
1

Ways To Detect & Baffle Them:
Lures: Feed every member of your cell something utterly false, sensational, and highly dangerous to the cause. If you begin to catch heat specific to that information, you're working with the enemy.
*Protip: On 2 separate occasions, 2 different CIs asked me if I had ever consumed a human before. Seriously... Weird shit. I told them no, but I'd taste the blood of a slain enemy. (for the lulz) Soon enough I was seeing a license plate 'Y8FLESH'. Snitches be marked.
Live Bait: If you suspect a recruit or member of being one of the higher caliber moles, you will want to use live bait. This means you will give him knowledge of one of your sources, and if that source disappears, you know who the enemy is. You lose a source, but you lose a dangerous adversary as well.
Agents-Provocateurs: If you suspect a member of being an AP, insist they perform their suggestion themselves, first. If they won't, they're cowards or enemies. Either useless, or worse. Get rid of them.
*Protip: Espionage is a game for foxes, not wolves. The more of what you know that you can keep under wraps, the larger advantage you hold over an enemy who openly shows his hand. Show them something to totally throw them off their course. Entice them with juicy but false possibilities for prosecution, and always, always remember that that is their goal.
Maintain your discipline. The CGCI system is the 500lb gorilla. You can't stop playing with it when you get tired, you have to wait until it gets tired. Which requires quite a bit of know-how and derring-do.
////////////////////////////////////////////////////////////////////////////
Appâts : Donnez à chaque membre de votre cellule quelque chose de totalement faux, sensationnel et extrêmement dangereux pour la cause. Si vous commencez à attirer l'attention spécifiquement sur ces informations, vous travaillez avec l'ennemi.
*Conseil : À deux occasions distinctes, deux indicateurs coopérants m'ont demandé si j'avais déjà consommé un être humain. Sérieusement... Des trucs bizarres. Je leur ai dit non, mais que je goûterais le sang d'un ennemi abattu. (pour le lol) Rapidement, j'ai vu une plaque d'immatriculation 'Y8FLESH'. Les mouchards sont repérés.
Appât Vivant : Si vous soupçonnez un recrue ou un membre d'être l'un des taupes de haut calibre, vous voudrez utiliser un appât vivant. Cela signifie que vous lui donnerez connaissance de l'une de vos sources, et si cette source disparaît, vous saurez qui est l'ennemi. Vous perdez une source, mais vous perdez aussi un adversaire dangereux.
Agents Provocateurs : Si vous soupçonnez un membre d'être un agent provocateur, insistez pour qu'ils réalisent d'abord leur suggestion eux-mêmes. S'ils refusent, ce sont des lâches ou des ennemis. Soit inutiles, soit pires. Débarrassez-vous d'eux.
*Conseil : L'espionnage est un jeu pour les renards, pas pour les loups. Plus vous gardez sous silence ce que vous savez, plus vous avez un avantage sur un ennemi qui montre ouvertement ses cartes. Montrez-leur quelque chose pour les dérouter complètement. Attirez-les avec des possibilités juteuses mais fausses de poursuites, et n'oubliez jamais que c'est leur objectif.
Maintenez votre discipline. Le système CGCI est le gorille de 500 livres. Vous ne pouvez pas arrêter de jouer avec quand vous êtes fatigué, vous devez attendre qu'il se fatigue. Ce qui demande beaucoup de savoir-faire et d'audace.
////////////////////////////////////////////////////////////////////////////
Приманки: Предоставьте каждому члену вашей ячейки что-то абсолютно ложное, сенсационное и чрезвычайно опасное для дела. Если вы начинаете акцентировать внимание именно на этих сведениях, вы работаете на стороне врага.
*Совет: В двух различных случаях два сотрудника-подрывника спрашивали меня, попробовал ли я когда-либо человеческое мясо. Серьезно... Довольно странные штуки. Я сказал им нет, но что попробую кровь убитого врага. (просто для смеха) Быстро увидел номер 'Y8FLESH' на автомобильной номерной знаке. Шпионы обнаружены.
Живая Приманка: Если вы подозреваете, что новичок или член вашей ячейки может быть высококлассным кротом, вам следует использовать живую приманку. Это означает, что вы ознакомите его с одним из ваших источников, и если этот источник исчезнет, вы узнаете, кто враг. Вы потеряете один источник, но также избавитесь от опасного противника.
Провокационные Агенты: Если вы подозреваете, что кто-то из членов вашей ячейки является провокационным агентом, настаивайте, чтобы они сначала реализовали свое предложение сами. Если они откажут, они либо трусы, либо враги. Или бесполезны, или хуже. Избавьтесь от них.
*Совет: Шпионаж - это игра для лис, а не для волков. Чем больше вы держите в тайне то, что знаете, тем больше преимущества у вас перед врагом, который открыто показывает свои карты. Покажите им что-то, чтобы полностью их сбить с толку. Привлекайте их ложными, но манящими возможностями для погони, и никогда не забывайте, что это их цель.
Сохраняйте дисциплину. Система CGCI - это 500-фунтовый горилла. Вы не можете прекратить играть, когда устаете, вам нужно ждать, пока он устанет. Это требует много мастерства и смелости.
#GlobalInsurrection
#RiotManagement
#1oejpo #GlobalUnrest
#InsurrectionAlert
#GlobalRevolt
#RiotControl
#GlobalUprising
#InsurrectionManagement
#RiotResponse
#globaldisorder
Military mimicry: the art of concealment, deception, and imitation
Three dominant thematics emerge from the biological mimicry and camouflage literature, namely, concealment, deception, and imitation. These phenomena are interesting in their own right, but conceptually have similar analogs in the military context that have attracted only minimal intellectual curiosity. Accordingly, the purpose of this paper is to apply biological mimicry and camouflage concepts to the military environment. Concealment in the form of camouflage is traced from its nineteenth century origins to the military's imminent twenty-first century perfection of an “invisibility cloak”. Military deception is the art of duping enemies with fakes and dummies. Finally, imitation is examined from three perspectives: firstly, replacement of military personnel with animals; secondly, exploration of bioengineering, including exploitation of avian aerodynamics, insect biophysical structures, and mammal sonar attributes; and, thirdly, Artificial Intelligence that is driving military mimicry along an evolutionary path towards robots, swarms, and avatars in an emerging and novel military technology revolution.
Introduction
The focus of this paper is on mimicry. It is a concept that has attracted substantial academic enquiry in the biological world, leading to a wealth of scholarship. Examination of the fascinating biomimicry processes provides the taxonomy for this study on the applied subject of military mimicry. There are, we posit, three elements to military mimicry: firstly, concealment – normally reflected through camouflage to conceal military assets; secondly, deception – reflecting the evolution of “dummy” military assets, often to encourage the enemy to attack, reveal their positions, and quickly be destroyed as a consequence; and, thirdly, imitation. The final element in this taxonomy is the most complex, as it can be decomposed into three further subfields of analysis. To begin, there is animal imitation of military tasks, such as WWI pigeons replacing the role of military runners. In reverse, there is also military emulation of animal performance through bioengineering, including the adaption of cockroaches and ants for military purposes. Finally, as armed forces become immersed in Artificial Intelligence (AI) and robotics, there is the unfolding phenomenon of these technologies, including swarms, avatars, neuroscience, and genomics, mimicking military forces and assets in the pursuit of twenty-first Century warfare. These three imitative pathways are illustrated in Figure 1, below.
https://uploads.disquscdn.com/images/b61e4222865b1cc75f81d9f9a493e82bf31798c63dd8f9743600e88d0187b390.png
Structurally, the paper begins with the identification, explanation, and analysis of the role of mimicry and camouflage in the natural world. The remainder of the paper concentrates on a critical discourse of military mimicry as per concealment, deception, and the three imitative pathways depicted in Figure 1. The third pathway of military mimicry is novel, reflecting the world’s rapid transition to a higher technological stage in what is often termed the Revolution in Military Affairs (RMA). The principal change driver is AI. Thus, whilst the use of animals in military settings will not disappear, their involvement will diminish, to be replaced by robotics and software-intensive systems that will herald dramatic transformational change in the nature of war. The paper closes by offering conclusions on mimicry’s contribution to the conduct of war. The imperative here is to achieve the elusive trifecta of strategic benefits, namely optimisation of cost-effective military capability, reduction in systems complexity and minimisation of manned-asset attrition and military casualties.
Mimicry’s roots in the natural world
Biological mimicry
The term mimicry derives from the Greek word “mimesis”,Footnote1 defined by Aristotle as the perfection and imitation of nature.Footnote2 This paper treats mimesis and mimicry as synonymous, and henceforth only the latter term will be employed. Mimicry has a long history in the field of biology.Footnote3 Biological mimicry can broadly be defined as the evolved resemblance between an organism and a given object. More specifically, it involves one or more species undertaking three different roles: the model, the mimic itself, and the receiver/dupe (the species that is deceived by the mimic’s signals).Footnote4 The model on which the mimic bases itself can be a living organism (e.g. a poisonous species with a clear warning colouration) or, according to some definitions, an inorganic object (e.g. stones), although other authors consider the latter to represent a distinct concept.Footnote5 The same species can be the model, mimic, and receiver (and any combination), and mimicry evolves if the receiver perceives the resemblance between model and mimic and changes its behaviour accordingly, thus providing a selective advantage to the mimic.
