The Rise of Unmanned Warfare
The Hand Behind Unmanned
Origins of the US Autonomous Military Arsenal
by Jacquelyn Schneider and Julia Macdonald
Online Description
The Hand Behind Unmanned explains why the United States built the unmanned arsenal it actually has: an arsenal dominated by expensive, remotely controlled aerial platforms rather than by the wider family of unmanned mines, torpedoes, missiles, loitering munitions, satellites, surface systems, underwater systems, and cheap attritable drones. Published by Oxford University Press in 2025, the book uses interviews, doctrine, military writings, historical sources, and process tracing to reconstruct more than a century of U.S. unmanned weapons development, from mines and balloons to Reapers and Global Hawks.
The core argument is constructivist: the U.S. arsenal is not the inevitable product of technology, threat, cost, or military efficiency. It is the product of beliefs, service identities, policy entrepreneurs, critical junctures, and path dependencies. In particular, Schneider and Macdonald emphasize beliefs in military revolutions and technological determinism, beliefs in casualty aversion and force protection, and the constraining power of service culture. The result is a SAASS-relevant account of how ideas become programs, programs become budget lines, and budget lines produce a force that may or may not be suited to the next war.
Source note: This note is reconstructed from public sources rather than a full book PDF. Page references use Oxford Academic’s public chapter page ranges and page numbers visible in public reviews. Exact quotes are included only when visible in public review excerpts.
Author Background
Jacquelyn Schneider is listed by Hoover as the Hargrove Hoover Fellow and director of the Wargaming and Crisis Simulation Initiative at Stanford’s Hoover Institution; Hoover also notes prior positions at CNAS, RAND, and the Naval War College, as well as prior service as an Air Force officer. Julia Macdonald is listed by Hoover as a research professor at the Korbel School of International Studies, University of Denver, and director for research and engagement at the Asia New Zealand Foundation.
Their combined work sits at the intersection of technology, national security, political psychology, defense policy, and U.S. military strategy. The public reviews and launch materials frame this book as a contribution to military innovation studies and to debates over drones, autonomy, and the future of war.
60-Second Brief
- Core claim: The U.S. unmanned arsenal is socially and politically constructed: beliefs about military revolutions, beliefs about casualty aversion, and armed-service identities explain why certain unmanned systems flourished while others languished.
- Causal logic in a phrase: Beliefs + service identity + political shocks + policy entrepreneurs → investment patterns → path-dependent arsenal.
- Main level(s) of analysis / lens: Organizational culture, beliefs/cognition, bureaucratic politics, civil-military policy networks, war experience, and military innovation theory.
- Why it matters for SAASS 660:
- It rejects technological determinism without denying that technology matters.
- It shows how military innovation depends on more than invention or procurement.
- It distinguishes warfighting effectiveness from acquisition activity: buying unmanned systems is not the same thing as fielding the right unmanned force for the next war.
- It is directly useful for analogies about AI, autonomy, drone swarms, collaborative combat aircraft, cheap mass, precision strike, cyber, space, and future force design.
- Best single takeaway: The “hand behind unmanned” is not the machine; it is the human network of beliefs, identities, shocks, champions, and institutions that decides which technologies become military power.
SAASS 660 Lens
Technological determinism vs. social construction. This book sits firmly on the social-construction side of the spectrum. It does not argue that technology is irrelevant; it argues that available technologies become militarily meaningful only after people interpret them through beliefs about war, organizational identity, and political cost. The book explicitly challenges explanations that focus only on capacity or structure and instead argues that beliefs and identities shape the capacities the United States chooses to build.
Sources of military innovation. Innovation here comes from the interaction of ideas, service cultures, political shocks, and policy entrepreneurship. The book’s dependent variable is not simply “more drones” but the composition and trajectory of the U.S. unmanned arsenal: why remotely piloted aerial platforms became dominant while other unmanned weapons—missiles, mines, munitions, underwater systems, and cheap mass—received different treatment.
Most important intervening factors. The most important factors are belief, culture, policy entrepreneurship, and war experience. Organizational design and acquisition matter, but mainly as channels through which beliefs and identities are translated into programs and budget lines. Law and ethics are less central than political casualty sensitivity and force protection, though the book’s logic has ethical implications because unmanned systems can alter perceptions of cost, risk, and political accountability.
Implications for RMAs and future war. The book treats the RMA less as an objective revolution than as a powerful belief system. Advocates of military revolutions and technological determinism helped create expectations that the right information-age technologies could produce dramatic operational advantages. That belief shaped real procurement outcomes, but it also risked producing exquisite, expensive systems misaligned with future attritional or great-power war.
Military effectiveness vs. efficiency. The book is a warning against mistaking administrative modernization, acquisition activity, or technological sophistication for military innovation. A system counts for SAASS 660 only if it changes warfighting in a way that substantially increases effectiveness. Schneider and Macdonald’s argument implies that the United States often optimized for political and organizational fit—force protection, remote control, precision, service identity—rather than for the full spectrum of future military effectiveness.
