Category Archives: Future Tech

What is coming down the pipe in naval and maritime technology?

State of War, State of Mind: Reconsidering Mobilization in the Information Age, Pt. 2

By LCDR Robert “Jake” Bebber USN

This article is part two of a two-part piece drawn from a recently completed report by the author that was published by The Journal of Political Risk, and is available in its entirety here

What Must Be Done?

Part one of this article outlined some of the broad challenges facing American policy-makers and defense planners in the coming years. Part two explores the practical and policy implications of what must be done.

Considering these developments outlined in part one, U.S. mobilization efforts should take the following six steps:

  1. Shift the focus of strategic warning to identifying emerging disruptions and strategic latency.
  2. Develop a strategic intelligence capability to monitor and evaluate sources of U.S. power and identify areas of potential comparative advantage.
  3. Institutionalize a “whole of society” approach to peacetime preparedness.
  4. Reframe warfighting posture toward preparing to survive an initial blow, then transition to alternative capabilities that can achieve desired effects. 
  5. Integrate allied and U.S. preparedness efforts, to include research and development, technology sharing, coordinated production, and political resiliency.
  6. Understand and educate the American people on the realities of sustained competition and conflict.

Strategic Latency, Warning, and Disruption Futures

Since the Second World War, the idea of “warning” has largely been linked to surprise military attacks. Pearl Harbor, the invasion of South Korea by North Korea, and September 11, stand out as hallmark examples of the types of surprise attacks that most concern policymakers. During the Cold War, this included not only a nuclear first strike, but also a surprise Soviet attack into Western Europe or a resumption of hostilities on the Korean peninsula. Other warning concerns would be events which might have dramatic impact on the geopolitical landscape, such as coups and revolutions, the outbreak of civil war, the assassination of a world leader, or the outbreak of a war involving a U.S. ally. 

The nature of surprise assumes a level of unpreparedness – catching your adversary unprepared is why surprise is usually sought after. The American intelligence community, while it has many roles and functions, exists foremost to prevent surprise and provide strategic warning. 

Cynthia Grabo describes warning as “an intangible, an abstraction, a theory, a deduction, a perception, a belief. It is the product of reasoning or of logic, a hypothesis whose validity can neither be confirmed nor refuted until it is too late [emphasis added].”1 It should not be confused with current intelligence, nor does it necessarily flow from a mere “compilation of facts” or the result of “majority consensus.” Rather it depends on exhaustive research, and usually the kind of holistic approach that the American intelligence community was not originally designed for.2 There are currently 17 federal agencies and military service components devoted to different collection and analysis emphases, each working independently under a broad umbrella agency, the Office of the Director of National Intelligence (ODNI). ODNI was established after the September 11, 2001, terrorist attacks, largely in response to the significant failures of the separate intelligence agencies to work together and share information and analytic expertise.

While anticipating a military surprise attack will remain an enduring requirement for the intelligence community, the emerging global trends and adversary campaigns reshaping the strategic environment will likely matter more in the coming decades. However, the current analytic techniques used by intelligence analysts are inadequate to identify these trends and are likely to result in a strategic warning crisis.3

Strategic latency refers to the potential for technologies to fundamentally shift the military and economic balance of power.4 China (and Russia to a lesser extent) leverage dual-use technologies to exploit commercial and supply chain vulnerabilities and hold critical information and economic “choke points.” Supply chain dominance provides control of the underlying infrastructure of the 21st century economy, from undersea cables to satellites. By controlling  the electromagnetic spectrum and supporting supply chains such as media, advertising, entertainment, legal regimes, political lobbying, and public opinion management, China is approaching the point where it can achieve global information superiority, if not dominance. Information control enables population control

The intelligence community’s inability to detect and anticipate latent disruptions results from the organizational structure of the community, the charges of its component organizations, and its analytic tradecraft. The 17 U.S. intelligence agencies that fall under ODNI’s purview are organized under either intelligence disciplines, such as communication intelligence or geospatial intelligence, service warfighting domains (air, land, sea, space), or domestic security and law enforcement functions. Its core responsibility is the fusion of these different disciplines into larger strategic intelligence support to the President and National Security Council.

Today’s intelligence community organization results from two major events: the 2001 terrorist attacks on New York and Washington, D.C., and the intelligence community’s erroneous assessment in 2002-3 of Iraq’s weapons of mass destruction program. The first represents a failure to detect an impending attack. The second represents a failure to accurately assess the state of an adversary’s capabilities. In both cases, cognitive limitations inherent to dealing with incomplete or ambiguous information led to intelligence and warning failures. Analysts do not approach their trade with a “blank slate,” but start with certain assumptions about foreign capabilities and intentions that have been developed through education, training, and experience. These assumptions form a mindset that influences what the analyst judges to be reliable and relevant. While this is often a strength, it is not error-free.5

However, the intelligence community’s ability to forecast latent disruptions is questionable at best. This places American national security at a severe risk since it directly impacts peacetime strategic competition and mobilization execution in the event of conflict. Yet understanding anticipatory behavior is central to financial asset management firms, and seven of the top ten firms reside in the United States. Before these firms make multi-billion dollar decisions, they perform deep research and analysis, evaluating an immense, diverse array of data sets, from predicting sea level rises to mobile communication use in India. These firms specialize in evaluating risks to capital investment. 

Data sets are available almost instantaneously from a growing “Internet of Things” and ubiquitous sensors that constantly monitor human activity. Programmers use these data sets to build and refine predictive algorithms that drive risk management and investment.  This methodological approach suggests humans telegraph their behavior through technology and investment decisions. This “Techno-Financial” intelligence capability is a critical requirement for better anticipating emerging disruptions.6 It is a multidisciplinary approach integrating behavioral economics, neuroscience, demographics, regulatory, legal, and other sectors. Interconnected technologies and complex networks are treated as living organisms, while investment is the fueling force that can predict future organism behavior.7

Along with a techno-financial intelligence capability, the intelligence community lacks a comprehensive methodology to “understand the ways individuals perceive and respond to various types of information.” It requires a knowledge of how humans communicate with others in groups, and “orient and respond to economic, social and political environments.” To detect these changing patterns in human group behavior, the intelligence community will need massive sets of diverse and cross domain data sets, along with the ability to process this data to yield understanding and prediction.8 Many of these data sets will overlap with techno-financial intelligence, and the two disciplines complement one another.

