Professional Documents
Culture Documents
Swarming Destruction: Drone Swarms and Chemical, Biological, Radiological, and Nuclear Weapons
Swarming Destruction: Drone Swarms and Chemical, Biological, Radiological, and Nuclear Weapons
To cite this article: Zachary Kallenborn & Philipp C. Bleek (2019): Swarming destruction: drone
swarms and chemical, biological, radiological, and nuclear weapons, The Nonproliferation Review,
DOI: 10.1080/10736700.2018.1546902
ABSTRACT KEYWORDS
Drone swarms—multiple unmanned systems capable of coordinating chemical weapons; biological
their actions to accomplish shared objectives—have major weapons; radiological
implications for the future of warfare. One important set of weapons; nuclear weapons;
implications relates to the ability of drone swarms to complement, weapons of mass destruction;
delivery systems; drones;
challenge, and even substitute for chemical, biological, radiological, unmanned aerial vehicles;
and nuclear (CBRN) weapons. For example, swarming drones might autonomous robots; drone
enable more effective CBRN delivery. Or they might facilitate swarms
standoff detection, search the oceans for nuclear-armed submarines,
or otherwise impede an adversary’s ability to threaten or employ
CBRN weapons. Conventionally armed drone swarms might serve as
strategic deterrents in lieu of CBRN weapons. At the same time,
many CBRN-relevant applications of drone-swarm technology entail
significant technical challenges even for very sophisticated states,
and even more so for non-state actors whose capabilities will be far
more limited, so there is considerable uncertainty around whether,
how much, and when drone-swarm technology will complement,
challenge, or substitute for CBRN weapons.
Once science fiction, drone swarms are exploding into the realm of international security
and their capabilities are growing rapidly. Within only five years, a student drone-swarm
project went from initial presentation to a large working drone swarm capable of being
launched from a fighter jet. In 2011, engineering students at the Massachusetts Institute
of Technology (MIT) presented the fully autonomous, fixed-wing Perdix drone capable
of between-drone communication at the 2011 Air Vehicle Survivability Workshop.1
Development of this drone transitioned to MIT Lincoln Laboratories and then to the
US Department of Defense’s (DOD) Strategic Capabilities Office. By October 2016, they
had successfully launched a swarm of 103 Perdix drones from three F/A-18 Super
Hornet fighter aircraft.2
Many other states are seriously pursuing drone-swarm technology, including Russia,
South Korea, and China. For example, China successfully tested a swarm of 119
fixed-wing drones and a swarm of 1,000 less sophisticated rotor-wing drones.3 And
China is clearly interested in the military applications, including for targeting US aircraft
carriers.4 Similarly, the South Korean military recently launched a “dronebot” combat unit
and is researching swarming technology.5 Russia is reportedly seeking to develop a heli-
copter capable of controlling a swarm of drones by 2025.6 This implies that all of these
states perceive military value in developing this capability.
However, there has been little study of the broader strategic implications of drone
swarms, including for chemical, biological, radiological, and nuclear (CBRN) weapons.7
A publicly released, abbreviated version of a restricted study by the National Academies
of Science, Engineering, and Medicine on counter-unmanned aerial systems (cUAS)
briefly mentions the threat of drone swarms armed with chemical, biological, or radiologi-
cal weapons for battalion-and-below operations.8 Other studies have focused on the tac-
tical aspects, such as connecting drone swarms to swarm tactics and their efficacy against
traditional maneuver warfare, drone swarms employed to enhance communications in
Marine Aviation ground taskforces, and drone swarms as electronic warfare platforms.9
Some articles examine approaches to countering drone swarms and swarm vs. swarm
combat,10 while others have looked at the history of swarming generally, unrelated to
drones, arguing that the rise of information and communications technology enables
swarming tactics.11 Numerous studies examine technical issues relating to drone
swarms, such as human–drone interaction.12 A small number address, but none focuses
on, topics relevant to CBRN.13 One study examined some theoretical scenarios of
Elsa Kania, “Battlefield Singularity: Artificial Intelligence, Military Revolution, and China’s Future Military Power,” Center
4
Security, Defense, and Law Enforcement, XIV (Bellingham, WA: SPIE Publishers, 2015), includes four sentences on drone
swarms’ potential as air-defense suppression, which could have an effect on air-based CBRN delivery systems. Bryan
Clark, “The Emerging Era in Undersea Warfare,” Center for Strategic and Budgetary Analysis, January 22, 2015, p. 16,
<csbaonline.org/research/publications/undersea-warfare/publication>, mentions the possibility of using swarms of
unmanned undersea vehicles for coordinated surveillance or attack operations, which could have an impact on submar-
ine-based nuclear weapons.
14
Jeremy Straub, “Analysis of Mutual Assured Destruction-like Scenario with Swarms of Non-recallable Autonomous
Robots,” Proceedings of the International Society for Optics and Photonics, May 23, 2015, <www.spiedigitallibrary.org/
conference-proceedings-of-spie/9456/1/Analysis-of-mutual-assured-destruction-like-scenario-with-swarms-of/10.1117/
12.2177839.short?SSO=1>.
15
Natasha Bajema and Diane DiEuliis, “Peril and Promise: Emerging Technologies and WMD; Emergence and Convergence
Workshop Report, 13–14 October 2016,” National Defense University: Center for the Study of Weapons of Mass Destruc-
tion, May 2017, pp. 14–21, <https://wmdcenter.ndu.edu/Portals/97/Documents/Publications/Articles/2016%
20Workshop%20Report%20FINAL%205-12-17.pdf?ver=2017-05-12-105811-853>.
