Irregular Warfare Podcast - The Future of Irregular Warfare

Episode Date: August 28, 2020

In Episode 8 of the Irregular Warfare Podcast, hosts Nick Lopez and Shawna Sinnott speak to best-selling authors August Cole and P.W. Singer to discuss how they see the future of irregular warfare and... implications for policymakers, practitioners, and academics. The guests have conducted extensive research on how technology will drastically affect society, the economy, and all things defense-related. They use this research to tell action-packed stories, to include the best seller Ghost Fleet: a Novel of the Next World War and their recently released Burn In: A Novel of the Real Robotic Revolution. Intro music: "Unsilenced" by Ketsa Outro music: "Launch" by Ketsa CC BY-NC-ND 4.0

Transcript
Discussion (0)
Starting point is 00:00:00 Hello, everyone. Thank you for joining us today on the Irregular Warfare podcast. I'm Shauna Sinnott, one of your co-hosts. And before we start today's conversation with P.W. Singer and August Cole, I wanted to let you know that we're currently searching for a fourth co-host to join our team. If you're interested, please send an email with your resume to engage at irregularwarfarepodcast.com. That's E-N-G-A-G-E at irregularwarfarepodcast.com. We will accept applications through September 15, 2020. There are no hard requirements. You can be civilian or military, a researcher, policymaker, or a practitioner.
Starting point is 00:00:38 The key criteria is just that you have a deep interest in learning and sharing knowledge about irregular warfare topics. So thanks for listening and enjoy the conversation. on the weaponization of information? Zero. The strategic corporal is once again a relevant concept because of the Twitter account. To put a fine point in, I think there's in particular two draw lessons that Vernon has for the community working on irregular warfare issues. One is about the whole suite of technologies that will be available to them. But then the second is the change in the operating environment
Starting point is 00:01:34 driven by this industrial revolution. Welcome to episode eight of the Irregular Warfare podcast. Your hosts today are myself, Nick Lopez, and my co-host, Shauna Sinnott. In today's episode, we take a look at the future of irregular warfare, its implications on defense planning, policymaking, and what the future irregular warfare practitioner will look like. We talk with two best-selling authors who have conducted extensive research on how technology will drastically affect society, the economy, and all things defense-related, especially in the realm of irregular warfare. They take this research and weave it into thrilling stories that portray the future of conflict, to include the
Starting point is 00:02:14 bestseller Ghost Fleet, a novel of the next world war, and their recently released Burn In, a novel of the real robotic revolution. Their books are on military and government professional reading lists around the world. P.W. Singer is strategist at New America and a professor of practice at Arizona State University. No other author has more books on professional military reading lists. He has been described in the Wall Street Journal as the premier futurist in the national security environment. He's been named by the Smithsonian as one of the nation's 100 leading innovators and by foreign policy to their top 100 global thinkers list. August Cole is a non-resident fellow at the Brute Krulak Center for Innovation and Creativity at Marine Corps University and a non-resident senior fellow at the Brent Scowcroft Center on Strategy and Security at the Atlantic Council,
Starting point is 00:03:00 where he directed the council's Art of the Future project. He consults on creative futures at Spark Cognition and is a regular speaker to private sector, academic, and U.S. and allied government audiences. He is also the author of numerous short stories about the future of conflict. You are listening to the Irregular Warfare Podcast, a joint production of the Princeton Empirical Studies of Conflict Project and the Modern War Institute at West Point,
Starting point is 00:03:23 dedicated to bridging the gap between scholars and practitioners to support the community of irregular warfare professionals. Here's our conversation with P.W. Singer and August Cole. P.W. Singer and August Cole, I know I can speak for the team here by saying we really enjoy your work with Ghost Fleet and your most recent book, Burnin'. So with that, it's great to welcome you both to the Irregular Warfare podcast. Thanks for having us. It's great to be here. All right. I'd like to jump right in by talking about your most recent work,
Starting point is 00:03:54 Burnin'. We'll start with Peter. What was the motivation behind the work and how did you all get started? Sure. So Burnin' is both a continuation of something we tested out with Ghost Fleet, but also taking it into both new topics and new levels. So Burnin, it's a smash up of a novel and nonfiction. Now that sounds kind of odd to say it that way. But what it is, is it's a techno thriller, you follow the hunt for a terrorist through a future Washington, D.C. And so, of course, that's fiction. It hasn't yet happened. But baked into the story are over 300 real world explanations and predictions of everything from, OK, I keep hearing about AI. How does it actually work? To what's the next special forces sniper rifle going to be like? To dilemma questions that will emerge from new technologies, information overload issues, new ethical issues like algorithmic bias. All of these different sort of questions and issues.
