units will continue to operate the QBZ-95-1 for the foreseeable future.
  • Special Operations Forces (SOF): PLAGF special forces are among the first to receive the full suite of new-generation weapons. They are likely to be fully equipped with the compact QBZ-192 carbine for its maneuverability in direct action missions. Their specialized inventory also includes the high-precision CS/LR4 bolt-action sniper rifle for long-range engagements and the new 9mm QCQ-171 SMG for suppressed, close-quarters operations.

PLA Navy (PLAN) (中国人民解放军海军, Zhōngguó Rénmín Jiěfàngjūn Hǎijūn)

  • Marines (海军陆战队, Hǎijūn Lùzhànduì): As an elite expeditionary force analogous to the USMC, the PLAN Marine Corps is receiving the QBZ-191 family concurrently with the PLAGF’s frontline units. Given their focus on amphibious assault, littoral operations, and potential urban warfare scenarios, the compact QBZ-192 carbine is expected to be a common issue weapon alongside the standard QBZ-191 rifle.
  • Shipboard Personnel: For general security, anti-piracy, and visit, board, search, and seizure (VBSS) operations, compactness is the key driver of weapon selection. Personnel were historically armed with the QBZ-95B carbine, but are now likely transitioning to the superior QBZ-192 carbine. The QSZ-92 pistol remains the standard sidearm.

PLA Air Force (PLAAF) (中国人民解放军空军, Zhōngguó Rénmín Jiěfàngjūn Kōngjūn)

  • Base Security/Ground Personnel: PLAAF ground personnel, such as those in airfield security units, are typically equipped with standard infantry rifles. They currently operate the QBZ-95-1 and will likely be among the later recipients of the QBZ-191 as production ramps up.
  • Pilots: Aircrew are issued compact weapons for survival and self-defense in the event of an ejection over hostile territory. This role was historically filled by machine pistols like the Type 80, but is now transitioning to the new, more reliable, and compact QSZ-193 pistol in 9x19mm.

People’s Armed Police (PAP) (中国人民武装警察部队, Zhōngguó Rénmín Wǔzhuāng Jǐngchá Bùduì)

The PAP is a massive paramilitary force responsible for internal security, counter-terrorism, and border control. Its armament reflects this dual law enforcement and military role.

  • Internal Security Units: The vast majority of PAP units, tasked with roles like riot control and guarding critical infrastructure, widely use the QBZ-95-1 rifle and the QSZ-92 pistol (often the 9mm version).
  • Counter-Terrorism Units: Elite PAP units, such as the Beijing-based Snow Leopard Commando Unit and various regional special police units, maintain a diverse and highly specialized inventory. Their requirements overlap significantly with military SOF but with a greater emphasis on surgical urban operations. They utilize the CS/LR4 sniper rifle for precision hostage rescue shots, both the integrally suppressed 5.8mm QCW-05 and the new 9mm QCQ-171 SMGs for close-quarters battle, and specialized tactical shotguns like the QBS-09 (09式军用霰弹枪, 09 Shì Jūnyòng Xiàndànqiāng, Type 09 Military Shotgun).

China Coast Guard (CCG) (中国海警局, Zhōngguó Hǎijǐng Jú)

As a paramilitary maritime law enforcement agency, the CCG’s armament is more standardized and focused on its mission set. Boarding teams are typically equipped with compact weapons suitable for use on ships, primarily the QBZ-95B carbine and the QSZ-92 pistol. Their cutters and larger vessels are armed with deck-mounted heavy machine guns and autocannons.

VIII. Concluding Analysis: Industrial Capacity and Future Trajectory

The ongoing modernization of the PLA’s small arms inventory reveals several key strategic trends and provides a clear indication of the capabilities of China’s domestic defense industry. The trajectory points towards a force that is rapidly closing the technological and doctrinal gap with leading Western militaries at the level of the individual soldier.

The analysis synthesizes four dominant trends. First is the primacy of modularity and optics integration, exemplified by the QBZ-191’s conventional layout and full-length Picatinny rail. Second is the shift towards a holistic, systems-based design approach, where the rifle, cartridge (DBP-191), and optic (QMK-191) are developed concurrently as an optimized package. Third is the pragmatic adoption of international standards, such as the MIL-STD-1913 rail and the 9x19mm pistol caliber, when they offer a clear performance advantage over proprietary solutions. Fourth is the implementation of a deliberate, cost-effective, tiered modernization strategy that maximizes the combat power of the entire force structure during a prolonged transition period.

The development and mass production of the QBZ-191 family is a testament to the maturity of China’s state-owned defense industry, primarily represented by the corporate giant Norinco. It demonstrates a sophisticated capability for rapid, clean-sheet design, the use of modern materials and manufacturing methods (such as advanced polymers for furniture and aluminum forgings and extrusions for receivers), and the large-scale production and integration of complex electro-optics. The ability to identify the doctrinal shortcomings of a previous flagship system (QBZ-95) and execute a complete and rapid course correction speaks to an agile and capability-focused industrial base.

Looking forward, the full replacement of the QBZ-95 family in all frontline PLAGF and PLAN Marine Corps units is likely to be completed within the next 5-10 years. Future development will likely focus on addressing remaining gaps in the PLA’s small arms portfolio. A high-priority area will likely be the development of a new GPMG, probably chambered in a full-power cartridge, to rectify the doctrinal and performance shortcomings of the 5.8mm QJY-88. Furthermore, the PLA will almost certainly continue the trend of integrating “smart” technologies into the infantry weapon system, including networked sights that can share data, integrated command and control links, and other technologies that further embed the individual soldier into a digital battlefield network. The overall trajectory is clear: China is committed to equipping its infantry with small arms systems that are not merely sufficient, but are technologically on par with, and in some cases potentially superior to, those of any potential adversary.

IX. Appendix: Comprehensive Small Arms Summary Table

The following table provides a consolidated, at-a-glance reference for the primary small arms systems currently in service with the armed forces of the People’s Republic of China.

