On Deep Convolutional Neural Networks and Building Latent Violence in the Indo-Pacific

By Major Joseph Schmid

Article published on: March 4, 2026 in the 2026 e-Edition of Field Artillery

Read Time: < 9 mins

Editor’s Note: This article reflects the author’s professional opinions and interpretations. It does not represent the official views, positions, or policies of the Field Artillery Commandant or Field Artillery School.
In today’s hyper-computing age of convergent technology, information flows, and processing power, the capacity exists to calculate previously impenetrable problems.
—Everett Dolman, Pure Strategy1

At first glance, it may seem odd to couple a two-millennia-old story with modern notions of neural network architecture and deterrence. Yet Cicero’s depiction of the sword of Damocles offers an excellent introductory framework for conceptualizing how forward-positioned joint, allied, and partner militaries can leverage neural networks to build overwhelming deterrent capacity within the Indo-Pacific region. Cicero tells of a Syracusan tyrant, Dionysius, who believes a member of his court, Damocles, is seeking to supplant him.2 In response, Dionysius throws a feast, gives Damocles a place of honor, and lavishes him with the finest foods royalty can provide. Simultaneously, he orders “a bright sword to be let down from the ceiling, suspended by a single horse-hair, so as to hang over the head of [Damocles].”3 With this gesture, Dionysius achieves what Thomas Schelling would later define as “latent violence,” or violence “that can still be withheld or inflicted” for the purpose of influencing behavior.4

Keeping Cicero’s story in mind, this essay is composed of three components. First, it isolates core ideas associated with deterrence theory. Second, it reviews the current state of Deep Convolutional Neural Networks (DCNNs) relevant to building deterrence in the Indo-Pacific. Lastly, it combines these components to present a vision for future Indo-Pacific strategic deterrence undergirded by intelligentized targeting cycles. Ultimately, I argue that the joint fires enterprise can bolster contemporary deterrence in the Indo-Pacific region by leveraging mature target-acquisition DCNNs to produce an overwhelming, credible threat of latent violence—thereby creating a modern sword of Damocles.

Effective deterrent action rests upon three pillars: (1) capability, (2) communication, and (3) credibility.5 Concerning capability, one party, A, must convince another party, B, that it can forcefully punish B at will. In this way, A gains a degree of control over B, who now believes the “resistance costs” are more detrimental than the costs associated with tacit “compliance.”6 J. C. Wylie referred to this as gaining “control of the pattern of war.”7 Consequently, A can threaten B to “discourage or disincentivize a given action from being taken.”8 Clear communication of “expected behavioral guidelines” from A to B outlines a path for B to avoid latent violence.9

For the threat to remain effective, A must maintain credibility by continuously demonstrating a “commitment to carry out the threat.”10 Within the U.S.–China deterrence dichotomy, U.S. commitment is often demonstrated through combined exercises with Indo-Pacific partners. For example, Ronnie Michael illustrates how U.S.–Japanese bilateral exercises such as KEEN EDGE/KEEN SWORD build alliance capacity.11 Richard Butler and Jimmy Bell also highlight the shore-to-ship “ring of fires” capability demonstrated during the 2024 U.S.–Philippines BALIKATAN exercise.12 Over time, such exercises build “multi-layered networks” that reinforce U.S. credibility and commitment to maintaining an integrated deterrence framework in the Indo-Pacific.13 Now consider how DCNNs can enhance this commitment.

DCNNs utilize computer vision to achieve object detection and classification at intelligentized machine speed, creating efficiencies within the targeting cycle at orders of magnitude above what contemporary staffs can achieve using informatized systems. Figure 1 uses an S-300 air defense platform to illustrate how target-acquisition DCNNs move through their decision-making process to reach image classification.

Future target-acquisition DCNNs within a joint fires enterprise will observe adversarial combat power such as the S-300 above. The feature-learning component—consisting of convolutional + rectified linear unit (ReLU) and pooling layers—segments the image into feature maps from which the DCNN extracts key features.14 The pooling function continuously consolidates these extractions into increasingly recognizable features associated with what the DCNN is observing. The flattening layer acts as a “pruning” mechanism that orders consolidated feature maps into a linear vector from which the DCNN can understand the image holistically.15 Most importantly, the fully connected layer ties all preceding layers together, “facilitating comprehensive feature representation” and accurate target classification.16 In this example, the DCNN attaches a 98.3% probability that the observed image is an S-300.

