Swarming (military): Difference between revisions

Content deleted Content added
m Category:CS1 errors: deprecated parameters: migrate 8/8 |dead-url= to |url-status=; minor cleanup; WP:GenFixes on
Removed dead link
 
(31 intermediate revisions by 27 users not shown)
Line 1:
{{Short description|Battlefield tactic to saturate defences}}
{{Multiple issues|
{{essay|date=May 2014}}
{{synthesis|date=May 2014}}
{{expert needed}}
}}
 
{{War}}
'''Military swarmingSwarming''' is a [[military tactics|battlefield tactic]] designed to maximize [[Saturation attack|target saturation]], and thereby overwhelm or saturate the defensesdefences of the principal target or objective. On the other-hand, defendersDefenders can overcome attempts at swarming, by launching counter-swarming measures that are designed to neutralize or otherwise repel such attacks.
 
'''Military swarming''' is a [[military tactics|battlefield tactic]] designed to maximize [[Saturation attack|target saturation]], and thereby overwhelm or saturate the defenses of the principal target or objective. On the other-hand, defenders can overcome attempts at swarming, by launching counter-swarming measures that are designed to neutralize or otherwise repel such attacks.
 
Military swarming is often encountered in [[asymmetric warfare]] where opposing forces are not of the same size, or capacity. In such situations, swarming involves the use of a decentralized force against an opponent, in a manner that emphasizes mobility, communication, unit autonomy and coordination or synchronization.<ref name=Edwards-2000>{{cite book
Line 17 ⟶ 11:
| series=Rand Monograph MR-1100
| url=http://www.rand.org/pubs/monograph_reports/MR1100
}}</ref> Historically military forces have used the principles of swarming without really examining them explicitly, but there is now active research in consciously examining [[military doctrine]]s that draw ideas from swarming. In nature and nonmilitary situations, there are other various forms of swarming. [[#Biological swarming|Biologically driven forms]] are often [[complex adaptive systemssystem]]s, but have no central planning, simple individual rules, and nondeterministic behavior that may or may not evolve with the situation.<ref name=Edwards-2003>{{cite conference
| first = Sean J.A.
| last = Edwards
| date = January 2003
| title = Military History of Swarming
| url = http://www.comdig.de/Conf/C4ISR/Edwards.ppt |accessdateaccess-date = 2007-12-16
| format = ppt
| conference = Conference on Swarming and Network Enabled Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) (January 13–14, 2003)
| location = McLean, Virginia
| conferenceurlconference-url = http://www.comdig.de/Conf/C4ISR/
| booktitlebook-title = Complexity Digest
| edition = May 2005
}}</ref>
Line 35 ⟶ 29:
| author = Splinter Group C
| date=January 2003
| url=http://www.comdig.de/Conf/C4ISR/GroupC.ppt |accessdateaccess-date=2007-12-16
| format=PPT
| conference=Conference on Swarming and Network Enabled Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (January 13–14, 2003)
| location = McLean, Virginia
| conferenceurlconference-url = http://www.comdig.de/Conf/C4ISR/
| booktitlebook-title = Complexity Digest}}</ref> They observed that military swarming is primarily ''tactical,'' sometimes operational and rarely strategic, and is a complement to other efforts rather than a replacement for them. Swarming is a logical extension of network-centric warfare, but the networks needed to make swarming routine will be available around 2010–2011. At present, the networking for swarming is only available in specific contexts.
 
==Swarming in history==
Line 50 ⟶ 44:
=== Siege of Samarkand===
 
At the [[Siege of Samarkand (1494 / 1496)|siege of Samarkand]], [[Spitamenes]] used Bactrian [[horse archer]]s in effective swarming attacks against a relief column sent by [[Alexander the Great]]. Bactrian horse archers surrounded various [[Macedonian phalanxes]], staying out of range of their melee weapons, and firedshot arrows until they had no more. The archers would then withdraw to a supply point, but another swarm of horse archers would sometimes replace them, and sometimes attack elsewhere. The Bactrians eventually caused the phalanx to break formation, and destroyed it. Alexander recognized his forces could not directly combat horse archers, but that the horse archers needed resupply of provisions, horses, and arrows. Alexander split his forces into five columns and began building fortifications in the areas where the Bactrians had resupplied. Eventually, his anti-swarm tactics worked: cut off from resupply, the Bactrians had to meet the Macedonian phalanx, which were vastly superior in melee. Alexander made it priority to engage guerillas or other light mobile forces. Spitamenes was effective as long as his force were mobile, and he had adequate communications with mounted couriers. Once he was forced into direct battle with heavy forces, he literally lost the advantages of his headforces and was defeated quickly. At the Battle of the Jaxartes River, Alexander once again faced swarming tactics from an army of Scythian horse archers. Alexander sent a unit of heavy cavalry ahead of his main line. As expected, the Scythian horsemen surrounded the detached cavalry. At the right moment, Alexander's cavalry reversed direction and pushed half of the Scythians straight into the main phalanx of Alexander's army, where they were slaughtered. Upon seeing this, the remaining half of the Scythian army retreated from the battle.{{citation needed|date=February 2012}}
 
