Swarming (military)

Last updated

Swarming is a battlefield tactic designed to maximize target saturation, and thereby overwhelm or saturate the defences of the principal target or objective. Defenders can overcome attempts at swarming by launching counter-swarming measures that are designed to neutralize or otherwise repel such attacks.

Contents

Military swarming is often encountered in asymmetric warfare where opposing forces are not of the same size, or capacity. In such situations, swarming involves the use of a decentralized force against an opponent, in a manner that emphasizes mobility, communication, unit autonomy and coordination or synchronization. [1] Historically military forces have used the principles of swarming without really examining them explicitly, but there is now active research in consciously examining military doctrines that draw ideas from swarming. In nature and nonmilitary situations, there are other various forms of swarming. Biologically driven forms are often complex adaptive systems, but have no central planning, simple individual rules, and nondeterministic behavior that may or may not evolve with the situation. [2]

Current military explorations into swarming address the spectrum of military operations, from strategic through tactical. An expert group evaluated swarming's role in the "revolution in military affairs" or force transformation. [3] They observed that military swarming is primarily tactical, sometimes operational and rarely strategic, and is a complement to other efforts rather than a replacement for them. Swarming is a logical extension of network-centric warfare. At present, the networking for swarming is only available in specific contexts.

Swarming in history

Enthusiasts of swarming sometimes apply it to situations that have superficial similarities, but really do not qualify as swarms. While swarms do converge on a target, not every military action, where multiple units attacked from all sides of a target, constitute swarming. Other conflicts, especially historical ones, fit a swarming paradigm, but the commanders involved did not use the concept. Nevertheless, historical examples help illustrate what modern analysts do and do not consider swarming.

Some historical examples with at least some aspect of swarming include: [2]

Siege of Samarkand

At the siege of Samarkand, Spitamenes used Bactrian horse archers in effective swarming attacks against a relief column sent by Alexander the Great. Bactrian horse archers surrounded various Macedonian phalanxes, staying out of range of their melee weapons, and shot arrows until they had no more. The archers would then withdraw to a supply point, but another swarm of horse archers would sometimes replace them, and sometimes attack elsewhere. The Bactrians eventually caused the phalanx to break formation, and destroyed it. Alexander recognized his forces could not directly combat horse archers, but that the horse archers needed resupply of provisions, horses, and arrows. Alexander split his forces into five columns and began building fortifications in the areas where the Bactrians had resupplied. Eventually, his anti-swarm tactics worked: cut off from resupply, the Bactrians had to meet the Macedonian phalanx, which were vastly superior in melee. Alexander made it priority to engage guerillas or other light mobile forces. Spitamenes was effective as long as his force were mobile, and he had adequate communications with mounted couriers. Once he was forced into direct battle with heavy forces, he lost the advantages of his forces and was defeated quickly. At the Battle of the Jaxartes River, Alexander once again faced swarming tactics from an army of Scythian horse archers. Alexander sent a unit of heavy cavalry ahead of his main line. As expected, the Scythian horsemen surrounded the detached cavalry. At the right moment, Alexander's cavalry reversed direction and pushed half of the Scythians straight into the main phalanx of Alexander's army, where they were slaughtered. Upon seeing this, the remaining half of the Scythian army retreated from the battle.[ citation needed ]

Mongols Horde

Mongols under Genghis Khan practiced an equivalent of swarming, partially because their communications, which used flags, horns, and couriers, were advanced for the time. Also one of the standard tactics of Mongol military was the commonly practiced feigned retreat to break enemy formations and to lure small enemy groups away from larger groups and defended positions for ambush and counterattack. Genghis Khan used the Yam system, which established a rear line of points for supplies and for remounts of fast-moving couriers. The remount system allowed horsemen to move much faster than the couriers of opponents without them. These couriers kept the Mongol senior and subordinate commanders informed, such that they could make fast decisions based on current information. In modern terms, the courier system provided the means of getting inside the opponent's OODA loop. With fast communications, the Mongols could make decisions not just on what they could see locally, but with that information oriented within the overall situation. They could then decide and act while the enemy were still waiting for information. Outnumbered Mongols could beat larger forces by faster communications, which allowed units to withdraw and regroup while other groups continually stung the enemy, withdrew in turn, while the earlier group again hit the enemy.