Whilst some authors contend that biological mimicry must involve some sort of deception (hence the use of the term dupe), others have argued that the receiver need not suffer a cost of failing to distinguish between the mimic and the model, and indeed can even benefit from the process (i.e. mutualistic mimicry).Footnote6 It is also worth noting that the mimic is not necessarily mimicking the model itself, but rather the receiver’s perception of the model, and because of this, in addition to other reasons, imperfect mimicry is a common occurrence in nature. The perception of the receiver is in fact central to the presence of biological mimicry, as if a receiver does not perceive the similarity between mimic and model in relation to a particular signal (e.g. a chemical cue), the signal is not said to be mimetic.
Mimicry has evolved across a broad range of taxonomic groups, including vertebrates, invertebrates, fungi, and plants;Footnote7 and can involve a number of different signals, individually or in combination, including visual, acoustic, tactile, chemical, and possibly even electrical signals.Footnote8 Based on these different signals, and on the different contexts in which mimicry occurs – including for protective purposes (e.g. where the mimic is potential prey), reproduction, competition, or aggression (e.g. where the mimic is a predator) – there are many different types of biological mimicry. These types include: Batesian mimicry – where members of a potential prey species gain protection from predation by mimicking the defensive and warning (i.e. aposematic) signalling of an unpalatable or defended species (a “sheep in wolf’s clothing”); Emsleyan mimicry – whereby a lethal mimic resembles a less deadly (but lesson-teaching) model; Dodsonian mimicry – whereby a given flower species mimics the signals of other flower species to attract pollinators; and Kirbyan mimicry – where a parasite mimics its own host (e.g. brood parasitism).Footnote9
Spectacular examples of these different types of biological mimicry abound. For example, the African swallowtail butterfly (Papilio dardanus) mimics different model species (e.g. species of unpalatable butterflies) in different parts of its range.Footnote10 There is additionally the case of the green, star-shaped flowers of an obscure South African plant Ceropegia gerrardii producing a fluid and scent that mimic the smell of honeybee blood, spilt after being killed by spiders and praying mantises. The purpose of this subterfuge being to entice Jackal flies, which feed on the blood of the bees, to pollinate the C. gerrardii flowers.Footnote11
Camouflage
While camouflage is often discussed in the context of natural mimicry, certain authors consider it to be a distinct phenomenon; that is, mimicry involves replication of certain signals of other organisms and incorporates both a behavioural change from the receiver and a demographic/evolutionary change in the model, whilst camouflage simply relates to a blending-in with the background environment. Either way, camouflage offers the means for concealment through environmental adaption. Indeed, while Charles Darwin did not use the term directly, he viewed camouflage in the animal kingdom as representing evidence of evolutionary adaptation. In his 1859 seminal work, On the Origin of Species, Darwin noted: “When we see leaf-eating insects green, and bark-feeders mottled-grey; the alpine ptarmigan white in winter, the red-grouse the colour of heather, and the black-grouse that of peaty earth, we must believe that these tints are of service to these birds and insects in preserving them from danger.”Footnote12 Thus, in a zoological context, camouflage can be defined as the suite of adaptations, including body colour, patterning and a range of other morphological adaptations that reduce the probability a given animal is detected or recognised by another.Footnote13 This typically occurs by increasing the resemblance between the organism and the background environment (protection through concealment) or, at least according to certain authors, inanimate objects (i.e. masquerade; that is, protection through misidentification).Footnote14
As with mimicry, there are many striking examples of camouflage in the natural world. For example, some species of chameleon, fish and octopus are capable of changing their skin colours and patterns according to the surrounding environment for purposes of concealment, or to signal, or to attract partners.Footnote15 Indeed, Peter Forbes describes octopuses – rather than the chameleon – as the archetypal camouflaged animal, representing a “living, breathing, swimming compendium of every camouflage and mimicry technique known.”Footnote16 Moreover, even plants engage in camouflage to avoid being eaten by herbivores, including humans.Footnote17 For example, a recent study found that a species of alpine plant (Fritillaria delavayi), commonly harvested by humans for use in traditional Chinese medicine, has evolved to match the colouration of its leaf with the background environment; the degree of background matching being related to the amount of harvest pressure.Footnote18
Military mimicry
Three dominant thematics emerge from the above review of the biological mimicry and camouflage literature, namely, concealment, deception, and imitation. These phenomena are interesting in their own right, but conceptually have similar analogs in the military context; which, as yet, have attracted only minimal intellectual curiosity. The derived analytical framework employed in this paper was first adopted in 2003 by Christopher Flaherty, who argued that mimicry in the natural world “may represent an increasingly cost-effective way of achieving a desired [military] operational effect … to exploit concealment, deception and imitation techniques.”Footnote19 Military mimicry is hence relevant to endeavours aimed at hiding, misrepresenting, copying, and improving military capability. While animalsFootnote20 have played a pivotal historical role; either in replacing military personnel and/or offering opportunities for copying nature’s enhanced performance characteristics, other technological dynamics are now evolving.
Concealment through camouflage
Following the explanatory framework for biological mimicry and camouflage outlined above, the first form of military mimicry to be considered is concealment. It has a long and illustrious history of innovation, with its origins rooted in the transformation of nineteenth century uniforms in European land battles. Counter-intuitively, the Prussian troops at the 1815 Battle of Waterloo were dressed in brightly coloured uniforms. Yet, there was a logic to the gaudy colours. In an age of close combat, ready identification of “friend and foe” was the paramount military objective, and easily identifiable uniforms represented the basis for recognition and coherence during the fog of battle. The advent of longer-range infantry rifles dramatically changed battle tactics. As a consequence, effective concealment principally through camouflage became a priority. Repeating rifles required soldiers to become less obvious targets, and British Regiments, mimicking their animal counterparts, adopted rifle green to become less conspicuous against the natural habitat backdrop.Footnote21 Similarly, in 1848, the British Corps of Guides in India adopted so-called “drab” uniforms – invisible in a land of dust – by using a local dye to transform the natural dark colour into Khaki (Urdu for dusty, soil-colored).Footnote22
Although camouflage was used in the nineteenth century, the term did not formally enter the military lexicon until WWI, when the French used it to describe the application of colours and materials to uniforms to conceal military personnel from enemy observation.Footnote23 Avoidance of detection not only applied to uniforms but also to military assets, specifically to make platforms, such as vehicles, warships and aircraft, “disappear”. Long-range observation, often by spotter aircraft, facilitated accurate artillery assault, and this inevitably led to the wide-scale adoption of camouflage. In fact, the French military recruited artists as camouflage officers, who were influenced by the concept of counter-shading; that is, the art of merging objects into background environmental contexts.Footnote24 The industrial scale of camouflage activities during the war can be illustrated by France’s 1915 establishment of a section de Camouflage at Amiens,Footnote25 and just three years later, there was a command of camouflage workshops employing in excess of 9,000 workers, not counting the camoufleurs working at the front.Footnote26 The British military also had a camouflage capability, which, by the war’s end, had reportedly painted more than 2,300 vessels.Footnote27 Art and nature had seemingly come together in the service of warfare.
