April 22, 2026

Headlines

Defense Industry Supply Chain Vulnerabilities: Trump’s Achilles’ Heel

 

 

 

 



Introduction

This article is going to press on November 8th of 2024. Donald J. Trump as been confirmed to have won the US Presidential election be a decisive margin. While much is being made in some quarters about how “Daddy Trump” is going to fix everything overnight, the reality is that Trump will face a myriad of major diplomatic challenges on Day One of his new administration. While we could write multiple articles on every one of the many wars Trump will have to deal with – and we will discuss one of them next week – this week, we will talk about the most important issue.

The ongoing conflict in Ukraine has exposed critical weaknesses in Western defense industrial capacity, while recent infrastructure incidents highlight the fragility of military logistics chains. These vulnerabilities raise serious questions about NATO’s ability to sustain high-intensity conflicts and maintain global military readiness, because they are not being addressed.

Peace Through Strength” is a resounding cry, but it requires “strength” to make it work.

 

The Artillery Crisis

NATO’s inability to meet Ukraine’s artillery shell requirements has revealed a stark reality: Western defense industries are no longer configured for industrial-scale warfare. The conflict has consumed ammunition at rates not seen since World War II, with Ukraine firing approximately 6,000-8,000 artillery rounds per day, while Russia expends an estimated 15,000-20,000 rounds daily.

European and American ammunition plants, optimized for peacetime efficiency rather than wartime surge capacity, have struggled to increase production. Most Western facilities operate on a single-shift basis with aging equipment, lacking the workforce and infrastructure for rapid expansion. The situation is exacerbated by shortages of raw materials and specialized components, many of which come from a limited number of suppliers.

In contrast, Russia – which had correctly forecasted the coming decade’s events – quietly began classifying increasing amounts of its economic (and possibly population) data, beginning in 2014. Further, while the Western powers had deliriously wrapped up and eventually converted or bulldozed much of its war production capacity, the newly non-Soviet Russia did not: they mothballed their facilities. And, as tensions with the West began rising after the Donbas War began, they began to quietly bring those mothballed plants back online.

The reason for focusing so much on artillery production is that, far more than the production of drones, tanks or airplanes, artillery is the most important determiner of modern warfare capabilities, after Logistics infrastructure and the combat abilities of one’s infantry forces.

 

Infrastructure Vulnerabilities

The recent collapse of the Francis Scott Key Bridge in Baltimore, Maryland after being struck by the container ship MV Dali highlights another critical vulnerability in military logistics. Major ports and waterways are essential for moving military equipment and supplies, yet many rely on aging infrastructure. The Baltimore incident demonstrates how a single point of failure can disrupt both civilian and military shipping patterns across an entire region.

The Military Sealift Command (MSC) fast combat support ship USNS Supply (T-AOE 6) sails through the Atlantic Ocean, 2006. U.S. Navy photo by Photographer’s Mate 3rd Class Joshua Kinter. Public Domain.

Similar vulnerabilities exist across NATO’s logistics infrastructure:

  • Aging rail networks crucial for moving heavy military equipment
  • Limited redundancy in key shipping channels and ports
  • Concentrated dependence on specific facilities for military operations
  • Vulnerability of critical bridges and tunnels to both accidents and potential sabotage
  • Limited upgrades to handle increased loads

 

Supply Chain Complexity

Modern defense systems rely on intricate supply chains involving thousands of contractors and subcontractors. This complexity creates multiple potential points of failure:

 

Raw Materials

  • Critical mineral dependencies
  • Limited processing facilities
  • Potential supply disruptions from geopolitical tensions

Component Manufacturing

  • Specialized electronics producers
  • Precision machining capabilities
  • Quality control requirements

Assembly and Integration

  • Skilled workforce shortages
  • Facility capacity constraints
  • Security clearance requirements

 

The China Factor

Many of these vulnerabilities trace back to China’s quiet dominance in global supply chains. Critical raw materials, electronic components, and industrial chemicals often originate from Chinese sources. This dependency creates strategic risks, particularly in scenarios where China might decide to restrict exports or support adversaries.

While this has yet to significantly impact the war in Ukraine, it remains a distinct possibility…especially should a Trump diplomatic effort fail or stall – or expand.

 

Impact on Military Readiness

These supply chain vulnerabilities affect military readiness in several ways:

 

Reduced Training

  • Limited ammunition for training exercises
  • Delayed maintenance due to parts shortages
  • Restricted live-fire drills

Strategic Reserve Depletion

  • Ammunition stocks below minimum requirements
  • Extended replacement timelines
  • Reduced crisis response capability

Force Projection

  • Logistics bottlenecks limiting deployment options
  • Increased vulnerability to interdiction
  • Reduced sustained operation capability

 

Misplaced Priorities

Another serious consideration is the toxic culture of the long-ballyhooed “military-industrial complex“. That term is a tired trope that has been overused to the point of reducing it to a joke…However, it is very real, and is one of the major axes that is causing the downstream bottleneck that is choking the combat power of Western forces.

For generations, defense contractors have made squeezing as much taxpayer money as possible in technical “peacetime” as high a priority as possible, whether their products worked or not – the Sgt York and Dragon ATGM come immediately to mind. Making products like “dumb” (i.e., “unguided”) artillery ammunition and aircraft bombs is not considered as cost-effective, from a business perspective, as more technically complex – and thus, highly expensive – weapons systems.

The fact that these weapons cannot be produced anywhere near as quickly as modern combat demands – as demonstrated in Ukraine – is not part of the cost-benefit calculations of the commercial military-industrial complex.

 

Addressing the Challenges

Military planners are attempting to address these vulnerabilities through several initiatives:

 

Industrial Base

  • Investing in modernized production facilities
  • Developing workforce training programs
  • Creating redundant supply sources

Infrastructure

  • Identifying critical chokepoints
  • Developing alternative routing options
  • Improving facility protection

Stockpile Management

  • Reassessing minimum stock levels
  • Implementing more robust tracking systems
  • Developing new storage facilities

 

At the same time, those same military planners face the harsh reality that too many civilian leaders in Congress – both outgoing and incoming – received a large amount of cash that put them into a very cushy position, and that getting those same politicians to act against what defense contractors see as their own best interests is going to be an uphill battle, all the way. This will be even harder for Donald Trump, who has dared to speak the unspeakable, that peace needs to break out again.

 

The Near Term Outlook

The combination of industrial capacity limitations and infrastructure vulnerabilities presents a serious challenge to Western military capabilities, and especially to the incoming 47th President. Addressing these issues requires sustained investment and policy attention, potentially including:

  • Defense Industrial Base revitalization
  • Infrastructure hardening and redundancy
  • Supply chain diversification
  • Stockpile expansion
  • International cooperation on critical materials
  • And finally, reining in the military-industrial complex, whether they like it or not

 

The lessons from Ukraine and incidents like the Baltimore bridge collapse underscore the urgent need for comprehensive supply chain resilience in defense planning…They also show the dangers of thinking that business and war are analogous – misapplying the principle of Sun Tzu is actually far more dangerous than dismissing them.

 

 

ADDITIONAL RESOURCES

  1. Julian Thompson (1994), Lifeblood of War: Logistics in Armed Conflict
  2. Thomas Ricks (2012), The Generals
  3. James F. Dunnigan (2003), How To Make War, 4th Edition
  4. James F. Dunnigan (1991), Shooting Blanks

 

 

 

 

The Freedomist — Keeping Watch, So You Don’t Have To
North Korea: Changing the Calculus through Incompetence

 

 

 



North Korea’s Strategic Pivot: Abandoning Reunification for Military Partnership

Amid the hysteria of the 2024 US Presidential election – seen by many on the world as a pivotal event in the world’s direction for the next generation, at least – there is an increasing amount of talk concerning North Korea’s increasingly militant actions. Most alarming among these is its deployment of combat troops to Ukraine, to aid the Russian war effort there, as that conflict grins through its third year.

The failure of the 2019 Hanoi Summit between then-US President Donald Trump and Kim Jong Un marked more than just another setback in US-DPRK relations. It represented a crucial turning point in North Korea’s strategic outlook, leading to its current role as a military supplier to Russia and its apparent abandonment of the long-held dream of peaceful reunification with South Korea.

The reasons for these cascading failures go back as far as 2003, and are the result of a warped view of ‘realpolitik‘, driven by open and naked profit motives which are completely divorced from reality.

The Shadow of History

Since its formal organization in 1948, the totalitarian Democratic People’s Republic of Korea (or DPRK) has been responsible for not simply fomenting wars, but some of the worst, and longest-running, human rights abuses in modern history.

The Pyongyang government’s abysmal mismanagement of the nation has resulted in a brutal prison state, routinely wracked by famines, and whose industrial base remains firmly in the 1970’s, if that. In addition, North Korean intelligence has been routinely kidnapping Japanese citizens since the 1970’s, to train their foreign intelligence operatives (i.e., “spies”) how to act as citizens of western countries.

However, in two critical area’s, the almost obscenely resource-rich North Korea has spared no expense: its nuclear weapons and space launch programs.

While derided by many for their technological backwardness, poor national management, and cultural isolation, in these two critical areas, North Korean capabilities are nothing to be laughed at.

Bolton’s astoundingly bad judgement is what caused Trump’s failure in Hanoi, a decision-tree so bad, it could be seen as a deliberate act of sedition. North Korea’s nuclear strategy has been fundamentally shaped by the fate of other authoritarian leaders who gave up their WMD programs. The overthrow and subsequent deaths of Saddam Hussein in Iraq (2003) and Muammar Gaddafi in Libya (2011), among others, provided “Supreme Leader” Kim Jong Un with compelling evidence that nuclear weapons are the ultimate guarantee of regime survival.

The Hanoi Disaster

The 2019 Hanoi Summit failed largely because of fundamentally different expectations. The Trump administration, abysmally advised by the hysterical chickenhawk, then-National Security Advisor John Bolton, then-US President Donald Trump was led to believe that North Korea could be “persuaded” to follow a “Libya model” of denuclearization. This profound misreading of Kim’s priorities doomed the talks before they began.

Kim arrived in Hanoi seeking a gradual approach: partial denuclearization in exchange for significant sanctions relief. The American position – complete denuclearization before any meaningful sanctions relief – was a non-starter for a regime that had learned harsh lessons from history: Kim Jong Un, North Korea’s youthful leader, is well aware of the vicious, gruesome and bloodthirsty cackle of then- (2011) US Secretary of State Hillary Clinton on the death of Libyan dictator Muammar Gadaffi: “We Came, We Saw, He Died”…after the Libyan dictator had completely caved to Western pressure to abandon his “weapons of mass destruction” programs nerly a decade before, only to have the United States and NATO openly destroy his regime. Muammar Gadaffi was one of the foulest excuses for a human being in modern history, but the West made an agreement with him, then happily broke it at the first opportunity.

