Tuesday, 22 December 2015

Operatives for Conflicts.

 
            In the last blog I suggested some of the mechanisms that would be available to an aggressor during a conflict on TS Earth. Many of these would be termed “unconventional warfare” in modern terminology. Unconventional warfare is one of those phrases that is often thrown around but is often rather vague in its definition. The circular US military definition given on Wikipedia certainly does not describe many of the attack techniques described in the previous blog. “UW” is conducted by USSOF and SOF are forces that conduct Unconventional warfare. A more useful definition is that unconventional warfare is warfare that is not conducted by “conventional” military forces. The definition of what is conventional in military circles does change over time, of course.
            The previous example of a conflict between two corporations illustrates several things. The first is that many forms of conflict can be conducted without military action. Even more direct action might be more effectively achieved by native or professional agents operating in a covert or clandestine manner. Many aggressive operations can be non-violent or unconventional in nature. When military action is used it is as a precise application of force, probably involving a small but well equipped and well trained group.
            These modes of action are as applicable to a nation as they are to a corporation. The enemy in this case need not be another nation. It is just as likely to be a domestic or foreign faction, criminal organisation or even a corporation. Many enemies are ideological in the nature of their opposition so manipulation of perception and memetic warfare is at least as important as destruction. For profit-orientated enemies economic warfare may be most decisive. Many battles may be won or lost in the stock market. The final part of the novel “Hardwired” by Walter Jon Williams gives a good example of military action used for stock manipulation to achieve political power over an enemy.
            Operations such as those described in the last blog are likely to require a mixture of specialists and here we will consider some.
 
Data Gathering.
            The foundation of any operation is good information. On TS Earth a lot of information is readily available on the net, the real task being to process it. Intelligence agencies will have hackers and data miners who spend their time attempting to access restricted on-line data. In the movies agency hackers are often “poachers turned gamekeepers”. By 2100 many of these may have been replaced by software and AIs that can be relied upon to be more disciplined and politically reliable.
            Several forms of data collection are of particular note:-
            Although “Spy” satellites are widely used air reconnaissance and surveillance will remain important. In a major war satellites are likely to be destroyed in the first few minutes. The orbit of satellites is also predictable and enemies may tailor their operations to avoid them or time them for when known or suspected satellites are not overhead. The spy planes of 2100 are unmanned and autonomous rather than remotely controlled. They come in a wide variety of forms, some of them the size and shape of birds or smaller. Some use solar power to stay aloft for days. Others fly at very high altitudes and supersonic speeds.
            Ground reconnaissance was a task that in the past was often allocated to Special Forces or similar highly trained units. In 2100 many of these operations are performed by a variety of small flying, crawling and swimming cybershells and swarmbots. Many of these are similar to the myriad machines being used to explore other planets and moons. If human personnel are used they are just one component of a variety of systems being employed. In many instances a deployment of reconbots will be used without any nearby human support.
 
Espionage.
            Clandestine acquisition of information may still require a human element. Most spies are “natives”. They will often be long term members of the organisation of interest. There is little point training someone to pass as a Burmese engineer when it is easier to recruit some actual Burmese engineers. Transhuman Space has the potential for some interesting variations of this theme. A person’s companion AI could be reprogrammed to act as a spy. The wearer may have no idea that their AI is recording and reporting everything they see or hear. A step up from this is the use of a puppet implant or even a cloned or necromorph bioshell (TS 3e p.126). The victim may steal secrets or perform acts of sabotage without their consent or knowledge.
 
Handlers.
            Recruiting and controlling local spies (“assets”)  is the task of an Intelligence Officer, “broker” or “handler”. Possibly by 2100 a certain proportion of this activity can be performed on-line. The nature of these activities will often still require a personal interaction. Handlers need to be well versed in psychology, local languages and customs and a variety of other fields. Good handlers often are persuasive and charismatic individuals. It is likely handlers will be equipped with high level AI companions to assist and advise them, effectively becoming a Human-AI handler team. Handlers may have cosmetic and pheromonal biomods designed to make them more acceptable to assets. 
 
Analysts.
            Data is of little use unless it can be processed into meaningful information. Seemingly unrelated facts can be highly significant if brought together and placed in correct context. In 2100 the massive amounts of data available to Intelligence agencies is processed and correlated by state of the art AI systems. It is possible a small number of human intelligence analysts are still employed to assist the AIs in their interpretations and conclusions.
 