Starting point is 00:05:03 There's 300 of them baked into the story. And there's actually 27 pages of research in notes to document, hey, that's not what Peter and August dreamed up. That's actually, here's the study that backs it. Or here's the contract announcement order for that sniper rifle. Or here's a white paper if you want to learn more about this topic that we just experienced in a scene. Ghost Fleet explored what a future war, particularly a great power conflict, might look like. Burn-in in particular tackles what we think is one of the most important, if not the most important, technology, but also social, political, economic, moral, legal, security, when you think of its impact, issue that's out there that's in turn arguably the least understood, which is what's
Starting point is 00:05:52 going on with AI, automation, internet of things, these massive changes to our economy, but also to war, you name it. And so we use the fiction to explain that. war, you name it. And so we use the fiction to explain that. Yeah. And that's a really unique vehicle to be able to convey imagination, which I think some of us who are in more linear professions struggle to do. And so the way that that looks at the future is very interesting. August, could you tell us what FICINT actually is and about how to use this framework to explore the content that Peter just explained. When you look at the different types of fiction writing out there, particularly science fiction, that can be useful to professional military leaders in that community, it's important, I think, at the same time to really start to unpack what is and what makes those things
Starting point is 00:06:41 actually useful in those kinds of stories. So the FICANT framework was something that kind of began somewhat tongue-in-cheek in using it because I was trying to think of a way that we could discuss the sorts of books like Ghost Fleet, the sorts of short stories that you might see on the Army Mad Scientist blog that are trying to address big policy questions, real-world implications of technologies that are almost existential. And it's a mashup of the idea of fiction plus intelligence, the same way you might have like human intelligence is human. And when people started to hear that, nobody laughed, which is obviously a good first order test when you're talking about this in a presentation. Something
Starting point is 00:07:21 Pete and I have really started to hone in on is almost like rules for FICCN. From starting as kind of a larger sort of notional idea of what it is to having a much more clarity. And so that could be, you know, being able to, you know, hew to rules that, for example, represent technology, not as people want it to be, but as it is, or, you know, to take the fog of war construct from Clausewitz, like that's going to be there in the future too. And all the, you know, salesmanship, if you will, and the aspirational aspects of technology, which are of course important to realizing their potential, you know, that can also be analytically very dangerous because it can allow us to place too much faith in certain systems. And particularly if adversaries are already, you know, queuing to exploiting that overconfidence potentially. So, you know, the other facets too, I think you can see in FICCNT that are manifest in Ghost Fleet,
Starting point is 00:08:10 that are manifest in Burn In, are things like end notes, allowing at least enough tethering to economic, political, technological trends so that a reader just doesn't go, this is crazy. That's what Nick and I were talking about this. And I think that's what stood out the most to us is every detail. If it was something that we knew and if it was something we didn't know, it sounded legit. Yeah, I'll second that. Very well detailed. So one of the things I'm interested in is how your research shaped your approach to thinking about some tools that AI affords, like the weaponization of information. Absolutely core issue, but we need to divide it out in a couple of ways. On the weaponization of information side, and in particular, we're talking about what in a prior book I called like war.
Starting point is 00:08:50 So if you think of cyber war, it's the hacking of networks, stealing information, be it intellectual property, be it your credit card. Like war is not about hacking the network, but rather people on the network, driving ideas viral. And again, here it might be driving terrorist propaganda viral. It might be driving election misinformation or even coronavirus misinformation viral. Just like in cyber conflict, the goal is not the network activity. It's the real world. It's to have a real world effect.
Starting point is 00:09:24 So it's to, you know, and like where we began with a look at the Battle of Mosul and how what played out on social media actually affected literally the outcome of that battle, Iraqi units dissolving, or it's having an effect on people's beliefs, what they vote on. It's to have an effect on what products they buy, you name it. And I think it's interesting because it is a crucial part of what drove us to rethink great power conflict as a priority. And yet we still don't get it right. And by that, I mean, we've added Russia as a greater competitor in the national defense strategy. But Russia didn't become a greater competitor because it's a single aircraft carrier that's dated and actually caught fire and
Starting point is 00:10:16 sank in dry dock. They didn't become a greater competitor because they got more thousands of new tanks. They became more of a challenge because of this part, because that's where their power has come from. And yet, think about what we've done to counter it. Overall, U.S. cybersecurity strategy, a document that came out roughly the same period that the NDS did. You know how many sentences it has
Starting point is 00:10:42 on the weaponization of information? Zero, zero, quick answer, zero. that the NDS did. You know how many sentences it has on the weaponization of information? Zero. Zero. Quick answer, zero. It got a lot of stuff on protecting critical infrastructure, got NADA on this space. I mean, we have different things going on.
Starting point is 00:10:54 You've got a little element going on in NSA. You've got people in public affairs learning more. But in terms of State Department or how we've changed the education system, how we're right now, not handling slash mishandling ongoing information threats to our election, we do not have a national strategy for it. And we can unpack a lot of reasons for it. But it's a major gap. Well, Peter, you mentioned Russia and their weaponization of information.
