Swarming (military)
Encyclopedia
Military swarming is a behavior where autonomous, or semi-autonomous, units of action attack an enemy from several different directions and then regroup. Pulsing, where the units shift the point of attack, is a part of military swarming. Swarming is not limited to the human military realm. As the name suggests, it comes from insect behavior, although social insects, such as bee
Bee
Bees are flying insects closely related to wasps and ants, and are known for their role in pollination and for producing honey and beeswax. Bees are a monophyletic lineage within the superfamily Apoidea, presently classified by the unranked taxon name Anthophila...

s, wasp
Wasp
The term wasp is typically defined as any insect of the order Hymenoptera and suborder Apocrita that is neither a bee nor an ant. Almost every pest insect species has at least one wasp species that preys upon it or parasitizes it, making wasps critically important in natural control of their...

s and ant
Ant
Ants are social insects of the family Formicidae and, along with the related wasps and bees, belong to the order Hymenoptera. Ants evolved from wasp-like ancestors in the mid-Cretaceous period between 110 and 130 million years ago and diversified after the rise of flowering plants. More than...

s, also use its principles in nest building, food gathering and reproduction.

Military swarming involves the use of a decentralized force against an opponent, in a manner that emphasizes mobility, communication, unit autonomy and coordination or synchronization. Historically military forces have used the principles of swarming without really examining them explicitly, but there is now active research in consciously examining military doctrines that draw ideas from swarming. In nature and nonmilitary situations, there are other various forms of swarming. Biologically driven forms are often complex adaptive systems, but have no central planning, simple individual rules, and nondeterministic behavior that may or may not evolve with the situation.

Current military explores swarming addresses the spectrum of military operations, from strategic through tactical, An expert group evaluated swarming's role in the "revolution in military affairs" or force transformation. They observed that military swarming is primarily tactical, sometimes operational and rarely strategic, and is a complement to other efforts rather than a replacement for them. Swarming is a logical extension of network-centric warfare, but the networks needed to make swarming routine will be available around 2010-2011. At present, the networking for swarming is only available in specific contexts.

Reviewing swarming and non-swarming conflict

Major differences from swarming in nature include the deliberate triggering of swarming, and continual synchronization both to avoid fratricide
Fratricide
Fratricide is the act of a person killing his or her brother....

 and to apply the forces available in the most effective way. Swarming operations may have more local autonomy than in traditional command and control, but there is still coordination. A unit that fails to coordinate becomes a prime candidate for fratricide (i.e., being attacked by its own side) if its own side does not recognize it.

From a military tactical standpoint, there are four basic doctrines, of which swarming is one:
  • swarming
  • chaotic melee
  • brute-force massing
  • nimble manoeuvre


Melee is unorganized and random fighting, in contrast with the distributed organization of swarming. Examples of melee are tribal warfare, modern gang fighting, World War I dogfights, ancient naval conflict and modern urban warfare. Massing, is organized warfare in which armies use strict structure to have such as large mass they can overwhelm the enemy. Manoeuvre is similar to mass except that mass is concentrated at a particular point.

Not every converging operation is swarming. "...the phrase “convergent attack” could be stretched to include every case in history in which an army or unit ended up surrounded by the enemy and attacked from all sides during the course of a battle. Encircling and surrounding an enemy has always been a desirable goal: It cuts off the enemy’s supply lines and destroys his morale by cutting off any possible retreat. The distinction is that swarming implies a [intentional, planned] convergent attack by many units as the primary manoeuvre from the start of the battle or campaign, not the convergent attacks that result as a matter of course when some unit becomes isolated and encircled because of some other manoeuvre.

Biological swarming

In nature, swarming plays on the natural physical and psychological vulnerabilities of the victim. Being spread out confuses the victim in regard to numbers. On the one hand the enemy seems to be everywhere but on the other hand the enemy is only seen in small numbers. This causes the victim to greatly overestimate or underestimate the size of the enemy. As the enemy quickly joins forces and attacks the victim, the victim becomes extremely confused and disoriented. All of these results are also the object of most military operations.

Swarming theorists draw on biological and historical examples that exhibited the characteristics of deliberate swarming. The Joint Experimentation Directorate (J9) of the U.S. Joint Forces Command defined military swarming as "a maneuver in which forces and firepower converge on a target force simultaneously from all directions. The DOD expects swarming tactics to play an important role in future battlefield environments involving small, dispersed, autonomous units operating independently using networked, decentralized command and control. This tactic is especially important for rapid reaction forces that need to avoid sustained direct-fire battles and rely on elusiveness for survivability. The MITRE Corporation is continuing the J9 work, by studying behaviors of bird flocks, animal herds, and insect colonies, and how they communicate and coordinate. Clearly, ants do not form and use a concept of swarming, but they can be observed to deposit chemical pheromones to coordinate foraging and other activities has proved extremely valuable. Algorithms based on the models that ants use to coordinate through pheromones were effective controlling a swarm of unmanned aerial vehicles conducting an attack against mobile targets.

Ant algorithms, in the MITRE work, are described as lattice swarm models. In lattice swarm models, individual agents are constrained to behave in a three-dimensional space defined by a discrete lattice. Each agent has a repertoire of actions it can use to move through this space and modify the environment. An agent's sensors detect information derived from local properties of the agent's current position in the lattice and the positions directly adjacent to it. Since each agent has only a local view of the overall activity in the swarm, some additional mechanism must be available to coordinate the collective behavior of the swarm. Pheromones are one example of such a mechanism.

Stigmergy
Stigmergy
Stigmergy is a mechanism of indirect coordination between agents or actions. The principle is that the trace left in the environment by an action stimulates the performance of a next action, by the same or a different agent...

 is an example of insect behaviors relevant to swarming. The term was introduced by Pierre-Paul Grassé
Pierre-Paul Grassé
Pierre-Paul Grassé, born on November 27, 1895 in Périgueux and died on July 9, 1985, was a French zoologist, author of over 300 publications including the influential 35-volume Traité de Zoologie. He was an expert on termites.- Studies :...

, and explains that hive insects build complex nests by taking their cues from the structure itself. As the nest is built, the insects observe its current state and change their behavior accordingly to build the next piece. The behavior of wasps as they construct their sophisticated nests is a well-studied example of swarming behavior that can be modeled in the lattice swarm framework. The building activities of each individual wasp are directed purely by observing the nest components constructed by the other wasps in adjacent locations.

