US Ready To Fight Hybrid War By 2030

The US Army’s new draft strategy for 2025 to 2040 expects enemies to attack ever more lethally in multiple domains, land, sea, air, space, and cyber online, while blurring the distinction between peace and war.

To meet these foes, the strategy says, the Army of the future must be much more mobile, with small teams that can fight like today’s large units, and do it in every domain of warfare, simultaneously.

The Army’s Training and Doctrine Command, or TRADOC, creates guides that the Army uses to draft field manuals and train troops for tomorrow’s fights.

Last month they released a draft of their newest “concept document” that lays out the Army’s best guess about the enemy of the future.

Titled Multi-Domain Battle: Evolution of Combined Arms for the 21st Century, 2025-2040, it repeats one key point over and over again: Adversaries will make life as difficult as possible for US troops by not declaring themselves to be the enemy, or, as the concept puts it, by “combining regular and irregular forces with criminal and terrorist enterprises to attack the Joint Force’s vulnerabilities while avoiding its strength.”

That idea is not entirely new. The world got a great glimpse of what modern, blended warfare looks like when thousands of little green men invaded Ukraine’s Crimean peninsula in 2014.

“Adversaries have blurred the distinction between actions ‘below armed conflict’ and ‘conflict,’ enabling the achievement of strategic military objectives short of what the US traditionally considers ‘war,’” the document says.

The concept goes on to describe four other reasons the Army cannot successfully fight wars the way it has in the past:

1. The exponential speed of information technology. US forces can’t assume that they will have the best phones, drones, or computer hardware on the battlefield. As computers get smaller, cheaper, and more widely available, US tech advantages will disintegrate.

2. Warfare will be much more urban. Some 60 percent (conservatively) of the Earth’s population will live in cities in 2030, many in megacities with populations of more than 10 million. This is where adversaries will try to engage US forces, not in open fields or deserts where today’s Army and its enormous battle vehicles have the advantage.

3. The Internet will be a key aspect of the battlefield, not just in terms of trading cyber-attacks with enemy hackers but in the need to constantly and expertly shape global opinion about the conflict.

Troll armies spreading fake news and disinformation, coupled with enough social-media traffic to overwhelm open-source analysts, could “complicate the Army’s ability to gain and maintain an accurate, up-to-date, intelligence-driven understanding of the situation, as well as control of the information environment,” the document says.

4. Every bad guy becomes The Joker. The Army sees a rise of “Super-empowered individuals and small groups” who can “use access to cyberspace, space, and nuclear, biological, radiological, and chemical weapons of mass effects to change the battlespace calculus and redefine the conditions of conflict resolution.” Read that to mean: lone wolves and minuscule teams with the power to rival many of today’s nation-states.

Even the spread of personal phones and the Internet of Things will make US troops easier targets. “Unmanaged signatures will become a critical US vulnerability because the adversary’s forces will increasingly possess the ability to find and attack US and allied forces at strategic, operational, and tactical distances simultaneously,” the document says.

To fight in this environment, the US Army will move toward smaller, much more versatile, and more capable formations, somewhat like today’s special operations forces that can embark on a wide variety of missions.

These “semi-independent” formations won’t just be tasked with winning territory and holding it. They’ll have to do everything from flying drones (and defending against them) to shooting missiles deep into enemy territory (and getting the targeting data to do it) to outflanking the bad guys in cyberspace. And they’ll have to do it with less protection.

“Formations must maneuver semi-independently, without secured flanks, constant communications with higher headquarters, and continuous lines of communications,” the document says.

The “semi-independent” part is key. The Army still sees these smaller groups as connected to a much larger whole, perhaps even more so, but that doesn’t mean a return to large tank formations.

Nor does it mean that every tiny, mobile, Swiss-Army-knife formation will also carry an enormous missile battery. Rather, little teams will have to be able to access capabilities like drones and fire support from somewhere, but the capabilities themselves will likely be shared, similar to how people use Uber.

This idea of small, nimble, loosely connected nodes in sprawling networks fits well with what other services’ leaders have described as the future of the Navy and the Air Force.

It’s a future where every node become smaller, and where connections grow in number even as connectivity itself is challenged.

DefenseOne:

You Might Also Read:

Russian General Brags About Cyberwar Successes:

Cyber Warfare Opens A New Front Against Civilians:

How A Cyber Attack Transformed Estonia:

 

« Cyber Security Insurance
Where Should The Pentagon Focus In Cyberspace? »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Intelligence-sec

Intelligence-sec

Intelligence-Sec is a fully integrated Conferences and Exhibitions Company managing and producing topical events for the security industry.

Consult Hyperion

Consult Hyperion

Consult Hyperion is an independent strategic and technical consultancy specialising in digital identity and secure electronic transactions.

Intrusion

Intrusion

Intrusion provides IT professionals with the most robust tool set available for performing in-depth research and analysis of network traffic.

ECOS Technology

ECOS Technology

ECOS Technology specializes in the development and sale of IT solutions for high-security remote access as well as the management of certificates and smart cards.

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC) is a government body providing support for ICT related activities including formulating national ICT strategy and policy.

Ataya & Partners

Ataya & Partners

Ataya & Partners is a consulting company that delivers data protection, cybersecurity and IT & Digital governance services.

Cofrac

Cofrac

Cofrac is the national accreditation body for France. The directory of members provides details of organisations offering certification services for ISO 27001.

Tier1Asset (T1A)

Tier1Asset (T1A)

T1A is Europe’s leading IT refurbisher. We offer certified data erasure using blancco on site and at our facilities, providing environmentally sound disposal of your used equipment.

Crypto International

Crypto International

Crypto International offers comprehensive services for the operation of our customers’ IT and communication infrastructure, with a focus on cybersecurity and encryption solutions.

Cigent Technology

Cigent Technology

Cigent keeps the most valuable asset in your organization safe—your data. Our advanced endpoint and managed network security solutions prevent ransomware and data theft.

Core to Cloud

Core to Cloud

Core to Cloud provide consultancy and technical support for the planning and implementation of sustainable security strategies.

Entech

Entech

Entech is a managed IT service provider. We work behind the scenes on your network to ensure data security and integrity.

Anchor Technologies Inc (ATI)

Anchor Technologies Inc (ATI)

Anchor provides a full spectrum of cybersecurity services assisting our clients with all aspects of cybersecurity risk planning, identification, management, and monitoring.

Ridgeline International

Ridgeline International

Ridgeline helps organizations manage digital risk through data privacy and secure infrastructure solutions.

Identifly

Identifly

Identifly is the leading Australian independent identity consultancy and partner in Australia, helping enterprises implement large scale identity security projects fast.

Wisr AI

Wisr AI

Wisr AI helps enterprises assess not only their own internal Cyber Risk posture, but also helps prioritize the inherent risk faced through 3rd party infrastructure and supply chain connections.