27.01.2015 Views

Joint Publication 3-13, Information Operations - The Global ...

Joint Publication 3-13, Information Operations - The Global ...

Joint Publication 3-13, Information Operations - The Global ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter II<br />

For more discussion on OPSEC, see JP 3-54, <strong>Operations</strong> Security.<br />

e. Electronic Warfare<br />

(1) EW refers to any military action involving the use of electromagnetic (EM) and<br />

directed energy to control the EM spectrum or to attack the adversary. EW includes three major<br />

subdivisions: EA, electronic protection (EP), and electronic warfare support (ES). EA involves<br />

the use of EM energy, directed energy, or antiradiation weapons to attack personnel, facilities, or<br />

equipment with the intent of degrading, neutralizing, or destroying adversary combat capability.<br />

EP ensures the friendly use of the EM spectrum. ES consists of actions tasked by, or under direct<br />

control of, an operational commander to search for, intercept, identify, and locate or localize<br />

sources of intentional and unintentional radiated EM energy for the purpose of immediate threat<br />

recognition, targeting, planning, and conduct of future operations. ES provides information<br />

required for decisions involving EW operations and other tactical actions such as threat avoidance,<br />

targeting, and homing. ES data can be used to produce SIGINT, provide targeting for electronic<br />

or other forms of attack, and produce measurement and signature intelligence (MASINT). SIGINT<br />

and MASINT can also provide battle damage assessment (BDA) and feedback on the effectiveness<br />

of the overall operational plan.<br />

(2) EW as an IO Core Capability. EW contributes to the success of IO by using offensive<br />

and defensive tactics and techniques in a variety of combinations to shape, disrupt, and exploit adversarial<br />

use of the EM spectrum while protecting friendly freedom of action in that spectrum. Expanding reliance<br />

on the EM spectrum for informational purposes increases both the potential and the challenges of EW<br />

in IO. <strong>The</strong> increasing prevalence of wireless telephone and computer usage extends both the utility and<br />

threat of EW, offering opportunities to exploit an adversary’s electronic vulnerabilities and a requirement<br />

to identify and protect our own from similar exploitation. As the use of the EM spectrum has become<br />

universal in military operations, so has EW become involved in all aspects of IO. All of the core,<br />

supporting, and related IO capabilities either directly use EW or indirectly benefit from EW. In order to<br />

coordinate and deconflict EW, and more broadly all military usage of the EM spectrum, an electronic<br />

warfare coordination cell (EWCC) should be established by the JFC to reside with the component<br />

commander most appropriate to the operation. In addition, all joint operations require a joint restricted<br />

frequency list (JRFL). This list specifies protected, guarded, and taboo frequencies that should not<br />

normally be disrupted without prior coordination and planning, either because of friendly use or friendly<br />

exploitation. This is maintained and promulgated by the communications system directorate of a joint<br />

staff (J-6) in coordination with J-3 and the joint commander’s electronic warfare staff (or EWCC, if<br />

delegated).<br />

For more discussion on EW, see JP 3-51, <strong>Joint</strong> Doctrine for Electronic Warfare.<br />

f. Computer Network <strong>Operations</strong><br />

(1) CNO is one of the latest capabilities developed in support of military operations. CNO<br />

stems from the increasing use of networked computers and supporting IT infrastructure systems by<br />

military and civilian organizations. CNO, along with EW, is used to attack, deceive, degrade, disrupt,<br />

II-4<br />

JP 3-<strong>13</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!