CategoryChinese Designation (Hanzi)Pinyin RomanizationU.S. English Name/TranslationManufacturerCaliberOperating PrincipleWeight (Unloaded)Overall LengthPrimary Users
Service Rifle191式自动步枪191 Shì Zìdòng BùqiāngType 191 Automatic RifleNorinco State Arsenals5.8x42mm DBP-191Short-stroke gas piston, rotating bolt~3.25 kg~950 mm (stock extended)PLAGF, PLAN Marines
Carbine192式短自动步枪192 Shì Duǎn Zìdòng BùqiāngType 192 Short Automatic RifleNorinco State Arsenals5.8x42mm DBP-191Short-stroke gas piston, rotating bolt~3.0 kg~810 mm (stock extended)SOF, Vehicle Crews, PLAN
Service Rifle95-1式自动步枪95-1 Shì Zìdòng BùqiāngType 95-1 Automatic RifleNorinco State Arsenals5.8x42mm DBP-10Short-stroke gas piston, rotating bolt3.25 kg745 mmPLAGF, PAP, PLAN, PLAAF
Legacy Rifle81式自动步枪81 Shì Zìdòng BùqiāngType 81 Automatic RifleNorinco State Arsenals7.62x39mmShort-stroke gas piston, rotating bolt3.4 kg955 mm (fixed stock)PLA Reserve, Militia
Pistol92式手枪92 Shì ShǒuqiāngType 92 PistolNorinco State Arsenals5.8x21mm / 9x19mmShort recoil, rotating barrel0.76 kg190 mmPLA, PAP
Pistol193式手枪193 Shì ShǒuqiāngType 193 PistolNorinco State Arsenals9x19mmShort recoil, striker-firedN/A (Compact)N/A (Compact)PLAAF Pilots, SOF
SMG171式冲锋枪171 Shì ChōngfēngqiāngType 171 Submachine GunNorinco State Arsenals9x19mmBlowback~2.8 kg~690 mm (stock extended)SOF, PAP
SMG05式轻型冲锋枪05 Shì Qīngxíng ChōngfēngqiāngType 05 Light Submachine GunNorinco State Arsenals5.8x21mmBlowback, integrally suppressed2.2 kg500 mmSOF, PAP
DMR191式精确射手步枪191 Shì Jīngquè Shèshǒu BùqiāngType 191 Precision Marksman RifleNorinco State Arsenals5.8x42mm DBP-191Short-stroke gas piston, rotating bolt~4.5 kg (est.)~1100 mm (est.)PLAGF, PLAN Marines
DMR88式狙击步枪88 Shì Jūjí BùqiāngType 88 Sniper RifleNorinco State Arsenals5.8x42mm (Heavy)Short-stroke gas piston, rotating bolt4.1 kg920 mmPLAGF, PAP
Sniper RifleCS/LR4CS/LR4CS/LR4 High-Precision Sniper RifleNorinco State Arsenals7.62x51mm NATOBolt-action6.5 kg1100 mmPLAGF SOF, PAP CTU
Anti-Materiel10式大口径狙击步枪10 Shì Dàkǒujìng Jūjí BùqiāngType 10 Large-Caliber Sniper RifleNorinco State Arsenals12.7x108mmGas-operated, semi-automatic13.3 kg1380 mmPLAGF
LMG201式班用机枪201 Shì Bānyòng JīqiāngType 201 Squad Machine GunNorinco State Arsenals5.8x42mm DBP-191Gas-operated, belt-fed< 5 kg (est.)N/APLAGF
SAW95-1式班用机枪95-1 Shì Bānyòng JīqiāngType 95-1 Squad Machine GunNorinco State Arsenals5.8x42mm DBP-10Short-stroke gas piston, rotating bolt3.95 kg840 mmPLAGF, PAP
GPMG88式通用机枪88 Shì Tōngyòng JīqiāngType 88 General Purpose Machine GunNorinco State Arsenals5.8x42mm (Heavy)Gas-operated, belt-fed11.8 kg (gun & bipod)1150 mmPLAGF
HMG89式重机枪89 Shì Zhòng JīqiāngType 89 Heavy Machine GunNorinco State Arsenals12.7x108mmGas-operated, belt-fed17.5 kg (gun only)1192 mmPLAGF
AGL87/11式榴弹发射器87/11 Shì Liúdàn FāshèqìType 87/11 Grenade LauncherNorinco State Arsenals35x32mmSRBlowback, semi/full auto12 kg (gun & bipod)970 mmPLAGF


If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly donate to help fund our continued report, please visit our donations page.


Convergence and Collision: A Comparative Analysis of U.S. and Chinese Military Philosophies in the 21st Century

The strategic competition between the United States and the People’s Republic of China is the defining geopolitical dynamic of the 21st century, and at its core lies a fundamental divergence in military philosophy, doctrine, and strategic posture. This report provides a comparative analysis of these competing military worldviews. The United States continues to operate under a philosophy of global power projection, enabled by a network of alliances and underpinned by a new doctrine of Joint All-Domain Operations (JADO) designed to achieve decision dominance through superior integration. In contrast, China’s military thought is rooted in a concept of “Active Defense,” a strategically defensive but operationally offensive posture designed to secure its regional periphery and deter outside intervention. This philosophy is operationalized through a doctrine of “Intelligentized Warfare” and “System Destruction,” which aims to paralyze a technologically superior adversary by attacking the network-centric systems that provide its strength.

These philosophies are not evolving in a vacuum; they are a direct response to one another, creating a dynamic of doctrinal competition. Where the U.S. seeks to build a resilient, integrated “kill web,” China seeks to develop the “assassin’s mace” capabilities to break it. Where the U.S. leverages a global network of allies, China pursues strategic self-reliance. This analysis reveals that while both powers converge on the belief that future warfare will be a contest of information and decision speed, their methods for achieving victory are starkly different, creating a complex and potentially volatile military balance.


Table 1: Comparative Matrix of U.S. and Chinese Military Philosophies

Capability/MindsetUnited StatesChinaAreas of SimilarityAreas of DifferenceKey Lessons
Overarching PhilosophyGlobal Power Projection: An expeditionary mindset focused on defending global interests far from home, maintaining access to the global commons, and supporting allies.1Active Defense: A strategically defensive posture focused on securing the national periphery, allowing for tactically and operationally offensive actions to deter or defeat intervention.3Both philosophies are designed to secure national interests and deter aggression, adapting to perceived threats.Geographic Scope: Global and expeditionary vs. Regional and counter-interventionist. Strategic Posture: Proactive and forward-deployed vs. Reactive and bastion-focused.U.S. power is inherently expeditionary, creating logistical vulnerabilities. China’s philosophy leverages geography as a strategic asset.
Core DoctrineJoint All-Domain Operations (JADO): Integration of effects across all domains (air, land, sea, space, cyber, EMS) to overwhelm an adversary’s decision-making cycle.5Intelligentized Warfare / System Destruction: Use of AI-enabled systems to attack an adversary’s C4ISR network, causing systemic collapse rather than attriting forces.7Both doctrines prioritize information superiority and decision speed, viewing the network as the central battlefield. Both are moving toward AI-enabled C2.Targeting Logic: U.S. targets adversary decision-making (paralysis). China targets the adversary’s system itself (collapse). Method: U.S. seeks integration (“kill web”). China seeks disintegration (“system destruction”).The central conflict is a doctrinal race: the U.S. builds an integrated network while China builds the tools to break it.
Geographic FocusGlobal: Postured to operate in multiple theaters simultaneously, with a significant focus on the Indo-Pacific and Europe.2Regional Periphery: Focused on the First and Second Island Chains, particularly scenarios involving Taiwan and the South China Sea.11Both view the Indo-Pacific as the primary theater of strategic competition.U.S. faces the “tyranny of distance” and must project power across vast oceans. China enjoys the “tyranny of proximity,” a home-field advantage.Geography remains a dominant factor. China’s A2/AD strategy is a direct exploitation of its geographic advantage.
Role of AlliancesCentral Pillar: A global network of formal treaty allies is integral to strategy, providing basing, legitimacy, and combat power.13Strategic Self-Reliance: Advocates “partnerships, not alliances,” avoiding binding mutual defense commitments to maintain strategic autonomy.16Both engage in military diplomacy and joint exercises with other nations.Nature of Commitment: U.S. has formal, binding defense treaties. China has pragmatic, non-binding partnerships.Alliances are a key U.S. asymmetry, providing mass but adding complexity. China’s approach provides speed but risks isolation.
Technological DriverNetwork-Centric “Kill Webs”: Focus on connecting any sensor to any shooter across all domains via JADC2 to create a resilient, integrated force.18Asymmetric “Assassin’s Mace”: Focus on developing niche, high-impact capabilities (e.g., ASBMs, hypersonics) to exploit specific U.S. vulnerabilities.20Both are heavily investing in AI, autonomy, cyber, and space capabilities as force multipliers.U.S. seeks to enhance its existing system through networking. China seeks to bypass and defeat the U.S. system with asymmetric weapons.Technology is not just about quality but about the strategic logic of its application.
Industrial ModelDistinct Defense Industrial Base: A largely separate ecosystem of specialized defense contractors, though with increasing ties to commercial tech.22Military-Civil Fusion (MCF): A national strategy to eliminate barriers between civilian and military R&D and industry, leveraging the entire national economy for military modernization.24Both recognize the need to leverage national technological and industrial power for military advantage.Integration Level: U.S. model is one of partnership between distinct sectors. China’s model is one of state-directed fusion.MCF presents a whole-of-nation challenge that blurs the lines between economic and military competition.
Theory of VictoryParalysis through Overwhelm: Present the adversary with so many simultaneous, multi-domain dilemmas that their ability to command and control their forces is paralyzed.5Disintegration through Disruption: Degrade and destroy the adversary’s C4ISR systems, severing the links between sensors and shooters, causing their warfighting system to collapse.7Both aim to win decisively and quickly by targeting the adversary’s cognitive and command functions, not just their physical forces.U.S. theory is based on the resilience of its own network. China’s theory is based on the fragility of the adversary’s network.Victory is increasingly defined by disruption, not attrition.
Civil-Military RelationsStrict Civilian Control: The military is subordinate to elected civilian leadership (President, Congress) as mandated by the Constitution.27Party-Army Fusion: The People’s Liberation Army (PLA) is the armed wing of the Chinese Communist Party (CCP), not the state. Its ultimate loyalty is to the Party.3In both, the military is an instrument of national policy.Source of Authority: U.S. military serves the Constitution and the nation. The PLA serves the CCP.This fundamental difference shapes strategic objectives, risk tolerance, and the ultimate purpose for which military force is used.

