<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[FYSA]]></title><description><![CDATA[Essays for warfighters, civilians at the Pentagon, fellow defense tech builders, and industry observers the unfiltered truth about the most complicated issues confronting global defense.]]></description><link>https://www.fysa.org</link><image><url>https://substackcdn.com/image/fetch/$s_!bRRb!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1933aef9-965c-42b1-87dd-94906a8ff9f5_375x375.png</url><title>FYSA</title><link>https://www.fysa.org</link></image><generator>Substack</generator><lastBuildDate>Tue, 05 May 2026 12:00:03 GMT</lastBuildDate><atom:link href="https://www.fysa.org/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[James Boyd]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[jamesboyd208828@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[jamesboyd208828@substack.com]]></itunes:email><itunes:name><![CDATA[James Boyd]]></itunes:name></itunes:owner><itunes:author><![CDATA[James Boyd]]></itunes:author><googleplay:owner><![CDATA[jamesboyd208828@substack.com]]></googleplay:owner><googleplay:email><![CDATA[jamesboyd208828@substack.com]]></googleplay:email><googleplay:author><![CDATA[James Boyd]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[The operational fabric of Fifth Generation Warfare (5GW)]]></title><description><![CDATA[Atlas: Decentralized, software-defined infrastructure]]></description><link>https://www.fysa.org/p/the-operational-fabric-of-fifth-generation</link><guid isPermaLink="false">https://www.fysa.org/p/the-operational-fabric-of-fifth-generation</guid><dc:creator><![CDATA[Andrew Ehrlich]]></dc:creator><pubDate>Mon, 02 Mar 2026 17:44:58 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/c2b9ef5d-fe3b-4745-92cb-ab8a804f0800_2121x1414.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>This is the first guest essay on FYSA, courtesy of Adyton&#8217;s Head of Product <a href="https://www.linkedin.com/in/andrew-ehrlich/">Andrew Ehrlich</a>. Andrew is a proud Marine Corps veteran who brings a warfighter mindset to technology. He specializes in product management, strategy, and execution with a track record of building and scaling zero-to-one products across B2B, B2C, and B2G verticals.</em></p><h2>0. Modern war</h2><p>In the last FYSA essay, <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;James Boyd&quot;,&quot;id&quot;:48213708,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2445736e-63a1-4b17-9235-7600c0013c1d_989x989.jpeg&quot;,&quot;uuid&quot;:&quot;68c4e29f-57e3-4a84-a787-07bf65c08162&quot;}" data-component-name="MentionToDOM"></span> wrote about <a href="https://www.fysa.org/p/the-stack-of-power">The Stack of Power</a>. It is the mental model through which the reality of modern war can be understood: the idea that war is confined to declared hostilities, uniformed forces, or discrete phases of peace and combat is, as James wrote, &#8220;a foundationally insufficient view of and expression of power. &#8220;</p><p>Instead, it unfolds continuously across civilian infrastructure, administrative systems, information environments, partner forces, and public institutions. This often happens long before the first shot is fired.</p><p>Advantage no longer accrues solely to the actor with superior weapons or platforms. It accrues to the actor whose systems remain coherent under pressure: whose people can communicate, coordinate, and decide even when networks are degraded, trust boundaries are unclear, and centralized control is contested.</p><p>This is Fifth Generation Warfare (5GW): conflict defined not just by capability, but by resilience of coordination.</p><p>I view Fifth Generation Warfare through the combined lens of an operator and a product builder. After nearly seven years in the Marine Corps, I&#8217;ve seen how quickly coherence breaks down when communications fragment and decision authority blurs. In the private sector, building products at Amazon, Spotify, and Blend Labs, and now as Head of Product at Adyton, I&#8217;ve learned how resilient systems are intentionally designed: how identity, trust, synchronization, and user workflows must be architected, not assumed.</p><p>The defining challenge of 5GW is not just tactical lethality alone. It is maintaining system coherence under pressure. That is a product challenge as much as it is a military one.</p><p>5GW cannot be addressed with role-specific or phase-specific tools. It requires a single operational fabric capable of functioning across the full spectrum of modern conflict &#8212; from steady-state operations to the tactical edge, and into the society in between.</p><p>It is important that technologists who are building for the Department of War do so in a manner that delivers products to warfighters that align with the modern national security mission. To that end, I want to provide transparency into what we&#8217;re building at Adyton and why, against the backdrop of James Boyd&#8217;s <a href="https://www.fysa.org/p/the-stack-of-power">Stack of Power</a> and within the broader context  of Fifth Generation Warfare.</p><p>5GW isn&#8217;t hypothetical. Its defining characteristics are on display in Europe, a living laboratory of &#8220;all-of-society&#8221; conflict. Observing these realities, we&#8217;ve built AOK to enable military forces, partners, and public safety institutions to operate as a coherent system, even in the face of persistent competition.</p><h2>1. Fifth Generation Warfare and the collapse of phase-based conflict</h2><p>Fifth Generation Warfare fundamentally shifts how conflict is manifested and how power is contested.</p><p>Unlike earlier generations of warfare &#8212; defined by maneuver, firepower, or information dominance &#8212; 5GW is characterized by ambiguity, civilian-military entanglement, and systems disruption.</p><p>Conflict is no longer bounded by clear transitions between peace and war. It does not begin with mobilization orders or end with ceasefires. Instead, it unfolds continuously across economic systems, information networks, administrative processes, and civilian institutions. The objective is not the seizure of terrain, but the erosion of cohesion: trust in institutions, confidence in leadership, and the ability of societies to act collectively under pressure.</p><p>In this paradigm, traditional distinctions collapse. Civilian and military systems are interdependent by default. Logistics, communications, and personnel workflows &#8212; once considered rear-area functions &#8212; become active surfaces of conflict.</p><p>Adversaries operating in this space seek advantage not through decisive engagements, but through exploitation at the seams: Between organizations, between authorities, and between centralized command structures and decentralized actors. The more fragmented the system, the greater the opportunity to disrupt it.</p><p>Critically, 5GW expands the cognitive dimension of conflict. Human decision-makers now operate alongside autonomous systems, sensors, and unmanned platforms that continuously generate, relay, and act independently on information, augmenting how decisions are formed, distributed, and executed. Perception, coordination, and tempo are decisive. The challenge is no longer access to data, but the ability to integrate human intent with machine-generated insight across a dynamic battlespace.</p><p>In 5GW, advantage accrues not to the actor with the most advanced tools, but to the one whose systems are unified across the conflict spectrum.</p><h4>1.1 From total war to &#8220;all-of-society&#8221; defense</h4><p>The idea that societies must mobilize in wartime is not new. During the industrial wars of the twentieth century, victory depended on the ability <a href="https://www.firstbreakfast.com/i/175489110/total-spectrum-warfare">to convert civilian industry into military capacity</a>. Factories became arsenals; logistics networks became lifelines.</p><p>Today, the nature of mobilization itself has changed.</p><p>In modern conflict, resilience is no longer generated primarily through industrial output. It is generated through coordination, trust, and collaborative operations across military, civilian, and private-sector systems. The battlefield has expanded into society, and deterrence depends on whether that society can absorb shocks without fragmenting.</p><p>This reality has driven a shift toward all-of-society defense models across NATO and allied nations. Under these frameworks, civilian government agencies, private infrastructure operators, public safety organizations, and partner forces are no longer supporting actors. They are operational participants.</p><p>Public safety agencies, emergency responders, and infrastructure operators now operate under conditions that increasingly resemble contested environments: Intermittently degraded communications, incomplete information, high time pressure, increased tempo, and overlapping authorities. These actors are targeted by cyber operations, disinformation campaigns, and infrastructure sabotage whether or not they are formally part of a military response.</p><p>Despite this recognition, operational tooling has not evolved at the pace necessary to succeed in a 5GW environment. Military systems remain optimized for hierarchy and assumed connectivity. Civilian systems prioritize availability but lack security and interoperability. Partner forces and public safety organizations are integrated slowly, through bespoke arrangements that do not scale under pressure.</p><p>Doctrine has evolved toward all-of-society defense.</p><p>However, the operational product architecture that these participants use on a daily basis has not.</p><h4>1.2 Europe: Proof that 5GW is here</h4><p>Europe today exists in a persistent state of contestation. It is neither at peace nor engaged in declared war, yet it experiences continuous pressure across its infrastructure, information environment, and public institutions.</p><p>Rail networks are disrupted. Energy pipelines and undersea cables are damaged or threatened. Communications systems are probed and attacked. Disinformation campaigns target public trust and political cohesion. Drones routinely test sovereign airspace. These actions are deliberately ambiguous, distributed, and deniable &#8212;designed to remain below traditional thresholds of military response while imposing real costs on society.</p><p>The significance of these activities lies not in their individual tactical impact, but in what they reveal about modern conflict. The primary targets are not military formations. They are societal systems that underpin modern life: logistics networks, communications infrastructure, administrative processes, and public confidence.</p><p>These attacks exploit fragmentation that arises from operational architecture that is neither cohesive nor resilient. Civilian and military authorities often operate on separate systems. Public safety agencies lack secure, interoperable coordination with defense organizations. Partner forces remain digitally isolated. Centralized, legacy technologies struggle to extend trust and authority into degraded environments.</p><p>Compounding this challenge is cognitive friction. The problem is not a lack of information, but the dispersion of information across multiple disconnected platforms and institutions. Human operators must assemble situational awareness manually, under time pressure and degraded connectivity.</p><p>Delay and confusion are not side effects; they are intended outcomes.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.fysa.