Neither the Stack Nor the Swarm

April 17, 2026

The defense AI market is consolidating and fragmenting simultaneously. The standard explanation treats the pattern as a contradiction requiring resolution. The application layer compresses as platform players acquire their way toward vertical stack control. Shield AI raises $2.25 billion and acquires Aechelon to own autonomy plus simulation and Palantir Technologies Maven pushes toward Program of Record permanence to own the enterprise data layer. At the same time, the model layer splinters as defense customers discover that single-provider bets are a structural risk. Defense contractors that built around a single foundation model provider like Anthropic are discovering that leadership instability, shifting commercial priorities, and unpredictable policy decisions at any one provider can compromise mission capabilities. The result is urgent demand for model swap, model hedging, and provider diversity. The conventional wisdom says the value migrates to autonomy middleware, the orchestration layer that brokers between consolidated applications above and fragmented models below, often framed as swarm intelligence or agentic AI frameworks for military operations.

The conventional wisdom is wrong. The dynamics are real but the proposed resolution repeats an architectural error the defense establishment cannot afford to make again. The error becomes visible not in abstract architectural comparison but in the concrete operational problem the current stack cannot solve, the problem of defeating an adversary whose entire doctrine is designed to make centralized systems irrelevant.

The Problem Centralized Stacks Cannot Solve

Did you think my latest demo was just a war game? Set in the fantasy world of the Shattered Crown where the operative military doctrine is deliberate decentralization, the sovereign authority in question divided military might across thirty-one autonomous provincial war-hosts each commanded by a Banner Lord holding pre-delegated authority to fight independently. Each Banner maintains its own logistics, its own training cadres, its own finance pipelines, and sealed orders covering scenarios in which the sovereign is killed, incapacitated, or unreachable. Beyond the thirty-one internal Banners, the kingdom sustains external proxy orders operating in neighboring territories with their own chains of command.

The Shattered Crown’s system is engineered so that the political decision-making and the operational military system are deliberately decoupled. The decoupling is not a failure of command discipline but an explicit design specification. The Shattered Crown cannot be disabled because there is no single node whose destruction collapses the network. There is no headquarters whose loss matters. There is no logistics hub whose destruction starves the whole. There is no command link whose interdiction silences the cells.

Suppose the sovereign is incapacitated and a ceasefire is proclaimed in his name. The political system signs the deal. The Seventh Banner, however, operating under sealed orders and pre-delegated authority, launches strikes against a coastal city anyway. The Twenty-Eighth Banner stirs to join. The system that signed the deal and the system firing the weapons are two different systems. No command can disable them.

The scenario just described exposes the architectural insufficiency of every dominant approach in the current defense AI market.

The asymmetry goes deeper than doctrine. The Shattered Crown’s thirty-one Banners are partition-tolerant by design. Each continues operating when disconnected from the sovereign, from neighboring Banners, and from central communications. Disconnection is not a failure mode; it is the normal operating condition for which the doctrine was built. Meanwhile, the force opposing the Shattered Crown fields unmanned systems whose entire value depends on maintaining continuous command-and-control links, some of them to cloud facilities that simply can’t be present under operational command. Industry and procurement conversations increasingly focus on C2 resiliency (more robust radios, more adaptive waveforms, and spectrum-agile communications) as though the problem is making the link harder to break. A more resilient link is still a link. A more adaptive waveform is still a transmission that can be denied. The adversary designed its coordination to survive the loss of every link. The defending force is spending billions to avoid confronting the possibility that link dependency itself is the wrong architecture. Every dollar spent hardening a C2 connection is a dollar spent preserving an architectural assumption the adversary has already moved past.

Why Vertical Integration Fails Here

Every major defense AI platform currently in production or procurement executes the same strategy. Each platform seeks to become the single dominant provider, to own the stack, to absorb what sits below it, and to compress vertical control until competitors cannot replicate its position because they do not control enough layers.

Enterprise data platforms that model operational reality through a single ontological schema provide extraordinary integration capability. They ingest data from disparate sources, resolve entities across databases, and enable analysts to see connections previously invisible across organizational silos. The integration is real. The operational value is genuine.

The limitation is equally real and practitioners who build on these platforms encounter it daily. Engineers working inside single-ontology platforms report spending hours mapping business objects to explain why transactions are not payments are not settlements, three things that look similar enough to occupy a shared schema but whose temporal profiles, failure semantics, regulatory governance, and operational meaning are irreducibly different. Schema drift surfaces at 2 AM when the data’s actual structure diverges from the ontology’s assumed structure. Lineage breaks when someone builds a pipeline outside the governance framework because the framework’s schema does not have room for what the work requires. The workaround is not recklessness but the practitioner being faithful to an operational reality the ontology cannot simply represent. When the domain happens to match the schema, these platforms are extraordinarily powerful, but force fitting different domains to a canned schema across a single ontology is a problem that ontology can’t solve.

