Small Wars Journal

The Development of Operational Art and CEMA in Multi-Domain Battle: A Historical Analysis the Guadalcanal Campaign 1942-1943

Mon, 04/22/2019 - 12:07am
The Development of Operational Art and CEMA in Multi-Domain Battle: A Historical Analysis the Guadalcanal Campaign 1942-1943
 
Ronald W. Sprang
 
Introduction

“When the Nation calls upon the Army to fight and win its next war, the operational environment…will be defined by an enemy who will challenge our ability to maintain freedom of maneuver and superiority across the air, cyberspace, land maritime, and space domains and the electromagnetic spectrum. …To counter our state-of-the-art communications network, they may hack in, disrupt, and deny our assurances through a well-organized group of experts hitting targets purposefully selected with intelligence and acting in accord with a larger maneuver plan—all executed from outside the area of operations.”

—General David G. Perkins, Military Review

Multi-Domain Battle is the Army’s new concept for future warfare with lineage from the AirLand Battle concept of the 1980’s. The Airland Battle concept began an open dialogue across the Army and is attributed as the genesis of FM 100-5, Operations.[i] The current operational environment and the emerging challenges of near peers and non-state actors have combined to create a challenge for the United States to gain and maintain the advantage across all three levels of war and across all domains. China, Russia, North Korea, and Iran have developed and implemented varying levels of cyber capabilities in support of their strategic national objectives.[ii]

The Russians and Chinese have focused efforts over the last decade to increase their capability to offset US military strengths. The Russian ‘New Generation Warfare’ has evolved to the ‘New-Type of War’ concept. General-Lieutenant Andrey V. Kartapolov outlined the concept in 2015 as a means to gain an asymmetric advantage over an enemy’s technological advantage.[iii] Fundamental to gaining this advantage is the employment of cyberwarfare and ‘software effects.’[iv]

The Army’s multi-domain battle concept outlines emerging requirements for the military to achieve effects in the contemporary operational environment against emerging near peer threats. Cyberwarfare capabilities are a critical component to creating and exploiting temporary windows of advantage at the operational level.[v] Operational planners must employ operational art to arrange cyber effects in time and space to achieve strategic objectives against near peer threats, across all domains. Cyber capabilities are critical to warfare to allow operational level commanders the opportunity to shape the deep fight and control tempo of multi-domain, joint operations.

The significance of this research is that it contributes to an understanding of cyberwarfare as applied through the lens of operational art and its contribution to multi-domain battle. An effective operational approach will provide the operational commander the opportunity to create temporary windows of advantage by leveraging the cyber domain across other domains. The study provides a conceptual framework to assist in answering two key questions. First, how do military forces offensively and defensively employ cyber capabilities? Second, how can the US Army develop an operational approach to gain an advantage in the cyber domain and synergy across other domains to create windows of advantage?

These questions require a common understanding of several terms: cyberwarfare, operational art, tempo, cross-domain synergy, and multi-domain operations. Cyberwarfare is an “act of war that includes a wide range of activities using information systems as weapons against an opposing force.”[vi]US Army Doctrinal Reference Publication (ADRP) 3-0 Operations defines operational art as the, “pursuit of strategic objectives, in whole or in part, through the arrangement of tactical actions in time, space, and purpose.”[vii] Operational artists build campaigns through intermediate objectives across lines of operations over time. Army planners achieve strategic objectives through creating an operational approach that acts as the bridge between tactical actions and success, to strategic aims. Tempo is the, “relative speed and rhythm of military operations over time with respect to the enemy.”[viii] Additional attributes of tempo considered in this study will be the aspects of frequency, duration, sequencing, and opportunity.[ix] The Multi-domain battle white paper refers to the recognized five domains of air, land, maritime, space, and cyberspace; in addition it refers to the electromagnetic spectrum, information environment, and cognitive dimension of warfare as contested areas.[x] Cross-domain synergy is “the complementary vice merely additive employment of capabilities in different domains such that each enhances the effectiveness and compensates for the vulnerabilities of others.”[xi]  The joint force routinely employs air, land, maritime, space, and/or cyberspace capabilities to impact operational tempo and create multiple dilemmas for the enemy commander, thereby paralyzing the enemy decision cycle.[xii] Synergy is achieved with simultaneous action across multiple or all domains.[xiii]

This research relies on three hypotheses. First, when an operational approach arranges cyber capabilities across all domains it will create time and space allowing the operational level commander to shape the deep fight and control the tempo of joint operations. Second, when cyber capabilities are used across all domains they provide the operational commander time and space in the defense to expose and increase enemy vulnerability by forcing the enemy to concentrate forces.[xiv] Third, when cyber capabilities are employed in the offense across all domains the arrangement achieved will allow operational commanders the time, space and ability to seize, retain, and exploit the initiative, gaining the advantage against the threat. [xv]

Eight research questions are used to gather evidence to test the three hypotheses. First, what are cyber capabilities in the defense? Second, what is the current US operational approach to the implementation of cyber capabilities at the operational level? Third, what are cyber capabilities in the offense? Fourth, what are examples of cross domain effects providing time, space, and operational advantage? Fifth, what can cyber do to integrate cross domain capabilities to buy time and space for the commander? Sixth, what are current enemy cyber capabilities and methods of employment at the operational level? Seventh, what are the contributions of cyber to the Deep Battle concept and reflexive control (RC)? Eighth, what critical capabilities across all domains are linked to cyber capabilities and critical vulnerabilities?

This research focused on only unclassified, publicly released information. The primary purpose of the analysis centered on the cyber domain and its ability to impact the land domain through cross-domain synergy and effects. The paper attempts to apply operational art in the context of the cyber domain to develop a multi-faceted operational approach to create an advantage for the operational level commander and staff. The historical case study of Guadalcanal was used to develop and inform the understanding of the cross-domain exponential advantage gained through exploitation and synergized effects of application of cyber capabilities across multiple domains. This case study provides examples of how the application of cyber capabilities across multiple domains can create opportunities.

The study is organized into seven sections: the introduction, literature review, methodology, case study, findings, analysis, and conclusion. The literature review builds a theoretical foundation of operational art, joint cyber capabilities, and cyberwarfare and how those capabilities are currently implemented across all domains. Next, the methodology provides a framework and approach to determine how cyber capabilities integrate across domains pointing to an operational approach to achieve synergy and desired effects. Next, the case study will illuminate, through historical examples, how temporary windows of advantage in one domain have created exponential capability in other domains. The findings section will synthesize the case study findings within the theoretical framework. Finally, the conclusion draws from the findings to recommend an operational approach for the application of cyber capabilities across joint operations allowing the operational commander multi-domain windows of advantage.

Literature Review

The literature review provides a logical framework for the basis of this study. Once established, this framework provides the theoretical lenses and parameters for the discussion, methodology and how the case study will be viewed. First, operational art will be discussed within the evolution of the US doctrinal framework and prominent thinkers and Russian deep battle concept. Second, the two aforementioned operational art frameworks will be combined with current joint and Army cyberspace doctrine to provide a structured focused approach to assess the subsequent case study and analyze potential multi-domain advantages to be gained through cyber capabilities. The case study will include analysis of the WWII campaign for Guadalcanal.

US Operational Art

Operational art provides the bridge between tactical actions and strategic objectives. It involves a systematic and deliberate campaign planning process for major operations in a theater of war.[xvi] There are nuanced differences among joint and Army doctrine on the exact meaning of operational art since its emergence in the US Army in the 1980’s. Joint Publication 3-0 Joint Operations includes the development of campaigns and operations by “integrating ends, ways and means…reach the desired military end state in support of national objectives.”[xvii] Additionally, operational art incorporates operational design “the conception and construction of the framework that underpins a joint operation or campaign plan and its subsequent execution”[xviii] to provide linkage and an operational approach over time between the overall tasks, purposes and desired end state for a campaign. Joint Publication 5-0 Joint Planning defines in detail the purpose of operational art and operational design. There are thirteen elements of operational design that assist in visualizing the problem and developing an effective operational approach. The elements are; termination, military end state, objectives, effects, center of gravity, decisive points, lines of operations and lines of effort, direct and indirect approach, anticipation, operational reach, culmination, arranging operations, and forces and functions.[xix]

US Army doctrine details operational art in ADRP 3-0 Operations. The Army released FM 100-5, Operations in 1982 when it previewed the AirLand Battle concept and the term has experienced multiple evolutions over the last thirty-five years. The emergence of operational art and AirLand Battle sought to synchronize efforts across all domains and warfighting functions to maximize capability in time and space and counter the Soviet threat at the time.[xx] ADRP 3-0 defines operational art as the “pursuit of strategic objectives, in whole or in part, through the arrangement of tactical actions in time, space, and purpose.”[xxi] The Army includes ten elements of operational art: end state and conditions, centers of gravity, decisive points, lines of operations and lines of effort, basing, tempo, phasing and transitions, culmination, operational reach, and risk.[xxii] Five of the ten Army elements are common to the elements of operational design joint doctrine mentioned previously from JP 5-0.