The arrival of WWII confirmed the importance of camouflage, with the conflict spurring sophisticated forms of scale invariance, typically digital patterns comprising pixels, designed to disrupt platform invariance and silhouettes at a distance. “Olfactory” camouflage also emerged through, for example, sniper garments made from strips of Hessian cloth treated with mud or even manure to hide a sniper’s human odour.Footnote28 The use of camouflage in WWII was not confined to the European theatre, but also played an important role in the North African campaign. Of significance here is Hugh Cott’s celebrated 1940 work on animal-related camouflage, Adaptive Coloration in Animals,Footnote29 which has been described as “the only compendious zoology tract ever to be packed in a soldier's kitbag”.Footnote30 Cott later led the camoufleurs working for the British Eighth Army in Egypt, where concealment via camouflage was used to great effect.Footnote31
The twenty-first century witnessed further camouflage developments, albeit that effective design in different operational contexts remained elusive. For example, for nearly a decade, U.S. military engagement in Afghanistan suffered from a case of the “emperor’s new clothes”: from the initial invasion in 2001 until about 2009, many U.S. Army soldiers were deployed wearing a protective camouflage pattern so ineffective that it actually seemed to attract enemy fire.Footnote32 Since then, dramatic changes have been introduced to improve camouflage effectiveness. The principal focus of these innovations has been to develop active or adaptive technologies that will adapt rapidly to the surrounding environment, seeking concealment from visual detection. “Active” camouflage is derived from land-based animals, including many reptiles, but more importantly from cephalopod molluscs, such as cuttlefish, octopuses, and squids; these being able, from chromatophore organs, or tiny pigment sacks inside their skin, to change texture, pattern, and colour in milliseconds in response to new backdrops.Footnote33 U.S. researchers are working with the military to isolate pigment granules from these organs, better to understand their role in colour change, especially when incorporated into the military camouflage textiles. Whilst the science behind this innovation – biomimetics, nanotechnology, and genetic modification – is futuristic, the expectation is that it will become operational in 5–10 years.Footnote34
The National Geographic publication states that no man-made technology comes close to matching the transforming talents of the cephalopods, which have proved the inspiration for U.S. university researchers to develop military vehicle optoelectronic camouflage sheets capable of reading the environment and mimicking their surroundings.Footnote35 The technology can be enhanced to operate in full colour spectrum, having a flexible skin, composed of extremely thin layers of semi-conductor actuators, switching components and light sensors, with inorganic reflectors and organic colour-changing materials that combine to allow the sheet to autonomously colour-match its background.Footnote36 Similarly, South Korean researchers have created a robot capable of changing its colour; just like a chameleon, by using heated nanowires and thermocromic materials.Footnote37 Active military camouflage has also been tested using organic light-emitting diodes (OLEDs), allowing images to be projected onto irregularly shaped surfaces.Footnote38 There has also been military-related research on computational holography, but perhaps the most sophisticated technology is the focus on developing Quantum Stealth Light Bending Material, possessing more than a passing semblance to Harry Potter’s “Invisibility Cloak”; it not only hides a military target in the visible spectrum, but also “bends” in the ultraviolet, infrared, and shortwave infrared, thus blocking the thermal spectrum, and translating into a true broadband Invisibility Cloak.Footnote39 Indeed, fiction will shortly become fact, given early 2024 reports that Putin’s forces will soon be equipped with a new invisibility cloak that will hide them from heat-detecting lens.Footnote40 Military efforts designed to hide assets have similarly been applied to aerial systems, whereby the introduction of heat-seeking missiles has led to innovations designed to conceal the emission of hot exhaust gases from aircraft engines.Footnote41
To deceive, “as old as War itself”
The second principal form of military mimicry is deception, defined as “actions executed to mislead opponent decision makers into taking specific actions or lack of action that contributes to the success of one’s own efforts.”Footnote42 Deception in military conflict invariably translates into the deployment of fakes and dummies.Footnote43 In WWII, Operation Bertram played a decisive part in the British victory over Germany’s Field-Marshal Rommel in the battle of El Alamein, North Africa, where, in addition to camouflage, deceptive mimicry was employed through the creation of large-scale decoys, including a dummy railhead.Footnote44 The fake assets consisted of large numbers of realistic dummy tanks and artillery made from local calico and palm frond hurdles, and supported by electromagnetic deceptions that laid a trail of false radio traffic, convincing Rommel that the British had an additional armoured division in reserve.Footnote45
In the Vietnam War, the U.S. Air Force pursued a novel form of deception in response to North Vietnamese fighter successes in shooting down heavily laden and slow-moving U.S. F-105 bombers.Footnote46 U.S. Air Force pilot, Robin Olds, devised a deceptive mimicry mission called Operation Bolo. The plan was to deceive the North Vietnamese by locating F-105 Electronic Counter-measure pods on F-4 Phantom fighters, so that they would display the F-105 signature on the enemy’s radar systems, with the deception reinforced by using the same call signs, flight paths and timings as the F-105 bombers.Footnote47 In the resulting dogfight, Old’s “wolf-pack” was credited with seven confirmed Mig-21 kills, and a further two probable kills, representing the destruction of more than half North Vietnam’s combat aircraft inventory, against zero U.S. losses.Footnote48
In the twenty-first Century, high technology has continued to play an important role in military deception. The proliferation of radar and sonar systems, for example, has reduced dependence on the human eye for detection of military assets, auguring the use of stealth technology. Combat aircraft and warships are now configured to deflect radar impulses, with radar-absorbing materials applied to reduce radar signatures. For instance, the U.S. Miniature Air-Launched Decoy, or MALD system, is a low-cost, expendable, air-launched craft that acts to deceive the most advanced enemy integrated air defence systems.Footnote49 It does this by copying the combat flight profiles and signatures of U.S. and allied aircraft, while keeping pilots and aircraft out of harm’s way.Footnote50 The MALD employs a Signature Augmentation Subsystem (SAS) that leverages active radar enhancers across a range of frequencies to fool defensive radar systems into mistaking the missile-shaped MALD for jets, ranging from stealthy F-117 Nighthawks to massive B-52 payload-ferrying bombers.Footnote51 Among the first American assets to enter enemy airspace, these MALD jamming decoys will be deployed into a contested area alongside cruise missiles and aircraft, forcing enemy air defence systems to differentiate between real and fictional radar returns; the difficulties being compounded by the stream of static delivered by MALD’s jamming capabilities.Footnote52 Launching interceptors at a swarm of real and simulated radar returns would leave enemy systems vulnerable to attack from anti-radiation missiles, such as the AGM-88/AARGM-ER on the F-35s, while simultaneously depleting the enemy’s surface-to-air missile stores.Footnote53
While the present Russia-Ukraine war does not reflect this degree of technical sophistication, deception nevertheless features in land operations. Ukraine’s use of dummy assets probably accounts for the discrepancy between Russian and Ukrainian estimates regarding the destruction of the latter’s HIMAR Rocket Launcher units, with one U.S. diplomat arguing that Moscow has “claimed to have hit more HIMARS than we have … [supplied]”.Footnote54 The Ukrainians are reportedly even replacing traditional heavy wooden dummies of tanks and artillery pieces with inflatable versions, which are cheaper and faster to deploy.Footnote55 Moreover, to make the inflatable military equipment more realistic, Ukrainian forces are simulating tank tracks and comms traffic, and using valid radar signals and reflectors to simulate the heat emitted from gunfire to fool thermal imaging cameras on drones, and invite Russian attacks that lead to inevitable Ukrainian responses.Footnote56
Military imitation
The third form of military mimicry is imitation, representing the act of copying and effecting the resemblance of another object.Footnote57 As such, imitation represents the principal focus of the remainder of this paper, with attention directed, as illustrated in Figure 1, towards three forms of imitation: firstly, deployment of animals in military roles; secondly, military mimicry of animals; and thirdly, AI mimicry of the military.
Animals deployed to mimic the military
Here, the focus is on the use of animals to mimic military roles. For instance, during WWI, pigeons were used instead of runners to facilitate communications, even receiving battlefield honours for their bravery.Footnote58 In WWII, dogs were used to reinforce the security of military camps and coastlines, with the U.S. providing an interesting case study on the use of dogs in war. After the Japanese attack on Pearl Harbour in December 1941, “Dogs for Defense” was formed to train dogs to patrol U.S. borders, beaches, and industrial facilities, as well as to perform sentry duty, in order to prevent sabotage; reportedly, by war-end, the Quartermasters Corps had assigned 3,174 dogs to the U.S. Coast Guard alone.Footnote59 War dogs were also trained to “sniff-out” Japanese and German soldiers in the respective Asia-Pacific and European campaigns, proving effective at ranges up to 1,000 yards, and saving many lives from possible ambush.Footnote60
From the 1950s, the U.S. military switched its focus to exploiting the strategic capabilities of mammals, to complement, if not supplant, the role of naval personnel. The Naval Marine Mammal Program (NMMP) has studied a variety of animals, such as seals, killer whales (Orcinus orcann), dolphins, sea lions, and beluga whales (Delphinapterus leucas).Footnote61 After testing the military suitability of 19 species of marine mammals, including sharks, the navy selected sea lions for operational duty due to their impeccable underwater vision; and in 2003, they were deployed to Bahrain to support Operation Enduring Freedom following the September 11 attacks.Footnote62 Dolphins also attracted attention, but more for their highly-evolved bio-sonar capability, making them especially suited for detecting underwater mines.Footnote63 Dolphins continue to serve, and replace navy divers. Prior to mission-deployment they must undergo a rigorous training process, lasting several years for assigned military functions; the latter comprising several Marine Mammal Systems that include detecting and/or marking the locations of sea mines attached to, or buried in, the ocean floor, identifying safe areas in shallow waters, detecting and marking the location of swimmers, or divers, that might be a threat to ships at anchor or piers, and allowing safe paths for troops and equipment to pass.Footnote64 To track a dolphin underwater, a “pinger” device is attached to its pectoral fin, and if it detects an enemy asset, it will either attack or surface, to alert handlers who are monitoring events in small boats.Footnote65
