FM
stringclasses 43
values | page
int64 1
477
| text
stringlengths 6
8.45k
|
---|---|---|
3-13.4 | 69 | Deception Evaluation Checklist
* Did the enemy’s intelligence estimate of friendly capabilities warrant the use of deception with
the expected expenditure of personnel and equipment?
* Was there adequate time for the enemy to observe the deception and react in a desired manner?
* What were the results of deception activities?
* Were intelligence means and indicators established to measure enemy reaction to the friendly
unit’s deception? |
3-13.4 | 71 | Source Notes
This division lists the source by page number.
1-8 Examples given in paragraphs 1-42 through 1-60 originated in the Central Intelligence
Agency, Office of Research and Development, Deception Maxims: Fact and Folklore
(Washington D.C.: Government Printing Office, 1980), 9–40. |
3-13.4 | 73 | Glossary
The glossary lists acronyms and terms with Army or joint definitions. The proponent
publication for terms is listed in parentheses after the definition. The term for which
FM 3-13.4 is the proponent is marked with an asterisk (*).
SECTION I – ACRONYMS AND ABBREVIATIONS
ADP Army doctrine publication
ATP Army techniques publication
CCMD combatant command
CJCSI Chairman of the Joint Chiefs of Staff instruction
COA course of action
DA Department of the Army
DISO deception in support of operations security
DOD Department of Defense
DODD Department of Defense directive
DODI Department of Defense instruction
DODM Department of Defense manual
DWG deception working group
FIE foreign intelligence entity
FM field manual
G-2 assistant chief of staff, intelligence
G-3 assistant chief of staff, operations
G-5 assistant chief of staff, plans
IO information operations
IRC information-related capability
J-2 intelligence directorate of a joint staff
JP joint publication
MDO military deception officer
MILDEC military deception
MISO military information support operations
MOE measure of effectiveness
MOP measure of performance
OPLAN operation plan
OPORD operation order
OPSEC operations security
RFI request for information
S-2 battalion or brigade intelligence staff officer |
3-13.4 | 74 | Glossary
TAC-D tactical deception
U.S. United States
SECTION II – TERMS
competing observable
Within military deception, any observable that contradicts the deception story, casts doubt on, or
diminishes the impact of one or more required or supporting observables. (JP 3-13.4)
conduits
Within military deception, information or intelligence gateways to the deception target, such as foreign
intelligence entities, intelligence collection platforms, open-source intelligence, and foreign and
domestic news media. (JP 3-13.4)
counterdeception
Efforts to negate, neutralize, diminish the effects of, or gain advantage from a foreign deception
operation. (JP 3-13.4)
deception event
A deception means executed at a specific time and location in support of a deception operation.
(JP 3-13.4)
deception goal
Commander’s statement of the purpose of military deception as it contributes to the successful
accomplishment of the assigned mission. (JP 3-13.4)
deception means
Methods, resources, and techniques that can be used to convey information to the deception target.
(JP 3-13.4)
deception objective
The desired result of a deception operation expressed in terms of what the adversary is to do or not to
do at the critical time and/or location. (JP 3-13.4)
deception story
A scenario that outlines the friendly actions that will be portrayed to cause the deception target to
adopt the desired perception. (JP 3-13.4)
deception target
The adversary decision maker with the authority to make the decision that will achieve the deception
objective. (JP 3-13.4)
decoy
An imitation in any sense of a person, object, or phenomenon that is intended to deceive enemy
surveillance devices or mislead enemy evaluation. (JP 3-13.4)
demonstration
In military deception, a show of force similar to a feint without actual contact with the adversary, in an
area where a decision is not sought that is made to deceive an adversary. (JP 3-13.4)
desired perception
In military deception, what the deception target must believe for it to make the decision that will
achieve the deception objective. (JP 3-13.4)
display
In military deception, a static portrayal of an activity, force, or equipment intended to deceive the
adversary’s visual observation. (JP 3-13.4) |
3-13.4 | 75 | Glossary
diversion
The act of drawing the attention and forces of an enemy from the point of the principal operation; an
attack, alarm, or feint that diverts attention. (JP 3-03)
electronic warfare
Military action involving the use of electromagnetic and directed energy to control the electromagnetic
spectrum or to attack the enemy. (JP 3-13.1)
feint
In military deception, an offensive action involving contact with the adversary conducted for the
purpose of deceiving the adversary as to the location and/or time of the actual main offensive action.
(JP 3-13.4)
human factors
The physical, cultural, psychological, and behavioral attributes of an individual or group that influence
perceptions, understanding, and interactions. (JP 2-0)
indicator
In operations security usage, data derived from friendly detectable actions and open-source
information that an adversary can interpret and piece together to reach conclusions or estimates of
friendly intentions, capabilities, or activities. (JP 3-13.3)
information environment
The aggregate of individuals, organizations, and systems that collect, process, disseminate, or act on
information. (JP 3-13)
information-related capability
A tool, technique, or activity employed within a dimension of the information environment that can be
used to create effects and operationally desirable conditions. (JP 3-13)
link
A behavioral, physical, or functional relationship between nodes. (JP 3-0)
military deception
Actions executed to deliberately mislead adversary military, paramilitary, or violent extremist
organization decision makers, thereby causing the adversary to take specific actions (or inactions) that
will contribute to the accomplishment of the friendly mission. (JP 3-13.4)
military information support operations
Planned operations to convey selected information and indicators to foreign audiences to influence
their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments,
organizations, groups, and individuals in a manner favorable to the originator’s objectives. (JP 3-13.2)
node
An element of a system that represents a person, place, or physical thing. (JP 3-0)
observable
In military deception, the detectable result of the combination of an indicator within an adversary’s
conduit intended to cause action or inaction by the deception target. (JP 3-13.4)
operations security vulnerability
A condition in which friendly actions provide operations security indicators that may be obtained and
accurately evaluated by an adversary in time to provide a basis for effective adversary decision
making. (JP 3-13.3)
ruse
In military deception, an action designed to deceive the adversary, usually involving the deliberate
exposure of false information to the adversary’s intelligence collection system. (JP 3-13.4) |
3-13.4 | 76 | Glossary
*tactical deception
An activity planned and executed by, and in support of, tactical-level commanders to cause enemy
decision makers to take actions or inactions prejudicial to themselves and favorable to the achievement
of tactical commanders’ objectives. |
3-13.4 | 77 | References
All Websites were verified on 14 February 2019.
REQUIRED PUBLICATIONS
Readers require these publications for fundamental concepts, terms, and definitions.
DOD Dictionary of Military and Associated Terms. January 2019.
ADP 1-02. Terms and Military Symbols. 14 August 2018.
RELATED PUBLICATIONS
These publications are referenced in this publication.
JOINT PUBLICATIONS
CJCS issuances are available at https://www.jcs.mil/Library/. DOD issuances are available at
https://www.dtic.mil/whs/directives/. Joint publications are available at
https://jdeis.js.mil/jdeis/generic.jsp.
CJCSI 3211.01. Joint Policy for Military Deception (U). 14 May 2015. (This classified publication is
available on the SIPRNET. Contact the preparing agency of this publication for access
instructions.)
DODD 2311.01E. DoD Law of War Program. 09 May 2006.
DODI 3604.01. Department of Defense Military Deception (U). 11 March 2013. (This classified
publication is available on the SIPRNET. Contact the preparing agency of this publication for
access instructions.)
DODM 5200.01. DoD Information Security Program: Overview, Classification, and Declassification
Volume 1. 24 February 2012.
JP 2-0. Joint Intelligence. 22 October 2013.
JP 3-0. Joint Operations. 17 January 2017.
JP 3-03. Joint Interdiction. 09 September 2016.
JP 3-13. Information Operations. 27 November 2012.
JP 3-13.1. Electronic Warfare. 08 February 2012.
JP 3-13.2. Military Information Support Operations. 21 November 2014.
JP 3-13.3. Operations Security. 06 January 2016.
JP 3-13.4. Military Deception. 14 February 2017.
ARMY PUBLICATIONS
Army doctrine and training publications are available at https://armypubs.army.mil/.
ATP 3-37.34. Survivability Operations. 16 April 2018.
ATP 3-53.1. Military Information in Special Operations. 23 April 2015.
FM 3-12. Cyberspace and Electronic Warfare Operations. 11 April 2017.
FM 6-0. Commander and Staff Organization and Operations. 05 May 2014.
FM 27-10. The Law of Land Warfare. 18 July 1956. |
3-13.4 | 78 | References
OTHER SOURCES
Geneva Convention and Hague Regulation (Article 23) at
https://www.icrc.org/eng/assets/files/publications/icrc-002-0173.pdf.
Central Intelligence Agency, Office of Research and Development. Deception Maxims: Fact and
Folklore. Washington DC: Government Printing Office, 1980.
Department of Defense Law of War Manual. 12 June 2015 at
https://apps.dtic.mil/dtic/tr/fulltext/u2/1014128.pdf.
PRESCRIBED FORMS
This section contains no entries.
REFERENCED FORMS
Unless otherwise indicated, DA forms are available on the Army Publishing Directorate Website:
https://armypubs.army.mil/.
DA Form 2028. Recommended Changes to Publications and Blank Forms.
RECOMMENDED READINGS
Armstrong, LTC Richard N. Soviet Operational Deception: The Red Cloak. Fort Leavenworth,
Kansas: Combat Studies Institute, U.S. Army Command and General Staff College, 1989.
Axelrod, Robert. “The Rational Timing of Surprise.” World Politics, vol. 31, no. 2 (1979): 228–246.
Bittman, Ladislav. Deception Game, Czechoslovakian Intelligence in Soviet Political Warfare.
Syracuse, New York: Syracuse University Research Corporation, 1972.
Brown, Anthony Cave. Bodyguard of Lies. New York: HarperCollins, 1975.
Cruickshank, Charles. Deception in World War II. New York: Oxford University Press, 1979.
Daniel, Donald C. and Katherine L. Herbig, editors. Strategic Military Deception. New York:
Pergamon Press, 1982.
Dewar, Michael. The Art of Deception in War. New York: David & Charles, 1989.
Dunnigan, James F. and Albert A. Nofi. Victory and Deceit; Dirty Tricks at War. New York: Morrow,
1996.
Fisher, David. The War Magician. New York: Coward-McCann, 1983.
Gawne, Jonathan. Ghosts of the ETO. Havertown, Pennsylvania: Casemate Publishers, 2002.
Gerard, Philip. Secret Soldiers: The Story of World War II’s Heroic Army of Deception. New York:
Dutton, 2002.
Gerwehr, Scott and Russell Glenn. The Art of Darkness: Deception and Urban Operations. Santa
Monica, California: Rand, 2000.
Glantz, David M. Soviet Military Deception in the Second World War. Totowa, New Jersey: Frank
Cass, 1989.
Godson, Roy and James J. Wirtz. Strategic Denial and Deception: The Twenty-First Century
Challenge. New Brunswick, New Jersey: Transaction Publishers, 2002.
Handel, Michael, editor. Strategic and Operational Deception in the Second World War. Totowa, New
Jersey: Frank Cass, 1989.
Handel, Michael, editor. War, Strategy and Intelligence. Totowa, New Jersey: Frank Cass, 1989.
Hartcup, Guy. Camouflage: A History of Concealment and Deception in War. New York: Scribner’s,
1980.
Haswell, Jock. D-Day: Intelligence and Deception. New York: Times Books, 1979.
Haswell, Jock. The Tangled Web: The Art of Tactical and Strategic Deception. Wendover: John
Goodchild Publishers, 1984. |
3-13.4 | 79 | References
Hesketh, Roger. Fortitude: The D-Day Deception Campaign. Woodstock, New York: Overlook Press,
2002.
Holt, Thaddeus. The Deceivers: Allied Military Deception in the Second World War. New York:
Scribner, 2004.
Howard, Sir Michael. British Intelligence in the Second World War: Strategic Deception. Vol. 5. New
York: Cambridge University Press, 1989.
Huber, Dr. Thomas M. Pastel: Deception in the Invasion of Japan. Fort Leavenworth, Kansas: Combat
Studies Institute, U.S. Army Command and General Staff College, 1988.
Jones, R. V. The Wizard War: British Scientific Intelligence, 1939-1945. New York: Coward, McCann,
& Geoghegan, 1972.
Lloyd, Mark. The Art of Military Deception. London: L. Cooper, 1997.
Macintyre, Ben. Operation Mincemeat: How a Dead Man and a Bizarre Plan Fooled the Nazis and
Assured an Allied Victory. New York: Harmony Books, 2010.
Mahl, Thomas. Desperate Deception: British Covert Operations in the United States, 1939-44.
Washington D.C.: Brassey’s Inc., 1998.
Masterman, J. C. The Double-Cross System in the War of 1939 to 1945. New Haven: Yale University
Press, 1972.
Montagu, Ewen. The Man Who Never Was. Philadelphia: J.B. Lippincott Company, 1954.
Mure, David. Master of Deception: Tangled Webs in London and the Middle East. London: William
Kimber, 1980.
Mure, David. Practice to Deceive. London: William Kimber, 1977.
Reit, Seymour. Masquerade: The Amazing Camouflage Deceptions of World War II. New York:
Hawthorn Books, 1978.
Sun Tzu. The Art of War. New York: Oxford University Press, 1971.
The 1991 Intelligence Authorization Act.
Whaley, Barton. Codeword BARBAROSSA. Cambridge, Massachusetts: MIT Press, 1973.
Whaley, Barton. Practise to Deceive: Learning Curves of Military Deception Planners. Annapolis,
Maryland: Naval Institute Press, 2016.
Whaley, Barton. Stratagem: Deception and Surprise in War. Boston: Artech House, 2007. |
3-13.4 | 81 | Index
Entries are by paragraph number.
collection, 1-21, 2-119, 3-13 considerations by, 1-72
A coordinating, 1-77 decisions by, 2-12, A-4
access, maintaining, 3-16 saving, 1-55 guidance from, 2-5, 2-124
multinational partners, 2-125 information for, 4-15
assumptions, making, 2-78
protecting, 2-23 informing, 3-15
planning, 2-19
actions, cause, 1-24 validating, 3-22 responsibilities, 1-71–1-72,
3-16
activities. See also deception
B support to, 1-73, 3-27
activities.
baseline analysis, 2-2 team and, 3-12
coordinating, 2-106, 2-121
termination plan, 2-71, 3-30
deception execution, 3-5–3-16 behavior, influencing, 2-15
understanding, A-2
MILDEC, 1-5 patterns of, 1-46, 1-53, 4-12
monitoring, 1-19, 2-103, 3-23, understanding, 2-37, 2-39 commander’s intent, guidance
4-4 beliefs, changing, 1-42 from, 1-4, 1-28
reverse planning, 2-27 credibility of, 1-33, 1-49–1-50 mission analysis and, 2-5
support from, 1-4 communication, 2-116, 3-12
believable, deception story, 1-19,
administrative means, 1-66 1-31, 1-60, 2-24, 2-62 competing observable, defined,
ambiguity-decreasing deception, information, 1-69, 2-55 1-20
1-33, 2-47 bias, types of, 2-39 complex conduit, 2-46
ambiguity-increasing deception, briefing, COA, 2-29 concealment, 1-67
1-31–1-32, 2-47, 2-116 mission analysis, 2-17 OPSEC and, 2-67, 2-98, 2-100
analysis. See also conduit running estimate, 2-21 conditions, changing, 1-26, 2-19,
analysis, mission analysis. 2-78, 3-6–3-9, 3-15
baseline, 2-2 C establish, 1-2, 1-4
emulative, 2-38 camouflage, 1-67 suitability, 2-12, 2-53, 2-128,
information environment, 2-15 capabilities, 1-2, 1-67, 2-62, 3-4, 3-23, 3-29
intelligence, 2-50–2-52, 2-78– 2-117, 2-120, A-6, A-9 conduit analysis, 1-15, 2-42
2-79, 2-84, A-5 deception, 1-39, 1-55 conducting, 2-42–2-48
OPSEC, 2-109 military, 1-11, 2-88 terms, 2-44
analysis plan, developing, 4-8 understanding, 2-49–2-52,
conduits, complex, 2-46
2-54
appendix 14, B-1–B-2 defined, 1-13
producing, 2-75 caution, reactions and, 1-60 exploiting, 2-48
template, B-2 civil-military operations, 2-122 identifying, 2-43, 2-46
approval, deception plan, 2-76 COA, briefing, 2-29 information, 2-86
manipulating, 1-48
approval authority, deception plan, providing, 1-31, 2-30, A-5
risk and, 2-45
3-19 support to, 2-28
selecting, 2-47
assessment. See also risk COA development, planning, 2-9, simple, 2-46
assessment. 2-28 verifiable, 2-60
DWG, 1-80 cognitive, bias, 2-37, 2-39 considerations, analyzing, 2-13,
feedback, 1-58, 3-14 process, 2-25, 2-26 2-41, 2-72, B-1
final, 4-10 state, 4-12 commanders, 1-72
intelligence, 2-79 vulnerabilities, 2-53 legal, 2-89–2-96
responsibilities, 4-1–4-5
collaboration, benefits, 2-108 MDO, 2-1, 2-3, 2-10, 2-11,
termination, 3-30
cyberspace operations, 1-78, 2-12, 2-41, 2-45, 2-66, 4-1
assessment plan, 4-6–4-10 2-118 planners, 1-60, 2-9, 2-45, 4-5
deception event, 4-3
commander, approval from, 2-21, consistency, deception story, 2-63
developing, 4-6–4-10
2-76, 3-27
feedback types, 4-7
brief to, 2-21
assets, availability, 2-10 compromising by, A-6 |
3-13.4 | 82 | Index
Entries are by paragraph number.
control, centralized, 1-26 running estimate, 2-16–2-21 deception plan, adjusting, 3-1,
criteria, 3-26 support from, 2-6 3-6–3-9
execution, 3-25 support to, 2-10 approving, 2-76
controlling planner, execution, synchronizing, 2-64 assess, 4-5
3-18, 3-20–3-21 unlawful, 2-91–2-95 authority, 3-19
responsibilities, 3-24 viable, 2-9 benefits from, 2-101
construction, 2-30
support from, 3-27 deception activities, 2-91, 2-121
coordination with, 3-13
coordination, 2-106, 3-10 developing, 1-4, 1-7, 1-70, 2-3,
cyberspace operations, 2-119
civil-military operations, 2-122 2-120
enemy, A-2
deception event schedule, enemy, A-1, A-4
executing, 3-4, 3-17–3-27
4-14 sequencing, 1-57
identifying enemy’s, A-3
deception plan, 3-2 deception assets, husbanding,
implementation, 3-20
electronic warfare, 2-116 1-55–1-56
intelligence production from,
intelligence staff, A-3 deception event, 2-13, 2-65, 2-72, 2-80
MDO, 1-76, 2-111, 3-2, 3-10, 3-18, 4-3 protection of, 3-16
4-14, A-3 assessment plan, 4-3 quality, 2-83, 3-22
multinational, 2-125 defined, 1-17, 2-64 requirements of, 2-79
planning, 1-60, 2-23
deception event schedule, 2-70, risk, 2-128
requirements, 1-71, 1-75,
3-12 support from, 2-22
2-89–2-90, 2-123–2-125
completing, 2-75, 2-78, 3-20 support to, 4-16
counterdeception, defined, A-1 considerations, 2-66 deception planning, creating, 2-28
planning, A-1–A-2 developing, 2-64–2-66, 2-70, feedback and, 2-68
course of action. See COA. 4-14 guidance, 2-3–2-6
credibility, 2-45 sequencing, 2-66 methodology, 2-24–2-26
MISO, 2-114 support from, 2-66 security, 2-23
criteria, feedback, 2-68–2-70 deception execution, activities, steps of process, 2-27–2-75
termination, 2-71 3-5–3-16 support to, 2-77–2-88
cultural, bias, 2-39 deception goal, alternatives, 2-18 deception story, compromised,
approval, 2-21 3-14
cyberspace electromagnetic defined, 1-9 confirming, 2-47
activities, 1-78 determine, 2-3–2-5, 2-31–2-32 conveying, 2-64
cyberspace operations, 2-118– output, 2-8 defined, 1-22
2-119 planning, 2-27 developing, 2-58–2-59
effective, 2-59
deception in support of operations
D supporting, 2-107
security. See DISO.
data, 1-14, 2-77 time for, 2-13
collecting and treating, 4-9 deception means, 1-61–1-68, deception target, 2-33–2-54
collection plan, 4-8 2-64, 2-65 analyzing, 2-42–2-48
categories of, 1-61
deception, assessment of, 4-1 defined, 1-11
defined, 1-61
categories, 1-4–1-7 identifying, 2-33
developing, 2-56–2-57
challenge, 4-2 information, 2-85
perceptions and, 2-57
characteristics of, 1-51 perceptions of, 2-55
confirming enemy’s, A-4 deception objective, 2-8, 2-55, understanding, 2-11
detecting enemy’s, A-3 2-58, 4-1 versus MISO target, 2-112
see-think-do, 2-26 defined, 1-10 deception task, completing, 2-111
employment of, 1-61 determine, 2-32
exposing, A-7 identifying, 1-73, 2-4 deception working group. See
focus, 2-25 planning, 2-27 DWG.
guidance for, 1-23 running estimate and, 2-18 decision making, enemy, 2-49
integrating, 2-99 deception observable, developing, influencing, 2-39
MOP and, 4-13 2-56–2-57, 2-112 decision-making process, 2-87
movement, 3-18
deception operations, constraints, decision-making structure, 2-35
OPSEC, 2-97–2-109, 3-10–
2-92, 2-93
3-11 decision-making style, 2-36
controlling, 3-25–3-27
personnel, A-3 information collection, 2-82 decoy, defined, 1-68
planning process, 2-22–2-75
monitoring, 3-22–3-24 demonstration, 2-114, 2-116
principles, 1-23–1-29
status, 3-15 defined, 1-37
restrictions to, 2-89
synchronizing, 3-24
results, 4-16
terminating, 3-28–3-30 |
3-13.4 | 83 | Index
Entries are by paragraph number.
desired perception, 1-22, 2-55, deception story, 2-61 processing, 1-44
2-58, 2-65 exploitation, 1-33, 2-48, 2-98 protecting, 2-104
defined, 1-12 enemy deception, A-5–A-8 restricting, 2-124
DISO, 1-7 information collection, 3-13, 4-3
assessment of, 4-1 F managing, 2-82
feedback, assessment plan, 4-7
display, 2-114, 2-116 information environment, defined,
criteria, 2-68–2-70
defined, 1-39 2-15
developing, 2-68–2-70
diversion, defined, 1-35 information operations, MDO and,
importance of, 1-58–1-59
doctrine, enemy, 2-54 monitoring, 3-21 1-77
do-think-see, deception, 2-26 results of, 2-70 information operations officer,
use of, 3-14 responsibilities, 1-75
DWG. See also working group.
data, 4-9 feint, defined, 1-36 information quality, 1-69–1-70
deception goal, 2-31 filter, 1-15, 2-46 information-related capability. See
recommendations from, 4-10 IRC.
flags, deception and, 2-94
responsibilities, 1-80 integration, deception and, 1-29,
focus, deception plan and, 1-24,
1-64
E 4-16
intelligence, enemy, 2-49–2-52
electromagnetic deception, 1-65 foreign intelligence entity,
friendly, 2-88
types, 2-117 analyzing, 2-51
requirements, 2-84–2-88
support to, 1-7
electronic warfare, 2-115–2-117
validity, 1-49
defined, 2-115 functions, military deception, 1-3
intelligence collection, 1-38, 3-13
support from, 2-116
G intelligence estimate, deception
emulative analysis, conducting,
G-2, evaluating by, C-2 story and, 2-58
2-38
perceptions and, 2-50 intelligence process, enemy, 2-52
enemy. See also target.
responsibility, 1-73
analyzing, 2-51, 2-54 intelligence requirements, 2-81
assessing threat, 2-108 G-3, evaluating by, C-1 refining, 2-84
responsibilities, 1-74
capabilities, A-1 intelligence staff, 3-13
cognitive state, 4-12 G-5, responsibilities, 1-79, 1-80, MDO, 4-15
deception plan, A-3 2-3
intelligence support, deception
decision making, 2-25, 2-35– goal, enemy, 2-37 planning, 2-77–2-88
2-36 feedback and, 2-69 managing, 2-82
goals, 2-37
guidance, 1-23, 2-30, 2-31, 2-124 requiring, 2-79
identifying, 2-20
intelligence, 2-49–2-52 deception planning, 1-9, 2-3– IRC, 2-90, 2-99
knowledge of, 2-11 2-6, 2-21 defined, 2-110
misleading, 1-8 integrating, 1-75, 2-111–2-122
H
perspective, 2-59
human factors, analyzing, 2-37– J
see-think-do, 2-25
understanding, 2-49–2-52 2-41 Jones’ dilemma, 1-48
defining, 2-37
vulnerabilities, 2-53
K
human information processing,
enemy deception, confirming, A-4,
limitations to, 1-44–1-45 knowledge, 3-9, A-2
A-5
providing, 2-52
countering, A-5–A-9 I restricting, 1-27, 2-124
exploiting, A-5–A-9
illusions, creating, 1-32
estimate. See also running L
indicator, critical, 2-103
estimate. law of war, adhering to, 2-91
defined, 1-14
deception, 1-9, 2-18
threats from, 2-101 legal, considerations, 2-89–2-96
technical, 2-51
information, accessing, 2-88 leverage the truth, 1-53
evaluation, G-2, C-2
analyzing, 2-103 link, defined, 1-16
G-3, C-1
conduit, 2-86
risks, 2-126 location, 2-116
critical, 2-103
deception planning, 1-31, 1-67,
event schedule, adjusting, 3-21 deception target, 2-85
validation, 3-20 decision-making process, 2-87 2-23, 2-65
execution, 3-4–3-16 delivering, 2-47 M
challenges to, 3-25 enemy considerations, 2-11
Magruder’s principle, 1-42–1-43
deception plan, 3-4, 3-27 manipulating, 2-49 |
3-13.4 | 84 | Index
Entries are by paragraph number.
material, 1-49, 1-64 using, 1-58, 3-14, 4-2 revised, 3-19
terminating, 2-71–2-74
maxims, deception, 1-41–1-60 monitoring activities, feedback,
validating, 3-9
MDO. See also planners. 3-14
types, 3-23 planners. See also MDO.
analyzing, 2-81, 2-104
activity, 1-19
assessment plan, 4-6 MOP, collection steps, 4-13
analyzing by, 2-38
assistance from, 1-72 developing, 4-11–4-16
considerations by, 1-60, 2-9,
considerations by, 2-1, 2-3, using, 4-1
2-45, 4-5
2-10, 2-11, 2-12, 2-41, 2-45,
2-66, 4-1 N deception plan, 2-22
coordinating, 2-97, 3-2 node, 1-16, 2-43 integrating, 2-99
evaluation, 2-14 defined, 1-15 OPSEC, 2-105
preparation and, 3-1
information operations and,
1-77 O responsibilities, 2-34, 2-35
intelligence staff, 4-15 objective, conflict with, 1-26 planning, assumptions, 2-19
intelligence support, 2-78 deception plan and, 1-25 centralized, 1-26
mission analysis and, 2-7 enemy, 2-37 effort, 2-9
responsibilities, 1-76–1-77, observable, building, 2-65 military deception, 1-1–1-2
1-79, 2-1, 2-24, 2-30, 2-55, defined, 1-18 reverse, 2-27
2-56, 2-73, 2-85, 2-89, risk, 2-126
operation order. See OPORD.
2-123, 3-6–3-9, 3-26, 3-30, suitability, 2-12
4-1, 4-4, 4-8, 4-14 operation plan. See OPLAN. termination, 2-72
means. See deception means. operations, coordinating, 1-77 time, 2-13
measure of effectiveness. See operations security. See OPSEC. planning horizon, 2-9
MOE. OPLAN, 2-22, 3-2, B-2 planning process, deception,
measure of performance. See input to, B-1 2-102
MOP. support to, 2-22 deception plan in, 4-5
nesting, 2-22
message, 2-113–2-114 OPORD, 1-80, 2-75, 2-76, B-2
OPSEC, 2-102
input to, B-1
methodology, 2-43, 2-46, 2-87, tactical, 2-22–2-75
A-4 OPSEC, 1-67
preconception, 2-40
deception planning, 2-24–2-26 deception, 2-97–2-109, 2-115
see-think-do, 2-24, 4-11 developing, 2-67 preparation, 2-18, 2-67, 3-1–3-3
DISO and, 1-7 preplanning, 2-1–2-22
military deception, 1-5
integrating, 1-1, 2-99 considerations, 2-1
defined, 1-1
planners, 2-105
functions of, 1-3 protection, cyberspace operations,
planning and, 1-57, 3-3
legal support to, 2-96 2-118
purpose, 2-98
planning, 1-1–1-2 electronic warfare, 2-115
synchronizing, 3-11
terms, 1-8–1-22 measures, 2-67
types of, 1-30–1-33 OPSEC analysis, using, 2-109 public affairs, deception and,
versus tactical deception, 1-6 OPSEC plan, deception and, 2-121
military deception officer. See 3-10–3-11
MDO. organizational, bias, 2-39 R
reactions, unwanted, 1-60
military information support
P–Q
operations. See MISO. recommendations, DWG and,
patterns, enemy and, 1-21 4-10
minimize falsehood, 1-54
of behavior, 1-53, 4-12
reporting channels, 4-14
MISO, 2-112–2-114
perceptions, believable, 2-62
credibility, 2-114 resources, enemy, 2-54
controlling, 2-106
defined, 2-112 OPSEC, 2-108
creating, 2-50, 2-65
message, 2-113 use of, 1-74
identifying, 2-55
mission, 4-2, 4-4 interpretations of, 4-11 restrictions, legal, 2-89
suitability, 2-12 measuring, 4-2 risk, conduits and, 2-45
time for, 2-13 personal, bias, 2-39 deception and, 1-55
mission analysis, planners, 2-4, deficiencies, 2-77
perspective, target, 1-9, 2-59–
2-33 planning, 2-14
2-63
planning, 2-7–2-22 reducing, 2-100
running estimate for, 2-16 physical means, 1-62 risk assessment, 2-126–1-128
MOE, developing, 4-11–4-16 plan, adjusting, 4-15 developing, 2-128
focusing, 4-12 implementing, 3-17 refining, 2-127 |
3-13.4 | 85 | Index
Entries are by paragraph number.
running estimate, deception, surprise, forms of, 1-46–1-47 terms, military deception, 1-8–
2-16–2-21 sustainment, 3-10–3-13 1-22
preparing, 2-18
synchronization, 3-10–3-11, 3-24 time, deception story, 2-13
refining, 2-19
conduits and, 2-46 mission, 2-13
results, 2-17, 2-20
internal deception and, 3-12 OPSEC and, 2-108
support from, 2-31–2-32
OPSEC plan, 3-10–3-11 transmission, 2-44
ruse, defined, 1-38
timing and, 1-28 timing, planning and, 1-28
electronic warfare, 2-116
tools, information management,
legitimate, 2-95 T
B-1
ruse of war, 2-92 tactical deception, defined, 1-6
transition, 3-18
planning process, 2-22–2-75
S versus military deception, 1-6 transmission time, 2-44
security, deception and, 1-27 tactics, deception and, 1-34–1-39 truth, leverage of, 1-53
maintaining, 3-16
target. See also enemy.