Special Agents.
            Whereas the majority of intelligence agents are natives many agencies may have a small number of “professional” field agents. Many of these are technicians or other specialists in fields such as burglary or safe-cracking. True “Special” agents are a rare breed and are used for covert operations as well as espionage. Only a few special agents on TS Earth are former Special Forces. A good special agent does not appear to be a threat or even worthy of notice. The biomods that many Fourth or Fifth Wave military men have make them too conspicuous and many serving special forces troops will in fact be bioroids that cannot pass as humans. A special agent will often operate without weapons or gadgets so will be well versed in unarmed killing techniques and using everyday objects as weapons (Likely skills/techniques: Lethal strike; Neck snap; Choke; Garrotte). If biomods are present they will be subtle devices such as polykeratin blades, poison sacs and specially tailored gut flora. In Bruce Sterling’s story “Spook” the agent has a schizophrenia-causing toxin in his sinuses and emotional hormones in his sweat. Shaking hands with the agent would cause the victim to become depressed and suicidal within a few hours! Corporations, criminal organisations and security companies will often have their own equivalent to the special agent or troubleshooter. The triad equivalent, for example, would probably be well armed and more inclined to public demonstrations of power rather than covert operations.
 
Raiders.
            When direct action is needed the implement of choice is often a small unit that can make a low-profile infiltration. For most nations this will take the form of Special Operations Forces (SOF). They may be used on their own or in coordination with other system such as an airstrike. Missions are often designed to facilitate other measures such as political, economic or memetic actions. SOF units are numerically quite small but receive a generous allocation of resources and the best equipment and personnel available. A result of this is that many Third Wave militaries may have special forces of Fourth or Fifth Wave level. In many SOF units a large proportion of the enlisted ranks will be specialised bioroids or cybershells and the officers parahumans or biomodded humans. A raid may be conducted entirely by cybershells and the nature of such operations will mean these may be “sterile”, with no distinguishing markings or identifiable serial numbers. Generic or foreign models of cybershell may be used to deliberately mislead an enemy. Cybershell raiders may very well be considered expendable. This means there may be no plan to extract them once their mission is over. After eliminating everyone in their objective they may self-destruct or they may become dormant, ready to ambush reinforcements or hapless explorers.
            Radical factions may have equivalent units to special forces, as may some corporations. Other corporations may hire mercenaries to perform such missions. The increasing number of aquatic communities in 2100 means that most SOF contingents include a unit optimised for underwater operations.
 
Airstrikes.
I use the term “Airstrike” here in the broadest sense, referring also to orbital bombardments and weapons fired from the land or sea. Where the main objective of an operation is destruction of a target the airstrike is generally the preferred means, minimising friendly casualties or compromising evidence. A SOF/raider force might be positioned to mop up after a strike, however. Such attacks are usually delivered by autonomous UCAVs, which often resemble stealthy, reusable cruise missiles. Supersonic ballistic missiles are also utilized. Most nations have a variety of UCAV and missile designs intended for deep strike but because they are used so seldom the size of the “bomber” fleet is often relatively modest. A more detailed discussion of such systems will appear in a future blog.
An obvious attack by a missile or UCAV can sometimes be too overt an act of aggression. The covert reprogramming of a commercial aircraft to crash into a target might be considered by some organizations.
 
Expeditionary Forces.
For more overt and conventional military operations nations will have expeditionary forces designed for rapid deployment outside of a nation’s borders. In many nations they will be derived from Airborne forces and Marines/Naval Infantry. Such forces are often equipped with air-droppable or amphibious armoured vehicles. One of their roles is to support SOF units. SOF operations often involve small, low profile units that can take an objective but cannot hold it. Expeditionary forces can be used to reinforce such operations. In some militaries the expeditionary forces also include light/mechanized infantry and support units intended for longer duration missions, peacekeeping and disaster relief.
For a Fifth Wave nation expeditionary forces will include a large number of cybershells. For airborne operations these are often delivered by glide bomb. Obviously such technology can be combined with the bomb-dropping UCAVs described earlier under airstrikes.
 
