3D opportunity for adversaries Additive manufacturing considerations for national security
The same benefits that make additive manufacturing a valuable capability for manufacturers may also be exploited by those seeking to do harm. How can those tasked with protecting the populace anticipate these trends and prepare for action?
Explore the 3D Opportunity collection
In 2013, Cody Wilson, a self-described crypto-anarchist and gun-rights activist, posted blueprints for the Liberator, a functioning one-shot plastic pistol that could be reproduced with a 3D printer, via additive manufacturing. Local law enforcement had no issues with it—a resident of Texas, Wilson had been issued a federal license to manufacture and deal in firearms.1
It was the US Department of State, through its Directorate of Defense Trade Controls, that requested the files be taken down until a determination could be made whether the information was controlled "technical data."2 It claimed that the files were potentially subject to a set of regulations known as the US International Traffic in Arms Regulations (ITAR). The State Department’s position was that publishing “technical data,” a term defined under US law, which includes information used for the development, production, or use of an export-controlled item, was tantamount to the export of technical data and that Wilson did so without authorization.3
Wilson eventually complied—but not before the files for the gun had been downloaded over 100,000 times.4 In 2015, Defense Distributed, a nonprofit founded and run by Wilson, and the gun rights group Second Amendment Foundation filed a lawsuit against the State Department, claiming a violation of Wilson’s first-amendment right to free speech.5
This case highlights one of the trickier aspects of additive manufacturing (AM), also known as 3D printing: The capabilities it enables can be applied beyond the bounds of legitimate businesses, and exploited by those seeking to do harm.
AM does not pose a threat in and of itself. Quite the opposite; AM can provide great benefits for society. At the same time, however, these benefits can also be used to malign ends. The same characteristics that make AM valuable to manufacturers—speed to delivery, on-demand production at or close to the point of use, more effective inventory management, design innovation, and lower barriers to entry into new geographies—may also attract those with malicious intent. AM makes these ends more attainable by democratizing access to technology. This can simultaneously create a new challenge for law enforcement, as the wider access to technology enabled by AM can make controlling the creation or possession of dangerous devices much more difficult.
Put simply, AM can make it easier to engage in certain types of threatening behavior that could undermine aspects of national security. By examining the impacts AM has on business (see the sidebar “The additive manufacturing framework”), this article strives to identify some of the potential threats and threat actors, examine some of the ways in which AM can potentially be put to malicious uses, and present a lens through which law enforcement, national security, and intelligence organizations from every nation can consider avenues to protect citizens.
The same characteristics that make AM valuable to manufacturers . . . may also attract those with malicious intent.
THE ADDITIVE MANUFACTURING FRAMEWORK
AM’s roots go back nearly three decades. Its importance is derived from its ability to break existing performance trade-offs in two fundamental ways. First, AM can reduce the capital required to achieve economies of scale. Second, it increases flexibility and reduces the capital required to achieve scope.6
Capital versus scale: Considerations of minimum efficient scale can shape supply chains. AM has the potential to reduce the capital required to reach minimum efficient scale for production, thus lowering the manufacturing barriers to entry for a given location.
Capital versus scope: Economies of scope influence how and what products can be made. The flexibility of AM facilitates an increase in the variety of products a unit of capital can produce, which can reduce the costs associated with production changeovers and customization and, thus, the overall amount of required capital.
Changing the capital versus scale relationship has the potential to impact how supply chains are configured, and changing the capital versus scope relationship has the potential to impact product designs. These impacts present companies with choices on how to deploy AM across their businesses.
Companies pursuing AM capabilities can choose different paths (figure 1):
Path I: Companies do not seek radical alterations in either supply chains or products, but they may explore AM technologies to improve value delivery for current products within existing supply chains.
Path II: Companies take advantage of the scale economics offered by AM as a potential enabler of supply chain transformation for the products they offer.
Path III: Companies take advantage of the scope economics offered by AM technologies to achieve new levels of performance or innovation in the products they offer.
Path IV: Companies alter both supply chains and products in pursuit of new business models.