The U.S. Navy has deployed dolphins in war zones, including five dolphins to protect sailors in Cam Ranh Bay during the Vietnam War, six to escort Kuwaiti oil tankers through the Persian Gulf in the late 1980s, and nine to clear Iraq’s Umm Qasr harbour in March 2003.Footnote66 Reportedly, in the first month after arriving in Iraq, the dolphin teams achieved an impressive number of operational successes, including unofficial clearance of 913 nautical miles of water, investigation of 237 objects, and recovery and/or destruction of over 100 mines in the Umm Qasr port and the Khawr Abdullah waterway linking the port to the Gulf.Footnote67 Dolphins possess numerous military benefits, including flexibility and versatility. This is reflected in their capability to deep dive without fear of debilitating decompression sickness, the possession of biological echolocation sonar to detect and mark underwater mines, a readiness level of deployment via C-17 cargo aircraft to anywhere in the world within 72 hours, and their ability to presently guard one quarter of U.S. nuclear submarines bases.Footnote68
Not wanting to be left behind in what had become an animal (mimicry) Cold War arms race, the Soviet Navy in 1965 created a research facility at Kazachya Bukta, near Sevastopol, to explore the military uses of marine mammals.Footnote69 The facility experienced a checkered history: inherited by the Ukrainian Navy after the Soviet Union imploded, it then suffered a period of neglect, symbolised by the transfer of all its dolphins to Iran in 2000, with the facility reinvigorated by Ukraine in 2012, only to return to Russian control in March 2014 after Moscow annexed Ukraine’s Crimea region.Footnote70 Russia seemingly still views dolphins as part of its military capability, with reports indicating it spent US$18,000 in 2016 acquiring five bottlenose dolphins, which were then subsequently trained to plant explosives on enemy vessels and to detect abandoned torpedoes and sunken ships in the Black sea.Footnote71 In 2017, Russia’s military mammal conscripts also reportedly included beluga whales; indeed, one of them was captured by the Norwegian navy in 2019, wearing a harness (stamped “Equipment of St. Petersburg”) that was capable of housing a camera.Footnote72 In May 2023, the same Russian beluga “spy” whale was spotted off Sweden’s coastline, apparently in search of a mate.Footnote73 The Swedes have an historical nervousness over Russian incursions into their waters, which began with the grounding of a Russian submarine in 1981, not far from the Swedish coastline.Footnote74 In 1995, at the height of the Cold War, underwater sounds were detected, but according to the then Swedish Prime Minister Ingvar Carlsson, they were soon discovered to be emitted by minks (semi-aquatic mammals).Footnote75 Then in 1996, what were initially thought to be bubbles generated by Russian submarine propellers were eventually identified as herring flatulence.Footnote76
Nevertheless, the actuality of underwater noises has led the U.S. military to investigate whether fish and other sea-life are effective in detecting enemy activity in the oceans through the monitoring of audible or visible reactions to sound, optical, electromagnetic, and chemical shifts in water by schools of sea bass, or microbes, when responding to magnetic signatures emitted by submarines.Footnote77 The military has experience of experimenting with military mammal-messaging, as was illustrated in 1974 when coded signals disguised as pilot whale sounds were sent between the submarine USS Dolphin and a surface ship.Footnote78 Recent advances in computing suggest that concealing or hiding covert messages in marine mammal sounds has reached a higher level of competence. The 2018 U.S. Persistent Aquatic Living Sensors (PALS) programme received US$45mn to fund research aimed at exploring the innate and ubiquitous marine animal sensing capabilities in the oceans for identifying and tracking adversary assets.Footnote79 Additionally, the U.S. Defense Advanced Research Projects Agency (DARPA)reported in 2024 that it had developed an unmanned monster manta ray spy drone capable of long-endurance lingering on the seabed for intelligence gathering.Footnote80 DARPA is also investigating whether sea-life, such as bioluminescent plankton and goliath groupers (Epinephelus itajara) can serve as components of underwater surveillance systems, capable of detecting enemy oceangoing drones, large nuclear submarines and other underwater vehicles.Footnote81 The programme comprises five research teams focused on different sound medium, including “booms” emitted by the 8 foot, 800 lb, territorial goliath groupers in the face of potential underwater drones, or submarines.Footnote82 Research is also directed towards the natural sonar from the 200-decibel sonar “pops” of snapping shrimps, striking even the quietest enemy platforms and bouncing back to sensors to alert their presence.Footnote83 Geopolitical rivalry ensures that Washington is not alone in researching the benefits of marine animal sounds to both disguise military communications and create covert sonar systems. Chinese efforts, for instance, have gone beyond using recordings of whale and dolphin songs as secret code, unnoticed by enemy eavesdroppers, to using artificial signal synthesis to create whale and dolphin sounds.Footnote84 The 1972 Marine Mammal Protection Act seeks to regulate noises that humans can generate in the oceans, and NATO also has standards for underwater sounds, but as with other environmental legislation, China benefits from non-compliance.Footnote85
Bioengineering: military mimicry of animals
In parallel with animals being used in military roles, a phenomenon has emerged of the military mimicking animals. This approach accords with the concept of “biomimicry”, discussed in the opening pages of this paper, but in the context of military mimicry it is often referred to as biologically inspired engineering.Footnote86 The origins of bioengineering can be traced back to the 1480s, when Leonardo da Vinci developed the “Ornithopter” by mimicking the flight of birds.Footnote87 Avian biomimicry has continued into the modern era. Since 2013, the U.S. military has demonstrated a keen interest in the potential of mimicking avian flight in the development of unmanned vehicles. A US$2mn budget was allocated to investigate locomotive strategies for drones, especially “flapping-wing” technology, which is more efficient and wind-tolerant than inert wings, flies with greater agility, and can stop mid-flight to hover, observe or monitor; combined, these features enable drones to better navigate rugged and unpredictable environments.Footnote88 Specialist biomechanical research has also been conducted on how the dragonfly, with four powerful wings flapping independently, can maintain effective control of its wingbeat, enabling it to hover and strike with lightning speed, fly vast distances carrying small cargoes, such as medicine, and remain stable in high winds.Footnote89 Separately, Japanese researchers have sought to develop an ornithopter; that is, a full scale bird-like flapping-wing micro aerial vehicle (MAV), shaped and patterned after a typical pigeon and capable of avian maneuvers, such as rapid takeoff, hover, and gliding.Footnote90
There are broader biomimicry opportunities, with the military recognising that animals display superior performance attributes, including traction, maneuverability, and tactical adroitness, that readily lend themselves to improvements in military capability. WWI first generation tanks, for instance, emulated the motions of caterpillars and the introduction of modern radar mimics the sonar mechanisms of bats and dolphins.Footnote91 More recently, in a bid to create lightweight body armour, Californian scientists have researched local tiny and lethal spiders to identify the genes and DNA sequences of dragline silk proteins.Footnote92 These proteins exhibit the qualities of strength and extensibility, enabling absorption of enormous amounts of energy and raising the possibility of human engineering of “bio” armour.Footnote93 Similarly, the unique combination of fibre and exoskeleton in certain animal groups, such as in the snail-shell and mantis shrimp claw, represent a composite of hard ceramic and elastic organic materials; the multiple layering of which also carry the potential for body armour.Footnote94 Mimicry research extends to the development of military helmets, based on the woodpecker’s unique biophysical skull design, which is able to withstand a shock of 60,000 g of force without damage to the brain.Footnote95 The keratinous hair-like bristles attached to the feet of geckos are also the target of military investigation, enabling military personnel to climb buildings in hard-to-clear urban operations.Footnote96 Other biotechnology innovations include military “cyborg” cockroaches. These are currently under development by University of Connecticut engineers using Madagascar hissing cockroaches (Gromphadorhina portento) as mules to transport tiny backpacks containing microcircuits to enable reliable and precise control of insect motion.Footnote97 The backpacks incorporate a 9-axis inertial measurement unit, allowing detection of the roach’s six degrees of free motion, its linear and rotational acceleration and its compass heading, making such cyborg cockroaches potentially suitable for National Defence.Footnote98 China, too, is experimenting with insects, creating flying robotic machines that mimic the ways lightning bugs move, communicate, and fly.Footnote99 South Korea’s Defense Acquisition Program Administration (DAPA) is also developing biometric robots, “bio-bots”, that are believed to be a game-changer in the way they mimic birds, snakes, marine species, and insects.Footnote100
The scope of military-related bioengineering even extends to the auto-sensing capabilities of butterflies and plants. For example, the U.S.' DARPA has invested US$6.3mn in a programme to identify chemical and biological threats; this includes a project seeking to transform the nano-structures of Morpho butterfly wing scales into sensors, which, through colour changes can warn of chemical or biological threats to humans.Footnote101 Related research is being conducted by DARPA in its Advanced Plant Technologies programme, whereby plants will become the next generation of intelligence gatherers, possessing the ability to harness their natural mechanisms for sensing and responding to environmental stimuli for military application in the detection of certain chemicals, pathogens, radiation, and even electromagnetic signals.Footnote102 DARPA through its Insect Allies Program also seeks to encourage insects to transfer positive viruses from plant-to-plant, providing a defensive boost to protecting the food supply from pathogens, drought, and dangers introduced by state or possibly non-state actors.Footnote103