The 10 Key Lessons Learned

  1. The central battlefield of the 21st century is the network. Both the United States and China have concluded that victory in modern warfare hinges on achieving “decision dominance” by processing information and executing commands faster and more effectively than the adversary.
  2. U.S. military power is fundamentally expeditionary and alliance-dependent. Its ability to project force globally is its greatest strength, but the long logistical chains and complex political coordination required are also its most critical vulnerabilities.
  3. China’s military philosophy is fundamentally regional and counter-interventionist. It is designed to leverage geography and asymmetric technology to create a formidable bastion within the Indo-Pacific, making it prohibitively costly for the U.S. to intervene in matters China defines as its core interests.
  4. The U.S. and China are engaged in a direct doctrinal race. The U.S. is building integrated “kill webs” (JADO) to connect all its assets, while China is simultaneously developing “system destruction” capabilities specifically designed to find and break the links in those webs.
  5. The U.S. relies on a distinct, highly advanced defense industry, while China’s Military-Civil Fusion (MCF) strategy presents a whole-of-nation challenge. MCF blurs the lines between economic and military competition, turning the entire global technology ecosystem into a contested space.
  6. Alliances are a defining asymmetry. The U.S. fights as a coalition, gaining immense capability and legitimacy at the cost of operational complexity and slower decision-making. China fights alone, gaining speed and unity of command at the cost of strategic isolation.
  7. The character of conflict is shifting from attrition to disruption. Victory may be defined not by destroying the most enemy platforms, but by paralyzing an adversary’s ability to command them, causing a systemic collapse.
  8. Geography remains paramount. The United States faces the “tyranny of distance” in any potential Pacific conflict, while China enjoys the “tyranny of proximity”—a home-field advantage that its Anti-Access/Area Denial (A2/AD) strategy is built to exploit.
  9. The PLA’s modernization is a reactive process. Much of its doctrinal and technological development has been shaped by decades of meticulously studying U.S. military operations to identify and build capabilities to exploit perceived American weaknesses.
  10. Both powers believe emerging technologies like AI are revolutionary. However, China’s state-directed, fused civil-military approach aims to “leapfrog” U.S. capabilities, while the United States seeks to integrate these technologies to enhance its existing joint force structure and operational concepts.

Part I: The American Way of War: Global Expeditionary Power and All-Domain Integration

The military philosophy of the United States is intrinsically linked to its status as a global power with interests that span the globe. Its military is not postured primarily for homeland defense but as an expeditionary force designed to project power, deter aggression, and defend national interests far from its own shores. This philosophy has evolved from the Cold War’s containment strategy to a modern doctrine of integrated, all-domain operations designed to maintain a competitive edge in an era of renewed great power competition.

The Philosophy of Global Power Projection

The foundational strategic mindset of the U.S. military is that of a global power with global interests.2 Its economic prosperity depends on global trade, its security is tied to a network of international allies, and its influence is challenged by competitors in key regions worldwide. Consequently, its military is tasked with protecting the nation’s interests on a correspondingly global scale, including safeguarding the freedom to use the global commons—the sea, air, space, and cyberspace domains.2 This mandate necessitates a force capable of power projection, which the U.S. Department of Defense defines as the “ability of a nation to apply all or some of its elements of national power—political, economic, informational, or military—to rapidly and effectively deploy and sustain forces in and from multiple dispersed locations to respond to crises”.1

This philosophy is operationalized through a combination of strategic capabilities. At its heart is a reliance on expeditionary forces that can be deployed from bases within the United States and sustained over vast distances.29 This requires immense strategic mobility, including airlift and sealift capabilities, to move troops and equipment to distant theaters.1 To reduce deployment times, this expeditionary posture is augmented by a network of forward bases and prepositioned stocks of equipment at strategic locations around the world.1 This forward presence serves not only a logistical purpose but also a political one, demonstrating U.S. commitment and acting as a deterrent to potential aggressors.30

Crucially, this global posture is built upon a vast and deeply integrated network of alliances. Unlike the temporary arrangements that have characterized much of history, the U.S. network of formal treaty allies is treated as a permanent and indispensable operational platform.15 Allies share the burden of power projection, provide critical basing and overflight rights, and contribute their own military forces to coalition operations.1 This approach was historically shaped by a force-sizing construct intended to handle two “nearly simultaneous major regional conflicts,” a standard that, while no longer official doctrine, continues to inform the scale and ambition of the U.S. force structure.2 Russian military analysis acknowledges this unique characteristic, noting that “the U.S. military has a worldwide presence and can project combat power throughout the globe,” in stark contrast to Russia’s own regionally focused military.10

This reliance on global power projection, however, creates a profound strategic paradox. The very capability that underpins America’s superpower status—its global reach—is simultaneously the source of its greatest logistical vulnerability. The need to deploy and, critically, sustain forces across thousands of miles of ocean and air creates long and potentially exposed supply lines.1 An adversary focused on regional defense can concentrate its efforts on disrupting this logistical chain, preventing the U.S. from bringing its full military might to bear. This dynamic has not been lost on U.S. competitors and forms the central challenge that its modern military doctrine seeks to overcome.

The Doctrine of Joint All-Domain Operations (JADO)

In response to the reemergence of great power competition and the erosion of its traditional military advantages, the United States has developed a new operational concept: Joint All-Domain Operations (JADO). This doctrine represents a fundamental rethinking of how to orchestrate military power in a highly contested, technologically advanced battlespace where adversaries can challenge U.S. forces across every warfighting domain.5 JADO is the U.S. military’s answer to the proliferation of advanced technologies and the development of sophisticated Anti-Access/Area Denial (A2/AD) threats by competitors like China.5

The core principle of JADO is the “convergence of effects,” which involves synchronizing kinetic (e.g., missiles) and non-kinetic (e.g., cyber attacks) capabilities across the domains of air, land, maritime, cyberspace, and space, as well as the electromagnetic spectrum.5 The goal is to present an adversary with multiple, simultaneous dilemmas at a tempo that complicates or negates their response, enabling U.S. forces to operate inside the adversary’s decision-making cycle.5 This approach is “objective-centric and domain-agnostic,” meaning it focuses on achieving a desired outcome using the most efficient and effective tools available, regardless of which military service owns the asset.6 For example, an air operation might be enabled by a preceding cyber operation that disables enemy air defense communications.6

Enabling this complex orchestration is the concept of Joint All-Domain Command and Control (JADC2). JADC2 is the technological and procedural backbone of JADO, designed to create a unified network that connects sensors from all military branches to all “shooters” or effectors.18 The goal is to turn the vast amounts of data collected from disparate sources into actionable intelligence, allowing commanders to “sense, make sense, and act” with a speed and coherence that outpaces the enemy.5 This is a direct application of Colonel John Boyd’s “OODA loop” (Observe, Orient, Decide, Act) theory to 21st-century warfare, where victory is achieved by manipulating the tempo of operations to generate confusion and paralysis in the adversary.5

Successfully implementing JADO requires a “paradigm shift” in military planning and execution. It demands that commanders consider all domains from the very beginning of the planning process, moving away from the traditional, stovepiped approach where each service plans its operations in its primary domain before attempting to deconflict and integrate them later.5 Furthermore, given the U.S. reliance on coalition warfare, JADO explicitly incorporates the challenge of operating in a combined environment with allies, whose capabilities and procedures must be integrated into the all-domain framework.31

The development of JADO is an implicit acknowledgment that the era of guaranteed U.S. domain dominance is over. Past doctrines, such as AirLand Battle, were predicated on the assumption that the U.S. could achieve air superiority, which would then create the conditions for freedom of maneuver on the ground.29 JADO, by contrast, starts from the premise that adversaries can now contest every domain simultaneously.5 Therefore, the new strategic objective is not necessarily to achieve total control of any single domain, but rather to achieve “decision dominance.” This is accomplished by using temporary or localized advantages in one domain to create decisive effects in another, ultimately paralyzing the adversary’s ability to command its forces. It marks a subtle but profound shift from a strategy of annihilation to a strategy of systemic paralysis.

