US Ready To Fight Hybrid War By 2030

The US Army’s new draft strategy for 2025 to 2040 expects enemies to attack ever more lethally in multiple domains, land, sea, air, space, and cyber online, while blurring the distinction between peace and war.

To meet these foes, the strategy says, the Army of the future must be much more mobile, with small teams that can fight like today’s large units, and do it in every domain of warfare, simultaneously.

The Army’s Training and Doctrine Command, or TRADOC, creates guides that the Army uses to draft field manuals and train troops for tomorrow’s fights.

Last month they released a draft of their newest “concept document” that lays out the Army’s best guess about the enemy of the future.

Titled Multi-Domain Battle: Evolution of Combined Arms for the 21st Century, 2025-2040, it repeats one key point over and over again: Adversaries will make life as difficult as possible for US troops by not declaring themselves to be the enemy, or, as the concept puts it, by “combining regular and irregular forces with criminal and terrorist enterprises to attack the Joint Force’s vulnerabilities while avoiding its strength.”

That idea is not entirely new. The world got a great glimpse of what modern, blended warfare looks like when thousands of little green men invaded Ukraine’s Crimean peninsula in 2014.

“Adversaries have blurred the distinction between actions ‘below armed conflict’ and ‘conflict,’ enabling the achievement of strategic military objectives short of what the US traditionally considers ‘war,’” the document says.

The concept goes on to describe four other reasons the Army cannot successfully fight wars the way it has in the past:

1. The exponential speed of information technology. US forces can’t assume that they will have the best phones, drones, or computer hardware on the battlefield. As computers get smaller, cheaper, and more widely available, US tech advantages will disintegrate.

2. Warfare will be much more urban. Some 60 percent (conservatively) of the Earth’s population will live in cities in 2030, many in megacities with populations of more than 10 million. This is where adversaries will try to engage US forces, not in open fields or deserts where today’s Army and its enormous battle vehicles have the advantage.

3. The Internet will be a key aspect of the battlefield, not just in terms of trading cyber-attacks with enemy hackers but in the need to constantly and expertly shape global opinion about the conflict.

Troll armies spreading fake news and disinformation, coupled with enough social-media traffic to overwhelm open-source analysts, could “complicate the Army’s ability to gain and maintain an accurate, up-to-date, intelligence-driven understanding of the situation, as well as control of the information environment,” the document says.

4. Every bad guy becomes The Joker. The Army sees a rise of “Super-empowered individuals and small groups” who can “use access to cyberspace, space, and nuclear, biological, radiological, and chemical weapons of mass effects to change the battlespace calculus and redefine the conditions of conflict resolution.” Read that to mean: lone wolves and minuscule teams with the power to rival many of today’s nation-states.

Even the spread of personal phones and the Internet of Things will make US troops easier targets. “Unmanaged signatures will become a critical US vulnerability because the adversary’s forces will increasingly possess the ability to find and attack US and allied forces at strategic, operational, and tactical distances simultaneously,” the document says.

To fight in this environment, the US Army will move toward smaller, much more versatile, and more capable formations, somewhat like today’s special operations forces that can embark on a wide variety of missions.

These “semi-independent” formations won’t just be tasked with winning territory and holding it. They’ll have to do everything from flying drones (and defending against them) to shooting missiles deep into enemy territory (and getting the targeting data to do it) to outflanking the bad guys in cyberspace. And they’ll have to do it with less protection.

“Formations must maneuver semi-independently, without secured flanks, constant communications with higher headquarters, and continuous lines of communications,” the document says.

The “semi-independent” part is key. The Army still sees these smaller groups as connected to a much larger whole, perhaps even more so, but that doesn’t mean a return to large tank formations.

Nor does it mean that every tiny, mobile, Swiss-Army-knife formation will also carry an enormous missile battery. Rather, little teams will have to be able to access capabilities like drones and fire support from somewhere, but the capabilities themselves will likely be shared, similar to how people use Uber.

This idea of small, nimble, loosely connected nodes in sprawling networks fits well with what other services’ leaders have described as the future of the Navy and the Air Force.

It’s a future where every node become smaller, and where connections grow in number even as connectivity itself is challenged.

DefenseOne:

You Might Also Read:

Russian General Brags About Cyberwar Successes:

Cyber Warfare Opens A New Front Against Civilians:

How A Cyber Attack Transformed Estonia:

 

« Cyber Security Insurance
Where Should The Pentagon Focus In Cyberspace? »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Davis Wright Tremaine (DWT)

Davis Wright Tremaine (DWT)

Davis Wright Tremaine is a full-service law firm with offices throughout the US and in Shanghai, China. Practice areas include Technology, Privacy & Security.

Site24x7

Site24x7

Site24x7 is an AI-powered observability platform for DevOps and IT operations.

Fastpath Solutions

Fastpath Solutions

Fastpath deliver software solutions that enable you to take control of your security, compliance and risk management initiatives.

ARC Advisory Group

ARC Advisory Group

ARC is a leading technology research and advisory firm with expertise in both information technologies (IT) and operational technologies (OT)

Cyber Resilient Energy Delivery Consortium (CREDC)

Cyber Resilient Energy Delivery Consortium (CREDC)

CREDC performs multidisciplinary R&D in support of the Energy Sector Control Systems Working Group’s Roadmap of resilient Energy Delivery Systems (EDS).

CyberSecurityTrainingCourses.com

CyberSecurityTrainingCourses.com

Cyber Security Training Courses is a portal to help candidates find the best courses to progress their career within the IT security industry.

Netography

Netography

Netography provides a scalable and reliable platform for detection & remediation of cyber threats found on your network.

Financial Services Information Sharing and Analysis Center (FS-ISAC)

Financial Services Information Sharing and Analysis Center (FS-ISAC)

The Financial Services Information Sharing and Analysis Center is the only global cyber intelligence sharing community solely focused on financial services.

Canonic Security

Canonic Security

Canonic streamlines app review, continuously monitors apps, and reduces the risks involved in third-party access to your data.

Ostra Cybersecurity

Ostra Cybersecurity

As a next-generation MSSP, Ostra Cybersecurity combines best-in-class tools, proprietary technology and exceptional talent to deliver Fortune 100-level protection for businesses of all sizes.

European Union Agency for Network and Information Security (ENISA)

European Union Agency for Network and Information Security (ENISA)

The European Union Agency for Cybersecurity, ENISA, is the Union’s agency dedicated to achieving a high common level of cybersecurity across Europe.

ZEUSS

ZEUSS

ZEUSS is a diversified data center, cybersecurity, and green energy company.

RESTIV Technology

RESTIV Technology

RESTIV Compliance Copilot is your partner in continuous compliance. Real-time monitoring, continuous testing, and transparent evidence—no surprises, just peace of mind.

Corvid Cyberdefense

Corvid Cyberdefense

Corvid Cyberdefense provides military-grade cybersecurity as a service for growing organizations and municipalities of all sizes.

COcyber

COcyber

COcyber aims to enhance collaboration between the cybersecurity civilian and defence spheres. It is a two-year project funded by the European Union and it kicked off in July 2024.

Cyshield

Cyshield

Since 2016, Cyshield has been a leader in cybersecurity and digital solutions. We have worked on 350+ projects, earning a reputation as a trusted consultant in the digital world.