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.fysa.org/subscribe?"><span>Subscribe now</span></a></p><p>Europe demonstrates a central truth of Fifth Generation Warfare: vulnerability is not rooted in weak militaries, but in fragmented and fragile systems. This is the operational gap modern adversaries exploit &#8212; and the one any credible 5GW architecture must close.</p><h2>2. The operational gap: Fragmentation and fragility as a strategic liability</h2><p>Despite broad recognition that conflict has expanded beyond traditional battlefields, the systems used to manage operations and communicate remain deeply fragmented. Military, civilian, and public safety organizations operate on a patchwork of disconnected toolsets &#8212; each optimized for narrow roles and implicit assumptions that connectivity and control will be continuous and readily available.</p><p><strong>Military systems are typically designed for hierarchical command and continuous reach-back. Civilian platforms emphasize scale and availability, often at the expense of security and interoperability. Partner forces are integrated through bespoke mechanisms that are slow to establish and brittle under stress. Critically, these systems that inherently prioritize different functionality do not work in concert with one another.</strong></p><p>When these systems inevitably break down, operators use what works: commercial tools like Signal and WhatsApp. These tools succeed not because they are compliant or secure by military standards, but because they are fast, intuitive, and frictionless.</p><p>The challenge is not to prohibit such tools, but to render them unnecessary by elevating military technologies to similar standards of speed and intuitiveness.</p><p>Administrative friction degrades readiness long before kinetic contact. Uncertainty in personnel accountability, ambiguity in logistics, and breakdowns in command signal create latent vulnerabilities that adversaries can amplify through disruption and narrative manipulation. When kinetic contact comes, its impact is magnified because of administrative failures. When connectivity is contested, centralized systems fail first, forcing ad hoc workarounds that fracture trust and situational awareness.</p><p>This is not a failure of doctrine or intent. It is a failure of architecture.</p><p>A credible response to 5GW requires moving beyond collections of role-specific tools toward a unified operational fabric &#8212; one that maintains usability while embedding security, trust, and operational context by design.</p><h4>2.1 Atlas: Decentralized, software-defined infrastructure from steady-state operations to the tactical edge</h4><p>The Adyton Operations Kit (AOK) is the unified product suite. Atlas is its decentralized infrastructure layer. The Atlas Application is its tactical expression built on that infrastructure. Together, they operate across the full spectrum of modern conflict.</p><p>The Atlas Platform is the decentralized, software-defined infrastructure for edge and autonomous systems and human-machine teaming in DDIL environments. Atlas resiliently and securely connects people, sensors, effectors, and autonomous systems from any vendor into a resilient, infrastructure-independent network, ensuring the mission is maintained even while disconnected.</p><p>By unifying partner force interoperability and human-machine operations in contested environments, Atlas delivers sustained decision advantage and mission success. Built on decentralized cryptographic identity, end-to-end encryption, dynamic multi-transport mesh networking, and offline authorization, Atlas treats infrastructure failure as the base case, not an edge case.</p><p>Atlas can be used through its own application, the Atlas Application, or via its embeddable SDK to integrate with other systems such as the TAK ecosystem to enable true, human-machine teaming at the edge.</p><p>Together, the Adyton Operations Kit (AOK) and Atlas represent a unified product suite that operates across the full spectrum of modern conflict. Using a shared trust, identity, and data foundation, AOK supports core operational workflows &#8212; such as personnel, logistics, and command communications &#8212; while Atlas enables tactical execution and human&#8211;machine teaming at the edge across disparate forces, without requiring separate systems or re-establishing trust as environments degrade.</p><p>Our products are built on the premise that modern conflict does not allow for clean transitions between systems, roles, or phases, a premise being born out of 5GW. Steady-state operations, crisis response, and tactical execution are contiguous parts of a single operational reality.</p><p><strong>Warfighters should use the same technology in garrison, on a ship, or in the field.</strong></p><p>Adyton&#8217;s products reflect this reality by providing one operational fabric whose capabilities adapt to context while the underlying system remains consistent.</p><p>Identity, security, and data models are preserved as users move across environments. What changes is not the system itself, but how its capabilities are expressed based on operational need.</p><p>AOK is authorized for use within Department of War environments and is deployed through existing accreditation pathways, allowing organizations to adopt the platform without bespoke authorization processes. The Atlas Application, too, is deployed with users down range in EW-denied environments, pressure-testing our technology&#8217;s ability to support the warfighter regardless of connectivity, no matter where they are in the world.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.fysa.org/p/the-operational-fabric-of-fifth-generation?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.fysa.org/p/the-operational-fabric-of-fifth-generation?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h4>2.2 Architectural foundations: Built for degradation, not assumptions</h4><p>Atlas is designed around the expectation that modern operating environments are unstable by default.</p><p>Operational data is secured and written locally at the endpoint, enabling continued operation during network disruption. Information is shared peer-to-peer when local transports are available and synchronized opportunistically as connectivity returns. This approach avoids single points of failure while preserving operational continuity.</p><p>Security is enforced at the endpoint rather than at the perimeter. Identity is bound to users and devices, access is scoped by organization and mission context, and data remains protected from end to end, at rest and in transit, using standards-aligned cryptographic controls. This allows Atlas to support cross-organization collaboration without shared domains or centralized trust dependencies.</p><p>Atlas does not rely on a central server for identity, authorization, or data availability. This architectural choice reduces operational fragility and enables resilience under contested conditions.</p><h4>2.3 Adyton technology in steady-state operations</h4><p>In steady-state environments (e.g., garrison), AOK is used. AOK structures the workflows that generate readiness long before conditions deteriorate: personnel accountability, equipment visibility, logistics tracking, and command communications. In operational use, these workflows have reduced personnel accountability timelines from hours to minutes during real-world incidents, eliminated recurring equipment reconciliation failures, and materially reduced administrative burden during deployment preparation.</p><p>These functions are not administrative overhead. They are foundational.</p><p>Operational clarity enables tempo, and friction in these systems represents a latent vulnerability long before kinetic engagement begins.</p><h4>2.4 Atlas at the tactical edge</h4><p>At the tactical edge, the same operational fabric is expressed through different products. Atlas is the underlying architecture, the serverless, decentralized, fully interoperable software-defined infrastructure between humans and machines, machines and machines, and humans and humans built for DDIL environments.</p><p>Organizations can deploy Atlas to connect disparate endpoints into any UI via protocol adapters. Vendors can define custom protocols via Atlas&#8217;s SDK that can run directly on device firmware, using Atlas&#8217;s unified schema or their own defined schema and protocols. Atlas then manages the transport, identity, and sync layer.</p><p>For organizations that want even more out of Atlas, they can leverage the Atlas Application. This is Atlas &#8220;out of the box,&#8221; a geospatial application built on top of our software infrastructure with customizable tactical workflows that have been pressure tested in the field.</p><p>The Atlas Application provides operators at the edge with tactical workflows including secure chat, voice and video, customizable templates for structured reporting, and a map-based geospatial common operating picture with layers, tracks, and support for offline navigation &#8212; all of which are mission-capable in DDIL environments.</p><p>The Atlas Application is engineered to function reliably in contested, denied, and degraded environments because it is built on Atlas&#8217;s serverless infrastructure. Data is secured at the endpoint, synchronized opportunistically, and shared peer-to-peer as needed &#8212; enabling decentralized execution aligned with higher-level intent.</p><p>The Atlas Application also supports human&#8211;machine interoperability in active operations. Features such as DroneStat, an example of templatized reporting, are already in use to coordinate distributed drone teams, capturing structured, real-time operational data and aggregating it across units. AI and machine learning can surface availability, status, and constraints &#8212; reducing cognitive overhead while preserving human decision authority.</p><h4>2.5 One system, context-dependent expression</h4><p>Across steady-state and tactical environments, Adyton&#8217;s products remain one unified product suite. The distinction is contextual, not architectural. As users move closer to the edge, workflows in Adyton become more immediate and coordination more time-sensitive. As they move back toward steady-state operations, workflows emphasize continuity, accountability, and long-term visibility.</p><p>Adyton Operations Kit (AOK)and Atlas provide continuity across the conflict spectrum. In steady-state environments, it structures readiness and accountability. At the tactical edge, it sustains coordination and situational awareness. Across all Adyton products, trust and decision quality are preserved as conditions change. Human&#8211;machine teaming reinforces this continuity by protecting human judgment under pressure &#8212; not replacing it.</p><h2>3. Partner forces and public safety: Extending trust without fragmentation</h2><p>Fifth Generation Warfare is coalition warfare by default. Partner forces, host-nation units, and public safety organizations are operational actors whether or not they are formally designated as such.</p><p>Atlas enables rapid extension of the same operational fabric to these actors through scoped trust, data visibility, and authority. &#8220;Partner force in a box&#8221; is not a separate system &#8212; it is Atlas operating with constrained policies and mission-specific boundaries.</p><p>Public safety agencies face many of the same conditions as military units in gray-zone conflict: degraded communications, incomplete information, and high-stakes decision-making. Adyton&#8217;s products do not militarize these organizations. They provide secure coordination and situational awareness when conventional systems fail.