<<

April 2019 in 2030

A Primer on The Future of Technology and COIN

Peter Warren Singer

Last edited on April 22, 2019 at 12:13 p.m. EDT Acknowledgments

The author would like to thank the supporters of New America and its Future of project, Arizona State University, and the valuable editing assistance of Ian Wallace, David Sterman, Maria Elkin, Joanne Zalatoris, and Will Walkey, as well as Emerson Brooking for sections drawing from the LikeWar book.

newamerica.org/international-security/reports/insurgency-2030/ 2 About the Author(s)

Peter Warren Singer is strategist and senior fellow at New America.

About New America

We are dedicated to renewing America by continuing the quest to realize our nation’s highest ideals, honestly confronting the challenges caused by rapid technological and social change, and seizing the opportunities those changes create.

About International Security

The International Security program aims to provide evidence-based analysis of some of the thorniest questions facing American policymakers and the public. We are focused on South Asia and the Middle East, extremist groups such as ISIS, al Qaeda and allied groups, the proliferation of drones, homeland security, and the activities of U.S. Special Forces and the CIA.

newamerica.org/international-security/reports/insurgency-2030/ 3 Contents

Introduction 5

The Technology That Matters 8

Hardware 9

Software 10

Wetware 13

Synergy 14

What Will This All Mean for ? 15

The End of Non-Proliferation 15

Multi-Domain 16

UnderMatch 17

Information Underload and LikeWars 19

Conclusions 25

newamerica.org/international-security/reports/insurgency-2030/ 4 Introduction

Long before the convoy arrived in the muggy town of Dara Lam, news of the meeting between the U.S. Army colonel and the unpopular governor of the Kirsham province had seeped into social media.1 Angry with the American presence and the governor’s corruption, local citizens organized for a demonstration. Their trending hashtag—#justice4all—soon drew the attention of international media and the online world, trending in popularity. It also drew the eyes of some less interested in justice: the notorious Fariq network. Using sockpuppet accounts and bots to steer the course of online and real world sentiment, the terrorists fanned the fames, calling for the protesters to confront the American occupiers.

But this wasn’t the full extent of Fariq’s plan. Knowing where a massive crowd of civilians would soon gather, the terrorists also set an . Their plan was to fre on the U.S. soldiers as they exited the building, and, if the soldiers fred back, the demonstrators would be caught in the crossfre. Pre-positioned cameramen stood ready to record the bloody outcome: either dead Americans or dead civilians. A network of online proxies was then prepared to drive the event to virality and use it for future propaganda and recruiting. Whatever the physical outcome, the insurgents would win this .

Luckily, other eyes were tracking the furry of activity online: those of a U.S. Army brigade’s tactical operations center. The center’s task was to monitor the environment in which its soldiers operated, whether the was dense , isolated mountain ranges, or, now, clusters of social media infuencers. The fast-moving online developments were detected and then immediately passed up the chain of command. A generation earlier, the ofcers might have discounted what was playing out online as mere internet chatter, but now they understood its importance. Receiving word of the ’s growing strength and fury, the colonel cut his meeting short and left discreetly through a back entrance. Fariq’s plan was thwarted.

Try as you might, you won’t fnd any record of this event in the news—and it is not because it takes place in the distant year of 2030. It is because Dara Lam is a fake settlement in a fake province of a fake country, one that endures a fake war that breaks out every few months in the very real state of .

The Joint Readiness Training Center at Fort Polk holds a special place in . It was created as part of the Louisiana Maneuvers, a series of massive training exercises held just before the entered II. When Hitler and his rolled over Europe, the U.S. Army realized warfare was operating by a new set of rules. It had to fgure out how to transition from a world of horses and telegraphs to one of mechanized tanks and trucks guided by wireless communications. It was at Fort Polk that American soldiers, including

newamerica.org/international-security/reports/insurgency-2030/ 5 such legendary fgures as Dwight D. Eisenhower and George S. Patton, learned how to fght in a way that would preserve the free world.

A Quartermaster Supply Unit during the 1941 Louisiana Maneuvers. Source: US Army Signal Corps., Courtesy of the Library of Congress

Since then, Fort Polk has served as a continuous feld laboratory where the Army trains for tomorrow’s . During the , it was used to prepare for feared clashes with the Soviet Red Army and then to acclimatize troops to the jungles of Vietnam. After 9/11, the 72,000-acre site was transformed into the province of Kirsham, replete with twelve plywood villages, an opposing force of simulated insurgents, and scores of full-time actors playing civilians caught in the middle. In short, everything the Army thought it needed to simulate how war was changing. Today, Fort Polk boasts a brand-new innovation for this task: SMEIR.2

Short for Social Media Environment and Internet Replication, SMEIR simulates the blogs, news outlets, and social media accounts that intertwine to form a virtual battlefeld atop the physical one. A team of defense contractors and military ofcers create a version of the internet activity of a small —rambling posts, innocuous tweets, and the occasional bit of viral propaganda—challenging the troops fghting in the Kirsham counterinsurgency to navigate the new digital terrain. For the stressed, exhausted soldiers dodging enemy IEDs and bullets, it is not enough to safeguard the local population and fght the evil insurgents; they must also now be mindful of the ebb and fow of online conversation.

newamerica.org/international-security/reports/insurgency-2030/ 6 Imagery from SMEIR project of simulated online insurgents. Source: Provided to author by U.S. Army/IDS SMEIR project

The project illustrates just how rapid –and surreal—technology change can be for military training and the broader political environment. A generation ago, the internet was a niche plaything—one that the U.S. military itself had literally just walked away from, handing of control to a global consortium of volunteers. Only the most far-sighted futurists at RAND were suggesting that it might one day become a crucial battlefeld.3 None imagined that the military in that future would have to pay millions of dollars to simulate a second, fake internet to train for war on the real one.4

In this way, what played out at Fort Polk serves not just as a training moment, but a warning for those wrestling to understand the future of war. Despite hopes to the contrary, there will likely be a consistent need to prepare for insurgency, not just because of the continuing issues of failed states and collapsed , but the likelihood that, as in the Cold War, competition could express itself through proxy warfare.5 Yet while the essence of insurgency—a against authority that targets the efectiveness and legitimacy of the pillars of society6 —remains the same, advances in science and knowledge can reshape it. Just as new technologies can change the society within which insurgency takes place, they can also introduce key shifts in everything from tactics used in battle to the overall dynamics of the confict itself.