Contemporary technology relevance. For AI and autonomy, the book suggests that adoption will depend less on technical maturity alone than on whether systems fit service identities, receive champions, answer a wartime problem, and align with dominant beliefs about future war. For cyber, information technology, space, and missiles, the conclusion explicitly extends the unmanned case to other contemporary technology debates. For cheap drones, loitering munitions, and mass, the Ukraine discussion makes the core warning concrete: an arsenal built around exquisite remote platforms may be poorly matched to wars that reward cheap, expendable, networked systems.
Seminar Placement
- Unit: Phase II — intervening factors: policy entrepreneurs, political shocks, service cultures, beliefs, and organizational identity. It also bridges into Phase III because RMA beliefs and future-war claims are central to the argument.
- Seminar: Seminar Nine: Policy Entrepreneurs, Political Shocks, and Service Cultures.
- Why this book is in this seminar: It is the assigned text that most directly fuses policy entrepreneurship, political shocks, and service identity into an explanation of military-technical adoption. It asks why the United States chose one unmanned trajectory rather than another, and it treats that outcome as a product of human choices rather than technological inevitability.
- Closest neighboring texts in the syllabus: Mackenzie on social construction of technology; Hankins on organizational culture and bureaucratic politics; Rosen and Hone on military innovation mechanisms; Farrell, Rynning, and Terriff on post-Cold War transformation; Krepinevich on RMAs; Biddle on whether new technologies transform or must be integrated into existing warfighting systems.
Seminar Questions (from syllabus)
- How do the conflicting positions of military revolution advocates and force protection advocates inform their advocacy for certain types of uninhabited weapons systems?
- Who is the “hand behind unmanned?”
- What is the role of war in the development of the US autonomous military arsenal?
- What is the role of policy entrepreneurs?
- What is the role of culture?
✅ Direct Responses to Seminar Questions
How do the conflicting positions of military revolution advocates and force protection advocates inform their advocacy for certain types of uninhabited weapons systems?
Military revolution advocates see unmanned systems through the lens of first-mover advantage, information-age war, reconnaissance-strike complexes, precision, speed, and operational effectiveness. Their preferred technologies are those that appear to compress kill chains, exploit information superiority, and deliver a leap in military effectiveness. Chapter 3 traces this belief to Andy Marshall and the Office of Net Assessment and links it to technological determinism and RMA narratives (pp. 95–126).
Force protection advocates see unmanned systems as a way to remove U.S. personnel from danger while preserving the ability to use force. Chapter 4 traces this belief from Vietnam through AirLand Battle, Weinberger, Powell, Bosnia, the Bush transformation era, and COIN operations (pp. 127–170). The belief does not merely support “drones”; it supports systems that make the political and human cost of force appear more manageable.
The two positions converged around remotely piloted aerial platforms such as Predator and Reaper because those systems promised persistence, precision, low U.S. risk, and visible technological superiority. They diverged over other unmanned options: munitions, mines, missiles, and cheap mass may be highly relevant for great-power war, but they do not always fit the political appeal of protecting U.S. personnel through remote presence. Reviews of the book emphasize that the post-9/11 wars shifted the arsenal toward uninhabited drones prioritizing precision and casualty avoidance.
Who is the “hand behind unmanned?”
The “hand” is not a single person, service, technology, or market. It is a changing cast of policy entrepreneurs, service champions, military officers, civilian defense intellectuals, organizations, and shocks that translate beliefs into weapons investments. Air University’s review argues that the answer is hard because Schneider and Macdonald present both entrepreneurs and historical context as causal forces; the review ultimately characterizes the hand as a cast of characters with competing beliefs acting under political constraints.
The key individual in the military-revolution story is Andy Marshall, whose Office of Net Assessment had limited formal budget power but built networks, educated officers and academics, and propagated ideas through defense reviews, PME, think tanks, and military institutions. The book-launch discussion also highlights service influencers such as LeMay, Schriever, Rickover, Powell, DePuy, and other internal champions who shaped how services interpreted new technology.
So the hand is best understood as human agency under institutional constraint: policy entrepreneurs can open pathways, but service identities and wars decide which pathways remain viable.
What is the role of war in the development of the US autonomous military arsenal?
War is both catalyst and filter. Vietnam helped generate sticky beliefs about force protection and casualty sensitivity; the Gulf War reinforced beliefs in precision, information-age warfare, and technological dominance; 9/11 and the wars in Afghanistan and Iraq redirected unmanned investment toward persistent aerial ISR and strike; Ukraine exposed the limits of an arsenal dominated by exquisite remote platforms when the battlefield rewards cheap mass, attrition tolerance, and rapid adaptation.
The authors’ launch discussion puts this sharply: war is described as a major catalyst and “final arbiter” of innovation because it creates operational urgency that can loosen peacetime service identities. In the absence of war, services tend to revert to core identities and traditional platforms; in war, battlefield necessity can create space for experimentation outside those identities.