The Engine of Dominance: The U.S. Defense-Industrial Ecosystem

The U.S. military’s technological superiority is sustained by a vast and sophisticated defense-industrial ecosystem. This ecosystem operates under the principle of strict civilian control, a cornerstone of American governance enshrined in the Constitution. The President acts as Commander-in-Chief, while Congress holds the power to declare war and, crucially, to raise, support, and fund the armed forces.22 This creates a clear, formal separation between the Department of Defense and the largely private-sector defense industry that equips it.23

The priorities of this industrial engine are guided by the National Defense Strategy, which explicitly identifies China as the “pacing challenge”.34 The Fiscal Year 2025 budget request reflects this focus, prioritizing investments in modernization to meet 21st-century threats.35 Key modernization priorities are directly aligned with the requirements of JADO and great power competition. These include developing and fielding long-range precision fires, advanced air and missile defense systems, cyber and electronic warfare capabilities, AI-driven command and control systems, and a new generation of unmanned and autonomous platforms.36

Concrete examples of this strategic pivot are evident across the services. The U.S. Army’s 2024 force structure transformation is a prime case, divesting legacy systems designed for counterinsurgency while creating new, high-tech formations such as Multi-Domain Task Forces (MDTFs) built to deliver long-range kinetic and non-kinetic effects.39 Similarly, the U.S. Air Force is investing heavily in its Next Generation Air Dominance (NGAD) family of systems, Collaborative Combat Aircraft (CCA), and the modernization of its nuclear triad with the B-21 Raider bomber and the Sentinel ICBM, all aimed at maintaining strategic superiority over a peer adversary.40

However, this powerful industrial ecosystem faces a significant challenge. The U.S. defense acquisition system has been optimized for decades to produce small numbers of exquisite, technologically complex, and extremely expensive platforms like aircraft carriers and stealth fighters. While these systems remain critical, the emerging character of modern warfare, as observed in conflicts like the war in Ukraine, increasingly demands mass, speed, and affordability—particularly in areas like attritable drones and loitering munitions. Directives to “accelerate delivery of war winning capabilities,” “eliminate wasteful spending,” and “reform the acquisition process” indicate a recognition that the current system is often too slow and inefficient to keep pace with the threat.37 This creates a fundamental tension: the established industrial base excels at large, multi-decade programs, but the future battlefield may be dominated by the rapid, iterative development of cheaper, more numerous, and potentially disposable systems. The U.S. is attempting to pivot, but its deeply entrenched industrial and bureaucratic structures present a formidable hurdle to this transformation.

Part II: The Chinese Way of War: Regional Bastion and System Confrontation

China’s military philosophy is a product of its unique history, political ideology, and strategic circumstances. It has evolved from a continental, revolutionary mindset into a sophisticated, technologically driven approach aimed at securing its regional interests and challenging the post-Cold War, U.S.-led order. Its core tenets are designed to counter a more powerful, expeditionary adversary by leveraging geography, asymmetric technology, and a whole-of-nation approach to military modernization.

The Philosophy of “Active Defense”

The cornerstone of the People’s Liberation Army’s (PLA) strategic thought is “Active Defense” (积极防御, jījí fángyù). This is not a modern invention but a long-standing concept with roots in the revolutionary warfare of the Chinese Communist Party (CCP), first articulated by Mao Zedong as early as 1935.43 The philosophy is a deliberate paradox: it maintains a strategically defensive posture, asserting that China will not be the aggressor, while simultaneously authorizing tactically and operationally offensive actions to defeat an attacking enemy.3 It is a strategy of counter-attack, designed to seize the initiative from an opponent who strikes first.

This philosophy has not been static. The PLA has issued nine major strategic guidelines since 1949, with three representing fundamental shifts in direction.43 The most significant of these occurred in 1993, a direct reaction to two world-changing events: the collapse of the Soviet Union, which removed the primary land threat to China’s north, and the stunning display of U.S. technological prowess in the First Gulf War.3 These events convinced PLA planners that their traditional strategy of “luring the enemy in deep” to swallow an invader in a protracted “People’s War” was obsolete. The new imperative was to win “local wars under high-technology conditions” by fighting a forward defense along China’s periphery, keeping any conflict far from its vital economic and political centers.3

Today, this philosophy is inextricably linked to President Xi Jinping’s overarching national goal of the “great rejuvenation of the Chinese nation”.3 Achieving this “Chinese Dream” requires a powerful military capable of protecting China’s sovereignty, securing its expanding overseas interests, and, crucially, preventing a repeat of the “century of humiliation” when foreign powers intervened in and dominated China.4 Active Defense, in its modern form, is therefore the military expression of this national ambition: a strategy to create a regional bastion so formidable that it deters intervention in what China considers its internal affairs, most notably Taiwan.17 It is a patient, long-term strategy that prioritizes political objectives, seeks to win without fighting where possible, but prepares to win quickly and decisively if conflict becomes unavoidable.

The Doctrine of “Intelligentized Warfare” and System Destruction

The modern operational expression of Active Defense is a doctrine centered on information, technology, and systemic disruption. The PLA’s modernization has progressed through distinct but overlapping phases: from mechanization (building a modern force of tanks, ships, and planes) to informatization (networking those platforms) and now to intelligentization (integrating artificial intelligence, big data, and autonomous systems into every aspect of warfare).8 This final phase, which China believes is the next revolution in military affairs, is intended to allow the PLA to “leapfrog” its competitors.9

The central warfighting concept within this framework is “system destruction warfare” (体系破击战, tǐxì pòjī zhàn). This doctrine, developed from years of studying the U.S. military’s network-centric approach, posits that a modern, technologically advanced military is a highly integrated “system of systems”.9 Its greatest strength—the network that connects sensors, command nodes, and shooters—is also its greatest vulnerability.7 Therefore, victory is achieved not by destroying enemy platforms in a battle of attrition, but by attacking the C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance) architecture that enables the system to function. The objective is to sever the links, blind the sensors, and jam the communications, causing the adversary’s entire warfighting system to collapse into a collection of isolated, ineffective parts.7

To execute this doctrine, the PLA has invested heavily in asymmetric “assassin’s mace” (杀手锏, shāshǒujiǎn) capabilities—niche, high-impact weapons designed to exploit specific vulnerabilities of a superior foe.21 The most prominent examples are its families of anti-ship ballistic missiles (ASBMs), such as the DF-21D and DF-26, and its development of hypersonic weapons.11 These weapons are designed to hold high-value U.S. assets, particularly aircraft carriers and major forward bases like Guam, at risk from hundreds or even thousands of miles away.11 This doctrine of systemic fragility is a direct counter to the U.S. doctrine of network-centric integration. A PLA campaign would likely commence not with a direct assault on U.S. forces, but with a multi-domain barrage of cyber attacks, electronic warfare, anti-satellite weapons, and long-range missile strikes aimed at blinding, deafening, and decapitating the U.S. military before the main battle is joined.

