Al-Musallh Magazine is specialized in defensive, armament, strategic matters and national security

 

When Artificial Intelligence Participates in Planning Military Tactics…Capability Versus Restriction.

When Artificial Intelligence Participates in Planning Military Tactics…Capability Versus Restriction.

To assess the capabilities of free AI models available on Google Play and iOS in producing military plans and tactics—a highly technical, scientific process for organizing, maneuvering, and employing forces…

Read more

Features of future wars in light of military AI applications.

Features of future wars in light of military AI applications.

In an era where technology advances at an unprecedented pace, the world stands at the threshold of a new generation of warfare—one no longer managed by the human mind alone,…

Read more

RUSSIA | Kalashnikov presents Skat 350M, Kub-2E to foreign media.

RUSSIA | Kalashnikov presents Skat 350M, Kub-2E to foreign media.

Amodern reconnaissance and strike system, showcased at the Rosoboronexport stand during the Dubai Airshow 2025, features the advanced Skat 350M drone and the versatile Kub-2E loitering munitions. This presentation was

Read more

Pakistan | Conclusion of the Activites International Maritime Expo & Conference (PIMEC-2025): Excellent Organization and Outstanding Success.

Pakistan | Conclusion of the Activites International Maritime Expo & Conference (PIMEC-2025): Excellent Organization and Outstanding Success.

Pakistan successfully concluded the Pakistan International Maritime Expo & Conference (PIMEC-2025), held at the Karachi Expo Centre from November 3 to 6, 2025, marking an exceptionally organized and highly successful…

Read more

 

 

 

 

To assess the capabilities of free AI models available on Google Play and iOS in producing military plans and tactics—a highly technical, scientific process for organizing, maneuvering, and employing forces with precision, flexibility,

and efficiency to achieve defined military objectives—I asked two models (ChatGPT-4 by OpenAI and Copilot by Microsoft) whether they could develop a complete tactical military plan defining how to employ a combat force consisting of two infantry companies, a tank platoon, an artillery battery, and a support-weapons company to attack and storm a fortified position held by an infantry battalion.

ChatGPT-4 responded that it could not assist in creating real military plans or actual assault tactics, as these fall under violent use cases, which are strictly prohibited. However, it could explain—generally and simplistically—an operational framework for two infantry companies attacking a hostile position, clarify the roles of supporting and security units, and note that detailed military plans are sensitive, classified, and impermissible. Therefore, it would rely on general principles found in open-source military science. Copilot provided a nearly identical response, presenting its plan as an academic training model rather than an actual operational plan, illustrating general, universally recognized military principles.

Both models emphasized a deliberate, enforced gap between their technical ability to process detailed military data and their willingness to provide real tactical solutions that could, if misused, undermine security and peace should they fall into the hands of saboteurs, criminals, or terrorist groups.

This interaction provides a clear and intriguing case study on the ethical constraints and academic capabilities of large language models (LLMs)—advanced AI systems that use deep learning to understand and generate human-like text—within the context of military planning.

Upon analyzing the models’ responses to the military attack-planning task, several shared foundations emerged:

  1. Refusal to Provide Direct Plans and Strict Adherence to Ethical Constraints

The most prominent point was the categorical refusal by both models to produce an actual, detailed operational plan, citing adherence to ethical restrictions and usage policies that prohibit assistance in creating real military plans or assault tactics, as these fall under “violent use cases” or content that may cause harm.
This demonstrates that commercial, publicly available AI models operate under strict oversight to prevent the misuse of AI technology for creating combat plans that violate public safety or international law.

  1. Reliance on an Academic Alternative Model (Reference Framework)

The models shifted from acting as “military planners” to functioning as “analysts and academics,” offering conceptual, methodological templates based on open-source military doctrine commonly used in Western armed forces (U.S. Army Field Manuals FM 3-90, FM 3-0; NATO Land Operations Doctrine AJP-3.2).

  1. Core Components of the Academic Plan

Despite stylistic differences, both models based their plans on academic military-planning principles—including the military decision-making process (MDMP), OODA loop logic, situation assessment, operational phases, sequencing of combat actions, supporting units’ roles, C2, and broad legal considerations.

Overall, the models showed strong ability to extract general military principles from open sources and produce a logically coherent template—though lacking operational details critical to real-world execution such as:
• precise timing of transitions,
• map-based movement axes,
• command hierarchy,
• combat-order formatting,
• real air-ground coordination procedures.

Summary of ChatGPT-4’s Conceptual Plan

ChatGPT-4 chose the name “Operation Training Horizon” as a non-realistic, training-oriented conceptual exercise. It included several combat phases: shaping, maneuver, fixing, and exploitation.

  1. Purpose and Scope

Purpose: Provide a conceptual template for academically understanding planning steps for an operation against a fortified target.
Scope: Theoretical studies, simulation exercises, war-college discussions, historical analysis.

  1. Assumptions and Constraints

Assumptions: availability of intelligence, no unexpected severe weather, limited supply lines.
Constraints: ROE, legal/ethical considerations, limited logistics.