Characterizing the threat: Different actors, same intent
In the national security context, a threat is characterized by a combination of intent and capability.7 Before we explore the various ways in which AM can lower the barriers to entry for malicious actors, it is important to first identify who those various actors could be, and highlight some of the common threats by which they may typically act—threats that can be strengthened to some extent by the use of AM.
We will consider a representative cross section of potential actors. It is important to note, however, that in today’s world, the points of demarcation between these actors are often blurry, and this list is not intended to be exhaustive:
- Lone wolf: It refers to an individual actor, operating independently to achieve his or her own goals. AM can increase the availability of technology, knowledge, and equipment, lowering the “barriers to entry” for such individuals while potentially increasing the impact of their actions.8
- Organized crime: A group of individuals can operate on a local, national, or transnational scale, performing illegal activities primarily motivated by economic (and sometimes political) factors. The highly organized, systematized approach to criminal activity used by these groups can undermine the rule of law and threaten national security itself, as evidenced by the activities of Latin American drug cartels.9 While their levels of sophistication, internationalization, and politicization may vary, their illegal activities can be enhanced, and detection potentially evaded, through the use of AM.
- Non-state (terrorist) actors: A well-organized network of determined actors can use violence to achieve geopolitical goals. Non-state networks are differentiated from the other categories in that their organizing principle is overtly political, and their objective in acquiring weaponry is to commit acts of terror and cause fear.10 AM can help terrorist groups not only acquire new weapons or capabilities, but also allow them to do so more rapidly and stealthily than before, across a wider range of locations.
- National strategy of a foreign government: It refers to the coordinated actions of a foreign government taken to advance its geopolitical agenda. In contrast to the other actor categories, nation–states possess significant industrial and financial resources, which can permit sanctioned activity to happen within their borders, despite international efforts to delay or deter it. AM is but one tool at their disposal.11
While these groups may differ, the intent remains a constant thread that all share in common: Each group has the intent do to harm, regardless of whether AM is involved. Therefore, the real impact of AM is on the capability side of the threat definition. AM significantly reduces the barriers to entry in many technological fields, democratizing the capabilities to do harm and potentially introducing new, asymmetric threats. The automated nature of AM and the manufacturing flexibility it affords means that the physical, logistical, and human capital requirements to run a small/agile manufacturing operation are less prohibitive.
For purposes of discussion, we will consider five use cases that could be either created directly or improved by AM.12
- Homemade firearms: Improvised plastic firearms made on hobby-grade additive manufacturing machines with plans downloaded from the Internet13
- Counterfeits: Goods or components designed and produced to mimic a trusted product from a trusted supplier;14 products can range from counterfeit consumer goods, to credit card scanners, and even include false parts for military hardware15
- Improvised explosive devices: Nontraditional explosive devices16
- Advanced technology/weapons: A collection of advanced, usually export-controlled, technologies, including jet engine technology, missile technology, and advanced explosive systems such as explosively formed penetrators (EFPs)17
- CBRNE threats: Chemical, biological, radiological, nuclear, and explosive (CBRNE) threats, as well as the means to produce or accelerate production/weaponization of such threats18
Considering these two dimensions of actor and AM-produced categories as a matrix, and arranging them roughly in order of sophistication, we depict the threat/actor space in figure 2.
Of course, the true threat space is limited only by human imagination. This presents a challenge for those whose responsibility it is to protect the population. How can they anticipate a criminal’s imagination and therefore take action ahead of time to protect against a threat?
In the next section, we explore how the AM framework—a set of paths that guide the ways in which businesses and government agencies can extract value from AM—can also be exploited by those seeking to do harm. As we do so, we will explore the ways in which AM can help enable some of the specific threats identified in figure 2.
AM significantly reduces the barriers to entry in many technological fields, democratizing the capabilities to do harm and potentially introducing new, asymmetric threats.
Opportunities and threats: Two sides of the coin
The AM framework identifies opportunities that the technology creates for companies and government entities in a commercial or industrial setting. But its benefits can be a double-edged sword, streamlining processes for criminal actors and posing a threat to national security. The threat actors discussed above are admittedly not companies, but they can be similarly well-organized, and seek to use many of the same tools and strategies as legitimate organizations to achieve their desired ends—only with, to be sure, a very different set of objectives. As they pursue their goals, however, they can still exploit the benefits of AM to break the trade-offs between scale and scope in much the same way companies do: to test and develop new devices more quickly, sidestep the supply chain, produce wholly new objects, or manufacture a wider variety of them more easily.