Security and Homeland Defence.
As can be seen from the above passages, a nation or other organization on TS Earth faces a variety of threats. The defence of a nation falls to a variety of forces. Smart artillery and air defences can make large scale attacks a very costly proposition. These will be supplemented by mobile forces in the form of airmobile and armoured brigades supported by close-support UCAVs. The analyst AIs of the intelligence agencies will also direct investigative and counter-espionage forces against possible espionage and covert actions. Specialist military, police or government units handle missions such as bomb disposal, hostage rescue and counter-terrorism. The result of this is significant proportion of many militaries will be structured for internal security duties as a defence against enemy small unit raiding and sabotage operations. Such forces include “light” infantry but also a wide assortment of specialised patrol cybershells ranging from UAVs to sniffer swarms. Security system specialists will become an important element of TS military and private organizations.
            Many of the above types of operative in some form or another will also be encountered in non-nation organisations such as corporations. Roles such as security may be contracted to other organisations. A corporation may not have military assets but it will probably know where to hire some when it needs them. Such interactions will doubtless fall to the corporation’s equivalent of a handler.
 
 

Confliction on the Earth of Transhuman Space.


            With a population of 11 thousand million the TS Earth will be no stranger to competition and conflict. The actual nature of such conflicts may, however, be very different to what we might expect.
            For an illustration of a possible conflict in Transhuman Space let us consider two hypothetical corporations that are in dispute. Corporation A has a considerable investment in fish farming. Corporation B is well on the way to marketing a cloned fish flesh product -a “fauxfish”. It is in the best interests of Corporation A that Corporation B’s program fails.
            Most of the conflict between the corporations will be non-violent. Wars are often won or lost in the minds of the combatants. Much of this conflict will take the form of memetic operations. Corporation A secretly initiates or encourages a “Campaign for Real Food” movement. Celebrity chefs wax lyrical on the superiority of real fish. Pop idols and Actresses often mention the topic in interviews and so on.
            Various infowar and cyber-attack techniques are applied against B. Important shipments of supplies for the research centre are often redirected. Embarrassing information about key researchers and executives may be made public, destabilising and disrupting the corporation structure.
            These measures may be the limit of hostilities but for purposes of this illustration we will consider A opting for more direct action. A has a virus with a modified DNA sequence. If this virus is introduced to a fauxfish culture it will cause the cells to manufacture unpleasant tasting compounds. It will also cause fauxfish to exhibit rodent antigens, giving a false positive result to tests for the fish being contaminated with rat meat. The future, well timed revelation that “fauxfish contains rat” is hoped to cause a fall in Corporation B’s stock that A can exploit.
            How to bring the virus and the fauxfish together? One method might be to use the virus to contaminate something that was used to grow the fauxfish, If the production process used sterile glucose solution, for example, a batch of this could be contaminated with the virus. The glucose is probably produced by a supplier so the contamination could be performed well away from the security of Corporation B or even while the order was in transit.
            The second method is to have someone at the research lab introduce the virus to the fauxfish culture. Most espionage and covert actions are performed by “natives”, in this case an existing employee at the research centre. There are numerous ways to recruit a “native” including but not limited to blackmail and bribery. Corporation A’s data-miners will have been scrutinizing databanks for likely candidates. The asset may not have to contaminate the culture directly. Possibly a robot system at the lab could be clandestinely programmed to do the task.
            If an asset already working at the research centre cannot be found a job opening might have to be created. A member of the staff might be hit by a car. The health of a relative might be caused to deteriorate, causing a staff member to take time off and a replacement to be needed. In the absence of a turned asset a professional agent will have to be introduced to deliver the virus. This can either be done by impersonation or a clandestine break-in, although both methods pose problems.
            Corporation A may be tempted to use even more direct methods than clandestine sabotage. Military actions between Corporations are not going to involve armoured columns clashing in a field. The likely action will be a raid against B’s research centre to destroy materials and seize information. This will be a covert operation since it is in A’s interests that it is not implicated. Ideally a proxy or patsy group can be found. Perhaps some radical religious group that opposes cloning can be induced to make the attack if provided with information, supplies and encouragement. Failing this, mercenaries or criminals can be hired anonymously, perhaps with a false identity as a radical group created on the web. For additional security A may use its own security personnel to conduct the raid as a false flag operation.
            Our illustration has described a conflict between two commercial groups but similar techniques can be used by conflicting nations or between a government and an opposing faction.
            In the next post I will look at some of the “tools” that can be used in the above operations.

Genesis


            And so it begins...

            For the last few months I have been amusing myself dipping into the GURPs sourcebooks for their Transhuman Space worlds. This got me thinking about many of the aspects of the world that they describe. A number of technologies similar to those that they describe are likely to exist in real life within in a few decades so Transhuman Space (TS) is worth reading even if you do not play GURPs or a similar system.
            Very soon I had jotted down a collection of notes and ideas sufficient to create my own TS sourcebook. Publishing these ideas and essays as a blog seemed to be the best option since it gives me the option of easily updating sections in need of revision.