Throughout the history of warfare from the age of gunpowder, troops have faced snipers; sometimes facing off against a building with blown out windows where every dark hole could hide a sniper; or a dense thicket of trees, or rubble indistinguishable from its surrounding. A nameless faceless utterly hidden rifleman can keep hundreds of men pinned down, inflicting cruel wounds on hapless infantry.
The sniper team includes a spotter and a shooter who finds and eliminates targets. Counter sniper teams have to flush out shots and see of they can find the source of the shooting. Often a single sniper is deadly enough to call in artillery or air support. During the invasion of Italy, the oldest Benedictine cathedral in the world was bombed into rubble because of a single Nazi sniper team.
Soon an infantry company will carry a case of mini helicopter drones, each with a live feed camera and a single explosive charge, a flying guided hand grenade of sorts. All of them are hive minded, controlled by a single processor that coordinates their movement to support each other. The drones deploy and climb into the air and begin circling the building where a sniper is hiding. A waiting game begins.
The sniper must now decide whether to wait until the drones disappear, or perhaps even shoot one of them down.
He decides to shoot one down.
He also gives his position away. All the existing drones are ‘aware’ that a shot has been fired and they know about where the sound originated. The drone swarm enters the building through a window where the shot was possibly fired and begins searching for movement and sound.
The sniper shoots another drone down. The remaining drones swarm over him. Two or three get within range of the sniper team and detonate.
Furthermore, the remaining live drones are programmed to keep reconnoitering the area as the company moves forward.
Each one can also act a signal generator that draws in an air strike slaved to the signal. Infantry enters the building searching for the GPS signal that the exploding drones emitted. They find the body; they continue to clear the building.
The Mortar Team.
An enemy squad sized mortar team has slipped into range of your troops. A little after midnight they begin firing from behind a low ridge line. As soldiers run for cover and attempt to pick up casualties, a drone swarm is released and directed to the ridge line.
The drones, all equipped with night vision, find the squad, a loader, a mortar operator and an equipment carrier all within about five yards from each other. Four drones circle and keep an eye on the team. Four drones position themselves over the team, cut off their rotors and drop directly on the team and detonate on impact. The hive-minded drones select one of the group to detonate the pile of ammo. The remaining drones circle and keep a feed on for Battle Damage Assessment.
The Air Strike
A flight of enemy strike aircraft, laden with bombs, is headed your way. One of them rises into the air to become a target and turn on our tracking and fire control radars. This way the incoming aircraft can jam the fire control radars signature hopefully before a missile locks onto it.
Six surface to air missiles, armed with intelligent software rocket into the air after the strike package. They are armed with super powerful Electro Magnetic Pulse weapons. They just need to get within a few hundred yards of the aircraft. The missiles travel at Mach 3 and their intelligent software shows them how to get close enough to work. Working together, the missiles discern tricks and tactics to lose them, but they compensate and get smarter as the fight continues. When they are within proximity of the strike package, the program detonates the EM Pulse.
The missiles are drones, and they work together in small groups that are large enough to overwhelm a flight crew. The rest of the missiles in the air that have not detonated their explosive payload are free to purse new targets autonomously or receive new target assignments. The autonomous defensive missiles use IFF transponders to distinguish enemy craft.
Electrical systems all over the strike aircraft fail. Even planes with EMP defenses like casing that is impervious to EM signals cannot stay in the air and effectively fight when ancillary flight control systems go down. Turbines shut down, planes get lost, and soon enough the mission has been compromised. Within a few minutes, they entire strike package is on the ground or in the water.
The Aircraft Carrier and Environs.
The USS Gerald Ford is headed into the Persian Gulf. Pakistani hackers break into the fire control systems and detonate a few torpedoes below deck near the reactor. No one knows what happens for months. In that time, Pakistani hackers have destroyed several support vessels, including a Russian signal intelligence ship disguised a fishing trawler. You see when you are the empire; supply lines are your way of staying in power. It doesn’t take a lot to stop a fleet. They need food and fuel and medicine and ammunition. Simply attenuating a supply line is a way to slow a fleet’s progress.
