19jun Davis Bochner
19jun Davis Bochner
19jun Davis Bochner
DSpace Repository
2019-06
http://hdl.handle.net/10945/62727
This publication is a work of the U.S. Government as defined in Title 17, United
States Code, Section 101. Copyright protection is not available for this work in the
United States.
THESIS
by
Joseph D. Davis and William W. Bochner June 2019
11. SUPPLEMENTARY NOTES The views expressed in this thesis are those of the author and do not reflect the
official policy or position of the Department of Defense or the U.S. Government.
12a. DISTRIBUTION / AVAILABILITY STATEMENT 12b. DISTRIBUTION CODE
Approved for public release. Distribution is unlimited. A
13. ABSTRACT (maximum 200 words)
The relevance and best utilization of traditional SOF Infiltration methods are depicted for the battlefield
of 2035. Through an analysis of trends in demographics, technology, diffusion of social media, and
adversary capabilities, the study focuses on civilian population density and connectivity, and their relation to
a SOF unit’s ability to conduct time-sensitive, direct action operations. This study first outlines a typology
for describing an operational environment, past or future, using the variables of population density and
connectivity. Next, using the established typology, the study analyzes historical case studies of both military
and non-military infiltration in environments that share characteristics with the proposed future
environment, recognizing that no historical environments exist that simultaneously exhibit both the
population density and connectivity of the future. The study then identifies among the case studies the
characteristics that historically resulted in successful infiltration, with the goal of developing a heuristic
approach to the problem of infiltration in a future environment. Finally, this thesis offers recommendations
for the direction in which SOF capabilities (tactical, platform-based, and a planning mindset) should
advance to conduct successful infiltration on the battlefields of 2035 and beyond.
i
THIS PAGE INTENTIONALLY LEFT BLANK
ii
Approved for public release. Distribution is unlimited.
Joseph D. Davis
Major, United States Air Force
BS, The Ohio State University, 2005
MA, American Military University, 2013
William W. Bochner
Lieutenant, United States Navy
BS, U.S. Naval Academy, 2011
from the
Michael E. Freeman
Co-Advisor
John J. Arquilla
Chair, Department of Defense Analysis
ii
THIS PAGE INTENTIONALLY LEFT BLANK
i
ABSTRACT
The relevance and best utilization of traditional SOF Infiltration methods are
depicted for the battlefield of 2035. Through an analysis of trends in demographics,
technology, diffusion of social media, and adversary capabilities, the study focuses on
civilian population density and connectivity, and their relation to a SOF unit’s ability to
conduct time-sensitive, direct action operations. This study first outlines a typology for
describing an operational environment, past or future, using the variables of population
density and connectivity. Next, using the established typology, the study analyzes
historical case studies of both military and non-military infiltration in environments that
share characteristics with the proposed future environment, recognizing that no
historical environments exist that simultaneously exhibit both the population
density and connectivity of the future. The study then identifies among the
case studies the characteristics that historically resulted in successful infiltration,
with the goal of developing a heuristic approach to the problem of infiltration in a
future environment. Finally, this thesis offers recommendations for the direction in
which SOF capabilities (tactical, platform-based, and a planning mindset) should
advance to conduct successful infiltration on the battlefields of 2035 and beyond.
v
THIS PAGE INTENTIONALLY LEFT BLANK
v
TABLE OF CONTENTS
I. INTRODUCTION..................................................................................................1
A. RESEARCH QUESTION.........................................................................1
1. Traditional SOF Infiltration.........................................................2
2. Future SOF Core Tasks.................................................................3
3. Why Population Density and Connectivity?...............................3
B. POPULATION DENSITY........................................................................5
1. Trends.............................................................................................5
2. Consequences..................................................................................7
C. CONNECTIVITY....................................................................................10
1. Trends...........................................................................................10
2. Consequences................................................................................17
v
LIST OF REFERENCES................................................................................................55
v
LIST OF FIGURES
Figure 1. Tweets per hour compared to flying training times in Japan on July
26, 2018......................................................................................................41
i
THIS PAGE INTENTIONALLY LEFT BLANK
x
LIST OF ACRONYMS AND ABBREVIATIONS
AI Artificial Intelligence
AQ Al Qaeda
IO Information Operations
IT Information Technology
JP Joint Publication
LeT Lashkar-e-Taiba
x
QRF Quick Reaction Force
UW Unconventional Warfare
x
ACKNOWLEDGMENTS
We want to acknowledge and thank our advisors, Dr. Robert Burks and Dr.
Michael Freeman, for their advice, guidance, and patience throughout the writing process.
They helped us corral our wild visions and scope them into coherent thoughts. Without
them, we would still have a pile of body parts instead of Frankenstein’s monster.
Thank you to Christine Davis for putting up with the long days in the library and
the occasional nights when I had to seclude myself at home. You always understood, and
I could not have finished without your support. I also want to acknowledge my father,
Tim Davis, for the countless hours you spent reviewing my writing and for having way
better grammar than I. You still got it, Pops.
Thanks to Liz Bochner for brainstorming help, and to Eva for enthusiastically
attending thesis meetings.
vi
THIS PAGE INTENTIONALLY LEFT BLANK
vi
I. INTRODUCTION
A. RESEARCH QUESTION
1
Todd South, “The Future Battlefield: Army, Marines Prepare for ‘Massive’ Fight in Megacities,”
Military Times, March 8, 2018, https://www.militarytimes.com/news/your-army/2018/03/06/the-future-
battlefield-army-marines-prepare-for-massive-fight-in-megacities/.
2
Jacob Siegel, “Could Social Media Blow Special Operations Like the Failed Foley Rescue?,” The
Daily Beast, August 22, 2014, https://www.thedailybeast.com/could-social-media-blow-special-operations-
like-the-failed-foley-rescue.
3
Siegel.
1
4
Kieren McCarthy, “United Nations Pledges to Get Everyone Online...by 2030,” The
Register, September 8, 2015,
https://www.theregister.co.uk/2015/09/08/united_nations_to_get_everyone_online_by_2030/.
2
By the year 2035 the “millennial generation,” loosely defined as those born
between 1981 and 1996, will hold leadership positions within SOF.5 In this millennial
battlespace, SOF will face threats that can potentially compromise even the most
carefully planned clandestine operations. These threats have not been present in recent
conflicts. Based on current technological trends, the battlefield by 2035 may present
instant connectivity of a more populous and urbanized citizenry.6 In this scenario, every
person could be a potential sensor in a new kind of early warning alert network. In spite
of these conditions, it is likely that SOF will still need to conduct clandestine infiltration
missions.
The question remains: How should the U.S. Special Operations community
conduct SOF infiltration given increased population density and connectivity when
potential targets move out of rural terrain by 2035?
5
Michael Dimock, “Defining Generations: Where Millennials End and Generation Z Begins,” Pew
Research Center (blog), accessed May 9, 2019, https://www.pewresearch.org/fact-tank/2019/01/17/where-
millennials-end-and-generation-z-begins/.
6
McCarthy, “United Nations Pledges to Get Everyone Online...by 2030.”
3
7
Joint Chiefs of Staff, Special Operations, JP 3-05 (Washington, DC: Joint Chiefs of Staff, 2014), I–2.
4
2. Future SOF Core Tasks
SOF have a variety of mission sets or core tasks. According to the JP 3-05, they
are “direct action, special reconnaissance, countering weapons of mass destruction,
counterterrorism, unconventional warfare (UW), foreign internal defense, security force
assistance, hostage rescue and recovery, counterinsurgency, foreign humanitarian
assistance, military information support operations, and civil affairs operations.” 8 The
United States Army Special Operations Command’s 2016 “USASOC Strategy—2035”
outlines the requirements that Army SOF may face in the future. 9 Similarly, U.S. Special
Operations Command’s “Special Operations Forces Operation Concept: A Whitepaper to
Guide Future Special Operations Force Development,” provides insight into potential
future mission sets.10 Each suggests that SOF will retain mission sets that involve moving
small units into and out of contested areas in a short amount of time.
How SOF will operate in the future environment depends on the manner in which
planners and leaders think about the problem set today. Two emergent properties of
megacities that pose new challenges to SOF infiltration are population density and
8
Joint Chiefs of Staff, 3.
9
United States Army Special Operations Command, “USASOC Strategy—2035,” April 2016.
10
USSOCOM, “Special Operations Forces Operating Concept: A Whitepaper to Guide Future Special
Operations Force Development” (USSOCOM, February 1, 2016).
11
Arthur M Castiglia, “Megacities and the Role of U.S. Special Operations Forces” (Master’s thesis,
5
United States Army War College, 2015), 3.
6
connectivity.12 Therefore, our theory for future SOF infiltration and recommendations
will address the environments that have both high connectivity and population density.
12
Castiglia, 3.
13
“Global Trends Home Page,” accessed August 6, 2018, https://www.dni.gov/index.php/global-
trends-home.
14
Louise La Caille John and Louise Reynnells, “What Is Rural?,” United States Department of
Agriculture, May 2016, https://www.nal.usda.gov/ric/what-is-rural#HEALTH.
15
McCarthy, “United Nations Pledges to Get Everyone Online...by 2030.”
16 Julia Murphy and Max Roser, “Internet,” OurWorldInData.org, 2018,
https://ourworldindata.org/internet.
7
B. POPULATION DENSITY
1. Trends
Global urbanization results in three trends which will have an impact on SOF
infiltration. First, global urbanization will increasingly concentrate the world’s population
into not only very large cities but dozens of megacities. Second, ungoverned spaces will
exist in megacities in which both state and non-state actors will be able to find security.
Third, enemy organizations will migrate out of rural areas to ungoverned urban spaces.
The year 2008 marked the point at which the world’s population officially became
more urban than rural, and urbanization is expected to continue.17 By 2050, studies
predict that 86 percent of the population in developed countries and 67 percent in less
developed countries will live in urban areas.18 Currently, there are six hundred cities with
a population of one million or more, and experts expect that by 2030 there will be 40
cities with a population of 10 million or more. The United Nations defines a megacity as
a city with more than 10 million inhabitants; however, not all megacities are the same as
each has grown to different sizes at different rates.19 There are several problems that can
potentially plague all megacities. Even the best-governed megacities have the potential
for massive poverty and social unrest as a result of social exclusion and informalized
processes.20 Additionally, infrastructure problems, transportation congestion,
environmental pollution, and increased disease transmission pose a challenge to the
central government and the population alike.21 Finally, the sheer size of megacities
makes likely the existence of
17
Kees Koonings and Dirk Kruijt, Megacities: The Politics of Urban Exclusion and Violence in the
Global South (London: Zed Books, 2009), 8.
18
Koonings and Kruijt, 8.
19
David Shunk, “Mega Cities, Ungoverned Areas, and the Challenge of Army Urban Combat
Operations in 2030–2040,” Small Wars Journal, January 23, 2014,
http://smallwarsjournal.com/jrnl/art/mega-cities-ungoverned-areas-and-the-challenge-of-army-urban-
combat-operations-in-2030-2040.
