UNCLASSIFIED // FOR EDUCATIONAL AND ANALYTICAL PURPOSES // CENTER FOR COMPETITIVE STATECRAFT AND STRATEGIC POLICY // WP-2026 // MDO-01 v3.0
WP-2026 Series · Paper MDO-01 v3.0 · March 2026
Multi-Domain Operations Doctrine

Strategic Framework,
Execution Architecture,
and the Three-Track Analytic Model

Final Edition — v3.0 polish pass: compression, confidence standardization, tonal uniformity. Pairs with MDO-01-v3.docx.

Version
3.0 — Final
Classification
Unclassified // Open Source
Authority
Style Guide v3.0 · ODNI Standards
Reads Into
HORMUZ-01/02 · SHIELD-01 · PERSIST-01
Revision History
v1 initial · v2 red-team structural · v3 polish
Notice
Unclassified open-source analytical product. All content derived from publicly available doctrine, government publications, and open-source academic sources. The three-track framework is an analytic organizing construct — not a formally codified U.S. decision architecture. Claims derived by logical extension are labeled ANALYTICALLY INFERRED. Where the public record does not sustain a firm judgment, the limit is stated explicitly.
Part I

Methodological Note and Key Judgments

1.1 Analytical Posture and Scope

This paper constructs a consolidated reference framework for multi-domain operations (MDO) at the strategic and operational levels. Version 3.0 is the final polish pass following structural revision in v2.0, which addressed four red-team findings: overstatement of the three-track framework's formal status, confidence labels outrunning evidence, insufficient interagency and coalition friction, and insufficient adversary-facing analysis.

Each section separates Documented Doctrine, Public-Law Authority, and Analytic Assessment. The paper applies a three-track analytic model — Diplomatic, Overt Warfare, and Clandestine/Covert — to organize the principal channels of U.S. state power in competition and conflict.

1.1a Confidence Lexicon

High Confidence
Directly supported by multiple independent Tier 1 sources. Analytic inference minimal.
Moderate Confidence
Supported by Tier 1/2 sourcing with meaningful inference or an unresolved variable.
Low-Moderate Confidence
Structurally sound inference from indirect public reporting.
Low Confidence
Primarily analytic inference. Reasonable alternative conclusions exist.
Analytically Inferred
Derived by logical extension from documented premises. Not directly observed.
Scenario-Conditioned
Valid only under stated premises. Not a prediction.

1.2 Key Judgments

Six judgments govern this paper. Each carries a probability word, a confidence tag, a stated basis, a principal counterargument, and the condition that would change the confidence assessment. Click any judgment to expand the analytical sub-elements.

1
High Confidence · Doctrine-Supported

MDO is almost certainly the governing joint warfighting concept for peer and near-peer conflict, codified in FM 3-0 (2022) and JP 3-0. Its central mechanism — convergence of cross-domain effects timed to exceed adversary decision-cycle speed — is directly documented.

Basis
Primary doctrine: FM 3-0 (October 2022); JP 3-0 (2022).
Principal Counterargument
MDO remains contested; critics hold that cross-service interoperability gaps prevent the concept from functioning as specified.
What Would Change Confidence
Public evidence of CCMD-level rejection of MDO in favor of a competing concept.
2
Moderate Confidence · Analytically Inferred

The three-track framework likely reflects the principal channels through which U.S. state power has been employed in documented strategic campaigns. It is an analytic construct — not a formally codified U.S. decision architecture.

Basis
Cross-reference of IEEPA, Title 10, Title 50 authorities, official strategy documents, and observed practice.
Principal Counterargument
Real campaigns blur track boundaries; the paper's categorical structure is likely neater than actual interagency practice.
What Would Change Confidence
Formal government codification or explicit rejection of this categorical structure.
3
Low-Moderate Confidence · Analytically Inferred

Submarine and undersea forces may offer greater survivability and operational flexibility than surface or air assets under current ASW technology conditions. Comparative ranking across asset classes is not supported by the open-source record and is not asserted.