In addition to doctrine, three prominent theorists and writers have informed this paper’s definition of operational art. In his book, Napoleon’s Last Victory: 1809 and the Emergence of Modern War, Robert Epstein defines operational campaigns as “characterized by symmetrical conscript armies organized into corps, maneuvered in a distributed fashion so that tactical engagements are sequenced and often simultaneous, command is decentralized, yet the commanders have a common understanding of operational methods. Victory is achieved by the cumulative effects of tactical engagements and operational campaigns.”[xxiii] The advent of modern warfare saw the end to the possibility of one decisive battle. The commander and staff in modern war must understand and visualize the linkages between multiple battles or tactical actions and arrange them over time and space to achieve the overall end state and strategic objectives. The critical aspects from Epstein’s definition are the cumulative effects and the plurality of the requirement of multiple engagements and campaigns. Operational art is founded on an operational approach that links multiple tactical actions into campaigns over time to achieve the objective.

The next critical thinker who greatly contributed to the overall understanding of operational art is Dr. James Schneider and his Theoretical Paper No. Four, Vulcan’s Anvil: The American Civil War and the Foundations of Operational Art. Schneider defines operational art as “a unique style of military art, became the planning, execution and sustainment of temporally and spatially distributed maneuvers and battles, all viewed as one organic whole.”[xxiv] According to Schneider, operational art is characterized by eight attributes: distributed operations, distributed campaigns, continuous logistics, instantaneous command and control, operationally durable formations, operational vision, distributed enemy, and distributed deployment.[xxv] Schneider’s definition of operational art demonstrates the foundation of the understanding of both time and space separating maneuvers and the linkage to an overall whole or goal. Additionally, the attributes he defines link to our current, Army and Joint doctrines’ elements of operational art and design. All of the elements of operational art and design are interrelated variables that must be considered holistically to determine the most effective operational approach to solve a problem.

The next aspect of operational art critical to this study is the combination of the theory of operational art and systems theory from Shimon Naveh. Within the complexity of the contemporary operational environment it is critical to account for the challenges within the operational level of war. Three critical concepts taken from Naveh are the requirements for operational art, the concept of operational shock, and operational vulnerability. Naveh describes nine requirements for operational art or an operational level plan: 1) reflect the cognitive tension between the strategic and tactical levels of war; 2) based on productive maneuver reflecting the link from tactical action and strategic aim; 3) must be synergetic (the sum of the whole is greater than the individual parts) and integrate forces in time and space that are geographically and spatially separate; 4) aim at the disruption of the opponent’s system; 5) account for chaos within the conflict of systems on systems; 6) non-linear in nature, hierarchical and express across the depth of the operational environment; 7) reflect the deliberate interaction between maneuver and attrition or erosion of the opponent; 8) although reliant on the strategic level for aims, restrictions and resources, it is still an independent entity; 9) must be related to a broad and universal theory.[xxvi]

Naveh continues to develop the understanding of operational art with his discussion of operational shock. Operational shock “delineates in practical terms a consequential state of a fighting system which can no longer accomplish its aims.”[xxvii] Naveh’s systems approach to operational art provides insight to developing a practical operational approach to link tactical actions in time and space to achieve strategic objectives and aims. As a system, the military interacts within multiple systems targeting the enemy systems to achieve the effect of shock or paralysis, thereby preventing the enemy from achieving their aim and allowing our victory and subsequent success operationally and strategically.

Naveh further outlines two potential weaknesses within a military system vulnerable to shock, which will assist in protecting our critical vulnerabilities as well as identifying and attacking the enemy’s. The two potential weaknesses are: 1) absolute dominance of the aim; 2) deep structure and hierarchic logic of action.[xxviii] In keeping these weaknesses in mind Naveh outlines three methods for exploiting the system’s structure and weaknesses. First is division and fragmentation in depth, both horizontally and vertically.[xxix] This multi-dimensional action will disrupt the synergy of the enemy system across the breadth of the formation and in-depth at echelon disrupting the ability of the enemy to command, control, communicate, and synchronize. The enemy system will be broken down into individual parts thereby creating shock. Second, the attacks on the enemy must achieve simultaneity throughout the depth of the enemy formation with multiple concurrent and synchronized operations. Finally, shock can be created with attacks on the center of gravity.[xxx] There are three critical components to identify: 1) the exact points of strength and weakness in the opposing system; 2) the deliberate creation of operational vulnerabilities in it; 3) the exploitation of vulnerabilities through maneuver.[xxxi]

Russian Operational Art

Russian operational art began under Aleksandr Svechin during the 1920’s. He defined operational art as the conceptual linkage between strategy and tactics, where commanders link successes tactically with operational bounds to strategic objectives.[xxxii] Svechin proposed a strategy of attrition as an option outside of destruction in a decisive battle. The goal of attrition is to gradually deplete the enemy’s capability to wage war over a successive series of tactical engagements. “The operations of a strategy of attrition are not so much direct stages toward the achievement of an ultimate goal as they are stages in the deployment of material superiority, which would ultimately deprive the enemy of means for successful resistance.”[xxxiii]

M. N. Tukhachevsky has also been credited with the development of Soviet operational art and the concept of mechanization, militarization of the Soviet economy, deep battle and its transformation into deep operations theory focusing on the annihilation of the enemy through the depth of his defenses.[xxxiv] He first detailed his understanding of the modernization of war and operational level of warfare in a 1926 article.

Modern tactics are characterized primarily by organization of battle, presuming coordination of various branches of troops. Modern strategy embraces its former meaning: that is the ‘tactics of a theatre of military operations’. However, this definition is complicated by the fact that strategy not only prepares for battle, but also participates in and influences the course of battle. Modern operations involve the concentration of forces necessary to deliver a strike, and the infliction of continual and uninterrupted blows of these forces against the enemy throughout an extremely deep area. The nature of modern weapons and modern battle is such that it is impossible to destroy the enemy’s manpower by one blow in a one-day battle. Battle in modern operations stretches out into a series of battles not only along the front but also in depth until that time when either the enemy has been struck by a final annihilating blow or the offensive forces are exhausted. In that regard, modern tactics of a theater of military operations are tremendously more complex than those of Napoleon. And they are made even more complex by the inescapable condition mentioned above that the strategic commander cannot personally organize combat.[xxxv]

Tukhachevsky understood the requirements for an operational level of war to provide the linkage between strategy and tactical actions across the battlefield and throughout the entire depth of an enemy. He also postulated the importance of the critical factors of depth, continuity, synergism and wholeness and developed an understanding of operational shock (udar) and impacts in the enemy as a system.[xxxvi] The overarching goal is to create an operational approach that will achieve simultaneous paralysis of the entire depth and breadth of the enemy formation through operational maneuver. This paralysis will neutralize the opponent’s system and subcomponents creating the opportunity for annihilation and victory and achieving the strategic goal. Isserson further developed the concept and provided models for the operational formations that would achieve a deep breakthrough. A hallmark of his concept is developing ‘depth-to-depth blows’ and ‘operational simultaneity.’[xxxvii]

Current Russian strategy has continued to modernize the deep battle concept with the two critical aspects of ‘new-type warfare’ and reflexive control. The Russians have developed New-type warfare in an effort to gain asymmetric advantage against an opponent’s technological advantage, specifically that of the United States.[xxxviii] General-Lieutenant Andrey Kartapolov in 2015 described the theory and key components. Kartapolov postulates that new-type warfare involves 80-90 percent propaganda and 10-20 percent violence.[xxxix] He provided a graphic that outlines the phases of New-Type warfare (see Appendix 1, Figure 1). Deep battle resonates throughout and it expounds the development of Russian operations across domains to shape operations prior to conflict using “hybrid methods” across multiple domains to create windows of advantage.

The second modern Russian theoretical concept is reflexive control. Reflexive control is applied as a means to interfere and manipulate an opponent’s decision-making cycle. It can target human decision making and organizational decision-making systems and processes. Reflexive control can also be applied through automated systems and digital mission command architecture. Reflexive control is “a means of conveying to a partner or an opponent specially prepared information to incline him to voluntarily make the predetermined decision desired by the initiator of the action.”[xl] One of the goals of reflexive control is the temporary slowdown of the adversary’s tempo and operational level decision making process.[xli] This adjustment in tempo creates windows of opportunity for Russian exploitation of changes in tempo and potential opponent decisions that shape the operational level forces into the overall Russian operational design and approach.