For SAASS 660, this means war can accelerate military innovation, but not automatically. War creates demand signals and legitimacy; organizations still need concepts, champions, and integration.
What is the role of policy entrepreneurs?
Policy entrepreneurs translate ideas into organizational influence. They build networks, frame problems, attach technologies to beliefs about the future of war, and shepherd ideas through doctrine, PME, defense reviews, congressional narratives, acquisition programs, and budgets. Chapter 2 explicitly uses policy entrepreneurs, critical junctures, and path dependencies to explain how ideas shape unmanned proliferation (pp. 63–94).
Andy Marshall is the central example. He did not need direct command over programs to shape the unmanned arsenal; he influenced the intellectual environment in which officers, analysts, and policymakers understood military revolutions and future war. The book-launch transcript emphasizes that Marshall built networks and empowered people who later carried those ideas into senior roles, defense reviews, and military education.
But policy entrepreneurs are not omnipotent. Chapter 5 argues that service identities can ignore, manipulate, or co-opt external beliefs when those beliefs threaten core platforms and missions (pp. 171–214).
What is the role of culture?
Culture is central. The book’s strongest cultural variable is service identity: the Army, Air Force, Navy, and Marine Corps each interprets unmanned systems through its own traditions, missions, platforms, and ideas of military virtue. Chapter 5 argues that service identities shape attitudes toward unmanned systems and determine whether broader beliefs about military revolutions or casualty aversion translate into investment (pp. 171–214).
The Air Force can adopt unmanned systems when they reinforce strategic airpower, persistence, precision, or manned-aircraft command relationships. The Navy is presented in the launch discussion as having a particularly strong and internally competitive identity, which helps explain difficulty in adopting armed unmanned systems. The Marine Corps appears more adaptable, but is constrained by its relationship to Navy budgets and acquisition.
Culture therefore shapes not only whether a technology is adopted, but what version of the technology survives. A service may accept autonomy only after bending it back toward familiar platforms, missions, and command relationships.
Chapter-by-Chapter Breakdown
Introduction: Introduction
- One-sentence thesis: The central puzzle is not why the United States uses unmanned systems, but why it built this particular unmanned arsenal—dominated by remotely controlled aerial platforms rather than other unmanned alternatives (pp. 1–16).
- What happens / what the author argues: The introduction sets up the book’s main question: why has the United States invested so heavily in remotely controlled platforms over the last two decades when earlier unmanned outlays included munitions and other systems? The authors argue that the answer lies in the beliefs and identities of the U.S. defense community, not in a purely rational calculation of military effectiveness.
- Key concepts introduced: Unmanned arsenal, proliferation, beliefs, identity, drones, munitions, military innovation, military effectiveness.
- Evidence / cases used: The contrast between contemporary remotely piloted platforms and earlier unmanned munitions; the current puzzle of whether the U.S. unmanned arsenal is suited for Ukraine-style and great-power conflict.
- Why it matters for SAASS 660: The introduction forces the course’s central distinction: a technological acquisition trend is not automatically a military innovation. The key question is whether the resulting arsenal produces a significant increase in military effectiveness.
- Links to seminar questions: Sets up “who is the hand?” and points toward culture, beliefs, and policy entrepreneurs as the answer.
- Notable quotes: None used from the public chapter excerpt.
Chapter 1: The Rise of Unmanned Technologies
- One-sentence thesis: U.S. unmanned systems have a much longer and broader history than drones, and that history reveals many possible paths not taken (pp. 17–62).
- What happens / what the author argues: The chapter provides the historical baseline: unmanned technology includes mines, balloons, torpedoes, satellites, unmanned aircraft, unmanned ground vehicles, unmanned surface vehicles, guided bombs, and missiles. It traces the development of unmanned systems from the Revolutionary War and Civil War through the Cold War, Vietnam, Afghanistan, and Iraq.
- Key concepts introduced: Broad unmanned technology; historical trajectory; divergence in unmanned investment; unmanned systems as a family of technologies rather than a synonym for drones.
- Evidence / cases used: Early mines and balloons; torpedoes; Cold War missiles and satellites; guided bombs; unmanned aircraft; Afghanistan and Iraq; post-9/11 divergence in investment.
- Why it matters for SAASS 660: The chapter prevents a narrow “drone revolution” story. It shows that the real innovation question is selection: why did one branch of unmanned development dominate over other plausible branches?
- Links to seminar questions: Provides the empirical base for asking why military revolution advocates, force protection advocates, and service cultures favored some systems over others.
- Notable quotes: None used from the public chapter excerpt.
Chapter 2: Ideas and Unmanned Proliferation
- One-sentence thesis: The book’s theory is that service identity, military-revolution beliefs, and casualty-aversion beliefs shape the U.S. unmanned arsenal through policy entrepreneurs, critical junctures, and path dependencies (pp. 63–94).
- What happens / what the author argues: Chapter 2 builds the causal framework. It draws from military innovation literature and constructivist IR/foreign-policy theory to argue that beliefs and identities shape how defense actors interpret emerging technologies under uncertainty.
