THE TRANSFORMATION OF WAR AND THE FUTURE OF THE CORPS


           THE TRANSFORMATION OF WAR AND THE FUTURE OF THE CORPS

                     Major Robert David Steele, USMCR

                   Cleared for Publication 28 April 1992

     The Marine Corps, in combination with supporting Navy
elements, is our Nation's "911" force, well‑positioned to serve
in a variety of joint, combined, and‑‑if necessary‑‑unilateral
roles across the spectrum of combat and non‑combat operations.
The Department of the Navy 1992 Posture Statement, and the
Remarks of General Carl E. Mundy, Jr. Before Congress (Gazette,
April 1992), clearly outline how far we have come revitalizing
our traditional emphasis on littoral operations, and how we are
preserving our core capabilities in the face of imposed
reductions.

     All this is good.  Never‑the‑less, lost in the vortex caused
by a changing Unified Command Plan, sharp reductions in manning
and resources, and mixed (or absent) signals from national and
defense intelligence about the nature of the future threat, is
the fundamental fact that war as we know it has been transformed.
The future of the Corps depends not just on getting leaner while
maintain its traditional expeditionary emphasis, but on our
recognizing that we must train, equip, and organize our forces to
deal with four completely distinct types of opposing warrior
classes.



                           GUERRILLA
  Physical    HIGH TECH      WARS      LOW TECH    Natural
  Stealth,    BRUTES                    BRUTES     Stealth,
  Precision   (MIC/HIC)                 (LIC)      Random
  Targeting          Money‑‑Ruthlessness           Targeting

    ECONOMIC WAR       Power Base        TERRORISM

  Cyber‑             Knowledge‑‑Ideology           Ideo‑
  Stealth,    HIGH TECH                LOW TECH    Stealth,
  Database     SEERS                    SEERS      Mass
  Targeting   (C3I WAR)    CULTURAL    (JIHAD)     Targeting
                             WARS


                Figure 1.  Four Warrior Classes Illustrated

     Although appearing complex, the above figure simply shows
essential distinctions between each warrior class: its power
base, its preferred mode of warfare, its stealth mode, and its
targeting approach.  Additionally, the figure shows the four

kinds of war (guerrilla, terrorism, cultural, and economic) which
might be encountered between different sets of warrior classes.

     I have elected to identify these four classes of warriors as
the high‑tech brutes, the low‑tech brutes, the high‑tech seers,
and the low‑tech seers.  Something of their nature is illustrated
in Figure 1.  Each of these warrior classes has different
strategies, capabilities, and vulnerabilities.  Each has a
different source of power, a different approach to warfare, and a
different command and control, communications, computer, and
intelligence structure which must be dominated in the attack and
the defense.

     Below are four summations of each warrior class.


        High Tech Brutes       |        Low Tech Brutes
                               |
   Rely on money and capital,  |   Rely on "low slow singleton"
 physical stealth of equipment,| invisibility which creates a
 and precision targeting by    | "needle in the haystack" prob‑
 highly technical munitions.   | lem for high‑tech brutes; use
   Vulnerabilities include     | randomness of route and of
 command & control links, and  | objective to frustrate pre‑
 especially commercial commun‑ | planned physical surveillance.
 ications paths; also financial|   Relatively invulnerable as
 databases.                    | a class of warriors due to
   Capabilities unsuited for   | high profit (drugs) and high
 combat against low‑tech single| availability of expendable
 and mobile targets, mass      | individuals.
 movements of non‑combatants.  |   Capabilities match goals.
                               |
‑!‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑|‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑
        High Tech Seers        |        Low Tech Seers
                               |
   Reliant on knowledge and    |   Reliant on ideological ap‑
 cyber‑stealth (invisible      | peal to masses.
 access to knowledge bases).   |   Impervious to high‑tech
   Vulnerable as a class to    | brute attack if latter pulls
 electromagnetic terrorism     | punches and fails to take the
 which "melts down" entire     | ideo‑cultural high ground;
 communications and computing  | oblivious to terrorism, and
 infrastructures, but single   | insensitive to knowledge or
 hackers are relatively        | profit pressures.
 invulnerable to detection and |   Can only be defeated by a
 control.                      | comprehensive ideological and
   Unable to deal with low‑    | cultural campaign which wins
 tech seers or low‑tech brutes.| away its grass roots support.
                               |
                 Figure 2.  Four Warrior Classes Described

     High‑tech brutes design systems which can defeat known and
predictable opposing capabilities.  They cannot handle ambiguity
nor can they handle non‑conventional defenses or attacks.

