FM
stringclasses
43 values
page
int64
1
477
text
stringlengths
6
8.45k
3-13.4
69
Deception Evaluation Checklist * Did the enemy’s intelligence estimate of friendly capabilities warrant the use of deception with the expected expenditure of personnel and equipment? * Was there adequate time for the enemy to observe the deception and react in a desired manner? * What were the results of deception activities? * Were intelligence means and indicators established to measure enemy reaction to the friendly unit’s deception?
3-13.4
71
Source Notes This division lists the source by page number. 1-8 Examples given in paragraphs 1-42 through 1-60 originated in the Central Intelligence Agency, Office of Research and Development, Deception Maxims: Fact and Folklore (Washington D.C.: Government Printing Office, 1980), 9–40.
3-13.4
73
Glossary The glossary lists acronyms and terms with Army or joint definitions. The proponent publication for terms is listed in parentheses after the definition. The term for which FM 3-13.4 is the proponent is marked with an asterisk (*). SECTION I – ACRONYMS AND ABBREVIATIONS ADP Army doctrine publication ATP Army techniques publication CCMD combatant command CJCSI Chairman of the Joint Chiefs of Staff instruction COA course of action DA Department of the Army DISO deception in support of operations security DOD Department of Defense DODD Department of Defense directive DODI Department of Defense instruction DODM Department of Defense manual DWG deception working group FIE foreign intelligence entity FM field manual G-2 assistant chief of staff, intelligence G-3 assistant chief of staff, operations G-5 assistant chief of staff, plans IO information operations IRC information-related capability J-2 intelligence directorate of a joint staff JP joint publication MDO military deception officer MILDEC military deception MISO military information support operations MOE measure of effectiveness MOP measure of performance OPLAN operation plan OPORD operation order OPSEC operations security RFI request for information S-2 battalion or brigade intelligence staff officer
3-13.4
74
Glossary TAC-D tactical deception U.S. United States SECTION II – TERMS competing observable Within military deception, any observable that contradicts the deception story, casts doubt on, or diminishes the impact of one or more required or supporting observables. (JP 3-13.4) conduits Within military deception, information or intelligence gateways to the deception target, such as foreign intelligence entities, intelligence collection platforms, open-source intelligence, and foreign and domestic news media. (JP 3-13.4) counterdeception Efforts to negate, neutralize, diminish the effects of, or gain advantage from a foreign deception operation. (JP 3-13.4) deception event A deception means executed at a specific time and location in support of a deception operation. (JP 3-13.4) deception goal Commander’s statement of the purpose of military deception as it contributes to the successful accomplishment of the assigned mission. (JP 3-13.4) deception means Methods, resources, and techniques that can be used to convey information to the deception target. (JP 3-13.4) deception objective The desired result of a deception operation expressed in terms of what the adversary is to do or not to do at the critical time and/or location. (JP 3-13.4) deception story A scenario that outlines the friendly actions that will be portrayed to cause the deception target to adopt the desired perception. (JP 3-13.4) deception target The adversary decision maker with the authority to make the decision that will achieve the deception objective. (JP 3-13.4) decoy An imitation in any sense of a person, object, or phenomenon that is intended to deceive enemy surveillance devices or mislead enemy evaluation. (JP 3-13.4) demonstration In military deception, a show of force similar to a feint without actual contact with the adversary, in an area where a decision is not sought that is made to deceive an adversary. (JP 3-13.4) desired perception In military deception, what the deception target must believe for it to make the decision that will achieve the deception objective. (JP 3-13.4) display In military deception, a static portrayal of an activity, force, or equipment intended to deceive the adversary’s visual observation. (JP 3-13.4)
3-13.4
75
Glossary diversion The act of drawing the attention and forces of an enemy from the point of the principal operation; an attack, alarm, or feint that diverts attention. (JP 3-03) electronic warfare Military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or to attack the enemy. (JP 3-13.1) feint In military deception, an offensive action involving contact with the adversary conducted for the purpose of deceiving the adversary as to the location and/or time of the actual main offensive action. (JP 3-13.4) human factors The physical, cultural, psychological, and behavioral attributes of an individual or group that influence perceptions, understanding, and interactions. (JP 2-0) indicator In operations security usage, data derived from friendly detectable actions and open-source information that an adversary can interpret and piece together to reach conclusions or estimates of friendly intentions, capabilities, or activities. (JP 3-13.3) information environment The aggregate of individuals, organizations, and systems that collect, process, disseminate, or act on information. (JP 3-13) information-related capability A tool, technique, or activity employed within a dimension of the information environment that can be used to create effects and operationally desirable conditions. (JP 3-13) link A behavioral, physical, or functional relationship between nodes. (JP 3-0) military deception Actions executed to deliberately mislead adversary military, paramilitary, or violent extremist organization decision makers, thereby causing the adversary to take specific actions (or inactions) that will contribute to the accomplishment of the friendly mission. (JP 3-13.4) military information support operations Planned operations to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and individuals in a manner favorable to the originator’s objectives. (JP 3-13.2) node An element of a system that represents a person, place, or physical thing. (JP 3-0) observable In military deception, the detectable result of the combination of an indicator within an adversary’s conduit intended to cause action or inaction by the deception target. (JP 3-13.4) operations security vulnerability A condition in which friendly actions provide operations security indicators that may be obtained and accurately evaluated by an adversary in time to provide a basis for effective adversary decision making. (JP 3-13.3) ruse In military deception, an action designed to deceive the adversary, usually involving the deliberate exposure of false information to the adversary’s intelligence collection system. (JP 3-13.4)
3-13.4
76
Glossary *tactical deception An activity planned and executed by, and in support of, tactical-level commanders to cause enemy decision makers to take actions or inactions prejudicial to themselves and favorable to the achievement of tactical commanders’ objectives.
3-13.4
77
References All Websites were verified on 14 February 2019. REQUIRED PUBLICATIONS Readers require these publications for fundamental concepts, terms, and definitions. DOD Dictionary of Military and Associated Terms. January 2019. ADP 1-02. Terms and Military Symbols. 14 August 2018. RELATED PUBLICATIONS These publications are referenced in this publication. JOINT PUBLICATIONS CJCS issuances are available at https://www.jcs.mil/Library/. DOD issuances are available at https://www.dtic.mil/whs/directives/. Joint publications are available at https://jdeis.js.mil/jdeis/generic.jsp. CJCSI 3211.01. Joint Policy for Military Deception (U). 14 May 2015. (This classified publication is available on the SIPRNET. Contact the preparing agency of this publication for access instructions.) DODD 2311.01E. DoD Law of War Program. 09 May 2006. DODI 3604.01. Department of Defense Military Deception (U). 11 March 2013. (This classified publication is available on the SIPRNET. Contact the preparing agency of this publication for access instructions.) DODM 5200.01. DoD Information Security Program: Overview, Classification, and Declassification Volume 1. 24 February 2012. JP 2-0. Joint Intelligence. 22 October 2013. JP 3-0. Joint Operations. 17 January 2017. JP 3-03. Joint Interdiction. 09 September 2016. JP 3-13. Information Operations. 27 November 2012. JP 3-13.1. Electronic Warfare. 08 February 2012. JP 3-13.2. Military Information Support Operations. 21 November 2014. JP 3-13.3. Operations Security. 06 January 2016. JP 3-13.4. Military Deception. 14 February 2017. ARMY PUBLICATIONS Army doctrine and training publications are available at https://armypubs.army.mil/. ATP 3-37.34. Survivability Operations. 16 April 2018. ATP 3-53.1. Military Information in Special Operations. 23 April 2015. FM 3-12. Cyberspace and Electronic Warfare Operations. 11 April 2017. FM 6-0. Commander and Staff Organization and Operations. 05 May 2014. FM 27-10. The Law of Land Warfare. 18 July 1956.
3-13.4
78
References OTHER SOURCES Geneva Convention and Hague Regulation (Article 23) at https://www.icrc.org/eng/assets/files/publications/icrc-002-0173.pdf. Central Intelligence Agency, Office of Research and Development. Deception Maxims: Fact and Folklore. Washington DC: Government Printing Office, 1980. Department of Defense Law of War Manual. 12 June 2015 at https://apps.dtic.mil/dtic/tr/fulltext/u2/1014128.pdf. PRESCRIBED FORMS This section contains no entries. REFERENCED FORMS Unless otherwise indicated, DA forms are available on the Army Publishing Directorate Website: https://armypubs.army.mil/. DA Form 2028. Recommended Changes to Publications and Blank Forms. RECOMMENDED READINGS Armstrong, LTC Richard N. Soviet Operational Deception: The Red Cloak. Fort Leavenworth, Kansas: Combat Studies Institute, U.S. Army Command and General Staff College, 1989. Axelrod, Robert. “The Rational Timing of Surprise.” World Politics, vol. 31, no. 2 (1979): 228–246. Bittman, Ladislav. Deception Game, Czechoslovakian Intelligence in Soviet Political Warfare. Syracuse, New York: Syracuse University Research Corporation, 1972. Brown, Anthony Cave. Bodyguard of Lies. New York: HarperCollins, 1975. Cruickshank, Charles. Deception in World War II. New York: Oxford University Press, 1979. Daniel, Donald C. and Katherine L. Herbig, editors. Strategic Military Deception. New York: Pergamon Press, 1982. Dewar, Michael. The Art of Deception in War. New York: David & Charles, 1989. Dunnigan, James F. and Albert A. Nofi. Victory and Deceit; Dirty Tricks at War. New York: Morrow, 1996. Fisher, David. The War Magician. New York: Coward-McCann, 1983. Gawne, Jonathan. Ghosts of the ETO. Havertown, Pennsylvania: Casemate Publishers, 2002. Gerard, Philip. Secret Soldiers: The Story of World War II’s Heroic Army of Deception. New York: Dutton, 2002. Gerwehr, Scott and Russell Glenn. The Art of Darkness: Deception and Urban Operations. Santa Monica, California: Rand, 2000. Glantz, David M. Soviet Military Deception in the Second World War. Totowa, New Jersey: Frank Cass, 1989. Godson, Roy and James J. Wirtz. Strategic Denial and Deception: The Twenty-First Century Challenge. New Brunswick, New Jersey: Transaction Publishers, 2002. Handel, Michael, editor. Strategic and Operational Deception in the Second World War. Totowa, New Jersey: Frank Cass, 1989. Handel, Michael, editor. War, Strategy and Intelligence. Totowa, New Jersey: Frank Cass, 1989. Hartcup, Guy. Camouflage: A History of Concealment and Deception in War. New York: Scribner’s, 1980. Haswell, Jock. D-Day: Intelligence and Deception. New York: Times Books, 1979. Haswell, Jock. The Tangled Web: The Art of Tactical and Strategic Deception. Wendover: John Goodchild Publishers, 1984.
