Department of Defense

Restricted U.S. Army Special Forces Military Free-Fall Operations Manual

DODD 5100.01 tasks the Army to “train and equip, as required, forces for airborne operations, in coordination with the other military Services, and in accordance with joint doctrine.” This guidance directs the Army, which has primary responsibility for the development of airborne doctrine, procedures, and techniques, to develop, in coordination with the other military Services, doctrine, procedures, and equipment that are of common interest.

U.S. Army Future Warfare Division White Paper: Operationalizing Robotic and Autonomous Systems in Support of Multi-Domain Operations

Robotic and Autonomous Systems (RAS) and artificial intelligence (AI) are fundamental to the future Joint Force realizing the full potential of Multi-Domain Operations (MDO 1.5). These systems, in particular AI, offer the ability to outmaneuver adversaries across domains, the electromagnetic (EM) spectrum, and the information environment. The employment of these systems during competition allows the Joint Force to understand the operational environment (OE) in real time, and thus better employ both manned and unmanned capabilities to defeat threat operations meant to destabilize a region, deter escalation of violence, and turn denied spaces into contested spaces. In the transition from competition to armed conflict, RAS and AI maneuver, fires, and intelligence, surveillance, and reconnaissance (ISR) capabilities provide the Joint Force with the ability to deny the enemy’s efforts to seize positions of advantage.

The U.S. Army in Multi-Domain Operations 2028

From Multi-Domain Battle to Multi-Domain Operations. TRADOC Pamphlet 525-3-1, The U.S. Army in Multi-Domain Operations 2028 expands upon the ideas previously explained in Multi-Domain Battle: Evolution of Combined Arms for the 21st Century. It describes how the Army contributes to the Joint Force’s principal task as defined in the unclassified Summary of the National Defense Strategy: deter and defeat Chinese and Russian aggression in both competition and conflict. The U.S. Army in Multi-Domain Operations concept proposes detailed solutions to the specific problems posed by the militaries of post-industrial, information-based states like China and Russia. Although this concept focuses on China and Russia, the ideas also apply to other threats.

Domestic Operational Law Handbook for Judge Advocates 2018

The Domestic Operational Law (DOPLAW) Handbook for judge advocates is a product of the Center for Law and Military Operations (CLAMO). The content is derived from statutes, Executive Orders and Directives, national policy, DoD Directives and Instructions, joint publications, service regulations, field manuals, as well as lessons learned by judge advocates and other practitioners throughout Federal and State government. This edition includes substantial revisions.

Restricted U.S. Army Space Operations Manual

FM 3-14, Army Space Operations, provides an overview of space operations in the Army and is consistent and compatible with joint doctrine. FM 3-14 links Army space operations doctrine to joint space operations doctrine as expressed in JP 3-14, Space Operations and other joint doctrinal publications. This FM establishes guidance for employing space and space-based systems and capabilities to support United States (U.S.) Army land warfighting dominance. It provides a general overview of overhead support to Army operations, reviews national guidance and direction, and outlines selected unique space-related Army capabilities. The doctrine in this manual documents Army thought for the best use of space capabilities. This manual also contains tactics and procedures outlining how to plan, integrate, and execute Army space operations.

Joint Publication 3-12 Cyberspace Operations

Cyberspace operations (CO) is the employment of cyberspace capabilities where the primary purpose is to achieve objectives in or through cyberspace. This publication focuses on military operations in and through cyberspace; explains the relationships and responsibilities of the Joint Staff (JS), combatant commands (CCMDs), United States Cyber Command (USCYBERCOM), the Service cyberspace component (SCC) commands, and combat support agencies; and establishes a framework for the employment of cyberspace forces and capabilities.

DoD Forensic Science Lexicon

The Department of Defense (DoD) performs forensic science in a collaborative environment which necessitates the clear communication of all activities and their results. A critical enabler of communication is the use of a clear, internally consistent vocabulary. The goal of the Department of Defense Forensics Lexicon is to provide an operational vocabulary to address Forensics. A shared vocabulary enables a common understanding of Forensics, enhances the fidelity and the utility of operational reporting, facilitates structured data sharing, and strengthens the decision making processes across the DoD.

(U//FOUO) DIA Study: Warp Drive, Dark Energy, and the Manipulation of Extra Dimensions

If one is to realistically entertain the notion of interstellar exploration in timeframes of а human lifespan, а dramatic shift in the traditional approach to spacecraft propulsion is necessary. It has been known and well tested since the time of Einstein that all matter is restricted to motion at sublight velocities ( << З х 10⁸ m/s, the speed of light, or с), and that as matter approaches, the speed of light, its mass asymptotically approaches infinity. This mass increase ensures that an infinite amount of energy would Ье necessary to travel at the speed of light, and, thus, this speed is impossible to reach and represent an absolute speed limit to all matter traveling through spacetime.