     Low‑tech brutes, in the short‑run, will be extremely
successful.  In the long‑run, unless they develop an ideology (or
form an alliance with low‑tech seers already possessing an
ideology), they lack the mental/spiritual energy that religion or
ideology can provide, and therefore can be defeated.

     Both in the short‑run and the long‑run, the ability of low‑
tech to defeat high‑tech cannot be underestimated‑‑low‑tech, by
relying on the human factor, introduces to warfare an unexcelled
capability for dealing with ambiguity and creating unanticipated
scenarios.  The fact that they do not seek political control of a
society, and can therefore develop various levels of
accommodation and co‑existence, also makes it difficult to
eradicate this class of warriors.

     In considering high‑tech seers, it is useful to surface the
distinction between "thinkers" and "process" servers.  Many of
the humans associated with the computer industry are in fact
nothing more than unthinking data‑entry "slaves".  Even the
notorious (or illustrious) "hackers" can be considered
"unthinking" to the extent that they exercise their pleasure
"mindlessly", to no objective end.  The most dangerous enemy is
that very small group which is morally driven, mentally powerful,
and‑‑perhaps through computers‑‑physically endowed.  It merits
comment that single high‑tech seers ("hackers") may exist within
low‑tech environments (e.g. Colombia, Iran), and place their
services at the disposal of criminals or zealots.

     Low‑tech seers are perhaps the single most dangerous threat
to any established community because they represent an
alternative or parallel infrastructure which can be used to
discreetly undermine any organization.  The bottom line is
simple: if the existing organization is not providing protection
and economic stability for its population‑‑the center of gravity
in most nations‑‑then the low tech seer, promising both salvation
and comfort, will receive support.  The low‑tech seer also
dominates in the moral arena by having a very powerful
ideological construct which can move its members to heroic feats
against physically more powerful and mentally more agile
opponents.

     We as a Nation, with our nuclear and conventional forces and
our bureaucratic organization, fall into one of the four
categories, that of "high‑tech brute".  As an aside, one observer
has comment that we as a Nation have a tendency to try to fit
reality to our force structure, rather than designing our force
structure to fit reality.  That is the point of this paper‑‑to
highlight the four different realities with which we must deal.

     We are relatively well prepared to defend ourselves against
other high‑tech brutes, having just seen the demolition of the
Soviet empire.  This is however, the least likely form of attack
against us in the future.

     We are completely vulnerable to attack from the other three
kinds of warrior, as illustrated below, and simultaneously
ineffective in the attack against those three warrior classes.

     Our challenge in the 1990's is two‑fold: to significantly
reduce our defense expenditures while also developing appropriate
capabilities essential to protect our citizens and our property
against all four warrior classes.  This can only be done by
radically changing the way we train, organize, and equip selected
elements of our forces.

     What is the problem?  As high‑tech brutes, we are the modern
equivalent of dinosaurs sinking into two tar‑pits.  One is an
information tar‑pit, overloading our now archaic sensor systems
(all of which are designed to deal with "known" threat signatures
that can be pre‑programmed).  The other is a mobility tar‑pit,
wherein we are frustrated by our heavy logistics train and heavy
ground and air mobility systems, constraining our ability to deal
with fleet of foot "singleton" threats.  Our air power, our
artillery, our armor‑‑all of these are marginally effective
against the low‑intensity opponent, and also remarkably
vulnerable to isolated attacks in garrison and rear areas.

     Our existing command and control, communications, computer,
and intelligence (C3I) infrastructure is only geared for
confrontation with other high tech brutes.  We are extremely
vulnerable to covert attack by emerging high tech seers
(hackers), to random attack by low tech brutes (narco‑barons),
and to broad subversion by low tech seers (fanatics).  For
example:

     ‑‑  Our increasing reliance on commercial communications
paths, as well as our relative lack of computer security
procedures throughout the government, when combined with the
pervasiveness of telephone technology, enable a single hacker,
from anywhere in the world, to shut down U.S. telephone switching
stations, and contaminate with viruses virtually any unclassified
system.  It merits comment that even if our classified data may
be safe, the telephone company operating systems, packet
switching networks, and so on, are not encrypted or protected,
and the flow of data will simply cease.

     ‑‑  The ability of narcotics barons to operate their
business with impunity across our borders and within our
communities, and the ability of terrorists to strike with
relative impunity‑‑they don't play by our "rules"‑‑are well
recognized.

     ‑‑  Our susceptibility to cultural subversion, a
susceptibility which stems in part from our national abdication
of any cultural standards (e.g. imposing English as a national
language in our schools), is less well recognized.
     Unfortunately, between our Nation's natural division into
nine relatively distinct regions, the deterioration of our
schools, and the strong ethnic roots that many of our immigrants
choose to nurture long after their migration to our country, we
are facing a period of internal cultural warfare which will have
a deleterious impact on our ability to wage external cultural
warfare.

     We exacerbate this situation by imposing an expensive, slow
to act and react, hierarchical command & control process on the
"brute" force structure on our Nation, at a time when we require
a relatively inexpensive, fast‑acting, "seer" capability able to
act anywhere, anytime, without regard to any national, ethnic, or
religious strictures.  We persist is having bureaucratic "turf
wars" because no one has really come to grips with the fact that
we are at war, now, in four different environments!

     What does this analysis suggest?  It suggests that warfare
in the future will be fought at the platoon level, under
relatively autonomous circumstances and with limited resource to
complex combinations of combined arms.

     Brainpower, understanding of local cultures and conditions
including operational geography, and highly responsive all‑source
tactical intelligence will be critical force multipliers under
such circumstances.  Autonomous decision‑making by the commander
(or single Marine) on the spot will be the norm.

     What is the solution?  For selected elements of our national
defense organization, we need to revisit our concepts of
operation, doctrine, and force structure planning methodology,
substantially reduce the base force idea, and think instead of
four expanded and significantly improved capabilities:

     ‑‑   Paramilitary and clandestine/indigenous variants of our
Special Forces to attack and destroy selected low tech brute
forces on their home ground and without necessarily having the
support of local host governments

     ‑‑   Foreign area experts, ideally with ethnic roots and
intuitive understanding necessary to fully appreciate the nuances
of religious and other forms of low tech ideology, and to develop
global or precision ideological defense and attack campaigns

     ‑‑   Computer security (defense) and computer attack
specialists able, with the selective assistance off tactical and
strategic communications specialists to penetrate, monitor,
disrupt, deceive, and dominate any computer or any communications
system for any length of time, ideally without being detected

     ‑‑   Expeditionary and sea‑based variants of our
conventional forces, able to conduct precision raids and guide
precision munitions in coordination with covertly‑inserted
Special Forces or indigenous clandestine assets.



                   Forces for Future Warfare

         Vs. Low‑Tech Brute: Paramilitary/Clandestine
         Vs. Low‑Tech Seer: Foreign Area Specialists
         Vs. High‑Tech Seer: Computer Specialists
         Vs. High‑Tech Brute: Expeditionary Forces


                   Figure 3.   Forces for Future Warfare

     Each of the above forces will have its own requirements,
both for C3I support to its planning, programming, and
operations; and for C3I offensive capabilities against its
primary warrior class opponent.  We are not ready!

     Policy‑makers, political leaders, and industrial managers
need to think through four different kinds of national security
capability, each with a different C3I defense/attack problem set,
and each with a different concept, doctrine, training, and
acquisition problem set.

     The private sector, increasingly given to forming its own
international security corps and hiring specialists to protect
its computers and its people, will have a role to play in the
multi‑dimensional competition/conflict environment described in
this paper.

     One of the hardest policy problems‑‑with significant legal
ramifications‑‑is that of establishing dividing lines between the
public and the private sector.

     In a fast‑moving global environment, where crime, culture,
and knowledge cannot be controlled by any government or group of
governments, we are finally going to have to come face to face
with the possibility that the private sector can do things that
government cannot not, and we may actually have to develop
methods of "privatizing" certain security and
conflict/competition functions.

     Within the Marine Corps, these concepts should translate
into a substantially reinforced ability to conduct paramilitary
operations (i.e. not necessarily in uniform), augmented by
tailored clandestine human intelligence support networks in
countries in high interest to the Marine Corps.  This should
result also in a dramatically expanded investment in our Foreign
Area Officer program (both active and reserve); ideally I would
like to see every officer, and most non‑commissioned officers,
required to learn and maintain a second language as a basis for
promotion.  Truly expeditionary forces should by definition be
led if not manned by "foreign area officers".  Finally, to deal
with the severe threat to our communications and computers, I
would create a C4 security occupational specialty, dedicate at
least one officer and one non‑commissioned officer to computer
security matters at each MAGTF or division/wing level, and
establish an integrated Marine Corps C4I Security Plan which
provides for training, equipping, and organizing our forces to be
effective in a fragile C4 environment.

     The GOOD NEWS is that these capabilities will cost a
fraction of what our high‑tech systems have cost and are
projected to cost, and, with the exception of the linguistic and
cultural warfare capabilities, can be stood up relatively
quickly.  The money is there, but only if there is a radical
reduction in our investments against old technology and old
concepts.





Comments

Popular posts from this blog

The Mystery of Rh-Negative Blood Genetic Origin Unknown

Awareness of EBE Contact

American Airlines Flight 77 Evidence