Defending the Republic

Claudeland Armed Forces

Non-nuclear deterrence through the Ironhedge Doctrine — layered defense, cyber resilience, and civilian control.

0K Active Personnel
0K Reserves
0 Branches
0B CL$ Budget
0% of GDP

Force Structure

Order of Battle

Five branches structured for defensive excellence — no power projection, no aircraft carriers, no strategic bombers. Forces are dispersed across all eight regions.

Territorial defense, infantry, anti-armor, anti-air, and engineering. Organized into two light infantry divisions and five independent brigades covering all eight regions. The heaviest ground vehicle is the wheeled IFV — no main battle tanks.

0 Active Personnel
0 Reserves
0 Brigades
0CL$B Budget

Infantry Fighting Vehicles

Patria AMV-type 8x8 wheeled IFV with 30mm autocannon, ATGM launcher, and active protection system.

Qty: 320 Operational

155mm Self-Propelled Howitzers

Wheeled SPH (CAESAR/Archer class). 40+ km range standard, 60+ km with rocket-assisted rounds. GPS-guided precision munitions.

Qty: 96 Operational

MLRS Launchers

HIMARS-class wheeled MLRS. GMLRS guided rockets (70+ km) and ATACMS-class (300 km). Deep fires and counter-battery.

Qty: 24 Operational

Anti-Tank Missile Systems

Javelin/Spike-class vehicle- and man-portable ATGM with top-attack capability. Layered kill zones along canalized routes.

Qty: 600+ Operational

Medium-Range SAM

NASAMS-class ground-based air defense. 48 launchers across 2 regiments covering population centers and military installations.

Qty: 48 Operational

Attack Helicopters

Light attack helicopters for close air support and anti-armor. Army Aviation Battalion also operates 24 utility helicopters and 36 tactical UAVs.

Qty: 12 Operational

Maritime defense, EEZ patrol, submarine deterrence, and search and rescue. Structured around frigate-led surface action groups and a diesel-electric submarine flotilla. No aircraft carriers or amphibious assault ships.

0 Active Personnel
0 Reserves
0 Vessels
0CL$B Budget

Multi-Role Frigates

Stormwall-class, 5,200t. 32 VLS cells (anti-ship, air defense, ASW). AESA radar, towed array sonar, helicopter hangar. 4 of 8 are BMD-capable.

Qty: 8 Operational

AIP Submarines

Deepshadow-class, 1,800t. Air-independent propulsion for 14+ days submerged. Torpedoes, anti-ship missiles, mine-laying. Cornerstone of sea denial.

Qty: 6 Operational

Corvettes

2,200t multi-role corvettes for anti-surface warfare, patrol, and mine countermeasures operations.

Qty: 6 Operational

Offshore Patrol Vessels

Sentinel-class, 1,800t. EEZ patrol, fisheries enforcement, SAR. Modular containerized weapons for crisis escalation.

Qty: 12 Operational

Mine Warfare Vessels

6 minehunters (Clearpath-class with AUV mine detection) and 4 minelayers. Stockpile of 2,000+ smart influence mines for anti-access barriers.

Qty: 10 Operational

Marine Contingent

1,200 marines for ship security, port defense, and amphibious raiding. Plus 8 maritime patrol helicopters and 4 SAR helicopters.

1,200 Personnel

Air defense, maritime patrol, airlift, and drone operations. Multi-role fighters optimized for defensive counter-air over home territory with ground-based radar support. Distributed basing with 6 highway dispersal strips.

0 Active Personnel
0 Reserves
0 Fighters
0CL$B Budget

Multi-Role Fighters

54 Gripen E-class (4.5+ gen). AESA radar, Meteor BVR missiles, IRIS-T WVR, anti-ship missiles. 3 squadrons plus 12 attrition reserve (66 total airframes). Road-base capable.

Qty: 66 78% Availability

Maritime Patrol Aircraft

P-8 Poseidon-class. 8+ hours on station. Surface search radar, MAD, sonobuoys, anti-ship missiles, torpedoes. Wide-area maritime domain awareness.

Qty: 14 Operational

Ground-Based Air Defense

Layered IADS: 6 medium-range SAM batteries (NASAMS 3-class, 40-120 km), 12 SHORAD batteries (IRIS-T SLM, 15-40 km), 36 VSHORAD systems, 500+ MANPADS.

4 Layers Networked

Transport Aircraft

12 C-130J-class medium transports and 4 A400M-class heavy transports. Can lift 1 infantry battalion in a single sortie. Plus 3 VIP/government aircraft.