Intelligence and Investment for the Home Front

Underlying disruptions in the global economy, changing consumer behaviors, and advanced non-kinetic mass disruption attacks have left the American home front vulnerable. In many respects, war in the 21st century will be characterized not only by a lack of “front lines” but also the absence of any sanctuary. Traditional offensive and defensive operations may not apply, and the “battlefield” may be located in far off corners of the globe while simultaneously being fought in corporate boardrooms, small town hall meetings, and even family gatherings.

Mobilization and peacetime preparedness are best informed through a comprehensive program that identifies the sources of American power creation, evaluates changes and coming discontinuities, and conducts predictive analysis. The Department of Defense has been conducting this type of work through agencies such as the Office of Net Assessment and the Defense Science Board, yet for obvious reasons their efforts are mostly confined to understanding the military balance. Other agencies do track data and trends and make reports within their purview, such as the Department of Labor or Health and Human Services. However, no agency or interagency network or research institute is tasked with crafting a framework to evaluate sources of American power, anticipate opportunities to develop comparative advantages or to mitigate vulnerabilities, or to be used as the basis for policy formation and strategic decision-making. There is no framework that provides the understanding of complex network relationships and evaluates it as an organic whole.9

This is not to say that no one has suggested doing so. One such approach, Strategic Advantage by Bruce Berkowitz, argued that in order for the U.S. to remain the global leader in the 21st Century, it must achieve organizational agility, optimally manage risk, better navigate the crosscurrents of economic development and democratic institutions, and use its comparative advantages effectively. This requires a constant evaluation process of macro-trends in demographics, economics, commercial use, technology, health, and other factors, and how those factors shape national power and create opportunities and vulnerabilities. Importantly, there is a pacing element to power creation and sustainment based around economic constraints and the realities of American political support. In a complex threat environment with competing – and sometimes conflicting – interests, the challenge will be developing, selecting, and combining various capabilities (military, economic, diplomatic, etc.), and then recombining them as conditions change, while avoiding becoming so overcommitted in addressing one threat that we are unable to address others.10

Six principles guide this framework. This first is to understand the potential scenarios for world events, and the important variables (demographic, economic, technology, etc.) that underlie each scenario and identify the mileposts that might signal how these scenarios would play out. The second principle is to recognize the United States’ unique strengths that provide it outsized advantages and to identify how these strengths might be cultivated and exploited. Next, planning must anticipate that changes in the environment occur rapidly, and assumptions will likely not remain valid for more than three to five years, at best. Planning must also account for constraints on both resources and public opinion. Success will require an organizational approach that accommodates more risk and is agile enough to respond to changes in the environment. Finally, maintaining a strategic advantage will depend on the availability of resources, which emphasizes the centrality of economic growth toward national security, preparedness, and mobilization.11

From Whole-of-Government to Whole-of-Society

For a whole-of-society approach to be truly meaningful, it must reach beyond the federal, state, and local governments, as well as beyond traditional social institutions such as chambers of commerce and trade unions. A few lessons from the mobilization during the Second World War still apply, but none more so than organizing industrial mobilization around industry, rather than government, which was central to the explosive growth in American capacity to provide the bulk of war materiel for all allies. This was only possible because industry and labor led the approach. While the government stepped in to regulate consumption through the rationing of certain goods and services, production always remained voluntary and driven by incentive. As early as 1938, industrial mobilization planning was built around getting ahead of the problem to determine what was needed and when, rather than what American industry had the capacity to produce. This drove a requirements-based process while helping build production momentum.12

A major war in the 21st Century will certainly look much different in the production and employment of war materiel, but what might matter more is how the United States organizes its preparedness and mobilization planning to leverage its comparative advantages.

While it is important for the federal government to organize and sustain the effort, state and local governments must have a role in decision-making on national-level priorities. Key economic sectors in finance, logistics, transportation, health care, manufacturing, retail, telecommunications, and others represent a large source of national power. No less so are public education and institutes of higher learning, training and certification bodies, and community organizations such as the American Red Cross and United Way. Important in the 21st Century is the growing role of social media “influencers” and YouTube stars, as well as bottom-up capital generation like Kickstarter and community activism tools such as Change.org. Non-traditional platforms and organizations can bring innovative ways of thinking and alternative approaches to mobilization and preparedness planning.

Some states are approaching preparedness in novel ways. The Ohio National Guard has created the Ohio Cyber Reserve, teams of trained civilians available to assist municipalities with cybersecurity vulnerabilities and provide recommendations to reduce threats. They also provide workforce development training and education services in local schools. This approach can be expanded with government support to create citizen volunteer organizations modeled on the Civil Air Patrol to better utilize the large population of Americans who may not be interested in government or military service but have unique skill sets such as  on-net operations, resiliency testing, critical infrastructure protection roles, and youth mentorship in science, technology, engineering and the liberal arts.13

“Survive, Then Transition”

The stages of mobilization are traditionally crisis mobilization, tactical mobilization, and strategic mobilization. However, the character of warfare in the information age suggests that adversaries will likely engage in non-kinetic disruption attacks, potentially on a mass scale, to achieve strategic effects well before initiating open hostilities. Disruptive attacks on preparation activities and material production will likely thwart or slow the U.S.’s ability to mobilize, marshal forces, and project power. These attacks may go on for months or years, in pursuit of long-term weakening by delegitimizing democratic institutions, sowing social discord, or even increasing the use of addictive opioids among the population, thereby rendering them unfit not only for military service, but unemployable in most industries. It might be wise to assume that the U.S. is under attack right now for the express purpose of rendering its mobilization and preparedness capability impossible.

As discussed above, policymakers should create a strategic warning regime tailored to detect these types of mass disruptive attacks, while building intelligence collection capabilities and analytic techniques to support strategic warning. Still, the ability of an adversary to initiate a surprise attack on a global scale, along with the complexity and high tempo of modern combat suggests that against a peer adversary like China, the United States and its allies could quickly find themselves overwhelmed in one or more theaters. Maintaining credible, forward deployed combat power is challenging now, and growing more so each day. 