</p><h2>4. The Infrastructure of Modern Defense</h2><p>Fifth Generation Warfare is not a future scenario. It is shaping global security today.</p><p>We must embrace the concept of war that extends from the battlefield and permeates civilian spaces &#8212; financial systems, social media networks, economic capacity, transportation systems, and information information networks.</p><p>In this environment, fragmented systems fail first. Organizations that cannot maintain coordination and decision-making under degraded conditions cede advantage before kinetic conflict begins.</p><p>Adyton provides the infrastructure required for modern defense: a unified operational fabric that unifies partner force interoperability and human-machine operations together, enabling America and her allies to act clearly and decisively.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.fysa.org/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&quot;,&quot;text&quot;:&quot;Share FYSA&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.fysa.org/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share"><span>Share FYSA</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[The Stack of Power]]></title><description><![CDATA[A mental model for understanding global conflict]]></description><link>https://www.fysa.org/p/the-stack-of-power</link><guid isPermaLink="false">https://www.fysa.org/p/the-stack-of-power</guid><dc:creator><![CDATA[James Boyd]]></dc:creator><pubDate>Thu, 12 Feb 2026 15:30:12 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/62da96d7-8e43-4988-b7e9-ce441862aa61_1200x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>0. The Stack of Power</h2><p>I credit Shane Parrish&#8217;s <em>Farnam Street</em> for first introducing me to the idea of mental models &#8212; a conceptual idea of how a thing behaves.</p><p>Throughout my time in the military, most notably as a Special Forces veteran, I had a mental model of a patrol as an organism. The helicopter lands, and the organism flows off into the woodline, actively working to perceive its surroundings. The organism extends &#8220;tentacles&#8221; in the form of people &#8212; they walk point, they move into a wedge and slither across the terrain. The organism adapts as terrain and obstacles and threats arise.</p><p>Having been an engineer by trade for much of my life, I&#8217;ve seen how engineering has its own similar concepts and mental models. When anyone builds software, they have a tech stack &#8212; a series of components and technical design choices that form layers of dependencies, where higher layers depend on lower ones, where information flows from one layer to another.</p><p>The other key aspect of a technology stack is the conversion of information from one form to another as it flows between layers. A UI layer interacts with a business logic layer, which interacts with storage and persistence layers. As information moves, it changes. Information on a screen are pixels and optical energy; they were, at one point, electrons moving through transistors in a CPU to rest on a hard drive as magnetic notches on a spinning disk.</p><p>Power, too, is a stack and power, as an idea, can be expressed in a multitude of ways. What I&#8217;ve dubbed The Stack of Power &#8212; a mental model to understand how power manifests within modern nation states &#8212; is necessary to understand who wins the next great power struggle because modern conflict in its myriad forms includes and extends beyond violence.</p><p>The next fights <em>(or should they be &#8220;contests&#8221;) </em> will be determined by legitimacy <em>and </em>production, not just who has the biggest battleship.</p><h2>1. Power is a stack</h2><p>Power is the ability to reliably produce outcomes over time despite resistance. Power, like information or energy, can be stored. But power takes maintenance. Entropy is a fundamental law of the universe &#8212; the tendency for things to break down over time &#8212; so power dissipates over time like a car battery in the winter unless it is continually refreshed and replenished. Additionally, power, like information in a computer or hydrocarbon energy in a car gas tank, can be converted from one form to another. But in doing so, there&#8217;s a conversion loss, whether that&#8217;s the electricity required to run the computer or the heat from a combustion engine.</p><p>In defense circles, between our Armed Forces and our allies and the commercial entities supporting the national security mission, discussions about power &#8212; discussions I&#8217;ve often been involved in &#8212; manifest themselves, primarily, in the forms of military and industrial might. It&#8217;s atoms and bits as the form of power, it&#8217;s the pace of resupply as the first derivative.</p><p><strong>It is a foundationally insufficient view of and expression of power.</strong></p><p>To truly understand the mechanisms through which national power and national security can be bolstered or eroded, we need to evolve the conversation &#8212; to talk about power in the most fundamental way.</p><p>That is why I&#8217;ve crafted The Stack of Power for the nation state, which consists of four basic layers.</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/UVJb1/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2ad99710-4d09-4d06-86c1-ce5d5368211d_1220x634.png&quot;,&quot;thumbnail_url_full&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d5b04b1f-a5f1-4f29-81f1-6c38497079a5_1220x704.png&quot;,&quot;height&quot;:349,&quot;title&quot;:&quot;The Stack of Power&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/UVJb1/1/" width="730" height="349" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><p>There are feedback loops across these layers. Higher layers reduce the need for lower layers. If people believe a rule is legitimate (L4), you need fewer enforcers (L1). At the same time, lower layers can prop up the higher layers, but at a cost &#8212; force can impose order, but if it hollows out legitimacy, a nation ends up using more force forever until the system breaks.</p><p>Power also &#8220;converts&#8221; across these layers, like how information &#8220;converts&#8221; into different forms across the software stack. Legitimacy of government converts into taxation of the citizens (L4 &#8594; L2). The capital raised from those taxes can convert into institutions as armies are built (L2 &#8594; L3). Those institutions can convert into force projection (L3 &#8594; L1).</p><p>There is an efficiency associated with these power conversions that can be thought of as an &#8220;exchange rate.&#8221; Legitimacy, for example, buys compliance cheaply, but coercion buys compliance expensively. These are the foundational concepts that underpin The Stack of Power.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.fysa.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.fysa.org/subscribe?"><span>Subscribe now</span></a></p><h4>1.1 Examples through history</h4><p>Prominent institutions throughout human history are the Stack of Power manifest.</p><h4>1.2 The Church</h4><p>The Catholic Church demonstrates that if you control legitimacy, you can steer politics without occupying territory. At its peak, the Church functioned as:</p><ul><li><p>A shared set of moral language (L4: Legitimacy)</p></li><li><p>A global administrative network (L3: Coordination)</p></li><li><p>A major landholder and economic actor (L2: Production)</p></li><li><p>And occasionally, an enforcer via coercion through aligned rulers (L1: Coercion)</p></li></ul><p>For most of its history, the Catholic Church hasn&#8217;t traditionally needed L1 (coercion and force) because it relied on L4 (legitimacy and narrative). It could define what was pious and lawful, shameful or sacred. It could then institutionalize those definitions (L3: institutions and coordination) through rituals and governance, which, in the Catholic Church manifest as services and congregations, respectively.</p><p>The lesson from the Church is that when L4 (legitimacy and narrative) are strong, an institution need not rely on physical coercion.</p><h4>1.2 Labor Unions</h4><p>Workers as individuals have limited power. Organized labor shows how coordination (L3) converts into power over capital and production (L2) and then into policy and norms (L1). The labor union serves as a coordination machine.</p><ul><li><p>It synchronizes the individual risk into a collective one: &#8220;We act together, so retaliation costs more.&#8221;</p></li><li><p>Unions create negotiating discipline: &#8220;We speak with one voice.&#8221;</p></li><li><p>They turn labor from a set of individuals into a strategic choke point that controls the means of production.</p></li></ul><p>Like the Church, labor unions need not rely on L1 in the traditional sense (coercion and force) because it has L3 (institutions and coordination) as its expression of power. Labor unions can then create leverage through the synchronization of risks, asks, and action. That synchronization is the conceptual &#8220;Mass&#8221; from the Army&#8217;s <a href="https://www.cia.gov/readingroom/docs/THE%20PRINCIPLES%20OF%20WAR%5B14652262%5D.pdf">Nine Principles of War</a>.</p><h4>1.3 Financial markets</h4><p>Markets look &#8220;neutral,&#8221; but they are anything but. Financial markets exert disciplining power by constraining the set of options available to participants. When a government issues bonds (national debt) and borrows money to fund armies or wars, it is putting itself dependent on the market as a means to express its power through L1 (coercion &amp; force). But if the interest rates rise and the borrowing costs increase, it may no longer be able to raise adequate debt, and the set of options the government has decreases. The Spanish Empire and its <a href="https://en.wikipedia.org/wiki/Army_of_Flanders">Army of Flanders</a> demonstrates this cleanly.</p><p>Markets attempt to operate across the entire Stack of Power:</p><ul><li><p>L4 (legitimacy and narrative): Markets leverage confidence and credit in the form of belief that contracts and commitments will hold and that debt will be repaid.</p></li><li><p>L3 (institutions and coordination): Institutions like stock exchanges, debt markets, and insurance marketplaces standardize exchange and pricing of risk.</p></li><li><p>L2 (capital and production): Credit, liquidity, and investments are allocated to fund endeavors</p></li><li><p>L1 (coercion and force): Capital exists and rising costs</p></li></ul><p>The coercion here is not through physical force &#8212; it is through the free action in the market which changes the prices of another actor&#8217;s choices. When the bond market loses confidence in the value of a nation&#8217;s currency or the nation&#8217;s ability to manage inflation, or a lender (which could be the troops of the Army of Flanders lending their time) loses confidence that the debt will be repaid, it changes the cost of borrowing for the nation state. If an institution can raise the price of someone&#8217;s choices, it can govern them without ever &#8220;ruling&#8221; over them in the traditional sense.