A significant aspect of RC is the targeting of technology as well. The goal is to use RC control as a shaping operation to disrupt the opponent’s understanding of the operational environment. Through manipulation of reconnaissance assets, satellites, weapons guidance systems and associated technology and systems used by the opponent, the Russians use RC to shape opponent understanding, feint direction of attacks, and manipulate portions of the mission command architecture.[xlii] RC is part of the Russian targeting methodology and process to identify weak links and means to exploit. The interference at a minimum aims to achieve temporary paralysis of the opponent’s decision-making process and operational tempo.[xliii]

Another critical aspect of reflexive control is the concept of complex or double-track control. Critical and corresponding to control of the enemy is the ability to exercise appropriate mission command over friendly forces. Reflexive control creates windows of opportunity for exploitation. In order to exploit the opportunity, Russian friendly units must have a plan in place to exploit the opportunity and gain the initiative at the tactical, operational and strategic levels. Reflexive control requires synchronization and has a spatial-temporal aspect.[xliv] Appendix 1, figures 2 and 3 are visual depictions of the planning methodology linking the Russian decision-making process to reflexive control of the enemy, the information packet (IP), and the combat mission (CM) of Russian elements seeking to exploit the process.

US Joint and Army Cyber Doctrine

Critical to the understanding of US cyber capabilities is an understanding of the Department of Defense (DoD) cyber strategy as well as joint and army doctrine for cyberspace operations, and joint doctrine on cross domain synergy. The focus of this section on cyberspace is not to provide an exhaustive list of the history of cyberspace, but to introduce the current doctrine for employment in order to inform the implementation and understanding of cross domain advantage opportunities as applied in the case study methodology. Additionally, it is important to have a foundational knowledge of those cyberspace electromagnetic activities (CEMA) to implement as part of an operational approach and to counter the Russian operational methodology for employment.

The Department of Defense published The DoD Cyber Strategy in 2015. It outlines the major considerations and priorities for US cyberspace operations. There are three primary cyber missions, two defensive and one offensive in nature: “1) DoD must defend its own networks, systems, and information; 2) DoD must be prepared to defend the United States and its interests against cyberattacks of significant consequence; 3) if directed by the President or Secretary of Defense, DoD must be able to provide integrated cyber capabilities to support military operations and contingency plans.”[xlv] The primary mission consideration for this study will be the third mission of integration of cyber capabilities to support military operations across the DoD and implied across multiple or all domains.

In addition to the three missions, the DoD strategy also identifies five strategic goals: 1) Build and maintain ready forces and capabilities to conduct cyberspace operations; 2) Defend the DoD information network, secure DoD data, and mitigate risks to DoD missions; 3) Be prepared to defend the US homeland and US vital interests from disruptive or destructive cyberattacks of significant consequences; 4) Build and maintain viable cyber options and plan to use those options to control conflict escalation and to shape the conflict environment in all stages; 5) Build and maintain robust international alliances and partnerships to deter shared threats and increase international security and stability.[xlvi] The strategic goals most relevant to an operational level impact and this study are goals two and four. The DoD Information Network (DODIN) is employed at all levels of war and will be targeted specifically at the operational level to impact the decision-making process, shape US actions through reflexive control, technological interference, and manipulation of mission command architecture and systems. Cyber applications will also be used both offensively and defensively to facilitate control of conflict escalation and to shape the operational environment throughout military operations across all domains.

Joint Publication 3-12 (R) Cyberspace Operations describes in detail the cyberspace environment, cyberspace operations, and the implications for the joint planning and operations process including the planning, preparation, execution and assessment. Cyberspace operations “are the employment of cyberspace capabilities where the primary purpose is to achieve objectives in or through cyberspace.”[xlvii] Cyberspace is unique in the aspect of being one of the five domains (air, land, maritime, space and cyber) but also operating across three cyberspace layers (physical network, logical network, cyber-persona) while providing critical linkages across all physical domains and across all six functions of joint operations (command and control, intelligence, fires, movement and maneuver, sustainment, protection).[xlviii] Cyberspace operations allow the commander to retain freedom of maneuver across cyberspace, accomplish the Joint Force Commander’s (JFC) objectives, deny freedom of action to the enemy, and enable other operations across the other physical domains.[xlix] As the US military becomes more dependent on cyberspace for communication, planning, mission command, and sustainment we will become more susceptible to cyber-attack and targeting from adversaries. The physical domains have become dependent on the cyber domain as it relates to specific functions and tempo within the physical operating environment.

There are three primary types of cyberspace operations, offensive, defensive and DODIN which are intent based. The types of cyber operations will determine planning priorities and also reveal potential vulnerabilities of the cyber domain during military operations. Offensive operations “are cyber operations intended to project power by the application of forces in and through cyberspace.”[l] Cyber operations are interwoven within information operations to include military information support operations (MISO) and military deception (MILDEC). Defensive cyberspace operations are “intended to defend DoD or other friendly cyberspace…they are passive and active cyberspace defense operations to preserve the ability to utilize friendly cyberspace capabilities and protect data, networks, net-centric capabilities, and other designated systems.”[li] The final aspect relevant to this study are DODIN operations. DODIN operations are “actions taken to design, build, configure, secure, operate, maintain and sustain DoD communications systems and networks in a way that creates and preserves data availability, integrity, confidentiality, as well as user/entity authentication and non-repudiation.”[lii]

Additionally, cyberspace operations are broken down into cyberspace actions. These actions are tied to achieving effects and can assist in understanding at the operational level as cyberspace operations tie into the joint planning and targeting process. There are four cyberspace actions available to the joint commander: 1) cyberspace defense; 2) cyberspace intelligence, surveillance, and reconnaissance (ISR); 3) cyberspace operational preparation of the environment; 4) Cyberspace attack.[liii] Cyberspace attack has ramification both in the cyber and physical domains as it can achieve the effects of deny or manipulate. Deny is directly related to time and therefore can impact an opponent’s tempo with respect to opportunities for decisions, sequencing and frequency. To deny is to “degrade, disrupt, or destroy access to, operation of, or availability of a target by a specified level for a specified time…prevents adversary use of resources.”[liv] To manipulate is to “control or change the adversary’s information, information systems, and/or networks in a manner that supports commander’s objectives.”[lv]

Field Manual 3-12 Cyberspace and Electronic Warfare Operations was published in April 2017 to guide US Army cyber operations. The manual is nested with the joint and DoD documents previously addressed. The major significance for this study is the inclusion of cyber operations in planning considerations within the military decision making process (MDMP) and targeting process. The goal of the application of cyber capabilities is to synchronize simultaneous and complementary effects across domains to gain a position of advantage. JP 3-0 defines joint targeting as the “process of selecting and prioritizing targets and matching the appropriate response to them, taking account of command objectives, operational requirements, and capabilities.”[lvi] Due to the complexity of cyberspace operations and the multiple layers of the domain a significant effort must be placed throughout the planning process, specifically Intelligence Preparation of the Battlefield (IPB).[lvii] Additionally, the cyber domain involves aspects across multiple domains and also the functional commands requiring additional coordination to acquire the appropriate command level authority to authorize target execution and maintain synchronization at the operational level with operations to achieve the desired effect. Finally, aspects of cyber capabilities exist in the physical domains and can be targeted by other assets. The targeting boards at the various Army and joint commands must be involved to assist in prioritization of assets used to strike as well the priority of the opponent’s capabilities to target.

The Army targeting methodology follows the four-step construct of decide, detect, deliver and assess. FM 3-12 applies the targeting process to CEMA specifically and outlines key considerations for each step of the process. Decide and detect are two critical steps in the targeting process based on the requirements for integration in the approval and prioritization process and the intel and information collection plan. The first step, decide, requires a deliberate plan to identify enemy capabilities based on the potential anonymity cyberspace provides and which domain and weapon system will best achieve the desired effects to create cross domain synergy.[lviii] The second step, detect, is also tied to the information collection plan. Situational understanding is critical and is attained through “situational data as geospatial location, signal strength, system type, and frequency of target to focus effects on the intended target.”[lix]Additionally, targets must be developed through the collection plan, vetted, validated and approved for prosecution as part of the target nomination and collection plan processes. The third step is deliver. Delivery must be synchronized in time and space to achieve the operational commander’s purpose. Additionally, it will most likely need to be synchronized to achieve synergy with operational maneuver in the physical domains. The multiple levels of the approval process require early target approval to allow for application in a timely manner at the operational level. The final step in the targeting process is assess. Intelligence and maneuver assets can be tied to the assessment of cyber actions to determine effectiveness and whether it requires reengagement. However, effects produced in cyberspace are not always physically visible or apparent, especially to the echelon requesting the effect.[lx] The appropriate level must be tied into the operational level for feedback and effects. Additional considerations must be made for enemy capabilities to detect and mitigate the cyber effects and impacts on commander’s decisions for additional assets to create the desired window of opportunity within the cyber domains or impacts on desired cross domain effects and synergy.

The final doctrinal concept for review is the idea of cross domain synergy. The joint document Cross-Domain Synergy in Joint Operations Planner’s Guide details the concept in relation to the joint planning process (JPP). The overall purpose is to gain efficiency and effectiveness across all domains and their capabilities to assist the joint force in accomplishing the mission.[lxi] The focus of the document is on planning but the concept also applies to the execution of operations as well. Cross domain synergy is “the complementary vice merely additive employment of capabilities in different domains such that each enhances the effectiveness and compensates for the vulnerabilities of others.”[lxii] The joint force routinely employs all domain (air, land, maritime, space, and cyberspace) capabilities to overwhelm an adversary’s ability to decide and act.[lxiii] Although the Planner’s Guide focuses on the planning process, inherently involved as well is the execution and feedback elements of the operations process.