- Key concepts introduced: Beliefs, identities, military effectiveness, military innovation, military revolutions, casualty aversion, policy entrepreneurs, critical junctures, path dependency.
- Evidence / cases used: The chapter functions mainly as theory-building, but it frames later cases by specifying how ideas should leave observable traces in doctrine, budgets, advocacy networks, and adoption patterns.
- Why it matters for SAASS 660: This is the book’s theory chapter. It gives students a causal template for analyzing emerging technologies without defaulting to either technological determinism or generic bureaucratic inertia.
- Links to seminar questions: Directly addresses the role of policy entrepreneurs and sets up why culture matters.
- Notable quotes: One review-visible book excerpt describes technological effectiveness as socially sustained “by those who have an interest in using, developing and sustaining that technology” (p. 67).
Chapter 3: Military Revolutions and Technological Determinism
- One-sentence thesis: Belief in military revolutions, propagated through Andy Marshall and the Office of Net Assessment, helped legitimate exquisite unmanned systems as the path to revolutionary operational effectiveness (pp. 95–126).
- What happens / what the author argues: The chapter traces the origins and evolution of the belief in military revolutions inside the Department of Defense. It links this belief to technological determinism and to RMA narratives, then shows how it cascaded through key individuals and networks.
- Key concepts introduced: Military revolution belief, technological determinism, RMA, exquisite unmanned systems, policy entrepreneur, ONA, Andrew Marshall.
- Evidence / cases used: Andy Marshall; Office of Net Assessment; RMA discourse; defense intellectual networks; the push for unmanned weapons as tools for revolutionary increases in operational effectiveness.
- Why it matters for SAASS 660: This chapter connects directly to Phase III of the course. It treats the RMA not simply as a material change in warfare, but as a belief system that shaped actual force development.
- Links to seminar questions: Explains the military-revolution side of the seminar’s first question and clarifies the policy entrepreneur role.
- Notable quotes: A review-visible book excerpt says advocates treated “unmanned weapons [as] an inevitable next step of technological development” (p. 113).
Chapter 4: Force Protection and Casualty Aversion Beliefs
- One-sentence thesis: Casualty aversion and force protection became powerful beliefs after Vietnam and made unmanned systems attractive as a way to use force while reducing U.S. personnel risk (pp. 127–170).
- What happens / what the author argues: The chapter traces casualty-aversion beliefs from Vietnam through AirLand Battle, Weinberger, Powell, Bosnia, the Bush transformation years, and recent COIN operations. It shows how force protection intermingled with military-revolution beliefs and supported contemporary investments in unmanned systems.
- Key concepts introduced: Casualty aversion, force protection, Vietnam-generation officers, AirLand Battle, Powell Doctrine, Bosnia, 9/11, COIN, Predator.
- Evidence / cases used: Vietnam; Army doctrine; Weinberger and Powell; Bosnia; post-9/11 transformation; COIN; Predator employment.
- Why it matters for SAASS 660: The chapter shows that political cost can be a driver of technological adoption. A system can be adopted not because it is most decisive, but because it appears to reduce the domestic and institutional cost of fighting.
- Links to seminar questions: Directly answers the force-protection side of the first seminar question and the role of war.
- Notable quotes: A review-visible book excerpt states that “the U.S. public is casualty intolerant” (p. 17), a belief the authors analyze as politically and organizationally consequential.
Chapter 5: Service Identity
- One-sentence thesis: Service identity is the strongest filter through which unmanned technologies are accepted, rejected, co-opted, or reshaped (pp. 171–214).
- What happens / what the author argues: The chapter examines the Army, Air Force, Navy, and Marine Corps and shows how each service’s self-conception shapes attitudes toward unmanned systems. It argues that services ignored, manipulated, or co-opted military-revolution and casualty-aversion beliefs when those beliefs threatened platforms or projects central to service identity.
- Key concepts introduced: Service identity, organizational culture, armed-service traditions, platform identity, co-optation, nonorganic beliefs.
- Evidence / cases used: The four armed services; Air Force identity; Navy identity; Marine adaptability; Army mission identity; cultural attachment to core platforms and missions.
- Why it matters for SAASS 660: This chapter is the best link to the organizational-culture portion of the course. It shows why technology adoption is not enough: each service will tend to adopt the version of the technology that preserves its identity.
- Links to seminar questions: Directly answers the role of culture and explains why policy entrepreneurs face limits.
- Notable quotes: None used from the public chapter excerpt.
Chapter 6: Conclusion
- One-sentence thesis: The U.S. unmanned arsenal reveals how beliefs and identities shape military technology, and the resulting force may be mismatched for Ukraine-style attrition and future great-power conflict (pp. 215–240).
- What happens / what the author argues: The conclusion brings the argument together, applies it to the Russia-Ukraine war, and extends the lessons to cyber, information technologies, space, and missiles. It asks what unmanned systems the United States should invest in next.
