Enter a post title

 Mitt Romney.

           THE TRANSFORMATION OF WAR AND THE FUTURE OF THE CORPS

 

                     Major Robert David Steele, USMCR

 

                   Cleared for Publication 28 April 1992

 

     The Marine Corps, in combination with supporting Navy

elements, is our Nation's "911" force, well‑positioned to serve

in a variety of joint, combined, and‑‑if necessary‑‑unilateral

roles across the spectrum of combat and non‑combat operations.

The Department of the Navy 1992 Posture Statement, and the

Remarks of General Carl E. Mundy, Jr. Before Congress (Gazette,

April 1992), clearly outline how far we have come revitalizing

our traditional emphasis on littoral operations, and how we are

preserving our core capabilities in the face of imposed

reductions.

 

     All this is good.  Never‑the‑less, lost in the vortex caused

by a changing Unified Command Plan, sharp reductions in manning

and resources, and mixed (or absent) signals from national and

defense intelligence about the nature of the future threat, is

the fundamental fact that war as we know it has been transformed.

The future of the Corps depends not just on getting leaner while

maintain its traditional expeditionary emphasis, but on our

recognizing that we must train, equip, and organize our forces to

deal with four completely distinct types of opposing warrior

classes.

 

 

 

                           GUERRILLA

  Physical    HIGH TECH      WARS      LOW TECH    Natural

  Stealth,    BRUTES                    BRUTES     Stealth,

  Precision   (MIC/HIC)                 (LIC)      Random

  Targeting          Money‑‑Ruthlessness           Targeting

 

    ECONOMIC WAR       Power Base        TERRORISM

 

  Cyber‑             Knowledge‑‑Ideology           Ideo‑

  Stealth,    HIGH TECH                LOW TECH    Stealth,

  Database     SEERS                    SEERS      Mass

  Targeting   (C3I WAR)    CULTURAL    (JIHAD)     Targeting

                             WARS

 

 

                Figure 1.  Four Warrior Classes Illustrated

 

     Although appearing complex, the above figure simply shows

essential distinctions between each warrior class: its power

base, its preferred mode of warfare, its stealth mode, and its

targeting approach.  Additionally, the figure shows the four

 

kinds of war (guerrilla, terrorism, cultural, and economic) which

might be encountered between different sets of warrior classes.

 

     I have elected to identify these four classes of warriors as

the high‑tech brutes, the low‑tech brutes, the high‑tech seers,

and the low‑tech seers.  Something of their nature is illustrated

in Figure 1.  Each of these warrior classes has different

strategies, capabilities, and vulnerabilities.  Each has a

different source of power, a different approach to warfare, and a

different command and control, communications, computer, and

intelligence structure which must be dominated in the attack and

the defense.

 

     Below are four summations of each warrior class.

 

 

        High Tech Brutes       |        Low Tech Brutes

                               |

   Rely on money and capital,  |   Rely on "low slow singleton"

 physical stealth of equipment,| invisibility which creates a

 and precision targeting by    | "needle in the haystack" prob‑

 highly technical munitions.   | lem for high‑tech brutes; use

   Vulnerabilities include     | randomness of route and of

 command & control links, and  | objective to frustrate pre‑

 especially commercial commun‑ | planned physical surveillance.

 ications paths; also financial|   Relatively invulnerable as

 databases.                    | a class of warriors due to

   Capabilities unsuited for   | high profit (drugs) and high

 combat against low‑tech single| availability of expendable

 and mobile targets, mass      | individuals.

 movements of non‑combatants.  |   Capabilities match goals.

                               |

‑!‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑|‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑

        High Tech Seers        |        Low Tech Seers

                               |

   Reliant on knowledge and    |   Reliant on ideological ap‑

 cyber‑stealth (invisible      | peal to masses.

 access to knowledge bases).   |   Impervious to high‑tech

   Vulnerable as a class to    | brute attack if latter pulls

 electromagnetic terrorism     | punches and fails to take the

 which "melts down" entire     | ideo‑cultural high ground;

 communications and computing  | oblivious to terrorism, and

 infrastructures, but single   | insensitive to knowledge or

 hackers are relatively        | profit pressures.

 invulnerable to detection and |   Can only be defeated by a

 control.                      | comprehensive ideological and

   Unable to deal with low‑    | cultural campaign which wins

 tech seers or low‑tech brutes.| away its grass roots support.

                               |

                 Figure 2.  Four Warrior Classes Described

 

     High‑tech brutes design systems which can defeat known and

predictable opposing capabilities.  They cannot handle ambiguity

nor can they handle non‑conventional defenses or attacks.