20
Koonings and Kruijt, Megacities: The Politics of Urban Exclusion and Violence in the Global
South, 8.
21
Shunk, “Mega Cities, Ungoverned Areas, and the Challenge of Army Urban Combat Operations in
2030–2040.”
8
ungoverned spaces in which criminal organizations and non-state actors may find
freedom of movement and a safe haven.
Ungoverned spaces exist all over the world but predominantly in weak states. 22
Generally speaking, it is the territory in which a state does not have a monopoly of
influence and which subversive or non-state actors may exploit to their advantage. The
failure of the government to exert authority leaves a power vacuum and an opportunity
for other organizations to take on the role of the state. 23 The prevalence of such spaces is
of interest to SOF as the rise of violent criminal extremist organizations, such as ISIS in
Syria and the Lord’s Resistance Army (LRA) in Uganda, have previously taken
advantage of ungoverned spaces to increase their power an influence.24 In the
ungoverned spaces of Karachi, Pakistan, rather than attempting to maintain order, the
government acts as a mediator over the informal order between the various criminal and
terrorist organizations competing for power.25 Likewise, in the Latin American cities of
Mexico City, and Sao Paulo, Brazil, where roughly 25 percent of the urban space is
characteristically ungoverned, local chiefs and armed organizations execute a parallel law
and justice system through the use of force.26 In each ungoverned megacity example, the
central government has little to no control over the criminal networks and insurgent
groups that spread, compete with one another, and fill the power vacuum.
22
Angel Rabasa et al., Ungoverned Territories: Understanding and Reducing Terrorism Risks
(Santa Monica, CA: RAND Corporation, 2007), 2–3,
https://www.rand.org/pubs/monographs/MG561.html. Also available in print form.
23
Africano Abasa, “Ungoverned Spaces and the Survival of Terrorist Groups in Africa: A Case Study
of the Lord’s Resistance Army” (Master’s thesis, Naval Postgraduate School, 2015), 5,
https://calhoun.nps.edu/handle/10945/47802.
24
John Campbell, “Terrorists Are Not the Only Ones Exploiting Ungoverned Spaces Across Nigeria,”
Council on Foreign Relations (blog), May 15, 2018, https://www.cfr.org/blog/terrorists-are-not-only-ones-
exploiting-ungoverned-spaces-across-nigeria.
25
Nazia Hussain and Louise Shelley, “Karachi Organized Crime in a Key Megacity,” Connections 15,
no. 3 (Summer 2016): 8.
26
Koonings and Kruijt, Megacities: The Politics of Urban Exclusion and Violence in the Global
South, 14.
9
Rural safe havens are steadily disappearing through a combination of urbanization
and counterterrorism efforts.27 Traditionally, safe havens have existed primarily in the
remote ungoverned spaces that offer geographic concealment, resources, and the support
of a sympathetic population. For many years, al-Qaeda in Afghanistan enjoyed the
freedom to hide in the remote terrain and mountain caves, had access to resources
through bin Laden and other wealthy contributors, and had the support of the Afghani
population. For decades, counterterrorism forces developed tactics and technologies
optimized for finding and eliminating terrorist organizations in rural and less populated
areas. The same is not true about urban areas. This gap in capability provides an
advantage for the enemy.
Enemy organizations need money and resources to sustain the organization let
alone expand it. The urban environment offers far greater access to resources than a rural
one. Regardless of whether the enemy is a non-state actor or state government,
urbanization provides monetary and infrastructure benefits that lend to the greater
sustainment and longevity of the organization. Combined with the fact that global
urbanization is feeding the growth of megacities, it is inevitable that enemy organizations
will move out of the rural areas toward ungoverned urban spaces because theses spaces
provide concealment from adversaries, access to resources, and a sympathetic
population.28
2. Consequences
27
Russell W. Glenn, “Megacities: The Good, the Bad, and the Ugly,” Small Wars Journal, no. Feb
(2016), http://smallwarsjournal.com/jrnl/art/megacities-the-good-the-bad-and-theugly.
28
Michael Freeman, “The Sources of Terrorist Financing: Theory and Typology,” Studies in Conflict
1
& Terrorism 34, no. 6 (2011): 463; 470.
29
Koonings and Kruijt, Megacities: The Politics of Urban Exclusion and Violence in the Global
South, 118.
1
The extensive concealment and cover provided by man-made structures in urban
terrain make it optimal for the defender and much more difficult for the assaulting force.
Locating an individual in a city can be like finding a needle in a haystack. Capturing or
eliminating a target is even more difficult. The nature of urban terrain makes a surgical
strike with a bomb or limited engagement with special operations forces using current
tactics nearly impossible. Any conventional assault in urban terrain inevitably resembles
attrition warfare with civilian casualties and escalating violence.30 The physical
characteristics of urban terrain allow an enemy organization to exploit both vertical and
subterranean spaces, further complicating the assault and dramatically favoring the
defender.31 Hamas has long used urban terrain to deny the Israeli Defense Force (IDF)
from observing and targeting their locations.32 For example, even when the IDF knew the
location of Hamas’ headquarters was below a hospital in Gaza during 2014 OPERATION
PROTECTIVE EDGE, the urban terrain prevented the IDF from successfully eliminating
the target.33 As population densities steadily increase due to urbanization, it will be
advantageous for enemy organizations to exploit the natural defenses of urban terrain.
The terrain that makes up urban areas reduces the number of places to land
aircraft, restricts movement of forces on the ground and water, and creates canalized
areas which the enemy can more easily defend.34 Subterranean tunnels and hidden
avenues of escape further complicate the problem for the assaulting force. With limited
time to conduct an operation, the infiltrating force using traditional infiltration means
must rely on vastly superior firepower or numbers in order to be successful.
Another advantage for the enemy in the urban environment is that there is greater
access to people sympathetic to their cause. An enemy organization will be more
effective
30
Peter Adey, “Vertical Security in the Megacity: Legibility, Mobility and Aerial Politics,” Theory,
Culture & Society 27, no. 6 (2010): 53; Castiglia, “Megacities and the Role of U.S. Special Operations
Forces,” 2.
31
Glenn, “Megacities: The Good, the Bad, and the
Ugly.” 32 Glenn.
33
Glenn.
2030–
1
34
Shunk, “Mega Cities, Ungoverned Areas, and the Challenge of Army Urban Combat Operations in
2030–
1
at countering infiltration if it has the cooperation of a sympathetic population. They may
be sympathetic to the organization’s cause or merely willing to accept the social and
economic benefits that the organization provides. For example, Hamas in Gaza and
Lebanon set up schools, medical clinics and other social services for the civilian
population, and they garnered legitimacy and support of the local population.35 As a
consequence, the population offers a means of organic early warning and defensive
protections from attackers. Whether it be a single city block or an entire city, a
sympathetic population helps to maximize the overall security of an enemy organization
within an urban environment.
2030–
1
35
Freeman, “The Sources of Terrorist Financing: Theory and Typology,” 471.
36
Shunk, “Mega Cities, Ungoverned Areas, and the Challenge of Army Urban Combat Operations in
2030–
1
Currently, SOF forces rarely conduct an urban infiltration for these reasons; else they
may encounter the same disastrous consequence. Unfortunately, these issues will be
unavoidable and will likely be magnified in the future battlespace, so it is crucial that
SOF planners find ways to address these issues.
C. CONNECTIVITY
1. Trends
Considering the trajectory of communication technology over the last 140 years,
we identify two overarching trends: First, communication is becoming faster, cheaper,
more data intensive, and makes information easier to disseminate.37 Second, a state or
non- state organization with sufficient resources can exploit the massive amount of
communications data generated by individual citizens for their own benefit.
37
Christopher H. Sterling, Military Communications from Ancient Times to the 21st Century (Santa
1
Barbara, CA: ABC-CLIO, 2008).
1
terrorist actions do not necessarily take place in entirely hostile environments, which is
analogous to SOF operations into neutral and densely populated areas.
One of the earliest established terrorist organizations during the First Wave was
the Russian anarchist group, “The People’s Will,” also known as Narodnaya Volya,
which holds the credit of being the “first organization in history dedicated to systematic
political terrorism.”40 At the time of Narodnaya Volya’s emergence in 1879, the
technology of “electrotyping” and the telegraph impacted both the group’s ability to
spread its beliefs and coordinate attacks. Electrotyping, created in 1839 by a German
inventor temporarily living
38
Audrey Kurth Cronin and James M. Ludes, Attacking Terrorism: Elements of a Grand Strategy
(Washington, DC: Georgetown University Press, 2004).
39
Cronin and Ludes.
40
Richard Pipes, The Degaev Affair: Terror and Treason in Tsarist Russia (New Haven, CT: Yale
1
University Press, 2003), 10.
1
in Russia, made the duplication of metal printing plates faster and more accurate than the
previous method.41 The technology made it viable for Narodnaya Volya to disseminate
its underground newspaper, “The People’s Gazette,” which spread the group’s anti-
autocratic message. Additionally, the introduction of the telegraph to Russia allowed
Narodnaya Volya to coordinate its unprecedented 1879 train bombing over vast
distances. In preparation for the group’s 1879 attack on Tsar Alexander II’s train,
informants for Narodnaya Volya reportedly telegraphed coded details about the Tsar’s
train schedule to fellow terrorists in Moscow.42
41
Harris Hatch and Stewart Alexander, Electrotyping and Stereotyping (Chicago: United Typothetae
of America, 1918): 4.
42
Frithjof Benjamin Schenk, “Attacking the Empire’s Achilles Heels: Railroads and Terrorism in
Tsarist Russia,” Jahrbucher Fur Geschichte Osteuropas 58 (2010): 232–53: 237.
43
Richard Deacon, A History of the Russian Secret Service (New York: Taplinger Pub. Co., 1972).
44 Richard Deacon, A History of the Russian Secret Service (New York: Taplinger Pub. Co., 1972):
2
65.
2
groups trying to spread their message and conduct point-to-point attack coordination, yet
it did little to assist the Tsarist forces from coordinating their security efforts on the
massive scale required.
The net effect of communication technology during this First Wave favored the
small unit attacker. Given the high cost of transmitting each package of information from
one point to another high, the defender was unable to share the necessary amount of data
to keep a dispersed network of security offices informed of suspected individuals and
head- off potential attacks.
The French military’s strategy to counter the FLN relied on accurate intelligence
and the ability to quickly disseminate enemy locations to tactical units. France’s use of
helicopters, aerial surveillance, and an “abundance of radio equipment,” allowed them
maximum mobility and flexibility, which denied the FLN freedom of movement to
coordinate attacks.48
While the fight to establish Algerian independence from France included non-
terrorist efforts, the terrorist component of the FLN remained active throughout, despite
significant setbacks. Under the tactically effective opposition of the French military
45
Henry F. Jackson, The FLN in Algeria: Party Development in a Revolutionary Society,
Contributions in Afro-American and African Studies ; No. 30 (Westport, Conn: Greenwood Press, 1977).
46
Sterling, Military Communications from Ancient Times to the 21st Century.
