Multidomain Information Operations
Multidomain Information Operations
platoon. An IO officer and a cyberspace planner also separate IO section including a civil affairs (CA) captain
augmented the brigade staff. and a psychological operations (PSYOP) sergeant first
The primary external support to the brigade was the class, who respectively planned operations for the CA
expeditionary cyber team (ECT), which contained both and PSYOP elements notionally attached to the brigade.
offensive cyberspace operations (OCO) and defensive The brigade public affairs officer was also part of the IO
cyberspace operations personnel as well as an IO plan- section for all practical purposes. Additionally, the IO
ner. The ECT had the capability to conduct remote section assumed responsibility for deception and opera-
operations and close target reconnaissance. The division tional security (OPSEC) planning.
retained operational control of the ECT during the Dividing IRCs into two separate sections made
experiment. However, the brigade was able to request cy- integration more difficult. The brigade treated the
berspace effects from the ECT through the division. The IO section and CEMA section as separate but equal
ECT conducted multiple missions for both the division entities. This meant CEMA and IO equities only
and the brigade throughout Cyber Blitz. formally converged at the brigade operations officer
The experiment almost entirely simulated maneuver (S-3), creating a situation ripe for fragmented and
forces while primarily conducting CEMA activities live disjointed planning. Therefore, the IO officer worked
with supplemental simulations. The ECT conducted cy- through the S-3 to develop overarching IO concepts
berspace operations live on networks simulating the global of support to nest CEMA efforts with other IRCs.
internet and the brigade Secret Internet Protocol Router Fortunately for the S-3, the nature of Cyber Blitz,
Network. CERDEC emplaced a range of emitters simulat- with its dictated scheme of maneuver, allowed him
ing enemy, friendly, and neutral emissions on various Fort the time to focus on incorporating CEMA and other
Dix ranges. This allowed the EW teams to detect, charac- IRCs into the plan. The IO officer was also able to
terize, geolocate, and jam a variety of signals. exert influence over the CEMA section due to his
The brigade’s mission was to secure the area of op- or her rank and experience despite having no formal
erations (AO) and defeat enemy conventional forces to authority over the section.
protect an adjacent unit AO.6 The brigade’s scheme of
maneuver began with an air assault to secure an airfield Information Operations at Cyber Blitz
and was followed by the buildup of combat power via The brigade successfully integrated and synchro-
air landing. After this, the brigade planned to secure key nized IRCs to support its scheme of maneuver through-
infrastructure in the sector and establish a defense. out Cyber Blitz. Beyond
The experiment planners dictated the scheme of individually supporting Maj. John P. Rodriguez,
maneuver, and the staff did not have to conduct detailed the scheme of maneu- U.S. Army, is an in-
planning for the movements of the maneuver battalions. ver, the brigade’s IRCs formation operations
This simplified the task facing the brigade staff and freed often worked together officer in the Maryland
them to focus on integrating CEMA into their maneu- in a mutually supportive Army National Guard
ver plan. The brigade also planned to defend against manner achieving synergy. assigned to Plans and
enemy multi-domain operations. The brigade staff con- During an early phase of Policy Division, Intelligence
ducted an abbreviated military decision-making process the operation, the IRCs Directorate, the Joint Staff.
during the first week of Cyber Blitz. The deputy brigade focused on supporting an He holds a BA from Mount
commander directed the staff to include CEMA and IO air assault. Later, when the Saint Mary’s University and
to the maximum extent possible. enemy launched a pow- an MA from Georgetown
The brigade possessed multiple IRCs, but the or- erful attack with both con- University. He served as
ganization of the staff split the IRCs between various ventional and insurgent the director of information
sections (see figure, page 36). The brigade EW officer, a forces, a preplanned multi- operations for Combined
captain, served as the brigade’s CEMA chief and an EW IRC response delayed the Joint Task Force–Horn of
warrant officer and master sergeant supported her. The attack and added friction Africa from 2017 to 2018
cyberspace planner attached to the brigade nominally into enemy mission com- and participated in Cyber
worked for the CEMA chief. The attached IO major led a mand networks. Blitz 2018.