Massive, instinctively coordinated nest building

In the context of wasp nests, Theraulaz and Bonabeau elaborated on stigmergy. Specifically, it is the coordination of activities throughout an environment. The control mechanisms for stimergy may be:
  • Continuous or quantitative stigmergy, in which quantitatively different stimuli trigger quantitatively different behaviors
  • Discrete or qualitative stigmergy, where stimuli are classified into distinct classes, which trigger distinct behaviors

Massive, instinctively coordinated crisis response

Bees exhibit it when defending the hive, and it is useful to remember that a bee dies after it stings, so it is more analogous to a missile than a combat unit. Ants use massive numbers, attacking from all directions, in attacking prey, or competing ants, in a relatively small area.

Pack-level coordination

Wolves and hyenas have also been shown to use swarming tactics. Unlike bees and ants, wolves often do not have massive numbers and are frequently outnumbered by their prey. However wolves stay far apart allowing them to cover more territory than their more numerous prey can. They only come together at the last moment to attack a weak member of the herd together. The ability to cover vast areas of land with few numbers, and to rapidly attack the enemy’s weak point from all sides has definite military applications. Pack behavior and hierarchy control the coordination of this sort of swarm.

Nonmilitary swarming

Two additional kinds of swarming demonstrate the behavior, but not in a manner precisely relevant to military strategy.

Opportunistic and uncoordinated

The next form of nonmilitary swarming is opportunistic, in which many individuals simply join in on a successful attack. These are not efficient models for military swarming, as there is very little coordination, and sometimes competition, among the members of the swarm. Mobs, soccer hooligans, viruses, bacteria and sharks all engage in this sort of attack.

Opportunistic and variably coordinated

More coordinated swarms are seen in sports and in malicious hacking of networked computers. Hackers often use swarming practices. By gaining control of many victims email accounts they are able to concentrate a massive assault on their target from countless different sources and overwhelm their target. Swarming is even used in sports. Basketball teams use a “triangle offense” in which players are dispersed but can rapidly pass the ball between each other.

The key to swarming is information, distributed to the swarm operating resources, to on-scene commanders when the swarm is not autonomous, and to senior commanders who can release more resources to the swarm. Information is necessary both to avoid fratricide and target the enemy. Many hackers argue that the future of information conflict is swarming.

Political swarms

Either opportunistically or preplanned, the use of swarming is becoming a factor in political demonstrations and may become significant in unconventional warfare
Unconventional warfare
Unconventional warfare is the opposite of conventional warfare. Where conventional warfare is used to reduce an opponent's military capability, unconventional warfare is an attempt to achieve military victory through acquiescence, capitulation, or clandestine support for one side of an existing...

 in urban areas. Among the best known examples is the WTO Ministerial Conference of 1999 protest activity
WTO Ministerial Conference of 1999 protest activity
Protest activity surrounding the WTO Ministerial Conference of 1999, which was to be the launch of a new millennial round of trade negotiations, occurred on November 30, 1999 , when the World Trade Organization convened at the Washington State Convention and Trade Center in Seattle, Washington,...

 and the EDSA Revolution of 2001 that overthrew Philippine President Joseph Estrada
Joseph Estrada
Joseph "Erap" Ejercito Estrada was the 13th President of the Philippines, serving from 1998 until 2001. Estrada was the first person in the Post-EDSA era to be elected both to the presidency and vice-presidency.Estrada gained popularity as a film actor, playing the lead role in over 100 films in...

. Both used text messaging, cellphones, and websites for near-real-time coordination, previously associated only with advanced military forces. As described by Howard Rheingold
Howard Rheingold
-See also:* Collective intelligence* Information society* The WELL* Virtual community-External links:***** at TED conference** a 48MB Quicktime movie, hosted by the Internet Archive...

, "Smart mobs emerge when communication and computing technologies amplify human talents for cooperation.

Planned and highly coordinated

In North America, the Incident Command System
Incident Command System
The Incident Command System is "a systematic tool used for the command, control, and coordination of emergency response" according to the United States Federal Highway Administration...

 is the main paradigm for emergency response to incidents requiring many responders. ICS originated in the fire service, where, even at a relatively small incident, there still needs to be an Incident Commander (IC) to which all firefighters look for guidance. Police use it as well, for events requiring multiple responses (e.g., hostage and bomb situations). Honan described well-managed public safety emergencies, under ICS, as a swarm model. They differ from some in that the operational units are not completely autonomous, there is an on-scene Incident Commander (IC), and higher command levels support the IC with resources.

If the IC decides that more resources are needed, there are specific protocols for calling in resources from one's own department, from neighboring areas with which there are mutual aid agreements, and, for sufficiently large incidents, all the way up to national resources. As the response grows, the original IC may be replaced by a more appropriate commander, but the handover is always well-defined; the responders never need to question their point of command. When high value low density (HVLD) assets are needed, such as bomb squads or SWAT
SWAT
A SWAT team is an elite tactical unit in various national law enforcement departments. They are trained to perform high-risk operations that fall outside of the abilities of regular officers...

, the IC requests their assignment, but controls them once they are assigned.

Swarming applies in the sense that additional resources may arrive in a semi-random manner, and need to be directed to the appropriate point of attack on a fire or other disaster. Mutual aid agreements may trigger a distributed form of swarming, in which neighboring jurisdictions send their firefighters to stations vacated by the responders in the original department, and will respond to unrelated incidents.

While the IC runs operations at the event, there is still a 911 dispatch center that directs responses to other incidents. As the incident grows in size, a Joint Command post is established to coordinate delivering more swarm resources to the IC, and finding additional resources. For the largest disasters, the National Incident Management System
National Incident Management System
The National Incident Management System is emergency management doctrine used nationwide to coordinate emergency preparedness and incident management and response among the public and private sectors.NIMS is a comprehensive, national approach to incident management that is applicable at all...

 (NIMS) is activated. The Joint Command or NIMS center may manage the dispatch of resources to ICs at multiple incidents.

Swarming in history

Enthusiasts of swarming sometimes apply it to situations that have superficial similarities, but really do not qualify as swarms. While swarms do converge on a target, not every military action, where multiple units attacked from all sides of a target, constitute swarming. Other conflicts, especially historical ones, fit a swarming paradigm, but the commanders involved did not use the concept. Nevertheless, historical examples help illustrate what modern analysts do and do not consider swarming.

Some historical examples with at least some aspect of swarming are given below. In examining this list, one must be careful to distinguish those that truly had a hit-and-run, "pulsing" quality, rather than simply having multiple forces converge on an enemy.

Ancient swarm and counter-swarm

At the siege of Samarkand, Spitamenes used Bactrian horse archers in effective swarming attacks against a relief column sent by Alexander the Great. Bactrian horse archers surrounded various Macedonian phalanxes, staying out of range of their melee weapons, and fired arrows until they had no more. The archers would then withdraw to a supply point, but another swarm of horse archers would sometimes replace them, and sometimes attack elsewhere. The Bactrians eventually caused the phalanx to break formation, and destroyed it.