Against the Shattered Crown, the limitation just described becomes operational rather than administrative. The thirty-one Banners are not a unified force modeled from a single command hierarchy. Each Banner has its own operational tempo, its own logistics patterns, its own communications signatures, and its own relationships with neighboring Banners and external proxy orders. A schema designed to model a centralized adversary, assuming headquarters, subordinate commands, and lines of communication cannot see the decoupled relationships that make the mosaic function. The link between the Seventh and the Twenty-Eighth is not a command relationship but a behavioral coordination pattern, a thickening of the coordinates_with thread visible only if the platform models each Banner’s behavioral signature in its own terms rather than forcing all thirty-one into a single command-hierarchy template.

Autonomy platforms executing vertical integration face the same structural limitation at the engagement layer. An autonomy stack that owns its simulation environment creates a powerful feedback loop in which the simulation trains the autonomy and the autonomy generates data that improves the simulation. The simulation, however, models the adversary through the assumptions embedded in its design. When those assumptions include centralized command, the autonomy system is trained to look for headquarters, decapitate leadership, and interdict command links. Against an adversary that has no headquarters, whose leadership can be incapacitated without operational effect, and whose command links are pre-severed by design, the autonomy system is optimized for the wrong problem.

Why Autonomy Middleware Fails Here Too

The emerging response to vertical integration’s limitations is autonomy middleware, specifically swarm AI frameworks, agentic orchestration layers, and decentralized coordination platforms that promise to match the adversary’s decentralization with decentralized autonomous agents. The thinking runs that a swarm is defeated by another swarm.

The preceding response misdiagnoses the problem. The Shattered Crown is not a swarm. Swarm intelligence assumes homogeneous agents executing simple rules that produce emergent collective behavior. The thirty-one Banners are not homogeneous. Each has different capabilities, different terrain, different relationships, and different operational cultures. The Seventh Banner’s mountain warfare capability is not interchangeable with the Twenty-Eighth’s coastal logistics network. The proxy orders operating in foreign territories bear no resemblance to the internal provincial commands. Treating them as a swarm, as interchangeable nodes in a decentralized graph, loses the specific behavioral signatures that make each Banner identifiable and each coordination pattern detectable.

More fundamentally, autonomy middleware flattens the operational domains it coordinates. A swarm framework treats every sensor, every effector, and every analytical node as an agent in a common coordination model. The operational domains involved in countering the Shattered Crown, however, covering signals intelligence, geospatial analysis, financial tracking, information operations, cyber operations, and kinetic engagement, are not variations of a single domain. They operate at genuinely different temporal cadences, with different data types, different classification requirements, different legal authorities, and different chains of command. A communications analyst tracking frequency-hopping signatures works in a different operational reality than a financial intelligence specialist tracing hawala networks. A cyber operator timing an intrusion works at a different tempo than an information operations planner shaping a narrative over weeks.

Autonomy middleware that forces these domains into a single agent framework commits the same homogenization error as vertical integration, simply at a different layer of the stack. Instead of absorbing all data into one ontological schema, it absorbs all operational domains into one coordination model. The genuine differences between domains are erased for the sake of interoperability. The domain-specific intelligence each discipline provides disappears with them.

The result is a system decentralized without being heterogeneous, matching the adversary’s distribution while missing the adversary’s diversity. Against the Shattered Crown, the distinction between distribution and diversity is the difference between seeing the mosaic’s tiles and reading the grout between them.

Defeating the Shattered Crown

The effective architecture is neither centralized integration nor decentralized swarming but genuine heterogeneity under genuine coordination, a configuration in which many operational domains, each native to its own reality, are unified through a coordination fabric that preserves their differences rather than erasing them.

Multiple Sensor Ontologies, Each Native to Its Domain

Low-power neuromorphic classifiers deployed on forward collection platforms classify behavioral signatures in microseconds at microwatt power. Each classifier operates in its own domain, covering communications patterns, logistics movements, financial flows, social network dynamics, and cyber activity. A communications classifier does not need to understand financial flows. A logistics tracker does not need to parse social networks. Each sensor reports what it actually sees, in its own terms, through typed metrics with semantic direction indicating whether higher values represent more activity or more quiescence. The coordination layer understands that a rising communications signature and a falling logistics movement together mean something neither domain would flag independently and it understands the correlation through the relationship between the domains rather than forcing both into a common metric.

