Invisible Siegecraft: Submarine Cable Vulnerabilities and the Battle for the Deep-Sea Arteries of Global Power

The Invisible Infrastructure of Global Survival

The internet feels weightless. We speak of data living in the cloud, of information flowing through the ether, of wireless connections liberating us from physical constraints. This perception is a dangerous illusion. Beneath the ocean’s surface, stretching across 1.4 million kilometers of seabed, lies the physical nervous system of modern civilization: a network of between 550 and 600 active submarine cable systems that carries 99 percent of all intercontinental data and facilitates over $10 trillion in daily financial transactions.

These cables are not merely important infrastructure. They are the invisible arteries through which the lifeblood of the global economy pulses every microsecond. When a trader in London executes a transaction on the Tokyo exchange, when a surgeon in Berlin guides a robotic procedure in Singapore, when intelligence agencies share time-sensitive information across continents, these communications travel not through satellites but through fiber-optic strands resting on the ocean floor. As the Atlantic Council has documented, three converging trends—authoritarian reshaping of internet topology, centralized network management systems, and explosive growth of cloud computing—have dramatically increased the strategic stakes of this infrastructure.

For decades, the primary threats to this infrastructure were prosaic: fishing trawlers dragging anchors across shallow-water routes, earthquakes severing cables along fault lines, sharks inexplicably drawn to gnaw on repeater housings. These were manageable risks, addressed through redundancy, rapid repair protocols, and careful route planning. But the strategic calculus has fundamentally shifted. What was once a domain of accidental damage has become a theater of deliberate, state-sponsored sabotage conducted under the cover of plausible deniability.

A new form of warfare has emerged: SIEGECRAFT—the systematic strangulation of an adversary’s digital lifelines without firing a shot.

The Seabed as Gray Zone Paradise

The ocean floor presents an almost perfect environment for covert aggression. Consider the convergence of factors that make submarine cables uniquely vulnerable to strategic sabotage.

Physical fragility is the first factor. Modern submarine cables, despite carrying the digital traffic of entire nations, are often unarmored across vast stretches of deep ocean. The logic is economic: armoring adds weight and cost, and the deep seabed historically presented few threats. A cable that costs tens of millions to manufacture and deploy can be severed by a determined adversary with equipment no more sophisticated than a weighted anchor. According to CSIS analysis, between 100 and 150 cable faults occur annually, with 66 percent caused by fishing and shipping activities and 30 percent specifically from anchor dragging.

Geographic concentration compounds this vulnerability. Global data traffic funnels through a handful of chokepoints where bathymetry, geopolitics, and commercial logic converge. The Baltic Sea, with an average depth of only 180 feet and over 4,000 ship transits daily, hosts critical cables linking Northern Europe to the broader internet backbone. The Red Sea corridor carries 18 cable systems representing 25 percent of Asia-Europe traffic through waters increasingly destabilized by regional conflict. The Taiwan Strait, perhaps most consequentially, has witnessed 27 to 30 cable cuts over a five-year period, a frequency that strains credulity as coincidence.

Legal ambiguity provides the final enabling condition. The United Nations Convention on the Law of the Sea, specifically Article 113, criminalizes intentional cable damage but provides virtually no enforcement mechanisms. A vessel operating in international waters or within another nation’s Exclusive Economic Zone cannot be boarded without flag-state permission. A ship flying the flag of a permissive registry can drag an anchor across a critical cable, claim mechanical failure, and face no meaningful consequence. The law, designed for an era of accidental damage, is impotent against adversaries who weaponize plausible deniability.

The Architects of Subsea Disruption

Russia: The Hybrid Warfare Specialist. The Russian approach to submarine cable warfare exemplifies its broader doctrine of hybrid aggression. Moscow maintains a sophisticated capability for seabed operations disguised as oceanographic research. The spy ship Yantar and the newly commissioned General Valery Gerasimov carry deep-diving submersibles, including the nuclear-powered Losharik, capable of operating at depths that place them beyond observation. These vessels have been documented loitering over critical cable junctions in the North Sea and within the Irish Exclusive Economic Zone, actively mapping NATO critical undersea infrastructure.

More insidious is Russia’s shadow fleet: approximately 1,900 vessels by end of Q3 2024 operating under opaque ownership structures, often registered in permissive flag states, characterized by aging hulls and minimal regulatory compliance. These ships, originally assembled to evade oil sanctions, have proven equally useful for infrastructure sabotage. The December 2024 Christmas Day incident demonstrated the model. The Eagle S, a Cook Islands-flagged tanker with documented Russian links, dragged its anchor for approximately 62 miles across the Gulf of Finland, severing the Estlink 2 power cable and four data cables. Finnish Special Forces ultimately boarded the vessel, marking the first enforcement action against suspected cable sabotage under the 1884 Convention since 1959. The damage was done nonetheless—Estlink 2 required over seven months for repair.

China: The Integrated Hegemon. Beijing’s approach differs in sophistication but matches Russia in strategic consequence. China has achieved dominance across the submarine cable value chain through HMN Technologies, formerly Huawei Marine Networks, which controls approximately 25 percent of global cable construction and repair capacity. This market position creates dual concerns. At the hardware level, cables manufactured or maintained by Chinese-linked entities present potential vectors for intelligence collection or embedded vulnerabilities. At the operational level, China’s repair dominance in the Asia-Pacific—through state-linked company SBSS—means that adversaries may find their damaged cables at the back of the repair queue during any regional crisis.

China’s kinetic capabilities have been demonstrated through what might be called salami-slicing tactics against Taiwan’s offshore islands. In February 2023, Chinese sand dredgers and fishing vessels repeatedly severed the two cables connecting the Matsu Islands to Taiwan proper. The 13,000 residents of Matsu experienced a digital blackout lasting 50 days—a proof-of-concept demonstration of SIEGECRAFT that required no missiles, no blockade, and no formal act of war. Research at Lishui University has reportedly produced anchor-like devices specifically engineered for cable cutting at depths beyond typical commercial operations, suggesting Beijing views this capability as worthy of deliberate development.

The pattern has continued into 2024 and 2025. In November 2024, the Chinese vessel Yi Peng 3, departing the Russian port of Ust-Luga, severed both the BCS East-West Interlink and C-Lion1 cables in the Baltic within 24 hours—an incident now under joint investigation by Sweden, Finland, and Lithuania via Eurojust. In January 2025, the Shunxin 39—flying a Cameroon flag with Hong Kong ownership and Chinese crew—damaged the Trans-Pacific Express cable north of Taipei while operating under two separate AIS systems, a signature of vessels seeking to obscure their movements.

Non-State Actors and Proxies. State adversaries need not act directly. The Houthi campaign in the Red Sea during 2024 and 2025 demonstrated how regional proxies can impose global consequences. Cable cuts to the PEACE system and SeaMeWe-4 disrupted Microsoft Azure services and financial platforms across three continents. Whether these cuts reflected deliberate targeting or collateral damage from anchor mines remains debated. The strategic lesson is clear regardless: localized conflict in critical chokepoints radiates outward through the cable network.

Building the Shield: The Defensive Response

Recognition of the threat has catalyzed an unprecedented defensive mobilization across NATO and allied nations.

At the institutional level, NATO has established dedicated coordination cells for undersea infrastructure protection. The Maritime Centre for Security of Critical Undersea Infrastructure, headquartered at Northwood in the United Kingdom, provides operational coordination. The Critical Undersea Infrastructure Coordination Cell in Brussels handles alliance-wide policy integration. These structures aim to transform cable protection from a national afterthought into a collective security priority. In October 2023, NATO Defense Ministers endorsed the Digital Ocean Vision, integrating satellite, surface, and subsea sensors into a unified diagnostic framework.

Operational presence has intensified in parallel. The Baltic Sentry mission, launched January 2025, deploys multinational naval patrols, complemented by the UK-commanded Nordic Warden mission under the Joint Expeditionary Force, to monitor suspicious vessel activity in real time. The objective is deterrence through presence: making it clear that loitering over cable routes will be observed, documented, and potentially intercepted.