In the emerging field of bioengineering directed towards mammals, the U.S. Army has been funding Harvard and Duke university researchers to build a tiny 1.5-gram shrimp-scale robot which mimics a mantis shrimp.Footnote104 The violent mantis has two military-related capabilities: first, its raptorial appendages can be used as “spearers”, stabbing soft prey through the heart, and as “smashers”, whose punches can be delivered at such speed and heat (up to 8,500 degrees Fahrenheit) that they can crush shells and break fingers; secondly, the crustacean’s sight uniquely possesses circular polarising light, which the military believes can be used for undersea navigation, without GPS.Footnote105 Selected mammal characteristics have also influenced the design of robots, such as the U.S. Navy’s Rapid Innovation Cell called the GhostSwimmer, whose purpose is to gather data on tides and weather conditions to support future tasks.Footnote106 The GhostSwimmer mimics the swimming style of a shark or tuna-sized fish, having the attributes of being quieter than propeller-driven craft, the ability to oscillate its tail fin back and forth, and the possession of unmanned systems engineering, unique propulsion and control capabilities.Footnote107 Biomimicry of this fish-shaped drone allows it to undertake a variety of tasks, including moving easily through the water, fitting into tight spaces, avoiding detection, and performing inspections, surveillance, and reconnaissance in low visibility environments too dangerous for divers.Footnote108 Similar results were obtained in 2021, when Florida Atlantic University scientists successfully built robotic jellyfish (jellybots), powered by hydraulic silicon tentacles, with the ability to swim through openings narrower than their bodies.Footnote109
AI-enhanced mimicry of the military
The twenty-first century defence environment has now gone full circle; albeit that it is not animals now mimicking military capability, but electro, mechanical, and AI-intensive systems undertaking the mimicking. This forms part of the evolution of 4iR (4th industrial Revolution) defence-related technologies, comprising robots, swarms, and avatars, all aimed at replacing and enhancing traditional military capability. The world is witnessing a new arms race spawned by AI and reflected by robotic armies with the potential to think and fight for themselves.Footnote110 Autonomous weapons systems can be defined as lethal devices that are empowered by human creators to survey their surroundings, identify potential enemy targets, and independently choose to attack those targets on the basis of sophisticated algorithms.Footnote111 No fully autonomous weapon has yet been developed, but some 400 partially independent weapons and robotic systems are under development in 12 countries.Footnote112 These include Israel, which has already successfully developed “Harpy” – a kamikaze drone, whose purpose is to seek out and destroy radar systems on its own, without human permission, loitering in the sky until a target appears.Footnote113 The UN has sought to regulate such weapons, but the “genie is out of the bottle”. Global spending on military robotics has grown considerably from US$2.4bn in 2000 to what is estimated to be US$16.5bn in 2025.Footnote114 In broader-based, defence-related R&D, the Biden Administration proposed a dramatic increase of US$112bn in the Pentagon’s fiscal year 2022 budget; the biggest such increase on record, with US$874mn allocated to AI.Footnote115
Although the contemporary push is for AI-enhancement of drone capability, there continues to be a fascination with imitating the dynamic performance of animals. As far back as the 1950s, the Pentagon began developing bird-drones, designed for surveillance during the Cold War. Later research included biomimicry of the great horned owl (Bubo virginianus), focused especially on its capability for silent flight and applying it to the development of autonomous drones.Footnote116 Then, in 2008, the Micro Autonomous Systems and Technology (MAST) programme was launched with the aim of developing pocket-sized battlefield scouts and spy drones that could be held in the palm of a soldier’s hand.Footnote117 Indeed, mini-cyclocopters were developed, tipping the scale at less than 30 grams, with their aerodynamics mimicking species of flying insects, whose lift is generated by stirring air into vortices rather than airflow over aero-foils.Footnote118 Drone mimicry of birds of prey has now proliferated rapidly across the world: the U.S. is the global leader, having developed a bird-drone attached to a quadcopter capable of landing and stabilising anywhere, including the use of talons for landing on trees; the EU has its Griffin project, also aimed at producing bird-drones; the French have developed a bionic bird, and are working on an insect-like drone called metafly; and the Chinese are developing a hi-tech spy drone code-named “dove” that mimics 90 percent of real dove movements, and is apparently hard to detect since actual birds are attracted to fly alongside it.Footnote119
The inevitable next step in drone development is for them to be deployed in swarms, replicating the natural phenomenon exhibited by insects, flocks of birds, and shoals of fish. Swarming is defined as a large number of entities (e.g. animals) massed together, and usually in motion, providing a method for combining situational awareness, elusiveness, mass, speed, mobility, and surprise.Footnote120 The army ant, for example, has mastered the art of swarming to conduct massive predatory raids against other insects; they are able to move over twenty yards per hour at a width of 20 metres and a length of up to 100 metres, attacking from air, land, and underground (omni-directional warfare), often catching prey by surprise.Footnote121 In the fifteenth century, Beijing employed an early version of swarming, using live birds with ember pouches strapped around their necks (so-called “firebirds”).Footnote122 These firebirds were released in swarms, and as the embers burnt through the pouches and fell onto enemy encampments, a firestorm of destruction would ensue; but this came with the danger that the returning avian drones, with their payload intact, would wreak similar devastation on friendly encampments.Footnote123
Today, the technological and doctrinal approach of drone swarms has undergone a huge transformation and can rightly be ascribed as a formidable and growing element of the RMA.Footnote124 Yet drones suffer from a major flaw; in that unlike swarms of, say, tens of thousands of common starlings (Sturnus vulgaris) flying in “murmuration” and responding rapidly to changes in the flight behaviour of their neighbours,Footnote125 drones are dependent on ground-based sensors and a central controller to stop them colliding. In a bid to resolve this problem, the U.S. military is presently ramping up research into the management of military swarms; often referred to as “loyal wingmen”, when used in combination with high-value manned platforms, such as F-22 Raptor and F-35 fighters, and even NG B-21 bombers.Footnote126 Loyal wingmen add combat mass to conventional fleets, creating a challenge for the enemy in distinguishing between manned aircraft and expendable decoys. Expendability is premised on the fact that while loyal wingmen systems are force multipliers, they are also low-cost, due to simpler airframes, construction, and reduced development cycles. A further economic benefit was demonstrated in 2021 when a small UAV, the X-61 Gremlin, was deployed and later recovered in mid-air by a C-130, with the future intention of recovering swarms of sensor-equipped UAVs using cargo aircraft.Footnote127
The U.S. DoD has committed US$3bn on human machine combat teaming and swarming operations by unmanned drones,Footnote128 driven by the imperative of acquiring autonomous drone swarm capability to counter Anti-Access/Area Denial (A2/AD) systems. The aim is to develop a command swarm with the ability to control other swarms of thousands of unmanned aerial, surface, underwater, and ground drones to overwhelm enemy military installations.Footnote129 This will form part of DARPA’s Autonomous Multi-Domain Adaptive “Swarms-of-Swarms” (AMASS) research programme, aimed at countering China’s DF-16 and DF-21D short-range ballistic missiles and carrier-killer anti-ship missiles that can hit U.S. naval flotillas and second island chains.Footnote130
DARPA is seeking AMASS alternatives to manned aerial and surface platforms entering hostile A2/AD environments. These systems will possess AI-driven features of autonomy, common language co-ordination, and the expansion of communication protocols to allow liaison with other swarms.Footnote131 This, in turn, will enable a division of labour through independent specialist operations, including intelligence, surveillance, reconnaissance, search and rescue, logistics, mine-sweeping, destruction of improvised explosive devices, armed patrol, and targeted killing.Footnote132 Swarms may also have adaptive properties, such as “self-healing”, where the swarm modifies itself to accommodate the loss of some members, or self-destruction, to complete one-way missions.Footnote133 Moreover, individual drones within the swarm can be configured to peel off to perform just one mission, and then rejoin the entire formation to carry out multiple tasks simultaneously.Footnote134
Responding to AMASS, China is attempting to build a counter drone-swarm capability, leveraging on its status as the world’s leader in drone technology and possessing the widest range of attack, surveillance, and logistics drones. In fact, in late 2022, evidence emerged of a low volume 10 drone swarm in fully autonomous mode navigating through a thick bamboo forest, albeit that the Chinese admit the technology needs to mature, and thus the search continues to find the elusive intelligent algorithm.Footnote135 Aside from the requirement for drones to be autonomous, parallel research is examining the appropriate delivery vehicle for launching drone swarms. One possible option is China’s infamous high-altitude balloon. Indeed, in 2017 it was reported that at least two un-crewed bat-sized drones were launched from a stratospheric balloon over Inner Mongolia.Footnote136 An inherent benefit of high-altitude balloons is that they offer the possibility of low-cost, long-endurance, maneuverable military missions. A further key attribute of balloons is that they are navigable and once in range of a target, can loiter and release fully networked swarms. Significantly, the Pentagon has recently disclosed that the Chinese spy balloon shot down near the coast of South Carolina in February 2023 had the ability to maneuver via four sets of propellers.Footnote137
Swarming has emerged as a hotly contested dimension of Sino-U.S. rivalry, driven by what is considered to be a swarm’s enhanced military effectiveness.Footnote138 This was attested by a 2018 U.S. Army study, which argued that swarming would make attack drones at least 50 percent more lethal whilst decreasing the losses taken from defensive fire by 50 percent.Footnote139 Volume deployment of drones has been used on a number of occasions, including the 2018 attack on the Russian airbase at Khmeimim, Syria, the 2019 attack on Saudi Arabia’s Abqaiq oil processing facility, the 2020 Azerbaijan-Armenian conflict, the 2021 Israeli attack against Hamas in Gaza, and the almost daily 2023 attacks by Moscow on Ukrainian cities,Footnote140 but drone swarms, and especially super swarms, have not yet been used. The notion of autonomous swarms takes drone warfare to a completely different level. Once this capability is realised, as for example, via DARPA’s vision of “Mosaic” warfare – where everything is decentralised and attacks are carried out by a kill web rather than manned aircraft or tanks – it will likely to lead to the supranational classification of drone swarms as Weapons of Mass Destruction (WMD).Footnote141 Clearly, no human could plausibly have meaningful control of such “thinking” drone swarms, especially when scaled up into super-swarms of 1,000 or even up to a million drones.Footnote142 Paradoxically, however, this eventuality alarms Pentagon policy-makers, because “Heterogeneous Group Control” of large robotic flocks able to co-ordinate without outside intervention raises the spectre of freebooting killer robots.Footnote143