The ability to operate in multiple domains also allows the operational commander multiple opportunities and options to apply force across all domains against enemy weaknesses,[lxiv] thereby creating options for the friendly force and multiple dilemmas for the enemy. The cross-domain synergy gained will impact the enemy’s decision-making process and systems, and have implications on the enemy’s ability to understand, visualize, describe the operational environment and take appropriate actions. Cross domain synergy will inherently help create paralysis and shock in the enemy system and windows of opportunity for the force to gain and maintain the operational advantage.

Methodology

This study employs the structured focus approach of a single case study. First, it is structured in that the focused research questions are asked of the case study to guide and standardize collection, facilitate systematic comparison, and aid in analysis and findings.[lxv] Second, the study is focused because it will only deal with certain aspects of the historical cases examined.[lxvi] The overall desired end state is to determine aspects, methods and advantages gained through application of cross domain synergy to determine potential applications for the cyber domain to gain advantage across multiple domains. The elements of operational design and art from joint and Army doctrine, along with the additional operational art aspects from theory will be combined with aspects of Russian deep battle and reflexive control to provide an analysis tool for the case study involved. The structured focus methodology provides a way to assess the evidence of the case study and determine aspects of cross domain synergy and applications to the future use of cyber capabilities.[lxvii]

The critical factors provided a method of analysis of the case study to determine how advantages in one or more domains can impact other domains and overall synergy. The overall analysis will provide insight into how cyberspace capabilities within the cyber domain can provide temporary windows of advantage within other domains to create opportunities for the operational commander to accomplish the mission.

The significance of this research is that it contributes to the understanding of cyberwarfare as applied through the lens of operational art and its application to multi-domain battle. An effective operational approach will provide the operational commander the opportunity to create temporary windows of advantage by leveraging the cyber domain across other domains. The study provides a conceptual framework to assist in answering two key questions. First, how do military forces offensively and defensively deploy cyber capabilities? Second, how can the US Army develop an operational approach to gain an advantage in the cyber domain and synergy across other domains to create windows of advantage?

Eight research questions are used to gather evidence to test the three hypotheses. First, what are cyber capabilities in the defense? Second, what is the current US operational approach to the implementation of cyber capabilities at the operational level? Third, what are cyber capabilities in the offense? Fourth, what are examples of cross domain effects providing time, space, and operational advantage? Fifth, what can cyber do to integrate cross domain capabilities to buy time and space for the commander? Sixth, what are current enemy cyber capabilities and methods of employment at the operational level? Seventh, what are the contributions of cyber to the Deep Battle concept and reflexive control? Eighth, what critical capabilities across all domains are linked to cyber capabilities and critical vulnerabilities?

The case study will be the Guadalcanal campaign 1942-1943. The historical case study will provide a foundation for cross-domain advantage and analysis. Additionally, it will carry those lessons forward and allow for detailed analysis of the Russian operational art concept of deep battle and modern application combined with new-type warfare and reflexive control.

The use of primary and secondary sources provided the data for the study. The historical case study of Guadalcanal provided analysis of the elements of operational art. Additionally, it provided examples of cross-domain advantage and synergy primarily across the land, air, and maritime domains and electronic warfare (CEMA).

The structured focused approach applied to this case study will facilitate the objectives of this monograph and guide the evaluation of the three foundational hypotheses and eight research questions. Ultimately, the analysis will lead to an assessment of the application of operational art in multi-domain battle across the historical vignette to inform lessons for application of cyber capabilities to achieve cross domain synergy on the modern battlefield against a capable enemy. The next section will further analyze the case study against the research questions to determine applicable lessons and analysis for developing an effective operational approach to apply cyber domain at the operational level.

Case Study

Case study analysis assists us to analyze specific cases and determine relevant variables focused on a structured comparison to continue to refine concepts.[lxviii] One case study will be used throughout this project and will be analyzed using the same aspects. The case study will be the Guadalcanal 1942-1943 and will be developed and analyzed with a structured focus comparison of the established eight research questions. This analysis will lend to the refinement and clarification of multi-domain battle and the implications of the cyber domain across the other four domains.

Guadalcanal 1942-1943

Guadalcanal marked a more than ten-month campaign by US combined, joint forces to transition from the strategic and operational defense to the strategic and operational offense in the Pacific during World War II. In order to fully understand the case study, an understanding of the strategic context is necessary. The Battle of the Coral Sea, 7-8 May 1942 dealt a significant blow to the Japanese naval fleet, especially with the loss of four carriers with 250 aircraft and many highly trained aircrews.[lxix] The Battle of Midway 4-7 June 1942 marked another US victory and created a turning point ending the Japanese strategic offensive which originally intended to create the conditions through the offense to force US negotiations.[lxx]

United States and allied leadership began to see an opportunity to transition to the offense in the Pacific. The transition was critical to ensure the sea lines of communication (SLOC) to Australia, New Zealand, and New Guinea remained open. Additionally, the United States was supplying arms, equipment and advisors to China to keep them in the fight and maintain a force to fix Japanese Army capabilities on mainland Asia. The Japanese were attacking in Burma and extending their reach in the Pacific to sever the lines of supply to the Chinese. Both US and Japanese forces were at the limits of their operational reach. Subsequently this strategic context put the two belligerents on a collision course in the Solomon Islands and Guadalcanal, specifically.[lxxi]

Joint operations during the Guadalcanal campaign included multi-domain aspects across four domains; air, sea, land, and electronic warfare/intelligence. The electronic warfare/intelligence (EW/intel) domain most closely resembles the aspects of cyber today and will be used to offer lessons applicable to cyber domain capabilities. Further analysis will also be completed to garner potential lessons from cross domain synergy achieved through impacts of actions from one domain to another.

The first research question is what are cyber capabilities in the defense? Electronic warfare capabilities were still in their infancy at the outset of World War II. Throughout the campaign for Guadalcanal, five major EW/intel capabilities assisted in gaining cross-domain advantage in the defense. The assets included coast watchers, local scouts, radars, the naval SG radar, and radio crypto-analyst. Assets in the air domain included the SCR-270 air warning radar delivered by the Burrows on 29 August and the coast watcher assets. Coast watchers were located on the islands of Bougainville and New Georgia. The coast watchers reported via radio any Japanese aircraft movement Southeast from Rabaul to Guadalcanal. The SCR-270 radar had a range of up to 130 miles and provided 35-40 minutes early warning of Japanese aircraft.[lxxii] In the land domain, the local scouts operated under Captain Clemens to provide early warning of Japanese ground movements and offensive operations against Henderson Airfield. They greatly enhanced First Marine Division commander, Major General Vandergrift’s ability to effectively use combat power available to seize and defend key terrain to deny the Japanese Army the ability to regain the airfield or affect air operations, airfield maintenance, and expansion.

The naval component was critical to operations to maintain the SLOC and supply to the Marines and pilots on Henderson Airfield. The SG radar proved critical in the naval fight on 13-14 November and achieved effects that prevented Japanese resupply operations while maintaining the SLOC to Guadalcanal. The SG radar had a range of 15 miles with a range accuracy of ± 100 yards and azimuth accuracy: ± 2°.[lxxiii] Rear Admiral Willis Lee expertly used the system on his flagship enabling Task Force 64 to identify the Japanese Tokyo Express run to reinforce and resupply Japanese Army elements in the naval battle for Guadalcanal 13-14 November.[lxxiv] Lee not only denied Japanese naval efforts the ability to reinforce and resupply, but he also successfully screened and protected US naval efforts to assist the struggling First Marine Division on the island. In spite of heavy American naval losses, the delay allowed a transition to the air domain creating a window of opportunity for the Cactus Air Force to attack the remaining ships as they withdrew back to the Northeast toward Rabaul.

The final invaluable EW/intel asset used to great effect during the Guadalcanal campaign were the radio crypto-analysts. Crypto-analyst were able to intercept and decrypt a critical message on 8 November when Admiral Yamamato issued his orders for the November attack to reinforce and resupply Japanese Army elements on Guadalcanal. The analysts confirmed the Z-day for the operation for the 13th of November.[lxxv]  This valuable intelligence enabled Admiral Halsey to adequately plan and prioritize efforts for the defense of Guadalcanal as well as enabled naval and air efforts to focus capabilities for the intercept. The information proved invaluable for Admiral Lee in the naval battle for Guadalcanal 13-15 November which prevented Japanese naval reinforcement. The Japanese destroyer losses during that battle forced a transition to improvised methods of resupply with fifty gallon drums and submarines further affecting the land domain. The subsequent efforts continued to fail and the Japanese Army elements on the island operated near the edge of culmination and starvation.[lxxvi]

The second question is what is current US operational approach to the implementation of cyber capabilities at the operational level? The literature review section addressed current US cyber doctrine and theory for application. The primary focus on existing literature is at the strategic level and most recently at the tactical level with the publication of Field Manual 3-12, Cyberspace and Electronic Warfare Operations in April 2017. In order to adapt this question to the specific case study, this study will address the operational approach for the implementation of electronic warfare at the operational level during the Guadalcanal campaign 1942-43.