 

     Low‑tech brutes, in the short‑run, will be extremely

successful.  In the long‑run, unless they develop an ideology (or

form an alliance with low‑tech seers already possessing an

ideology), they lack the mental/spiritual energy that religion or

ideology can provide, and therefore can be defeated.

 

     Both in the short‑run and the long‑run, the ability of low‑

tech to defeat high‑tech cannot be underestimated‑‑low‑tech, by

relying on the human factor, introduces to warfare an unexcelled

capability for dealing with ambiguity and creating unanticipated

scenarios.  The fact that they do not seek political control of a

society, and can therefore develop various levels of

accommodation and co‑existence, also makes it difficult to

eradicate this class of warriors.

 

     In considering high‑tech seers, it is useful to surface the

distinction between "thinkers" and "process" servers.  Many of

the humans associated with the computer industry are in fact

nothing more than unthinking data‑entry "slaves".  Even the

notorious (or illustrious) "hackers" can be considered

"unthinking" to the extent that they exercise their pleasure

"mindlessly", to no objective end.  The most dangerous enemy is

that very small group which is morally driven, mentally powerful,

and‑‑perhaps through computers‑‑physically endowed.  It merits

comment that single high‑tech seers ("hackers") may exist within

low‑tech environments (e.g. Colombia, Iran), and place their

services at the disposal of criminals or zealots.

 

     Low‑tech seers are perhaps the single most dangerous threat

to any established community because they represent an

alternative or parallel infrastructure which can be used to

discreetly undermine any organization.  The bottom line is

simple: if the existing organization is not providing protection

and economic stability for its population‑‑the center of gravity

in most nations‑‑then the low tech seer, promising both salvation

and comfort, will receive support.  The low‑tech seer also

dominates in the moral arena by having a very powerful

ideological construct which can move its members to heroic feats

against physically more powerful and mentally more agile

opponents.

 

     We as a Nation, with our nuclear and conventional forces and

our bureaucratic organization, fall into one of the four

categories, that of "high‑tech brute".  As an aside, one observer

has comment that we as a Nation have a tendency to try to fit

reality to our force structure, rather than designing our force

structure to fit reality.  That is the point of this paper‑‑to

highlight the four different realities with which we must deal.

 

     We are relatively well prepared to defend ourselves against

other high‑tech brutes, having just seen the demolition of the

Soviet empire.  This is however, the least likely form of attack

against us in the future.

 

     We are completely vulnerable to attack from the other three

kinds of warrior, as illustrated below, and simultaneously

ineffective in the attack against those three warrior classes.

 

     Our challenge in the 1990's is two‑fold: to significantly

reduce our defense expenditures while also developing appropriate

capabilities essential to protect our citizens and our property

against all four warrior classes.  This can only be done by

radically changing the way we train, organize, and equip selected

elements of our forces.

 

     What is the problem?  As high‑tech brutes, we are the modern

equivalent of dinosaurs sinking into two tar‑pits.  One is an

information tar‑pit, overloading our now archaic sensor systems

(all of which are designed to deal with "known" threat signatures

that can be pre‑programmed).  The other is a mobility tar‑pit,

wherein we are frustrated by our heavy logistics train and heavy

ground and air mobility systems, constraining our ability to deal

with fleet of foot "singleton" threats.  Our air power, our

artillery, our armor‑‑all of these are marginally effective

against the low‑intensity opponent, and also remarkably

vulnerable to isolated attacks in garrison and rear areas.

 

     Our existing command and control, communications, computer,

and intelligence (C3I) infrastructure is only geared for

confrontation with other high tech brutes.  We are extremely

vulnerable to covert attack by emerging high tech seers

(hackers), to random attack by low tech brutes (narco‑barons),

and to broad subversion by low tech seers (fanatics).  For

example:

 

     ‑‑  Our increasing reliance on commercial communications

paths, as well as our relative lack of computer security

procedures throughout the government, when combined with the

pervasiveness of telephone technology, enable a single hacker,

from anywhere in the world, to shut down U.S. telephone switching

stations, and contaminate with viruses virtually any unclassified

system.  It merits comment that even if our classified data may

be safe, the telephone company operating systems, packet

switching networks, and so on, are not encrypted or protected,

and the flow of data will simply cease.

 

     ‑‑  The ability of narcotics barons to operate their

business with impunity across our borders and within our

communities, and the ability of terrorists to strike with

relative impunity‑‑they don't play by our "rules"‑‑are well

recognized.

 

     ‑‑  Our susceptibility to cultural subversion, a

susceptibility which stems in part from our national abdication

of any cultural standards (e.g. imposing English as a national

language in our schools), is less well recognized.

     Unfortunately, between our Nation's natural division into

nine relatively distinct regions, the deterioration of our

schools, and the strong ethnic roots that many of our immigrants

choose to nurture long after their migration to our country, we

are facing a period of internal cultural warfare which will have

a deleterious impact on our ability to wage external cultural

warfare.