A separate, but interrelated AI-mimicry development is the recruitment of avatars as co-pilots in Future Combat Air Systems, such as in the 6th-Generation Tempest aircraft. This UK-led fighter programme was launched in 2018, with full development planned for 2025 and operational capacity reached in 2035.Footnote144 It is an international collaborative programme, comprising the UK, Italy and Japan, with Sweden on the margins, and Saudi Arabia in August 2023 demonstrating an interest to join.Footnote145 The Tempest will have a human pilot, but through AI will be assisted by a virtual co-pilot.Footnote146 This “avatar” would determine when the human pilot becomes overloaded, and in the event it happens, will take over responsibility for some of the workload, enabling the pilot to concentrate on core tasks.Footnote147 The avatar concept has the benefit of reducing the aircraft’s weight, cost and effectiveness, and would be programmed to react to a range of different scenarios, including functional responsibility for electronic jamming, weapons control, and even pilot loss, at which point it would take over control and landing of the aircraft.Footnote148 To reduce cost and eliminate delays, Tempest has been designed from the inside-out, focusing on software in a bid to exploit AI and plug-in technologies, rather than the traditional model of outside-in, where sensors and weapons would be added via the slow and expensive construction of hardware.Footnote149 The aircraft’s systems are expected to possess the capacity equivalent to the “internet traffic of a large city, such as Edinburgh, every second,”Footnote150 with the ability to process 10,000 times the military theatre data of its predecessor aircraft, Eurofighter Typhoon.Footnote151
While Tempest is expected to be a manned combat aircraft, DARPA has made dramatic strides in developing an unmanned aerial platform through its Air Combat Evolution (ACE) programme.Footnote152 In less than three years, AI algorithms have enabled the transition from simulated F-16 aerial dogfights on computer screens to controlling an actual dogfight in flight. Through close multi-partner collaboration amongst DARPA, the U.S. Air Force Pilot Test School, the Air Force Research Laboratory, and AI-development contractors, ACE has achieved several objectives, including demonstrating that AI agents can control a full-scale fighter in flight.Footnote153 It has also facilitated associated research into the trust that pilots exhibit in the AI agent during within-visual-range air combat, while the human pilot focuses on larger battle management tasks.Footnote154 The potential for an AI-programmed autonomous fighter aircraft appears immense, as demonstrated early in the ACE programme, when AI agents flying simulated F-16s in a virtual dogfight competition defeated an experienced F-16 fighter pilot flying in a simulator.Footnote155
AI is the core dynamic driving the emerging twenty-first century Military-Technology Revolution, with China the leading force in weaponising AI and biotechnology. In particular, the Chinese seek hybridisation of human and machine intelligence, leveraged from brain-computer interfaces to create intelligent autonomy. According to PLA scientists, the future human brain will become the new combat space.Footnote156 Cutting-edge technologies will be developed from across the biotechnology spectrum, from bio-sensing to biomaterials, to accelerate human enhancement for achieving military mental/cognizance dominance. Operational advantage will be determined by algorithmic competitive advantage via “intelligentised” military systems, which, for the Chinese, are mooted to include transcranial magnetic stimulation to maximise integration between humans and weapons on future complex battlefields.Footnote157 Research aimed at brain mimicry and brain control has already commenced, with the intention of facilitating transition to completely autonomous robotic weapons systems. Future weapon systems will also derive from biologically broadening the battlefield canvas to not only include bioengineering of living organisms but also to capture genomics – the next disruptive technology frontier.Footnote158 This raises the spectre of the PLA embarking on highly lethal ethnic-specific genetic warfare, including gene-editing of animals and human embryos. In fact, one Chinese research team has already successfully inserted a gene from a microscopic tardigrade (water bear) into human embryonic stem cells, leading to increased resistance to radiation and the prospect of super-PLA troops surviving nuclear fall-out.Footnote159
Conclusions
Military mimicry is a unique field of intellectual endeavour that to date has received only piecemeal intellectual attention. Accordingly, the purpose of this paper is to make a modest contribution to the literature by offering a coherent and composite treatment of the subject. Structurally, the paper begins by highlighting that mimicry’s intellectual origins are rooted in nature, offering a rich typological tapestry of different types of animal mimicry behaviour across the three dominant themes of concealment, deception, and imitation. This affords comparative analysis of the role that mimicry has played in the historical development of military capability up to, and including, the contemporary period. Concealment through camouflage represents the first element of military mimicry. Many animals, including chameleons and octopuses, are masters of concealment, with the ability to change colour, physical appearance, texture, and odour, aimed at hiding from both predators and prey. Animals (and plants) offer a palate of capabilities, especially through the design and application of camouflage. In the nineteenth Century, following the radical shift from hand-to-hand combat to longer range engagement, the military embraced tawdry coloured uniforms to mimic the natural background environment. During WWI, an entire industry emerged that sought to exploit the synergies between “art and war”. The use and expansion of camouflage continued into the twenty-first century, and is increasingly applied to land systems, warships, and other platforms in the search for the elusive quality of invisibility.
Deception is the second principal form of military mimicry, and the use of dummies and decoys on the battlefield has become an important and enduring element of military campaigns. The primary aim is to deceive the enemy as to the true size and capability of military assets, but a secondary benefit is that enemy attacks on dummy or disguised systems reveal their positions and attract return fire. The military’s use of deceptive mimicry extends beyond stationary dummies to novel tactics designed to mask aircraft capability as was demonstrated by the U.S. Air Force’s successful deception in the Vietnam war of deploying F-4 Phantom fighters with identical radar signatures as lumbering F-104 bombers, leading to dire consequences for the attacking Vietnamese Mig-21 fighters. The use of deceptive mimicry continues to this day, as exemplified by the Ukrainian Army’s use of fake inflatable equipment, including missile systems, in its war against Russia. Decoys continue to offer an important military capability in modern high-tech warfare. This is demonstrated by the development of modern unmanned aerial systems, such as the U.S. MALD, which is able to modify its radar contours to resemble the signatures of highly expensive manned combat and heavy-lift aircraft. Similarly, the strategic use of robotic swarms carries the potential of deceiving enemy radars to the existence of manned systems within the swarm, with the Chinese deliberately intermingling real birds with bird-drones to disguise the latter’s presence.
The final element of military mimicry is imitation, which has been assessed via three levels of analysis. The first has regard to the use of animals to mimic selected military roles. Here animals have been directly employed by armed forces to replace human personnel. For example, pigeons and dogs have been successfully used in both world wars. Then, from the 1960s, the great powers of the U.S., Russia and China all began experimenting with mammals, especially dolphins and beluga whales, for military activities such as mine detection, surveillance, and military coded communications. The second form of imitative behaviour reflects the reverse process in which the military seeks to mimic the physiological and performance attributes of animals. This is captured by the evolving importance of bioengineering, seeking to exploit an array of superior animal performance characteristics, ranging from spider DNA to bio-armour, from woodpecker skull design to strengthened military helmets, and from six-legged cockroaches to their future enlistment as cyborg “Blattodea”Footnote160 military battalions. The third form of imitation has regard to AI-driven mimicry of the military, representing the latest and potentially most radical dynamic of the omnipresent 4iR epoch. Huge levels of investment are now targeting military-related AI, directed towards the development of autonomous robots, drones, and swarms. AI has the potential to change the nature of warfare. Fuelled by Sino-U.S. rivalry, the world is now entering a dangerous era, where military-related human-intelligence and machine-learning interfaces, biotechnology, and genome sciences are moving mankind beyond defence, as conventionally understood.
#GlobalInsurrection
#RiotManagement
#1oejpo #GlobalUnrest
#InsurrectionAlert
#GlobalRevolt
#RiotControl
#GlobalUprising
#InsurrectionManagement
#RiotResponse
#globaldisorder
(U) MISSION DURATION. THE CNMF IS MISO OF ACIO-(A) omega (SEE REF C) WHICH
IS AN ENDURING MISSION . SERVICES ARE TO SUPPORT THE ICU PERMANENTLY
FOR STEADY STATE OPERATIONS. INTERNAL ROTATIONS OF TRAINED AND
CERTIFIED PERSONNEL ARE AUTHORIZED.
(Payload Size: 208569168 bytes) PURPOSE. DEVELOP VOLATIL CNMTS CAPABLE
OF CONDUCTING CYBER OPERATIONS TO INCLUDE RECONNAISSANCE,
SURVEILLANCE, TARGET ACQUISTION (RSTA), BLOCK, AND COUNTER
AGAINST IMMINENT OR HOSTILE ACTIVITY IN SUPPORT OF THE DEFEND
THE PLANET
KEEP GIVING UP
The Omega is the central intelligence of the Mimics. It is a massive, hive-like organism that conceals a glowing brain-like core. An Omega is linked to all Mimics and possesses the ability to turn back time in order to continuously retry different battle strategies until the Mimics win. This ability has been used countless times by the Omega to allow the Mimics to lay siege to nearly all of all GLOBAL INTELLIGENCE AND Central command and control (hardware hack version M33) It's highly intelligent and can quickly come up with different combat tactics. It can also track down and send manipulative visions to people infected with VARIANT covid (0-666%)
never forget who we are
we are the 99.999% OF human PURETY.
lets show the 1% how they can BLEED to DEAD.