U
see-think-do, 4-11
analyzing, 2-34, 2-41, 2-53
enemy, 2-25 update, 3-15
decision maker, 2-70
MDO, 2-24
team, commander and, 3-12 V
sequencing rule, 1-57
technical means, 1-63–1-65 validity, intelligence, 1-49
signatures, physical means, 1-62
techniques, application of, 1-40 verifiable, sources, 2-60
simple conduit, 2-46
termination, actions of, 3-29 vulnerabilities, analyzing, 2-53
space operations, 2-120 criteria, 2-71 exploiting, 2-100
staff. See also G-2, G-3, G-5. deception plan, 3-28
intelligence, 3-13 evolving, 2-73 W–X–Y–Z
responsibilities, 1-71–1-80, preparation of, 3-28 working group. See also DWG.
3-17, A-4 scenarios, 2-74 analysis by, A-4
functions, A-5
suitability, mission, 2-12 termination plan, completing, 2-75
supporting observable, 1-19 developing, 2-71–2-74 |
3-13.4 | 87 | FM 3-13.4
26 February (cid:21)(cid:19)(cid:20)(cid:27)(cid:3)
(cid:37)(cid:92)(cid:3)(cid:50)(cid:85)(cid:71)(cid:72)(cid:85)(cid:3)(cid:82)(cid:73)(cid:3)(cid:87)(cid:75)(cid:72)(cid:3)(cid:54)(cid:72)(cid:70)(cid:85)(cid:72)(cid:87)(cid:68)(cid:85)(cid:92)(cid:3)(cid:82)(cid:73)(cid:3)(cid:87)(cid:75)(cid:72)(cid:3)(cid:36)(cid:85)(cid:80)(cid:92)(cid:29)(cid:3)
MARK A. MILLEY
(cid:42)(cid:72)(cid:81)(cid:72)(cid:85)(cid:68)(cid:79)(cid:15)(cid:3)(cid:56)(cid:81)(cid:76)(cid:87)(cid:72)(cid:71)(cid:3)(cid:54)(cid:87)(cid:68)(cid:87)(cid:72)(cid:86)(cid:3)(cid:36)(cid:85)(cid:80)(cid:92)(cid:3)
(cid:38)(cid:75)(cid:76)(cid:72)(cid:73)(cid:3)(cid:82)(cid:73)(cid:3)(cid:54)(cid:87)(cid:68)(cid:73)(cid:73)(cid:3)
(cid:50)(cid:73)(cid:73)(cid:76)(cid:70)(cid:76)(cid:68)(cid:79)(cid:29)(cid:3)
KATHLEEN S. MILLER
Administrative Assistant
to the Secretary of the Army
1905601
DISTRIBUTION:
Active Army, Army National Guard, and United States Army Reserve: (cid:55)(cid:82)(cid:3) (cid:69)(cid:72)(cid:3) (cid:71)istributed in |
6-02 | 1 | FM 6-02
SIGNAL SUPPORT TO
OPERATIONS
SEPTEMBER 2019
DISTRIBUTION RESTRICTION:
Approved for public release; distribution is unlimited.
This publication supersedes FM 6-02, dated 22 January 2014. |
6-02 | 2 | This publication is available at the Army Publishing Directorate site
(https://armypubs.army.mil/) and the Central Army Registry site |
6-02 | 3 | *FM 6-02
Field Manual Headquarters
No. 6-02 Department of the Army
Washington, D.C., 13 September 2019
Signal Support to Operations
Contents
Page
PREFACE..................................................................................................................... v
INTRODUCTION ........................................................................................................ vii
Chapter 1 OVERVIEW OF SIGNAL SUPPORT ........................................................................ 1-1
Section I – The Operational Environment ............................................................. 1-1
Challenges for Army Signal Support ......................................................................... 1-1
Operational Environment Overview ........................................................................... 1-1
Information Environment ........................................................................................... 1-2
Trends ........................................................................................................................ 1-3
Threat Effects on Signal Support .............................................................................. 1-8
Section II – Fundamental Principles of Signal Support ..................................... 1-13
Operational Focus ................................................................................................... 1-13
Interoperability ......................................................................................................... 1-14
Agility ....................................................................................................................... 1-14
Trusted Systems ...................................................................................................... 1-15
Shared Networks ..................................................................................................... 1-16
Network Situational Awareness ............................................................................... 1-16
Objectives of Signal Support ................................................................................... 1-17
Core Competencies of the Signal Corps ................................................................. 1-17
Section III – Signal in Army Operations .............................................................. 1-18
Support to Joint Operations ..................................................................................... 1-18
Army Strategic Roles ............................................................................................... 1-18
The Army Operational Concept ............................................................................... 1-19
Support to Command and Control ........................................................................... 1-20
Support to Other Warfighting Functions .................................................................. 1-21
Multinational Interoperability .................................................................................... 1-21
Strategic and Operational Reach ............................................................................ 1-22
Chapter 2 SIGNAL SUPPORT BY ARMY ECHELON, CORE COMPETENCIES, TRAINING,
AND THE ARMY NETWORK ................................................................................... 2-1
Section I – Signal Support by Echelon .................................................................. 2-1
Corps and Below Organizations With Organic Signal Assets ................................... 2-1
Units Without Organic Signal Assets ....................................................................... 2-11
Types of Signal Units Leveraged for Support .......................................................... 2-14
Requesting Signal Support ...................................................................................... 2-17
Support to Other Army Operations .......................................................................... 2-17
Signal-Enabling Commands and Staffs ................................................................... 2-26
DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.
*This publication supersedes FM 6-02, dated 22 January 2014. |
6-02 | 4 | Contents
Section II – Core Competencies and Essential Capability of the Signal
Corps ...................................................................................................................... 2-31
Department of Defense Information Network Operations ....................................... 2-31
Network Transport and Information Services ......................................................... 2-34
Spectrum Management Operations ........................................................................ 2-36
Visual Information and Combat Camera ................................................................. 2-36
Communications Security ....................................................................................... 2-38
Section III – Signal Training ................................................................................. 2-39
Individual Signal Training ........................................................................................ 2-39
Collective Signal Training in Units .......................................................................... 2-40
Signal Digital Master Gunner Course ..................................................................... 2-41
Section IV – The Army Network ........................................................................... 2-41
Department of Defense Information Network ......................................................... 2-41
Department of Defense Information Network-Army ................................................ 2-46
Chapter 3 SIGNAL SUPPORT TO OPERATIONS TO SHAPE AND PREVENT ..................... 3-1
Section I – Operations to Shape ............................................................................ 3-1
Overview of Army Operations to Shape.................................................................... 3-1
Signal Operations Assessments ............................................................................... 3-3
Risks to Signal Support ............................................................................................. 3-3
Signal Support ........................................................................................................... 3-4
Additional Shaping Activities ..................................................................................... 3-6
Consolidating Gains .................................................................................................. 3-8
Section II – Operations to Prevent ........................................................................ 3-8
Overview of Army Operations to Prevent ................................................................. 3-8
Risks to Signal Support ............................................................................................. 3-8
Signal Support ........................................................................................................... 3-9
Consolidating Gains ................................................................................................ 3-11
Chapter 4 LARGE-SCALE COMBAT OPERATIONS .............................................................. 4-1
Section I – Signal Support to Large-Scale Combat Operations ......................... 4-1
Overview of Large-Scale Combat Operations .......................................................... 4-1
Risks to Signal Support ............................................................................................. 4-1
Signal Support ........................................................................................................... 4-2
Section II – Large-Scale Defensive Operations ................................................... 4-4
Overview of Large-Scale Defensive Operations ....................................................... 4-4
Signal Support ........................................................................................................... 4-4
Risks to Signal Support ............................................................................................. 4-6
Section III – Large-Scale Offensive Operations ................................................... 4-6
Overview of Large Scale Offensive Operations ........................................................ 4-6
Signal Support ........................................................................................................... 4-6
Risks to Signal Support ............................................................................................. 4-8
Consolidation of Gains .............................................................................................. 4-8
Chapter 5 OPERATIONS TO CONSOLIDATE GAINS ............................................................ 5-1
Overview of Operations to Consolidate Gains .......................................................... 5-1
Signal Support ........................................................................................................... 5-1
Risks to Signal Support ............................................................................................. 5-2
Appendix A OPERATING IN A CONTESTED ENVIRONMENT ................................................. A-1
Appendix B SIGNAL PLANNING ................................................................................................. B-1
Appendix C VISUAL INFORMATION .......................................................................................... C-1
Appendix D SIGNAL SYSTEMS MAINTENANCE ....................................................................... D-1 |
6-02 | 5 | Contents
Appendix E REQUESTS FOR SIGNAL SUPPORT ..................................................................... E-1
SOURCE NOTES ................................................................................ Source Notes-1
GLOSSARY ................................................................................................ Glossary-1
REFERENCES ........................................................................................ References-1
INDEX ................................................................................................................ Index-1
Figures
Introductory figure-1. Command and control logic map .................................................................. viii
Introductory figure-2. The command and control system .................................................................. ix
Figure 2-1. Department of Defense information network operations technical channels at corps
and below .................................................................................................................... 2-3
Figure 2-2. Department of Defense information network operations components, effects, and
objectives .................................................................................................................. 2-34
Figure 2-3. Department of Defense information network-Army operational view ........................ 2-51
Figure 3-1. Shaping activities within an environment of cooperation and competition .................. 3-2
Figure B-1. Operation plan or order paragraph 5 .........................................................................B-13
Figure B-2. Operation plan or order annex H (Signal) .................................................................B-14
Figure B-3. Parallel sequences of the military decision-making process and troop leading
procedures. ...............................................................................................................B-21
Figure C-1. Combat camera support request format .................................................................... C-2
Figure E-1. Request for forces process ......................................................................................... E-3
Tables
Introductory table-1. Modified Army terms ........................................................................................ x
Table A-1. Common jamming signals ............................................................................................ A-6
Table B-1. Example primary, alternate, contingency, and emergency communications plan by
warfighting function ..................................................................................................... B-3
Table B-2. The military decision-making process, step 1: receipt of mission ................................ B-4
Table B-3. The military decision-making process, step 2: mission analysis .................................. B-6
Table B-4. The military decision-making process, step 3: course of action development ............. B-8
Table B-5. The military decision-making process, step 4: course of action analysis ..................... B-9
Table B-6. The military decision-making process, step 5: course of action comparison .............B-10
Table B-7. The military decision-making process, step 6: course of action approval ..................B-11
Table B-8. The military decision-making process, step 7: orders production, dissemination, and
transition ...................................................................................................................B-12
Table D-1. Alignment of units to type of maintenance performed ................................................. D-1 |
6-02 | 7 | Preface
FM 6-02 is the highest-level signal doctrine manual. It describes how signal Soldiers support Army forces as
they shape operational environments, prevent conflict, conduct large-scale combat operations, and
consolidate gains against a peer threat in joint operations. In order to understand this publication, readers
must be familiar with Army capstone doctrine (ADP 1 and ADP 3-0), ADP 5-0, ADP 6-0, and FM 3-0. FM
6-02 supports foundational Army doctrine and establishes context for signal-specific Army techniques
publications.
FM 6-02 is applicable to all members of the Army Profession—leaders, Soldiers, and Army civilians. The
principal audience for FM 6-02 is Army commanders, leaders, staffs, and signal Soldiers. Commanders and
staffs of Army headquarters serving as a joint task force or multinational headquarters also use applicable
joint or multinational doctrine for command and control of joint or multinational forces. Trainers and
educators throughout the Army also use this publication.
Commanders, staffs, and subordinates ensure their decisions and actions comply with applicable U.S.,
international, and in some cases, host-nation laws and regulations. Commanders at all levels ensure their
Soldiers operate according to the law of war and the rules of engagement (see FM 6-27). They also adhere to
the Army Ethic as described in ADP 1.
FM 6-02 uses joint terms where applicable. Selected joint and Army terms and definitions appear in both the
glossary and the text. Terms for which FM 6-02 is the proponent publication (the authority) are marked with
an asterisk (*) in the glossary. Definitions for which FM 6-02 is the proponent publication are boldfaced in
the text. For other definitions shown in the text, the term is italicized and the number of the proponent
publication follows the definition.
FM 6-02 applies to the Active Army, Army National Guard/Army National Guard of the United States, and
the United States Army Reserve, unless otherwise stated.
The proponent for FM 6-02 is the United States Army Cyber Center of Excellence. The preparing agency is
the Doctrine Division, United States Army Cyber Center of Excellence. Send comments and
recommendations on a DA Form 2028 (Recommended Changes to Publications and Blank Forms) to
Commander, United States Army Cyber Center of Excellence and Fort Gordon, ATTN: ATZH-OP (FM
6-02), 506 Chamberlain Avenue, Fort Gordon, GA 30905-5735; by e-mail to usarmy.gordon.cyber-
[email protected]. |
6-02 | 9 | Introduction
Command and control is fundamental to joint and Army operations. Command and control is the exercise of
authority and direction by a properly designated commander over assigned and attached forces in the
accomplishment of a mission (JP 1). The Army’s approach to command and control in unified land operations
is mission command.
Mission command is the Army’s approach to command and control that empowers subordinate decision
making and decentralized execution appropriate to the situation (ADP 6-0). Mission command guides
commanders, staffs, and subordinates in their approach to operations. The command and control warfighting
function enables commanders and staffs of theater armies, corps, divisions, and brigade combat teams to
synchronize and integrate combat power across multiple domains and the information environment.
Commanders cannot exercise command and control alone. Commanders exercise command and control
through the command and control warfighting function. The command and control warfighting function is
the related tasks and a system that enable commanders to synchronize and converge all elements of combat
power (ADP 6-0). See introductory figure-1 on page viii. |
6-02 | 10 | Introduction
Introductory figure-1. Command and control logic map
A command and control system is the arrangement of people, processes, networks, and command posts that
enable commanders to conduct operations (ADP 6-0). The command and control system enables the
commander and staff to execute the command and control warfighting function. Signal forces provide the |
6-02 | 11 | Introduction
network, information systems, and information management processes that enable command and control.
Signal soldiers implementing the network and information systems and performing their staff tasks enable
secure communications and situational awareness throughout their operational area. This enables the
commander’s exercise of command and control in support of unified land operations. See introductory
figure-2.
Introductory figure-2. The command and control system
By providing the network and conducting information management tasks to support the knowledge
management process in the command and control system, signal formations and staff elements enable secure
communications and situational awareness throughout their areas of operations. Information management
processes enable knowledge management and allow commanders to control their formations and synchronize
efforts across warfighting functions while conducting unified land operations.
The Army’s network enables every mission, from training the force to executing tactical tasks to influence
the operational environment in large-scale combat operations. The network is the part of the command and
control system that provides infrastructure for voice, data, and video connectivity to support operations. The
network disseminates the common operational picture and enables unified action partner integration. With
modern tactical radio systems able to pass digital information, the network extends as low as the individual
Soldier on the battlefield.
FM 6-02 outlines signal doctrine in five chapters with supporting appendixes to address tactics and
procedures for signal support to Army operations. The techniques to accomplish the signal missions,
functions, and tasks in this field manual appear in signal-specific Army techniques publications.
This revision to FM 6-02 adopts new doctrinal terms, force structure, and tactics implemented since the most
recent update. This manual supersedes FM 6-02, dated 22 January 2014. FM 6-02 chapters include—
Chapter 1 section I discusses the operational environment, information environment, and threat as they relate
to signal support. Section II introduces the fundamental principles of successful signal support to joint and
Army operations and the core competencies of the Signal Corps. Section III discusses the role of signal forces
in Army operations.
Chapter 2 section I discusses signal support to Army operations by echelon—corps and below units with
organic signal capabilities; units without organic signal capabilities; echelons above corps signal units that
provide support; and signal support to other Army operations. Section II details the core competencies and
essential capability of the Signal Corps. Section III discusses individual and collective signal training. Section
IV discusses the joint and Army networks that enable command and control across the range of military
operations.
Chapter 3 section I discusses signal support to Army operations to shape. Section II discusses signal support
to Army operations to prevent.
Chapter 4 section I provides an overview of signal support to large-scale combat operations. Section II
discusses signal support to large-scale defensive operations. Section III discusses signal support to large-
scale offensive operations.
Chapter 5 discusses signal support to Army operations to consolidate gains.
Appendix A discusses tactics and procedures for operations in a contested environment. It outlines the
procedures when communications systems and networks come under enemy electronic or cyberspace attack. |
6-02 | 12 | Introduction
Appendix B discusses the role of the signal staff in the military decision-making process. It outlines the
process and considerations for planning and coordinating Department of Defense information network
operations, network transport and information services, spectrum management, and communications
security.
Appendix C provides procedures for requesting visual information and combat camera support.
Appendix D discusses signal systems maintenance. It outlines two-level communications-electronics
maintenance, the roles and responsibilities for maintenance management in units, and the external
organizations that provide sustainment maintenance support.
Appendix E provides procedures for identifying support requirements and requesting signal support from
non-organic assets.
Based on current doctrinal changes, certain terms for which FM 6-02 is the proponent have been modified
for purposes of this publication. The glossary contains acronyms and defined terms. See introductory table-
1 for specific term changes.
Introductory table-1. Modified Army terms
Term Remarks
network transport Modified definition
Pro Patria Vigilans! (Watchful for the Country)
Signal Corps Motto |
6-02 | 13 | Chapter 1
Overview of Signal Support
Signal personnel and units at all echelons provide and secure the network for their
commanders to conduct command and control and integrate the other warfighting
functions across the range of military operations. This chapter describes the operational
environment, the fundamental principles and core competencies of signal support, and
the role of signal forces in support of Army operations.
SECTION I – THE OPERATIONAL ENVIRONMENT
1-1. Threats to U.S. interests throughout the world are countered by the ability of U.S. forces to respond to
a wide variety of challenges along a competition continuum that spans from cooperation to war. U.S. forces
conduct a range of military operations to respond to these challenges.
1-2. Signal forces provide communications services that can quickly transition from fixed garrison
infrastructure to deployed tactical systems to support Army commanders and units as they execute their
assigned missions. The fixed infrastructure on posts, camps, and stations; mobile single-channel radio
networks; and deployed communications sites combine to provide commanders the communications and
information technology capabilities they need, at the right time and location, across the conflict continuum.
CHALLENGES FOR ARMY SIGNAL SUPPORT
1-3. The experiences of the U.S. Army in Afghanistan and Iraq in the early 21st century are not
representative of the most dangerous conflicts the Army will face in the future. While the Army conducted
combat operations in both locations, for the most part it focused its efforts on counterinsurgency operations
and stability tasks (FM 3-0). In the future, large-scale combat operations against a peer threat will present
much more demanding operational tempo and greater lethality.
1-4. Army forces participate in operations as part of a joint and multinational force. These operations serve
a higher political purpose, and they should be planned and executed at each echelon to support that purpose
(FM 3-0). Signal planners must include unified action partner interoperability in signal support plans to
enable collaboration and synchronization with joint, interorganizational, and multinational mission partners.
1-5. Expeditionary forces must be ready to deploy on short notice to austere locations and immediately
conduct combat operations. Commanders sequence their deployment so the arriving forces can defend
themselves until follow-on forces arrive in the operational area. The earliest arriving forces have limited
communications and network capabilities until their organic signal capabilities arrive and establish the
network.
OPERATIONAL ENVIRONMENT OVERVIEW
1-6. Factors that affect operations extend far beyond the boundaries of a commander’s assigned area of
operations. Commanders and their staffs seek to develop and maintain an understanding of their operational
environment. An operational environment is a composite of the conditions, circumstances, and influences
that affect the employment of capabilities and bear on the decisions of the commander (JP 3-0). An
operational environment encompasses physical areas of the air, land, maritime, and space domains, as well
as the information environment, which includes cyberspace, the electromagnetic spectrum, and other factors.
Threat, friendly, and neutral actors can all affect conditions in the information environment and, by extension,
the operational environment. Because cyberspace and the electromagnetic spectrum span all physical
domains and geographic areas, some of these effects may originate outside the area of operations. |
6-02 | 14 | Chapter 1
Commanders face new challenges in defending capabilities in cyberspace where boundaries are far less
identifiable. Attacks in cyberspace can originate from, and route through, friendly, neutral, and adversary
countries.
1-7. As commanders operate across the range of military operations, signal capabilities must be tailorable
to meet the commander’s requirements. The way signal formations deliver communications services varies
based on the mission. Communications requirements during theater security cooperation activities from fixed
posts, camps, or stations differ from a brigade combat team commander’s requirements during a movement
to contact mission in large-scale combat operations. Signal staff officers and leaders need to clearly articulate
to commanders what communications capabilities are available during critical points of an operation and how
these capabilities support the exercise of command and control.
1-8. Understanding the operational environment is essential for signal leaders, engineers, planners, system
operators, and cybersecurity professionals to plan and execute effective signal support. Signal Soldiers must
understand signal flow from the end user, through the local area network, through the wide-area network,
and the Department of Defense information network-Army (DODIN-A). The Department of Defense
information network-Army is an Army-operated enclave of the Department of Defense information network
that encompasses all Army information capabilities that collect, process, store, display, disseminate, and
protect information worldwide (ATP 6-02.71). As an example, planners should understand how severe
weather in Guam may affect satellite communications networks in Korea, or a cyberspace incident in the
continental United States can quickly traverse the network and affect communications in an operational
theater.
INFORMATION ENVIRONMENT
“There is no better example of the challenge ahead than that of the information
environment. From moving supplies in the wake of a hurricane disaster to ordering troops
to the Pacific, or addressing the ever-changing cyber[space] threat, the global dependence
on information and networks in everyday activities demands our attention now.”
—General Martin E. Dempsey, former Chairman of the Joint Chiefs of Staff
1-9. Across the globe, information is increasingly available in near-real time. The DODIN-A provides the
ability to access this information from anywhere, and at any time. Access to information enables decision
making, leadership, and combat power. It is also key to seize, gain, and retain the initiative and to consolidate
gains in the operational environment.
1-10. U.S. forces seek to dominate the information environment to maintain information advantage. The
information environment is the aggregate of individuals, organizations, and systems that collect, process,
disseminate, or act on information (JP 3-13). In modern conflict, controlling the information environment is
as important as controlling key terrain in the physical domains. The information environment is not separate
or distinct from the operational environment, but an integral part of it. Any activity that takes place in the
information environment affects one or more of the warfighting domains.
1-11. Cyberspace and the electromagnetic spectrum are parts of the information environment. Cyberspace
is a global domain within the information environment consisting of the interdependent networks of
information technology infrastructures and resident data, including the Internet, telecommunications
networks, computer systems, and embedded processors and controllers (JP 3-12). Friendly, enemy,
adversary, and host-nation networks, communications systems, computers, cellular phone systems, social
media, and communications infrastructure are all parts of cyberspace.
1-12. The electromagnetic spectrum is the range of frequencies of electromagnetic radiation from zero to
infinity. It is divided into 26 alphabetically designated bands (JP 3-13.1). The electromagnetic spectrum
crosses all domains and provides the vital link between space and cyberspace domains. Cyberspace and the
electromagnetic spectrum have become increasingly congested and contested, even as their importance to
successful operations has increased. Army forces must be able to effectively operate in cyberspace and the
electromagnetic spectrum while controlling the ability of enemies and adversaries to operate.
1-13. Signal Soldiers install, operate, and secure the DODIN-A in locations where both friendly and enemy
cyberspace operations occur. Given the high risk to the network, signal operators and information system |
6-02 | 15 | Overview of Signal Support
users must continuously manage risk and secure their portions of the DODIN-A. Signal planners and DODIN
operations personnel assess security risk during network design, mitigate risk in software employment, and
continuously monitor for signs of malicious activity within the network. Individual users must maintain
cybersecurity awareness and learn to identify signs of malicious activity. While cybersecurity efforts cannot
prevent every intrusion, commanders and their staffs must take steps to identify, prioritize, and secure their
most important networks and data.
1-14. Unlike the air, land, maritime, and space domains, cyberspace has no range constraints. A threat actor
can disrupt, destroy, or intercept the flow of information while operating from the other side of the world.
For example, in 2014, North Korea allegedly conducted cyberspace attacks against the California
headquarters of Sony Pictures in retaliation for releasing a movie that insulted North Korean leaders. A peer
threat or other adversary could recruit hackers around the world to attack Army capabilities within an area of
operations, or all the way back to the strategic support area in the United States.
TRENDS
1-15. Proliferating technologies will continue to present challenges for the joint force. The widespread
availability of inexpensive communications devices allows threat actors to greatly increase their command
and control capabilities. Adversaries take advantage of the low entry cost to achieve offensive cyberspace
capabilities. Cyberspace attacks are a low-cost means for state and non-state threat actors to attack civilian,
military, and governmental targets. Cyberspace attacks can extend an enemy’s reach. Enemies will use
cyberspace attacks to counter the Army’s dominance on the battlefield. Enemy forces no longer need to
develop costly aircraft, naval, or missile systems to cause significant damage to infrastructure, command and
control nodes, or logistic capabilities.
1-16. As technology continues to advance, so does the Army’s reliance on the DODIN-A. Every aspect of
Army operations relies on networked communications, from individual Soldiers, to logistics, precision fires,
and command and control. In 2002, maneuver units’ manning and equipment authorizations provided
networked communications capabilities to echelons brigade and above, with limited satellite communications
assets pooled at the division and corps. A typical 20–30 vehicle convoy included only three or four single-
channel radios.
1-17. By 2005, satellite-based networked communications became available as low as battalion level. Nearly
every vehicle now has a radio and some form of networked friendly force tracking capability. The increase
in communications capabilities enables greater dispersion of forces and allows smaller forces to operate
across a larger battlespace. The increased capabilities enable faster flow of information between commands,
better flow of intelligence, just in time logistics, and enhanced situational understanding.
1-18. Over-reliance on technology creates significant vulnerabilities. Command and control nodes have
always been key targets for enemy attack. An enemy can attack command and control nodes with lethal fires,
cyberspace attack, or electronic attack. Army units have come to rely on uninterrupted, high-speed digital
communications and satellite positioning, navigation, and timing. Units must be able to operate without these
capabilities.
1-19. Soldiers need the skills to navigate with a map and compass to operate when capabilities are degraded
or denied. Staffs need to maintain paper maps and overlays in command posts to maintain situational
awareness of their area of operations if mission command information systems become disrupted or
unavailable. A primary, alternate, contingency, and emergency (PACE) communications plan provides
redundant communications means if the primary capability is unavailable. Disciplined initiative according to
the commander’s intent allows units to continue operations in the absence of reliable communications.
1-20. Peer threats have advanced capabilities to locate the electronic signature of communications systems.
The cyber electronic warfare officer can help formulate communications and electronic protection plans to
minimize the electronic signature of command posts and signal sites. Commanders should consider locating
communications transmitters and antennas remotely from major command posts to protect the headquarters
in case an enemy targets communications systems with lethal fires. Command posts and communications
systems must frequently displace during large-scale combat operations against a peer threat. |
6-02 | 16 | Chapter 1
Note. Locating a signal site remotely creates additional force protection and physical security
requirements to secure and defend the remote site.
MULTI-DOMAIN EXTENDED BATTLEFIELD
1-21. Army forces both depend upon and enable the joint force across the air, land, maritime, space, and
cyberspace domains. All Army operations are multi-domain operations and all battles are multi-domain
battles. Conventional Army multi-domain operations include airborne and air assault operations, air and
missile defense, cross-domain fires, aviation, electronic warfare (EW), cyberspace operations, military
deception, information operations, military information support operations, information collection, and
riverine operations. Since joint or multinational partners may provide some of these capabilities, Army
commanders and staffs plan, coordinate, and integrate joint and other unified action partner capabilities in
their multi-domain approach to operations. Large-scale combat operations require synchronization and
convergence of capabilities and effects across multiple disciplines and domains.
1-22. Army forces may conduct operations across multiple domains to gain freedom of action for other
members of the joint force. The air, land, maritime, space, and cyberspace domains, and their effects on the
information environment are closely interrelated. Their complex relationships require a cross-domain
understanding of the operational environment. Signal leaders must understand the available communications
capabilities and interoperability challenges of communications support in each domain. A thorough
understanding helps identify opportunities for the command to coordinate with unified action partners and
converge effects when operating throughout the multi-domain battlefield.
1-23. Signal support is a key enabler for multi-domain battle. Signal units have effectively integrated
communications capabilities across the air, land, maritime, space, and cyberspace domains for decades. The
DODIN-A and the services it extends enable collaboration and synchronization across domains and among
unified action partners.
SIGNAL DEPENDENCE ON SPACE-BASED CAPABILITIES
1-24. Signal support depends on access to space capabilities. Nearly all advanced countries and their military
forces rely heavily on space-based capabilities in the areas of—
* Communications.
* Positioning, navigation, and timing.
* Detection and monitoring.
1-25. Peer threats will likely attempt to jam or destroy space-based capabilities as a means of disrupting U.S.
operations. Disruption of positioning, navigation, and timing negatively impacts network synchronization,
friendly force tracking, precision munitions, unmanned aircraft systems, and ground movements. Destroying
or jamming satellite communications could reduce Army commanders’ ability to exercise command and
control beyond line of sight or in rugged or urban terrain. Exercising disciplined initiative with clear
commander’s intent, along with robust terrestrial-based communications capabilities, mitigates the disruption
of space-based communications.
1-26. U.S. space capabilities include—
* Information collection.
* Early warning.
* Environmental monitoring.
* Satellite communications.
* Positioning, navigation, and timing.
1-27. Satellite communications enable beyond line of sight communications without terrain restrictions.
Satellite-based positioning, navigation, and timing provides an accurate, universal source for system timing
and location. |
6-02 | 17 | Overview of Signal Support
1-28. Space-based capabilities enable signal units to establish communications networks, navigate, and
synchronize network systems. To most effectively employ space-based capabilities, signal Soldiers must
understand the capabilities and how to coordinate access. Spectrum managers and signal planners at brigade
and higher echelons assist units in planning, integrating, and coordinating access to satellite communications
capabilities. Refer to FM 3-14 more information on Army space operations.
1-29. The proliferation of advanced technology provides more widespread access to space-enabled
capabilities. Most potential adversaries have access to space-enabled technologies or the ability to degrade
U.S. space capabilities. Commanders and signal leaders cannot assume they will retain unrestrained access
to space-based capabilities. Units must prepare and train to conduct operations with degraded or disrupted
capabilities.
1-30. Signal planners must understand the limitations of satellite communications systems. Communications
links using multiple satellites and earth terminals introduce latency problems that interfere with Internet
protocol routing. Signal operators and planners must understand satellite latency and its effects on the
network. Applications that do not tolerate satellite latency, such as voice and video services, suffer
degradation. Planners must design network plans to minimize latency.
CONGESTED ENVIRONMENT
1-31. Today, all joint force operations depend on assured electromagnetic spectrum access throughout the
operational environment (JP 6-0). All forces and supporting agencies depend on the electromagnetic
spectrum for communications, information collection, and EW capabilities in support of operations in the air,
land, maritime, space, and cyberspace domains. Signal systems rely on the electromagnetic spectrum for
network transport. For this reason, gaining and maintaining access to the electromagnetic spectrum is critical
for signal support to joint and Army operations.
1-32. Within the electromagnetic spectrum, joint forces contend with civil agencies, commercial entities,
allied forces, and adversaries for use of a common electromagnetic spectrum resource (ATP 6-02.70).
Competition for the finite available bandwidth results in a congested electromagnetic spectrum, especially
when operating in developed nations.