The evolution of modern swarming

Iran-Iraq War's IRGC navy speedboats using swarm tactics Small Boats of Iran in Taker war 3.JPG
Iran–Iraq War's IRGC navy speedboats using swarm tactics

Swarming was present in the operations of Alexander the Great and Genghis Khan, but were generally replaced by melee and mass in the pre-industrial era. More synchronized manoeuvre was paced by the availability of mobile communications. Blitzkrieg was certainly a use of manoeuvre, but it was less flexible than later operations in which every tank and aircraft had radios, and far less flexible than forces that have effective networked information systems. [4] They define swarming, in a military context, as "...seemingly amorphous, but it is a deliberately structured, coordinated, strategic way to strike from all directions, by means of a sustainable pulsing of force and/or fire, close-in as well as from stand-off positions."

One aspect of swarming is that it moves away from the traditional model of a rigid chain of command. [5] This paper suggests abandoning the term command and control in favor of

  • agility: "... the critical capability that organizations need to meet the challenges of complexity and uncertainty"
  • focus: "provides the context and defines the purposes of the endeavor"
  • convergence. "convergence is the goal-seeking process that guides actions and effects."

Agility is a characteristic of an organization or unit capable of swarming. Focus can be designation of a goal by a higher-level commander, by a peer unit detecting a target, or by intelligence systems that feed information to the swarming units. Convergence is the key feature, which, while it can be distributed, causes swarming units to coordinate their actions, apply force, and know when to stop applying force.

Edwards holds that several axioms of military doctrine [6] change with the use of swarming: [7]

Edwards on principles of war changed by swarming
Traditional principle of warRedefinition with swarming
MassDispersed mass
Economy of forceSimultaneity
Unity of commandUnity of effort

Osgood points out that swarming is not new, although the means of coordination and synchronization are going through significant changes. [8] Howard Rheingold cites mobile communications technology as a key enabler: The bees sense each other's buzzing and instinctually move in concert in real time. Text messaging on mobile devices and instantaneous file sharing off the internet via PDAs allows groups of people to receive their instructions, move in unison, nearly instantaneously, without prior planning or forethought. And, the technology allows groups to do so without a central leader. One modern example is the protesters at the World Trade Organization meetings in Seattle, in 1999, who were able to orchestrate their movement effectively in this way.

Modern military swarming

Current military applications of swarming combine the use of swarms: large numbers of relatively small agents or weapons, with synchronized actions, such that the swarm reacts faster than its opponent and defeats it. This section deals with general principles, but also high-intensity combat.

Swarming does not require good military intelligence alone, but intelligent soldiers who can manage multiple information streams and keep situational awareness. It is not advisable to have a soldier so engrossed in displays that an enemy can sneak up and hit him over the head with a rock. One of the challenges of designing modern networked systems is not to overwhelm the users with information. Those users will also need extensive training, with their sensing and synchronization information, to use them properly under combat stress.

Swarming requires autonomous or semi-autonomous operating agents, with strong synchronization and communications among them. Senior commanders release resources to the swarm, but do not control them once released. If the agents are semi-autonomous, there will be an on-scene commander giving general direction to the swarming agents.

A 1987 proposal

In the 1980s, the Soviets developed an 'Operational Maneuver Group' (OMG) for a fast armored thrust deep into NATO defences east of the Rhine River. An OMG was expected to exploit strategic surprise with a force equal or greater than an armored division, featuring up to 700 tanks, 500 IFVs, and a substantial number of helicopters. As a countermeasure, NATO considered neutron bombs but their use was politically controversial. NATO instead devised a plan to slow the thrust with a swarming counterattack, called Dynamic Density, which used single-seat Small Military Aircraft (SMAs) operating autonomously in pairs with infantry ATGWs such as Milan, their pilots being infantry. [9] One aircraft would carry the Milan post and four missiles, the other the night-vision sight and four missiles (two of which might be anti-helicopter), and the tactics would be shoot and scoot. The SMA, known as the Dragoon, was evaluated and highly praised by the MoD's test pilots at Boscombe Down, its STOL performance and ease of handling making it ideal for this role. [10] Large numbers would be needed and 5,000 was suggested as sufficient to ensure that swarming would be successful against a force as large as an OMG. Once it was recognized that success could be claimed with a significant deceleration, other novelties were introduced, among which was Synthetic Density which required the SMAs to distribute pneumatic models (fitted with radar reflectors) of tanks and artillery along the OMG's MLA, these requiring the room to be put down and time to be lost before progress could be resumed.