</p><h2>2. The nation state as the full-stack power actor</h2><p>The modern state is distinctive because it integrates the entire stack in the traditional senses &#8212; unique even from financial markets, which can <em>appear</em> to be a full stack actor. Nation states manifest themselves across The Stack of Power in the following ways:</p><ul><li><p>L4 Legitimacy: Law, civic identity, moral claims</p></li><li><p>L3 Coordination: Bureaucracy, courts, agencies</p></li><li><p>L2 Production: Taxation, industry, monetary and trade policy</p></li><li><p>L1 Coercion: Police and military</p></li></ul><p>Max Weber is attributed with the idea that the nation state claims a monopoly on the legitimate use of force in a territory. We tend to focus on the force in this idea. The word &#8220;legitimate&#8221; is equally important and it is the connection <em>between</em> the two that is most significant. Force without legitimacy is a recurring drain on power. Force with legitimacy is a backstop, not a dependency.</p><p>That&#8217;s why, when people think of national security as military and defense apparati through force, they are wrong.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.fysa.org/p/the-stack-of-power?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.fysa.org/p/the-stack-of-power?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p>True national security is the protection of every layer of the Stack of Power against adversarial pressure internal or external; it is the ability of a society to continue to choose its own future, maintain its own sovereignty, to chart its path.</p><p>That definition of national security requires far more than territorial defense through force (L1), but also:</p><ul><li><p>The legitimacy to prevent internal fracturing (L4)</p></li><li><p>The institutions to sustain alliances and a nation&#8217;s own credibility (L3)</p></li><li><p>The mechanisms to protect critical domestic production (L2)</p></li></ul><h4>2.1 Military and defense</h4><p>Critics may posit that no, national security is tantamount to a powerful military, to soldiers and tanks and weapons. The reason why that is not true &#8212; why national security extends to the entire Stack of Power &#8212; is because, to reliably, repeatedly, and at scale produce outcomes to resist an enemy through physical force, elements from each layer of the Stack of Power must work in tandem in a complex dependency chain. Such elements include:</p><ul><li><p><strong>Trained personnel</strong>: Is your national population growing or shrinking? Are your people healthy?</p></li><li><p><strong>Consistent doctrine</strong>: Are your training institutions strong? Does it rapidly integrate and update learning?</p></li><li><p><strong>Intelligence</strong>: Do you have a truth seeking culture, predicated on facts not stories?</p></li><li><p><strong>Command and control</strong>: Is there clear authority and legitimacy of leaders? Are your troops disciplined and execute lawful orders?</p></li><li><p><strong>Logistics and sustainment</strong>: Can you fund your armies? Can you convert from capital to munition efficiently?</p></li><li><p><strong>Industrial production and innovation</strong>: Is your defense market attractive to participants? Does your country develop and attract engineering and scientific talent?</p></li><li><p><strong>Political authorization and legitimacy</strong>: Do people believe in what you are doing? Will they enlist? Will they support the politicians that aim to use force?</p></li></ul><p>The soldiers and tanks and weapons are the visible and foundational force at the base layer (L1) of the Stack of Power &#8212; they are what constitutes force and coercion, the sharp end of the sword, not the blade.</p><p>In fact, these visible elements of militaries are wholly reliant on other layers of The Stack of Power. A military is not a standalone instrument; it is a downstream consumer of legitimacy, coordination, and production upon which it relies for its existence.</p><ul><li><p>Legitimacy determines if the taxable public will sustain costs, allies will trust commitments, and lenders will be repaid.</p></li><li><p>Institutions determine whether a strategy turns into plans that turn into execution</p></li><li><p>Capital and production determines whether the plans can be supplied, maintained and replenished.</p></li></ul><p>If any one of these layers fail, so too will the ability of a nation state&#8217;s ability to exert force without a high cost or damage to itself. Any country can have elite personnel and powerful weapons; if the layers that constitute legitimacy, coordination, and production corrode, that nation will be strategically weak &#8212; legitimacy falls, institutions fight amongst themselves, production stutters, logistics fail, readiness drops, deterrence collapses, and war risk rises as the perceived costs of conflict fall for rivals.</p><p>Carl von Clausewitz&#8217;s basic point that war is a continuation of politics by other means highlights the dependency chain articulated above.</p><p>If the political aims aren&#8217;t coherent or sustainable (if they do not hold legitimacy), then even a tactical success can still become a strategic failure as national power is channeled through force and coercion to a futile end.</p><h2>3. Modern conflict: Fighting across the stack</h2><p>Now that we&#8217;ve established that the modern nation state must act across every layer in The Stack of Power, we can understand how a modern nation state&#8217;s full-stack strategy can enable it to defeat or defend against rivals.</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/rSCFV/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/01e3b678-ff87-4b06-8709-981bdd0e305e_1220x1112.png&quot;,&quot;thumbnail_url_full&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ff2cb604-ef51-434f-bea3-f28463315d1b_1220x1182.png&quot;,&quot;height&quot;:598,&quot;title&quot;:&quot;Fighting across The Stack of Power&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/rSCFV/1/" width="730" height="598" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><p>It is plain to see that, to undermine a nation state&#8217;s national security, they need not defeat a military first &#8212; they can aim at the upper layers to make the military irrelevant, unaffordable, or politically unusable.</p><p>Modern conflict is typified by an increase in pressure applied in mixed forms like narrative shaping, cyber disruption, economic coercion, and proxy conflicts. Look no further than China&#8217;s well-documented history of <a href="https://www.rand.org/content/dam/rand/pubs/research_briefs/RBA500/RBA594-1/RAND_RBA594-1.pdf">grey zone activities</a> &#8212; &#8220;coercive actions that are shy of armed conflict but beyond normal diplomatic, economic, and other activities&#8221;, Russia&#8217;s bots in the <a href="https://demtech.oii.ox.ac.uk/wp-content/uploads/sites/12/2016/06/COMPROP-2016-1.pdf">UK&#8217;s Brexit campaign</a>, and Russia&#8217;s <a href="https://www.spiegel.de/international/world/german-governor-manuela-schwesig-draws-ire-for-role-in-nord-stream-2-pipeline-a-509fecdc-6f33-4e33-ac15-87d368238b15">sponsorship of climate NGOs</a> in Germany to drive energy dependence on Russian Gas Imports.</p><p>Such actions are not part of a separate domain, but are coordinated and integrated attacks against a nation&#8217;s national security when national security is defined across the entire Stack of Power.</p><p>Full stack coercion could look something like this: Misinformation campaigns degrade legitimacy, internal institutional conflict ensues, production shocks result in turn, and then, once deterrent credibility is weakened, threaten kinetic force.</p><p>If a nation does not have the power to defend each layer of the Stack of Power, it is exhibiting weakness. Military defense through coercion and force is a necessary component of power, but it is only a component.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.fysa.org/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&quot;,&quot;text&quot;:&quot;Share FYSA&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.fysa.org/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share"><span>Share FYSA</span></a></p><p>True national security extends across The Stack of Power to keep each layer resilient under pressure so L1 (coercion &amp; force) is a last result, not a default mode of governance between nations.</p><p>It is through this lens &#8212; through the total Stack of Power &#8212; that the United States must view its national security strategy. Political authorization and legitimacy matter as much as trained personnel; logistics and sustainment for kinetic operations matter as much as industrial supply and innovation which matter as much as the strength of America&#8217;s monetary system.</p><p>Until we raise our gaze to include but extend beyond force and deterrence and coercion as the sole expressions of national security, America and her allies will remain at risk from near-peer adversaries who seek to readily disrupt the West by levying attacks at each layer in the Stack of Power.</p>]]></content:encoded></item><item><title><![CDATA[How to add five divisions of combat power to the Army]]></title><description><![CDATA[Without Recruiting a Single Soldier]]></description><link>https://www.fysa.org/p/how-to-add-five-divisions-of-combat</link><guid isPermaLink="false">https://www.fysa.org/p/how-to-add-five-divisions-of-combat</guid><dc:creator><![CDATA[JJ Wilson]]></dc:creator><pubDate>Thu, 29 Jan 2026 13:03:41 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/1e77e646-b51a-45b4-b434-b432d8d81985_1045x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The U.S. Army wastes <strong>seventy million hours each year</strong>, the equivalent of <strong>three combat divisions</strong>, on analog inventory processes: hand-counting gear, reconciling paper printouts with spreadsheets, and feeding data into enterprise systems everyone knows are wrong. Those hours translate to <strong>about $4 billion in lost productivity</strong> annually, yet the Army still cannot produce an auditable record of what it owns or what condition its equipment is in. The Department of War has never passed a financial audit; are we really to believe that all of its logistics systems are &#8220;green&#8221; across the board?</p><p>This waste is not a relic of old habits but a symptom of broken tools. Despite decades of &#8220;transformation&#8221; and billions spent on &#8220;modern&#8221; systems, the Army still manages logistics in much the same way as Alexander or Napoleon or the Russians we love to malign, with planning based on manual counts, delayed updates, and a life-and-death hope that ground truth is not too different from whatever exists in the official record.</p><p>Hope is not a plan. Ask those Russians.</p><p>The Army doesn&#8217;t cling to clipboards out of nostalgia. It does so because, despite billions invested, its systems have never made it easy to capture ground truth. I&#8217;ve seen firsthand how commanders at every level are forced to choose between honesty and compliance, rewarding the illusion of readiness over reality. The result is a culture that erodes training time, corrodes trust, and drives out the best soldiers. <strong>Seventy million wasted hours per year is not inefficiency &#8212; it is a profound corrosion of combat power.</strong></p><p>Digitizing property at the edge and capturing real-time ground-truth data where soldiers actually work is the single most transformative modernization initiative the Army could undertake. Forget AI, autonomy, or long-range precision fires. Automating even 80 percent of logistics billets and repurposing those hours would yield roughly <strong>63,000 soldier-equivalents, four to five divisions of combat power, without recruiting a single new soldier.