jp3_12r
jp3_12r
jp3_12r
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Chapter I<br />
integrate CO within joint operations. In the past, CO have been considered a subset of IO<br />
and those operations incorporated in the terms of computer network operations, computer<br />
network attack, computer network defense, and CNE. Refer to Director of Central<br />
Intelligence Directive 7/3, Information Operations and Intelligence Community Related<br />
Activities, for more information on CNE. The terminology used for the training, planning,<br />
and execution of military CO includes: offensive cyberspace operations (OCO), DCO, and<br />
DODIN operations. OCO and DCO are covered in detail in Chapter II, “Cyberspace<br />
Operations.”<br />
3. Integrating Cyberspace Operations<br />
a. CO are conducted across the range of military operations. While it is possible that<br />
some military objectives can be achieved by CO alone, CO capabilities should be considered<br />
during joint operation planning, integrated into the JFC’s plan, and synchronized with other<br />
operations during execution. Commanders conduct CO to retain freedom of maneuver in<br />
cyberspace, accomplish the JFC’s objectives, deny freedom of action to adversaries, and<br />
enable other operational activities.<br />
b. The importance of CO support to all military operations is growing in tandem with<br />
the joint force’s increasing reliance on cyberspace, especially for C2, but also for critical<br />
logistics functions that often rely on non-DOD networks. However, conflicts that may need<br />
to be addressed to fully integrate CO into joint operation planning and execution include:<br />
centralized CO planning for DODIN operations and defense; the JFC’s need to synchronize<br />
operations and fires, including CO; deconfliction requirements between government entities;<br />
partner nation relationships; and the relationships between CO and IO, between CO and<br />
operations conducted in the physical domains, and the wide variety of legal issues that relate<br />
to CO.<br />
4. The Joint Force and Cyberspace<br />
a. The JFC faces a unique set of challenges while executing CO in a complex global<br />
security environment. CO are enabled by the DODIN. The DODIN is a global<br />
infrastructure of DOD systems carrying DOD, national security, and related intelligence<br />
community (IC) information and intelligence.<br />
(1) Threats. Cyberspace presents the JFC with many threats ranging from nation<br />
states to individual actors.<br />
(a) Nation State Threat. This threat is potentially the most dangerous<br />
because of access to resources, personnel, and time that may not be available to other actors.<br />
Other nations may employ cyberspace to either attack or conduct espionage against the US.<br />
Nation state threats involve traditional adversaries and sometimes, in the case of espionage,<br />
even traditional allies. Nation states may conduct operations directly or may outsource them<br />
to third parties to achieve their goals.<br />
A cyberspace capability is a device, computer program, or technique,<br />
including any combination of software, firmware, or hardware, designed to<br />
create an effect in or through cyberspace.<br />
I-6 JP 3-12