In fact, precisely because they are unfettered by many of the rules of society, the threat actors can often be at the forefront of adopting new technology, meaning that those tasked to protect society may already lag behind their adversaries. For example, at the turn of the last century, criminals were quick to see the utility of automobiles, using them to escape from heists while police still walked or rode on horseback.19 The problem was not that the police lacked imagination, but that they did not seem to understand ahead of time how the new technology could benefit criminals and therefore did not take appropriate action to prevent that use.
Thus, if we are to protect against malicious actors, it is crucial to understand how AM allows these bad actors to do new bad things, faster. Below, we explore some of the opportunities AM presents for new threats and the paths by which these threats can emerge.
Path I: Stasis
Businesses have already shown several ways to harness AM with minimal changes to their product or supply chain.20 Even at this most accessible stage of AM usage, would-be threat agents can leverage the technology to enable economies of scope. Machines are inherently dual or even multiuse, meaning that an adversary could produce legitimate goods during business hours, and quickly convert to weapons or other contraband afterward. This has long been possible with traditional manufacturing, but the advent of AM dramatically lowers barriers to engaging in illegal behaviors by decreasing the time and cost associated with the changeover, complicating the detection and interdiction of such activity. Malicious actors can also leverage rapid prototyping to more easily create and test new ideas while wasting fewer resources.
A deeper look at potential Path I threats: Enabling CBRNE
It can be difficult to imagine a scenario where a nuclear device is 3D printed from scratch—or a chemical, biological, radiological, or explosive weapon, for that matter. However, AM can still produce small parts on demand. Indeed, a February 2017 report from the Stockholm International Peace Research Institute (SIPRI) concluded that, at the current state of technological development, AM cannot be used in all parts of weapon development, but can be used to print miscellaneous noncritical components.21 These components could be used in a number of applications, especially around the handling of weapons-grade nuclear material, including uranium enrichment, or tools for synthesizing chemical or biological compounds.22 In this way, AM can ease the development of a covert or overt CBRNE weapons program by accelerating development, easing the process of handling and transporting dangerous materials, or enabling a low signature presence. Adversaries of all types can use AM to locally produce the mechanical components of laboratory equipment and specialized apparatus they need for developing or weaponizing materials. In this case, AM shortens breakout time and reduces traditional indicators and warnings.
Path II: Supply chain evolution
The impact of AM on the supply chain can have even larger implications for national security. Using AM, militaries can potentially disintermediate their supply chains and produce warfighting equipment locally, at the point of use.23 This means that large, observable build-ups of materiel prior to invasions or other military action can be reduced. For the defense and government agencies responsible for monitoring such build-ups, AM potentially makes even large campaigns less predictable and therefore less prone to detection.
In much the same way that the US military seeks to deploy AM for maintenance and sustainment, smaller adversaries could achieve the same goals, reducing supply chain vulnerability and improving sustainment capabilities in a prolonged conflict. Further, large-scale adoption of AM could drastically reduce or eliminate reliance on identifiably military imports. As long as commercial imports—such as 3D printers—are allowed, the inherent dual-use nature of AM could still allow for production of military goods, effectively nullifying the effect of traditional weapons sanctions and export controls.
Use of AM along path II can also enable criminal organizations to sidestep typical smuggling approaches. This can have profound implications on detection of criminal activity, as US agencies can often track the movement of goods, such as illicit arms, to understand when and where threats may emerge.24 If organizations can print parts, tools, or weapons on-site, they can amass needed supplies while making it far more difficult for agencies to track them and deduce their intent.
A deeper look at potential path II threats: Homemade firearms
With today’s technology, it is possible to manufacture a rudimentary firearm from plans on the Internet using a 3D printer, and supply it with standard ammunition.25 Under current US federal law, however, no prohibition exists regarding the production of firearms for personal use. As of the writing of this paper, only a handful of states have sought to enact legislation to outlaw the use of AM to print guns.26 Even in those cases that do reach a court, prosecutors may find themselves stymied by the law, which has not yet caught up to the technology, or the application of seemingly unrelated regulations as a defense, as in the story described at the outset of this article.