Basis
CBO FY2024 Navy Submarine Programs; public USN posture statements on acoustic survivability.
Principal Counterargument
PRC ASW investment trajectories may narrow the survivability gap by the late 2030s; long-range air-launched strike may provide comparable effect at lower political risk.
What Would Change Confidence
Public reporting on adversary ASW capability closing the acoustic detection margin.
4
Low-Moderate Confidence · Analytically Inferred

MISO may contribute to shaping the pre-conflict competition environment when integrated with diplomatic signaling, cyber effects, and economic measures. The public record does not permit isolated causal attribution of behavioral change to information operations.

Basis
JP 3-13.2 doctrine; reported use in Ukraine and Gulf campaigns.
Principal Counterargument
PRC media control and Russian domestic narrative management materially limit target audience accessibility for U.S. MISO against primary peer adversaries.
What Would Change Confidence
Independently evaluated public evidence of MISO producing specific, measurable adversary behavioral change.
5
Low-Moderate Confidence · Analytically Inferred

Multilateral sanctions likely impose greater cost on target states than unilateral designation. Whether that cost differential produces strategic behavioral change is not established by the open-source record and is not asserted.

Basis
OFAC Annual Report FY2024; Iran JCPOA case (contributory); Russia 2022 counter-case (cost without behavioral change).
Principal Counterargument
Three of four major post-2014 sanctions regimes have not demonstrably altered core adversary strategic behavior.
What Would Change Confidence
Documented causal linkage between sanctions cost and operational constraint in a peer-equivalent adversary.
6
Low Confidence · Analytically Inferred

Clandestine and covert options may be considered in gray-zone and pre-conflict phases because they impose cost below the armed conflict threshold and preserve diplomatic optionality. The public record does not permit confident assessment of their frequency, effectiveness, or comparative preference.

Basis
Statutory authorities; publicly reported covert programs in Afghanistan, Syria, Ukraine.
Principal Counterargument
Presidential Finding requirements and interagency friction may make covert action slower and more politically costly than the framework implies; proxy/partner outcomes have been mixed.
What Would Change Confidence
Systematic public evaluation of covert option effectiveness comparable to unclassified RAND after-action assessments.
Part II

Strategic Doctrine and the Three-Track Analytic Model

2.1 Multi-Domain Operations

Documented Doctrine

FM 3-0 (October 2022), JP 3-0 (2022), and the Chairman's Joint Warfighting Concept establish MDO as the governing framework for peer adversary operations. No single domain is decisive. Adversary A2/AD architectures deny U.S. freedom of action, primarily in air. The MDO response is convergence: simultaneous cross-domain effects timed to collapse adversary decision cycles before integrated defense responds coherently. Three operational tasks: Compete (below armed conflict); Penetrate and Disintegrate A2/AD; Exploit Freedom of Action. TIER 1 — FM 3-0, October 2022, Chs. 1–3

Analytic Assessment

This paper assesses with moderate confidence that MDO's internal logic is sound but faces three documented implementation constraints: (1) cross-domain convergence requires interoperability that remains incomplete across services; (2) the concept requires decision speed that existing command structures may not consistently deliver; (3) PRC investments in EW, space denial, and cyber specifically target the enabling architecture MDO depends upon. The principal uncertainty is whether the institutional force can execute the concept under peer-adversary contested conditions. The public record does not resolve that question. TIER 2 — RAND MDO Analysis, 2023

2.2 The Three-Track Analytic Framework

This paper applies a three-track analytic framework to organize the principal channels through which U.S. state power is employed. It is an analytic organizing construct — not a formally codified U.S. decision architecture. Real campaigns frequently blur or compress track boundaries: covert action often precedes diplomatic action; overt military presence functions as economic signaling.