Kim Jong Un may be a lot of things, but an idiot, he most certainly is not.

Strategic Reassessment

The Hanoi summit’s collapse triggered a comprehensive reassessment in Pyongyang of North Korea’s strategic position:

  1. Nuclear Strategy
    – Nuclear weapons development needed to be accelerated
    – Its missile testing program needed rapid expansion
    – It needed to publicly acknowledge its nuclear status
  2. Diplomatic Posture
    – Reduced emphasis on US negotiations
    – Strengthened ties with China and Russia
    – Dismissal of South Korean outreach
  3. Economic Planning
    Increased focus on self-reliance
    – Development of sanctions-resistant trade
    – Military industry expansion

The Russian Connection

North Korea’s military-industrial complex, while technologically stalled in the 1970’s for the most part, maintains a massive production capacity for basic weapons systems. Its ability to manufacture artillery ammunition using Soviet-era specifications has made it an ideal supplier for Russia’s war effort, allowing Russian industry the ability to slow its own production to refine and retool, even as western arms industries remain stalled in their production of the same supplies. This partnership offers multiple benefits to Pyongyang:

  1. Economic Advantages
    – Hard currency earnings
    – Technology transfer opportunities
    – Sanctions circumvention
  2. Military Benefits
    – Combat experience for troops
    – Modern battlefield observations
    – Testing of equipment in actual combat
  3. Strategic Gains
    – Stronger ties with a permanent UN Security Council member
    – Reduced international isolation
    – Leverage against US pressure

Of these points, the second – giving its troops modern combat experience – is the most valuable to North korea in the short term. It it very difficult for a military that has not actually fought a war in decades to know what new tools and techniques it should try to implement; armed forces around the world are notoriously conservative (to the point of being hidebound) for a reason, although rarely to the level of North Korea.

Whatever the reality of the fighting in Ukraine, “blooding” North Korean troops there could give them a significant advantage over their South Korean adversaries in a future fight, as South Korean troops have not had any experience in the kind of war currently being fought in Ukraine, despite having a significant technological advantage over their northern opposition.

Abandoning Reunification

The shift away from even theoretical peaceful reunification represents a significant change in North Korean policy. Since the Korean War armistice in 1953, both Korea’s have maintained reunification as an official goal, though with vastly different visions of how it would occur.

This policy shift serves several purposes:

  • Solidifies Kim’s domestic position
  • Justifies increased militarization
  • Enables closer alignment with Russia and China
  • Reduces diplomatic constraints on aggressive actions

 

After a string of public failures to successfully get a satellite into orbit, Pyongyang finally managed to get a reconnaissance satellite, the “Malligyong-1” into orbit (rather like the original US and Soviet launch attempts).

The successful satellite launches demonstrate North Korea’s growing mastery of several critical ICBM technologies, particularly multi-stage rocket separation and long-range guidance systems. The primary technical hurdle remaining for effective ICBM capability is reentry vehicle technology – protecting a nuclear warhead during its hypersonic return through the atmosphere. Russian assistance in this area likely on Kim’s shopping list for providing weapons and troops to Russian leader Vladimir Putin, as Russia possesses some of the world’s most advanced reentry technologies.

 

Hwasong-17 intercontinental ballistic missile, 2024. Public Domain Photo from the Government of North Korea.

 

By early 2024, North Korea had already demonstrated progress in multiple independently targetable reentry vehicle (MIRV) development through tests of the Hwasong-17 ICBM, which appears designed to carry multiple warheads. Their March 2024 test of a new solid-fuel ICBM suggested further advances in this capability. MIRV technology would allow a single missile to carry multiple nuclear warheads, each capable of hitting different targets. This dramatically increases both first-strike capability and the ability to overwhelm missile defense systems.

The combination of proven satellite launch capabilities, potential Russian reentry assistance, and advancing MIRV technology could enable North Korea to deploy a credible nuclear triad system, fundamentally altering the strategic balance in Northeast Asia.

Regional Implications

This strategic realignment has profound implications for Northeast Asian security:

  1. South Korea
    – Increased military tension
    – Reduced diplomatic options
    – Stronger US alliance imperative
  2. Japan
    – Enhanced missile defense urgency
    – Strengthened US security ties
    – Increased military spending justification
  3. China
    – Complicated regional balance
    – Reduced influence over DPRK
    – New strategic calculations needed

The acquisition by North Korea of a credible strategic nuclear capability would represent a catastrophic shift of world power.

Looking Forward

North Korea’s evolution from a state theoretically seeking peaceful reunification to an active military supplier in global conflicts represents a significant shift in Northeast Asian security dynamics. This transformation, rooted in the failures (whether accidental or deliberate) of past diplomatic initiatives and Kim Jong Un’s determination to ensure the survival of his regime, suggests a more militarily active and less diplomatically constrained North Korea in the years ahead.

As this article goes to press, the United States is some four days away from the 2024 Presidential election. There is no way to know what will happen if Donald Trump wins on November 5th – but the outcome of a Harris victory is starkly and painfully clear, because any response they make to Kim’s new course will be either completely incoherent, or wildly overblown.

Choose wisely.

 

 

 

The Freedomist — Keeping Watch, So You Don’t Have To
Britain’s “Lost Decade” Economic Disaster & Its Impact On Global Security

 

 

 

 



The United Kingdom’s descent from its position as a leading global financial center into economic turmoil represents one of the most dramatic shifts in modern economic history. While the roots of this decline can be traced to the 2008 global financial crisis, the combined shocks of Brexit, the COVID-19 pandemic, and Britain’s steadfast support of Ukraine has accelerated what many analysts now term Britain’s “Lost Decade.”

The Foundation Cracks: 2008-2016

The 2008 financial crisis hit London particularly hard, given its out sized role in global banking and finance. While other nations gradually recovered, Britain’s recovery was notably sluggish. The Conservative-Liberal Democrat coalition government’s austerity measures, implemented under Prime Minister David Cameron, may have prevented a sovereign debt crisis (while some 70 potential defaults currently exist), but came at the cost of reduced public services and infrastructure investment.

During this period, Britain’s armed forces faced significant budget cuts. The 2010 Strategic Defence and Security Review disastrously led to significant reductions in personnel, the early retirement of the aircraft carrier HMS Ark Royal, and the scrapping of the Harrier jump-jet fleet. These decisions would later impact Britain’s ability to project power globally.

 

Brexit: The Self-Inflicted – With Help – Wound

The 2016 Brexit referendum marked a crucial turning point. The vote to leave the European Union triggered immediate economic consequences: the pound sterling plummeted, investment decisions were frozen, and London’s position as Europe’s financial capital began to erode. Major financial institutions started relocating operations to Dublin, Frankfurt, and Paris.

The protracted Brexit negotiations created years of uncertainty, depressing business investment and complicating trade relationships. The eventual Trade and Cooperation Agreement, while avoiding a “no-deal” scenario, still resulted in significant new barriers to trade with Britain’s largest market.

The reality was that Britain’s trade was significantly undermined by the European Union’s bitter and petty actions, as that body did not was to lose the major tax revenues that Britain was contributing, at a time when the EU was a whole was still reeling from the 2008 crisis. The “better option”, from the EU’s perspective, was to make it as hard for Britain as possible to “go it alone”.

What made these effects far worse, were a series of bungling failures by successive governments in London, from both sides of the political aisle. These poorly-considered actions have functionally flat-lined the British economy…and things are not improving.

 

Pandemic Paralysis

COVID-19 struck Britain particularly hard, both in human and economic terms. The UK experienced one of Europe’s highest death rates and deepest economic contractions. The government’s pandemic response, while unprecedented in scale, added substantially to national debt. The furlough scheme, while preventing mass unemployment, cost hundreds of billions of pounds.

The pandemic exposed and exacerbated existing economic weaknesses. Supply chain disruptions, combined with Brexit-related complications, led to shortages and inflation. The National Health Service, already strained by years of austerity, faced enormous pressure.

And, despite the government trying to “cook the books” by “revising” economic numbers, the British economy has still not recovered.

Ukraine Support and Energy Crisis

Britain’s robust support for Ukraine, while strategically important, has come at a significant economic cost. Military aid, combined with sanctions against Russia, contributed to spiraling energy costs and inflation. The situation has forced difficult choices between domestic spending and international commitments.

The energy crisis has highlighted Britain’s vulnerability to global supply shocks. Despite North Sea oil and gas resources, years of under-investment in energy infrastructure and storage capacity left the country exposed to price volatility.

Successive governments in London have learned the US government’s model of “borrow ’til you crash”, piling on mountains of debt to support Kiev’s flagging hopes of survival, as ‘victory’ is very much a malleable terms.

Impact on Global Security

Britain’s economic challenges have resulted in drastic and cascading effects on global security:

  1. Reduced Military Capability: Budget constraints have limited Britain’s ability to modernize its armed forces and maintain its traditional role in global security operations, something even the new Left-wing government of PM Keir Starmer could not ignore.
  2. NATO Implications: While Britain continues to meet NATO’s 2% GDP defense spending target, the declining value of the pound means this represents less actual military capability.
  3. Diplomatic Influence: Economic weakness has diminished Britain’s ‘soft power‘ and ability to influence global events through economic leverages.
  4. Intelligence Capabilities: Budget pressures have affected Britain’s renowned intelligence services, potentially impacting the “Five Eyes Alliance“.

Recruitment Crisis and Cultural Shift

The British military’s recruitment challenges reflect deeper societal changes. Traditional sources of military recruitment – working-class communities with strong patriotic traditions – have been eroded by demographic shifts, changing cultural attitudes and recently, the stunningly draconian response of the Starmer government to a sudden spate of riots initially linked – albeit wrongly – to racial violence. The Armed Forces’ 2022-23 recruitment targets were missed by approximately 40%, marking the worst recruitment crisis since the end of conscription in 1960, although recruiting numbers in the United Kingdom have been dropping steadily since at least 2010.

This recruitment crisis stems from multiple factors. Economic uncertainty has paradoxically reduced rather than increased military recruitment, as potential recruits seek more stable civilian careers. More significantly, surveys indicate a growing disconnect between younger Britons and traditional concepts of national service. The proportion of young people expressing “pride in being British” has declined significantly, particularly in urban areas, leading to even Left-leaning pundits to suggest that the British Left needs to “re-embrace patriotism”.