The proposal was published in the Journal of the Royal United Service Institution and a couple of years later a shorter article suggested that if the Soviets themselves had used SMAs in swarms in Afghanistan their COIN operations against the Mujaheddin would have been far more successful. [11] Contemporary Western armies in Afghanistan can readily accept that swarming at the tactical and operational levels is appropriate, but the physical structure of the country rules out the currently available fighting vehicles. However, networked and swarming SMAs, again 5,000 in number, all armed with laser designators for the second echelon of conventional ground attack aircraft, would constitute force multipliers with a substantial impact.

Improved decision-making as a force multiplier

Swarming ties in well with the theories of the military strategist John Boyd, the "high-low mix" in which a large number of less expensive aircraft, coupled with a small number of extremely capable "silver bullet" aircraft, had the effect of a much larger force. Boyd's concept of quick action is based on the repeated application of the Boyd loop, consisting of the steps

  • Observe: make use of the best sensors and other intelligence available
  • Orient: put the new observations into a context with the old
  • Decide: select the next action based on the combined observation and local knowledge
  • Act: carry out the selected action, ideally while the opponent is still observing your last action.

Boyd's concept is also known as the OODA Loop, and is applicable to all military operations, as well as to civilian competition from sports to business.

These are a realization of Boyd's theories. A swarming case is any historical example in which the scheme of manoeuvre involves the convergent attack of five (or more) semiautonomous (or autonomous) units on a targeted force in some particular place. "Convergent" implies an attack from most of the points on the compass." [1]

Saturation of air defenses

Mass launch of a swarm of miniature decoys from an airdropped canister. (Air Force Research Laboratory concept illustration) AFRL concept- Airdropped Mass Launcher of Minature decoy swarm 2019-04.jpg
Mass launch of a swarm of miniature decoys from an airdropped canister. (Air Force Research Laboratory concept illustration)

Due to the vulnerability of sophisticated air defense systems such as S-300 and S-400 to mass attacks from low flying cruise missiles, it is thought that swarm tactics are well suited for Suppression of Enemy Air Defenses (SEAD) missions using swarms of networked miniature spoofing decoy drones accompanying large numbers of JASSM-ER cruise missiles launched from mass fire platforms such as Rapid Dragon. [12] [13]

Swarming avoids fratricide

Prevention of fratricide, as well as the ability to make ad hoc swarming attacks on targets of opportunity, is one of the major goals of combat data networking among units down to the level of individual tanks and soldiers. Blue Force Tracker is an early vehicle-level synchronization system, [14] also operating in helicopters. [15] These systems are still new and undergoing considerable improvement. One fratricide incident in Afghanistan came from the users not understanding that their target designation device reinitialized, after battery replacement, to the position of their designator, not of the target. If the bomber had a beacon that gave the crew the precise location of the friendly troops, that would have been another way of avoiding attacking one's own troops.

Modern militaries and lower-intensity conflict

Alternatively, the US and other major powers may go to a more cooperative model, as in the foreign internal defense mission of special forces. In that model, which needs extensive lead time, the major power uses nonmilitary and military means to increase the capability of the host nation to resist insurgency.

Foreign internal defense includes the economic stabilization of host countries. In Thomas Barnett's paradigm, [16] the world is divided into a "connected core" of nations enjoying a high level of communications among their organizations and individuals, and those nations that are disconnected internally and externally. In a reasonably peaceful situation, he describes a "system administrator" force, often multinational, which does what some call "nation-building", but, most importantly, connects the nation to the core and empowers the natives to communicate—that communication can be likened to swarm coordination.

Swarming is not a panacea for conflict at all levels. If there is a significant military force preventing the system administrator from working on developing connections, the other part of the paradigm comes into play: [16] the leviathan, a first-world military force that takes down the opposition regular forces. Leviathan is not constituted to fight local insurgencies, but major forces. Leviathan may use extensive swarming at the tactical level, but its dispatch is a strategic decision that may be made unilaterally, or by an established core group such as NATO, ASEAN, or the United Nations.