This suggests that the United States would have to develop deep enough stocks and magazines to sustain combat forces in the early stages of a conflict (the “staying power” that the Reagan Administration attempted to address). However, the current mix of highly exquisite and expensive weapons systems has left the resources available for war reserve stocks nearly non-existent. Therefore, once military forces and the homeland have survived an initial onslaught, the U.S. will face two choices: try to reconstitute and replace forces or begin a transition to new capabilities that can be fielded rapidly and inexpensively while achieving required operational and strategic results. The fact that the force design and its supporting defense industrial base cannot be meaningfully expanded to keep up with anticipated attrition levels suggests that new means of rapid capability employment will be required.

The Defense Department has expanded its efforts to go outside of the traditional defense industry base and encourage companies to do business with the Pentagon, giving the military access to unique products and services as well as alternative approaches to design, production and sustainment. Through initiatives like the Defense Innovation Unit and legislative action to expand the use of Other Transaction Authorities, the Defense Department has adapted many commercially available products to military use, from personal communication devices to unmanned systems. 

Large companies are investing significantly in autonomy, artificial intelligence, and virtual reality to create new products, improve business logistics and administration, and meet changing consumer demands. Defense leaders should identify and improve upon lessons from employing non-traditional defense companies in order to transition to innovative and sustainable ways to deliver kinetic and non-kinetic capabilities. For example, there is a growing hobby in using a 3-D printer to create drones, leading to innovation in drone design, applications, time to develop, and reduced costs. In a strategic competition, actors can apply new and novel uses of information technology to dynamically impact global economies, public diplomacy, and influence campaigns to achieve strategic effects.

Integrating Allies into U.S. Preparedness

American security ultimately depends upon collective security, a fact that is often overlooked in preparedness planning. While the U.S. military and State Department have a long history of working with allies, friends, and partners to advance security interests, these efforts may not have the efficacy they once did, as China has aggressively sought to bond itself economically to American allies. Commercial and industrial interests are a strategic vulnerability to the democracies, unlike the Cold War where they were an asset. This has caused friction between the U.S. and its allies, especially concerning the use of Chinese companies to build critical infrastructure or operate maritime ports and transportation networks.

At present, only limited efforts exist to evaluate allied and partner nation industrial capacity, defense capabilities, research and development programs, dual-use technology development and applications, sustainment, and political resiliency. There is growing concern that as the gap between U.S. and allied military technology expands, interoperability between allied and coalition forces will become far more difficult. The inability to share resource, sustainment, and logistical burdens would place both U.S. and allied security at risk. The U.S.’s past successes in allied and coalition warfighting have largely been because of early agreement and understanding not only of the strategic objectives but also of partner burden sharing and mutual support. The U.S., given the size of its military, will likely have the largest share of the burden, and allies and partners must be able to receive and use American support.

Coordination of cross-domain operations, including space, cyber, and the electromagnetic domains, will be central to coalition warfighting and strategic competition campaigns that fall below the warfighting threshold. The U.S. will have allies of varying levels of sophistication, capabilities, and resources. Even allied and partner nations that operate comparable technology, such as Japan, South Korea, Israel, and the U.K., may have structural challenges that make coordination with the U.S. or with each other difficult. 

U.S. policy continues to emphasize self-sufficiency and autarky for its defense industrial base. This policy needs to be re-evaluated considering the increasing use of commercial and dual-use technology, much of which is developed in allied and partner countries. 

Fortunately, the U.S. and its allies have a long history of alliance management, cooperation on mutual interests, and integrated command structures. This is especially true for NATO, “Five-Eyes” partners, Japan, and South Korea. NATO established the Partnership Interoperability Initiative in 2014, which was also broadened to include Australia, Finland, Georgia, Jordan, and Sweden. NATO’s experience in the Balkans and Afghanistan highlighted many of the challenges forces had in standards, doctrine, logistics, and sustainment. The U.S. also maintained combined forces commands in Japan and South Korea, to include coalition war planning, exercises, basing, and sustainment. 

Expanding integration and interoperability is one area of mobilization preparedness that holds a great deal of promise. These efforts should be deepened to include joint development of research, development, and dual-use technology goals; combined command, control systems; and intelligence, surveillance, and reconnaissance capabilities and domain awareness capabilities. This may necessitate expanding and improving the ability of U.S. and allies to share a common operating picture that enables tactical tracking to find, fix, and finish targets across coalition platforms. 

Coordinated industrial base expansion, sustainment, tooling, and logistics support will be critical to maximizing comparative advantages that the alliance system provides. The U.S. and its allies should undertake further weapons system and platform development capabilities, to include non-traditional and dual use civilian-military capabilities. This may mean accepting the tradeoff between high-end, exquisite systems and moderately less capable, but still effective combat and non-kinetic systems that all parties can operate. In a strategic competition or conflict with China, and the immense industrial capacity it can harness, this could be the best option. It frees up a portion of the U.S. information technology and industrial base to develop and produce future high-end systems while spreading out the production of moderately capable systems that can be brought into the competition or conflict more rapidly. 

Such an expansion will require a dedicated, regular, systematic evaluation of allied and partner capabilities, more frequent combined and coalition exercises, and deeper coordination of planning and planning assumptions. Early and often allied wargaming, to include frank discussions on potential strategic and political goals, will greatly improve planning assumptions and further guide research, development, production, and operational concepts that are tailored to better meet alliance goals.

Understand and Educate the American People 

To paraphrase former Secretary of Defense Donald Rumsfeld, the U.S. will compete with the population it has, not the one it wants. That is, policy makers must realistically assess the willingness and desire of the American population to support and sustain another indefinite competition and conflict with a major power. The fiscal burden of creating and sustaining American power is likely to grow. This will come at a time when it will be incumbent on decision-makers to address the entire scope of national taxation and spending. Hard trade-offs will be required.

Yet fiscal constraints are only one piece of the puzzle. Even if the resources were readily available, it is not entirely clear that the population of 2020 is particularly interested in competing. The Cold War was born out of the Second World War, and early system shocks caused a reappraisal of U.S. efforts to rebuild the world order while being confronted with a global communist movement that had other designs. 