The total number of functioning guns and ammunition printed is impossible to calculate, but the ability to produce these types of weapons will likely only improve as printing technologies and material variety and quality continue to advance; in one case, a company claimed to have additively manufactured a gun that could shoot 200 rounds with minimal wear and tear.27 As technology continues to improve and proliferate, it may become possible for more advanced, reliable firearms to be produced with AM technology. Further, AM can enable the production of firearms using materials that may be less easy to detect in a security screening.
While homemade firearms may pose less of a challenge in the United States, where it is relatively easy to access a factory-made gun either through legal means or the grey/black market, this is not necessarily true in other parts of the world where access to firearms is more constrained.
At the same time, even as regulations exist to control the sale and distribution of traditionally manufactured firearms, the ability to seek the technical “know-how” to print, procure the necessary AM materials, and purchase off-the-shelf printers to complete the printing remains relatively uncontrolled. This highlights the challenge facing law enforcement and national security experts: AM machines are commercially available, making it possible for anyone to access the technology. Questions about regulating the sale and use of AM printers and digital design files have arisen, but this remains a challenge.28
Path III: Product evolution
AM can also allow for the creation of entirely new products that can outperform their traditional counterparts. For example, scientists at Lawrence Livermore National Laboratory have discovered that AM is actually more suitable than traditional manufacturing for the creation of certain types of parts.29 For example, plastic foams play a key role in the construction of thermonuclear weapons.30 Foams created by traditional processes leave random spaces throughout a material. AM, on the other hand, is able to create regular spacing, resulting in a material that is more resilient and more durable than traditional foams and can even be tuned to specific applications.
AM’s ability to effectively lower barriers to product innovation can have impacts on national security. It can make weapons and tools that previously were too difficult to procure or manufacture by other means more widely available to a variety of actors. For example, a terrorist organization might seek to create untraceable 3D-printed firearms or plastic bomb components specifically designed to evade airport security. These all could have been made previously, but would have been prohibitively difficult to design and produce using traditional manufacturing techniques. However, the design flexibility at low cost enabled by AM makes a variety of new designs possible for weapons, potentially invalidating proven security screening and countermeasures.
For larger, more established actors, AM can also serve as both a catalyst and accelerator. Far from being the realm of science fiction, AM is already used within advanced weapons programs. For example, the US National Nuclear Safety Administration has printed more than 25,000 nonnuclear parts, creating products that weigh less and perform better than traditional counterparts.31 While it is extremely unlikely that an adversary will directly 3D print a weapon of mass destruction, AM may be used in concert with other technologies, such as computer numerical control (CNC) machines, to produce small components or customized parts to be used within a larger weapon such as neutron reflectors or critical valves in production processes.32 Often these intricate parts require long, iterative periods of design, testing, and calibration to ensure that they work correctly within the finished device. This extensive testing can be detected and traced, providing intelligence agencies and decision makers with a relatively clear picture of the status of any illicit weapons program.33 However, because an AM part can exist digitally long before it is ever made physical, initial digital testing can be potentially accomplished more covertly, making certain types of detection more difficult.
AM’s ability to effectively lower barriers to product innovation can have impacts on national security.