 

 

The military has attempted to address this through modernized recruitment campaigns, often focusing on personal development and technical skills rather than patriotic duty. However, these efforts have met with mixed success, as they compete against private sector opportunities and what military leaders describe as an “individualistic zeitgeist” among younger generations.

This staffing crisis has forced difficult choices about force structure and capabilities, significantly limiting Britain’s ability to maintain its global military commitments.

Economic Indicators

The scale of Britain’s economic challenges is reflected in key indicators:

  • Persistent low productivity growth
  • Declining real wages
  • Rising income inequality
  • Chronic trade deficits
  • High government debt-to-GDP ratio
  • Weakening pound sterling
  • Reduced foreign direct investment

Looking Forward

Britain’s path to economic recovery remains uncertain. The country retains significant advantages: a highly skilled workforce, world-class universities, and leadership in sectors like fintech and renewable energy. However, structural challenges persist:

  • Aging infrastructure
  • Regional economic disparities
  • Skills shortages in key sectors
  • Housing market instability
  • Trade relationship uncertainties
  • Energy security concerns

 

The implications of these issues for global security will depend largely on Britain’s ability to navigate these challenges while maintaining its international commitments and modernizing its military capabilities.

The real problem for British security, however, remains the same as in the United States Armed Forces: an increasing percentage of the primary recruiting demographic – the “under-30” age group – simply do not see the point in volunteering to serve their country in the military, if at all, as it seemingly offers no opportunities over the civilian world, and has demonstrated (as in the United States and Canada) a staggeringly callous attitude towards treating the long-term impacts of combat on the country’s veterans…And, also as in the United States, if this trend is not reversed, the alternatives are not things any government wants to consider.

 

 

 

 

The Freedomist — Keeping Watch, So You Don’t Have To
Autonomous Weapons Systems: Ethical Dilemmas, Strategic Advantages

 

 

 

 

 



In the realm of military technology, few developments are as controversial or potentially game changing as autonomous weapons systems. These are weapons that can seek out, select and engage targets without human intervention, using artificial intelligence to make literal life-and-death decisions on the battlefield. As nations race to develop these systems, we find ourselves at a crossroads, weighing the strategic advantages against profound ethical concerns.

 

Defining Autonomous Weapons Systems

Autonomous weapons systems (AWS) range from AI-powered drones to robotic sentries and even potential future systems that could operate entirely independently of human control. The key feature is their ability to use sensors and algorithms to identify, target, and engage enemies without direct human authorization. This marks a significant shift from remote-controlled or semi-autonomous systems that still rely on human decision-making for lethal actions.

Significantly, the key difference between a drone or missile and an AWS is not hardware, but software – any sufficiently capable, computer-controlled platform can be loaded with an AWS algorithm, and no one would be the wiser, unless the unit was captured.

 

Strategic Advantages

The potential military benefits of AWS are significant:

  1. Reduced Risk to Human Personnel: By replacing human soldiers in dangerous situations, AWS could significantly reduce military casualties.
  2. Enhanced Speed and Precision: AI can process information and react much faster than humans, potentially increasing the speed and accuracy of military operations.
  3. 24/7 Operation: Unlike human soldiers, autonomous systems don’t need rest, allowing for continuous operation.
  4. Cost-Effectiveness: Over time, AWS could potentially reduce the personnel costs associated with maintaining large standing armies.
  5. Overcoming Human Limitations: AWS wouldn’t be subject to human failings like fear, fatigue, or emotional decision-making in combat situations.

 

Ukrainian bomb-armed “octocopter”. Photo Credit: General Staff of the Armed Forces of Ukraine, via armyinform.com.ua. CCA/4.0 Int’l

 

 

Ethical Dilemmas

However, the development of AWS raises serious ethical concerns:

  1. Lack of Human Judgment: Can an AI truly understand the context and nuances of a combat situation? There are fears that AWS might not be able to distinguish between combatants and civilians in complex scenarios. While this has always been a concern in relation to artillery and air strikes, both of those combat avenues have a presumably responsible human operator[s] at the top of the decision-making tree.
  2. Accountability Issues: If an autonomous weapon makes a mistake, who is held responsible? The programmer, the manufacturer, or the military commander who deployed it?
  3. Lowered Threshold for Conflict: With reduced risk to personnel, nations might be more willing to enter into armed conflicts, potentially increasing global instability.
  4. Potential for Escalation: The speed of AI decision-making could lead to rapid escalation of conflicts before humans have a chance to intervene.
  5. Hacking and Misuse: There are serious concerns about the potential for AWS to be hacked or fall into the wrong hands, with catastrophic consequences. Note that this potential is not limited to national entities, but can easily extend to non-governmental groups and individualsm as AWS algorithms are, at their core, simply computer programs, which can be endlessly duplicated and sent around the world via the internet, human couriers or just conventional “snail mail” services. The distinct danger out uncontrollable proliferation is not something to be blithely dismissed.

 

 

The Global Debate

The international community is grappling with how to approach AWS. Some nations and organizations are calling for a preemptive ban on “killer robots”, arguing that the risks outweigh any potential benefits. Others advocate for regulation and careful development, believing that AWS are inevitable and it’s better to shape their development than to futilely try to prevent it.

The United Nations has been a focal point for these discussions, with several meetings of the Convention on Certain Conventional Weapons (CCW) dedicated to debating potential regulations or bans on AWS. However, reaching a consensus has proven challenging, with major military powers often resistant to strict limitations.

 

Current State of Development

While fully autonomous weapons systems are not yet deployed in combat, many nations are actively developing precursor technologies. For example:

  • The US Navy’s Sea Hunter, an autonomous ship designed for anti-submarine warfare
  • Israel’s Harpy drone, which can autonomously detect and attack radar systems
  • Russia’s claimed development of AI-controlled missiles

 

‘Sea Hunter’ autonomous anti-submarine drone sails in formation during Rim of the Pacific (RIMPAC) 2022, July 28. U.S. Navy photo by Mass Communication Specialist 3rd Class Aleksandr Freutel. Public Domain.

 

While not fully autonomous, these systems represent significant steps toward AWS and demonstrate the ongoing interest in this technology among world powers.

Central to these concerns is the Kargu-2. Now combat-proven in the wreckage of Libya, in the hands of both Turkish “peacekeepers” and their local allies, the Kargu – despite official denials by Turkey, has shown that AWS systems are capable of performing lethal strikes with full autonomy is certainly possible.

 

STM Kargu-2, a portable rotary wing kamizake drone produced in Turkey. Photo credit: Armyinform.com.ua. CCA/4.0 Int’l

 

 

The Human Element

One of the core debates surrounding AWS is the role of human judgment in warfare. Proponents argue that removing human emotions like fear and anger from combat decisions could lead to more ethical outcomes. Critics counter that human empathy and moral reasoning are essential in making complex battlefield decisions.

The concept of “meaningful human control” has emerged as a potential middle ground, suggesting that while systems may have some autonomous functions, humans should retain ultimate control over lethal decisions. This is not an academic debate, because of the fundamental reality of all computer systems: Computers do not “care“, and neither does Artificial Intelligence. An AI combat system’s job is to attack what it can identify as an “enemy“, and if the last c.150 years of warfare have taught us anything, it is that every single person, regardless of gender or age, is a potential threat to be dealt with.

War is bad enough, as it is. We don’t need to allow it to be worse.

 

Future Implications

The widespread adoption of AWS could fundamentally change the nature of warfare. Some potential implications include:

  • Shifts in military strategy and tactics to account for the capabilities and limitations of AWS
  • Changes in the global balance of power, as nations with advanced AI capabilities gain military advantages
  • Potential arms races in AI and autonomous systems
  • New forms of conflict, including potential battles between opposing autonomous systems
  • The need to develop military training, techniques and procedures (TTP’s) to address the certainty that AWS algorithms will proliferate into the hands of terror groups.

 

 

Conclusion

Autonomous weapons systems represent both a remarkable technological achievement and a profound ethical challenge. As we stand on the brink of a new era in warfare, the decisions we make about the development and use of AWS will have far-reaching consequences for global security, international law, and the very nature of armed conflict.

The path forward will require careful consideration, robust international dialogue, and a commitment to balancing technological progress with ethical responsibility. As AWS continue to evolve, it’s crucial that policymakers, military leaders, ethicists, and the public engage in public and informed discussions about how to navigate this complex landscape.

Ultimately, the question we face is not just about the capabilities of machines, but about our own humanity – what role do we want human judgment to play in matters of life and death, and how can we ensure that the pursuit of military advantage doesn’t come at the cost of our ethical principles?

 

 

 

The Freedomist — Keeping Watch, So You Don’t Have To
Small Drones, Big Impact

 

 

 

 

 



In the ever-evolving landscape of modern warfare, a seemingly new player has emerged, that has been punching well above its weight class: the small, unmanned aerial vehicle (UAV), or “drone”. These compact, agile, and increasingly affordable devices are revolutionizing battlefield tactics, offering capabilities that were once the domain of larger, more expensive military assets.

 

The Rise of the Miniature Air Force

Gone are the days when drones were solely the purview of well-funded militaries. While unmanned, remotely-piloted military drones are certainly nothing new, having been used in combat as far back as World War 2, and while used on a large scale as recently as the six-week long Nagorno-Karabakh War in 2020, it is important to realize that many of the recent uses of drones were not “revolutionary” in any way. In fact, Azerbaijan’s use of drones was essentially a copy of the US and Coalition air force’s campaign against Saddam Hussein’s capital in Baghdad, in 1991.

 

A Naval Forces of Ukraine Bayraktar TB2 from the Turkish company Baykar Defense; CCA/4.0 Int’l

 

Today, however, it is the comparatively cheap, off-the-shelf commercial drones, often modified specifically for military use, which have become almost ubiquitous on battlefields around the world. From the conflict in Ukraine to the wars in the Middle East, small drones began making their presence felt as early as 2015.

These miniature flying machines come in various shapes and sizes, from hand-launched fixed-wing craft to multi-rotor copters that can take off and land vertically. What they lack in size, they make up for in versatility and sheer numbers. This is driven by their low cost (as low as $40, as of late 2024), and ease of use, as their control interfaces are based on either popular video game controllers, or on smartphone app interfaces, again often mimicking video game apps.

 

Drone hand controller unit, 2022. Photo Credit: South Carolina Air National Guard. Public Domain.