Personal staff
Military information
Cyber Electronic warfare Civil affairs support operations
O3 W2/E8 O3 E7
(Figure by author)
Initially, IO focused on supporting the brigade’s PSYOP forces to influence broader target audiences and
decisive operation, an air assault to seize the airfield at reinforce MISO messages delivered with other means.
Objective Desoto, located in the eastern portion of the The feint did not give the enemy a windfall; instead, it
AO. The deputy brigade commander sought to prevent presented the enemy with many different pieces that
the enemy from massing combat power against the air pointed to the decoy landing zone. The PSYOP planner
assault since it would take multiple lifts to get the whole also attempted to use EW platforms to deliver MISO
assault force on the objective. The IO officer used OPSEC messages, which was initially unsuccessful. In a later
as the construct to synchronize the IRCs. The overarch- phase of the experiment, EW and PSYOP overcame
ing concept was to protect the timing and location of the these hurdles and did disseminate MISO messages with
air assault. Ideally, this would cause the enemy to misallo- EW capabilities. EW also provided effects in the EMS
cate forces, but at a minimum, the goal was to disrupt en- to produce a signature consistent with an air assault and
emy decision-making to prevent the enemy from massing to degrade enemy collection assets and communication
combat power against the air assault. links that could discover or report on the feint.
The IO concept had two overlapping phases. The first The second phase was direct support of the actual
phase was a feint to make the adversary believe the main air assault. Both EW and OCO attempted to disrupt
friendly attack was occurring in the western portion of enemy command and control on the objective and
the AO. This required multiple mutually reinforcing el- along the air corridor. The effects were overlapping to
ements. An airfield was located just outside the brigade’s provide redundancy. This proved fortunate because
western boundary, which provided a realistic objective some capabilities were unable to achieve the desired
for the feint. There were also suitable landing zones in effects. However, staff swiftly communicated the
the vicinity of the false objective. EW, PSYOP, and OCO setback, and other assets achieved the desired effects.
forces supported the feint. In addition to disrupting en- The results were seamless for the assault force.
emy communications, OCO delivered military informa- The enemy began a multi-domain attack during a
tion support operations (MISO) messages. This allowed later phase of the operation that stressed the brigade’s
defenses. The enemy initiated insurgent attacks and enemy with a more complex challenge and prevented
popular uprisings as an enemy motorized rifle brigade the piecemeal employment of IRCs. The feint presented
began advancing. Enemy unmanned aerial systems observables in multiple ways, including the EMS and
and electronic attack platforms supported the advance social media, which targeted various conduits to enemy
and degraded friendly mission command. The enemy decision-makers. The feint was more likely to convince
also attempted to disrupt critical infrastructure with the decision-makers because it used diverse observables.
OCO. This presented the brigade with multiple di- The brigade’s counterattack created more friction
lemmas. The situation became dire when enemy OCO for the enemy because it combined OCO and PSYOP.
penetrated the brigade network as enemy forces began A purely OCO attack on enemy command networks
to pressure the brigade’s screen line. would have had limited effects because it would have
The brigade executed a preplanned IO counterattack been a singular execution. Instead, the brigade’s actions
to delay the enemy advance. This allowed the signal staff continued for the remainder of the fight as OCO con-
to reestablish the network and the infantry battalions to tinued delivering MISO messages. Additional MISO
finish preparing their defensive positions. The counter- executions, not exclusively delivered by OCO, extended
attack began with OCO against enemy mission com- the duration of the effects and exploited every oppor-
mand networks. OCO corrupted the integrity of the en- tunity provided by enemy missteps. Furthermore, this
emy systems and delivered MISO content. This induced counterattack was critical because it occurred at a deci-
friction into enemy decision-making, and the confusion sive point in the battle. The brigade identified the enemy
caused the enemy to make mistakes. PSYOP elements mission command network as a high payoff target during
exploited the enemy blunders with additional MISO mission analysis and the ECT gained access early in the
messages to degrade cohesion and increase rifts be- battle. The deputy brigade commander held this capabil-
tween enemy conventional and insurgent forces. OCO ity in reserve so he could use it for maximum effect. His
continued attacking the mission command network and patience carried risks because the ECT could have lost
delivering MISO messages for the rest of battle. access in the interim, but in this case, it paid off.