Technological innovation offers perhaps the most promising defensive avenue. Distributed Acoustic Sensing, or DAS, converts existing fiber-optic cables into enormous linear microphones capable of detecting approaching vessels, dragging anchors, or submersible activity at considerable distances. Where traditional cable monitoring required dedicated sensor deployments, DAS leverages the cables themselves as surveillance infrastructure. Complementary technologies, including uncrewed surface vessels like the Saildrone fleets tested by Denmark in 2025 and AI-enabled maritime surveillance systems, can identify vessels operating with disabled Automatic Identification System transponders—the signature behavior of ships engaged in covert operations.

The United States has moved to harden its policy framework. The September 2024 New York Principles, announced at the UN General Assembly, established a baseline for allied coordination on cable security. Team Telecom, the interagency body reviewing submarine cable licenses, now applies explicit national security criteria to landing rights decisions. The Congressional Research Service has outlined the protection issues facing Congress, while Deputy National Security Advisor Anne Neuberger’s January 2025 engagement with Nordic-Baltic allies has produced initial frameworks for unified response protocols.

The European Union has issued recommendations on secure and resilient submarine cable infrastructures and launched an EU Action Plan on Cable Security in February 2025 focused on prevention, detection, response, and deterrence. A memorandum of understanding among Baltic NATO allies and the EU now coordinates rapid-response frameworks, though implementation remains uneven.

The Industrial Bottleneck: Repair as Strategic Vulnerability

Detection and deterrence matter little if damaged cables cannot be rapidly restored. Here the West confronts a critical industrial deficit.

The global cable repair fleet numbers approximately 60 vessels, and 65 percent of these ships will reach obsolescence by 2040. New construction has not kept pace with either fleet aging or the expanding cable network. The economics are challenging: cable ships are expensive to build—$50 to $70 million per vessel—expensive to maintain, and generate revenue only when cables break. Commercial operators, understandably, underinvest in capacity that sits idle during normal operations.

Geographic concentration of repair capacity compounds the fleet shortage. In the Asia-Pacific region, SBSS, a Chinese-linked operator, dominates the repair market. During any Taiwan contingency, or indeed any regional tension involving Chinese interests, Western-aligned nations may find their repair needs deprioritized. A cable cut that might normally require two weeks to fix could stretch to months if the available repair ships are otherwise engaged or simply unwilling to operate in contested waters.

The economic asymmetry favors the aggressor. A planned cable repair, conducted in benign conditions with pre-positioned equipment, costs approximately $500,000 to $1 million. An emergency repair in a conflict zone, requiring hazard pay for crews, military escort, and expedited equipment mobilization, can exceed $12 million. An adversary can impose costs at a ratio of more than ten to one simply by keeping repair crews uncertain about when and where the next cut will occur. TeleGeography estimates that $3 billion in investment is needed by late 2025 merely to maintain the status quo—15 replacement ships, 5 additional vessels, and $200 to $400 million in pre-deployed repair kits.

The Emerging Legal Frontier

The detention of the Yi Peng 3 following its suspected involvement in the November 2024 Baltic cable cuts represented the first meaningful enforcement action under the 1884 Convention for the Protection of Submarine Telegraph Cables in over six decades. The precedent, while encouraging, exposed the inadequacy of existing frameworks.

Current international law treats the high seas as a zone of navigational freedom where vessels may transit without interference absent clear evidence of criminal activity. This framework, sensible for an era of legitimate maritime commerce, creates exploitable gaps for adversaries conducting operations designed to avoid attribution. A vessel can exhibit every behavioral signature of cable sabotage—disabled transponder, erratic course over known cable routes, extended loitering—without providing legal grounds for interdiction. As NATO CCDCOE has analyzed, the UNCLOS framework provides inadequate tools for the current threat environment.

Efforts to close these gaps are underway but incomplete. Proposals to redefine permissible interference with vessels displaying suspicious maritime patterns over critical infrastructure have gained traction among Northern European states most directly threatened. The November 2024 establishment of a UN International Advisory Body for Submarine Cable Resilience represents an initial diplomatic response. The challenge lies in balancing enhanced enforcement authority against the broader navigational freedoms that benefit Western commercial and military operations globally. Any precedent that allows boarding of suspected saboteurs also creates precedent that adversaries may invoke against Western vessels.

The Stakes of Inaction

The submarine cable network represents both the central nervous system of global commerce and a catastrophically under-threatened vulnerability. The emergence of SIEGECRAFT—the deliberate, deniable strangulation of digital infrastructure—has occurred faster than institutional responses can adapt. Recorded Future documented 46 incidents in 2024 alone, the highest annual count since 2013. Adversaries have recognized what defenders are only beginning to acknowledge: that massive economic and military harm can be inflicted through actions that fall below the threshold of armed conflict, conducted by deniable actors, in a domain where observation is difficult and enforcement is nearly impossible.

The path forward requires action across multiple domains simultaneously. Investment in sovereign repair capacity must become a strategic priority, not a commercial afterthought. Rapid deployment of distributed acoustic sensing across all Tier-1 cable routes would transform passive infrastructure into active surveillance networks. Legal frameworks must evolve to enable interdiction of vessels displaying clear patterns of hostile activity, even absent smoking-gun evidence of completed crimes. Satellite-based backup systems, including low-earth-orbit constellations like Starlink and OneWeb, should be positioned as emergency failover capabilities for regions most vulnerable to cable isolation.

Most fundamentally, policymakers must abandon the comfortable fiction that submarine cables exist in a separate domain from great power competition. The seabed has become a battlespace. The cables that carry our data, our financial transactions, and our military communications are under active threat from adversaries who have calculated, correctly, that the benefits of sabotage outweigh the minimal costs of plausible deniability.

In the twentieth century, nations fought for control of the oil flowing through pipelines. In the twenty-first, the contest has shifted to the data flowing through cables. SIEGECRAFT has emerged as the defining methodology of this new competition—patient, deniable, and devastating. The nations that recognize this reality, and act upon it, will retain their place in the global order. Those that do not may find themselves, like the residents of Matsu during their 50-day blackout, suddenly and silently severed from the systems upon which modern existence depends.

The Prometheus Option: Stealing Fire Without Breaking the Law-Talent Mobility as Asymmetric Defense

Series Summary: The United States is losing a competition it barely recognizes—not for weapons or territory, but for the scientists and engineers who build the future. This series argues that talent mobility is asymmetric defense: a low-cost strategy that forces competitors into expensive responses. Part I establishes the strategic stakes through the lens of a former Army Ranger who learned that trust is earned through performance, not credentials. Part II examines the data—Nobel laureates, brain drain statistics, and historical lessons from Einstein to Qian Xuesen. Part III proposes a shift from accidental magnet to deliberate strategy, culminating in a simple verdict: Prometheus matters not because he stole fire, but because he knew what to do with it.

The Two Words That Changed Everything

1st Ranger Battalion, Hunter Army Airfield, Savannah, Georgia. 1994.

I had been an Army Ranger for exactly twenty-four hours. The other Rangers in Charlie Company, 1st Battalion, 75th Ranger Regiment had been training for weeks for the Expert Infantryman Badge competition—fifty stations, the most coveted award an infantryman could earn short of valor decorations. I was told I would pull details: scut work, support duty. Watch the real Rangers compete.

I requested to see First Sergeant Van Houten immediately.

I told him I was fully prepared to go through this competition. I told him I was thirty-five years old and had been around the block a few times. I told him I would not take no for an answer. I told him I would make him look good.

He lowered his head for a long moment. Then he looked at my team leader—a young sergeant from Indiana who already hated me—and said two words:

“Let him.”

Three weeks later, I earned the highest score in the entire battalion: fifty out of fifty stations. Perfect. No “Christmas GO”—no free passes. I was selected to represent the entire enlisted corps of Army Rangers at the award ceremony, where Colonel Ralph Puckett—whose Distinguished Service Cross from Korea would later be upgraded to the Medal of Honor—handed me my badge and said, “Ranger Garner, we meet again. Congratulations.”