Alexander recognized his forces could not directly combat horse archers, but that the horse archers needed resupply of provisions, horses, and arrows. Alexander split his forces into five columns and began building fortifications in the areas where the Bactrians had resupplied. Eventually, his anti-swarm tactics worked: cut off from resupply, the Bactrians had to meet the Macedonian phalanx, which were vastly superior in melee.

Alexander made it priority to engage guerillas or other light mobile forces. Spitamenes was effective as long as his force were mobile, and he had adequate communications with mounted couriers. Once he was forced into direct battle with heavy forces, he literally lost his head.

At the Battle of the Jaxartes River, Alexander once again faced swarming tactics from an army of Scythian horse archers. Alexander sent a unit of heavy cavalry ahead of his main line. As expected, the Scythian horsemen surrounded the detached cavalry. At the right moment, Alexander's cavalry reversed direction and pushed half of the Scythians straight into the main phalanx of Alexander's army, where they were slaughtered. Upon seeing this, the remaining half of the Scythian army retreated from the battle.

What is not swarming

Merely because multiple units converge on a target, they are not necessarily swarming. Siege operations do not involve swarming, because there is no manoeuvre; there is convergence but on the besieged fortification. To return briefly to the civilian model of incident command, the IC may send task forces to deal with secondary fires or other events within the incident area, but separate from the main incident.

Guerilla ambushes do not constitute swarms, because they are "hit-and-run". Even though the ambush may have several points of attack on the enemy, the guerillas withdraw when they either have inflicted adequate damage, or when they are endangered.

Swarms may seem similar to double envelopments such as the Battle of Cannae
Battle of Cannae
The Battle of Cannae was a major battle of the Second Punic War, which took place on August 2, 216 BC near the town of Cannae in Apulia in southeast Italy. The army of Carthage under Hannibal decisively defeated a numerically superior army of the Roman Republic under command of the consuls Lucius...

, but there are key differences. In a double envelopment, the center immobilizes the enemy force, while the enveloping forces move against its flanks. Rather than having the Carthaginians in constant contact with the Roman flanks, grinding them to death, for the battle to involve swarming, the Carthaginians on the flank would have stayed mobile, using missile weapons as much as possible. Carthaginian cavalry might have made occasional shock attacks on the Romans, but for the battle to be swarming, they would need to pull back after each shock.

A marginally swarming situation is where the flow of battle isolates enemy units, and friendly units surround it. To make this a swarming situation, there has to be communication and synchronization, and a deliberate doctrine to manoeuvre in a swarming style. Like the guerillas, swarming units are relatively light, avoid close combat, and use hit and run tactics. Unlike the guerillas, the swarming units may withdraw and hit again and again, from new directions. In Edwards' term, swarming has to involve pulsing of multiple attacks. Swarming is attritional, but not in the grinding sense of the Battle of the Wilderness
Battle of the Wilderness
The Battle of the Wilderness, fought May 5–7, 1864, was the first battle of Lt. Gen. Ulysses S. Grant's 1864 Virginia Overland Campaign against Gen. Robert E. Lee and the Confederate Army of Northern Virginia. Both armies suffered heavy casualties, a harbinger of a bloody war of attrition by...

 or the trenches of the First World War or human wave attacks in the Korean War.

Mongol swarming

Mongols under Genghis Khan did practice an equivalent of swarming, partially because their non-electronic communications were still advanced for the time, within the limitations of communications by flags, horns, and couriers. Also one of the standard tactics of Mongol military was the commonly practiced feigned retreat to break enemy formations and to lure small enemy groups away from larger group and defended position for ambush and counterattack.

Genghis Khan used the Yam
Yam (route)
Yam is a supply point route messenger system employed and extensively used and expanded by Genghis Khan and used by subsequent Great Khans and Khans.Relay stations were used to give food, shelter and spare horses for Mongol armies messengers...

 system, which established a rear line of points for supplies and for remounts of fast-moving couriers. The remount system allowed horsemen to move much faster than the couriers of opponents without them. These couriers kept the Mongol senior and subordinate commanders informed, such that they could make fast decisions based on current information. In modern terms, the courier system provided the means of getting inside the opponent's OODA loop
OODA Loop
The OODA loop is a concept originally applied to the combat operations process, often at the strategic level in military operations. It is now also often applied to understand commercial operations and learning processes...

. With fast communications, the Mongols could make decisions not just on what they could see locally, but with that information oriented within the overall situation. They could then decide and act while the enemy were still waiting for information. Outnumbered Mongols could beat larger forces by faster communications, which allowed units to withdraw and regroup while other groups continually stung the enemy, withdrew in turn, while the earlier group again hit the enemy.

The evolution of modern swarming

Swarming was present in the operations of Alexander the Great and Genghis Khan, but were generally replaced by melee and mass in the pre-industrial era. More synchronized manoeuvre was paced by the availability of mobile communications. Blitzkrieg
Blitzkrieg
For other uses of the word, see: Blitzkrieg Blitzkrieg is an anglicized word describing all-motorised force concentration of tanks, infantry, artillery, combat engineers and air power, concentrating overwhelming force at high speed to break through enemy lines, and, once the lines are broken,...

 was certainly a use of manoeuvre, but it was less flexible than later operations in which every tank and aircraft had radios, and far less flexible than forces that have effective networked information systems. They define swarming, in a military context, as "...seemingly amorphous, but it is a deliberately structured, coordinated, strategic way to strike from all directions, by means of a sustainable pulsing of force and/or fire, close-in as well as from stand-off positions."

One aspect of swarming is that it moves away from the traditional model of a rigid chain of command. This paper suggests abandoning the term command and control in favor of
  • agility: "... the critical capability that organizations need to meet the challenges of complexity and uncertainty"
  • focus: "provides the context and defines the purposes of the endeavor"
  • convergence. "convergence is the goal-seeking process that guides actions and effects."


Agility is a characteristic of an organization or unit capable of swarming. Focus can be designation of a goal by a higher-level commander, by a peer unit detecting a target, or by intelligence systems that feed information to the swarming units. Convergence is the key feature, which, while it can be distributed, causes swarming units to coordinate their actions, apply force, and know when to stop applying force.

Edwards holds that several axioms of military doctrine change with the use of swarming: >
Edwards on principles of war changed by swarming
Traditional principle of war Redefinition with swarming
Mass Dispersed mass
Economy of force Simultaneity
Unity of command Unity of effort


Osgood points out that swarming is not new, although the means of coordination and synchronization are going through significant changes.
Howard Rheingold cites mobile communications technology as a key enabler: The bees sense each other's buzzing and instinctually move in concert in real time. Text messaging on mobile devices and instantaneous file sharing off the internet via PDAs allows groups of people to receive their instructions, move in unison, nearly instantaneously, without prior planning or forethought. And, the technology allows groups to do so without a central leader. One modern example is the protesters at the World Trade Organization meetings in Seattle, in 1999, who were able to orchestrate their movement effectively in this way.