47 Military Communications from Ancient Times to the 21st Century: 373.
48
Constantin Melnik, “The French Campaign Against the FLN” (Santa Monica, CA: RAND
2
Corporation, 1967).
2
enabled by their synchronization of radio communication and mobility, communication
among FLN members was difficult and entailed high risk. As such, the FLN relied
heavily on children as messengers and women as combatants.49 With intense pressure on
the FLN organization, its members were forced to meet in person to coordinate attacks,
establish a strategy, and nominate leaders. As a result, the FLN adopted an organization
that was a combination of a hierarchy and the star/hub model, which is a structure that
suits environments in which communication is costly.50
The FLN and other anti-colonial terrorist groups seem to be the victims rather
than beneficiaries of technological advances. Narodnaya Volya capitalized on
developments in printing and the telegraph to gain the upper hand on the state. For the
FLN, on the other hand, the French military’s effective use of technology forced the
terrorists to use costly, inefficient means of communication. There were many factors that
contributed to the FLN’s inability to progress beyond a terrorist group into a legitimate
military. Significantly, physical barriers like the Meurice-Challe Line, which physically
isolated FLN fighters in neighboring Tunisia and Morocco, was an effective impediment
to communication.51
The Provisional Irish Republican Army (PIRA) was prominent during the Third
Wave, despite the fact that it shared ideology with earlier, Second Wave, groups. The
PIRA was an anti-colonial terrorist group rather than “New Left” like other Third Wave
groups. Forming out of a split with the Official IRA in 1970, the PIRA became the more
violent, less political, of the groups that posed a security threat to Britain. 52 The PIRA
employed car bombs and Improvised Explosive Devices (IEDs) frequently in its
campaign of
49
Jackson, The FLN in Algeria: Party Development in a Revolutionary Society.
50
“The hub, star, or wheel network, as in a franchise or a cartel where a set of actors are tied to a
central (but not hierarchical) node or actor, and must go through that node to communicate and coordinate
with each other.” Quoted in: John. Arquilla and David F. Ronfeldt, Networks and Netwars: The Future of
Terror, Crime, and Militancy, MR / Rand Corporation; MR-1382-OSD (Santa Monica, CA: Rand, 2001).
51
Jackson, The FLN in Algeria: Party Development in a Revolutionary Society.
52
James. Dingley, Combating Terrorism in Northern Ireland, Cass Series on Political Violence
2
(London: Routledge, 2009).
2
violence. A particular spike in attacks famously occurred on “Bloody Friday,” during
which the PIRA detonated 22 IEDs within two hours.53
53
Paul Gill et al., “Lethal Connections: The Determinants of Network Connections in the Provisional
Irish Republican Army, 1970–1998,” International Interactions: Empirical and Theoretical Research in
International Relations, 2014.
54
Sean Boyne, “Uncovering the Irish Republican Army,” News, PBS Online, August 1, 1996,
2
https://www.pbs.org/wgbh/pages/frontline/shows/ira/inside/org.html.
55
Gill et al., “Lethal Connections: The Determinants of Network Connections in the Provisional
Irish Republican Army, 1970–1998.” 73.
2
computer conferencing led to a massive reduction in cost and effort required to
communicate and facilitates a different organizational structure altogether, the network.56
In their book Networks and Netwars, Dr. Arquilla and Dr. Ronfeldt discuss the
impacts of the information revolution on non-state actors. Describing the relationship of
communication technology to organizational structure, they argue:
“Of the three network types, the all-channel has been the most difficult to
organize and sustain, partly because it may require dense communications.
But it is the type that gives the network form its new, high potential for
collaborative undertakings and that is gaining new strength from the
information revolution.”57
AQ is a Fourth Wave terrorist group that made use of these new IT capabilities
and demonstrates what is possible using the “all-channel” network. Osama bin Laden
reportedly had a contemporary suite of IT equipment at his rural headquarters in
Afghanistan from which he directed the globally dispersed network of AQ affiliates and
cells in the 1990s.58 AQ and other Fourth Wave groups are known to have used floppy
discs and compact discs to transmit large files on bomb-making instructions, recruiting
material, and tactics.59 While the telephone did allow real-time coordination and
geographic dispersion for Third Wave groups, transfers of large amounts of data only
became possible during the Fourth Wave.
56
Arquilla and Ronfeldt, Networks and Netwars: The Future of Terror, Crime, and Militancy.
57 Arquilla and Ronfeldt, 8.
58 Arquilla and Ronfeldt, Networks and Netwars: The Future of Terror, Crime, and Militancy.
2
59 Arquilla and Ronfeldt, 36.
2
enemy like the Soviet Union.60 Therefore, recent developments in communication
technology favor the flexible and dispersed small-unit attacker over a hierarchically
structured defender.
2. Consequences
While increased technological capability will aide both the infiltrator and
defender, each will be vulnerable to attacks against its respective IT networks. For the
infiltrator relying on advanced communication within the unit and back to headquarters,
this vulnerability would take the form of communication disruption by the defender,
cutting the unit off from required supporting assets and inhibiting internal
synchronization. The
60
Sterling, Military Communications from Ancient Times to the 21st Century.
61
Jerome Doyon, “Counter-Extremism’ in Xinjiang: Understanding China’s Community-Focused
Counter-Terrorism Tactics,” War on the Rocks, January 14, 2019,
3
https://warontherocks.com/2019/01/counter-extremism-in-xinjiang-understanding-chinas-community-
focused-counter-terrorism-tactics/.
3
defender will similarly be susceptible to cyber-attacks against its alert networks, which
could create blind spots through which a SOF unit could infiltrate.
With more effective alert networks and precise locating of infiltrating forces, the
likelihood that a SOF unit would arrive on target with enough time to conduct its
operation before an enemy reaction force contacts them would significantly decrease. On
the other hand, the need for an infiltrating force to move in a formation, whether by
aircraft, ground vehicles, or maritime vessels, will diminish as technology allows units to
disperse, infiltrate, then concentrate at a specific location and time.
As both offensive and defensive actors place more reliance on IT systems, the
infiltrating unit must be prepared to leverage these advanced capabilities when they are
available, but also to operate in a communication-denied environment. Some of the
advanced technologies that facilitate complex infiltration tactics also represent a
vulnerability which the defender can target. This aspect of the future operating
environment differs significantly from that of the last decades, in which SOF maintained
overwhelming technological superiority over its enemies. In the future, SOF will find its
technologies equaled and sometimes surpassed by the enemy’s. Therefore, SOF must
possess a range of infiltration practices that can achieve success while wielding superior
technology but also minimize risk when faced with it.
3
II. THEORY OF FUTURE SOF INFILTRATION
In the previous chapter, we presented two trends that will likely shape the future
battlespace and impact how special operations forces will have to conduct infiltrations.
Population density and connectivity trends foretell that highly connected megacities will
be where the enemy finds a safe haven and where SOF must learn to infiltrate. In this
chapter, we will present our theory of what the future of SOF infiltration will likely need
to embody. The basis for this theory has foundation in concepts found in literature and
supported by both historical and current cases. While not all encompassing, the theory
instead encapsulates four critical areas where we observe that traditional SOF infiltration
needs reform and innovation. Our theory is that deception will be more important than
stealth technology, cognitive defilade will be more effective than physical defilade, the
unit size must reduce to smaller coordinated elements, and organic SOF cyber capability
will be as vital as physical actions for infiltration in the millennial battlespace
environment.62
62
“Defilade”- 1. Protection from hostile observation and fire provided by an obstacle such as a
hill, ridge, or bank. Quoted in Joint Chiefs of Staff, Department of Defense Dictionary of Military and
3
Associated Terms (Defense Technical Information Center, 2019).
3
1. Literature on Deception
Military theorists throughout history have examined deception from debating its
relevancy to analyzing how a successful deception functions.63 Even in the era of
medieval warfare, scholars emphasized the centrality of deception to a battle plan.
Specifically, they declared the importance of signaling to the enemy the opposite of what
was the reality with regards to one’s own forces.64 Moving beyond the question of
deception’s relevance in warfare, an examination of how to employ deception with the
greatest chance of success suggests that a particular deception should amplify the
enemy’s preconceived notions rather than challenge them. Thus, a deception effort builds
credibility among the enemy based on biases and oversights they already possessed.65
Rothstein and Whaley further this concept by dividing deception into two components:
dissimulation, or hiding what is true, and simulation, which is the affirmation of what is
false.66
While some modern warfighters hold the perception that deception is a “weapon
of the weak,” this idea is especially misguided when it comes to special operations.67
Describing the importance of the principle of Surprise in special operations, William
McRaven suggests that the role of deception is to delay the enemy’s response to the SOF
unit, thereby allowing the SOF unit to surprise the enemy and achieve relative
63
Sunzi, The Art of War, UNESCO Collection of Representative Works: Chinese Series (London:
Oxford University Press, 1963); Hy S. Rothstein, The Art and Science of Military Deception (London:
Artech House, 2013); James F. Dunnigan, Victory and Deceit: Dirty Tricks at War, 1st ed. (New York:
W. Morrow, 1995).
64
Sun Tzu discusses deception in The Art of War. He states: “All warfare is based on deception.
Hence, when we are able to attack, we must seem unable; when using our forces, we must appear inactive;
when we are near, we must make the enemy believe we are far away; when far away, we must make him
believe we are near.” Quoted in Sunzi. The Art of War. UNESCO Collection of Representative Works:
Chinese Series. London: Oxford University Press, 1963.
65
In their work, “Multidisciplinary Perspectives on Military Deception,” Katherine Herbig and
Donald Daniel reach a single overwhelming conclusion: “It is far easier to lead a target astray by
reinforcing the target’s existing beliefs, thus causing the target to ignore the contrary evidence of one’s true
intent, than it is to persuade a target to change his or her mind.” Donald C. Daniel et al., “Multidisciplinary
Perspectives on Military Deception,” Technical Report (Monterey, CA: Naval Postgraduate School, 1980),
60.
66
Hy S. Rothstein, The Art and Science of Military Deception (London: Artech House, 2013): 20.
3
67 Dunnigan, Victory and Deceit: Dirty Tricks at War.
3
superiority.68 Considering the fact that the U.S. Department of Defense publishes its Joint
Publication on the principles of deception, it is evident that deception is still considered a
central component of warfare. The vague nature of the principles outlined in official
military instructions, however, leads us to conclude that there is a substantial gap in
knowledge of what deception looks like in the current and future SOF operating
environment.69
Considering what theorists and military experts have said about deception on
current and past battlefields, let us contemplate what it will mean in the millennial
battlespace. Deceptions will need to not only delay the enemy’s discovery of the assault
force, but hide the fact that there is an assault force at all.
68
In his compilation of historical case studies, Spec Ops, William McRaven offers six principles of
special operations: Purpose, Simplicity, Speed, Security, Repetition, and Surprise. He writes, “Deception
when it works, either directs the enemy’s attention away from the attacking force or delays his response
long enough for surprise to be gained at the crucial moment.” Quoted in William H. McRaven, Spec Ops:
Case Studies in Special Operations Warfare: Theory & Practice (Novato, CA: Presidio, 1995).
