jp3_12r
jp3_12r
jp3_12r
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Cyberspace Operations<br />
cyberspace facilitates necessary rapid adaptation and changes in tactics, defensive measures,<br />
and other available response options.<br />
(4) In order to minimize the effects of threats that exploit previously unknown<br />
vulnerabilities, joint forces should develop mitigation and recovery measures, to include<br />
exercising the capability to operate in a denied or compromised portion of cyberspace.<br />
(5) Analysis and Attribution. Due to the characteristics of the physical network,<br />
logical network, and cyber-persona layers in CO, attribution of adversary OCO to people,<br />
criminal organization, non-state actors, or even responsible nation states is difficult.<br />
(6) Intelligence Gain/Loss (IGL). Another concern is that CO could potentially<br />
compromise intelligence collection activities. An IGL assessment is required prior to<br />
executing a CO to the maximum extent practicable. The IGL assessment could be further<br />
complicated by the array of non-DOD USG and multinational partners operating in<br />
cyberspace. See Chapter IV, “Planning and Coordination,” for further information regarding<br />
targeting in CO.<br />
(7) Indications and Warning (I&W). Cyberspace intelligence on nation-state<br />
threats should include all-source analysis in order to factor in traditional political/military<br />
I&W. Adversary cyberspace actions will often occur outside, and often well in advance of,<br />
traditional adversary military activities. Additionally, cyberspace I&W may recognize<br />
adversary CO triggers with only a relatively short time available to respond. These factors<br />
make the inclusion of all-source intelligence analysis very important for the effective<br />
analysis of our adversaries’ intentions in cyberspace.<br />
d. Fires. Depending on the objective, cyberspace fires can be offensive or defensive,<br />
supporting or supported. Like all forms of power projection, fires in and through cyberspace<br />
should be included in the joint planning and execution processes from inception in order to<br />
facilitate synchronization and unity of effort. Fires in and through cyberspace encompass a<br />
number of tasks, actions, and processes, including:<br />
(1) Joint Targeting, Coordination, and Deconfliction. The purpose of targeting<br />
is to integrate and synchronize fires into joint operations. Targeting is the process of<br />
selecting and prioritizing targets and matching the appropriate response to them, considering<br />
operational requirements and capabilities. Integrating and synchronizing planning,<br />
execution, and assessment is pivotal to the success of targeting. Understanding the<br />
objectives, intentions, capabilities, and limitations of all actors within the OE enables the use<br />
of joint, interagency, and multinational means to create effects. Target development and<br />
selection are based on what the commander wants to achieve rather than on the available<br />
ways and means to achieve them. In other words, the focus should be on creating the desired<br />
target effects that accomplish targeting-related tasks and objectives. Deconfliction is the act<br />
of coordinating those targets with applicable DOD, interagency, and multinational partners.<br />
Therefore, cyberspace targets should be nominated, vetted, and validated within the<br />
established targeting process. The targeting process for CO requires close coordination<br />
within DOD, with interagency and multinational partners, and with key allies. Deconfliction<br />
of CO has both an operational and a technical component. If two USG entities have<br />
II-9