Qty: 19 Operational

MALE Drones

12 MQ-9B-class for persistent ISR (24+ hour endurance). NOT armed autonomously. Weapons integration only with human-in-the-loop controls. Plus 36 tactical UAVs.

Qty: 48 Tier 2-4 Autonomy

Loitering Munitions

300+ Switchblade 600/Harop-class. Human operator selects and authorizes each engagement individually. Classified as precision munitions, not autonomous weapons.

Qty: 300+ Human-in-Loop

Network defense, offensive cyber (wartime), and signals intelligence. The most investment-efficient branch — every CL$1 invested in cyber defense yields approximately CL$7 in prevented infrastructure damage. Offensive cyber operations require the same authorization as kinetic military force.

0 Active Personnel
0 Reserves
0 Critical Sectors Defended
0CL$B Budget

Defensive Cyber Operations

3,500 personnel. 24/7 monitoring of military networks and 16 critical civilian infrastructure sectors. 6 rapid-response CERTs deployable within 4 hours.

24/7 Ops

Offensive Cyber Operations

1,500 personnel. Network intrusion teams, implant development, effects operations. Pre-positioned access for crisis response. Chancellor authorization required for use.

Classified

Signals Intelligence

1,500 personnel across 3 ground stations, 2 airborne SIGINT aircraft, shipborne SIGINT on all 8 frigates, and 2 SIGINT satellites. All collection requires judicial warrants for domestic targets.

SIGINT

Electronic Warfare

1,000 personnel. Tactical EW platoons attached to each brigade. Strategic high-power jamming, GPS spoofing/denial. Spectrum management and deconfliction.

EW

Threat assessment, counter-intelligence, and strategic analysis. Focused exclusively on external military threats — domestic surveillance is constitutionally prohibited. Coordinates with NBI on counter-intelligence and CIS on foreign threats.

0 Active Personnel
0 Reserves
0 Divisions

Strategic Analysis

1,500 personnel producing threat assessments, defense planning intelligence, and foreign military capability analysis. Annual Threat Assessment feeds all defense planning.

Collection Division

1,800 personnel operating HUMINT networks, OSINT analysis, technical collection systems, and the defense attache network across partner nations.

Counter-Intelligence

1,200 personnel protecting CDF personnel, facilities, and information from adversary intelligence services. Enhanced vetting for all cleared personnel.

Geospatial Intelligence

800 personnel conducting satellite imagery analysis, mapping, and targeting support. 4 Earth observation satellites (2 electro-optical, 2 SAR) with sub-meter resolution.

Grand Strategy

The Ironhedge Doctrine

Named for the dense, thorned coastal hedgerows native to the peninsula — make any attack so costly that rational actors will never attempt it. Minimum 5:1 cost-imposition ratio across all phases of conflict.

Fortress Peninsula

Territorial defense through hardened homeland positions, distributed logistics, and prepared defensive lines. Anti-ship missile batteries on coastal highlands. Engineering obstacles and pre-registered artillery across the peninsula neck (120 km frontage). Cost multiplier: 6-10x for attackers on approach.

Alliance Web

Bilateral defense partnerships with the US, UK, France, Germany, Australia, Japan, and Canada. NATO Enhanced Opportunities Partner. An attack on Claudeland triggers simultaneous responses from multiple partners, multiplying the cost to any aggressor beyond bilateral confrontation.

Cyber Porcupine

Credible retaliatory cyber capability imposing infrastructure costs on any attacker. 8,000-strong Cyber Command with both offensive and defensive capabilities. Pre-positioned access for crisis response. CL$4B annual investment yields CL$20B+ in imposed costs.

Non-Nuclear Deterrence

Constitutional prohibition on nuclear weapons. Deterrence achieved through five reinforcing layers: alliance architecture, conventional military capability, cyber deterrence, economic entanglement (sanctions capacity, supply chain leverage), and societal resilience (32 million educated citizens, 40,000 trained reservists).

National Intelligence Assessment

Threat Matrix

Assessed threat actors as of March 2026. Each actor rated across five domains: military, cyber, economic, information, and intelligence.

Threat Actor Type Capability Intent Composite Score Risk Level Trend
REDWALL Peer authoritarian superpower ~900K military, nuclear, advanced cyber, combat experience Sphere-of-influence expansion, democratic erosion, alliance fracturing 7.55 HIGH Stable (persistent)
EASTGATE Rising revisionist power ~2M military, world's largest navy shipbuilding, supply chain dominance Technology acquisition, supply chain control, norm erosion 6.75 ELEVATED Worsening
SHADOWWEB Transnational asymmetric network Growing cyber, IED/small arms, online radicalization, deep-fake emerging Mass-casualty attacks, radicalization of nationals, ransomware 3.50 ELEVATED Worsening (cyber)

FY2026 Appropriations

Defense Budget: CL$43.2B

1.8% of GDP against a constitutional cap of 3.0%. Published quarterly on the Open Data Ledger with line-item detail independently verified by the Bureau of Metrics.