The United States’ focus for the application of EW spread across all three echelons: strategic, operational, and tactical. Prior to World War II the American intelligence community had broken the Japanese diplomatic code which used the Purple cypher machine.[lxxvii] Through the use of code breaking, also known as “Ultra,” the joint forces were able to disrupt, delay, and prevent Japanese attempts to resupply and reinforce throughout the Solomon Islands.[lxxviii] Strategic and operational emphasis in the South Pacific was placed on radio intercepts, translation, and triangulation. It was far from an exact science. However, through atmospherics, location of the transmissions and volume of traffic, the radio traffic could be translated, decoded, and compared to determine Japanese plans for movement, resupply, and specific command structure for operations.[lxxix]

The second aspect of EW is the ground based airborne radar. Following the Marine landing and securing of Henderson Airfield on 7-9 August 1942 the airfield was expanded to receive aircraft. The airfield was completed on 18 August. [lxxx] The first SCR-270 reached the island on 20 September and was followed by two SCR-268’s.[lxxxi] The SCR-270 enabled the operators to identify number and type of aircraft out to 200km. The SCR-268 allowed the operators to relay to the aircrews overhead the altitude of the enemy planes, greatly reducing the demands on the pilots, planes, and fuel.[lxxxii] This tactical success enabled the operational level commanders to mitigate risk as well as prioritize the flow of supplies (especially fuel, planes, and pilots) during the tenuous period from August to November of 1942.

The final aspect of operational implementation of EW was the employment of naval radars. Perhaps the greatest leadership failures at Guadalcanal revolved around the Navy’s lack of understanding of the use of shipborne radar systems and the tactics to properly employ the systems with a mixed fleet of radar equipped ships at night. Five major surface engagements were fought in the vicinity of Guadalcanal and two carrier battles were fought just to the northeast. The Battle of Cape Esperance demonstrated a lack of understanding of new technologies based on both a quick timeline to development and secrecy surrounding the technology. Due in large part to the lack of understanding of the capabilities and improvements of the SG radars, Rear Admiral Scott did not switch his flagship to a light cruiser equipped with the SG radar.[lxxxiii]  Rear Amiral Scott was able to achieve effects against the superior night trained Japanese, but with significant US losses.

The naval battles of Guadalcanal 13-15 November taught additional lessons on the use of radars. The Japanese continued to deal heavy losses to the US Navy. Both key leaders, Admirals Callaghan and Scott chose flagships which were not outfitted with SG radar and both leaders were lost in the fight. Rear Admiral Lee provides a stark contrast to the previous naval failures. On the night of 14 November, he led a group of two battleships and four destroyers hastily put together. Lee faced off against a Japanese task force of a battleship, four cruisers, eighteen destroyers, and four transports.[lxxxiv] Lee used the Washington as his flagship because it had SG radar capabilities and he knew how to use it. The US naval task force sank a destroyer and a battleship. The US successes delayed the Japanese transports forcing the Japanese commander to run them aground. All were lost the following day from air attacks.[lxxxv]

The third research question is what are the cyber capabilities in the offense? EW provided three major contributions to offensive operations. First, the radar systems provided early warning, in conjunction with coast watchers, of pending Japanese air attacks. The early warning provided for defense of Henderson Airfield, but assisted the Cactus Air Force offensively as well. The 40-45 minutes warning provided by the SCR-270 and SCR-268 gave adequate time for the pilots to get their aircraft to adequate altitude to contest the bombers and the zeros. Second, the discovery of a Japanese radar system on Guadalcanal by the Marines triggered an electronic intelligence (ELINT) requirement. The first B-17 ELINT missions began flying at the end of October to identify Japanese radar sets for future targeting.[lxxxvi] The ELINT effort would become a shaping operation for future island hopping to establish the conditions for amphibious landings. Finally, communications intelligence (COMINT) provided early warning of the major Japanese reinforcement planned for 13 November.[lxxxvii]  The six days early warning gave both naval and air planners and leaders much needed time and focused intelligence to plan, prepare, and equip for the pending fight lending to the success of the naval and air battles 13-15 November 1942.

The fourth question is what are examples of cross domain effects providing time, space and operational advantage? Cross-domain synergy is “the complementary vice merely additive employment of capabilities in different domains such that each enhances the effectiveness and compensates for the vulnerabilities of others.”[lxxxviii]  Multi-domain battle allows

US forces to outmaneuver adversaries physically, virtually, and cognitively applying combined arms in and across all domains. It provides a flexible means to present multiple dilemmas to an enemy by converging capabilities form multiple domains to create windows of advantage, enabling friendly forces to seize, retain, and exploit the initiative to defeat enemies and achieve campaign objectives.[lxxxix]

EW made significant contributions and cross domain effects throughout the Guadalcanal campaign. Four events provide examples of EW providing time and space for US commanders across the domains.

First, the landing of the SCR-270 and SCR-268 allowed the Cactus Air Force adequate time to prepare and launch aircraft in time to prevent destruction on Henderson Airfield. The early warning also provided the space required to achieve necessary altitude to gain the advantage against the Japanese bombers as well as mitigate the technical edge the Japanese fighters had against the US aircraft. The two radar systems gave the ground team the ability to vector the pilots and give adequate direction to target enemy aircraft formations enroute to disrupt naval and ground operations on Guadalcanal.

Second, crypto-analysts were able to intercept Japanese radio traffic and provide time and space across all domains allowing Admiral Halsey the opportunity to gain the advantage. The message decrypted on 8 November revealed Admiral Yamamoto’s plan to begin a major operation with on 13November.[xc] This valuable intelligence enabled time and space to plan and prioritize efforts for the defense of Guadalcanal. The information proved invaluable to naval commanders in the naval battle for Guadalcanal 13-15 November which prevented Japanese Naval reinforcement even at high cost to US naval assets.

Third, Rear Admiral Lee effectively used the SG radar on the night of 14 November to gain time and space for himself to achieve tactical results and victory. Additionally, his use of the SG radar and eventual denial of Japanese reinforcement gained time and space for the operational level commander and the 1st Marine Division on the island. The Japanese elements of the 17th Army were denied resupply creating risk of culmination and inability to mount any effective counteroffensive efforts. Additionally, Admiral Turner was able to get 5,529 American reinforcements to Guadalcanal during that same period without loss of transports.[xci]

Finally, EW assisted in cross domain effects by providing time and space on 7 December 1942. The coast watchers provided radio warning of a Japanese naval reinforcement effort by 12 destroyers.[xcii] This timely report allowed both air and naval interdiction. US pilots attacked the convoy of ships on the evening of 7 December and PT boats were launched to interdict the convoy throughout the night. The PT boats are credited with disrupting the convoy operations and causing the Japanese commander, Captain Sato, to abandon the resupply effort on 8 December. In addition, the Americal Division was able to land and reinforce Guadalcanal that same day without loss of ship or Soldier.[xciii] The continued cross domain success of the US forces across all four domains, provided Admiral Halsey adequate time and space to seize the initiative at all echelons and forced a decision by Japanese operational and strategic leaders to abandon Guadalcanal as an offensive effort and begin the withdrawal.[xciv]

The fifth question is what can cyber do to integrate cross domain capabilities to buy time and space for the commander? EW was instrumental in identifying enemy aviation and naval assets. The critical information on Japanese locations received in a timely manner allowed both US aviation and naval assets time to prepare. Additionally, economy of force was achieved by providing a critical reconnaissance capability reducing the requirement for aerial assets to expend limited assets and time to find Japanese locations. The combination of radars and coastal watchers provided adequate early warning allowing for pilot rest and conservation of very limited fuel supplies, thereby reducing maintenance and loss of aircraft.[xcv] EW assets enabled US commanders at the strategic and operational levels to control the tempo of both the preparation and execution of combat operations across the sea, air and land domains. The ability to control tempo allowed the commanders to prioritize efforts, preserve combat power, capabilities, and strained logistics. Simultaneously, the Japanese had to remain at the extent of their operational reach increasing risk to the mission. The Japanese were forced by necessity to operate at a greater strain to resources, ships,[xcvi] airframes, sustainment, and manpower.

The sixth question is what are the current enemy cyber capabilities and methods of employment at the operational level? The Japanese did possess and employ EW capabilities during World War II and the Guadalcanal campaign. The Marines discovered two Japanese radar sets on Guadalcanal shortly after the landing on 7 August.[xcvii] Japanese radar development lagged behind the United States significantly and the quality was poor as well.[xcviii] Organizational structure and parochialism between the army and navy limited Japanese radar research and development and strained resources.[xcix] Subsequently, radar employment and effectiveness were limited and lacked full development until after 1943. The radars found on Guadalcanal were early developed radars and most likely a Tachi-6. The Tachi-6 had a range of 185 miles, but had no capability to determine altitude of aircraft,[c] thereby limiting its usefulness for fighter directional control from a ground station. The poor radar was compounded by low quality radio systems in Japanese aircraft often unable to receive valuable information from a ground targeting or direction officer.