69
Joint Chiefs of Staff, Special Operations, II–3.
3
3. Case Analysis
On the night of November 23, 2008, ten Lashkar-e-Taiba (LeT) terrorists and
their handlers boarded a rented vessel in Karachi, Pakistan, and began their journey
toward Mumbai. After entering Indian territorial waters, they seized an Indian fishing
vessel, the MV Kuber, and transferred the ten attackers to the hijacked ship while moving
the Kuber’s crew, except its captain, to their rented vessel. Forcing the captain’s
cooperation, the Kuber then made the 550 nautical mile trip back toward Mumbai. Four
miles outside Mumbai, the terrorist killed the Kuber’s captain and deployed their
inflatable dinghy. After abandoning the Kuber under cover of darkness on 26 November,
the ten terrorists transited to the Badhwar Park Jetty in Mumbai, where four of five two-
man teams went ashore. The remaining team used the dinghy to approach their first target
from the water. Once ashore, the pairs used local taxis to move to their primary targets.70
Until they drew their weapons at the first set of targets, the LeT attackers
remained unnoticed. Starting at the port of Karachi, they had clandestinely transited
roughly 600 miles and infiltrated the densely populated, urban center of Mumbai. After
indiscriminately killing and wounding scores of people during three near-simultaneous
attacks at a train station, a café, and the famous Taj Mahal Hotel, the attackers were able
to move to additional targets. Sieges ensued at a Jewish center, the Trident-Oberoi Hotel,
and the Taj Mahal Hotel, with the terrorists taking hostages and barricading themselves
within the respective structures while Indian security forces responded. For nearly three
days, Indian security forces struggled to apprehend the ten LeT attackers. With no
exfiltration plan, the terrorists eventually followed through on their intended
“martyrdom.” The security forces killed all but one by the end of the day on November
29th.71
3
70
Stephen Tankel, Storming the World Stage: The Story of Lashkar-e-Taiba (Oxford: Oxford
University Press, 2013).
71
Tankel: 219.
3
square kilometer.72 For comparison, the population density of New York City, New
York, was reported at 11,000 people per square kilometer in 2019. 73 Of note, Mumbai is
listed among the top ten most densely populated cities in the world.74
Mumbai residents had recent exposure to anti-Indian terrorists. Just two years
prior, in 2006, LeT members placed bombs on Mumbai commuter trains, killing more
than 180 people. Therefore, we can presume that Mumbai residents would be unlikely to
ignore evidence of an imminent or ongoing attack and would consequently alert
authorities and other civilians with any mobile devices they had available. Despite a
relatively low per capita number of mobile subscriptions (29 per 100 people), Twitter
reported that during the attack there were 70 tweets every five seconds describing the
events.75 Therefore, we assess a very high likelihood of reporting, which compensates for
the lower number of devices. Thus, Mumbai was a high population density and high
connectivity environment.
Not only is Mumbai densely populated on land, but everything from container
ships to a vast fleet of small fishing boats crowd its harbor. LeT’s use of both a fishing
boat to make the long transit from Karachi to Mumbai and the insertion via dinghy took
maximum
72
“City Population—Population Statistics in Maps and Charts for Cities, Agglomerations
and Administrative Divisions of All Countries of the World.” Accessed December 2, 2018.
https://www.citypopulation.de/.
73
“U.S. City Populations 2019,” accessed April 29, 2019, http://worldpopulationreview.com/us-
cities/.
74
“The World’s Most Densely Populated Cities,” WorldAtlas, accessed May 9, 2019,
https://www.worldatlas.com/articles/the-world-s-most-densely-populated-cities.html.
75
Claudine Beaumont, “Mumbai Attacks: Twitter and Flickr Used to Break News,” November 27,
2008, sec. World, https://www.telegraph.co.uk/news/worldnews/asia/india/3530640/Mumbai-attacks-
4
Twitter-and-Flickr-used-to-break-news-Bombay-India.html; Murphy and Roser, “Internet.”
76
Tankel, Storming the World Stage : The Story of Lashkar-e-Taiba: 209.
4
advantage of this difficult-to-police domain. Maritime patrolling is a resource-demanding
task. Maharashtra State, which governs Mumbai, had turned down an additional 26 patrol
craft from the Indian government because the state could not afford to maintain them. 77
Additionally, the use of local taxis to approach their initial targets enabled the attackers to
remain unnoticed despite being in an urban metropolis.
One could argue that the operation was unsuccessful because the terrorists were
eventually all killed or captured. Debriefs with the sole surviving attacker, David Headley
(born Daood Gilani), however, indicate that the operation’s planners initially
contemplated having an exfiltration plan but shifted to an intentional “martyrdom”
operation to garner more public attention.78 Had the attackers only struck their initial
three targets of the train station, café, and Taj Mahal Hotel then commenced an
exfiltration, it is imaginable that they could have escaped death or capture. Instead, they
deliberately hunkered down and awaited the slow response of India’s security forces.
77
Ayesha. Jalal, Partisans of Allah: Jihad in South Asia (Cambridge, Mass: Harvard University Press,
2008), 25.
78
Tankel, Storming the World Stage: The Story of Lashkar-e-Taiba, 228.
4
complexities of a megacity demand the existence of governing bureaucracies that can
provide general services and security to the population. Even so-called ungoverned
spaces may have an informal governing body. These bureaucracies may be state or non-
state actors with legal or illegal authorities, yet they play a role in the security.
Vulnerabilities of security bureaucracies like shortfalls of imagination and failures to
cooperate between jurisdictions will likely result in physical avenues of approach that
SOF can utilize.
4
79
Sunzi, The Art of War.
80
Philip D. Bougen and Pat O’Malley, “Bureaucracy, Imagination and U.S. Domestic Security
Policy,” Security Journal 22, no. 2 (2009): 101, https://doi.org/10.1057/palgrave.sj.8350078.
4
organized criminal groups, Gernot Morbach identifies some of the reasons why the
international community struggles to apprehend transnational criminals. Specifically, he
argues that states consistently want to fight crime under their own laws, and therefore are
biased against international cooperation. As a result, international crime goes unpunished
in exchange for states maintaining their desired law enforcement sovereignty.81 This
pattern serves as an example of how crowding of the security domain, as one would
likely see in the future operating environment, can result in an opportunity for the
infiltrating force. The study of how jurisdictions impact security operations typically
relates to countering organized crime and terrorism, but it offers a fresh perspective on
how an infiltrating force can leverage cognitive defilade to achieve its goals. The same
reluctance of security forces to cooperate at the international level is possible at
provincial and regional levels, as evidenced by the second case study in this section.
Security forces operate under some form of bureaucracy. Bureaucracies are good
at dealing with the expected.82 Natural disasters and terrorist attacks have shown us that
bureaucracies are terrible at dealing with the unexpected.83 What this means for an
enemy defensive system is that in the future, military defenses against SOF infiltration
will be geared to counter the most likely traditional infiltration methods. After all, every
potential adversary is limited to some extent by resources and must, therefore, accept
compromises in certain areas to bolster others. Consequently, we should recognize what
these expected deterrents to infiltration are and then alter our methods accordingly.
81
Gernot W. Morbach, “Terrorism and Organized Crime: The Alliance of Tomorrow? How
to Counter a Possible Future Threat.” (Master’s thesis, Naval Postgraduate School, 1998).
82
Bougen and O’Malley, “Bureaucracy, Imagination and U.S. Domestic Security Policy.”
83 Bougen and O’Malley.
4
environments. Successful criminals know how to identify the vulnerable points in what
may, at first consideration, appear to be a thorough defense.
3. Case Analysis
We will analyze three cases that illuminate aspects of our theory. A helpful lens
through which to consider the security vulnerabilities stemming from cognitive oversight
and bureaucratic shortfalls is the way in which thieves operate. Thieves intending to steal
high-value prizes are up against robust security countermeasures. Modern perpetrators of
bank and jewelry heists face advanced alarm systems, reinforced buildings or vehicles,
short police response times, and the fact that so many methods of entry have been tried
and are well defended. As a result, to succeed, thieves must strive to use “outside the
box” thinking to achieve their end goal. An excellent example of creative thinking to
overcome bureaucratic constraints and cognitive oversight is the 2009 robbery of the G4S
Cash Depot in Sweden. An account of the heist follows:
“At 5:15 AM on September 23, 2009, four thieves landed a stolen Bell
206 Jet Ranger helicopter on the roof of the G4S Cash Depot in Vastberga,
Sweden. Breaking into the depot through a large pyramid-shaped skylight,
the thieves descended via custom-length ladders to the depot’s counting
room. Breaking through the door using custom-fit explosives, the thieves
opened the depot’s cash cages with the assistance of a circulating saw.
Twenty minutes after they landed, the thieves ascended to the roof and
took off with $6.1 million (FY12) in cash. Thanks to a tip-off from the
Serbian foreign ministry, Swedish police had been expecting a helicopter
assault on a large cash depot in September, but they were not expecting
that the thieves would actively hinder a police response by spreading
caltrops across roads near the depot and placing packages resembling
bombs outside the police heliport.”84
The G4S robbery highlights a number of the concepts contained in our theory of
future SOF infiltration. First, their use of a helicopter for a vertical approach to the bank
demonstrates a cognitive shortfall by the bank’s security team, which had fortified
ground level entrances but had not conceived of an airborne entry into the vault.
Secondly, the thieves played off bureaucratic protocols of the responding security units
by placing fake
84
Jarret Lafleur et al., “The Perfect Heist: Recipes from Around the World” (Albuquerque, NM:
4
Sandia National Laboratories, March 2015).
4
bombs on the building’s roof. As members of a protocol driven organization, the Swedish
police were forced to stop and deal with the potential bombs before pursuing the
criminals. Lastly, while the Swedish police did receive the tip-off from the Serbian
government, it occurred just before the robbery and left little time for the Swedes to
emplace defensive measures. As such, it demonstrates how the thieves benefited from the
bureaucratic delay between the two governments’ security organizations.
We propose that the problem-solving approach used by the thieves is one that
SOF planners might benefit from when infiltrating the millennial battlespace. The
thieves’ recognition of both the physical vulnerability of the bank’s rooftop paired with
the fact that information transmission from the Serbian to Swedish government would
have some sort of delay and distortion would aide SOF in successfully infiltrating a high
population density, highly connected future environment.
During a deployment to the U.S. Central Command in 2017, this thesis’ author
observed that Islamic State in Iraq and Syria (ISIS) supply routes and bases of operations
frequently lay along national and provincial borders. After further investigation, it
appeared that the local military commanders assigned to secure their respective provinces
were extremely reluctant to conduct operations near the borders of their jurisdictions.
This tendency was due to the fact that the commanders had finite resources, and if the
enemy was located on the border of their jurisdiction and another commander’s, they
would much rather the other expend his resources to solve the problem. As a result, often
neither would launch operations along these jurisdictional borders and the enemy’s
activities would continue unhindered. The fact that ISIS’ final major territorial
strongholds were on the border of Iraq and Syria in the city of Baghouz, Syria, suggests
that this pattern can exist at an international level as well.85
It is not the case that jurisdictional borders are entirely open for infiltration.