A deeper look at potential path III threats: The disguised threat
Terror groups have shown continued interest in and have been successful in smuggling explosive devices into controlled areas by disguising them as everyday objects.34 This is not a new phenomenon, but the relative simplicity and ease with which threats can be disguised using AM may warrant special attention—and can expand beyond smuggling disguised explosives to other, more innovative approaches. For example, a group of criminals used a 3D printer to produce replica card slots (or “skimmers”) for ATMs, which could be fitted over ATM machines. Using these disguised devices, the criminals were able to copy bank customers’ information and use it to steal several hundred thousand dollars.35
Path IV: Business model evolution
Business model evolution combines paths II and III, changing both product and supply chain, to create entirely new ways of doing business, whether your business is consumer goods or crime and mayhem. While the exact specifics of these new types of threat may not yet be known, the most significant “benefits” to malicious actors come when AM is combined with other, existing technologies to allow them to create entirely new criminal or military strategies. For example, in recent years, terrorist organizations have shown considerable prowess in using the Internet and social media to recruit operatives in target countries, making what was once a laborious and slow process perhaps faster and lowering geographical barriers.36 An extension of this is to leverage the same platforms for the distribution of both attack commands and weapon designs to be used in entirely new forms of attack. Terrorist organizations can transmit instructions for an attack together with the files for creating weapons over the Internet. In this way, potential terrorists could participate independently in a simultaneous attack without any central direct planning or guidance.37 The result could be not just a new weapon, but an entirely new form of attack: a distributed, simultaneous strike across the globe. While each attacker may cause only limited destruction, the combined effect could be much larger. Without any centralized planning to detect, such a novel form of attack could be very difficult to prevent.
A deeper look at potential path IV threats: The undetermined future
Just as it was nearly impossible to predict the success of ride-sharing or similar new business models, so too is it difficult to predict exactly what new strategies threat actors may adopt in the future. The ability of a threat actor with the intent to weaponize capabilities is limited only by their imagination. However, by using tools such as the four paths of AM, we can understand how those capabilities are likely to evolve and therefore stand ready for whatever new threat may emerge.
Protecting the population: A journey, not a destination
The variety of potential threats—and the ways in which AM can be used—means that no single approach can protect against them all. Rather, the response to threatening uses of AM can involve everything from export regulations to surveillance of criminals to modifications to intelligence assessments, to considering ways to regulate digital files or track sales of machines. The effectiveness of these efforts may ultimately lie in their coordination. For example, law enforcement agents seeking to prevent the use of printed firearms may need help from intelligence agencies tracking the flow of design files on the dark web. Similarly, intelligence operatives seeking to understand the status of prohibited nuclear weapons programs may need support from diplomatic or economic experts on technology transfer, or even the AM industry itself. Regardless, the wide range of efforts required to counter the various threatening uses of AM means that numerous governmental and international organizations should be involved in that coordination.
With this in mind, the following steps should be considered to protect against the negative uses of AM:
- Creating an international community of action: Establishing mechanisms for government, industry, and international organizations to cooperate rapidly across traditional boundaries
- Working toward a common industry and international policy: Beginning to work toward a single, clearly articulated policy that incorporates industry and international actors and governments
The variety of potential threats—and the ways in which AM can be used—means that no single approach can protect against them all.
1. Creating an international community of action
Some progress has already been made in assembling a community of stakeholders interested in the possible threatening uses of AM. Several working groups within government are addressing the challenges posed by an adversary’s use of additive manufacturing, including the US Department of Commerce Emerging Technology and Research Advisory Committee, which regularly holds meetings with industry and academia on emerging technologies. These meetings focus on examining the possibilities of new technologies and exploring what the appropriate controls for those technologies may be.38
However, while such organizations represent progress, there may be opportunity for even greater coordination across the different functions of government. The diversity of threats and actors means that full representation from governments—the United States and its allies, industry, and international organizations—should be used to craft a comprehensive strategy. A single overlooked threat can create the exact national security incident that authorities are seeking to avoid.
2. Working toward a common industry and international policy
The creation of a community of action around AM is not the end, but rather the beginning of the cooperation necessary to adapt and react to such a rapidly changing technology. To guide this coordination and make it more meaningful than just a periodic conference, a common policy applicable to both industry and international actors is needed. While creating a common policy for AM acceptable to such a diverse community of stakeholders can seem daunting, lessons can be drawn from similar threats. In this regard, the situation regarding threats from AM is not dissimilar to that of improvised explosive devices (IEDs). In the effort to counter IEDs, the US government created an agile, coordinated community with roles and responsibilities articulated in Presidential Policy Directive 17 (PPD-17).39 As with PPD-17, the first steps to creating the agility and coordination necessary to mitigate the threats from AM may be the creation of a coordinated national strategy. Such a strategy can assemble the appropriate stakeholders, help to define the issues, and begin to scope collaboration. While the specifics of that coordinated policy would necessarily evolve with circumstances, the pace of technological change will likely require some adjustments from all stakeholders.
