23.10.2014 Views

jp3_12r

jp3_12r

jp3_12r

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter I<br />

data, e-mail and IP address(es), Web pages, phone numbers, etc. However, one individual<br />

may have multiple cyber-persona, which may vary in the degree to which they are factually<br />

accurate. A single cyber-persona can have multiple users. Consequently, attributing<br />

responsibility and targeting in cyberspace is difficult. Because cyber-personas can be<br />

complex, with elements in many virtual locations, but normally not linked to a single<br />

physical location or form, significant intelligence collection and analysis capabilities are<br />

required for the joint forces to gain sufficient insight and situational awareness (SA) of a<br />

cyber-persona to enable effective targeting and creation of the JFC’s desired effect.<br />

d. The Department of Defense information networks (DODIN) are a globally<br />

interconnected, end-to-end set of information capabilities for collecting, processing, storing,<br />

disseminating, and managing information on demand to warfighters, policy makers, and<br />

support personnel. The DODIN includes owned and leased communications and computing<br />

systems and services, software (including applications), data, security services, other<br />

associated services, and national security systems.<br />

Department of Defense information networks (DODIN) replace Global<br />

Information Grid (GIG) terminology, which remains in legacy Department of<br />

Defense (DOD) policy and doctrinal publications. Likewise, DODIN<br />

operations replace the previous use of DGO [DOD GIG operations].<br />

e. The Operational Environment. The OE is a composite of the conditions,<br />

circumstances, and influences that affect the employment of capabilities and bear on the<br />

decisions of the commander. The continuing advancement of communications and computer<br />

technology has significantly reduced acquisition costs leading to the rapid proliferation of<br />

cyberspace capabilities, considerably complicating the OE. The OE factors affecting CO<br />

vary in importance according to mission. Fully understanding cyberspace and its<br />

relationship to the physical domains is the first step in planning military operations in<br />

cyberspace.<br />

(1) Information and communications technology (ICT) is rapidly evolving, forcing<br />

governments and militaries to rethink the context in which they operate. From around-theclock<br />

news to blogs, social networking, and text messaging, the rapid flow of information<br />

has changed the social fabric of the world. The ability of social networks in cyberspace to<br />

incite popular support and to spread ideology is not geographically limited, and the<br />

continued proliferation of ICT will have profound implications for US national security and<br />

that of our partners.<br />

(2) ICT and other advanced technologies are used by a wide range of state and nonstate<br />

actors, and represent an inexpensive way for a small and/or materially disadvantaged<br />

adversary to pose a significant threat to the US. The application of low-cost cyberspace<br />

capabilities can result in disproportionate effects against a technology-dependent nation or<br />

organization. This provides actors who could not otherwise effectively oppose the US using<br />

traditional military forces with an asymmetric alternative. Potential adversaries see these<br />

technology options as much cheaper alternatives to building expensive weapons, such as<br />

stealth fighters or aircraft carriers, to pose a significant threat to US national security.<br />

I-4 JP 3-12

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!