It is the job of the system administrator force to deal with low-level conflict, and there must be both resources and a smooth transition plan from Leviathan to System Administrator responsibility, of which a classic successful example were the Operation Rankin plans that covered several ways in which Nazi power might end [17] which is more a mission for police, which certainly can include a militarized force like the Constabulary in the post-WWII occupation of Germany. [18]

Swarming would allow major powers to rapidly respond to guerilla forces, but, given the appropriate synchronization and communications, the less powerful forces can use swarming themselves. Modern communications allows military units to stay widely dispersed. The front, rear and flanks are disappearing from military conflict. Swarming allows the military to fight everywhere.

Swarming and Third World nations

Chinese soldiers swarm a UN-held position during the decisive Battle of the Cheongcheon River in the Korean War. Second Phase Campaign.jpg
Chinese soldiers swarm a UN-held position during the decisive Battle of the Cheongcheon River in the Korean War.

Swarming is advantageous to less powerful countries and groups, because it allows them to balance their disadvantage in firepower and numbers. Despite being less technically advanced, Communist forces made good use of swarming in Asia during the Cold War. The Chinese were able to make up for their lack of firepower by attacking from all sides and then quickly advancing to the rear. The Vietcong were famous from attacking from all directions out of nowhere and then quickly disappearing. When they did come into close contact, they used a technique called "hugging the belt", which meant they were too close for the US to employ air and artillery support. [19] If the attackers "hugged" at several points, "pulsing" their attacks, they both neutralized external fire support, but also made it difficult for the US commander to know where to commit reserves.

Swarming principles in terrorism

Cordesman observes that swarming is a viable terrorist tactic against targets of opportunity. [20] Al-Qaeda, for example, uses a different form of swarming than those of advanced militaries, in which the general objectives of operational cells are agreed in a manner coordinated, but not continuously controlled by the core organization. Once the decision has been made on the general targets, the operational cells cut positive control links from the core, although they may still receive financial and other support. A signature of al-Qaeda operations has been multiple, near-simultaneous attacks, such as the several hijacked airliners in the 9/11 attacks, the closely spaced bombings aimed at US embassies in Tanzania and Kenya, and attacks on buses and trains in London. The attacks on trains in Spain had an additional dimension: not all the swarms were associated with al-Qaeda.

While John Arquilla, a professor at the Naval Postgraduate School, cites the ability to plan separate and widely dispersed attacks, coordinated by mobile communications that might originate from a cave on the Afghan-Pakistan border, [8] he does not emphasize the apparent al-Qaeda technique of releasing operational units to local control, once the policy is set. [21] See Clandestine HUMINT operational techniques.

The apparent al-Qaeda methodology of letting operational cells decide on their final dates and means of attack exhibit an operational pattern, but not a periodicity that could easily be used for an indications checklist appropriate for a warning center. Such lists depend on seeing a local pattern to give a specific warning. [22]

Semiautonomous swarming, in which the actors occasionally interfere with one another, is seen in attacks on computer networks by loose confederations of malicious hackers. On occasion, especially when the attack uses a botnet, [23] some of the units may try to overpower and control one another, as well as the target. [24] One of the observations of the Center on Terrorism and Irregular Warfare was that unfocused mass disruption was not a useful terrorist, and by extension general military, tactic. [24] The 9/11 attacks had symbolism. A cyberattack on a stock market would have symbolism. For the political purposes of the swarm, there has to be a symbol to which observers need to connect the purpose of the attack.

See also

Related Research Articles

<span class="mw-page-title-main">Defense Information Systems Agency</span> US Department of Defense combat support agency

The Defense Information Systems Agency (DISA), known as the Defense Communications Agency (DCA) until 1991, is a United States Department of Defense (DoD) combat support agency composed of military, federal civilians, and contractors. DISA provides information technology (IT) and communications support to the President, Vice President, Secretary of Defense, the military services, the combatant commands, and any individual or system contributing to the defense of the United States.

<span class="mw-page-title-main">Combined arms</span> Approach to warfare

Combined arms is an approach to warfare that seeks to integrate different combat arms of a military to achieve mutually complementary effects—for example, using infantry and armour in an urban environment in which each supports the other.