 

 

Revolutionizing Reconnaissance

While “kamikaze” and bomb-dropping drones are certainly newsworthy, perhaps the most significant impact of small drones repurposed for military use has been in the realm of reconnaissance. Traditionally, gathering intelligence on enemy positions often required putting soldiers in harm’s way or relying on expensive satellite imagery. Now, a soldier as far down as the squad level (8-13 troops) can launch a drone from a safe position and get real-time video feedback of enemy locations, fortifications, and movements.

This capability has significantly democratized battlefield intelligence. Now, even small units can now have their own “eye in the sky,” providing unprecedented situational awareness. The psychological impact is also significant – the constant buzz of drones overhead can be deeply unnerving for opposing forces, never knowing when they’re being watched…or targeted.

 

South Carolina Air National Guard Conducts Drone Fly Over of Runway Construction, 2022. Photo Credit: South Carolina Air National Guard. Public Domain.

 

 

From Eyes to Claws: The Weaponization of Small Drones

While reconnaissance remains a primary function, small drones are increasingly being weaponized. In some conflicts, commercial drones have been modified to drop small explosive payloads, usually modified hand grenades or rocket-propelled grenade (RPG) rounds, and do so with surprising accuracy. This last has, in fact, been used frequently on Ukrainian battlefields to counter the threat posed by main battle tanks. This has allowed for precise (if small scale) strikes on localized high-value targets without risking pilot’s lives or using expensive guided missiles.

A significant factor in this, is the timeliness of engagement, as a local unit with armed drones can act to engage a target far faster than it could using the old methods of calling back to an artillery or missile base, in order to adjust and coordinate fires; while that can – and is – still done with more conventional artillery, the weaponized drone – under the command of a leader literally shoulder to shoulder with the operator – can engage a group of targets much faster than before.

The low cost and expendable nature of these drones also enable swarming tactics. A swarm of small, explosive-laden drones, whether operating as kamikaze’s or under positive control, can overwhelm older, conventional defenses designed to counter larger, conventional threats. This asymmetric capability allows smaller forces to challenge larger, better-equipped opponents.

 

Leveling the Playing Field

Perhaps the most profound impact of small drones is how they’re leveling the playing field in asymmetric conflicts. Non-state actors and smaller military forces can now possess capabilities that were once the exclusive domain of major powers. A few thousand dollars worth of drones can now threaten millions of dollars worth of military hardware, and can frighten and demoralize professional troops who lack the knowledge, skills, training or equipment to effectively deal with this type of threat.

This democratization of air power is forcing a rethink of traditional military doctrine. Heavy armor, once the king of the battlefield, is increasingly vulnerable to drone-spotted artillery or direct drone attacks; current ad hoc armor strategies to counter drone strikes have only “sort of” worked. Air superiority, traditionally achieved through fighter jets and large drones, now also requires countering swarms of much smaller, harder-to-detect UAV’s. If anything, this threat is much harder for conventional armies to deal with.

 

The Counter-Drone Challenge

As small drones reshape offensive tactics, they’re also spawning a new field of counter-drone technology. Militaries around the world are racing to develop effective countermeasures, from electronic warfare systems that can jam drone controls to directed energy weapons that can shoot them out of the sky. Some novel approaches include training eagles to intercept drones, using large nets to capture them, or deploying “hunter-killer” drones to pursue and neutralize hostile UAV’s. Obviously, these advanced systems – while they may work for the moment – are breathtakingly expensive for the threats they are envisioned to be deployed against.

The challenge is significant – how do you economically counter a threat that might cost only a few hundred dollars per unit?

 

The Counter-Rocket, Artillery, Missile (C-RAM) gun fires flares during a weapons test at Joint Base Balad, Iraq, Jan. 31, 2010. USAF Photo by Senior Airman B. Bateman. Public Domain.

 

While conventional systems such as the combat-proven C-RAM and the venerable ZSU-23-2 can be fitted with proximity-fuzed warheads and self-destruct systems to help prevent “friendly fire” incidents, the dollar gap – something that always looms large in the conduct of war – is still far too wide for these systems to be truly cost-effective in combat. Likewise, conventional rifles are nearly useless against drones, as their projectiles – while perfectly suitable against a human-sized target – are nearly impossible to use against a fast-moving target roughly the size of a human hand.

 

A salvo from the ZU-23-2 anti-aircraft gun, 2021. Photo by: Ministry of Defense of Russia via mil.ru. CCA/4.0

 

Is there a better option?

 

Shotguns vs. Drones: A Low-Tech Solution to a High-Tech Threat

 

While militaries and defense contractors pour millions into developing advanced counter-drone technologies, one surprisingly effective tool has emerged from a much older era of warfare: the conventional shotgun.

The oldest model of personal firearm in history, shotguns have been continuously used in combat since the invention of gunpowder. As early as the 1980’s, if not before, conventional 12-gauge pump-action shotguns were mounted under the barrels of rifles such as the M-16, usually as supplementary weapons for police SWAT units to use in blasting open locked doors during raids; in fact, a Mossberg 500 was mounted under an M-16 look-alike in the 1987 movie “Predator“. Although terribly front-heavy, this sort of “combination weapon” does have its uses, when in trained hands.

 

The KAC MasterKey mounted under the barrel of an M4 assault rifle. 2009 photo by DrBaker of M4Carbine.net. Public Domain.

 

Militaries around the world have used shotguns for both combat and recreation. The shooting sports of “trap” and “skeet” are particularly relevant here, as both are based on hitting very small, fast moving targets with little lead-time.

 

Boatswain’s Mate Seaman Alonzo Bender, left, fires a 12-gauge shotgun during a skeet shoot on the flight deck of the amphibious dock landing ship USS Pearl Harbor (LSD 52), in 2010. U.S. Navy photo by Mass Communication Specialist 2nd Class Michael Russell. Public Domain.

 

Shotguns offer several advantages in countering small drones:

 

  1. Widespread Availability: Most military and law enforcement units already have shotguns, making them an immediately accessible solution.
  2. Ease of Use: Soldiers are often already trained in shotgun use, and even if they are not, only minimal additional training is required.
  3. Wide Dispersal Pattern: The ever-widening spread of shotgun pellets after they leave the muzzle increases the likelihood of hitting a small, fast-moving target.
  4. Cost-Effective: Compared to expensive electronic warfare systems or laser weapons, shotgun shells are incredibly cheap.
  5. Low Collateral Damage: Unlike missiles or explosives, shotgun pellets have a limited range, reducing risks to surrounding areas.

 

Real-World Applications

Several militaries have already employed shotguns against drones. U.S. forces in Syria and Iraq have used them to down small ISIS drones, while developments continue to seek out solutions to develop anti-drone ammunition for conventional weapons. Meanwhile, in Ukraine, Russian companies are developing specialized anti-drone shotguns for the battlefield. And all the while, the inability of most military forces to convince their civilian-staffed governments – most of whom have no military experience at all – that going back to older designs continues to leave expensively trained and equipped troops vulnerable on the battlefield.

Despite their advantages, shotguns are not a perfect solution:

  1. Limited Range: Effective range is typically less than 100 meters, requiring the threat to be relatively close.
  2. Manual Targeting: Unlike automated systems, shotguns require a human operator to spot and shoot the drone.
  3. Multiple Shots: Often, multiple shots are needed to down a drone, especially if it’s a larger or more robust model.
  4. Environmental Factors: Wind, obstacles, and poor visibility can significantly affect accuracy.
  5. Escalation Risks: In some scenarios, using firearms against drones could be seen as an escalation, particularly in sensitive diplomatic situations.

 

Still, shotguns do at least offer a fast solution to the close-range defense problem, when the alternatives are foot-long autocannon rounds or worse, anti-aircraft missiles to deal with what is essentially a lethal child’s toy.

 

Conclusion: Small Size, Big Shift

While the proliferation of small drones on the battlefield represents a significant shift in military tactics and strategy, they are like most developments: there is a lot of flash and thunder early on, but military forces that are actually competent will quickly adapt, and find countermeasures. All the same, these diminutive devices are rewriting the rules of military engagement, challenging long-held assumptions about military power, and forcing a reevaluation of everything from equipment procurement to tactical doctrine.

As technology continues to advance, making drones smaller, smarter, and more capable, their impact on warfare is only likely to grow. The military forces that can best adapt to this new reality – leveraging the strengths of small drones while effectively countering their threats – will hold a significant advantage on the battlefields of the future.

In the grand chess game of global conflict, the smallest pieces on the board are proving that size isn’t everything. The age of the small drone has arrived, and with it, a new era of warfare where the tiny can have a truly outsized impact.

 

 

The Freedomist — Keeping Watch, So You Don’t Have To
From Narco Subs to Military Tech

 

 

 

 



In the murky world of drug trafficking, narco submarines have long been a thorn in the side of law enforcement. These stealthy vessels, often homemade and barely submerged, have smuggled tons of illicit cargo past watchful eyes. Now, in an ironic twist, the U.S. Navy and Marine Corps are taking cues from these ingenious, if nefarious, designs to develop a new generation of military craft: low-profile submersibles for resupply and covert operations. The implications do not bode well.

 

Learning from the Underworld

Narco submarines, or “narco subs,” are semi-submersible vessels designed to evade detection while transporting large quantities of drugs. They are typically long, slender craft that cruise just below the water’s surface, with only a small conning tower visible above the waves. This design makes them incredibly difficult to spot visually or on radar. The other aspect is that narco subs do not “sound” like military vessels, or true submarines; this is due to them primarily using non-military marine diesel engines common to many civilian pleasure craft.

 

Two Narco subs (LPVs) interdicted by USCG personnel aboard USS Preble (5 June 2020) and USS Pinckney (15 May 2020). Sources: HI Sutton, US Navy, US Coast Guard, Small Wars Journal.

 

The military has taken note of these vessels’ effectiveness in evading detection. While the goals are vastly different, the need for stealth and the ability to operate in shallow coastal waters are shared requirements that make the design of narco sub an intriguing proposition for military applications.

 

The Military’s New Toy

The U.S. Navy and Marine Corps are now developing their own versions of these low-profile vessels. Unlike their illegal counterparts, these military craft are being designed with cutting-edge technology, robust construction, and specific military objectives in mind…Meaning, if the US Army’s Infantry Squad Vehicle (ISV) is any indication, will not work the way they think it will.

The primary focus is on using these submersibles for discrete resupply missions. In scenarios where traditional supply lines might be compromised or under threat, these stealthy craft could slip in undetected to deliver crucial supplies to troops in remote, isolated locations. This is patches a critical hole in the US Marine Corps’ “Force Design 2030“, by allowing covert resupply to widely dispersed monitoring and anti-ship and -air missile units on atolls, islands and continental regions with long coastlines or navigable river systems.

