jp3_12r
jp3_12r
jp3_12r
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Chapter I<br />
data, e-mail and IP address(es), Web pages, phone numbers, etc. However, one individual<br />
may have multiple cyber-persona, which may vary in the degree to which they are factually<br />
accurate. A single cyber-persona can have multiple users. Consequently, attributing<br />
responsibility and targeting in cyberspace is difficult. Because cyber-personas can be<br />
complex, with elements in many virtual locations, but normally not linked to a single<br />
physical location or form, significant intelligence collection and analysis capabilities are<br />
required for the joint forces to gain sufficient insight and situational awareness (SA) of a<br />
cyber-persona to enable effective targeting and creation of the JFC’s desired effect.<br />
d. The Department of Defense information networks (DODIN) are a globally<br />
interconnected, end-to-end set of information capabilities for collecting, processing, storing,<br />
disseminating, and managing information on demand to warfighters, policy makers, and<br />
support personnel. The DODIN includes owned and leased communications and computing<br />
systems and services, software (including applications), data, security services, other<br />
associated services, and national security systems.<br />
Department of Defense information networks (DODIN) replace Global<br />
Information Grid (GIG) terminology, which remains in legacy Department of<br />
Defense (DOD) policy and doctrinal publications. Likewise, DODIN<br />
operations replace the previous use of DGO [DOD GIG operations].<br />
e. The Operational Environment. The OE is a composite of the conditions,<br />
circumstances, and influences that affect the employment of capabilities and bear on the<br />
decisions of the commander. The continuing advancement of communications and computer<br />
technology has significantly reduced acquisition costs leading to the rapid proliferation of<br />
cyberspace capabilities, considerably complicating the OE. The OE factors affecting CO<br />
vary in importance according to mission. Fully understanding cyberspace and its<br />
relationship to the physical domains is the first step in planning military operations in<br />
cyberspace.<br />
(1) Information and communications technology (ICT) is rapidly evolving, forcing<br />
governments and militaries to rethink the context in which they operate. From around-theclock<br />
news to blogs, social networking, and text messaging, the rapid flow of information<br />
has changed the social fabric of the world. The ability of social networks in cyberspace to<br />
incite popular support and to spread ideology is not geographically limited, and the<br />
continued proliferation of ICT will have profound implications for US national security and<br />
that of our partners.<br />
(2) ICT and other advanced technologies are used by a wide range of state and nonstate<br />
actors, and represent an inexpensive way for a small and/or materially disadvantaged<br />
adversary to pose a significant threat to the US. The application of low-cost cyberspace<br />
capabilities can result in disproportionate effects against a technology-dependent nation or<br />
organization. This provides actors who could not otherwise effectively oppose the US using<br />
traditional military forces with an asymmetric alternative. Potential adversaries see these<br />
technology options as much cheaper alternatives to building expensive weapons, such as<br />
stealth fighters or aircraft carriers, to pose a significant threat to US national security.<br />
I-4 JP 3-12