23.10.2014 Views

jp3_12r

jp3_12r

jp3_12r

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Cyberspace Operations<br />

cyberspace facilitates necessary rapid adaptation and changes in tactics, defensive measures,<br />

and other available response options.<br />

(4) In order to minimize the effects of threats that exploit previously unknown<br />

vulnerabilities, joint forces should develop mitigation and recovery measures, to include<br />

exercising the capability to operate in a denied or compromised portion of cyberspace.<br />

(5) Analysis and Attribution. Due to the characteristics of the physical network,<br />

logical network, and cyber-persona layers in CO, attribution of adversary OCO to people,<br />

criminal organization, non-state actors, or even responsible nation states is difficult.<br />

(6) Intelligence Gain/Loss (IGL). Another concern is that CO could potentially<br />

compromise intelligence collection activities. An IGL assessment is required prior to<br />

executing a CO to the maximum extent practicable. The IGL assessment could be further<br />

complicated by the array of non-DOD USG and multinational partners operating in<br />

cyberspace. See Chapter IV, “Planning and Coordination,” for further information regarding<br />

targeting in CO.<br />

(7) Indications and Warning (I&W). Cyberspace intelligence on nation-state<br />

threats should include all-source analysis in order to factor in traditional political/military<br />

I&W. Adversary cyberspace actions will often occur outside, and often well in advance of,<br />

traditional adversary military activities. Additionally, cyberspace I&W may recognize<br />

adversary CO triggers with only a relatively short time available to respond. These factors<br />

make the inclusion of all-source intelligence analysis very important for the effective<br />

analysis of our adversaries’ intentions in cyberspace.<br />

d. Fires. Depending on the objective, cyberspace fires can be offensive or defensive,<br />

supporting or supported. Like all forms of power projection, fires in and through cyberspace<br />

should be included in the joint planning and execution processes from inception in order to<br />

facilitate synchronization and unity of effort. Fires in and through cyberspace encompass a<br />

number of tasks, actions, and processes, including:<br />

(1) Joint Targeting, Coordination, and Deconfliction. The purpose of targeting<br />

is to integrate and synchronize fires into joint operations. Targeting is the process of<br />

selecting and prioritizing targets and matching the appropriate response to them, considering<br />

operational requirements and capabilities. Integrating and synchronizing planning,<br />

execution, and assessment is pivotal to the success of targeting. Understanding the<br />

objectives, intentions, capabilities, and limitations of all actors within the OE enables the use<br />

of joint, interagency, and multinational means to create effects. Target development and<br />

selection are based on what the commander wants to achieve rather than on the available<br />

ways and means to achieve them. In other words, the focus should be on creating the desired<br />

target effects that accomplish targeting-related tasks and objectives. Deconfliction is the act<br />

of coordinating those targets with applicable DOD, interagency, and multinational partners.<br />

Therefore, cyberspace targets should be nominated, vetted, and validated within the<br />

established targeting process. The targeting process for CO requires close coordination<br />

within DOD, with interagency and multinational partners, and with key allies. Deconfliction<br />

of CO has both an operational and a technical component. If two USG entities have<br />

II-9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!