23.10.2014 Views

jp3_12r

jp3_12r

jp3_12r

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Executive Summary<br />

functions common to joint operations at all levels of war<br />

into six basic groups: command and control (C2),<br />

intelligence, fires, movement and maneuver, protection,<br />

and sustainment.<br />

Command and Control<br />

Intelligence<br />

Fires<br />

Movement and Maneuver<br />

Sustainment<br />

Protection<br />

C2 of operations in and through cyberspace encompasses<br />

the exercise of authority and direction by commanders<br />

over assigned and attached forces in the accomplishment<br />

of their mission.<br />

Intelligence collected in cyberspace may come from<br />

DOD and/or national-level sources and may serve<br />

strategic, operational, or tactical requirements.<br />

Depending on the objective, cyberspace fires can be<br />

offensive or defensive, supporting or supported. Like all<br />

forms of power projection, fires in and through<br />

cyberspace should be included in the joint planning and<br />

execution processes from inception in order to facilitate<br />

synchronization and unity of effort.<br />

A significant factor in maneuverability in cyberspace is<br />

access to the target node. Movement and maneuver in<br />

cyberspace can occur in all three layers: the physical<br />

network, logical network, and the cyber-persona layer.<br />

JFCs must identify required forces and capabilities,<br />

critical cyberspace assets, assess risk, ensure redundancy<br />

(including non-cyberspace alternatives), and actively<br />

exercise continuity of operations plans to respond to<br />

outages or adversary actions that degrade or compromise<br />

cyberspace access or reliability.<br />

Cyberspace capabilities requiring protection include not<br />

only the infrastructure (computers, cables, antennas, and<br />

switching and routing equipment), as well as parts of the<br />

EMS (e.g., datalink frequencies to include satellite<br />

downlink, cellular, and wireless), and the content (both<br />

data and applications) on which military operations rely.<br />

Authorities, Roles, and Responsibilities<br />

Introduction<br />

Under the authorities of the Secretary of Defense<br />

(SecDef), DOD uses cyberspace capabilities to shape<br />

cyberspace and provide integrated offensive and<br />

defensive options. As directed by United States Strategic<br />

Command (USSTRATCOM), United States Cyber<br />

viii JP 3-12

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!