Starting point is 00:11:19 But what does this look like with a more capable adversary like China, who might use this in conjunction with automation and artificial intelligence? What we look at in Burn In is it's not the classic framing of an arms race of who gets AI first or whose AI shoots further. If you think about, you know, the arms race with the Soviets. AI shoots further, if you think about the arms race with the Soviets. Instead, it isn't arms race in a certain way, but it's about two totally different competing visions and applications of AI in terms of an industrial revolution. You have the Chinese model, which is massive. And AI, we're not just talking about AI itself, but broader automation unmanned systems. But it's not just in the military side, it's on the society wide side. And China has a plan to be a world leader in AI and automation technology by the year 2030. They've got a strategy to back it,
Starting point is 00:12:18 but it's a very centralized approach. They've chosen their national company champions and all data has to be shared with government. By contrast, in the US, we'll see just as much automation, AI happening. It's just kind of spread out. You've got Google changing it. You've got Facebook. You've got Kentucky Fried Chicken had a face recognition program. You've got the US military has a cacophony of AI and automation programs. And so there's just two very different visions. But the better way to understand it, like we try and explore in Burn-In, is understand it's an industrial revolution. It's not about one single type of robot or one HAL 9000 super intelligence. It's more about what played out with steam engines
Starting point is 00:13:07 or another example would be electricity. So when we think about how conflict might look with this type of weaponization of information, August, can you speak to how this might look different from a conventional war that we might be used to to in a regular warfare context, which might be a more likely scenario when competing with our peers or near peers? I think that's a great follow-up to what Pete was just talking about,
Starting point is 00:13:29 in part because the synergy of AI and our national defense strategy, if we are reorienting in the US towards China and to a lesser extent, Russia, as this sort of near peer-to-peer framework. And what we're not, I think, appreciating within that is yes, technologies like AI can be capital level national priorities with, in China's case, very big budgets that dwarf ours. But we're also, I think, not looking at the second and third order effects of that industrial revolution aspect to AI that Pete talked about, and that to be putting forth a strategy that doesn't acknowledge the vulnerabilities at a systemic level in the US. So if you're going to think about being at a
Starting point is 00:14:11 deterrent posture in the 2020s and into the 2030s, because I really do believe between where we are today and where we are in the late 2030s is probably the most critical 20 years of this century, that what will happen with China's ascent and the technological breakthroughs and capabilities like AI and autonomy are going to, I think, very much determine the next 60 years that follow. So if we look at America in 2025, five years from now, and our social contract is weakened, we have far more technology, remote work, we have far more 1099 gig work, we're going to have essentially transformed in many ways that policy won't have caught up with. And the country may be more vulnerable at a social and
Starting point is 00:14:51 political level. That is not the place I would want to be when conducting a great power strategy and executing in a way that looks like you can win that over 10 to 15 years. And to root it back into the question of regular warfare. So by enabling a society to experiment and of course, adopt and invest in a very unstructured way, that can be very effective and can produce some really high flying companies and really, really great use cases. But you can't also ignore the gaps and flaws that that can either create or highlight that technologies like AI can exploit an information domain. And to see the domestic influence operations around COVID that are being conducted by foreign adversaries, just reading about it in the media, it's pretty, I think, striking.
Starting point is 00:15:37 And I think an indicator that there is a lot of lessons learned being passed from one nation to another that you'll see continue and continue and continue. And as non-state actors start to adopt that, I think you'll find a lot more really interesting conflicts taking place. And by interesting, I mean difficult for the U.S. to engage in in a way that maybe fits into our conventional military models. Even if we are, you know, in the special operations community trying to reframe back towards great power conflict, but does that mean that we turn our back on the experience the last 20 years or the discrete lessons learned, especially around like cyber information operations, high-speed
Starting point is 00:16:09 targeting and mission execution? That is going to have to get wrapped into, of course, this larger narrative about the enabling power of AI, the rising challenge of a country like China, not just in its backyard, but through Belt and Road or potentially on our own soil in terms of influence ops. And then of course, are we really on a solid foundation to be able to wage that kind of a strategic campaign? And on all three of those counts, I have a lot of worry. To put a fine point in, I think there's in particular two draw lessons that Burnin has for the community working on irregular warfare issues. One is about the whole suite of technologies that will be available to them, whether it's augmented reality to AI decision aid systems and the like, and that those technologies will offer new possibilities, but they'll also
Starting point is 00:17:00 offer up incredible new dilemmas that'll have to be figured out everywhere from tactic to doctrine. But then the second is the change in the operating environment driven by this industrial revolution. And that both, you know, it is going to affect the economy, society, politics in the US, but also a wide variety of nations that people might deploy into. To put it bluntly, the last industrial revolution changed much of the world. It drove, again, everything from how people lived and worked, to how they fought, to even what they fought about. And that's the same phenomena that we're entering into. So I think those are the two particular drawout lessons, but woven in a way that is not, here's your 180 page white paper that you have to read, or here's my stack of 30. Or the PowerPoint brief, right?
Starting point is 00:17:55 Yeah, here's my PowerPoint brief on it. Instead, going back to this concept of useful fiction, put into a framework where hopefully you're simultaneously being educated, but also engaged and entertained. And, you know, for some people, it's just going to be a fun read for other people. It's, Ooh, that's a little useful tidbit for me. I might add to that at the core of a book like Burn In, and we specifically thought about this every single day we were working on it and continue to, is the relationship between a human and a machine. And the relationship that that human has with other people and how it's affected by that relationship with that machine. And that is a core facet of our experience as individuals and collectively we're going to have to start to really wrestle with.