Part of this is due to the nature of how the Cold War ended and the brief, unipolar moment the United States enjoyed. Little effort was given to recapitalizing the institutions necessary to meet a new, peer challenger. Even conservative, anti-communist stalwarts argued that it was time for America to become a “normal nation,” and shed the burden of global leadership. The lack of an existential threat made such calls even more appealing.

Recent polling suggests that a smaller portion of younger generations – Generation “Z” and Millennials – view the United States as “better” than all other countries, an idea commonly called “American exceptionalism.” At the same time, significant gaps exist between the younger and older generations on perceived threats to America, with Millennials pointing to “climate change” (62%) as a bigger threat than “the development of China as a world power” (35%), “North Korea’s nuclear program,” (55%) or the “rise of authoritarianism around the world” (42%).

To be sure, as one ages and experiences the world, the perception of threats will likely change, and generations do not hold monolithic views that remain etched in stone. Evidence suggests that the public is growing far more wary of China as a threat, and CCP leadership’s complicity in covering up the danger of the COVID-19 pandemic may further incur the American public’s anger. The vast majority of Americans still believe that a future with U.S. leadership is far better than a world led by Beijing.14

Yet it would be the most profound failure of policy for the United States to execute a grand strategy designed to compete with, and if necessary, fight Communist China if popular consensus is not there. Indeed, it would be disastrous. This is more important for younger generations as it is they who will face most of the sacrifice. The underlying assumption behind competing with China is that the American people are invested in the cause. If that assumption is misplaced, then a competition strategy cannot succeed, and the U.S. is likely to suffer a catastrophic loss.

Implementing a competition strategy will require not only public debate, but also public accountability, and the willingness to craft policy and strategy around the constraints of public opinion. While public opinion can be moved, the case must be made. This must be central to American grand strategy, strategic competition, mobilization, and preparedness planning. The current complacency regarding the public’s declining trust in institutions and America’s role in the world is dangerous. Foreign powers actively engage in strategies to undermine American political legitimacy and resiliency, but they need only accentuate the domestic trends that are already present. 

Preparedness and mobilization planning remain central to America’s ability to defend its interests and the cause of freedom. This is worth fighting for. But it cannot be defended without the support of the people. It is a political case that must be made at all levels of government and society. It will require a renewed effort toward public education, and frank, honest debate about the sacrifice required. To best make the case, policy makers have to meet the American public where they are, using terms that convey the gravity of the situation and the stakes involved.

 LCDR Bebber is a Cryptologic Warfare officer assigned to Information Warfare Training Command Corry Station in Pensacola, Florida. The views expressed here do not represent those of the Department of Defense, Department of the Navy or the U.S. government. He welcomes your comments at jbebber@gmail.com.

Endnotes

1 Cynthia M. Grabo, Anticipating Surprise: Analysis for Strategic Warning (Lanham: University Press of America, 2004), 4.

2 Grabo.

3 Maureen Rhemann, “Intelligence Analysis in a Post-Heuer World: Why We Don’t Recognize New Forms of Warfare and 6 Intelligence Take-Aways From Neuroscience” (Reperi Analysis Center, 2020).

4 Celeste Chen, Jacob Andriola, and James Giordano, “Biotechnology, Commercial Veiling, and Implications for Strategic Latency: The Exemplar of Neuroscience and Neurotechnology Research and Development in China,” in Strategic Latency: Red, White, and Blue, ed. Zachary S. Davis and Michael Nacht (Livermore: Lawrence Livermore National Laboratory, 2018).

5 Richards J. Heuer, “Limits of Intelligence Analysis,” Orbis Winter (2005): 76–77.

6 Techno-Financial Intelligence was pioneered by the Reperi Analysis Center (RAC) in 1999 to detect future disruption blending leading data sets to detect asymmetric pre-cursors and perfected with advanced algorithms in 2020. It assumes behavior is telegraphed and users 7-S/ADP and other processes.

7 Maureen Rhemann, “What We’ve Learned from 20 Years of Techno-Financial Intelligence” (Reperi Analysis Center, 2020).

8 James Giordano and Rachel Wurzman, “Integrative Computational and Neurocognitive Science and Technology for Intelligence Operations: Horizons of Potential Viability, Value and Opportunity,” STEPS 4 (2016): 32–37.

9 For a brief overview of how China approaches this challenge, see the Appendix on Comprehensive National Power which is found in the longer study published at the Journal of Political Risk.

10 Bruce Berkowitz, Strategic Advantage: Challengers, Competitors, and Threats to America’s Future (Washington, D.C.: Georgetown University Press, 2008).

11 Berkowitz, 231–32.

12 Herman, Freedom’s Forge: How American Business Produced Victory in World War II.

13  Robert Bebber, Interview: Dr. Peter W. Singer, January 16, 2020.

14 Devlin, Silver, and Huang, “U.S. Views of China Increasingly Negative Amid Coronavirus Outbreak.”

Featured Image: Fighter aircraft under construction at the Bell Aircraft Corporation plant at Wheatfield, New York. (U.S. National Archives)

State of War, State of Mind: Reconsidering Mobilization in the Information Age, Pt. 1

By LCDR Robert “Jake” Bebber, USN

This article is part one of a two-part piece, drawn from a recently completed report by the author that was published by The Journal of Political Risk, and is available in its entirety here

Introduction

Recently, American policymakers and national security thinkers have begun to recognize that revisionist powers in the Peoples’ Republic of China (PRC) and Russia have no interest in preserving the current liberal order, and instead have embarked on a course to challenge and supplant the U.S. as the world’s superpower. However, the United States is not postured to mobilize for long-term strategic competition or war with great powers. 

American policymakers’ assumptions regarding war preparation, prosecution, and sustainment are not aligned to the emerging 21st Century landscape dominated by three major trends: advances in understanding of neuroscience, dual-use technologies, and new financial business models. These articles take a holistic approach toward identifying how war mobilization in the 21st Century will look different from the industrial models of the mid-to-late 20th Century. Looking beyond the Defense Department, they explore economic, policy, social, technological, and informational aspects of planning and preparation. Part Two will identify why the intelligence and national security communities are not postured to detect or anticipate emerging disruptions and strategic latency. It will put forward strategies and recommendations on how to grow American power and create new sources of comparative advantage that can be rapidly converted into both kinetic and non-kinetic effects in all domains, not just military.

