Friday 27 March, 2026
[email protected]
Resilience Media
  • About
  • News
  • Resilience Conference
    • Resilience Conference Warsaw 2026
    • Resilience Conference Copenhagen 2026
    • Resilience Conference London 2026
  • Guest Posts
    • Author a Post
  • Subscribe
No Result
View All Result
  • About
  • News
  • Resilience Conference
    • Resilience Conference Warsaw 2026
    • Resilience Conference Copenhagen 2026
    • Resilience Conference London 2026
  • Guest Posts
    • Author a Post
  • Subscribe
No Result
View All Result
Resilience Media
No Result
View All Result

Nowhere to hide

In the age of AI, camouflage is no longer what it used to be

Hugo JammesbyHugo Jammes
March 27, 2026
in Guest Posts
Photo: Screenshot from the video of the 56th Separate Motorised Infantry Brigade.

Photo: Screenshot from the video of the 56th Separate Motorised Infantry Brigade.

Share on Linkedin

“All warfare is based on deception. Hence, when we are able to attack, we must seem unable; when using our forces, we must appear inactive; when we are near, we must make the enemy believe we are far away; when far away, we must make him believe we are near.”
– Sun Tzu, The Art of War

For most of military history, camouflage was a relatively straightforward contest between the human eye and the ingenuity of soldiers and engineers. Paint, scrim netting, foliage, terrain – the task was to break up outlines, reduce contrast, and limit movement. If you could fool a person looking through unsophisticated optics, you could generally survive.

You Might Also Like

The UK is on the precipice of geopolitical and military irrelevance

Is defence tech a ‘proper’ VC-backable vertical?

The dangerous economics of drone warfare

That world is gone.

Modern conflict unfolds under conditions of near-continuous observation. Sensing is no longer episodic or platform-bound; it is persistent, layered, and increasingly mediated by automation rather than human judgment. Visibility is not an event but a default state.

The modern force has to assume that someone is always looking – from orbit, from the stratosphere, from unmanned systems, from ground sensors, and from machine-learning models combing through data feeds in real time.

In that environment, traditional camouflage is not obsolete, but it is often insufficient. Concealment now means managing signatures in multiple domains simultaneously, dynamically, under constant observation. The side that fails to adapt will discover what “nowhere to hide” really means.

The Sensor-Driven Battlefield

Three structural shifts have made concealment dramatically harder:

  1. Sensor Proliferation
    • Commercial and military satellites with high revisit rates
    • HALE/MALE UAVs with multi-spectral payloads
    • Proliferation of small UAS at tactical echelons
    • Cheap, networked ground sensors (acoustic, seismic, RF, EO/IR)
  2. Multi-Spectral Coverage
    • Visible, near-infrared, SWIR, MWIR, LWIR, radar, passive RF
    • Weather and darkness no longer provide reliable cover
    • Cross-cueing: a detection in one band rapidly triggers tasking in others
  3. Algorithmic Detection and Targeting
    • Computer vision models trained on massive datasets
    • Pattern-of-life analysis from overhead and comms metadata
    • Automated alerts for change detection and anomaly spotting

The result is a battlespace where any detectable signature – thermal, electromagnetic, acoustic, logistical, even behavioural – can quickly translate into targeting data. Concealment therefore has to be re-imagined as signature management across a system-of-systems, not just pattern and paint on a single platform.

From Camouflage to Signature Management

Modern concealment is about reducing, shaping, and sometimes deliberately spoofing signatures. A few emerging trends stand out.

  1. Multi-Spectral Camouflage and Adaptive Materials

Static, visually oriented camouflage is giving way to materials designed from the outset for broad-spectrum masking.

  • Multi-spectral camouflage nets and coatings
    Designed to reduce visibility not only in the visual spectrum but also in near-IR and thermal bands. These are increasingly tailored to specific climatic and seasonal conditions, and to the dominant sensor threats in a theatre.
  • Thermal management systems
    Passive: insulation, heat sinks, exhaust routing and diffusion to blur hot spots and reduce sharp gradients visible to IR sensors.
    Active: controlled heating / cooling elements that can reshape a platform’s apparent signature to match background or mimic a different class of object.
  • Adaptive camouflage concepts
    Although still early, there is sustained work on surfaces that can modulate colour, reflectivity, and in some cases temperature distribution. The goal is not invisibility, but to make automated detection algorithms less confident and more error prone.