The following report will frst explore the technologic change that looms in the years leading toward 2030 and beyond, and then propose a series of their potential implications for counterinsurgency.

newamerica.org/international-security/reports/insurgency-2030/ 7 The Technology That Matters

When modern U.S. counterinsurgency strategy was frst codifed in 1962 under the idea of “Overseas Internal Defense Policy,”7 it was typed out on a machine that had no digital components. Computers were just used as massive calculators for a small number of government agencies and businesses. Personal communications devices were little-changed versions of the telephone developed by Alexander Graham Bell almost a century earlier—hard wired into your ofce or home. The internet wouldn’t even be conceived for another year (in a memo written by J.C.R. Licklider and Robert W. Taylor, who frst described it as the “Intergalactic Computer Network”),8 while the frst mobile telephone wouldn’t be invented until 1973 (and even then, the three-pound Motorola monstrosity wouldn’t go on sale for another decade, for the modest price, in today’s dollars, of $10,000).9 As we see in everything from the fctional training at Dara Lam to ISIS’s all too real rise and recruiting through its deft use of social media, these technologies have since proven crucial to the story of modern insurgency.10

In weighing the potential impact of technology on insurgency moving forward, we should similarly seek to identify the technologies that will truly matter in a manner like the computer and its networking. That is, our focus should not be on mere evolutionary improvements, such as a gun that shoots a bit faster or a missile that goes slightly further, but the technologies that truly change the game. These go by various catchphrases. A generation ago in the Pentagon, “” The original 1962 document codifying U.S. 11 was the popular term. Today, the Overseas Internal Defense Policy, which was buzzword is “disruptive.” Ironically, produced on a machine with no digital outside the military, the descriptor is components. “killer app.” Whatever the term, think Source: Central Intelligence Agency of these next important technologies as akin to the steam engine in 1820s or the airplane in 1920s or the computer in 1980s. They are real, and will change the world, but haven’t yet.

There is an important warning, however. What make them revolutionary, is not the mistaken belief they somehow magically will solve all our problems or lift the fog of war.12 Thinking like that is exactly what can lead one to absurd optimism and terrible errors, especially about war and insurgency.13

newamerica.org/international-security/reports/insurgency-2030/ 8 Rather, it is the opposite. What truly defnes the revolutionary game-changers is that they are technologies that present new questions, for which we don’t have the answers to. These are questions of two types: First, they introduce issues of “What is possible that wasn’t possible just a generation before?” And, secondly, they raise new issues of “What is proper, in issues of right and wrong, that we weren’t wrestling with before?” These may be new questions of the proper way to recruit, organize, or train. Or, they might be new issues of and ethics that were recently the stuf of science fction.

A few years back, I helped develop a project for the Pentagon called NeXTech,14 where we conducted research to answer just what were the pending technologies that might have this efect? That is, what were the technologies of today that were in that potential parallel position to the computer in 1980?

We interviewed a diverse set of subject matter experts, who ranged from people working at places like DARPA and ONR, to university research labs, to experts in industry, ranging from defense contractors to Silicon Valley frms like Apple, Google, and Facebook. They helped us identify that the looming change was not about any single one technology, but rather a cluster of new technology areas. From the hardware of robotics to the wetware of human performance enhancements, these technology clusters are poised to change the landscape of both what is viewed as possible and proper, including for war and insurgency.

Hardware

In our lifetime, robots, arguably the most celebrated of science fction technologies, have fnally become reality. The U.S. military force that went into after the 2001 attacks used zero robotic systems; now the force has over 22,000 in its inventory, while civilian drones are being used everywhere from agriculture to real estate.15

Moving forward, we will see even more automation. Increasingly autonomous robotics will come in two primary forms, each of which mimics intelligence in nature. The frst are where the intelligence is centralized, such that the task is done directly. In robotics, these tend to be large-scale systems that mimic or directly replace human tasks, such as driverless cars, planes, etc. And then there are systems where the intelligence and resulting tasks are decentralized. They work via networks, akin to insects, allowing the tasks to be disaggregated into parts, but also operating via “swarms” in mass scale.16

The changes brought on by both types will be incredibly disruptive to both war and work. An Oxford University examination of 702 diferent jobs found that 47 percent of total U.S. employment is at risk for replacement or reduction by automation within our lifetime.17 It will hit developing world economies, which

newamerica.org/international-security/reports/insurgency-2030/ 9 support often fragile politics, even harder. As just one illustration, according to International Labour Organization estimates, over 137 million salaried workers in just the fve states of Cambodia, , the , Thailand, and Vietnam are “at high risk of being replaced by machines.”18

Automation will change not just labor forces but warfare. Source: KUKA Roboter GmbH, courtesy of Wikimedia Commons

This points to an important impact of a true technology change: It afects society on multiple levels and issue areas. Relevant to robotics, we should thus expect a double efect. Technology that simulates and replaces humans will alter not just the various roles that humans play in insurgency, but will maybe even spark the kind of anger and unrest that festers into it.19

Software

There are also major changes in what runs and connects our technology, software, and internet it is now bound within. The rise of the “network of networks” has so shaped insurgency that a group like ISIS is literally a creature of the modern internet,20 both recruiting through it and operating on it.

Yet, the internet itself is changing as it moves into its second half-century of life, and not just by bringing the second half of the world’s population online

newamerica.org/international-security/reports/insurgency-2030/ 10 (importantly in many of the areas most fragile and susceptible to mass violence). The internet is shifting from being about communications between human beings (already disruptive enough to everything from our to our economy to our dating lives) to running the systems of our increasingly digital world. Roughly 10 billion devices are online now. In the next fve years, the number of networked devices is estimated to reach 64 billion, refecting over $3 trillion in annual spending.21 But most of these new contact points will shift from being computers on our desks and smart phones in our pockets to “things” like cars, thermostats, power plants, etc.

This massive growth won’t just empower the internet economy to new spaces, but also massively grow the attack surface—the potential points of vulnerability that cyber threats will go after. However, it will also be a bit like traveling back in time, in that the new growth in the “Internet of Things” (IoT) is replicating all the old cyber security problems. With responsibilities for security unclear, and almost no regulation or even basic liability, all too often these devices lack even basic security features, while customers are largely unaware of what they can and should do. The result is that up to 70 percent of IoT devices have known vulnerabilities,22 and they have already become a key part of botnets.23

The shift to the things connecting and run by the internet will play out simultaneous to another core shift: How the sharing of fles, records, and knowledge on it works. This emergent wave is of distributed ledgers using blockchain and other such technologies. Already, its impact has been felt in areas like fnance, where cryptocurrencies like bitcoin have created a new form of money and the transfer of value. Yet, the model of peer-to-peer distribution may lead to even greater change as it is applied across felds and into recordkeeping. It may even lead to a fundamental reorder of the web, as Chris Meserole and Alina Polyakova put it in Foreign Policy magazine, “outside the control of major corporations and states,”24 thus empowering weaker and nonstate actors. Or, like in other spaces of the web, it may prove to be another means for authoritarian states to exert control, such as through China’s recent eforts targeting blockchain developers.25 The very fact that both are in the potential future illustrates the shift at hand.