21st Century Trends That Will Shape the Coming War 

Three main forces will shape the 21st Century: advances in neuroscience, emerging dual-use technologies, and new financial business models. The convergence of these forces creates disruptions on a mass scale. Chinese and Russian operations, policies, and investment decisions, along with market forces and changing consumer preferences each play a part in the changing geopolitical landscape, threatening the efficacy of American assumptions in strategic competition, war preparation, prosecution, and sustainment. This requires rethinking how the U.S. considers strategic warning and intelligence during peacetime, the transition from competition to conflict, the resiliency and capacity of current forces to “weather the storm” of initial combat, and whether the country is postured to transition to other means of using force during a global war with a great power. Perhaps most important will be the means by which the U.S. sustains its economic power and the political will to fight. Right now, adversaries are conducting systematic attacks on U.S. and allied sources of economic power, reducing and eliminating what was once considered the principle advantage of industrialized democracies, while at the same time using non-kinetic means to deliver mass cognitive attacks, destabilizing political societies.

The Brain as the Battlefield

Over the past forty years, scientists have made significant advancements in the study of the human brain. James Giordano and others point to immense potential for neuroscience and neurotechnology to “study, predict and influence” human ecologies, potentially affecting human activities on individual, group, and population levels, and human relations on a local, regional, and global scale. These understandings will permit the U.S. and its competitors to develop capabilities to assess, access, and affect the human brain. It will come to influence, and perhaps dominate, the posture and conduct of national security and the defense agenda.

The growth in understanding of the human brain, from evaluating its components and functions, to accessing and influencing it, will be a central focus of strategic competition, not unlike the space program of the Cold War, but with perhaps even more profound implications — the weaponization of brain sciences. Neuroscience can be leveraged as a soft weapon to create economic advantages, intelligence capabilities, and advanced psychological influence operations such as narrative networks. More concerning is how neuroscience can help develop hard weapons that use chemicals, biologicals, toxins, and devices to have physical effects.

Neuroscientific advancement also has significant neuro-enablement application potential to enhance the performance military operators and intelligence officers. More broadly, these understandings can also be used to understand and shape public behavior.

Strategic competitors have invested considerable resources in the research, development, and fielding of neuroscience and biotechnology. China has announced initiatives to position itself as the leading power in brain science and is openly exploring the application of brain sciences to hard and soft power. Military writers and researchers in China argue that future battlefield success will depend on “biological dominance,” “mental/cognitive dominance,” and “intelligence dominance,” and are applying insights from neuroscience to exploit vulnerabilities in human cognition, to include the development of “brain control weaponry.”

Dual-Use, Radical Leveling, and Emerging Technologies

A key driver of strategic competition is the explosive growth in globally powerful “dual-use” or “dual purpose” technologies. These include mobile internet, cloud computing, the exploitation of “big data,” the “internet of things,” ubiquitous sensors, nano-materials, additive manufacturing, self-navigating vehicles, autonomous industrial and civilian robots, artificial intelligence and machine learning, advanced energy storage, renewable energy, and “do it yourself” genomics. Since the end of the Cold War, advances in these technologies have had a significant impact on military technology and operational concepts1 in areas as diverse as space and cyberspace operations, biological weapons development, precision guided munitions (PGM), the realization of transoceanic-range precision strikes, autonomous unmanned combat systems and platforms (to include swarms), directed energy combat systems, and enhanced and protected infantry.2

More profound perhaps is how existing and emerging developments in science and technology enhance power in non-kinetic engagements, creating mass disruptive “weapons” that “incur rippling effects in and across targeted individuals, societies and nations.” These actions “can adversely impact, if not defeat, an opponent …” without meeting the current legally accepted criteria of an explicit act of war. These engagements may cause immediate-to-long-term damage to popular stability, but because the perpetrator of these engagements might remain ambiguous, it is politically problematic for the victim to respond. These types of operations are exceptionally difficult to identify in advance as threats, or can evoke effects which “may not be easily recognizable or attributable to the technology or the actor(s).”3

Adversaries pursue these dual-use technologies as means to deliver effects on a population’s brains, or even its genetic code, through the use of the electromagnetic spectrum via radio frequency or directed energy.4 The increased proliferation of Chinese telecommunications hardware, platforms, and infrastructure may provide a way for the PRC to conduct surveillance, collect intelligence, and execute influence operations. It is also a means to use the frequency spectrum to deliver effects at the neurological and even genetic level.5 This would likely be done using mundane and ubiquitous technology, such as 5G networks, cell phone applications, or even music or video streams.6

Economic War Matters More

Investment decisions may telegraph human behavior and intent,7 and identify future asymmetric disruptions in ways superior to traditional strategic intelligence tradecraft. Investments can have multiplier effects that can move entire commercial sectors globally, with profound implications in a strategic competition where understanding future business models is more important than understanding future technology. 

For example, Chinese telecommunication firms can now exert considerable influence because they enjoy approximately 78% of the leverage in the $3.5 trillion global communications industry.8 These firms should not be confused with traditionally understood commercial firms in the democracies, however. The Chinese Communist Party has put in place a legal and political regime that effectively controls corporate operations. This influence began when a Chinese state-owned enterprise made the initial investment in Huawei, telegraphing the Party’s intent to influence the global telecommunications industry.9 The Party has translated its investment into geo-economic effects that create debt obligations among developing countries (“debt-trap diplomacy”) as well as provide entry to Chinese “techno-authoritarian” influence and control of communities and states outside of China.

American national security planners must consider how to build sources of economic power, and sustain that power in a time of strategic competition and conflict, when America’s competitors exercise significant leverage over American, allied, and global industries. The capture and control of key industries such as telecommunications or space systems will circumscribe U.S. power and force policymakers into more difficult trade-offs to sustain a conflict. Information is a strategic resource and should be treated as such.10

Conclusion

The strategic competition between the United States and Allies, China, and Russia, and how states attempt to create and wield power on a global scale will drive the future security environment. There are two broad competing visions of international order: the Chinese and Russian techno-authoritarian model of control, and the liberal model of broadly supported international rules. The chance of this strategic competition erupting into outright conflict is very real.