Starting point is 00:18:44 experience as individuals and collectively, we're going to have to start to really wrestle with. There's profound implications in the military domain and the security domain, whether it's the standing army construct, as that starts to shift over the next 15 years because of larger fiscal pressures, the increasing capabilities of systems. And yet, to not be too overly, I think, optimistic about the transformational capabilities of, you know, software driven platforms, whether they're walking, whether they're handheld, or whether they fly. The thing to always remember, I think, is that, you know, we are going to be ultimately in this kind of human context, and that we may have more autonomy and even less human in or on the loop. But the overall arching campaign
Starting point is 00:19:25 objectives, especially in the irregular warfare sense, heretofore have been very human focused. And that's not to say there won't be significant shifts. You know, the primacy of data is, of course, tied to, you know, the relationship you have with that machine. You know, in Burn In, Special Agent Laura Keegan has this TAMS, the Tactical Autonomous Mobility System, which is kind of like an earmark type robot that she's been assigned to work with effectively by the Justice Department as an FBI agent. And she's essentially seeing that relationship change the more and more data the robot has access to. And that's, I think, a really important paradigm. You don't often see in narratives about machines, but it reflects the reality.
Starting point is 00:20:00 And it increases both trust, but also confidence as well in being able to rely on that system. And her background as a robot wrangler in the Marine Corps, I think, gives her some initial skepticism and kind of a realistic way of looking at the technology that I think helps the story kind of start. But also, I think, gives you a fairly accurate way of how people who are in professional military might actually relate to machines throughout the course of a campaign, an operation, a career. might actually relate to machines throughout the course of a campaign, an operation, a career. So Special Operations Command invests a lot in human capability. And there's five special operations truths. The first is that humans are more important than hardware. In Burnin, the protagonist, Special Agent Laura Keegan, was initially assigned the robot and she was apprehensive. However, she received a lot of pressure from within the FBI to go through the process of utilizing the robot and the technology. So I'm interested from your perspective, what's needed to onboard technology at scale while still maintaining the importance of
Starting point is 00:21:08 human capability? I think we can have a lot of maxims, right, about, let's say, the special operations community. And some of those, I think, are enduring and some of them are going to be changing, right? I think the things that are going to be consistent are, of course, as you said, the importance of the individual, the value and training and experience and maturity. I think the question, the challenge, though, is you've seen the need for the U.S. special operations community to scale up dramatically more probably than it would have naturally done outside of the 9-11 framework. And being able to give people those three qualities going into the future. And again, if we're going to, by extension, say this is a special operations community that's going to be
Starting point is 00:21:48 very active in this great power, you know, campaign globally, you may need even more people than you have today. And so the question I think becomes, one, do you try to keep growing the organization or do you try to take those traits and qualities and spread them throughout the general purpose or, you know, regular forces? And certainly there are systems that are AI-based software, whether it's guidance, whether it's the sorts of analytics that can be used real-time by individuals. I think almost force an existential question upon a special operations community, right? Do you spread this off more or do you reduce down to have a fewer and fewer number of people who you invest more and more technology in? Because government does not have a fewer and fewer number of people who invest more and more technology because government does not have a track record of spending more and more on capability and necessarily getting what it
Starting point is 00:22:29 wants out of it. Not that people are becoming aircraft platforms, but you can look at the paradigm in that world too. So if SOCOM in 2040 has 300 people total, it may be, yes, they are super enabled, the equivalent of an F-22, but that's probably still going to be out of step with the reality of operations around the world and the missions that it's called upon to do that. At the same time, I think that a lot of the capabilities to shape the environment, to understand it importantly, are going to be really interesting to see those move off of platforms, right? And that's going to be requiring individuals to have new interfaces and interaction
Starting point is 00:23:05 with that kind of information and data. So, you know, to be able to, in a very tactical sense, understand what's going on from around you, not with that minority report style, augmented reality glasses construct, which is really cool. But I've been thinking a lot about actually the haptic aspects of situational awareness and the ability to be able to deal with the cognitive overload that we talk about and burn in as a real problem. In the law enforcement and counterterrorism context, that's only going to increase as we get more and more access to data. So you're going to require machines to make decisions, not so much about what the target is, but about what information you should be looking at. And I think we're trying to kind of, from what I see, you know, make sense of which technologies actually can shape that future. Talking about technologies shaping the future, I can't help but think about companies like Neuralink who are attempting to integrate or fuse human and tech directly, right?
Starting point is 00:24:02 So one of the things that comes to mind is brain-machine interfaces. So August, I'm interested in how you see BMI or brain-machine interfaces affecting the future of irregular warfare. I think the really science fiction advances that really do fuse human and machine at that neurological level are coming. They're probably going to come out of the commercial marketplace first. I would expect gaming will be one of the first places you see that emerge. I think medicine, too. Imagine, like, again, doing robosurgery with that kind of a neural link capability would
Starting point is 00:24:34 be really interesting. And, you know, the military is probably going to lag. And there's going to be adversaries in small states or small groups, rather, that aren't going to be wed to convention ethics, norms, you know, budgetary cycles and priorities that allow them to be more experimental. I mean, this is a really interesting challenge, again, in the irregular unconventional warfare construct. Like if there's U.S. allies that we partner with, is it possible that we could see them actually be more experimental, say, in the Indo-Pacific with some of these technologies where we are working with an allied nation and their peer special operations community may
Starting point is 00:25:09 actually be more forward in this than we are because of, again, an imperative that is going to become, I think, increasingly real, which is how do you create deterrence and capability in the shadow of China, but also because the paradigms are breaking down on the defense industrial side. And there's less and less, you know, obviously political value placed to those deals. You know, we're currently with this administration and we'll have to see what the next one. So I think you're going to be freeing people up to kind of re-baseline bilateral relationships, mil-mil relationships, not just on, hey, did you buy the same like, you know, hardware that I did that came off the same line in the same state in America?
