jp3_12r
jp3_12r
jp3_12r
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Planning and Coordination<br />
normally executed dynamically; however, to be successful, they require considerable<br />
deliberate planning and preparation within the joint targeting cycle. TSTs that are engaged<br />
through CO require detailed joint, cross-CCMD, interagency, and likely multinational<br />
planning and coordination of OPE, engagement, assessment, and intelligence efforts.<br />
(b) The actual prosecution of a TST through cyberspace requires that<br />
cyberspace planners and operators coordinate with the supported commander early in the<br />
planning phase to ensure access to the target is available when the fleeting opportunity<br />
arises. In addition, JFCs should establish procedures to quickly promulgate execution orders<br />
for CO-engaged TSTs, which due to their unique cyberspace interagency<br />
deconfliction/coordination requirements may involve coordinating pre-approval for specific<br />
actions conducted under specific circumstances. Likewise, successful prosecution of TSTs<br />
requires a well-organized and well-rehearsed process for sharing sensor data and targeting<br />
information, identifying suitable strike assets, obtaining mission approval, and rapidly<br />
deconflicting weapon employment. The key for success is performing as much coordination<br />
and decision making as possible in advance.<br />
For more information on attacking TSTs, see JP 3-60, Joint Targeting.<br />
d. Target nomination processes remain unchanged when addressing CO and should be<br />
leveraged appropriately by planners. Development of target folders must include<br />
characteristics of the target as it relates to cyberspace. Development of this data is<br />
imperative to understand and characterize the cyberspace element and its relevancy. Also,<br />
this data allows the planner to develop and match an appropriate effect to be created against<br />
a particular target through cyberspace fires.<br />
e. DOD Information Network Operations. The US military’s reliance on cyberspace<br />
is well understood by our adversaries. DODIN operations underlie nearly every aspect of the<br />
JFC’s operations, throughout the OE, however, it is often overlooked as a planning<br />
consideration. JFC planning to ensure DODIN resiliency in the face of cyberspace threats is<br />
essential. Besides physical protection of key cyberspace infrastructure, the JFC’s primary<br />
defense-in-depth in cyberspace is DODIN operations which includes IA, configuration<br />
control and secure architectures, intrusion detection, bandwidth management/spectrum<br />
management, data encryption, and operating and maintaining the associated hardware<br />
(routers, receivers, switches, etc.). The GCC’s JCCs must coordinate and deconflict these<br />
activities with USSTRATCOM via the USCYBERCOM CSE, where their effects transcend<br />
the AOR.<br />
(1) Situational Awareness. Cyberspace SA is the requisite current and predictive<br />
knowledge of cyberspace and the OE upon which CO depend, including all factors affecting<br />
friendly and adversary cyberspace forces. DODIN operations activities are the foundation of<br />
cyberspace SA, therefore, DODIN operations are fundamental to the commander’s SA of the<br />
OE. A commander continually assesses the OE through a combination of staff element and<br />
other reporting; personal observation; intelligence, to include threat I&W; and<br />
representations of various activities occurring in the JOA through a COP. Sustainment of<br />
these communication channels, data feeds, and user interfaces is one of the key functions of<br />
DODIN operations. Accurate and comprehensive SA is critical for rapid decision making in<br />
IV-5