3-13.4
79
References Hesketh, Roger. Fortitude: The D-Day Deception Campaign. Woodstock, New York: Overlook Press, 2002. Holt, Thaddeus. The Deceivers: Allied Military Deception in the Second World War. New York: Scribner, 2004. Howard, Sir Michael. British Intelligence in the Second World War: Strategic Deception. Vol. 5. New York: Cambridge University Press, 1989. Huber, Dr. Thomas M. Pastel: Deception in the Invasion of Japan. Fort Leavenworth, Kansas: Combat Studies Institute, U.S. Army Command and General Staff College, 1988. Jones, R. V. The Wizard War: British Scientific Intelligence, 1939-1945. New York: Coward, McCann, & Geoghegan, 1972. Lloyd, Mark. The Art of Military Deception. London: L. Cooper, 1997. Macintyre, Ben. Operation Mincemeat: How a Dead Man and a Bizarre Plan Fooled the Nazis and Assured an Allied Victory. New York: Harmony Books, 2010. Mahl, Thomas. Desperate Deception: British Covert Operations in the United States, 1939-44. Washington D.C.: Brassey’s Inc., 1998. Masterman, J. C. The Double-Cross System in the War of 1939 to 1945. New Haven: Yale University Press, 1972. Montagu, Ewen. The Man Who Never Was. Philadelphia: J.B. Lippincott Company, 1954. Mure, David. Master of Deception: Tangled Webs in London and the Middle East. London: William Kimber, 1980. Mure, David. Practice to Deceive. London: William Kimber, 1977. Reit, Seymour. Masquerade: The Amazing Camouflage Deceptions of World War II. New York: Hawthorn Books, 1978. Sun Tzu. The Art of War. New York: Oxford University Press, 1971. The 1991 Intelligence Authorization Act. Whaley, Barton. Codeword BARBAROSSA. Cambridge, Massachusetts: MIT Press, 1973. Whaley, Barton. Practise to Deceive: Learning Curves of Military Deception Planners. Annapolis, Maryland: Naval Institute Press, 2016. Whaley, Barton. Stratagem: Deception and Surprise in War. Boston: Artech House, 2007.
3-13.4
81
Index Entries are by paragraph number. collection, 1-21, 2-119, 3-13 considerations by, 1-72 A coordinating, 1-77 decisions by, 2-12, A-4 access, maintaining, 3-16 saving, 1-55 guidance from, 2-5, 2-124 multinational partners, 2-125 information for, 4-15 assumptions, making, 2-78 protecting, 2-23 informing, 3-15 planning, 2-19 actions, cause, 1-24 validating, 3-22 responsibilities, 1-71–1-72, 3-16 activities. See also deception B support to, 1-73, 3-27 activities. baseline analysis, 2-2 team and, 3-12 coordinating, 2-106, 2-121 termination plan, 2-71, 3-30 deception execution, 3-5–3-16 behavior, influencing, 2-15 understanding, A-2 MILDEC, 1-5 patterns of, 1-46, 1-53, 4-12 monitoring, 1-19, 2-103, 3-23, understanding, 2-37, 2-39 commander’s intent, guidance 4-4 beliefs, changing, 1-42 from, 1-4, 1-28 reverse planning, 2-27 credibility of, 1-33, 1-49–1-50 mission analysis and, 2-5 support from, 1-4 communication, 2-116, 3-12 believable, deception story, 1-19, administrative means, 1-66 1-31, 1-60, 2-24, 2-62 competing observable, defined, ambiguity-decreasing deception, information, 1-69, 2-55 1-20 1-33, 2-47 bias, types of, 2-39 complex conduit, 2-46 ambiguity-increasing deception, briefing, COA, 2-29 concealment, 1-67 1-31–1-32, 2-47, 2-116 mission analysis, 2-17 OPSEC and, 2-67, 2-98, 2-100 analysis. See also conduit running estimate, 2-21 conditions, changing, 1-26, 2-19, analysis, mission analysis. 2-78, 3-6–3-9, 3-15 baseline, 2-2 C establish, 1-2, 1-4 emulative, 2-38 camouflage, 1-67 suitability, 2-12, 2-53, 2-128, information environment, 2-15 capabilities, 1-2, 1-67, 2-62, 3-4, 3-23, 3-29 intelligence, 2-50–2-52, 2-78– 2-117, 2-120, A-6, A-9 conduit analysis, 1-15, 2-42 2-79, 2-84, A-5 deception, 1-39, 1-55 conducting, 2-42–2-48 OPSEC, 2-109 military, 1-11, 2-88 terms, 2-44 analysis plan, developing, 4-8 understanding, 2-49–2-52, conduits, complex, 2-46 2-54 appendix 14, B-1–B-2 defined, 1-13 producing, 2-75 caution, reactions and, 1-60 exploiting, 2-48 template, B-2 civil-military operations, 2-122 identifying, 2-43, 2-46 approval, deception plan, 2-76 COA, briefing, 2-29 information, 2-86 manipulating, 1-48 approval authority, deception plan, providing, 1-31, 2-30, A-5 risk and, 2-45 3-19 support to, 2-28 selecting, 2-47 assessment. See also risk COA development, planning, 2-9, simple, 2-46 assessment. 2-28 verifiable, 2-60 DWG, 1-80 cognitive, bias, 2-37, 2-39 considerations, analyzing, 2-13, feedback, 1-58, 3-14 process, 2-25, 2-26 2-41, 2-72, B-1 final, 4-10 state, 4-12 commanders, 1-72 intelligence, 2-79 vulnerabilities, 2-53 legal, 2-89–2-96 responsibilities, 4-1–4-5 collaboration, benefits, 2-108 MDO, 2-1, 2-3, 2-10, 2-11, termination, 3-30 cyberspace operations, 1-78, 2-12, 2-41, 2-45, 2-66, 4-1 assessment plan, 4-6–4-10 2-118 planners, 1-60, 2-9, 2-45, 4-5 deception event, 4-3 commander, approval from, 2-21, consistency, deception story, 2-63 developing, 4-6–4-10 2-76, 3-27 feedback types, 4-7 brief to, 2-21 assets, availability, 2-10 compromising by, A-6
3-13.4
82
Index Entries are by paragraph number. control, centralized, 1-26 running estimate, 2-16–2-21 deception plan, adjusting, 3-1, criteria, 3-26 support from, 2-6 3-6–3-9 execution, 3-25 support to, 2-10 approving, 2-76 controlling planner, execution, synchronizing, 2-64 assess, 4-5 3-18, 3-20–3-21 unlawful, 2-91–2-95 authority, 3-19 responsibilities, 3-24 viable, 2-9 benefits from, 2-101 construction, 2-30 support from, 3-27 deception activities, 2-91, 2-121 coordination with, 3-13 coordination, 2-106, 3-10 developing, 1-4, 1-7, 1-70, 2-3, cyberspace operations, 2-119 civil-military operations, 2-122 2-120 enemy, A-2 deception event schedule, enemy, A-1, A-4 executing, 3-4, 3-17–3-27 4-14 sequencing, 1-57 identifying enemy’s, A-3 deception plan, 3-2 deception assets, husbanding, implementation, 3-20 electronic warfare, 2-116 1-55–1-56 intelligence production from, intelligence staff, A-3 deception event, 2-13, 2-65, 2-72, 2-80 MDO, 1-76, 2-111, 3-2, 3-10, 3-18, 4-3 protection of, 3-16 4-14, A-3 assessment plan, 4-3 quality, 2-83, 3-22 multinational, 2-125 defined, 1-17, 2-64 requirements of, 2-79 planning, 1-60, 2-23 deception event schedule, 2-70, risk, 2-128 requirements, 1-71, 1-75, 3-12 support from, 2-22 2-89–2-90, 2-123–2-125 completing, 2-75, 2-78, 3-20 support to, 4-16 counterdeception, defined, A-1 considerations, 2-66 deception planning, creating, 2-28 planning, A-1–A-2 developing, 2-64–2-66, 2-70, feedback and, 2-68 course of action. See COA. 4-14 guidance, 2-3–2-6 credibility, 2-45 sequencing, 2-66 methodology, 2-24–2-26 MISO, 2-114 support from, 2-66 security, 2-23 criteria, feedback, 2-68–2-70 deception execution, activities, steps of process, 2-27–2-75 termination, 2-71 3-5–3-16 support to, 2-77–2-88 cultural, bias, 2-39 deception goal, alternatives, 2-18 deception story, compromised, approval, 2-21 3-14 cyberspace electromagnetic defined, 1-9 confirming, 2-47 activities, 1-78 determine, 2-3–2-5, 2-31–2-32 conveying, 2-64 cyberspace operations, 2-118– output, 2-8 defined, 1-22 2-119 planning, 2-27 developing, 2-58–2-59 effective, 2-59 deception in support of operations D supporting, 2-107 security. See DISO. data, 1-14, 2-77 time for, 2-13 collecting and treating, 4-9 deception means, 1-61–1-68, deception target, 2-33–2-54 collection plan, 4-8 2-64, 2-65 analyzing, 2-42–2-48 categories of, 1-61 deception, assessment of, 4-1 defined, 1-11 defined, 1-61 categories, 1-4–1-7 identifying, 2-33 developing, 2-56–2-57 challenge, 4-2 information, 2-85 perceptions and, 2-57 characteristics of, 1-51 perceptions of, 2-55 confirming enemy’s, A-4 deception objective, 2-8, 2-55, understanding, 2-11 detecting enemy’s, A-3 2-58, 4-1 versus MISO target, 2-112 see-think-do, 2-26 defined, 1-10 deception task, completing, 2-111 employment of, 1-61 determine, 2-32 exposing, A-7 identifying, 1-73, 2-4 deception working group. See focus, 2-25 planning, 2-27 DWG. guidance for, 1-23 running estimate and, 2-18 decision making, enemy, 2-49 integrating, 2-99 deception observable, developing, influencing, 2-39 MOP and, 4-13 2-56–2-57, 2-112 decision-making process, 2-87 movement, 3-18 deception operations, constraints, decision-making structure, 2-35 OPSEC, 2-97–2-109, 3-10– 2-92, 2-93 3-11 decision-making style, 2-36 controlling, 3-25–3-27 personnel, A-3 information collection, 2-82 decoy, defined, 1-68 planning process, 2-22–2-75 monitoring, 3-22–3-24 demonstration, 2-114, 2-116 principles, 1-23–1-29 status, 3-15 defined, 1-37 restrictions to, 2-89 synchronizing, 3-24 results, 4-16 terminating, 3-28–3-30