The Engine of Modernization: Military-Civil Fusion (MCF)

Underpinning the PLA’s rapid technological advancement is a unique national strategy known as Military-Civil Fusion (MCF, 军民融合, jūnmín rónghé). Personally overseen by Xi Jinping, MCF is an aggressive, whole-of-government effort to build a “world-class military” by 2049.24 Its core objective is to systematically eliminate the barriers between China’s civilian research and commercial sectors and its military and defense industrial sectors. The goal is to ensure that any new innovation, whether developed in a state lab, a private company, or a university, simultaneously advances both economic and military development.24

MCF targets key dual-use technologies that are seen as driving the future of warfare: artificial intelligence, quantum computing, big data, semiconductors, 5G, and aerospace technology.24 The Chinese Communist Party implements this strategy through a wide range of licit and illicit means. These include direct state investment in private industries, global talent recruitment programs, directing academic and research collaboration toward military ends, and leveraging intelligence gathering, forced technology transfer, and outright theft to acquire foreign technology.24 The strategy explicitly exploits the open and transparent nature of the global research enterprise to bolster the PLA’s capabilities, often without the knowledge or consent of foreign partners.51

Military-Civil Fusion is far more than a simple defense procurement strategy; it represents a fundamental reconception of national power. It treats technological prowess, economic strength, and military might not as separate pillars of statecraft, but as a single, integrated objective. In the U.S. system, a clear, if sometimes blurry, line exists between a commercial tech firm and a defense contractor. MCF deliberately erases that line. A Chinese company developing AI for commercial logistics is, by national strategy, also developing it for military logistics. A university conducting fundamental research in quantum computing is contributing directly to national defense.51 This creates a strategic competition that transcends the military domain, turning the entire globalized economy and research ecosystem into a potential arena of conflict. For the United States and its allies, this means that competing with China militarily requires competing with its entire national technological and industrial base.

Part III: A Comparative Strategic Framework: Similarities, Differences, and Asymmetries

While the military philosophies of the United States and China are born of different histories and geopolitical realities, they exhibit striking points of convergence alongside their profound divergences. Both powers are grappling with the same technological revolution and have arrived at similar conclusions about the future character of war. Yet, their strategic responses to these shared realities are fundamentally asymmetric, reflecting their different positions in the international system, their geographic circumstances, and their political structures.

Points of Convergence – The Race for Decision Dominance

Despite their opposing strategic postures, both the U.S. and Chinese militaries have independently concluded that the decisive element in modern, high-tech warfare is the ability to make better decisions faster than the enemy. The future battlefield will not be won simply by the side with the superior platforms, but by the side with the superior information processing and command and control architecture. This shared belief has ignited a race for what can be termed “decision dominance.”

The U.S. concept of JADC2 is explicitly designed to “deliver information and decision advantage” to commanders, enabling them to operate inside an adversary’s OODA loop.5 Similarly, China’s doctrine of “Informatized Warfare” seeks to achieve “Information Dominance” by disrupting the enemy’s C2 systems, thereby paralyzing their ability to make coherent decisions.7 Russian military analysis, observing both powers, confirms this convergence, noting that a shared objective is “achieving dominance in decision-making in future wars”.9 To this end, both nations are pouring immense resources into the enabling technologies of this new era of warfare. The U.S. is pursuing “AI-driven command and control” at all echelons 37, while China’s entire concept of “intelligentization” is predicated on the mass integration of AI to accelerate sensing, analysis, and action.45

This convergence on decision-centric warfare creates a deeply unstable dynamic. When victory is perceived to depend on striking first and disabling the enemy’s cognitive functions, it creates a powerful “first-mover advantage.” In a crisis, the side that believes its AI-enabled C2 system can achieve a decisive advantage in the opening moments may be more tempted to launch a preemptive cyber, electronic, or kinetic strike against the adversary’s C2 network. This establishes a dangerous “use it or lose it” pressure on both sides’ most critical command systems, making any crisis over a flashpoint like Taiwan incredibly volatile and prone to rapid, hard-to-control escalation.

Points of Divergence – Expeditionary Offense vs. A2/AD Defense

The sharpest contrast between the two military postures lies in their geographic orientation and operational approach. The U.S. military is fundamentally an expeditionary force, structured for global power projection. Its ability to deploy and sustain forces thousands of miles from its homeland, centered on its fleet of 11 nuclear-powered aircraft carriers and a global network of bases, is the primary instrument of its foreign policy and military strategy.1

China’s military, in direct response, is structured as a regional bastion. Its A2/AD strategy is explicitly designed to counter U.S. power projection by raising the costs of intervention to an unacceptable level.20 This strategy creates a layered, integrated defense network of sensors, long-range anti-ship missiles, submarines, and air power that extends hundreds of miles from its coast, covering the First and Second Island Chains.11 This creates a significant “home game” advantage, where China’s land-based assets, particularly the PLA Rocket Force, can provide immense firepower to augment its naval and air forces.49 This has forced the U.S. to begin shifting its strategic focus from simple power projection to what some analysts call “power protection”—developing the capabilities and concepts needed for its forward forces to survive and operate effectively within a highly contested A2/AD environment.29

This creates a competition that is not symmetric—carrier versus carrier or fighter versus fighter—but is instead highly asymmetric. A U.S. carrier strike group operating in the Western Pacific would not merely face the Chinese Navy; it would be targeted by the full weight of China’s land-based missile forces, its space-based surveillance systems, and its cyber and electronic warfare units.48 China’s land-based “carrier-killer” anti-ship ballistic missiles, for example, possess a range that can exceed that of the aircraft deployed on a U.S. carrier. This forces U.S. naval forces to either operate from farther away, reducing their combat effectiveness and sortie rates, or to enter a “kill zone” and accept a level of risk not faced since World War II. China has successfully weaponized geography to offset the qualitative and quantitative superiority of U.S. expeditionary platforms.

The Alliance Factor – A Networked Coalition vs. Strategic Self-Reliance

A final, profound asymmetry lies in how each nation approaches partnerships. The U.S. military strategy is inseparable from its global network of formal treaty allies, including NATO in Europe and Japan, South Korea, the Philippines, and Australia in the Indo-Pacific.13 These alliances are not merely political arrangements; they are integral to U.S. military operations, providing essential basing, logistical support, intelligence sharing, and substantial additional combat power.14

China, by contrast, officially “advocates partnerships rather than alliances and does not join any military bloc”.17 Its relationships, even its close strategic partnership with Russia, are pragmatic and lack the binding mutual defense commitments of a formal alliance.16 Russian analysis suggests that while military cooperation with China is deep, it is highly unlikely to evolve into a formal alliance, primarily because Beijing is unwilling to cede any of its strategic autonomy or be drawn into conflicts not of its own choosing.58

This divergence presents a fundamental strategic trade-off for both sides. The U.S. approach generates potentially overwhelming combat mass and enhances the political legitimacy of its actions. However, operating as a coalition introduces immense friction. The need to coordinate the command and control, technological systems, and political objectives of multiple nations is an extraordinary challenge—one that the JADO concept explicitly seeks to address.31 This complexity inevitably slows down the decision-making cycle that JADO is trying to accelerate. China’s approach, conversely, preserves absolute unity of command and action. Decisions can be made and executed with a speed and coherence that a coalition would struggle to match. However, this self-reliance comes at the cost of potential strategic isolation. In a major conflict, China could find itself facing a coalition of powerful nations with no formal allies obligated to come to its aid. In essence, the United States trades speed for mass, while China trades mass for speed.

Part IV: Strategic Implications and Future Outlook

The collision of these competing military philosophies is reshaping the strategic landscape, particularly in the Indo-Pacific. The doctrinal and technological race between the United States and China is not an abstract exercise; it is actively playing out in the gray zone and defining the potential character of a future conflict. Understanding this dynamic is critical for assessing risk and navigating the turbulent decades ahead.

The Shifting Military Balance and Flashpoint Scenarios

The theoretical comparison of military doctrines becomes starkly practical when applied to the region’s most volatile flashpoints: Taiwan and the South China Sea. These are the arenas where the U.S. philosophy of power projection directly confronts China’s strategy of Active Defense and A2/AD.