16
See, for instance, Frank L. Smith III, American Biodefense: How Dangerous Ideas about Biological Weapons Shape National
Security (Ithaca, NY: Cornell University Press, 2014).
17
Mike Pietrucha, “The Need for SEAD Part 1: The Nature of SEAD,” War on the Rocks, May 17, 2016, <https://
warontherocks.com/2016/05/the-need-for-sead-part-i-the-nature-of-sead/>.
4 Z. KALLENBORN AND P.C. BLEEK
surveillance.25 These swarms are typically composed of small drones with limited range.
However, as the technology matures, it will become increasingly viable to incorporate
larger, more complex platforms able to carry weapon systems over large distances.26 As
the drone swarms and component drones increase in sophistication (better control algor-
ithms; larger payloads; improved range and persistence), production costs are likely to
increase as well owing to increased system complexity. Higher costs may mitigate some
of the strategic value drone swarms offer.
Role differentiation within heterogeneous swarms offers distinct advantages. Attack
drones carry weapons payloads; sensing drones carry sensors to identify and track poten-
tial targets or threats; communications drones ensure stable communication links within
the swarm and between command system; and dummy drones may absorb incoming
adversary fire, generate false signatures, or simply make the swarm appear larger.
The composition of a heterogeneous swarm could be modified to meet the needs of a
particular mission or operational environment. The capability to swap in new drones has
been demonstrated on a small scale.27 In the future, providing a drone swarm to an oper-
ational commander could be akin to supplying a box of Lego: “Here are your component
parts. Assemble them into what you need.”
Role differentiation may also enable more complex behaviors: sensing drones may be
smaller and lighter than attack drones, enabling them to conduct reconnaissance ahead
of the main swarm. Software architecture has been developed to coordinate teams of
multi-mission unmanned aerial vehicles, including integrated intelligence and strike
functions, weapon selection, and route planning based on identified adversary air defenses
(Figure 1).28
There is a significant distinction between drone swarms and drones en masse. Drones en
masse is the use of multiple drones without autonomous communication between the
drones (see Figure 1). Rather, one or more human decision-makers coordinate all their
actions, either in real time or in advance via preprogrammed behaviors. This distinction
is significant for three reasons. First, the limits of human cognition are likely to limit the
size, complexity, and behaviors of drone swarms generally, and they are exacerbated signifi-
cantly with drones en masse. As Amy Hocraffer and Chang S. Nam note: “[aerial drone]
swarms pose several human factors challenges, such as high cognitive demands, non-intui-
tive behavior, and serious consequences for errors.”29 They also find that the level of auton-
omy of the swarm is the main factor in whether the human controller is a strength or
weakness for management of large drone swarms.30 While drone swarms have at least
limited autonomy to limit the cognitive demands, drones en masse do not necessarily.
25
Axel Bürkle, Florian Segor, and Matthias Kollman, “Towards Autonomous Micro UAV Swarms,” Fraunhofer-Institut für
Optronik, Systemtechnik und Bildauswertung, Vol. 61, Nos. 1–4, (2011), pp. 339–53, <http://akme-a2.iosb.fraunhofer.
de/EatThisGoogleScholar/d/2011_Towards%20autonomous%20micro%20UAV%20swarms.pdf>.
26
The US Navy recently tested a swarm of four drone boats: Jeremy Hsu, “US Navy’s Drone Boat Swarm Practices Harbor
Defense,” IEEE Spectrum, December 19, 2016, <https://spectrum.ieee.org/automaton/robotics/military-robots/navy-
drone-boat-swarm-practices-harbor-defense>.
27
Nithin Mathews, Anders Lyhne Christensen, Rehan O’Grady, Francesco Mondada, and Marco Dorigo, “Mergeable Nervous
System for Robots,” Nature Communications, Vol. 8 (2017), <www.nature.com/articles/s41467-017-00109-2>.
28
Milton B. Adams, Janet A. Lepanto, and Mark L. Hanson, “Mixed Initiative Command and Control of Autonomous Air
Vehicles,” Journal of Aerospace Computing, Information, and Communication, Vol. 2, No. 2 (February 2005), <https://
arc.aiaa.org/doi/10.2514/1.12963>.
29
Hocraffer and Nam, “A Meta-analysis of Human–System Interfaces in Unmanned Aerial Vehicle (UAV) Swarm Manage-
ment,” p. 66.
30
Ibid., p. 77
6 Z. KALLENBORN AND P.C. BLEEK
Second, drones en masse, unlike drone swarms, will not be vulnerable to countermeasures
that seek to disrupt inter-drone communication or exploit weaknesses in control algorithms.
Drones en masse will still be vulnerable to disrupting connections between the drones and
the operator, though this communication may use different frequencies or different types of
communication methods than inter-swarm communication. Although a central hub to
collect and disperse data could limit this risk, the use of a central hub would likely
impose range and responsiveness costs and create a vulnerable target to disrupt the drone
swarm. Third, drone swarms will incorporate additional technological complexity over
drones en masse. While commercial-off-the-shelf or do-it-yourself drones can easily be
used en masse, enabling them to communicate and alter behavior autonomously is a signifi-
cant technical challenge. This challenge is likely to be particularly acute for non-state actors,
who are likely to have more limited capabilities.