The Japanese did have cryptology and crypto-analysis programs in World War II. The Japanese priority for decryption focused on Soviet diplomatic traffic over US because the Soviet codes were easier to break.[ci] Additionally, the Japanese lacked the analytical ability beyond the diplomatic and did not focus on military traffic or interpreting US intentions.[cii] The Japanese Navy was able to successfully use radio direction-finding signal intercept for triangulation of US ship formation locations but were proven complacent with protecting their own radio traffic even though they knew the United States had broken Japanese codes.[ciii] The challenge and failure for the Japanese was to use information gained as time sensitive intelligence at either the operational or tactical level.

The seventh question is what are the contributions to the Deep Battle concept and reflexive control? Soviet Deep Battle was defined in Chapter VII, Attack of PU-36 (Soviet Field Regulation of 1936).

An attack requires a combination of the most powerful personnel and resources and the preparation of overwhelming superiority in the direction of the main effort. In joint operations by all branches and services, offensive operations must have the objective of simultaneously overwhelming the entire depth of the enemy defense. This can be accomplished as follows: a) by air attacks against the reserves and the rear areas of the enemy defenses; b) by artillery attacks against the entire depth of the enemy “tactical defense zone”; c) by tank penetration into the depth of the tactical defense zone; d) by infantry penetration, accompanied by escort tanks, into enemy positions; e) by advancing mechanized and cavalry units into far rear areas of the enemy; f) by large-scale use of smoke screens to conceal friendly movements and to confuse the enemy in less important sectors. In this way the enemy is to be tied down, encircled, and destroyed in the entire depth of his position.[civ]

EW assets when used appropriately during the Guadalcanal campaign provided US commanders the ability to conduct deep operations across domains within the constraints of the systems used. Radar capabilities provided warning across the depth and breadth of their range. The SCR-270 and 268 provided electronic depth and penetration out to 130 miles providing clarity on the enemy direction and altitude of Japanese air attacks. The closest Japanese airfield, naval base, and command and control (C2) location was the island of Rabaul, approximately 675 miles to the northwest of Guadalcanal. The coast watchers located on Bougainville (192-273 miles from Rabaul) and New Georgia (436 miles from Rabaul) provided additional depth beyond the range of either the US or Japanese radar systems. Additionally, the Marine seizure of the Japanese radars on Guadalcanal restricted the Japanese depth for radar early warning. The second EW asset for analysis is the crypto-analysis. The ability of the US forces to provide accurate and timely information on Japanese plans and operations provided both strategic and operational depth for planning and execution of operations to protect US reinforcement and deny the Japanese the ability to do the same.

Reflexive control was not achievable with EW assets during the Guadalcanal campaign. Reflexive control is “a means of conveying to a partner or an opponent specially prepared information to incline him to voluntarily make the predetermined decision desired by the initiator of the action.”[cv] Neither radio communications, crypto-analysis, radar nor the “Ultra” efforts had the ability to provide the offensive or manipulative enemy decision shaping intended by reflexive control. However, EW efforts did provide the opportunity to intercept and understand enemy plans and operations creating time and space to shape friendly combat power to be adequately prepared in depth to attack the enemy at the decisive point.

The eighth question is what critical capabilities across all domains are linked to cyber capabilities and critical vulnerabilities? Critical capabilities for both belligerents in the Guadalcanal campaign revolved around sustainment. Reinforcement, resupply operations, and available transports and ships (destroyers) determined the ability of both the Japanese and United States to have adequate combat power available across all domains to seize and secure Guadalcanal and Henderson Airfield. The island was critical to further offensive operations and expansion of operational reach. EW assets indirectly impacted the ability to identify, target, prepare, disrupt, delay, and destroy Japanese naval resupply convoy assets. The subsequent shipping and aviation losses continued to mount for the Japanese and they were no longer capable at the strategic and operational levels to restore the ability to project combat power or replace the losses.[cvi]

Analysis

This study relied on three hypotheses. First, when an operational approach arranges cyber capabilities across all domains it will create time and space allowing the operational level commander to shape the deep fight and control the tempo of joint operations. The evidence suggests this hypothesis is supported. The United States at Guadalcanal demonstrate the operational commander’s use of cyber and EW capabilities to create cross domain advantage and synergy. The efforts created critically needed time to prioritize limited assets, capabilities, and manpower. Operational level leaders were able to mitigate risk and apply combat power at critical decisive points, using an indirect approach to attack the enemy COG. The applied cyber and EW assets prevented US culmination while operating at the limit of operational reach and consequently forced the opponent to culminate and conduct costly operations beyond his operational reach.

Second, when cyber capabilities are used across all domains they provide the operational commander time and space in the defense to expose and increase enemy vulnerability by forcing the enemy to concentrate forces. The evidence suggests this hypothesis is also supported. The case study illuminates critical lessons for operational commanders in the defense. Operational commanders assume the defense to regenerate combat power and build capabilities to regain the offense. At Guadalcanal Halsey was able to gain time and create tactical, operational, and strategic space by defending and contesting critical sea lanes allowing US resupply and reinforcement and denying the same to the Japanese on the island.

Third, when cyber capabilities are employed across all domains the arrangement achieved will allow operational commanders the time, space and ability to seize, retain, and exploit the initiative, gaining the advantage against the threat. The evidence suggests this hypothesis is supported as well. Lessons from Guadalcanal demonstrate the use of cyber and EW capabilities to set the conditions to seize the initiative. Cyber and EW allow simultaneity and depth when used across the other four domains that cannot be achieved without them. The cross-domain synergy achieved in both case studies provided multiple options for the operational commander, created shock and delay in the enemy decision-making cycle, and allowed the Americans to gain and maintain the initiative forcing operational level culmination of the opponent.

In summation, the evidence from the case study suggests that all three hypotheses are supported and that the United States during the campaign for Guadalcanal a applied operational art to link tactical action to the desired strategic end state.  Cyber and EW capabilities are critical in warfare and allow operational level commanders the opportunity to shape the deep fight and control the tempo of multi-domain, joint operations. An effective operational approach will provide the operational commander the opportunity to create temporary windows of advantage by leveraging the cyber and EW domain across other domains.

Conclusion

This research sought to determine how cyberwarfare applied through the lens of operational art contributes to cross domain synergy within the context of multi-domain battle. Cyber and EW capabilities are critical to enable operational commanders the opportunity to create temporary windows of advantage, shape the deep fight, control tempo of multi-domain operations, and arrange cyber effects in time and space to achieve strategic objectives. The three hypotheses this study evaluated support this thesis. First, when an operational approach arranges cyber capabilities across all domains it will create time and space allowing the operational level commander to shape the deep fight and control the tempo of joint operations. Second, when cyber capabilities are used across all domains they provide the operational commander time and space in the defense to expose and increase enemy vulnerability by forcing the enemy to concentrate forces. Third, when cyber capabilities are employed across all domains the arrangement achieved will allow operational commanders the time, space and ability to seize, retain, and exploit the initiative, gaining the advantage against the threat.

This research used a structured focused approach to evaluate the application of CEMA capabilities within the context of multi-domain battle. The Guadalcanal Campaign 1942-1943 case study was developed and analyzed with a structured focus comparison of the established eight research questions. It clearly demonstrates cross domain synergy achieved with successful application of CEMA to provide opportunities and create temporary windows of advantage during multi-domain operations.

The analysis of the three hypotheses provided critical lessons for operational level commanders and planners to maximize the effects of cyber and electromagnetic capabilities to mitigate risks and create opportunities to apply combat power against the enemy’s COGs across multiple domains. The achieved additive effects of cross domain synergy are larger than the total sum of the individual parts. The case study demonstrates that the multi-domain efforts created critically needed time to prioritize limited assets, capabilities, and manpower. Leaders were able to mitigate risk and apply combat power at critical decisive points, using an indirect approach to attack enemy COGs while preventing their culmination while operating at the limit of operational reach and consequently forced the opponent to culminate and conduct costly operations beyond his operational reach.

Next, when cyber capabilities are used across all domains they provide the operational commander time and space in the defense to expose and increase enemy vulnerability by forcing the enemy to concentrate forces. Operational commanders can gain time and create tactical, operational, and strategic space by defending and contesting critical lines of communication in order to allow US resupply and reinforcement in the rear and close fight and denying the same to the enemy in the deep fight. Additionally, cyber capabilities can be employed in a proactive defense through information operations to prevent international interference with operations. A strategic cyber defense using cyber and information operations will assist in shaping the environment and reduce force requirements for offensive operations to seize key terrain during initial ground operations.