3-13.4
83
Index Entries are by paragraph number. desired perception, 1-22, 2-55, deception story, 2-61 processing, 1-44 2-58, 2-65 exploitation, 1-33, 2-48, 2-98 protecting, 2-104 defined, 1-12 enemy deception, A-5–A-8 restricting, 2-124 DISO, 1-7 information collection, 3-13, 4-3 assessment of, 4-1 F managing, 2-82 feedback, assessment plan, 4-7 display, 2-114, 2-116 information environment, defined, criteria, 2-68–2-70 defined, 1-39 2-15 developing, 2-68–2-70 diversion, defined, 1-35 information operations, MDO and, importance of, 1-58–1-59 doctrine, enemy, 2-54 monitoring, 3-21 1-77 do-think-see, deception, 2-26 results of, 2-70 information operations officer, use of, 3-14 responsibilities, 1-75 DWG. See also working group. data, 4-9 feint, defined, 1-36 information quality, 1-69–1-70 deception goal, 2-31 filter, 1-15, 2-46 information-related capability. See recommendations from, 4-10 IRC. flags, deception and, 2-94 responsibilities, 1-80 integration, deception and, 1-29, focus, deception plan and, 1-24, 1-64 E 4-16 intelligence, enemy, 2-49–2-52 electromagnetic deception, 1-65 foreign intelligence entity, friendly, 2-88 types, 2-117 analyzing, 2-51 requirements, 2-84–2-88 support to, 1-7 electronic warfare, 2-115–2-117 validity, 1-49 defined, 2-115 functions, military deception, 1-3 intelligence collection, 1-38, 3-13 support from, 2-116 G intelligence estimate, deception emulative analysis, conducting, G-2, evaluating by, C-2 story and, 2-58 2-38 perceptions and, 2-50 intelligence process, enemy, 2-52 enemy. See also target. responsibility, 1-73 analyzing, 2-51, 2-54 intelligence requirements, 2-81 assessing threat, 2-108 G-3, evaluating by, C-1 refining, 2-84 responsibilities, 1-74 capabilities, A-1 intelligence staff, 3-13 cognitive state, 4-12 G-5, responsibilities, 1-79, 1-80, MDO, 4-15 deception plan, A-3 2-3 intelligence support, deception decision making, 2-25, 2-35– goal, enemy, 2-37 planning, 2-77–2-88 2-36 feedback and, 2-69 managing, 2-82 goals, 2-37 guidance, 1-23, 2-30, 2-31, 2-124 requiring, 2-79 identifying, 2-20 intelligence, 2-49–2-52 deception planning, 1-9, 2-3– IRC, 2-90, 2-99 knowledge of, 2-11 2-6, 2-21 defined, 2-110 misleading, 1-8 integrating, 1-75, 2-111–2-122 H perspective, 2-59 human factors, analyzing, 2-37– J see-think-do, 2-25 understanding, 2-49–2-52 2-41 Jones’ dilemma, 1-48 defining, 2-37 vulnerabilities, 2-53 K human information processing, enemy deception, confirming, A-4, limitations to, 1-44–1-45 knowledge, 3-9, A-2 A-5 providing, 2-52 countering, A-5–A-9 I restricting, 1-27, 2-124 exploiting, A-5–A-9 illusions, creating, 1-32 estimate. See also running L indicator, critical, 2-103 estimate. law of war, adhering to, 2-91 defined, 1-14 deception, 1-9, 2-18 threats from, 2-101 legal, considerations, 2-89–2-96 technical, 2-51 information, accessing, 2-88 leverage the truth, 1-53 evaluation, G-2, C-2 analyzing, 2-103 link, defined, 1-16 G-3, C-1 conduit, 2-86 risks, 2-126 location, 2-116 critical, 2-103 deception planning, 1-31, 1-67, event schedule, adjusting, 3-21 deception target, 2-85 validation, 3-20 decision-making process, 2-87 2-23, 2-65 execution, 3-4–3-16 delivering, 2-47 M challenges to, 3-25 enemy considerations, 2-11 Magruder’s principle, 1-42–1-43 deception plan, 3-4, 3-27 manipulating, 2-49
3-13.4
84
Index Entries are by paragraph number. material, 1-49, 1-64 using, 1-58, 3-14, 4-2 revised, 3-19 terminating, 2-71–2-74 maxims, deception, 1-41–1-60 monitoring activities, feedback, validating, 3-9 MDO. See also planners. 3-14 types, 3-23 planners. See also MDO. analyzing, 2-81, 2-104 activity, 1-19 assessment plan, 4-6 MOP, collection steps, 4-13 analyzing by, 2-38 assistance from, 1-72 developing, 4-11–4-16 considerations by, 1-60, 2-9, considerations by, 2-1, 2-3, using, 4-1 2-45, 4-5 2-10, 2-11, 2-12, 2-41, 2-45, 2-66, 4-1 N deception plan, 2-22 coordinating, 2-97, 3-2 node, 1-16, 2-43 integrating, 2-99 evaluation, 2-14 defined, 1-15 OPSEC, 2-105 preparation and, 3-1 information operations and, 1-77 O responsibilities, 2-34, 2-35 intelligence staff, 4-15 objective, conflict with, 1-26 planning, assumptions, 2-19 intelligence support, 2-78 deception plan and, 1-25 centralized, 1-26 mission analysis and, 2-7 enemy, 2-37 effort, 2-9 responsibilities, 1-76–1-77, observable, building, 2-65 military deception, 1-1–1-2 1-79, 2-1, 2-24, 2-30, 2-55, defined, 1-18 reverse, 2-27 2-56, 2-73, 2-85, 2-89, risk, 2-126 operation order. See OPORD. 2-123, 3-6–3-9, 3-26, 3-30, suitability, 2-12 4-1, 4-4, 4-8, 4-14 operation plan. See OPLAN. termination, 2-72 means. See deception means. operations, coordinating, 1-77 time, 2-13 measure of effectiveness. See operations security. See OPSEC. planning horizon, 2-9 MOE. OPLAN, 2-22, 3-2, B-2 planning process, deception, measure of performance. See input to, B-1 2-102 MOP. support to, 2-22 deception plan in, 4-5 nesting, 2-22 message, 2-113–2-114 OPORD, 1-80, 2-75, 2-76, B-2 OPSEC, 2-102 input to, B-1 methodology, 2-43, 2-46, 2-87, tactical, 2-22–2-75 A-4 OPSEC, 1-67 preconception, 2-40 deception planning, 2-24–2-26 deception, 2-97–2-109, 2-115 see-think-do, 2-24, 4-11 developing, 2-67 preparation, 2-18, 2-67, 3-1–3-3 DISO and, 1-7 preplanning, 2-1–2-22 military deception, 1-5 integrating, 1-1, 2-99 considerations, 2-1 defined, 1-1 planners, 2-105 functions of, 1-3 protection, cyberspace operations, planning and, 1-57, 3-3 legal support to, 2-96 2-118 purpose, 2-98 planning, 1-1–1-2 electronic warfare, 2-115 synchronizing, 3-11 terms, 1-8–1-22 measures, 2-67 types of, 1-30–1-33 OPSEC analysis, using, 2-109 public affairs, deception and, versus tactical deception, 1-6 OPSEC plan, deception and, 2-121 military deception officer. See 3-10–3-11 MDO. organizational, bias, 2-39 R reactions, unwanted, 1-60 military information support P–Q operations. See MISO. recommendations, DWG and, patterns, enemy and, 1-21 4-10 minimize falsehood, 1-54 of behavior, 1-53, 4-12 reporting channels, 4-14 MISO, 2-112–2-114 perceptions, believable, 2-62 credibility, 2-114 resources, enemy, 2-54 controlling, 2-106 defined, 2-112 OPSEC, 2-108 creating, 2-50, 2-65 message, 2-113 use of, 1-74 identifying, 2-55 mission, 4-2, 4-4 interpretations of, 4-11 restrictions, legal, 2-89 suitability, 2-12 measuring, 4-2 risk, conduits and, 2-45 time for, 2-13 personal, bias, 2-39 deception and, 1-55 mission analysis, planners, 2-4, deficiencies, 2-77 perspective, target, 1-9, 2-59– 2-33 planning, 2-14 2-63 planning, 2-7–2-22 reducing, 2-100 running estimate for, 2-16 physical means, 1-62 risk assessment, 2-126–1-128 MOE, developing, 4-11–4-16 plan, adjusting, 4-15 developing, 2-128 focusing, 4-12 implementing, 3-17 refining, 2-127