===Mongols Horde===
Line 60 ⟶ 54:
 
Swarming was present in the operations of Alexander the Great and Genghis Khan, but were generally replaced by melee and mass in the pre-industrial era. More synchronized manoeuvre was paced by the availability of mobile communications. [[Blitzkrieg]] was certainly a use of manoeuvre, but it was less flexible than later operations in which every tank and aircraft had radios, and far less flexible than forces that have effective networked information systems.<ref name=Arquilla-2000>
{{cite webbook
| title = Swarming and the Future of Conflict
| author = Arquilla, John
Line 80 ⟶ 74:
| publisher = Command and Control Research Program
| url = http://www.dodccrp.org/html4/journal_v1n1_01.html
| accessdateaccess-date = 2007-11-23
}}</ref> This paper suggests abandoning the term '''command and control''' in favor of
:*agility: "... the critical capability that organizations need to meet the challenges of complexity and uncertainty"
Line 88 ⟶ 82:
Agility is a characteristic of an organization or unit capable of swarming. Focus can be designation of a goal by a higher-level commander, by a peer unit detecting a target, or by intelligence systems that feed information to the swarming units. Convergence is the key feature, which, while it can be distributed, causes swarming units to coordinate their actions, apply force, and know when to stop applying force.
 
Edwards holds that several axioms of military doctrine<ref name=FM3-0>{{cite book |author=Headquarters, Department of the Army |authorlinkauthor-link=United States Department of the Army#Headquarters, Department of the Army |title=FM&nbsp;3–0, Operations (with included Change&nbsp;1) |date=22 February 2011 |origyearorig-year=27&nbsp;February 2008 |place=Washington, DC |publisher=[[United States Government Printing Office|GPO]] |url=http://www.fas.org/irp/doddir/army/fm3-0.pdf |format=PDF |accessdateaccess-date=31 August 2013}}</ref> change with the use of swarming:<ref name=Edwards-2004>{{cite book
| url = http://www.rand.org/pubs/rgs_dissertations/RGSD189/
| title = Swarming and the Future of War
Line 121 ⟶ 115:
|archive-url=https://web.archive.org/web/20060927012543/http://www.acfnewsource.org/science/swarm_war.html
|archive-date=2006-09-27
|df=
}}</ref>
Howard Rheingold cites mobile communications technology as a key enabler: The bees sense each other's buzzing and instinctually move in concert in real time. Text messaging on mobile devices and instantaneous file sharing off the internet via PDAs allows groups of people to receive their instructions, move in unison, nearly instantaneously, without prior planning or forethought. And, the technology allows groups to do so without a central leader. One modern example is the protesters at the World Trade Organization meetings in Seattle, in 1999, who were able to orchestrate their movement effectively in this way.
Line 145 ⟶ 138:
| publisher = Pegasus Associates }}</ref> Large numbers would be needed and 5,000 was suggested as sufficient to ensure that swarming would be successful against a force as large as an OMG. Once it was recognized that success could be claimed with a significant deceleration, other novelties were introduced, among which was Synthetic Density which required the SMAs to distribute pneumatic models (fitted with radar reflectors) of tanks and artillery along the OMG's MLA, these requiring the room to be put down and time to be lost before progress could be resumed.
 
The proposal was published in the Journal of the Royal United ServicesService InstituteInstitution and a couple of years later a shorter article suggested that if the Soviets themselves had used SMAs in swarms in Afghanistan their COIN operations against the Mujaheddin would have been far more successful.<ref name="COIN Swarming-RUSI-1989">{{ citation
| url = http://web.mac.com/banneret/iWeb/Defence/Papers_files/Crocodile%20or%20Piranha-1.pdf
| title = Crocodile or Piranha
Line 162 ⟶ 155:
 
These are a realization of Boyd's theories. A swarming case is any historical example in which the scheme of manoeuvre involves the convergent attack of five (or more) semiautonomous (or autonomous) units on a targeted force in some particular place. "Convergent" implies an attack from most of the points on the compass."<ref name=Edwards-2000/>
 