Blitzkrieg was not swarming

While many might think of blitzkrieg as swarming, the delays between armored attacks were longer than the characteristic pulsing. Part of the problem is while the armored groups were highly mobile, much of the logistical support was horse-drawn and the infantry to hold the flanks moved by foot.

There were also problems with communications. Not all tanks or aircraft had radios, and when they did, they often were incompatible. The Germans had not worked out a combined forces command post that could manage swarming, and the potentially swarming elements lacked the communications to do this autonomously.

While the situation at the Battle of Dunkirk
Battle of Dunkirk
The Battle of Dunkirk was a battle in the Second World War between the Allies and Germany. A part of the Battle of France on the Western Front, the Battle of Dunkirk was the defence and evacuation of British and allied forces in Europe from 26 May–4 June 1940.After the Phoney War, the Battle of...

 was more complex since Hermann Göring
Hermann Göring
Hermann Wilhelm Göring, was a German politician, military leader, and a leading member of the Nazi Party. He was a veteran of World War I as an ace fighter pilot, and a recipient of the coveted Pour le Mérite, also known as "The Blue Max"...

, commanding the German Luftwaffe
Luftwaffe
Luftwaffe is a generic German term for an air force. It is also the official name for two of the four historic German air forces, the Wehrmacht air arm founded in 1935 and disbanded in 1946; and the current Bundeswehr air arm founded in 1956....

 air arm, had promised to destroy the desperately retreating forces, had swarming been used, pressure would never have been taken off the British and allied forces.

Swarming by the Royal Air Force in the Battle of Britain

In contrast, Royal Air Force
Royal Air Force
The Royal Air Force is the aerial warfare service branch of the British Armed Forces. Formed on 1 April 1918, it is the oldest independent air force in the world...

 (RAF) Fighter Command, in the Battle of Britain
Battle of Britain
The Battle of Britain is the name given to the World War II air campaign waged by the German Air Force against the United Kingdom during the summer and autumn of 1940...

, had excellent communications and coordination. While radar is often credited as the winning factor for the British, the Sector Stations and the overall British command system was even more critical. Air defense commanders had information constantly funneled to them from a variety of sources, certainly including radar but also readiness reports from bases, combat reporting from engaged fighters, sightings from ground observer and antiaircraft artillery sites, and SIGINT.

The British were often able to judge when the Germans had committed their forces, and would then move fighters assigned to areas not under attack to join the heavily engaged forces.

German tactics in the Battle of the Atlantic: mixed benefits

German U-boats used the same tactics during World War II that wolves use against prey. Despite being against the two largest navies in the world, during the years of 1941 and 1942 the Germans were sinking more ships than the allies could produce. Individual U-Boats patrolled throughout the Atlantic but could then come together and attack weak merchant ships from all sides.

When wolfpacks could attack in a swarm, they needed to be ordered to do so, and coordinated, by radio. The Germans did not know the extent to which the Allies could use effective radio direction-finding HF/DF and cryptanalysis of the messages sent by their Enigma machine
Enigma machine
An Enigma machine is any of a family of related electro-mechanical rotor cipher machines used for the encryption and decryption of secret messages. Enigma was invented by German engineer Arthur Scherbius at the end of World War I...

s. Eventually, the Allies combined SIGINT with swarms of aircraft, cooperating with antisubmarine vessels, to sink enough U-boats to minimize the threat.

Battle of Surigao Strait: decisive swarming victory

One of the battles of the Leyte Gulf campaign, which would have been a major engagement but was dwarfed by the overall Leyte operation, was the Battle of Surigao Strait, the last battleship-to-battleship gun duel in history. A Japanese force under Admiral Nishimura, consisting of two battleships, a cruiser, and several destroyers, attempted to advance through Surigao Strait. The Americans were aware they were coming, and prepared a swarming ambush.

This battle may have some relevance to modern situations, such as a major modern naval force in the Persian Gulf. While the 39 PT boat
PT boat
PT Boats were a variety of motor torpedo boat , a small, fast vessel used by the United States Navy in World War II to attack larger surface ships. The PT boat squadrons were nicknamed "the mosquito fleet". The Japanese called them "Devil Boats".The original pre–World War I torpedo boats were...

s do not appear to have done significant damage to Nishimura's force, they distracted it and broke up its formation. While individual modern speedboats, even prepared to make suicide attacks with explosive payloads, may not have that much effect against a carrier battle group, they cannot be ignored. Potentially, they could help force a surface group into the range of quietly submerged submarines, or into the range of massed antiship missiles on shore or ships.

RADM Jesse Oldendorf arranged the PT boats as the first swarm, followed by destroyer squadrons prepared for torpedo attack. A line of battleships capped the T of the strait, with additional cruisers and destroyers screening their rear.

In the early hours of 25 October 1944, 39 PT boats attacked in swarms. The exact damage they did is unknown, but they clearly distracted Nishimura's force from more deadly forces.

The next set of swarms were three destroyer squadrons, making squadron-sized torpedo attacks starting at 0300, and continuing for over 30 minutes. The inflicted damage included causing the battleship Fuso to break in half but not sink. Finally, six US battleships completed the destruction. Nishimura went down with his flagship. Most of the US battleships had effective fire control radar but the Japanese did not, more evidence of the value of sensors in swarm tactics.

Modern military swarming

Current military applications of swarming combine the use of swarms: large numbers of relatively small agents or weapons, with synchronized actions, such that the swarm reacts faster than its opponent and defeats it. This section deals with general principles, but also high-intensity combat.

Swarming does not require good military intelligence alone, but intelligent soldiers who can manage multiple information streams and keep situational awareness. It is not advisable to have a soldier so engrossed in displays that an enemy can sneak up and hit him over the head with a rock. One of the challenges of designing modern networked systems is not to overwhelm the users with information. Those users will also need extensive training, with their sensing and synchronization information, to use them properly under combat stress.

Principles of modern swarming

Swarming requires autonomous or semi-autonomous operating agents, with strong synchronization and communications among them. Senior commanders release resources to the swarm, but do not control them once released. If the agents are semi-autonomous, there will be an on-scene commander giving general direction to the swarming agents.