3-13.4
85
Index Entries are by paragraph number. running estimate, deception, surprise, forms of, 1-46–1-47 terms, military deception, 1-8– 2-16–2-21 sustainment, 3-10–3-13 1-22 preparing, 2-18 synchronization, 3-10–3-11, 3-24 time, deception story, 2-13 refining, 2-19 conduits and, 2-46 mission, 2-13 results, 2-17, 2-20 internal deception and, 3-12 OPSEC and, 2-108 support from, 2-31–2-32 OPSEC plan, 3-10–3-11 transmission, 2-44 ruse, defined, 1-38 timing and, 1-28 timing, planning and, 1-28 electronic warfare, 2-116 tools, information management, legitimate, 2-95 T B-1 ruse of war, 2-92 tactical deception, defined, 1-6 transition, 3-18 planning process, 2-22–2-75 S versus military deception, 1-6 transmission time, 2-44 security, deception and, 1-27 tactics, deception and, 1-34–1-39 truth, leverage of, 1-53 maintaining, 3-16 target. See also enemy. U see-think-do, 4-11 analyzing, 2-34, 2-41, 2-53 enemy, 2-25 update, 3-15 decision maker, 2-70 MDO, 2-24 team, commander and, 3-12 V sequencing rule, 1-57 technical means, 1-63–1-65 validity, intelligence, 1-49 signatures, physical means, 1-62 techniques, application of, 1-40 verifiable, sources, 2-60 simple conduit, 2-46 termination, actions of, 3-29 vulnerabilities, analyzing, 2-53 space operations, 2-120 criteria, 2-71 exploiting, 2-100 staff. See also G-2, G-3, G-5. deception plan, 3-28 intelligence, 3-13 evolving, 2-73 W–X–Y–Z responsibilities, 1-71–1-80, preparation of, 3-28 working group. See also DWG. 3-17, A-4 scenarios, 2-74 analysis by, A-4 functions, A-5 suitability, mission, 2-12 termination plan, completing, 2-75 supporting observable, 1-19 developing, 2-71–2-74
3-13.4
87
FM 3-13.4 26 February (cid:21)(cid:19)(cid:20)(cid:27)(cid:3) (cid:37)(cid:92)(cid:3)(cid:50)(cid:85)(cid:71)(cid:72)(cid:85)(cid:3)(cid:82)(cid:73)(cid:3)(cid:87)(cid:75)(cid:72)(cid:3)(cid:54)(cid:72)(cid:70)(cid:85)(cid:72)(cid:87)(cid:68)(cid:85)(cid:92)(cid:3)(cid:82)(cid:73)(cid:3)(cid:87)(cid:75)(cid:72)(cid:3)(cid:36)(cid:85)(cid:80)(cid:92)(cid:29)(cid:3) MARK A. MILLEY (cid:42)(cid:72)(cid:81)(cid:72)(cid:85)(cid:68)(cid:79)(cid:15)(cid:3)(cid:56)(cid:81)(cid:76)(cid:87)(cid:72)(cid:71)(cid:3)(cid:54)(cid:87)(cid:68)(cid:87)(cid:72)(cid:86)(cid:3)(cid:36)(cid:85)(cid:80)(cid:92)(cid:3) (cid:38)(cid:75)(cid:76)(cid:72)(cid:73)(cid:3)(cid:82)(cid:73)(cid:3)(cid:54)(cid:87)(cid:68)(cid:73)(cid:73)(cid:3) (cid:50)(cid:73)(cid:73)(cid:76)(cid:70)(cid:76)(cid:68)(cid:79)(cid:29)(cid:3) KATHLEEN S. MILLER Administrative Assistant to the Secretary of the Army 1905601 DISTRIBUTION: Active Army, Army National Guard, and United States Army Reserve: (cid:55)(cid:82)(cid:3) (cid:69)(cid:72)(cid:3) (cid:71)istributed in
6-02
1
FM 6-02 SIGNAL SUPPORT TO OPERATIONS SEPTEMBER 2019 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. This publication supersedes FM 6-02, dated 22 January 2014.
6-02
2
This publication is available at the Army Publishing Directorate site (https://armypubs.army.mil/) and the Central Army Registry site
6-02
3
*FM 6-02 Field Manual Headquarters No. 6-02 Department of the Army Washington, D.C., 13 September 2019 Signal Support to Operations Contents Page PREFACE..................................................................................................................... v INTRODUCTION ........................................................................................................ vii Chapter 1 OVERVIEW OF SIGNAL SUPPORT ........................................................................ 1-1 Section I – The Operational Environment ............................................................. 1-1 Challenges for Army Signal Support ......................................................................... 1-1 Operational Environment Overview ........................................................................... 1-1 Information Environment ........................................................................................... 1-2 Trends ........................................................................................................................ 1-3 Threat Effects on Signal Support .............................................................................. 1-8 Section II – Fundamental Principles of Signal Support ..................................... 1-13 Operational Focus ................................................................................................... 1-13 Interoperability ......................................................................................................... 1-14 Agility ....................................................................................................................... 1-14 Trusted Systems ...................................................................................................... 1-15 Shared Networks ..................................................................................................... 1-16 Network Situational Awareness ............................................................................... 1-16 Objectives of Signal Support ................................................................................... 1-17 Core Competencies of the Signal Corps ................................................................. 1-17 Section III – Signal in Army Operations .............................................................. 1-18 Support to Joint Operations ..................................................................................... 1-18 Army Strategic Roles ............................................................................................... 1-18 The Army Operational Concept ............................................................................... 1-19 Support to Command and Control ........................................................................... 1-20 Support to Other Warfighting Functions .................................................................. 1-21 Multinational Interoperability .................................................................................... 1-21 Strategic and Operational Reach ............................................................................ 1-22 Chapter 2 SIGNAL SUPPORT BY ARMY ECHELON, CORE COMPETENCIES, TRAINING, AND THE ARMY NETWORK ................................................................................... 2-1 Section I – Signal Support by Echelon .................................................................. 2-1 Corps and Below Organizations With Organic Signal Assets ................................... 2-1 Units Without Organic Signal Assets ....................................................................... 2-11 Types of Signal Units Leveraged for Support .......................................................... 2-14 Requesting Signal Support ...................................................................................... 2-17 Support to Other Army Operations .......................................................................... 2-17 Signal-Enabling Commands and Staffs ................................................................... 2-26 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. *This publication supersedes FM 6-02, dated 22 January 2014.