Track Definition Primary Legal Authority Execution Lead Sanctions Integration
1 — Diplomatic Negotiation, deterrence signaling, coalition building, economic coercion, and international pressure through official governmental and multilateral channels. IEEPA; Arms Export Control Act; Title 22 USC; UN Charter NSC / State / Treasury OFAC Primary vehicle for sanctions designation; provides coalition legitimacy for secondary sanctions.
2 — Overt Warfare Declared or acknowledged use of military force under Title 10, including conventional operations, strikes, maritime interdiction, and power projection. AUMF; Title 10 USC; UN Charter Art. 51; LOAC/IHL SecDef / CCMD / JFC Sanctions inform target lists; maritime interdiction enforces cargo restrictions.
3 — Clandestine/Covert Deniable or unacknowledged operations including CIA covert action, SOF unconventional warfare, proxy support, offensive cyber, and information operations. Title 50 USC § 3093 (Presidential Finding required); EO 12333; Title 10 § 127e CIA SAC / JSOC / USCYBERCOM May disrupt sanctions evasion networks; operational outcomes not publicly assessed.

2.3 Authorities Overlap and Interagency Friction

The three-track model implies procedural neatness that does not reflect documented interagency practice. The following constraints are established in public reporting and congressional testimony.

Documented Interagency Friction Points
  • Contested Jurisdiction (Title 10 vs. Title 50): The 2017 Niger incident demonstrated that Section 127e authorities remain legally and politically contested when operations produce casualties; congressional oversight has tightened since.
  • Legal Review Variance: OCO against adversary critical infrastructure faces unsettled LOAC proportionality and distinction analysis that imposes real execution delays.
  • Coalition Veto Points: NATO Article 5 does not automatically generate allied operational participation. Compartmented U.S. cyber operations may not be shareable with coalition partners.
  • Attribution Thresholds: Both the 2016 DNC attribution and SolarWinds response demonstrate months-scale gaps between detection and policy authorization.
  • Escalation Management Constraints: Track 3 options may be legally available but held in reserve due to escalation concern, alliance equities, or domestic political cost. The operative question is political cost, not legal authority.
Part III

Five-Domain Warfighting Architecture

⚔️
Land
  • M1A2 SEPv3 armor
  • HIMARS / PrSM (499+ km)
  • Patriot PAC-3 / THAAD GBAD
  • BCT — armored / IBCT / Stryker
Sea
  • SSN — Virginia Block V
  • SSBN — Ohio / Trident D5
  • CVN Carrier Strike Groups
  • DDG Arleigh Burke Aegis BMD
🛩️
Air
  • F-22 / F-35 5th-gen stealth
  • B-21 Raider penetrating strike
  • JASSM-ER (1,000+ km)
  • EA-18G Growler EW
🛰️
Space
  • GPS III — PNT backbone
  • SBIRS / Next-Gen OPIR
  • WGS — wideband SATCOM
  • NRO overhead targeting
💻
Cyberspace
  • CYBERCOM — CMF 133 teams
  • Defend Forward / OCO
  • NSA SIGINT / TAO
  • Hunt Forward operations

3.1 Land Domain

Analytic Assessment

This paper assesses with moderate confidence that the primary land-domain constraint in an INDOPACOM contingency is access, not capability. The theater lacks sufficient pre-positioned Army heavy forces; strategic lift throughput via APOD/SPOD is the binding logistics constraint. The public record does not establish whether pre-positioning improvements currently underway will resolve this constraint within the relevant contingency timeline. TIER 2 — RAND INDOPACOM Logistics Analysis, 2023

3.2 Sea Domain and Submarine Architecture

Analytic Assessment

This paper assesses with low-moderate confidence that submarine forces may offer greater survivability and flexibility than surface or air assets under current ASW technology conditions. The public record supports high SSN acoustic survivability at current adversary detection capability levels. The degree to which PRC fixed-array, helicopter-dipping sonar, and UUV investments have already narrowed that margin constitutes the principal uncertainty for this judgment. Comparative leverage ranking against other asset classes is not supported by available evidence and is not asserted. TIER 1 — CBO FY2024 Navy Submarine Programs