Two Americans are held captive by insurgents. The USMC deploys an odorless, tasteless gas that puts everyone to sleep. Marine recon teams slip into the compound where everyone is dormant, and they rescue the Marines. They also take the sleeping insurgents with them.
Specially curated stories spread lies to the American people. The people support policies that are harmful to the country. I know this is a current topic. But there is no end to how people can be mislead. I hate to say it, especially Americans. This isn’t a future battlefield because it’s already happened. This is a battlefield where the current technology supports lying.
Insurgents hack into traffic systems and create random red and green lights all over the country. For one day the traffic is the worst it has even been, wasting time, resources, and a billion dollars of gas.
Hackers interrupt Air Traffic Control in ATL, LGA and LAX. So that air travel basically ends on that day costing industry millions. This doesn’t mention the millions in lost billable hours.
Hackers break into nuclear power control systems and turn off reactor coolants. Ten Chernobyls begin simultaneously.
An already discombobulated US Department of State cannot react to a series of attacks on a US military compound, because hacker bots ( programs that run by themselves and make decisions without a person in the loophole) are redirecting communication channels, blocking transmissions, delaying news so that it comes so late that any response is inappropriate.
In today’s New York Times is an article about how sophisticated a North Korean attack on Sony Films was. This attack was not only effective, it scared the shit out of plenty of media companies.
“…The North, meanwhile, was developing its own exotic arsenal. It tried repeatedly to disrupt American and South Korean military exercises by jamming electronic signals for guided weapons, including missiles. And it demonstrated its cyber power in the oddest of places — Hollywood. In 2014, it attacked Sony Pictures Entertainment with a strike that destroyed about 70 percent of the company’s computing systems, surprising experts with its technical savvy.
Last month, a report on cyber vulnerabilities by the Defense Science Board, commissioned by the Pentagon during the Obama administration, warned that North Korea might acquire the ability to cripple the American power grid, and cautioned that it could never be allowed to “hold vital U.S. strike systems at risk….”.
Insurgents and Drones
using plain old drones with hidden UV technology films bridges in the US at night and finds the places where the bridges are weakest. Placing a highly explosive charge (perhaps in a car, or multiple cars) allows our enemies to detonate the cars at the same time. If they were smart enough and patient enough they could bring bridges down from Virginia to DC to New York.
Insurgents and Chemical Applications
On a street in DC, three operatives place canisters down in lobbies and access to train stations and on busy sidewalks. They pull cords and the canister begin spraying something that fills the air, a hallucinogenic substance, this one designed to make every docile and happy and stoned. Operatives enter buildings in the area and steal vital banking hard-drives, software, financial data and military technology and trade.
Insurgents with Exo-Combat Suits
A team of insurgents wearing bullet proof exo suits, enter a tech firm in mid day, jam cellphone signals around them, and steal weapons technology and walkout unscathed despite guards opening fire on them. They escape by uncovering a three man drone hiding in plain sight. They board and the aircraft takes off.
A Swedish battalion in a border garrison that defends a pass into Russia receives a communique from Danish Command. It says a Danish contingent inside the country is going to escort in a secret Russian regiment that is defecting. Allow them in, then close the gates. Signal in when the operation is complete.
The local commanders open the gates and let in the tank battalion.
Which is all Russian.
And all a ruse.
And all a software trick played by Russians.
Not a shot is fired.
A soldier is shot and needs evacuation. A drone spots him, calls in aid and attempts to transport him itself, lifting him and heading towards the nearest medical help available.
These might loiter over a battlefield looking for wounded to rescue, or worse.
The possibilities are endless. This might be a good time to stop building tanks and planes, and instead create the technology that will make today’s weapons look like bows and arrows.