<span class="mw-page-title-main">Electronic warfare</span> Combat involving electronics and directed energy

Electromagnetic warfare or electronic warfare (EW) is warfare involving the use of the electromagnetic spectrum or directed energy to control the spectrum, attack an enemy, or impede enemy operations. The purpose of electromagnetic warfare is to deny the opponent the advantage of—and ensure friendly unimpeded access to—the EM spectrum. Electromagnetic warfare can be applied from air, sea, land, or space by crewed and uncrewed systems, and can target communication, radar, or other military and civilian assets.

Military doctrine is the expression of how military forces contribute to campaigns, major operations, battles, and engagements. A military doctrine outlines what military means should be used, how forces should be structured, where forces should be deployed, and the modes of cooperation between types of forces. "Joint doctrine" refers to the doctrines shared and aligned by multinational forces or joint service operations.

<span class="mw-page-title-main">United States Army Special Operations Command</span> Army component of the U.S. Special Operations Command

The United States Army Special Operations Command (Airborne) (USASOC ( YOO-sə-sok)) is the command charged with overseeing the various special operations forces of the United States Army. Headquartered at Fort Liberty, North Carolina, it is the largest component of the United States Special Operations Command. It is an Army Service Component Command. Its mission is to organize, train, educate, man, equip, fund, administer, mobilize, deploy and sustain Army special operations forces to successfully conduct worldwide special operations.

Network-centric warfare, also called network-centric operations or net-centric warfare, is a military doctrine or theory of war that aims to translate an information advantage, enabled partly by information technology, into a competitive advantage through the computer networking of dispersed forces. It was pioneered by the United States Department of Defense in the 1990s.

In military science, force multiplication or a force multiplier is a factor or a combination of factors that gives personnel or weapons the ability to accomplish greater feats than without it. The expected size increase required to have the same effectiveness without that advantage is the multiplication factor. For example, if a technology like GPS enables a force to accomplish the same results as a force five times as large without GPS, then the multiplier is five. Such estimates are used to justify the investment for force multipliers.

Defeat in detail, or divide and conquer, is a military tactic of bringing a large portion of one's own force to bear on small enemy units in sequence, rather than engaging the bulk of the enemy force all at once. This exposes one's own units to many small risks but allows for the eventual destruction of an entire enemy force.

<span class="mw-page-title-main">Joint Special Operations Command</span> Joint component command of the U.S. Special Operations Command

The Joint Special Operations Command (JSOC) is a joint component command of the United States Special Operations Command (USSOCOM) and is charged with studying special operations requirements and techniques to ensure interoperability and equipment standardization, to plan and conduct special operations exercises and training, to develop joint special operations tactics, and to execute special operations missions worldwide. It was established in 1980 on recommendation of Colonel Charlie Beckwith, in the aftermath of the failure of Operation Eagle Claw. It is headquartered at Pope Field.

Deep operation, also known as Soviet deep battle, was a military theory developed by the Soviet Union for its armed forces during the 1920s and 1930s. It was a tenet that emphasized destroying, suppressing or disorganizing enemy forces not only at the line of contact but also throughout the depth of the battlefield.

<span class="mw-page-title-main">Special reconnaissance</span> Intelligence gathering discipline

Special reconnaissance (SR) is conducted by small units, such as a recon team, made up of highly trained military personnel, usually from special forces units and/or military intelligence organizations. Special reconnaissance teams operate behind enemy lines, avoiding direct combat and detection by the enemy. As a role, SR is distinct from commando operations, but both are often carried out by the same units. The SR role frequently includes covert direction of airstrikes and indirect fire, in areas deep behind enemy lines, placement of remotely monitored sensors, and preparations for other special forces. Like other special forces, SR units may also carry out direct action and unconventional warfare, including guerrilla operations.

A clandestine cell system is a method for organizing a group of people, such as resistance fighters, spies, mercenaries, organized crime members, or terrorists, to make it harder for police, military or other hostile groups to catch them. In a cell structure, each cell consists of a relatively small number of people, who know little to no information concerning organization assets beyond their cell. This limits the harm that can be done to the organization as a whole by any individual cell member defecting, being a mole, being surveilled, or giving up information after being apprehended and interrogated.