Drone swarms are also distinct from swarming as a tactic. John Arquilla and David
Ronfeldt define tactical swarming as “seemingly amorphous, but it is a deliberately struc-
tured, coordinated, strategic way to strike from all directions at a particular point or
points, by means of a sustainable pulsing of force and/or fire, close-in as well as from
standoff positions.”31 Given the rich history and apparent importance of swarming as a
tactic, it is striking that the literature on it appears to be rather limited. Swarming has
been employed as a tactic throughout history, long before contemporary development
of unmanned systems. For example, the twelfth- and thirteenth-century Mongols “com-
bined the mobility of the horse with the rapid, long-range fire of their horn bows to
create an imposing ability to swarm either fire or forces.”32
Drone swarms are highly suited to employing swarming tactics, but do not necessarily
need to do so. Members of a drone swarm rapidly share information and coordinate
their actions, enabling them to attack from all directions. The ability of drones within
31
Arquilla and Ronfeldt, “Swarming and the Future of Conflict,” p. vii
32
Ibid, p. 29
NONPROLIFERATION REVIEW 7
CBRN-related roles
Next, we examine the applications of drone swarms to CBRN weapons and defenses,
addressing three categories of applications:
35
DOD, “The Military Critical Technologies List Part II: Weapons of Mass Destruction Technologies (ADA 330102), ‘Chemical
Weapons Technology’,” February 1998, p. II-4-22, <http://fas.org/irp/threat/mctl98-2/mctl98-2.pdf>.
36
Office of Technology Assessment, “Proliferation of Weapons of Mass Destruction,” p. 52
37
Office of Technology Assessment, “Technologies Underlying Weapons of Mass Destruction,” OTA-BP-ISC-115, December
1993, p. 98, <www.au.af.mil/au/awc/awcgate/ota/9344.pdf>.
38
States are likely to differ over the degree of concern, especially as the impacts could be limited. For example, auton-
omous targeting could only be allowed in pre-designated areas where risk of inadvertent harm is minimal.
39
With highly robust targeting algorithms able to alter their dispersion based on local geography, limited payload may not
be a significant concern. Better targeting means less required agent.
NONPROLIFERATION REVIEW 9
off course.40 So, while drone swarms could mitigate some problems, drone swarms are
unlikely to completely mitigate these weaknesses. Similarly, Gregory Koblentz of
George Mason University notes that biological weapons are highly ineffective strategic
deterrents because of uncertain effects, a need for surprise, and the broad availability of
defensive measures.41 Drone swarms would not mitigate these challenges.
Individual drones could also achieve at least some of these benefits. The same environ-
mental sensors could be mounted on a single CB-equipped drone. Individual drones could
also achieve some of the wide-area advantages of drone swarms if drones were launched en
masse. Individual drones are also likely to be cheaper than swarms because they could be
purchased off the shelf without needing the software or hardware to manage the swarming
behavior. These benefits are already being realized with drone-based crop-sprayers to help
farmers in California.42 But drone swarms enable the use of various new tactics and strat-
egies in employing CBRN weapons.
Drone swarms equipped with CB weapons could be pre-positioned within friendly
cities to attack hostile forces. Members of a drone swarm positioned on rooftops could
be activated when invaders arrive, swooping in from all directions to target enemy person-
nel. Such a rapid, unexpected attack would leave little time for adversary forces to don pro-
tective gear to minimize CB-weapon effects. By the time adversaries are prepared, the
drone swarm may have already dispersed.
Drone-swarm delivery systems could enable mixed tactics, incorporating CB weapons
alongside conventional weapons. In a scenario where a drone swarm attacks a massed
group of adversary troops, a few lead drones may attack with a chemical agent. Soldiers
don appropriate protective gear and prepare themselves to respond to a chemical
attack. However, the remaining drones may be equipped with conventional munitions,
striking the soldiers unexpectedly. Such an attack would likely be more effective than a
conventional attack alone, because chemical protective gear inhibits soldiers’ dexterity,
vision, and communication.43 Similarly, a drone-swarm attack equipped with conven-
tional weapons could include a small number of drones equipped with biological
weapons. Those drones might go unrecognized in the confusion of the attack, leaving sol-
diers unaware of their exposure.
The improved targeting, live information, and intra-swarm communication may also
decrease mission-planning and intelligence requirements.44 For example, in certain situ-
ations, it may make sense to allow the drones themselves to select their targets and rely
on automation to prevent confliction and appropriately distribute attacks.45 Mission com-
manders would not need to take significant efforts to plan the exact sequence and pro-
gression of attacks. Further, they might also be able to expend less time and fewer
resources on intelligence collection and analysis prior to an operation because the
40
Perry Hardin and Ryan Jensen, “Small-Scale Unmanned Aerial Vehicles in Environmental Remote Sensing: Challenges and
Opportunities,” GIScience & Remote Sensing, Vol. 48, (2011), pp. 99–111.
41
Gregory D. Koblentz, Living Weapons: Biological Warfare and International Security (Ithaca, NY: Cornell University Press,
2009), p. 39.
42
“Unmanned Drones Used for Spraying to Better Assist Crop Growth,” CBS Sacramento, June 9, 2013, <https://
sacramento.cbslocal.com/2013/06/09/unmanned-drones-used-for-spraying-to-better-assist-crop-growth/>.
43
Bernard J. Fine, “Human Performance of Military Tasks while Wearing Chemical Protective Clothing,” GlobalSecurity.org,
September 23, 2002, <www.globalsecurity.org/wmd/library/report/2002/mopp-human-performance.htm>.
44
David Frelinger, Joel Kvitky, and William Stanley, “Proliferation Autonomous Weapons: An Example of Cooperative
Behavior,” RAND, 1998, p. 19, <www.rand.org/pubs/documented_briefings/DB239.html>.