3.3 Air Domain

Analytic Assessment

This paper assesses with moderate confidence that air superiority over Taiwan Strait or South China Sea against PRC IADS — HQ-9, S-400 derivatives, DF-21D/DF-26 — is achievable with current 5th-generation and JASSM-ER combinations, but requires attrition-based DEAD that imposes real cost. The principal vulnerability is the enabling architecture — AWACS, J-STARS, tankers — which is soft-killable via PRC cyber and ASCM. TIER 2 — CSIS China Power Project, 2024

3.4 Space Domain

Analytic Assessment

This paper assesses with moderate-high confidence, based on ODNI ATA 2025, that PRC counter-space investments — co-orbital maneuvering satellites, directed energy, jamming — target the GPS, SATCOM, and OPIR architecture MDO requires. ODNI ATA 2025 reports China "has fielded ground-based ASAT missiles" and is developing additional capabilities. Resilience measures partially offset but do not eliminate this risk. TIER 1 — ODNI ATA 2025, p. 10

3.5 Cyberspace Domain

Analytic Assessment

Public reporting indicates USCYBERCOM has conducted Hunt Forward operations in 17 countries through FY2023. The public record does not establish whether pre-positioned OCO capabilities would execute reliably against PRC integrated defense under contested electromagnetic conditions. Attribution latency is a documented constraint: both the 2016 DNC case and the SolarWinds response demonstrate months-scale gaps between detection and policy-level authorization. TIER 1 — DoD Cyber Strategy 2023

Part IV

PSYOP, Information Operations, and Economic Integration

4.1 PSYOP and Military Information Support Operations

Analytic Assessment

This paper assesses with low-moderate confidence that MISO may contribute to shaping the competition environment when integrated with diplomatic, cyber, and economic measures. The public record does not permit isolated causal attribution of behavioral change to information operations.

Adversary resilience is a documented constraint. PRC information environment controls substantially limit target audience accessibility. Russian domestic information management achieved sufficient narrative control from 2014 through at least 2022 to sustain public support for major strategic actions. This paper assesses with moderate confidence that adversary information environment architecture materially constrains U.S. MISO effectiveness against both primary peer adversaries. TIER 2 — RAND, 2023

4.2 Electronic Warfare

Documented Doctrine

EW — jamming, spoofing, deception, directed-energy — contests adversary spectrum use while protecting U.S. use. EA-18G Growler is the primary EW aircraft. EW enables SEAD/DEAD and CNE by degrading adversary radar and expanding exploitation windows. TIER 1 — USAF EW FY2024 Budget Justification

4.3 Sanctions as Economic Instrument

Public-Law Authority

OFAC administers approximately 35 active sanctions programs under IEEPA, TWEA, and specific statutory authorities. OFAC FY2024 reported $1.54 billion in civil monetary penalties. Primary sanctions restrict U.S. person dealings. Secondary sanctions restrict third-country entities. TIER 1 — OFAC Annual Report FY2024

Case Evidence
Mini-Case 1 — Iran: JCPOA
Assessment: Contributory, not isolated cause
2012–2015 sanctions (SWIFT exclusion, oil embargo) contributed to ~15–20% GDP contraction and 60% reduction in oil revenue. Iran signed JCPOA July 2015. Post-2018 maximum pressure produced no equivalent agreement — inconsistent with simple effectiveness models. TIER 1 — EIA 2015; IMF 2015
Mini-Case 2 — Russia: Behavioral Limits
Assessment: Cost imposed; behavioral change not produced
Post-2022 regime — SWIFT exclusion, $300B+ reserve freeze, export controls — produced documented costs but GDP contracted only ~2.1% in 2022. Military operations continued through 2024. Primary counter-case to claims of sanctions decisiveness. TIER 1 — OFAC Russia Designations FY2022–2024
Mini-Case 3 — DPRK: Enforcement Gap
Assessment: Evasion outpaced enforcement ~18–24 months
UNSCR 2375/2397 imposed comprehensive commodity sanctions. UN PoE (2019–2023) identified 25–40 vessel ship-to-ship transfer network using AIS spoofing. Petroleum cap enforcement assessed as largely ineffective by 2022. Illustrates Track 1 designation authority / Track 2–3 enforcement gap. TIER 1 — UN PoE Reports 2019–2023
Part V