Nascent versions of such DCNNs are already embedded within military organizations. The U.S. Army leverages a target-acquisition DCNN to power its Maven Smart System, enabling automatic target classification and real-time targeting, as demonstrated by the 18th Airborne Corps in their Scarlett Dragon Exercise series.17 Similarly, Alex Barker highlights how the People’s Liberation Army incorporates You Only Look Once (YOLO) DCNNs to achieve intelligentized “military target recognition.”18 Given these capabilities, how will future DCNNs contribute to American deterrence in the Indo-Pacific?

Enhancing deterrence will require:

  1. Embedding mature target-acquisition DCNNs in manned and emerging unmanned ISR platforms,

  2. Communicating this augmented intelligentized capability to the PLA, and

  3. Building credibility by exploiting existing Operation Pathways exercises to demonstrate an intelligentized joint targeting cycle. (See Figure 2 on next page)

Figure 1. Target Acquisition Deep Convolutional Neural Network

Near-future, long-endurance air, sea, and land robotic ISR platforms—like those on the left of Figure 2—will operate with mature DCNNs capable of identifying adversarial combat power type, location, and disposition. This data will be aggregated in a targeting-decision support neural network aware of all ISR inputs as well as the location, readiness, and magazine capacity of friendly delivery platforms. The network synchronizes ISR data with Joint Targeting Coordination Board outputs, such as the Joint Integrated Prioritized Target List (JIPTL) and apportioned targets by service component.19 Responsive dynamic targeting thus becomes facilitated by neural networks that allow commanders “to target across the battlespace [at] hitherto unachievable depth, speed, and resolution.”20 This newfound capability must be repeatedly communicated to the Chinese Communist Party and the PLA.

Figure 2. Joint Targeting Facilitated by Neural Networks

Operation Pathways exercises offer an excellent venue to communicate and demonstrate this intelligentized joint targeting capability. Yama Sakura 87 is already advertised as an exercise in deterrence and combat power projection facilitated by Japan, Australia, and the United States.21 Likewise, the shore-to-ship “SinkEX” dynamic targeting event during Balikatan—featuring “relocating long-range precision-strike systems”—offers an ideal environment for demonstrating emerging deterrent capability.22 Coupling these existing exercises with target-acquisition neural networks holds great potential for demonstrating capability, communicating intent, and reinforcing credibility among allies and partners.

At the beginning of this paper, Dolman considered how increased processing power and robust information flows could solve previously impenetrable problems. He said this in 2004. Today, in 2025, ever-increasing computing power has created viable target-acquisition DCNNs that, when applied at scale, offer a solution to the enduring challenge of rapid and effective targeting. As the United States continues to invest in artificial intelligence development, the sophistication and utility of DCNNs will only increase—further improving their viability as a modern sword of Damocles.

In Dionysius’s time, the sword of Damocles was an effective threat of latent violence because Damocles recognized its credible danger as it dangled above his head. By lowering the sword, Dionysius demonstrated capability, communicated intent, and established a credible deterrent threat to influence the behavior of a power-hungry subordinate. Modern target-acquisition DCNNs, enabled by contemporary computing power, provide a means to achieve a similar effect today—an intelligentized joint targeting capability functioning as a modern sword of Damocles. One must only demonstrate the capability, communicate its effectiveness, and continually build credibility to enhance deterrence in the Indo-Pacific.

Mens Est Clavis Victoriae.

References

1. Everett Dolman, Pure Strategy: Power and Principle in the Space and Information Age (New York, NY: Taylor and Francis, 2005), 111.1

2. Cicero, Tusculan Disputations, trans. C. D. Yonge, in Harpers New Classical Library (New York, NY: Harper and Brothers, 1877), 185.

3. Cicero, Tusculan Disputations, 185.

4. Thomas Schelling, Arms and Influence (New Haven, CT: Yale University Press, 1966), 3.

5. Andrew Carr and Stephan Frühling, “Forward Presence for Deterrence: Implications for the Australian Army,” Australian Army Occasional Paper No. 15 (Campell, Australia: Australian Army Research Center, 2023), 16, https://researchcentre.army.gov.au/sites/default/files/ op_15_-_forward_presence_for_deterrence.pdf.

6. Lawrence Freedman, Deterrence (Malden, MA: Polity Press, 2004), 39.

7. J.C. Wylie, Military Strategy (Annapolis, MD: Naval Institute Press, 2014), 83.

8. Jared McKinney and Peter Harris, Deterrence Gap: Avoiding War in the Taiwan Strait (Carlisle, PA: United States Army War College Press, 2024), 9.