6-02
4
Contents Section II – Core Competencies and Essential Capability of the Signal Corps ...................................................................................................................... 2-31 Department of Defense Information Network Operations ....................................... 2-31 Network Transport and Information Services ......................................................... 2-34 Spectrum Management Operations ........................................................................ 2-36 Visual Information and Combat Camera ................................................................. 2-36 Communications Security ....................................................................................... 2-38 Section III – Signal Training ................................................................................. 2-39 Individual Signal Training ........................................................................................ 2-39 Collective Signal Training in Units .......................................................................... 2-40 Signal Digital Master Gunner Course ..................................................................... 2-41 Section IV – The Army Network ........................................................................... 2-41 Department of Defense Information Network ......................................................... 2-41 Department of Defense Information Network-Army ................................................ 2-46 Chapter 3 SIGNAL SUPPORT TO OPERATIONS TO SHAPE AND PREVENT ..................... 3-1 Section I – Operations to Shape ............................................................................ 3-1 Overview of Army Operations to Shape.................................................................... 3-1 Signal Operations Assessments ............................................................................... 3-3 Risks to Signal Support ............................................................................................. 3-3 Signal Support ........................................................................................................... 3-4 Additional Shaping Activities ..................................................................................... 3-6 Consolidating Gains .................................................................................................. 3-8 Section II – Operations to Prevent ........................................................................ 3-8 Overview of Army Operations to Prevent ................................................................. 3-8 Risks to Signal Support ............................................................................................. 3-8 Signal Support ........................................................................................................... 3-9 Consolidating Gains ................................................................................................ 3-11 Chapter 4 LARGE-SCALE COMBAT OPERATIONS .............................................................. 4-1 Section I – Signal Support to Large-Scale Combat Operations ......................... 4-1 Overview of Large-Scale Combat Operations .......................................................... 4-1 Risks to Signal Support ............................................................................................. 4-1 Signal Support ........................................................................................................... 4-2 Section II – Large-Scale Defensive Operations ................................................... 4-4 Overview of Large-Scale Defensive Operations ....................................................... 4-4 Signal Support ........................................................................................................... 4-4 Risks to Signal Support ............................................................................................. 4-6 Section III – Large-Scale Offensive Operations ................................................... 4-6 Overview of Large Scale Offensive Operations ........................................................ 4-6 Signal Support ........................................................................................................... 4-6 Risks to Signal Support ............................................................................................. 4-8 Consolidation of Gains .............................................................................................. 4-8 Chapter 5 OPERATIONS TO CONSOLIDATE GAINS ............................................................ 5-1 Overview of Operations to Consolidate Gains .......................................................... 5-1 Signal Support ........................................................................................................... 5-1 Risks to Signal Support ............................................................................................. 5-2 Appendix A OPERATING IN A CONTESTED ENVIRONMENT ................................................. A-1 Appendix B SIGNAL PLANNING ................................................................................................. B-1 Appendix C VISUAL INFORMATION .......................................................................................... C-1 Appendix D SIGNAL SYSTEMS MAINTENANCE ....................................................................... D-1
6-02
5
Contents Appendix E REQUESTS FOR SIGNAL SUPPORT ..................................................................... E-1 SOURCE NOTES ................................................................................ Source Notes-1 GLOSSARY ................................................................................................ Glossary-1 REFERENCES ........................................................................................ References-1 INDEX ................................................................................................................ Index-1 Figures Introductory figure-1. Command and control logic map .................................................................. viii Introductory figure-2. The command and control system .................................................................. ix Figure 2-1. Department of Defense information network operations technical channels at corps and below .................................................................................................................... 2-3 Figure 2-2. Department of Defense information network operations components, effects, and objectives .................................................................................................................. 2-34 Figure 2-3. Department of Defense information network-Army operational view ........................ 2-51 Figure 3-1. Shaping activities within an environment of cooperation and competition .................. 3-2 Figure B-1. Operation plan or order paragraph 5 .........................................................................B-13 Figure B-2. Operation plan or order annex H (Signal) .................................................................B-14 Figure B-3. Parallel sequences of the military decision-making process and troop leading procedures. ...............................................................................................................B-21 Figure C-1. Combat camera support request format .................................................................... C-2 Figure E-1. Request for forces process ......................................................................................... E-3 Tables Introductory table-1. Modified Army terms ........................................................................................ x Table A-1. Common jamming signals ............................................................................................ A-6 Table B-1. Example primary, alternate, contingency, and emergency communications plan by warfighting function ..................................................................................................... B-3 Table B-2. The military decision-making process, step 1: receipt of mission ................................ B-4 Table B-3. The military decision-making process, step 2: mission analysis .................................. B-6 Table B-4. The military decision-making process, step 3: course of action development ............. B-8 Table B-5. The military decision-making process, step 4: course of action analysis ..................... B-9 Table B-6. The military decision-making process, step 5: course of action comparison .............B-10 Table B-7. The military decision-making process, step 6: course of action approval ..................B-11 Table B-8. The military decision-making process, step 7: orders production, dissemination, and transition ...................................................................................................................B-12 Table D-1. Alignment of units to type of maintenance performed ................................................. D-1
6-02
7
Preface FM 6-02 is the highest-level signal doctrine manual. It describes how signal Soldiers support Army forces as they shape operational environments, prevent conflict, conduct large-scale combat operations, and consolidate gains against a peer threat in joint operations. In order to understand this publication, readers must be familiar with Army capstone doctrine (ADP 1 and ADP 3-0), ADP 5-0, ADP 6-0, and FM 3-0. FM 6-02 supports foundational Army doctrine and establishes context for signal-specific Army techniques publications. FM 6-02 is applicable to all members of the Army Profession—leaders, Soldiers, and Army civilians. The principal audience for FM 6-02 is Army commanders, leaders, staffs, and signal Soldiers. Commanders and staffs of Army headquarters serving as a joint task force or multinational headquarters also use applicable joint or multinational doctrine for command and control of joint or multinational forces. Trainers and educators throughout the Army also use this publication. Commanders, staffs, and subordinates ensure their decisions and actions comply with applicable U.S., international, and in some cases, host-nation laws and regulations. Commanders at all levels ensure their Soldiers operate according to the law of war and the rules of engagement (see FM 6-27). They also adhere to the Army Ethic as described in ADP 1. FM 6-02 uses joint terms where applicable. Selected joint and Army terms and definitions appear in both the glossary and the text. Terms for which FM 6-02 is the proponent publication (the authority) are marked with an asterisk (*) in the glossary. Definitions for which FM 6-02 is the proponent publication are boldfaced in the text. For other definitions shown in the text, the term is italicized and the number of the proponent publication follows the definition. FM 6-02 applies to the Active Army, Army National Guard/Army National Guard of the United States, and the United States Army Reserve, unless otherwise stated. The proponent for FM 6-02 is the United States Army Cyber Center of Excellence. The preparing agency is the Doctrine Division, United States Army Cyber Center of Excellence. Send comments and recommendations on a DA Form 2028 (Recommended Changes to Publications and Blank Forms) to Commander, United States Army Cyber Center of Excellence and Fort Gordon, ATTN: ATZH-OP (FM 6-02), 506 Chamberlain Avenue, Fort Gordon, GA 30905-5735; by e-mail to usarmy.gordon.cyber- [email protected].
6-02
9
Introduction Command and control is fundamental to joint and Army operations. Command and control is the exercise of authority and direction by a properly designated commander over assigned and attached forces in the accomplishment of a mission (JP 1). The Army’s approach to command and control in unified land operations is mission command. Mission command is the Army’s approach to command and control that empowers subordinate decision making and decentralized execution appropriate to the situation (ADP 6-0). Mission command guides commanders, staffs, and subordinates in their approach to operations. The command and control warfighting function enables commanders and staffs of theater armies, corps, divisions, and brigade combat teams to synchronize and integrate combat power across multiple domains and the information environment. Commanders cannot exercise command and control alone. Commanders exercise command and control through the command and control warfighting function. The command and control warfighting function is the related tasks and a system that enable commanders to synchronize and converge all elements of combat power (ADP 6-0). See introductory figure-1 on page viii.
6-02
10
Introduction Introductory figure-1. Command and control logic map A command and control system is the arrangement of people, processes, networks, and command posts that enable commanders to conduct operations (ADP 6-0). The command and control system enables the commander and staff to execute the command and control warfighting function. Signal forces provide the
6-02
11
Introduction network, information systems, and information management processes that enable command and control. Signal soldiers implementing the network and information systems and performing their staff tasks enable secure communications and situational awareness throughout their operational area. This enables the commander’s exercise of command and control in support of unified land operations. See introductory figure-2. Introductory figure-2. The command and control system By providing the network and conducting information management tasks to support the knowledge management process in the command and control system, signal formations and staff elements enable secure communications and situational awareness throughout their areas of operations. Information management processes enable knowledge management and allow commanders to control their formations and synchronize efforts across warfighting functions while conducting unified land operations. The Army’s network enables every mission, from training the force to executing tactical tasks to influence the operational environment in large-scale combat operations. The network is the part of the command and control system that provides infrastructure for voice, data, and video connectivity to support operations. The network disseminates the common operational picture and enables unified action partner integration. With modern tactical radio systems able to pass digital information, the network extends as low as the individual Soldier on the battlefield. FM 6-02 outlines signal doctrine in five chapters with supporting appendixes to address tactics and procedures for signal support to Army operations. The techniques to accomplish the signal missions, functions, and tasks in this field manual appear in signal-specific Army techniques publications. This revision to FM 6-02 adopts new doctrinal terms, force structure, and tactics implemented since the most recent update. This manual supersedes FM 6-02, dated 22 January 2014. FM 6-02 chapters include— Chapter 1 section I discusses the operational environment, information environment, and threat as they relate to signal support. Section II introduces the fundamental principles of successful signal support to joint and Army operations and the core competencies of the Signal Corps. Section III discusses the role of signal forces in Army operations. Chapter 2 section I discusses signal support to Army operations by echelon—corps and below units with organic signal capabilities; units without organic signal capabilities; echelons above corps signal units that provide support; and signal support to other Army operations. Section II details the core competencies and essential capability of the Signal Corps. Section III discusses individual and collective signal training. Section IV discusses the joint and Army networks that enable command and control across the range of military operations. Chapter 3 section I discusses signal support to Army operations to shape. Section II discusses signal support to Army operations to prevent. Chapter 4 section I provides an overview of signal support to large-scale combat operations. Section II discusses signal support to large-scale defensive operations. Section III discusses signal support to large- scale offensive operations. Chapter 5 discusses signal support to Army operations to consolidate gains. Appendix A discusses tactics and procedures for operations in a contested environment. It outlines the procedures when communications systems and networks come under enemy electronic or cyberspace attack.