Special Operations, Clandestine Forces, and Covert Action

5.1 Legal Architecture

Public-Law Authority

Title 10 USC § 167 establishes USSOCOM as a combatant command. § 127e authorizes SOF support to foreign partner forces in CT operations. Title 50 USC § 3093 requires a written Presidential Finding for CIA covert action and Congressional notification (Gang of Eight minimum). EO 12333 (2008) governs peacetime clandestine collection. TIER 1 — Title 10 USC; Title 50 USC § 3093; EO 12333

Analytic Assessment

Covert action is not a rapid-response instrument in the first instance. The Presidential Finding requirement imposes procedural latency. The 2017 Niger incident and subsequent NDAA FY2018 tightening of § 127e authorities illustrate that congressional tolerance for casualties in deniable operations imposes operational risk-acceptance constraints not captured in the statutory structure.

5.2 SOF and Covert Force Employment

ForceTierAuthorityTrackPrimary FunctionExecution Order
SF ODA2Title 10; SOFA/bilateral2/3UW, FID, SR, PSYOP supportCCMD OPORD / JSOTF order
75th Ranger Regiment2Title 10; AUMF2Direct action, airfield seizureJSOC OPORD
Delta Force / DEVGRU1Title 10; Presidential authority2HVT, hostage rescue, counter-WMDSECDEF or POTUS EXORD
CIA Ground Branch (SAC)1Title 50; Presidential Finding3Covert paramilitary, lethal covert actionPresidential Finding; SECSTATE coordination
SEAL Teams (non-Tier 1)2Title 10; AUMF2/3DA, SR, VBSS, UWCCMD JSOTF order
160th SOAR2Title 102/3SOF aviation: infiltration/exfiltration, ISRJTF or JSOC order
Note on Table Certainty

The authority and execution order columns document the predicate statutory framework. Actual operational thresholds — which force requires which Presidential-level, SECDEF-level, or CCMD-level approval in specific contingencies — are governed by classified operational orders and may differ from the statutory baseline presented.

Part VI

Adversary Context and Escalation Logic

6.1 People's Republic of China — Systems Confrontation and Political Warfare

Documented Doctrine

PLA doctrine centers on systems confrontation (体系对抗): neutralizing an adversary's operational system before attriting its platforms. The PLA targets C2, logistics, ISR, and space/cyber enablers before engaging combat platforms. This approach is structurally analogous to MDO convergence but oriented toward disabling the enabling architecture U.S. forces require. TIER 2 — RAND PLA Modernization, 2023; USCC Annual Report 2024

Analytic Assessment

Consistent with ODNI ATA 2025, PRC Three Warfares doctrine — legal warfare (法律战), media warfare (舆论战), and psychological warfare (心理战) — is designed to exploit Track 1/Track 3 seams in the U.S. response architecture. The campaign does not require winning on any single dimension; it requires imposing sufficient friction to delay decisive U.S. action past the adversary's operational culmination point. TIER 1 — ODNI ATA 2025, pp. 8–12

6.2 Russia — Escalation Signaling and Decision-Window Compression

Analytic Assessment

This paper assesses with moderate confidence that Russia's escalation signaling — nuclear exercises, strategic bomber flights, threshold-testing actions — specifically targets the deliberative timeline that U.S. Track 2 authority structures require. War Powers Resolution notification norms and Congressional consultation requirements assume a faster congressional-executive relationship than currently exists. This assessment is based on documented Russian operational patterns in Georgia (2008), Crimea (2014), and Syria (2015). TIER 2 — Brookings, Charap and Darden, 2023