Obviously, there are implications of this for use in intelligence operations, to supply covert operatives in coastal areas. For the same reasons that drug cartels use semi-submersibles to smuggle illicit drugs into the United States by the ton-weight, these low-profile vessels are able to ferry in weapons and munitions without the need to dangerously expose aircraft crews to drop the supplies by parachute. Moreover, these craft can be remotely piloted, making for a truly “deniable” operation.

But resupply is just the beginning. The potential applications for these vessels in low-intensity conflicts are vast and varied.

 

Game-Changers in Low-Intensity Conflicts

Low-intensity conflicts, characterized by guerrilla warfare, counterinsurgency, and special operations, could all see a significant shift in tactics with the introduction of these submersibles. The low profile of these vessels makes them particularly suited for operations in contested waters, where larger, more visible craft might provoke unwanted attention or escalation. A brief look at these enhancements include:

  1. Covert Insertion: Special operations teams could be deployed silently and swiftly into hostile territory, with minimal risk of detection.
  2. Intelligence Gathering: Equipped with advanced sensors, these vessels could patrol coastlines, gathering crucial intelligence without alerting the enemy.
  3. Humanitarian Aid: In disaster zones where ports are damaged or inaccessible, these craft could deliver vital supplies to coastal communities.
  4. Counter-Narcotics Operations: Ironically, these military vessels, inspired by narco subs, could be used to combat drug trafficking, using the smugglers’ own tactics against them, via covertly inserting teams to raid drug-producing factories.
  5. Mine Warfare: Low-profile submersibles could be ideal for deploying or detecting underwater mines in shallow waters.

 

Marines with 3rd Reconnaissance Battalion, 3rd Marine Division, III Marine Expeditionary Force, prepare diver propulsion devices for training, Okinawa, Japan, 2011. Source: DVIDS. Public Domain.

 

Obviously, any group that can build and deploy such craft – including terror groups, can use them to conduct these sorts of operations. The Lashkar-e-Taiba (LeT) team that attacked Mumbai in 2008 had to capture a fishing trawler, force its captain to sail to a point off Mumbai (a coastal port city), then infiltrated the team at night using Zodiac-style rubber boats. Several of the steps the LeT required could have been eliminated with semi-submersible craft.

 

Technical Challenges and Innovations

Developing these submersibles isn’t without its challenges. The military versions need to be far more sophisticated than their narco counterparts. Engineers are grappling with issues like:

  •  Propulsion systems that are both powerful and quiet
  •  Advanced navigation systems for precise underwater maneuvering
  •  Life support systems for extended underwater operations
  •  Modular designs to support various mission profiles
  •  Materials that can withstand the pressures of submersion while maintaining a low profile

 

These challenges are driving innovations in naval engineering, with potential spin-off benefits for civilian maritime technology.

 

The Future of Naval Warfare?

As these low-profile submersibles move from concept to reality, they have the potential to reshape naval strategy, particularly in littoral and coastal operations. They represent a shift towards more agile, adaptable naval forces capable of operating in the gray zones of modern conflict. But the true game-changer may lie in their potential as stealthy missile platforms.

 

The Game-Changing Potential of Missile-Armed Submersibles

Recent developments have shown that these vessels could be more than just transport and reconnaissance platforms. The U.S. Navy has been exploring the possibility of arming these low-profile submersibles with anti-ship missiles, specifically the Naval Strike Missile (NSM).

 

Naval Strike Missile (NSM). Hemus Exhibition , 2010, International Fair in Plovdiv, Bulgaria. Photo by Peterdx. Public Domain.

 

The NSM is a sea-skimming, high-subsonic speed missile with a range of over 100 nautical miles. It’s designed to evade enemy defenses and can strike both land and sea targets. Now, this potent weapon system could be mounted on a vessel that is nearly invisible to radar, confusing to sonar (if using non-military engines) and difficult to detect visually.

This combination creates a formidable and unpredictable threat. A group pf small, stealthy vessels lurking just offshore, capable of launching precision strikes against much larger ships or land targets, could fundamentally alter the balance of power in coastal areas.

 

Tactical Advantages

The tactical advantages of this setup are numerous:

  1. Surprise Factor: These submersibles could approach high-value targets undetected, launching missiles from unexpected locations.
  2. Cost-Effective Sea Denial: A relatively inexpensive platform could threaten or neutralize much larger, more expensive naval assets…not least, because of the potential for the platform’s use as a remotely piloted vessel.
  3. Distributed Lethality: By spreading offensive capabilities across numerous small platforms, naval forces become more resilient and harder to neutralize.
  4. Rapid Response: These vessels could quickly deploy to hot-spots, providing a swift and stealthy strike capability where needed.

 

Strategic Implications

The strategic implications of missile-armed low-profile submersibles are profound:

  1. Asymmetric Warfare: Smaller nations or non-state actors could potentially leverage this technology to challenge larger naval powers, which – despite their strength on paper – cannot have ships deployed everywhere, continuously.
  2. Area Denial: The mere threat of these vessels could deter enemy forces from operating in certain areas, effectively expanding a nation’s defensive perimeter.
  3. Escalation Management: Their small size and low profile could make them less provocative than deploying larger warships, allowing for a measured response in tense situations.
  4. Changed Calculus: Naval planners would need to reconsider strategies for littoral operations, knowing that potent threats could be hiding in plain sight.

 

Challenges and Considerations

However, arming these vessels with missiles isn’t without challenges:

  1. Stability: Ensuring accurate missile launches from a small, semi-submerged platform presents engineering challenges.
  2. Limited Payload: The size of these vessels restricts the number of missiles they can carry.
  3. Ethical Concerns: The covert nature of these platforms could raise questions about transparency in military operations.
  4. Proliferation Risks: As with any advanced military technology, there’s a risk of these capabilities spreading to potential adversaries.

 

A New Era of Naval Warfare?

The combination of low-profile submersibles and advanced anti-ship missiles like the NSM could herald a new era in naval warfare. It blends the stealth of submarines with the striking power of surface combatants in a compact, versatile package.

As these technologies mature and potentially enter service, they may well rewrite the rules of engagement in coastal waters. The ability to strike from hidden positions with precision and power could make these small vessels a cornerstone of future naval strategy.

However, like any military technology, their true impact will only be understood once they’re deployed in real-world scenarios. Will they prove to be the game-changers some predict, or will unforeseen limitations curb their effectiveness?

One thing is certain: as these stealthy, missile-armed craft prepare to slip beneath the waves and into military service, they may well be ushering in a new era of naval operations—one where the lines between submersible and surface vessel, between defensive and offensive capabilities, become increasingly blurred. The future of naval warfare may very well belong to those who master the art of hiding in plain sight while packing a powerful punch.

As these low-profile submersibles move from concept to reality, they have the potential to reshape naval strategy, particularly in littoral and coastal operations. They represent a shift towards more agile, adaptable naval forces capable of operating in the gray zones of modern conflict…However, like any military technology, their true impact will only be understood once they’re deployed in real-world scenarios. Will they prove to be the game-changers some predict, or will unforeseen limitations curb their effectiveness?

One thing is certain: the development of these vessels showcases the military’s ability to innovate and adapt, even drawing inspiration from unexpected sources. From the shadowy world of drug smuggling to the cutting edge of naval warfare, the journey of the low-profile submersible is a testament to the old adage that necessity — whether in crime or in war — is indeed the mother of invention.

At the same time, serious thought needs to given to ask the uncomfortable question: Are state military design bureau’s around the world so bereft of ideas, that they have to adapt the ad hoc tactics and tools of criminals and terrorists to “big war” theory? After all, the US Army’s ISV program exists for the sole reason to emulate the widespread use of “technicals” in combat around the world – and does so poorly. Will the US Navy and Marine Corps’ semi-submersible program make the same mistakes?

As these stealthy craft prepare to slip beneath the waves and into military service, they may well be ushering in a new era of naval operations—one where the ability to remain unseen is just as important as the power to strike.

 

 

ADDITIONAL RESOURCES

  1. Wayne P Hughes Jr. USN (Ret.), Robert P. Girrier (2018), Fleet Tactics and Naval Operations, Third Edition
  2. Julian Thompson (1994), Lifeblood of War: Logistics in Armed Conflict
  3. Thomas Ricks (2012), The Generals
  4. James F. Dunnigan (2003), How To Make War, 4th Edition
  5. James F. Dunnigan (1991), Shooting Blanks

 

 

 

The Freedomist — Keeping Watch, So You Don’t Have To
The Rise of Civilian Satellite Intelligence

 

 

 

 



Not too long ago, access to satellite imagery was firmly relegated to the realm of spy movies and top-secret government agencies. Times have certainly changed. Today, anyone with an internet connection can access detailed satellite images of almost anywhere on Earth. This democratization of satellite intelligence is reshaping how we understand global events, conduct business, and even wage war.

 

From Military Secrets to Public Domain

Before roughly 2000, good- to high-quality satellite imagery was the exclusive domain of superpowers. The United States and the Soviet Union spent billions during the Cold War to launch spy satellites, gaining a bird’s-eye view of each other’s military activities. This open access to the ultimate “high ground” forced every national government that wanted to try and keep their secrets out of public view to become highly creative in hiding facilities. As advanced sensors developed, so too did methods of concealment. Fast-forward to the 21st Century, and companies like Planet Labs and Maxar Technologies are providing high-resolution satellite imagery to paying customers – be they governments, corporations, or even individuals. Not only that, but many of these high-quality are now finding their way into free-access platforms, such as Google and Bing Maps, but even such unlikely sites as NatureFocused – offer very high-quality maps featuring regular, street-type maps, but also very recent satellite imagery and highly detailed terrain maps.

This shift has profound implications. Suddenly, small countries, NGOs, citizen journalists – even terrorists – now have access to intelligence that was once the privilege of only the most powerful nations. It’s like giving everyone a seat at the geopolitical poker table and letting them peek at each other’s cards.

 

Changing the Game in Global Politics

So, how exactly is this changing the political landscape? For starters, it’s making it a lot harder for governments to hide their activities. Take the recent conflicts in Ukraine and the Middle East. Civilian satellites routinely capture troop movements, missile launches, and the aftermath of strikes, often before official sources confirm them. This frequently happens in real-time, with independent verification changing (and often confusing) how we understand and respond to global crises.

But it’s not just about conflict zones. Environmental groups are using satellite imagery to track deforestation, oil spills, and illegal fishing. Human rights organizations can now monitor refugee movements and verify claims of atrocities. While it may seem like having a “global watchdog” that never sleeps, there are issues of misinterpretation – both accidental and deliberate – that can and do muddy the waters, giving false impressions through outdated images, failures of interpretation, or any number of other issues, technical or human.