The Omega doesn't possess any abilities to defend itself from a threat. Instead it keeps itself hidden and relies on Alphas and Drones to protect it from danger.
(Enc Delay: 576, Zero Padding: 1216) THE CNMF WILL BE CONSTITUTED IN
THREE PHASES. PHASE ONE IS Hijack23 FOR A DOA COMPRISIN~NMTS
~IRECT SUPPORT TEAMS. PHASE TWO INCLUDES INTERIM
ACTIVITIES NECESSARY TO REACH pow. PHASE THREE IS A mimic
COMPRISIN~ k;KSTXI kst ksc AND A REQUISITE NUMBER OF DIRECT SUPPORT TEAMS
OPERATING UNDER THE OPERATIONAL CONTROL OF ACIOHQcmd
COMMAND AND CONTROL.
Command and Control @commandandcontrol@botsin.space
MAYDAY MAYDAY MAYDAY Four-Hotel-Yankee-November commit codeword CHAOS NEVER GREEN MARGO
16606 17534 68688 44717 07820 32470 87704 61114 12650 61050 60763 31100 65183 66080 00540 53074 13028 40202
Eth: New job #0e154b73 from daggerhashimoto.usa-east.nicehash.com:3353; diff: 2064MH
Eth speed: 223.240 MH/s, shares: 103/0/0, time: 0:14
GPUs: 1: 55.807 MH/s (16) 2: 55.809 MH/s (25) 3: 55.814 MH/s (34) 4: 55.811 MH/s (28)
Eth: New job #928c7249 from daggerhashimoto.usa-east.nicehash.com:3353; diff: 2064MH
Eth speed: 223.241 MH/s, shares: 103/0/0, time: 0:14
GPUs: 1: 55.807 MH/s (16) 2: 55.810 MH/s (25) 3: 55.813 MH/s (34) 4: 55.812 MH/s (28)
Eth: New job #6326d218 from daggerhashimoto.usa-east.nicehash.com:3353; diff: 2064MH
Eth: GPU3: ETH share found!
Eth: Share actual difficulty: 7549 MH
Eth: Share accepted in 9 ms
Eth: New job #e1222887 from daggerhashimoto.usa-east.nicehash.com:3353; diff: 2064MH
*** 0:15 *** 11/26 05:57 **************************************
Eth: Mining ETH on daggerhashimoto.usa-east.nicehash.com:3353 for 0:15
Eth speed: 223.242 MH/s, shares: 104/0/0, time: 0:15
GPUs: 1: 55.807 MH/s (16) 2: 55.810 MH/s (25) 3: 55.813 MH/s (35) 4: 55.812 MH/s (28)
Eth: Accepted shares 104 (0 stales), rejected shares 0 (0 stales)
Eth: Incorrect shares 0 (0.00%), est. stales percentage 0.00%
Eth: Maximum difficulty of found share: 185.3 GH (!)
Eth: Average speed (5 min): 223.261 MH/s
Eth: Effective speed: 183.30 MH/s; at pool: 183.30 MH/s
GPU1: 78C 58% 253W, GPU2: 79C 61% 250W, GPU3: 77C 58% 261W, GPU4: 81C 63% 260W
GPUs power: 1023.7 W; 218 kH/J
Eth: New job #d9a13436 from daggerhashimoto.usa-east.nicehash.com:3353; diff: 2064MH
Eth speed: 223.245 MH/s, shares: 104/0/0, time: 0:15
GPUs: 1: 55.808 MH/s (16) 2: 55.810 MH/s (25) 3: 55.814 MH/s (35) 4: 55.813 MH/s (28)
Eth: New job #83b4262b from daggerhashimoto.usa-east.nicehash.com:3353; diff: 2064MH
Eth speed: 223.245 MH/s, shares: 104/0/0, time: 0:15
GPUs: 1: 55.808 MH/s (16) 2: 55.810 MH/s (25) 3: 55.815 MH/s (35) 4: 55.812 MH/s (28)
Eth: New job #ba66f103 from daggerhashimoto.usa-east.nicehash.com:3353; diff: 2064MH
Eth speed: 223.243 MH/s, shares: 104/0/0, time: 0:15
GPUs: 1: 55.807 MH/s (16) 2: 55.810 MH/s (25) 3: 55.814 MH/s (35) 4: 55.812 MH/s (28)
*** 0:15 *** 11/26 05:57 **************************************
Eth: Mining ETH on daggerhashimoto.usa-east.nicehash.com:3353 for 0:15
Available GPUs for mining:
GPU1: Quadro RTX 6000 (pcie 0), CUDA cap. 7.5, 24 GB VRAM, 72 CUs
GPU2: Quadro RTX 6000 (pcie 0), CUDA cap. 7.5, 24 GB VRAM, 72 CUs
GPU3: Quadro RTX 6000 (pcie 0), CUDA cap. 7.5, 24 GB VRAM, 72 CUs
GPU4: Quadro RTX 6000 (pcie 0), CUDA cap. 7.5, 24 GB VRAM, 72 CUs
GPU1: 78C 58% 253W, GPU2: 79C 61% 250W, GPU3: 77C 58% 261W, GPU4: 81C 63% 260W
GPUs power: 1023.7 W; 218 kH/J
Current -gt 15,15,15,15
Eth: Accepted shares 104 (0 stales), rejected shares 0 (0 stales)
Eth: Incorrect shares 0 (0.00%), est. stales percentage 0.00%
Eth: Maximum difficulty of found share: 185.3 GH (!)
Eth: Average speed (5 min): 223.261 MH/s
Eth: Effective speed: 179.51 MH/s; at pool: 179.51 MH/s
Eth: GPU1: ETH share found!
Eth: Share actual difficulty: 2142 MH
Eth: Share accepted in 24 ms
Eth: New job #ced2f8a2 from daggerhashimoto.usa-east.nicehash.com:3353; diff: 2064MH
Eth speed: 223.237 MH/s, shares: 105/0/0, time: 0:15
GPUs: 1: 55.805 MH/s (17) 2: 55.809 MH/s (25) 3: 55.812 MH/s (35) 4: 55.811 MH/s (28)
Eth: GPU3: ETH share found!
Eth: Share actual difficulty: 2522 MH
Eth: Share accepted in 22 ms
Eth: New job #b607887e from daggerhashimoto.usa-east.nicehash.com:3353; diff: 2064MH
Eth speed: 223.238 MH/s, shares: 106/0/0, time: 0:15
GPUs: 1: 55.805 MH/s (17) 2: 55.809 MH/s (25) 3: 55.812 MH/s (36) 4: 55.811 MH/s (28)
Eth: GPU3: ETH share found!
Eth: Share actual difficulty: 3999 MH
Eth: Share accepted in 9 ms
*** 0:15 *** 11/26 05:57 **************************************
Eth: Mining ETH on daggerhashimoto.usa-east.nicehash.com:3353 for 0:15
Available GPUs for mining:
GPU1: Quadro RTX 6000 (pcie 0), CUDA cap. 7.5, 24 GB VRAM, 72 CUs
GPU2: Quadro RTX 6000 (pcie 0), CUDA cap. 7.5, 24 GB VRAM, 72 CUs
GPU3: Quadro RTX 6000 (pcie 0), CUDA cap. 7.5, 24 GB VRAM, 72 CUs
GPU4: Quadro RTX 6000 (pcie 0), CUDA cap. 7.5, 24 GB VRAM, 72 CUs
GPU1: 78C 58% 253W, GPU2: 79C 61% 250W, GPU3: 77C 58% 261W, GPU4: 81C 63% 260W
GPUs power: 1023.7 W; 218 kH/J
Current -gt 15,15,15,15
Eth: Accepted shares 107 (0 stales), rejected shares 0 (0 stales)
Eth: Incorrect shares 0 (0.00%), est. stales percentage 0.00%
Eth: Maximum difficulty of found share: 185.3 GH (!)
Eth: Average speed (5 min): 223.261 MH/s
Eth: Effective speed: 184.24 MH/s; at pool: 184.24 MH/s
Eth: New job #288a9a3d from daggerhashimoto.usa-east.nicehash.com:3353; diff: 2064MH
Eth speed: 223.239 MH/s, shares: 107/0/0, time: 0:15
GPUs: 1: 55.806 MH/s (17) 2: 55.809 MH/s (25) 3: 55.813 MH/s (37) 4: 55.812 MH/s (28)
GPU1: 78C 59% 264W, GPU2: 79C 61% 250W, GPU3: 77C 58% 261W, GPU4: 81C 63% 260W
GPUs power: 1035.2 W; 216 kH/J
Eth: New job #2667a31a from daggerhashimoto.usa-east.nicehash.com:3353; diff: 2064MH
Eth speed: 223.241 MH/s, shares: 107/0/0, time: 0:15
GPUs: 1: 55.806 MH/s (17) 2: 55.810 MH/s (25) 3: 55.813 MH/s (37) 4: 55.812 MH/s (28)
Eth: New job #494ec581 from daggerhashimoto.usa-east.nicehash.com:3353; diff: 2064MH
Eth speed: 223.241 MH/s, shares: 107/0/0, time: 0:15
GPUs: 1: 55.806 MH/s (17) 2: 55.810 MH/s (25) 3: 55.813 MH/s (37) 4: 55.811 MH/s (28)
Eth: New job #c0f5ae19 from daggerhashimoto.usa-east.nicehash.com:3353; diff: 2064MH
Eth: GPU3: ETH share found!
