O140 Multi Domain Operations

¡Supera tus tareas y exámenes ahora con Quizwiz!

MDO

Army forces, as an element of the Joint Force, conduct Multi-Domain Operations to prevail in competition; when necessary, Army forces penetrate and dis-integrate enemy anti-access and area denial systems and exploit the resultant freedom of maneuver to achieve strategic objectives (win) and force a return to competition on favorable terms •The Army's approach proposes a series of solutions to solve the problem of layered standoff. The central idea in solving this problem is the rapid and continuous integration of all domains of warfare to deter and prevail as the U.S. competes short of armed conflict. •If deterrence fails, Army formations, operating as part of the Joint Force, penetrate and dis-integrate enemy anti-access and area denial systems; exploit the resulting freedom of maneuver to defeat enemy systems, formations and objectives and to achieve our own strategic objectives; and consolidate gains to force a return to competition on terms more favorable to the U.S., our allies and partners.

Tenets of MDO

Calibrated Force Posture -forward presence -expeditionary -national-level -authorities MD formations -conduct independent maneuver -employ cross domain fires -maximize human potential Convergence -cross domain synergy -layered options

Space Disadvantages

Congested, Contested, and Competitive Satellite Communications Surveillance and Reconnaissance Positioning, Navigation and Timing (PNT)

DCO

Defense cyberspace operations

D3SOE

Denied, degraded, disruptive space operational environment

PNT

Each GPS receiver requires line-of-sight to a minimum of 4 satellites GPS signal is an easy target Most likely threat to GPS are ground-based jammers targeting receivers Adversaries have developed their own Global Navigation Satellite Systems (GNSS)

GPS Mitigation TTPs

Encrypt GPS receivers (e.g., DAGR) Block jamming signal maintain analog navigation skills develop PACE plan

Joint Phases of Operation

Group 1: Phase 0 (Shape) Phase 1 (Deter) Group 2: Phase 2 (Seize Initiative) Group 3: Phase 3 (Dominate) Group 4: Phase 4 (Stabilize) Phase 5 (Enable Civil Authority) compete/recompete penetrate disintegrate/exploit

ISR

Intelligence, surveillance, and reconnaissance.

Range of Operations

LSCO crisis response/limited operations military engagement

CEMA in BCT

Maintaining effective communications are one of the keys to success for a Brigade Combat Team (BCT) Satellite Communication (SATCOM) is vulnerable to enemy jamming and cyber attacks Positioning, Navigation and Timing (PNT) signals are easy for adversaries to deny

Space Advantages

Precise Positioning and Accuracy Information and Intelligence Gathering Global Command and Control Allows Unfettered Global Access

Brigades

converge organice ISR, maneuver maneuver, and fires capabilities with limited amounts of available aviation, maneuver support, EW, joint fires, and offensive space capabilities.

CEMA

cyberspace electromagnetic activités Advise the commander on the capabilities, limitations, and effects of cyberspace and EW specific to the unit mission, cyberspace threat, commander's intent and concept of operations, legal authority, and rules of engagement. Develop and provide OCO courses of action to support the scheme of maneuver, facilitate OCO missions as directed, and coordinate and integrate DCO as required. Ensure integration and synchronization of cyberspace and EW operations into the schemes of maneuver and fires.

Electronic Warfare EW

electronic attack electronic protection electronic warfare support

IO

information operations is the integrated employment, during military operations, of information-related capabilities in concert with other lines of operation to influence, disrupt, corrupt, or usurp the decision-making of adversaries and potential adversaries while protecting our own influenceing/disrupting/degrading Military Deception (MILDEC) Military Information Support Operations (MISO) Soldier and Leader Engagement (SLE) Civil Affairs OPS Combat Camera Operations Security (OPSEC) Public Affairs

Cyberspace

is a global domain within the information environment consisting of the interdependent networks of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.

SIGINT

is intelligence derived from communications, electronic, and foreign instrumentation signals -Military Intelligence Company AN/MLQ-40 Prophet

MILDEC

military deception actions executed to deliberately mislead adversary military, paramilitary, or violent extremist organization decision makers, thereby causing the adversary to take specific actions (or inactions) that will contribute to the accomplishment of the friendly mission amplifying signatures suppressing signatures overloading enemy sensors repackaging known organizations conditioning the enemy

OCO

offensive cyberspace operations

SATCOM

satellite communications


Conjuntos de estudio relacionados

PHYS 1301 - Ch. 5 (Learnsmart & Connect)

View Set

BIOL 102 - CHP. 1 Review (Human Biology)

View Set

Name of some animals and their young ones

View Set