- Key concepts introduced: Future unmanned investments, Ukraine, great-power conflict, cyber, information technologies, space, missiles, cost, mass, resilience.
- Evidence / cases used: Ukraine-Russia conflict; U.S. support to Ukraine; debates over cyber, information technology, space, missiles, and future unmanned systems.
- Why it matters for SAASS 660: This is the chapter most useful for the final brief. It converts the historical case into an analogical warning: the United States may overinvest in elegant systems that fit inherited beliefs while underinvesting in cheap, modular, attritable, massed systems needed for future war.
- Links to seminar questions: Shows how war, culture, and policy entrepreneurship will shape the next unmanned trajectory.
- Notable quotes: None used from the public chapter excerpt.
Theory / Framework Map
- Central problem: Why did the United States build an unmanned arsenal dominated by expensive remote aerial systems rather than a broader or different set of unmanned capabilities?
- Dependent variable(s):
- Composition of the U.S. unmanned arsenal.
- Trajectory of investment across unmanned technology types.
- Adoption, neglect, co-optation, or transformation of unmanned systems within services.
- Key independent variable(s):
- Service identity.
- Belief in military revolutions and technological determinism.
- Belief in casualty aversion and force protection.
- Policy entrepreneurs and belief networks.
- Critical junctures: Vietnam, the end of the Cold War, 9/11, GWOT, Ukraine.
- Path dependency in programs, budgets, and doctrine.
- Causal mechanism(s):
- Beliefs reduce uncertainty about emerging technology.
- Policy entrepreneurs attach technologies to compelling theories of future war.
- Service identities filter those beliefs through organizational self-conceptions.
- War and political shocks create windows for adoption.
- Successful advocacy becomes doctrine, acquisition, budget lines, and path-dependent arsenals.
- Scope conditions:
- Most directly applies to U.S. Department of Defense unmanned systems.
- Strongest for technologies whose military value is uncertain or contested.
- Strongest where services must integrate technologies that threaten core missions or platforms.
- Rival explanations or competing schools:
- Technological determinism: the best technology naturally wins.
- Rational military effectiveness: services buy what works best.
- Civilian intervention: political leaders impose innovation.
- Interservice competition: services innovate to protect budgets.
- Organizational mavericks: internal rebels drive change.
- Threat-based realism: adversary capability determines adoption.
- Observable implications:
- Technologies that fit service identity should be adopted more easily.
- Technologies that threaten service identity should be resisted, reshaped, or orphaned.
- Ideas with powerful entrepreneurs should leave traces in PME, doctrine, studies, budget language, and acquisition narratives.
- Shocks should produce divergence points in the arsenal.
- War should accelerate adoption when technology solves immediate operational or political-cost problems.
- What would weaken the author’s argument?
- Evidence that cost, technical performance, or threat explains adoption better than beliefs and identities.
- Cases where services adopted identity-threatening technologies without war, champions, or external pressure.
- Evidence that policy entrepreneurs had little traceable influence on doctrine, budgets, or networks.
- Evidence that neglected systems were technically or operationally nonviable, not culturally or politically disadvantaged.
Key Concepts & Definitions (author’s usage)
- Unmanned technologies: A broad family of systems, not just drones; includes mines, balloons, torpedoes, satellites, unmanned aircraft, ground vehicles, surface vehicles, guided bombs, and missiles (pp. 17–62).
- Unmanned proliferation: The expansion and differentiation of unmanned systems across the U.S. arsenal, including why some systems become dominant while others remain marginal.
- Beliefs: Shared interpretive frameworks that help defense actors make decisions under technological and strategic uncertainty.
- Service identity: A service’s self-conception—its traditions, core missions, preferred platforms, and understanding of how war should be fought. Chapter 5 treats this as a primary determinant of unmanned adoption (pp. 171–214).
- Military revolution belief: The belief that certain technologies, properly adopted, can create discontinuous leaps in military effectiveness and reward first movers.
- Technological determinism: The assumption that technology’s military trajectory is inevitable or self-directing, rather than mediated by organizations, beliefs, and politics.
- Casualty aversion: The belief that U.S. public and political support for military operations is highly sensitive to U.S. losses, making force protection a strategic priority.
- Force protection: The operational and institutional priority of shielding U.S. personnel from battlefield risk; in this book, a major driver of remote and unmanned adoption (pp. 127–170).
- Policy entrepreneur: An actor who frames problems, builds networks, promotes beliefs, and links technologies to organizational or political opportunities.
- Critical juncture: A shock or turning point—Vietnam, the Gulf War, 9/11, Ukraine—that opens or redirects pathways for military-technical development.
- Path dependency: The tendency for early choices in doctrine, acquisition, and budgets to structure later possibilities.
- Exquisite systems: High-end, expensive, technically sophisticated platforms; in this book, associated with the U.S. tendency toward remotely piloted aerial systems rather than cheap mass.