6-02
12
Introduction Appendix B discusses the role of the signal staff in the military decision-making process. It outlines the process and considerations for planning and coordinating Department of Defense information network operations, network transport and information services, spectrum management, and communications security. Appendix C provides procedures for requesting visual information and combat camera support. Appendix D discusses signal systems maintenance. It outlines two-level communications-electronics maintenance, the roles and responsibilities for maintenance management in units, and the external organizations that provide sustainment maintenance support. Appendix E provides procedures for identifying support requirements and requesting signal support from non-organic assets. Based on current doctrinal changes, certain terms for which FM 6-02 is the proponent have been modified for purposes of this publication. The glossary contains acronyms and defined terms. See introductory table- 1 for specific term changes. Introductory table-1. Modified Army terms Term Remarks network transport Modified definition Pro Patria Vigilans! (Watchful for the Country) Signal Corps Motto
6-02
13
Chapter 1 Overview of Signal Support Signal personnel and units at all echelons provide and secure the network for their commanders to conduct command and control and integrate the other warfighting functions across the range of military operations. This chapter describes the operational environment, the fundamental principles and core competencies of signal support, and the role of signal forces in support of Army operations. SECTION I – THE OPERATIONAL ENVIRONMENT 1-1. Threats to U.S. interests throughout the world are countered by the ability of U.S. forces to respond to a wide variety of challenges along a competition continuum that spans from cooperation to war. U.S. forces conduct a range of military operations to respond to these challenges. 1-2. Signal forces provide communications services that can quickly transition from fixed garrison infrastructure to deployed tactical systems to support Army commanders and units as they execute their assigned missions. The fixed infrastructure on posts, camps, and stations; mobile single-channel radio networks; and deployed communications sites combine to provide commanders the communications and information technology capabilities they need, at the right time and location, across the conflict continuum. CHALLENGES FOR ARMY SIGNAL SUPPORT 1-3. The experiences of the U.S. Army in Afghanistan and Iraq in the early 21st century are not representative of the most dangerous conflicts the Army will face in the future. While the Army conducted combat operations in both locations, for the most part it focused its efforts on counterinsurgency operations and stability tasks (FM 3-0). In the future, large-scale combat operations against a peer threat will present much more demanding operational tempo and greater lethality. 1-4. Army forces participate in operations as part of a joint and multinational force. These operations serve a higher political purpose, and they should be planned and executed at each echelon to support that purpose (FM 3-0). Signal planners must include unified action partner interoperability in signal support plans to enable collaboration and synchronization with joint, interorganizational, and multinational mission partners. 1-5. Expeditionary forces must be ready to deploy on short notice to austere locations and immediately conduct combat operations. Commanders sequence their deployment so the arriving forces can defend themselves until follow-on forces arrive in the operational area. The earliest arriving forces have limited communications and network capabilities until their organic signal capabilities arrive and establish the network. OPERATIONAL ENVIRONMENT OVERVIEW 1-6. Factors that affect operations extend far beyond the boundaries of a commander’s assigned area of operations. Commanders and their staffs seek to develop and maintain an understanding of their operational environment. An operational environment is a composite of the conditions, circumstances, and influences that affect the employment of capabilities and bear on the decisions of the commander (JP 3-0). An operational environment encompasses physical areas of the air, land, maritime, and space domains, as well as the information environment, which includes cyberspace, the electromagnetic spectrum, and other factors. Threat, friendly, and neutral actors can all affect conditions in the information environment and, by extension, the operational environment. Because cyberspace and the electromagnetic spectrum span all physical domains and geographic areas, some of these effects may originate outside the area of operations.
6-02
14
Chapter 1 Commanders face new challenges in defending capabilities in cyberspace where boundaries are far less identifiable. Attacks in cyberspace can originate from, and route through, friendly, neutral, and adversary countries. 1-7. As commanders operate across the range of military operations, signal capabilities must be tailorable to meet the commander’s requirements. The way signal formations deliver communications services varies based on the mission. Communications requirements during theater security cooperation activities from fixed posts, camps, or stations differ from a brigade combat team commander’s requirements during a movement to contact mission in large-scale combat operations. Signal staff officers and leaders need to clearly articulate to commanders what communications capabilities are available during critical points of an operation and how these capabilities support the exercise of command and control. 1-8. Understanding the operational environment is essential for signal leaders, engineers, planners, system operators, and cybersecurity professionals to plan and execute effective signal support. Signal Soldiers must understand signal flow from the end user, through the local area network, through the wide-area network, and the Department of Defense information network-Army (DODIN-A). The Department of Defense information network-Army is an Army-operated enclave of the Department of Defense information network that encompasses all Army information capabilities that collect, process, store, display, disseminate, and protect information worldwide (ATP 6-02.71). As an example, planners should understand how severe weather in Guam may affect satellite communications networks in Korea, or a cyberspace incident in the continental United States can quickly traverse the network and affect communications in an operational theater. INFORMATION ENVIRONMENT “There is no better example of the challenge ahead than that of the information environment. From moving supplies in the wake of a hurricane disaster to ordering troops to the Pacific, or addressing the ever-changing cyber[space] threat, the global dependence on information and networks in everyday activities demands our attention now.” —General Martin E. Dempsey, former Chairman of the Joint Chiefs of Staff 1-9. Across the globe, information is increasingly available in near-real time. The DODIN-A provides the ability to access this information from anywhere, and at any time. Access to information enables decision making, leadership, and combat power. It is also key to seize, gain, and retain the initiative and to consolidate gains in the operational environment. 1-10. U.S. forces seek to dominate the information environment to maintain information advantage. The information environment is the aggregate of individuals, organizations, and systems that collect, process, disseminate, or act on information (JP 3-13). In modern conflict, controlling the information environment is as important as controlling key terrain in the physical domains. The information environment is not separate or distinct from the operational environment, but an integral part of it. Any activity that takes place in the information environment affects one or more of the warfighting domains. 1-11. Cyberspace and the electromagnetic spectrum are parts of the information environment. Cyberspace is a global domain within the information environment consisting of the interdependent networks of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers (JP 3-12). Friendly, enemy, adversary, and host-nation networks, communications systems, computers, cellular phone systems, social media, and communications infrastructure are all parts of cyberspace. 1-12. The electromagnetic spectrum is the range of frequencies of electromagnetic radiation from zero to infinity. It is divided into 26 alphabetically designated bands (JP 3-13.1). The electromagnetic spectrum crosses all domains and provides the vital link between space and cyberspace domains. Cyberspace and the electromagnetic spectrum have become increasingly congested and contested, even as their importance to successful operations has increased. Army forces must be able to effectively operate in cyberspace and the electromagnetic spectrum while controlling the ability of enemies and adversaries to operate. 1-13. Signal Soldiers install, operate, and secure the DODIN-A in locations where both friendly and enemy cyberspace operations occur. Given the high risk to the network, signal operators and information system
6-02
15
Overview of Signal Support users must continuously manage risk and secure their portions of the DODIN-A. Signal planners and DODIN operations personnel assess security risk during network design, mitigate risk in software employment, and continuously monitor for signs of malicious activity within the network. Individual users must maintain cybersecurity awareness and learn to identify signs of malicious activity. While cybersecurity efforts cannot prevent every intrusion, commanders and their staffs must take steps to identify, prioritize, and secure their most important networks and data. 1-14. Unlike the air, land, maritime, and space domains, cyberspace has no range constraints. A threat actor can disrupt, destroy, or intercept the flow of information while operating from the other side of the world. For example, in 2014, North Korea allegedly conducted cyberspace attacks against the California headquarters of Sony Pictures in retaliation for releasing a movie that insulted North Korean leaders. A peer threat or other adversary could recruit hackers around the world to attack Army capabilities within an area of operations, or all the way back to the strategic support area in the United States. TRENDS 1-15. Proliferating technologies will continue to present challenges for the joint force. The widespread availability of inexpensive communications devices allows threat actors to greatly increase their command and control capabilities. Adversaries take advantage of the low entry cost to achieve offensive cyberspace capabilities. Cyberspace attacks are a low-cost means for state and non-state threat actors to attack civilian, military, and governmental targets. Cyberspace attacks can extend an enemy’s reach. Enemies will use cyberspace attacks to counter the Army’s dominance on the battlefield. Enemy forces no longer need to develop costly aircraft, naval, or missile systems to cause significant damage to infrastructure, command and control nodes, or logistic capabilities. 1-16. As technology continues to advance, so does the Army’s reliance on the DODIN-A. Every aspect of Army operations relies on networked communications, from individual Soldiers, to logistics, precision fires, and command and control. In 2002, maneuver units’ manning and equipment authorizations provided networked communications capabilities to echelons brigade and above, with limited satellite communications assets pooled at the division and corps. A typical 20–30 vehicle convoy included only three or four single- channel radios. 1-17. By 2005, satellite-based networked communications became available as low as battalion level. Nearly every vehicle now has a radio and some form of networked friendly force tracking capability. The increase in communications capabilities enables greater dispersion of forces and allows smaller forces to operate across a larger battlespace. The increased capabilities enable faster flow of information between commands, better flow of intelligence, just in time logistics, and enhanced situational understanding. 1-18. Over-reliance on technology creates significant vulnerabilities. Command and control nodes have always been key targets for enemy attack. An enemy can attack command and control nodes with lethal fires, cyberspace attack, or electronic attack. Army units have come to rely on uninterrupted, high-speed digital communications and satellite positioning, navigation, and timing. Units must be able to operate without these capabilities. 1-19. Soldiers need the skills to navigate with a map and compass to operate when capabilities are degraded or denied. Staffs need to maintain paper maps and overlays in command posts to maintain situational awareness of their area of operations if mission command information systems become disrupted or unavailable. A primary, alternate, contingency, and emergency (PACE) communications plan provides redundant communications means if the primary capability is unavailable. Disciplined initiative according to the commander’s intent allows units to continue operations in the absence of reliable communications. 1-20. Peer threats have advanced capabilities to locate the electronic signature of communications systems. The cyber electronic warfare officer can help formulate communications and electronic protection plans to minimize the electronic signature of command posts and signal sites. Commanders should consider locating communications transmitters and antennas remotely from major command posts to protect the headquarters in case an enemy targets communications systems with lethal fires. Command posts and communications systems must frequently displace during large-scale combat operations against a peer threat.