The fact that both China and the United States – and important powers such as Russia, Great Britain, India, France, Pakistan, and others – are nuclear powers shape the competition in ways similar to the Cold War. Each side will seek to achieve strategic effects while attempting to limit the likelihood of a nuclear exchange. However, as the balance between conventional and non-kinetic powers of each side fluctuate, the risk grows that competitors will see their options reduced to “go nuclear or surrender,” as President Kennedy famously suggested.

This competition, like the one with the Soviets, will require a national effort toward sustained power creation and planning toward the sustained conversion of power into wartime, crisis, and peacetime capabilities. The United States is in the early stages of evaluating its level of preparedness. There are also important distinctions between the current Information Age and how future technologies will reshape human behavior and our understanding of it, and what that means for power creation, sustainment, and rapid conversion. Theoretical frameworks drawn from the Cold War provide some broad insights, but new approaches will be required.

Ultimately, strategic competition, mobilization, and preparedness are still acts of political will, and no effort will be sustainable that does not have the broad buy-in from the American people. It will require not only engagement from senior leaders and elected officials, but also their bipartisan leadership in explaining, gaining, and keeping political support.

Part two of this article will outline what steps the U.S. and Allies should take. When the brain is a battlefield, American paradigms of conflict preparation and executions must change to meet the challenges of an increasingly connected world.

LCDR Bebber is a Cryptologic Warfare officer assigned to Information Warfare Training Command Corry Station in Pensacola, Florida. The views expressed here do not represent those of the Department of Defense, Department of the Navy or the U.S. government. He welcomes your comments at jbebber@gmail.com

Endnotes

1 Snow, Jen “Radical Leveling Technologies: What They Are, Why They Matter, and the Challenges to Come” Seminar Middlebury Institute of International Studies, Monterey, April 25, 2016.

2 Peter A. Wilson. “Concepts of National Mobilization circa 2036: Implications of Emerging Dual-Purpose and Military Technologies” prepared in support of the “Mobilization in 2030+” tabletop exercise played by the Long-Term Strategy program, (NDU Eisenhower School) March 30, 2016.

3 James Giordano, Joseph DeFranco & L.R. Bremseth “Radical Leveling and Emerging Technologies as Tools of Non-Kinetic Mass Disruption” Invited Perspective Series: Strategic Multilayer Assessment Future of Global Competition & Conflict Effort, February 3, 2019.

4 Markov, Marko S. ““Biological windows”: a tribute to W. Ross Adey.” Environmentalist 25.2-4 (2005): 67-74.

5 Ranzato, M.A., Boureau, Y.L., Chopra, S. and LeCun, Y., March. A unified energy-based framework for unsupervised learning. In Artificial Intelligence and Statistics. 2007. (pp. 371-379).

6 Adey, W.R., Brain interactions with RF/microwave fields generated by mobile phones. International Encyclopedia of Neuroscience. Third Edition. New York: Elsevier. 2003.

7 Rhemann, Maureen. Exploring Asymmetry to Detect Disruption 2018. Journal of Futures Studies 23(2), pp.85-99.

8 Rhemann, Maureen. “Disrupted. Space 2030”; Reperi Analysis Center (RAC). December, 2019.

9 USCC Research Staff, “The National Security Implications of Investments and Products from the People’s Republic of China in the Telecommunications Sector” (Washington, D.C.: U.S. – China Economic and Security Review Commission, January 2011).

10 Robert J. Bebber, “Treating Information as a Strategic Resource to Win the ‘Information War,’” Orbis Summer (2017): 394–403.

Featured Image: A naval honor guard at the in 2012 onboard the Chinese carrier Liaoning. (Xinhua News Agency Photo)

Creating a Global Accelerator Network to Launch the Digital Ocean

By Julie Angus and Michael D. Brasseur 

Oceans support the livelihoods of over three billion people, provide the primary source of protein for a third of the planet, and are the transportation corridor for over 90 percent of internationally traded goods. The global blue economy is expected to grow to $3 trillion by 2030. This explosive growth is fueled by exciting bluetech startups creating new technologies to increase our understanding and ultimately unleash the full potential of the oceans. In recognition of the important but yet untapped potential of the oceans, the United Nations Decade of Ocean Science for Sustainable Development will launch next year.

A digital ocean would advance our blue economy and ability to safeguard oceans in remarkable ways, providing unparalleled insights and access to some of the most remote and inhospitable places on our planet. This “Internet of Things” for the ocean would create a network from seafloor to ocean surface across millions of square miles. Leveraging advances in artificial intelligence, communications and robotics, a system of underwater, surface, and aerial drones could continuously patrol the maritime environment while powered primarily by the sun, wind, or waves. Data from advanced sensors, cameras, and acoustics transmitted in real-time would provide early warning for risks like oil spills, safeguard against illegal fishing, and detect subversive ships and submarines.

To achieve these innovative breakthroughs, we need bluetech companies, yet even those with great promise are extremely vulnerable in their early stages due to the challenges of fundraising, attracting talent, and product-market fit. But uniting global innovation ecosystems has the potential to foster and unify disruptive technologies to protect and make the most of shared resources like our oceans.

Accelerators nurture fledgling companies and shepherd them to a stage of greater resilience by providing business guidance, access to capital, connection to community, shared resources, and the support of a mentor network to grow early-stage tech companies. The number of accelerators increased tenfold in the U.S. between 2008 and 2014, and now there are more than 7,000 accelerators and incubators globally. According to a report by the Brookings Institute, the average value of U.S.-backed accelerator companies is $7.1 million, and for those that go on to secure venture funding, their valuation skyrockets to $90 million.

The innovation and capital creation that is unlocked through accelerators is impressive, but could it be better? What if we were to create a global accelerator network to turbocharge the bluetech sector and focus companies on the creation of the digital ocean?