Taiwan remains the most dangerous potential flashpoint for a direct U.S.-China conflict.59 The PLA’s modernization is increasingly postured to provide Beijing with a credible military option to compel unification, with a key benchmark set for 2027.46 A Chinese campaign against Taiwan could manifest in several ways, from a “gray zone” quarantine led by its coast guard to disrupt shipping and assert administrative control, to a full-scale military blockade and invasion.61 Any such scenario would represent a direct clash of doctrines. A Chinese A2/AD bubble would be established to deter or defeat U.S. intervention, employing the principles of system destruction warfare against incoming U.S. naval and air forces. A U.S. response, guided by its obligations under the Taiwan Relations Act, would be a textbook application of JADO, attempting to penetrate this A2/AD zone and disrupt China’s invasion plans through integrated, multi-domain attacks.62

In the South China Sea, this doctrinal clash is already a daily reality. China’s assertion of sovereignty via its “nine-dash line,” coupled with its construction and militarization of artificial islands, is a direct challenge to the principle of freedom of navigation, a core U.S. interest.64 U.S. Freedom of Navigation Operations (FONOPS), where naval vessels sail through waters claimed by China, are a tangible application of the power projection philosophy, demonstrating that Washington does not accept Beijing’s claims and will operate its military wherever international law allows.65 China’s response—using its navy, coast guard, and maritime militia to shadow, harass, and attempt to expel U.S. ships—is a real-world application of its A2/AD and Active Defense mindset in the gray zone, short of open conflict.66 These interactions are a constant, high-stakes dialogue conducted with military hardware, where both sides test each other’s resolve, refine their operational procedures, and signal their strategic intent. The inherent risk is that a miscalculation by a single ship captain or pilot in this tense environment could rapidly escalate into the high-intensity conflict that both militaries are preparing to fight.

The Future Character of Conflict

The trajectory of this strategic competition points toward a future battlefield that is radically different from those of the past. It will be a battlespace saturated with ubiquitous sensors, from satellites in orbit to unmanned systems underwater, all connected through resilient networks and processing data at machine speed.69 The defining characteristic of future conflict will be a relentless “contest of data and deception.”

In response, the U.S. is driving its forces to become “leaner, more lethal,” and more adaptable. Its modernization efforts are focused on developing the tools for this new era: long-range autonomous weapons, AI-driven command and control, and resilient, networked communications.37 The goal is to create a force that can absorb an initial blow and still generate overwhelming, coordinated effects across all domains.

China, meanwhile, is pursuing its strategy of “intelligentization” with the explicit goal of leapfrogging U.S. capabilities. It believes that by mastering AI and autonomy within its state-directed, military-civil fused system, it can achieve an enduring advantage in decision speed and operational effectiveness, rendering traditional U.S. platform superiority irrelevant.9

This sets the stage for a future conflict defined by a “battle of the logics.” The United States is betting on the logic of network resilience. Its JADO concept is a wager that it can build a network of networks so robust, redundant, and intelligent that it can withstand systemic attacks and continue to function, ultimately overwhelming the enemy. China is betting on the logic of systemic fragility. Its doctrine of System Destruction is a wager that any complex network, no matter how resilient, contains critical nodes and unavoidable dependencies that can be identified and severed, triggering a cascading collapse that paralyzes the entire force. This is not just a technological race to build better hardware; it is a conceptual struggle over the fundamental nature of networked warfare. The winner of a future conflict may not be the side with the most advanced ship or plane, but the side whose underlying assumption about this new character of war proves more correct.

Conclusion – Ten Key Lessons for the Modern Strategist

The strategic competition between the United States and China is a multi-faceted and dynamic challenge that will define the international security environment for decades to come. A comparative analysis of their military philosophies reveals a complex interplay of converging technological paths and diverging strategic cultures. For the modern strategist, policymaker, and industry analyst, ten key lessons emerge from this analysis:

  1. The central battlefield of the 21st century is the network. Both powers have concluded that victory hinges on “decision dominance.” The U.S. JADC2 and China’s “Informatized Warfare” are parallel efforts to achieve information superiority, making the command, control, and communications architecture of each side the primary target and the primary weapon in any future conflict.
  2. U.S. military power is fundamentally expeditionary and alliance-dependent. The ability to project force across the globe is the defining feature of the U.S. military. However, this strength is predicated on secure logistical chains and the political cohesion of its alliances, both of which are now primary targets for adversary strategies.
  3. China’s military philosophy is fundamentally regional and counter-interventionist. The PLA is not currently configured for global power projection but is optimized for a single, overriding task: to dominate its immediate periphery and make it impossible for the U.S. to intervene effectively in a regional crisis, thereby leveraging geography as a decisive strategic asset.
  4. The U.S. and China are engaged in a direct doctrinal race. This is the central dynamic of the military competition. The U.S. concept of JADO aims to create a perfectly integrated “kill web.” China’s concept of “System Destruction” is designed to be the ultimate “web breaker.” This is a classic offense-defense spiral playing out in the information age.
  5. The U.S. relies on a distinct, highly advanced defense industry, while China’s Military-Civil Fusion (MCF) strategy presents a whole-of-nation challenge. MCF transforms the competition from a military-to-military affair into a nation-to-nation contest across the technological, industrial, and economic domains, posing a systemic challenge to the traditional Western model of defense procurement.
  6. Alliances are a defining asymmetry. The U.S. strategy is built on the overwhelming combat potential and political legitimacy of its coalition of allies. This provides strategic depth and mass but introduces operational friction. China’s preference for self-reliance ensures unity of command and speed of action but risks strategic isolation in a widespread conflict.
  7. The character of conflict is shifting from attrition to disruption. The theories of victory for both nations prioritize the paralysis and systemic collapse of the adversary’s military over the physical destruction of its forces. This suggests that future wars could be decided with shocking speed, with the decisive blows being struck in cyberspace and the electromagnetic spectrum.
  8. Geography remains paramount. Despite technological advances, the physical realities of the Indo-Pacific theater are critical. The U.S. must overcome the “tyranny of distance” to bring its power to bear. China, by contrast, is weaponizing the “tyranny of proximity” through its A2/AD strategy, turning its geographic position into a formidable defensive advantage.
  9. The PLA’s modernization is a reactive process. For three decades, the PLA has been a dedicated student of the American way of war. Its doctrines, technologies, and force structure have been systematically developed to counter specific, perceived U.S. strengths and exploit perceived weaknesses, making it a force tailored to fight the United States.
  10. Both powers believe emerging technologies like AI are revolutionary. The race to operationalize AI is central to the competition. China’s state-directed MCF model aims to use AI to “leapfrog” the U.S. technologically. The U.S. seeks to integrate AI to perfect its vision of a fully networked, all-domain force. The nation that most effectively harnesses this technology will likely hold a decisive military advantage for years to come.


If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly donate to help fund our continued report, please visit our donations page.


