Undergrounds-as-a-System: Doctrine Map for Resilient Conflict Architecture

This is Part III — Read Part I and Part II to get the context.

I. Definition and Lineage

Undergrounds are clandestine, resilient systems that enable sustained resistance, asymmetric warfare, or covert statecraft. Historically embedded in insurgency, resistance, and revolutionary doctrine, they now re-emerge as critical enablers in grey-zone and high-tech conflict.

II. Structural Overview: The Five Subsystems of the Underground

SubsystemPrimary FunctionHistorical ArchetypeModern Form
1. Operational Secrecy & DeceptionConcealment of movement, identity, intentFrench Resistance, IRA safe housesRF spoofing, drone decoys, synthetic IDs
2. Clandestine ProductionCreation and maintenance of warfighting assetsViet Cong tunnel workshopsAdditive drone labs, EMP-hardened micro-fabs
3. Cognitive InfrastructureNarrative shaping, morale, and coordinationRadio Free Europe, Afghan mullah networksEncrypted meme ops, pirate signal clouds
4. Shadow Finance & LogisticsSustaining resources, non-attributable supplyHawala, opium logistics, gold barsCold wallet logistics, darknet procurement
5. Human Terrain TrainingIndoctrination, trust-building, skills devCuban cadre schools, PLA political commissarsSIM-embedded LMS, covert mesh bootcamps

III. Strategic Relevance in 21st Century Conflict

  1. Counter-Swarm Defense
    • Underground drone repair and redeployment cells sustain massed autonomous conflict.
    • Clandestine ISR nodes feed swarm-kill-chain analytics without radio signature.
  2. Cognitive Warfare & Denial
    • Underground narrative cells shape perceptions in occupied or fogged-out zones.
    • Digital exile media preserves continuity of authority.
  3. Anti-Access/Area Denial (A2/AD) Support
    • Smuggled munitions, shadow fabrication of precision weapons near denied zones.
    • False decoy nodes to exhaust enemy munitions.
  4. Resilience under Radical Uncertainty
    • Enabling sovereign continuity of operations under first strike, economic collapse, or informational blackouts.

IV. Modern Examples and Playbooks

ActorSubsystem CoverageDescription
Ukraine1, 2, 3, 4, 5DIY drone labs; covert logistics hubs in Lviv/Kharkiv; Telegram psyops; rotating IP cyberteams; drone clubs as auxiliary ISR units [Sources: https://www.army-technology.com/features/ukraine-diy-drones-war/, https://rusi.org/explore-our-research/publications/commentary/ukraine-innovating-under-fire-how-its-defence-tech-outpacing-russias].
Iranian Quds Force1, 3, 4, 5Shell companies for tech acquisition; disinfo networks in Arabic/Persian; proxy cadres in NGOs/religious institutions [Sources: https://www.iiss.org/blogs/analysis/2021/01/irans-qods-force-and-its-proxies, https://ctc.westpoint.edu/the-qods-force-and-iranian-proxies-in-syria/].
Wagner Group1, 3, 4Dual passports for mobility; cultural recruitment mythos; logistics through shell firms in Africa and UAE; use of civilian air cover [Sources: https://www.bbc.com/news/world-60947877, https://acleddata.com/2022/03/04/wagner-group-expands-footprint-in-africa/, https://dossier.center/en/wagner-africa/].
Palestinian Resistance1, 2, 3, 4Tunnel-based logistics; crypto/diaspora-funded arms; civilian-cloaked ISR and comms; narrative operations via TikTok/Telegram [Sources: https://www.terrorism-info.org.il/en/tag/underground-tunnels/, https://www.timesofisrael.com/idf-using-ai-to-track-hamas-rockets-and-target-operatives-on-social-media/, https://www.reuters.com/article/us-palestinians-gaza-tunnels-idUSKCN1VV0EE].
South China Sea Militias1, 4Fishing fleet ISR; ship registry manipulation; logistics fronted as cooperatives; port-based deception nodes [Sources: https://www.rand.org/blog/2020/03/chinas-maritime-militias-and-fishing-fleet.html, https://amti.csis.org/chinas-maritime-militia/.]

Example: Ukraine

Example: Iranian Quds Force

Example: Wagner Group

Example: Palestinian Resistance

Example: South China Sea Maritime Militias


Implications for Investment and NATO Planning

CategoryVC-Backable?Notes
Covert logistics toolsYes (dual-use kits, not traditional supply chains)Requires export control diligence
Decoy / ghost infrastructureYesMust be delivered in non-attributable formats
Deepfake ID validationYesApplies to civilian and tactical ID domains
Cadre training platformsPartiallyGamified OPSEC/comms education is possible
Cold network crypto & messagingYes (if modular, open-source, edge-compute)Target for public + defense adoption

Undergrounds are not relics of ideological guerilla warfare. They are now critical system layers beneath digital, kinetic, and cognitive combat. A future-proofed NATO or sovereign defense architecture must:

  • Acknowledge the legitimacy and utility of underground systems;
  • Invest in dual-use capabilities that sustain decentralized autonomy;
  • Prepare narrative and logistical redundancy before overt conflict begins.

Failing to integrate this layer leaves modern forces brittle in the face of adaptive, asymmetric adversaries.

“Where the aboveground fails, the underground sustains.”