- Cheap mass / attritable systems: Lower-cost systems that can be fielded in numbers and lost without strategic or political crisis; especially relevant to the Ukraine implications in the conclusion (pp. 215–240).
- Belief chaperones: Actors or networks that carry ideas through institutions until those ideas affect doctrine, programs, and budgets.
Key Arguments & Evidence
- The U.S. arsenal is not the inevitable product of technology.
The introduction argues that expensive drones became dominant through choices made by individuals and organizations motivated by beliefs and identities, not simply by rational military-effectiveness calculations (pp. 1–16). - Unmanned systems have many possible lineages.
Chapter 1’s history of mines, balloons, torpedoes, satellites, unmanned vehicles, guided bombs, and missiles shows that “unmanned” could have meant many different arsenals (pp. 17–62). - RMA beliefs favored exquisite systems and technological leap logic.
Chapter 3 traces military-revolution belief to Andy Marshall and ONA, showing how technological determinism and RMA narratives generated advocacy for systems expected to produce revolutionary operational effectiveness (pp. 95–126). - Casualty aversion favored remote systems that lowered U.S. personnel risk.
Chapter 4 traces force-protection beliefs from Vietnam through later doctrines and interventions, showing how unmanned systems became attractive as a technological answer to political and operational risk (pp. 127–170). - Service identity determines which unmanned systems survive contact with bureaucracy.
Chapter 5 shows that services co-opt, ignore, or manipulate broader beliefs when they threaten core service platforms and missions (pp. 171–214). - War redirects unmanned trajectories.
Vietnam, the Gulf War, 9/11, Afghanistan, Iraq, and Ukraine each changed the perceived problem unmanned systems were supposed to solve. Public reviews emphasize that the wars after 9/11 bear major responsibility for the character of the contemporary U.S. drone arsenal. - The current arsenal may be mismatched to future war.
The conclusion applies the argument to Ukraine and great-power conflict, where attrition, cheap mass, modularity, and resilience matter more than exquisite persistence alone (pp. 215–240). The CIA review highlights the book’s warning that U.S. drone investments are poorly suited for Ukraine-style cheap drone mass and may create problems for competition with China.
Barriers, Determinants, and Causal Logic
What drives innovation?
Innovation is driven by the interaction of a perceived military problem, a plausible technological solution, a legitimating belief about future war, a service or policy champion, and a shock that creates urgency. In this account, war and political shocks open the window; beliefs define what the window means; policy entrepreneurs push specific systems through it; service identity determines whether the system is adopted, resisted, or reshaped.
What blocks innovation?
The main blocker is not ignorance of technology. It is misalignment with service identity. Chapter 5 argues that services can ignore, manipulate, or co-opt unmanned systems that threaten core platforms and projects (pp. 171–214). A second blocker is the absence of a clear theory of victory: without a compelling idea of how the technology improves warfighting effectiveness, acquisition defaults to familiar programs and bureaucratic interests.
Which actors matter most?
Policy entrepreneurs matter when they create networks and attach technologies to persuasive beliefs. Service champions matter because they can translate external ideas into organic doctrine and programs. Senior military leaders matter when they define professional identity and mission priority. Civilian defense intellectuals matter when they shape RMA narratives. Industry matters when it takes risk ahead of demand signals, though the launch discussion notes that industry usually needs some government demand signal; General Atomics is discussed as a notable case where a company invested before large demand fully materialized.
Role of organizations and service cultures.
Organizations provide the channel; culture provides the filter. A technology that supports a service’s core self-image can be adopted and scaled. A technology that undermines that self-image may be reframed until it resembles an existing platform, as with unmanned aircraft treated as extensions of manned aviation rather than as a radically different force design problem.
Role of bureaucracies and politicians.
Bureaucracies convert beliefs into programs, requirements, acquisition pathways, and budget lines. Politicians and civilian leaders matter through shocks, budget authority, and strategic narratives, but the book’s emphasis is less on top-down civilian intervention and more on the diffusion of ideas through defense institutions.
Role of scientists and firms.
Scientists are not the central actors in this account. Firms matter when they anticipate or shape demand, but they are not free agents outside the defense ecosystem. The launch discussion stresses that the defense industrial base usually does not invest heavily without government demand signals, though recent acquisition pathways and defense-tech firms may alter that balance.
Role of operational experience.
Operational experience creates sticky beliefs. The authors’ launch discussion distinguishes beliefs generated from firsthand battlefield experience—especially Vietnam—from more intellectual beliefs that must be taught through networks and education. War makes some technologies urgent and renders others irrelevant.
What distinguishes success from failure?
A successful unmanned innovation requires more than technical viability. It needs operational relevance, a credible concept, fit with service identity or a champion strong enough to overcome identity resistance, political legitimacy, and a pathway into budgets and doctrine. Failure occurs when a system lacks a champion, threatens identity, misses the political moment, or solves the wrong warfighting problem.
⚖️ Assumptions & Critical Tensions
- Technology vs. organization: The book assumes technology does not determine its own military meaning; organizations and beliefs construct that meaning.