9. Krista Langeland and Derek Grossman, Tailoring Deterrence for China in Space (Santa Monica, CA: RAND Corporation, 2021), 23, https://doi. org/10.7249/rra943-1.

10. Maria Malksoo, “NATO’s New Front: Deterrence Moves Eastward,” International Affairs 100, no. 2 (2024): 535, https://doi.org/10.1093/ia/ iiae008.

11. Ronnie Michael, “Pacific Pathways: A Value Added Approach to US Strategic Objectives in the Pacific” (master’s thesis, Marine Corps University, 2016), 6, https://apps.dtic.mil/sti/trecms/pdf/ad1176203.pdf.

12. Richard Butler and Jimmy Bell, Assessing the Effectiveness of US Army Campaigning in the Indo-Pacific (Carlisle, PA: Strategic Studies Institute, 2025), para. 11, https://ssi.armywarcollege.edu/ssimedia/ recent-publications/article/4024568/assessing-the effectiveness-of-us-army-campaigning-in-theindo-pacific/.

13. Chyungly Lee, “A New Trend of Defense Cooperation under the US Indo-Pacific Strategy: Deterrence by Networks of Combined Military Exercises,” in Dynamics in the Indo-Pacific: From Geopolitics and Geoeconomics Perspectives, ed. Klaus Heinrich Raditio and Shofwan Al Banna Choiruzzad (Jakarta, Indonesia: The Habibie Center, 2024), 26, https://habibiecenter.or.id/img/publication/edited%20volume%20 2024.pdf#page=40.

14. Muntather Almusawi, Shivaprasad Yadav, Abdul Rahim, Srinivas Aluvala, and A.C. Ramachandra, “Military Vehicle Object Detection Based on Feature Representation and Refined Localization Using Inception Recurrent Convolutional Neural Network” (paper presented at the 2024 International Conference on Distributed Computing and Optimization Techniques, Bengaluru, India, 2024), 3.

15. Ernest Jeczmionek and Piotr A. Kowalski, “Flattening Layer Pruning in Convolutional Neural Networks,” Symmetry 13, no. 7 (2021): 5, https:// doi.org/10.3390/sym13071147.

16. Gangeshwar Mishra, Prinima Gupta and Rohit Tanwar, “Target Recognition Using Pre-Trained Convolutional Neural Networks and Transfer Learning,” Procedia Computer Science vol. 235 (2024): 1449, https://www.sciencedirect.com/science/article/pii/ s1877050924008123.

17. Michael Brown, Ellen Lord, Andrew Metrick and Robert Work, “Going Fast at Scale Today: The Seven Factors,” in Integration for Innovation: A Report of the CNAS Defense Technology Task Force (Washington, DC: Center for a New American Security, 2024), 8, https://www.jstor.org/ stable/resrep63569.6.

18. Alex Barker, “Giving Precision Munitions ‘Eyes’ and a ‘Brain’: The State of PLA Research on Military Target Recognition,” China Brief 21, no. 13 (2021): para. 5, https://jamestown.org/program/givingprecision-munitions-eyes-and-a-brain-thestate-of-pla-research-on-military-targetrecognition/.

19. Joint Staff Director for Operations (J-3), Joint Targeting, Joint Publication (JP) 3-60 (Washington, DC: Joint Chiefs of Staff, 2024), II-9, https://jdeis.js.mil/jdeis/new_pubs/jp3_60.pdf.

20. Anthony King, “Digital Targeting: Artificial Intelligence, Data, and Military Intelligence,” Journal of Global Security Studies 9, no. 2 (2024): 4, https://doi.org/10.1093/jogss/ogae009.

21. Matthew Pargett, “Enhancing Interoperability, Readiness at Yama Sakura 87,” U.S. Army, November 9, 2024, https://www.army.mil/ article/281261/enhancing_interoperability_readiness_at_yama_ sakura_87.

22. U.S. Naval Institute, “Balikatan 2024,” Proceedings 150, no. 6 (2024): para 4-5, https://www.usni.org/magazines/proceedings/2024/june/ balikatan-2024.

Authors

MAJ Joseph D. Schmid is a field artillery officer and former Task Force-Philippines J7 member assigned to the 25th Infantry Division. He holds a Bachelor of Arts in English as well as master’s degrees in English, Military Studies, Military Art and Science, and Military Operations. Previous articles cover Cross Domain Fires in Lighting Forge, Brigade Deep Battle 2.0, Artillery on the Korean Peninsula, Classical Methods of Influence, Neural Targeting Networks, and Lessons from the Russo-Ukraine War.