Yet, the shift in the internet itself might be minuscule in its impact compared to what is about to play out in the intelligence of the software that runs through all of it. In Chinese military thinking, the signifcance is described as the shift in societies—and their wars—from industrialization of the last century to informatization of the turn of this century to a looming “intelligentization.”26

newamerica.org/international-security/reports/insurgency-2030/ 11 The feld of “Artifcial Intelligence” encompasses work on everything from machine learning to neural networks. Arguably no other technology area is seeing as much energy and investment. At this time, there is roughly $153 billion in spending in this space, “with an estimated annual creative disruption impact of $14-33 Trillion.”27 Its participants include all the leading governments of the world, who are engaged in what is increasingly A doorbell connected to the internet: One of referred to as an “AI arms race.” billions of devices on the emerging Internet This arms race, though, is unlike those of Things. in the past in that its participants go Source: Wikimedia Commons beyond competing nations. AI is the focus of a massive scale of industrial spending, poised to hit $79.2 billion by 2022 at a compound annual growth rate of 38 percent.28 Its participants include not just tech frms, but also more traditional business corporations looking to survive the next generation. For example, both John Deere and McDonalds have each respectively spent over $300 million buying AI startups to weave into their business.29

Indeed, of companies listed on the stock market, 244 list AI30 as a centerpiece of their future business plans (a fgure gathered by an algorithm sifting through earnings calls). This feld is also the obsession of the majority of new entrants to the marketplace, who hope to make the next great fortunes. The founder of Wired magazine described today’s boom in Silicon Valley start-up companies, who will shape tomorrow, as follows: “AI is already here, it’s real, it’s quickening … I think the formula for the next 10,000 start-ups is to take something that already exists and add AI to it.”31

As thought leaders and business luminaries from around the world wrestle with how important this development will be, it seems as if they cannot overstate its signifcance. Masayoshi Son, the founder of the mega-conglomerate Softbank, frames it this way:

"Every industry that mankind created will be redefned. The medical industry, automobile industry, the information industry of course. Every industry that mankind ever defned and created, even agriculture, will be redefned. Because the tools that we created were inferior to mankind's brain in the past. Now the tools become smarter than

newamerica.org/international-security/reports/insurgency-2030/ 12 mankind ourselves. The defnition of whatever the industry, will be redefned."32

Baratunde Thurston, a Director’s Fellow at MIT’s Media Lab, thinks even this massive claim is actually an understatement, in that it just focuses on business: “Every area of life will be afected. Every. Single. One.”33 Insurgency, of course, falls within this categorization.

Wetware

Yet there is another historic change afoot in technology. Software and Hardware are technology that we use. “Wetware,” or, more technically, “human performance modifcation,” is about using technology to change us. Think of this as akin to the science fction of Iron Man and Captain America crossed with the Russian Olympic athlete program.

We are seeing in a feld that extends from medicine to synthetic biology—a new feld that encompasses revolutions ranging from genome editing like CRISPR to biologic computers.34 In this space, discoveries and breakthroughs are outpacing the IT feld standard of “Moore’s Law.” They are rewriting what has been possible or not in the literal history of our species, altering everything from susceptibility to disease to body endurance to the workings of the brain itself.35

In turn, new technologies in brain machine interface will rewrite the entire history of how humans have connected to their tools.

In turn, new technologies in brain machine interface will rewrite the entire history of how humans have connected to their tools. From the frst stone to the drone and iPhone, we have used our monkey fngers. This is already being challenged by technologies that have allowed test subjects to thought-control advanced technologies like aircrafts36 to conduct database queries and process product orders without ever writing or vocalizing it, which is known as “telepathy tech.”37

newamerica.org/international-security/reports/insurgency-2030/ 13 Synergy

There are a variety of other technology areas that could bode to be as disruptive as the above three. For instance, we are seeing both new forms of energy generation and storage come onto line or become distributed in new ways. These could shift everything from geopolitics (how much we care about insurgencies is often determined by their proximity to key energy resources that we’ve become dependent on due to technology changes) to battlefeld logistics. They could redefne the roles and purpose of already revolutionary systems. For instance, an autonomous drone is game-changing enough as a plane; an autonomous drone that uses a mix of solar and hydrogen to stay in the air for 12 months38 perhaps ought to be understood as something else, as it now has attributes more like a space satellite than a plane.

Indeed, the fact that so many of these new technologies cross and shape each other is maybe what is the most exciting and game-changing of their prospects (in military terms, the parallel would be how the German blitzkrieg derived from the operational blending together of tanks, planes, and radio). For example, Direct Digital Manufacturing, popularly known as “3D printing,” turns a bit, a computer design, into an atom, a created thing. It is a story of both hardware and software. It also holds the promise of potentially altering fundamental business models. It could do to defense frms what the iPod did to the music industry, absolutely changing not just proft margins, but proft model itself, as anyone can make their own systems and spare parts. 3D printing’s rise, as a result, also means that major aspects of sanction regimes or embargos might become outdated. Indeed, in a nation where gun sales are efectively banned, British police have already had to deal with 3D printed guns,39 while ISIS used fairly advanced injection molding techniques in making its own drones.

newamerica.org/international-security/reports/insurgency-2030/ 14 What Will This All Mean for Counterinsurgency?

With so much change, it is too early to know all that will shake out from these new technologies. But we can identify a few key trends of what will matter for war and beyond, and resulting questions that future counter-insurgents will likely have to wrestle with.

The End of Non-Proliferation

A common theme through these diverse technology areas is that they are neither inherently military nor civilian. Both the people and organizations that research and develop these technologies and those that buy and use them will be both government and civilian. They will be applied to confict, but also areas that range from business to family life. A related attribute is that they are less likely to require massive logistics systems to deploy, while the trend of greater machine intelligence means that they will also be easier to learn and use—not requiring large training or acquisitions programs. These factors mean that insurgent groups will be able to make far more rapid gains in technology and capability than previously possible.

In short, the game-changing technologies of tomorrow are most likely to have incredibly low barriers to entry, which means they will be proliferated. In addition, some of the technologies, such as 3D printing, will make it difcult to prevent the spread of capability via traditional non-proliferation approaches such as arms embargos and . Interdicting routes is less workable in a world where manufacturing can be done on site.