- Innovation vs. acquisition: More unmanned procurement does not necessarily equal military innovation. The SAASS threshold is increased military effectiveness, not novelty or spending.
- Precision vs. mass: The U.S. preference for exquisite precision platforms may be poorly suited for attritional environments that reward cheap, scalable systems.
- Force protection vs. victory: Reducing U.S. casualties can enable military action, but it can also distort force design if the system optimized for political risk is not the system needed to win.
- Remote control vs. autonomy: Removing the human from the platform is not the same as rethinking concepts of operation, command and control, mass, and attrition.
- Service identity vs. joint effectiveness: A service may adopt unmanned systems in ways that preserve its identity but fail to produce a coherent joint theory of war.
- Civilian policy entrepreneurship vs. military ownership: Outside entrepreneurs can seed ideas, but durable adoption often requires internal service champions.
- Peacetime identity vs. wartime adaptation: War can break bureaucratic inertia, but peacetime acquisition may revert to familiar platforms and service priorities.
Critique Points
- Strongest contribution: The book’s strongest contribution is its causal synthesis: it combines beliefs, service culture, policy entrepreneurship, critical junctures, and path dependency rather than choosing one single-cause theory of innovation. Air University’s review explicitly places it in military innovation studies and emphasizes its account of the social creation of the U.S. autonomous arsenal.
- Biggest blind spot: The CIA review argues that the book gives little treatment to the CIA or broader Intelligence Community despite their formative role in early operational unmanned reconnaissance and the Predator story. That omission matters because it leaves the service-identity thesis less tested against a non-Title 10 actor that shaped unmanned employment.
- Where the evidence is strongest: The evidence is strongest where the authors trace ideas through recognizable institutional pathways: ONA networks, RMA discourse, Vietnam-generation force-protection beliefs, service identities, doctrine, and budgets.
- Where the evidence is thin or contestable: The causal weight among entrepreneurs, shocks, and service culture is contestable. Air University’s review notes that the causal process can seem ambiguous: individuals matter, but historical shocks sometimes appear to overwhelm them.
- What kind of evidence would change your mind: A systematic budget/program comparison showing that cost, military utility, or adversary threat predicted adoption better than beliefs and identities would weaken the argument. So would evidence of major identity-threatening adoption without war, policy entrepreneurs, or internal champions.
Policy & Strategy Takeaways
- Do not equate autonomy procurement with military innovation. Ask what warfighting problem the system solves and whether it produces a significant increase in effectiveness.
- Build a joint theory of unmanned war before scaling platforms. Without a theory of victory, services will bend new systems toward old identities.
- Treat cheap mass, attrition tolerance, modularity, and replaceability as strategic variables, not second-order acquisition details.
- Identify and cultivate internal champions. External policy entrepreneurs can seed ideas, but services need organic advocates who can translate concepts into doctrine, training, and budgets.
- Use war lessons carefully. Ukraine is a powerful analogy for mass and adaptation, but the U.S. should avoid copying platforms without understanding the operational, industrial, and political logic behind them.
- Audit service identity effects. For every major AI/autonomy program, ask: is the service adopting the technology, or domesticating it into a familiar platform?
- Preserve idea-generation institutions. The book suggests that strategic clarity depends on people and organizations that articulate compelling theories of future war, not only on faster acquisition pathways.
660 Final Brief Utility
- Most useful historical analogies or cases from this book:
- Early mines, balloons, torpedoes, and missiles as reminders that unmanned systems are not new (pp. 17–62).
- Sputnik, missiles, and Cold War competition as a shock-driven pathway for technology adoption.
- Andy Marshall and ONA as a policy-entrepreneur network shaping RMA belief (pp. 95–126).
- Vietnam as the generator of sticky force-protection beliefs (pp. 127–170).
- Predator/Reaper and GWOT as the convergence of military-revolution, force-protection, and service-identity logics.
- Ukraine as a stress test for an arsenal built around exquisite remote aerial systems rather than cheap mass (pp. 215–240).
- What emerging idea, technology, or technological system this book helps analyze:
- AI-enabled autonomy.
- Collaborative combat aircraft.
- Drone swarms and loitering munitions.
- Cheap attritable mass.
- Precision strike and kill-chain compression.
- Cyber, space, information technologies, and missiles.
- Any technology that services may adopt only after forcing it to fit legacy identity.
- Shapers of events / adoption:
- War shocks.
- Service identities.
- Policy entrepreneurs.
- PME, doctrine, and defense reviews.
- Budget lines.
- Industry demand signals.
- Political beliefs about casualties and cost.
- Barriers to integration:
- Identity-threatened services.
- Lack of internal champions.
- No clear theory of victory.
- Preference for exquisite systems.
- Acquisition systems that reward familiar platforms.
- Political incentives to minimize visible U.S. risk rather than maximize war-winning capacity.
- Determinants of success or failure:
- Fit with operational problem.
- Fit with service identity or ability to change that identity.