However, we propose that there is an incentive for those in charge of securing the areas
on either side to withhold from responding to threats in the hopes that the other
commander
4
85
“Coalition Warplanes Hit Last ISIS Enclave in Eastern Syria | CBC News,” accessed April 26,
2019, https://www.cbc.ca/news/world/syrian-democratic-forces-fight-isis-baghouz-1.5013866.
4
will expend his own resources to do so. This jurisdictional rivalry creates a delay in
reaction that would otherwise not exist. Incorporating this understanding into SOF
infiltration planning can aid in identifying potentially vulnerable points in the enemy’s
defense.
Smugglers’ along the U.S. and Mexican border demonstrate an infiltration method
that combines cognitive oversight and jurisdictional gaps. With increasing pressure on
drug cartels by U.S. Customs and Border Protection (CBP) and the Drug Enforcement
Agency (DEA), smugglers turned to a subterranean network of both pre-existing and
newly constructed tunnels to move illicit goods across the U.S./Mexico border. U.S. law
enforcement identified the highest concentration of tunnels in Nogales, Arizona, which
lies across the border from Nogales, Mexico. From the first tunnel discovery in 1990
through 2014, CPB located 102 tunnels dug by criminals.86 CBP classifies tunnels in
three categories: rudimentary, interconnecting, and sophisticated.87 While rudimentary
and sophisticated are independent of existing infrastructure, interconnecting tunnels
exploit cognitive oversight. Interconnecting tunnels are short spans that breach existing
drainage networks, allowing criminals to tap into the elaborate and largely unmapped
system of storm drains on both sides of the border. Once inside the system of
subterranean pathways on the U.S. side, smugglers can move drugs, people, and terrorist
materials further North and away from the heavily monitored border.88 Because the
bureaucracies on either side of the border did not consider the drainage system as a
potential infiltration avenue due to a lack of imagination, smugglers were able to
effectively circumvent robust defenses above ground.
Smugglers use of tunnels not only exploits the fact that CBP and DEA until
recently did not think to fortify underground access points against infiltration, but it also
takes advantage of the jurisdictional gap along the border. In order to identify potential
tunnel
86
Jason McCammack, “What Lies Beneath | U.S. Customs and Border Protection,” accessed May 8,
2019, https://www.cbp.gov/frontline/what-lies-beneath.
5
87
McCammack.
88
McCammack.
5
entries on the Mexico side, U.S. authorities must cooperate with Mexican authorities. 89
Regardless of how smooth this cooperation is, it inevitably contains friction points with
regards to sharing of intelligence and physical access for U.S. personnel to investigate on
Mexican soil.90 As a result, those defenders against subterranean infiltration must
overcome both the lack of information on the location of tunnels and jurisdictional gaps
that arise when cooperating with Mexican authorities.
Decades of urban fighting and the occasional attempt at SOF infiltration into high
population density environments has revealed several lessons learned with regard to large
force concentrations. Infiltration in the millennial battlespace cannot rely on superior
numbers and overwhelming firepower to be successful. A large infiltration force will
undoubtedly be immediately detected and will encounter a reduced enemy response time
in a highly connected and densely populated environment. Instead, a SOF force divided
into smaller units, synchronized and coordinated toward the same objective, will be
necessary.
Lessons learned from U.S. and non-U.S. campaigns in the urban environment
from 1980 to 2015 indicate that units must not only be smaller but also be able to move
independently at a tactical level.91 Regardless of whether the force is conventional
military or special operations, complexity increases in urban warfare due to the
physical
89
“Nogales Tunnel Task Force, Mexican Authorities Shut down Incomplete Drug Tunnel,” accessed
May 8, 2019, https://www.ice.gov/news/releases/nogales-tunnel-task-force-mexican-authorities-shut-down-
incomplete-drug-tunnel.
90
Sigrid Arzt, “US-Mexico Security Collaboration: Intelligence Sharing and Law Enforcement
Cooperation,” Shared Responsibility. US-Mexico Policy Options for Confronting Organized Crime, 2010,
351–69.
91
The Asymmetric Warfare Group states in their report, “Modern Urban Operations,” illustrated that
urban warfare “necessitates decentralized, small-unit operations at the tactical level” in which “small-unit
commanders must be resourced and empowered to operate independently based on mission command.”
Quoted in “Modern Urban Operations: Lessons Learned from Urban Operations from 1980 to the
5
Present” (Asymmetric Warfare Group, November 2016), 2.
5
characteristics of the environment that greatly favor the defender and increase the
resource demand of the attacker.92 The concept of shrinking the problem is one that is
applied as a means of countering the complexity of the urban environment by reducing
the size and thus the complexity of the assaulting force.93 This idea is executable by
reducing the physical size of the unit to shape it to the problem and by employing tactics
which minimize the effects of the environment on the mission.
Doctrinal references for optimal unit size for an infiltration echo those for urban
operations. Simplicity is an essential principle for successful special operations as it is for
an infiltration. As the force size and number of units involved increases, so do the
complexity and risk level of the mission.95 The risk mitigation measures required to plan
an infiltration mission do not lend themselves to a large force, as additional operators
92
“Modern Urban Operations: Lessons Learned from Urban Operations from 1980 to the
Present” (Asymmetric Warfare Group, November 2016), 2.
93
In the work Reimagining the Character of Urban Operations for the U.S. Army, RAND presents
the concept of “shrinking the problem” of urban operations by developing a “conceptually appropriate way
to reduce the magnitude of an urban environment to the point where military forces can exploit localized
nuances to operational effect.” Quoted in Gian Gentile et al., “Reimagining the Character of Urban
Operations for the U.S. Army” (Santa Monica, CA: RAND Corporation, 2017),
https://www.rand.org/pubs/research_reports/RR1602.html.
94
McRaven, Spec Ops: Case Studies in Special Operations Warfare: Theory & Practice.
95
The United States Army and Marine Corps technique publication, ATP 3–06: Urban Operations
discusses the force size for infiltration in that, “the difficulty of infiltration attacks increases with the size
and number of units involved.” Quoted in Department of the Army, Urban Operations, ATP 3–06
(Washington, DC: Army Publishing Directorate, 2017), 4–6.
5
increase contact with a potentially hostile population.96 Ultimately, special operations
infiltration into the millennial battlespace necessitates a smaller, dispersed force that can
consolidate at a single specified target objective.97
Case Analysis
96
Joint Publication JP 3-06: Joint Urban Operations, states that “Infiltration depends on situational
awareness and understanding of the urban area, careful selection of objectives, detailed planning, and
efficient support and deception. Infiltration is not likely to be attempted by large conventional forces, but
rather small units. A hostile civilian population reduces the prospects for success.” Quoted in Joint Chiefs
of Staff, Joint Urban Operations, JP 3-06 (Washington, DC: Joint Chiefs of Staff, 2013).
97
Department of the Army, Urban Operations, 4–18.
5
98
McRaven, Spec Ops: Case Studies in Special Operations Warfare: Theory & Practice, 8.
5
to the smaller units.99 Due to the speed with which the five two-man teams of terrorists
moved from target to target, and because the multitude of reports reached authorities with
varying speed and accuracy, the Indian authorities believed that there was a much larger
attacking force than merely ten men.100 Along with the element of surprise and
convincing disguise, the decision to shrink the problem by splitting into small
coordinated groups contributed significantly to LeT’s disproportionate effects. SOF
forces will have to adopt a similar distribution of forces to infiltrate the millennial
battlespace, especially considering the defender’s detection capabilities will improve, and
SOF is subject to ethical and legal constraints which terrorists are not.
99
Tankel, Storming the World Stage: The Story of Lashkar-e-Taiba, 215.
100 Tankel, 215.
101
Kevin Govern, “Operation Neptune Spear: Was Killing Bin Laden a Legitimate Military
Objective?,” in Targeted Killings: Law and Morality in an Asymmetrical World (Oxford University Press,
2012), 355.
102
Peter L. Bergen, Manhunt: The Ten-Year Search for Bin Laden from 9/11 to Abbottabad, 1st ed.
(New York: Crown Publishers, 2012), 215.
5
103
Bergen, 215.
5
residents. After about an hour and a half, the helicopters arrived at Abbottabad from the
northwest. They avoided the population to the north before hugging the sparsely
populated foothills to the east of the city and ultimately turning on the shortest path
directly to the compound.104 Bin Laden’s compound was a one-acre complex with a
three-story building surrounded by twenty-foot walls at the end of a dirt road in the
middle of Bilal Town.105 Bilal Town is an affluent Abbottabad, Pakistan, suburb
surrounded by golf courses and the Pakistani Military Academy.106
We assess that the population density is high in this case. The city of Abbottabad
is a suburban mountain retreat for wealthy individuals to escape from the heat of
Islamabad.107 The population of Abbottabad in 2011 was approximately 150,000 people,
based on census interpolation, and the urbanized area was 89 square kilometers. 108 As a
result, the population density was 1685 people per square kilometer. 109 By comparison,
Abbottabad in 2011 had approximately the same population density as Grand Junction,
Colorado or Tuscaloosa, Alabama today.110
The connectivity level for Pakistan and Abbottabad was high. Penetration of
broadband internet access, let alone access to land connected internet network, paled in
comparison to the rest of the world at the time; however, mobile cellular subscriptions
were
104
Bergen, 215.
105
Mark Bowden, The Finish: The Killing of Osama Bin Laden (London: Grove Press, 2012), 134.
106 Bowden, 134.
107
Nicholas Schmidle, “Getting Bin Laden: What Happened That Night in Abbottabad,” The New
Yorker, August 8, 2011, https://www.thomasweibel.ch/artikel/110808_new_yorker_getting_bin_laden.pdf.
108
Thomas Brinkhoff, “City Population—Population Statistics in Maps and Charts for Cities,
Agglomerations and Administrative Divisions of All Countries of the World,” City Population,
accessed September 2, 2018, https://www.citypopulation.de/.
109
The population size and density of Pakistan and, more specifically Abbottabad, in 2011 cannot be
precisely measured because census data is only available from 1998 and 2017. However, we can
interpolate between the two censuses to get an approximate value. These databases are available at
www.citypopulation.de/ and the Pakistan Bureau of Statistics at United Nations, Pakistan: Population
Density (as of 26 August 2013) (United Nations Office for the Coordination of Humanitarian Affairs,
August 26, 2013), https://reliefweb.int/map/pakistan/pakistan-population-density-26-august-2013.
110
“Population Density for U.S. Cities Statistics,” Governing, accessed November 15, 2018,
5
http://www.governing.com/gov-data/population-density-land-area-cities-map.html.
6
very prevalent. The Pakistani population had 62 mobile subscriptions for every 100
people in 2011.111
The infiltration force arrived on the target at one o’clock in the morning, when
they would have the longest period of darkness during which to conduct the assault. The
SEALs had planned and rehearsed their actions to allow for no more than 30 minutes on
the ground, which they assessed to be the response time of an alerted Pakistani military.