A 1987 proposal

In the 1980s, the Soviets developed an 'Operational Maneuver Group' (OMG) for a fast armored thrust deep into NATO defences east of the Rhine River. An OMG was expected to exploit strategic surprise with a force equal or greater than an armored division, featuring up to 700 tanks, 500 IFVs, and a substantial number of helicopters. As a countermeasure, NATO considered neutron bombs but their use was politically controversial. NATO instead devised a plan to slow the thrust with a swarming counterattack, called Dynamic Density, which used single-seat Small Military Aircraft (SMAs) operating autonomously in pairs with infantry ATGWs such as Milan, their pilots being infantry. One aircraft would carry the Milan post and four missiles, the other the night-vision sight and four missiles (two of which might be anti-helicopter), and the tactics would be shoot and scoot. The SMA, known as the Dragoon, was evaluated and highly praised by the MoD's test pilots at Boscombe Down, its STOL performance and ease of handling making it ideal for this role. Large numbers would be needed and 5,000 was suggested as sufficient to ensure that swarming would be successful against a force as large as an OMG. Once it was recognized that success could be claimed with a significant deceleration, other novelties were introduced, among which was Synthetic Density which required the SMAs to distribute pneumatic models (fitted with radar reflectors) of tanks and artillery along the OMG's MLA, these requiring the norm to be put down and time to be lost before progress could be resumed.

The proposal was published in the Journal of the Royal United Services Institute and a couple of years later a shorter article suggested that if the Soviets themselves had used SMAs in swarms in Afghanistan their COIN operations against the Mujaheddin would have been far more successful. Contemporary Western armies in Afghanistan can readily accept that swarming at the tactical and operational levels is appropriate, but the physical structure of the country rules out the currently available fighting vehicles. However, networked and swarming SMAs, again 5,000 in number, all armed with laser designators for the second echelon of conventional ground attack aircraft, would constitute force multipliers with a substantial impact.

Communications and synchronization are critical

For combatant units to use swarming efficiently, they must be closely coordinated. A distributed control mechanism, where peer units keep one another notified of their location, status, and intention, is much more fault-tolerant than relying on a single command post. One of Napoleon's combat advantages was the introduction of both terrain maps and reliable timepieces, which let him synchronize widely separated actions. When a central command post, especially with backups, can coordinate, it can allow combat units to be even more effective, if the units need not use radars and other easily detectable units in order to locate their targets.

India has recently ordered AWACS airborne radar & control aircraft, and, while awaiting delivery of the Russian aircraft using Israeli electronics, participated in joint training exercises with the U.S. During these exercises, the Indian pilots had an opportunity to operate under US AWACS control, and found it extremely effective. Officer and pilot comments included "definitely was a force multiplier. Giving you an eye deep beyond you"... "We could pick up incoming targets whether aircraft or missiles almost 400 kilometers away. It gives a grand battle coordination in the air". In typical scenarios involving AWACS, only the AWACS radar is active in a search mode, with onboard battle controllers sending directions to the fighters via secure voice radio and data links.

In 1991, Coalition units in Operation Desert Storm had an unprecedented ability to synchronize, as well as not being limited to roads, with the use of Global Positioning System
Global Positioning System
The Global Positioning System is a space-based global navigation satellite system that provides location and time information in all weather, anywhere on or near the Earth, where there is an unobstructed line of sight to four or more GPS satellites...

 (GPS) receivers that give precision location and time information. Still, GPS did not make units aware of one another, and a significant number of Coalition casualties were due to friendly fire
Friendly fire
Friendly fire is inadvertent firing towards one's own or otherwise friendly forces while attempting to engage enemy forces, particularly where this results in injury or death. A death resulting from a negligent discharge is not considered friendly fire...

.

Improved decision-making as a force multiplier

Swarming ties in well with the theories of John Boyd (military strategist)
John Boyd (military strategist)
Colonel John Boyd was a United States Air Force fighter pilot and Pentagon consultant of the late 20th century, whose theories have been highly influential in the military, sports, and business.-Biography:...

, the "high-low mix" in which a large number of less expensive aircraft, coupled with a small number of extremely capable "silver bullet" aircraft, had the effect of a much larger force. Boyd's concept of quick action is based on the repeated application of the Boyd loop, consisting of the steps
  • Observe: make use of the best sensors and other intelligence available
  • Orient: put the new observations into a context with the old
  • Decide: select the next action based on the combined observation and local knowledge
  • Act: carry out the selected action, ideally while the opponent is still observing your last action.

Boyd's concept is also known as the OODA Loop, and is applicable to all military operations, as well as to civilian competition from sports to business.

These are a realization of Boyd's theories. A swarming case is any historical example in which the scheme of manoeuvre involves the convergent attack of five (or more) semiautonomous (or autonomous) units on a targeted force in some particular place. "Convergent" implies an attack from most of the points on the compass."

Swarming avoids fratricide

Prevention of fratricide, as well as the ability to make ad hoc swarming attacks on targets of opportunity, is one of the major goals of combat data networking among units down to the level of individual tanks and soldiers. Blue Force Tracker is an early vehicle-level synchronization system, also operating in helicopters. These systems are still new and undergoing considerable improvement. One fratricide incident in Afghanistan came from the users not understanding that their target designation device reinitialized, after battery replacement, to the position of their designator, not of the target. If the bomber had had a beacon that gave the crew the precise location of the friendly troops, that would have been another way of avoiding attacking one's own troops.

Contemporary and near-future military applications

Other devices interconnect ground forces with each other and with support aircraft
The same piece of electronics, with different software, can be an U.S. Air Force Situation Awareness Data Link (SADL) device that communicates between aircraft doing close air support, but also can exchange mission data with Army Enhanced Position Location Reporting System (EPLRS) equipment. Again, the same basic equipment interconnects EPLRS ground units. These devices are not U.S-only, but are being made available to NATO and other allies.

The paradox of war in the Information Age
Information Age
The Information Age, also commonly known as the Computer Age or Digital Age, is an idea that the current age will be characterized by the ability of individuals to transfer information freely, and to have instant access to knowledge that would have been difficult or impossible to find previously...

 is one of managing massive amounts of information and resisting the temptation to overcontrol it. The competitive advantage is nullified when you try to run decisions up and down the chain of command. All platoons and tank crews have real-time information on what is going on around them, the location of the enemy, and the nature and targeting of the enemy's weapons system. Once the commander's intent is understood, decisions must be devolved to the lowest possible level to allow these front line soldiers to exploit the opportunities that develop. —General Gordon R. Sullivan
Gordon R. Sullivan
General Gordon Russell Sullivan is a retired Army general officer, who served as the 32nd Chief of Staff of the United States Army and as a member of the Joint Chiefs of Staff.-Background and education:...

, quoted in 'Delivering Results' by David Ulrich.

Swarming by reconnaissance coupled with PGM support

After the advent of close air support with precision guided munitions (PGM), there was still direct target marking by a ground or air observer, typically with a laser. Another approach was to specify the target in relation to a beacon.