- Champion network.
- Wartime urgency.
- Scalable industrial base.
- Coherent joint concept.
- Political sustainability.
- Limits of the analogy:
- The U.S. defense ecosystem is not Ukraine’s wartime improvisational ecosystem.
- COIN-era drone lessons do not automatically transfer to great-power war.
- Cheap mass solves some problems but not all high-end targeting, survivability, or command-and-control problems.
- Service culture is powerful but not immutable.
- Autonomy, AI, and cyber may diffuse through commercial ecosystems differently than traditional unmanned platforms.
- Best way to use this book in a 20-minute SAASS 660 brief:
- Use it as the mechanism case for how emerging technology becomes military power: not invention → adoption → victory, but belief → identity filter → champion network → shock → budget → doctrine → effectiveness or mismatch.
- Pair it with a contemporary case such as cheap drone mass, CCA, AI-enabled targeting, or resilient kill webs.
- Make the brief’s analytic punchline: the future of war will not be determined by technology alone; it will be determined by which organizations can build concepts, cultures, and arsenals that turn technology into military effectiveness.
⚔️ Cross-Text Synthesis (SAASS 660)
McNeill / Evron & Bitzinger / King.
Schneider and Macdonald reinforce the course’s warning against simple technological determinism. Like a McNeill-style account, the book recognizes that technology and power are connected; unlike a deterministic account, it shows that adoption depends on social and institutional mediation. For Evron and Bitzinger’s military-civil fusion questions and King’s AI/autonomy concerns, the book adds a caution: channeling civil-economic or AI capability into military innovation requires more than access to technology. It requires beliefs, doctrine, organizations, and service cultures capable of turning technology into effectiveness.
Posen / Rosen / Hone.
The book complicates Posen-style civilian-intervention arguments by showing that external civilian or policy entrepreneurs matter, but only when their ideas can survive service identity and historical timing. It complements Rosen by emphasizing internal champions and career networks, but it broadens the mechanism beyond promotion pathways into beliefs, shocks, and service identity. It fits Hone’s learning-war logic because it treats doctrine, PME, experimentation, and operational experience as mechanisms for turning ideas into capability.
Mackenzie / Bridger / Hankins / Farrell-Rynning-Terriff / Schneider-MacDonald.
This book is closest to Mackenzie and Hankins. Like Mackenzie, it treats technology as socially constructed by actors with interests, beliefs, and institutional positions. Like Hankins, it shows that service culture and bureaucratic politics shape what “technical progress” means. It also speaks to post-Cold War transformation debates: transformation is not inherently innovation; it succeeds only when new systems are integrated into concepts and organizations that improve military effectiveness.
Krepinevich / Biddle.
Schneider and Macdonald are useful alongside Krepinevich because they treat RMA thinking as a causal belief system, not simply as an objective description of military change. Against a naive RMA reading, the book says technology does not produce revolution by itself. Alongside Biddle, the book encourages a harder question: do unmanned systems change the modern system, or do they need to be integrated into existing combined-arms, concealment, suppression, dispersion, and command-and-control practices to matter?
❓ Open Questions for Seminar / Briefing
- If the U.S. unmanned arsenal was shaped by beliefs and identities rather than pure effectiveness, what would a truly effectiveness-first unmanned portfolio look like?
- Are cheap drones and loitering munitions a military innovation, or are they only an acquisition shift until paired with new doctrine and organizations?
- Which current service identity is most likely to distort AI and autonomy adoption?
- Does casualty aversion still matter in great-power competition, or does the possibility of large-scale war overwhelm the force-protection logic?
- Who are today’s Andy Marshall equivalents for autonomy, AI, space, cyber, or cheap mass—and do they have institutional pathways into budgets?
- Is Ukraine a valid analogy for U.S.-China conflict, or does it overstate the relevance of cheap tactical drones for Indo-Pacific war?
- Can the United States deliberately build “belief chaperones” and policy entrepreneurs, or do they emerge only from unusual personalities and shocks?
- What would count as evidence that unmanned systems have crossed the SAASS 660 threshold from technological adoption to military innovation?
✍️ Notable Quotes & Thoughts
“unmanned weapons [as] an inevitable next step of technological development” (p. 113).
This captures the technological-determinist belief the book is trying to explain, not endorse. For SAASS, the point is that belief in inevitability can itself become causal.
“the U.S. public is casualty intolerant” (p. 17).
This is the force-protection logic in its starkest form. Whether or not the public is actually casualty intolerant in a simple way, the belief shaped how defense actors understood the political utility of unmanned systems.
“onto existing understandings about war, international relations, or technology” (p. 219).
This is the policy entrepreneur’s mechanism: new systems gain traction when advocates attach them to already-legible ideas about war.
“by those who have an interest in using, developing and sustaining that technology” (p. 67).
This is the Mackenzie-style social-construction point. Technological effectiveness is not simply discovered; it is argued, stabilized, funded, and defended by communities with stakes in the system.