US Ready To Fight Hybrid War By 2030

The US Army’s new draft strategy for 2025 to 2040 expects enemies to attack ever more lethally in multiple domains, land, sea, air, space, and cyber online, while blurring the distinction between peace and war.

To meet these foes, the strategy says, the Army of the future must be much more mobile, with small teams that can fight like today’s large units, and do it in every domain of warfare, simultaneously.

The Army’s Training and Doctrine Command, or TRADOC, creates guides that the Army uses to draft field manuals and train troops for tomorrow’s fights.

Last month they released a draft of their newest “concept document” that lays out the Army’s best guess about the enemy of the future.

Titled Multi-Domain Battle: Evolution of Combined Arms for the 21st Century, 2025-2040, it repeats one key point over and over again: Adversaries will make life as difficult as possible for US troops by not declaring themselves to be the enemy, or, as the concept puts it, by “combining regular and irregular forces with criminal and terrorist enterprises to attack the Joint Force’s vulnerabilities while avoiding its strength.”

That idea is not entirely new. The world got a great glimpse of what modern, blended warfare looks like when thousands of little green men invaded Ukraine’s Crimean peninsula in 2014.

“Adversaries have blurred the distinction between actions ‘below armed conflict’ and ‘conflict,’ enabling the achievement of strategic military objectives short of what the US traditionally considers ‘war,’” the document says.

The concept goes on to describe four other reasons the Army cannot successfully fight wars the way it has in the past:

1. The exponential speed of information technology. US forces can’t assume that they will have the best phones, drones, or computer hardware on the battlefield. As computers get smaller, cheaper, and more widely available, US tech advantages will disintegrate.

2. Warfare will be much more urban. Some 60 percent (conservatively) of the Earth’s population will live in cities in 2030, many in megacities with populations of more than 10 million. This is where adversaries will try to engage US forces, not in open fields or deserts where today’s Army and its enormous battle vehicles have the advantage.

3. The Internet will be a key aspect of the battlefield, not just in terms of trading cyber-attacks with enemy hackers but in the need to constantly and expertly shape global opinion about the conflict.

Troll armies spreading fake news and disinformation, coupled with enough social-media traffic to overwhelm open-source analysts, could “complicate the Army’s ability to gain and maintain an accurate, up-to-date, intelligence-driven understanding of the situation, as well as control of the information environment,” the document says.

4. Every bad guy becomes The Joker. The Army sees a rise of “Super-empowered individuals and small groups” who can “use access to cyberspace, space, and nuclear, biological, radiological, and chemical weapons of mass effects to change the battlespace calculus and redefine the conditions of conflict resolution.” Read that to mean: lone wolves and minuscule teams with the power to rival many of today’s nation-states.

Even the spread of personal phones and the Internet of Things will make US troops easier targets. “Unmanaged signatures will become a critical US vulnerability because the adversary’s forces will increasingly possess the ability to find and attack US and allied forces at strategic, operational, and tactical distances simultaneously,” the document says.

To fight in this environment, the US Army will move toward smaller, much more versatile, and more capable formations, somewhat like today’s special operations forces that can embark on a wide variety of missions.

These “semi-independent” formations won’t just be tasked with winning territory and holding it. They’ll have to do everything from flying drones (and defending against them) to shooting missiles deep into enemy territory (and getting the targeting data to do it) to outflanking the bad guys in cyberspace. And they’ll have to do it with less protection.

“Formations must maneuver semi-independently, without secured flanks, constant communications with higher headquarters, and continuous lines of communications,” the document says.

The “semi-independent” part is key. The Army still sees these smaller groups as connected to a much larger whole, perhaps even more so, but that doesn’t mean a return to large tank formations.

Nor does it mean that every tiny, mobile, Swiss-Army-knife formation will also carry an enormous missile battery. Rather, little teams will have to be able to access capabilities like drones and fire support from somewhere, but the capabilities themselves will likely be shared, similar to how people use Uber.

This idea of small, nimble, loosely connected nodes in sprawling networks fits well with what other services’ leaders have described as the future of the Navy and the Air Force.

It’s a future where every node become smaller, and where connections grow in number even as connectivity itself is challenged.

DefenseOne:

You Might Also Read:

Russian General Brags About Cyberwar Successes:

Cyber Warfare Opens A New Front Against Civilians:

How A Cyber Attack Transformed Estonia:

 

« Cyber Security Insurance
Where Should The Pentagon Focus In Cyberspace? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Libraesva

Libraesva

Libraesva specialize in Email Security. From Email Security, Phishing Awareness and Email Archiver. We can assist you with any email issues you may have.

Logscape

Logscape

Logscape provides a big data analytical tool for log file analysis and operational analytics.

qSkills

qSkills

QSkills is an independent training provider specialized high-quality IT and IT management training courses including IT security.

Cyber Security Expo

Cyber Security Expo

Cyber Security EXPO is a unique one day recruitment event for the cyber security industry.

RunSafe Security

RunSafe Security

RunSafe Security is the pioneer of a patented cyberhardening transformation process designed to disrupt attackers and protect vulnerable embedded systems and devices.

CLDigital

CLDigital

CLDigital's no-code risk and resilience platform, CL360, provides leaders with risk and resilience data to make strategic and tactical continuity decisions.

Bace Cybersecurity Institute (BCI)

Bace Cybersecurity Institute (BCI)

Bace Cybersecurity Institute focuses on understanding, empowering and taking action across four critical areas driving continual improvement toward a safer, more secure cyber world.

Vector Informatik

Vector Informatik

Vector Informatik is a specialist in automotove electronics and provides services, embedded software and tools for securing embedded systems against cyber-attacks.

Quside

Quside

Quside, a spin-off from The Institute of Photonic Sciences in Barcelona, designs and manufactures innovative quantum technologies for a wide range of applications including cyber security.

National Institute for Research & Development in Informatics (ICI Bucharest) - Romania

National Institute for Research & Development in Informatics (ICI Bucharest) - Romania

ICI Bucharest is the most important institute in the field of research, development and innovation in information and communication technology (ICT) in Romania.

IntelliDyne

IntelliDyne

IntelliDyne is a leading information technology consulting firm enabling better mission performance through innovative technology solutions.

Harbor Networks

Harbor Networks

Harbor Networks is a communications systems integrator and managed services provider. We provide business consultation services for voice and data communication technology.

SecurityLoophole

SecurityLoophole

SecurityLoophole is an independent cyber security news platform with global coverage. Latest updates, reports, news and events related to cyber security.

Gathid

Gathid

Gathid is a unique and versatile identity governance platform providing organizations with the ability to model, explore, audit, and track complex access-related scenarios.

Cloud Native Computing Foundation (CNCF)

Cloud Native Computing Foundation (CNCF)

CNCF seeks to drive adoption of cloud native technologies by fostering and sustaining an ecosystem of open source, vendor-neutral projects.

Accompio

Accompio

Accompio offer comprehensive support in the digitalisation of your business processes.