</strong></p><p>In an era when our adversaries will always outnumber us, America&#8217;s advantage must be <strong>time and truth, not mass.</strong> To win the next war, the Army must turn pen and paper into ones and zeroes.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.fysa.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.fysa.org/subscribe?"><span>Subscribe now</span></a></p><h2>0. Digitizing the edge is the single most transformative investment our military can make</h2><p>I was catching up recently with a friend from British SBS, and he shared with me his favorite story from Ukraine, that there is this amazing restaurant in Kyiv called Kanapa. It&#8217;s one of the best restaurants in eastern Europe, and it&#8217;s nearly impossible to get a reservation. If you go back and look at their reservation book for February 26, 2022, two days after the Russian invasion was initiated, you will find an entry there for a &#8220;Mr V Putin, plus one.&#8221;</p><p>Whether the story is true doesn&#8217;t really matter. It captures the psychology of a military and a political system that believed its own PowerPoint. On paper, the Russian Army was ready. Its unit status reports, top to bottom, glowed green, commanders no doubt reporting &#8220;full combat capability.&#8221; In their mind, there was no reason why Mr. Putin should not treat himself to a nice dinner out as soon as their conquest was complete.</p><p>In real life, however, after the war started on February 24, instead of enjoying fancy dinners, the Russians were trying to explain to the rest of the world why their convoys were being abandoned on highways, fuel trucks captured intact, soldiers looting gas stations for lickies and chewies. The Russians didn&#8217;t just misjudge the Ukrainians. They misjudged themselves, and this was possible only because their entire military readiness system rewarded compliance over truth.</p><p>We should take no comfort in the contrast. Our own readiness dashboards are green by default, regardless of what is happening in our motor pools or supply warehouses where Army soldiers and leaders spend more time reconciling discrepancies between systems of record and their own ground truth than they spend on the jobs they signed up to do. The U.S. Army wastes <strong>seventy million hours every year</strong> on property accountability, a ritual of counting and re-counting gear that effectively turns entire brigades into glorified supply clerks.</p><p><strong>That is the manpower equivalent of three combat divisions doing nothing but paperwork.</strong></p><p>The deeper problem is not effort but illusion. Ask any battalion commander what percentage of equipment statuses in G-Army are accurate. Ask a company commander how many &#8220;mission-capable&#8221; vehicles are good to go. Ask them, if we had to roll tomorrow, how many soldiers by rank and by MOS are actually deployable. You&#8217;ll get two answers: the system&#8217;s truth and the commander&#8217;s truth.</p><p>They&#8217;re both probably wrong.</p><p>Every self-styled military historian loves to remind us that wars are won by logistics<em>.</em> They&#8217;ll point to Alexander&#8217;s campaign in Persia, Napoleon&#8217;s failure in Russia, Hitler&#8217;s collapse on the Eastern Front, the present-day Russian invasion of Ukraine. Of course, they&#8217;re right. In the age of horses, coal, and canned food, victory went to the army that could keep its wagons moving. In the twenty-first century, we&#8217;re still running logistics like Alexander or Napoleon, managing property with handwritten notes and hope. In any near-peer conflict, we will never win by mass. Demographics are destiny, and the math is not hard. Our adversaries will always have more people, more conscripts, more mat&#233;riel. Our edge will come only from <strong>time and truth</strong>, from knowing what we have, where it is, and whether it works.</p><p>Digitizing property at the edge is not a staff efficiency project.<strong> It is the single most transformative investment our military can make.</strong> Forget drones, forget AI-powered predictive maintenance and decision support, forget the next generation of long-range precision fires. Until the Army can produce accurate, real-time data about its own gear, everything else is built atop a foundation of shifting sand.</p><h2>1. The Army spends seventy million hours per year to get the wrong answer</h2><h4>1.1. Seventy million hours cannot possibly be the number</h4><p>This is not a typo. It&#8217;s not supposed to be seven million or seventy thousand. The number is seventy million, and it&#8217;s actually a pretty conservative estimate.</p><p>First, we assumed 485,000 soldiers in the Army, excluding civilians or contractors, and then we assumed that, on average, every soldier spends at least twelve hours each month on inventories and related paperwork. We know that some soldiers (e.g. 92-series, PBOs, COs and their designees) spend much more, that a change of command or &#8220;FLIPL&#8221; can chew up hundreds of hours across multiple personnel, but if we use <strong>conservative estimates</strong> and assume <strong>twelve hours per soldier per month</strong>, then in aggregate we get to seventy million hours.</p><p><strong>Seventy million</strong> is an absurd number. If we are again conservative in our assumptions and estimate that every soldier works, on average, two thousand hours per year, then seventy million hours of productivity is <strong>the equivalent of about 35,000 full-time soldiers</strong>. To put that into context, this is the equivalent of three divisions&#8217; worth of soldiers, all chasing hand receipts and hunting down some variation on &#8220;headset, black, miscellaneous.&#8221; It would be as if we had gone <strong>to the 82nd Airborne and the 101st Airborne and the 10th Mountain Division</strong> and said, &#8220;Nope. <strong>You guys don&#8217;t do infantry anymore</strong>. You guys do paperwork now.&#8221;</p><p>To take it a step further, if we convert those soldier hours into dollars and, again using simple and conservative estimates, assume that every soldier costs, on average, <strong>about $55 per hour</strong>, then that seventy million hours turns into almost<strong> $4B worth of productivity</strong>. Relative to the entire defense budget, maybe $4B doesn&#8217;t seem like a lot, but our military could do a lot with that money.</p><p>With $4B I could buy almost 200 brand new UH-60M helicopters, a brand new fleet almost as large as Poland&#8217;s entire helicopter force. With $4B, I could buy about 225 M1A2 SEPv3 tanks, which would give me a more sophisticated armor fleet than the whole of Western Europe (except maybe Germany). With $4B, I could buy 23,000 GMLRS missiles, which unfortunately would take Lockheed up to two years to manufacture.</p><p><strong>This is how much time we waste</strong>. <strong>It is existentially stupid</strong>.</p><h4>1.2. Despite seventy million hours of work, the Army still can&#8217;t figure out the right answer</h4><p>The worst kept secret in the United States Army is that all our systems are wrong. I served, and I knew they were wrong. Vantage is wrong. IPPS-A is wrong. GCSS-A is wrong. They&#8217;re all wrong, and everyone knows they&#8217;re wrong.</p><p>Because of this, everything the Army thinks it knows about its personnel and equipment is, at best, an educated guess and, at worst, well, an uneducated guess. The Army does not know how many soldiers it has, much less how many rifles or radios or pickup trucks. The Army does not know how many operational tanks or helicopters it has or how many fully functional HMMWVs or HIMARS platforms.</p><p>None of this is any one person&#8217;s fault or the fault of any one program. All of the systems that might help the Army with the answers are populated with bad data. Those systems don&#8217;t fail because the developers were incompetent or the vendors were crooked. Palantir, who built Vantage, probably has more engineering talent than any other company in the world. I have personally spent time with the teams at places like CACI and BAH and LockheedMartin that support programs like IPPS-A and ADVANA and SOF GLSS. These are hard-working and patriotic professionals. All of these folks are doing the best they can.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.fysa.org/p/how-to-add-five-divisions-of-combat?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.fysa.org/p/how-to-add-five-divisions-of-combat?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p>The systems fail, however, because the capabilities they are trying to deliver depend on <a href="https://www.armyupress.army.mil/Portals/7/military-review/Archives/English/SO-20/Lipsky-Unit-Status-Report-1.pdf">fantasy inputs</a> to an <a href="https://www.firstbreakfast.com/p/erps-have-failed-our-military?utm_campaign=post&amp;utm_medium=web">outdated architecture</a><em>.</em> Somehow we have yet to wrap our heads around the inescapable fact that if the data generated at the edge is wrong, then everything built on top will also be wrong. Data at the edge is wrong because those soldiers have neither the time nor the tools to enter data accurately. Because those inputs feed everything above them, every output &#8212; readiness reports, maintenance forecasts, personnel rosters &#8212; is wrong too. DPAS is wrong. LMP is wrong. LIS is wrong. If it ever gets built, EBS-C, the Army&#8217;s grand plan to unify its enterprise systems, will be wrong, too.</p><p>A monolithic architecture pumped full of bad data does not produce truth.</p><p>Now, imagine you&#8217;re a company commander. You have inherited this system, You know the systems are wrong. You know that you&#8217;ll get crushed if you report that your formation is not as &#8220;green&#8221; as it was when you took command, and, even if you were willing to assume that kind of career risk, you don&#8217;t actually have a reliable way of verifying the readiness of your own soldiers, trucks, tanks, or radios. So what do you do?</p><p>You do what commanders across the force have done for years: <strong><a href="https://www.armyupress.army.mil/Portals/7/military-review/Archives/English/SO-20/Lipsky-Unit-Status-Report-1.pdf">you game the numbers</a></strong>. You delay reporting a deadlined vehicle so it won&#8217;t tank your unit status report. You consolidate the order of repair parts under one serial number so the system thinks only a single tank is down, not six. You prioritize &#8220;pacer&#8221; items because the metrics overweight them, even if it means your command-and-control trucks sit broken in the motor pool. The system rewards you for paper strength, not combat strength, so that&#8217;s what you report.</p><p>Meanwhile, you and your leadership team and supply personnel have to figure out some way to document an accurate reflection of your world so that, when called upon to do the job you signed up for, you actually have a chance to make mission. This doesn&#8217;t get done with an enterprise system. It gets done with <strong>spreadsheets, three-ring binders overflowing with pdf printouts, clipboards stacked high with 2062s, handwritten notes in the margins</strong>.</p><p>When we need to know how much fuel is left, we send an E-4 with a clipboard to go inspect the blivets. When we need to know how many Patriots are left, we send another E-4 to go do a manual count because the software was never updated after we increased the capacity from four to sixteen. There are probably 1500-1800 company-sized elements in the Army. This is how logistics works <strong>in all of them</strong>.