 

     We exacerbate this situation by imposing an expensive, slow

to act and react, hierarchical command & control process on the

"brute" force structure on our Nation, at a time when we require

a relatively inexpensive, fast‑acting, "seer" capability able to

act anywhere, anytime, without regard to any national, ethnic, or

religious strictures.  We persist is having bureaucratic "turf

wars" because no one has really come to grips with the fact that

we are at war, now, in four different environments!

 

     What does this analysis suggest?  It suggests that warfare

in the future will be fought at the platoon level, under

relatively autonomous circumstances and with limited resource to

complex combinations of combined arms.

 

     Brainpower, understanding of local cultures and conditions

including operational geography, and highly responsive all‑source

tactical intelligence will be critical force multipliers under

such circumstances.  Autonomous decision‑making by the commander

(or single Marine) on the spot will be the norm.

 

     What is the solution?  For selected elements of our national

defense organization, we need to revisit our concepts of

operation, doctrine, and force structure planning methodology,

substantially reduce the base force idea, and think instead of

four expanded and significantly improved capabilities:

 

     ‑‑   Paramilitary and clandestine/indigenous variants of our

Special Forces to attack and destroy selected low tech brute

forces on their home ground and without necessarily having the

support of local host governments

 

     ‑‑   Foreign area experts, ideally with ethnic roots and

intuitive understanding necessary to fully appreciate the nuances

of religious and other forms of low tech ideology, and to develop

global or precision ideological defense and attack campaigns

 

     ‑‑   Computer security (defense) and computer attack

specialists able, with the selective assistance off tactical and

strategic communications specialists to penetrate, monitor,

disrupt, deceive, and dominate any computer or any communications

system for any length of time, ideally without being detected

 

     ‑‑   Expeditionary and sea‑based variants of our

conventional forces, able to conduct precision raids and guide

precision munitions in coordination with covertly‑inserted

Special Forces or indigenous clandestine assets.

 

 

 

                   Forces for Future Warfare

 

         Vs. Low‑Tech Brute: Paramilitary/Clandestine

         Vs. Low‑Tech Seer: Foreign Area Specialists

         Vs. High‑Tech Seer: Computer Specialists

         Vs. High‑Tech Brute: Expeditionary Forces

 

 

                   Figure 3.   Forces for Future Warfare

 

     Each of the above forces will have its own requirements,

both for C3I support to its planning, programming, and

operations; and for C3I offensive capabilities against its

primary warrior class opponent.  We are not ready!

 

     Policy‑makers, political leaders, and industrial managers

need to think through four different kinds of national security

capability, each with a different C3I defense/attack problem set,

and each with a different concept, doctrine, training, and

acquisition problem set.

 

     The private sector, increasingly given to forming its own

international security corps and hiring specialists to protect

its computers and its people, will have a role to play in the

multi‑dimensional competition/conflict environment described in

this paper.

 

     One of the hardest policy problems‑‑with significant legal

ramifications‑‑is that of establishing dividing lines between the

public and the private sector.

 

     In a fast‑moving global environment, where crime, culture,

and knowledge cannot be controlled by any government or group of

governments, we are finally going to have to come face to face

with the possibility that the private sector can do things that

government cannot not, and we may actually have to develop

methods of "privatizing" certain security and

conflict/competition functions.

 

     Within the Marine Corps, these concepts should translate

into a substantially reinforced ability to conduct paramilitary

operations (i.e. not necessarily in uniform), augmented by

tailored clandestine human intelligence support networks in

countries in high interest to the Marine Corps.  This should

result also in a dramatically expanded investment in our Foreign

Area Officer program (both active and reserve); ideally I would

like to see every officer, and most non‑commissioned officers,

required to learn and maintain a second language as a basis for

promotion.  Truly expeditionary forces should by definition be

led if not manned by "foreign area officers".  Finally, to deal

with the severe threat to our communications and computers, I

would create a C4 security occupational specialty, dedicate at

least one officer and one non‑commissioned officer to computer

security matters at each MAGTF or division/wing level, and

establish an integrated Marine Corps C4I Security Plan which

provides for training, equipping, and organizing our forces to be

effective in a fragile C4 environment.

 

     The GOOD NEWS is that these capabilities will cost a

fraction of what our high‑tech systems have cost and are

projected to cost, and, with the exception of the linguistic and

cultural warfare capabilities, can be stood up relatively

quickly.  The money is there, but only if there is a radical

reduction in our investments against old technology and old

concepts.

 

 

Comments

Popular posts from this blog

Awareness of EBE Contact

The Mystery of Rh-Negative Blood Genetic Origin Unknown

American Airlines Flight 77 Evidence