I share this story not as credential-polishing but as evidence. Two words from a first sergeant who decided to bet on capability over compliance changed the trajectory of my life. The system almost filtered me out. One decision let me through.

That’s the argument of this series in miniature: the difference between a system that filters for credentials and one that filters for capability is the difference between strategic advantage and strategic suicide.

The United States is currently running a credential-filtering system for scientific and technical talent. It is losing.

The New Chokepoints Aren’t Straits-They’re People

Picture a familiar scene: a brilliant scientist stands at the edge of a life decision that has nothing to do with equations and everything to do with friction. A job offer exists in a free society. A research lab is ready. The work is meaningful. But the paperwork timeline is vague, the rules feel arbitrary, and the risk of being treated as suspect never fully goes away. In the end, the scientist does what humans do under uncertainty: chooses the path with fewer surprises.

Sometimes, that path leads away from the United States.

Sometimes, that path leads to Shanghai.

That is the quiet strategic loss most maps will never show.

In September 2025, CNN documented what researchers had been warning about for years: at least eighty-five scientists who had been working in the United States joined Chinese research institutions full-time since the start of 2024, with more than half making the move in 2025 alone. Among them: a Princeton nuclear physicist, a mechanical engineer who helped NASA explore manufacturing in space, a National Institutes of Health neurobiologist, celebrated mathematicians, and more than half a dozen AI experts.

Chinese universities, according to Princeton sociologist Yu Xie, are viewing American policy uncertainty as “a gift.”

A gift.

The clearest signal that this loss matters comes from the US government itself. In 2024, the White House’s interagency National Science and Technology Council published an updated list of the technology areas it considers especially significant to national security—advanced computing, artificial intelligence, biotechnology, quantum information science, hypersonics, directed energy, and more. That list is not a think tank wishlist. It is a statement of national priorities. Read it as such: Critical and Emerging Technologies List Update (February 2024).

Once government formally declares that certain technology domains carry strategic weight, an uncomfortable truth follows. The center of gravity in competition is not only factories, chip supply chains, or defense budgets. It is the scientists and engineers who can build the systems those budgets buy.

A nation can stockpile equipment.

It cannot stockpile genius.

It has to attract it, keep it, and integrate it securely. Or it has to watch that genius build the future somewhere else.

What I Learned About Trust in Places That Would Kill You for Getting It Wrong

Most policy papers on immigration and security are written by people who have never held a clearance, never operated in environments where misplaced trust gets people killed, never had to make real-time judgments about who belongs inside the wire and who doesn’t.

I have.

As a Ranger, I learned that trust is not a credential. It is not a background check. It is not a form. Trust is demonstrated reliability under pressure. It is earned in increments, tested constantly, and extended only as far as performance warrants.

The young Rangers at 1st Battalion hazed me relentlessly. Smoked me every chance they got. I was the oldest private in the unit, a thirty-five-year-old among kids who could have been my sons. They hated everything I represented—the audacity of showing up late to a game they’d been playing their whole lives.

But I didn’t need them to like me. I needed them to see what I could do.

When I earned that perfect EIB score, the hazing didn’t stop. But the questions started. Who the hell is this guy? How did he do that without training?

That’s how trust works in high-stakes environments. You don’t get it by asking. You don’t get it by credential. You get it by performing at a level that makes the questions answer themselves.

Later, in Africa, I learned the corollary lesson—though not in any way the credential-checkers would approve.

I traveled to Southern Africa to blow off steam for a month. I stayed two years. I overstayed my visa. Year one, I was a drunk hanging out with other drunks, lost in a way that only someone who has been through what I’d been through can understand. But even then—even at the bottom—I knew I would create a new path. I always had.

Year two, I was thrust into anti-poaching work. Hunting men who killed elephants and rhinos for profit. The details of what that work entailed are not suitable for policy journals. But I will say this: I learned more about trust, operational security, and human reliability in the African bush than I ever learned in any classroom or any Army manual. Or Ranger School.

Trust must be architecturally constrained, not just personally earned. You build systems that assume anyone can be compromised, anyone can be pressured, anyone can be turned. Then you design access and monitoring structures that make betrayal harder and more detectable. You don’t rely on flags or name-matching or visa stamps. You rely on compartmentalization, progressive access, and performance metrics that don’t lie.

The irony is not lost on me: I was technically an illegal overstay while doing work that governments couldn’t or wouldn’t do. The credential-filtering system would have had me deported. The capability-filtering system—the one that actually works—put a weapon in my hands and pointed me at men who needed stopping.

This is what security integration actually looks like when the stakes are lethal.

And it is precisely what American immigration policy for scientific talent fails to do.

We have built a system that filters on credentials and country of origin—proxies that correlate loosely with risk and hardly at all with capability. We have not built a system that filters on demonstrated performance and architecturally constrains access based on sensitivity. The result is that we exclude talent that could transform American capability while doing almost nothing to stop sophisticated adversary intelligence operations, which don’t rely on student visas anyway.

The Reagan Institute’s 2024 National Security Innovation Base Report Card gave the United States a grade of “C-” for its talent base and pipeline—citing an aging domestic defense workforce and visa hurdles for foreign talent. The answer to those who claim that immigration reform will lead to exploitation by adversaries is not to exclude talent. It is to build better architecture.

The Rangers didn’t vet me by where I came from or how old I was. They vetted me by what I could do. And then they constrained my access until I earned more.

That’s the model.

The Data Behind the Gut Feeling

The debate over talent sometimes gets stuck in symbolism. The hard baseline is simpler and more useful: the United States already relies heavily on foreign-born talent in science and engineering fields. This is not a proposal. It is the existing structure of American technical capability.

In 2024, the National Science Board published indicators showing that foreign-born workers made up 19 percent of the United States STEM workforce and 43 percent of doctorate-level scientists and engineers. At the highest levels of training—the people who actually push the frontier—nearly half came from somewhere else.

The innovation literature fits the same pattern. Britta Glennon’s comprehensive review in the Journal of Economic Perspectives (Winter 2024) surveys the evidence and finds “ample evidence that skilled immigrants have a strong positive effect on firm outcomes.” Her critical finding: when employers face immigration restrictions, they don’t hire more Americans. They offshore the work, automate it, or restructure around the constraint. Restrictions don’t keep jobs in America. They move capability abroad. Her follow-up study in Management Science (2024) quantified the effect: when H-1B visa restrictions tightened, affected firms increased foreign affiliate employment by 21 percent—not because they wanted to offshore, but because the immigration system gave them no other option.

William Kerr’s updated analysis in IMF Finance & Development (March 2025) puts numbers on the mobility: inventors migrate at twice the rate of college-educated workers; Nobel Prize winners migrate at six times that rate. The exceptional move. The question is whether they move here.

The National Foundation for American Policy analysis updated through October 2025 reports that immigrants have been awarded 36 percent of the Nobel Prizes won by Americans in chemistry, medicine, and physics since 1901—and 40 percent since 2000.

The 2025 Nobel Prize in Chemistry went to Omar M. Yaghi, who was born into a refugee family in Jordan and arrived in the United States alone as a teenager with limited English proficiency. He started at Hudson Valley Community College in Troy, New York. He bagged groceries and mopped floors. He is now at UC Berkeley, and his work on metal-organic frameworks may help solve clean water access for millions.

A refugee. A community college student. A Nobel laureate.

I know something about that trajectory.

In ninth grade, I made a list. Four things I would become:

  1. A shark biologist, after reading Jaws.
  2. A mercenary of some type, after reading Frederick Forsyth’s The Dogs of War.
  3. An Army Ranger, after reading Stars and Stripes articles on long-range reconnaissance patrol Rangers in Vietnam—articles my father sent me from his posting at Ubon Royal Thai Air Base while he flew combat missions.
  4. A “brain biologist,” to study and learn how and why I was such a weirdo.

Four impossible things written in a notebook by a fifteen-year-old military brat with damaged eyesight and a mother who had beaten the fighter-pilot dream out of him.

I did all four.