When there was air superiority and available heavy bomber support, the ground swarms changed from an attritional attack to a special reconnaissance
Special reconnaissance
Special reconnaissance is conducted by small units of highly trained military personnel, usually from special forces units or military intelligence organisations, who operate behind enemy lines, avoiding direct combat and detection by the enemy. As a role, SR is distinct from commando operations,...

 mission focusing on finding targets for aircraft. SR had had the capability to use laser designators for the Go-Onto-Target (GOT) model, but that required they stay in line of sight of the target (i.e., possibly exposing themselves) or placing an electronic offset beacon near the target, but the SR troops still face the problem of precise angular and distance measurement from the beacon to the target. In the Afghanistan campaign of 2001, a new technique was adopted: ground-aided precision strike (GAPS) To put GAPS in practice, MG Daniel Leaf, USAF Director of Operational Requirements for Air and Space Operations said, in 2002, "If you had offered the B-1 with JDAMs in direct support of ground forces as a solution 10 years ago, I would have laughed heartily because it’s not what we envisioned." The JDAM's principal guidance mechanism is inertial, with a GPS correction option: a Go-to-Location-in-Space (GOLIS) model.

"Precision firepower called in by TACPs on the ground [is] GAPS and [needs its own doctrine]. The situation in Afghanistan was unique; there was not a large-standing opposing army that was conducting maneuvers to bring firepower to bear against our forces... Airpower was the maneuvering element that was supported by the small fire support teams on the ground. The small ground units have been instrumental in calling in the precise air strikes [especially when Army Special Forces were augmented with Air Force combat controllers]. This emerging mission goes beyond the joint definition of CAS.

Shoot and scoot

Artillery, whether cannon, rocket, or missile, also must avoid direct combat. Since modern counter-artillery radar, acoustic, and electro-optical sensors can detect a projectile in flight, and send coordinates of its launcher to its own side's counter-battery artillery within 15–30 seconds, artillery that fires and fails to move immediately dies. Most artillery is self-propelled, and has ammunition supply vehicles of equivalent mobility. The doctrine is to fire, and then move immediately to a new position. Once at the next positions, the firing pieces reload if necessary, fire, and then move again.

Unmanned vehicles and swarms

A variety of unmanned aerial vehicles (UAV), unmanned ground vehicle
Unmanned ground vehicle
An unmanned ground vehicle is a military robot used to augment the soldiers capability. This type of robot is generally capable of operating outdoors and over a wide variety of terrain, functioning in place of humans....

s (UGV) and unmanned undersea vehicles (UUV)
Autonomous Underwater Vehicle
An autonomous underwater vehicle is a robot which travels underwater without requiring input from an operator. AUVs constitute part of a larger group of undersea systems known as unmanned underwater vehicles, a classification that includes non-autonomous remotely operated underwater vehicles...

,
some capable of observation only and others (UCAV and UCGV) of using combat weapons on the enemy, will have a major effect on swarming. Previously, when one swarming unit pulled away to rearm and regroup, as another unit "pulsed" another attack, there could be a loss of situational awareness to the group that withdrew. It is now quite possible for that unit to leave a low-visibility drone aircraft or vehicle giving them continuing visual or other sensor data on the enemy they attacked, and to network these data to other units in the swarm. Combat vehicles can keep up pressure where no actual troops are in contact.

One area in which a hierarchy of swarming agents show promise is demining. Lambert describes a system where the swarming begins by sending a large UUV to a mined area of water, where it approximates the positions of suspected mines. The large UUV then dispatches pairs of bistatic micro-UUVs to the positions in question. Pairing the UUVs (i.e., using them bistatically) helps in positioning and three-dimensional characterization. Once there, the micro-UUVs can identify the object, send information back on it, and neutralize it. Sufficiently small and simple UUVs need not be recoverable if an inexpensive UUV saves a manned ship. With different economics for land mines, a similar method could use UGVs.

Surveillance by UAVs, UGVs, UUVs, reconnaissance troops, and combat troops keeping a distance from the unit being attacked, also can guide indirect (i.e., non-line-of-site) weapons onto the target, from artillery, missiles, and aircraft.

Swarming is not a panacea

Swarming should be adapted, for appropriate missions, but is not a panacea. The challenge of modern combat is to find and fix the enemy. Once located, they can be destroyed, but they first must be found and held in place. In modern warfare, when one side has air superiority and has the location of a enemy force, it has more options for defeating that force. Swarming tactics are more limited when the forces are generally matched as to technology, especially if air superiority is contested, such as in the Falklands War
Falklands War
The Falklands War , also called the Falklands Conflict or Falklands Crisis, was fought in 1982 between Argentina and the United Kingdom over the disputed Falkland Islands and South Georgia and the South Sandwich Islands...

.

One of the prerequisites for swarming is considerable autonomy for the manoeuvre units. Doctrine has been moving in the direction of mission-type tactics
Mission-type tactics
Mission-type tactics , have been a central component of the tactics of German armed forces since the 19th century. The term Auftragstaktik was coined by opponents of the development of mission-type tactics...

, as opposed to extremely specific directives giving no discretion to the junior commander, to multiply the effectiveness of forces. Originating from German pre-WWII concepts of Auftragstaktik, these tactics may be developing even more rapidly in the concept of network-centric warfare
Network-centric warfare
Network-centric warfare, also called network-centric operations, is a military doctrine or theory of war pioneered by the United States Department of Defense in the 1990's....

, where subordinate commanders receive information not only from their own commanders, but from adjacent units. Sharing information, and pushing it to lower levels, is not a substitute for intelligent decision-making; military forces are not bees or wasps. Some of the challenges of swarming, indeed, involve the ability of lower echelons to be aware of much more complex situations. Information overload is a real concern.

Decentralized decision-making has broader implications than military issues alone. It is wise to avoid micromanagement, but sometimes political decisions are necessary before taking an action. The C4ISR expert panel suggested moving from the "operational engagement area to explore swarming methodology for other missions/applications", such as protecting computer networks and defending against terrorism. There will be new complexity in Rules of Engagement
Rules of engagement
Rules of Engagement refers to those responses that are permitted in the employment of military personnel during operations or in the course of their duties. These rules of engagement are determined by the legal framework within which these duties are being carried out...

: at what point can an autonomous weapons system be trusted to fire without human oversight?

More swarming will mean shifts in leadership, personnel, and facilities. The leadership must be able to trust a decentralized model, and all levels must have interoperable communications. There may be cases where higher-ranking officers need to command, or provide support to, smaller units than those with which they normally work, because that swarming agent may be the only one in contact with the enemy.

Command thinking is one personnel issue. Another, especially with autonomous or semiautonomous combat systems, is having "Smarter, more skilled personnel - But tradeoff is need for less personnel". The remaining personnel will be more like special operators—can enough be found?