Starting point is 00:25:43 Or rather, you know, are we really aligned strategically and operationally? And are there other technological capabilities that then we can arbitrage to and say, hey, if there's a partner nation that has this capability, we want to use it. And I think actually from a US soft point of view, I would probably be encouraging that because there may be ways that you can start to leverage and really reframe that when we engage in a partner capability in a foreign internal defense context, like, do we have to be the most sophisticated technologically in that context? Or can we have better awareness and kind of, you know, almost an anthropological sense of feeling for what's going on and truly allowing other people to do what they need to do and being the best enablers that you can. That's a very different context than coming in and being
Starting point is 00:26:23 the quietest, the stealthiest, the most effective. But it may be something that is a kind of new iteration because of that technological democratization that doesn't necessarily mean that a Green Beret team is going to have the best comms, the best brain machine interface, or even on the social media side, the best ability to conduct like war, like Pete said. Yeah. And I think what's interesting about these technologies is our inclination is to think of them in an offensive context when we're talking about acquiring them and employing them. But what you've alluded to some of the challenges, Burnin really emphasizes the susceptibility to exploitation and it's in that domestic context there. But can you speak to what that looks like and what we might be missing in terms of both friendly and adversary exploitation of these technologies?
Starting point is 00:27:11 So I think there's a couple of things to think about in terms of that. One that we've already hit before is the idea of influence operations taking on a whole new level. taking on a whole new level. What you have playing out with the change to what we call the internet of things is that you've got, you know, this wide variety of platforms out there that have sensors. So think face recognition, which has been, you know, whether it's there's a DOD program to do face recognition at a thousand meter distance in the dark. But you also have, you know, everyone from police departments to companies, you know, Rite Aid actually was just revealed to have been quietly running a face recognition program of its customers. So that allows you, okay, this is the person's face and to match it to an identity. That's Peter who just walked in.
Starting point is 00:28:06 But then I can take that data and connect it back to everything that we've been able to gather about Peter. And even more so people like Peter, everything that's been posted, everything that's been bought, et cetera. But importantly, not just do the history, but move forward. This is what Peter as an individual or someone having these attributes might do next. And here again, you can think about that for marketing purposes, political purposes, targeting purposes, figuring out military moves, but to influence, not just predict, but influence. So we've got all that going on. And it will be done in ways that are overt, in ways that will be covert and not well understood in the background.
Starting point is 00:28:51 And it will happen. It will have tactical application. It will have strategic application. So that's one issue. But the other is, unfortunately, we are baking into the Internet of Things all the mistakes that we did with the first couple generations of the Internet. So you also now allow cyber attacks that will have kinetic impact. And here again, it might be something at a very tactical level. So not to spoil the book for people, but you could, for example,
Starting point is 00:29:21 kill someone in a smart home without ever leaving your home using digital means. The impact of that, of course, is it opens up all sorts of new possibilities for our own operations, but it also means that it can be done against us. And again, whether it's against military targets, you think about the emergent smart bases, to the wider civilian system. Yeah, I direct this to August. When we think about the emergent smart bases to the wider civilian system. Yeah, I direct this to August. When we think about the ways that we're protecting that, are we doing a good job to make sure we're not becoming vulnerable to a lot of this exploitation? And I think that goes to something you've also talked about and goes to lead with supply chain risk management and some of the vulnerabilities that are apparent there.
Starting point is 00:30:03 But structurally, are we paying attention to this? I mean, the first step is recognizing you have a problem, right? So we have that conversation happening about some of these vulnerabilities, which is great. The critical thing, I think, comes down to probably three areas. One is having as many people involved in that debate and dialogue as possible to get truly innovative and unusual solutions. You know, the second is, I think, being able to accept vulnerability and understand that your ability to persevere through it, you know, resilience is the word that's often used in,
Starting point is 00:30:38 you know, the homeland, you know, security community and the cyber community. I think it's really apt, especially as more infrastructure begins to get wired up, especially things that may not have intended to be put on the internet. You know, maybe in, again, two or three decades, you may have, you know, new start, you know, systems that are doing bedrock infrastructure, you know, America's due for a, you know, probably a couple trillion dollar infrastructure upgrade, you could do that more securely than trying to like, you know, rewire sensors to pass old bridges, water systems, electrical. But I think the last is kind of a cultural question, you know, to understand that like, you know, the human and cognitive domain is a terrain at which we are being engaged on.