</p><p>And so we have created for ourselves this world of <strong>two truths</strong>. There is the <strong>systems truth</strong>, and then there is the <strong>observed truth</strong>. Commanders can&#8217;t admit how wide the gap has become between the systems truth and the observed truth, so they live in both worlds at once, feeding the official numbers upward while keeping a shadow version of reality on their laptops and clipboards and the little green notebooks in their cargo pockets. Over time, up and down the chain of command, those two realities diverge. The official one persists in the various systems of record &#8212; aggregated, immaculate and wrong. The observed one is messy but closer to real.</p><p>From a reporting standpoint, the delta between system truth and observed truth is why, time and again, over decades, the Department of War has <strong>never once passed a financial audit</strong>. Not once. Not ever. GAO and DoD IG reports read like a broken record:</p><ul><li><p>In 2025, GAO found that <strong>contractor-acquired property wasn&#8217;t even consistently recorded</strong>, leaving billions in gear essentially off the books (GAO-25-106868).</p></li><li><p>In 2023, GAO reported that DoD was sitting on billions in <strong>excess, obsolete, or underutilized spare parts</strong> because the data to manage them was wrong (GAO-23-106136).</p></li><li><p>In 2019, GAO highlighted <strong>$90B in secondary inventory</strong> plagued by mismanagement and excess stocks (GAO-19-493).</p></li><li><p>As recently as 2024, DoD IG flagged that <strong>23,000 pieces of government-furnished property in Kuwait were missing from Army records</strong> &#8212; not in wartime chaos, but in daily operations (DODIG-2022-106).</p></li><li><p>Congress&#8217;s own researchers are blunt: <strong>the Department cannot credibly claim readiness while its books are so unreliable</strong> (CRS Report R46067).</p></li></ul><p>The hard truth is that <strong>digitizing the edge </strong>is the only reform that makes the rest of modernization possible.  By digitizing the edge, we give every company commander and supply sergeant the ability to capture accurate, real-time property data, making it easier for soldiers to do the right thing and narrowing the delta between systems truth and observed truth, rebuilding trust in the numbers that underpin readiness, maintenance, and even personnel systems. You can&#8217;t fix G-Army or IPPS-A or Vantage until you fix the data that feeds them. Another ERP won&#8217;t fix it. AI won&#8217;t fix it. Sensors won&#8217;t fix it. And without a resilient solution, the Army will continue to spend billions getting to the wrong answer more quickly.</p><p>Aside from the audit question, the real-world implications of these two truths are much more dangerous. The tragedy is that we plan wars based on the first while relying on the second to win them and come home. We are the finest fighting force in the world &#8212; and it&#8217;s not particularly close &#8212; and we keep track of our gear with color-coded highlighters and sticky notes. We do not actually know how bad it is, how big the delta is between those truths, and history suggests we won&#8217;t know until it&#8217;s too late.</p><p>Before Russia rolled into Ukraine, its own army almost certainly looked &#8220;green&#8221; across the board on readiness reports. On paper, brigades were no doubt full, tanks operational, all units ready to march on Kyiv. When the fighting started, however, the fa&#231;ade shattered. Vehicles broke down on the march, logistics trains froze on the highways, soldiers abandoned equipment that was either not operational or not maintainable or both. Commanders discovered that the rosy projections in their readiness reports bore no resemblance whatsoever to the truth on the ground.</p><p>We love to point to the Russian invasion of Ukraine as a kind of exemplar for how an overmatched, outgunned, outnumbered fighting force might make a stand against a superior formation. Our soldiers are far better trained, far more well-equipped than the Ukrainians. When it comes to supply and logistics, however, we are much more like the Russians than we would care to admit.</p><p>&#8220;Green&#8221; on a unit status report does not mean green in real life. It means that a salty old E7 helped a wet-behind-the-ears O1 figure out how to do the paperwork correctly. Paper readiness rewards deception; real readiness rewards honesty. Ignoring ugly truths around poor leadership and a culture of fear, what happens when militaries believe their own spreadsheets? Russia did, right up until they didn&#8217;t.</p><h2>2. When the tail wags the tooth, Army culture dies</h2><h4>2.1 When the tail wags the tooth, lethality becomes an afterthought</h4><p>I applaud the extent to which the current administration has made a priority of re-establishing fundamental<strong> lethality</strong> as the cornerstone of Army culture.</p><p>The Pentagon loves the word. Everything is supposed to make the force &#8220;more lethal.&#8221; Ask five generals to define it and you&#8217;ll get ten answers. Here&#8217;s one that works: <strong>lethality is the ability of a unit to close with and destroy the enemy.</strong></p><p>To oversimplify, that requires three main ingredients:</p><ul><li><p><strong>Manpower in the right mix.</strong> Combat arms, not cooks or clerks.</p></li><li><p><strong>Training time.</strong> On the range and in the field, not PowerPoints and Excel.</p></li><li><p><strong>Equipment that actually works.</strong> Green in the motor pool, not just in Vantage.</p></li></ul><p>By that definition, <strong>seventy million wasted hours a year</strong> isn&#8217;t an inefficiency. It is corrosion, rot, a withering away.</p><p>Every hour spent chasing a hand receipt is an hour not spent on mission training. A rifle company burning a week reconciling radios and NVGs isn&#8217;t on the range. An aviation battalion tied up closing out ULLS-A maintenance actions isn&#8217;t flying. A reconnaissance troop scrambling to meet a Unit Status Report window isn&#8217;t rehearsing scout-screen maneuvers, conducting weapons qualifications, or holding live-fire exercises. Give the force those hours back and you buy millions of extra reps, miles run and doors kicked and rounds downrange. Instead, we funnel that time into three-ring binders and manila folders.</p><p>Even the Army&#8217;s premier training events have become hostage to the same dynamic. A Combat Training Center rotation &#8212; JRTC in Louisiana, NTC in California, or JMRC in Germany &#8212; is supposed to be the pinnacle of collective training: the place where a brigade tests itself against a thinking enemy under field conditions. In practice, getting there is half the battle. Units spend months closing maintenance faults, reconciling property books, and clearing digital discrepancies before they can even load a vehicle on a rail car. Commanders joke that the hardest part of JRTC isn&#8217;t fighting &#8220;in the box,&#8221; but rather surviving the paperwork that gets you there.</p><p>The irony is that the Army&#8217;s best warfighting exercise has become a year-long administrative marathon ending in a four-week sprint. A brigade might spend six months preparing for thirty days of fighting. The bureaucracy surrounding readiness has swallowed the practice of readiness itself. We&#8217;ve built a system where we train harder to report readiness than to achieve it.</p><p>And that&#8217;s only the visible cost. The invisible cost is the quiet re-engineering of the force itself around administrative maintenance. The Department&#8217;s <strong>acquisition and contracting workforce now tops 150,000</strong>, while the Army and Marine Corps together probably field only <strong>about 75,000 infantry soldiers </strong>&#8212; the people who actually close with and destroy the enemy. Within the Army, <strong>roughly one in five active-duty soldiers</strong> serves in a logistics or administrative billet. Comparable commercial supply-chain organizations operate with <strong>5&#8211;10 percent</strong> of headcount in back-office functions; ours runs <strong>closer to 25 percent.</strong></p><p>The inefficiency is not confined to the uniformed ranks. Behind every rifle company stands a bureaucracy that dwarfs it. DoD employs <strong>about 760,000 civilians</strong> and contracts with another <strong>700,000 private workers </strong>&#8212; nearly one for every active-duty service member. The Army&#8217;s G-1 data show the civilian back office has grown <strong>25 percent</strong> since 2001 while active-duty end strength shrank <strong>7 percent.</strong> We are literally adding managers while losing fighters.</p><p>And the architecture keeps metastasizing. The 2,300-system tangle identified in 2018 has barely shrunk, even after billions poured into consolidation efforts. Since 2017 the Department has spent another <strong>$5 billion</strong> on &#8220;audit readiness,&#8221; still failing every audit. <strong>Up to forty percent of the budget</strong> now goes to management and support &#8212; a larger share than in the years after 9/11 when the Army was fighting two wars. A bureaucracy this large doesn&#8217;t serve warfighters; it exists to feed itself.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.fysa.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.fysa.org/subscribe?"><span>Subscribe now</span></a></p><p>Training calendars tell the same story. RAND&#8217;s <em>Non-Deployable Time and Administrative Burden in the U.S. Army</em> found that <strong>company-grade officers spend 40&#8211;60 percent of the work week on administrative tasks</strong> instead of tactical leadership. GAO&#8217;s <em>Army Readiness: Better Measures Needed</em> estimated that inventories and reconciliations cost units <strong>three to five training days per quarter.</strong> A 2023 DoD IG audit determined that <strong>one in four administrative hours</strong> is consumed re-entering the same data into multiple systems. Even the best-run battalions are losing the equivalent of a full month of training every year just to remain compliant.</p><p>This isn&#8217;t lethality. It&#8217;s bureaucracy wearing camouflage. When we tell soldiers their mission is to win wars but structure their workdays like a regional insurance office, the outcome is predictable: training time collapses, initiative withers, and the sharp edge of the force dulls itself on its own paperwork.</p><h4>2.2 When Lethality becomes an afterthought, culture erodes from within</h4><p>All that wasted time doesn&#8217;t just dull readiness. It changes what the Army values. When the calendar fills with compliance tasks, the culture follows.</p><p>Every wasted hour comes out of someone&#8217;s hide. Soldiers join to shoot, fly, drive, and fight, not to chase signatures on DA 2062s. When they spend weekends reconciling spreadsheets instead of training or seeing family, they don&#8217;t re-enlist. When commanders are judged on compliance rather than competence, they stop telling the truth about readiness. That&#8217;s how a bureaucracy eats a profession.</p><p>The results are visible in recruiting and retention. The Army has missed its recruiting goal by <strong>about 15,000 soldiers two years in a row</strong>, lowering future targets just to preserve appearances. Voluntary separations are up <strong>14 percent</strong> in three years, and retention among mid-career NCOs is down <strong>roughly 10 percent</strong> since 2019. The service&#8217;s own <em>Why They Leave</em> survey lists the culprits: <strong>administrative burden, lack of meaningful work, poor work-life balance, and loss of trust in leadership.