1-33. The proliferation of transmitting devices throughout an operational environment intensifies
competition for bandwidth in the electromagnetic spectrum, complicates unified action partner
interoperability, and increases the complexity of friendly networks. The vast number and variety of radio
frequency transmitting devices in military and civilian use compounds the competition for electromagnetic
spectrum access among the Army, the joint force, and the civilian population. At the same time, widespread
use of commercial communications devices allows adversaries to mask their communications transmissions
among the many other transmitters.
1-34. Signal staffs plan communications and network capabilities to support all anticipated requirements in
their operational area. However, in a congested electromagnetic operational environment, there might not be
adequate satellite bandwidth and spectrum availability to support all missions. Signal leaders must be able to
clearly articulate the limitations and expected level of degradation, so commanders can make appropriate risk
decisions and align the available capabilities with their priorities.
CONTESTED ENVIRONMENT
1-35. Enemies and adversaries may deliberately attempt to deny friendly use of the electromagnetic
spectrum, space, cyberspace, and/or terrestrial systems. Due to heavy joint reliance on advanced
communications systems, such an attack may be a central element of any enemy or adversary antiaccess and
area denial strategy, requiring a higher degree of protection for friendly command and control systems and
planning for operations in a denied or degraded environment (JP 6-0).
1-36. Threat cyberspace and EW capabilities jeopardize U.S. freedom of action in cyberspace and the
electromagnetic spectrum. Because communications are a key command and control enabler, U.S. military
communications and information networks present high-value targets. Peer threats and other adversaries
understand the extent of U.S. forces’ reliance on communications and automated information systems. |
6-02 | 18 | Chapter 1
Enemies and adversaries are likely to contest the information environment across the conflict continuum to
deny operational access and diminish the effectiveness of U.S. and allied forces.
1-37. An enemy can use radio frequency direction finding equipment to locate any radio frequency emitter,
such as a radio, satellite communications terminal, counter-improvised explosive device system, radar, or
cell phone. Once they determine an accurate location, enemy forces can direct lethal or non-lethal fires to
destroy, degrade, or compromise the capability.
1-38. Combining signal and electronic protection techniques with current intelligence estimates may mitigate
an enemy’s ability to find and attack key communications nodes or command posts. The assistant chief of
staff, intelligence (G-2) or battalion or brigade intelligence staff officer (S-2) section can better define an
enemy’s electronic technical data. The cyber electronic warfare officer’s knowledge of threat EW capabilities
and techniques helps inform a communications plan to limit the enemy’s effectiveness. Units can camouflage
their operational use of the spectrum within the spectral noise of an urban area or mask communications
transmissions using terrain or antenna placement. Refer to Army doctrine for EW and ATP 6-02.53 for more
information about communications masking and antenna placement.
1-39. Synchronizing signal support with cyberspace, EW, intelligence, space, and other information-related
capabilities is key to achieving and maintaining freedom of action in contested cyberspace and the
electromagnetic spectrum while denying the same to adversaries. Synchronization is the arrangement of
military actions in time, space, and purpose to produce maximum relative combat power at a decisive place
and time (JP 2-0). Synchronization provides the ability to execute multiple related and mutually supporting
tasks in different locations at the same time, producing greater effects than executing each in isolation.
Synchronization of capabilities across multiple domains and warfighting functions maximizes their
complementary effects in and through cyberspace and the electromagnetic spectrum.
1-40. Changes in the operational variables (political, military, economic, social, information, infrastructure,
physical environment, and time) or mission variables (mission, enemy, terrain and weather, troops and
support available, time available, and civil considerations) could change communications requirements
beyond the capabilities of assigned and attached signal elements. Because DODIN operations authorities
align to the operational chain of command, commanders can allocate the available communications and
network support to their highest mission priorities until additional capabilities are available. Refer to FM
6-0 for a complete discussion of the operational and mission variables.
Degraded Environment
1-41. The cyberspace and space domains grow in importance as global competitors, regional competitors,
and non-state actors invest in capabilities to protect their access and disrupt or deny access to others. Although
Army forces have grown accustomed to communicating freely without fear of jamming or interception, U.S.
enemies and adversaries are likely to use technological advances in cyberspace and vulnerabilities in the
electromagnetic spectrum to conduct cyberspace or electromagnetic spectrum attacks (FM 3-0).
1-42. A broad array of threat actors will challenge the joint force’s freedom of action in space, cyberspace,
and the electromagnetic spectrum. For example, an enemy that jams positioning, navigation, and timing
satellites may render precision fires inaccurate. Army commanders must protect their own systems and
disrupt the enemy’s ability to operate while being prepared to operate with degraded communications and
reduced access to cyberspace and space capabilities.
1-43. While enemy action might cause a degraded environment, degraded capabilities may also occur
because of insufficient resources to support all communications requirements. For example, inadequate
communications satellite capacity in an operational area cause congestion and network latency. Jamming or
unintentional electromagnetic interference may also cause degradation. The architecture of the tactical
network implements redundant communications means to improve reliability in a degraded environment.
1-44. In a hostile EW environment where satellite links are denied or degraded, Army forces at echelons
corps through brigade retain the ability to communicate through protected satellite communications. Units at
echelons battalion and below rely on line of sight communications and other terrestrial means to overcome
satellite denial or degradation. Ground and aerial retransmission links can extend the communications range,
but are still vulnerable to direction finding and jamming. Refer to ATP 6-02.54 for more information about
protected satellite communications. |
6-02 | 19 | Overview of Signal Support
1-45. Careful operational planning can minimize disrupted operations in a degraded environment. The
commander’s priority of effort includes priorities of service. Continuity of operations plans, PACE plans,
and disciplined initiative under the mission command approach can mitigate the effects of degraded
communications capabilities. The information and knowledge management plans should include priorities
for knowledge management in a degraded environment.
Denied Environment
1-46. Enemies and adversaries may adopt an antiaccess and area denial strategy against U.S. forces. An
enemy or adversary with the ability to field layered and fully integrated antiaccess and area denial capabilities
may try to deny U.S. access to an operational area altogether. Operations relying on the DODIN, and
operations of the DODIN itself, must continue even in times of crisis. The DODIN architecture supports
continued operations in a denied environment.
1-47. Continuity of operations plans, disaster recovery plans, and distributed DODIN operations reduce the
adverse effects of isolated network disruptions. Network failures should be transparent to end users.
Continuing operations rely on systems and capabilities that automatically and immediately transfer to
alternate means, to minimize interruptions to connectivity. Denied access in an isolated area or operational
theater does not affect the continued overall operation of the DODIN outside the contested area. See appendix
A for more information about operations in a contested environment.
Continuity of Operations Planning
1-48. Army units must develop, train, and implement techniques across all warfighting functions to ensure
continuity of operations and enable an accurate common operational picture when communications become
degraded. These methods include—
* Anticipating and recognizing degraded and denied communications so operators can quickly
employ countermeasures.
* Adjusting the dispersion of units.
* Graphic control measures.
* Bandwidth management.
* Adjusting operational tempo.
* Centralizing or decentralizing key communications capabilities, as required.
* Employing redundant communications, targeting, and collection assets.
* Implementing procedures to transfer critical data and information, both manually and verbally.
* Retaining the ability to perform critical command and control and other warfighting function tasks
manually.
* Establishing push, versus pull, reporting procedures in case normal reporting is hindered.
* Planning locations and capacity for data storage.
* Scheduling regular backups of operational data.
* Establishing and rehearsing procedures for emergency restoration.
1-49. U.S. forces’ increased reliance on reachback information and network capabilities creates
vulnerabilities to attack from various sources. Employment of the mission command philosophy is essential
to overcome the fog and friction that a decentralized, disaggregated, and degraded communications
environment adds to the battlefield when other defensive countermeasures fail (FM 3-0). The assistant chief
of staff, signal (G-6) or battalion or brigade signal staff officer (S-6) supports the assistant chief of staff,
operations (G-3) and battalion or brigade operations staff officer (S-3) continuity of operations plans by
planning a robust communications network with redundant means of transport and developing PACE plans
during the military decision-making process.
Primary, Alternate, Contingency, and Emergency Plan
1-50. Commanders must be able to communicate with adjacent units, supporting joint forces, and host-nation
and multinational forces in addition to their subordinates. Successful commanders understand that networks
may be degraded through threat or environmental factors during operations. They develop methods and |
6-02 | 20 | Chapter 1
measures to mitigate the impact of degraded networks (ADP 6-0). A PACE plan provides predictability and
redundancy for communications in congested or contested environments. Redundant communications
systems and methods enable communications throughout the corps and division areas of operations in
contested environments. A viable, effective PACE plan may be the most valuable contribution of a G-6 (S-
6)in the planning process.
1-51. A PACE plan is a key requirement for operations in a contested environment. Leaders need to be able
to command their formations when communication networks are disrupted, while on the move, and without
perfect situational awareness (FM 3-0). Continuous mission command requires adequate, but not necessarily
continuous, network connectivity. PACE plans provide prioritized options for redundant means of
communication to ensure effective command and control and interoperability:
* Primary—the best, and intended, method of communications.
* Alternate—another common, but perhaps less optimal method.
* Contingency—method may not be as fast, convenient, or reliable, but it can still accomplish the
task.
* Emergency—communications method of last resort. Emergency methods may cause delays or
otherwise affect operations.
1-52. Most units establish two PACE plans—one for communications to higher headquarters and one for
subordinate units. The higher headquarters usually establishes the PACE plan for communications between
echelons. Units should validate the PACE plan during mission rehearsals to ensure each means of
communication is viable and to establish triggers for execution. Viable PACE plans are critical to support
command and control in a degraded or denied environment. For a PACE plan to be viable, each method of
communication must be feasible, suitable, acceptable, distinguishable, and complete. If a subordinate unit
does not have the required equipment or is untrained in employing a system, that system should not be part
of the PACE plan. See appendix B for more information about PACE planning.
THREAT EFFECTS ON SIGNAL SUPPORT
1-53. A threat is any combination of actors, entities, or forces that have the capability and intent to harm
United States forces, United States national interests, or the homeland (ADP 3-0). Threats can be categorized
as adversaries, enemies, or insiders. An adversary is a party acknowledged as potentially hostile to a friendly
party and against which the use of force may be envisaged (JP 3-0). An enemy is a party identified as hostile
against which the use of force is authorized (ADP 3-0). Insider threats present unique challenges because
they are trusted individuals with access to Army capabilities and sensitive operational information. The
primary threat context in FM 6-02 is peer threats in large-scale combat operations. See paragraph 1-90 for
more information about insider threats.
PEER THREAT
1-54. A peer threat is an adversary or enemy with capabilities and capacity to oppose U.S. forces across
multiple domains world-wide or in a specific region where they enjoy a position of relative advantage. Peer
threats possess roughly equal combat power in geographical proximity to a conflict area with U.S. forces.
Peer threats generate tactical, operational, and strategic challenges that are an order of magnitude more
challenging militarily than those the U.S. Army has faced since the end of the Cold War (FM 3-0). Peer
threats employ their resources across multiple domains to exploit U.S. vulnerabilities. They use their
capabilities to create lethal and nonlethal effects across the operational environment. Peer threat tactics
include preclusion, isolation, sanctuary, and systems warfare.
1-55. Peer threats have demonstrated advanced capabilities in long-range precision fires, integrated air
defense, and EW. These threat capabilities demand changes to signal tactics, techniques, and procedures to
counter the risks they present. Command and control nodes must displace frequently during large-scale
combat operations to avoid destruction by enemy fires.
1-56. Peer threats consider U.S. communications, command and control nodes, massed formations, and
critical infrastructure key targets during large-scale combat operations. Commanders should ensure as much
dispersion of their formations as tactically prudent. Locating radio frequency emitters, such as satellite |
6-02 | 21 | Overview of Signal Support
communications antennas and line of sight radio systems away from major command posts minimizes loss
of life and command and control capabilities if the enemy targets the communications systems with lethal
fires.
Preclusion
1-57. Peer threats use a wide variety of capabilities to preclude a friendly force’s ability to shape the
operational environment and mass and sustain combat power. Antiaccess and area denial are two such
activities. (FM 3-0). Regional peers will use their relative advantages in a geographic area to attempt to
prevent U.S. forces from gaining operational access.
1-58. Peer threats will use cyberspace attacks and EW as part of their antiaccess and area denial strategy.
Overcoming enemy antiaccess and area denial requires a forcible entry operation. Signal support to forcible
entry operations (see paragraph 1-185) allows the joint force commander to synchronize maneuver and
effects across multiple domains to gain a foothold from which to conduct land operations in the joint
operations area. Refer to JP 3-18 for doctrine on joint forcible entry operations.
Isolation
1-59. Isolation is containment of a force so it cannot accomplish its mission. Peer threats believe that the
defeat of the U.S. forces lies not at the end of a substantial battle, but through the culmination of U.S. efforts
before U.S. goals are reached. In large-scale combat operations, peer threats will seek to isolate U.S. tactical
forces and prevent their mutual support while threat forces work toward their campaign objectives. Some
examples of how isolation may affect signal support are—
* Preventing or limiting communications with other units.
* Deceiving friendly forces as a means to gain access to the U.S. network.
* Targeting command and control nodes with lethal fires.
* Conducting denial of service attacks against the U.S. network.
* Electronic attack (jamming) to prevent U.S. and allied use of the electromagnetic spectrum.
* Denying satellite access through jamming or destruction of satellite communications capabilities.
1-60. The tactical network provides redundant means of network transport to prevent formations from
becoming isolated. PACE communications plans and disciplined initiative within the commander’s intent
further mitigate the effects of isolation.
Sanctuary
1-61. Sanctuary is a threat method of putting threat forces beyond the reach of friendly forces. It is a form of
protection derived by some combination of political, legal, and physical boundaries that restrict freedom of
action by a friendly force commander. Peer threats will use any means necessary, including sanctuary, to
protect key elements of their combat power from destruction, particularly by air and missile capabilities (FM
3-0).
1-62. Signal support enables information collection and disseminates the common operational picture,
enabling commanders and their staffs to maintain situational understanding and support the targeting process
throughout their area of operations. Comprehensive understanding of the threat force’s position and situation
reduces the protection they seek to derive by operating from sanctuary.
Systems Warfare
1-63. Peer threats view the battlefield, their own instruments of power, and an opponent’s instruments of
power as a collection of complex, dynamic, and integrated systems composed of subsystems and components.
Peer threats use systems warfare to identify specific critical capabilities for disruption or destruction in order
to cause failure of a larger friendly system (FM 3-0).
1-64. An example of systems warfare that affects signal support is an enemy using radio frequency direction
finding to locate a critical retransmission site. Once the enemy locates the retransmission site, they can
confirm the location using unmanned aircraft systems and direct long-range precision fires from sanctuary to |
6-02 | 22 | Chapter 1
prevent counterattack. Targeting a critical retransmission asset has a more significant effect than destroying
a typical single node in the network. Loss of the retransmission capability disrupts communications for many
radios across a wide section of the area of operations. Refer to TC 7-100.2 for an in-depth discussion of
systems warfare.
HYBRID THREAT
1-65. A hybrid threat is the diverse and dynamic combination of regular forces, irregular forces, terrorists,
or criminal elements acting in concert to achieve mutually benefitting effects (ADP 3-0). Some aspects of
the hybrid threat, such as criminal or terrorist organizations, do not abide by the law of war. Hybrid threats
seek to exploit asymmetric advantages over an adversary to avoid engaging in direct combat.
1-66. In many ways, hybrid threat is not a new way of fighting a war; it is simply a new way of framing the
operational environment. The Colonials in the American Revolution employed a hybrid strategy with a
mixture of regular Continental troops, state militias, irregular partisans, and supportive local populations,
along with publishers and pamphleteers sympathetic to the revolutionary cause. What has changed is the
tools available to threat actors and the ability of some of these tools to create far-reaching effects outside the
operational area. Enemies may employ cyberspace attack and exploitation, battlefield jammers, and space-
based capabilities, such as anti-satellite weapons, to disrupt U.S. communications; positioning, navigation,
and timing; synchronization; and freedom of maneuver. A peer threat’s ability to combine regular and
irregular forces, robust information warfare capabilities, long-range precision fires, and massed lethal fires
with the capacity to contest or achieve air superiority presents a formidable challenge.
1-67. The hybrid threat understands that the most challenging environment for U.S. forces is one where
conventional military operations occur in concert with irregular warfare. The hybrid threat concept is not
simply making do with what is available, but deliberately taking advantage of all tools at hand to create a
complex operational environment.
1-68. Hybrid threats employ a wide variety of military, paramilitary, insurgent, criminal, and information
warfare capabilities in concert with a robust antiaccess and area denial strategy and long-range precision fires
to support their strategic and tactical objectives. Each component of the hybrid threat brings additional
capabilities to bear. Commanders should not underestimate the synergy of these capabilities. Operational
environments are inherently complex due to the operational variables. The hybrid threat seeks to introduce
additional complexity using an ever-shifting array of forces, technologies, and techniques. The hybrid threat
may conduct a conventional military attack while simultaneously creating economic instability, fostering
lack of trust in existing governance, attacking information networks, and conducting a propaganda campaign,
perhaps while causing a humanitarian crisis.
1-69. Commanders facing a hybrid threat will have difficulty identifying and responding to specific
challenges. If they faced them individually, U.S. forces could readily isolate and defeat each aspect of the
hybrid threat. However, because hybrid threat actors integrate these capabilities across the operational area,
they can continue to shift effort and emphasis to make all U.S. choices seem poor ones. Enemies can learn
and adapt quickly, often unrestricted by rules or bureaucracy. The hybrid threat’s continually shifting efforts
may cause haphazard and incomplete change, but such rapid adaptation is difficult to counter. Ultimately,
success goes to those who can act, react, and adapt their tactics quickly and creatively.
INFORMATION WARFARE
1-70. Information warfare refers to a threat’s use of information activities, such as cyberspace attack and
EW, to gain an advantage in the information environment. The threat construct of information warfare merges
the disciplines of EW, deception, lethal fires, information protection, perception management, and
cyberspace operations into a mutually supporting, integrated capability. Threat information warfare consists
of—
* EW. Measures conducted to control or deny an enemy’s use of the electromagnetic spectrum,
while ensuring its use by the hybrid threat.
* Deception. Measures designed to mislead an enemy by manipulation, distortion, or falsification
of information to induce the enemy to act in a manner prejudicial to their interests.
* Physical destruction. Measures to destroy critical components of communications infrastructure. |
6-02 | 23 | Overview of Signal Support
* Protection and security measures. Measures to protect the hybrid threat’s information
infrastructure and to deny protected information to other actors.
* Perception management. Information, misinformation, disinformation, and propaganda.
* Information attack. Attacks against the information resident on or transiting communications
and information systems, rather than the systems themselves. Information attacks focus
exclusively on the manipulation or degradation of the information to affect the information
environment.
* Computer warfare. Measures ranging from unauthorized access (hacking) of information
systems for intelligence collection purposes to the insertion of destructive viruses and deceptive
information into enemy computer systems.
1-71. Because these elements share some of the same functions, means, and targets, the enemy or adversary
can formulate and execute a single, integrated information warfare plan. Despite the name information
warfare, adversaries continuously conduct these activities at every level of warfare across the competition
continuum to set favorable conditions, protect their self-interests, and influence public opinion in an
operational area.
1-72. Some threat information warfare capabilities, such as cyberspace attack and perception management,
can reach far beyond the immediate operational area. An enemy or adversary may perform strategic
information warfare activities to create effects globally, including attacks on critical U.S. infrastructure,
military deception, and perception management campaigns to influence public support. Refer to FM 3-53 for
more information about military deception and perception management.
1-73. An enemy or adversary may also undertake tactical actions to achieve information warfare objectives,
rather than purely military ones. To some extent, managing, controlling, and disseminating information have
always been critical to tactical success. This is especially true given the advances in information technology
and U.S. reliance on network capabilities.
1-74. Adversaries recognize the advantages information warfare activities can provide their tactical
commanders. Therefore, they strive to integrate information warfare planning and activities in all tactical
missions and battles. Information warfare activities may degrade or deny U.S. communications and blur or
manipulate the common operational picture. Information warfare may also help an enemy dictate the tempo
of combat. By combining perception management, military deception, and EW, the enemy may be able to
effectively slow or control the pace of battle. Traditional EW activities, such as jamming, also contribute to
the tactical application of information warfare by challenging U.S. attempts to establish information
advantage. Information advantage is the superior position or condition derived from the ability to securely
access, share, and collaborate via trusted information while exploiting or denying an adversary’s ability to
do the same.
1-75. Threat information warfare also supports tactical counterreconnaissance. Threat actors constantly seek
to attack, degrade, or manipulate U.S. intelligence, surveillance, and reconnaissance capabilities. Each U.S.
and allied target acquisition system and sensor is a potential target.
1-76. Because threat actors integrate their information warfare capabilities, a coordinated and synchronized
response is essential. The countermeasures to defend against these capabilities are a combination of signal,
cyberspace operations, electronic protection, space, and other information-related capabilities, along with
intelligence and operations security support. Close collaboration between these elements ensures a more
effective response. Refer to TC 7-100 for more information about hybrid threat and information warfare.
THREAT ACTIVITIES IN CYBERSPACE
1-77. Threat actors can exploit system vulnerabilities and cause a loss of confidentiality, integrity, or
availability of communications networks. Protecting the information on the Army network from internal and
external threats is essential to maintaining freedom of action in cyberspace.
1-78. Threat actors include adversaries and enemies. The difference between them is that an adversary is
potentially hostile, while an enemy is demonstrably hostile. This distinction is clear in the physical domains,
but less so in cyberspace. An adversary may well take hostile actions against U.S. interests in cyberspace |
6-02 | 24 | Chapter 1
without becoming an enemy that U.S. forces might engage in the physical domains. For this discussion, threat
actors encompass both adversaries and enemies.
1-79. DOD networks and information systems face continuous risk from a variety of threat actors. Every
day, DOD networks come under attack by threat actors including—
* Insider threats.
* Foreign intelligence entities.
* Military or political opponents.
* Terrorist groups.
* Non-state actors (criminal and activist organizations).
1-80. These threat actors use many methods to disrupt, degrade, destroy, exploit, alter, or otherwise adversely
affect the Army’s use of cyberspace. Elements of the network reside across the physical domains, with
different methods of communicating and varying levels of interconnectivity and isolation. Threat actors may
seek to exploit any network node, communications link, or the data residing in or traversing the nodes and
links. Connecting critical infrastructure to the network exposes it to the risk of cyberspace attack.
1-81. Cyberspace allows threat actors to operate anonymously or to obscure their identity and location. This
allows threat actors to pose as friendly actors and deceive individuals into divulging sensitive information or
circumventing security measures—likely without realizing they have done so—through social engineering
or phishing. Threat actors can attack Army systems, networks, and information assets by manipulating
unsecured systems.
1-82. The same gateways that facilitate information exchange and allow legitimate outside users to access
the network present attack vectors threat actors attempt to exploit. Threat actors often use the same
commercial networks as noncombatant civilian populations, complicating cyberspace attack attribution and
response.
Note. Social engineering uses techniques that rely on weakness in human nature rather than
software. The goal is to deceive people into revealing passwords and other information that
compromise the security of automated information systems and networks.
1-83. The broad range of threat actors in cyberspace increases the complexity in securing the Army network.
The enduring nature of threat activities in cyberspace causes U.S. forces to expend considerable resources
and effort securing DOD networks. Network-enabled operations are a force multiplier and a traditional
strength of U.S. forces. However, network-enabled operations also create significant vulnerabilities. The
extent to which U.S. forces rely on networked capabilities presents broad cyberspace and electromagnetic
spectrum attack surfaces.
1-84. Failing to protect even one system can create a foothold into the network and place sensitive data, U.S.
operations, and lives at risk. Even when cyberspace defenders discover and stop an attack, they might not be
able to attribute it to a particular source. Following cybersecurity best practices, defending the network, and
adhering to operations security guidelines help protect DOD networks and data.
1-85. Threat actors may undertake intelligence gathering within the Department of Defense information
network (DODIN), either to support their operations or to counter U.S. operations. Exploitation reveals
information resident on, or transiting through, a system. Threat intelligence activities can compromise
sensitive operational information.
1-86. Trusted insiders with legitimate access to systems pose one of the most difficult threats to counter.
Insiders are the most dangerous threat to operations security because they can readily access sensitive
information.
1-87. A peer threat will systematically and continuously combine all available means to attack U.S. and
allied network capabilities to create effects in the information environment. Peer threats will use deceptive
tactics such as phishing attacks to gain access to Army networks for follow-on cyberspace operations. |
6-02 | 25 | Overview of Signal Support
1-88. Commanders must recognize the proliferation of threat cyberspace capabilities and their impact on
operations. Threat activities in cyberspace can disrupt friendly information systems and degrade joint
command and control. Threat operations in cyberspace are often less encumbered by treaty, law, and policy
restrictions than those imposed on U.S. forces. This may allow enemies and adversaries an initial advantage
in cyberspace. Signal support elements and staffs must maintain an effective cybersecurity program to secure
the network against threat activities in cyberspace.
INSIDER THREAT
1-89. Insider threats present a significant risk to military operations. An insider threat is a person with
placement and access who intentionally causes loss or degradation of resources or capabilities or
compromises the ability of an organization to accomplish its mission through espionage, providing support
to international terrorism, or the unauthorized release or disclosure of information about the plans and
intentions of U.S. military forces (AR 381-12). Insider threats are hostile actors who intentionally
compromise national security through deliberate actions. Insider threat should not be confused with
operations security or cybersecurity risks, where sensitive operational information may be accidentally
compromised and place U.S. operations or personnel at risk.
1-90. An insider threat does not necessarily need to be a military member or government employee. Third
party vendors, contractors, and partners could pose a threat as well. The insider threat is especially dangerous
because insider activity is generally the hardest to identify. Downloading or printing files to remove from
secure areas may appear to be ordinary day-to-day activities. Similar to enemy cyberspace attacks, a trusted
insider can steal sensitive data to undermine partner relationships or manipulate public opinion.
1-91. Past cases of insider threats have demonstrated that coworkers, associates, friends, and supervisors of
those engaging in espionage or terrorist activity commonly overlook potential threat indicators. If these
indicators had been reported and investigated, they might have minimized the damage to national security or
saved the lives of U.S. personnel. The knowledge, awareness, and participation of all Department of the
Army personnel in threat awareness and reporting is essential to the success of the Army’s warfighting
mission and in protecting the lives of Soldiers (AR 381-12).
SECTION II – FUNDAMENTAL PRINCIPLES OF SIGNAL SUPPORT
1-92. The network connects geographically separated forces for network-enabled operations. Because the
Army conducts operations as part of a joint force, signal support requires joint interoperability in systems
engineering, planning, deployment, and operation. Joint forces must be networked, linked, and synchronized
in time and purpose so dispersed forces can communicate, maneuver, share information, collaborate, and
share a common operational picture.
1-93. By integrating information from across the operational area, Army forces can maintain timely and
relevant situational understanding. The integrated common operational picture allows commanders to
manage operational risk and employ the right capabilities at the right place and time to achieve mission
objectives. Making this possible requires signal Soldiers and leaders to apply the fundamental principles of—
* Operational focus.
* Interoperability.
* Agility.
* Trusted systems.
* Shared networks.
* Situational awareness.
OPERATIONAL FOCUS
1-94. Communications support should never be the limiting factor to the commander’s ability to execute a
mission. Signal staffs need to understand the commander’s scheme of maneuver and intent and be able to
articulate the capabilities and limitations of their communications systems to their commanders. This way,
commanders can employ their signal capabilities to best support the operation. |
6-02 | 26 | Chapter 1
1-95. Signal staffs must participate early in and throughout the operations process. Integration of the scheme
of signal support into operations plans is essential to mission success. This integration requires signal
planners at every echelon to participate as full partners in the military decision-making process. Signal
planners participate throughout the planning process, so they can better understand the maneuver plan and
anticipate changes in operational requirements. During course of action comparison, signal planners advise
the commander and staff of capability shortfalls that will adversely affect a proposed course of action.
INTEROPERABILITY
1-96. Interoperability among unified action partners enables information advantage in joint and multinational
operations. Sharing common technical standards and policies among joint mission partners allows a wide
range of networking and information systems to interoperate as a joint network. Interoperability among
systems and mission partners facilitates information exchange and speeds up decision making and
implementation. Interoperability requires compatibility and standardization among communications and
automated information systems. Planners must consider joint interoperability when formulating signal
support plans.
COMPATIBILITY
1-97. Compatibility is the capability of two or more different items or components of equipment to function
in the same system or environment without mutual interference. Electromagnetic compatibility, including
frequency supportability, is a design consideration at the earliest conceptual stage and throughout the
planning, design, development, testing, evaluation, and operational life cycle of all systems.
STANDARDIZATION
1-98. The need for standardization applies across the DOD, including the joint, Army, and other Services’
networks. Operating all of these networks and enclaves under the same technical standards ensures
interoperability among mission partners. Standardization enables collaboration with unified action partners
and reduces duplication in research and development efforts.
AGILITY
1-99. Agile communications enable decentralized execution according to the commander’s intent.
Communications and networking capabilities must meet the commander’s communications requirements and
support decision-making processes. An agile network adapts to meets user needs in a continually changing
operational environment. Agile networks have the capacity, flexibility, mobility, redundancy, reliability,
scalability, and timeliness to meet commanders’ requirements across the range of military operations. To
support agile forces and operational concepts, the communications architecture should adapt to a wide range
of missions without needing extensive reconfiguration.
CAPACITY
1-100. Signal staffs must plan communications and network capabilities to support all anticipated
requirements in the operational area. High-level plans for the theater network must consider satellite
bandwidth and spectrum availability to support growth as the theater network expands to meet increasing
operational requirements.
FLEXIBILITY
1-101. Flexibility allows rapid integration at all levels of joint and Army automated information systems
support. Flexibility allows signal elements to adapt to changing situations and dynamic operations with
minimal disruption or delay. Flexibility is particularly important during contingency operations. |
6-02 | 27 | Overview of Signal Support
MOBILITY
1-102. Commanders at all levels must have network systems that are as mobile as the forces, elements, or
organizations they support, without degraded information quality or flow. The network should provide an
operational advantage and not a burden while enhancing the speed and agility of warfighting formations.
REDUNDANCY
1-103. Redundancy provides multiple transmission paths, backups, self-healing strategies, and data
replication. Redundancy enables quick recovery if portions of the network or the data that it transports are
destroyed, rendered inoperative, or degraded. Signal elements implement redundancy through—
* Communications in depth—using alternative communications means for connectivity in a
degraded environment.
* PACE plans.
RELIABILITY
1-104. Reliability ensures networks are available when needed and perform as intended. Use of systems
and networks with low failure rates, error correction techniques, and self-healing network architecture
enhances the reliability of communications support.
SCALABILITY
1-105. Signal forces must provide a network that is tailorable to adapt, based on phases of an operation, to
enable command and control at home station, en route, and in deployed environments. Deployed
environments include training, exercises, theater security cooperation, initial entry, and maneuver. Deployed
environments may involve minimal to robust force packages. Signal elements must be able to adjust the
network to provide the right services at the point of need, under all conditions as the size of the supported
deployed forces increases or decreases.
TIMELINESS
1-106. Timeliness ensures that the processing and transmission time for warning, critical intelligence, and
operation order execution information is as short as practicable. As weapon systems technology shortens the
time between warning and attack, information management processes must reduce the lag between
information collection and dissemination.