Shark biologist: I pioneered research in shark cell culturing and electroreception at institutions including Scripps. Mercenary: year two in Southern Africa, hunting poachers, doing work governments couldn’t or wouldn’t do. Army Ranger: 1st Battalion, 75th Ranger Regiment, perfect EIB score, award presented by Colonel Ralph Puckett. Brain biologist: biophysicist and neuroscientist, now writing about the mechanical and molecular foundations of trauma in Silent Scars, Bold Remedies: Cutting-Edge Care and Healing from Post-Traumatic Stress Injuries.

The credentialing system didn’t make that list. I did. And then I walked it—through a flunk-out at the University of South Florida, through Prince George’s Community College in Maryland, through a full scholarship to American University, through Ranger Battalion at thirty-five, through the African bush at age 54, through everything the system said I wasn’t supposed to survive.

I made my own doors. I always have.

Yaghi and I are the same story wearing different clothes. The system didn’t make room for us. We drew our own maps and walked them. And that’s the point: the United States has built a talent-filtering apparatus that would have excluded the very people who prove its value. The community college kid who wins the Nobel. The ninth-grader who wrote four impossible things in a notebook and then did all of them. The thirty-five-year-old private who outperforms Rangers half his age.

Credential-based filtering is not security. It is not efficiency. It is the systematic exclusion of people who don’t fit a trajectory that was never designed to identify capability in the first place.

When Omar Yaghi was asked what his first reaction was to learning he had won the Nobel Prize, he said: “Astonished, delighted, overwhelmed.”

I understand that feeling. Not because I’ve won a Nobel—but because I’ve stood in rooms I was never supposed to enter, holding credentials I was never supposed to earn, having done things the system said I couldn’t do. Every box on that ninth-grade list, checked. Every door that didn’t exist, built.

That’s what the American system is capable of when it works. And that’s what we’re currently in the process of strangling.

The Penn Wharton Budget Model (March 2025) found that shifting even 10 percent of future low-skilled immigration toward high-skilled STEM workers would grow the economy, reduce federal debt, and increase wages across all income groups—lower-skilled, higher-skilled non-STEM, and higher-skilled STEM alike. A rare “Pareto improvement” benefitting everyone.

A strategy that treats such talent as an afterthought will not merely miss an opportunity. It will weaken an existing pillar of national capacity.

When a Crackdown Chills the Lab

In 2018, the Department of Justice launched the China Initiative, framed around concerns including economic espionage and trade secret theft. By 2022, the Department moved away from the label while emphasizing a broader approach to nation-state threats.

The label changed. The damage lingered.

The Stanford Center on China’s Economy and Institutions documented what happened: after the China Initiative began, departures of Chinese-born scientists from US institutions increased by 75 percent, with two-thirds relocating to mainland China or Hong Kong. A survey published in PNAS found that 35 percent of Chinese-American scientists reported feeling unwelcome in the United States, 72 percent expressed feelings of insecurity as researchers, and 42 percent feared restrictions on their research freedom.

Fear is a signal. Scientists read signals.

The consequences are no longer theoretical. That CNN investigation in September 2025 documented the exodus in real time: eighty-five scientists, including leaders in AI, quantum computing, and biotechnology—fields the US government has formally designated as strategically significant—leaving American institutions for Chinese ones. A protein chemist who left the University of Maryland for Shanghai’s Fudan University noted there has been a “clear surge in the number of job applicants from overseas” at Chinese institutions.

“I know Chinese universities are bending over backwards to actively take advantage of this opportunity presented to them as a gift from a ‘perceived’ adversary,” he said.

A gift.

A security posture that treats broad communities as presumptive risk creates a self-inflicted strategic wound: it discourages exactly the people the United States needs in order to compete in frontier technologies. Competitors gain capability without having to recruit. They simply wait.

The Refugee Dividend, and the Trap of Making Enemies

History offers two lessons that need to be held together.

The first: American strategic capability has sometimes been strengthened by people who arrived because they had nowhere safe to go.

The Atomic Heritage Foundation’s account of refugee scientists in the Manhattan Project era shows how displaced experts—fleeing fascism, fleeing persecution, fleeing death—became part of the American wartime research ecosystem. Albert Einstein fled Nazi Germany. Enrico Fermi fled fascist Italy. They did not come because the paperwork was easy. They came because America was the last option. And they built the nuclear backbone that underpins US security to this day.

As Rachel Hoff and Reed Kessler note in War on the Rocks: today, the chances that Einstein could win the arbitrary H-1B visa lottery are a mere 11 percent.

The second lesson: mishandling foreign-born talent can create blowback that lasts generations.

Qian Xuesen was educated at MIT and Caltech. He helped found the Jet Propulsion Laboratory. He was one of the most brilliant aerospace engineers of his generation—and he was American by every measure except birth.

Then the Red Scare came. Qian was accused of Communist sympathies, stripped of his security clearance, placed under house arrest. In 1955, he was deported to China in a prisoner exchange.

He spent the next four decades building China’s missile and space programs. The rockets that now carry Chinese astronauts into orbit and Chinese warheads toward targets trace their lineage to a man America trained, accused, and expelled.

Iris Chang’s biography Thread of the Silkworm tells the full story. It should be required reading for anyone who thinks suspicion is a strategy.

These two stories do not cancel each other out. They point to the same operational conclusion: talent strategy must be paired with process legitimacy and security discipline. A system that invites talent in and then governs it through paranoia risks turning a potential asset into a long-term adversarial advantage for a rival. A system that invites talent in and then integrates it through transparent rules, architectural constraints, and performance-based trust can convert lawful opportunity into durable alignment.

The Spell-Caster’s Son

Before I learned to walk up to poachers at twenty meters, I learned to walk up to Supreme Court Justices at embassy parties.

When I was studying at American University and Georgetown, my parents were listed in the DC Green Book—the who’s who of dignitaries and diplomatic society. My mother, the same woman who had beaten the fighter-pilot dream out of me, gave me her invitations to embassy functions. A dozen parties. Ambassadors, dignitaries, the kind of rooms a twenty-one-year-old punk from community college had no business entering.

I walked into every one of them like I belonged.

At one reception, I noticed Sandra Day O’Connor—a sitting Supreme Court Justice—sitting alone. No one was approaching her. Too intimidated, too deferential, too aware of the protocol they might violate.

I walked straight up and chatted her up.

Did the same with Timothy Leary. Did the same with Jack Nicholson. Did the same with ambassadors from countries I couldn’t find on a map. A twenty-one-year-old punk, crashing diplomatic society on borrowed invitations, taking space that no one else had the audacity to claim.

My mother called it spell-casting. She had decorated six foreign embassies in Washington, charmed ambassadors into letting her redesign their official residences, designed The Emerald Ball at the Kennedy Center and The International Fair in Rock Creek Park. She could make anyone feel like the most important person in the room—right up until she struck. I learned that from her. The art of disarming people with genuine human contact. The understanding that deference is what people expect, and authenticity is what they crave.

Years later, in the African bush, I used the same technique on poachers. Wave from a hundred meters. Yell something friendly. Close the distance while they wonder who this idiot white boy is. At twenty meters, they’re curious. They’ve let their guard down.

Then I did what I had to do.

It’s the same move. Embassy parties and poacher camps. Sandra Day O’Connor and men who killed elephants for profit. Walk up, be human, take the space everyone else is too afraid to claim.

Here’s why this matters for the argument of this series: that’s how America used to work.

The DC Green Book. Embassy parties. A country so magnetic, so confident in its own gravitational pull, that a twenty-one-year-old community college transfer could walk into rooms with Supreme Court Justices and ambassadors and belong there through sheer audacity. The system was porous enough to let talent flow upward. The doors weren’t locked—they were waiting for someone bold enough to push.

That porosity wasn’t weakness. It was strategic advantage. It was how America attracted the world’s best, integrated them into the highest levels of society, and converted their talent into national capability. It was soft power made flesh.

That’s the America we’re losing. The one that let Omar Yaghi in from a refugee camp. The one that let me walk up to Sandra Day O’Connor. The one that said “Let him” when a thirty-five-year-old demanded his shot at the EIB.

We’re replacing porosity with paranoia. And paranoia is not a strategy.