===Saturation of air defenses===
 
[[File:AFRL concept- Airdropped Mass Launcher of Minature decoy swarm 2019-04.jpg|thumb|300px|Mass launch of a swarm of miniature decoys from an airdropped canister. (Air Force Research Laboratory concept illustration)]]
Due to the vulnerability of sophisticated air defense systems such as [[S-300 missile system|S-300]] and [[S-400]] to mass attacks from low flying cruise missiles, it is thought that swarm tactics are well suited for [[Suppression of Enemy Air Defenses]] (SEAD) missions using swarms of networked miniature spoofing decoy drones accompanying large numbers of [[AGM-158|JASSM-ER]] cruise missiles launched from mass fire platforms such as [[Rapid Dragon]].<ref>{{cite magazine |last1=Hollings |first1=Alex |date=July 21, 2022 |title=The S-400 myth: Why Russia's air defense prowess is exaggerated |magazine=Sandboxx News |publisher= 19fortyfive Corp. |url=https://www.sandboxx.us/blog/the-s-400-myth-why-russias-air-defense-prowess-is-exaggerated/ |access-date=2022-07-30}}</ref><ref>{{cite magazine|date=April 2019 |title=U.S. Air Force 2030 Science and Technology Strategy |magazine=Air Force Science and Technology |publisher= [[Air Force Research Laboratory]] |url=https://www.af.mil/Portals/1/documents/2019%20SAF%20story%20attachments/Air%20Force%20Science%20and%20Technology%20Strategy.pdf |access-date=2022-07-30}}</ref>
 
===Swarming avoids fratricide===
Line 176 ⟶ 174:
|archive-url = https://web.archive.org/web/20120224225003/http://www.popsci.com/scitech/article/2006-06/winning-and-losing-first-wired-war
|archive-date = 2012-02-24
|df =
}}</ref> also operating in helicopters.<ref name=Watanabe-2004>{{cite journal
|title=Blue Force Tracker and Army Aviation Operations in Afghanistan
Line 186 ⟶ 183:
|url=http://www.quad-a.org/chapters/Drum/blue_force_tracker_and_army_avia.htm
|access-date=2007-11-23
|format=&nbsp;– <sup>[https://scholar.google.co.uk/scholar?hl=en&lr=&q=author%3A+intitle%3ABlue+Force+Tracker+and+Army+Aviation+Operations+in+Afghanistan&as_publication=Army+Aviation&as_ylo=&as_yhi=&btnG=Search Scholar search]</sup>
|archive-url=https://web.archive.org/web/20071009130330/http://www.quad-a.org/chapters/Drum/blue_force_tracker_and_army_avia.htm
|archive-date=2007-10-09
|url-status=dead
}}</ref> These systems are still new and undergoing considerable improvement. One [[Special reconnaissance#Offset GOLIS|fratricide incident in Afghanistan]] came from the users not understanding that their target designation device reinitialized, after battery replacement, to the position of their designator, not of the target. If the bomber had a [[Special reconnaissance#Reducing friendly fire incidents|beacon]] that gave the crew the precise location of the friendly troops, that would have been another way of avoiding attacking one's own troops.
|df=
}}</ref> These systems are still new and undergoing considerable improvement. One [[Special reconnaissance#Offset GOLIS|fratricide incident in Afghanistan]] came from the users not understanding that their target designation device reinitialized, after battery replacement, to the position of their designator, not of the target. If the bomber had a [[Special reconnaissance#Reducing friendly fire incidents|beacon]] that gave the crew the precise location of the friendly troops, that would have been another way of avoiding attacking one's own troops.
 