</strong> RAND&#8217;s officer-retention studies reach the same conclusion, that officers are leaving not because they fear real combat but because they&#8217;re exhausted by clerical combat.</p><p>Trust in leadership is eroding just as fast. Army climate surveys show confidence in senior leaders has fallen from <strong>around 65 percent a decade ago to barely 50 percent today.</strong> Less than half of enlisted soldiers believe their feedback leads to change, and <strong>41 percent</strong> think favoritism or politics influence promotions more than merit. Bureaucracy doesn&#8217;t just waste time. It teaches people that honesty is dangerous and that merit is irrelevant.</p><p>Administrative drag has become a health hazard. The average soldier works <strong>59&#8211;63 hours a week,</strong> according to RAND&#8217;s <em>Soldier Tempo and Fatigue</em> study, much of it on non-mission tasks. The Army&#8217;s risk-reduction reports show <strong>over 60 percent</strong> of soldiers reporting chronic fatigue or lack of sleep tied to administrative workload. The Army&#8217;s suicide rate sits around <strong>36 per 100,000 </strong>&#8212; more than twice the civilian average &#8212; and the Health Promotion Office cites <strong>workload and loss of purpose</strong> among the top stressors. This is what happens when lethality becomes an afterthought: people stop seeing the point.</p><p>The Army is supposed to be hard. We all signed up for hard. A lot of us also signed up precisely because we did not want a job driving a desk, and in this context, when we ask soldiers in survey after survey why they got out, they do not complain that the job itself was hard but rather point to <em>meaningless work</em> and <em>loss of trust</em> as their reasons for leaving. When lethality becomes an afterthought, paperwork becomes the profession. When paperwork becomes the profession, the best people walk. A trained NCO can earn more managing logistics for Amazon, and no one there asks him to enter the same data three times in three different systems.</p><p>This is not a culture problem that can be fixed with slogans or leadership summits. It&#8217;s a design problem. The systems that govern daily life &#8212; G-Army, IPPS-A, Vantage &#8212; are built to reward box-checking and punish initiative. They make truth-telling career risk and self-deception career insurance. The longer we tolerate that, the less lethal we become.</p><p>When lethality becomes an afterthought, culture dies. And once culture dies, no amount of money, technology, or motivational posters will bring it back. What will bring it back is something simpler and far harder: <strong>respecting the soldier&#8217;s time.</strong> A nation that values its soldiers&#8217; lives enough to send them to war should value their hours enough not to waste them.</p><h2>3. How to add five divisions of tooth without recruiting a single new soldier</h2><p>The reforms that matter most aren&#8217;t new weapons or doctrines. They&#8217;re the ones that give time back to soldiers and truth back to commanders. The math is not hard. The Army maintains an entire MOS series (the 92-series logisticians, property book officers, and supply clerks) whose work keeps the enterprise moving. These are capable, professional soldiers who do exactly what we ask of them. The problem isn&#8217;t them; it&#8217;s that <strong>we need far more of them than we should.</strong> In a digital logistics system, a supply section of five could do the work that today requires twenty. The payoff isn&#8217;t saving soldiers from their jobs. Rather, it&#8217;s <strong>redistributing billets to point those soldiers toward combat arms.</strong></p><p>Right now, roughly 8 percent of the active Army, about 35,000 billets, is dedicated to logistics accounting and property management. If automation and edge-level digitization reduced that demand by even <strong>80 percent,</strong> the Army could reassign nearly <strong>28,000 soldiers</strong> to fighting formations. Add the <strong>70 million hours</strong> now lost each year to manual inventory work &#8212; the equivalent of <strong>35,000 full-time soldiers </strong>&#8212; and you recover about <strong>63,000 soldier-equivalents</strong> of combat power: <strong>four to five divisions.</strong></p><p>No new recruits. No new bases. Just truth and time returned to the force.</p><p>That kind of gain is not a thought experiment &#8212; it&#8217;s the scale of advantage the United States will need to stay credible against nations that win by mass. China&#8217;s People&#8217;s Liberation Army fields <strong>nearly a million ground troops</strong> and adds another <strong>700,000 paramilitary reservists.</strong> Russia&#8217;s ground force, even after losses in Ukraine, numbers <strong>more than half a million.</strong> The active U.S. Army sits just under <strong>450,000.</strong> We will never win a headcount competition. Our edge has always been <em>time to truth </em>&#8212; the speed with which we can sense, decide, and act. Currently, however, our only digital advantage over the Wehrmacht is Microsoft Excel. Excel was written in 1985.</p><p>Whatever advantages we have historically enjoyed are shrinking. Today, DoD&#8217;s own Joint All-Domain C2 assessments put our logistics-data latency &#8212; the time between an event in the field and its reflection in a system &#8212; at <strong>hours to days.</strong> The target is <strong>seconds.</strong> Each day of lag is a day of lost deterrence. A near-peer who can see real readiness faster will always decide faster. If digitizing property at the edge cuts that latency by even one order of magnitude, it&#8217;s worth a hundred new aircraft.</p><p>The opportunity cost is visible in training and sustainment. A typical Brigade Combat Team logs <strong>18&#8211;20 training days per quarter.</strong> RAND&#8217;s analysis shows that inventories and administrative cycles erase <strong>three to five of those days</strong>. Reclaiming that time across the force is the equivalent of adding an extra month of live-fire training every year &#8212; without extending deployments or raising costs. Multiply that across 31 BCTs and you buy back the combat proficiency of a small army.</p><p>Digitizing the edge does more than make the Army faster; it makes modernization coherent. Every major investment we&#8217;re betting on &#8212; AI, autonomy, precision fires, even recruiting analytics &#8212; depends on clean, timely data. <strong>You can&#8217;t build intelligent logistics on dumb inputs.</strong> Fix the edge first, and every subsequent technology starts working as advertised. Ignore it, and we&#8217;ll keep spending billions to get the wrong answer faster.</p><p>The math is simple. The imperative is not. Eliminating analog property processes and automating the bulk of logistics billets yields roughly <strong>63,000 soldier-equivalents</strong> of combat power, five divisions&#8217; worth of readiness, deterrence, and depth. It is the cheapest, fastest way to strengthen the Army and, by extension, the credibility of American power.</p><h4>Time and truth</h4><p>In 2022, Russia booked its reservation in Kyiv because it believed its own slides. We don&#8217;t need to make the same mistake to share the same weakness. Every &#8220;green&#8221; dashboard, every spreadsheet that passes for truth, pushes us a little closer to our own Kanapa moment.</p><p><strong>Time and truth are the only advantages that scale without cost.</strong> Every hour we give back to a soldier compounds in training, retention, and deterrence. Every byte of accurate data multiplies the value of every other system we own. Digitizing logistics isn&#8217;t a staff reform; it&#8217;s how the United States preserves the edge that has defined its military for seventy-five years.</p><p>Wars have always been won by logistics, but not by this kind of logistics. Alexander marched on foot. Napoleon rode horses. Hitler relied on rail. We rely on Excel. Excel is brilliant software, but it&#8217;s forty years old. If that remains the backbone of the most sophisticated army in history, we have confused automation with transformation.</p><p>A spreadsheet is not a strategy.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.fysa.org/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&quot;,&quot;text&quot;:&quot;Share FYSA&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.fysa.org/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share"><span>Share FYSA</span></a></p><p>Our adversaries will always have us outnumbered. Our advantage has to be precision &#8212; <strong>knowing, faster and more accurately than anyone else, what we have and where it is.</strong> In the industrial age, armies maneuvered across geography. In the information age, they maneuver across time. The decisive movement today is not the speed of a tank but the speed of truth &#8212; how quickly accurate data moves through the force. <strong>Awareness &#8212; the ability to move truth faster than the enemy &#8212; has become the twenty-first-century form of maneuver.</strong> That awareness turns information into lethality.</p><p>Digitizing property at the edge isn&#8217;t glamorous, but it&#8217;s decisive. It frees commanders to train, maintain, and fight instead of reconcile. It ensures that readiness slides finally match the motor pool. <strong>No ERP, no AI, no sensor network or precision weapon can deliver greater or faster return on investment, because every one of them still depends on the quality of the data beneath it.</strong> Fix the edge first, and everything else starts working as advertised. Ignore it, and we&#8217;ll keep spending billions to get the wrong answer faster. Done right, digitizing the edge guarantees that the next war, when it comes, will be won by soldiers, not lost in spreadsheets<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a>.</p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><h2>Further Reading &amp; Source Notes</h2><h4>Army Policy and Modernization Efforts</h4><ul><li><p><strong>&#8220;Modernization: Out with the Old, In with the New,&#8221; Army.mil (Jan 2024)<br></strong>Gen. Randy George tasked Army Materiel Command to make the removal of excess and unused equipment more efficient. The <em>Rapid Removal of Excess (R2E)</em> program aims to reduce property burdens and simplify accountability, though it does not quantify the labor cost of current practices.</p></li><li><p><strong>&#8220;I Corps Reduces Property Demand on Units&#8221; (Army.mil, Jun 2024)<br></strong>Details how units turned in thousands of excess items under the R2E initiative to relieve &#8220;inventory, maintenance, and accountability management demands.&#8221; Illustrates the systemic appetite to offload inventory that the current system cannot manage efficiently.</p></li><li><p><strong>SMA Michael Weimer, &#8220;Focused on Fundamentals&#8221; (AUSA, Oct 2023)<br></strong>Emphasizes &#8220;brilliance at the basics,&#8221; supply discipline, and accountability as readiness fundamentals. Useful context for the Army&#8217;s current cultural narrative around property discipline, but no quantitative analysis of administrative cost.