On Deep Convolutional Neural Networks and Building Latent Violence in the Indo-Pacific
By Major Joseph Schmid
Article published on: March 4, 2026 in the 2026 e-Edition of Field Artillery
Read Time: < 9 mins
Editor’s Note: This article reflects the author’s professional opinions and
interpretations. It does not represent the official views, positions, or policies of the Field Artillery Commandant
or Field Artillery School.
In today’s hyper-computing age of convergent technology, information flows, and processing power, the
capacity exists to calculate previously impenetrable problems.
—Everett Dolman, Pure Strategy1
At first glance, it may seem odd to couple a two-millennia-old story with modern notions of neural network
architecture and deterrence. Yet Cicero’s depiction of the sword of Damocles offers an excellent introductory
framework for conceptualizing how forward-positioned joint, allied, and partner militaries can leverage neural
networks to build overwhelming deterrent capacity within the Indo-Pacific region. Cicero tells of a Syracusan
tyrant, Dionysius, who believes a member of his court, Damocles, is seeking to supplant him.2 In response, Dionysius throws a feast, gives Damocles a place of
honor, and lavishes him with the finest foods royalty can provide. Simultaneously, he orders “a bright sword to be
let down from the ceiling, suspended by a single horse-hair, so as to hang over the head of [Damocles].”3 With this gesture, Dionysius achieves what Thomas
Schelling would later define as “latent violence,” or violence “that can still be withheld or inflicted” for the
purpose of influencing behavior.4
Keeping Cicero’s story in mind, this essay is composed of three components. First, it isolates core ideas
associated with deterrence theory. Second, it reviews the current state of Deep Convolutional Neural Networks
(DCNNs) relevant to building deterrence in the Indo-Pacific. Lastly, it combines these components to present a
vision for future Indo-Pacific strategic deterrence undergirded by intelligentized targeting cycles. Ultimately, I
argue that the joint fires enterprise can bolster contemporary deterrence in the Indo-Pacific region by leveraging
mature target-acquisition DCNNs to produce an overwhelming, credible threat of latent violence—thereby creating a
modern sword of Damocles.
Effective deterrent action rests upon three pillars: (1) capability, (2)
communication, and (3) credibility.5 Concerning capability, one party, A, must convince another party, B, that
it can forcefully punish B at will. In this way, A gains a degree of control over B, who
now believes the “resistance costs” are more detrimental than the costs associated with tacit “compliance.”6 J. C. Wylie referred to this as gaining “control
of the pattern of war.”7 Consequently, A
can threaten B to “discourage or disincentivize a given action from being taken.”8 Clear communication of “expected behavioral guidelines” from A
to B outlines a path for B to avoid latent violence.9
For the threat to remain effective, A must maintain credibility by continuously demonstrating a
“commitment to carry out the threat.”10 Within
the U.S.–China deterrence dichotomy, U.S. commitment is often demonstrated through combined exercises with
Indo-Pacific partners. For example, Ronnie Michael illustrates how U.S.–Japanese bilateral exercises such as KEEN
EDGE/KEEN SWORD build alliance capacity.11
Richard Butler and Jimmy Bell also highlight the shore-to-ship “ring of fires” capability demonstrated during the
2024 U.S.–Philippines BALIKATAN exercise.12 Over
time, such exercises build “multi-layered networks” that reinforce U.S. credibility and commitment to maintaining an
integrated deterrence framework in the Indo-Pacific.13 Now consider how DCNNs can enhance this commitment.
DCNNs utilize computer vision to achieve object detection and classification at intelligentized machine speed,
creating efficiencies within the targeting cycle at orders of magnitude above what contemporary staffs can achieve
using informatized systems. Figure 1 uses an S-300 air defense platform to illustrate how
target-acquisition DCNNs move through their decision-making process to reach image classification.
Future target-acquisition DCNNs within a joint fires enterprise will observe adversarial combat power such as the
S-300 above. The feature-learning component—consisting of convolutional + rectified linear unit (ReLU) and pooling
layers—segments the image into feature maps from which the DCNN extracts key features.14 The pooling function continuously consolidates these extractions
into increasingly recognizable features associated with what the DCNN is observing. The flattening layer acts as a
“pruning” mechanism that orders consolidated feature maps into a linear vector from which the DCNN can understand
the image holistically.15 Most importantly, the
fully connected layer ties all preceding layers together, “facilitating comprehensive feature representation” and
accurate target classification.16 In this
example, the DCNN attaches a 98.3% probability that the observed image is an S-300.