1-107. Signal elements perform information management in support of the unit’s knowledge management
plan to ensure commanders and their staffs receive the information they need, when they need it, to support
planning and decision making. As the network expands or network nodes displace to meet mission
requirements, signal elements ensure timely network support through—
* Priorities of work.
* Priorities of service.
* Quality of service management.
TRUSTED SYSTEMS
1-108. Commanders and system users need to be able to trust the confidentiality, integrity, and availability
of automated information systems. Trusted networks must be transparent to users, protect the information
and services on the network, and provide users with confidence in the validity of the information the network
delivers. Trusted networks must be protected, survivable, and sustainable.
PROTECTION
1-109. Protected communications systems and networks enable joint command and control in a contested
environment. As such, they present high-value targets to the enemy. Cybersecurity and communications
security (COMSEC) secure DOD networks and the information they carry. Cybersecurity establishes the |
6-02 | 28 | Chapter 1
baseline security of the network. COMSEC secures network transport media and classified terminal devices.
Signal elements protect the network through—
* Cybersecurity.
* COMSEC.
* Electronic counter-countermeasures (anti-jamming techniques).
SURVIVABILITY
1-110. Survivable networks result from techniques such as dispersal of key facilities, redundant
communications nodes, or a combination of techniques necessary for the physical and electrical protection
of networks and critical infrastructure. While it is not practical or economically feasible to make all networks
or elements of a system equally survivable, the networks and systems that enable command and control need
protection commensurate with the survivability requirements of the associated command post. Since the
Army network is a key command and control enabler, enemies consider it a key target for lethal and nonlethal
fires.
SUSTAINABILITY
1-111. Sustainable networks provide support during any type of operation, regardless of its duration. This
requires the economical design and employment of networks without sacrificing operational capability or
survivability. Examples that might improve system sustainability include—
* Consolidating functionality of similar facilities.
* Adherence to joint-approved architectures.
* Integrating special purpose and dedicated networks, when possible, into the joint portion of the
DOD network.
* Maximum use of DOD-wide common user services.
* Judicious use of commercial services to augment military capabilities.
SHARED NETWORKS
1-112. Shared networks and services allow the mutual use of information services and communications
capabilities among unified action partners at all echelons. Shared networks enable collaboration, rapid
dissemination of intelligence and information, and the ability to project decisions based on common
situational understanding. Signal elements provide shared networking capabilities by implementing—
* DOD-wide common standards—common cybersecurity policies and system configurations to
enhance interoperability.
* Cybersecurity reciprocity—sharing security authorization packages and agreeing to accept other
Services’ test and assessment results and authorization.
* Mission partner environment—secure networking environment for multinational collaboration.
NETWORK SITUATIONAL AWARENESS
1-113. Comprehensive network situational awareness allows commanders and their staffs to receive,
correlate, and display an accurate representation of systems and networks. A clear visual representation of
the network allows near real-time assessment of operational impacts and helps staffs identify key terrain in
cyberspace.
1-114. Observation of the intensity of network activity, traffic load, and data throughput yields network
situational understanding to enable dynamic rerouting of priority traffic and services and may provide
indications of cyberspace or electronic attack. Situational awareness allows commanders and signal elements
to—
* Monitor, protect, and prioritize their network assets.
* Assess the operational impact of network disruptions.
* Respond to network outages or attacks. |
6-02 | 29 | Overview of Signal Support
* Dynamically reallocate network traffic.
OBJECTIVES OF SIGNAL SUPPORT
1-115. Signal elements and capabilities exist to meet commanders’ information requirements and enable
control of forces. The Army network extends from the lowest tactical echelons to the highest levels of
command. As a warfighting platform, the network enables commanders to integrate combined arms and all
elements of combat power. Signal capabilities support command and control and enable strategic
responsiveness, ultimately leading to a marked information advantage in the operational area.
SUPPORT TO COMMAND AND CONTROL
1-116. The fundamental principle of operational focus supports the commander’s exercise of command and
control. Signal elements can adapt the network based on the operational phase or tactical situation to meet
the commander’s information requirements at the home station, en route, or while deployed. The fundamental
principle of scalability enables signal leaders to tailor signal support to the purpose and scope of the
deployment. Supporting signal elements adjust the network to provide appropriate services at the point of
need, under all conditions
STRATEGIC RESPONSIVENESS
1-117. Strategic responsiveness requires Army forces to react quickly to changes in the operational
environment. The fundamental principles of operational focus, interoperability, agility, and shared networks
allow signal support to rapidly adapt and scale the network to support any mission or situation. Joint and
Army networks provide worldwide strategic voice and data capabilities and prepositioned connection points
to extend services to expeditionary forces. Expeditionary signal capabilities provide the same types of
services used at the home station, whenever and wherever rapidly-deployable forces are needed.
1-118. Signal network capabilities enable leaders to receive, process, and disseminate information globally.
Strategic responsiveness allows leaders to see and understand the significance of situations around the world
and then make and disseminate decisions, resulting in action. These network capabilities support coordinated
planning, preparation, execution, and synchronization with unified action partners.
INFORMATION ADVANTAGE
1-119. Signal elements who successfully apply all of the fundamental principles of signal support provide
their commander an information advantage. The Army network allows commanders and staffs to access
timely, protected information when and where they need it to meet their critical information requirements.
Access to information results in an information advantage and enables decision making, leadership, and
combat power. Information advantage is a key to gaining and retaining the initiative and consolidating gains
in the operational environment. Signal support enables information advantage by providing communications
and information technology systems, information management processes, and operational procedures that
give commanders the ability to—
* Focus on building an accurate, current, common operational picture.
* Enhance and share knowledge, understanding, and visualization of the operational environment.
* Improve and sustain the quality and speed of collaboration and decision making.
CORE COMPETENCIES OF THE SIGNAL CORPS
1-120. Signal Soldiers and units apply the fundamental principles of signal support by executing the core
competencies and essential capability of the Signal Corps. The core competencies are—
* DODIN operations.
* Network transport and information services.
* Spectrum management operations.
* Visual information and combat camera. |
6-02 | 30 | Chapter 1
1-121. COMSEC, while not a core competency, is an essential capability of signal support to implement
trusted systems. Together, the core competencies and essential capability enable commanders’ exercise of
command and control and integration of the other warfighting functions. Chapter 2 contains a more detailed
discussion of the core competencies and essential capability of the Signal Corps.
SECTION III – SIGNAL IN ARMY OPERATIONS
SUPPORT TO JOINT OPERATIONS
1-122. The Army is interdependent with the joint force and serves as the foundation on which the joint force
conducts land operations. The Army conducts operations to gain, sustain, and exploit control over land to
deny its use to an enemy. It does this with combined arms formations with the mobility, firepower, and
protection to defeat an enemy and establish control over land, resources, and populations. Army capabilities
enable joint force success across multiple domains, and in the information environment. The Army provides
key enabling capabilities to the joint force, including communications, intelligence, protection, and
sustainment support.
1-123. A secure, robust, and reliable communications system gives the joint force commander the means to
assimilate information and to exercise authority and direct forces over large geographic areas and a wide
range of conditions. A communications system that provides connectivity throughout the operational area
from the strategic to tactical levels is vital to plan, conduct, sustain operations, and enable information
superiority (JP 6-0). Joint commanders use the network to exercise command and control and integrate the
joint force components.
1-124. Army contributions to joint command and control include establishing, maintaining, and defending
the communications and network architecture to support Army and joint forces in the theater. The network
provides connectivity between Army forces and unified action partners in the joint operations area.
1-125. Army communications planners must include joint interoperability in their plans. Differences in
policies, technologies, levels of capabilities, and resources when integrating communications support
between joint and multinational forces create challenges that cannot be mitigated without in-depth planning
at all levels. As an example, when integrating with joint mission partners, Army network planners must align
their information sharing, COMSEC, technical engineering, and interconnection policies and procedures with
those established by the communications system directorate of a joint staff (J-6). Considering interoperability
requirements as early as possible in the planning process mitigates the added complexity of joint
communications planning.
1-126. The DODIN-A can adapt, and the network main effort shifts, as the theater matures and forces
transition between phases of an operation. DODIN operations control authorities and responsibilities shift as
an operation matures and units arrive in the affected theater. Refer to ATP 6-02.71 for details on the transfer
of DODIN operations authorities across the operational phases.
ARMY STRATEGIC ROLES
1-127. The Army accomplishes its mission by supporting the joint force in four strategic roles: shape
operational environments, prevent conflict, conduct large-scale ground combat, and consolidate gains (FM
3-0). Strategic roles are not tasks assigned to subordinate units, but broad goals of an Army force. The Army
conducts tactical tasks to accomplish each of its strategic roles to varying extents across each phase of an
operation. Refer to FM 3-0 for more information about the Army’s strategic roles.
SHAPE OPERATIONAL ENVIRONMENTS
1-128. Army operations to shape help dissuade adversary activities designed to achieve regional goals short
of military conflict. As part of operations to shape, the Army provides trained and ready forces to geographic
combatant commanders in support of their theater campaign plan. The theater army and subordinate Army
forces assist the geographic combatant commander in building partner capacity and capability and promoting |
6-02 | 31 | Overview of Signal Support
stability across the area of responsibility (FM 3-0). Army operations to shape take place continuously before,
during, and after a joint operation within a specific operational area.
1-129. Signal forces may contribute to shaping by conducting security cooperation activities to help build
partner nation capacity, capabilities, and interoperability. Forward deployed strategic signal units provide
peacetime and contingency access to the DODIN-A in theater. See chapter 3 for more information about
signal support to operations to shape.
PREVENT CONFLICT
1-130. Army operations to prevent include all activities to deter an adversary’s undesirable actions. These
operations are an extension of operations to shape designed to prevent adversary opportunities to further
exploit positions of relative advantage by raising the potential costs to adversaries of continuing activities
that threaten U.S. interests. Prevent activities are generally weighted toward actions to protect friendly forces,
assets, and partners, and to indicate U.S. intent to execute subsequent phases of a planned operation (FM
3-0).
1-131. Signal activities during operations to prevent include—predeployment activities, initial entry, and
development of theater infrastructure. Theater army planners develop contingency communications plans to
support the geographic combatant commander’s concept of operations. See chapter 3 for more information
about signal support to operations to prevent.
CONDUCT LARGE-SCALE GROUND COMBAT
1-132. During large-scale combat operations, Army forces focus on the defeat and destruction of enemy
ground forces as part of the joint team. Army forces close with and destroy enemy forces in any terrain,
exploit success, and break their opponent’s will to resist. Army forces attack, defend, conduct stability
tasks, and consolidate gains to attain national objectives (FM 3-0)
1-133. During large-scale ground combat, organic signal elements at corps and below support command
post operations for planning and support. Maneuver elements rely mainly on single-channel radios and
friendly force tracking capabilities. See chapter 4 for more information about signal support to large-scale
combat operations.
CONSOLIDATE GAINS
1-134. Consolidation of gains is an integral and continuous part of armed conflict, and it is necessary for
achieving success across the range of military operations (FM 3-0). Consolidation of gains is deliberate and
takes place during all phases of an operation. Consolidation of gains becomes the primary focus of Army
forces at the conclusion of large-scale combat operations. Signal activities to consolidate gains may include
transitioning to commercial communications infrastructure. See chapter 5 for more information about signal
support to the consolidation of gains.
THE ARMY OPERATIONAL CONCEPT
1-135. Army forces contribute to the joint mission through the conduct of unified land operations as part of
a joint and multinational force. Unified land operations is the simultaneous execution of offense, defense,
stability, and defense support of civil authorities across multiple domains to shape operational environments,
prevent conflict, prevail in large-scale ground combat, and consolidate gains as part of unified action (ADP
3-0).
1-136. Commanders conducting network-enabled operations need secure communications and automated
information systems that operate reliably and adapt to changing requirements, transparent to users. These
systems support U.S. and multinational forces at every level of command. The DOD network that supports
network-enabled operations is the DODIN. The Department of Defense information network is the set of
information capabilities, and associated processes for collecting, processing, storing, disseminating, and
managing information on-demand to warfighters, policy makers, and support personnel, whether
interconnected or stand-alone, including owned and leased communications and computing systems and |
6-02 | 32 | Chapter 1
services, software (including applications), data, security services, other associated services, and national
security systems (JP 6-0). Signal Soldiers and formations support Army operations with secure network
connectivity and information services at all echelons.
SUPPORT TO COMMAND AND CONTROL
1-137. Combined arms maneuver is impossible unless commanders have the expertise and communications
to synchronize Army and joint combat power. The science of control—regulating, monitoring, and directing
unit actions—requires sophisticated and rugged information systems, along with a well-trained staff to
employ them. Even knowledgeable and charismatic commanders cannot control everything beyond their
immediate surroundings without the supporting personnel, networks, information systems, processes and
procedures, and facilities and equipment (ADP 1).
1-138. The command and control system enhances the commander’s ability to conduct operations.
Commanders arrange the four components of the command and control system (see introductory figure-2)
to—
* Support decision making.
* Collect, create, and maintain relevant information and prepare knowledge products to support
situational understanding and visualization.
* Prepare and communicate directives.
* Establish the means to communicate, collaborate, and facilitate the functioning of teams.
1-139. Signal Soldiers and units provide the network and automated information systems to support the
commander’s exercise of command and control. Networks enable successful operations. Commanders
determine their information requirements and focus their staffs and organizations on using networks to meet
these requirements. These capabilities relieve staffs from handling routine data, and enable extensive
information sharing, collaborative planning, execution, and assessment that promote shared understanding
(ADP 6-0). Networks also assist commanders in projecting their decisions across the force. The Army’s
network is the DODIN-A. The DODIN-A enables the warfighting functions of command and control, fires,
intelligence, movement and maneuver, protection, and sustainment, and provides the commander and staff
the information they need to support sound decision making.
1-140. Signal support enables the commander to exercise command and control and to integrate the other
warfighting functions (see introductory figure-1 on page viii). The DODIN-A and automated information
systems enhance the ability to plan and coordinate operations across staff sections, cells, command posts,
and echelons. Signal Soldiers—
* Install, operate, maintain, and secure the DODIN-A (DODIN operations and COMSEC).
* Formulate signal support plans as part of the military decision-making process.
* Conduct information management.
1-141. As a warfighting platform, the DODIN-A enables commanders to integrate joint combined arms and
all elements of combat power. Command post personnel, information systems, and equipment must be able
to support continuous operations while in communication with their higher echelon, subordinate, supporting,
supported, and adjacent units (FM 3-0). The DODIN-A connects command posts, weapon platforms,
dismounted Soldiers, and sensors, enabling the command and control system to—
* Support leaders’ ability to understand, visualize, and describe the operational environment,
problems, and approaches to solving them (situational understanding).
* Support commanders’ ability to make decisions and direct action toward a desired end state.
* Assess understanding of—
The problem.
Adequacy of the operational approach and subsequent plans.
Level of progress.
1-142. Adversaries and enemies will target command and control systems. Units must adapt their command
and control systems to the realities of fighting peer threats. Conditions in large-scale combat operations
require the smallest possible physical footprint and electronic signature and the highest possible level of |
6-02 | 33 | Overview of Signal Support
agility. Close coordination between the G-6 (S-6) and the EW section can help identify and minimize the
command posts’ electronic signature.
1-143. The DODIN-A supports global, distributed command and control and enables the Army to fight and
win in a congested and contested operational environment. The DODIN-A integrates information services
and capabilities at all strategic, operational, and tactical echelons and enables all warfighting functions.
1-144. Signal elements can adapt the network based on the operational phase or tactical situation to provide
command and control capabilities in support of training and exercise, theater security cooperation, forcible
entry, large-scale combat operations, and stability activities. The purpose and scope of the deployment
determine the size and capability of the forces required. Supporting signal elements adjust the network to
provide appropriate services at the point of need, under all conditions.
1-145. Home station mission command centers enable units to conduct split-based operations. Controlling
an operation from the home station and deploying a smaller, forward-deployed command post reduces the
deployed footprint and operational risk. Utilizing the home station mission command center, the division can
deploy a smaller, tailored command post for initial entry operations, conduct major planning at the home
station, and use reachback to the home station.
SUPPORT TO OTHER WARFIGHTING FUNCTIONS
1-146. Signal Soldiers and units support all warfighting functions by installing, operating, and securing the
DODIN-A to provide connectivity to critical Defense Information Systems Network (DISN) services. These
services include the Defense Switched Network, Defense Red Switched Network, Organizational Messaging
Service, video teleconferencing, telemedicine services, SECRET Internet Protocol Router Network
(SIPRNET), Non-Classified Internet Protocol Router Network (NIPRNET), Joint Worldwide Intelligence
Communications System, and mission partner environment.
1-147. Reliable, secure communications and information services enable commanders to exercise command
and control and to integrate the other warfighting functions. The warfighting functions are mutually
supportive. The DODIN-A connects people to enable resource and information sharing and collaboration.
As information passes between elements, the network enables coordination to support the commander’s
intent. Integration of the warfighting functions relies on the network for information sharing.
1-148. Information and communications requirements change with the operational and mission variables.
Signal elements can adapt the network to continue supporting, and enabling the integration of, all warfighting
functions. The network can expand or contract to meet the commander’s changing information requirements.
As forces enter or leave an operational area, signal elements scale the theater network to meet mission
requirements.
1-149. Network changes take deliberate planning and sometimes require additional resources. Considering
network requirements early in the planning process ensures the network can fully support the unit’s
communications requirements. Identifying communications gaps during early planning allows commanders
to request augmentation, as necessary.
MULTINATIONAL INTEROPERABILITY
1-150. Army forces integrate, both operationally and organizationally, with joint, interorganizational, and
multinational mission partners. The traditional model of multinational operations, where each mission partner
operated in a separate area of operations and maintained a separate national classified network interferes with
information sharing and unity of effort. A tailored mission network in which unified action partners share
classified information and operate as equals enhances interoperability and facilitates multinational
cooperation.
1-151. The Defense Information Systems Agency maintains configuration standards and joining
instructions for mission partner environment. By adopting common standards and configurations, unified
action partners can share classified information freely without compromising the security of the information.
Mission partner environment increases battlefield effectiveness by enabling unity of effort among diverse
mission partners. |
6-02 | 34 | Chapter 1
STRATEGIC AND OPERATIONAL REACH
1-152. Strategic and operational reach enable Army forces to deploy rapidly, fight on arrival, and conduct
extended campaigns as part of a joint and multinational force. Doing so requires proficiency at force
projection, protection, and sustainment. Soldiers require an expeditionary mindset to prepare them for short
notice deployments into uncertain, often austere, and lethal environments.
1-153. Strategic reach provides the capability to operate against threats operating anywhere in the world.
The distance across which the United States can project decisive military power is its strategic reach
(FM 3-0).
1-154. Operational reach is the distance and duration across which a force can successfully employ military
capabilities (JP 3-0). Extending operational reach is a major concern for commanders throughout an
operation. The limit of a unit’s operational reach is its culminating point. Signal support using beyond line
of sight satellite communications capabilities extends operational reach by increasing the geographic area a
commander can effectively control.
OPERATIONAL MOVEMENT AND MANEUVER
1-155. Operational movement and maneuver combines global force projection with maneuver against an
operationally significant objective. Successful operational movement and maneuver allows a unit to—
* Secure and defend a lodgment.
* Develop support infrastructure and base camps.
* Receive, stage, and build up forces.
1-156. Signal support to operational movement and maneuver combines operational science and art to
ensure the right capabilities are available to support Army commanders, staffs, and units at the right time and
place. The science of signal support is the technical aspects of communications and the ability to properly
employ the Army’s wide variety of communications capabilities. The G-6 (S-6) must understand the
operation plan and articulate the capabilities and limitations of the unit’s communications assets. The scheme
of signal support effectively distributes capabilities across the organization and employs the network in a
manner that ensures the commander’s ability to exercise command and control at any time and place on the
battlefield.
EXPEDITIONARY CAPABILITY
1-157. The Army requires expeditionary forces with the endurance to prevail in protracted conflict against
determined enemies. Expeditionary capability requires deploying the right mix of Army forces to the right
place at the right time to achieve the desired mission objectives.
1-158. Expeditionary signal systems and formations enable commanders’ exercise of command and control
in a constrained environment, whether they are restricted to single-channel radios or are operating with full
DODIN-A capabilities. The tactical portion of the DODIN-A can scale up or down to meet changing
operational needs. The signal staff determines the smallest, least complex system available, and the minimum
staffing necessary to meet the expeditionary mission requirement. Signal staffs determine whether to deploy
servers forward, utilize reachback to the home station, or rely on strategic enterprise services to support an
expeditionary mission.
FORCE PROJECTION
1-159. Force projection is the military component of power projection. Seizing the initiative generally
requires force projection. Force projection is a race between friendly and enemy forces. The side that most
rapidly builds combat power can seize the initiative. During force projection, the ability to scale
communications packages up or down to meet mission requirements gives commanders flexibility when
tailoring force projection packages. |
6-02 | 35 | Overview of Signal Support
ENTRY OPERATIONS
1-160. The entry of Army and joint forces into a joint operations area or theater of operations may be
unopposed or opposed (FM 3-0). Being part of an expeditionary force means units deploy on short notice to
austere locations. Maintaining communications en route to the operational area allows units to refine their
plans while in transit and arrive in the area of operations with current intelligence estimates ready to
immediately conduct combat operations.
1-161. Attaining operational reach often requires gaining and maintaining operational access in the face of
enemy antiaccess and area denial capabilities and actions. Commanders conduct forcible entry operations to
seize and hold a military lodgment in the face of armed opposition.
Early and Initial Entry
1-162. During the initial phases of an operation, units may not be able to deploy heavy wideband satellite
communications trailers and nodal systems. Signal leaders need to deploy their communications capabilities
in phases and build network capacity over time. Initial entry operations may be supported solely with single-
channel, push-to-talk radios. Commercial cellular networks and devices may augment single-channel radios
until adequate signal support becomes available in the operational area, but commanders’ risk decisions must
account for peer threat capabilities to exploit cellular networks for location information and intelligence
collection. Expeditionary units must be prepared to operate with limited communications capabilities in
austere locations. Signal planners must effectively deploy the solutions that maximize capabilities within the
limitations of the situation or environment.
Forcible Entry
1-163. Forcible entry is seizing and holding of a military lodgment in the face of armed opposition or
forcing access into a denied area to allow movement and maneuver to accomplish the mission (JP 3-18).
Army forces, as part of a joint force, must be capable of deploying and fighting to gain access to geographic
areas controlled by forces hostile to U.S. national interests to be credible both as a deterrent and as a viable
military option for policy enforcement (FM 3-0).
1-164. Forcible entry operations are inherently complex and always joint. Often only hours separate the
alert from the deployment. The demands of simultaneous deployment and employment create a distinct set
of dynamics. Operations are carefully planned and rehearsed in training areas and marshalling areas.
Personnel and equipment are configured for employment upon arrival without reception, staging, onward
movement, and integration (FM 3-0).
1-165. Joint interoperability of signal systems enables units to conduct forcible entry operations with joint
and multinational partners. Interoperable communications allow mission partners to synchronize their efforts
and share situational awareness to prevent friendly fire.
1-166. Because communications systems must be built-up at the objective area, some aspects of
communications support are unique in forcible entry operations. Communications requirements for joint
forcible entry operations vary with the mission, size, composition, and geographic location of the joint force
and its senior headquarters. Significant requirements to consider for forcible entry operations are the use of
intermediate staging bases, en route mission planning, and intelligence sharing.
1-167. Ground commanders in airlift aircraft may communicate with the chain of command over the Army
secure en route communications package. Normally, the airlift mission commander and the airborne task
force commander are in the same aircraft. The senior ground commander can advise embarked ground
commanders of changes in the ground tactical situation or to the air movement plan (JP 3-18).
1-168. Forces initially deploy with limited communications capabilities—primarily single-channel radios
and narrowband (single-channel) satellite communications. As additional units enter the operational area, the
deployed network becomes more robust to support greater troop strength and associated command posts.
Refer to JP 3-18 for more information about forcible entry operations. |
6-02 | 37 | Chapter 2
Signal Support by Army Echelon, Core Competencies,
Training, and the Army Network
This chapter discusses Army signal capabilities by echelon, the core competencies of
the Signal Corps, signal collective training in units, and the Department of Defense
information network-Army.
SECTION I – SIGNAL SUPPORT BY ECHELON
2-1. Deployable signal elements support the Army’s operational needs, whether they are pooled assets or
organic to a maneuver or support unit. Unique signal units provide strategic communications infrastructure
or perform specialized missions and functions.
CORPS AND BELOW ORGANIZATIONS WITH ORGANIC SIGNAL
ASSETS
2-2. Combat and combined arms units at echelons corps and below have organic signal capabilities to
conduct their standard missions without requiring outside signal support. However, augmentation of
communications capabilities is required for most enabler units, and if the unit’s operational reach expands
beyond the capabilities of their organic systems.
2-3. A brigade combat team may have company- or platoon-sized elements operating beyond the reach of
single-channel radios, or that require more robust network connectivity and services than those provided by
the brigade’s organic signal capabilities. This becomes a downward-reinforcing mission of the theater tactical
signal brigade and expeditionary signal battalion. Refer to ATP 6-02.60 for more information about the
organic network communications capabilities of corps and below units.
CORPS
2-4. The corps is the principal headquarters for applying landpower as a component of a campaign (FM
3-94). The corps integrates landpower into campaigns and serves as the link between the operational and
tactical levels of war.
2-5. The organic signal capabilities of the corps support its main and tactical command posts. When the
corps serves as a joint task force headquarters, as a joint or multinational land component command, or as a
tactical headquarters commanding multiple divisions, it may require augmentation from other Services or
pooled signal assets from the theater tactical signal brigade.
Corps G-6
2-6. The G-6 is the principal staff officer who advises the commander on all matters related to
communications in the corps. The G-6 advises the corps commander, staff, and subordinate commanders on
technical and training issues related to network and information service integration. During split-based
operations, the G-6 usually aligns with the tactical command post, while the deputy G-6 remains with the
main command post. The corps G-6 coordinates with G-3 to direct the actions and movements of signal
elements to support operations through the orders process. |
6-02 | 38 | Chapter 2
2-7. The G-6 coordinates with higher, adjacent, and subordinate echelons to ensure adequate network
support. See appendix B for more information about collaboration with higher, adjacent, and subordinate
signal elements.
2-8. The G-6 controls DODIN operations in the corps area of operations through the network operations
and security center. The corps network operations and security center establishes the corps portion of the
DODIN-A. The network operations and security center provides operational and technical support to
subordinate signal elements through technical channels. Technical channels are the chain of authority for
ensuring the execution of clearly delineated technical tasks, functions, and capabilities to meet the dynamic
requirements of Department of Defense information network operations (ATP 6-02.71). The network
operations and security center monitors the health of the network and directs fault, configuration, accounting,
performance, and security management. When operating as part of a joint task force headquarters, the corps
network operations and security center forms the core of the joint network operations control center, with
augmentation.
Note. Signal personnel often incorrectly refer to a ‘network operations chain of command.’ The
correct term to describe the chain of authority for the conduct of DODIN operations is technical
channels.
2-9. DODIN operations technical channels align with the operational chain of command to maintain unity
of command and unity of effort. This allows commanders to manage the network as a warfighting platform
and align available communications and network support capabilities to their highest mission priorities
during each phase of an operation. Battalions configure their systems to report status information to the
brigade network operations and security center. Each subsequent network operations and security center
reports status to the next higher level of command. The regional cyber center monitors status of the theater
network through the regional hub node on behalf of the theater army. Figure 2-1 depicts the DODIN
operations technical channels at corps and below. Refer to ATP 6-02.71 for more information about DODIN
operations monitoring and reporting. |
6-02 | 39 | Signal Support by Army Echelon, Core Competencies, Training, and the Army Network
Figure 2-1. Department of Defense information network operations technical channels at corps
and below
2-10. The corps G-6 integrates the corps network and automated information systems. The G-6 prepares the
communications plan and exercises technical control over the signal portion of the corps signal, intelligence,
and sustainment company in executing the plan. After initializing the local area networks, the G-6 establishes
a 24-hour service desk to help with user issues and local area network connectivity in the command posts.
The roles and responsibilities of the G-6 include—
* Developing the scheme of signal support to operation orders through the military decision-making
process, including PACE plans for each phase of the operation.
* Assist the commander and G-3 in identifying user requirements by number and service type.
* DODIN operations planning.
* Satellite communications planning.
* Line of sight network planning.
* Tactical radio network planning.
* Spectrum management.
* COMSEC account management.
* Integrating mission command information systems in the corps network. |
6-02 | 40 | Chapter 2
* Coordinating, planning, and directing integration of unified action partner networks (mission
partner environment).
* Local area network management for the corps command posts.
* Service desk management.
* Helping collect and disseminate relevant input to the common operational picture.
* Supporting the cyberspace electromagnetic activities (CEMA) section, as required.
* Information dissemination management to ensure awareness of relevant, accurate information,
automated access to newly discovered or recurring information, and timely information delivery
to support decision making.
* Signal maintenance and logistical readiness oversight for communications-electronics equipment.
2-11. When the corps headquarters serves as a joint task force headquarters, the G-6 usually serves as the
joint task force J-6. This mission requires augmentation from other Services or pooled Army tactical signal
assets.
Corps Signal, Intelligence, and Sustainment Company
2-12. The signal portion of the corps signal, intelligence, and sustainment company operates under the
technical control of the corps G-6. The company includes staffing for the G-6 section and elements to install,
operate, maintain, and secure the corps headquarters’ network transport, automated information systems, and
networks. Refer to relevant intelligence and sustainment doctrine publications for more information on the
company’s intelligence and sustainment functions.
2-13. The corps signal, intelligence, and sustainment company provides communications and network
support for the corps main and tactical command posts and the various companies in the corps headquarters
and headquarters battalion. The signal portion of the company also provides—
* Wideband and protected satellite communications transport to connect with the DODIN-A.
* High-throughput line of sight transport to communicate between command posts.
* DISN services—SIPRNET, NIPRNET, Joint Worldwide Intelligence Communications System,
voice, and video.
* Wire, cable, and fiber optic systems to support the corps command posts.
* Single-channel radio and narrowband (single-channel) tactical satellite retransmission for the
corps and support elements.
* Global Broadcast Service capability to receive high bandwidth imagery, logistics data, and digital
map information to support command and control.
Note. Employing a retransmission team remotely from established command posts or other units
requires additional planning and resources for site defense, logistics, and emergency evacuation.
Refer to ATP 6-02.53 for more information about retransmission planning.
DIVISION
2-14. The division is the Army’s primary tactical warfighting headquarters. Its primary role is as a tactical
headquarters commanding brigades in decisive action (FM 3-94). The division’s organic signal capabilities
support operations from traditional main and tactical command posts, as well as command and control on-
the-move. The division’s home station mission command center supports split-based operations. Although
the division has organic signal capabilities, most enablers and other attached units require augmentation. As
the division’s operational reach expands, smaller units without organic signal capabilities require
augmentation. This is a downward reinforcing mission of the theater tactical signal brigade.
Division G-6
2-15. The G-6 is the principal staff officer who advises the commander on all matters related to
communications in the division. The G-6 advises the division commander, staff, and subordinate |
6-02 | 41 | Signal Support by Army Echelon, Core Competencies, Training, and the Army Network
commanders on technical and training issues related to network and information service integration. During
split-based operations, the G-6 usually aligns with the tactical command post, while the deputy G-6 remains
with the main command post. The division G-6 coordinates with the G-3 to direct the actions and movements
of signal elements to support operations through the orders process.