</p></li><li><p><strong>&#8220;Leadership Training Gaps in Property Accountability,&#8221; Army Sustainment (2016)<br></strong>Notes that many junior officers outside logistics branches receive minimal formal training in property accountability. Highlights the complexity and risk of current processes at the company level</p></li><li><p><strong>&#8220;Company Commanders&#8217; Property Books Have Significantly Grown Over the Past 20 Years,&#8221; Duke Sanford School, Jnah-FSRP Field Study (2023)<br></strong>Quotes senior leaders acknowledging the exponential growth of property-book burdens at the company level. Provides qualitative support for the claim that analog accountability drains unit focus.</p></li><li><p><strong>Command Supply Discipline Program (Lessons Learned / Army Manual)<br></strong>Explains the regulatory inventory cycles (change of PHRH, annual, sensitive items) that drive recurring administrative load. Useful for understanding the mandatory compliance that underpins the 70-million-hour estimate.</p></li><li><p><strong>&#8220;Understanding DA 2062: Guide to Military Equipment Accountability,&#8221; Business Money (2024)<br></strong>Describes DA Form 2062 as the foundation of Army property control through hand receipts and annexes. Process overview but lacks quantification of time or productivity cost.</p></li><li><p><strong>&#8220;The Importance of Keeping Track,&#8221; PEO IEW&amp;S (2017)<br></strong>Addresses systemic weaknesses in property accountability and audit preparation, reinforcing that the issue is acknowledged but under-measured.</p></li></ul><h4>Government Accountability Office (GAO) &amp; Inspector General Reports</h4><ul><li><p><strong>GAO-25-106868 (2025): </strong><em><strong>DoD Financial Management &#8211; Greater Accountability Needed over Contractor-Acquired Property<br></strong></em>Finds that billions in contractor-acquired property remain unrecorded or inconsistently tracked&#8212;direct evidence of &#8220;ground truth&#8221; and &#8220;systems truth&#8221; divergence.</p></li><li><p><strong>GAO-23-106136 (2023): </strong><em><strong>Defense Supply Chain &#8211; DoD Needs Better Information to Manage Spare Parts<br></strong></em>Estimates billions in spare parts stored as excess, obsolete, or underutilized inventory due to inaccurate data&#8212;supports 5&#8211;10% waste assumption.</p></li><li><p><strong>GAO-19-493 (2019): </strong><em><strong>DoD Inventory Management &#8211; Improved Policies Needed to Address Deficiencies<br></strong></em>Identifies $90 billion in secondary inventory mismanagement, a key precedent for the $35 billion Army waste anchor.</p></li><li><p><strong>DoDIG-2022-106 (2024): </strong><em><strong>Audit of Army Government-Furnished Property in Kuwait<br></strong></em>Reports 23,000 missing items in Army records&#8212;illustrates that accountability failures occur in routine operations, not just combat.</p></li><li><p><strong>Congressional Research Service R46067 (2019): </strong><em><strong>Defense Primer &#8211; Audit of the Department of Defense<br></strong></em>Summarizes DoD&#8217;s decades-long inability to achieve a clean audit opinion; confirms the persistent data-integrity problem.</p></li><li><p><strong>GAO Testimony, &#8220;DoD Audit Progress and Challenges&#8221; (2023)<br></strong>Notes that DoD has spent over <strong>$5 billion</strong> since 2017 on audit-readiness with little measurable progress.</p></li></ul><h4>RAND Corporation Studies</h4><ul><li><p><strong>&#8220;Non-Deployable Time and Administrative Burden in the U.S. Army&#8221; (2018)<br></strong>Finds company-grade officers spend <strong>40&#8211;60%</strong> of their time on administrative tasks. Foundation for the &#8220;training time lost&#8221; argument.</p></li><li><p><strong>&#8220;Soldier Tempo and Fatigue: Understanding Non-Mission Workload&#8221; (2019)<br></strong>Reports average soldier workweeks of <strong>59&#8211;63 hours</strong>, much of it consumed by non-mission tasks; links administrative overload to fatigue and morale.</p></li><li><p><strong>&#8220;Officer Retention and Talent Management&#8221; (2022)<br></strong>Identifies &#8220;bureaucratic culture&#8221; and &#8220;lack of autonomy&#8221; as top reasons officers exit before 10 years of service.</p></li><li><p><strong>&#8220;Army Command Climate and Leadership Trends&#8221; (2023)<br></strong>Provides survey data showing <strong>40&#8211;50%</strong> of enlisted soldiers have low confidence in leadership responsiveness.</p></li></ul><h4>Department of Defense &amp; Congressional Data</h4><ul><li><p><strong>DoD Acquisition Workforce Human Capital Initiatives (AWF-HCI) Annual Report (2023)<br></strong>Documents <strong>~150,000 acquisition professionals</strong>, double the number of infantry soldiers across the Army and Marine Corps combined.</p></li><li><p><strong>OSD Personnel &amp; Readiness, DoD Civilian Workforce Statistics (FY2023)<br></strong>Confirms <strong>~760,000 civilians</strong> employed by DoD&#8212;nearly one for every active-duty service member.</p></li><li><p><strong>CRS &#8220;Department of Defense Contractor and Civilian Workforce&#8221; (2022)<br></strong>Estimates <strong>~700,000 contractors</strong> supporting DoD; validates the &#8220;one-for-one&#8221; uniform-to-civilian ratio.</p></li><li><p><strong>DoD Comptroller, FY2024 Budget Overview<br></strong>Shows <strong>36% of the base budget</strong> devoted to management and support activities&#8212;evidence of back-office expansion.</p></li><li><p><strong>2018 NDAA Section 912 Report<br></strong>Identifies <strong>2,300+ business and logistics IT systems</strong> across DoD; foundational for the duplication argument.</p></li></ul><h4>Retention, Morale, and Health</h4><ul><li><p><strong>Army People Strategy, &#8220;Why They Leave&#8221; Survey (2023)<br></strong>Lists top separation reasons: administrative burden, lack of meaningful work, poor work-life balance, and declining trust in leadership.</p></li><li><p><strong>Army Risk Reduction and Health Promotion Report (2022)<br></strong>Finds <strong>over 60%</strong> of soldiers report chronic fatigue or lack of sleep linked to workload; cites loss of purpose as a top stressor.</p></li><li><p><strong>DoD Annual Suicide Report (2023)<br></strong>Army suicide rate <strong>~36 per 100,000</strong>, double the civilian average; identifies workload and institutional stress as major contributors.</p></li><li><p><strong>Army Climate and Safety Survey (2022)<br></strong>Shows confidence in senior leadership has dropped from <strong>65% (2014)</strong> to <strong>&#8776;50% (2022)</strong>; fewer than half of enlisted believe feedback leads to change.</p></li></ul><h4>Comparative &amp; Industry Benchmarks</h4><ul><li><p><strong>McKinsey Global Institute, &#8220;Automation in Defense&#8221; (2021)<br></strong>Estimates 20&#8211;40% efficiency gains from digitizing repetitive administrative tasks&#8212;validates automation ROI assumptions.</p></li><li><p><strong>IISS </strong><em><strong>The Military Balance 2024<br></strong></em>Provides comparative force sizes: PLA &#8776; 975 K ground troops; Russian Army &#8776; 550 K; U.S. Army &#8776; 445 K&#8212;context for &#8220;mass vs. time-to-truth&#8221; argument.</p></li><li><p><strong>CSIS, &#8220;Defense Industrial Workforce and Competitiveness&#8221; (2023)<br></strong>Notes U.S. defense-industrial workforce &#8776; 1.1 M vs China&#8217;s &gt; 7 M&#8212;underscores need to extract more combat power per soldier.</p></li><li><p><strong>GAO-24-210, </strong><em><strong>Army Training Readiness</strong></em><strong> (2024)<br></strong>Finds typical BCT averages <strong>18&#8211;20 training days per quarter</strong>, with administrative cycles eroding <strong>3&#8211;5 days</strong>&#8212;used in Section 3.</p></li><li><p><strong>McKinsey Global Institute &amp; DoD JADC2 Assessments (2022)<br></strong>Highlight that current logistics data latency is measured in <em>hours to days</em>; modernization goal is <em>seconds</em>&#8212;basis for &#8220;awareness as maneuver&#8221; framing.</p></li></ul><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[Introducing FYSA]]></title><description><![CDATA[The defense technology ecosystem in America and abroad, from EUCOM to INDOPACOM to SOUTHCOM, is rife with hyperbole and surface-level discussions.]]></description><link>https://www.fysa.org/p/introducing-fysa</link><guid isPermaLink="false">https://www.fysa.org/p/introducing-fysa</guid><dc:creator><![CDATA[James Boyd]]></dc:creator><pubDate>Wed, 14 Jan 2026 15:32:21 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/b607f16f-5949-4107-8146-67b2351cd827_2831x1226.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The defense technology ecosystem in America and abroad, from EUCOM to INDOPACOM to SOUTHCOM, is rife with hyperbole and surface-level discussions.</p><p>My co-founder (<span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;JJ Wilson&quot;,&quot;id&quot;:19761214,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7929c4e7-9e78-4aa3-904f-9a213b403491_498x498.jpeg&quot;,&quot;uuid&quot;:&quot;6152e2cd-1009-41dc-9bc8-b8cfa69c9448&quot;}" data-component-name="MentionToDOM"></span>, who you&#8217;ll hear from frequently in this newsletter) and I get it &#8212; punchy, tweet-length statements about <em>building </em>or <em>rearming</em> and <em>lethality </em>are easy to write. It&#8217;s easy to <em>say</em> we need to have more drones and deploy AI. Few on the side of Western democracies are anti-building or against enhancing the lethality of America&#8217;s forces and those of her allies.</p><p>It&#8217;s much harder to <em>do </em>these things (if they were easy to do, they would be done!) because, in part, meaningful interrogation of the underlying challenges that exist between saying a thing and getting it done remain largely missing from the defense tech discourse.</p><p>How should we expand the definition of modern warfare, and how does that impact how the Pentagon operations and technologies it procures? Why does the underlying technological architecture behind the enterprise systems behind the warfighter fail, and how do we fix it? How can the Department of War and Ministries of Defence improve the balance between innovation and hierarchy when these two vital concepts are so often at odds with one another? What are programmatic steps Militaries can take today to improve how it buys and deploys software? How do shifting geopolitical priorities impact defense from Europe to Taiwan, and everywhere in between?</p><p>Unpacking these issues can&#8217;t be done in a Tweet, and empty platitudes help no one.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.fysa.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.fysa.org/subscribe?"><span>Subscribe now</span></a></p><p>We&#8217;re giving warfighters, civilians at the Pentagon, fellow defense tech builders, and industry observers the unfiltered truth about the most complicated issues confronting the most complex institution on Earth: The Department of War. Because the Pentagon is a global institution, expect global commentary &#8212; we&#8217;ll dive deep into the state of play for defense technology companies across Europe, explore burgeoning issues in INDOPACOM, and abstract requirements for global security to first principles.</p><p>For those serious about supporting the warfighter &#8212; for those who do this not because of VC funding or because it&#8217;s &#8220;cool&#8221; or because you can go viral &#8212; for those who do this because it is <em>right, </em>join us.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.fysa.org/p/introducing-fysa?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.fysa.org/p/introducing-fysa?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p>]]></content:encoded></item></channel></rss>