A Knowledge Graph That Writes Itself

The classified behavioral signatures flow into a graph that models the thirty-one Banners, their Banner Lords, their external proxy orders, and their relationships. The graph’s link types (swears_to, supplies, coordinates_with, and falls_silent_before) form the true map of the Shattered Crown. Where the adversary sees only thirty-one separate hearths, the graph sees the whole flame. When the Seventh Banner’s communications go quiet while the Twenty-Eighth stirs, the graph marks the correlation. When a shipment leaves a depot that should have been emptied, the graph connects it to the Seventh’s logistics pattern. Silent anomalies accumulate into composite assessments no single-domain system could produce.

Attribution Requiring Convergence Across Independent Domains

No assessment crosses into action unless multiple independent sources, drawn from different sensor domains, using different collection methods, and operating through different classification models, confirm the same conclusion. The requirement is not bureaucratic caution but architectural integrity. Different domains see different facets of the same reality. Requiring convergence across genuinely independent observations produces assessments that no single domain could achieve and that no single-domain spoofing could fabricate.

Reasoning at Scale Across the Full Adversary Graph

Large language model inference reads the accumulated graph and identifies patterns no human analyst could track across thirty-one simultaneous actors. The inference operates as a persistent service across multiple model tiers, with per-instance operational metrics driving real-time routing to the least-loaded appropriate model. The reasoning layer sees rather than decides. Human commanders read the reasoning layer’s assessments and set policy. The coordination layer allocates the response. Human judgment reigns supreme and execution operates at machine speed and scale.

The coordination layer’s depth is what enables the architecture. The coordination layer is not a flat scheduling system that counts resources and assigns tasks but a typed, hierarchical, semantically rich governance fabric. Each operational domain reports its actual state (sensor health, collection capacity, analytical queue depth, and effect readiness) through domain-native metrics at configurable sub-second intervals. The coordination layer makes routing and allocation decisions based on the real-time operational state of every domain simultaneously. Consumer governance hierarchies ensure that each operational domain receives its allocation while idle capacity flows laterally to domains under pressure. Service lifecycle management enables persistent analytical services that accumulate context across sessions rather than starting fresh with each invocation.

The preceding description is not theoretical capability. Service-oriented workload management platforms with these characteristics (typed metrics with semantic direction, hierarchical consumer governance, per-instance operational state, sub-second metric freshness, multi-phase service lifecycles, and multi-cluster federation) have operated in production at institutions processing billions of tasks daily for over two decades. The engineering tradition traces to Songnian Zhou’s 1987 doctoral research at UC Berkeley, where the foundational insight was that effective coordination across heterogeneous resources requires preserving each resource’s native characteristics rather than forcing all resources into a common abstraction. The principle has scaled from VAX workstations through financial services grids to GPU clusters to quantum-classical hybrid systems without modification, because it was never bound to any particular substrate.

Multi-Domain Effects Coordinated Without Homogenization

The response to the Seventh Banner’s ceasefire violation is not a single kinetic strike but simultaneous disruption across every domain on which the Seventh depends (its supply lines, its communications with neighboring Banners, its financial flows, and its information environment), with each effect delivered through the operational domain appropriate to its nature. Cyber effects operate at cyber tempo. Financial effects operate at financial tempo. Information effects operate at narrative tempo. Kinetic effects operate at kinetic tempo. The coordination layer ensures the effects arrive in the right sequence to compound, managing each domain’s contribution according to that domain’s own operational metrics and readiness state.

Partition-Native Edge Operations

The unmanned systems executing these effects do not depend on continuous command-and-control links for their operational relevance. Each edge carries enough local state (mission context, role assignments, coordination relationships with neighboring assets, and rules of engagement) to continue operating autonomously when connectivity degrades or is denied. Connectivity enriches operation rather than defining it. When the coordination fabric is available, the drone receives cross-domain intelligence, updated targeting, and multi-asset synchronization. Disconnection does not end operation but shifts the edge into autonomous mode within the last known context, accumulating observations that synchronize when the relationship resumes. The network fabric carrying the coordination is not dumb transport trying to remain operational. The fabric understands the relationships it carries, namely which edge node coordinates with which sensor platform, which effector, and which command authority. Degradation is a matter of intelligent management. Partial connectivity does not mean full capability or no capability. Partial connectivity means the relationships that can be maintained are maintained, the ones that cannot be maintained trigger local autonomy, and the fabric tracks which relationships need reconciliation when connectivity returns. The architecture provides the same partition tolerance the adversary built into the Shattered Crown. In the architecture, however, partition tolerance is governed, attributable, and coordinated across domains rather than pre-delegated and unaccountable. The defending force matches the adversary’s resilience without adopting the adversary’s ungoverned autonomy.