45
Ibid.
10 Z. KALLENBORN AND P.C. BLEEK
drones could collect some information in situ. Of course, this is unlikely to apply to
nuclear-armed drones because nuclear weapons are unlikely to ever be deployed
without considerable pre-operation planning or removing meaningful human control.
Finally, drone-swarm delivery systems could better survive traditional CBRN delivery
defenses. The CBRN-equipped drone swarm could, for instance, incorporate conven-
tional drones designed to attack adversary defenses: information sharing within the
drone swarm would allow the drones to coordinate these actions so that the convention-
ally armed drones focus on the defensive systems that pose the greatest threat to the
CBRN-armed drone. Similarly, the CBRN-equipped drone swarm could also include
decoy drones designed to absorb attacks from defensive systems. As the number of
drones increases, the likelihood of an adversary successfully defeating the CBRN-
equipped drone would decrease. However, drone-swarm delivery systems may also
create new vulnerabilities.
Drone swarms are more likely than traditional CBRN delivery systems to be more vul-
nerable to cyber- and electronic-warfare attacks because drone swarms significantly
depend on those capabilities to function. Adversaries may also seek to exploit the auton-
omous control of more advanced drone swarms to manipulate their actions.46 In an
extreme scenario, an adversary could manipulate the drone swarm into using CBRN
weapons against a friendly or neutral population. Although these vulnerabilities could
be mitigated, they do mean that drone swarms may have significant reliability concerns.
A reliable delivery system is critical for CBRN weapons to function as strategic deter-
rents. If a target of a CBRN attack is not confident that the threatening state can reliably
carry out the threat, they are unlikely to be deterred. This concern, in part, drove the
United States to develop its nuclear triad—nuclear-armed submarines, nuclear gravity
bombs, and land-based missiles—to ensure it can reliably carry out a nuclear threat
even in the event of an adversary first strike. But specific cyber vulnerabilities, for
example, may not be discovered until the drone swarm is used in a nuclear attack (a
so-called “zero-day” vulnerability that is unknown to cyber defenders prior to an
attack). Thus, even if drone swarms offer significant benefits for CBRN delivery, the
decreased reliability may outweigh the benefits in their use as a strategic deterrent
against a technologically sophisticated adversary.47
But reliability concerns are likely to be less significant against adversaries that lack
sophisticated electronic- or cyber-warfare capabilities. Less militarily capable states, dom-
estic populations, and terrorist organizations may lack the capabilities to effectively exploit
these vulnerabilities. Instead, these actors must rely on traditional CBRN defenses.
Further, states may differ in how concerned they are about decreased reliability, either
believing their cyber- and electronic-warfare defenses are capable enough to minimize
the concern or only using drones in ways where reliability concerns are few. Russia, for
example, is developing an underwater drone that is armed with nuclear weapons.48
46
Paul Scharre, “Counter-Swarm: A Guide to Defeating Robotic Swarms,” War on the Rocks, March 31, 2015, <http://
warontherocks.com/2015/03/counter-swarm-a-guide-to-defeating-robotic-swarms/>.
47
These concerns may also apply to other advanced weapon systems that are susceptible to being hacked; however, drone
swarms inherently require a high degree of autonomy that is likely to make them more susceptible. Intra-swarm com-
munication is also likely to be a vulnerability unique to drone swarms.
48
Valerie Insinna, “Russia’s Nuclear Underwater Drone Is Real and in the Nuclear Posture Review,” Defense News, January
12, 2018, <www.defensenews.com/space/2018/01/12/russias-nuclear-underwater-drone-is-real-and-in-the-nuclear-
posture-review/>.
NONPROLIFERATION REVIEW 11
Defeat defenses
Drone swarms have potential applicability in suppressing or defeating air defenses, missile
defenses, and antisubmarine measures.
Targets may try to defend against CBRN attacks using either active defenses to destroy
or disable the delivery system or passive defenses to limit the damage from successful
usage. The type of defense depends significantly on the CBRN delivery system.
Air defenses such as surface-to-air missiles, antiaircraft artillery, and interceptor air-
craft seek to deny CBRN-equipped aerial delivery systems access to airspace. A successful
air-defense system requires a defender to locate the incoming plane, provide that infor-
mation to the weapon system, and launch a successful attack. Different types of air
defenses may be integrated to increase the likelihood of success.49
Missile defenses seek to prevent missiles from successfully reaching their targets. In
addition to traditional ballistic-missile defenses systems—composed of radar and inter-
ceptor missiles—there are several other missile-defense systems, as discussed in Ashton
Carter’s definitive 1984 summary, including those that: spread projectiles into the path
of the missile just prior to arrival at a target, rely on buried nuclear bombs that launch
clouds of dust into the air when detonated, fly small rockets through space (exoatmo-
spheric or “overlay” midcourse systems), or use advanced weapons such as lasers or par-
ticle beams to strike the missile in its boost phase.50 Several of these concepts have had
significant difficulty translating to operational reality, such as space-based rockets or
laser-based missile defenses. Nonetheless, development appears to be continuing.51
Missile defenses may be either static—typically guarding large areas—or mobile, with typi-
cally shorter range to defend particular targets.