2-16. The G-6 coordinates with higher, adjacent, and subordinate echelons to ensure adequate network
support. The G-6 recommends network changes as needed to support the commander’s intent. See appendix
B for more information about signal planning and collaboration with higher, adjacent, and subordinate signal
elements.
2-17. The division G-6 conducts DODIN operations in their area of operations through the division network
operations and security center. The division network operations and security center establishes the division’s
portion of the DODIN-A. The network operations and security center provides guidance to subordinate signal
elements through technical channels. The network operations and security center monitors the health of the
network and directs fault, configuration, accounting, performance, and security management. When the
division acts as a joint task force headquarters, the division network operations and security center forms the
core of the joint network operations control center, with augmentation.
2-18. The division G-6 integrates the division’s network and information systems. The G-6 prepares the
communications plan and exercises technical control over the division signal company in executing the plan.
After initializing the local area networks, the G-6 establishes a 24-hour service desk to help with user issues
and local area network connectivity in the command posts. The roles and responsibilities of the G-6 include—
* Developing the scheme of signal support to operation orders through the military decision-making
process, including PACE plans for each phase of the operation.
* Assist the commander and G-3 in identifying user requirements by number and service type.
* DODIN operations planning.
* Satellite communications planning.
* Managing satellite communications networks for the division and subordinate brigade combat
teams.
* Line of sight network planning.
* Managing line of sight networks for the division and subordinate brigade combat teams.
* Tactical radio network planning.
* Spectrum management.
* COMSEC account management.
* Integrating mission command information systems in the division network.
* Coordinating, planning, and directing integration of unified action partner networks (mission
partner environment).
* Local area network management for the division command posts.
* Service desk management.
* Helping collect and disseminate relevant input to the common operational picture.
* Supporting the CEMA section, as required.
* Information dissemination management to ensure awareness of relevant, accurate information,
automated access to newly discovered or recurring information, and timely information delivery
to support decision making.
* Signal maintenance and logistical readiness oversight for communications-electronics equipment.
2-19. When the division headquarters serves as a joint task force headquarters, the G-6 usually serves as the
joint task force J-6. This mission requires augmentation from other Services or pooled signal assets.
Division Signal, Intelligence, and Sustainment Company
2-20. The signal portion of the division signal, intelligence, and sustainment company operates under the
technical control of the division G-6. The company installs, operates, maintains, and secures the division’s
network transport, automated information systems, and networks and provides the G-6 staff. The division’s
organic signal capabilities support operations at-the-halt from the main and tactical command posts, and |
6-02 | 42 | Chapter 2
command and control on-the-move. Refer to relevant intelligence and sustainment doctrine publications for
more information on the company’s intelligence and sustainment functions.
2-21. The signal portion of the division signal, intelligence, and sustainment company supports the division
command posts and the various companies in the division headquarters and headquarters battalion. The
company also provides—
* Wideband and protected satellite communications transport to connect with the DODIN-A.
* Gateway access to the DODIN-A through the tactical hub node, if regional hub node service is not
available.
* High-throughput line of sight transport to communicate between fixed command posts.
* Line of sight and wideband satellite communications transport to support command and control
on-the-move.
* DISN services—SIPRNET, NIPRNET, Joint Worldwide Intelligence Communications System,
voice, and video.
* Single-channel radio and narrowband (single-channel) tactical satellite retransmission for the
brigade and support elements.
* Wire, cable, and fiber optic systems to support the division command posts.
* Global Broadcast Service capability to receive high bandwidth imagery, logistics data, and digital
map information to support command and control.
BRIGADE COMBAT TEAM
2-22. The brigade combat team provides the division, land component command, or joint task force with
close combat capabilities. The brigade combat team’s organic signal capabilities support operations at-the-
halt from the main and tactical command posts. Active component infantry and Stryker brigade combat
teams’ signal capabilities also support command and control on-the-move.
Brigade Combat Team S-6
2-23. The S-6 is the principal staff officer who advises the commander on all matters related to
communications in the brigade. The S-6 advises the brigade combat team commander, staff, and subordinate
commanders on technical and training issues related to network and information service integration. The
S-6 directs planning and coordination for DODIN operations, network transport and information services,
and spectrum management operations for the brigade headquarters and subordinate units through the military
decision-making process (see appendix B).
2-24. The S-6 collaborates with the higher headquarters J-6 or G-6, assigned or attached battalion S-6 staffs,
and adjacent units to ensure effective communications throughout the brigade area of operations. The S-6
recommends network changes as needed to support the commander’s intent. The brigade S-6 coordinates
with the S-3 to direct the actions and movements of signal company elements to support operations through
the orders process.
2-25. The S-6 conducts DODIN operations for the brigade and subordinate battalions through the brigade
network operations and security center. The network operations and security center establishes the brigade’s
portion of the DODIN-A. The network operations and security center provides guidance to subordinate signal
elements through technical channels. The network operations and security center monitors the health of the
network and directs fault, configuration, accounting, performance, and security management.
2-26. The S-6 integrates the brigade’s network and automated information systems. The S-6 prepares the
communications plan and exercises technical control over the brigade signal company in executing the plan.
After initializing the local area networks, the S-6 establishes a 24-hour service desk to help with user issues
and local area network connectivity in the command posts. Roles and responsibilities of the S-6 include—
* Developing the scheme of signal support to operation orders through the military decision-making
process, including PACE plans for each phase of the operation.
* Assist the commander and S-3 in identifying user requirements by number and service type.
* DODIN operations planning for the brigade and subordinate battalions. |
6-02 | 43 | Signal Support by Army Echelon, Core Competencies, Training, and the Army Network
* Identifying user requirements by number and service type.
* Spectrum management for the brigade and subordinate battalions.
* Satellite communications planning for the brigade and subordinate battalions.
* Line of sight network planning.
* Tactical radio network planning.
* Tactical radio networks management.
* COMSEC account management.
* Integrating mission command information systems in the brigade network.
* Coordinating, planning, and directing integration of unified action partner networks (mission
partner environment).
* Local area network management for the brigade command posts.
* Installing, operating, and maintaining automated information systems and telephone equipment in
the brigade command posts.
* Installing, operating, and maintaining Battle Command Common Server.
* Service desk management.
* Helping collect and disseminate relevant input to the common operational picture.
* Supporting the CEMA section, as required.
* Information dissemination management to ensure awareness of relevant, accurate information,
automated access to newly discovered or recurring information, and timely information delivery
to support decision making.
* Signal maintenance and logistical readiness oversight for communications-electronics equipment.
Brigade Combat Team Signal Company
2-27. The brigade signal company is assigned to the brigade engineer battalion. The company operates under
the technical control of the brigade S-6. The company installs, operates, maintains, and secures the brigade’s
organic network transport, automated information systems, and networks to support command post
operations at-the-halt and command and control on-the-move. The signal company employs its platoons and
teams throughout the brigade area of operations. The signal company has signal and COMSEC systems
maintenance augmentation, spares management, and maintenance accountability from the organic
communications-electronics maintenance element of the brigade support battalion’s field maintenance
company. Field maintenance is on-system maintenance, repair and return to the user including maintenance
actions performed by operators (FM 4-30).
2-28. The brigade signal company extends information services to the brigade command posts and command
vehicles. The brigade signal company also provides—
* Wideband and protected satellite communications transport to connect with the division portion
of the DODIN-A.
* High-throughput line of sight transport to communicate between fixed command posts.
* Line of sight and wideband satellite communications transport to support command and control
on-the-move.
* Wire, cable, and fiber optic systems to support the brigade and battalion command posts.
* DISN services—SIPRNET, NIPRNET, Joint Worldwide Intelligence Communications System,
voice, and video.
* Single-channel radio and narrowband (single-channel) tactical satellite retransmission for the
brigade and support elements.
* Global Broadcast Service capability to receive high bandwidth imagery, logistics data, and digital
map information to support command and control.
Maneuver Battalion S-6
2-29. The S-6 advises the commander on all matters related to communications in the battalion. The battalion
S-6 integrates automated information systems, manages their local area network, implements cybersecurity, |
6-02 | 44 | Chapter 2
and coordinates spectrum management. Signal planners in the S-6 section are active participants throughout
the military decision-making process. The S-6 evaluates the supportability and feasibility of the signal plan
supporting each proposed course of action during the military decision-making process. The S-6 maintains
the running estimate of communications capabilities and provides signal support plans to design and
configure the battalion’s communications assets, including PACE plans for each phase of the operation.
2-30. The S-6 interacts closely with the executive officer, S-3, and other staff sections to define
communications and network requirements through the military decision-making process. They consult with
higher, lower, and adjacent headquarters to ensure effective communications throughout their area of
operations. The S-6 should maintain a close working relationship with the commander and battalion S-3 to
ensure the communications plan supports the commander’s intent. Roles and responsibilities of the S-6
include—
* Developing the scheme of signal support to operation orders through the military decision-making
process.
* Assist the commander and S-3 in identifying user requirements by number and service type.
* Identifying user requirements by number and service type.
* Coordinating spectrum management for the battalion’s communications systems with the brigade
spectrum manager.
* Managing the COMSEC local hand receipt.
* Integrating mission command information systems in the battalion network.
* Local area network management for the battalion command post.
* Installing, integrating, and maintaining automated information systems and telephone equipment
in the battalion command post.
* Implements cybersecurity measures to maintain compliant systems.
* Managing tactical radio networks.
Maneuver Battalion Signal Capabilities
2-31. The battalion S-6 section configures, secures, and operates the battalion’s organic communications
capabilities. Each maneuver battalion has organic tactical radios, local area network, and wide-area network
capabilities. The battalion’s organic assets support the battalion command post at-the-halt and provide the
commander the common operational picture and a command and control on-the-move capability. The
battalion S-6 section also provides—
* Beyond line of sight satellite communications access to the division portion of the DODIN-A.
* Line of sight and satellite communications on-the-move to the company, battalion, brigade, and
division network.
* DISN services—SIPRNET, NIPRNET, voice, and video.
* Single-channel radio and narrowband (single-channel) tactical satellite communications
retransmission for the battalion and support elements.
* Global Broadcast Service capability to receive high bandwidth imagery, logistics data, and digital
map information to support command and control.
Maneuver Company Signal Capabilities
2-32. Maneuver companies have limited organic signal capabilities. Companies have single-channel secure
radios down to squad level. The company commander has beyond line of sight satellite communications
access to the division information network to support the common operational picture, limited DISN services,
and command and control on-the-move. The company’s communications systems are mostly general-
purpose, user-operated equipment not staffed by signal Soldiers. Refer to FM 3-96 for more information
about brigade combat team operations. |
6-02 | 45 | Signal Support by Army Echelon, Core Competencies, Training, and the Army Network
MULTIFUNCTIONAL SUPPORT BRIGADE
2-33. Combat aviation, field artillery, maneuver enhancement, and sustainment brigades have organic
tactical signal assets. Their signal capabilities support the brigade and subordinate battalion command posts
operating at-the-halt.
Brigade S-6
2-34. The S-6 advises the commander on all matters related to communications in the brigade. The S-6
advises the commander, staff, and subordinate commanders on technical and training issues related to
network and information service integration. The S-6 plans and coordinates signal support to the brigade’s
main and tactical command posts through the military decision-making process (see appendix B). The brigade
S-6 coordinates with the S-3 to direct the actions and movements of signal company elements to support
operations through the orders process.
2-35. The S-6 directs planning and coordination for DODIN operations, network transport and information
services, and spectrum management for the brigade headquarters and subordinate units. The
S-6 collaborates with higher, subordinate, and adjacent units to ensure adequate network support. The S-6
recommends network changes as needed to support the commander’s intent.
2-36. The S-6 integrates the brigade’s network and information systems. The S-6 prepares the
communications plan and exercises technical control over the brigade signal company in executing the plan.
After initializing the local area networks, the S-6 section establishes a 24-hour service desk to help with user
issues and local area network connectivity in the command posts. Roles and responsibilities of the S-6
include—
* Developing the scheme of signal support to operation orders through the military decision-making
process, including PACE plans for each phase of the operation.
* Assist the commander and S-3 in identifying user requirements by number and service type.
* DODIN operations planning for the brigade and subordinate battalions.
* Satellite communications planning for the brigade and subordinate battalions.
* Line of sight network planning.
* Tactical radio network planning.
* Spectrum management for the brigade and subordinate battalions.
* COMSEC account management.
* Integrating mission command information systems in the brigade network.
* Coordinating, planning, and directing integration of unified action partner networks (mission
partner environment).
* Local area network management for the brigade command posts.
* Service desk management.
* Helping collect and disseminate relevant input to the common operational picture.
* Supporting the CEMA section, as required.
* Information dissemination management to ensure awareness of relevant, accurate information,
automated access to newly discovered or recurring information, and timely information delivery
to support decision making.
* Signal maintenance and logistical readiness oversight for communications-electronics equipment.
Brigade Signal Company
2-37. The brigade signal company operates under the technical control of the brigade S-6. The company
installs, operates, maintains, and secures the brigade’s network transport, automated information systems,
and networks. The brigade’s organic signal capabilities support command post operations at-the-halt. The
brigade signal company has signal maintenance augmentation, spares management, and maintenance
accountability from the brigade’s organic communications-electronics maintenance element. Either the
organic maintenance element or the support maintenance company provides remaining maintenance support |
6-02 | 46 | Chapter 2
for communications-electronics, COMSEC, automotive, power generation, and environmental control
equipment.
2-38. The brigade signal company supports the brigade and subordinate battalion command posts. The
brigade signal company also provides—
* Wideband and protected satellite communications transport to connect with the division portion
of the DODIN-A.
* High-throughput line of sight transport to communicate between command posts.
* Line of sight and wideband satellite communications transport to support command and control
on-the-move.
* DISN services—SIPRNET, NIPRNET, Joint Worldwide Intelligence Communications System,
voice, and video.
* Single-channel radio and narrowband (single-channel) tactical satellite retransmission for the
brigade and support elements.
* Global Broadcast Service capability to receive high bandwidth imagery, logistics data, and digital
map information to support command and control.
* Wire, cable, and fiber optic systems to support the brigade and battalion command posts.
Battalion S-6
2-39. The battalion S-6 integrates automated information systems, manages the battalion local area network,
implements cybersecurity, and coordinates spectrum management. Signal planners in the S-6 section are
active in the operations process. The S-6 ensures the commander can communicate to exercise command and
control. The S-6 evaluates the supportability and feasibility of the signal plan supporting each proposed
course of action during the military decision-making process. The S-6 maintains the running estimate of
communications capabilities and provides signal support plans to build and configure the battalion’s
communications capabilities.
2-40. The S-6 interacts closely with the executive officer, S-3, and other staff sections to define
communications and network requirements through the military decision-making process. They collaborate
with higher, lower, and adjacent headquarters to ensure effective communications throughout their area of
operations. The S-6 should maintain a close working relationship with the commander and battalion S-3 to
ensure the communications plan supports the commander’s intent. Roles and responsibilities of the S-6
include—
* Developing the scheme of signal support to operation orders through the military decision-making
process, including PACE plans for each phase of the operation.
* Assist the commander and S-3 in identifying user requirements by number and service type.
* Coordinating spectrum management for the battalion’s communications systems with the brigade
spectrum manager.
* Managing the battalion COMSEC hand receipt.
* Managing tactical radio networks.
* Integrating mission command information systems in the battalion network.
* Local area network management for the battalion command post.
* Installing, integrating, and maintaining automated information systems and telephone equipment
in the battalion command post.
* Implementing cybersecurity measures to maintain compliant systems.
2-41. The S-6 section performs local area network setup, administration, and user support. Attached brigade
signal company elements provide only the connection to DISN services. Refer to ATP 6-02.60 for more
information about brigade through corps communications. |
6-02 | 47 | Signal Support by Army Echelon, Core Competencies, Training, and the Army Network
SECURITY FORCE ASSISTANCE BRIGADE
2-42. Each security force assistance brigade, both armored and infantry variants, has two maneuver
battalions, a cavalry squadron, a field artillery battalion, an engineer battalion, a military intelligence
company, a signal company, a support battalion, and a headquarters and headquarters company (ATP 3-96.1).
Brigade S-6
2-43. The S-6 advises the commander on all matters related to communications in the brigade. The S-6
advises the commander, staff, and subordinate commanders on technical and training issues related to
network and information service integration. The S-6 plans and coordinates signal support to the brigade’s
main and tactical command posts through the military decision-making process (see appendix B). The S-6
collaborates with subordinate battalion S-6s and supported unit to ensure adequate network support. See
appendix B for more information about collaboration with higher and subordinate signal elements.
Brigade Signal Company
2-44. The signal company provides voice and data retransmission capability for its tactical radio network.
The retransmission team provides line of sight extension of the brigade’s tactical radio network within the
brigade area of operations. During deployment, the signal company uses augmented assets from the
expeditionary signal battalion to provide worldwide digital voice and data communications to enable
command and control across the brigade’s area of operations.
Battalion S-6
2-45. The battalion S-6 coordinates with the brigade S-6 to define communications and network support
requirements, based on the situation and mission. The operational chain of command validates requests for
signal support they cannot source internally and forwards them to United States Army Forces Command for
approval and resourcing. The supporting signal unit provides a communications package tailored to validated
communications and information exchange requirements.
UNITS WITHOUT ORGANIC SIGNAL ASSETS
2-46. Theater tactical signal brigades and their assigned expeditionary signal battalions, are manned, trained,
and equipped to provide communications support to expeditionary units with no organic signal assets. See
paragraph 2-57 for more information about the theater tactical signal brigade.
THEATER ARMY
2-47. The theater army is the Army Service component command to a geographic combatant command. The
theater army headquarters—
* Exercises administrative control of all Army forces in the geographic combatant command area
of responsibility.
* Integrates Army forces into theater engagement plans.
* Provides Army support to joint, interorganizational, and multinational forces, as directed by the
geographic combatant commander.
2-48. The theater army main command post conducts routine day-to-day operations and crisis action
planning. With augmentation, the contingency command post can deploy to conduct small-scale operations,
commanding up to two brigade combat teams or equivalent for up to 30 days.
2-49. The theater army is designated as the DOD executive agent for setting and supporting the theater
communications and network architecture. The theater army executes these executive agent responsibilities
primarily through a signal command (theater) [SC(T)] assigned to support the area of responsibility
(ATP 3-93). Each Service component in a joint task force maintains its own networked communications
infrastructure, compatible with the other unified action partners. The J-6 exercises staff oversight over the
Service component systems in the joint force. The Service components may need to provide staffing or
equipment augmentation for the joint task force J-6 section. |
6-02 | 48 | Chapter 2
Theater Army G-6
2-50. The theater army G-6 plans, prioritizes, and coordinates communications and automated information
systems requirements to support Army units in a theater of operations. The G-6 integrates information
systems support to geographic combatant commander-designated joint, interorganizational, and
multinational partners. The G-6 assesses the network’s ability to meet the commander’s requirements and
develops relevant parts of operation orders, operation plans, and concept plans. The theater army G-6
validates communications and information systems requirements and urgent operational needs statements for
Army units in theater, and makes recommendations for resourcing.
* Headquarters section. Supervises planning, requirements development, and information
management policy for information systems support for the theater army headquarters and Army
forces in theater.
* Operations section. G-6 operations coordinates with military and civil communications
authorities of the host nation and integrates information systems support to geographic combatant
commander-designated joint, interorganizational, and multinational partners. The operations
section validates information system requirements and service requests to support Army forces in
theater. The section develops information system requirements to support Army and joint
exercises, and plans, implements, and analyzes information system requirements for the
headquarters.
COMSEC account manager. The COMSEC account manager maintains the theater army
headquarters COMSEC account, establishes COMSEC operations policies, and enforces
policies in the theater army area of operations. The COMSEC account manager also provides
user-level training on COMSEC material management and accountability.
Spectrum element. The spectrum element coordinates with other spectrum managers to
integrate Army and joint systems with the headquarters network. The element coordinates,
manages, and apportions frequency assignments for land forces in theater. The spectrum
manager coordinates with host-nation spectrum authorities to deconflict military use of the
electromagnetic spectrum.
* Programs, policy, and projects headquarters section. The programs, policy, and projects
headquarters section of the main command post plans and controls the headquarters’ information
management architecture and long-range modernization plans. The section tracks the status of the
headquarters’ automated information systems and local area network. The section develops and
justifies long-range financial plans, and conducts research and analysis to evaluate technology
available to support user requirements.
Projects branch. The projects branch manages network initiatives and projects for the theater
army headquarters. The branch manages intra-theater information system projects, programs,
and initiatives and integrates commercial off-the-shelf communications and information
systems into the theater network. The branch coordinates with national- and strategic-level
information systems engineering activities to implement information technology initiatives in
support of theater army operations and plans.
Cybersecurity branch. The cybersecurity branch establishes, manages, and assesses the
headquarters’ cybersecurity program. The branch provides user-level cybersecurity
awareness training to help secure the network infrastructure and oversees, assesses, and
supports information technology systems accreditation according to the DOD risk
management framework. Refer to DODI 8510.01 for detailed information about the DOD risk
management framework.
Programs and policy branch. The programs and policy branch plans and controls theater
army headquarters basing initiatives, information management architecture, and long-range
modernization plans. The branch develops and justifies long-range financial plans that support
users’ information system requirements.
Enterprise architecture branch. The enterprise architecture branch ensures compliance and
interoperability of the Army information technology architecture within the theater, in support
of the regional cyber center. The branch manages the theater portion of the Army information
management program to support network-enabled, knowledge-based operations. The |
6-02 | 49 | Signal Support by Army Echelon, Core Competencies, Training, and the Army Network
enterprise architecture branch also develops theater enterprise architecture and standards to
ensure equipment, systems, and networks meet DOD, joint, Department of the Army and
other applicable operational and doctrinal requirements.
* Headquarters support section. The headquarters support section installs, operates, maintains,
and secures video teleconferencing services and local area networks to support headquarters users,
and protects headquarters information systems from cyberspace attack. The section defines
requirements for communications, automated information systems, and services and manages the
headquarters information systems automation life cycle replacement plan.
* Joint and coalition network section. The joint and coalition network section plans, and
coordinates the management of, joint functional computer systems—both hardware and software.
The section integrates joint information systems with command post and sustainment information
systems. The section develops the information management plan and maintains Global Command
and Control System (Army and joint) servers to provide the common operational picture for the
theater army area of operations. The section represents the theater army on Army, joint, and
multinational information management boards. The section also develops and maintains the
concept of operations for multinational network information exchange, develops network
architecture and support requirements for joint and multinational exercises, and plans
implementation for new technologies.
Signal Support
2-51. The theater army has no organic signal capabilities. The theater army headquarters receives its network
and information services support from the local network enterprise center. If the theater army deploys a
contingency command post, the command post receives signal support from theater-committed or rotational
signal units. The theater Army G-6 identifies requirements, and the G-3 requests support through the
geographic combatant commander to United States Army Forces Command. The pooled resources of a
theater tactical signal brigade normally fulfill these communications requirements. See appendix E for more
information about requests for signal support.
FUNCTIONAL SUPPORT BRIGADES
2-52. A functional support brigade is a brigade or group that provides a single function or capability. These
brigades can provide support for a theater, corps, or division, depending upon how each is tailored
(FM 3-94). Functional support brigades receive their signal support either from the organic assets of the
supported unit or from pooled assets, such as an expeditionary signal battalion or forward operating base
infrastructure, as defined in the operation order. The supported unit assumes DODIN operations
responsibility for the support brigade. Managing the network may require augmentation.
2-53. The support brigade S-6 coordinates with the supported unit’s G-6 (S-6) to define communications and
network support requirements, based on the situation and mission. The operational chain of command
validates requests for signal support they cannot source internally and forwards them to United States Army
Forces Command for approval and resourcing. The signal support unit provides a communications package
tailored to satisfy validated communications and information exchange requirements.
JOINT TASK FORCES
2-54. Combatant commanders tailor task forces based on the commander’s vision, the concept of operations,
the situation, and the mission. As an ad hoc headquarters, a joint task force has no organic capabilities. The
commander, joint task force can task any force component to provide communications and network support
for the headquarters. The commander, joint task force controls joint task force communications systems and
networks through a joint network operations control center. Refer to JP 6-0 for more information about the
joint network operations control center.
2-55. The Army component of the joint task force provides its own communications support using organic
or pooled signal capabilities. The Army component of the joint task force is directly subordinate to the
commander, joint task force or joint force land component commander, but under the administrative control
of the theater army. The Army component headquarters has a dual DODIN operations reporting |
6-02 | 50 | Chapter 2
relationship—to the joint task force (through the joint network operations control center) and the theater army
(through the regional cyber center).
2-56. The commander, joint task force exercises overall authority and responsibility for DODIN operations
within the joint operations area. The theater army also provides guidance to Army forces through technical
channels to ensure compliance with Army policies for DODIN operations. Refer to JP 3-33 for more
information about joint task force operations.
SIGNAL COMMAND (THEATER)
2-57. The SC(T) headquarters at its home station receives communications and information services support
from its local network enterprise center. Forward deployed SC(T) staff elements receive network and
information services support through an overseas installation’s network enterprise center or forward
operating base infrastructure, or request communications support from theater-committed or rotational signal
units through the geographic combatant commander to United States Army Forces Command.
Note. In a theater with no assigned SC(T), the strategic signal brigade commander and staff or the
tactical actions center assume the staff functions normally associated with the SC(T).
TYPES OF SIGNAL UNITS LEVERAGED FOR SUPPORT
2-58. The Army’s global force pool includes echelons above core expeditionary signal units to support those
units with no organic signal assets. Expeditionary signal units can also augment corps and below units when
organic capabilities are not sufficient for an assigned mission.
THEATER TACTICAL SIGNAL BRIGADE
2-59. The theater tactical signal brigade headquarters supervises building, configuration, operation, and
maintenance of communications nodes, and secures these nodes, in the deployed portion of the network,
excluding the division and corps systems. It also integrates interorganizational and multinational partners
into the DODIN. The theater tactical signal brigade—
* Allocates, controls, and positions tactical networking resources.
* Oversees connection to the network for Army and designated joint, interorganizational, and
multinational elements.
* Provides physical security for, and actively defends, network resources.
* Performs long-range planning for tactical network expansion and upgrade.
* Enforces global (enterprise) and theater-level technical standards and policies for assigned tactical
networking resources.
* Conducts enterprise systems management and network management.
* Conducts spectrum management operations for tactical signal forces in theater.
* Exercises communications-electronics maintenance and logistical readiness oversight over
subordinate elements.
* Oversees contractor support operations and personnel.
Expeditionary Signal Battalion
2-60. The expeditionary signal battalion is a fundamental building block of the Army’s global force pool.
Most expeditionary signal battalions are theater available forces that can deploy for contingency or enduring
missions. An expeditionary signal battalion consists of a headquarters company, two expeditionary signal
companies, and a joint/area signal company. The battalion headquarters provides administrative and logistical
support for the signal battalion. The battalion S-3 oversees designing, building, configuring, securing,
operating, maintaining, and sustaining nodal and extension communications. |
6-02 | 51 | Signal Support by Army Echelon, Core Competencies, Training, and the Army Network
2-61. The expeditionary signal battalion supports Army units up to theater army, joint force land component
commanders, or joint task force headquarters. It also manages tactical communications assets in the battalion
through its suite of DODIN operations tools. The battalion headquarters provides these capabilities—
* Staff planning and supervision of the battalion and any attached units.
* Field maintenance support for the battalion headquarters.
* COMSEC account management for the battalion.
* Field maintenance of organic COMSEC equipment.
Note. COMSEC repair authorities cannot be delegated. Typically, field maintenance of COMSEC
is limited to preventive maintenance checks and services, inspection, detection, and correction of
minor faults.
Expeditionary Signal Company
2-62. The expeditionary signal company headquarters provides staff planning and supervision of its signal
platoons and any augmenting elements, personnel, or material assets. The expeditionary signal company
provides communications support in theater primarily for echelons above corps Army units. The
expeditionary signal company may also support other units without organic signal capabilities or augment a
unit’s organic capabilities. The expeditionary signal company also provides—
* Wideband and protected satellite communications transport.
* Beyond line of sight troposcatter network transport.
* High-throughput line of sight transmission.
* Telephone switching services.
* DODIN operations tools to support network management within the company.
* Cable, wire, and fiber optic installation and maintenance.
* Access to DISN voice, data, and video services.
* Field maintenance support for organic communications-electronics, COMSEC, automotive,
power generation, and environmental control equipment.
Joint/Area Signal Company
2-63. The joint/area signal company installs, operates, maintains, and secures large or medium command
nodes to extend DISN services supporting Army and joint missions in a theater of operations. The company
can also provide limited DISN services to support smaller command posts. This support includes line of sight
and beyond line of sight network transport, network management, and cable and wire installation to provide
garrison-quality data services to deployed users. The joint/area signal company primarily supports large
headquarters command posts, such as a geographic combatant command, theater army, joint task force, or
joint force land component command. The company can also support a limited number of battalion-sized
command posts. This joint/area signal company provides—
* Large command post support—DISN services.
* High-throughput line of sight transmission.
* Small command post support—limited DISN services.
* DODIN operations tools to support network management within the company.
* Troposcatter network transport to link large command posts, major headquarters, and signal nodes.
* Wideband satellite communications transport.
* Protected satellite communications connectivity between selected large and small node centers
and remote command posts.
* Cable and multiplexer assets to interconnect signal equipment.
* Field maintenance and limited sustainment maintenance of organic communications-electronics
and COMSEC equipment. |
6-02 | 52 | Chapter 2
SPECIAL-PURPOSE SIGNAL UNITS
2-64. The Army’s global force pool contains single-purpose signal units designed to concentrate low-density
specialties. Units can request the specialized support these signal companies provide through their operational
chain of command to United States Army Forces Command.
Combat Camera Company
2-65. The combat camera (COMCAM) company provides visual documentation covering the Military
Services in war, natural disasters, and training activities. The company provides still and motion imagery and
video documentation to support intelligence and decision making. The COMCAM company provides—
* Liaison to supported units, joint COMCAM teams, and other Service COMCAM elements.
* Planning, coordination, and supervision of COMCAM documentation support missions.
* COMCAM support for airborne operations (airborne COMCAM company only).
* COMCAM support for ground, air assault, and amphibious operations.
* Still photo (film and digital) and video editing, including rough editing for on-site customers.
* Tailored still and motion media, graphics products, narration support, video reports, presentations,
and visual imagery to support operational headquarters in the theater army, corps, and division
areas of operation.
* COMCAM equipment maintenance by on-site repair, replacement, or evacuation to civilian
contractors.
* Field maintenance of vehicles, power generators, environmental control units, and signal support
systems.
Tactical Installation and Networking Company-Enhanced
2-66. The tactical installation and networking company-enhanced provides network installation,
troubleshooting, quality assurance testing, and handoff coordination to enable the transition from tactical to
semi-permanent automation support. The company provides these capabilities to support theater army,
geographic combatant command, SC(T), and joint task force or coalition headquarters:
* Installation, maintenance, troubleshooting, testing, and repair of cable, wire, and fiber optic
transmission systems.
* Antenna and tower construction and repair.
* Installation of automated information systems and services, including—
Local area networks.
Wide-area networks.
Network security hardware.
SIPRNET.
NIPRNET.