Absolute Value: The Alchemy That Makes Fire Useful

My mother taught me many things, most of them in ways no child should learn. She beat me severely enough to destroy my eyesight—the eyesight I needed to become a fighter pilot like my father, who flew F-4 Phantoms in Vietnam. She shifted my teeth with her fists. She left scars on my head and neck that I only understood decades later through hypnosis.

She also taught me to survive.

She taught me to read people the way a soldier reads terrain—for hidden dangers, for opportunities, for the moment to move. She taught me psychological warfare more sophisticated than anything Sun Tzu or Clausewitz ever wrote. She taught me that the biggest killer in the world is not cancer or heart disease. It’s arrogance. And when some arrogant threat underestimated me, that gave me leverage to strike.

In mathematics, there is a concept called absolute value. Whatever number you put between those two little brackets—positive or negative—comes out positive. The brackets strip away the sign and keep only the magnitude.

I learned to apply that concept to my life. The negative energy from pain and suffering can, with work and dedication, be converted to something entirely positive and useful. Trauma becomes fuel. Fear becomes focus. The fire that burns you can also forge you.

That is also the story of America’s relationship with immigrant talent.

Omar Yaghi’s fire was a refugee camp. Einstein’s fire was Nazi persecution. Fermi’s fire was fascist oppression. My fire was a childhood that would have destroyed someone who didn’t learn to transmute it.

Prometheus does not matter because he stole fire. Prometheus matters because he knew what to do with it once he had it.

The United States has historically been a place where people with fire—people fleeing, people seeking, people burning with capability that their home countries couldn’t use or wouldn’t tolerate—could come and convert that fire into light.

That is the strategic asset. That is the asymmetric advantage no amount of money can buy.

And we are currently in the process of giving it away.

From Accidental Magnet to Deliberate Strategy

The United States has long benefited from being a destination. But being a destination is not the same thing as running a strategy.

In 2024, seventy former national security officials—cabinet members, military leaders, intelligence professionals from both Republican and Democratic administrations—sent a letter to Congress warning about STEM immigration bottlenecks. Their conclusion:

“China is the most significant technological and geopolitical competitor our country has faced in recent times. With the world’s best STEM talent on our side, it will be very hard for the United States to lose. Without it, it will be very hard for us to win.”

In April 2025, Senators Dick Durbin and Mike Rounds introduced the bipartisan Keep STEM Talent Act, which would retain international graduates with advanced STEM degrees while imposing new vetting requirements.

As Senator Rounds stated: “Legal, highly skilled STEM immigration is crucial for our nation and has opened doors for talented immigrants like Albert Einstein to come to America. Particularly with the advancements of artificial intelligence and cybersecurity, we must keep talent in the United States and stay ahead of our near peer competitors such as China and Russia.”

The starting point for a real strategy already exists: the government’s own list of critical and emerging technologies. When that list identifies the domains that matter most, it also identifies the talent domains that matter most. The missing step is turning that priority into a coherent pipeline that actually functions for humans making career decisions under uncertainty.

That pipeline begins by reducing predictable friction in lawful immigration pathways intended for extraordinary talent. The government already describes and administers the relevant categories—the O-1 visa for extraordinary ability, the H-1B for specialty occupations, the EB-1 and EB-2 green card tracks. The USCIS fee schedule shows what it costs. The task is to make timelines, standards, and expectations predictable enough that the United States becomes the low-uncertainty option, not merely the high-prestige option.

In January 2025, the Department of Homeland Security launched a major overhaul of the H-1B visa program, removing the traditional employer-employee requirement and allowing professionals in specialty occupations to self-sponsor. The O-1 visa for individuals with extraordinary ability saw expanded evidence criteria for AI, quantum computing, clean energy, and biotechnology professionals. These are steps in the right direction.

The pipeline also requires retention. As many as 90 percent of foreign students receiving advanced STEM degrees are currently forced to leave the country after graduation under existing rules—after American taxpayers have funded their research, after American universities have trained them, after American labs have integrated them into teams working on American priorities.

We train them. We fund them. Then we send them home to compete against us.

Finally, the pipeline requires secure integration that does not collapse into blanket suspicion. Security should scale through design: compartmentalized access, continuous monitoring, progressive responsibility based on demonstrated reliability. The model is not the background check as gate. The model is the architecture as constraint.

That’s what I learned in the Rangers. Trust is earned in increments. Access follows performance. And you never stop watching, not because everyone is guilty, but because the system has to work even when someone is.

The Last Fire

First Sergeant Van Houten didn’t know what I would become when he said “Let him.” He didn’t know I would earn a perfect score. He didn’t know I would go on to overseas operations, to anti-poaching work in Africa, to a career that would take me to more than a hundred countries and teach me things no classroom ever could.

He made a bet on capability. The system almost excluded me. Two words let me through.

Somewhere right now, there is a scientist standing at the edge of a decision. She has the talent to transform American capability in a field the government has formally designated as strategically significant. She has the drive. She has the fire.

And she is looking at a system that treats her as a risk to be managed rather than an asset to be integrated.

If we lose her—not to a competitor’s recruitment campaign, but to our own uncertainty and bureaucratic friction and ambient suspicion—we will never know what we lost. She will simply build the future somewhere else. Her papers will appear in Chinese journals. Her patents will be filed in Shanghai. Her students will work for companies that compete against American firms.

And some analyst years from now will write a report wondering how we fell behind.

The United States government has already said, in plain language, which technology domains it considers strategically significant. The National Science Board has already quantified how much the American science and engineering enterprise relies on foreign-born talent. The innovation literature has already assembled evidence that high-skilled immigration correlates with measurable innovation outputs. And the research on deterrence and fear has already raised a warning: policies framed as security can still weaken security if they drive talent away.

That warning is now materializing in real time. Scientists are leaving. Chinese institutions are recruiting with unprecedented success. The reverse brain drain that analysts warned about has become documented fact.

Seventy former national security officials from both parties have already told Congress: With the world’s best STEM talent on our side, it will be very hard for the United States to lose. Without it, it will be very hard for us to win.

This does not call for naïve openness, and it does not call for paranoid closure. It calls for a system that treats lawful talent mobility as strategic infrastructure—disciplined, predictable, and backed by security architecture that scales without stigmatizing the very people a competitive society needs.

Prometheus does not matter because he stole fire.

Prometheus matters because fire changes who can build the future.

Strategy in this century is deciding where that fire lands—and building a system worthy of holding it.

The Billion-Dollar Bonfire: How a $99 Toy Turns a Trillion-Dollar Fleet to Ash

Executive Summary

The United States Air Force faces an existential threat not from peer-state missiles, but from $99 commercial drones. While we spent decades building a Maginot Line in the sky, we left our trillion-dollar fleet parked in the open, vulnerable to swarms that cost less than a Pentagon coffee budget. This paper exposes the “Glass Jaw” of American airpower: the catastrophic vulnerability of forward-deployed aircraft to cheap, attritable ground strikes.
Current high-tech defenses are failing.

Billion-dollar solid-state lasers are defeated by simple magnesium smoke—a hard-counter based on Mie scattering physics—and kinetic interceptors are paralyzed by collateral damage risks in urban environments. Worse, our 12-year acquisition cycle cannot compete with the enemy’s 2-day Amazon delivery speed.

The solution is not more technology; it is humility. We must adopt “Redneck Solutions”—industrial fishing nets (“The Tuna Dome”), shotgun countermeasures (“Duck Hunt”), and inflatable decoys. These low-tech defenses work immediately, cheaply, and without software updates. Continued reliance on MIL-SPEC arrogance over practical physics will result in the destruction of US Air Force assets on the ground before a single pilot takes off. We can catch the threat in a net, or we can sweep up the ashes.

The Glass Jaw

In the Pentagon, the delusion has a name. They call it “Sanctuary.”
The Generals look at the oceans. They look at the nuclear triad. They look at the young airman with an M4 standing at the gate. They believe this is security.

It is theater. Expensive theater. The kind of theater where the tickets cost $850 billion a year and the ending is a surprise to everyone except the enemy.