To do this, we would need a driving force that can connect nations, bring them together, and focus them on a common goal. NATO, with its 30 allies and over $1 trillion dollars in annual defense expenditures, is well-positioned to lead this new global accelerator network toward a common goal, like the creation of the digital ocean. The seas are critical to NATO member states, with 24 being maritime nations, and the remainder within close proximity to the water. These nations have a shared need to protect their waters to ensure safety, economic prosperity, and food supply for their citizens.

In fact, the newly launched NATO Maritime Unmanned Systems Initiative (MUSI), which brings together 14 NATO Allies to accelerate the development and integration of unmanned systems into Allied navies, could lead the effort to create the digital ocean. Given just how vast our oceans are and how expensive ships, submarines, and aircraft have become, it is clear that drones above, on, and below the water will be critical in making the digital ocean a reality. Maritime drones, many of which are created by bluetech startups and powered by wind, solar, and wave energy, are relatively inexpensive to build and operate. And these drones, when networked over secure digital networks, could not only increase our understanding of the maritime domain, but also help secure it by providing a powerful deterrent to potential adversary submarines, seaborne migration, and illegal fishing.

NATO, led by the MUSI team, could use this shared focus and pooled resources to create a network of accelerators in member states, all working toward the same goal. Each country’s accelerator would harness the nation’s academic resources, business elites, technology giants, and venture capital to drive toward the digital ocean. This convergence of research, business, and venture creates an ecosystem that nations need to drive a culture of innovation and give rise to the startups needed to finally harness the ocean’s full potential. The accelerator’s impact would be leveraged beyond its borders by linking it to the network of NATO accelerators, all focused on exciting new bluetech to make the digital ocean a reality. These accelerators across nations would share assets, knowledge, and expertise creating a pool of resources that is unlike anything else we have seen in the accelerator space to drive the development of new technologies.

Uniting the fast-paced innovation ecosystem that flourishes within accelerators with the support and guidance of NATO, with its seven decades of experience and unparalleled resources, can be the driving force that unlocks the disruptive technologies we need to tackle the seemingly unsolvable problems in our oceans. A global accelerator network under the shared vision of NATO would leverage comparative advantage, creativity, and capital to win the race to create new technologies and implement them. It has the potential to be uniquely capable of focusing on challenges and opportunities that transcend borders, like our oceans, paving the way to create a digital ocean that would meet both our security and commercial needs, grow the ocean economy, advance sustainability and protect our waters.

Julie Angus is the CEO and co-founder of Open Ocean Robotics, a marine drone company that is transforming how we understand and protect our oceans. She is a leading adventurer, bestselling author, scientist and entrepreneur, who was awarded National Geographic’s Adventurer of the Year award when she became the first woman to row across the Atlantic Ocean from mainland to mainland.

Michael D. Brasseur co-founded and served as the first Director of the NATO Maritime Unmanned Systems Innovation & Coordination Cell (MUSIC^2), which is the key integrator and accelerator for the NATO MUS Initiative which aims combine the synergistic network effects offered by the most powerful global military alliance with the agility, ingenuity, and mindset of a start‐up to enhance the Alliance’s capabilities through manned/unmanned teaming. Michael has commanded two U.S. Navy warships, served on four others, and sailed the world’s oceans with friends and allies. His views are presented in a personal capacity and do not necessarily reflect those of any government or agency.

Julie and Michael both serve on the NATO Maritime Unmanned Systems Innovation Advisory Board (IAB), providing advice on how best to improve, accelerate and scale the NATO MUS Initiative. 

Featured Image: The port of Cape Town, South Africa. (Wikimedia Commons)

Don’t Neglect the Easy Wins for Military AI

By Christian Heller

The defense community is captivated with artificial intelligence (AI) and its possible impacts on warfare. There has been much debate on AI’s impact on offensive and defensive operations, nuclear command and control, and information warfare. AI experts worry about the dangers of ultrafast AI decision-making, the U.S.-China AI arms race, the level of autonomy granted to robots, and the overall threat to humans with increased AI independence.

The Department of the Navy (DoN) has responded with building organizations to help integrate AI into the military services. Most prolific of these groups are the Algorithmic Warfare Cross-Functional Team (also known as Project Maven) and the Joint Artificial Intelligence Center (JAIC). Project Maven’s efforts focus on using AI to support the processing, exploitation, and dissemination (PED) of video and imagery intelligence. These efforts also include using AI to exploit captured enemy material (CEM), acoustic intelligence (ACINT), and publicly available information (PAI, also known as Open-Source Intelligence, or OSINT). The JAIC’s first two initiatives were predictive maintenance and humanitarian assistance/disaster relief. Later last year, they expanded to include cyberspace and robotic process automation.

While these lines of effort are important, they pursue difficult, hard-to-achieve tactical goals while ignoring the easy, low-hanging-fruits of AI implementation within the bureaucracy. Self-targeting drones, deep fakes, and global integrated predictive analytics platforms are worthwhile, but the Navy can achieve better and faster returns on its investments by pursuing unglamorous AI efforts in the fields of manpower and administration. With a renewed willingness to rebuild the services to face the threats of the future, now is the ideal team to embrace AI.

Manpower

Existing uses of AI in the private sector can be implemented by the DoN to support recruiting, training, retention, promotions, and billet assignments. Numerous companies are using AI to help their hiring managers identify and recruit employees. Recruiting commands could adopt these services to reduce their personnel burden and increase their effectiveness. Montage combines AI, process automation, and analytics to personalize the recruitment process toward specific candidates. Textio helps recruiters choose the right words and language to attract the right people. Firms like Koru use predictive AI to better match candidates to available positions and could change the way the services assign personnel to specialties and units.

Many companies have already implemented cost-saving AI measures such as these. Google worked with American Eagle to customize their marketing to individual consumers, similar to how the services could customize efforts for individual recruits and better manpower management. Amazon, Starbucks, and Nike all use AI to personalize customer engagement and marketing. LinkedIn uses AI for its LinkedIn Recruiter platform to identify the best candidates for hiring managers, and Home Depot and Dyson use AI programs to identify candidates based on their internal databases, social media, and public job boards.

The lack of continuity of knowledge is endemic to the DoN where service members continuously change billets and commands. Turnover is high and leads to a severe lack of institutional knowledge. This turnover means the time-cost of retraining a replacement detracts from time spent advancing a project forward. AI training systems can help. IBM has partnered with firms to help departing employees document their knowledge for future workers. AI then indexes and sorts the information to make it more easily available, and successful efforts have already reduced the search times for previous knowledge by 75 percent.