Video teleconferencing.
2-67. The tactical installation and networking company-enhanced headquarters performs these functions to
support the unit’s mission:
* Advice to supported commanders on all aspects of network installation, including inside and
outside plant, local area networks, and wide-area networks.
* Technical expertise to interpret and execute engineering implementation plans for
communications systems.
* Direction and technical expertise to cable and wire sections and teams to restore supported
facilities.
* Planning, coordination, configuration, and integration of network installation efforts. |
6-02 | 53 | Signal Support by Army Echelon, Core Competencies, Training, and the Army Network
REQUESTING SIGNAL SUPPORT
2-68. A requesting unit’s G-6 (S-6) defines signal support requirements based on the mission, size of the
operation, the number of personnel and systems, and services needed. Signal requirements are not static; they
may change with the operational and mission variables. When defining requirements, the requesting unit
describes—
* The unit needing service and the number of connections needed for each requested service.
* The services needed—NIPRNET, SIPRNET, voice, special circuits, and COMSEC key support.
* The date-time group for required services.
* The location for required services.
* The supported unit battle rhythm for communications services.
2-69. Requests for signal support route through the operational chain of command to United States Army
Forces Command for validation and resourcing. When supporting a division, the requesting unit’s S-6 and
S-3 coordinate through the division G-6 to the theater army G-6 to identify and validate support requirements.
Any unit not tasked to a division coordinates directly with the theater army G-6 to request signal support.
2-70. When the operation order identifies the supporting signal unit, the requesting G-6 (S-6) contacts that
unit for coordination. The supporting signal unit provides the connection to DISN services, but does not
provide computers, telephones, or local area network support.
2-71. Supporting signal assets may fall under the operational or tactical control of the supported unit. The
supported unit may assume responsibility to provide logistics, personnel services, and health service support,
based on the command relationship established in the deployment order. See appendix E for details about
requests for signal support.
SUPPORT TO OTHER ARMY OPERATIONS
2-72. Certain types of Army units have organic signal capabilities to support their unique missions. Some
types of Army operations have specific communications requirements. Expeditionary signal units support
these operations.
SUPPORT TO ELECTRONIC WARFARE
2-73. Electronic warfare is military action involving the use of electromagnetic and directed energy to
control the electromagnetic spectrum or to attack the enemy (JP 3-13.1). The DODIN-A supports planning
and coordination of EW activities. The unit’s DODIN operations personnel, spectrum manager, and G-6 (S-
6) staff perform key roles in EW planning.
2-74. The unit’s network and automated information systems support EW planning. Signal Soldiers provide
the network for EW planners to—
* Prepare electronic protection policy on behalf of the commander.
* Prepare EW plans and orders.
* Aggregate EW sensor data to detect enemy electronic attacks.
* Report enemy electronic attack activity on friendly networks.
* Help resolve issues with EW systems maintenance or interference with friendly communications.
2-75. The spectrum manager in the G-6 (S-6) coordinates electromagnetic spectrum use for communications
and other electronic resources. Some units have spectrum managers in both the signal staff and the EW
section. The spectrum managers support EW by—
* Coordinating spectrum resources for the unit or task force.
* Coordinating spectrum use with higher echelon G-6 (S-6), host-nation spectrum authorities, and
international agencies, as necessary.
* Preparing the restricted frequency list.
* Issuing emissions control guidance. |
6-02 | 54 | Chapter 2
* Coordinating with the cyber electronic warfare officer for electromagnetic deception plans in
which assigned communications elements participate.
* Coordinating measures to reduce electromagnetic interference.
* Coordinating with higher echelon spectrum managers to mitigate electromagnetic interference that
cannot be resolved internally.
* Helping the cyber electronic warfare officer issue guidance to deconflict and resolve interference
between EW systems and friendly communications.
* Participating in CEMA to deconflict friendly electromagnetic spectrum requirements with planned
EW operations and information collection.
SUPPORT TO INTELLIGENCE OPERATIONS
2-76. The deployed portion of the DODIN-A provides network transport for intelligence-unique automated
information systems. These systems gather intelligence spanning all echelons and warfighting domains and
enable operational visualization and situational awareness for current and future operations. These
intelligence systems give commanders the ability to view joint intelligence, surveillance, and reconnaissance
products in one place and integrates that information into tools that can support intelligence development.
2-77. With transport convergence (see paragraph 2-267), the deployed network also provides network
transport for the top secret/sensitive compartmented information network to the brigade level. While the
network transport takes place through the tactical signal systems, the G-2 (S-2) section continues performing
DODIN operations for the top secret network.
SUPPORT TO SPACE OPERATIONS
2-78. The Army relies on space-based capabilities and systems, such as global positioning, communication,
weather satellites, and intelligence collection platforms. These systems are critical enablers used by the corps
to plan, communicate, navigate, maneuver, maintain situational awareness, engage the enemy, provide
missile warning, protect, and sustain forces (FM 3-14). One of the Army’s key space capabilities is satellite
communications. Specially-trained signal Soldiers plan, manage, monitor, and control access to the Defense
Satellite Communications System and Wideband Global Satellite Communications constellations (see
paragraph 2-161). Refer to FM 3-14 for more information about Army space operations. Refer to ATP 6-
02.54 for more information about satellite communications.
SUPPORT TO SPECIAL OPERATIONS
2-79. Army special operations forces require a secure and robust communications system to ensure the
commander can exercise authority and direct forces over large geographic areas. Special forces and Rangers’
organic signal capabilities provide communications and network services tailored to their unique
requirements.
2-80. Special operations communications networks include redundant transmission paths to prevent site
isolation. Global communications support ensures Army special operations forces can communicate
anywhere and at any time using strategic capabilities to the maximum extent possible, as well as commercial,
tactical, and host-nation assets (ATP 3-05.60).
Special Forces
2-81. The Army special operations forces location, mission, and structure drive specific information
requirements and flow, processing requirements and the specific configuration of the communications
system. Connectivity throughout the operational area is vital to planning, conducting, and sustaining
operations. The communications system must be tactically agile and globally deployable with consideration
made for communications that are en route, within the area of responsibility, and between the areas of
responsibility (ATP 3-05.60).
2-82. The special operations communications system meets these unique requirements with a blend of
standard Army communications capabilities, commercial off-the-shelf systems, and special operations
forces-specific capabilities. |
6-02 | 55 | Signal Support by Army Echelon, Core Competencies, Training, and the Army Network
Special Forces Group
2-83. Each special forces group has an S-6 with a supporting section located in the group headquarters and
headquarters company, and a group signal detachment located within the group special troops battalion. Each
special forces battalion has an S-6, with a supporting section located in the battalion headquarters and a
battalion signal detachment located in the battalion support company (ATP 3-05.60).
2-84. The group S-6 prepares signal plans; conducts information management, spectrum management
operations, and COMSEC management; and supports EW operations focusing on electronic protection. The
special forces group’s organic signal capabilities include—
* Wideband satellite communications.
* Special operations forces-unique switching systems.
* Tactical local area network—connected to either the DISN or the closed special operations forces
network.
* Mission command information systems.
* Global Broadcast Service.
* Narrowband (single-channel) satellite communications.
* Single-channel radios.
* Line of sight radios.
* Satellite telephones.
* International maritime satellite Broadband Global Area Network.
2-85. The battalion S-6 advises the commander on signal support, automation management, DODIN
operations, and information security. The duties of the battalion S-6 are similar to the group S-6. Special
forces battalion capabilities include—
* Wideband satellite communications.
* Special operations forces-unique switching systems.
* Tactical local area network—connected to either the DISN or the closed special operations forces
network.
* Mission command information systems.
* Narrowband (single-channel) satellite communications.
* Single-channel radios.
* International maritime satellite Broadband Global Area Network.
2-86. Special forces operational detachments A and B have organic narrowband satellite communications,
single-channel radio, international maritime satellite Broadband Global Area Network, satellite telephone,
and friendly force tracking capabilities.
Special Operations Signal Battalion
2-87. The special operations signal battalion provides operational- and tactical-level communications to
support joint and Army special operations forces. The battalion network operations and security center
manages the Army special operations forces tactical network.
2-88. The special operations signal battalion provides these capabilities:
* DODIN operations for the Army special operations forces network.
* Planning, installing, operating, and maintaining the theater-level special operations forces wide-
area network.
* Classified and unclassified voice, video, and data communications to support early or forcible
entry and sustained command post operations for United States Army Special Operations
Command. The battalion can also perform this function to support a joint task force or joint special
operations task force.
* Reachback to special operations forces headquarters to support split-based operations.
* Configuration management to maintain interoperability with the rest of the DODIN.
* COMSEC account management and maintenance. |
6-02 | 56 | Chapter 2
* Field- and sustainment-level maintenance for organic signal equipment and automation systems.
* Limited maintenance of special operations forces-unique signal equipment.
* Communications support for airborne and airdrop operations.
Rangers
2-89. The Ranger Regiment’s organic signal company deploys worldwide to install, operate, maintain, and
secure the regiment’s communications and automated information systems. The Ranger Regiment signal
company establishes secure networks to support the regiment’s operations and integrate with the Army force
component of a joint force. The signal company provides local area network support for the company, the
Ranger battalions, the Ranger Special Troops Battalion, and the Ranger Regiment.
2-90. The Ranger Regiment signal company provides—
* Automated information systems support for maneuver, support, and command elements.
* Tactical radio relay, retransmission, and beyond line of sight high frequency and single-channel
satellite communications to extend networks.
* Global Broadcast Service capability to receive high bandwidth imagery, logistics data, and digital
map information to support command and control.
* Field- and sustainment-level communications-electronics and COMSEC maintenance for the
special troops battalion and supporting organizations.
SUPPORT TO CYBERSPACE OPERATIONS
2-91. Cyberspace operations are the employment of cyberspace capabilities where the primary purpose is to
achieve objectives in or through cyberspace (JP 3-0). The core cyberspace operations missions are—
* DODIN operations.
* Defensive cyberspace operations.
* Offensive cyberspace operations.
2-92. Cyberspace actions support DODIN operations, defensive cyberspace operations, offensive cyberspace
operations, or any combination thereof. Executing cyberspace actions at any echelon is dependent on
authority, capability, and coordination. The cyberspace actions are interrelated. A cyberspace mission may
require more than one action to achieve mission success. The cyberspace actions are—
* Cyberspace defense.
* Cyberspace intelligence, surveillance, and reconnaissance.
* Cyberspace operational preparation of the environment.
* Cyberspace attack.
* Cyberspace security.
2-93. Signal support to cyberspace operations includes the tasks to establish the baseline security posture
and operate the DODIN-A. Signal Soldiers perform DODIN operations to support both the joint and Army
portions of cyberspace and take part in CEMA.
2-94. Cyberspace security actions are those taken within a protected network. Cyberspace security actions
prevent unauthorized access to, an exploitation of, or damage to computers, electronic communications
systems, and other information technology, including platform information technology. Cyberspace security
actions help ensure the availability, integrity, authentication, confidentiality, and nonrepudiation of classified
and other sensitive information. Cyberspace security is not specific to an enemy or adversary. Cyberspace
security actions protect the networks and systems through all phases of network planning and
implementation. Cyberspace security activities include vulnerability assessment and analysis, vulnerability
management, incident handling, continuous monitoring, and detection and restoration capabilities to shield
and preserve information and information systems (FM 3-12). Refer to FM 3-12 for more information about
the other cyberspace actions. |
6-02 | 57 | Signal Support by Army Echelon, Core Competencies, Training, and the Army Network
Department of Defense Information Network Operations
2-95. The cyberspace operations mission of DODIN operations is primarily a signal support function.
Department of Defense information network operations are operations to secure, configure, operate, extend,
maintain, and sustain Department of Defense cyberspace to create and preserve the confidentiality,
availability, and integrity of the Department of Defense information network. (JP 3-12). DODIN operations
functions include routine activities to operate the network and establish the baseline cybersecurity
framework.
Support to Defensive Cyberspace Operations
2-96. Defensive cyberspace operations are missions to preserve the ability to utilize blue cyberspace
capabilities and protect data, networks, cyberspace-enabled devices, and other designated systems by
defeating on-going or imminent malicious cyberspace activity (JP 3-12). Most defensive cyberspace
operations tasks at corps and below focus on enabling friendly command and control and fires while
protecting the DODIN. Adversaries and enemies continuously seek to gain an advantage by penetrating
friendly networks to disrupt operations. Army units conduct defensive cyberspace operations to prevent,
detect, identify, and respond to anomalous or unauthorized activity, intrusions, or attacks against the DODIN
and other networks when authorized.
Defensive Cyberspace Operations-Internal Defensive Measures
2-97. Defensive cyberspace operations-internal defensive measures are operations in which authorized
defense actions occur within the defended portion of cyberspace (JP 3-12). Most defensive cyberspace
operations missions are defensive cyberspace operations-internal defensive measures, which include pro-
active and aggressive internal threat hunting for advanced and/or persistent threats, as well as the active
internal countermeasures and responses used to eliminate these threats and mitigate their effects (JP 3-12).
Defensive cyberspace operations-internal defensive measures are responses to unauthorized activity, alerts,
or threat information within the defended network. Defensive cyberspace operations-internal defensive
measures leverage intelligence, counterintelligence, law enforcement, and other military capabilities, as
required.
2-98. For compromised DODIN elements, specific tactics include rerouting, reconstitution, restoration, or
isolation. To defend cyberspace, signal personnel work to detect, analyze, and respond to unauthorized
activities not mitigated by cybersecurity measures. United States Army Cyber Command (ARCYBER) is the
Army lead for defensive cyberspace operations-internal defensive measures. Cyberspace defenders and
DODIN operations personnel apply mitigation measures recommended by cyber protection teams.
Defensive Cyberspace Operations-Response Actions
2-99. Defensive cyberspace operations-response actions are operations that are part of a defensive
cyberspace operations mission that are taken external to the defended network or portion of cyberspace
without the permission of the owner of the affected system (JP 3-12). Because the actions occur outside the
DOD network, defensive cyberspace operations-response actions are subject to legal constraints and
restraints. Defensive cyberspace operations-response actions require authorization according to standing and
supplemental rules of engagement. To support response actions, signal personnel help identify key terrain in
cyberspace during CEMA. Security logs collected as part of DODIN operations help identify threat actions
and feed planning for defensive cyberspace operations-response actions. Signal Soldiers and units provide
the network (the DODIN-A) used for defensive cyberspace operations-response actions planning and
targeting requests.
Support to Offensive Cyberspace Operations
2-100. Offensive cyberspace operations are cyberspace operations intended to project power by the
application of force in or through cyberspace (JP 3-12). Army units plan, synchronize and integrate offensive
cyberspace operations to create effects supporting commanders’ objectives. Signal Soldiers and units provide
the network (the DODIN-A) used for offensive cyberspace operations targeting requests. |
6-02 | 58 | Chapter 2
Synchronizing Department of Defense Information Network Operations and Defensive
Cyberspace Operations
2-101. Defensive cyberspace operations and DODIN operations share a common objective of a secure
network. DODIN operations tasks are network-focused. Cybersecurity sets the baseline security posture of
the network to protect against known exploits and vulnerabilities, rather than a particular threat actor or
capability. The cybersecurity workforce attempts to mitigate all vulnerabilities of their assigned network or
systems. Cybersecurity uses available intelligence about specific threats to improve the network’s security
posture.
2-102. By contrast, defensive cyberspace operations are mission-focused and threat-specific. Defensive
cyberspace operations missions involve deliberate measures to counter a specific threat attack, exploitation,
or malware that has breached security measures. Defensive cyberspace operations leverage information from
intelligence, counterintelligence, law enforcement, and other sources, as required.
Cyberspace Electromagnetic Activities
2-103. Commanders and staffs face the challenge of enabling joint, interorganizational, and multinational
collaboration and assuring access to critical data and information networks in increasingly congested and
contested cyberspace and electromagnetic spectrum environments, while simultaneously denying the same
to the enemy. Operating in the congested and contested information environment requires commanders and
their staffs to synchronize signal, cyberspace, and EW capabilities through CEMA. Cyberspace
electromagnetic activities is the process of planning, integrating, and synchronizing cyberspace and
electronic warfare operations in support of unified land operations (ADP 3-0).
2-104. CEMA integrates—
* Cyberspace operations.
DODIN operations.
Defensive cyberspace operations.
Offensive cyberspace operations.
* EW.
Electronic attack.
Electronic protection.
Electronic warfare support.
* Spectrum management operations.
2-105. Because the hybrid threat integrates information warfare capabilities in these areas, U.S. forces must
similarly coordinate their defenses. Attempting to conduct signal, cyberspace, and EW activities in isolation
makes them more vulnerable. Synchronizing these activities through CEMA ensures coordinated defense and
counter-offense against threat information warfare activities.
2-106. To support CEMA at the theater army level and below, the G-6 (S-6) staff and spectrum manager
integrate DODIN operations and spectrum management actions. They also coordinate to synchronize these
actions with mutually supporting capabilities residing in the G-2 (S-2) and G-3 (S-3) sections.
2-107. Signal, cyberspace, and EW missions share certain areas of potential overlap. Each has its own set
of threat and performance indicators. Synchronizing signal, cyberspace, and EW missions and tasks
strengthens all of them beyond their inherent capabilities.
2-108. Shared awareness between signal, cyberspace operations, EW, and intelligence elements improves
situational understanding and identifies opportunities for mutual support between the capabilities. The
CEMA section coordinates to deconflict spectrum use between signal and EW elements. Deconfliction
ensures EW capabilities do not create unintended electromagnetic interference (frequency fratricide) with
friendly communications, unmanned aircraft systems, weapon systems, or positioning, navigation, and
timing. Failing to share situational understanding could cause planners or operations personnel to miss
indicators of a cyberspace or electronic attack. The EW section can plan and execute electronic attack and
electronic protection actions to support signal capabilities. |
6-02 | 59 | Signal Support by Army Echelon, Core Competencies, Training, and the Army Network
2-109. Synchronizing signal, cyberspace, EW, and intelligence capabilities is especially important when
planning for, or operating against, a peer threat. Refer to FM 3-12 for more information about cyberspace
operations and CEMA. Refer to ATP 3-12.3 for more information about EW techniques.
Cyberspace Workforce Management
2-110. DOD policy unifies the cyberspace workforce to align, manage, and standardize roles, qualifications,
and training requirements for—
* Cyberspace effects elements.
* Cybersecurity elements.
* Cyberspace information technology elements.
* Intelligence workforce (cyberspace).
2-111. Personnel in the cyberspace workforce must meet minimum qualifications based on their respective
cyberspace roles. While the policy standardizes the workforce requirements, the Joint Staff, combatant
commands, and Services base their operational employment decisions on mission requirements. Refer to
DODD 8140.01 for more information about cyberspace workforce management.
ENABLING INFORMATION AND KNOWLEDGE MANAGEMENT
2-112. It is essential that the joint communications system complement human capabilities and reduce or
eliminate anticipated or known limitations to mission accomplishment (JP 6-0). Improved technology in
mobility, weapons, sensors, and communications generates large amounts of data with which to establish
situational understanding. However, the volume of data can overwhelm planners and decision makers,
leading to poor decisions. For the data to be useful, staffs need to process and analyze it into relevant
information and knowledge so the commander and staff can achieve understanding.
2-113. Information, as an element of combat power, includes both the combat information necessary to gain
understanding and make decisions and the use of information to dominate the information environment.
Information enables commanders at all levels to make informed decisions on how best to apply combat
power. Well-managed information and knowledge lead to a distinct information advantage. Through
information and knowledge management, the right information gets to the right people to support better
decision making.
Information Management
2-114. Information management is the science of using procedures and information systems to collect,
process, store, display, disseminate, and protect data, information, and knowledge products (ADP 6-0).
Information management helps commanders make and disseminate effective decisions faster than the enemy
can. Signal personnel conduct information management. They perform these information management tasks
to enable knowledge management:
* Application and database administration.
* Data backup and migration.
* Website interface maintenance.
* Troubleshooting.
* Security.
* Configuration.
* Providing network architecture and technological tools to support content management and
content sharing.
* Providing DODIN operations and information management support through the G-6 (S-6) section.
Knowledge Management
2-115. Well-managed information enables knowledge management. Knowledge management is the process
of enabling knowledge flow to enhance shared understanding, learning, and decision making (ADP 6-0).
Knowledge management enables commanders to make informed, timely decisions despite the uncertainty of |
6-02 | 60 | Chapter 2
operations. Knowledge management aligns an organization’s people, processes, and tools to distribute
knowledge and promote shared situational understanding.
2-116. Signal Soldiers assigned to the knowledge management section ensure the information technology
network supports knowledge creation and uses automated knowledge management tools. Some signal
Soldiers serve in the knowledge management section. Their responsibilities include providing software
developer capability support. Refer to ATP 6-01.1 for more information about knowledge management.
SUPPORT TO INFORMATION OPERATIONS
2-117. Information operations are the integrated employment, during military operations, of information-
related capabilities in concert with other lines of operation to influence, disrupt, corrupt, or usurp the decision-
making of adversaries and potential adversaries while protecting our own (JP 3-13). Some information-
related capabilities (COMCAM, satellite communications, and DODIN operations) are Signal Corps
functions.
2-118. The DODIN-A provides a platform to plan information operations and synchronize information-
related capabilities globally across all echelons and organizations in near real-time. Security and defense of
the DODIN-A through cybersecurity and defensive cyberspace operations provide a layer of defense against
threat information warfare capabilities.
SUPPORT TO AVIATION OPERATIONS
2-119. Combat aviation brigades have organic signal Soldiers and capabilities to support deployed forces
(see paragraph 2-31). These organic capabilities connect the brigade and battalion command posts to the
DODIN-A.
2-120. The DODIN-A also provides network transport for aviation-specific automated information systems.
These systems integrate air and ground operations, facilitate civil and interagency airspace coordination, and
provide joint interoperability with the joint force air component commander. Interoperable single-channel
radio systems enable coordination with ground troops for close air support and medical evacuation.
SUPPORT TO PORT OPERATIONS
2-121. The theater army G-6 coordinates with the geographic combatant commander to support
communications for the harbormaster detachment. The harbormaster detachment coordinates and
synchronizes vessel operations. When the detachment arrives, it establishes the satellite communications
transport, automated information systems, weather data sensors, and the radio communications necessary to
control port operations. Refer to ATP 4-15, for more information about port operations.
BASE CAMP COMMUNICATIONS
2-122. The communications and network support a unit receives in a base camp are similar to the services
the network enterprise center provides at their home station. Signal planners determine a base camp’s
communications requirements based on its size, level of capabilities, and purpose. Tenant and transient units
determine their signal requirements based on their operational needs.
2-123. When a G-6 (S-6) or signal unit supports a base camp, the G-6 (S-6) coordinates with the base camp
commander to identify communications requirements, including local area network and wide-area network
support, DISN services, communications-electronics maintenance, and communications augmentation, as
necessary. Refer to ATP 3-37.10 for more information about base camp support.
DEFENSE SUPPORT OF CIVIL AUTHORITIES AND HOMELAND DEFENSE
2-124. The unique capabilities of Army signal systems enable expeditionary signal units to rapidly deploy
to support various other contingency or crisis mission requirements. Military communications systems
include joint interoperability as a design consideration. However, most communications systems developed
for combat are incompatible with civilian systems, unless the military provides specialized connections. |
6-02 | 61 | Signal Support by Army Echelon, Core Competencies, Training, and the Army Network
2-125. Signal elements may need to interconnect with various military and commercial communications
systems. Compatibility issues may limit the availability of secure communications. The use of disparate
communications systems among mission partners introduces additional planning requirements for defense
support of civil authorities and homeland defense missions.
2-126. Differing systems, use of allocated civilian and military bandwidth, and limited interoperability
complicate collaborative incident management. Signal elements supporting defense support of civil
authorities and homeland defense missions collaborate and interoperate with joint and interorganizational
partners. These partners include other Military Services and Departments, state and Federal Government
agencies, local authorities, and non-governmental organizations.
Defense Support of Civil Authorities
2-127. Army support of civil authorities is a vital aspect of the Army’s service to the Nation and a way it
maintains trust with citizens (ADP 3-28). The skills that allow Soldiers to accomplish their missions on
battlefields can support local, state, tribal, and federal civil authorities, especially when domestic emergencies
overwhelm the ability of local government agencies to respond adequately. During defense support of civil
authorities, the DOD serves in a supporting role to the Federal Emergency Management Agency and other
federal agencies.
2-128. Because not all mission partners can access the DODIN, signal elements tasked for these missions
need to interoperate with commercial communications systems. The DODIN-A and DOD gateway can
provide connections to the commercial Internet and commercial telephone service for collaboration with non-
DOD mission partners.
2-129. Army National Guard units activated under state control (state active duty or Title 32) operate under
a separate chain of command from active duty task forces and National Guard troops under federal control
(Title 10). Communications interoperability between these forces enables better coordination between the
separate chains of command.
2-130. Local communications infrastructure may be inoperable or unreliable after a natural or man-made
disaster. The lack of land-based and wireless communications hampers emergency management and first
responder operations. Signal units routinely deploy to provide communications and DISN services in austere
environments. The same expeditionary capabilities are ideally suited to establishing emergency
communications in areas with damaged infrastructure. Because these units have organic power generation
equipment, they can establish communications before the commercial power grid is restored, though they
need fuel and other logistical support. Expeditionary signal units can provide—
* Emergency restoral of first responder communications.
* Command post communications—voice, data, and video teleconferencing.
* Network connectivity to disseminate the common operational picture.
* Communications to coordinate logistical support.
* Connection to civilian communications infrastructure to interoperate with emergency responders
and nongovernmental organizations.
* Communications to areas outside the disaster zone.
Homeland Defense
2-131. The DOD is the primary federal agency for homeland defense. The strategy for homeland defense
protects U.S. territory against attack by state and non-state actors through an active, layered defense. This
strategy aims to deter and defeat aggression abroad while protecting the homeland. The Army supports this
strategy with capabilities in the forward regions of the world, in the geographic approaches to U.S. territory,
and within the U.S. homeland. Army signal elements may provide communications to support missions
protecting U.S. sovereignty, territory, domestic population, and critical defense infrastructure against external
aggression or other threats, as directed by the President.
2-132. Strategic signal capabilities contribute to the United States’ day-to-day defensive posture by
supporting attack warning and assessment, enabling situational understanding, and helping secure the |
6-02 | 62 | Chapter 2
cyberspace domain. Both fixed station and expeditionary signal capabilities enable homeland defense
operations in the land, air, maritime, space, and cyberspace domains.
2-133. During a homeland defense operation, civil authorities continue to operate and perform many of
their routine functions. While homeland security activities of some interagency partners sometimes overlap
with homeland defense activities, major military activities are the responsibility of the DOD. Interagency
mission partners cannot perform these activities, but their support is essential for mission success.
2-134. Unity of effort among all homeland defense participants is fundamental and essential (JP 3-27). For
this reason, homeland defense operations in the United States often require connections to the civilian
communications infrastructure to interoperate with various state and federal agencies and nongovernmental
organizations. Planners consider joint and interorganizational interoperability as early as possible in the
planning process.
Note. The Department of Homeland Security is the lead federal agency for security and defense
of civilian U.S. Government cyberspace within the United States.
SIGNAL-ENABLING COMMANDS AND STAFFS
2-135. Signal-enabling commands and staffs support the DODIN-A as a global enterprise network. These
entities develop signal capabilities, establish policy and guidance, perform DODIN operations, provide
strategic infrastructure, and secure the DODIN-A. These commands, staffs, and agencies support the strategic
support area, extend the network to tactical units, and preserve the Army’s ability to operate in cyberspace.
CHIEF INFORMATION OFFICER/G-6
2-136. The Chief Information Officer (CIO)/G-6 is the principal staff assistant and advisor to the Secretary
of the Army for information management, information technology, and their effects on warfighting
capabilities. The CIO/G-6 is also the force modernization proponent for information management (AR 5-22).
2-137. The CIO/G-6 establishes policy for Army use of information technology systems and networks. This
responsibility includes evaluating existing Army information management and information technology
policies and overseeing their implementation. The CIO/G-6 sets the strategic direction for, and supervises
the execution of, Army information management programs and policy. These programs and policies include
network architecture, information sharing policy, cybersecurity policy, the Army cybersecurity program,
resource management, process modernization, and synchronization of the Army’s network activities. The
CIO/G-6 exercises Headquarters, Department of the Army oversight to ensure compliance with federal
statutes for information technology reform (The Clinger-Cohen Act).
UNITED STATES ARMY CYBER COMMAND
2-138. ARCYBER is the Army Service component command to United States Cyber Command.
ARCYBER is the primary Army headquarters responsible for cyberspace operations to support joint
requirements. ARCYBER is the single point of contact for reporting and assessing cyberspace incidents,
events, and operations in Army networks and for synchronizing and integrating Army responses. When
directed, ARCYBER conducts offensive and defensive cyberspace operations to support other Army
operations, ensure U.S. and allied freedom of action in cyberspace, and deny the same to adversaries and
enemies. ARCYBER provides appropriate-level interactions both as a supported and as a supporting
commander to Army commands, other Army Service component commands (including theater armies), direct
reporting units, and joint, interorganizational, and multinational elements.
Army Cyber Operations and Integration Center
2-139. The Army Cyber Operations and Integration Center is an operational element of the ARCYBER
headquarters. It is the top-level control center for Army cyberspace activities. The Army Cyber Operations
and Integration Center provides situational understanding for Army networks and situational awareness of
the wider DODIN. The Army Cyber Operations and Integration Center also provides worldwide operational |
6-02 | 63 | Signal Support by Army Echelon, Core Competencies, Training, and the Army Network
and technical support across the strategic, operational, and tactical levels, in coordination with the theater
armies. The Army Cyber Operations and Integration Center directs the regional cyber centers through
operational channels. The Army Cyber Operations and Integration Center interfaces with the functional
network operations and security centers, and coordinates with other Service and agency DODIN operations
centers, through technical channels.
2-140. The Army Cyber Operations and Integration Center analyzes threat information and directs network
security actions through the regional cyber centers, in coordination with the theater armies. The Army Cyber
Operations and Integration Center develops technical solutions to secure Army networks and helps Army
units and regional cyber centers implement cybersecurity policy. Refer to ATP 6-02.71 for more information
about the Army Cyber Operations and Integration Center.
United States Army Network Enterprise Technology Command
2-141. United States Army Network Enterprise Technology Command (NETCOM) is the Army’s global
enterprise network service provider. NETCOM is subordinate to ARCYBER, provides global DODIN
operations oversight, and performs inter-theater DODIN operations functions to ensure interoperability
across the DODIN-A. NETCOM enforces Army-wide standards established by the CIO/G-6 to preserve joint,
interorganizational, and multinational interoperability.
2-142. NETCOM integrates Army information technology to achieve a single, virtual enterprise network.
NETCOM enforces service delivery activities, cybersecurity policies, processes, procedures, and protocols
for operation of Army networks. To ensure unity of effort in DODIN operations, NETCOM has direct liaison
authority to the CIO/G-6, with notification to ARCYBER.
2-143. NETCOM manages the DODIN-A, including enforcing technical standards, and configuration
management. NETCOM is the single entry point to submit validated, approved telecommunications
requirements for coordination and implementation by the Defense Information Systems Agency.