Starting point is 00:31:16 And it's not just, you know, kind of a reframing of like the old, you know, marketing kind of assault that, you know, Madison Avenue, so to speak, you know, has had on us since the 50s. But rather, like, this is actually, there are strategic, there's strategic intent from nation states and from individuals who are often aligned with them. And we have to accept that we need to invest more in education and preparation that allows us to weather that. Because you remember, even in an organized, you know, military, like ours in a Western society, it's an all-volunteer force. We're drawing people from the general population. So the more I think you can prepare people before they serve, the more you can prepare people who are in critical functional
Starting point is 00:31:54 roles in society. Again, these are not like really complex or really difficult policy, I think, ideas to execute. It really comes down to, again, rethinking education, rethinking investment in the social contract. So it seems like the proliferation of this technology lowers the barrier to entry is what I'm understanding. So I imagine you'll think that non-state actors will utilize this to the greatest extent possible, making irregular warfare practitioners with Laura Keegan-like traits are all the more important moving forward. So what does the ideal future Irregular Warfare practitioner look like? Other than being a great female protagonist, which is awesome. I'll jump on that in two ways. One is, you actually hit that, which is there's stereotypes
Starting point is 00:32:41 of who does certain roles and how they look and what their background is. And as we all know, that's not always the best way to find the best talent for it. So that's right at the top, hit that. But in terms of a character and kind of the skill set that Keegan brings, And kind of the skill set that Keegan brings. But one of the things that sort of the attribute that she brings that I believe is going to have to continue is this cross between an understanding of the technology, how it works, but also where it doesn't work well. What are its strengths? What are its flaws?
Starting point is 00:33:33 And then an ability to kind of always constantly pull back and think about not just what is the technology doing, but the context that it's within and the effect that it's having, both on that context, but also on herself. And also trying to figure out why is it operating this way? Is it operating this way because it was programmed to do it or is it taking some kind of data and mishandling it? So kind of what I go back to, it's a facility with technology, but not putting it up on a pedestal and thinking that it's a solution to all your problem sets.
Starting point is 00:34:07 It's to be realistic about it. So she understands the advantages of it. She's not a Luddite, but it's also she's not one of these Silicon Valley folks saying, yeah, it's going to solve all our problems. That to me, how do you get that? That's not just a personality issue. There's a training aspect to it as well. I think there's another aspect too, which is being surrounded by technology and having the training and therefore the confidence to make those kinds of calls, like Pete said, to be able to say
Starting point is 00:34:36 definitively, this system is not doing what it needs to do for me right now. I'm going to ignore it. And that I think is something that only comes through experience. The good thing is though, that with simulation, particularly as it relates to using systems like AI or software like that, we are at an age where we will be able to more rapidly iterate, but I will submit though, there is still nothing that will replace real world experience and understanding, you know, what the actual stakes are with a piece of technology when someone's life who's standing next to you would be on the line. To me, that seems like a very critical aspect. And so the way you would, I think, incorporate that into the current force, because the current force is the future force,
Starting point is 00:35:13 is to begin by, could you give every army recruit or marine recruit in basic training, a drone, a bot, and essentially like in that Tamagotchi way, you know, keep alive through that, through that cycle, right? The Marine Corps transformation, pushing small bots down to the squad level and below, I think is a really intelligent way to approach this because by design, you're going to be therefore expecting young individuals, young Americans to break these things, to lose them, to mob them, to race them, to fight them, to do whatever. And that's the point. So to not create that kind of like, oh, you broke it, you're in trouble accountability around systems that should be a tritable in the first place. So there's a position shift to from everything from the acquisition system to doctrine and tactics
Starting point is 00:35:55 that goes with that. But the more you can saturate people in technology, because when they come in as civilians, they've been growing up with it. Like my kids, you know, will have been swiping on screens and playing with controllers and flying little drones pretty much since they could write their own name. And I think that to me speaks to the effect of how far you can see almost like being out of phase with broader global technological trends. I'm pretty sure that other parts of the world, just as you've seen, for example, the rise of cell phones 30 years ago or over landlines other parts of the world, just as you've seen, for example, the rise of cell phones 30 years ago, or, you know, over landlines and parts of,
Starting point is 00:36:28 say, Africa, where development was not facilitating the kind of infrastructure that in the West we would have built or had built over the prior century. You're going to see those kinds of technological uptick and adoption experimentation happening at a very young age as well. And in the West, we have to have that same mindset, I think. It's also key to understanding how an adversary is going to operate. I mean, you think about the surprise that ISIS presented to us. Much of it was ISIS members acting like, frankly, you know, what other millennials would do. You know, going back to the discussion that we have frequently of, you know, ISIS was so good at social media. So is every other 20-year-old, yeah.
Starting point is 00:37:04 They were basically doing things that any other teenagers would do. Or ISIS deploying unmanned aerial systems in both surveillance and later on in attack roles. They were basically jury-rigging ones that were available to almost anyone. So I think having that facility with technology is also going to be key to understanding not just what are the possibilities for us, but what are the possibilities for adversaries, too.
Starting point is 00:37:30 Pete, you mentioned election and coronavirus misinformation. I want to come back to that as a regular warfare seeks to influence and gain legitimacy amongst populations. see amongst populations. As misinformation and disinformation are huge threats, other than education, what are some implications that you pulled out of your research on combating misinformation and disinformation? So like everything else, you first have to admit that you have a problem, and then you build a strategy to deal with that problem. And unfortunately, build a strategy to to deal with that problem uh and unfortunately and this is something that is um it's a differentiator between the states that uh handle uh misinformation threats well the estonians of the world the canadas uh it's the finlands etc and those that have um are basically pointed to as being the pits at it and And that is the US followed closely by the UK
Starting point is 00:38:25 in terms of democracies, is admit that you're handling this bad. And unfortunately, there's some partisan political issues that have prevented us and in the UK from coming to grips with that. Okay, so then you build a strategy. Also something that the Estonias, et cetera, have that we don't.