The Navy and DARPA already proved the relevance of AI to training service members. A combined project in which a digital AI tutor led new sailors though their training saw AI-trained students “frequently outperform Navy experts with 7-10 years of experience.” AI startups like Bakpax aid teachers with their grading to identify specific personal needs for students and speed up the corrective process. A study by Johns Hopkins University found that students using Knewton, one of the original AI education startups which personalizes learning plans and materials for students, performed better compared to peers. Improvements in training may not seem like a critical requirement for the services, but training and development is viewed as the primary job benefit by millennials in choosing their employer.

AI also can help reform promotion processes with are plagued with inefficiency. Analytics firms like Palatine are helping leaders make better personnel decisions to identify strengths, weaknesses, and future potential. Well-meaning efforts within the Navy and Army are attempting to combat this issues, but AI can help eliminate recurrent human problems like bias from hiring and advancement.

Companies like Adecco are already able to prescreen candidates based on skillsets, geographic preferences, experiences, and availability to open locations. Its scale is massive: AI manages their timesheets, payroll, and work prioritization for its 700,000 workers and recruiters. A similar process could be applied to initial training and follow-on unit assignments to better meet the needs of commands and services while still satisfying the lifestyle demands of individuals and families.

Retention is a problem in both the government and the private sector, but AI solutions exist which can help. This increased level of human resources personalization towards recruiting, training, and billet assignments could drastically improve morale within the services and help retain talent for the DoN. Dissatisfaction with supervisors and a lack of appreciation are two of the main reasons employees quit, and AI and sentiment analysis can help manage those effects. AI management tools also help manage workloads and burnout, which, in a military environment, could prevent catastrophes.

Administration

The routine tasks of administration with the DoN and services can be significantly augmented by existing AI services. Document preparation, completion, and handling; payment and voucher processing; policy and guidance administration; and archival storage and retrieval are all carried out by AI at varying levels within the private sector. A Harvard Business Review study found that the majority of AI projects implemented by businesses involve automating back-office tasks. These tasks include updating personnel files from e-mails and call centers, as well as extracting and updating records between multiple systems. These examples found that process-automation is the cheapest and easiest of AI technologies to implement. Administrative programs can significantly reduce the time required for manually processing high numbers of different paperwork with inaccuracies or inconsistencies, and other government agencies like NASA have already adopted these practices in some departments.

Paperwork and process automation is well-established. For instance, the consulting and accounting firm Deloitte has automated thousands of forms and saved thousands more hours of labor for its clients in the financial sector. The accounting firm KPMG partnered with IBM and Watson to learn from 10,000 documents and help its tax advisors better serve their clients. Google’s Vision OCR detects text, character, and images in documents of various file types to extract, organize, and process the relevant information. Amazon’s Textract claims to go further by creating “smart search indexes” and automated workflows for processing documents through various departments.

Today’s tech leaders – Google, Amazon, Apple, and Microsoft – each have their own AI-powered assistants which businesses can implement to streamline management and coordination. Routine work like task management, calendar management, and emails and communication can be augmented by these tools.  Businesses can also use these tools to manage facilities and systems. These same tools can be used to engage leaders and commands with their service members using 24/7 assistance. Major companies like General Electric have adopted these tools, and IBM’s Watson Assistant has led to 40 percent reductions in time spent on administrative tasks.

Transitioning these types of workloads to, or augmenting them with, AI services can reduce the time burden currently placed upon staff officers and administrative specialists. In addition to large companies like Google and Amazon, start-ups like x.ai, Voicea, and Sigrid all perform a variety of tasks like coordinating calendars and meeting schedules, setting up conference calls, managing receipts and travel processes, scheduling transportation, and scanning and saving relevant files. Communications platforms like Zoom already auto-transcribe meetings and then publish the results as text-files for easy searches.

One key way AI is changing administrative work is aiding companies in their legal and regulatory compliance. With overlapping, always changing, and sometimes contradictory sets of policies and guidance, the DoN and the services could benefit from AI tools to assist leaders at both the senior and junior levels with policy adherence. AI has allowed insurance firms, one of the most highly-regulated and complex industries in the world, to analyze documents and process claims 25 percent faster.

Savings and Possibilities

Despite the difficulties which government agencies often have when implementing new technologies, examples of effective AI adoption already exist in some areas: the review and validation of 50,000 PDF records for a federal healthcare agency, state governments achieving 100 percent compliance for land lease payments and management, and state health insurance marketplaces responding to over 1,500 customers per day. In the United Kingdom, both the Ministry of Justice and the Department for Transport have implemented AI tools to provide better services to their citizens.

Adopting AI services to aid in manpower and administrative functions will pay for themselves with an outsized return-on-investment, and free up manpower and time which the services can redirect to other specialized needs. Even a small reduction in cost can provide substantial returns. For example, a 1 percent savings in the recruiting and training budgets for the Army ($5.1 billion), Navy ($2.1 billion), and Air Force ($2.4 billion) would result in $96 million in savings. A 1 percent savings in the services’ combined administrative budgets would result in over $200 million saved. Manpower can also be reduced in these respective areas to free personnel numbers for different MOS’s or operations. For example, decreases in administrative, training, and departmental management manpower for the Army (195,500), Navy (103,800), Marine Corps (56,100), and Air Force (125,100) could allocate thousands of billets for other duties.

Conclusion

These savings and efficiency measures are even more important considering the DoN’s increased emphasis on re-allocating funding toward research and innovation. AI support for tactical military purposes certainly deserves its own attention and prioritization, but the services and their leadership must not be quick to reject the immediate benefits to be gained by AI-services in the routine and familiar worlds of manpower and administration. These implementations can provide the highest near-term benefit and make additional funds and resources available for tactical AI research or other battlefield capabilities.

Christian Heller is a graduate of the U.S. Naval Academy and the University of Oxford. He currently works as an officer in the U.S. Marine Corps, and can be followed on Twitter @hellerch.

Featured Image: Server room of BalticServers (Wikimedia Commons)