Tag Archives: US Army Special Operations Command (USASOC)

A Worldwide Web that Kills with Success

Doubts are growing about the satellites, warships and other big pieces of hardware involved in the command and control of America’s military might. For the past couple of decades the country’s generals and admirals have focused their attention on defeating various forms of irregular warfare. For this, these castles in the sky and at sea have worked well. In the meantime, however, America’s rivals have been upgrading their regular forces—including weapons that can destroy such nodes of power. Both China and Russia have successfully blown up orbiting satellites. And both have developed, or are developing, sophisticated long-range anti-aircraft and anti-ship missiles.

As a result, America is trying to devise a different approach to C2, as command and control is known in military jargon. The Department of Defense has dubbed this idea “Joint All-Domain Command and Control”, or JADC2. It aims to eliminate vulnerable nodes in the system (e.g., satellites) by multiplying the number of peer-to-peer data links that connect pieces of military hardware directly to one another, rather than via a control center that might be eliminated by a single, well-aimed missile.

The goal, officials say, is to create a network that links “every sensor and every shooter”. When complete, this will encompass sensors as small as soldiers’ night-vision gear and sonar buoys drifting at sea, and shooters as potent as ground-based artillery and aerial drones armed with Hellfire missiles.

One likely beneficiary of the jadc2 approach is Anduril Industries, a Californian firm…Its products include small spy helicopter drones; radar, infrared and optical systems constructed as solar-powered towers; and paperback-sized ground sensors that can be disguised as rocks

Sensors come in still-more-diverse forms than Anduril’s, though. An autonomous doglike robot made by Ghost Robotics of Philadelphia offers a hint of things to come. In addition to infrared and video systems, this quadruped, dubbed v60 q-ugv, can be equipped with acoustic sensors (to recognise, among other things, animal and human footsteps), a millimetre-wave scanner (to see through walls) and “sniffers” that identify radiation, chemicals and electromagnetic signals. Thanks to navigation systems developed for self-driving cars, v60 q-ugv can scamper across rough terrain, climb stairs and hide from people. In a test by the air force this robot was able to spot a mobile missile launcher and pass its location on directly to an artillery team…

Applying Artificial Intelligence (AI) to more C2 processes should cut the time required to hit a target. In a demonstration in September 2020, army artillery controlled by AI and fed instructions by air-force sensors shot down a cruise missile in a response described as “blistering”…

There are, however, numerous obstacles to the success of all this. For a start, developing unhackable software for the purpose will be hard. Legions of machines containing proprietary and classified technologies, new and old, will have to be connected seamlessly, often without adding antennae or other equipment that would spoil their stealthiness…America’s technologists must, then, link the country’s military equipment into a “kill web” so robust that attempts to cripple it will amount to “trying to pop a balloon with one finger”, as Timothy Grayson, head of strategic technologies at DARPA, the defense department’s main research agency, puts it…

Excerpts from The future of armed conflict: Warfare’s worldwide web, Economist,  Jan. 9, 2021

How to Manipulate People in War

“We have, in my view, exquisite capabilities to kill people,” said Lt. Gen. Charles Cleveland. “We need exquisite capabilities to manipulate them.”  Psychological subtlety and the US military don’t always go hand-in-hand. Worldwide, we’ve become better known for drone strikes and Special Operations raids to kill High Value Targets. But that wasn’t enough for the last 13 years of war, according to a RAND study …“We’ve built a great apparatus for terrorism and to some degree we’ve got to be careful that doesn’t create blind spots,” Cleveland said… during a panel discussion at RAND. “There’s a cottage industry that’s built up around it [counter-terrorism]. You run the risk of basically taking on an entrenched infrastructure” whenever you try to broaden the focus killing and capturing the bad guys, he said, but we have to try.

“I don’t think we understand completely the fight we’re in,” Cleveland said. …In the US, though, “we’re horrible at ‘influence operations,’” said Cleveland. The US approach is “fractured” among multiple specialties and organizations, he said. Some key elements are in Cleveland’s USASOC — civil affairs, for example, and Military Information Support Operations (MISO), formerly known as psychological operations — while others lie entirely outside — such as cyber and electronic warfare.

To the extent US forces address psychology, propaganda, and politics at all, we tend to do it as an afterthought. “We routinely write a plan for kinetic action, and buried in there is the information operations annex,” said William Wechsler, deputy assistant secretary of Defense for special operations and combating terrorism. “Many times, it should be the opposite…. When you’re dealing with these types of adversaries [e.g. ISIL], that is often the decisive line of operations.”

That’s just one example of how the US ties its own hands with organizations, processes, even laws — indeed, an entire national security culture — designed for a very different kind of warfare. All warfare is a clash of wills, Clausewitz famously said, but Americans tend to fixate on technology and targets, not winning — or intimidating — hearts and minds….” Even when unconditional surrender is the goal, victory always means convincing the enemy to stop fighting….

Likewise, local partners are rarely reliable allies, but they aren’t the enemy either. Commanders need to understand the good, bad, and ugly of partners who may be corrupt, inept, or grinding their own political axes on the heads of rival ethnic groups. US intelligence, however, is still geared to figuring out “the enemy,” defined as a clear-cut foe. “…Where combat advisors are allowed, their roles must be negotiated between the host government and the US country by country, case by case, and there are usually strict restrictions — often imposed by American political leaders fearful of putting US troops in harm’s way.  “Putting people on the ground to do this kind of work is inherently more risky than flying an Unmanned Aerial Vehicle and dropping a Hellfire, but we have to learn how to accept that risk, because this at the end of the day is much more often the decisive line of operation,” said Wechsler….

“We are shooting behind the target in almost every case,” said Hix, because we have to grind through our methodical, outdated planning process while adversaries innovate. A new Joint Concept does away with the traditional “Phase 0″ through “Phase 5″ system, which conceives the world in terms of before, during, and after major conflicts, Hix told me after the panel. In the new world disorder, “we need those resources and authorities in what we consider to be ‘peace,”” he said. If you don’t have them, he warned, “your enemy’s playing chess while you’re playing checkers.”

By SYDNEY J. FREEDBERG JR., Killing Is Not Enough: Special Operators, Breaking Defense, Dec. 16, 2014