6.3 DPRK — Nuclear Asymmetry and Proportionality Constraints

Analytic Assessment

ODNI ATA 2025 assesses with high confidence that DPRK has demonstrated ICBM capability. This paper assesses with low-moderate confidence, ANALYTICALLY INFERRED from LOAC doctrine and DPRK capability reporting, that demonstrated ICBM capability materially affects the proportionality calculus applicable to any Track 2 response to North Korean conventional provocations. The relevant question is not whether nuclear retaliation is certain, but whether its non-zero probability at asymmetric consequence affects the proportionality determination. The public record does not establish whether this factor is incorporated into current U.S. contingency planning. TIER 1 — ODNI ATA 2025, pp. 15–17

Part VII

Execution Workflow and Decision Conditions

7.1 F2T2EA Targeting Sequence

PhaseFunctionAssetsAuthorityDecision ConditionOff-Ramp / Friction
FINDMulti-INT cueing; pattern-of-life developmentNSA SIGINT; NRO; CIA HUMINT; NGA; airborne ISREO 12333; Title 10 ISR authorityTarget identified as valid military objective under LOACID below legal threshold — return to collection; do not proceed
FIXPrecise geolocation to weapon delivery CEP thresholdSIGINT geolocation; GPS-referenced imagery; HUMINTExisting ISR authorityLocation accuracy meets planned munition CEP thresholdGeolocation uncertainty — delay or select larger-radius munition
TRACKPersistent surveillance through engagement windowMQ-9; satellite; SIGINT continuationContinued ISR authoritySensor continuity maintained; no track-loss gapTrack lost — return to FIX; do not engage on stale data
TARGETWeaponeering; ROE check; LOAC legal review; CDEJ2 target intel; J3 fires; SJA legal reviewJTF ROE; LOAC CDE proportionality; EXORD thresholdsLegal review complete; CDE within limits; ROE satisfiedCDE exceeds threshold — refer up; legal unresolved — hold fire
ENGAGEExecute; assign shooter; activate terminal guidanceStrike aircraft; TLAM; HIMARS/PrSM; OCO; SOF DAEXORD; CCMD delegation; ROE cardPositive ID confirmed at engagement; no protected status changeTarget moves to protected site — abort; escalation threshold exceeded — refer to CCMD
ASSESSPhysical, functional, target system BDA; re-attack recommendationNRO post-strike imagery; SIGINT BDA; HUMINT; SSEStandard ISR collection authorityAssessment complete; re-attack based on functional damage assessmentBDA inconclusive — hold pending ISR; collateral damage confirmed — escalate to CCMD/SJA

7.2 Four-Phase Campaign Workflow

Phase 0 — Competition
T1: Coalition building; sanctions architecture; deterrence signaling.

T2: Forward presence; security cooperation; BMD posture.

T3: HUMINT collection; SOF FID; CNE pre-positioning; PSYOP framework.

Sanctions: OFAC architecture established; secondary sanctions active; FININT targeting.
Trigger: adversary aggregation above exercise threshold
Phase 1 — Crisis
T1: Coercive diplomacy; UNSC proceedings; expanded designation.

T2: CCMD force flow; submarine surge; maritime interdiction.

T3: Covert action under Finding; proxy activation; PSYOP surge; OCO disruption.

Sanctions: Emergency OFAC; SWIFT exclusion threat; energy sector.
Trigger: adversary first kinetic or cyber use against U.S./ally
Phases 2–3 — Armed Conflict
T1: Coalition management; war termination preparation.

T2: EXORD; A2/AD penetration; kinetic fires; maritime/air operations.

T3: SOF DA; JSOC Tier 1 HVT; CIA covert resistance; continued OCO.

Sanctions: Maintained; maritime blockade; possible central bank OCO.
Trigger: adversary nuclear signaling — threshold assessed as approached
Phase 4 — Post-Conflict
T1: Reconstruction; conditioned sanctions relief; peace agreement.

T2: Security assistance; partner force advising.

T3: Long-term intelligence architecture; SOF stabilization transition.

