Military Review English Edition November-December 2013 | Page 84
of warfare, A2/AD specializes in avoiding U.S.
strengths while targeting American vulnerabilities
and dependencies.
Fighting against A2/AD, new challenges emerge
and familiar challenges take on new forms. For
example, in the hands of an agile, adaptive, and
aware A2/AD adversary, time becomes a weapon
when its short, sharp, rapid onset denies America
time to mobilize its resolve, economy, Reserves, and
National Guard completely by blunting the projection of military forces. Moreover, America’s ability
to operate from convenient regional sanctuaries to
safely mass forces and effects, build combat power,
stage logistics, and reinforce a campaign are the
key U.S. activities an A2/AD adversary will seek
to continuously preclude.
Before an A2/AD crisis becomes a full-blown
conflict elsewhere, America’s government, military,
and private sector coul d suffer large-scale, widearea, or focused cyberspace attacks whose purposes
are to cripple America’s ability to mobilize, generate, deploy, and fight. Harkening to total war, our
adversaries may utilize cyber attacks to undermine
U.S. and ally public support for military operations.
Elsewhere, at relevant American forward bases, the
A2/AD adversary’s missile forces may compel a
U.S. defensive posture before America can deploy
adequate missile defense capacity.
To sketch some broad campaign strokes of what
A2/AD looks and sounds like, here is a notional
basket of hostile activities any A2/AD adversary
or competitor could undertake today. In those portions of the operations area where the adversary’s
navy has sufficient freedom of action, it could mine
littoral waters and cripple U.S. expeditionary naval
forces and the maritime portion of the joint force
logistics enterprise just as America is attempting to
ramp up presence and build combat power. Missile
raids against area U.S. Navy surface warfare groups
may cause them to retire to mitigate risk of further
attack. In space, using skills and access credentials
stolen beforehand, the adversary could disrupt control of U.S. space assets and degrade orbital platform
services with a three-way combination of offensive
counterspace, offensive electromagnetic, and offensive counternetwork effects. To preclude a force
buildup or to attack a massed force, key regional
bases could suffer withering missile raids that
damage facilities, delay reinforcement, and obstruct
82
Potential Land Force Targets
RECONNAISSANCE:
• Key terrain, A2/AD systems
• Potential routes, corridors, zones
for follow-on joint force operations
RAIDS:
• Shore, coastal anti-ship missile
batteries
• Integrated air defense sites, facilities
• Adversary C4ISR nodes
• Adversary telecom sites
• Key adversary logistics facilities
SEIZURES
• Missile trans-shipment, storage sites
• Missile staging, assembly, firing
areas
• Maritime mine storage, staging sites
• Electromagnetic effects generation
sites
Figure 3: Potential Land Force Targets
the buildup of combat power. Overall, adversary
attacks in every domain using kinetic and nonkinetic
force may rapidly cripple the U.S. logistics enterprise
all the way back to the continental U.S. zip codes.
Finally, because in war all sides have a story to tell,
a war of counterinformation within the larger conflict
will shift into hyperdrive as the adversary bombards
media arenas with psychological shaping whose
purpose is less to inform and more to undermine
U.S. credibility and presence. That is certainly not
an all-inclusive list of what A2/AD can do, but these
points establish a foundation from which to tether
the goals of A2/AD.5
As shown in figure 4, nations employing A2/
AD have four goals; however, it is inaccurate to
November-December 2013
• MILITARY REVIEW