Works cited

  1. Power projection – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/Power_projection
  2. Introduction: An Assessment of U.S. Military Power | The Heritage Foundation, accessed August 21, 2025, https://www.heritage.org/military-strength/intro-assessment-us-military-power
  3. Xi Jinping’s PLA Reforms and Redefining “Active Defense”, accessed August 21, 2025, https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/September-October-2023/Active-Defense/
  4. Xi Jinping’s PLA Reforms and Redefining “Active Defense” – Army University Press, accessed August 21, 2025, https://www.armyupress.army.mil/Portals/7/military-review/Archives/English/September-October-23/Active-Defense/Active-Defense-UA1.pdf
  5. USAF Role in Joint All-Domain Operations – Air Force Doctrine, accessed August 21, 2025, https://www.doctrine.af.mil/Portals/61/documents/Notes/Joint%20All-Domain%20Operations%20Doctrine–CSAF%20signed.pdf
  6. Joint All-Domain Operations (JADO): The Maneuver Concept for …, accessed August 21, 2025, https://othjournal.com/2024/11/22/joint-all-domain-operations-jado-the-maneuver-concept-for-future-conflict/
  7. Chinese information operations and information warfare – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/Chinese_information_operations_and_information_warfare
  8. The Path to China’s Intelligentized Warfare: Converging on the Metaverse Battlefield – The Cyber Defense Review, accessed August 21, 2025, https://cyberdefensereview.army.mil/Portals/6/Documents/2024-Fall/Baughman_CDRV9N3-Fall-2024.pdf
  9. Russia and China Look at the Future of War | Institute for the Study …, accessed August 21, 2025, https://www.understandingwar.org/backgrounder/russia-and-china-look-future-war
  10. Introduction Be Aware That the Russian and U.S. Army Military Decision-Making Systems Differ Greatly Know That Russians Do Not T – Army University Press, accessed August 21, 2025, https://www.armyupress.army.mil/Portals/7/Hot%20Spots/Documents/Russia/Bartles-russian.pdf
  11. China’s Anti-Access/Area-Denial Strategy – TDHJ.org, accessed August 21, 2025, https://tdhj.org/blog/post/china-a2ad-strategy/
  12. China’s Modernizing Military | Council on Foreign Relations, accessed August 21, 2025, https://www.cfr.org/backgrounder/chinas-modernizing-military
  13. The National Military Strategy of the United States of America 2015 – Joint Chiefs of Staff, accessed August 21, 2025, https://www.jcs.mil/portals/36/documents/publications/2015_national_military_strategy.pdf
  14. Military Alliances, Partnerships Strengthened Through Defense Strategy Execution, accessed August 21, 2025, https://www.defense.gov/News/News-Stories/Article/Article/2300352/military-alliances-partnerships-strengthened-through-defense-strategy-execution/
  15. Grand strategy: Alliances – Defense Priorities, accessed August 21, 2025, https://www.defensepriorities.org/explainers/grand-strategy-alliances/
  16. The China-Russia relationship and threats to vital US interests – Brookings Institution, accessed August 21, 2025, https://www.brookings.edu/articles/the-china-russia-relationship-and-threats-to-vital-us-interests/
  17. Defense Policy, accessed August 21, 2025, http://eng.mod.gov.cn/xb/DefensePolicy/index.html
  18. Summary of the Joint All-Domain Command and Control Strategy – Department of Defense, accessed August 21, 2025, https://media.defense.gov/2022/Mar/17/2002958406/-1/-1/1/SUMMARY-OF-THE-JOINT-ALL-DOMAIN-COMMAND-AND-CONTROL-STRATEGY.pdf
  19. Joint All-Domain Command and Control – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/Joint_All-Domain_Command_and_Control
  20. Anti-access/area denial – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/Anti-access/area_denial
  21. A Low-Visibility Force Multiplier: Assessing China’s Cruise Missile Ambitions, accessed August 21, 2025, https://inss.ndu.edu/Media/News/Article/699509/a-low-visibility-force-multiplier-assessing-chinas-cruise-missile-ambitions/
  22. Relationship: The DoD and the Government – Challenge Coin Nation, accessed August 21, 2025, https://challengecoinnation.com/blogs/news/relationship-between-the-u-s-military-and-the-government
  23. United States Armed Forces – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/United_States_Armed_Forces
  24. Military-Civil Fusion – State Department, accessed August 21, 2025, https://www.state.gov/wp-content/uploads/2020/05/What-is-MCF-One-Pager.pdf
  25. Commercialized Militarization: China’s Military-Civil Fusion Strategy, accessed August 21, 2025, https://www.nbr.org/publication/commercialized-militarization-chinas-military-civil-fusion-strategy/
  26. China’s Strategy of ‘Informationised and Intelligent’ Warfare, accessed August 21, 2025, https://www.spsnavalforces.com/story/?id=802&h=Chinas-Strategy-of-Informationised-and-Intelligent-Warfare
  27. Military Power and Congress – Stennis Center for Public Service, accessed August 21, 2025, https://stennis.gov/new-brief-military-power-and-congress/
  28. Modernization of the People’s Liberation Army – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/Modernization_of_the_People%27s_Liberation_Army
  29. From Power Projection to Power Protection – Department of Defense, accessed August 21, 2025, https://media.defense.gov/2019/Mar/21/2002104239/-1/-1/0/DP_0033_LOHSE_FROM_POWER_PROJECTION_TO_POWER_PROTECTION.PDF
  30. Forward Naval Presence: A Political, Not Military, Leadership Problem | Proceedings, accessed August 21, 2025, https://www.usni.org/magazines/proceedings/2022/january/forward-naval-presence-political-not-military-leadership-problem
  31. All-Domain Operations in a Combined Environment – Joint Air Power Competence Centre, accessed August 21, 2025, https://www.japcc.org/flyers/all-domain-operations-in-a-combined-environment/
  32. ‘NATO JADO’: A Comprehensive Approach to Joint All-Domain Operations in a Combined Environment, accessed August 21, 2025, https://www.japcc.org/wp-content/uploads/NATO-Joint-All-Domain-Operations.pdf
  33. Russian Military Doctrine – Geopolitical Futures, accessed August 21, 2025, https://geopoliticalfutures.com/russian-military-doctrine/
  34. FY2025 President’s Budget Highlights – Army Financial Management & Comptroller, accessed August 21, 2025, https://www.asafm.army.mil/Portals/72/Documents/BudgetMaterial/2025/pbr/Army%20FY%202025-Budget%20Highlights.pdf
  35. FY2025 Defense Budget – Department of Defense, accessed August 21, 2025, https://www.defense.gov/Spotlights/FY2025-Defense-Budget/
  36. An Army Modernization Update | AUSA, accessed August 21, 2025, https://www.ausa.org/publications/land-warfare-paper/an-army-modernization-update
  37. Army Transformation and Acquisition Reform – Department of Defense, accessed August 21, 2025, https://media.defense.gov/2025/May/01/2003702281/-1/-1/1/ARMY-TRANSFORMATION-AND-ACQUISITION-REFORM.PDF
  38. U.S. Army 2025 Restructuring: Strategic Realignment and Industrial Impact, accessed August 21, 2025, https://defense-update.com/20250505_us-army-2025-restructuring.html
  39. The 2024 Army Force Structure Transformation Initiative | Congress …, accessed August 21, 2025, https://www.congress.gov/crs-product/R47985
  40. Air, Space Force Leaders Stress Modernization, Readiness – Department of Defense, accessed August 21, 2025, https://www.defense.gov/News/News-Stories/Article/Article/4193428/air-space-force-leaders-stress-modernization-readiness/
  41. DAF releases 2025 budget proposal > United States Space Force > Article Display, accessed August 21, 2025, https://www.spaceforce.mil/News/Article-Display/Article/3703322/daf-releases-2025-budget-proposal/
  42. Hegseth Tasks Army to Transform to Leaner, More Lethal Force – Department of Defense, accessed August 21, 2025, https://www.defense.gov/News/News-Stories/Article/Article/4172313/hegseth-tasks-army-to-transform-to-leaner-more-lethal-force/
  43. Active Defense: China’s Military Strategy since 1949, accessed August 21, 2025, https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=8120&context=nwc-review
  44. The (evolving) art of war | MIT News | Massachusetts Institute of Technology, accessed August 21, 2025, https://news.mit.edu/2019/active-defense-chinese-military-0508
  45. PLA’s Perception about the Impact of AI on Military Affairs*, accessed August 21, 2025, https://www.nids.mod.go.jp/english/publication/security/pdf/2022/01/04.pdf
  46. A New Step in China’s Military Reform – National Defense University Press, accessed August 21, 2025, https://ndupress.ndu.edu/Media/News/News-Article-View/Article/4157257/a-new-step-in-chinas-military-reform/
  47. Military Artificial Intelligence, the People’s Liberation Army, and U.S.-China Strategic Competition | CNAS, accessed August 21, 2025, https://www.cnas.org/publications/congressional-testimony/military-artificial-intelligence-the-peoples-liberation-army-and-u-s-china-strategic-competition
  48. Fighting DMO, Pt. 8: China’s Anti-Ship Firepower and Mass Firing Schemes – CIMSEC, accessed August 21, 2025, https://cimsec.org/fighting-dmo-pt-8-chinas-anti-ship-firepower-and-mass-firing-schemes/
  49. China’s aircraft carriers in Pacific signals ability to ‘contest’ US power – Al Jazeera, accessed August 21, 2025, https://www.aljazeera.com/news/2025/8/15/china-navy-power-on-show-in-pacific-signals-ability-to-contest-us-access
  50. Military-civil fusion – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/Military-civil_fusion
  51. The Chinese Communist Party’s Military-Civil Fusion Policy – state.gov, accessed August 21, 2025, https://2017-2021.state.gov/military-civil-fusion/
  52. U.S.-China Competition and Military AI – CNAS, accessed August 21, 2025, https://www.cnas.org/publications/reports/u-s-china-competition-and-military-ai
  53. US and China’s Aircraft Carriers Show Force in Contested Waters – Newsweek, accessed August 21, 2025, https://www.newsweek.com/us-china-news-aircraft-carriers-george-washington-shandong-2094003
  54. China Naval Modernization: Implications for U.S. Navy Capabilities—Background and Issues for Congress, accessed August 21, 2025, https://www.congress.gov/crs-product/RL33153
  55. Attaining All-domain Control: China’s Anti-Access/Area Denial (A2/AD) Capabilities in the South China Sea – Pacific Forum, accessed August 21, 2025, https://pacforum.org/publications/issues-insights-issues-and-insights-volume-25-wp-2-attaining-all-domain-control-chinas-anti-access-area-denial-a2-ad-capabilities-in-the-south-china-sea/
  56. Is China or Russia the bigger threat to the United States? There’s a clear answer., accessed August 21, 2025, https://www.atlanticcouncil.org/blogs/new-atlanticist/is-china-or-russia-the-bigger-threat-to-the-united-states-theres-a-clear-answer/
  57. China-Russia Military Relationship – Walter H. Shorenstein Asia-Pacific Research Center, accessed August 21, 2025, https://aparc.fsi.stanford.edu/research/china-russia-military-relationship
  58. Partnership Short of Alliance: Military Cooperation Between Russia and China – CEPA, accessed August 21, 2025, https://cepa.org/comprehensive-reports/partnership-short-of-alliance-military-cooperation-between-russia-and-china/
  59. The United States, China and Taiwan and the Role of Deterrence in Scenarios Short of War, accessed August 21, 2025, https://usa.embassy.gov.au/APCSS24
  60. The Risks of Rushing to Denial in the Taiwan Strait – CSIS, accessed August 21, 2025, https://www.csis.org/analysis/risks-rushing-denial-taiwan-strait
  61. How China Could Quarantine Taiwan: Mapping Out Two Possible Scenarios – CSIS, accessed August 21, 2025, https://www.csis.org/analysis/how-china-could-quarantine-taiwan-mapping-out-two-possible-scenarios
  62. Great Power Competition in Contested States: The Case of Taiwan – Project MUSE, accessed August 21, 2025, https://muse.jhu.edu/article/953086
  63. Why China-Taiwan Relations Are So Tense, accessed August 21, 2025, https://www.cfr.org/backgrounder/china-taiwan-relations-tension-us-policy-trump
  64. Territorial disputes in the South China Sea – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/Territorial_disputes_in_the_South_China_Sea
  65. Territorial Disputes in the South China Sea | Global Conflict Tracker, accessed August 21, 2025, https://www.cfr.org/global-conflict-tracker/conflict/territorial-disputes-south-china-sea
  66. A quiet path to peace in the South China Sea – Asia Times, accessed August 21, 2025, https://asiatimes.com/2025/08/a-quiet-path-to-peace-in-the-south-china-sea/
  67. Bejing Chases Off US Warship! China Challenges Trump In South China Sea? – YouTube, accessed August 21, 2025, https://www.youtube.com/watch?v=P8DH7sxZB_A
  68. Navigating Tensions in the South China Sea: A Multidimensional Analysis, accessed August 21, 2025, https://www.cjfp.org/navigating-tensions-in-the-south-china-sea-a-multidimensional-analysis/
  69. Next Army: Envisioning the U.S. Army at 250 and Beyond [CSIS] – Reddit, accessed August 21, 2025, https://www.reddit.com/r/army/comments/1lb5pw0/next_army_envisioning_the_us_army_at_250_and/