 

The Double-Edged Sword of Warfare

In the realm of warfare, easy and (mostly) free access to recent, high-grade satellite intelligence is a “game-changer”. Military strategists now have to assume that their movements are being watched not just by enemy governments, but also potentially by anyone with an internet connection. This transparency can act as a deterrent to aggression, but it also means that the element of surprise in military operations is becoming a thing of the past.

In the hoary old days of 1983, the Reagan administration launched “Operation Urgent Fury“, to invade the Caribbean island nation of Grenada, which had collapsed into chaos as different factions of the ruling party wrestled for control. This placed the safety of some 400-odd American medical students in question, and the Reagan administration – which had come to power at least partly as a result of the previous administration’s failure in dealing with the Iranian Hostage crisis – was not about to risk a repeat performance on its doorstep.

While there was never any doubt that the United States military would win a conflict in Grenada, it was discovered – much to the consternation of all planners – that there were no detailed maps of Grenada inside the US cartographic system. US Army planners were forced to purchase tourist maps of Grenada just outside the gates of their bases, hand-draw grid reference lines and the estimated locations of targets on those rudimentary maps, then photocopy those maps and hand those out to troop leaders.

The issue was that there were very few “recon birds” – the colloquial term for reconnaissance satellites – in orbit at the time, and those satellites were not easy to “re-task”. Grenada was so “off-the-radar” in the United States, some intelligence officers wondered why they were being ordered to plan an invasion of the city of “Granada” in Spain.

Humor aside, this was clearly a serious problem…and one that would not be replicated today, in any army in the world worthy of the name. Today, anyone with an internet connection can utilize free tools (often coming as “stock” programs with many computers) that the battle planners of “Urgent Fury” – or, for that matter, “Desert Storm” – could have dreamed of.

Unfortunately, that also includes terrorists.

 

 

The 2008 attack on Mumbai, India, by the terror group “Lashkar-e-Taiba“, were planned and directed in real-time using stock personal computers, an internet connection and tools like Google, to verify targets, observe news reports on the fighting in real-time, and to generate maps that were used for plotting the progress of their operations on target.

Likewise, there are now commercially available tools, like “ATAK“, that approach military and national intelligence agency tool-sets in quality. These free, or at least low-cost, programs are well within the reach of private individuals, to say nothing of terror groups and small governments and their military forces.

These realities have proven the wisdom of the United States Marine Corps’ “Small Wars Manual“, published in 1940, which warned that what the West now calls “Third World” forces were improving their abilities and acquiring more modern weapons and equipment, and that the result would be that “First World” forces would have to be willing and able to adapt and evolve faster than those forces could.

 

 

The Road Ahead

As we look to the future, it’s clear that easy access to satellite intelligence will continue to play an increasingly important role in shaping our world. We’re likely to see even more detailed imagery, combined with AI and machine learning to provide real-time analysis of global events.

This technology has the potential to increase transparency, hold powerful actors accountable, and provide crucial information in times of crisis. But it also risks further eroding both personal and start privacy, and potentially destabilizing delicate geopolitical situations in unforeseen ways.

One thing is certain: the “view from above” is here to stay, and it’s changing how we see our world, literally. As this technology continues to evolve, it will be up to all of us – governments, businesses, and citizens alike – to figure out how to use it responsibly and effectively.

In a world where everyone can be a satellite superpower, the challenge will be learning how to use this newfound vision wisely.

 

 

The Freedomist — Keeping Watch, So You Don’t Have To
Blind-Sided – Why the F-35 Will Unhinge Strategy

 

 

 

 

 

 

 



In the vast chess game of global politics, naval power has long been a deciding factor for centuries. In the modern day, the aircraft carrier has reigned supreme since World War 2 as the ultimate symbol of maritime dominance; we discussed this back in August of this year. But…what if the rules of the game are changing? What if smaller nations, or even non-state actors, could suddenly challenge the naval superpowers – the United States, Britain, France, India and China – with their own fleets of makeshift aircraft carriers?

While this might sound like the plot of a bad conspiracy movie, it isn’t. The future of naval warfare might be closer to a DIY project than you’d think.

Historically, the concept of aircraft carriers revolutionized naval warfare. In World War II, after the twin strikes on the Italian fleet at Taranto, and the attack on Pearl Harbor (which used Taranto as its base model). The strike on Pearl Harbor left the US Navy without the force it had planned to use to fight Japan, leaving only its aircraft carriers to hold the line until the nation could fully mobilize. These floating airfields – now holding up to 70 attack aircraft – has allowed nations to project significant combat power far beyond their shores, changing the very nature of maritime strategy. Fast forward some eighty years, to the early 21st Century, and carrier battle groups are still the backbone of naval power for the United States, and those states trying to join in.

 

Aerial view of the Mar Piccolo anchorage of Taranto, Italy, showing Italian cruisers preparing to get under way, 12 November 1940 following the attack. Photo from the collection of C. Oliver, via the Australian War Memorial. Public Domain.

 

But – there’s a catch: traditional aircraft carriers are expensive. Really expensive. Multiple billions of dollars expensive. This high cost, along with serious and complex technical issues, has kept carrier capabilities out of reach for most nations.

Until now.

The emergency conditions of World War 2 sparked a need to both transport aircraft to a distant theater of war without having to actually fight until they got there, and/or escort convoys of slow-moving, mostly defenseless, civilian merchant ships. The answer to this problem was the concept of the “escort” carrier – a comparatively small ship, capable of transporting fewer than 30 aircraft. These types of vessels filled the gap, allowing the US and British Royal Navies to both escort convoys, protecting the ships from enemy submarines, and delivering combat aircraft ti the battle area…and sometimes, actively engaging the enemy, even though not equipped to do so, as happened in the three-day Battle of Leyte Gulf, in 1944.

Following World War 2, the United States maintained carriers as its primary fleet element. And the carriers became the linchpin of a new method of power projection. No one has seriously contended with US naval dominance in the 80-odd years since World War 2 ended. To be sure, the tensions of the Cold War saw the Soviet Union present a serious threat to US naval power with its huge and very capable submarine force, but no country ever attempted to match the US Navy’s carrier fleet.

But, as time advanced onward, so did technology. In 1969, Britain aircraft designer Hawker Siddeley came up with something new: the Harrier. Unlike conventional jets, the Harrier was designed to take off and land vertically, a system known as V/STOL. As a subsonic aircraft, the Harrier could not seriously contend with the high speed, supersonic interceptors of its time, but it carried a useful weapons payload, and did not require the complicated launch and recover system, known as “CATOBAR“, that conventional fighters needed to launch from a rolling and pitching deck.

 

F/A-18C Hornets assigned to the “Stingers” of Strike Fighter Squadron (VFA) 113 launch from the Nimitz-class aircraft carrier USS Ronald Reagan (CVN 76), November of 2008. U.S. Navy photo by MC2 Joseph M. Buliavac. Public Domain.

 

However, the Harrier was an outgrowth of an abandoned Hawker Siddeley project: the P.1154. Designed for a NATO requirement for a supersonic V/STOL fighter-bomber, the P.1154 fell victim – publicly, at least – to “mission creep” and bureaucratic infighting…Maybe. We’ll come back to that.

During the Cold War, with NATO’s desperate need to guard the GIUK Gap against it being closed by the Soviet Union during the critical opening phases of World War 3, in a manner similar to Nazi Germany’s U-Boat strategy of World War 2, one of the ideas to maximize the use of old, mothballed carrier hulls came in the form of the “helicopter carrier“. As the name suggests, this type of vessel was intended to only carry helicopters. In response to NATO needs, the idea was to pack the ship full of helicopters carrying air launched anti-submarine weapons and detection systems, which would allow the ship to protect convoys carrying war material to defend Europe against a Warsaw Pact invasion, from attack the very real threat of Soviet submarine forces. Clearly, a supersonic V/STOL would have been a great asset to ships like this in carrying out their mission.

But, the helicopter carrier concept was ultimately seen as wasteful, and it was eventually ended. The US Navy was happy with its upcoming LHA and LHD classes of amphibious warfare ships, which could operate Harrier’s for protection, and that was deemed sufficient.

But then, History intervened. During the Falklands War of 1982, the British suddenly found that the Royal Navy – after near-lethal budget cuts had left them with only two helicopter-type carriers – was forced to convert civilian cargo ships impressed for the war into makeshift aircraft carriers by the simple expedient of welding a solid landing platform on top of a base of shipping containers, and lashing Harriers and CH-47 helicopters to the deck. Ultimately the ship, the SS Atlantic Conveyor, would embark some five CH-47’s and six Westland Wessex helicopters, and then embarked fourteen Harriers as well, during the reorganization of the fleet at Ascension Island. Her sister ship, the SS Atlantic Causeway, would be fitted out to carry twenty-eight helicopters. (The Atlantic Conveyor was sunk by Argentinean Exocet anti-ship missiles on May 25th, 1982, taking most of her helicopter cargo down with her…the Harriers, however, had been flown off beforehand, significantly aiding the British war effort.)

It wasn’t pretty, but it worked.

 

SS Atlantic Conveyor approaching the Falklands, c.19 May 1982. A Westland Wessek Helicopter is seen near the bow. Photo credit: D.M. Gerard. CCA/2.5

 

Clearly, the notion of V/STOL fighters taking off from converted cargo was well grounded in realism. In fact, it was reinforced a year later in 1983, in the “Alraigo Incident“, when Royal Navy Sub-Lieutenant Ian Watson – unable to locate his carrier after a flight systems failure, made an emergency landing on the Spanish container ship “Alraigo” in mid-Atlantic before crashing from running out of fuel.

Enter the world of the 21st Century.

The “People’s Republic of China”, desperate to strengthen its flagging position in the world, is attempting to claim essentially all of the South China Sea, international arbitration be damned. However, the cold fact remains, that China has nothing to counter the firepower of even one US Navy carrier battlegroup…or, does it?

Aside from accelerating development of anti-ship ballistic missiles, the so-called “carrier killers”, the PRC has been trying to float their own aircraft carriers, without much success. The main problem comes down to CATOBAR systems and training. The launch and recovery system for fixed-wing aircraft is highly specialized, and requires extensive training and years of crew experience to work effectively. The US Navy has had over 70 years to perfect its own CATOBAR operations, and it shows in the low accident rates and relatively smooth operational pace on all US carriers.

With the deployment of the F-35B & C models – the “naval” variant – is being heralded as the solution to turn amphibious assault ships into “mini-carriers”; whether that is true or not remains to be seen. However, the US, along with Australia and Norway, are developing air-launched anti-ship missiles for the F-35B.