So, when the Twenty-Eighth Banner moves to join the Seventh, it finds its neighbor already isolated, with supplies disrupted, communications garbled, finances frozen, and its own Banner Lord suddenly uncertain whether the Seventh was right to strike at all. The Twenty-Eighth hesitates, and during that hesitation the attribution chain closes on it. By dawn, three more Banners are unwilling to move.

The Shattered Crown has not been reunified. The sovereign is still incapacitated. The thirty-one Banners still exist. The Shattered Crown, however, has become operationally incoherent, its tiles intact, its picture refusing to assemble. The defeat mechanism is not attrition but orchestrated incoherence achieved through multi-domain coordination that matches the adversary’s plurality while exceeding its unity.

The Quantum Horizon

The urgency of the architectural question increases with the approach of operational quantum computing. Every vertically integrated defense AI stack and every autonomy middleware framework in production or procurement today is built on classical compute assumptions.

Quantum computing is not a faster version of classical computing but a genuinely different computational reality operating through superposition, entanglement, and probabilistic measurement. The defense applications where quantum is expected to achieve operational relevance first (optimization at logistics-planning scale, cryptanalytic operations against current encryption standards, and pattern detection across combinatorial spaces) are precisely the applications generating the highest value within current defense AI stacks and precisely the capabilities the Shattered Crown scenario demands.

Finding coordination patterns across thirty-one simultaneous actors with shifting allegiances, intermittent communications, and deceptive signaling is a combinatorial optimization problem, exactly the problem class where quantum advantage is expected to emerge first. A platform architecturally prepared for quantum incorporates quantum advantage without re-architecture, meaning one that treats each computational paradigm as a native domain with its own ontology and coordinates across paradigm boundaries through typed relationships. A platform locked into classical assumptions, whether through vertical integration or autonomy middleware, must choose between missing the advantage and rebuilding under operational pressure.

A platform built on the principle of native heterogeneous coordination handles quantum as it handles every new computational reality. Quantum enters as a new domain with its own metrics (fidelity, coherence time, error correction overhead, and circuit depth constraints). Quantum establishes coordination relationships with classical domains. Quantum results, inherently probabilistic, are not collapsed into classical certainty at the boundary. The probability distribution is preserved and coordinated with classical domains through typed relationship surfaces that translate without losing information. The platform does not change when quantum arrives. Instead, the relationships expand. The same principle that enables the platform to coordinate signals intelligence, financial tracking, and kinetic engagement without forcing them into a common model applies to a new computational paradigm rather than to a new operational domain.

The defense establishment has a window before quantum reaches operational scale. The platforms built during that window will either accommodate quantum as a native computational reality or face re-architecture under adversary pressure. Both vertical integration and autonomy middleware foreclose the first option because both homogenize what they coordinate. Native heterogeneous coordination preserves the distinctions.

Implications for the Competitive Landscape

The defense AI market currently offers two options, both insufficient. Vertical integration compresses the stack under a single vendor’s ontological framework, providing operational coherence at the cost of homogenization and paradigm lock-in. Autonomy middleware distributes coordination across agents in a common framework providing decentralization at the cost of flattening genuine operational differences into a single coordination model.

A third architecture is what the Shattered Crown demands, one where many operational worlds coexist, each native to its domain, coordinated through typed relationships that honor what each domain actually is. The engineering tradition behind this architecture is not a startup’s pitch or a research prototype but a lineage spanning nearly four decades of production deployment, from Zhou’s Berkeley research through financial services grids processing billions of tasks daily to heterogeneous orchestration across GPU, quantum, neuromorphic, and mainframe tiers. The constituent capabilities (typed resource ontologies, hierarchical consumer governance, per-instance operational metrics, sub-second dispatch, multi-cluster federation, and distributed storage as coordination substrate) exist in production at scale.

The missing element has been the integration of these capabilities into a defense coordination platform designed from the ground up for the principle that operational domains differing in kind deserve coordination differing in kind. The organizations that build toward that integration are building the platform that defeats the adversary the current stack cannot handle and survives whatever computational paradigm comes next.

The defense AI market is consolidating and fragmenting at the same time. The resolution is not to pick a side, broker between them, or swarm past them. The resolution is to build infrastructure where many operational worlds fit, each governed by its own ontology, each coordinated through relationships faithful to its design, and each prepared for whatever comes next.

You can watch the Shattered Crown demo video here.

The opinions expressed in the present article are those of the author and do not necessarily reflect the views of the author’s employer.