This issue is not one merely of the hardware, but also the spread of ideas. As vexing as the extent of terrorist and “how to’s” have been in a world of social media, these platforms are still centrally controlled. The Twitters and Facebooks of the world can take down content when they are persuaded of the legal or public A 3D printed gun discovered by TSA at relations need. However, the move Reno-Tahoe International Airport. toward decentralized applications Source: Transportation Security Administration reduces this power, as there is no one place to appeal for censorship.41 This phenomenon is well beyond just the problem of a YouTube clip showing how to build an IED, or a cleric inspiring a watcher of a linked video to become a suicide bomber. It is that decentralization crossed with crowd-sourcing and open sourcing empowers anyone on the

newamerica.org/international-security/reports/insurgency-2030/ 15 network to new scales. Indeed, there are already open-source projects like Tensorfow,42 where any actor can tap into AI resources that were science fction just a decade ago.

Key Resulting Questions:

• How will U.S. and allied forces prepare for insurgent adversaries that have access to many of the very same technologies and capabilities that they previously relied upon for an edge?

• Will lower barriers to entry make it easier for insurgencies to gain the capability needed to rise? Will it make it more difcult to defeat them if they can rapidly recreate capability?

Multi-Domain Insurgencies

Whether it was the Marines battling the rebel forces in with the earliest of close air support missions a century ago to the Marines battling the Taliban today, counterinsurgents of the last 100 years have enjoyed a crucial advantage. When it came to the various domains of war, the state actor alone had the ability to bring true power to bear across domains. In enjoying unfettered access to the air and sea, they could operate more efectively on the land, not just by conducting surveillance and strikes that prevented insurgents from efectively massing forces, but by crucially moving their own forces to almost anywhere they wanted to go.

This monopolization of power may not be the case in the future. Indeed, ISIS has already been able to utilize the air domain (via a self-made air force of drones) to conduct ISR of U.S. and allied forces, as well as several hundred air strikes.43 It may be ad hoc, but it still achieved their goals at a minimal cost. More importantly, the ISIS drone use points to a change in the overall story of air power and insurgency. Now, as exemplifed everywhere from to Ukraine, the insurgents can fy and fght back.44

This ability to cross domains is, of course, not just limited to air power, but also other new domains that technology is opening up to battle. Insurgencies will be able to tap into the global network of satellites that have given U.S. forces such advantage in ISR and communications, or even potentially be able to launch and operate cheap micro satellites, either via proxy aid or on their own (If college students can do it already,45 why not insurgents?).

newamerica.org/international-security/reports/insurgency-2030/ 16 More importantly, the “cyber war” side of insurgency will likely move well past what has been experienced so far.46 The proliferation of capability through both dark markets and increasing automation, combined with the change in the internet’s form to more and more “things” operating online, points to insurgents being able to target networks and A weaponized drone carrying an IED. even use Stuxnet-style digital weapons Source: New Jersey Ofce of Homeland Security causing physical damage.47 and Preparedness The ability to operate across domains also means that insurgents will be able to overcome the tyranny of distance. Once-secure bases and even a force’s distant homeland will become observable, targetable, and reachable, whether by malware or unmanned aerial systems delivering packages of a diferent sort. To think of it a diferent way, a future insurgency may not see a Tet-style ofensive attack in Hue, but rather Houston.

Key Resulting Questions:

1. Is the U.S. prepared for multi-domain warfare, not just against peer states but also insurgents?

2. What capabilities utilized in counterinsurgency today might not be available in 2030?

3. Just as U.S. forces used capability in one domain to win battles in another, how might insurgents do so?

UnderMatch

In the fnal battles of World War II’s European , U.S. forces had to contend with an adversary that brought better technology to the fght. Fortunately for the Allies, the German “wonder weapons” of everything from rockets and jets to assault rifes entered the war too little and too late.

For the last 75 years, U.S. defense planning has focused on making sure that never happened again. Having a qualitative technology edge to "" our adversaries became baked into everything from our overall defense strategy to small-unit tactics. It is how the U.S. military deterred the Red Army in the Cold War despite having a much smaller military, and how it was able to invade

newamerica.org/international-security/reports/insurgency-2030/ 17 with a force one-third the size of Saddam Hussein's (inverting the historic mantra that the attacker's force should be three times the size of the defender's).48

Even in painful insurgencies from Vietnam to the post-9-11 wars, this approach didn't always deliver easy victories, but it did become part of a changed worldview. A Marine ofcer once told me that if his unit of 30 men was attacked by 100 Taliban, he would have no fear that his unit might lose; indeed, he described how it would almost be a relief to face the foe in a stand-up fght, as opposed to the fruitless hunts, hidden and roadside bombs of insurgency. The reason wasn’t just his force’s training, but that in any battle, his side alone could call down systems of technology that the insurgency couldn’t dream of having, from pinpoint targeting of unmanned aerial systems controlled via satellite from thousands of miles away to hundreds of GPS-guided bombs dropped by high speed jet aircraft able to operate with impunity.

Yet U.S. forces can't count on that overmatch in the future. This is not just the issue of mass proliferation discussed above, driven by the lower barriers to entry and availability of key tech on the marketplace. Our future counterinsurgency thinking must also recognize that the geopolitical position has changed. As challenging as the Taliban and ISIS have been, they were not supported by a comparable peer state power, developing its own game-changing technology, and potentially supplying it to the world.

Mass campaigns of state-linked intellectual property theft have meant we are paying much of the research and development costs of China’s weapons development, while at the same time, it is investing in becoming a world leader in each of the above revolutionary technology clusters.49 For instance, in the feld of AI, China has a dedicated national strategy to become the world leader in AI by the year 2030,50 with a massive array of planning and activity to achieve that goal. Meanwhile, it has displayed novel weapons programs in areas that range from space to armed robotics.51

The result is that in a future insurgency, whether from purchases of the global market or proxy warfare supplies, American soldiers could face the same kind of shock that the Soviet helicopter pilots had in their 1980s war in Afghanistan, when the Stinger missile showed up in the hands of the mujahideen. The United States could one day fnd itself fghting a guerilla force that brings better technology to the fght.

newamerica.org/international-security/reports/insurgency-2030/ 18 Key Resulting Questions:

• What changes in tactics are needed for counterinsurgents when they do not enjoy technology “over-match?”

• How does the growing geopolitical environment shift counterinsurgency? Are U.S. tactics and doctrine ready for great power supported insurgents?

Information Underload and LikeWars

“It is like sipping from a fre hose.”

A Stinger Missile of the type that surprised This is how a U.S. military ofcer the Soviet forces in Afghanistan. described to me a core problem in their Source: U.S. Department of Defense, courtesy of job. The setting was the Combined Air Wikimedia Commons Operations Center at Al Udeid Air Force Base, where U.S. forces coordinated the massive scale of operations in support of counterinsurgencies in Iraq and Afghanistan.