(U//FOUO) DIA Study: Advanced Space Propulsion Based оn Vacuum (Spacetime Metric) Engineering

А theme that has come to the fore in advanced рlаnniпg for long-range space exploration in the future is the соnсерt that empty space itself (the quantum vacuum, or spacetime metric) might bе engineered to provide energy/thrust for future space vehicles. Although far reaching, such а proposal is solidly grounded iп modern physical theory, аnd therefore the possibility that matter/vacuum iпteractions might bе engineered for spaceflight applications is nоt а priori ruled out.

U.S. Army Threat Tactics Report: Russia

In the last seven years, Russia has reasserted itself as a military force in Eastern Europe and the Caucasus. With the 2008 military incursion into Georgia and the 2014 seizure of Crimea and support for pro-Russian separatists in Ukraine, Russia has assumed a more aggressive, interventionist stance in Europe. In the effort to influence events in Ukraine, the Russians have used what the US Army defines as “Hybrid Warfare” to infiltrate, isolate, and dominate eastern Ukraine and Crimea. This is all a part of the strategy of what can be called “Indirect Action”—the belief by the Russians that they reserve the right to protect ethnic Russians and interests in their former states from domination by Western powers and NATO.

The Expanding Spectrum of Espionage by Americans, 1947–2015

The report describes characteristics of 209 Americans who committed espionage-related offenses against the U.S. since 1947. Three cohorts are compared based on when the individual began espionage: 1947-1979, 1980-1989, and 1990-2015. Using data coded from open published sources, analyses are reported on personal attributes of persons across the three cohorts, the employment and levels of clearance, how they committed espionage, the consequences they suffered, and their motivations. The second part of the report explores each of the five types of espionage committed by the 209 persons under study. These include: classic espionage, leaks, acting as an agent of a foreign government, violations of export control laws, and economic espionage. The statutes governing each type are discussed and compared. Classification of national security information is discussed as one element in espionage. In Part 3, revisions to the espionage statutes are recommended in light of findings presented in the report.

(U//FOUO) DoD Nuclear Posture Review Draft January 2018

On January 27th, the President directed the Department of Defense to conduct a new Nuclear Posture Review (NPR) to ensure a safe, secure, and effective nuclear deterrent that safeguards the homeland, assures allies, and deters adversaries. This review comes at a critical moment in our nation’s history, for America confronts an international security situation that is more Complex and demanding than any since the end of the Cold War. In this environment, it is not possible to delay modernization of our nuclear forces and remain faithful sentinels Of our nation’ s security and freedom for the next generation as well as our own.

U.S. Army Study: Envisioning the Deep Future of Small Arms 2022-2042

In the summer of 2012, HQDA G3 provided a presentation to the Chief of Staff of the Army (CSA) focused on small arms overmatch at the squad level. This presentation resulted in questions raised by the CSA regarding the nature of the Army’s holistic strategy for small arms dominance into the future. HQDA G3 received the task to follow up on these questions and present back to the CSA a comprehensive small arms strategy. In support of the HQDA G3 mission, ASA(ALT) SAAL-ZT as the responsible agent for the Army’s science and technology investments, agreed to identify and prioritize future concepts with potential to enable long-term small arms overmatch for US military forces from the period 2020-2040+.

U.S. Army Threat Tactics Report: North Korea

The Korean peninsula is a location of strategic interest for the US in the Pacific Command (PACOM), and many observers note that North Korea is an unpredictable and potentially volatile actor. According to the Department of Defense in its report to Congress and the intelligence community, the DPRK “remains one of the United States’ most critical security challenges for many reasons. These include North Korea’s willingness to undertake provocative and destabilizing behavior, including attacks on the Republic of Korea (ROK), its pursuit of nuclear weapons and long-range ballistic missiles, and its willingness to proliferate weapons in contravention of United Nations Security Council Resolutions.”

Joint Staff Strategic Multilayer Assessment: Influence in an Age of Rising Connectedness

In the pluralized, multipolar world, in which military and economic sources of power are widely distributed and technologies are making nation states increasingly more porous, the US and its partners face significant challenges on how best to adapt and thrive in a period of revolutionary changes. These factors may change the way US analysts, planners, and operators evaluate approaches in order to affect and direct the outcomes of military operations. To date, such courses of actions to a large extend have focused on compelling adversaries through the threat or application of force to achieve victory (i.e., “control”). In this changing geopolitical/technical landscape, it is increasingly clear that the DOD needs complement “control” with an explicit focus upon “influence” factors and forces that produce desired behavioral outcomes across complex and intermeshed human and technical systems.

