23.10.2014 Views

jp3_12r

jp3_12r

jp3_12r

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter I<br />

integrate CO within joint operations. In the past, CO have been considered a subset of IO<br />

and those operations incorporated in the terms of computer network operations, computer<br />

network attack, computer network defense, and CNE. Refer to Director of Central<br />

Intelligence Directive 7/3, Information Operations and Intelligence Community Related<br />

Activities, for more information on CNE. The terminology used for the training, planning,<br />

and execution of military CO includes: offensive cyberspace operations (OCO), DCO, and<br />

DODIN operations. OCO and DCO are covered in detail in Chapter II, “Cyberspace<br />

Operations.”<br />

3. Integrating Cyberspace Operations<br />

a. CO are conducted across the range of military operations. While it is possible that<br />

some military objectives can be achieved by CO alone, CO capabilities should be considered<br />

during joint operation planning, integrated into the JFC’s plan, and synchronized with other<br />

operations during execution. Commanders conduct CO to retain freedom of maneuver in<br />

cyberspace, accomplish the JFC’s objectives, deny freedom of action to adversaries, and<br />

enable other operational activities.<br />

b. The importance of CO support to all military operations is growing in tandem with<br />

the joint force’s increasing reliance on cyberspace, especially for C2, but also for critical<br />

logistics functions that often rely on non-DOD networks. However, conflicts that may need<br />

to be addressed to fully integrate CO into joint operation planning and execution include:<br />

centralized CO planning for DODIN operations and defense; the JFC’s need to synchronize<br />

operations and fires, including CO; deconfliction requirements between government entities;<br />

partner nation relationships; and the relationships between CO and IO, between CO and<br />

operations conducted in the physical domains, and the wide variety of legal issues that relate<br />

to CO.<br />

4. The Joint Force and Cyberspace<br />

a. The JFC faces a unique set of challenges while executing CO in a complex global<br />

security environment. CO are enabled by the DODIN. The DODIN is a global<br />

infrastructure of DOD systems carrying DOD, national security, and related intelligence<br />

community (IC) information and intelligence.<br />

(1) Threats. Cyberspace presents the JFC with many threats ranging from nation<br />

states to individual actors.<br />

(a) Nation State Threat. This threat is potentially the most dangerous<br />

because of access to resources, personnel, and time that may not be available to other actors.<br />

Other nations may employ cyberspace to either attack or conduct espionage against the US.<br />

Nation state threats involve traditional adversaries and sometimes, in the case of espionage,<br />

even traditional allies. Nation states may conduct operations directly or may outsource them<br />

to third parties to achieve their goals.<br />

A cyberspace capability is a device, computer program, or technique,<br />

including any combination of software, firmware, or hardware, designed to<br />

create an effect in or through cyberspace.<br />

I-6 JP 3-12

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!