This white paper will focus on the vulnerabilities of LTE communication by explaining LTE jamming and unintentional interference problems, address the coexistence issues with other services, and discuss the mitigation options to build a broad perspective on the possible deployment of the LTE technology for future military and civil governmental applications. Understanding the susceptance of new technologies to known and expected environments is critical to the adoption for defense applications.