Antisubmarine measures include aerial, surface, and undersea assets designed to locate
and/or strike adversary submarines equipped with nuclear ballistic or cruise missiles. Sub-
marine warfare, in general, is a “hider–finder” competition in which submarines hide
from antisubmarine forces in the vastness of the ocean.52 Attack submarines are particularly
effective in striking adversary submarines, though are less effective at searching for them.53
Helicopters, aerial drones, and land- or carrier-based fixed-wing aircraft are able to survey
far greater areas far more quickly but cannot strike as effectively.54 Surface ships may serve as
platforms for antisubmarine helicopters, drones, and sensors.55 An effective overall capa-
bility is achieved by integrating all of these systems together.
Drone swarms could be used to strike or disable defensive detection, communication,
and weapon systems. Drones within the swarm could be equipped with electronic- or
cyber-warfare payloads to degrade adversary detection systems. In these roles, as others
have argued, drone swarms offer significant operational advantages including: low
49
James Brungess, Setting the Context: Suppression of Enemy Air Defenses and Joint War Fighting in an Uncertain World
(Maxwell Air Force Base, AL: Air University Press, 1994), <www.dtic.mil/dtic/tr/fulltext/u2/a421980.pdf>.
50
Ashton B. Carter, “Introduction,” in Ashton B. Carter and David N. Schwartz, eds., Ballistic Missile Defense (Washington, DC:
Brookings Institution, 1984), p. 9.
51
Thomas G. Roberts, “Why a Space-Based Missile Interceptor System Is Not Viable,” Bulletin of the Atomic Scientists, Vol. 74,
No. 4 (2018), <https://thebulletin.org/2018/06/why-a-space-based-missile-interceptor-system-is-not-viable/>; Jeff
Hecht, “Laser Weapons Not Ready for Missile Defense,” IEEE Spectrum, September 27, 2017, <https://spectrum.ieee.
org/tech-talk/aerospace/military/no-quick-laser-missile-defense>.
52
Clark, “The Emerging Era in Undersea Warfare,” p. 2.
53
Timothy Ketter, “Anti-submarine Warfare in the 21st Century,” Naval War College, May 20, 2004, p. 9.
54
Ibid.
55
Ibid.
12 Z. KALLENBORN AND P.C. BLEEK
power requirements, low observability, reduced mission risk, high operational flexibility,
mission sustainability, cost effectiveness, and psychological effectiveness.56 The cost effec-
tiveness of drone swarms is likely to be a significant advantage in suppressing enemy air
defenses, capabilities that the United States has generally neglected since the 1991 Gulf
War.57 However, some technological challenges first need to be mastered, including
effective geolocation, synchronizing antennae, and managing the airspace.58 In addition
to or in lieu of jamming defensive systems, drones could be equipped with antiradiation,
antiship, or regular missiles to strike defensive systems. Swarms of drones could coordi-
nate their fire, striking multiple targets at once. Drone swarms could be particularly
effective in targeting mobile defensive systems because dispersed sensor drones could
search for those systems. This is significant because mobile air defenses tend to be
more difficult to counter than static ones.59 Similarly, as John Benedict argues, “without
reliable, timely, and accurate surveillance cues and reliable weapons, [antisubmarine
warfare] becomes a very hard, inefficient, and asset-intensive game.”60 Defense suppres-
sion swarms could also incorporate decoy drones to draw the attention and/or fire of
defender detector and weapon systems.61
Drone swarms may serve as decoys to create false signatures of a CBRN delivery
system’s presence.62 During Israel’s Bekaa Valley campaign against Syria, the Israeli
military equipped reflectors to individual decoy drones to emulate the radar signatures
of Israeli attack aircraft.63 The Syrian military wasted large numbers of surface-to-air
missiles against the drones, providing the Israelis with an opportunity to attack while
the Syrians reloaded.64 Used in this manner, drone swarms could offer additional capa-
bility. The decoy drones could use time delays to trick defender radar systems into
believing an aircraft was at a range beyond the swarm itself.65 Further, drone swarms
could fly in complex formations, more akin to traditional aircraft. Increased autonomy
may also enable a drone swarm to travel alongside a CBRN delivery system, decreasing
the likelihood of a defender successfully downing the CBRN-equipped system and/or
providing real-time defense.
In CBRN competition, these applications favor the defender by lowering the likelihood
of successful attack. Both standoff detection and defeating CBRN delivery systems make it
more difficult to successfully employ CBRN weapons.
targets in its recent wars; thus, missile mobility is of key importance.”71 The wide-area search
ability and relatively low cost of drone swarms could be particularly effective in searching for
TELs, especially because the cost of losing some drones within the swarm is small compared
with the loss of a manned aircraft. Further, the unique shape of TELs may make them particu-
larly suited to automated image recognition because false positives will be less likely. Once a
TEL is identified, swarms could either send the information about the TEL location back to
other strike forces or incorporate attack drones to eliminate the TEL.
Mixed swarms of undersea, surface, and aerial drones could be used as advanced anti-
submarine platforms to identify and/or eliminate nuclear-armed ballistic or cruise-
missile-carrying submarines. Already, the US military is pursuing autonomous antisub-
marine capabilities. The Defense Advanced Research Projects Agency (DARPA) is cur-
rently developing an Anti-Submarine Warfare Continuous Trail Unmanned Vehicle for
tracking diesel-electric submarines from the surface.72 Autonomous communication
between unmanned surface, undersea, and aerial vehicles would enable much wider net-
works, increasing the coverage of surveillance and relaying information for attack.73 The
sensors within that network could be a combination of mobile (equipped to the drone) or
static (distributed by the drone) sensors.74
Drone swarms could also mount attacks on submarine bases. Such an attack may seek
to destroy a nuclear-weapon-armed submarine while it is in port or disable port oper-
ations to inhibit resupply or maintenance. This would be particularly significant for
states with a limited number of submarine bases. The United Kingdom, for example,
has only a single nuclear submarine base: Her Majesty’s Naval Base, Clyde. A massive
drone-swarm attack on the base could significantly weaken—even suspend the operation
of—the UK sea-based deterrent.