Sanctions: Relief structured as behavioral compliance leverage.
Trigger: renewed aggression or ceasefire violation
Part VIII

Structural Constraints and Confidence Boundaries

8.1 Limitations of the Public Record

Documented Limitations
  • Operational details of current OPLANs, contingency plans, and active covert programs are classified and not reflected in this analysis.
  • The three-track framework is an analytic organizing construct. Real interagency practice may differ materially from the categorical structure presented.
  • Capability assessments reflect publicly acknowledged specifications. Actual performance — particularly for classified cyber tools, submarine sensors, and adversary ASW systems — may differ materially.
  • The mini-cases are bounded by the public record. Causal attribution is limited to "contributory" language. No claim of decisiveness is asserted.
  • The adversary analysis in Part VI relies on translated public documents and Western analysis — not primary intelligence.

8.2 Principal Uncertainties

  • Whether PRC ASW investments have already reduced SSN freedom of maneuver in contested waters.
  • Whether U.S. MISO has produced measurable behavioral change in any primary peer adversary population.
  • Whether USCYBERCOM OCO pre-positioning would execute reliably against PRC integrated defense under contested electromagnetic conditions.
  • Whether the DPRK nuclear threshold is operationalized at a level already constraining Track 2 contingency planning.
  • Whether Russian escalation signaling reflects standing doctrine or real-time improvisation.
Sources

Reference Basis

Tier 1 — Primary Government and Official Sources
  • FM 3-0, Operations (Department of the Army, October 2022)
  • JP 3-0, Joint Operations (CJCS, 2022)
  • JP 3-05, Special Operations (CJCS, July 2019)
  • JP 3-12, Cyberspace Operations (CJCS, June 2018)
  • JP 3-13, Information Operations (CJCS, November 2014, updated 2022)
  • JP 3-13.2, Military Information Support Operations (CJCS, December 2022)
  • JP 3-14, Space Operations (CJCS, April 2018, updated 2022)
  • JP 3-60, Joint Targeting (CJCS, January 2019)
  • DoD Cyber Strategy 2023 (unclassified summary, September 2023)
  • ODNI Annual Threat Assessment 2025 (ODNI, March 2025)
  • USAF Posture Statement FY2025 (Secretary of the Air Force, 2024)
  • USSF Posture Statement FY2025 (Chief of Space Operations, 2024)
  • OFAC Annual Report FY2024 (U.S. Department of the Treasury, 2024)
  • Title 10 USC; Title 50 USC § 3093; EO 12333 (2008 amendment)
  • UNSCR 2375 and 2397 (UN Security Council, 2017)
  • Congressional Budget Office, FY2024 Navy Submarine Programs (CBO, 2024)
  • USCC Annual Report 2024 (U.S.-China Economic and Security Review Commission, 2024)
  • IMF Article IV Consultation — Iran (IMF, 2015); EIA Iran Country Analysis Brief (EIA, 2015)
  • UN Panel of Experts Reports on DPRK (UNSC, 2019–2023)
Tier 2 — Analytical and Research Sources
  • RAND, Multi-Domain Operations: Strategic Implications (2023)
  • RAND, Russian Operational Art and the War in Ukraine (2022)
  • RAND, Countering Russian Disinformation (2023)
  • RAND, U.S. Military in the Indo-Pacific: Logistics and Posture (2023)
  • CSIS China Power Project, China Military Capabilities Assessment (2024)
  • CSIS, Space Threat Assessment 2024 (2024)
  • Atlantic Council Cyber Statecraft Initiative, Defend Forward Analysis (2023)
  • CRS R44647, U.S. Special Operations Forces (2024)
  • CRS R45175, Covert Action and Clandestine Activities (2024)
  • CRS R46514, Overview of U.S. Economic Sanctions (2024)
  • Kofman and Fink, "Escalation Management in the War in Ukraine," Foreign Affairs, 2023
  • Charap and Darden, "Russia's Strategy of Permanent Revolution," Brookings Foreign Policy, 2023
End of Document — MDO-01 v3.0 // Multi-Domain Operations Doctrine — Final — WP-2026 Series — March 2026 — Unclassified // Open Source