Nascent versions of such DCNNs are already embedded within military organizations. The U.S. Army leverages a
target-acquisition DCNN to power its Maven Smart System, enabling automatic target classification and real-time
targeting, as demonstrated by the 18th Airborne Corps in their Scarlett Dragon Exercise series.17 Similarly, Alex Barker highlights how the People’s Liberation Army
incorporates You Only Look Once (YOLO) DCNNs to achieve intelligentized “military target recognition.”18 Given these capabilities, how will future DCNNs
contribute to American deterrence in the Indo-Pacific?
Enhancing deterrence will require:
-
Embedding mature target-acquisition DCNNs in manned and emerging unmanned ISR platforms,
-
Communicating this augmented intelligentized capability to the PLA, and
-
Building credibility by exploiting existing Operation Pathways exercises to demonstrate an intelligentized
joint targeting cycle. (See Figure 2 on next page)
Near-future, long-endurance air, sea, and land robotic ISR platforms—like those on the left of Figure
2—will operate with mature DCNNs capable of identifying adversarial combat power type, location, and
disposition. This data will be aggregated in a targeting-decision support neural network aware of all ISR inputs as
well as the location, readiness, and magazine capacity of friendly delivery platforms. The network synchronizes ISR
data with Joint Targeting Coordination Board outputs, such as the Joint Integrated Prioritized Target List (JIPTL)
and apportioned targets by service component.19
Responsive dynamic targeting thus becomes facilitated by neural networks that allow commanders “to target across the
battlespace [at] hitherto unachievable depth, speed, and resolution.”20 This newfound capability must be repeatedly communicated to the Chinese Communist Party and
the PLA.
Operation Pathways exercises offer an excellent venue to communicate and demonstrate this intelligentized joint
targeting capability. Yama Sakura 87 is already advertised as an exercise in deterrence and combat power projection
facilitated by Japan, Australia, and the United States.21 Likewise, the shore-to-ship “SinkEX” dynamic targeting event during Balikatan—featuring
“relocating long-range precision-strike systems”—offers an ideal environment for demonstrating emerging deterrent
capability.22 Coupling these existing exercises
with target-acquisition neural networks holds great potential for demonstrating capability, communicating intent,
and reinforcing credibility among allies and partners.
At the beginning of this paper, Dolman considered how increased processing power and robust information flows
could solve previously impenetrable problems. He said this in 2004. Today, in 2025, ever-increasing computing power
has created viable target-acquisition DCNNs that, when applied at scale, offer a solution to the enduring challenge
of rapid and effective targeting. As the United States continues to invest in artificial intelligence development,
the sophistication and utility of DCNNs will only increase—further improving their viability as a modern sword of
Damocles.
In Dionysius’s time, the sword of Damocles was an effective threat of latent violence because Damocles recognized
its credible danger as it dangled above his head. By lowering the sword, Dionysius demonstrated capability,
communicated intent, and established a credible deterrent threat to influence the behavior of a power-hungry
subordinate. Modern target-acquisition DCNNs, enabled by contemporary computing power, provide a means to achieve a
similar effect today—an intelligentized joint targeting capability functioning as a modern sword of Damocles. One
must only demonstrate the capability, communicate its effectiveness, and continually build credibility to enhance
deterrence in the Indo-Pacific.
Mens Est Clavis Victoriae.
References
1. Everett Dolman, Pure Strategy: Power and Principle in the
Space and Information Age (New York, NY: Taylor and Francis, 2005), 111.1
2. Cicero, Tusculan Disputations, trans. C. D. Yonge, in
Harpers New Classical Library (New York, NY: Harper and Brothers, 1877), 185.
3. Cicero, Tusculan Disputations, 185.
4. Thomas Schelling, Arms and Influence (New Haven, CT: Yale
University Press, 1966), 3.
5. Andrew Carr and Stephan Frühling, “Forward Presence for
Deterrence: Implications for the Australian Army,” Australian Army Occasional Paper No. 15 (Campell, Australia:
Australian Army Research Center, 2023), 16, https://researchcentre.army.gov.au/sites/default/files/
op_15_-_forward_presence_for_deterrence.pdf.
6. Lawrence Freedman, Deterrence (Malden, MA: Polity Press,
2004), 39.
7. J.C. Wylie, Military Strategy (Annapolis, MD: Naval
Institute Press, 2014), 83.
8. Jared McKinney and Peter Harris, Deterrence Gap: Avoiding
War in the Taiwan Strait (Carlisle, PA: United States Army War College Press, 2024), 9.