Starting point is 00:38:47 That strategy, like any other good strategy should not be based on uh the hope for a silver bullet solution uh one solution no you're not going to solve this it's uh it's about risk management as long as you have the internet as long as you have people you're going to have mis- and disinformation threats. And with AI, they're only going to grow worse. Silver bullet, there's no one thing that you do. You build up an approach that brings together a wide array of actors. And there's a great parallel to both regular cybersecurity, but also public health in this space about what to do about disinformation. And it's basically that you have a role for government, and it's across government. You have a role for the private sector. You have a role for the individual. No one in cybersecurity would say, well, they created Cyber Command. I guess my mom
Starting point is 00:39:37 doesn't need a good password on her Gmail. And yet we kind of want that in this space, right? So government, we need a strategy that sets up a division of labor of who does what. That's division of labor plays out everywhere from within the military. At one point in time, no one was doing it to now you have, you know, everything from cyber command says it's ours. Special operations says, no, no, no, no. It's psyops. And then info ops. No, no, no. It's not psyops.
Starting point is 00:40:11 It's info ops to public affairs is like, whoa, whoa, whoa. What about us? It's in the public. So but it's not just that figuring out that division labor. It's literally how are you changing professional military education here? Again, think about the parallel to cybersecurity. how are you changing professional military education? Here again, think about the parallel to cybersecurity. Yes, we created Cyber Command, but we also changed the training for every officer who needs to get a little bit of a dose of this. And it's not just about understanding the threat
Starting point is 00:40:35 environment. It even extends to how do I do this individually? I do talks for the new flag officers in the different services, the new three stars. And we'll talk about large strategic disinformation threats, but there's also this gap of no one's ever taught them on how to use their own social media accounts effectively. And so it's thinking about the systemic change within the military, not just I'm saying this is the Oregon charge of it, it hits all the way to PME. But you could do all that within the military, and it would not be enough if you don't have the key changes within the intelligence community prioritizing this kind of threat. Estonia, for example, knows better than anyone the real threat of Russian tanks rolling over you. And yet they've changed their intelligence system to do a better job of
Starting point is 00:41:25 understanding incoming disinformation threats because they see it as just as or in some situations more threatening. So there's so much more that can be done. Are we doing it? Unfortunately, we're still well behind. I think there's another side to that question, which is, and this relates to the special operations community, and that's how do you utilize those very capabilities overseas against adversaries? And if you are in this era of increasing technological capability, most likely autonomy, how do you push that capability and importantly, the permissioning behind it lower and lower into your formations. You know, to my point earlier about training and, you know, giving people their Tamagotchi drone or, or, you know, UGV or whatever. If you can train an individual to responsibly use, you know, a weapon,
Starting point is 00:42:17 it seems that you should be able to also simultaneously be spending time to responsibly use social media, especially given, as Pete said, the strategic impact. You know, the strategic corporal is once again a relevant concept because of the Twitter account, right, or the Facebook account or, you know, the VK account. I think that is a cultural shift, though, that obviously in the SOCOM world deals with a lot of silos, as Pete said, between different commands and who has authorities, who is essentially given a seat at the table. If you're information warfare or psyops, people aren't given a seat at the table with the other commanders, so to speak, at that level, you're never going to have,
Starting point is 00:42:58 I think, that voice to say, you know what, we don't need to own this, but we need to help everyone else propagate this throughout. Because if you're going to be operating in small teams and not be given those authorities or having lengthy, you know, if you're moving much slower than an adversary is going to, then I think you're going to be in a situation where you're not ever going to be effective. So there's a question of trust, but crucially training. And it's certainly within our capabilities to do that, but it requires, I think, a very big cultural shift. August, you mentioned some of the cultural considerations at the institutional level, but this comes down to the individual level as well. So what lessons does Burnin have for
Starting point is 00:43:31 practitioners in the irregular warfare community about how to approach the future of conflict? Yeah. I think one of the abiding lessons in Burnin for the irregular warfare community is that you are going to have to have a much more intimate relationship with the information that describes the environment around you, not just in a current sense, but in a predictive sense. And in the book, it's a robot, it's like the physical manifestation of that, which is effectively that human machine interface that is like having a conversation with an oracle of sorts. And that relationship between Special Agent Laura Keegan and this robot TAMS deepens, of course, the more and more data it accesses throughout the course of the story. But that's not unlike, I think,
Starting point is 00:44:15 the same way that military operations will be conducted in that human machine aspect. So the more, for example, exploitation of adversary servers, of battle networks, et cetera, is going to, of course, deepen that relationship with the information and environment around you. It's really important to think a lot about how that interface goes. And I think giving people who are on the soldier side or the operator side or whatever the language to shape that interface, the UX, the UI, user experience, user interface, I think is critical. Rather than being told this is how it's going to be. And I think that actually could be quite important in determining whether that data is truly effective in skewing operations toward being bogged down in information and in action to being able to clearly decide what's important and when to move in a certain way and
Starting point is 00:45:05 what to do with that information. So being really cognizant of that very human relationship with technology, but ultimately that's really about the information that's behind it. We are going past the platform era in describing the Western way of war. We are in the software era and that's true for information operations. It's true for kinetic. it's true for cyber, you know, it's true for space. And I think that is also a critical realization too, that a book like Burnin kind of manifests, you know, in a counterterrorism case that in many ways is like the hunt for a high value individual, right. And trying to unpack and penetrate different networks using technology, but also the human intelligence factors that, that I think drive, you know, the, the realistic and kind of real world ways that those sorts of missions would be done, you know, in the next decade.