The challenge they felt was that there was too much data coming at them, from full motion video to chatroom posts, sent in by people ranging from soldiers in the midst of a frefght to intelligence analysts back in the United States. It was not just that the ofcer could barely keep up, but also that, in constantly servicing their in-box, it was hard to think and act strategically. In essence, their relationship to information was one that we all feel: TMI, Too Much Information.

Some believe that mastering this problem actually holds the solution to ending insurgency as a phenomenon once and for all. In a world of mass surveillance, follows this thinking, if we can just sift through the information rapidly enough, insurgents will not be able to operate efectively. AI algorithms won’t just instantly identify insurgents via face recognition52 or gait detection analysis,53 but even move to predict their activities before they plan them. Indeed, projects like PreData54 already mine open source intelligence like social media posts to predict the very outbreak of insurgencies.

newamerica.org/international-security/reports/insurgency-2030/ 19 An illustration of Elastic Bunch Mapping for facial recognition. Source: Federal Bureau of Investigation

We shouldn’t be so quick to declare victory against rebels of the future. Insurgency, like all confict, involves a thinking adversary reacting to each and every move and technology. For instance, we are already seeing the rise of counters to mass surveillance like face paints55 and even stealth clothing.56 In turn, the spread of autonomous drones and cars will render whole swaths of current counterterrorism/insurgency defenses obsolete.

But the counters may be about more than merely deceiving sensors, but altering our very relationship with information itself.

The technology systems that we rely on for counterinsurgency are only as reliable as the information that goes into them. The connection points of this information can be attacked. The communications signals to drones have already been blocked and manipulated in tests, while merchant ships in the Black Sea of Russia experienced a suspected hack where their GPS started to tell the ship captains they were sailing miles inland.57

In these situations, it was self-evident that the “spigot” of information was being cut of or tampered with. But what also bodes is a kind of poison to the overall system, targeting the people behind the networks.

is theater,” declared RAND Corporation analyst Brian Jenkins in a 1974 report that became one of the feld’s foundational studies.58 Command enough attention, and it didn’t matter how weak or strong you were: you could bend populations to your will and cow the most powerful adversaries into submission. This simple principle has guided insurgents and terrorists for millennia. Whether via in the town squares of ancient Judea, marketplace bombings in colonial wars in , or ISIS’s carefully edited beheadings in , the goal has always been the same: Control what people thought (and feared).

newamerica.org/international-security/reports/insurgency-2030/ 20 Already we have seen the power of online networks to control this crucial narrative, perhaps most illustratively with the of Mosul, where an insurgent force didn’t hide from, but embraced surveillance. Indeed, ISIS even branded its 2014 ofensive #AllEyesOnISIS to ensure that the world was watching. It was efective, but again, quite basic. We can increasingly place false information that is overwhelming for not just our political systems, but our very human senses.

One vector of this is bots—algorithms that perform automated tasks, such as acting like humans online. The early versions of social media bots proved able to drive what people thought, knew, and even argued about during the most crucial elections of our time from their massive presence during the Brexit referendum (researchers found approximately 20 percent of the users The hashtag pushed by #ISIS during its 2014 shaping online discussion on Britain invasion of Mosul. leaving the European Union were Source: Screenshot by author actually bots) to the 2016 U.S. presidential election (Twitter concluded that bots helped drive Russian-generated propaganda to users 454.7 million times).59 Years later, the similar use of artifcial accounts would strike not just in elections like in Mexico’s, but also in controversies ranging from the Colin Kaepernick NFL to the spread of anti-vaccine conspiracy theories.60

Artifcial intelligence, again available to all actors, is set to massively compound this problem with the creation of what are known as “deep fakes.” Artifcial neural networks mimic how the human brain works by having individual nodes that activate or not to a single point of information and carry out incredibly complex tasks by layering the connections together. Through this, machines now can study a database of images, words, and sounds to learn to mimic a human speaker’s face and voice almost perfectly. An early example of the potential political impact of this came in the creation of an eerily accurate, entirely fake conversation between Barack Obama, Hillary Clinton, and Donald Trump.61 Indeed, only drawing from the data of two-dimensional photographs, these systems can build photorealistic, three-dimensional models of someone’s face to place into online settings. A demonstration with the late boxing legend Muhammad Ali transformed a single picture into “photorealistic facial texture inference” that was essentially able to rewrite what “the greatest” actually did and said when he was alive, at least in our online records of him (which will be the source of “truth” to the vast majority).62

newamerica.org/international-security/reports/insurgency-2030/ 21 Neural networks can also be used to create deep fakes that aren’t copies at all. Rather than study images to learn the names of diferent objects, these networks learn how to produce new, never-before-seen versions of the objects in question. These are called “generative networks.”63 As an example, computer scientists unveiled a generative network that could create photorealistic synthetic images on demand, all with only a keyword. Ask for “volcano,” and you got fery eruptions as well as serene, dormant mountains—wholly familiar-seeming landscapes that had no earthly counterparts. Another system created faces of people who didn’t exist but which real humans would likely view as being Hollywood movie stars.64

With such technology, users will eventually be able to conjure a convincing likeness of any scene or person they can imagine. Because the image will be truly original, it will be difcult to identify the forgery via many of the old methods of detection. And such networks can do the same thing with video to create new moments in time that never happened.65 They have produced eerie, looping clips of a “beach,” a “baby,” or even “golf.” They’ve also learned how to take a static image (a man on a feld; a train in the station) and generate a short video of a predictive future (the man walking away; the train departing). In this way, events that never took place may nonetheless be presented online as real occurrences, documented with compelling video evidence.

Finally, there are neural network-trained chatbots—also known as machine- driven communications tools or MADCOMs.66 The inherent promise of such technology—an AI that is essentially indistinguishable from a human operator—is being built to help companies replace their help desks and sell products online. But it also could be utilized for terrible misuse. Today, it still remains possible for a savvy internet user to distinguish “real” people from automated botnets and even many sockpuppets (the combination of Russophied English and a love for red #MAGA hats often gives them away). Soon enough, even this uncertain state of afairs may be recalled fondly as the “good old days”—the last time it was possible to have some confdence that another social media user was a fesh-and- blood human being instead of a manipulative machine.

Combine all these pernicious applications of neural networks—mimicked voices, stolen faces, real-time audiovisual editing, artifcial image and video generation, and MADCOM manipulation—and it’s tough to shake the conclusion that the long feared “Cyberwar” of hacking networks will prove less important than what one might think of as the “LikeWar” side of battle: hacking the people on the networks by driving ideas viral through a mix of likes, shares, and lies.67

newamerica.org/international-security/reports/insurgency-2030/ 22 The insurgencies of tomorrow will involve a melding of kinetic and online operations. Source: P.W. Singer and Emerson Brooking.