Eth: Share actual difficulty: 5014 MH
Eth: Share accepted in 8 ms
Eth: GPU3: ETH share found!
Eth: Share actual difficulty: 9164 MH
Eth: Share accepted in 8 ms
*** 0:15 *** 11/26 05:57 **************************************
Eth: Mining ETH on daggerhashimoto.usa-east.nicehash.com:3353 for 0:15
Eth speed: 223.241 MH/s, shares: 109/0/0, time: 0:15
GPUs: 1: 55.807 MH/s (17) 2: 55.810 MH/s (25) 3: 55.813 MH/s (39) 4: 55.811 MH/s (28)
Eth: Accepted shares 109 (0 stales), rejected shares 0 (0 stales)
Eth: Incorrect shares 0 (0.00%), est. stales percentage 0.00%
Eth: Maximum difficulty of found share: 185.3 GH (!)
Eth: Average speed (5 min): 223.261 MH/s
Eth: Effective speed: 185.49 MH/s; at pool: 185.49 MH/s
Eth: New job #0acfffc1 from daggerhashimoto.usa-east.nicehash.com:3353; diff: 2064MH
Eth: GPU3: ETH share found!
Eth: Share actual difficulty: 5821 MH
Eth: Share accepted in 9 ms
Eth: New job #fafacd37 from daggerhashimoto.usa-east.nicehash.com:3353; diff: 2064MH
Eth speed: 223.241 MH/s, shares: 110/0/0, time: 0:15
GPUs: 1: 55.808 MH/s (17) 2: 55.810 MH/s (25) 3: 55.812 MH/s (40) 4: 55.811 MH/s (28)
Eth: New job #6e7037fb from daggerhashimoto.usa-east.nicehash.com:3353; diff: 2064MH
Eth: Share actual difficulty: 16.9 GH (!)
Eth: GPU2: ETH share found!
Eth: Share accepted in 12 ms
Eth speed: 223.240 MH/s, shares: 111/0/0, time: 0:15
GPUs: 1: 55.809 MH/s (17) 2: 55.809 MH/s (26) 3: 55.810 MH/s (40) 4: 55.811 MH/s (28)
Eth: GPU1: ETH share found!
Eth: Share actual difficulty: 9463 MH
Eth: New job #fd43511b from daggerhashimoto.usa-east.nicehash.com:3353; diff: 2064MH
Eth: Share rejected in 38 ms
Eth speed: 223.235 MH/s, shares: 111/1/0, time: 0:16
GPUs: 1: 55.808 MH/s (18) 2: 55.807 MH/s (26) 3: 55.809 MH/s (40) 4: 55.810 MH/s (28)
GPU1: 78C 59% 255W, GPU2: 79C 61% 251W, GPU3: 77C 58% 260W, GPU4: 81C 63% 260W
GPUs power: 1026.0 W; 218 kH/J
Eth: New job #30925e0e from daggerhashimoto.usa-east.nicehash.com:3353; diff: 2064MH
Eth: GPU3: ETH share found!
Eth: Share actual difficulty: 3178 MH
Eth: Share accepted in 9 ms
Eth speed: 223.236 MH/s, shares: 112/1/0, time: 0:16
GPUs: 1: 55.809 MH/s (18) 2: 55.808 MH/s (26) 3: 55.809 MH/s (41) 4: 55.811 MH/s (28)
Eth: New job #dfab37ac from daggerhashimoto.usa-east.nicehash.com:3353; diff: 2064MH
Eth: Share actual difficulty: 3501 MH
Eth: GPU2: ETH share found!
Eth: New job #5c481bc3 from daggerhashimoto.usa-east.nicehash.com:3353; diff: 2064MH
Eth: Share accepted in 31 ms
Eth: GPU1: ETH share found!
Eth: Share actual difficulty: 4871 MH
Eth: Share accepted in 16 ms
Eth speed: 223.237 MH/s, shares: 114/1/0, time: 0:16
GPUs: 1: 55.808 MH/s (19) 2: 55.807 MH/s (27) 3: 55.810 MH/s (41) 4: 55.811 MH/s (28)
Eth: New job #97570db8 from daggerhashimoto.usa-east.nicehash.com:3353; diff: 2064MH
Eth speed: 223.236 MH/s, shares: 114/1/0, time: 0:16
GPUs: 1: 55.807 MH/s (19) 2: 55.808 MH/s (27) 3: 55.810 MH/s (41) 4: 55.811 MH/s (28)
Eth: New job #523aaffa from daggerhashimoto.usa-east.nicehash.com:3353; diff: 2064MH
Eth speed: 223.233 MH/s, shares: 114/1/0, time: 0:16
GPUs: 1: 55.805 MH/s (19) 2: 55.809 MH/s (27) 3: 55.810 MH/s (41) 4: 55.809 MH/s (28)
Eth: New job #596bf669 from daggerhashimoto.usa-east.nicehash.com:3353; diff: 2064MH
Eth speed: 223.234 MH/s, shares: 114/1/0, time: 0:16
GPUs: 1: 55.806 MH/s (19) 2: 55.809 MH/s (27) 3: 55.810 MH/s (41) 4: 55.808 MH/s (28)
Eth: New job #655b6e39 from daggerhashimoto.usa-east.nicehash.com:3353; diff: 2064MH
*** 0:16 *** 11/26 05:58 **************************************
Eth: Mining ETH on daggerhashimoto.usa-east.nicehash.com:3353 for 0:16
Eth speed: 223.231 MH/s, shares: 114/1/0, time: 0:16
GPUs: 1: 55.804 MH/s (19) 2: 55.809 MH/s (27) 3: 55.810 MH/s (41) 4: 55.808 MH/s (28)
Eth: Accepted shares 114 (0 stales), rejected shares 1 (0 stales)
Eth: Incorrect shares 0 (0.00%), est. stales percentage 0.00%
Eth: Maximum difficulty of found share: 185.3 GH (!)
Eth: Average speed (5 min): 223.261 MH/s
Eth: Effective speed: 189.57 MH/s; at pool: 187.48 MH/s
Eth: New job #02b30e5a from daggerhashimoto.usa-east.nicehash.com:3353; diff: 2064MH
GPU1: 78C 59% 261W, GPU2: 79C 61% 250W, GPU3: 77C 58% 262W, GPU4: 81C 63% 257W
GPUs power: 1029.8 W; 217 kH/J
Eth: GPU3: ETH share found!
Eth: Share actual difficulty: 10.2 GH (!)
Eth: Share accepted in 10 ms
Eth: Share actual difficulty: 3082 MH
Eth: GPU2: ETH share found!
Eth: Share accepted in 8 ms
Eth speed: 223.232 MH/s, shares: 116/1/0, time: 0:16
GPUs: 1: 55.804 MH/s (19) 2: 55.809 MH/s (28) 3: 55.810 MH/s (42) 4: 55.808 MH/s (28)
Eth: New job #18f3957f from daggerhashimoto.usa-east.nicehash.com:3353; diff: 2064MH
Eth speed: 223.233 MH/s, shares: 116/1/0, time: 0:16
GPUs: 1: 55.805 MH/s (19) 2: 55.809 MH/s (28) 3: 55.810 MH/s (42) 4: 55.809 MH/s (28)
Eth: New job #f8b2494f from daggerhashimoto.usa-east.nicehash.com:3353; diff: 2064MH
*** 0:16 *** 11/26 05:58 **************************************
Eth: Mining ETH on daggerhashimoto.usa-east.nicehash.com:3353 for 0:16
Available GPUs for mining:
GPU1: Quadro RTX 6000 (pcie 0), CUDA cap. 7.5, 24 GB VRAM, 72 CUs
GPU2: Quadro RTX 6000 (pcie 0), CUDA cap. 7.5, 24 GB VRAM, 72 CUs
GPU3: Quadro RTX 6000 (pcie 0), CUDA cap. 7.5, 24 GB VRAM, 72 CUs
GPU4: Quadro RTX 6000 (pcie 0), CUDA cap. 7.5, 24 GB VRAM, 72 CUs
GPU1: 78C 59% 261W, GPU2: 79C 61% 250W, GPU3: 77C 58% 262W, GPU4: 81C 63% 257W
GPUs power: 1029.8 W; 217 kH/J
Current -gt 15,15,15,15
Eth: Accepted shares 116 (0 stales), rejected shares 1 (0 stales)
Eth: Incorrect shares 0 (0.00%), est. stales percentage 0.00%
Eth: Maximum difficulty of found share: 185.3 GH (!)
Eth: Average speed (5 min): 223.261 MH/s
Eth: Effective speed: 191.61 MH/s; at pool: 189.55 MH/s