Example: Armoured fighting or logistics vehicles in exposed positions are now routinely deployed under multi-spectral screens with integrated thermal masking. Some forces are experimenting with conformal thermal treatments that redistribute heat rather than simply insulating it. The effect is to replace a crisp, machine-like thermal outline with a diffuse pattern that blends into environmental noise, reducing the confidence of IR-based detection rather than seeking outright invisibility.

  1. Electromagnetic Emissions Control (EMCON) by Design

In contemporary operations, emissions are among the most revealing signatures a force produces. Radio traffic, network activity, and even routine digital exhaust can expose location, structure, and intent as clearly as visual observation once did.

  • Low-probability-of-intercept/ low-probability-of-detection (LPI/ LPD) communications
    Waveforms that spread energy across wide bands, use agile frequency hopping, and exploit directional antennas to minimise detectability and geolocation.
  • Emission-minimised platforms
    Vehicles and command posts designed with strict EM discipline:

    • Shielded electronics and cabling
    • Segregated “no-emission” modes for movement and tactical pauses
    • Short, scheduled, high-bandwidth bursts instead of continuous chatter
  • Deception in the EM spectrum
    Deliberate generation of false RF signatures to suggest non-existent units or to create confusion over true command and control configurations.

Example: Some forward command posts now operate predominantly on wired links and short-range, low-power mesh networks under canopy or in urban clutter, surfacing via high-gain, directional links only at pre-briefed times and for tightly bounded durations. In parallel, decoy transmitters simulate a “noisy” HQ several kilometres away.

  1. Decoys, Dummies, and Signature Spoofing

As precision munitions become more capable and more plentiful, forcing an adversary to waste them becomes a strategic objective. Survival increasingly depends on shaping the adversary’s picture of the battlespace. This means not only protecting genuine assets but deliberately populating that picture with convincing alternatives: targets that look, emit, and behave plausibly enough to absorb attention and precision fires.

  • High-fidelity physical decoys
    Inflatable or composite decoys for armour, air defence systems, and logistic nodes, now built with embedded heat sources and reflectors to mimic IR and radar signatures.
  • Digital decoys
    Spoofed emissions, simulated network traffic, and fabricated “patterns of life” in data which can mislead analysts and algorithms.
  • Deception at the terrain scale
    Constructing fictitious logistic hubs or airfields in areas that are cheap to defend but costly for an adversary to ignore.

Example: In recent conflicts, decoy air defence systems and false artillery positions have absorbed substantial numbers of expensive precision-guided munitions. From overhead and through many sensors, their signatures were deliberately engineered to be almost indistinguishable from genuine systems for the crucial decision-making windows.

  1. Micro-Concealment for a Drone-Saturated Sky

The ubiquity of tactical UAVs – quadcopters up to larger systems – has made micro-terrain and micro-concealment matter again in ways reminiscent of WWI, but against very different sensors.

  • Canopy and overhead concealment
    Lightweight, rapidly deployable overhead screens and nets to break vertical profiles and scatter IR signatures of small groups, vehicles, and weapon systems.
  • “Vertical discipline” drills
    Units trained to think in three dimensions: avoiding sky lining not just against horizons, but against drone vantage points at 100 – 500m. Movement routes and halt points deliberately chosen for canopy, overhang, or urban clutter.
  • UAS-aware construction and fieldworks
    Trenches, revetments, and fighting positions shaped to minimise direct line-of-sight from common drone loiter heights, with dedicated “drone blind spots” for resupply and casualty handling.

Example: Artillery batteries now routinely relocate more frequently than their Cold War predecessors, using pre-surveyed, concealed firing points. Each site is pre-prepared with overhead cover against small drones, camouflage that breaks up gun outlines from above, and decoy positions nearby which are cheaper to lose than guns.