The likely outcome is that the insurgencies of 2030 won’t just be fought by people, but also by highly intelligent, inscrutable algorithms that will speak convincingly of things that never happened and produce “proof” that doesn’t really exist. They’ll seed falsehoods across the social media landscape with an intensity and volume that will make the current state of afairs look quaint.

For instance, as futuristic as the counterinsurgency training on the SMEIR at Fort Polk that opened this report seems, it captures a point in time soon to be passed by technology and tactics. Thwarted by the eagle-eyed U.S. Army tactical operations ofcer, the terrorists might not just fade back into the crowd. They might instead shoot the civilians anyway and simply manufacture compelling online evidence of U.S. involvement. Or, maybe they never even show up in the frst place, able manufacture everything about the using neural networks that would produce hyper-realistic imagery, distribute information outwards with armies of AI-infused bots, and manipulate the algorithms of the web itself. In turn, the role of that ofcer might be replaced by the only entity able to

newamerica.org/international-security/reports/insurgency-2030/ 23 efectively battle back: another artifcial intelligence. The result will be algorithms battling over the hearts and minds of humans.

The result will be algorithms battling over the hearts and minds of humans.

It is easy to downplay the efects of these online battles, but to do so ignores how the age-old lessons of counterinsurgency are likely to cross with the new features of LikeWar. As General Stanley McChrystal told a conference of military ofcers in the Middle East, “…For the foreseeable future,” the online space of social media will be as crucial of a domain to any war as that of the air, land, or sea. The reason, he explains, is that “There is a war on reality…Shaping the perception of which side is right or which side is winning will be more important than actually which side is right or winning."68

Key Resulting Questions:

• What aspects of our relationship to information itself will change in future insurgencies?

• What will the LikeWar battles between insurgents and counterinsurgents look like in the future? Are we prepared to fght and win them? How will we even know?

newamerica.org/international-security/reports/insurgency-2030/ 24 Conclusions

The most powerful evidence that we are in a time of historic change is that the trends that are in play in technology, and their resulting efects on the world, are so diverse that they can be a bit overwhelming. Their challenge is not merely that they ripple out in so many diferent directions, but that we are simply not in a position yet to answer many of the questions that they raise, especially for a realm so prone to uncertainty as war. But that is okay to admit. As Werner Herzog sagely put it, "Sometimes a deep question is better than a straight answer.”69

In such a time of massive change, those that choose to stand still, ignore the trends, and not adjust appropriately, are making a choice with their inaction.

Yet, in all this uncertainty, there is one key takeaway lesson that this survey of the technology and its potential efect on counterinsurgency does seem to provide: In such a time of massive change, those that choose to stand still, ignore the trends, and not adjust appropriately, are making a choice with their inaction. They are choosing to lose the wars of tomorrow.

newamerica.org/international-security/reports/insurgency-2030/ 25 Notes 10 P. W. Singer and Emerson T. Brooking, “Terror on Twitter,” Popular Science, December 11, 2015, https:// 1 The following scene is from P. W. Singer and www.popsci.com/terror-on-twitter-how-isis-is- Emerson T. Brooking, Likewar: The Weaponization of taking-war-to-social-media. Social Media (Boston: Houghton Mifflin Harcourt, 2018). 11 Donald Rumsfeld, “Transforming the Military,” For eign Affairs, June 2002, https:// 2 “SMEIR: Social Media Environment and Internet www.foreignaffairs.com/articles/2002-05-01/ Replication,” SMEIR, https://www.smeir.net/ transforming-military. (accessed March 18, 2019). 12 Arthur K. Cebrowski and John H. Garstka, 3 John Arquilla et al., eds., “Cyberwar Is Coming!,” “Network-Centric Warfare - Its Origin and Future,” Pr in In Athena’s Camp: Preparing for Conflict in the oceedings 124, no. 1/1,139 (January 1998), https:// Information Age (Santa Monica, Calif: Rand, 1997), www.usni.org/magazines/proceedings/1998/january/ https://www.rand.org/pubs/reprints/RP223.html. network-centric-warfare-its-origin-and-future.

4 The above scene is from Singer and Brooking, Like 13 Judd Legum, “Rumsfeld Lies About Pre-War war. Predictions: ‘You Can Take That To The Bank,’” Think Progress, December 9, 2005, https:// 5 Candace Rondeaux and David Sterman, “Twenty- thinkprogress.org/rumsfeld-lies-about-pre-war- First Century Proxy Warfare: Confronting Strategic predictions-you-can-take-that-to-the- Innovation in a Multipolar World” (New America, bank-5457831b2f25/. February 20, 2019), https://www.newamerica.org/ international-security/reports/twenty-first-century- 14 Patrick Lin, “Pain Rays and Robot Swarms: The proxy-warfare-confronting-strategic-innovation- Radical New War Games the DOD Plays,” The multipolar-world/. Atlantic, April 15, 2013, https://www.theatlantic.com/ technology/archive/2013/04/pain-rays-and-robot- 6 , “Three Pillars of swarms-the-radical-new-war-games-the-dod-plays/ Counterinsurgency” (U.S. Government 274965/. Counterinsurgency Conference, Washington D.C., 2006), http://www.au.af.mil/au/awc/awcgate/uscoin/ 15 P.W. Singer, Wired for War (HMH, 2009); April 3pillars_of_counterinsurgency.pdf. Glaser and Rani Molla, “The Number of Robots Sold in the U.S. Will Jump Nearly 300 Percent in Nine 7 “Format of U.S. Overseas Internal Defense Policy Years,” ReCode, April 3, 2017, https:// (USOIDP)” (CIA, January 1, 1962), https:// www.recode.net/2017/4/3/15123006/robots-sold- www.cia.gov/library/readingroom/document/cia- america-growth-300-percent-jobs-automation. rdp78-06207a000100050008-4. 16 Oriana Pawlyk, “Pentagon Still Questioning How 8 J.C.R. Licklider, “Licklider Describes the Smart to Make Its Drone Swarms,” Military.Com, ‘Intergalatic Computer Network,’” April 25, 1963, February 7, 2019. http://www.historyofinformation.com/detail.php? entryid=1029. 17 Henry Conrad, “Here’s What Jobs Robots Will Be Taking over in the near Future,” ZME Science, 9 “From Brick to Slick: A history of Mobile Phones,” September 15, 2015, https://www.zmescience.com/ Wired, March 20019. https://www.wired.com/ research/robot-jobs-15092015/. 2009/03/gallery-cell-phone-history/