Asymmetric Warfare Group Lessons Learned from Modern Urban Operations from 1980 to the Present

Urban warfare is not a new phenomenon. The U.S. Army saw urban combat in the Revolutionary War, the War of 1812, the Civil War, and elsewhere. Starting with World War II, overall armed conflict began to occur around centers with a high population density. This new backdrop for conflict has caused a whole new set of challenges, especially in an era of public scrutiny. The “Army’s capacity to engage, fight, and win major urban combat operations will determine the success of future operational and strategic endeavors.”

InterAgency Board Recommendations on Personal Protective Equipment and Decontamination Products for Fentanyl Exposure

Increased illicit use of opioids, including synthetic opioids such as fentanyl and its analogue carfentanil, is a source of increased risk to responders. Most routine encounters between patients or detainees and EMS or law enforcement do not present a significant threat of toxic exposure. While there are anecdotal reports of public safety personnel being exposed to opioids during operations, they are largely unconfirmed. To proactively address the potential risks, this document establishes guidance for personal protective equipment selection and use, decontamination, detection, and medical countermeasures for first responders who may be exposed to opioids in the course of their occupational activities. Throughout the remainder of this document, the term synthetic opioids will be used to include fentanyl, fentanyl analogues, morphine analogues, the U-series opioids, and others.

(U//FOUO) Asymmetric Warfare Group Russian New Generation Warfare Handbook

As the American Army fought in Iraq and Afghanistan, it became the best tactical level counter insurgency force of the modern era. America’s enemies, however, did not rest. Russia observed the transformation of the American Army and began a transformation of their own. This new military barely resembles its former Soviet self. Wielding a sophisticated blend of Unmanned Aircraft Systems (UAS), electronic warfare (EW) jamming equipment, and long range rocket artillery, it took the Soviet model out of the 1980s and into the 21st Century.

U.S. Army Mad Scientist Conference Report: The 2050 Cyber Army

The Mad Scientist 2050 Cyber Army project explored the visualization of the Army’s Cyber Force out to 2050 and its ability to address three major objectives of the Army’s Cyberspace Strategy for Unified Land Operations 2025: What does the cyber environment look like in 2040-2050 (how will cyber influence the environment and the population? What will connecting look like / what will they connect to? What are the drivers influencing this or not)? How do we build an Army Cyber Force that can dominate the cyber domain in the context of the multi-domain battle concept to gain a position of relative advantage? How can we build shared goals and expectations as well as develop an understanding of roles and responsibilities in order to build and maintain partnerships with U.S., and international academia, industry, defense departments/ministries and other agencies to enhance cyberspace operations? What new ideas should we be considering? Co-sponsored by the TRADOC G-2 and the Army Cyber Institute at the United States Military Academy, the 2050 Cyber Army project leveraged submitted papers, an on-line technology survey, and a 13-14 September Mad Scientist Conference that generated the insights synthesized in this report.

Defense Intelligence Agency Russia Military Power Report 2017

As part of this vision, DIA has a long history of producing comprehensive and authoritative defense intelligence overviews. In September 1981, Secretary of Defense Caspar Weinberger asked the Defense Intelligence Agency to produce an unclassified overview of the Soviet Union’s military strength. The purpose was to provide America’s leaders, the national security community, and the public a complete and accurate view of the threat. The result: the first edition of Soviet Military Power. DIA produced over 250,000 copies, and it soon became an annual publication that was translated into eight languages and distributed around the world. In many cases, this report conveyed the scope and breadth of Soviet military strength to U.S. policymakers and the public for the first time.

Restricted U.S. Army Special Forces Guide to Information Operations

This TC serves as a guide to describe the fundamentals of how to incorporate IO at the tactical and operational level. Appendixes A through F offer tactics, techniques, and procedures (TTP) Special Forces (SF) Soldiers can use to analyze and plan information operations. This TC implements Army and joint IO doctrine established in FM 3-13, Inform and Influence Activities, and Joint Publication (JP) 3-13, Information Operations. This TC reinforces the definition of IO used by Army forces: IO employs the core capabilities of electronic warfare (EW), computer network operations (CNO), Military Information Support operations (MISO), military deception (MILDEC), and operations security (OPSEC), in concert with specified supporting and related capabilities, to affect or defend information and information systems and to influence decisionmaking. This TC is specifically targeted for SF; however, it is also useful to Army special operations forces (ARSOF) and the Army in understanding how SF employs IO.