O140 Multi Domain Operations
MDO
Army forces, as an element of the Joint Force, conduct Multi-Domain Operations to prevail in competition; when necessary, Army forces penetrate and dis-integrate enemy anti-access and area denial systems and exploit the resultant freedom of maneuver to achieve strategic objectives (win) and force a return to competition on favorable terms •The Army's approach proposes a series of solutions to solve the problem of layered standoff. The central idea in solving this problem is the rapid and continuous integration of all domains of warfare to deter and prevail as the U.S. competes short of armed conflict. •If deterrence fails, Army formations, operating as part of the Joint Force, penetrate and dis-integrate enemy anti-access and area denial systems; exploit the resulting freedom of maneuver to defeat enemy systems, formations and objectives and to achieve our own strategic objectives; and consolidate gains to force a return to competition on terms more favorable to the U.S., our allies and partners.
Tenets of MDO
Calibrated Force Posture -forward presence -expeditionary -national-level -authorities MD formations -conduct independent maneuver -employ cross domain fires -maximize human potential Convergence -cross domain synergy -layered options
Space Disadvantages
Congested, Contested, and Competitive Satellite Communications Surveillance and Reconnaissance Positioning, Navigation and Timing (PNT)
DCO
Defense cyberspace operations
D3SOE
Denied, degraded, disruptive space operational environment
PNT
Each GPS receiver requires line-of-sight to a minimum of 4 satellites GPS signal is an easy target Most likely threat to GPS are ground-based jammers targeting receivers Adversaries have developed their own Global Navigation Satellite Systems (GNSS)
GPS Mitigation TTPs
Encrypt GPS receivers (e.g., DAGR) Block jamming signal maintain analog navigation skills develop PACE plan
Joint Phases of Operation
Group 1: Phase 0 (Shape) Phase 1 (Deter) Group 2: Phase 2 (Seize Initiative) Group 3: Phase 3 (Dominate) Group 4: Phase 4 (Stabilize) Phase 5 (Enable Civil Authority) compete/recompete penetrate disintegrate/exploit
ISR
Intelligence, surveillance, and reconnaissance.
Range of Operations
LSCO crisis response/limited operations military engagement
CEMA in BCT
Maintaining effective communications are one of the keys to success for a Brigade Combat Team (BCT) Satellite Communication (SATCOM) is vulnerable to enemy jamming and cyber attacks Positioning, Navigation and Timing (PNT) signals are easy for adversaries to deny
Space Advantages
Precise Positioning and Accuracy Information and Intelligence Gathering Global Command and Control Allows Unfettered Global Access
Brigades
converge organice ISR, maneuver maneuver, and fires capabilities with limited amounts of available aviation, maneuver support, EW, joint fires, and offensive space capabilities.
CEMA
cyberspace electromagnetic activités Advise the commander on the capabilities, limitations, and effects of cyberspace and EW specific to the unit mission, cyberspace threat, commander's intent and concept of operations, legal authority, and rules of engagement. Develop and provide OCO courses of action to support the scheme of maneuver, facilitate OCO missions as directed, and coordinate and integrate DCO as required. Ensure integration and synchronization of cyberspace and EW operations into the schemes of maneuver and fires.
Electronic Warfare EW
electronic attack electronic protection electronic warfare support
IO
information operations is the integrated employment, during military operations, of information-related capabilities in concert with other lines of operation to influence, disrupt, corrupt, or usurp the decision-making of adversaries and potential adversaries while protecting our own influenceing/disrupting/degrading Military Deception (MILDEC) Military Information Support Operations (MISO) Soldier and Leader Engagement (SLE) Civil Affairs OPS Combat Camera Operations Security (OPSEC) Public Affairs
Cyberspace
is a global domain within the information environment consisting of the interdependent networks of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.
SIGINT
is intelligence derived from communications, electronic, and foreign instrumentation signals -Military Intelligence Company AN/MLQ-40 Prophet
MILDEC
military deception actions executed to deliberately mislead adversary military, paramilitary, or violent extremist organization decision makers, thereby causing the adversary to take specific actions (or inactions) that will contribute to the accomplishment of the friendly mission amplifying signatures suppressing signatures overloading enemy sensors repackaging known organizations conditioning the enemy
OCO
offensive cyberspace operations
SATCOM
satellite communications