Public intelligence warnings are only useful if the system that receives them can act. History shows that accurate indicators can be ignored, misinterpreted, or neutralized by organizational habits. That is not a partisan observation. It is a blunt fact that should guide how the United States prepares for asymmetric threats today.
Lessons from past intelligence failures are simple and uncomfortable. Analysts will collect signals. Leaders will form a prevailing concept of the threat. If the concept calcifies, discordant warnings get discounted. The result is not a single bad report. It is a predictable organizational failure that turns discrete misses into strategic surprise. The 9/11 Commission and subsequent studies of surprise attacks make the same point: process matters as much as collection.
We are living in a different threat environment than the one that produced those old lessons. Cheap, capable technology has shifted the economics of attack. Small unmanned systems that once required state investment are now ubiquitous, affordable, and adaptable. The Congressional Research Service cataloged how unmanned aircraft systems have evolved into core battlefield tools with growing dual use civilian and military roles. That matters because proliferation lowers the threshold for threat actors to project force.
Non-state actors and irregular forces are not waiting for permission to test those capabilities. Open source reporting and expert analysis have documented widespread adaptation of commercial drones for reconnaissance, payload delivery, and one way strike missions. Countermeasures exist, but many are expensive, hard to scale, or simply unsuitable against swarms and autonomous waypoint missions. The mismatch between low cost offensive tools and high cost defensive systems creates a vulnerability that adversaries will seek to exploit.
Translate that into operational risk. A hostile group with modern communications tradecraft, a modest inventory of fixed wing or rotary drones, basic electronic warfare tools, and a plan that prepositions personnel and targets can generate shock disproportionate to its size. Warning indicators for such a plan exist. They include unusual training patterns, movement of fighters to staging areas, pre-surveyed routes and target lists, and logistical preparations. The failure mode we should fear is not just missed collection. It is an analytic culture that explains those indicators away because the scenario is uncomfortable or unlikely. Historical precedent shows that culture can be the biggest single risk.
What should the United States do about it now? First, treat low-cost technologies as strategic. Defensive procurement, doctrine, and force posture must accept that asymmetric tools are operationally relevant. That means accelerating affordable counter-UAS systems for forward forces and critical infrastructure, scaling electronic warfare and non-kinetic options, and funding distributed sensor networks that can detect small, low-altitude threats before they are over a target. Congress has already laid out the problem space for UAS missions and countermeasures. The next step is speed and modularity in acquisition.
Second, fix the warning pipeline. Independent red teams and formal devil’s advocate roles are not academic luxuries. They must be empowered, resourced, and routinely integrated into assessments at tactical and strategic levels. Red teams must feed decision makers with worst case plausible scenarios and a clear statement of indicator thresholds that should trigger action. Lessons from past failures show that such mechanisms atrophy without institutional backing. That will not happen without explicit policy and oversight.
Third, harden the homeland and critical systems now. Cyber and physical infrastructures are increasingly intertwined. CISA and GAO reporting over the last year underscore the ongoing vulnerabilities in critical infrastructure and the need for shared, timely incident reporting and mitigation assistance between private operators and federal partners. The homeland defense posture must include stronger fusion between intelligence on kinetic threats and cyber threat intelligence, because adversaries will combine vectors to create cascades.
Fourth, stop treating countermeasures as platform stovepipes. The problem is not only detection hardware. It is data fusion, command and control, rules of engagement for non-kinetic methods, and legal authorities to act quickly when indicators cross a threshold. Fielded counter-UAS kits must be interoperable, portable, and affordable. Supply chains must be resilient so that theater commanders and civil authorities can buy and deploy systems without long bureaucratic waits. This requires policy changes to procurement and clearer delegation of responsibilities between DOD, DHS, and state and local partners.
Fifth, invest in the human side of warning. Training for managers and senior leaders must emphasize cognitive humility. Promote policies that reward dissenting analysis, and build accountability for leaders who ignore credible warnings. Fixing organizational culture is harder than buying equipment. It takes leadership, oversight, and routine exercises that simulate high ambiguity. The US intelligence community has made reforms since 9/11. The point now is to ensure those reforms are operational across theaters and across the civil-military divide.
Finally, exercise with the private sector. Much of America’s critical infrastructure is owned and operated outside government. Realistic drills, shared playbooks for drone swarm incidents, and rapid information sharing are not optional. They are the backbone of deterrence in a world where simple tools can produce large effects. Federal agencies must make assistance predictable, fast, and concrete so that private operators will both share data and harden systems proactively. Recent federal reviews and year in review reporting from CISA document both progress and continuing gaps in those partnerships.
Facts matter and so do action timelines. Intelligence collection without adaptive analysis and rapid, modular defenses is a recipe for surprise. The United States has the technical capacity to blunt these threats. The remaining gaps are bureaucratic and cultural. Fixing them requires urgency, not more study. If we want warnings to matter, we must change the incentives that decide which warnings become policy.