There was no planned air superiority nor any close air support aircraft. This decision was
intended to prevent the Pakistani air forces from being alerted to the presence of the
infiltration force and reduce the overall signature of the infiltration. The only additional
forces were a quick
111
Murphy and Roser, “Internet.”
112
Cathy Scott-Clark, The Exile: The Stunning inside Story of Osama Bin Laden and Al Qaeda in
Flight (New York: Bloomsbury, 2017), 420–25; Oriana Pawlyk, “The Days of Secret Military Operations
May Soon Be Over. Does That Matter?,” Military.com, December 1, 2018,
https://www.military.com/daily-news/2018/12/01/days-secret-military-operations-may-soon-be-over-does-
matter.html.
6
113
Schmidle, “Getting Bin Laden: What Happened That Night in Abbottabad.”
114
Bergen, Manhunt: The Ten-Year Search for Bin Laden from 9/11 to Abbottabad, 183.
6
reaction force (QRF) that followed on three MH-47 Chinooks and were waiting outside
the city limits in the event that the assault force became overwhelmed.115
The helicopters successfully arrived at the target compound without alerting the
occupants or the Pakistani military. The plan was to fast-rope the force onto the roof and
inside the internal walls. However, one of the helicopters lost control and managed to
execute a controlled crash into an animal pen outside of the interior walls. 116 Fortunately,
no one was injured, so the assault force exited the aircraft and proceeded on the mission.
For the next 38 minutes, the SEALs cleared the three-story building room by
room in search of bin Laden. Meanwhile, the noise of the crash, explosions, and gunfire
alerted the civilian neighbors who began to investigate after about 15 minutes. 117 One
citizen, Sohaib Athar, live-tweeted the incident, commenting that “Helicopter hovering
above Abbottabad at 1 AM (is a rare event).”118 At this point, the connectivity of the
local population compromised the mission. The interpreter with the assault force
managed to control the crowd long enough for the SEALs to finish the operation, destroy
the damaged helicopter, and extract via one of the waiting Chinooks. 119 The U.S. forces
sustained no casualties throughout the mission, and the Pakistani army did not respond.
Only after the helicopters departed the area did the Pakistani military respond with two F-
16s, but the helicopters were never detected or under threat.
The mission was deemed a success because it resulted in Osama bin Laden’s
death and the collection of a large amount of intelligence. It was, however, marred by the
loss of the stealth helicopter and compromised by a civilian bystander who revealed
information about the mission to approximately one billion people with access to social
media.120
115
Bergen, 215.
116
Schmidle, “Getting Bin Laden: What Happened That Night in Abbottabad.”
117
Mark. Owen, No Easy Day: The Autobiography of a Navy SEAL: The Firsthand Account of the
Mission That Killed Osama Bin Laden (New York, N.Y.: Dutton, 2012), 250.
118
Pawlyk, “The Days of Secret Military Operations May Soon Be Over. Does That
Matter?” 119 Schmidle, “Getting Bin Laden: What Happened That Night in Abbottabad.”
6
120
Pawlyk, “The Days of Secret Military Operations May Soon Be Over. Does That Matter?”
6
The case of OPERATION NEPTUNE SPEAR exemplifies a small unit special
operations infiltration into an urbanized, high connectivity environment. The infiltration
force knew that they would face a variety of challenges that increased the risk of being
detected by the Pakistani military and population. There was serious risk that Pakistan’s
robust air defense system would detect the helicopters and launch fighters to intercept
them. By shrinking the problem, the small size of the infiltration force helped to reduce
the risk of detection because there was less chance that they would be picked up on radar
or be seen or heard by the population during the infiltration. These risk mitigation
measures enabled the assault force to reach the target undetected. Only after several
minutes in the target area and one of the helicopters crashing did civilians in the area
detect the assault force. Fortunately, the surrounding population was not particularly
hostile, or it may have overwhelmed the small force. This case demonstrates how a small
force size reduces the chance that a passive observer will have an opportunity to detect an
infiltration.
Trends in communication and data processing have the potential to level the
proverbial playing field in the cyber domain between SOF and enemy adversaries. The
enemy will have increased situational awareness of an infiltrating SOF unit, and therefore
SOF forces must have specialized cyber warriors with the necessary resources and skills
to ensure the success of the infiltration. These cyber specialists should be able to manage
the friendly cyber signature, support deceptions with cyber based information operations,
exploit the enemy’s cyber signature, and monitor online reflections about operations in
real-time.
121
Miniwatts Marketing Group, “World Internet Users Statistics and 2019 World Population
6
Stats,” March 2019, https://www.internetworldstats.com/stats.htm.
6
to the entire population by 2030 through sustainable development. 122 While globalization
and advances in technology will certainly help to improve living conditions and reduce
poverty, it will paradoxically result in emboldening and empowering anti-establishment
groups, potentially leading to greater conflict.123 The paradox is both promising and
ominous as special operations forces may find themselves facing numerous, highly-
connected groups in unfamiliar environments.
122
McCarthy, “United Nations Pledges to Get Everyone Online...by 2030.”
123 “Global Trends Home Page.”
124
Eric Leonhardi, Mark Murphy, and Hannah Kim explore this subject in their NPS thesis,
“Analysis of Department of Defense Social Media Policy and its Impact on Operational Security”
specifically concerning Operational Security (OPSEC) for military operations. Quoted in Eric V.
Leonhardi, Mark Murphy, and Hannah Kim, “Analysis of Department of Defense Social Media Policy
and Its Impact on Operational Security” (Master’s thesis, Naval Postgraduate School, 2015), 15.
125
Patrick M. Gillen, “Real-Time Detection of Operational Military Information in Social Media”
(Master’s thesis, Naval Postgraduate School, 2015).
126
Gillen, 52.
127
Karthik Kambatla et al., “Trends in Big Data Analytics,” Journal of Parallel and Distributed
Computing 74, no. 7 (2014): 2570, https://doi.org/10.1016/j.jpdc.2014.01.003.
128
Daniel O’Leary, “Artificial Intelligence and Big Data,” IEEE Intelligent Systems 28, no. 2
6
(April 2013): 99, https://doi.org/10.1109/MIS.2013.39.
6
an adversary to collect, aggregate, and interpret enormous amounts of real-time data and
pose a credible threat to SOF infiltration.
In the millennial battlespace, integrated air defense systems will not be the only
means of detecting an airborne infiltration, nor will closed-circuit televisions (CCTV)—
like in Beijing, China or London, England—be the only way to monitor ground
movements in urban areas.129 Instead, a population connected through personal devices,
social media, and other means will create a network of passive and active sensors which
can be exploited by both defender and attacker. A simple Twitter post of an aircraft flying
overhead from a casual observer or a photograph of a suspicious looking vehicle driving
in a neighborhood could compromise a SOF infiltration. In states with fewer privacy laws
than the U.S., personal devices may have software forcibly installed which allows the
state to monitor the microphone, camera, and location at all times, providing a steady
stream of observational data. Doing so would turn both witting and unwitting civilians
into sensors feeding a central processing node. In an era when data-processing
capabilities are rapidly expanding through machine learning and AI, this metadata could
potentially enable a rapid response to a security threat.
SOF must evolve its employment of cyber forces to be effective in the millennial
battlespace. While cyber forces currently support SOF operations in a complementary
129
“Top 5 Cities with the Largest Surveillance Camera Networks,” vintechnology.com, May 4, 2011,
https://vintechnology.com/2011/05/04/top-5-cities-with-the-largest-surveillance-camera-networks/.
6
capacity, their integration and role are insufficient and generally reactionary. 130 A SOF
infiltration in the millennial battlespace will require a more robust and dedicated cyber
element embedded into the unit, directly supporting and even accompanying the assault
force. The cyber operator must be specially trained in the nuances of SOF operations and
play an offensive and defensive role by facilitating both deception and physical
disruption of the network of passive sensors embedded in the population. SOF will
require the ability to monitor and disrupt friendly and enemy social media activity for
specific signatures that may compromise the mission.
3. Case Analysis
Twitter is one of the most popular social media platforms in the region, and it also
has a program that can “scrape” past tweets, searching for specific hashtag phrases.133
130
Clint Tracy, “Operationalizing Cyber, Electronic Warfare, Space, Special Technical Operations for
Decisive Action,” Fires, 2018, 11.
131
Brinkhoff, “City Population—Population Statistics in Maps and Charts for Cities,
Agglomerations and Administrative Divisions of All Countries of the World.”
132
Murphy and Roser, “Internet.”
133
“Japan: Social Network Audience Reach 2017 | Statistic,” Statista, accessed September 10, 2018,
https://www.statista.com/statistics/258849/most-popular-social-networks-in-japan-ranked-by-reach/.
7
Comparison of tweets to actual flight data from Detachment 353 reveals correlation that
an adversary could exploit. We observe that there is a distinct spike in Twitter posts
during flying periods on a given day. Notably, on July 26, 2018, Figure 1 shows this
correlation.
Analysis of the tweets reveals that posts consisted of photographs, videos, and
comments concerning the Osprey during its flying period (Figure 2); posts during the
non- flying period show non-specific posts and retweets regarding the presence of the
Osprey in Japan. The concentration in Twitter activity that occurs spatially during the
flying period correlates to the spike in activity temporally. In conjunction with the
content from the actual posts during the flying period, there is evidence that social media
activity could function as an early warning system to locate a SOF infiltration force in a
similar environment.
7
This example is not applicable to every environment and threat; however, the
findings reveal some essential indicators about the challenges traditional SOF infiltration
will face in the millennial battlespace. A highly connected population, with a
predisposition to report activity, could compromise security and the ability to maintain
surprise during an infiltration mission. Regardless of whether the population is friendly or
hostile, this brief but powerful example demonstrates that a SOF aircraft could be
detected and located both temporally and spatially with enough accuracy that an opposing
force could be alerted to their arrival well in advance. The Twitter activity would need to
be able to be monitored in real time, and analyzed for key terms that would signal special
operations activity. Additionally, the population would have to be active enough on social
media to post at a frequency necessary to provide a spike in activity. Ultimately, as
Twitter and other social media scrubbing algorithms learn how to better “read” the
context of tweets, and adversaries can process more social media data from decentralized
sources faster, it will likely become easier to spatially and temporally detect where SOF
aircraft are operating using this method.
7
A state that closely monitors its citizens’ communications could detect,
coordinate, and react against an infiltration. While this notion may seem far-fetched, there
is at least one contemporary example of such a system already in place. The Chinese
government has constructed a multi-faceted surveillance apparatus in its Xinjiang
province that resembles a dystopian science fiction society.