Finally, when cyber capabilities are employed across all domains the arrangement achieved allows commanders the time, space and ability to seize, retain, and exploit the initiative, gaining the advantage against the threat. Cyber and EW capabilities allow simultaneity and depth when used across the other four domains that cannot be achieved without them. The cross-domain synergy achieved in both case studies provided multiple options for the operational commander, created shock and delay in the enemy decision-making cycle, and allowed the Americans to gain and maintain the initiative forcing operational level culmination of the opponent.

Future studies should evaluate cross domain synergy and the ability to achieve simultaneous effects through the integration of all domains with the inclusion of MISO as a major component. An investigation of the application of the Russian New-Type of War with the All-Inclusive Command and Control of Combat Operations will allow strategic and operational level leaders to develop wargames against a near peer threat for wargames and planning exercises. Additionally, classified research will provide a more robust study and in-depth analysis supported by cyber experts to provide technical requirements to appropriately combat Russian and Chinese cyber threats. Finally, a combatant command, in partnership with US Cyber Command, should undertake a planning effort and command post exercises to test capabilities and potential operational approaches to combat cyber threats during combat operations. These future studies will assist and inform in the cyber capabilities and future requirements across doctrine, organization, training, materiel, leadership and education, personnel, facilities (DOTMLPF) required to enable the joint force to fight and win our nation’s wars.

Appendix 1: Figures

Figure 1: Methods and Ways of Conducting a New-Type of War. Military Review, July-August 2017, 40.

Figure 2: Russian concept of All-Inclusive Command and Control of Combat Operations. Kremlin Kontrol: Russia’s Political-Military Reality, 195.

Figure 3: Russian concept of All-Inclusive Command and Control of Combat Operations. Kremlin Kontrol: Russia’s Political-Military Reality, 196.

End Notes

[i] GEN David G. Perkins, “Multi-Domain Battle: Driving Change to Win in the Future,” Military Review (July-August 2017): 8.

[ii] Jonathan Bott, “Outlining the Multi-Domain Battle Concept,” June 8, 2017, accessed August 19, 2017, https://overthehorizonmdos.com/2017/06/08/outlining-the-multi-domain-operating-concept/.

[iii] Andrey V. Kartapolov, “Lessons of Military Conflicts and Prospects for the Development of Resources and Methods of Conducting Them. Direct and Indirect Actions in Contemporary International Conflicts,” Vestnik Akademii Voennykh Nauk 2 (Journal of the Academy of Military Science 2) (2015): 35, quoted in Timothy Thomas, “The Evolving Nature of Russia’s Way of War,” Military Review (July-August 2017): 39.

[iv] Ibid., 40.

[v] US Army Training and Doctrine Command, White Paper, “Multi-Domain Battle: Combined Arms for the 21st Century,” February 24, 2017, accessed July 19, 2017, http://www.tradoc.army.mil/multidomainbattle/docs/MDB_WhitePaper.pdf.

[vi] Mike Chapple and David Seidl, Cyberwarfare: Information Operations in a Connected World (Burlington, MA: Jones and Bartlett Learning, 2015), 389, accessed August 19, 2017, https://books.google.com/books?id=EVwtBAAAQBAJ&printsec=frontcover&dq=cyberwarfare&hl=en&sa=X&ved=0ahUKEwi2-u695uTVAhUp74MKHXYTDU0Q6AEITzAG#v=onepage&q=cyberwarfare%20defined&f=false.

[vii] US Department of the Army, Army Doctrinal Reference Publication (ADRP) 3-0, Operations (Washington, DC: Government Printing Office, 2016), 2-1.

[viii] Ibid., 2-7.

[ix] Robert R. Leonhard, Fighting by Minutes: Time and the Art of War (Westport, CT: Praeger, 1994).

[x] US Army Training and Doctrine Command, White Paper, “Multi-Domain Battle: Combined Arms for the 21st Century,” February 24, 2017, 1, accessed July 19, 2017, http://www.tradoc.army.mil/multidomainbattle/docs/MDB_WhitePaper.pdf.

[xi] US Department of Defense, Joint Operational Access Concept (JOAC) Version 1.0 (Washington, DC:  United States Department of Defense, 2012), Foreword, accessed August 19, 2017,  https://www.defense.gov/Portals/1/Documents/pubs/JOAC_Jan%202012_Signed.pdf.

[xii] Ibid., ii.

[xiii] US Joint Staff Joint Force Development (J7)- Future Joint Force Development, Cross-Domain Synergy in Joint Operations, Planner’s Guide, January 14, 2016, 1, accessed August 19, 2017, http://www.dtic.mil/doctrine/concepts/joint_concepts/cross_domain_planning_guide.pdf.

[xiv] A defensive task is a, “task conducted to defeat an enemy attack, gain time, economize forces, and develop conditions favorable for offensive or stability tasks.” US Department of the Army, Army Doctrinal Reference Publication (ADRP) 3-0, Operations (Washington, DC: Government Printing Office, 2016), 3-4.

[xv] The main purpose of the offense, “is to defeat, destroy, or neutralize the enemy force.” US Department of the Army, Army Doctrinal Reference Publication (ADRP) 3-90, Offense and Defense (Washington, DC: Government Printing Office, 2012), 3-1.

[xvi] John Andreas Olsen and Martin van Creveld, The Evolution of Operational Art: From Napoleon to the Present (Oxford: Oxford University Press, 2011), 1.

[xvii] US Department of Defense, Joint Publication 3-0, Joint Operations (Washington, DC: United States Department of Defense, 2017), xii, accessed September 12, 2017, http://www.dtic.mil/doctrine/new_pubs/jp3_0.pdf.

[xviii] Ibid., II-4.  

[xix] US Department of Defense, Joint Publication 5-0, Joint Planning (Washington, DC: United States Department of Defense, 2017), IV-19, accessed September 12, 2017, http://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp5_0_20171606.pdf.

[xx] Antulio J. Echevarria “American Operational Art, 1917-2008.” In The Evolution of Operational Art: From Napoleon to the Present, edited by John Andreas Olsen and Martin van Creveld (New York: Oxford University Press, 2011), 155.

[xxi] US Department of the Army, Army Doctrinal Reference Publication (ADRP) 3-0, Operations (Washington, DC: Government Printing Office, 2016), 2-1.

[xxii] Ibid., 2-4.

[xxiii] Robert M. Epstein, Napoleon’s Last Victory and the Emergence of Modern War (Lawrence, KS: University Press of Kansas, 1994), 6.

[xxiv] James, J. Schneider, Vulcan’s Anvil: The American Civil War and the Foundations of Operational Art, Theoretical Paper No. Four (Fort Leavenworth, KS: School of Advanced Military Studies, Command and General Staff College, 1992), 28.

[xxv] Ibid., 35-58.

[xxvi] Shimon Naveh, The Cummings Center Series, vol. 7, In Pursuit of Military Excellence: The Evolution of Operational Theory (London: Frank Cass, 1997), 13-14.

[xxvii] Ibid., 16.

[xxviii] Ibid., 16-17.

[xxix] Ibid., 17.

[xxx] Ibid., 18.

[xxxi] Ibid., 19.

[xxxii] Jacob W. Kipp, “The Tsarist and Soviet Operational Art, 1853-1991,” in The Evolution of Operational Art: From Napoleon to the Present, edited by John Andreas Olsen and Martin van Creveld (New York: Oxford University Press, 201), 65.

[xxxiii] Aleksandr Svechin, Strategy, ed. Kent D. Lee (Minneapolis, MN: East View Publications, 1992), 247.

[xxxiv] Kipp, “The Tsarist and Soviet Operational Art, 1853-1991,” 70-71.

[xxxv] M. N. Tukhachevskii, ‘Voina’ (War), 1926, in A.B. Kadishev (ed.), Voprosy strategii I operativnogo iskusstva v sovetkikh voennykh trudakh 1917-1940 gg. (Questions of Strategy and Operational Art in Soviet Military Works 1917-1940) (Moscow, 1965), pp 104-5 quoted in Shimon Naveh, The Cummings Center Series, vol. 7, In Pursuit of Military Excellence: the Evolution of Operational Theory (London: Frank Cass, 1997), 10-11.

[xxxvi] Naveh, The Cummings Center Series, vol. 7, In Pursuit of Military Excellence: The Evolution of Operational Theory, 11.

[xxxvii] Georgii Samoilovich Isserson, The Evolution of Operational Art, translated by Bruce W. Menning (Fort Leavenworth: Combat Studies Institute Press, 2013), 67-69.

[xxxviii] Andrey V. Kartapolov, “Lessons of Military Conflicts and Prospects for the Development of Resources and Methods of Conducting Them. Direct and Indirect Actions in Contemporary International Conflicts,” Vestnik Akademii Voennykh Nauk 2 (Journal of the Academy of Military Science 2) (2015): 35, quoted by Timothy Thomas, “The Evolving Nature of Russia’s Way of War,” Military Review (July-August 2017): 39.