Drone swarms could also be used to counter other drone swarms armed with CBRN
weapons. In some respects, drone swarms are effective counters to drone swarms
because they are low cost and effective at striking many targets at once. To that end,
DARPA and the US Naval Postgraduate School are exploring swarm vs. swarm combat
to develop new concepts of operations and tactics.75
In addition to targeting delivery systems, drone swarms could target CBRN command-
and-control systems through direct strike on facilities and personnel, or electronic- or
cyber-warfare attacks on facility communication and computer systems. Drone swarms
could be used to strike fixed CBRN command-and-control systems or mobile platforms
such as the United States’s E-6B Mercury. Or drone swarms could be used in targeted
strikes on the personnel involved with CBRN systems, including those in a state’s
nuclear command authority. Drone swarms may also serve as platforms for cyber- or elec-
tronic-warfare payloads to prevent CBRN launch orders from being delivered. Such a
71
William F. Bell, “Have Adversary Missiles Become a Revolution in Military Affairs?” Air & Space Power Journal, Vol. 28, No. 5
(2014), p. 53.
72
Alexander M. G. Walan, “Anti-submarine Warfare (ASW) Continuous Trail Unmanned Vehicle (ACTUV),” DARPA, <www.
darpa.mil/program/anti-submarine-warfare-continuous-trail-unmanned-vessel>.
73
Clark, “The Emerging Era in Undersea Warfare,” p. 16.
74
Kathleen Hicks, Andrew Metrick, Lisa Sawyer Samp, and Kathleen Weinberger, “Undersea Warfare in Northern Europe,”
Center for Strategic and International Studies, July 2016, pp. 36–37, <http://csis-prod.s3.amazonaws.com/s3fs-public/
publication/160721_Hicks_UnderseaWarfare_Web.pdf>.
75
Chung et. al., “50 vs. 50 by 2015.” “Service Academies Swarm Challenge Pushes the Boundaries of Autonomous Swarm
Capabilities,” DARPA, May 11, 2017, <www.darpa.mil/news-events/2017-05-11>.
NONPROLIFERATION REVIEW 15
drone swarm would also need to ensure that its offensive activities do not inhibit the
swarm itself. For all these applications, the primary advantage of drone swarms is in
their broad area coverage: jammer-equipped swarms could spread broadly over a
command-and-control facility; armed swarms could strike multiple targets at once, satur-
ating a base’s defenses; and drones could spread out to search for possible personnel
targets, while sensing drones monitor for possible threats to the swarm.
76
Gary W. Phillips, David J. Nagel, and Timothy Coffey, “A Primer on the Detection of Nuclear and Radiological Weapons,”
National Defense University Center for Technology and National Security Policy, July 2005, <large.stanford.edu/courses/
2011/ph241/keller1/docs/phillips.pdf>.
77
Dana A. Shea and Sarah A. Lister, “The BioWatch Program: Detection of Bioterrorism,” Congressional Research Service,
November 19, 2003.
78
Richard T. Kouzes, Edward R. Siciliano, James H. Ely, Paul E. Keller, and Ronald J. McConn, “Passive Neutron Detection for
Interdiction of Nuclear Materials at Borders,” Nuclear Instruments and Methods in Physics Research A, Vol. 584, Nos. 2–3
(2008), pp. 383–400.
79
Ibid.
80
Committee on R&D Needs for Improving Civilian Medical Response to Chemical and Biological Terrorism Incidents,
Chemical and Biological Terrorism: Research and Development to Improve Civilian Medical Response (Washington, DC:
National Academies Press, 1999).
81
Ibid.
82
Committee on PCR Standards for the BioWatch Program, BioWatch PCR Assays: Building Confidence, Ensuring Reliability:
Abbreviated Version (Washington, DC: National Academies Press, 2015), p. 25.
83
Ibid.
16 Z. KALLENBORN AND P.C. BLEEK
CBRN detection techniques are not well suited for mobile detectors because of their size
and human requirements.
Air- or ground-based drones could serve as platforms for mobile detectors. Because
detector drones would likely operate primarily in urban or otherwise crowded environ-
ments, drones would need to be small, thereby also limiting detector size. Some already
developed detectors could conceivably be used for these purposes and the US Department
of Homeland Security (DHS) is reportedly testing small drones equipped with sensors for
detecting chemical or radical incidents.84 Ground-based drones are unlikely to have sig-
nificant payload concerns; however, they may be less readily deployable due to inaccessible
terrain. Ground-based drones could also serve as carriers for air-based detection drones,
providing transportation, limited hazard detection (e.g. checking for open space), and
recharging capabilities. The exact operation of the detector drones and feasibility of
different approaches depend significantly on the type of CBRN material searched for
owing to differences in how the detectors operate.
Intra-swarm communication enables sophisticated search patterns. Control algorithms
could prioritize flights over specific areas during high-traffic periods. For example, drones
could be programmed to overfly Washington, DC’s Key Bridge during the evening
commute, a notably congested roadway, which non-state actors could perceive as a desir-
able CBRN target.85 Similarly, swarms could be programmed to frequently change their
routes to mitigate the risk of adversaries anticipating and defeating detection.
Further, intra-swarm communication could help mitigate false positives. If a drone
detects a possible CBRN agent, it could relay a request for a secondary inspection.