Distributed models will call for both more prepositioned resources (not necessarily personnel) and the ability to reach back to the home country for support. Just in time
Just In Time
Just in time is a production strategy that strives to improve a business return on investment by reducing in-process inventory and associated carrying costs. Just-in-time production method is also called the Toyota Production System...

 logistics may replace forward permanent bases, but those logistics have to be able to reach the users.

Continuing roles for mass and manoeuvre

Modern forces, to some extent, still use mass, melee and manoeuvre, although certainly in a different form than the Mongols or even WWII. The AirLand Battle
AirLand Battle
AirLand Battle was the overall conceptual framework that formed the basis of the US Army's European warfighting doctrine from 1982 into the late 1990s. AirLand Battle emphasized close coordination between land forces acting as an aggressively maneuvering defense, and air forces attacking...

 doctrine worked effectively against Iraqi forces in Operation Desert Storm, and in the conventional early stages of the 2003 invasion of Iraq.

Until there was a diversion of effort into preparing for the Iraqi invasions, certainly the early operations in Afghanistan used a good deal of swarming, with SR designating bomber targets, and then local forces dealing with direct combat.

Misuse of mass, manoeuvre, and potentially swarming

AirLand Battle, of course, has been ineffective against the Iraqi insurgency, but, in fairness, it was not designed for such combat. Reaching back to WWII occupation planning, GEN Eric Shinseki
Eric Shinseki
Eric Ken Shinseki is a retired United States Army four-star general who is currently serving as the 7th United States Secretary of Veterans Affairs. His final U.S. Army post was as the 34th Chief of Staff of the Army...

's recommendations for a much larger occupation force for Iraq, and Barnett's concept of the "System Administrator" all applied better to the post-conventional phase that should have been expected. In Barnett's terminology, Leviathan was asked to do the job of System Administrator.

Swarming is not appropriate for all low-intensity conflict. If one considers civilian law enforcement as able to use swarming, it is indeed appropriate to swarm a car, full of criminals actively shooting, which is moving at dangerous high speed through crowded streets. Police calming a domestic situation, often find calmness, not a show of force, to be most effective.

Finding the balance: speed/deployability, offense, and defense

Before battleships became obsolete, their designers, such as Admiral of the Fleet John Fisher, 1st Baron Fisher, constantly tried to find the right balance between armor, speed, and firepower. Specialized designs such as battlecruisers proved effective in their originally planned roles as scouts and commerce raiders
Commerce raiding
Commerce raiding or guerre de course is a form of naval warfare used to destroy or disrupt the logistics of an enemy on the open sea by attacking its merchant shipping, rather than engaging the combatants themselves or enforcing a blockade against them.Commerce raiding was heavily criticised by...

 against ships with light escorts. They were not intended to join battleships in gun-to-gun duels, and met with disaster when so used at the Battle of Jutland
Battle of Jutland
The Battle of Jutland was a naval battle between the British Royal Navy's Grand Fleet and the Imperial German Navy's High Seas Fleet during the First World War. The battle was fought on 31 May and 1 June 1916 in the North Sea near Jutland, Denmark. It was the largest naval battle and the only...

.

The concept of a battlecruiser is that it would be fast enough to run away from any ship with bigger guns, and heavily armed enough to destroy any ship that could not escape it. A related problem faces modern ground force designers. The US military is still trying to find the right balance among strategic mobility (e.g., air-transportability), lethality, and survivability. An M1A2 tank is almost invulnerable to ground weapons, but it can be flown only in the largest transport aircraft, is too heavy for many third world bridges, and too wide for many streets in urban combat. A Humvee is agile but can be defeated by light weapons.

Medium fighting vehicles such as the Stryker
Stryker
The IAV Stryker is a family of eight-wheeled, 4-wheel-drive , armored fighting vehicles derived from the Canadian LAV III and produced by General Dynamics Land Systems, in use by the United States Army. The vehicle is named for two American servicemen who posthumously received the Medal of Honor:...

 or LAV III
LAV III
The LAV III armoured vehicle is the latest in the Generation III Light Armoured Vehicle series built by General Dynamics Land Systems, entering service in 1999. It is based on the Swiss MOWAG Piranha IIIH 8x8....

 cannot go directly against heavy armor. To win with these easily deployable vehicles that have light protection, they must be elusive to avoid direct fire, and use organic or supporting standoff weapons.

Logistics

A rapidly moving swarming force may rapidly over-extend its supply lines unless the supply units are as mobile as the fighting units. Similar situations have occurred both in the advance into Iraq as rapidly moving fighting units overextended their supply lines, and historically in the case of the German army in World War II, when front line panzer units were mechanized while their supply units were horse drawn. In both cases the supply units were not organized and equipped to be as mobile as the fighting units.

This has been a specific concern to military planners, and solutions implemented by the US and allies include fast, all-terrain support vehicles such as the Heavy Expanded Mobility Tactical Truck
Heavy Expanded Mobility Tactical Truck
The Heavy Expanded Mobility Tactical Truck series is a range of eight-wheel drive diesel-powered off-road capable trucks, used by the US military. Formally described as "Truck, Cargo: 10-Ton, 8x8", it has been nicknamed the "Dragon Wagon". HEMTT trucks first went into service with the U.S...

. In certain circumstances, it is faster to carry tanks and other tracked vehicles to the jump-off point using Heavy Equipment Transport System trucks.

When forces move by helicopter, they may interleave combat and logistical moves, with helicopters bringing up fuel for the next group of helicopters and ground vehicles. Additional fuel can be brought up by slower trucks. The distance that a heliborne unit can move, in each combat "pulse" move, is set by the spacing of forward arming and refueling points (FARP). There are several helicopter configurations that optimize their ability to transport fuel into FARPs, but there will be a delicate balance of the number and type of helicopters committed to fuel transport, as opposed to those available for combat operations. While a FARP technically covers both fueling and rearming, the closer the FARP to the enemy, the more likely it is to be restricted to fueling.

Concern over evacuating the wounded has been met in several ways. Perhaps most important, a swarming force avoiding direct combat will need fewer soldiers, and, if the doctrine works, will have fewer casualties. Combat Lifesaver training, a mixture of first aid and paramedic skills solely devoted to stabilizing a wounded soldier for evacuation, is being given to more and more troops. Medium armored vehicles have ambulance versions in which treatment can begin, and helicopters are well known for casualty evacuation if their side has air superiority and suppresses air defenses.

Modern militaries and lower-intensity conflict

Alternatively, the US and other major powers may go to a more cooperative model, as in the foreign internal defense
Foreign internal defense
Foreign internal defense is a term used by a number of Western militaries, including the United States, France and the United Kingdom, to describe an approach to combating actual or threatened insurgency in a foreign state called the Host Nation . The term counter-insurgency is more commonly used...

 mission of special forces. In that model, which needs extensive lead time, the major power uses nonmilitary and military means to increase the capability of the host nation to resist insurgency.