Walk the flight line at Langley. At Eglin. At Nellis. The F-22s sit wingtip to wingtip. The F-35s. The KC-46 tankers. Soft. Full of jet fuel. Covered in sensors that cost as much as a house. Arranged with all the strategic foresight of a Costco parking lot.

We park them like Chevrolets at a used car lot. Correction: used car lots have security cameras that work.

The enemy sees this. He is not stupid. He just has WiFi and a grudge. He cannot fight the F-35 in the air. In the air, the F-35 is a god. So he decides to slay the god while it sleeps. While it’s parked. While it’s getting a $44,000 paint job to maintain its stealth coating.

More than 350 drone incursions were detected over U.S. military bases in 2024 alone. At Langley Air Force Base—home to the F-22 Raptors and Air Combat Command Headquarters—coordinated drone swarms flew at altitudes between 100 and 4,000 feet for seventeen consecutive days. Seventeen days. That’s not an incursion. That’s a commute. Naval Station Norfolk, the world’s largest naval base, was along the flight path. The military could not track, identify, or stop the intrusions. The world’s most powerful military, defeated by something your nephew got for Christmas.

He rents a box truck. He drives to the industrial park two miles from the runway. He parks behind a warehouse, just half a block from Burger King and McDonald’s. After a Happy Meal, he opens the back door and smiles.

Inside: one hundred drones. Consumer quadcopters start at $99. Each carries a pound of C4. Total investment: less than a Pentagon coffee budget.

The base fence is ten feet high. The drones fly at fifty feet. The airman at the gate is watching for a terrorist in a van. He is not looking up. Nobody told him to look up. The training manual is from 2006.

The attack takes ninety seconds. The drones rise. They swarm. They zoom over the terrain at two miles in a minute. They dive.

They do not hit the bunkers. Bunkers are hard. They hit the jets sitting in the sun. The jets we left outside. Like lawn furniture. Like we’re daring someone to steal them.

We shoot down ninety. We hold a press conference. We give ourselves medals. It does not matter. Simulations show that when eight drones attack an Aegis-class destroyer, an average of 2.8 still penetrate defenses. Ten get through. Ten jets burn. Mission accomplished—for the enemy.

The F-35A costs $82.5 million per aircraft as of July 2024, according to the F-35 Joint Program Office. The F-22 program cost $67.3 billion for 195 aircraft—approximately $350 million per unit. Ten jets destroyed equals $1.5 billion in damage. The enemy spent pennies. He put it on a credit card. He got airline miles.

Return on investment: seven hundred and fifty thousand percent. Wall Street would kill their grandmothers for those numbers. Literally. They have.

The Physics of Failure

We believe in technology. We love acronyms. We love lasers. We especially love lasers with acronyms. The longer the acronym, the bigger the contract.
The enemy loves high school chemistry. And physics. He paid attention in class. We were busy writing requirements documents.

The Magnesium Curtain

We spent billions on High Energy Lasers. The Generals love them. They look great in PowerPoint. They make swooshing sounds in the animations. Raytheon’s 50-kW laser can burn through a small consumer drone in seconds. In the lab. In perfect weather. In San Diego. Where it never rains. Where the enemy has politely agreed not to use countermeasures.

But the enemy knows about magnesium. Eighth grade science fair. Blue ribbon. His parents were very proud.

The lead drones carry no bombs. They carry magnesium flares. They drop magnesium oxide dust. Magnesium burns at flame temperatures ranging from 2,500-3,500 K (approximately 2,200-3,200°C or 4,000-5,800°F), producing brilliant white light and dense smoke. It’s basically a rave for photons. A very expensive rave that we’re paying for.

The laser hits the smoke. We physicists call it Mie Scattering. Here is the punchline: The Pentagon’s favorite solid-state lasers (like the 50kW class systems currently deployed) operate at 1.064 microns—the near-infrared. Burning magnesium produces Magnesium Oxide (MgO) particles with an average diameter of roughly 0.5 to 1.5 microns. Do you see the problem? The particle size isn’t just random. It’s a mathematically near-perfect match for the laser’s wavelength. Think: giant disco ball at Studio 54. We didn’t just build a laser that can be defeated by smoke. We built a laser specifically hard-countered by the most common pyrotechnic on earth. We spent billions to design a weapon that’s allergic to a flare.

High-energy lasers face “diminished effectiveness in rain, fog and smoke, which scatter laser beams”. Diminished effectiveness. Pentagon-speak for “doesn’t work.” The thermal cameras go white. Blind. The operators see nothing. They paid $200,000 for night vision that now shows them the inside lining of a cloud.

“Substances in the atmosphere—particularly water vapor, but also sand, dust, salt particles, smoke, and other air pollution—absorb and scatter light, and atmospheric turbulence can defocus a laser beam,” according to a 2023 Congressional Research Service report on directed-energy weapons.

In other words: weather exists. Someone should have mentioned this. Maybe in one of the 847 meetings about laser development. Maybe during the 12-year acquisition process. Maybe before we spent the GDP of a small nation on a weapon that can be defeated by fog. Or a campfire. Or a teenager with a bag of powder from a chemical supply store. Fifty dollars. Free shipping.

The Clutter

Our radar was built to track Soviet bombers at Mach 3. Big. Fast. Metal. Radiating heat like a flying furnace. The radar is very good at finding flying furnaces. Unfortunately, the enemy stopped building flying furnaces. We didn’t get the memo.

The radar filters out noise. Birds. Rain. Anything slow. Anything small. Anything that looks like it belongs in the sky. It was designed this way on purpose. By smart people. Who never imagined that the enemy would build weapons that look like birds.

The drone is small. Plastic. Slow. To the radar, it is a bird. To the radar, the swarm is a flock of starlings. A hundred starlings. Carrying explosives. The radar sees nature. How peaceful.

“At low altitude, probably not,” admitted General Gregory Guillot when asked if standard FAA or surveillance radars could detect drone swarms over Langley. “Probably not.” That’s a four-star general. That’s the commander of NORAD and USNORTHCOM. That’s the man in charge of defending North America. Probably not

Maybe they’re the fuzzy-orange foo fighters from the skies of WWII.

The operator chases a Red Bull with a Monster tallboy. His screen is clear. Everything is fine. The birds are flying. Some of the birds have C4 strapped to them. The radar doesn’t mention this. The radar was not programmed to care.

The enemy flies his killer drones in the middle of Amazon delivery traffic. Next to the news helicopter. In the same airspace as grandma’s medication delivery. He files a flight plan. He’s very polite about it.

The Lieutenant sees fifty dots. Forty are delivering toothpaste and M&Ms. Six are delivering pizza. Three are filming real estate listings. One is delivering high explosives. He has three seconds to pick a target.

If he shoots the toothpaste/M&Ms drone, his career ends. CNN runs the footage for six weeks. “Military Destroys Amazon Christmas Package.” Congressional hearings. His wife threatens to leave him.

If he shoots the news chopper, he goes to prison. Orange jumpsuit. Bad food. No pension.
If he shoots the explosive drone and misses, he’s on the news anyway. “Military Fires Missiles Over Suburban Neighborhood.” Property values collapse. Lawsuits. His wife definitely leaves him.

So he waits. He calls his supervisor. His supervisor calls legal. Legal is at lunch. The drones do not wait. The drones do not have a legal department. The drones do not take lunch.

The Self-Inflicted Wound

We are civilized. We have laws. We have lawyers. So many lawyers. Entire buildings full of lawyers. The enemy has neither. The enemy has a YouTube tutorial and a wet dream.
He launches from a school zone. He picks the school zone on purpose. He knows we know where he is. He knows we can’t shoot. He waves.

He flies over a suburb. Nice suburb. Good schools. HOA keeps the lawns tidy. Go Trump signs in some yards, Yay Hegseth signs in others. United in their imminent vulnerability.
He approaches from the city side, not the ocean. The ocean approach has sensors. The city side has Starbucks. He stops for coffee. Grande. Oat milk. He tips well. He’s about to have a very good day.