Another drone in the swarm may reroute to the area or back-up drones could be activated
and deployed. If the second drone fails to confirm the positive detection, the drones may
return to their previous routing. If the second drone confirms the positive detection, it may
relay the detection to human emergency responders to deploy to the scene.
In cities, CBRN-sensing drones could be incorporated into broader “security swarms”
that provide multi-threat defenses. For example, in addition to CBRN detection, a security
swarm could incorporate drones dedicated to counter-drone operations; drones dedicated
to identifying and neutralizing drones used by hostile actors. A security swarm could also
include facial recognition to identify wanted individuals or general plume-detection capa-
bilities to identify burning buildings.
However, city-based swarms would likely entail significant public concerns. The public
may be unsettled by regularly seeing drones flying above them, especially as current drones
often have a unique buzzing sound. Similarly, the public may raise privacy concerns over
potential recording equipment on the platform.86 Some people may be concerned about
government surveillance, while others may be concerned about nefarious actors acquiring
access to video feeds.
Any such system would need effective cyber security measures to ensure actors are
unable to exploit security swarms for negative ends. They may seek to access data
84
BioPrepWatch Reports, “DHS Testing Drone Sensors with CBRN-Detection Capability,” BioPrepWatch, March 11, 2013,
<https://bioprepwatch.com/stories/510510077-dhs-testing-drone-sensors-with-cbrn-detection-capabilitya>.
85
Jack Moore, “When and Where You’ll Find the Worst Traffic Congestion in DC,” WTOP, February 13, 2017, <https://wtop.
com/dc-transit/2017/02/dc-traffic-congestion-worst/>
86
Heather Roff, “Banning and Regulating Autonomous Weapons,” Bulletin of the Atomic Scientists, November 24, 2015,
<http://thebulletin.org/autonomous-weapons-civilian-safety-and-regulation-versus-prohibition/banning-and-
regulating-autonomous-weapons>.
NONPROLIFERATION REVIEW 17
streams to identify possible targets, take control of the system to destroy it, use it as a
weapon (e.g. flying the drone into a building or person), or inhibit effective incident
response. While certain methods of deployment and usage may mitigate some risk (e.g.
only deploying a detection swarm during an incident), cyber security is still likely to be
a significant concern.
While drones may have minimal up-time owing to limited battery life, platform main-
tenance, and harsh environmental conditions, advances in drone, battery, and automation
technology may allay these problems. For example, a recent study demonstrated drones
are capable of charging on power-lines and via an inductive charging pad.87 Autonomous
drones could also be programmed to return to designated maintenance areas after a given
time period or after an internal self-check has identified a problem. Similarly, drones could
be programmed to return to protected areas in the event of hazardous weather.
Aerial drone swarms will also likely have the added challenge of avoiding potential
hazards from every direction, especially in a city. Depending on drone routing, a detection
drone would need to avoid birds, open windows and doors, stoplights, streetlights, falling
objects, trees, and other hazards. Some success has already been demonstrated in fully
autonomous flight, such as the US Marine Corps’ successful recent tests of a fully auton-
omous helicopter.88 These same technologies could also be quite useful in cleaning up after
a successful CBRN attack.
overall impact of successful CBRN usage on the defender, especially for radiological
weapons that rely on long-term damage to inflict harm.
Single drones, drones en masse, and drone swarms could all be highly useful in decon-
taminating after a CBRN attack, drone swarms providing the most capability. As
Matthew Jonkey argues: drones could limit risks to human exposure, provide better
information on injured people, assess the “parameters of the incident” (identify
source, incident size, and plume activity), deploy quickly, and be relatively inexpen-
sive.92 In general, drones can be used to clean up the material or support decontamina-
tion through improved situational awareness.
Drones can be tasked directly to clean CBRN-contaminated material. Robots with
CBRN decontamination capabilities could readily spread over areas broadly impacted
by CBRN weapons. Drones, unlike humans, would likely not risk harm from the CBRN
material itself and so would not need sophisticated protective equipment that also inhibits
mobility. That may be especially advantageous in wartime conditions because friendly sol-
diers would not be put in an exposed position.
Drones and drone swarms are also likely to be useful in a support capacity to assess
the spread of material. Drones equipped with cameras and other sensors can provide
real-time video and thermal imaging to help responders deploy resources, identify
risks, and build common situational understanding.93 In a CBRN disaster or successful
usage on the battlefield, this information would be particularly useful in, among other
things, determining the need for CBRN medical countermeasures based on improved
assessments of the number of harmed people and the degree of restrictions on friendly
military mobility.
Initial mathematical modeling has demonstrated significant monitoring potential for
drones en masse in detecting the perimeter of oil spills, a similar type of problem.94
However, as the authors note, the drones “must be able to detect and follow pollutants
that can change and move in time mainly by the action of advection and diffusion.”95
The dynamics of detecting and following CBRN pollutants, as opposed to spilled oil,
are different and will depend significantly on the type of CBRN agent and where and
how the agent is released.
While single drones can accomplish many of these functions as well as drone swarms,
drone swarms would offer additional capability. In large-scale or catastrophic CBRN
usage, the affected area is likely to evolve and expand rapidly. Drone swarms are likely
better equipped to handle the situation because they will be able to respond more auton-
omously and rapidly. Further, a significant CBRN event is also likely to seriously challenge
existing resources, including the availability of drone pilots and support personnel. The
ability of drone swarms to coordinate their actions would decrease personnel requirements
both for drone operation and for planning and coordination.