6-02
16
Chapter 1 Note. Locating a signal site remotely creates additional force protection and physical security requirements to secure and defend the remote site. MULTI-DOMAIN EXTENDED BATTLEFIELD 1-21. Army forces both depend upon and enable the joint force across the air, land, maritime, space, and cyberspace domains. All Army operations are multi-domain operations and all battles are multi-domain battles. Conventional Army multi-domain operations include airborne and air assault operations, air and missile defense, cross-domain fires, aviation, electronic warfare (EW), cyberspace operations, military deception, information operations, military information support operations, information collection, and riverine operations. Since joint or multinational partners may provide some of these capabilities, Army commanders and staffs plan, coordinate, and integrate joint and other unified action partner capabilities in their multi-domain approach to operations. Large-scale combat operations require synchronization and convergence of capabilities and effects across multiple disciplines and domains. 1-22. Army forces may conduct operations across multiple domains to gain freedom of action for other members of the joint force. The air, land, maritime, space, and cyberspace domains, and their effects on the information environment are closely interrelated. Their complex relationships require a cross-domain understanding of the operational environment. Signal leaders must understand the available communications capabilities and interoperability challenges of communications support in each domain. A thorough understanding helps identify opportunities for the command to coordinate with unified action partners and converge effects when operating throughout the multi-domain battlefield. 1-23. Signal support is a key enabler for multi-domain battle. Signal units have effectively integrated communications capabilities across the air, land, maritime, space, and cyberspace domains for decades. The DODIN-A and the services it extends enable collaboration and synchronization across domains and among unified action partners. SIGNAL DEPENDENCE ON SPACE-BASED CAPABILITIES 1-24. Signal support depends on access to space capabilities. Nearly all advanced countries and their military forces rely heavily on space-based capabilities in the areas of— * Communications. * Positioning, navigation, and timing. * Detection and monitoring. 1-25. Peer threats will likely attempt to jam or destroy space-based capabilities as a means of disrupting U.S. operations. Disruption of positioning, navigation, and timing negatively impacts network synchronization, friendly force tracking, precision munitions, unmanned aircraft systems, and ground movements. Destroying or jamming satellite communications could reduce Army commanders’ ability to exercise command and control beyond line of sight or in rugged or urban terrain. Exercising disciplined initiative with clear commander’s intent, along with robust terrestrial-based communications capabilities, mitigates the disruption of space-based communications. 1-26. U.S. space capabilities include— * Information collection. * Early warning. * Environmental monitoring. * Satellite communications. * Positioning, navigation, and timing. 1-27. Satellite communications enable beyond line of sight communications without terrain restrictions. Satellite-based positioning, navigation, and timing provides an accurate, universal source for system timing and location.
6-02
17
Overview of Signal Support 1-28. Space-based capabilities enable signal units to establish communications networks, navigate, and synchronize network systems. To most effectively employ space-based capabilities, signal Soldiers must understand the capabilities and how to coordinate access. Spectrum managers and signal planners at brigade and higher echelons assist units in planning, integrating, and coordinating access to satellite communications capabilities. Refer to FM 3-14 more information on Army space operations. 1-29. The proliferation of advanced technology provides more widespread access to space-enabled capabilities. Most potential adversaries have access to space-enabled technologies or the ability to degrade U.S. space capabilities. Commanders and signal leaders cannot assume they will retain unrestrained access to space-based capabilities. Units must prepare and train to conduct operations with degraded or disrupted capabilities. 1-30. Signal planners must understand the limitations of satellite communications systems. Communications links using multiple satellites and earth terminals introduce latency problems that interfere with Internet protocol routing. Signal operators and planners must understand satellite latency and its effects on the network. Applications that do not tolerate satellite latency, such as voice and video services, suffer degradation. Planners must design network plans to minimize latency. CONGESTED ENVIRONMENT 1-31. Today, all joint force operations depend on assured electromagnetic spectrum access throughout the operational environment (JP 6-0). All forces and supporting agencies depend on the electromagnetic spectrum for communications, information collection, and EW capabilities in support of operations in the air, land, maritime, space, and cyberspace domains. Signal systems rely on the electromagnetic spectrum for network transport. For this reason, gaining and maintaining access to the electromagnetic spectrum is critical for signal support to joint and Army operations. 1-32. Within the electromagnetic spectrum, joint forces contend with civil agencies, commercial entities, allied forces, and adversaries for use of a common electromagnetic spectrum resource (ATP 6-02.70). Competition for the finite available bandwidth results in a congested electromagnetic spectrum, especially when operating in developed nations. 1-33. The proliferation of transmitting devices throughout an operational environment intensifies competition for bandwidth in the electromagnetic spectrum, complicates unified action partner interoperability, and increases the complexity of friendly networks. The vast number and variety of radio frequency transmitting devices in military and civilian use compounds the competition for electromagnetic spectrum access among the Army, the joint force, and the civilian population. At the same time, widespread use of commercial communications devices allows adversaries to mask their communications transmissions among the many other transmitters. 1-34. Signal staffs plan communications and network capabilities to support all anticipated requirements in their operational area. However, in a congested electromagnetic operational environment, there might not be adequate satellite bandwidth and spectrum availability to support all missions. Signal leaders must be able to clearly articulate the limitations and expected level of degradation, so commanders can make appropriate risk decisions and align the available capabilities with their priorities. CONTESTED ENVIRONMENT 1-35. Enemies and adversaries may deliberately attempt to deny friendly use of the electromagnetic spectrum, space, cyberspace, and/or terrestrial systems. Due to heavy joint reliance on advanced communications systems, such an attack may be a central element of any enemy or adversary antiaccess and area denial strategy, requiring a higher degree of protection for friendly command and control systems and planning for operations in a denied or degraded environment (JP 6-0). 1-36. Threat cyberspace and EW capabilities jeopardize U.S. freedom of action in cyberspace and the electromagnetic spectrum. Because communications are a key command and control enabler, U.S. military communications and information networks present high-value targets. Peer threats and other adversaries understand the extent of U.S. forces’ reliance on communications and automated information systems.
6-02
18
Chapter 1 Enemies and adversaries are likely to contest the information environment across the conflict continuum to deny operational access and diminish the effectiveness of U.S. and allied forces. 1-37. An enemy can use radio frequency direction finding equipment to locate any radio frequency emitter, such as a radio, satellite communications terminal, counter-improvised explosive device system, radar, or cell phone. Once they determine an accurate location, enemy forces can direct lethal or non-lethal fires to destroy, degrade, or compromise the capability. 1-38. Combining signal and electronic protection techniques with current intelligence estimates may mitigate an enemy’s ability to find and attack key communications nodes or command posts. The assistant chief of staff, intelligence (G-2) or battalion or brigade intelligence staff officer (S-2) section can better define an enemy’s electronic technical data. The cyber electronic warfare officer’s knowledge of threat EW capabilities and techniques helps inform a communications plan to limit the enemy’s effectiveness. Units can camouflage their operational use of the spectrum within the spectral noise of an urban area or mask communications transmissions using terrain or antenna placement. Refer to Army doctrine for EW and ATP 6-02.53 for more information about communications masking and antenna placement. 1-39. Synchronizing signal support with cyberspace, EW, intelligence, space, and other information-related capabilities is key to achieving and maintaining freedom of action in contested cyberspace and the electromagnetic spectrum while denying the same to adversaries. Synchronization is the arrangement of military actions in time, space, and purpose to produce maximum relative combat power at a decisive place and time (JP 2-0). Synchronization provides the ability to execute multiple related and mutually supporting tasks in different locations at the same time, producing greater effects than executing each in isolation. Synchronization of capabilities across multiple domains and warfighting functions maximizes their complementary effects in and through cyberspace and the electromagnetic spectrum. 1-40. Changes in the operational variables (political, military, economic, social, information, infrastructure, physical environment, and time) or mission variables (mission, enemy, terrain and weather, troops and support available, time available, and civil considerations) could change communications requirements beyond the capabilities of assigned and attached signal elements. Because DODIN operations authorities align to the operational chain of command, commanders can allocate the available communications and network support to their highest mission priorities until additional capabilities are available. Refer to FM 6-0 for a complete discussion of the operational and mission variables. Degraded Environment 1-41. The cyberspace and space domains grow in importance as global competitors, regional competitors, and non-state actors invest in capabilities to protect their access and disrupt or deny access to others. Although Army forces have grown accustomed to communicating freely without fear of jamming or interception, U.S. enemies and adversaries are likely to use technological advances in cyberspace and vulnerabilities in the electromagnetic spectrum to conduct cyberspace or electromagnetic spectrum attacks (FM 3-0). 1-42. A broad array of threat actors will challenge the joint force’s freedom of action in space, cyberspace, and the electromagnetic spectrum. For example, an enemy that jams positioning, navigation, and timing satellites may render precision fires inaccurate. Army commanders must protect their own systems and disrupt the enemy’s ability to operate while being prepared to operate with degraded communications and reduced access to cyberspace and space capabilities. 1-43. While enemy action might cause a degraded environment, degraded capabilities may also occur because of insufficient resources to support all communications requirements. For example, inadequate communications satellite capacity in an operational area cause congestion and network latency. Jamming or unintentional electromagnetic interference may also cause degradation. The architecture of the tactical network implements redundant communications means to improve reliability in a degraded environment. 1-44. In a hostile EW environment where satellite links are denied or degraded, Army forces at echelons corps through brigade retain the ability to communicate through protected satellite communications. Units at echelons battalion and below rely on line of sight communications and other terrestrial means to overcome satellite denial or degradation. Ground and aerial retransmission links can extend the communications range, but are still vulnerable to direction finding and jamming. Refer to ATP 6-02.54 for more information about protected satellite communications.