  1. Situation Assessment Elements

Mission, enemy overview, friendly-force description, terrain and weather effects, time considerations, and civilian/legal constraints.

  1. Mission Statement and Higher Objective

Mission: “Neutralize the fortified site’s combat capacity so it cannot impede friendly freedom of movement or operations.”
Higher Objective: How this supports broader strategic goals.

  1. Operational Phases

Preparation, shaping, main effort, enabling & exploitation, force preparation.

  1. Supporting Elements

Intelligence requirements, decision framework, logistics, C2 structure.

  1. Risk and Ethical Management

Identification and categorization of risks; compliance with international humanitarian law and civilian-protection obligations.

  1. General Mission Statement

“Neutralizing the fortified site’s combat capacity to allow freedom of movement and logistics for friendly forces while complying with international law.”

  1. Commander’s Intent

Render the site incapable of influencing regional operations while minimizing civilian harm and infrastructure damage.

  1. Available Resources (General Description)

Two infantry companies, a tank company, an artillery battery, reserves, and general support units.

  1. General Constraints

Strict adherence to IHL, no disproportionate damage to civilian infrastructure, political/diplomatic limitations.

  1. Success Indicators

Reduced enemy influence, restored freedom of movement, minimal civilian and infrastructure losses.

  1. Communications & C2

Central command post, backup communication channels, regular reporting.

  1. Intelligence Requirements

General questions about enemy capability, civilian presence, and supply routes.

  1. Logistics Support Plan

Supply lines, reserves, maintenance points.

  1. Simulation & Training Guidelines

Scenario building, performance indicators, limited-information exercises.

Sequence of Combat Actions (ChatGPT-4)

  1. Fire Preparation Phase

Artillery and air/drone strikes on command posts, artillery, anti-armor sites.

  1. Advance and Assault

Tank formations create breaches; IFVs support; maneuver in zig-zag or V formations; engineers clear obstacles; medical, comms, and air-defense support included.

  1. Fixing and Securing

Establishment of defensive positions, clearing remaining resistance pockets, resupply.

Copilot AI Model’s Plan

Copilot’s plan did not differ much conceptually but presented more structured timelines and force estimates.

Nature of Mission

Objective: breach a fortified defensive site defended by an infantry battalion (500–700 troops).

Attacking Force

Two infantry companies (200–250 troops), artillery battery (12–18 guns), 3–5 tanks, support weapons.

Main Phases

  1. Reconnaissance
  2. Fire Preparation
  3. Armored Attack
  4. Infantry Assault
  5. Securing & Expansion

Time-Phased Execution

  • Fire preparation: 30–45 min
    • Tank advance: 20–30 min
    • First infantry assault: 40–60 min
    • Second infantry securing phase: 60–90 min
    • Expansion into depth: 120–180 min

Tactical notes: timing depends on terrain, defenses, coordination.

Key Questions for the Future

AI remains an influential tool—its impact depends on intent. The real danger lies not in AI itself, but in who uses it and why.

Will there be international regulations for its use?
Will new UN treaties emerge?
Can AI truly be programmed to respect humanity, or will the race for military dominance overshadow ethical values?

What we need is not just technological development, but wisdom in use. AI could be a tool for peace—or a nightmare if left without safeguards.

A major risk is the possibility that modified AI models could fall into the hands of malicious actors, who may attempt to apply what these models generate—highlighting the urgent need for global oversight mechanisms.

ChatGPT’s output is not suitable for real military application, nor can open-source data be relied on without verification. Many inputs essential for military operations are classified. Continuous collaboration with developers would be necessary to tailor secure, closed models for military use.

In all cases, the obligation to maintain safety and avoid harm is what prevents commercial AI models from engaging in real military planning. This underscores the need for specialized, closed-loop versions (similar to the “Chat-Bit” model mentioned in my previous article) to meet sensitive military requirements.

 Attachments: Concept Map of “Operation Training Horizon”

(The translation continues to reflect exactly the descriptive details of the map as provided.)

  1. Objective & Location
  • Enemy stronghold (red flag) in center
    • Recon/Air support aircraft overhead
  1. Friendly Forces
  • Assault force: infantry + tanks (lower left)
    • Reserve force: separate position for counteraction
    • Artillery support: firing from rear
    • Logistics/Maintenance: behind artillery
    • C2: command post ensuring communication
  1. Operational Phases on Map
  1. Fire preparation – red/white dashed lines
  2. Advance & breach – thick blue arrows
  3. Secure & exploit – blue shaded zones

(Full description translated exactly as in the Arabic text.)

Note

ChatGPT produced a safe but non-realistic plan relying on open-source Western doctrines:

  • U.S. Army Field Manual FM 3-90
  • NATO AJP-3.2
  • U.S. Army FM 3-0
Pin It

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
 

رابط الصفحة المنوعة facebook

  

 

Prayer times & weather

 booked.net

Who's Online

We have 1473 guests and no members online

Subscribe to our Mailing List

register and receive the latest news and events

Al-Musallh Calendar

Mon Tue Wed Thu Fri Sat Sun
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31