[xxxix] Ibid., 40.

[xl] Timothy L. Thomas, Kremlin Kontrol: Russia’s Political-Military Reality (Fort Leavenworth, KS: Foreign Military Studies Office, 2017), 176.

[xli] V.B Veprentsev, A.V. Manoylo, A.I. Petrenko, and D.B. Frolov, Operations in Information-Psychological War: Short Encyclopedic Dictionary, Moscow: Hotline—Telecom, 2011, pp. 446-448 quoted in Timothy L. Thomas, Kremlin Kontrol: Russia’s Political-Military Reality (Fort Leavenworth, KS: Foreign Military Studies Office, 2017), 177.

[xlii] S. Leonenko, “On Reflexive Control of the Enemy,” Armeyskiy Sbornik (Army Digest), No. 8 1995, p. 28, quoted in Timothy L. Thomas, Kremlin Kontrol: Russia’s Political-Military Reality, (Foreign Military Studies Office, Fort Leavenworth, KS, 2017), 179.

[xliii] V.L. Makhnin, “Reflexive Processes in Military Art: The Historico-Gnoseological Aspect,” Voennaya Mysl’ (Military Thought), No. 1 2013, p. 40 quoted by Timothy L. Thomas, Kremlin Kontrol: Russia’s Political-Military Reality, (Fort Leavenworth, KS: Foreign Military Studies Office, 2017), 188.

[xliv] Timothy L. Thomas, Kremlin Kontrol: Russia’s Political-Military Reality, 194.

[xlv] US Department of Defense, The Department of Defense Cyber Strategy (Washington, DC: Government Printing Office, 2015), 4-5.

[xlvi] Ibid., 7-8.

[xlvii] US Department of Defense, Joint Staff. Joint Publication (JP) 3-12 (R), Cyberspace Operations (Washington, DC: Government Printing Office, 2013), v.

[xlviii] Ibid., v-viii.

[xlix] Ibid., I-6.

[l] Ibid., II-2.

[li] Ibid., II-2.

[lii] Ibid., II-3.

[liii] Ibid., II-4-II-5.

[liv] Ibid., II-5.

[lv] Ibid.

[lvi] US Department of Defense, Joint Staff. Joint Publication (JP) 3-0, Joint Operations (Washington, DC: Government Printing Office, 2017), III-26.

[lvii] US Department of the Army, Field Manual (FM) 3-12, Cyberspace and Electronic Warfare Operations (Washington, DC: Government Printing Office, 2017), 3-22.

[lviii] Ibid., 3-23.

[lix] Ibid.

[lx] Ibid.

[lxi] US Joint Staff Joint Force Development (J7)- Future Joint Force Development, Cross-Domain Synergy in Joint Operations, Planner’s Guide, Preface.

[lxii] US Department of Defense, Joint Operational Access Concept (JOAC) Version 1.0, Foreword.

[lxiii] Ibid., ii.

[lxiv] US Joint Staff Joint Force Development (J7)- Future Joint Force Development, Cross-Domain Synergy in Joint Operations, Planner’s Guide, 5.

[lxv] Alexander L. George, Case Studies and Theory Development in the Social Sciences, Besia Studies in International Security (Cambridge, MA: MIT Press, 2005), 67.

[lxvi] Ibid., 67.

[lxvii] Ibid.

[lxviii] David Collier, “Comparative Historical Analysis: Where Do We Stand?” American Political Science Association: Comparative Politics Newsletter, No. 10 (Winter 1999): 1-6.

[lxix] Richard B. Frank, Guadalcanal: The Definitive Account of the Landmark Battle (New York: Penguin, 1992, 1990), 24-25.

[lxx] Ibid., 25.

[lxxi] William H. Bartsch, Williams-Ford Texas A&M University Military History Series, vol. 147, Victory Fever On Guadalcanal: Japan's First Land Defeat of World War II (College Station: Texas A&M University Press, 2014), 6-7.

[lxxii] Frank, Guadalcanal: The Definitive Account of the Landmark Battle, 207.

[lxxiii] The Navy Department Library, Naval History and Heritage Command, U.S. Radar Operational Characteristics of Radar Classified by Tactical Application, FTP 217, prepared by Authority of the Joint Chiefs of Staff, by the Radar Research and Development Sub-Committee of the Joint Committee on New Weapons and Equipment, 1 August 1943, accessed October 27, 2017, https://www.history.navy.mil/research/library/online-reading-room/title-list-alphabetically/u/operational-characteristics-of-radar-classified-by-tactical-application.html#sss.

[lxxiv] Robert Edward Lee, Victory at Guadalcanal (Novato, CA: Presidio Press, 1981), 253.

[lxxv] Frank, Guadalcanal: The Definitive Account of the Landmark Battle, 426.

[lxxvi] Charles W. Koburger, Pacific Turning Point: The Solomons Campaign, 1942-1943 (Westport, CT: Praeger, 1995), 118.

[lxxvii] Frederik Nebeker, Dawn of the Electronic Age: Electrical Technologies in the Shaping of the Modern World, 1914 to 1945 (Piscataway, NJ: IEEE, 2009), 404.

[lxxviii] Ibid.

[lxxix] Rodney Carlisle, Encyclopedia of Intelligence and Counterintelligence (London, England: Routledge, 2015), 721-724, accessed October 31, 2017, http://ebookcentral.proquest.com/lib/columbia/detail.action?docid=2005326.

[lxxx] Frank, Guadalcanal: The Definitive Account of the Landmark Battle, 127.

[lxxxi] Louis Brown, A Radar History of World War II: Technical and Military Imperatives (Bristol: Institute of Physics Pub., 1999), 249.

[lxxxii] Ibid., 250.

[lxxxiii] Frank, Guadalcanal: The Definitive Account of the Landmark Battle, 294.

[lxxxiv] Brown, A Radar History of World War II: Technical and Military Imperatives, 256-258.

[lxxxiv] Ibid., 250.

[lxxxv] Ibid., 258.

[lxxxvi] Alfred Price, The History of US Electronic Warfare, Volume I “The Years of Innovation-Beginnings to 1946” (Westford, MA: The Association of Old Crows, 1984), 47-49.

[lxxxvii] Frank, Guadalcanal: The Definitive Account of the Landmark Battle, 426.

[lxxxviii] US Department of Defense, Joint Operational Access Concept (JOAC) Version 1.0, Foreword.

[lxxxix] US Army Training and Doctrine Command, “Multi-Domain Battle: Evolution of Combined Arms for the 21st Century 2025-2040, Version 1.0,” October, 2017, accessed October 19, 2017, https://admin.govexec.com/media/20171003_-_working_draft_-_concept_document_for_multi-domain_battle_1_0.pdf.

[xc] Frank, Guadalcanal: The Definitive Account of the Landmark Battle, 426.

[xci] Ibid., 490.

[xcii] Ibid., 520.

[xciii] Ibid.

[xciv] Ibid., 534.

[xcv] Brown, A Radar History of World War II: Technical and Military Imperatives, 250.

[xcvi] Koburger, Pacific Turning Point: The Solomons Campaign, 1942-1943, 119.

[xcvii] Lundstrom, The First Team and the Guadalcanal Campaign: Naval Fighter Combat from August to November 1942, quoted in Louis Brown, A Radar History of World War II: Technical and Military Imperatives, 248.

[xcviii] Devereux, Messenger Gods of Battle: Radio, Radar, Sonar, the Story of Electronics in War, 219.

[xcix] Price, The History of US Electronic Warfare, Volume I “The Years of Innovation-Beginnings to 1946,” 291.

[c] Ibid., 289-290.

[ci] Williamson Murray and Allan R. Millett, editors Military Innovation in the Interwar Period (Cambridge: Cambridge University Press, 1998), 358.

[cii] Ibid., 358.

[ciii] Ibid.

[civ] USSR report, Military Affairs, Provisional Field Regulations for the Red Army, Vremennyy Polevoy Ustav, RKKA 1936 (PU 36) original in Russian, 1937, pp. 1-261, (Foreign Broadcast Information Service, June 12, 1986), 52-53, accessed November 1, 2017, handle.dtic.mil/100.2/ADA361873.

[cv] Thomas, Kremlin Kontrol: Russia’s Political-Military Reality, 176.

[cvi] Abdul Karim Baram, Technology in Warfare: The Electronic Dimension (Abu Dhabi, United Arab Emirates: Emirates Center for Strategic Studies and Research, 2008), 129.

 

About the Author(s)

LTC Ronald W. Sprang is an infantry officer currently serving as the G5, Chief of Plans, for III Corps. He has served in combat as a rifle platoon leader (OIF I) in the 101st Airborne Division, twice as a company commander (2x Iraq deployments) in the 1st Cavalry Division, and as a battalion and brigade operations officer (Afghanistan) in the 10th Mountain Division. In his most recent deployment, he served as the deputy CJ35 (future operations) Chief of Plans for Combined Joint Task Force-Operation Inherent Resolve.