newamerica.org/international-security/reports/insurgency-2030/ 26 18 Molly Kinder, “Learning to Work WIth Robots,” Fo the-bridge/2017/6/8/-chinas-quest-for-an-ai- reign Policy, July 11, 2018, https://foreignpolicy.com/ -in-warfare. 2018/07/11/learning-to-work-with-robots-automation- ai-labor/. 27 “Artificial Intelligence (AI) Trends,” Mad Scientist Laboratory, December 14, 2017, https:// 19 Steve LeVine, “Robots May Have given Trump an madsciblog.tradoc.army.mil/11-artificial-intelligence- Edge in 2016,” Axios, July 8, 2018, https:// ai-trends/. www.axios.com/robots-automation-populist- uprising-2016-presidential- 28 John McCormick, “Worldwide AI Spending to Hit election-45400a64-9ee3-4a46-b473- $35.8 Billion in 2019,” Wall Street Journal, March 13, ab822429631b.html. 2019, https://www.wsj.com/articles/worldwide-ai- spending-to-hit-35-8-billion-in-2019-11552516291. 20 Abdel Bari Atwan, Islamic State: The Digital Caliphate (Oakland, California: University of 29 Brian Barrett, “McDonalds bites on Big Data with California Press, 2015). $300 million acquisition,” Wired, March 25, 2019, https://www.wired.com/story/mcdonalds-big-data- 21 Peter Newman, “IoT Report: How Internet of dynamic-yield-acquisition/; James Vincent, “John Things technology growth is reaching mainstream Deere is buying an AI startup to help teach its companies and consumers,” Business Insider, Jan. 28, tractors how to farm,” The Verge, September 7, 2017, 2019https://www.businessinsider.com/internet-of- https://www.theverge.com/2017/9/7/16267962/ things-report automated-farming-john-deere-buys-blue-river- technology; Deere and Company, “Deere to Advance 22 Bradley Boughton, “2017 Cyber Security Threats, Machine Learning Capabilities in Acquisition of Blue Predictions, Funding & Trends,” Glocomms, February River Technology,” PR Newswire, September 6, 2017, 22, 2017, https://www.phaidoninternational.com/ https://www.prnewswire.com/news-releases/deere- industryinsights/2017-cyber-security-threats- to-advance-machine-learning-capabilities-in- predictions-funding-and-trends-715030103047878. acquisition-of-blue-river-technology-300514879.html.

23 Michelle Drolet, “Botnets: Is Your Network Really 30 Michael McDonough, Twitter, February 28, 2017, Protected?,” CSO, March 13, 2017, https:// https://twitter.com/m_mcdonough/status/ www.csoonline.com/article/3179430/botnets-is-your- 836580294484451328. network-really-protected.html. 31 Jonathan Merritt, “Is AI a Threat to Christianity,” 24 Chris Meserole and Alina Polyakova, The Atlantic, February 3, 2017, https:// “Disinformation Wars,” Foreign Policy, May 25, 2018, www.theatlantic.com/technology/archive/2017/02/ https://foreignpolicy.com/2018/05/25/disinformation- artificial-intelligence-christianity/515463/. wars/. 32 Amie Tsang and Michael J. de la Merced, 25 David Canellis, “China Is Forcing Blockchain Devs “Morning Agenda: Masayoshi Son Warns of the to Dox Users, Censor Content,” TNW, January 10, Singularity,” New York Times, September 20, 2017, 2019, https://thenextweb.com/hardfork/2019/01/10/ https://www.nytimes.com/2017/09/20/business/ china-blockchain-censorship/. dealbook/masayoshi-son-softbank-artificial- intelligence.html. 26 Elsa B. Kania, “数字化 – 网络化 – 智能化: China’s Quest for an AI Revolution in Warfare,” The Strategy 33 Lee Rainie and Janna Anderson, “Code- Bridge, June 8, 2017, https://thestrategybridge.org/ Dependent: Pros and Cons of the Algorithm Age”

newamerica.org/international-security/reports/insurgency-2030/ 27 (Pew Research Center, February 8, 2017), https:// 41 Meserole and Polyakova, “Disinformation Wars.” www.pewinternet.org/2017/02/08/code-dependent- pros-and-cons-of-the-algorithm-age/? 42 “Why TensorFlow,” TensorFlow, accessed March utm_content=buffera79ab&utm_medium=social&ut 28, 2019, https://www.tensorflow.org/. m_source=twitter.com&utm_campaign=buffer. 43 Eric Schmitt, “Pentagon Tests Lasers and Nets to 34 Feng Zhang, “Questions and Answers about a Vexing Foe: ISIS Drones,” New York Times, CRISPR,” Broad Institute, https:// September 23, 2017, https://www.nytimes.com/ www.broadinstitute.org/what-broad/areas-focus/ 2017/09/23/world/middleeast/isis-drones-pentagon- project-spotlight/questions-and-answers-about- experiments.html. crispr. 44 “Houthi Drones Kill Several at Yemeni Military 35 Antonio Regalado, “China’s CRISPR Twins Might Parade,” Reuters, January 10, 2019, https:// Have Had Their Brains Inadvertently Enhanced,” MIT www.reuters.com/article/us-yemen-security/houthi- Technology Review, February 21, 2019, https:// drones-kill-several-at-yemeni-military-parade- www.technologyreview.com/s/612997/the-crispr- idUSKCN1P40N9. twins-had-their-brains-altered/. 45 Becky Ferreira, “The Race to Launch the First 36 Luke Dormehl, “This Scientist Can Control a Student-Built Rocket into Space Is On,” Vice Swarm of Drones with His Thoughts,” Digital Trends, Motherboard, February 23, 2018, https:// July 15, 2016, https://www.digitaltrends.com/cool- motherboard.vice.com/en_us/article/3k77jb/the- tech/drone-swarm/. race-to-launch-the-first-student-built-rocket-into- space-is-on. 37 Philip Perry, “New MIT Device Can Read Your ‘inside Voice’, Marking the Dawn of Telepathy Tech,” 46 Peter W. Singer, “The 2018 State of the Digitial BIg Think, April 11, 2018, https://bigthink.com/philip- Union: The Seven Deadly Sins of Cyber Security We perry/you-can-use-the-internet-telepathically-using- Must Face,” War on the Rocks, January 30, 2018, this-device-developed-at-mit. https://warontherocks.com/2018/01/2018-state- digital-union-seven-deadly-sins-cyber-security-must- 38 Rhiannon Williams, “Solar-Powered Drone Is face/. Capable of Flying for up to a Year at a Time,” I News, May 4, 2018, https://inews.co.uk/news/technology/ 47 Jack Wallen, “Five Nightmarish Attacks That solar-powered-drone-is-capable-of-flying-for-up-to- Show the Risks of IoT Security,” ZDNet, June 1, 2017, a-year-at-a-time/. https://www.zdnet.com/article/5-nightmarish- attacks-that-show-the-risks-of-iot-security/. 39 Martin Evans, “‘3D Printed Gun’ Discovered by Police,” The Telegraph, October 25, 2013, https:// 48 The coalition invasion force numbered roughly www.telegraph.co.uk/news/uknews/crime/ 380,000 vs roughly 1.3 million defenders. Kenneth 10403432/3D-printed-gun-discovered-by- Katzman, "Iraq: Post-Saddam Governance and police.html. Security," fpc.state.gov/. Congressional Research Service. Retrieved 23 September 2014. 40 Nick Waters, “ISIS Is Building Bombs to Arm Its Drone Air Force,” War Is Boring, February 10, 2017, 49 Dennis C. Blair and Jon M. Huntsman Jr., “The IP https://medium.com/war-is-boring/isis-is-building- Commission Report” (National Bureau of Asian bombs-to-arm-its-drone-air-force-4179ce3befa9. Research, May 2013), http://www.ipcommission.org/ report/ip_commission_report_052213.pdf.