misuse IO planners and saddle them with additional Maj. Alex J. Duffy, 3rd Brigade Combat Team, 10th Mountain Division
duties unrelated to IO in garrison. Ideally, the reserv- operations officer (right), and Capt. Jacob M. Allen, assistant operations
officer, use a map overlaid with operational graphics to back-up digi-
ists would also support the BCTs at combat readiness tal mission command systems and provide redundancy 17 September
center rotations in addition to deployments so units 2018 during Cyber Blitz 2018 at Joint Base McGuire-Dix-Lakehurst,
could train as they would fight. However, it could New Jersey. This alternate method to battle track temporarily became
place a strain on reservists to support month-long the primary method when an enemy cyberattack knocked the digital
systems off-line. (Photo courtesy of U.S. Army Communications-Elec-
training center rotations habitually while already tronics Research, Development and Engineering Center [CERDEC])
attending many schools and supporting numerous
exercises in addition to regular deployments. Relying
on reservists to fill this gap could further stress the
force and be impractical. and staff organization, these capabilities will not be used
to their full potential. It also showed how an IO officer
Conclusion on the brigade staff can drastically improve the brigade’s
The Army must embrace IO’s integration function to effectiveness. The Army cannot accept piecemeal em-
institutionalize the Patriot Brigade’s success at Cyber Blitz ployment of IRCs and a divide between CEMA and IO.
2018. Cyber Blitz demonstrated that, while new equip- The U.S. military “has no preordained right to victory,”
ment and organizations are necessary to enable BCT and we must relentlessly improve our capabilities to win
multi-domain operations, without the proper doctrine the multi-domain battles of tomorrow.11
FUTURE WARFARE
Distribution Service, 3 October 2018, accessed 21
March 2019, https://www.dvidshub.net/news/295282/
cyber-blitz-2018-gives-arcyber-opportuni-
WRITING PROGRAM
ty-test-new-concepts-capabilities-and-techniques.
6. Cyber Blitz Team, “Cyber Blitz 2018 (CB18)
Distinguished Visitor Day.”
7. Joint Publication 3-13, Information Operations
Call for Speculative Essays and (Washington, DC: U.S. Government Printing Office, 27
November 2012).
Short Works of Fiction 8. TP 525-3-1, The U.S. Army in Multi-Domain
Operations 2028, GL-5. Information environment
operations is defined as “integrated employment of
information related capabilities (IRC) in concert with
Military Review calls for short works of fiction for inclusion in the other lines of operation to influence, deceive, disrupt,
Army University Press Future Warfare Writing Program (FWWP) for corrupt, or usurp the decision-making of enemies and
adversaries while protecting our own; to influence
2019. The purpose of this program is to solicit serious contemplation enemy formations and populations to reduce their
of possible future scenarios through the medium of fiction in order will to fight; and influence friendly and neutral popu-
lations to enable friendly operations.”
to anticipate future security requirements. As a result, well-written 9. Cyber Blitz Team, “Cyber Blitz 2018 (CB18)
works of fiction in short-story format with new and fresh insights Distinguished Visitor Day.”
10. Field Manual 3-13, Inform and Influence Ac-
into the character of possible future martial conflicts and domes- tivities (Washington, DC: U.S. Government Printing
tic unrest are of special interest. Detailed guidance related to the Office, 2013 [obsolete]). Revised to Field Manual
3-13, Information Operations (Washington, DC: U.S.
character of such fiction together with submission guidelines GPO, 2016).
can be found at https://www.armyupress.army.mil/Special-Topics/ 11. OSD, “Summary of the 2018 National Defense
Strategy.”
Future-Warfare-Writing-Program/Future-Warfare-Writing-Pro-
gram-Submission-Guidelines/. To read previously published FWWP
submissions, visit https://www.armyupress.army.mil/Special-Topics/
Future-Warfare-Writing-Program/.
Army University
Press
July-August 2019 MILITARY REVIEW