9. Krista Langeland and Derek Grossman, Tailoring Deterrence
for China in Space (Santa Monica, CA: RAND Corporation, 2021), 23, https://doi. org/10.7249/rra943-1.
10. Maria Malksoo, “NATO’s New Front: Deterrence Moves
Eastward,” International Affairs 100, no. 2 (2024): 535, https://doi.org/10.1093/ia/ iiae008.
11. Ronnie Michael, “Pacific Pathways: A Value Added Approach
to US Strategic Objectives in the Pacific” (master’s thesis, Marine Corps University, 2016), 6, https://apps.dtic.mil/sti/trecms/pdf/ad1176203.pdf.
12. Richard Butler and Jimmy Bell, Assessing the
Effectiveness of US Army Campaigning in the Indo-Pacific (Carlisle, PA: Strategic Studies Institute, 2025), para.
11, https://ssi.armywarcollege.edu/ssimedia/
recent-publications/article/4024568/assessing-the
effectiveness-of-us-army-campaigning-in-theindo-pacific/.
13. Chyungly Lee, “A New Trend of Defense Cooperation under
the US Indo-Pacific Strategy: Deterrence by Networks of Combined Military Exercises,” in Dynamics in the
Indo-Pacific: From Geopolitics and Geoeconomics Perspectives, ed. Klaus Heinrich Raditio and Shofwan Al Banna
Choiruzzad (Jakarta, Indonesia: The Habibie Center, 2024), 26, https://habibiecenter.or.id/img/publication/edited%20volume%20
2024.pdf#page=40.
14. Muntather Almusawi, Shivaprasad Yadav, Abdul Rahim,
Srinivas Aluvala, and A.C. Ramachandra, “Military Vehicle Object Detection Based on Feature Representation and
Refined Localization Using Inception Recurrent Convolutional Neural Network” (paper presented at the 2024
International Conference on Distributed Computing and Optimization Techniques, Bengaluru, India, 2024), 3.
15. Ernest Jeczmionek and Piotr A. Kowalski, “Flattening
Layer Pruning in Convolutional Neural Networks,” Symmetry 13, no. 7 (2021): 5, https:// doi.org/10.3390/sym13071147.
16. Gangeshwar Mishra, Prinima Gupta and Rohit Tanwar,
“Target Recognition Using Pre-Trained Convolutional Neural Networks and Transfer Learning,” Procedia Computer
Science vol. 235 (2024): 1449, https://www.sciencedirect.com/science/article/pii/
s1877050924008123.
17. Michael Brown, Ellen Lord, Andrew Metrick and Robert
Work, “Going Fast at Scale Today: The Seven Factors,” in Integration for Innovation: A Report of the CNAS Defense
Technology Task Force (Washington, DC: Center for a New American Security, 2024), 8, https://www.jstor.org/ stable/resrep63569.6.
18. Alex Barker, “Giving Precision Munitions ‘Eyes’ and a
‘Brain’: The State of PLA Research on Military Target Recognition,” China Brief 21, no. 13 (2021): para. 5, https://jamestown.org/program/givingprecision-munitions-eyes-and-a-brain-thestate-of-pla-research-on-military-targetrecognition/.
19. Joint Staff Director for Operations (J-3), Joint
Targeting, Joint Publication (JP) 3-60 (Washington, DC: Joint Chiefs of Staff, 2024), II-9, https://jdeis.js.mil/jdeis/new_pubs/jp3_60.pdf.
20. Anthony King, “Digital Targeting: Artificial
Intelligence, Data, and Military Intelligence,” Journal of Global Security Studies 9, no. 2 (2024): 4, https://doi.org/10.1093/jogss/ogae009.
21. Matthew Pargett, “Enhancing Interoperability, Readiness
at Yama Sakura 87,” U.S. Army, November 9, 2024, https://www.army.mil/
article/281261/enhancing_interoperability_readiness_at_yama_
sakura_87.
22. U.S. Naval Institute, “Balikatan 2024,” Proceedings 150,
no. 6 (2024): para 4-5, https://www.usni.org/magazines/proceedings/2024/june/
balikatan-2024.
Authors
MAJ Joseph D. Schmid is a field artillery officer and former Task Force-Philippines J7 member
assigned to the 25th Infantry Division. He holds a Bachelor of Arts in English as well as master’s degrees in
English, Military Studies, Military Art and Science, and Military Operations. Previous articles cover Cross Domain
Fires in Lighting Forge, Brigade Deep Battle 2.0, Artillery on the Korean Peninsula, Classical Methods of
Influence, Neural Targeting Networks, and Lessons from the Russo-Ukraine War.