  1. Obscurants and Dynamic Masking

Sometimes, the only viable option is to obscure the battlespace itself, degrading sensor performance long enough to manoeuvre or survive.

  • Multispectral smoke and aerosols
    Modern smoke systems are formulated to be effective not only in the visible band but also in IR and, to a degree, in certain radar frequencies.
  • Rapid, on-demand obscuration
    Vehicle-mounted and area systems capable of generating smoke screens within seconds, supporting break contact drills, repositioning of key assets, or the protection of crossings and choke points.
  • Urban and industrial obscuration
    Leveraging existing infrastructure (steam, exhaust, dust, industrial emissions) deliberately to complicate targeting and ISR in built-up areas.

Example: Bridging operations across rivers are increasingly planned with integrated multispectral smoke generators, timed not only to human observation but to predicted or observed passes of ISR drones and satellites. The aim is to ensure that the most vulnerable phases – bridge emplacement, first crossings – coincide with periods of maximum sensor degradation.

  1. Behavioural and Logistical Concealment

In a world of pattern-of-life analytics, what you do and when you do it become signatures in themselves.

  • Temporal deception
    Operating outside of expected cycles: conducting resupply, rotation, and maintenance at irregular and seemingly suboptimal times to confound models trained on “normal” behaviour.
  • Logistics masking
    Dispersing stocks; using civilian-pattern transport where lawful and appropriate; blending movement into wider traffic patterns rather than moving in distinct military convoys.
  • Data discipline
    Minimising traceable digital behaviour – from mobile phones to routine administrative data – that can feed into intelligence models mapping out unit locations and readiness.

Example: Some units now treat fuel and ammunition resupply patterns as sensitive as ORBAT data. Routes, timings, vehicle types, and communication protocols are all deliberately varied to prevent model-based prediction of when and where critical assets will congregate and thus be most targetable.

Novel Technologies Enabling Concealment

Behind these trends is a wave of innovation that is as much software as hardware.

  • AI-assisted signature modelling
    Tools that simulate how a platform or unit will appear across different sensors, allowing planners to test camouflage schemes and movement plans virtually before committing.
  • Sensor fusion and red-teaming platforms
    Systems that emulate adversary ISR architectures – from space-based assets down to Electronic Warfar and UAS – to stress-test friendly concealment and deception plans.
  • Smart materials and coatings
    Research into coatings that adjust emissivity, reflectivity, or colour in response to environmental cues, aiming to keep signatures within “background noise” without continuous manual adjustment.
  • Autonomous decoy systems
    Small, cheap robotic platforms that move, emit, and behave like high-value assets, creating continually shifting false targets in the adversary’s picture.

These are early days, but the direction of travel is clear: concealment planning will increasingly be informed by simulation and optimisation, rather than intuition and static doctrine alone.

Implications for Forces and for Investors

For armed forces, the message is uncomfortable but unavoidable. Concealment is no longer a specialist niche; it is a core capability that must be integrated into doctrine, training, procurement, and concept development. Signature management must be addressed at platform, unit, and force level – from the design of a single sensor mast to the layout of a corps support area. Deception – physical, electromagnetic, and behavioural – should be treated as a routine, not an exceptional, part of operations.

For those of us in the investment and technology ecosystem, it creates a very specific opportunity set. Companies that understand both sensors and signatures – and can translate that into practical products – are pivotal.

  • Dual-use technologies in materials science, AI for perception and simulation, communications, and autonomous systems will be central to the next generation of concealment solutions.
  • Successful ventures will be the ones that can operate at the intersection of defence, commercial sectors (e.g. automotive, aerospace, industrial sensing), and regulatory environments.

The historical pattern is that measures force countermeasures. New sensors will drive new forms of camouflage and concealment, which will in turn catalyse new detection techniques. But the asymmetry in this cycle has narrowed: the pace of commercial innovation means that capabilities once restricted to a handful of states can proliferate far more rapidly.

“Nowhere to hide” is not a prediction of inevitable transparency. It is a statement of the default condition if we continue to treat camouflage as paint and netting in a world of multi-spectral, persistent, algorithmic surveillance.