The Base Commander has the C-RAM. Twenty-millimeter explosive rounds. It sounds like a chainsaw having a seizure. Very impressive. Very loud. The system uses the 20mm HEIT-SD (high-explosive incendiary tracer, self-destruct) ammunition, which explodes on impact with the target or on tracer burnout, reducing the risk of collateral damage. Reducing. Not eliminating. Reducing. Like a sale at Kohl’s. Thirty percent off collateral damage. Bargain.
But gravity is law. Gravity does not care about our lawyers. Gravity does not attend briefings. Bullets go up. They must come down. Newton was very clear about this. We ignored Newton. We ignore a lot of things.

The C-RAM uses HEIT-SD ammunition specifically because even self-destruct rounds “could cause unintended collateral damage” in urban areas. Could. Such a gentle word. “Could cause unintended collateral damage.” Translation: shrapnel might kill taxpayers. Taxpayers vote. Taxpayers sue. Taxpayers have local news on speed dial.

“In an urban area, if C-RAM is able to knock these mortars out and have them explode up in the air, the debris and the shrapnel from some of those rounds are going to fall. This can cause some civilian casualties.”

Some civilian casualties. Some. We spent forty years learning to say “collateral damage” with a straight face. We have entire public affairs offices dedicated to explaining why civilian casualties are actually not that bad. But those civilian casualties were overseas. Those civilians were other people’s voters. These civilians have Instagram. These civilians went to high school with the reporter. These civilians are three miles from a congressional district that flipped last election.

He cannot fire.

So he uses the microwave. The HPM. High-Powered Microwave. Another acronym. Another PowerPoint. This one cooks the electronics. The drone dies mid-flight. Victory. Sort of.
It becomes a twenty-pound brick at terminal velocity. It’s still carrying its payload. It’s just not steering anymore. It’s now brain-dead but still ballistically active. Physics takes over. Physics is always undefeated.

It crashes through the roof of a house. Through the baby’s room. Through the kitchen where mom was making breakfast. Through the windshield of the minivan in the driveway. The one with the “Support Our Troops” bumper sticker. Irony doesn’t care about bumper stickers. The bomb did not detonate in the air. We stopped that. We’re very proud. It detonates on the ground. In the suburb. Next to the family who moved there because the schools were good and the crime was low and it was safe. It was safe.

The enemy wins either way. Heads he wins. Tails we lose.

If the drone hits the jet, he destroys $100 million in aircraft. Pictures on Al Jazeera. Pictures on RT. Recruitment videos. The F-35 burning makes excellent B-roll.

If we shoot it down over the neighborhood, he destroys something more valuable. He destroys the illusion. He destroys the story we tell ourselves. He destroys the sanctuary. The photos go viral. The mother’s Facebook post gets shared four million times. The Mayor sues. The Governor screams. The President issues a statement. The statement has been focus-grouped. It includes the phrase “full investigation.” There is always a full investigation. The investigation finds that everyone followed procedure. The procedure was wrong. Nobody changes the procedure.

The President orders a ceasefire. No more shooting over neighborhoods. The lawyers agree. The Generals comply. The enemy retreats to his corner and reloads for Round 2.

We are held hostage by our own zip code. We spent $850 billion to build a military that cannot defend a Denny’s without a permit and a prayer.

The Procurement Disease

We buy weapons like we are building cathedrals. Twenty years. Committees. Requirements. Subcommittees. Requirements about requirements. Bids. Counter-bids. Protests. Lawyers. More lawyers. Consultants. Consultants for the consultants. Prototypes. Failed prototypes. Revised prototypes. Paint. The paint takes eighteen months. The paint has its own program office.

The enemy buys weapons like groceries. He has a list. He goes to the store. He checks out. He kills people. Tuesday.

The Timeline

The terrorist watches a YouTube video. “How to Build a Drone Swarm for Dummies.” One point two million views. Monetized. Day One.

He orders parts on Amazon. Prime shipping. Free with membership. He’s also ordering my book, Silent Scars Bold Remedies: Cutting-Edge Care and Healing from Post-Traumatic Stress Injuries; trying to mitigate what’s about to happen. The algorithm suggests C4. Just kidding. The algorithm suggests batteries. He already has C4. Day Two.

The parts arrive. In a box with a smile on it. He 3D-prints a bomb release. The printer cost $200. The file was free. Some kid in Finland who lives by sisu made it. The kid is fifteen. The kid has a Patreon. Day Four.He tests it in a field. It works. Of course it works. It’s not complicated. A toaster is more complicated. He films the test. He might post it later. Might get some followers. Day Seven.
Day Eight, he is ready to live-fire.

Meanwhile, in America, in the Pentagon, in a conference room with bad coffee and fluorescent lighting:

On average, the Department of Defense takes almost 12 years to deliver the first version of a weapon system. Twelve years. The iPhone didn’t exist twelve years before the iPhone. The enemy’s grandchildren will have grandchildren. The threat will have evolved seventeen times. We’ll still be in committee.

Year One, the Pentagon realizes drones are a threat. Someone writes a memo. The memo goes to a committee. The committee schedules a meeting. The meeting is in six months. There’s a conflict with another meeting.

Year Two, they form a Counter-UAS Task Force. The Task Force has a logo. The logo took four months. There were concerns about the font. The Task Force has a mission statement. The mission statement has been wordsmithed. Everyone is very proud of the mission statement. The enemy does not read the mission statement.

Year Three, the Task Force issues a Request for Information. Forty-seven companies respond. Forty-six of them are the same five contractors wearing different hats. One is a guy in a garage who actually has a good idea. His proposal is rejected for improper formatting. He used the wrong margin size.

Year Five, Raytheon gets a contract to study the feasibility of a laser. The study costs $400 million. The study concludes that lasers are feasible. This is news to no one. Lasers have been feasible since 1960. But now it’s official. Now there’s a PDF.

Year Seven, the prototype fails in the rain. It was tested in New Mexico. It does not rain in New Mexico. It rains in the places where wars happen. Nobody thought to check. The prototype goes back for redesign. The redesign will take three years. There’s a supply chain issue. The supply chain is in China. We’re not supposed to talk about that.

Year Ten, the system is fielded. Ten million dollars per unit. It does not work against the magnesium disco ball. It works in the desert when no one is shooting back. The PowerPoint said it would work everywhere. The PowerPoint lied. PowerPoints always lie. We believe them anyway.

“DOD remains deeply entrenched in a traditional linear acquisition structure—characterized by rigid, sequential processes—that has proven inadequate in adapting to evolving threats.”
This isn’t just my opinion. Ask Shelby Oakley.

She’s the Director of Contracting and National Security Acquisitions at the GAO. She is the woman whose job is to tell the truth when everyone else is lying about the schedule. Her assessment?

“DOD remains deeply entrenched in a traditional linear acquisition structure—characterized by rigid, sequential processes—that has proven inadequate in adapting to evolving threats.” Inadequate. That is the polite government word for “suicide pact.”

These are not compliments. These are words most likely to appear in someone’s obituary. New weapons can take five to seven years from concept to production under normal procedures. Normal. This is normal. We have normalized twelve-year timelines. We have normalized fighting tomorrow’s war with yesterday’s bureaucracy. We have normalized losing.

One study found that following all current regulations, it would take about two years to produce a major contract—to buy nothing. Two years. To buy nothing. To issue the paperwork that allows you to begin the process of thinking about maybe possibly purchasing something. Two years of meetings about meetings. Two years of lawyers reviewing lawyers. Two years of the enemy building drones.

We are fighting software velocity with bureaucracy speed. We are bringing a loose-leaf binder to a knife fight. We are bringing a 12-year acquisition cycle to a 12-day threat development timeline. The math: very bad, not good. The math has never worked. We keep doing the math anyway.

The Redneck Solution

We cannot wait for the laser. The laser is a promise. The laser is a first date that keeps getting postponed. The laser is your friend who’s “definitely coming” but never shows up. We need a net. An actual net. The kind fishermen use. The kind you can buy at Cabela’s. The kind that doesn’t need a software update or a congressional appropriation or a twelve-year development cycle or a PowerPoint with a swooshing sound effect.