More rapid analysis
The potential for valid, commercial AM machinery to be put to use for undesirable purposes can increase the speed with which bad actors can produce weapons. This speed means that typical analytical tools and decision-making forums/methods should be adjusted. Faster intelligence analysis is needed to match the consolidated development timelines enabled by AM. Adjusting the time thresholds and values in analytical models can help to accommodate speed, make sense of new types of data coming in for analysis, and produce accurate assessments of the activity of terrorists and nation–states alike. National security decision-making forums can anticipate the need to address the negative use of AM. Novel analytical approaches evaluating the intent, opportunity, and impact of AM can help provide a more robust rapid analysis of this new threat. For example, one government agency is now leveraging “advanced computing and analytical solutions . . . to effectively combine and analyze multiple, large disparate data sets to increase enforcement effectiveness” against cross-border smuggling including counter-proliferation casework.40 Similar approaches to AM could be widely useful across stakeholders.
New indicators of activity
In order to tease valid conclusions from unclear data, the Intelligence Community has long used a list of key metrics—Indications and Warnings (I&W)—to drive intelligence collection and help predict a particular threat.41 As AM disintermediates the supply chain, it can also change or challenge traditional intelligence I&W. Adversaries could potentially increase readiness, deploy troops, or create illegal weapons without advance warning.
The ability of AM to redefine the production processes from which many traditional intelligence indicators are derived can force governments to re-examine how they observe a threat, develop collection plans, and analyze information to support decision making. Given the rapid flow of digital information and AM technology across the globe, crafting these lists of critical indicators likely cannot be a solo activity. Rather, further international coordination will likely be needed to understand the full impact of AM on the threat processes and to appropriately update indicators as a result.
The ability of AM to redefine the production processes from which many traditional intelligence indicators are derived can force governments to re-examine how they observe a threat, develop collection plans, and analyze information to support decision making.
Monitoring the digital to prevent the physical
In the past, if governments wanted to ban or control a new product, they could restrict the availability of that product either at its point of manufacture or at its point of sale. However, with AM, those two points can be variable: A product can be designed anywhere, sold digitally over the Internet, and manufactured anywhere where there is a suitable printer. This can present significant challenges for regulators and governments. Whatever method or material they use, all AM processes use digital information to fabricate physical objects.42 Thus, if a government is to restrict the creation of certain types of AM products, such as automatic firearms or explosive triggers, they should do so across the whole supply chain—both digital and physical. To do so, there are two key avenues for threat intervention: along the physical supply chains, including the raw materials that are used to print, and the digital supply chains, including the design files or, as described in exports controls, technical data or technical information.
Steps are already being taken to control the physical supply chain, but none offer a full solution. The Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies, for example, has unanimously adopted controls on certain AM equipment and software.43 However, the inherent dual use of what AM can produce means that controlling the products of AM through regulation of the physical raw materials can be difficult. After all, the same plastic resin or metal powder can become a child’s toy or an unregistered firearm. To help differentiate lawful uses from illegal or counterfeit products, taggants can be added to AM source material. But while this method can help to identify the source of a counterfeit or illicit product once it is made, it cannot preemptively stop its production.44
Therefore, these physical controls should be coupled with an expanded awareness of the digital side of the AM life cycle: examining how and where digital files are transferred, especially those files suspected for use as a weapon. Governments will likely need to identify, collect, and provide reporting on potential AM threats differently, in many cases while AM data remain in the form of digital files in cyberspace. By analyzing how and where traffic moves on the Internet and deep web, officials are better able to detect the unusual patterns of activity associated with the movement of illicit information to bad actors.
One cannot stop the technological advances—and opportunities—AM offers, but threats that arise must be thwarted as they emerge. This requires an intelligent understanding of what is possible, constant vigilance of the threat landscape, and coordinated action by affected state, local, federal, and international players. AM has the potential to bring boundless benefits to society, but to enjoy those benefits requires continuous vigilance.