Harnessing Data for Irregular Warfare

  • Published
  • By USAOC

The U.S. military’s advantage is increasingly reliant on data-driven technologies and the integration of diverse data sources, edge computing, and rapid software deployment. This, coupled with an increase in current and emerging AI/ML-enabling capabilities, requires the development of new warfighting concepts—to include within irregular warfare. How can SOF better capitalize on these data-analytics systems and processes for the purposes of irregular warfare?


  • Babb, Wallace, "Alternate Procurement Methods for Mitigating China MCF Strategy," AFGC thesis, 2025, 36 pgs. 
    • ​​​​​​​This paper discusses strategies to rapidly acquire and deploy AI, ML, and big data technologies, which are required for intelligence gathering and predictive analytics. It highlights a recent initiative by the U.S. Special Operations Command (SOCOM) to use Commercial Solutions Openings (CSOs) to rapidly solicit and award contracts for "SOF digital applications," ensuring SOF can quickly integrate new technologies at the speed of relevance. 
  • Brewer, Capt. Jonathan T., "Beyond the Endgame: Sustaining SOF Success with Infinite Game Tactics," AFGC thesis, 2025, 46 pgs. 
    • ​​​​​​​This paper addresses the need for SOF to shift its irregular warfare and strategic competition approaches to an "infinite game" mindset. The author notes that modern warfare is being reshaped by the rapid integration of disruptive technologies like AI, big data analytics, and unmanned systems, which SOF must leverage to enhance intelligence gathering, precision targeting, and autonomous operational capabilities. The paper also argues for updating SOF doctrine to integrate information warfare and influence campaigns into irregular warfare missions to counter hybrid threats. 
  • Higgins, Lt. Col. Brian, "Software Factories: Equipping Combatant commanders for the Digital Battlefield," AF Fellows paper (Atlantic Council), 2024, 3 pgs. 
    • ​​​​​​​​​​​​​​Directly addressing the need for rapid software deployment and edge computing, this paper advocates for equipping combatant commanders with "software factories" that utilize agile development and DevSecOps. This approach would allow the military to rapidly develop, deploy, and adapt custom applications at the "operational edge" to meet the dynamic, real-time demands of the warfighter in contested environments.
  • Howard, Regenald E., "A Snapshot in Time: The Proliferation of Generative AI and Lessons Learned for the United States Military," SAASS thesis, 2024, 98 pgs. 
    • ​​​​​​​​​​​​​​This paper explores the implementation of generative AI in austere, resource-constrained environments that lack basic infrastructure, which is highly relevant to SOF operations. It argues that AI can democratize expert knowledge at the tactical edge, such as allowing deployed service members to access critical medical information when operating in remote locations without qualified medical personnel, 
  • Hulshizer, Lt. Col. Eric D., "Every Wallet a Target: Fusing Financial and Military Targeting in Strategy for the Decisive Decade," SAASS thesis, 2024, 115 pgs. 
    • ​​​​​​​​​​​​​​This paper examines Counter Threat Finance (CTF), an application nested within irregular warfare and cyber doctrine. It details how SOF and intelligence analysts can use financial intelligence and data-analytic databases (such as USINDOPACOM's TETRIS database) to track illicit networks, subvert adversary activities in the "gray zone," and conduct operations short of conventional war.