Operation Phantom Phoenix was a major nationwide offensive launched by the Multinational Force Iraq (MNF-I) on 8 January 2008 in an attempt to build on the success of the two previous corps-level operations, Operation Phantom Thunder and Operation Phantom Strike and further reduce violence and secure Iraq's population, particularly in the capital Baghdad. The offensive consisted of a number of joint Coalition and Iraqi Army operations throughout northern Iraq as well as in the southern Baghdad Belts.

In US military doctrine, unconventional warfare is one of the core activities of irregular warfare. Unconventional warfare is essentially support provided by the military to a foreign insurgency or resistance. The legal definition of UW is:

Unconventional Warfare consists of activities conducted to enable a resistance movement or insurgency to coerce, disrupt or overthrow an occupying power or government by operating through or with an underground, auxiliary or guerrilla force in a denied area.

<span class="mw-page-title-main">Joint Special Operations Command Task Force in the Iraq War</span> Special operations unit

The Joint Special Operations Command Task Force which fought in the Iraq War was a joint U.S. and British special operations temporary grouping assembled from different units. It has been described as a "hunter-killer team" with its core made up of the United States Army's 1st Special Forces Operational Detachment-Delta and the 75th Ranger Regiment, as well as the United States Naval Special Warfare Development Group and members of the United States Air Force's 24th Special Tactics Squadron, all under Joint Special Operations Command (JSOC) and elements from the United Kingdom Special Forces, including the Special Air Service, Special Boat Service (SBS), Special Reconnaissance Regiment (SRR), 18 (UKSF) Signal Regiment and the Special Forces Support Group (SFSG). The task force was reported to be responsible for the cross border raid into Syria from Iraq in October 2008 that resulted in eight deaths including Abu Ghadiya, along with several US operations in the Horn of Africa targeting al-Qaeda.

<span class="mw-page-title-main">United States Army Special Forces selection and training</span> Army training program

The Special Forces Qualification Course (SFQC) or, informally, the Q Course is the initial formal training program for entry into the United States Army Special Forces. Phase I of the Q Course is Special Forces Assessment and Selection (SFAS). A candidate who is selected at the conclusion of SFAS will enable a candidate to continue to the next of the four phases. If a candidate successfully completes all phases they will graduate as a Special Forces qualified soldier and then, generally, be assigned to a 12-men Operational Detachment "A" (ODA), commonly known as an "A team." The length of the Q Course changes depending on the applicant's primary job field within Special Forces and their assigned foreign language capability but will usually last between 56 and 95 weeks.

Information Operations is a category of direct and indirect support operations for the United States Military. By definition in Joint Publication 3-13, "IO are described as the integrated employment of electronic warfare (EW), computer network operations (CNO), psychological operations (PSYOP), military deception (MILDEC), and operations security (OPSEC), in concert with specified supporting and related capabilities, to Information Operations (IO) are actions taken to affect adversary information and information systems while defending one's own information and information systems.

<span class="mw-page-title-main">Networked swarming warfare</span>

The concept of networked swarming warfare was first proposed by HUO Dajun in 2003. The key feature of the Information Age is the networking of organizational structure. The rising networked organization will overcome the limitation of traditional geography and link the operational resources distributed widely to form a military action network which combine strike range, speed and lethality, three elements of originally different developing, fundamentally transforming our idea of battle space. With the trend of decentralization of forces, we need to develop more small units with independent combat functions; meanwhile we can join these small units into a whole network as the technology's development. The warfare based on this network is called networked swarming warfare.

<span class="mw-page-title-main">United States Special Operations Command</span> Unified combatant command of the United States Armed Forces responsible for special operations

The United States Special Operations Command is the unified combatant command charged with overseeing the various special operations component commands of the Army, Marine Corps, Navy, and Air Force of the United States Armed Forces. The command is part of the Department of Defense and is the only unified combatant command created by an Act of Congress. USSOCOM is headquartered at MacDill Air Force Base in Tampa, Florida.