 

A British Lockheed Martin F-35B Lightning II (registration ZM148) of No. 617 Squadron RAF lands aboard the Royal Navy aircraft carrier HMS Queen Elizabeth (R08) in the Atlantic Ocean on 17 October 2019. U.S. Navy photo by MC3 Class Nathan T. Beard. Public Domain.

 

These weapons are designed to take out large, expensive supercarriers, especially if fired in swarms, to overcome a carrier’s anti-missile defenses. Ultimately, though, if enough missiles are fired at once, at least a few are bound to get through. The loss of a “supercarrier” like the USS Theodore Roosevelt or the new USS Gerald R. Ford would be a catastrophic blow to US confidence and foreign policy…But what about a smaller carrier? That’s a much harder target to hit, and a much less catastrophic loss if one is sunk.

More to the point, what if a country operating V/STOL fighter-bombers capable of launching anti-ship missiles suddenly converts a number of seized container ships and/or oil tankers into improvised aircraft carriers? Let’s take a hypothetical (and admittedly unlikely) scenario involving Australia or Indonesia.

Australia, with its vast coastline and strategic position, could theoretically convert some of its large merchant ships into makeshift carriers. Equipped with STOVL aircraft armed with anti-ship missiles, these DIY carriers could dramatically alter the balance of power in the South Pacific and Indian Ocean.

Or consider Indonesia, an archipelagic nation with a growing economy and increasing regional influence. If Indonesia were to suddenly develop a fleet of converted carriers, it could potentially control key maritime choke points and challenge established naval powers in the region.

 

Map of Southwest Pacific region. Image courtesy of Open Street Maps. ODbL.

 

Neither of these scenarios are likely to happen tomorrow, if ever. Both Australia and Indonesia are stable countries with good relations with major powers, including the United States. But in our rapidly changing world, what might happen in a decade or two? Recall that Iran went from a close U.S. ally to a sworn enemy practically overnight.

The point is, the potential for rapid, fundamental shifts in naval power is now here, and it’s something that traditional naval powers need to consider. In fact, this author has a suspicion that this very circumstance was the real reason for killing the Hawker Siddeley P.1154: the admirals of the late-1960’s and early-1970’s were all well-versed in carrier operations against other carrier forces in active combat as many, if not most, had been in combat against enemy carriers in World War 2 as junior officers, and would have wanted to limit the spread of functional carrier forces to small – and highly unstable – nations. Now, however, those veterans are gone, and navies have spent so long without a major naval war, the “institutional memory” of combat in this realm has been lost.

The only bright light in this darkness is the fact that there are very few V/STOL fighters out there, and none that can match the theoretical performance of the F-35B. The closest aircraft is the ancient YAK-38 of the Soviet era, an airplane that was plagued with problems from the start. In the modern day, the PRC has been trying to get its own V/STOL aircraft, the “J-18”, off the drawing boards for years. So far, they have failed to get it to work.

 

Yak-38 fighter landing aboard the aircraft-carrying cruiser Novorossiysk, part of the Red Banner Pacific Fleet, September, 1984. Phot credit: Vladimir Rodionov. CCA/3.0

 

But what if that changes? What if the Communist designers make a breakthrough, and create a missile-carrying V/STOL fighter-bomber that can at least operate at sea? Without a need for CATOBAR systems, such an event could seriously alter the nature of naval operations, especially if coupled to more exotic – but proven – projects.

So – what does this mean for the future of naval warfare? For one, it could lead to a more distributed form of naval air power. Instead of a few large carrier battle groups, we might see more numerous, smaller carrier groups. This could make naval forces more flexible and resilient, but also potentially more unpredictable.

It could also change the calculus of naval combat. Anti-ship missiles launched from converted tankers lurking among civilian shipping could pose a serious threat to traditional naval forces. The line between civilian and military vessels could become blurred, complicating rules of engagement. Moreover, this trend could democratize naval air power. Countries that could never afford traditional carriers might suddenly find themselves able to project power far beyond their shores. This could lead to increased regional conflicts, but it could also create new deterrents against aggression by larger powers.

 

SS Atlantic Conveyor loaded with Harrier V/STOL fighters and a Chinook helicopter in the lower-right corner. Shipping containers act as a wind break for flight and maintenance crews. Photo Credit: U.S. Naval Institute Photo Archive. Public Domain.

 

For major naval powers like the United States, this trend presents both challenges and opportunities. On one hand, it could erode the dominance of traditional carrier battle groups. On the other, it could open up new avenues for cooperation with allies and partners who adopt these capabilities.

While the reign of the supercarrier is far from over, the future of naval warfare might be more diverse and unpredictable than we now imagine. The potential for DIY carriers and distributed naval air power could reshape maritime strategy in the coming decades.

One thing is clear: the nations and leaders who can adapt to these changes will be the ones who shape the future of naval power. The game is changing, and it’s time for everyone to rethink their strategies.

 

 

The Freedomist — Keeping Watch, So You Don’t Have To
The Militarization of Social Media

 

 

 



 

In the age of likes, shares, and viral content, social media platforms have evolved far beyond their original purpose of connecting friends and family. Today, these digital spaces have become sophisticated battlegrounds where information warfare is waged with increasing intensity and sophistication. From election interference to political and social radicalization, the militarization of social media is reshaping the landscape of global conflict and challenging our understanding of national security.

The New Face of Warfare

Traditional warfare conjures images of tanks, aircraft, ships and troops moving bravely into battle, perhaps modified by images of personal-sized drones either surveilling the battlefield, if not directly attacking the enemy. However, in the 21st century, some of the most pivotal battles are being fought with keyboards and algorithms. Social media platforms, with their global reach and ability to rapidly disseminate information, have become powerful weapons in the arsenal of state and non-state actors alike.

This shift represents a fundamental change in how conflicts are waged. Information operations, once a supporting element of military strategy, have now taken center stage. The goal is no longer just to control physical territory, but to dominate the narrative, shape public opinion, and influence decision-making processes at the highest levels.

At its heart, “information warfare” is propaganda, directly targeting individuals – of friendly, neutral and enemy populations – to altrenately confuse, distract and misinform them, the better to shape their views to the attacker’s benefit. As an example, targeted social media manipulation can be used as a rallying cry to inflame public opinion – this is what happened in Tunisia in 2011 via Facebook, when a targeted campaign of social media manipulation aggravated the tragic suicide of an emotionally distressed young man, resulting in his self-immolation; this was the trigger event that started the so-called “Arab Spring” revolts, whose violent effects the world is still dealing with, over a decade later.

While many campaigns of militarized social media attack strategies are most often deployed by operators infiltrating existing sites and deploying multiple operators, assisted by increasingly sophisticated bots to artificially magnify and elevate the traffic of posts, spreading them much farther than they would spread organically, the most effective strategies come when the social media company itself consciously works with intelligence agencies to promote content. This is, in fact, at the core of the NSA using social media to promote the “selfie” craze to train facial recognition algorithms to better understand how human appearance can change.

Tactics and Techniques

The militarization of social media employs a wide range of tactics:

  1. Disinformation Campaigns: The spread of false or misleading information to sow confusion and discord.
  2. Astroturfing: Creating the illusion of widespread grassroots support for a particular viewpoint.
  3. Computational Propaganda: Using bots and algorithms to amplify certain messages and suppress others.
  4. Microtargeting: Leveraging user data to deliver highly personalized and persuasive content.
  5. Coordinated Inauthentic Behavior: Networks of fake accounts working together to manipulate public discourse.
  6. Memetic Warfare“: The creation of catchy, pithy images and sayings in a coherent and targeted campaign to begin shifting perceptions in a target population.

These tactics are often used in combination, creating complex information operations that can be difficult to detect and counter.

Memetic Warfare, as a doctrine, (as an outgrowth of Richard Dawkin’s theory of meme’s) is the latest iteration of the old practice of “psyops pamphlets“, printed flyers tossed from helicopters and airplanes – and sometimes, artillery shells – that attempted to alter the perceptions of opposing military personnel and civilians.

Modern internet memes can perform the exact same function as a propaganda leaflet, if a) constructed properly, and b) deployed to social media as part of a focused and structured campaign.

Real-World Impact

The consequences of this digital warfare are far-reaching and increasingly visible in global events:

  • Election Interference: The 2016 U.S. presidential election saw Russian-linked actors use Facebook, Twitter, and other platforms to spread divisive content and manipulate public opinion. The impact of these operations on the election outcome, however, remains a hotly debated topic.
  • COVID-19 Misinformation: During the COVID-19 pandemic, social media was used to attempt to brow-beat the public into dismissing concerns about the virus and vaccines as “conspiracy theories” or as “false information”, despite continuous evidence of widespread negative impacts of untested drugs. Social media was heavily used to justify all manner of draconian measures by various levels of government around the world, many of which – especially in various armed forces – have now (as of 2024) been retracted in full, or have cravenly begged those troops summarily dismissed to rejoin, actions that have failed miserably, as the command authorities’ actions have fundamentally broken the trust of their troops in their leadership abilities and morale authority.
  • Ethnic Violence: In Myanmar, Facebook was used to spread hate speech and incite violence against the Rohingya minority, demonstrating how social media can exacerbate real-world conflicts.
  • Recruitment for Extremist Groups: ISIL and other terrorist organizations have leveraged social media platforms for recruitment and radicalization, reaching potential members across the globe. ISIL, as of 2018, is estimated to have used social media to recruit and estimated 30,000-40,000 recruits, globally.

These examples illustrate how the militarization of social media can have tangible, often devastating, consequences in the physical world.

The Challenge for Free Societies

Free societies face particular challenges in this new weaponized landscape. The open nature of free societies, coupled with principles of free speech, can make them especially vulnerable to information warfare tactics, when those nation’s governments either do not promote detailed education of their own populations on the threat, and/or have lost the trust and faith of the populations, due to an over-abundance of security restrictions, that leave their populations scared of shadows, unable to understand the threat their governments warn them of, but only in vague and general terms.

Moreover, the line between legitimate political discourse and malicious information operations is often blurry. This creates a dilemma for both government agencies and social media companies: How to counter genuine threats without infringing on civil liberties or stifling free speech? As shown in the “knee-jerk” and draconian reactions to public concerns over those government’s response to the COVID pandemic, governmental overreaction and over-reach without coherent information being offered, damages or destroys public confidence in their governments; this creates a breeding ground for hostile actors to deploy information-warfare techniques and products to further weaken a public body’s loyalty to their government, which is exponentially aggravated by further government overreaction, as has recently occurred in the United Kingdom.