2-144. NETCOM manages the administration of amateur radio operations and the Army Military Auxiliary
Radio System program pursuant to AR 25-6 and provides COMCAM support for theater army and joint
military operations. NETCOM manages and services spectrum-related requirements for Army installations
in accordance with U.S., DOD, Army, host-nation, and international spectrum regulations, policies, and
technical standards.
Signal Command (Theater)
2-145. The SC(T) is a subordinate command of NETCOM which provides oversight, leadership, and
technical direction over the theater network. The SC(T) provides DODIN operations and spectrum
management support across the theater. The SC(T) provides these capabilities—
* Centralized management of Army data, voice, and video networks, including interfaces with joint,
interorganizational, and multinational systems in the theater.
* Enforcement of global cybersecurity policies to support the geographic combatant commander
and theater army commander.
* Oversight of units building, configuring, securing, operating, and maintaining signal support
systems and network interfaces to joint and multinational partner systems in theater.
* Establishment of mission priorities to ensure DODIN-A capabilities are available to meet
commanders’ information requirements.
Regional Cyber Center
2-146. The regional cyber center is the single point of contact for Army network services, operational status,
service provisioning, service interruption resolution, and service restoral in its operational area. The regional
cyber center is responsible for intra-theater communications, with a focus on tactical communications
support. The regional cyber center supports the strategic network by providing DODIN operations oversight
for up to eight network enterprise centers. The regional cyber center provides network status information to
the Defense Information Systems Agency’s enterprise operations center and the Army Cyber Operations and
Integration Center. The regional cyber center may also provide network status to other Service component |
6-02 | 64 | Chapter 2
DODIN operations centers to enable shared situational understanding. The regional cyber centers perform
the same functions in all theaters.
2-147. The regional cyber centers’ operational areas and core missions align with the theater and field army
commanders’ operational areas:
* United States Army Regional Cyber Center-CONUS (continental United States and South).
* United States Army Regional Cyber Center-Europe (Europe and Africa).
* United States Army Regional Cyber Center-Korea.
* United States Army Regional Cyber Center-Pacific.
* United States Army Regional Cyber Center-Southwest Asia.
2-148. The regional cyber center performs or coordinates DODIN operations tasks that span the theater or
multiple theaters. Centralizing high-level tasks provides consistent service among regions by performing the
operational function at the only location with visibility or awareness of multiple regions.
2-149. The regional cyber center is under operational control of the Army Cyber Operations and Integration
Center directs for DODIN operations, defensive cyberspace operations-internal defensive measures, network
vulnerability assessment, and incident management within the theater. The regional cyber center collaborates
with the Army Cyber Operations and Integration Center to—
* Coordinate threat assessments and support to multi-agency vulnerability assessments with the
supporting counterintelligence element.
* Develop countermeasures and defensive cyberspace operations strategies.
* Conduct attack signature sensing and warning analysis.
* Develop mitigation strategies to support network defense and prevent data loss, including spillage.
Spillage is a security incident that results in the transfer of classified information onto an
information system not authorized to store or process that information (CNSSI 4009). An example
of spillage is SECRET data on NIPRNET.
* Conduct the computer defense assistance program to support commanders in theater. The
computer defense assistance program includes penetration testing, network assistance visits, and
network damage assessments.
Tactical Actions Center
2-150. The NETCOM tactical actions center provides enterprise network engineering, planning, operations,
and cybersecurity support within a theater of operations that has no assigned SC(T). The tactical actions
center provides strategic and tactical planning, operations, and cybersecurity support to meet inter-theater
communications requirements. The tactical actions center is the in-theater lead for planning, engineering, and
executing NETCOM projects and operations.
Strategic Signal Brigade
2-151. Strategic signal brigades provide operational and strategic support area signal support to serve
warfighters in a theater of operations. This support includes long-haul transport, communications
infrastructure, automation, and network management. The strategic signal brigade provides—
* Operational direction through technical channels to the network enterprise center in provisioning
services.
* Access to the DODIN-A for fixed station Army assets within its theater.
* Gateway access to the DODIN-A for expeditionary Army units.
* Advice to commanders, staff, and users on the capabilities, limitations, and employment of
communications, network, and automated information system assets.
* Advice to supported commanders and staff on information management, automation policy,
technical matters, and system performance.
* Input to all-source intelligence assessments and estimates concerning the DODIN-A at the
operational and strategic levels. |
6-02 | 65 | Signal Support by Army Echelon, Core Competencies, Training, and the Army Network
2-152. Outside the continental United States, the strategic signal brigade provides communications
planning and command and control for an assigned expeditionary signal battalion. This allows the strategic
signal brigade to meet contingency and emerging tactical communications support requirements in theater
without going through the lengthy request for forces process.
Strategic Signal Battalion
2-153. Strategic signal battalions are regionally based signal elements. They manage communications
infrastructure in their geographical areas and configure, secure, operate, and maintain network facilities to
support strategic signal brigade, SC(T), and NETCOM missions. The battalion headquarters supports the
unit’s mission through—
* Staff planning and operational supervision of assigned companies and teams.
* Supervision of signal support, communications, automation, and visual information.
* Planning, engineering, and technical control of strategic communications systems.
2-154. The strategic signal battalions’ equipment and personnel authorizations support unique mission sets,
based on the battalion’s location and function. Most of their subordinate elements operate and maintain
equipment at fixed locations. The capabilities a strategic signal battalion may provide include—
* Long-haul, inter-theater satellite communications transport.
* Regional hub node to extend DISN services to deployed expeditionary units.
* Fixed station microwave transport.
* Technical control facilities.
* Geographic combatant commander communications support.
* Data centers.
* Installation-level DODIN operations (network enterprise center).
* Connectivity to DISN services, including NIPRNET, SIPRNET, Defense Red Switched Network,
Defense Switched Network, Organizational Messaging Service, video teleconferencing, and local
telephone exchange services (network enterprise center).
* COMSEC material issue and management.
* COMSEC equipment maintenance.
* Installation and maintenance of copper and fiber optic cable systems and related equipment.
Expeditionary Signal Battalion (Theater-Committed)
2-155. Some strategic signal brigades outside the continental United States also have an expeditionary
signal battalion assigned so they can support the entire range of military operations. These battalions and
their companies are theater-committed, not part of the global rotational force pool. A theater-committed
expeditionary signal battalion has the same capabilities and functions as a rotational unit, but it usually
supports only its assigned theater. See paragraph 2-58 for detailed capabilities of an expeditionary signal
battalion.
Network Enterprise Center
2-156. The network enterprise center provides overall DODIN operations, and is responsible for
information management, information technology management, and telecommunications services on its post,
camp, or station, or within its designated service area. Network enterprise centers coordinate, plan, program,
and execute electromagnetic spectrum management on their installation (ATP 6-02.70). Network enterprise
centers collaborate with external organizations to ensure proper operation of the installation-level
components of DOD or Army networks and information systems. The network enterprise center’s DODIN
operations responsibilities include— |
6-02 | 66 | Chapter 2
* Managing support functions for customer access to the installation network and information
systems infrastructure.
* Coordinating support and problem resolution for physical networks and information technology
equipment on the installation, or within the network enterprise center’s designated service area.
* Representing supported units in recommending changes to the DODIN, based on lessons and best
practices.
* Implementing DOD and industry best practices, according to DOD, Army, and SC(T) guidance.
* Establishing local policies and procedures for networks and information systems within its service
area.
* Establishing individualized service level support agreements between tenant units and the SC(T).
* Coordinating with the strategic signal battalion to manage inter-installation networks affecting
supported organizations.
* Managing the installation cybersecurity program.
* Managing the activities, functions, and capabilities of the network and information systems
resources within its service area, according to direction from the SC(T) and regional cyber center.
* Assessing the mission impact of outages, DODIN operations incidents, and other network issues
and reporting to the regional cyber center.
UNITED STATES ARMY COMMUNICATIONS-ELECTRONICS COMMAND
2-157. United States Army Communications-Electronics Command provides worldwide life cycle
sustainment and equipment readiness support. The command also provides training support and on-site
logistics assistance to units at their home stations inside and outside the continental United States and
deployed units.
Sustainment Maintenance Support
2-158. United States Army Communications-Electronics Command provides sustainment maintenance for
communications-electronics systems. Sustainment maintenance consists of depot maintenance and below
depot maintenance. See appendix C for more information about depot and below depot sustainment
maintenance.
Communications Security Support
2-159. The Communications Security Logistics Activity is the Army commodity manager for COMSEC
materiel. The Communications Security Logistics Activity acquires, distributes, and provides logistical
support for COMSEC equipment, cryptographic keying material, and other encryption products for Army
users.
UNITED STATES ARMY SPACE AND MISSILE DEFENSE COMMAND/ARMY FORCES
STRATEGIC COMMAND
2-160. United States Army Space and Missile Defense Command/Army Forces Strategic Command
engineers, operates, and provides technical expertise for its assigned satellite systems, including Wideband
Global Satellite Communications. The United States Army Space and Missile Defense Command/Army
Forces Strategic Command G-6 is the designated DOD satellite communications systems expert for—
* Wideband satellite communications.
* Narrowband satellite communications.
* Wideband Global Satellite Communications.
* Defense Satellite Communications System.
* Global Broadcast Service.
* Mobile User Objective System. |
6-02 | 67 | Signal Support by Army Echelon, Core Competencies, Training, and the Army Network
Regional Satellite Communications Support Center
2-161. United States Army Space and Missile Defense Command/Army Forces Strategic Command
operates the regional satellite communications support centers. The regional satellite communications
support centers are geographically distributed, multi-Service organizations. The regional satellite
communications support centers provide planning, engineering, and satellite payload management for all
military satellite communications systems. The regional satellite communications support centers’ staffing
includes personnel from the Army, Navy, Air Force, and the Defense Information Systems Agency.
2-162. The regional satellite communications support centers provide 24-hour satellite communications
resources, systems engineering, and modeling support. The regional satellite communications support centers
analyze requirements and develop solutions to support users in day-to-day management of satellite
communications resources allocated for the combatant command. They also process satellite access requests
to authorize the use of space and ground terminal resources via satellite access authorizations.
Signal Battalion (Satellite Control)
2-163. The signal battalion (satellite control) manages satellite communications networks and controls
communications payloads on the Defense Satellite Communications System and Wideband Global Satellite
Communications constellations. Signal Soldiers with specialized satellite network control training perform
these missions. These centers enable satellite communications support for the President, Secretary of
Defense, Chairman of the Joint Chiefs of Staff, Military Services, the Department of State, intelligence
activities, combatant commanders, and selected allied forces during unified action.
2-164. The wideband satellite communications operations centers support Army operations by—
* Monitoring and controlling use of Defense Satellite Communications System and Wideband
Global Satellite Communications satellites networks.
Satellite link establishment.
Satellite link quality monitoring and maintenance.
Satellite link power management.
Satellite communications earth terminal monitoring.
Terminal positive control and subnetwork control.
* Transmission and communications payload control of assigned Defense Satellite Communications
System and Wideband Global Satellite Communications satellites.
Payload command and telemetry.
Electromagnetic interference detection and geolocation.
2-165. Refer to FM 3-14 for more information about Army space operations. Refer to ATP 6-02.54 for
more information about the satellite control battalion and regional satellite communications support centers.
SECTION II – CORE COMPETENCIES AND ESSENTIAL CAPABILITY OF THE
SIGNAL CORPS
DEPARTMENT OF DEFENSE INFORMATION NETWORK
OPERATIONS
2-166. In the past, the Army and DOD have treated network operations as a task performed to manage the
network. DODIN operations are not an individual or crew task, but multifaceted military operations that take
place at all echelons. DODIN operations are arguably the most important and most complex operation the
Army performs from day-to-day, since the network is the foundation for all other functions and capabilities,
including command and control; joint intelligence, surveillance, and reconnaissance; precision fires;
logistics; and telemedicine.
2-167. DODIN operations support both the generating and operational forces. DODIN operations ensure
system and network availability, information protection, and information delivery to maintain freedom of |
6-02 | 68 | Chapter 2
action in cyberspace. Because they are so complex and have such wide-ranging impact on the information
environment, DODIN operations require deliberate planning through the military decision-making process
and coordinated execution through the operations process.
2-168. Effective DODIN operations make network-enabled operations possible. DODIN operations are a
commander-focused activity. Signal staffs prepare DODIN operations plans and courses of action and
commanders make the decisions. DODIN operations technical channels parallel the operational chain of
command to maintain unity of command and unity of effort. This allows commanders to align available
communications and network support to their highest mission priorities.
DEPARTMENT OF DEFENSE INFORMATION NETWORK OPERATIONS TASKS
2-169. Achieving information superiority requires unity of effort in command, control, and management of
the DODIN. As a practical matter, unity of effort is necessary due to the vast number of information
technology resources required to support worldwide DODIN operations (JP 6-0). DODIN operations
functions ensure availability and security of information technology resources and services and the
information they provide.
2-170. Each of the Military Services performs DODIN operations to DOD-wide standards to ensure joint
interoperability. Signal Soldiers control, secure, and manage the flow of information over DOD networks
through DODIN operations. DODIN operations tasks are active measures implemented across the entire
DODIN. Joint DODIN operations involve the employment of these essential joint tasks:
* DODIN enterprise management is the technology, processes, and policies necessary to engineer,
install, operate, maintain, and sustain DOD communications networks, information systems, and
applications. Enterprise management merges information technology services with the DODIN
operations capabilities.
* Cybersecurity is prevention of damage to, protection of, and restoration of computers, electronic
communications systems, electronic communications services, wire communication, and
electronic communication, including information contained therein, to ensure its availability,
integrity, authentication, confidentiality, and nonrepudiation (DODI 8500.01). Cybersecurity
policies are not specific to a threat actor. They establish the baseline security posture of the
network and mitigate risks associated with known exploits and vulnerabilities to DOD information
systems and computer networks. Cybersecurity provides the ability to monitor for, detect, and
analyze unauthorized activity within DOD information systems and computer networks.
* DODIN content management allows DODIN operations centers to optimize the flow and
location of information over the DODIN by positioning and repositioning data and information
services to optimum locations on the network relative to the information producers, information
consumers, and mission requirements.
2-171. Shared network status across the DODIN is critical to situational understanding and decision
making. Shared situational awareness and coordination between stakeholders on network events helps
commanders and non-information technology staff understand the impact of DODIN operations on the
information environment and the operational mission. Network situational awareness identifies cybersecurity
policy violations and aids in network troubleshooting and restoral. Unusual network activity might provide
the first indication of a cyberspace attack. Comprehensive network situational understanding, combined with
current intelligence estimates, allows the CEMA section to synchronize signal capabilities with cyberspace
and EW operations.
2-172. DODIN operations require centralized coordination because they have the potential to impact the
integrity and operational readiness of the DODIN; however, execution is generally decentralized (JP 6-0).
The Army conducts DODIN operations within the DODIN-A and in other DOD networks, as required. For
this manual, the term DODIN operations refers to these activities on any DOD network.
DEPARTMENT OF DEFENSE INFORMATION NETWORK OPERATIONS IN ARMY NETWORKS
2-173. DODIN operations provide integrated network visibility and end-to-end management of networks,
applications, and services across the DODIN-A. Network visibility enables commanders to control and
exercise command authority over their networks as they would other warfighting platforms. |
6-02 | 69 | Signal Support by Army Echelon, Core Competencies, Training, and the Army Network
2-174. DODIN operations personnel operate and secure the network to achieve information advantage
supporting Army and joint missions. Unlike many missions considered successful at a defined completion
date, DODIN operations are ongoing. The mission requires continuous support to achieve success.
2-175. DODIN operations allow commanders to employ network-enabled capabilities to shape and
influence their areas of operations. For the Army, DODIN operations consists of three essential tasks:
* Network management and enterprise systems management—install, operate, and maintain
Army communications and computer networks, systems, and applications to achieve information
advantage. Network management provides networked services with the desired quality and
availability. Enterprise systems management provides day-to-day management of information
systems, elements of systems, and services, including operating systems, databases, and end-user
systems. Network management and enterprise systems management correspond to, and nest
within, the joint task of DODIN enterprise management.
* Cybersecurity—provides end-to-end protection to ensure data confidentiality, integrity, and
availability, as well as protection against unauthorized access. The cybersecurity functions are—
identify, protect, detect, respond, and recover. Organizations manage cybersecurity risk by
organizing information, implementing the risk management framework, addressing
vulnerabilities, and improving security by learning from past activities. Cybersecurity in the
DODIN-A is the same as cybersecurity across the wider DODIN.
* Information dissemination management and content staging—emplace, manage, provide, and
restore information services to enable information and knowledge management. Information
dissemination management supports effective knowledge management so the right information
reaches the right users at the right time, in a usable format. Content staging compiles, catalogs,
and caches information. The Army task of information dissemination management and content
staging corresponds to, and nests within, the joint task of DODIN content management.
Information dissemination management and content staging consist of the technologies,
techniques, processes, policies, and procedures to provide warfighters—
Awareness of relevant, accurate information.
Automated access to newly revealed or recurring information.
Timely, efficient, delivery of information in a usable format.
The DODIN operations essential tasks take place at the strategic, operational, and tactical
levels and support all warfighting and business functions. DODIN operations enable network
and system availability, information protection, and timely information delivery across
strategic, operational, and tactical boundaries.
Network and information system availability. Ensuring availability of system and network
resources. This includes providing for continued operation in a degraded environment, self-
healing, and eliminating critical failure points.
Information delivery. Providing required information to users, planners, and decision makers.
DODIN operations personnel continuously monitor the network to ensure information
transfer is timely and network throughput and performance meet user requirements.
2-176. Figure 2-2 on page 2-34 shows the DODIN operations critical tasks with their individual and
combined effects. Network management and enterprise systems management (DODIN enterprise
management) consist of steps to configure, allocate, process, connect, route, flow, account for, and maintain
network capabilities. Information dissemination management and content staging (DODIN content
management) allow users to retrieve, cache, compile, catalog, and distribute information to support planning
and decision making. Cybersecurity provides the means to resist and recognize intrusions and to recover and
reconstitute network capabilities. The net effect of integrating the three tasks is information advantage. Users
get timely, protected information to meet their critical information requirements. Refer to ATP 6-02.71 for
more information about DODIN operations in Army networks. |
6-02 | 70 | Chapter 2
Figure 2-2. Department of Defense information network operations components, effects, and
objectives
NETWORK TRANSPORT AND INFORMATION SERVICES
2-177. Network transport and information services encompass the combined physical assets and activities
to ensure data reliably transverses the network. Network transport is the processes, equipment, and
transmission media that provide connectivity and move data between networking devices and facilities.
Information services enable planning, controlling, and manipulating information throughout its life cycle. |
6-02 | 71 | Signal Support by Army Echelon, Core Competencies, Training, and the Army Network
2-178. Network transport and information services connect users, automated information systems, and
applications throughout the Army enterprise. Network transport connects networking hardware and carries
data over distance to integrate local area networks and wide-area networks into the DODIN-A. Information
services provide computing and networking capabilities to facilitate human interaction, staff integration, and
interoperability with mission partners. When combined, network transport and information services enable
the flow of data and information among applications, systems, and users.
2-179. The network connects geographically separated forces for network-enabled operations. By
integrating information from across the operational area, Army forces can maintain more complete, relevant
situational understanding. The integrated common operational picture allows commanders to employ the
right capabilities, in the right place, at the right time to meet critical information requirements.
NETWORK TRANSPORT
2-180. Network transport moves data between networking facilities. Globally prepositioned network
transport capabilities extend access to DISN services worldwide to support Army operations.
2-181. The long-haul transport is the fixed backbone network provided by the Defense Information Systems
Agency as part of the DISN interface. The fixed backbone network provides communications infrastructure
for permanent installations and DOD Gateways as prepositioned connection points to connect deployed units
to the DODIN. Network transport includes all data transmission capabilities that extend DISN access across
the strategic, operational, and tactical levels. Key network transport capabilities are—
* Satellite communications.
* Line of sight and troposcatter systems.
* Tactical radios and radio retransmission.
* Copper wire and cable.
* Fiber optics.
2-182. Network transport connects elements across all echelons, so the DODIN-A can operate as an
integrated network. The network transport resources to connect the clients can belong to U.S. or non-U.S.
forces, host nations, or commercial entities. Adequate network transport throughput capacity is critical to
reliable cloud services, reachback, and the shift from locally-provided to enterprise services. Refer to ATP
6-02.54 for more information about satellite communications transport. Refer to ATP 6-02.53 for more
information about tactical radios and radio retransmission.
INFORMATION SERVICES
2-183. Information services allow access, storage, and sharing of information among mission partners, as
well as dynamically tailoring and prioritizing information to support the mission and affect the operational
environment. Information services allow commanders and Soldiers to collect, process, store, transmit,
display, and disseminate information. Information services consist of—
* Messaging services enable warfighters to exchange information among users. Messaging services
include e-mail, Organizational Messaging Service, instant messaging, and alerts.
* Discovery services enable warfighters to discover information content or services stored in
directories, registries, and catalogs. An example of a discovery service is a search engine.
* Mediation services enable system interoperability by processing data to translate, aggregate, fuse,
or integrate it with other data.
* Collaboration services provide the ability for warfighters to work together and share capabilities.
Examples of collaboration services are chat, online meetings, and workgroup applications.
* Storage services provide physical and virtual data hosting. Storage services include archiving,
continuity of operations, and content staging. Standard operating procedures or operation orders
should define information storage locations.
* User assistance services provide centralized service desk assistance and automated access to
lessons and best practices, which may improve processes or reduce the effort required to perform
tasks. |
6-02 | 72 | Chapter 2
* Identity and access management (Enterprise Directory Service) provides authoritative enterprise
identity and contact attributes for combatant commands, Services, and agencies. Enterprise
Directory Service includes—
* DOD Enterprise White Pages—authoritative identity and contact information for all DOD
common access card holders.
* Global Directory Service—a distribution point for personal public key certificates, certificate
revocation lists, and certificate authority certificates.
* Identity Synchronization Service—populates directories and global address lists with enterprise
identity and contact attributes.
2-184. These services also support joint, interorganizational, and multinational collaboration. Information
sharing allows the mutual use of information services or capabilities across functional or organizational
boundaries.
2-185. Identity and access management services facilitate and control information sharing. Identity and
access management assigns users common, portable identity credentials, such as a common access card or
SIPRNET token. Users with the proper credentials can access and view operational, business support, or
intelligence-related information, services, and applications related to their mission and communities of
interest. Refer to ATP 6-02.71 for more information about information services.
SPECTRUM MANAGEMENT OPERATIONS
2-186. Since a significant part of any communications system relies upon wireless transmissions,
communications planners must consider access to the electromagnetic spectrum. Signal Soldiers support
assured access through spectrum management operations. Spectrum management operations are the
interrelated functions of spectrum management, frequency assignment, host nation coordination, and
policy that together enable the planning, management, and execution of operations within the
electromagnetic operational environment during all phases of military operations. Spectrum
management operations enable access to the frequency spectrum to support Army operations.
2-187. Spectrum management includes operational, engineering, and administrative procedures to plan,
coordinate, and manage use of the electromagnetic spectrum. Spectrum managers prioritize and deconflict
operation of spectrum-dependent systems to prevent unacceptable interference. They may coordinate
spectrum use with U.S. or host-nation military and civil authorities. Spectrum management includes
enforcing frequency assignments while identifying and eliminating unauthorized use of the frequency
spectrum.
2-188. Frequency assignment involves requesting and issuing authorization to use frequencies for specific
equipment. This includes assigning frequencies for combat net radio networks, unmanned aircraft systems,
and line of sight networks. Spectrum managers perform frequency assignment for all spectrum-dependent
military equipment.
2-189. Host nation coordination is negotiation for authorization to operate radio frequency-emitting
equipment within a sovereign nation. This coordination is necessary to conform to international and national
laws, and to avoid interfering with host-nation communications and emergency services. Coordination
prevents diplomatic friction with the host nation. Commanders or operators who do not operate within host-
nation laws may incur criminal or civil liability and have their equipment confiscated. Host nation
coordination does not apply to forcible entry operations or operations in a hostile nation.
2-190. Spectrum management operations depend on policy adherence to ensure access to the spectrum. This
includes complying with national (strategic) through tactical-level policies and defining local policies for
spectrum management, frequency assignment, and host nation coordination. Refer to JP 6-01 and ATP
6-02.70 for more information about spectrum management.
VISUAL INFORMATION AND COMBAT CAMERA
2-191. Visual information and COMCAM capture still and motion imagery to support a variety of missions.
Visual information products may support command and control, training, education, logistics, human |
6-02 | 73 | Signal Support by Army Echelon, Core Competencies, Training, and the Army Network
resources, special operations, information operations, public affairs, or intelligence requirements. Visual
information and COMCAM provide decision makers and supported agencies current and accurate
information.
VISUAL INFORMATION
2-192. Visual information is various visual media with or without sound that generally includes still and
motion photography, audio video recording, graphic arts, and visual presentations (JP 3-61). Visual
information also includes the activities to produce and edit these products.
2-193. Unlike news stories, press releases, or press conferences, Army visual information records events as
they occur. It documents military operations, exercises, and activities to convey an unfiltered view to key
audiences. Visual information products are subject to the same security classification and operations security
considerations as other operational information.
2-194. Visual information products created for other uses can also support public affairs objectives. Multi-
use examples of visual information include—
* Documenting domestic disasters to aid emergency management decision making.
* Documenting evidence of war crimes.
* Preserving evidence about damage claims against the U.S. Government.
* Providing training aids that simulate battlefield conditions.
* Providing battle damage assessment images.
* Documenting forensic evidence of incidents, such as improvised explosive device detonations.
* Documenting the environmental impact of military operations.
2-195. Visual information support is limited to official events or activities. Commanders consider the
mission, cost-effectiveness, and the quality and quantity of products and services available when establishing
priorities for visual information support.
2-196. The Defense Imagery Management Operations Center receives, manages, and distributes strategic,
operational, tactical, and joint-interest imagery as a shared asset. See appendix C for more information about
requests for visual information resources.
2-197. Regardless of the mission and conditions under which visual information is created, it becomes an
official DOD record and may be releasable under the Freedom of Information Act, requests for evidence in
litigation, or other sources of legal authority (JP 3-61). The release of visual information products is subject
to security classification and operations security review. Refer to ATP 6-02.40 for more information about
visual information operations.
Note. Certain visual information-type imagery is exempt from mandatory disclosure and sharing.
Visual media collected exclusively to support intelligence, law enforcement, medical, or research,
development, test, and engineering activities, and imagery from weapon systems, helmet cameras,
or unmanned aerial vehicles fall under separate regulatory guidance. Refer to DODI 5040.02 for
more information on these exclusions.
COMBAT CAMERA
2-198. Combat camera is specially-trained expeditionary forces from Service-designated units capable of
providing high-quality directed visual information during military operations (JP 3-61). COMCAM units and
teams produce still and motion imagery to support combat, information operations, humanitarian relief,
special operations, intelligence, reconnaissance, engineering, legal, public affairs, and other operations
involving the Military Services. COMCAM is an essential battlefield information resource that supports
strategic, operational, and tactical mission objectives.
2-199. Commanders employ COMCAM capabilities to document the entire scope of U.S. military activities
during wartime operations, crises, contingencies, joint exercises, and other events of significant national
interest involving the DOD Components. The COMCAM mission may support, but is separate from, |
6-02 | 74 | Chapter 2
specialized imagery operations and systems for specific mission requirements, such as intelligence,
surveillance, and reconnaissance or operational test and evaluation.
2-200. COMCAM supports Army units across the range of military operations. COMCAM elements share
documentation, as required, to support operational and planning requirements from tactical through national
level. COMCAM documentation supports sound decision making. COMCAM capabilities include—
* Tactical digital media.
* Imagery editing.
* Video editing.
* Transmission of visual information products.
* High definition still and video imagery.
* Graphic design.
* Parachute-qualified COMCAM equipped Soldiers (airborne COMCAM company only).
2-201. COMCAM requirements are different from public affairs and press pool media requirements. While
COMCAM imagery may support public affairs, it is primarily a decision-making tool. Because COMCAM
Soldiers can access information and areas media personnel cannot, the imagery they produce is often
operationally sensitive. COMCAM imagery requires security classification and operations security review
before release for public affairs use. See appendix C for COMCAM request procedures. Refer to ATP 6-
02.40 for more information about COMCAM.
COMMUNICATIONS SECURITY
A strong case can be made that, seen broadly, a major purpose of COMSEC—perhaps its
overriding purpose—is to help achieve surprise by denying adversaries and enemies
foreknowledge of our capabilities and intentions.”
David G. Boak
2-202. Communication is more than the simple transmission of information. It is a means to exercise control
over forces. Communication links information to decisions and decisions to action. Communication among
the parts of a command supports their coordinated action (ADP 6-0). Operations security concerns dictate
that U.S. forces deny adversaries and enemies the content of sensitive communications.
2-203. Communications security is the protection resulting from all measures designed to deny
unauthorized persons information of value that might be derived from the possession and study of
telecommunications, or to mislead unauthorized persons in their interpretation of the results of such
possession and study (JP 6-0). While COMSEC does not rise to the level of a core competency, it is still an
essential capability to protect sensitive information.
2-204. Cryptographic systems and devices protect sensitive classified and unclassified operational
information in the DODIN-A. To decrypt the data, every member of the cryptonet needs an identical key.
COMSEC account managers distribute and control keying material and manage routine updates so all
authorized users—and only authorized users—have the correct key to communicate. Including COMSEC
key management in operations planning is essential to enabling secure communications.
2-205. If cryptographic equipment or keying materials become lost or captured, the communications they
secure risk compromise. This is especially true of a keyed device, such as a combat net radio, since a lost or
captured radio compromises the entire network. Promptly reporting a lost key facilitates risk assessment and
mitigation. Refer to ATP 5-19 for more information on risk management.
2-206. Normally, when a cryptographic key is lost, the controlling authority initiates emergency key
supersession to protect the integrity of the cryptographic network. Any member of the cryptonet who does
not have the new key, will lose communications over the network until they obtain and update their key. If
mission requirements prevent immediate supersession, the key update should take place as soon as the
mission allows. The commander’s risk decision must consider the likelihood the keying material has fallen
into enemy hands. |
6-02 | 75 | Signal Support by Army Echelon, Core Competencies, Training, and the Army Network
2-207. COMSEC account managers maintain centralized accountability of cryptographic material and
equipment. For tactical flexibility, operators and COMSEC local elements hold keying material and devices
at the lowest echelon that can maintain appropriate physical security. This allows COMSEC managers and
operators to react to contingencies, such as emergency key supersession, equipment failure, or operator error
with minimal downtime.
2-208. COMSEC compliance is a command responsibility. Users are responsible for protecting and
accounting for all COMSEC material and equipment in their possession or control. TB 380-40 provides
further guidance on COMSEC responsibilities. Refer to ATP 6-02.75 for more information about COMSEC
operations.
SECTION III – SIGNAL TRAINING
INDIVIDUAL SIGNAL TRAINING
2-209. The United States Army Signal School conducts training, leader development, and continuing
education. The Signal School conducts both resident training at the Cyber Center of Excellence, and
sustainment training at the cyber learning centers.
RESIDENT TRAINING
2-210. The Signal school trains officers, warrant officers, and enlisted Soldiers in signal branch
designations, functional areas, and military occupational specialties. This responsibility includes—
* Signal branch officer basic and career courses.
* Functional area 26A and 26B transition courses.
* Warrant officer courses.
* Advanced individual training.
* Enlisted military occupational specialty reclassification.
* Noncommissioned officer education system courses.
* Functional courses, such as signal digital master gunner and COMSEC account manager.
2-211. Signal Soldiers receive training to—
* Plan and direct signal support.
* Provide network transport and information services, including automated information systems
integration.
* Operate telecommunications systems and networks.
* Secure the confidentiality, integrity, and availability of telecommunications networks, automated
information systems, and data (cybersecurity).
* Conduct spectrum management.
* Manage COMSEC.
* Conduct visual information and COMCAM operations.
SUSTAINMENT TRAINING
2-212. The regional signal training sites—formerly United States Army Communications-Electronics
Command signal and sustainment universities—serve Active Component units at many installations. The
cyber learning centers are a key training capability for emerging technology, communications, information
technology applications, and commercial certifications. The individual training and certifications available
from the cyber learning center support units’ training readiness and can be a valuable tool in the unit’s overall
training plan. For more information about course offerings, contact the installation’s cyber learning center. |
6-02 | 76 | Chapter 2
COLLECTIVE SIGNAL TRAINING IN UNITS
2-213. The Army prepares itself for large-scale combat operations continuously. There is no time to build
readiness necessary to win once hostilities commence in the current operational environment. Army forces
must demonstrate a credible level of readiness against regional peer threats to effectively deter adversaries
and assure partners (FM 3-0).
2-214. Commanders understand a key to mission success is training their Soldiers in the tasks and battle
drills required to execute the unit’s primary mission. Experience at home station exercises, the combat
training centers, warfighter exercises, and deployments shows the importance of allowing enough time in the
training schedule for operator and crew training on critical signal support systems. The individual and team
tasks to operate and maintain these systems are complex, and the skills are perishable. Without regular
training, Soldiers’ proficiency quickly degrades. This is especially true for general-purpose user systems not
operated by signal Soldiers. Because typical operators are less familiar with signal equipment and concepts,
they need regular refresher training with these systems.
2-215. Collective tasks are clearly defined, observable, and measurable activities or actions that require
organized team or unit performance, leading to the accomplishment of a mission or function. Based on the
accomplishment of task proficiencies at the individual level, units conduct collective training. This is done
at home station, at maneuver combat training centers, at mobilization training centers, during joint training
exercises, and while deployed (ADP 7-0).
MISSION ESSENTIAL TASKS
2-216. Commanders rarely have enough time or resources to train all tasks. The commander evaluates the
unit’s task proficiency to determine which essential collective tasks the unit must train to attain the required
proficiency and on which tasks they can accept risk. The organic signal company’s combined arms training
strategy includes a mission essential task list. Each mission-essential task aligns with supporting collective
and individual tasks.
COLLECTIVE TRAINING TECHNIQUES
2-217. Collective training follows an integrated approach of live, virtual, and constructive training at home
station, combat training center rotations, and during deployments to build confident, cohesive units able to
adapt to their environment and defeat the enemy. Demanding and repetitive training builds Soldiers’
confidence in their weapons and equipment, their ability to fight and overcome challenges, their leaders, and
their teams.
Realistic Training Environment
2-218. The training environment should duplicate as closely as possible the expected operational
environment. Teams train under conditions that emphasize change, uncertainty, degraded friendly
capabilities, capable enemies, and austere conditions. Realistic training prepares Soldiers to perform under
combat conditions by including unexpected tasks and battle drills.
2-219. Commanders should incorporate a realistic threat environment into training exercises, so teams learn
to recognize indications of cyberspace attacks and jamming. Understanding network vulnerabilities is critical.
The training environment should include likely adversary tactics, techniques, and procedures. Units must
train to identify key terrain in cyberspace relative to their commander’s priorities to enable a focused defense.
Establishing a properly configured, monitored, and secured network during training events prepares operators
to detect malicious and unauthorized activity and enables command and control and the other warfighting
functions.
2-220. Integrating training with a realistic threat able to attack networks into unit training at home station
and combat training centers prepares units for real-world missions. It also prepares units to understand the
threat and indicators of a contested environment. Realistic training also demonstrates the consequences of
not following security procedures. |
6-02 | 77 | Signal Support by Army Echelon, Core Competencies, Training, and the Army Network
2-221. A realistic training environment provides operators practice securing the DODIN-A against active
threat and allows units to integrate actions and effects in support of maneuver commanders. Training signal
forces to secure the network against an active threat is critical to mission success. Realistic and combat-
focused training requires specialized technical training, instrumentation, and ranges at home station and
combat training centers.
Digital Battle Drills
2-222. Digital battle drills provide signal equipment operators and teams structured, pre-planned responses
to network, COMSEC, cybersecurity, or server-related events or power outages. Established standards are
easy to enforce and help manage expectations inside the command. Realistic training and repetition ensure
operators can reflexively apply conditioned responses under combat conditions. All echelons should
formulate and actively rehearse battle drills for a variety of anticipated events to ensure timely and
appropriate responses.
Combined Arms Training Strategy
2-223. The signal company’s training calendar should include events from the combined arms training
strategy. These training events progressively build from team level through multi-echelon exercises
supporting the parent unit. The combined arms training strategy begins with team tasks to develop crew
proficiency installing and operating their assigned systems. As training progresses, teams combine for
platoon- and company-level training exercises to ensure the teams can integrate the unit’s network systems
into the DODIN-A. Training signal teams to proficiency through the combined arms training strategy ensures
Soldiers are not only proficient in their individual military occupational specialty skills, but can integrate the
network to support operations.
SIGNAL DIGITAL MASTER GUNNER COURSE
2-224. The Signal Digital Master Gunner Course is a functional course that trains signal noncommissioned
officers to install, operate, maintain, and secure local area networks and integrate them with mission
command information systems and the unit’s portion of the DODIN-A. The course teaches Soldiers to
integrate commercial server applications with tactical communications systems. Signal digital master gunner
is a resident course taught at the Signal School.
SECTION IV – THE ARMY NETWORK
2-225. Army forces depend on the DODIN-A for network-enabled operations throughout all operational
phases and environments. This section discusses the joint (DODIN) and Army (DODIN-A) networks, the
network transport and information services capabilities that enable command and control, and DODIN
operations.
DEPARTMENT OF DEFENSE INFORMATION NETWORK
2-226. The joint force depends upon the DODIN to connect strategic, operational, and tactical commanders
across the globe. The DODIN enables the right users to access the right information at the right time to enable
situational understanding and timely decision making, with the right protection to prevent disclosure to
enemies and adversaries.
2-227. As the DOD portion of cyberspace, the DODIN interacts with and provides connections to national
and global cyberspace. The DODIN consists of joint capabilities provided by the Defense Information
Systems Agency combined with Service-specific enclaves provided by the Army (DODIN-A), Navy, Air
Force, and Marine Corps. An enclave is a set of system resources that operate in the same security domain
and that share the protection of a single, common, continuous security perimeter (CNSSI 4009).
2-228. The DODIN can store user data or make data stores available through commercial cloud service
providers. The Defense Information Systems Agency manages DISN applications and services through core
data centers in each geographic combatant commander’s area of responsibility. The servers at the core data |
6-02 | 78 | Chapter 2
center provide always-on, secure data storage. This data storage capability enables deploying Soldiers and
units to take their home-station information with them whenever and wherever they deploy by transferring
the data from their home station data center to the data center serving their deployment area of operations.
Core data centers support the DODIN worldwide so users can access Army, joint, and multinational data,
applications, and information services from anywhere, at any time, in any operational environment
COMMAND AND CONTROL
2-229. United States Cyber Command has the Unified Command Plan mission to operate, secure, and
defend the DODIN. For unity of command and unity of effort, Joint Force Headquarters-DODIN exercises
delegated directive authority over all DOD Services and agencies for DODIN operations and defensive
cyberspace operations-internal defensive measures. Within the Army, ARCYBER plans and directs
cyberspace operations, including DODIN operations.
Note. The Director of the Defense Information Systems Agency is designated as the Commander,
Joint Force Headquarters-DODIN.
ARCHITECTURE
2-230. The DODIN architecture identifies priority areas, principles, rules, and activities to implement a
manageable set of enterprise-wide capabilities. The architecture provides a common vocabulary for
describing the capabilities, activities, and services to achieve an integrated joint network.
Cloud Computing
2-231. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of
configurable computing resources—networks, servers, storage, applications, and services—that can be
rapidly provisioned and released with minimal management effort or service provider interaction. Users can
access cloud services without geographic limitations, as long as they have a connection to the DODIN.
2-232. Cloud services may reside at a DOD core data center or be leased from a commercial cloud service
provider. Units and commands can lease virtual servers or services to fulfill temporary requirements without
going through the lengthy acquisition cycle and terminate the lease when they no longer need the services.
Cloud-based solutions reduce the Army’s ownership, operation, and sustainment costs for information
technology hardware and software. Army units acquire cloud services through the DOD core data center, or
acquire commercial cloud services according to the guidelines in Memorandum, DOD CIO, 15 December
2014, subject: Updated Guidance on the Acquisition and Use of Commercial Cloud Computing Services.
Defense Information Systems Network
2-233. The DISN is the DOD enterprise network for data, video, and voice services. DISN services include
SIPRNET, NIPRNET, Joint Worldwide Intelligence Communications System, video teleconferencing,
Defense Switched Network, Defense Red Switched Network, Defense Research Engineering Network, and
mission partner environment.
2-234. The three segments of the DISN are the sustaining base, long-haul transport, and deployed. The
long-haul segment provides network transport between the sustaining base and deployed network elements.
Satellite Transport
2-235. Satellite transport includes all DOD data and voice satellite communications. Satellite
communications is a key method of network transport. Satellite communications capabilities, such as
Wideband Global Satellite Communications, extend the DODIN worldwide to users without copper or fiber
optic cable connections. Army satellite communications systems operate over military and commercial
communications satellites. The extended range of satellite communications allows Signal forces to quickly
establish connectivity within or between theaters. Using satellite communications transport allows Army |
6-02 | 79 | Signal Support by Army Echelon, Core Competencies, Training, and the Army Network
forces to extend access to the DODIN-A into remote or austere operational environments where there is no
existing DODIN infrastructure.
Global Backbone (Fixed Station)
2-236. Strategic backbone transport connects theaters outside the continental United States to the DODIN.
The backbone network transport establishes the DOD communications infrastructure and provides semi-
permanent access to DISN services in garrison and training environments worldwide.
Gateway Access (Expeditionary)
2-237. DOD Gateways at select fixed satellite communications facilities provide deployed forces pre-
positioned access points for reachback to the strategic support area. Because satellite communications allows
beyond line of sight communications at great distances, it can extend immediate access to full DISN services
in remote, austere operational environments without infrastructure limitations. Tactical satellite
communications systems support command and control on-the-move as well as operations from traditional
command posts. Refer to ATP 6-02.54 for more information about satellite communications transport.
Unified Capabilities
2-238. Unified capabilities integrate voice, video, and data services across a secure Internet protocol
network. The services are independent of technology, so they do not require stand-alone systems to deliver
capabilities. Using unified capabilities provides joint interoperability and reduces redundant efforts among
the Military Services.
2-239. The Defense Information Systems Agency’s unified capabilities approved products list is the single,
consolidated list of products certified for interoperability and cybersecurity compliance. The approved
products list includes network infrastructure capabilities as well as voice, video, and data services.
Note. The current list of approved unified capabilities is available at the Approved Products List
Integrated Tracking System Website.
PERSONALLY IDENTIFIABLE INFORMATION
2-240. Personally identifiable information is any information that can be used to distinguish or trace an
individual’s identity. This information can be in hard copy or electronic format, stored on personal computers,
laptops, and personal electronic devices, or found within databases. Protected personally identifiable
information includes—
* Name.
* Social Security number.
* Date and place of birth.
* Mother’s maiden name.
* Biometric records.
* Education records.
* Records of financial transactions.
* Medical files.
* Criminal records.
* Employment history.
2-241. In the digital age, leaked personally identifiable information can cause a great deal of damage. Many
individuals have fallen victim to identity theft from leaked information. Data breaches can also compromise
operations security or allow enemies or adversaries to target individual Soldiers or their family members.
2-242. Many DODIN users require access to some personally identifiable information in the regular course
of their duties. Handling this information carries a special commitment to protect individuals’ private |
6-02 | 80 | Chapter 2
information. All Army military, civilian, and contractor employees whose duties require collecting, using, or
storing personally identifiable information are responsible to—
* Be able to recognize and safeguard personal information.
* Collect personal information only when authorized and needed to perform their duties.
* Collect only the information necessary.
* Tell the individual the reason for collecting their personal information, who may see it, and what
happens if the individual does not provide the requested information.
* Keep the information accurate, relevant, timely, and complete.
* Protect the information with encrypted storage.
* Transmit the information only with encryption and digital signature.
* Keep personally identifiable information confidential and protect it from misuse, loss, or data
breach.
JOINT INFORMATION ENVIRONMENT
2-243. The joint information environment is a secure environment to share information technology
infrastructure, enterprise services, and a single security architecture across the DODIN. The joint information
environment implements enforceable standards and specifications, and common tactics, techniques, and
procedures among the Services.
2-244. Security and interoperability of networked computers are configuration-dependent. A single
incorrect setting on a workstation, router, or switch may leave it vulnerable to a cyberspace attack or unable
to connect with the DODIN. Security affects every aspect of military operations. Likewise, interoperability
is vital to mission success. Connecting to the DODIN facilitates collaboration with joint mission partners.
2-245. Each Service, installation, and organization has traditionally maintained separate security
infrastructure and processes. This creates too many opportunities for failure and hinders information sharing
among joint mission partners. Standardized, centralized security allows administrators to apply patches and
improvements faster and with greater certainty.
2-246. The joint information environment improves operational effectiveness, standardizes training and
equipment requirements across combatant commands and geographic regions, enhances security, and allows
Services and agencies to allocate and align their information technology resources to their mission
requirements. The joint information environment—
* Consolidates data centers.
* Standardizes and converges services, such as identity and access management and e-mail.
* Reduces the cyberspace attack surface.
* Provides DODIN-wide situational awareness.
Global Enterprise Operations Center
2-247. The Global Enterprise Operations Center is the Defense Information Systems Agency’s top-level
DODIN operations facility. The global enterprise operations center has complete visibility of the DODIN
and oversees global DODIN operations to support combatant commanders. The global enterprise operations
center—
* Directs global DODIN operations and defensive cyberspace operations-internal defensive
measures.
* Prioritizes global cyberspace missions.
* Acts as the global focal point for integrating unified action partners into mission partner
environment.
* Maintains global, joint situational awareness. |
6-02 | 81 | Signal Support by Army Echelon, Core Competencies, Training, and the Army Network
Enterprise Operations Center
2-248. The Defense Information Systems Agency’s regionally-aligned enterprise operations centers
maintain visibility of their respective portions of the enterprise network. The enterprise operations center
conducts regional cyberspace missions to support geographic combatant commander priorities and those
global missions directed by the global enterprise operations center. The enterprise operations center—
* Directs DODIN operations and defensive cyberspace operations-internal defensive measures in
its assigned theater.
* Acts as the regional focal point for integrating unified action partners into mission partner
environment.
* Maintains regional, joint situational awareness.
* Performs cybersecurity and defensive cyberspace operations-internal defensive measures
functions, as directed by the global enterprise operations center.
Local Infrastructure (Base, Post, Camp, Station, or Joint Base)
2-249. The Services continue to maintain their local infrastructure and their ability to support tactical units
and Service-unique missions. In the local infrastructure—
* The host Service maintains infrastructure.
* The host Service provides hands-on labor.
* The host Service provides defensive cyberspace operations incident response.
* The local installation provides mission- or unit-specific support.
* The Services maintain support for their tactical units.
Regional Top Level Architecture (Joint Regional Security Stack)
2-250. Top level architectures are access points to the DODIN. Their firewalls, intrusion detection, and
intrusion prevention sensors represent the border security between the DODIN and the public Internet. In the
legacy DODIN architecture, the Services typically hosted a top level architecture at each installation. Joint
information environment replaces over 1,000 installation-based top level architectures with regional top level
architectures (joint regional security stacks).
2-251. The joint regional security stacks consolidate the regional security architecture. This reduces the
cyberspace attack surface by limiting the number of direct interfaces with outside networks. It also reduces
the size of the specialized cybersecurity workforce needed to secure the network perimeter.
Note. Refer to Enabling the Joint Information Environment: Shaping the Enterprise for the
Conflicts of Tomorrow for more information about the joint information environment.
JOINT THEATER DEPARTMENT OF DEFENSE INFORMATION NETWORK OPERATIONS
AUTHORITIES
2-252. The highest-level joint DODIN operations authority in a theater is the Defense Information Systems
Agency’s enterprise operations center (see paragraph 2-248). The geographic combatant command and joint
task forces also have joint DODIN operations facilities to control their respective portions of the theater
network.
Joint Cyberspace Center
2-253. A joint cyberspace center is the operational element of the combatant command that plans and
oversees DODIN operations, defensive cyberspace operations, and offensive cyberspace operations in the
theater. In conjunction with the theater network operations control center, the joint cyberspace center
provides comprehensive network situational awareness, so commanders can make informed decisions to
align network assets and capabilities to mission priorities and defend the network. Refer to JP 3-12 for more
information about the joint cyberspace center’s defensive and offensive cyberspace operations roles. |
6-02 | 82 | Chapter 2
Geographic Combatant Command J-6
2-254. The geographic combatant command J-6 establishes policy and guidance for all communications
assets supporting the joint force commander and develops communications system architectures and plans to
support the geographic combatant commander’s mission. The J-6 also advises the geographic combatant
commander of the network’s ability to support operations.
Theater Network Operations Control Center
2-255. The theater network operations control center is the geographic combatant command-level DODIN
operations center. The theater network operations control center controls all theater systems and networks
operated by forces assigned to or supporting the geographic combatant commander through technical
channels.
Joint Network Operations Control Center
2-256. The commander, joint task force controls joint force systems and networks through a joint network
operations control center. The joint network operations control center directs operations and defense of the
joint task force portion of the theater network. The joint network operations control center collects network
status from supporting units in the joint operations area for consolidated network situational awareness. The
joint network operations control center provides the network status information to the joint cyberspace center
for the theater-wide situational awareness view.
DEPARTMENT OF DEFENSE INFORMATION NETWORK-ARMY
2-257. The Army’s portion of the DODIN is the DODIN-A. Adhering to common joint standards ensures
interoperability and cybersecurity compliance across the entire Army enterprise and the wider DODIN. The
DODIN-A uses redundant transport systems to link sensors, warfighting and business applications, and
services. The network provides access to timely, accurate information in any environment and enables
mission partner collaboration.
2-258. The DODIN-A connects geographically dispersed fixed station and deployed expeditionary forces
to the global network through long-haul network transport, and supports—
* Installation campus area networks for known, verified users. Campus networks connect
installation-based users to DISN services through a network enterprise center.
* Regional hub nodes that provide network transport and DISN services to support the deployed
and training environments. The regional hub node includes a satellite transport component that
connects deployed forces to the DODIN-A, and a gateway that provides access to DISN services
and the wider DODIN.
* Upper tier tactical internet to connect deployed users to a data center and DISN services,
regardless of their location. The deployed enclave connects to the DODIN-A and DISN services
through the regional hub node or tactical hub node.
* Lower tier tactical internet infrastructure to support tactical formations down to the team leader.
2-259. Commanders and their staffs leverage the DODIN-A as a warfighting platform and the foundation
for all other Army warfighting functions and capabilities. Commanders exercise command authority over
their portions of the network. Signal units and Soldiers install, operate, and maintain their respective portions
of the DODIN-A so commanders and staffs can communicate with higher, subordinate, adjacent, and
supporting elements for mission success. The DODIN-A enables leaders to exercise command and control,
integrate warfighting functions, and synchronize their efforts. The DODIN-A also allows synchronization
with higher, subordinate, and adjacent units using the common operational picture and commander’s intent,
without needing direct control from higher headquarters. |
6-02 | 83 | Signal Support by Army Echelon, Core Competencies, Training, and the Army Network
ARCHITECTURE
2-260. The architecture of the DODIN-A provides access to protected services at the point of need. The
architecture converges communications, computing, and enterprise services into a single platform that
supports and enables all other missions and functions.
2-261. The core competencies and essential capability of the Signal Corps enable the DODIN-A’s seamless
cloud environment:
* Network transport and information services provide, and extend access to, the network and its
applications and services.
* DODIN operations and the essential capability of COMSEC operate and secure the network
and provide access to cloud-based services.
* Spectrum management operations enable those DODIN-A systems that rely on wireless
connectivity, without causing or suffering unacceptable frequency interference.
Defense-in-Depth
2-262. Information systems security and network security are critical, because a single compromised
workstation or networking device places the entire network at risk. DODIN operations personnel secure the
network and its services through defense-in-depth. Defense-in-depth is an information security strategy
integrating people, technology, and operations capabilities to establish variable barriers across multiple layers
and missions of the organization (CNSSI 4009). Defense-in-depth includes perimeter security, enclave
security, host security, physical security, personnel security, and cybersecurity policies and standards.
Layered security protects every level of the network, down to individual workstations and users. By
enhancing protection and survivability, defense-in-depth helps achieve the fundamental principle of trusted
systems.
2-263. DODIN operations planners devise and implement comprehensive network plans using a full range
of security measures. The plan includes both external and internal perimeter protection. External perimeter
protection consists of COMSEC procedures, router filtering, access control lists, security guards, and, where
necessary, physical isolation serving as a barrier to outside networks, such as the public Internet. Internal
perimeter protection consists of firewalls and router filtering. These serve as barriers between echelons of
interconnected networks and information systems. Internal COMSEC barriers provide another layer of
security for network enclaves. Local workstation protection consists of individual access controls,
configuration audit capability, protection and intrusion detection tools, and security procedures.
2-264. The joint regional security stack secures the logical boundary between the DODIN-A and the rest of
the DODIN. The hardened outer perimeter of the joint regional security stack controls access to applications
and data within the DODIN-A.
Communications in Depth
2-265. Network-enabled operations require a robust, survivable network. Maintaining network-enabled
capabilities in a degraded information environment mandates a communications in depth architecture for the
tactical portion of the network. Deployed signal elements implement redundant network transport using line
of sight transport, satellite communications, wire, and cable. Automatic network establishment and restoral
eliminate single points of failure so critical communications still get through. Refer to ATP 6-02.60 for more
information about tactical network systems.
Colorless Core
2-266. Colorless core is a Defense Information Systems Agency-compliant cybersecurity architecture that
offers more efficient Internet protocol network encryption and transport. The key benefits of colorless core
are data protection and more efficient bandwidth use. The colorless core architecture encrypts all data,
whether classified or unclassified, from end-to-end. This is different from legacy systems that only encrypted
classified information. Since all the encrypted data looks the same, an enemy or adversary cannot distinguish
between classified and unclassified data. This makes unclassified information just as hard to recover as
classified information. It also makes it harder for adversaries to target classified networks for cryptanalysis. |
6-02 | 84 | Chapter 2
Link layer encryption isolates the network backbone (the wide-area network) from external networks. Refer
to ATP 6-02.60 for more information about colorless core architecture.
Transport Convergence
2-267. The Army has long maintained separate tactical transport networks to support the communications
requirements of different functional areas—command and control, intelligence, logistics, and medical. A unit
with all of these networks has used four separate satellite communications terminals and four sets of
networking hardware with all the associated manning, physical security, configuration and patching, and
logistics support requirements; four separate DODIN operations chains of authority; and up to four separate
commercial satellite leases. Converging the transport for these networks onto a common network transport
medium makes better use of resources and assets, leverages existing infrastructure, increases network
security, and simplifies network management, while reducing reliance on leased commercial satellite
resources.
2-268. The Army is migrating the network transport for the tactical portions of these networks onto a single
transport medium using the colorless core architecture. The first phase of transport convergence integrates
the top secret/sensitive compartmented information intelligence network into the colorless core architecture
to brigade level in the deployed portion of the network. The sensitive compartmented information data is
encrypted end-to-end from the TROJAN Network Control Center to the G-2 (S-2) section. The signal systems
provide only network transport. The G-2 (S-2) section continues to perform DODIN operations functions for
top secret networks.
2-269. The extra demand for data throughput over the converged transport requires DODIN operations
personnel to manage bandwidth apportionment and quality of service rules for the different classes of data,
based on mission requirements. Bandwidth apportionment ensures the converged transport provides the same
quality services as the legacy capabilities.
OPERATING ENVIRONMENTS
2-270. Work, deployed, and home or mobile represent the DODIN-A operating environments. Sharing
configurations and security standards allows these environments to operate as a single, integrated network.
Work Environment
2-271. Generating forces occupy posts, camps, and stations worldwide supporting the geographic
combatant commanders. The work environment represents the Army in-garrison, using the DODIN-A as a
strategic capability to support the generating force and shaping operations. Forward-deployed posts, camps,
and stations rely on Defense Information Systems Agency long-haul transport for connection to enterprise
services.
Network Enterprise Center
2-272. The network enterprise center is the facility that provides and acquires telecommunications and
information management services on Army installations (ATP 6-02.71). The network enterprise center
manages the installation campus area network and ensures service quality for supported units at their home
station. The campus area network connects installation-based users to the DISN, secure data stores, and
baseline common services on a non-reimbursable basis. The network enterprise center provides information
technology services other than those on the baseline services list on a fee-for-service basis (refer to AR
25-1). Strategic signal battalions operate the network enterprise centers. The network enterprise center
delivers these baseline services to units in garrison:
* Communications systems and system support services.
* Telephone and data infrastructure services.
* Emergency communications telephone services.
* Wireless infrastructure services.
* Video teleconferencing services.
* Range and field telephone services. |
6-02 | 85 | Signal Support by Army Echelon, Core Competencies, Training, and the Army Network
* Telecommunications continuity of operations plan and operation plan support services.
* Fire, safety, security, and other circuit services.
* Non-tactical radios and non-tactical/tactical radio spectrum management services.
* Cybersecurity services.
* Defense-in-depth.
* COMSEC services.
* Risk management, accreditation, and certification policy services.
* Network security services.
* Automation services.
* Mail, messaging, and collaboration (Defense Enterprise E-mail and Organizational Messaging
Service) and storage services.
* Desktop, software, and peripheral support services.
* Web support services.
* Automation and network service support services.
Note. Refer to the Command, Control, Communications, Computers, and Information
Management Services List for information about baseline common services.
Installation as a Docking Station
2-273. Securing tactical networks is complex and requires Soldiers proficient in specialized technical skills.
These skills are perishable and degrade quickly if not exercised regularly. Installation as a docking station
provides a standardized, simplified connection between mission command information systems and the
installation network. This allows units to train and work with the same systems they use when deployed
without relying on costly commercial satellite bandwidth or limited military satellite bandwidth and regional
hub node availability. Units can use the same systems and software they use on the battlefield as a routine
element of daily operations at their home station.
2-274. Installation as a docking station reduces the time needed to establish cybersecurity-compliant tactical
networking components through an always-on concept. The local network enterprise center distributes
patches directly to the unit, so system administrators can apply them immediately. This keeps user accounts
current and systems patched to mitigate security vulnerabilities. Because the system patching stays up to
date, the systems can rapidly transition to and from an operational theater. Units only need to pack their
equipment and begin movement.
2-275. Commanders and staffs can access the forward-deployed network and mission partner environment
through installation as a docking station. Theater and mission-specific information stores are available at the
home station to support the operations process. Installation as a docking station enables planning, preparing,
and assessing operations on the same mission network used in the operational theater.
Home Station Mission Command
2-276. Advances in communications and information technologies, such as teleconferencing and other
remote collaboration capabilities, allow units to conduct split-based operations, where the tactical command
post deploys to an operational theater and the main command post continues to operate from home station.
Each Army division has a home station mission command center that allows its main command post to control
operations of deployed, deploying, and non-deployed subordinate units from its home station. A tailored
portion of the headquarters can deploy to an area of operations and establish either an early entry command
post or a forward-deployed command post. The remainder of the headquarters can operate from home station
to perform dedicated analysis, planning, and coordination supporting forward operations.
2-277. Home station mission command reduces the time and strategic lift resources required to deploy a
division command post. It also reduces the forward logistics footprint required to sustain the command post
as compared with supporting an entire division headquarters. |
6-02 | 86 | Chapter 2
2-278. The size of the early entry or forward-deployed command post can increase or decrease as necessary
in response to changes in the operational or mission variables. Large-scale combat operations and campaigns
or unacceptable network defense challenges may require the division headquarters to deploy most of its
command and control capabilities. In these cases, the entire headquarters can deploy and establish traditional
main and tactical command posts in the operational theater.
2-279. Home station mission command increases data throughput requirements between deployed elements
and the home station headquarters. Signal planners should consider the network architecture and data
requirements for reliable connectivity between the separate headquarters. Locally hosting services at each
end so users can access critical information without relying on reachback mitigates the data throughput
requirements.
Deployed Environment
2-280. The strategic infrastructure supports units’ requirements at their home station, but tactical units still
need communications and information services when deployed in an operational theater. The deployed
portion of the DODIN-A provides the needed services and supports tactical mobility requirements.
2-281. The regional cyber center manages the theater network through technical channels. Deployed tactical
forces connect to the DODIN-A using satellite transport through a DOD Gateway site, regional hub node, or
tactical hub node. The tactical portion of the DODIN-A extends DISN voice, data, imagery, and video
capabilities to deployed forces.
Home or Mobile Environment
2-282. Many authorized users operate from outside the boundaries of the Army network. These users access
the DODIN-A from home or a temporary duty location. These users usually connect with the network through
the public Internet or a virtual private network connection. Users within the home and mobile environments
access the DODIN through commercial telecommunications to a joint, Army, or other Service network entry
point.
2-283. The security of an enterprise network is only as strong as its weakest point. Secure data, applications,
and services depend on cybersecurity compliance. Users must maintain current antivirus software and follow
good security practices. The DODIN-A operational view (Figure 2-3 on page 2-51) shows a high-level
overview of the DODIN and DODIN-A. |
6-02 | 87 | Signal Support by Army Echelon, Core Competencies, Training, and the Army Network
Figure 2-3. Department of Defense information network-Army operational view |
6-02 | 89 | Chapter 3
Signal Support to Operations to Shape and Prevent
This chapter provides an overview of signal support to Army operations to shape and
prevent. Section I discusses signal support in Army operations to shape. Section II
discusses signal support in Army operations to prevent.
SECTION I – OPERATIONS TO SHAPE
3-1. Operations to shape consist of various long-term military engagements, security cooperation, and
deterrence missions, tasks, and actions intended to assure friends, build partner capacity and capability, and
promote regional stability (FM 3-0).
OVERVIEW OF ARMY OPERATIONS TO SHAPE
3-2. Operations to shape support the geographic combatant commander’s theater campaign plan or the
theater security cooperation plan. Operations to shape serve four primary purposes:
* Promoting and protecting U.S. national interests and influence.
* Building partner capacity and partnerships.
* Recognizing and countering adversary attempts to gain positions of relative advantage.
* Setting conditions to win future conflicts.
3-3. Shaping activities include unit home station activities such as maintaining operational readiness,
training, contingency planning, combined exercises and training, military exchange programs, security
cooperation, and military-to-military engagements. Figure 3-1 on page 3-2 depicts activities to shape
operational environments and prevent conflict in an environment of cooperation and competition. Army
forces conduct shaping activities as part of a joint team and a larger whole-of-government effort to assure
friends, build partners, and to prevent, deter, or turn back adversary escalation. |