jp3_12r
jp3_12r
jp3_12r
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Executive Summary<br />
functions common to joint operations at all levels of war<br />
into six basic groups: command and control (C2),<br />
intelligence, fires, movement and maneuver, protection,<br />
and sustainment.<br />
Command and Control<br />
Intelligence<br />
Fires<br />
Movement and Maneuver<br />
Sustainment<br />
Protection<br />
C2 of operations in and through cyberspace encompasses<br />
the exercise of authority and direction by commanders<br />
over assigned and attached forces in the accomplishment<br />
of their mission.<br />
Intelligence collected in cyberspace may come from<br />
DOD and/or national-level sources and may serve<br />
strategic, operational, or tactical requirements.<br />
Depending on the objective, cyberspace fires can be<br />
offensive or defensive, supporting or supported. Like all<br />
forms of power projection, fires in and through<br />
cyberspace should be included in the joint planning and<br />
execution processes from inception in order to facilitate<br />
synchronization and unity of effort.<br />
A significant factor in maneuverability in cyberspace is<br />
access to the target node. Movement and maneuver in<br />
cyberspace can occur in all three layers: the physical<br />
network, logical network, and the cyber-persona layer.<br />
JFCs must identify required forces and capabilities,<br />
critical cyberspace assets, assess risk, ensure redundancy<br />
(including non-cyberspace alternatives), and actively<br />
exercise continuity of operations plans to respond to<br />
outages or adversary actions that degrade or compromise<br />
cyberspace access or reliability.<br />
Cyberspace capabilities requiring protection include not<br />
only the infrastructure (computers, cables, antennas, and<br />
switching and routing equipment), as well as parts of the<br />
EMS (e.g., datalink frequencies to include satellite<br />
downlink, cellular, and wireless), and the content (both<br />
data and applications) on which military operations rely.<br />
Authorities, Roles, and Responsibilities<br />
Introduction<br />
Under the authorities of the Secretary of Defense<br />
(SecDef), DOD uses cyberspace capabilities to shape<br />
cyberspace and provide integrated offensive and<br />
defensive options. As directed by United States Strategic<br />
Command (USSTRATCOM), United States Cyber<br />
viii JP 3-12