Starting point is 00:45:49 So I think we have time for one more question. And so we've talked about implications for policymakers and also practitioners. I'm particularly interested in what you both think academia should be focusing on in terms of research within the realm of irregular warfare? I'd suggest a couple of fronts. And there is a start of some really interesting work on each of these areas, but I think we can go a lot further. The first is near and dear to my own heart, which is what is the impact of true technologic change on this space, not just about direct use, but the ripple effect on the broader context. A different way of thinking about it is, I think of the parallel of where we are with unmanned systems is the equivalent of airplane
Starting point is 00:46:41 in the teens or the 1920s, right? We're just scraping the surface of not just what's possible, but what will be the effect on everywhere from tactics to doctrine to overall strategic behavior. So I think we need to dig deeper on that. And particularly when we think about what from the civilian side will come over that's, you know, the non-obvious application. The second is, and you're seeing more work on this, but understanding what is the role of this community in great power conflict and how does it express itself through not just what we've gotten used to, which is the foreign internal defense helping a government fight against an insurgency, but how does it express itself on the opposite, where we may be the ones behind the insurgency, which, oh, by the way, happened a great deal during the Cold War. And related to that, we still do not have a good handle on proxy warfare, which is one of the both in terms of us using but it being used against us and our allies. And, you know,
Starting point is 00:47:59 this, I could be talking about proxy warfare, whether it's in Middle East, whether it's in Ukraine, et cetera. I don't think we've got a good handle. So those are a couple of areas that I think should be priorities for us. You know, when it comes to what's next for regular warfare and special operations community, it seems like the academic community could spend a lot of time researching how the military will have access to different forms of data, when they'll get it, what they will be able to do with it. And I think that's something that is, you know, both a question of norms as much as is law, particularly when you look at the in extremis evolution of, you know, small rating units in World War II, say the British SBS, the rise of the SAS,
Starting point is 00:48:48 the kinds of both bureaucratic, but also legal in the international sense, rules that were broken to accomplish missions that were in many cases strategic, not always successful. But the point was that there was a fundamental shift going on in the nature of warfare that the West was conducting. And just as then you had, let's say, the long range desert group utilizing Jeeps, the future soft formations in the 2030s will be heavily impacted by their ability to access data when they're remotely. If you're looking at a building in a very dense urban environment, how many times was a toilet flushed in a certain apartment? Did that tell you how many people might actually be in there after a certain person arrives and leaves? You know, is there a pattern of life change?
Starting point is 00:49:30 In the same way that we study, you know, adversary server farm operations for, you know, small variations in temperature or whatever they, you know, the spooky folks do. You know, I think that level of data that's out there now is just like the tiniest sliver. But when the internet of everything becomes quite normalized and it's down to the clothing we're wearing, the appliances we're using in our homes, obviously just our increasingly powerful mobile capabilities,
Starting point is 00:49:57 whether it's the watches we wear, the phones that are in our pockets, et cetera, there's gonna be almost a limitless array of data. And I don't think the private sector, for example, has done the job of essentially establishing what the norms and rules are. Most of the big media companies that are focused on this space or data companies have a kind of move fast, break things philosophy still, even though we're well past that point, I think, in the maturity of those industries and the power that they have. There is to some extent an ability
Starting point is 00:50:24 to arbitrage that, which is to say if the special operations community can acknowledge the importance of this, especially in a great power context, and say, we want to be leading and defining the new laws of online and autonomous conflict, or the new kind of LOAC, or the new just war ethic. That's about all we have time for today. P.W. Singer and August Cole, thanks for coming on the Irregular Warfare podcast, talking to us about Vernon and sharing your thoughts for the future. Thanks for having us on.
Starting point is 00:50:51 Yeah, thanks so much. Really appreciate it. And great to connect with you. Take care. Thanks for doing the podcast. This is going to be awesome. It's a great, obviously, subject and thread to keep going. I'll keep listening. Thanks for listening to Episode 8 of the Irregular Warfare Podcast. We release a new episode every two weeks. In our next episode, we will discuss the importance of organizational culture in units that conduct military advising with Dr. Austin Long. After that, we will talk the human domain of warfare with Brigadier General Retired Kim Field
Starting point is 00:51:21 and Dr. Sue Bryant. Please be sure to subscribe to the Irregular Warfare podcast so you don't miss an episode. You can also follow and engage with us on Twitter, Facebook, or LinkedIn. One last note, what you hear in this episode are the views of the participants and don't represent those of West Point, the Army, or any other agency of the U.S. government. Thanks again, and we'll see you next time.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.