Foreign internal defense includes the economic stabilization of host countries. In Thomas Barnett's paradigm,
the world is divided into a "connected core" of nations enjoying a high level of communications among their organizations and individuals, and those nations that are disconnected internally and externally. In a reasonably peaceful situation, he describes a "system administrator" force, often multinational, which does what some call "nation-building", but, most importantly, connects the nation to the core and empowers the natives to communicate—that communication can be likened to swarm coordination.

Swarming is not a panacea for conflict at all levels. If there is a significant military force preventing the system administrator from working on developing connections, the other part of the paradigm comes into play: the leviathan, a first-world military force that takes down the opposition regular forces. Leviathan is not constituted to fight local insurgencies, but major forces. Leviathan may use extensive swarming at the tactical level, but its dispatch is a strategic decision that may be made unilaterally, or by an established core group such as NATO, ASEAN, or the United Nations
United Nations
The United Nations is an international organization whose stated aims are facilitating cooperation in international law, international security, economic development, social progress, human rights, and achievement of world peace...

.

It is the job of the system administrator force to deal with low-level conflict, and there must be both resources and a smooth transition plan from Leviathan to System Administrator responsibility, of which a classic successful example were the Operation Rankin plans that covered several ways in which Nazi power might end which is more a mission for police, which certainly can include a militarized force like the Constabulary
Constabulary
Constabulary may have several definitions.*A civil, non-paramilitary force consisting of police officers called constables. This is the usual definition in Britain, in which all county police forces once bore the title...

 in the post-WWII occupation of Germany.

Swarming would allow major powers to rapidly respond to guerilla forces, but, given the appropriate synchronization and communications, the less powerful forces can use swarming themselves. Modern communications allows military units to stay widely dispersed. The front, rear and flanks are disappearing from military conflict. Swarming allows the military to fight everywhere.

Swarming and Third World nations

Swarming is advantageous to less powerful countries and groups, because it allows them to balance their disadvantage in firepower and numbers. Despite being less technically advanced, Communist forces made good use of swarming in Asia during the Cold War. The Chinese were able to make up for their lack of firepower by attacking Western forces from all sides and then quickly advancing to the rear. The Vietcong were famous from attacking from all directions out of nowhere and then quickly disappearing. When they did come into close contact, they used a technique called "hugging the belt", which meant they were too close for the US to employ air and artillery support. If the attackers "hugged" at several points, "pulsing" their attacks, they both neutralized external fire support, but also made it difficult for the US commander to know where to commit reserves.

Instead the best investment for third world nations and groups is to adapt swarming. History has shown that massed swarming has actually had more success than swarming through firepower. The United States is intensely reliant on firepower. As the Viet Cong showed, attacks from all directions, in close quarters can be highly effective.

Nonplanned swarming is also effective. Numbers and firepower can be matched by the psychological difficulties of being attacked from all sides. The ability to rapidly break up prevents modern militaries from promptly reacting. Swarming can be a much more effective version of guerrilla warfare. Swarming calls for much smaller units. Used effectively, they can avoid decisive victory for more powerful forces, and exploit political advantages of the lack of victory.

Swarming principles in terrorism

Cordesman observes that swarming is a viable terrorist tactic against targets of opportunity.
Al-Qaeda
Al-Qaeda
Al-Qaeda is a global broad-based militant Islamist terrorist organization founded by Osama bin Laden sometime between August 1988 and late 1989. It operates as a network comprising both a multinational, stateless army and a radical Sunni Muslim movement calling for global Jihad...

, for example, uses a different form of swarming than those of advanced militaries, in which the general objectives of operational cells are agreed in a manner coordinated, but not continuously controlled by the core organization. Once the decision has been made on the general targets, the operational cells cut positive control links from the core, although they may still receive financial and other support. A signature of al-Qaeda operations has been multiple, near-simultaneous attacks, such as the several hijacked airliners in the 9/11 attacks, the closely spaced bombings aimed at US embassies in Tanzania and Kenya, and attacks on buses and trains in London. The attacks on trains in Spain had an additional dimension: not all the swarms were associated with al-Qaeda.

While John Arquilla
John Arquilla
John Arquilla received a PhD in International Relations from Stanford in 1991. He worked at RAND for several years, before joining the faculty of the US Naval Postgraduate School in 1993....

, a professor at the Naval Postgraduate School, cites the ability to plan separate and widely dispersed attacks, coordinated by mobile communications that might originate from a cave on the Afghan-Pakistan border, he does not emphasize the apparent al-Qaeda technique of releasing operational units to local control, once the policy is set. See Clandestine HUMINT operational techniques
Clandestine HUMINT operational techniques
The Clandestine HUMINT page deals with the functions of that discipline, including espionage and active counterintelligence. This page deals with Clandestine HUMINT operational techniques, also called "tradecraft". It applies to clandestine operations for espionage, and for a clandestine phase...

.

The apparent al-Qaeda methodology of letting operational cells decide on their final dates and means of attack exhibit an operational pattern, but not a periodicity that could easily be used for an indications checklist appropriate for a warning center. Such lists depend on seeing a local pattern to give a specific warning.

Semiautonomous swarming, in which the actors occasionally interfere with one another, is seen in attacks on computer networks by loose confederations of malicious hackers. On occasion, especially when the attack uses a botnet
Botnet
A botnet is a collection of compromised computers connected to the Internet. Termed "bots," they are generally used for malicious purposes. When a computer becomes compromised, it becomes a part of a botnet...

, some of the units may try to overpower and control one another, as well as the target. One of the observations of the Center on Terrorism and Irregular Warfare was that unfocused mass disruption was not a useful terrorist, and by extension general military, tactic. The 9/11 attacks had symbolism. A cyberattack on a stock market would have symbolism. For the political purposes of the swarm, there has to be a symbol to which observers need to connect the purpose of the attack.

See also

  • C4ISTAR
    C4ISTAR
    In military usage, a number of abbreviations in the format C followed by additional letters are used, based on expanded versions of the abbreviation C2 - command and control.C2I stands for command, control, and intelligence....

  • Defeat in detail
    Defeat in detail
    Defeat in detail is a military phrase referring to the tactic of bringing a large portion of one's own force to bear on small enemy units in sequence, rather than engaging the bulk of the enemy force all at once...

  • Battle of annihilation
    Battle of annihilation
    A battle of annihilation is a military strategy where an attacking army seeks to destroy the military capacity of the opposing army in a single planned pivotal battle...

  • Revolution in Military Affairs
    Revolution in Military Affairs
    The military concept of Revolution in Military Affairs is a theory about the future of warfare, often connected to technological and organizational recommendations for change in the United States military and others....


External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK