US Ready To Fight Hybrid War By 2030

The US Army’s new draft strategy for 2025 to 2040 expects enemies to attack ever more lethally in multiple domains, land, sea, air, space, and cyber online, while blurring the distinction between peace and war.

To meet these foes, the strategy says, the Army of the future must be much more mobile, with small teams that can fight like today’s large units, and do it in every domain of warfare, simultaneously.

The Army’s Training and Doctrine Command, or TRADOC, creates guides that the Army uses to draft field manuals and train troops for tomorrow’s fights.

Last month they released a draft of their newest “concept document” that lays out the Army’s best guess about the enemy of the future.

Titled Multi-Domain Battle: Evolution of Combined Arms for the 21st Century, 2025-2040, it repeats one key point over and over again: Adversaries will make life as difficult as possible for US troops by not declaring themselves to be the enemy, or, as the concept puts it, by “combining regular and irregular forces with criminal and terrorist enterprises to attack the Joint Force’s vulnerabilities while avoiding its strength.”

That idea is not entirely new. The world got a great glimpse of what modern, blended warfare looks like when thousands of little green men invaded Ukraine’s Crimean peninsula in 2014.

“Adversaries have blurred the distinction between actions ‘below armed conflict’ and ‘conflict,’ enabling the achievement of strategic military objectives short of what the US traditionally considers ‘war,’” the document says.

The concept goes on to describe four other reasons the Army cannot successfully fight wars the way it has in the past:

1. The exponential speed of information technology. US forces can’t assume that they will have the best phones, drones, or computer hardware on the battlefield. As computers get smaller, cheaper, and more widely available, US tech advantages will disintegrate.

2. Warfare will be much more urban. Some 60 percent (conservatively) of the Earth’s population will live in cities in 2030, many in megacities with populations of more than 10 million. This is where adversaries will try to engage US forces, not in open fields or deserts where today’s Army and its enormous battle vehicles have the advantage.

3. The Internet will be a key aspect of the battlefield, not just in terms of trading cyber-attacks with enemy hackers but in the need to constantly and expertly shape global opinion about the conflict.

Troll armies spreading fake news and disinformation, coupled with enough social-media traffic to overwhelm open-source analysts, could “complicate the Army’s ability to gain and maintain an accurate, up-to-date, intelligence-driven understanding of the situation, as well as control of the information environment,” the document says.

4. Every bad guy becomes The Joker. The Army sees a rise of “Super-empowered individuals and small groups” who can “use access to cyberspace, space, and nuclear, biological, radiological, and chemical weapons of mass effects to change the battlespace calculus and redefine the conditions of conflict resolution.” Read that to mean: lone wolves and minuscule teams with the power to rival many of today’s nation-states.

Even the spread of personal phones and the Internet of Things will make US troops easier targets. “Unmanaged signatures will become a critical US vulnerability because the adversary’s forces will increasingly possess the ability to find and attack US and allied forces at strategic, operational, and tactical distances simultaneously,” the document says.

To fight in this environment, the US Army will move toward smaller, much more versatile, and more capable formations, somewhat like today’s special operations forces that can embark on a wide variety of missions.

These “semi-independent” formations won’t just be tasked with winning territory and holding it. They’ll have to do everything from flying drones (and defending against them) to shooting missiles deep into enemy territory (and getting the targeting data to do it) to outflanking the bad guys in cyberspace. And they’ll have to do it with less protection.

“Formations must maneuver semi-independently, without secured flanks, constant communications with higher headquarters, and continuous lines of communications,” the document says.

The “semi-independent” part is key. The Army still sees these smaller groups as connected to a much larger whole, perhaps even more so, but that doesn’t mean a return to large tank formations.

Nor does it mean that every tiny, mobile, Swiss-Army-knife formation will also carry an enormous missile battery. Rather, little teams will have to be able to access capabilities like drones and fire support from somewhere, but the capabilities themselves will likely be shared, similar to how people use Uber.

This idea of small, nimble, loosely connected nodes in sprawling networks fits well with what other services’ leaders have described as the future of the Navy and the Air Force.

It’s a future where every node become smaller, and where connections grow in number even as connectivity itself is challenged.

DefenseOne:

You Might Also Read:

Russian General Brags About Cyberwar Successes:

Cyber Warfare Opens A New Front Against Civilians:

How A Cyber Attack Transformed Estonia:

 

« Cyber Security Insurance
Where Should The Pentagon Focus In Cyberspace? »

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Wisegate

Wisegate

Wisegate is a community of IT experts providing advisory services on all areas of IT including security.

DKCERT

DKCERT

DKCERT (Danish Computer Security Incident Response Team) is a service of DeIC (Danish e-Infrastructure Cooperation).

IS Decisions

IS Decisions

IS Decisions provide solutions to secure, control & audit user access to Microsoft Windows Server-based networks.

EdgeWave

EdgeWave

EdgeWave provides simple but highly effective data security and advanced threat protection in solutions that are affordable, scalable and easy to use.

TeachPrivacy

TeachPrivacy

TeachPrivacy provides computer-based privacy and data security training that is engaging, memorable, and understandable.

Hypori

Hypori

Hypori is a virtual smartphone solution that makes truly secure BYOD a reality for organizations in healthcare, finance, government, and beyond.

Continuity Logic

Continuity Logic

Continuity Logic is an innovation leader for enterprise continuity, risk, and compliance management software.

Vesta

Vesta

Vesta Corporation is a global provider of a scalable suite of fraud and payment solutions for online commerce.

TES

TES

TES is a provider of IT Lifecycle Services, offering bespoke solutions that help customers manage the commissioning, deployment and retirement of Information Technology assets.

White & Black

White & Black

White & Black are specialist corporate & technology lawyers based in London & Oxford.

Syber Technology

Syber Technology

Syber Technology is an IT project implementer empowering IT systems of Small to Medium Enterprises in the Middle East.

Microland

Microland

Microland’s delivery of digital is all about making technology do more and intrude less for global enterprises. Our services include Cloud & Data Center, Networks, Cybersecurity and more.

ISMAC

ISMAC

ISMAC was founded to create a security solution that would work for smaller to medium as well as bigger corporations at an affordable price.

Axiado

Axiado

Axiado Corporation is a security processor company redefining hardware root of trust with hardware-based security technologies, including per-system AI.

BDO Global

BDO Global

BDO is an international network of public accounting, tax and advisory firms which perform professional services under the name of BDO.

Charles IT

Charles IT

Charles IT is your friendly, no-nonsense IT team focused on helping companies make their technology work for them. We focus on building relationships that deliver results.

Palitronica

Palitronica

Palitronica build cutting-edge hardware and breakthrough software that revolutionizes how we defend critical infrastructure and key resources.