The Role of Social Media Companies

As the primary battlegrounds for this new form of warfare, social media platforms find themselves in a difficult position. They must balance user privacy, freedom of expression, and business interests with the need to protect their platforms from exploitation. Another factor is star-up capitol, as many very large social media companies got their start with grant money from intelligence agencies.

In response to growing pressure, companies like Facebook, Twitter, and YouTube have implemented various measures:

  • Content moderation policies to remove harmful content
  • Fact-checking partnerships to combat misinformation
  • Transparency reports on coordinated inauthentic behavior
  • Improved detection of bot accounts and inauthentic activity

However, critics argue that these efforts are often reactive and insufficient given the scale of the problem. In particular, “fact checking” has been badly handled by most social media companies, reducing the term to the level of a bad joke, and frequently generating the precisely opposite effect of its intent: if something is “fact checked” in a particular direction, it is widely assumed that the polar opposite is the actual truth.

Government and Military Response

Governments and military organizations are increasingly recognizing social media as a critical domain of modern warfare. Many countries have established dedicated units for information operations and cybersecurity:

These developments blur the lines between military operations, intelligence gathering, and public relations, raising complex ethical and legal questions. This democratization is intrinsically tied into free training in intelligence techniques available via everything from free-access archives of declassified military manuals to YouTube videos. Individuals who care enough, are training themselves to recognize the various techniques when they are deployed, and as a result, are able to bend this weaponization to their own use.

Looking Ahead: The Future of Digital Warfare

As technology continues to evolve, so too will the tactics of information warfare on social media. Several trends are likely to shape the future of this digital battlespace:

  1. Artificial Intelligence: AI will play an increasingly significant role, both in creating more convincing deep fakes and in detecting malicious content…Conversely, AI can be leveraged to radically speed up the action cycle.
  2. Augmented and Virtual Reality: As these technologies become more prevalent, they may open new fronts in information warfare, allowing individuals to “meet” and collaborate in ways only hinted at with previous tools, such as ZOOM, Teams or Discord, among others.
  3. Quantum Computing: This could revolutionize encryption and cybersecurity, with profound implications for online information operations.
  4. Regulation and Governance: There will likely be increased efforts to regulate social media platforms and establish international norms for behavior in the digital space. The reaction to this, however, may well encourage people to trust governments even less, to their direct detriment.

Conclusion

The militarization of social media represents a paradigm shift in how conflicts are waged in the 21st century. As digital platforms become ever more central to our lives, the battles fought on them will have increasingly significant real-world consequences.

Addressing this challenge will require a multifaceted approach involving governments, tech companies, civil society, and individual users. Education in digital literacy, robust democratic institutions, and innovative technological solutions will all play crucial roles in navigating this new landscape. At the same time, these responses have to be tempered by companies and governments, lest they either create or magnify the very problems they are attempting to defend their states from.

As the world moves forward, one thing is clear: the front lines of global conflict now extend to the palms of our hands, making every smartphone a potential battleground in the age of information warfare.

 

 

The Freedomist — Keeping Watch, So You Don’t Have To
Cryptocurrency and Conflict Financing – Reshaping the Economics of Modern Warfare

 

 

 



 

In the shadowy world of conflict financing, a new player has emerged: cryptocurrency. As digital currencies like Bitcoin – once derided by many as useless money pits – increasingly gain mainstream acceptance, they are also becoming a tool for those operating outside the law, including insurgent groups, terrorist organizations, and sanctioned states. This technological shift is reshaping the economics of modern warfare and challenging traditional methods of tracking and interdicting illicit funds. Money makes serious violent conflicts and wars possible, and cryptocurrencies are increasingly the preferred go-to for all non-state actors in conflicts…and major nations are not far behind.

The Rise of Crypto in Conflict Zones

Cryptocurrency’s key features – decentralization, anonymity, and borderless transactions – make it an attractive option for groups operating in conflict zones. Unlike traditional banking systems, which can be easily monitored and controlled by governments, cryptocurrencies offer a degree of financial autonomy that’s unprecedented in the digital age. It also holds the potential to radically expand the democratization of warfare, a subject we touched on last week.

In recent years, there have been several high-profile cases of cryptocurrency being used in conflict zones. In 2019, Hamas – the militant group controlling Gaza, responsible for the October 7, 2023 assault into Israel – turned to Bitcoin to solicit donations, bypassing international restrictions on its financing. Similarly, in the ongoing conflict in Ukraine, both sides have leveraged cryptocurrencies: volunteers supporting Ukrainian forces have raised over $200 million in crypto donations, while some Russian-backed separatist groups have also turned to digital currencies to evade sanctions.

Terrorism Financing Goes Digital

The shift from traditional financing methods to cryptocurrency is particularly evident in terrorism financing. Al-Qaeda, ISIS, and other terrorist groups have increasingly turned to Bitcoin and other cryptocurrencies to fund their operations. These groups often use social media platforms to solicit donations, providing Bitcoin addresses where supporters can send funds anonymously.

The ease of creating online fundraising campaigns with cryptocurrency has led to a new phenomenon: the crowdfunding of terror. In 2019, a website linked to Al-Qaeda-affiliated groups in Syria raised Bitcoin donations for weapons and training. The campaign, which ran on the dark web, promised donors anonymity and the ability to support jihad from anywhere in the world.

This has extended into Asia, as well, as extensive NFT networks have been employed to both raise and transfer cryptocurrencies into fungible cash. Part of this fallout comes in the form of Afghanistan coming to the fore as a clearinghouse for crypto transfers to terror groups, as the lax controls of the ruling Taliban – who returned to power after the bungled and disastrous withdrawal of United States forces from the country in 2021 by the Biden-Harris administration – effectively closing off surveillance and enforcement efforts within the pariah state.

Challenges for Law Enforcement

This new landscape of crypto-enabled conflict financing poses significant challenges for law enforcement and intelligence agencies. Tracking and intercepting cryptocurrency transactions is a complex task, requiring specialized skills and technologies that many agencies are still developing. A major part of this is the reality of the “dark web“, and its associated “darknet markets“. Outside of cryptocurrency transfers, these markets allow all manner of criminal activity, including human trafficking and child pornography, as well as illicit drug trades, all of which terror groups have no issue leveraging such tools.

The catch for law enforcement and intelligence agencies in tracking terrorists and other criminals through the “dark web” lays in the fact that although the core operating principle of the ‘dark web’ – so-called “onion routing” – was developed and patented by the US Navy in 1998, the very nature of the system developed to secure US military and government communications networks means that forcing access remotely is virtually impossible. In fact, the arrest by the FBI of the founder and main operator of the notorious “Silk Road” darknet market in 2013 (which led to his life sentence in 2015) did not involve traditional methods of hacking, but involved an agent infiltrating the “Silk Road” site as an administrator, and using “social engineering” techniques to narrow down Ulbricht’s location, and using his personal security mistakes to finally locate him…”Hacking” really had nothing to do with the takedown of the “Silk Road“, because it cannot be taken down by conventional methods of “hack-attack“.

The pseudonymous nature of most blockchain transactions using the “non-fungible token” protocol that makes cryptocurrencies viable, provides a veneer of anonymity, though it’s not impenetrable. Agencies like the FBI have had some success in tracing Bitcoin transactions related to ransomware attacks and other cybercrimes. However, newer “privacy coins” like Monero offer even greater anonymity, making them increasingly popular among those seeking to avoid detection.

Legal and jurisdictional issues further complicate matters. As cryptocurrency transactions usually cross international borders, questions are raised concerning which agencies have authority to investigate and prosecute any “criminal activity” based on a computer physically located in their countries, not least because a specific instance of criminal activity in one country is not necessarily such in another country, as was demonstrated in 2012, when Hungarian scam artists attempted to run an insurance fraud scheme in the wake of the Costa Concordia disaster. The lack of consistent regulations across countries creates loopholes that bad actors can exploit.

The Humanitarian Dilemma

Interestingly, the same features that make cryptocurrencies attractive for illicit financing also make them valuable for delivering humanitarian aid to conflict zones. In areas where traditional banking systems have broken down, or where governments restrict the flow of funds, cryptocurrencies can provide a lifeline for aid organizations.

For example, during Venezuela’s economic crisis, some aid groups turned to cryptocurrency to deliver assistance, bypassing the country’s dysfunctional financial system and strict currency controls. Similarly, in Afghanistan, some NGOs have explored using cryptocurrencies to continue operations after the Taliban takeover restricted traditional financial channels.

However, this humanitarian use of cryptocurrencies presents its own risks. The same channels used to deliver aid could potentially be exploited by militant groups to divert funds. This creates a complex balancing act for aid organizations and regulators alike, not least as crypto-financing is increasingly being seen as a negative, since it is a “hidden” method of finance.

Looking to the Future

As cryptocurrencies continue to evolve, so too will their impact on conflict financing. The development of central bank digital currencies (CBDCs) and the increasing sophistication of decentralized finance (DeFi) platforms will likely create new opportunities and challenges in this space.

Regulators and international bodies are scrambling to keep up. The Financial Action Task Force (FATF), a global money laundering and terrorist financing watchdog, has issued guidelines for regulating virtual assets. However, the effectiveness of these measures remains to be seen, especially given the rapid pace of technological change in the crypto world.

The impact of cryptocurrencies on global power dynamics is also worth considering. As digital currencies potentially weaken the effectiveness of economic sanctions, traditional forms of financial warfare may become less potent. This could lead to a shift in how nations project power and influence on the global stage.

Conclusion

The rise of cryptocurrency in conflict financing represents a significant shift in the landscape of modern warfare. While it offers new opportunities for bad actors to fund their activities, it also presents potential benefits in terms of delivering aid and fostering financial inclusion in unstable regions.

As we move forward, the challenge will be to develop adaptive policies and technologies that can mitigate the risks of crypto-enabled conflict financing while preserving the innovative potential of blockchain technology. This will require unprecedented cooperation between governments, financial institutions, and the tech sector.

The genie of cryptocurrency is out of the bottle, and its impact on conflict financing is here to stay. The responses to this challenge will shape the future of global security in the digital age.

 

 

 

The Freedomist — Keeping Watch, So You Don’t Have To
Main

Back FREEDOM for only $4.95/month and help the Freedomist to fight the ongoing war on liberty and defeat the establishment's SHILL press!!

Are you enjoying our content? Help support our mission to reach every American with a message of freedom through virtue, liberty, and independence! Support our team of dedicated freedom builders for as little as $4.95/month! Back the Freedomist now! Click here