US Ready To Fight Hybrid War By 2030

The US Army’s new draft strategy for 2025 to 2040 expects enemies to attack ever more lethally in multiple domains, land, sea, air, space, and cyber online, while blurring the distinction between peace and war.

To meet these foes, the strategy says, the Army of the future must be much more mobile, with small teams that can fight like today’s large units, and do it in every domain of warfare, simultaneously.

The Army’s Training and Doctrine Command, or TRADOC, creates guides that the Army uses to draft field manuals and train troops for tomorrow’s fights.

Last month they released a draft of their newest “concept document” that lays out the Army’s best guess about the enemy of the future.

Titled Multi-Domain Battle: Evolution of Combined Arms for the 21st Century, 2025-2040, it repeats one key point over and over again: Adversaries will make life as difficult as possible for US troops by not declaring themselves to be the enemy, or, as the concept puts it, by “combining regular and irregular forces with criminal and terrorist enterprises to attack the Joint Force’s vulnerabilities while avoiding its strength.”

That idea is not entirely new. The world got a great glimpse of what modern, blended warfare looks like when thousands of little green men invaded Ukraine’s Crimean peninsula in 2014.

“Adversaries have blurred the distinction between actions ‘below armed conflict’ and ‘conflict,’ enabling the achievement of strategic military objectives short of what the US traditionally considers ‘war,’” the document says.

The concept goes on to describe four other reasons the Army cannot successfully fight wars the way it has in the past:

1. The exponential speed of information technology. US forces can’t assume that they will have the best phones, drones, or computer hardware on the battlefield. As computers get smaller, cheaper, and more widely available, US tech advantages will disintegrate.

2. Warfare will be much more urban. Some 60 percent (conservatively) of the Earth’s population will live in cities in 2030, many in megacities with populations of more than 10 million. This is where adversaries will try to engage US forces, not in open fields or deserts where today’s Army and its enormous battle vehicles have the advantage.

3. The Internet will be a key aspect of the battlefield, not just in terms of trading cyber-attacks with enemy hackers but in the need to constantly and expertly shape global opinion about the conflict.

Troll armies spreading fake news and disinformation, coupled with enough social-media traffic to overwhelm open-source analysts, could “complicate the Army’s ability to gain and maintain an accurate, up-to-date, intelligence-driven understanding of the situation, as well as control of the information environment,” the document says.

4. Every bad guy becomes The Joker. The Army sees a rise of “Super-empowered individuals and small groups” who can “use access to cyberspace, space, and nuclear, biological, radiological, and chemical weapons of mass effects to change the battlespace calculus and redefine the conditions of conflict resolution.” Read that to mean: lone wolves and minuscule teams with the power to rival many of today’s nation-states.

Even the spread of personal phones and the Internet of Things will make US troops easier targets. “Unmanaged signatures will become a critical US vulnerability because the adversary’s forces will increasingly possess the ability to find and attack US and allied forces at strategic, operational, and tactical distances simultaneously,” the document says.

To fight in this environment, the US Army will move toward smaller, much more versatile, and more capable formations, somewhat like today’s special operations forces that can embark on a wide variety of missions.

These “semi-independent” formations won’t just be tasked with winning territory and holding it. They’ll have to do everything from flying drones (and defending against them) to shooting missiles deep into enemy territory (and getting the targeting data to do it) to outflanking the bad guys in cyberspace. And they’ll have to do it with less protection.

“Formations must maneuver semi-independently, without secured flanks, constant communications with higher headquarters, and continuous lines of communications,” the document says.

The “semi-independent” part is key. The Army still sees these smaller groups as connected to a much larger whole, perhaps even more so, but that doesn’t mean a return to large tank formations.

Nor does it mean that every tiny, mobile, Swiss-Army-knife formation will also carry an enormous missile battery. Rather, little teams will have to be able to access capabilities like drones and fire support from somewhere, but the capabilities themselves will likely be shared, similar to how people use Uber.

This idea of small, nimble, loosely connected nodes in sprawling networks fits well with what other services’ leaders have described as the future of the Navy and the Air Force.

It’s a future where every node become smaller, and where connections grow in number even as connectivity itself is challenged.

DefenseOne:

You Might Also Read:

Russian General Brags About Cyberwar Successes:

Cyber Warfare Opens A New Front Against Civilians:

How A Cyber Attack Transformed Estonia:

 

« Cyber Security Insurance
Where Should The Pentagon Focus In Cyberspace? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Pen Test Partners LLP

Pen Test Partners LLP

Pen Test Partners provides penetration testing, security assessment and training services.

Feedzai

Feedzai

Feedzai provide software that uses big data analysis and machine-based learning to prevent fraud in ecommerce.

Conix

Conix

Conix offerings include Governance and Risk Management, Auditing and Penetration Testing, Digital Forensics, Managed Security Operations Centre (SOC).

Squalio

Squalio

Squalio is an information technology group that delivers solutions and services for secure and effective IT management.

Reed

Reed

reed.co.uk is a leading job site in the UK, providing a full online service for anyone looking for a new job.

HSB

HSB

HSB offers insurance for equipment breakdown, cyber risk, data breach, identity recovery & employment practices liability.

Hold Security

Hold Security

Hold Security works with companies of all sizes to provide unparalleled Threat Intelligence services that actually make a difference.

PizzlySoft

PizzlySoft

PizzlySoft is a global company that is seeking convergence of network and security / software and hardware. We put our value on creating the best security.

InferSight

InferSight

InferSight can help you design an architecture that takes into account security, performance, availability, functionality, resiliency and future capacity to avoid technological lock in and limitations

VCG Group

VCG Group

VCG provides everything you need for the design, implementation and management of data centres, cyber-secure enterprise networks, cloud and connectivity services.

Celera Networks

Celera Networks

Celera Networks is a managed services provider specializing in cybersecurity, cloud and managed IT services.

Riot Security

Riot Security

In today's world, most successful cyberattacks start by a human failure. Riot have developed a platform that makes it easy to prepare your employees for cyberattacks, in a way they love.

Kodem Security

Kodem Security

Our mission is to make AppSec simple. Meet the world’s first dynamic software composition analysis platform. Only Kodem uses runtime intelligence to determine application risk.

Certera

Certera

Certera is a modern and affordable SSL Certificate, Code Signing Certificate, and Cyber Security Services provider.

Hughes Network Systems

Hughes Network Systems

Hughes are industry leaders in networking technologies and services, innovating constantly to deliver the global solutions that power a connected future for people, enterprises and things everywhere.

Sasken Technologies

Sasken Technologies

Sasken’s Cybersecurity Services enables enterprises to develop, maintain, and take digital products to the market with security postures that empower operational excellence.