US Coast Guard Response Boat Medium (RB-M) 45754 Stationed In Saint Joseph, MI

We were walking on the south pier in Saint Joseph, MI, on a fine June evening enjoying the cool Lake Michigan air. Coming in from the lake was one of the US Coast Guard boats that are stationed here. As it came in I decided to snap a number of photos plus look up just what the boat was when I had an opportunity.

In doing some digging, the vessel was a Response Boat Medium (RB-M) and the hull number 45754. It was delivered to the Saint Joseph USCG station in May 2014.

The RB-M is a 45-foot versatile utility boat used for search and rescue, The USCG has the following to say about the design:

The 45-foot RB-M is being procured to replace the 41-foot
utility boat (UTB). It is an all-aluminum boat that has a wire-
less crew communication system and is powered by twin
diesel engines and water jet propulsion. Unlike the 41-foot
UTB, the RB-M has the ability to self-right if it should ever
capsize. This feature allows the RB-M to operate in higher
seas, ensuring the crew (and rescued survivors) comes
home safely. For example, RB-M’s survivability parameters
are 12-foot seas and 50 knots of wind, whereas the UTB’s
limits are 8-foot seas and 30 knots of wind. The RB-M has
a top speed in excess of 40 knots and cruises at 30 knots,
compared to the 41-foot UTB top speed of 26 knots. All 174
RB-Ms have been delivered.

Click here for the USCG equipment guide PDF that I extracted the above info from if you want to learn more.

So, it’s a pretty cool versatile boat. Here are the photos that I took – if you click on one it will open up full size:

We definitely appreciate the service the Coasties provide the nation and our community. I thought it would be cool to share these photos in case others might like to see them.



If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly donate to help fund our continued report, please visit our donations page.



Ever Hear About The Time US Special Ops Snatched a Mi-25 Hind D Attack Helicopter?

Back in 1987, a damaged Libyan Mi-25 Hind D attack helicopter was captured by French and Chadian troops. The US wanted to inspect the helicopter and negotiated with the government of Chad to retrieve it.

Libyan MI-24 Hind D captured by Chadian forces at Wadi Doum, Chad .
Source: Wikipedia

On June 10, 1988, Operation Mount Hope III commenced to retrieve the Hind. The famous NightStakers (the 160th Special Operations Regiment) flew almost 500 miles at night with two MH-47 Chinooks to successfully retrieve the Hind and load it on a C-5.

On 21 June 1988, the captured Mi-25 arrived in N’Djamena where it was loaded into a USAF C-5
Source: Wikipedia

Videos

There are a couple of cool videos on Youtube that can give you some good background. The first one is very informative but please note the Hind D is not the fastest helicopter currently.

The next video has the same cover photo but is different:

Reading

If you want to read more, check out:

I hope you found this as interesting as I did.


Please note that the still photos are from the Wikipedia page listed above.



If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly donate to help fund our continued report, please visit our donations page.



Video: Manufacturing an Eight Inch High Explosive Howitzer Shell Circa 1917 – Shows a Ton of Machining Operations

If you like to watch old school machining, this video from the Library and Archives Canada is pretty amazing. It’s a silent black and white video that is just shy of 54 minutes long. The title of the video is “Manufacturing an Eight Inch High Explosive Howitzer Shell At The Works Of The John Bertram & Sons Company, Ltd., Dundas, Ontario – Canada”.

The video steps you through the process as well as general view of the shop. This shows you manufacturing in an era where a lot of artisan skill was required to turn out products. It’s really fascinating to watch. The following are some screen shots from the video:

Here’s the Video:


I hope you enjoyed this bit of history!


Please note that all images were extracted from the video and are the property of their respective owner.



If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly donate to help fund our continued report, please visit our donations page.