The Tuna Dome

A drone propeller spins at ten thousand RPM. Fast. But weak. It cannot handle friction. It cannot handle string. String. The technology that defeated the drone was invented before writing.

We do not need a missile. We do not need a laser. We do not need a $400 million study about the feasibility of defeating drones. We need string.

Industrial fishing nets. Tuna nets. Cargo nets. The nets your uncle uses. The nets that are currently on sale at Harbor Freight. String them between the light poles. Drape them over the alert pads. Cover the jets like you’re keeping them fresh for tomorrow.

It looks ugly. The Generals hate it. It’s not in the doctrine. It ruins the photo op. The jets look like they’re wearing hairnets. The base looks like a fish market. Senators won’t want to visit. The Lockheed lobbyist is confused. Where’s the contract? Where’s the overrun? Where’s the eighteen-month paint job?

The net does not care about photo ops.

When the drone hits the net, it tangles. The motor strains. The motor burns out. The drone hangs there, pathetic, wrapped in twine, defeated by technology from 3000 BC. The jet is safe. The jet doesn’t care if the net is ugly. The jet just wants to not explode.

A missile costs millions. The missile might miss. The missile might hit the wrong thing. The missile has lawyers. Net-based capture devices deployed from helicopters are among the “potential solutions” being evaluated. Being evaluated. Still. Twelve years from now, we’ll have a report about nets. The report will recommend more study.

A net costs five thousand dollars. You can buy it today. You can install it tomorrow. The net works every time. The net does not need a software update. The net does not need a cybersecurity review. The net does not need an environmental impact statement. The net does not care about magnesium smoke. The net does not care about rain or fog or the feelings of defense contractors. The net just works. That’s why we won’t buy it.

The Wile E. Coyote Protocol

The enemy wants the hot jets. He looks for heat signatures. His drone has a thermal camera. It cost $40 on AliExpress. It’s looking for engines. It’s looking for exhaust. It’s looking for the things that cost $100 million each.

So we lie to him. It’s not complicated. It’s not expensive. It’s annoying that no one has thought of it. Someone probably has. They probably wrote a memo. The memo is in a drawer.

Inflatable decoys. Rubber F-35s. The kind we used in World War II. The kind Patton used. Patton is dead. His ideas should not be.

Space heater inside. Fifty dollars at Walmart. Sixty if you want the oscillating kind. The heater creates the signature. The balloon creates the shape. The drone sees a jet. The drone dives. The drone hits a balloon. The balloon pops. Cue: sad trombone.

We hide the real jets in maintenance sheds. Cover them with thermal blankets. The blankets cost $200. They hide $100 million aircraft. The math is good. China has built more than 3,100 aircraft shelters—over 650 hardened and 2,000 non-hardened—to protect its fleet. China. The country we say we’re preparing to fight. They have shelters. We have sunshine. The U.S. has built just 22 new hardened shelters in the Indo-Pacific in the past decade. Twenty-two. China built three thousand. We built twenty-two. But we had meetings about building more. Lots of meetings.

Recent war games show 90% of U.S. aircraft losses would occur from ground strikes rather than air combat. Ninety percent. Not in the air. On the ground. Parked. Sitting. Waiting. We built planes that can defeat any enemy in the sky. Then we parked them where any idiot can blow them up. This is strategy. British SAS Lieutenant Colonel Paddy Mayne in WWII taught the Germans that this lazy act was just plain madness. He alone destroyed three times more enemy planes than the finest RAF pilot. And his boots never left the ground.

The swarm comes. The sensors see heat. They dive. They blow up balloons.

We lose a thousand dollars of rubber. We save a hundred million in heavy metal. The math is simple. A child could do it. A child has done it. The child works for the other side now. He’s doing fine.

Duck Hunt

The laser failed. We covered that. The jammer failed. The enemy changed frequencies. Frequencies are free to change. The jammer cost $5 million. The frequency change cost nothing. The drone is fifty yards out. Closing fast.

Give the guard a shotgun.

Remington 870. Twelve gauge. Number four buckshot. The most produced shotgun in American history. Your grandfather had one. Your grandfather could have defended the air base. Your grandfather is dead. His shotgun is in a closet. It still works.

A shotgun creates a wall of lead. Hundreds of pellets. Spreading. Covering. Forgiving. It does not need perfect aim. It does not need a targeting computer. It does not need a software update. It needs a person who can point and pull.

It shreds plastic rotors. It destroys batteries. It turns a $500 drone into confetti. It turns a threat into a story. “Yeah, I shot it down. With a duck gun. You want to see the YouTube video? My buddy filmed it.”

Ukrainian forces adopted semi-automatic shotguns that “have proven remarkably effective at disrupting Russian UAV operations”. Ukraine. The country we’re sending billions to help. They figured it out. Shotguns. The technology we invented. They’re using it better than we are. They don’t have committees. They have funerals.

Allied nations including France, Italy, and Belgium have deployed different Benelli shotguns with traditional and specialized drone shells; during field tests, these weapons have proven very effective at taking down FPV drones from 80–120 meters away. France. Italy. Belgium. Not known for their military innovation. Leading us. With shotguns. The weapon of bird hunters and home defenders. The weapon the Pentagon forgot existed.

The Benelli M4 Drone Guardian has an effective combat range of 50 meters, with potential maximum range up to 100 meters. Fifty meters. That’s 150 feet. That’s half a football field. That’s plenty. Shotguns are “more effective against drones than regular rifles because of their spreading pattern of multiple projectiles”—damaging one propeller is sufficient to make a quadcopter incapable of flight.

One propeller. One pellet. One shot. Done. And if you have an ATI Bulldog with a ten-round mag of number four buck like I do, then cowabunga. 
At fifty yards, a duck gun is the deadliest anti-drone weapon on earth. At fifty yards, a hundred-year-old technology beats a billion-dollar program. At fifty yards, your granddad beats Raytheon.

We spent a long damn time trying to build something better than a blunderbuss with a carved dragon’s head at the muzzle. We failed. The dragon is fine. The dragon was always fine. We just wanted something more expensive.

The Sanctuary Is Over

The sanctuary was always a lie. A comfortable lie. An expensive lie. A lie we told ourselves while we built systems that don’t work against enemies who impulse-buy online. The ocean protects nothing. Drones don’t need boats. The fence protects nothing. Drones don’t need gates. The guard at the entrance protects nothing. The enemy is not walking in. He’s flying over. While the guard watches the road.

“It’s been one year since Langley had their drone incursion and we don’t have the policies and laws in place to deal with this? That’s not a sense of urgency,” said retired General Glen VanHerck. One year. Seventeen days of drones over the crown jewels of American airpower, and one year later, we have policies being developed. Laws being considered. Meetings being scheduled. The next incursion being planned.

“There’s a perception that this is fortress America: two oceans on the east and west, with friendly nations north and south, and nobody’s gonna attack our homeland. It’s time we move beyond that assumption.”

Time to move beyond. We’ve had time. We’ve had decades. We spent the time building lasers that don’t work in rain and jammers that don’t work when the enemy changes channels and missiles that cost too much to shoot at toys. We spent the time in meetings. We spent the time on PowerPoints. We spent the time assuming the enemy was stupid. The enemy was not stupid. The enemy was shopping.

These bad actors are using cheap hardware and great ideas to defeat a trillion-dollar military. We are drowning in budget but starving for imagination. We need to start thinking like they do and stop being so snobby. We turn our noses up at solutions that don’t cost a billion dollars. We think if it doesn’t have a MIL-SPEC serial number, it’s beneath us. That level of arrogance is a target.

Look at Ukraine. Russia has the money. Russia has the resources. Russia has the “invincible” heavy metal. Yet they are getting dismantled by hobbyists with soldering irons. Ukraine is proving that a consumer drone with a grenade is more effective than a tank with a conscripted crew. They are trading pennies for millions, and they are winning the exchange.
We have a choice.

Keep pretending. Keep buying expensive toys that work great in the desert when no one is shooting back. Keep writing white papers about Next Generation Air Dominance while the current generation sits outside, uncovered, unprotected, waiting for a kid with a Radio Shack drone and a death wish.