92
Matthew J. Jonkey, “Seeing Eye Drones: How the DOD Can Transform CBRN and Disaster Response in the Homeland,”
Naval Postgraduate School, December 2016, <https://calhoun.nps.edu/handle/10945/51728>.
93
“Resource Typing Definition for Response Situational Assessment: Unmanned Aircraft System Team,” Federal
Emergency Management Agency, September 2017, <www.fema.gov/media-library-data/1516899610187-b1d4c358ca571
fb6f2efa9c4d67811a5/NIMS_509_2_TechnicalSpecialist(UAS).pdf>.
94
The authors of the study refer to their system as a “drone swarm,” but their description makes clear the drones do not
exchange information. F. Azner, M. Sempere, M. Pujol, R. Rizo, and M.J. Pujol “Modeling Oil-Spill Detection with Swarm
Drones,” Abstract and Applied Analysis, Vol. 2014, (2014), <www.hindawi.com/journals/aaa/2014/949407>.
95
Ibid, p. 3.
NONPROLIFERATION REVIEW 19
The rarity of CBRN events is likely to create development challenges for any auton-
omous drone system tasked with CBRN response. The rarity of events means little past
data will be available to train algorithms to recognize CBRN activity. This challenge
could be mitigated through experimentation and the use of CBRN agent simulants, but
this may be insufficient, because actual CBRN usage may occur in environments with
unforeseen complications.
. Export-control agencies should consider how and whether to limit the export of drone
swarms and control technology. Because drone swarms have potential non-military
applications such as environmental monitoring, there is a need to identify factors
that separate military vs. non-military swarms.
. Defense ministries should continue to expand their ongoing research on developing
swarms. This work should especially focus on (1) incorporating swarming behavior
into existing unmanned systems, (2) the development of multi-domain and
96
Of course, new norms and treaties against drone swarms and autonomous weapons could be developed in the future.
The nascent Campaign to Stop Killer Robots seeks to pre-emptively outlaw autonomous weapons, which would include
fully autonomous drone swarms.
20 Z. KALLENBORN AND P.C. BLEEK
heterogeneous swarms, and (3) the development of methods and techniques for creat-
ing interoperable drones that can be readily swapped into or out of a drone swarm. The
US DOD specifically should also include drone-swarm-control technology as a signifi-
cant line of effort for its new Joint Artificial Intelligence Office.97 Defense ministries
should also explore and evaluate methods of defending against mixed conventional
and CBRN swarm threats. Nuclear-armed states should evaluate the risks of drone-
swarm attacks at scale on missile silos and explore and evaluate potential methods
for defending them. Air forces should consider investing in drone swarms to
enhance their capability to suppress enemy air defenses, supporting both nuclear and
conventional aircraft. And navies should explore and evaluate potential drone-swarm
threats to critical naval ports. Missile-defense agencies should investigate the feasibility
of using drone swarms to protect against incoming missiles, how large such drones
would need to be, and how few drones are needed to make a missile-defense swarm
cost efficient.
. Domestic security agencies and departments should explore the potential avenues for
state or non-state actors to exploit drone swarm technology to attack critical infrastruc-
ture. Domestic security agencies should especially explore to what extent airports,
chemical facilities, and nuclear facilities are equipped to address aerial drone threats
generally, especially large numbers of drones, and how current defenses can be
improved. The US DHS should also invest in drone-swarm technology that could be
used for standoff CBRN detection through the National Nuclear Security Adminis-
tration, the Robotic Aircraft Safety Program, and other programs. In addition to
funding platform creation, this research should especially focus on the development
of effective miniaturized CBRN sensors that can be mounted on a small drone. Dom-
estic security agencies should develop and evaluate security swarms that combine a
variety of sensors and capabilities relevant to public security, including but not
limited to: counter-drone capabilities, fire identification, facial recognition, and
CBRN standoff detection. Emergency response agencies should also develop and evalu-
ate drone swarms for CBRN response and cleanup.
. Law enforcement agencies should explore and evaluate the potential for terrorist and
other nefarious actors to acquire and use drone swarm technology. Although this analy-
sis should include the use of drone swarms in a CBRN attack, it should focus on con-
ventionally armed drone swarms because those are likely to be comparatively easy for
non-state actors to acquire. They should also explore the feasibility and potential
methods of back-tracing downed drones to the original swarm.
. Foreign ministries should work with international partners to evaluate the merits and
potential methods of limiting the proliferation of CBRN-relevant drone swarms. This
should include both modifying current international treaties and the potential for
new ones.
. Parties to international treaties that cover delivery systems for CBRN weapons should
discuss how and whether those treaties could or should incorporate drone-swarm tech-
nology. Although a treaty may restrict drones generally, it may not account for the
implications of swarming. For example, the Missile Technology Control Regime
97
Billy Mitchell, “Pentagon Launching Joint Office Focused on Artificial Intelligence,” FedScoop, April 13, 2018, <www.
fedscoop.com/pentagon-launching-joint-office-focused-artificial-intelligence/>.
NONPROLIFERATION REVIEW 21
restricts the export of aerial drones that both have a range above 300 kilometers and
carry at least a 500-kilogram payload but does not appear to restrict long-range
swarms of drones functioning as a single unit that achieve a greater-than-500-kilogram
payload in aggregate.
The timeline and feasibility of these drone-swarm applications may vary, but the swarms
are coming. Are we ready?
ORCID
Zachary Kallenborn http://orcid.org/0000-0002-4642-1658
Philipp C. Bleek http://orcid.org/0000-0003-2877-6225