Xinjiang Province is roughly 1500 miles west of Beijing and borders Tibet, India,
Mongolia, Russia, Kazakhstan, Kyrgyzstan, Tajikistan, Afghanistan, and Pakistan. It is
home to the Uyghur ethnic group, a Turkic people who follow Islam. China has
historically struggled to maintain control in this vast region.134 After a series of fatal riots
in 2009 and bombings in 2014 attributed to Xinjiang-based militants, the Chinese
government launched an internal security campaign called, “The Strike Hard Campaign
Against Violent Terrorism.”135 This effort entailed a massive increase in surveillance and
population coercion measures. According to a Chinese human rights lawyer, the cutting-
edge technologies used in Xinjiang will appear soon in other parts of China.136
134
Elizabeth Van Wie Davis, “Uyghur Muslim Ethnic Separatism in Xinjiang, China,” Asian Affairs:
An American Review 35, no. 1 (2008): 15–30, https://doi.org/10.3200/AAFS.35.1.15-30.
135
Doyon, “Counter-Extremism’ in Xinjiang: Understanding China’s Community-Focused Counter-
Terrorism Tactics.”
136
Josh Chin and Clement Burge, “Twelve Days in Xinjiang: How China’s Surveillance State
Overwhelms Daily Life,” The Wall Street Journal Eastern Edition, December 20, 2017.
137
“Eradicating Ideological Viruses: China’s Campaign of Repression Against Xinjiang’s
Muslims” (Human Rights Watch, September 2018), 12,
7
https://www.hrw.org/sites/default/files/report_pdf/china0918_web.pdf.
7
tracking of private vehicles, and spyware in Uyghurs’ smartphones.138 Though it is
unclear if the entire system is in place currently, China’s stated goal of consolidating the
information from the various sources and processing it with AI would enable personnel at
its “convenience police stations” to rapidly interdict individuals suspected of
“extremism.”139
138
Doyon, “Counter-Extremism’ in Xinjiang: Understanding China’s Community-Focused Counter-
Terrorism Tactics.”
7
139
Doyon.
7
paint a vivid picture of the millennial battlespace. To infiltrate this environment, SOF will
need specialized cyber forces that can anticipate, neutralize, and leverage this massive
network of sensors upon which a defender relies.
7
THIS PAGE INTENTIONALLY LEFT BLANK
7
III. RECOMMENDATIONS AND CONCLUSION
The time to transform our SOF units to infiltrate the future environment is now.
Using our theory to guide our recommendations, we will suggest concrete steps that SOF
must take today to adapt to the changing requirements of the high population density,
high connectivity environment. Simply making small tweaks to decades-old training,
tactics, and technology does not address the rapidly changing nature of the future
battlefield. Our recommendations stem from the theory of infiltration and our study of the
future battlefield.
1. Training
7
would. Doing so with maritime, ground, and aerial platforms will enable SOF to delay
detection and increase the enemy’s reaction time.
8
Part of neutralizing the defender’s advantage in an urban environment will be the
use of above—and below—ground infrastructure to travel. To do so, SOF must train at
underground navigation. This training will depend on available navigation technology
that is not reliant on the global position system (GPS). To start, however, SOF units
should merely begin by practicing moving through the underground infrastructure of
cities in controlled training environments.
The apparent difference in physical appearance between most SOF members and
the populace in the areas SOF will operate poses a severe risk of detection. As such, SOF
should treat physical disguise as a core skill set, like shooting and combat medicine.
There is no reason that SOF should not be employing the techniques of cinematic make-
up artists to change members’ appearances to match those of the operating environment.
Like the use of indigenous vehicles, expert physical disguises can delay detection enough
to prevent an effective enemy reaction at a very low cost.
SOF must adopt a new perspective on the social media signature of its members
to facilitate infiltration. Historically, social media use is tolerated in SOF but viewed as a
nuisance to be constrained and ideally eliminated due to the amount of compromising
personal and unit information that an adversary could glean from it. Attempting to curb
that use is not only an uphill battle for SOF leaders but potentially counterproductive.
With the prevalence of social media use today, a sudden lack of activity by a SOF
member that is normally very active is also a data point for the enemy. SOF must not
only train members to restrict the accurate information they publicize; with a studied
8
understanding of how
8
social media activity informs the enemy, SOF can then deliberately manipulate its online
signature to support deception and aide in infiltration.
2. Tactics
Historically, SOF has sought infiltration routes that avoid high concentrations of
traffic. In the future environment, it must do the opposite. Using indigenous infiltration
platforms along the paths of high traffic concentration gives the advantage to the SOF
unit over the enemy security forces trying to find the “needle in the haystack.” LeT’s
maritime infiltration of Mumbai harbor by blending in with the mass of small fishing
boats exemplifies this tactic.
Just as we must train SOF members on how social media use influences the
enemy’s intelligence, tactically leveraging this understanding is critical to conducting
infiltration. After acknowledging the enemy’s capability to identify patterns among SOF
social media accounts that forewarn of an infiltration, the next step is to incorporate this
understanding into Information Operations (IO) and Psychological Operations (PSYOP).
Doing so would turn a vulnerability into an asset to use in support of SOF operations.
Essentially, if we know what patterns the enemy looks for to identify an imminent
operation, we can either artificially create the impression of a diversionary operation or
deliberately refrain from sending such signals.
8
3. Technology
The United States military has often been at the forefront of communications
technology. Some of the most sophisticated and secure communication and data systems
completely changed how we conduct warfare. Data links between air, ground, sea, and
spaceborne assets aid in synchronization and coordination of the battlespace on a grand
scale. Advancements are leveling the proverbial playing field with the enemy, which
means that SOF must adapt. Currently, data link and high bandwidth voice and video
communication are only available through equipment mounted in vehicles. Once the
ground force leaves the vehicle, their access to information is usually limited to only
voice. As tactics adapt to address the new environment, units will need to be divided into
smaller teams and utilize multiple modes of transportation. This shift will require more
coordination between the mission commander and individual elements. SOF units must
take advantage of the rapid advancements in communication technology by scaling the
data link down to the single soldier. This capability will allow the SOF unit to simplify
the problem by having a smaller force but also maintain relative superiority with
unparalleled situational awareness during the mission. While the technology may not yet
exist, it could take the form of a helmet integrated heads up display, goggles, or another
wearable device. SOF units should leverage advanced communications technology and
the high connectivity environment to maintain situational awareness, coordinate
movements, and precisely time assaults.
8
vehicles, and small, maneuverable aerial platforms will satisfy mobility capability
requirements of future infiltration. Considering that SOF will likely not avoid detection,
they must strive to delay it. Increased speed of travel is essential to stalling the enemy’s
response. As such, SOF units must invest in vehicles capable of higher speeds to increase
the time from detection to enemy reaction.
The tight physical spaces and vertical development of a megacity are not
conducive to the traditional SOF infiltration aerial vehicle. Transmission lines, antennas,
spires, traffic lights, etc., all pose a hazard for helicopters in the urban environment. Even
though SOF units currently train for urban infiltrations, an enemy can easily protect their
structure from traditional platforms with simple homemade defenses. In the millennial
battlespace, the enemy will leverage the defensive advantages inherent to the urban
environment wherever they can. Consequently, SOF must adopt aerial vehicles that are
small and maneuverable enough to negotiate the three-dimensional space of a city with
the ability to fly in between structures and light enough to land nearly anywhere. These
smaller aircraft will naturally facilitate division into smaller, more maneuverable and
coordinated elements necessary for infiltration.
SOF units will need a technology that facilitates navigation of the subterranean
infrastructure in megacities. To maximize the potential of a multimode dispersed
infiltration in the megacity environment, SOF must use all avenues of approach,
including underground spaces. The subterranean environment poses limitations in that
GPS does not work, and a compass may be inaccurate due to influences from urban
infrastructure. Additionally, the availability of up-to-date and accurate diagrams of this
8
domain is unlikely. Therefore, future SOF infiltration will hinge on advances not yet
conceived or
8
developed in navigation equipment that functions underground so forces can synchronize
movements, avoid enemy detection networks, and effectively launch attacks against
enemy utilizing subterranean spaces for defense.
B. CONCLUSION
Based on the trends above, we predict that by 2035 the battlespace will change in
several ways that affect SOF infiltration. Extensive concealment and cover provided by
human-made structures in urban terrain will overwhelmingly favor the defender over the
assaulting force. An enemy organization’s ability to counter SOF infiltration will be tied
even more closely to whether or not it has the cooperation of the local population.
Increases in population density will mean that infiltration routes through populated areas
are unavoidable. The defender will be able to identify security threats much more rapidly
than we have seen throughout history with an increase in sensors and computing
capability. The defenders’ response time to threats will significantly decrease with the
greater situational awareness that communication technology will allow. Both infiltrator
and defender will be vulnerable to attacks against their respective IT networks. Finally,
the infiltrating unit’s situational awareness will increase through the use of emerging
communication technology, enabling more sophisticated tactics to meet the rising threat.
8
The success of SOF infiltration will depend on how well planners prepare today
to address our findings. First, SOF infiltration should focus on deception over stealth.
Second, SOF infiltration must employ routes that use cognitive rather than physical
defilade. Third, infiltration will require smaller, better-coordinated units. Finally,
infiltration will require specialized SOF cyber to counter enemy capabilities. Ultimately,
success will depend on the willingness of today’s leaders to take risks and experiment
with new methods of infiltration.
The adage from World War II propaganda “loose lips sink ships” holds relevance
in the current and future battlespace. In the past, discussion of classified operations was
limited to anyone within earshot; now, an errant post on social media is visible to billions
of people. While some studies exist that explore the impacts of military members posting
information about operations, enemy forces are now able to aggregate seemingly
innocuous social media data from service members to build a detailed picture of our
operations. For instance, account activity patterns, location data from fitness devices, or a
sudden lack of activity can signal to the enemy that a unit may be deploying or
conducting an operation. Further work correlating SOF’s use of social media to
operations would allow us to turn a vulnerability into a flexible tool for deception and
greater operational security.
8
powered body armor bring capabilities previously seen only in large platforms to an
9
individual level. While these vehicles may not meet all the demands and may even stand
out more than a traditional military vehicle in some instances, they offer SOF a means to
conceive of new ways with which to conduct infiltration in the millennial battlespace. It
will be the development and adaptation of some of these technologies which will increase
the mobility of the individual SOF member, allowing them to disperse or concentrate
with greater maneuverability, that will facilitate successful infiltration.
9
LIST OF REFERENCES
Abasa, Africano. “Ungoverned Spaces and the Survival of Terrorist Groups in Africa: A
Case Study of the Lord’s Resistance Army.” Master’s thesis, Naval Postgraduate
School, 2015. https://calhoun.nps.edu/handle/10945/47802.
Adey, Peter. “Vertical Security in the Megacity: Legibility, Mobility and Aerial Politics.”
Theory, Culture & Society 27, no. 6 (2010): 51–67.
Arquilla, John, and David F. Ronfeldt. Networks and Netwars: The Future of Terror,
Crime, and Militancy. MR / Rand Corporation; MR-1382-OSD. Santa Monica,
CA: Rand, 2001.
Beaumont, Claudine. “Mumbai Attacks: Twitter and Flickr Used to Break News,”
November 27, 2008, sec. World.
https://www.telegraph.co.uk/news/worldnews/asia/india/3530640/Mumbai-
attacks-Twitter-and-Flickr-used-to-break-news-Bombay-India.html.