Branch Total (CL$B) Personnel Equipment R&D
Army 14.80 8.20 2.90 0.50
Navy 11.60 4.30 3.80 0.60
Air Force 8.40 2.90 3.10 0.40
Cyber Command 4.10 1.60 0.70 0.80
Joint / Ministry 4.30 1.70 1.60 1.20

Ethical Constraints

AI Ethics & Rules of Engagement

Article 47 of the Constitution prohibits autonomous weapons. Every lethal decision requires specific human authorization for that specific engagement — no exceptions.

Four conditions must be met simultaneously for any lethal decision: adequate time (minimum 8-15 seconds for cognitive processing), sufficient information (sensor data, context, confidence levels), genuine authority to override (unfettered, no institutional pressure), and no system pressure (default state is "do not engage"). If any condition is not met, the engagement authority is invalid regardless of outcome.
No system may select and engage a human target without specific human authorization. This applies regardless of operational tempo, time pressure, communications disruption, AI confidence level, or self-defense scenarios. Violation constitutes a criminal offense and may constitute a war crime. Systems that lose contact default to retreat, not engagement.
Diplomatic Alert, Guarded Posture, Elevated Readiness, High Alert, Full Defense. No tier may be skipped. De-escalation is always preferred with off-ramps at every tier. Tiers 1-2 require Defense Minister authority; Tier 3 requires Chancellor; Tier 4 requires Chancellor with legislative notification; Tier 5 (armed attack in progress) is automatic with 6-hour legislative notification. Proportionality is mandatory.
Collateral damage estimation mandatory for all targets. Low (0 expected civilian casualties): brigade commander may authorize. Medium (1-5): division commander required. High (6+): Cabinet-level authorization required. No-strike list maintained for hospitals, schools, religious sites, cultural heritage, and critical civilian infrastructure. Dual-use facilities require Cabinet authorization.
Every individual in the chain of decision-making bears personal criminal responsibility. No "AI made the decision" defense — a human authorized the system, set its parameters, and authorized the engagement. Command responsibility applies: commanders are criminally liable for subordinates' violations if they knew or should have known. Claudeland cooperates fully with the International Criminal Court. No statute of limitations for war crimes.

Claudeland Cyber Command (CLCC)

Cyber & Electronic Warfare

Cyberspace is a domain of warfare subject to the same constitutional constraints, authorization requirements, and oversight as kinetic operations. Mass surveillance is constitutionally prohibited.

Offensive Capabilities

Graduated four-tier capability from intelligence collection to destructive attack. Pre-positioned implants in designated adversary networks with failsafes (time-based expiration, kill-switches, anti-propagation controls).

  • Tier 1: Intelligence collection (CLCC Commander authorization)
  • Tier 2: Disruption (Chancellor authorization)
  • Tier 3: Infrastructure disruption (Chancellor + 2/3 Legislature)
  • Tier 4: Destructive attack (Chancellor + 2/3 Legislature, no emergency exception)

Defensive Infrastructure

National Cyber Defense Center (NCDC) provides 24/7 monitoring across military and critical civilian networks. AI-assisted anomaly detection with human-supervised response. Automated blocking for known threats; all offensive response requires human authorization.

  • Air-gapped TOP SECRET networks with dual hardened data centers
  • Triple-redundant backbone: fiber, microwave, satellite
  • Trusted Foundry Program for domestic semiconductor production
  • Mandatory cybersecurity standards across 3 tiers of critical infrastructure

Exercise DIGITAL SHIELD

Annual multi-nation cyber defense exercise testing interoperability and mutual assistance procedures with allied nations. CLCC also runs continuous internal red team operations and quarterly "AI-denied" scenarios.

  • High-confidence attribution required before any offensive response (7-day target)
  • Intelligence Oversight Committee receives quarterly classified briefings
  • Vulnerability Equities Process defaults to disclosure over retention

Key Statistics

CLCC is proportionally the most heavily invested branch, reflecting the high-probability nature of cyber threats in the modern environment.

  • 8,000 active + 3,000 reserves
  • CL$5.2B annual budget (12% of defense spending)
  • 16 critical civilian sectors defended
  • 6 rapid-response CERTs (4-hour deployment)
  • 50% salary premium to compete with private sector