Special Operator lying in cover on the side of a dirt track calling in tactical coordinates using his walkie and his tactical laptop.

Sneaky Tactics Enabled by US SOCOM To Challenge Drones

Special operations units in the military have several things in common with the intelligence community. The most striking aspect of both specialities is the inherent need for effective sneakiness. This is common to all conflict parties, which is why air power is still so highly rated. With drone effectiveness proven in Ukraine as a weapon, US Special Operations (via SOCOM) is now tasked with developing a tactical solution to this new threat.

The concept of threat response is not singular to the United States, and special operations solutioning is nothing new. Air power became a dominant military factor in World War 2. The then, newly minted ‘L detachment’ of the British SAS proved the conceptual use of special operations as a threat response in addressing air power.

British SAS Lead The Way

In 1941, Sergeant Du Vivier led a daring SAS raid in Ajdabiya, Libya. He, along with four other operators, infiltrated a German base and blew up 37 German warplanes on the ground. The raid was a hallmark mission for senior British officers. They approved of the results the SAS provided through their novel tactics. The SAS went onto chalk up more successes throughout the war, which materially reduced German air power at often critical junctures.

Moving back to the current day. SOCOM in the United States has tasked its special operations community to solution a threat response to drone attacks. Innovative disrupter technology, like drones, present a now proven threat. Instead of falling back on old bias, SOCOM is following the lead of those like the British SAS by seeking an innovative solution for this new threat.

From Terror to Valor: Echoes and Shadows, available on pre-order for September 11th release.

SOCOM makes a good choice for this task, given their vast experience in special operations, including counterterrorism and other asymmetrical operations. Militarized drones in Ukraine, and their effective use by the Houthis in Yeman, are good reasons to plan a threat response solution in this case.

While others focus on the threat from drones in the air (aka. right-of-launch), SOCOM will focus on the drone network (aka. left-of-launch). Like the British SAS destroying German air power in World War 2; SOCOM’s tasking will be the development of tactics, techniques, and skills to enable the effective destruction of adversary drone-launch capability.

Effective Sneakiness And SOCOM

While we will not be privy to what SOCOM comes up with, the need for effective sneakiness will undoubtably be an integral part of any new tactics used by US Special Operations. This creative process may seem like a waste of resources, but it has proven its effectiveness many times over.

In an active time of aggression, adversarial posturing, and malicious intent, nations who view democracy as a threat are engaged in their own version of this process. They do not apologize for it, as they do not feel the need. I would support this position for all democratic nations, who have become, by default, a target. Been effectively sneaky can change governments, destroy societies, and conquer the lands of those targeted.

The same is true for the free-peoples of these lands. They can use the same concept to protect themselves and secure the future of their children’s children. Only when we free ourselves of the chains that bind the notion we ‘own’ anything in this world can we cooperate as a species for the betterment of all. It’s my view that such a day is many generations away. Until then, we need to make do with the reality we got, and keep the door open towards a better future.

About the Author

John is a versatile author known for his gripping fiction narratives in the thriller, action, and suspense genres. With a background as a journalist since 2016, and expertise in cloud technologies as an engineer; John brings a unique blend of storytelling prowess and technical acumen to his work.

Community Newsletter

Put your feet up and let us do the hard work for you. Sign up directly for blog news, news related to the theme of John's novels and more.

We’ll never send you spam or share your email address.
Find out more in our Privacy Policy.

Scroll to Top
x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
Shield Security