Bergen, Peter L. Manhunt: The Ten-Year Search for Bin Laden from 9/11 to Abbottabad.
1st ed. New York: Crown Publishers, 2012.
Bougen, Philip D., and Pat O’Malley. “Bureaucracy, Imagination and U.S. Domestic
Security Policy.” Security Journal 22, no. 2 (2009): 101.
https://doi.org/10.1057/palgrave.sj.8350078.
Bowden, Mark. The Finish: The Killing of Osama Bin Laden. London: Grove Press,
2012.
Boyne, Sean. “Uncovering the Irish Republican Army.” News. PBS Online, August 1,
1996. https://www.pbs.org/wgbh/pages/frontline/shows/ira/inside/org.html.
Campbell, John. “Terrorists Are Not the Only Ones Exploiting Ungoverned Spaces
Across Nigeria.” Council on Foreign Relations (blog), May 15, 2018.
https://www.cfr.org/blog/terrorists-are-not-only-ones-exploiting-ungoverned-
spaces-across-nigeria.
9
Castiglia, Arthur M. “Megacities and the Role of U.S. Special Operations Forces.”
Master’s thesis, United States Army War College, 2015.
Chin, Josh, and Clement Burge. “Twelve Days in Xinjiang: How China’s Surveillance
State Overwhelms Daily Life.” The Wall Street Journal Eastern Edition,
December 20, 2017.
“Coalition Warplanes Hit Last ISIS Enclave in Eastern Syria | CBC News.” Accessed
April 26, 2019. https://www.cbc.ca/news/world/syrian-democratic-forces-fight-
isis-baghouz-1.5013866.
Cronin, Audrey Kurth, and James M. Ludes. Attacking Terrorism: Elements of a Grand
Strategy. Washington, D.C: Georgetown University Press, 2004.
Daniel, Donald C., Katherine L. Herbig, William Reese, Richards J. Heuer, Theodore R.
Sarbin, Paul H. Moose, and Ronald G. Sherwin. “Multidisciplinary Perspectives
on Military Deception.” Technical Report. Monterey, CA: Naval Postgraduate
School, 1980.
Daniel O’Leary. “Artificial Intelligence and Big Data.” IEEE Intelligent Systems 28, no.
2 (April 2013): 96–99. https://doi.org/10.1109/MIS.2013.39.
Davis, Elizabeth Van Wie. “Uyghur Muslim Ethnic Separatism in Xinjiang, China.”
Asian Affairs: An American Review 35, no. 1 (2008): 15–30.
https://doi.org/10.3200/AAFS.35.1.15-30.
Deacon, Richard. A History of the Russian Secret Service. New York: Taplinger Pub.
Co., 1972.
Department of the Army. Urban Operations. ATP 3–06. Washington, D.C.: Army
Publishing Directorate, 2017.
Dunnigan, James F. Victory and Deceit: Dirty Tricks at War. 1st ed. New York: W.
Morrow, 1995.
9
Freeman, Michael. “The Sources of Terrorist Financing: Theory and Typology.” Studies
in Conflict & Terrorism 34, no. 6 (2011): 461–75.
Gill, Paul, J. Lee, K. Rethemeyer, J. Horgan, and V. Asal. “Lethal Connections: The
Determinants of Network Connections in the Provisional Irish Republican Army,
1970–1998.” International Interactions: Empirical and Theoretical Research in
International Relations, 2014.
Glenn, Russell W. “Megacities: The Good, the Bad, and the Ugly”.” Small Wars Journal,
no. Feb (2016). http://smallwarsjournal.com/jrnl/art/megacities-the-good-the-bad-
and-theugly.
Govern, Kevin. “Operation Neptune Spear: Was Killing Bin Laden a Legitimate Military
Objective?” In Targeted Killings: Law and Morality in an Asymmetrical World,
347–73. Oxford University Press, 2012.
Hatch, Harris, and Stewart Alexander. Electrotyping and Stereotyping. Chicago: United
Typothetae of America, 1918.
Hussain, Nazia, and Louise Shelley. “Karachi Organized Crime in a Key Megacity.”
Connections 15, no. 3 (Summer 2016): 5–16.
Jalal, Ayesha. Partisans of Allah: Jihad in South Asia. Cambridge, Mass: Harvard
University Press, 2008.
“Japan: Social Network Audience Reach 2017 | Statistic.” Statista. Accessed September
10, 2018. https://www.statista.com/statistics/258849/most-popular-social-
networks-in-japan-ranked-by-reach/.
9
———. Joint Urban Operations. JP 3-06. Washington, D.C.: Joint Chiefs of Staff, 2013.
———. Special Operations. JP 3-05. Washington, D.C.: Joint Chiefs of Staff, 2014.
Kambatla, Karthik, Giorgos Kollias, Vipin Kumar, and Ananth Grama. “Trends in Big
Data Analytics.” Journal of Parallel and Distributed Computing 74, no. 7 (2014):
2561–73. https://doi.org/10.1016/j.jpdc.2014.01.003.
Koonings, Kees, and Dirk Kruijt. Megacities: The Politics of Urban Exclusion and
Violence in the Global South. London: Zed Books, 2009.
La Caille John, Louise, and Louise Reynnells. “What Is Rural?” United States
Department of Agriculture, May 2016. https://www.nal.usda.gov/ric/what-is-
rural#HEALTH.
Lafleur, Jarret, Liston Purvis, Alex Roesler, and Paul Westland. “The Perfect Heist:
Recipes from Around the World.” Albuquerque, NM: Sandia National
Laboratories, March 2015.
Leonhardi, Eric V., Mark Murphy, and Hannah Kim. “Analysis of Department of
Defense Social Media Policy and Its Impact on Operational Security.” Master’s
thesis, Naval Postgraduate School, 2015.
McCammack, Jason. “What Lies Beneath | U.S. Customs and Border Protection.”
Accessed May 8, 2019. https://www.cbp.gov/frontline/what-lies-beneath.
McCarthy, Kieren. “United Nations Pledges to Get Everyone Online...by 2030.” The
Register, September 8, 2015.
https://www.theregister.co.uk/2015/09/08/united_nations_to_get_everyone_onlin
e_by_2030/.
McRaven, William H. Spec Ops: Case Studies in Special Operations Warfare: Theory &
Practice. Novato, CA: Presidio, 1995.
Melnik, Constantin. “The French Campaign Against the FLN.” Santa Monica, CA:
RAND Corporation, 1967.
Miniwatts Marketing Group. “World Internet Users Statistics and 2019 World Population
Stats,” March 2019. https://www.internetworldstats.com/stats.htm.
“Modern Urban Operations: Lessons Learned from Urban Operations from 1980 to the
Present.” Asymmetric Warfare Group, November 2016.
“Modern Urban Operations: Lessons Learned from Urban Operations from 1980 to the
Present.” Asymmetric Warfare Group, November 2016.
9
Morbach, Gernot W. “Terrorism and Organized Crime: The Alliance of Tomorrow? How
to Counter a Possible Future Threat.” Master’s thesis, Naval Postgraduate School,
1998.
“Nogales Tunnel Task Force, Mexican Authorities Shut down Incomplete Drug
Tunnel.” Accessed May 8, 2019. https://www.ice.gov/news/releases/nogales-
tunnel-task- force-mexican-authorities-shut-down-incomplete-drug-tunnel.
Owen, Mark. No Easy Day: The Autobiography of a Navy SEAL: The Firsthand Account
of the Mission That Killed Osama Bin Laden. New York, N.Y.: Dutton, 2012.
Pawlyk, Oriana. “The Days of Secret Military Operations May Soon Be Over. Does
That Matter?” Military.com, December 1, 2018. https://www.military.com/daily-
news/2018/12/01/days-secret-military-operations-may-soon-be-over-does-
matter.html.
Pipes, Richard. The Degaev Affair: Terror and Treason in Tsarist Russia. New Haven,
CT: Yale University Press, 2003.
“Population Density for U.S. Cities Statistics.” Governing. Accessed November 15,
2018. http://www.governing.com/gov-data/population-density-land-area-cities-
map.html.
Rabasa, Angel, Steven Boraz, Peter Chalk, Kim Cragin, Theodore Karasik, Jennifer
Moroney, Kevin O’Brien, and John Peters. Ungoverned Territories:
Understanding and Reducing Terrorism Risks. Santa Monica, CA: RAND
Corporation, 2007. https://www.rand.org/pubs/monographs/MG561.html. Also
available in print form.
Rothstein, Hy S. The Art and Science of Military Deception. London: Artech House,
2013.
Schenk, Frithjof Benjamin. “Attacking the Empire’s Achilles Heels: Railroads and
Terrorism in Tsarist Russia.” Jahrbucher Fur Geschichte Osteuropas 58 (2010):
232–53.
Schmidle, Nicholas. “Getting Bin Laden: What Happened That Night in Abbottabad.”
The New Yorker, August 8, 2011.
https://www.thomasweibel.ch/artikel/110808_new_yorker_getting_bin_laden.pdf.
Scott-Clark, Cathy. The Exile: The Stunning inside Story of Osama Bin Laden and Al
Qaeda in Flight. New York: Bloomsbury, 2017.
9
Shunk, David. “Mega Cities, Ungoverned Areas, and the Challenge of Army
Urban Combat Operations in 2030–2040.” Small Wars Journal, January 23,
2014. http://smallwarsjournal.com/jrnl/art/mega-cities-ungoverned-areas-
and-the- challenge-of-army-urban-combat-operations-in-2030-2040.
Siegel, Jacob. “Could Social Media Blow Special Operations Like the Failed Foley
Rescue?” The Daily Beast, August 22, 2014.
https://www.thedailybeast.com/could-social-media-blow-special-operations-like-
the-failed-foley-rescue.
South, Todd. “The Future Battlefield: Army, Marines Prepare for ‘Massive’ Fight in
Megacities.” Military Times, March 8, 2018.
https://www.militarytimes.com/news/your-army/2018/03/06/the-future-
battlefield-army-marines-prepare-for-massive-fight-in-megacities/.
Sunzi. The Art of War. UNESCO Collection of Representative Works: Chinese Series.
London: Oxford University Press, 1963.
Tankel, Stephen. Storming the World Stage: The Story of Lashkar-e-Taiba. Oxford:
Oxford University Press, 2013.
“The World’s Most Densely Populated Cities.” WorldAtlas. Accessed May 9, 2019.
https://www.worldatlas.com/articles/the-world-s-most-densely-populated-
cities.html.
“Top 5 Cities with the Largest Surveillance Camera Networks.” vintechnology.com, May
4, 2011. https://vintechnology.com/2011/05/04/top-5-cities-with-the-largest-
surveillance-camera-networks/.
United Nations. “Pakistan: Population Density (as of 26 August 2013).” United Nations
Office for the Coordination of Humanitarian Affairs, August 26, 2013.
https://reliefweb.int/map/pakistan/pakistan-population-density-26-august-2013.
9
INITIAL DISTRIBUTION LIST