jp3_12r
jp3_12r
jp3_12r
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Chapter II<br />
requirements to create effects on the same target in cyberspace, their uncoordinated actions<br />
could expose or interfere with the actions of one or both. Assuming both effects can be<br />
created independently and are sufficiently well-justified, a technical analysis will still need to<br />
be conducted to determine if the proposed capabilities can operate in the same target<br />
environment without interference or increasing the chances of unwanted detection.<br />
For more information on joint targeting, see JP 3-60, Joint Targeting.<br />
(2) Integration of Cyberspace Fires. CO capabilities, though they may be used in<br />
a stand-alone context, are generally most effective when integrated with other capabilities to<br />
create the JFC’s desired effects. Cyberspace capabilities can be used to manipulate<br />
adversary cyberspace targets through MILDEC, redirection, systems conditioning, etc., to<br />
assist with friendly mission objectives, or deny adversary functional use of cyberspace assets.<br />
These effects can be created at the strategic, operational, or tactical level.<br />
(3) Assessment. The assessment process includes measuring the appropriate<br />
performance and effectiveness of fires, as well as their contribution to the larger operation or<br />
objective. Although traditional assessment of military operations has been in terms of firstorder<br />
battle damage, ongoing and recent military operations suggest that physical damage is<br />
often not the most operationally or strategically important. BDA is composed of physical<br />
damage assessment, functional damage assessment, and target system assessment, typically<br />
taking a three-phased approach to proceed from a micro-level examination of the damage or<br />
effect inflicted on a specific target, to ultimately arriving at macro-level conclusions<br />
regarding the functional outcomes created in the target system. Likewise, first-order effects<br />
of CO are often subtle, and assessment of second- and third-order effects can be difficult.<br />
Thus assessment of fires in and through cyberspace frequently requires significant<br />
intelligence capabilities and collection efforts. Prediction and assessment for CO must be<br />
incorporated into existing joint force staff processes to ensure that JFC objectives are met.<br />
e. Movement and Maneuver<br />
(1) Movement and maneuver involves deploying forces into an operational area and<br />
moving within that area to gain operational advantage in support of operational objectives.<br />
An essential component of planning is the concept of key terrain, which is any locality or<br />
area, the seizure or retention of which affords a marked advantage to either combatant.<br />
These might include major lines of communications; key access points for the defense,<br />
observation, and launch points for the offense; or opportunities to create bottlenecks. In<br />
cyberspace, key terrain involves network links and nodes that are essential to a particular<br />
friendly or adversary capability. The ubiquitous nature of cyberspace creates another major<br />
consideration in CO, because it enables an adversary to establish key points of presence<br />
outside the physical operating area.<br />
(2) Another component of maneuver in cyberspace is the movement of data. In this<br />
context, bandwidth (wired or wireless), the available data throughput that can be physically<br />
accommodated by the supporting infrastructure, can be considered as roughly analogous to<br />
lines of communications in the physical domains. The ability to maneuver the flow of data<br />
from one physical line to another, for example from terrestrial cables to satellite<br />
II-10 JP 3-12