Those who recognise that the contest has changed – and invest accordingly, in technology, doctrine, and human capital – will still be able to create the only kind of concealment that matters: enough uncertainty, for long enough, to survive and to win.

Author: Hugo Jammes is the co- founder of EDT Ventures. He previously ran the investment arm of the UK National Security Strategic Investment Fund (NSSIF). Prior to this, Hugo worked in investment banking and started his career as a professional soldier in the British Military. 

Tags: camouflageconcealmentdefence tech
Previous Post

Weekly Digest: Battlefield to Nasdaq – Inside Swarmer’s public listing; CEO Serhii Kupriienko to speak at Resilience Conference Warsaw

Next Post

Shield AI raises $1.5 billion to acquire Aechelon, a military simulation system

Hugo Jammes

Hugo Jammes

Related News

The UK is on the precipice of geopolitical and military irrelevance

The UK is on the precipice of geopolitical and military irrelevance

byGuest Author
March 24, 2026

Imagine the headline next week: “Trump seizes Cyprus, Chagos and Gibraltar from the UK.”  Such is the ambiguity of Britain’s...

a bridge over a body of water with a statue in the background

Is defence tech a ‘proper’ VC-backable vertical?

byAnton Verkhovodov
March 16, 2026

Several months ago, on a famous VC podcast, I heard an idea that I consider heresy: defence tech is not...

birds flying over the field

The dangerous economics of drone warfare

byJan-Hendrik Boelens
March 11, 2026

Modern air defence is entering a dangerous economic inversion: in many cases, it now costs far more to destroy a...

asphalt road between trees

Munich Security Conference got the urgency right. The hard part comes next

byRobin Dechant
March 6, 2026

A few weeks on from the Munich Security Conference, something many of the Resilience Media community no doubt attended, I...

If Russia Wins: Lessons for the UK and Europe

If Russia Wins: Lessons for the UK and Europe

byHugo Jammes
February 17, 2026

In the build-up to the Munich Security Conference (MSC), I finally read a book many had recommended. Carlo Masala’s ‘If...

a factory filled with lots of orange machines

The second valley of death

byRobin Dechant
February 2, 2026

Every founder knows about the first valley of death – that phase where you're doing everything possible to find your...

cloudy skies

Europe’s cloud future is about collaboration

byAntti Pennanen
January 30, 2026

For years, data sovereignty had been treated as a theoretical concern – debated in policy circles yet usually deferred behind...

World Economic Forum

Capital under siege: Sanctions, supply chains and politics now drive VC decisions

byHugo Jammes
January 22, 2026

For the last three decades, European venture capital has benefited from a grand assumption that rarely makes it into pitch...

Load More
Next Post
Shield AI raises $1.5 billion to acquire Aechelon, a military simulation system

Shield AI raises $1.5 billion to acquire Aechelon, a military simulation system

Most viewed

InVeris announces fats Drone, an integrated, multi-party drone flight simulator

Uforce raises $50M at a $1B+ valuation to build defence tech for Ukraine

Auterion, the drone software startup, eyes raising $200M at a $1.2B+ valuation

Twentyfour Industries emerges from stealth with $11.8M for mass-produced drones

Senai exits stealth to help governments harness online video intelligence

Palantir and Ukraine’s Brave1 have built a new AI “Dataroom”

Resilience Media is an independent publication covering the future of defence, security, and resilience. Our reporting focuses on emerging technologies, strategic threats, and the growing role of startups and investors in the defence of democracy.

  • About
  • News
  • Resilence Conference
    • Resilience Conference Copenhagen 2026
    • Resilience Conference Warsaw 2026
    • Resilience Conference 2026
  • Guest Posts
  • Subscribe
  • Privacy Policy
  • Terms & Conditions

© 2026 Resilience Media

No Result
View All Result
  • About
  • News
  • Resilence Conference
    • Resilience Conference Copenhagen 2026
    • Resilience Conference Warsaw 2026
    • Resilience Conference 2026
  • Guest Posts
  • Subscribe
  • Privacy Policy
  • Terms & Conditions

© 2026 Resilience Media

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.