newamerica.org/international-security/reports/insurgency-2030/ 28 50 Paul Triolo and Jimmy Goodrich, “From Riding a Corporation, 1974), https://www.rand.org/pubs/ Wave to Full Steam Ahead,” DigiChina (blog), papers/P5261.html. February 28, 2018, https://www.newamerica.org/ cybersecurity-initiative/digichina/blog/riding-wave- 59 “Research suggests bots generated social media full-steam-ahead/. stories during EU Referendum,” Swansea University Press Office, November 22, 2017, https:// 51 P. W. Singer and Emerson T. Brooking, “Eastern www.swansea.ac.uk/press-office/latest-research/ Arsenal,” Popular Science, accessed March 28, 2019, researchsuggestsbotsgeneratedsocialmediastoriesdu https://www.popsci.com/blog-network/eastern- ringeureferendum.php, United States Senate arsenal. Committee on the Judiciary, Subcommittee on Crime and Terrorism, Update on Results of Retrospective 52 Cade Metz and Natasha Singer, “Newspaper Review of Russian-Related Election Activity, hearing Shooting Shows Widening Use of Facial Recognition on Twitter, Inc. January 19, 2019, https:// by Authorities,” New York Times, June 29, 2018, www.judiciary.senate.gov/imo/media/doc/ https://www.nytimes.com/2018/06/29/business/ Edgett%20Appendix%20to%20Responses.pdf. newspaper-shooting-facial-recognition.html. 60 “Mexico election: Concerns about election bots, 53 Jim Giles, “Cameras Know You by Your Walk,” N trolls and fakes,” BBC, May 30, 2018. https:// ew Scientist, September 19, 2012, https:// www.bbc.com/news/blogs-trending-44252995; www.newscientist.com/article/mg21528835-600- Andrew Beaton, “How Russian Trolls Inflamed the cameras-know-you-by-your-walk/. NFL’s Anthem Controversy,” Wall Street Journal, Oct 22, 2018, https://www.wsj.com/articles/how-russian- 54 “Predictive Analytics for Geopolitical Risk,” trolls-inflamed-nfls-anthem- PreData, accessed March 28, 2019, https:// controversy-1540233979?ns=prod/accounts-wsj; www.predata.com/. “Weaponized Health Communication: Twitter Bots and Russian Trolls Amplify the Vaccine Debate,” 55 Marc Bain, “New ‘Camouflage’ Seeks to Make American Journal of Public Health, Oct 2018. https:// You Unrecognizable to Facial-Recognition www.ncbi.nlm.nih.gov/pmc/articles/PMC6137759/ Technology,” Quartz, January 6, 2017, https://qz.com/ 878820/new-camouflage-promises-to-make-you- 61 Natasha Lomas, “Lyrebird Is a Voice Mimic for unrecognizable-to-facial-recognition-technology/. the Fake News Era,” Tech Crunch (blog), April 25, 2017, https://techcrunch.com/2017/04/25/lyrebird-is- 56 Tim Maly, “Anti-Drone Camouflage: What to a-voice-mimic-for-the-fake-news-era/. Wear in Total Surveillance,” WIRED, January 17, 2013, https://www.wired.com/2013/01/anti-drone- 62 Shunsuke Saito et al. “Photorealistic Facial camouflage-apparel/. Texture Inference Using Deep Neural Networks,” December 2, 2016, https://arxiv.org/abs/1612.00523. 57 David Hambling, “Ships Fooled in GPS Spoofing Attack Suggest Russian ,” New 63 Anh Nguyen et al. “Plug & Play Generative Scientist, August 10, 2017, https:// Networks: Conditional Iterative Generation of www.newscientist.com/article/2143499-ships- Images in Latent Space,” November 30, 2016, https:// fooled-in-gps-spoofing-attack-suggest-russian- arxiv.org/abs/1612.00005. cyberweapon/. 64 Will Knight, “Meet the Fake Celebrities Dreamed 58 Brian Michael Jenkins, “International Terrorism: Up by AI,” MIT Technology Review, October 31, 2017, A New Kind of Warfare” (Santa Monica, CA: RAND https://www.technologyreview.com/the-download/

newamerica.org/international-security/reports/insurgency-2030/ 29 609290/meet-the-fake-celebrities-dreamed-up-by- ai/.

65 Carl Vondrick, Hamed Pirsiavash, and Antonio Torralba, “Generating Videos with Scene Dynamics” (29th Conference on Neural Information Processing Systems, Barcelona, Spain, 2016), http:// www.cs.columbia.edu/~vondrick/tinyvideo/ paper.pdf.

66 Matt Chessen, “The MADCOM Future” (Atlantic Council, September 26, 2017), https:// www.atlanticcouncil.org/publications/reports/the- madcom-future.

67 Singer and Brooking, Likewar.

68 General Stanley McChrystal, “War in the 21st Century,” Remarks at ECCSR, UAE, Oct 22, 2017.

69 Marc Spitz, “Werner Herzog Says ‘The Internet Has Its Glorious Side’’,’” New York Times, August 18, 2016, https://www.nytimes.com/2016/08/21/movies/ werner-herzog-lo-and-behold.html.

newamerica.org/international-security/reports/insurgency-2030/ 30

This report carries a Creative Commons Attribution 4.0 International license, which permits re-use of New America content when proper attribution is provided. This means you are free to share and adapt New America’s work, or include our content in derivative works, under the following conditions:

• Attribution. You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.

For the full legal code of this Creative Commons license, please visit creativecommons.org.

If you have any questions about citing or reusing New America content, please visit www.newamerica.org.

All photos in this report are supplied by, and licensed to, shutterstock.com unless otherwise stated. Photos from federal government sources are used under section 105 of the Copyright Act.

newamerica.org/international-security/reports/insurgency-2030/ 31