References

  1. 1 2 Edwards, Sean J.A. (2000). Swarming on the Battlefield: Past, Present, and Future. Rand Monograph MR-1100. Rand Corporation. ISBN   0-8330-2779-4.
  2. 1 2 Edwards, Sean J.A. (January 2003). "Military History of Swarming" (ppt). Complexity Digest. Conference on Swarming and Network Enabled Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) (January 13–14, 2003) (May 2005 ed.). McLean, Virginia. Retrieved 2007-12-16.
  3. Splinter Group C (January 2003). "Should swarming become a Tenet for Transformation?" (PPT). Complexity Digest. Conference on Swarming and Network Enabled Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (January 13–14, 2003). McLean, Virginia. Retrieved 2007-12-16.
  4. Arquilla, John; David Ronfeldt (2000). Swarming and the Future of Conflict. RAND Documented Briefing. RAND Corporation. ISBN   0833028855.
  5. Alberts, David S. (2007). "Agility, Focus, and Convergence: The Future of Command and Control". The International C2 Journal. 1 (1). Command and Control Research Program. ISSN   1938-6044 . Retrieved 2007-11-23.
  6. Headquarters, Department of the Army (22 February 2011) [27 February 2008]. FM 3–0, Operations (with included Change 1) (PDF). Washington, DC: GPO . Retrieved 31 August 2013.
  7. Edwards, Sean J.A. (September 2004). Swarming and the Future of War. PhD thesis. Pardee RAND Graduate School.
  8. 1 2 "Swarm War". The Osgood File. CBS Radio Network. January 28, 2003. Archived from the original on 2006-09-27.
  9. Frederick Hogarth (April 1987), Dynamic Density: Flexible Defence Against the OMG (PDF), Royal United Services Institute
  10. Frederick Hogarth (March 1989), ForestAir Dragoons Aircraft Evaluation (PDF), Pegasus Associates
  11. Frederick Hogarth (December 1989), Crocodile or Piranha (PDF), Pegasus Associates
  12. Hollings, Alex (July 21, 2022). "The S-400 myth: Why Russia's air defense prowess is exaggerated". Sandboxx News. 19fortyfive Corp. Retrieved 2022-07-30.
  13. "U.S. Air Force 2030 Science and Technology Strategy" (PDF). Air Force Science and Technology. Air Force Research Laboratory. April 2019. Retrieved 2022-07-30.
  14. Shachtman, Noah; David Axe (June 2006). "Winning – and Losing– the First Wired War". Popular Science. Archived from the original on 2012-02-24. Retrieved 2007-11-23.
  15. Watanabe, Nathan K. (March–April 2004). "Blue Force Tracker and Army Aviation Operations in Afghanistan". Army Aviation. 53: 18+. Archived from the original on 2007-10-09. Retrieved 2007-11-23.
  16. 1 2 Barnett, Thomas P.M. (2005). The Pentagon's New Map: The Pentagon's New Map: War and Peace in the Twenty-first Century . Berkley Trade. ISBN   0-425-20239-9.
  17. Pogue, Forrest C. (1954). US Army in WWII. European Theater of Operations. The Supreme Command. Chapter V: Planning Before SHAEF. United States Army Center of Military History. Pogue-1954-Chapter 5.
  18. "The U.S. Constabulary in Post-War Germany (1946–52)". United States Army Center of Military History (CMH). April 2000.
  19. Hackworth, David (1997). Hazardous Duty. HarperCollins. ISBN   0-380-72742-0.
  20. Cordesman, Anthony H. (August 1, 2006). "The Importance of Building Local Capabilities: Lessons from the Counterinsurgency in Iraq". Center for Strategic and International Studies. Archived from the original on April 10, 2008.
  21. "Hunting the Sleepers: Tracking al-Qaida's Covert Operatives" (PDF). Decision Support Systems, Inc. 31 December 2001. Archived from the original (PDF) on 2007-11-28. Retrieved 2007-11-17.
  22. Fellman, Philip Vos; Roxana Wright (September 2003). "Modeling Terrorist Networks – Complex Systems at the Mid-Range" (PDF). Complexity Programme. Complexity, Ethics and Creativity Conference September 2003. Archived from the original (PDF) on 2007-07-08. Retrieved 2007-11-02.
  23. Kristoff, John (October 17, 2004). "Botnets". NANOG Web. 2004 NANOG Meeting – Third Joint Meeting With ARIN! (October 2004). Reston, Virginia. Archived from the original on 2007-12-18. Retrieved 2007-11-23.
  24. 1 2 Center on Terrorism and Irregular Warfare of the Naval Postgraduate School (2000). "The Future of Armed Resistance: Cyberterror? Mass Casualties?" (PDF). Archived from the original (PDF) on 2007-07-13. Retrieved 2007-11-23.