==Modern militaries and lower-intensity conflict==
Line 199 ⟶ 195:
Foreign internal defense includes the economic stabilization of host countries. In Thomas Barnett's paradigm,<ref name=Barnett-2005>{{cite book
| author = Barnett, Thomas P.M.
| authorlinkauthor-link = Thomas P.M. Barnett
| title = The Pentagon's New Map: The Pentagon's New Map: War and Peace in the Twenty-first Century
| publisher = Berkley Trade
Line 215 ⟶ 211:
| title = US Army in WWII. European Theater of Operations. The Supreme Command. Chapter V: Planning Before SHAEF
| author = Pogue, Forrest C.
| authorlinkauthor-link = Forrest Pogue
| year = 1954
| id = Pogue-1954-Chapter 5
Line 232 ⟶ 228:
Swarming is advantageous to less powerful countries and groups, because it allows them to balance their disadvantage in firepower and numbers. Despite being less technically advanced, Communist forces made good use of swarming in Asia during the Cold War. The Chinese were able to make up for their lack of firepower by attacking from all sides and then quickly advancing to the rear. The Vietcong were famous from attacking from all directions out of nowhere and then quickly disappearing. When they did come into close contact, they used a technique called "hugging the belt", which meant they were too close for the US to employ air and artillery support.<ref>{{cite book
| author = Hackworth, David
| authorlinkauthor-link = David Hackworth
| title = Hazardous Duty
| publisher = HarperCollins
Line 244 ⟶ 240:
|title = The Importance of Building Local Capabilities: Lessons from the Counterinsurgency in Iraq
|author = Cordesman, Anthony H.
|authorlinkauthor-link = Anthony Cordesman
|url = http://www.csis.org/component/option,com_csis_pubs/task,view/id,3411/type,1/
|publisher = Center for Strategic and International Studies
Line 251 ⟶ 247:
|archive-url = https://web.archive.org/web/20080410035736/http://www.csis.org/component/option%2Ccom_csis_pubs/task%2Cview/id%2C3411/type%2C1/
|archive-date = April 10, 2008
|df =
}}</ref>
[[Al-Qaeda]], for example, uses a different form of swarming than those of advanced militaries, in which the general objectives of operational cells are agreed in a manner coordinated, but not continuously controlled by the core organization. Once the decision has been made on the general targets, the operational cells cut positive control links from the core, although they may still receive financial and other support. A signature of al-Qaeda operations has been multiple, near-simultaneous attacks, such as the several hijacked airliners in the [[9/11 attacks]], the closely spaced bombings aimed at US embassies in Tanzania and Kenya, and attacks on buses and trains in London. The attacks on trains in Spain had an additional dimension: not all the swarms were associated with al-Qaeda.
Line 259 ⟶ 254:
|access-date=2007-11-17
|url=http://www.metatempo.com/huntingthesleepers.pdf
|format=PDF
|title=Hunting the Sleepers: Tracking al-Qaida's Covert Operatives
|date=31 December 2001
Line 266 ⟶ 260:
|archive-url=https://web.archive.org/web/20071128125328/http://www.metatempo.com/huntingthesleepers.pdf
|archive-date=2007-11-28
|df=
}}</ref> See [[Clandestine HUMINT operational techniques]].
 
Line 275 ⟶ 268:
|date = September 2003
|url = http://www.psych.lse.ac.uk/complexity/Conference/FellmanWright.pdf
|format = PDF
|access-date = 2007-11-02
|booktitlebook-title = Complexity Programme
|conference = Complexity, Ethics and Creativity Conference September 2003
|conferenceurlconference-url = http://www.psych.lse.ac.uk/complexity/events/2003/2003/conference_sep03.html
|url-status = dead
|archive-url = https://web.archive.org/web/20070708062550/http://www.psych.lse.ac.uk/complexity/Conference/FellmanWright.pdf
|archive-date = 2007-07-08
|df =
}}</ref>
 
Line 291 ⟶ 282:
|author = Kristoff, John
|title = Botnets
|conferenceurlconference-url = http://www.nanog.org/mtg-0410/
|conference = 2004 NANOG Meeting – Third Joint Meeting With ARIN! (October 2004)
|booktitlebook-title = NANOG Web
|location = Reston, Virginia
|date = October 17, 2004
Line 299 ⟶ 290:
|archive-url = https://web.archive.org/web/20071218232327/http://www.nanog.org/mtg-0410/kristoff.html
|archive-date = 2007-12-18
|df =
}}</ref> some of the units may try to overpower and control one another, as well as the target.<ref name=USNPGS-2000>{{cite web
|url=http://www.nps.navy.mil/ctiw/files/substate_conflict_dynamics.pdf
Line 309 ⟶ 299:
|archive-url=https://web.archive.org/web/20070713210655/http://www.nps.navy.mil/ctiw/files/substate_conflict_dynamics.pdf
|archive-date=2007-07-13
|df=
}}</ref> One of the observations of the Center on Terrorism and Irregular Warfare was that unfocused mass disruption was not a useful terrorist, and by extension general military, tactic.<ref name=USNPGS-2000/> The 9/11 attacks had symbolism. A [[cyberattack]] on a stock market would have symbolism. For the political purposes of the swarm, there has to be a symbol to which observers need to connect the purpose of the attack.
 
Line 317 ⟶ 306:
* [[Battle of annihilation]]
* [[Three-Dimensional (3D) Tactics Analysis]]
* [[Cabbage tactics]]
 
==References==
Line 322 ⟶ 312:
 
==External links==
*[httphttps://wwwapps.dtic.mil/cgi-binsti/GetTRDoc?Location=U2&doc=GetTRDocpdfs/ADA483607.pdf&AD=ADA483607 Shannon, William D.; Tsypkin, Mikhail; Arguill, John. (June 2008). "Swarm Tactics and the Doctrinal Void: Lessons from the Chechen Wars". Naval Postgraduate School. Monterey, California (Thesis)]
 
{{collective animal behaviour}}
{{Authority control}}
 
{{DEFAULTSORT:Swarming (Military)}}
[[Category:Military strategy]]