6-02
19
Overview of Signal Support 1-45. Careful operational planning can minimize disrupted operations in a degraded environment. The commander’s priority of effort includes priorities of service. Continuity of operations plans, PACE plans, and disciplined initiative under the mission command approach can mitigate the effects of degraded communications capabilities. The information and knowledge management plans should include priorities for knowledge management in a degraded environment. Denied Environment 1-46. Enemies and adversaries may adopt an antiaccess and area denial strategy against U.S. forces. An enemy or adversary with the ability to field layered and fully integrated antiaccess and area denial capabilities may try to deny U.S. access to an operational area altogether. Operations relying on the DODIN, and operations of the DODIN itself, must continue even in times of crisis. The DODIN architecture supports continued operations in a denied environment. 1-47. Continuity of operations plans, disaster recovery plans, and distributed DODIN operations reduce the adverse effects of isolated network disruptions. Network failures should be transparent to end users. Continuing operations rely on systems and capabilities that automatically and immediately transfer to alternate means, to minimize interruptions to connectivity. Denied access in an isolated area or operational theater does not affect the continued overall operation of the DODIN outside the contested area. See appendix A for more information about operations in a contested environment. Continuity of Operations Planning 1-48. Army units must develop, train, and implement techniques across all warfighting functions to ensure continuity of operations and enable an accurate common operational picture when communications become degraded. These methods include— * Anticipating and recognizing degraded and denied communications so operators can quickly employ countermeasures. * Adjusting the dispersion of units. * Graphic control measures. * Bandwidth management. * Adjusting operational tempo. * Centralizing or decentralizing key communications capabilities, as required. * Employing redundant communications, targeting, and collection assets. * Implementing procedures to transfer critical data and information, both manually and verbally. * Retaining the ability to perform critical command and control and other warfighting function tasks manually. * Establishing push, versus pull, reporting procedures in case normal reporting is hindered. * Planning locations and capacity for data storage. * Scheduling regular backups of operational data. * Establishing and rehearsing procedures for emergency restoration. 1-49. U.S. forces’ increased reliance on reachback information and network capabilities creates vulnerabilities to attack from various sources. Employment of the mission command philosophy is essential to overcome the fog and friction that a decentralized, disaggregated, and degraded communications environment adds to the battlefield when other defensive countermeasures fail (FM 3-0). The assistant chief of staff, signal (G-6) or battalion or brigade signal staff officer (S-6) supports the assistant chief of staff, operations (G-3) and battalion or brigade operations staff officer (S-3) continuity of operations plans by planning a robust communications network with redundant means of transport and developing PACE plans during the military decision-making process. Primary, Alternate, Contingency, and Emergency Plan 1-50. Commanders must be able to communicate with adjacent units, supporting joint forces, and host-nation and multinational forces in addition to their subordinates. Successful commanders understand that networks may be degraded through threat or environmental factors during operations. They develop methods and
6-02
20
Chapter 1 measures to mitigate the impact of degraded networks (ADP 6-0). A PACE plan provides predictability and redundancy for communications in congested or contested environments. Redundant communications systems and methods enable communications throughout the corps and division areas of operations in contested environments. A viable, effective PACE plan may be the most valuable contribution of a G-6 (S- 6)in the planning process. 1-51. A PACE plan is a key requirement for operations in a contested environment. Leaders need to be able to command their formations when communication networks are disrupted, while on the move, and without perfect situational awareness (FM 3-0). Continuous mission command requires adequate, but not necessarily continuous, network connectivity. PACE plans provide prioritized options for redundant means of communication to ensure effective command and control and interoperability: * Primary—the best, and intended, method of communications. * Alternate—another common, but perhaps less optimal method. * Contingency—method may not be as fast, convenient, or reliable, but it can still accomplish the task. * Emergency—communications method of last resort. Emergency methods may cause delays or otherwise affect operations. 1-52. Most units establish two PACE plans—one for communications to higher headquarters and one for subordinate units. The higher headquarters usually establishes the PACE plan for communications between echelons. Units should validate the PACE plan during mission rehearsals to ensure each means of communication is viable and to establish triggers for execution. Viable PACE plans are critical to support command and control in a degraded or denied environment. For a PACE plan to be viable, each method of communication must be feasible, suitable, acceptable, distinguishable, and complete. If a subordinate unit does not have the required equipment or is untrained in employing a system, that system should not be part of the PACE plan. See appendix B for more information about PACE planning. THREAT EFFECTS ON SIGNAL SUPPORT 1-53. A threat is any combination of actors, entities, or forces that have the capability and intent to harm United States forces, United States national interests, or the homeland (ADP 3-0). Threats can be categorized as adversaries, enemies, or insiders. An adversary is a party acknowledged as potentially hostile to a friendly party and against which the use of force may be envisaged (JP 3-0). An enemy is a party identified as hostile against which the use of force is authorized (ADP 3-0). Insider threats present unique challenges because they are trusted individuals with access to Army capabilities and sensitive operational information. The primary threat context in FM 6-02 is peer threats in large-scale combat operations. See paragraph 1-90 for more information about insider threats. PEER THREAT 1-54. A peer threat is an adversary or enemy with capabilities and capacity to oppose U.S. forces across multiple domains world-wide or in a specific region where they enjoy a position of relative advantage. Peer threats possess roughly equal combat power in geographical proximity to a conflict area with U.S. forces. Peer threats generate tactical, operational, and strategic challenges that are an order of magnitude more challenging militarily than those the U.S. Army has faced since the end of the Cold War (FM 3-0). Peer threats employ their resources across multiple domains to exploit U.S. vulnerabilities. They use their capabilities to create lethal and nonlethal effects across the operational environment. Peer threat tactics include preclusion, isolation, sanctuary, and systems warfare. 1-55. Peer threats have demonstrated advanced capabilities in long-range precision fires, integrated air defense, and EW. These threat capabilities demand changes to signal tactics, techniques, and procedures to counter the risks they present. Command and control nodes must displace frequently during large-scale combat operations to avoid destruction by enemy fires. 1-56. Peer threats consider U.S. communications, command and control nodes, massed formations, and critical infrastructure key targets during large-scale combat operations. Commanders should ensure as much dispersion of their formations as tactically prudent. Locating radio frequency emitters, such as satellite
6-02
21
Overview of Signal Support communications antennas and line of sight radio systems away from major command posts minimizes loss of life and command and control capabilities if the enemy targets the communications systems with lethal fires. Preclusion 1-57. Peer threats use a wide variety of capabilities to preclude a friendly force’s ability to shape the operational environment and mass and sustain combat power. Antiaccess and area denial are two such activities. (FM 3-0). Regional peers will use their relative advantages in a geographic area to attempt to prevent U.S. forces from gaining operational access. 1-58. Peer threats will use cyberspace attacks and EW as part of their antiaccess and area denial strategy. Overcoming enemy antiaccess and area denial requires a forcible entry operation. Signal support to forcible entry operations (see paragraph 1-185) allows the joint force commander to synchronize maneuver and effects across multiple domains to gain a foothold from which to conduct land operations in the joint operations area. Refer to JP 3-18 for doctrine on joint forcible entry operations. Isolation 1-59. Isolation is containment of a force so it cannot accomplish its mission. Peer threats believe that the defeat of the U.S. forces lies not at the end of a substantial battle, but through the culmination of U.S. efforts before U.S. goals are reached. In large-scale combat operations, peer threats will seek to isolate U.S. tactical forces and prevent their mutual support while threat forces work toward their campaign objectives. Some examples of how isolation may affect signal support are— * Preventing or limiting communications with other units. * Deceiving friendly forces as a means to gain access to the U.S. network. * Targeting command and control nodes with lethal fires. * Conducting denial of service attacks against the U.S. network. * Electronic attack (jamming) to prevent U.S. and allied use of the electromagnetic spectrum. * Denying satellite access through jamming or destruction of satellite communications capabilities. 1-60. The tactical network provides redundant means of network transport to prevent formations from becoming isolated. PACE communications plans and disciplined initiative within the commander’s intent further mitigate the effects of isolation. Sanctuary 1-61. Sanctuary is a threat method of putting threat forces beyond the reach of friendly forces. It is a form of protection derived by some combination of political, legal, and physical boundaries that restrict freedom of action by a friendly force commander. Peer threats will use any means necessary, including sanctuary, to protect key elements of their combat power from destruction, particularly by air and missile capabilities (FM 3-0). 1-62. Signal support enables information collection and disseminates the common operational picture, enabling commanders and their staffs to maintain situational understanding and support the targeting process throughout their area of operations. Comprehensive understanding of the threat force’s position and situation reduces the protection they seek to derive by operating from sanctuary. Systems Warfare 1-63. Peer threats view the battlefield, their own instruments of power, and an opponent’s instruments of power as a collection of complex, dynamic, and integrated systems composed of subsystems and components. Peer threats use systems warfare to identify specific critical capabilities for disruption or destruction in order to cause failure of a larger friendly system (FM 3-0). 1-64. An example of systems warfare that affects signal support is an enemy using radio frequency direction finding to locate a critical retransmission site. Once the enemy locates the retransmission site, they can confirm the location using unmanned aircraft systems and direct long-range precision fires from sanctuary to
6-02
22
Chapter 1 prevent counterattack. Targeting a critical retransmission asset has a more significant effect than destroying a typical single node in the network. Loss of the retransmission capability disrupts communications for many radios across a wide section of the area of operations. Refer to TC 7-100.2 for an in-depth discussion of systems warfare. HYBRID THREAT 1-65. A hybrid threat is the diverse and dynamic combination of regular forces, irregular forces, terrorists, or criminal elements acting in concert to achieve mutually benefitting effects (ADP 3-0). Some aspects of the hybrid threat, such as criminal or terrorist organizations, do not abide by the law of war. Hybrid threats seek to exploit asymmetric advantages over an adversary to avoid engaging in direct combat. 1-66. In many ways, hybrid threat is not a new way of fighting a war; it is simply a new way of framing the operational environment. The Colonials in the American Revolution employed a hybrid strategy with a mixture of regular Continental troops, state militias, irregular partisans, and supportive local populations, along with publishers and pamphleteers sympathetic to the revolutionary cause. What has changed is the tools available to threat actors and the ability of some of these tools to create far-reaching effects outside the operational area. Enemies may employ cyberspace attack and exploitation, battlefield jammers, and space- based capabilities, such as anti-satellite weapons, to disrupt U.S. communications; positioning, navigation, and timing; synchronization; and freedom of maneuver. A peer threat’s ability to combine regular and irregular forces, robust information warfare capabilities, long-range precision fires, and massed lethal fires with the capacity to contest or achieve air superiority presents a formidable challenge. 1-67. The hybrid threat understands that the most challenging environment for U.S. forces is one where conventional military operations occur in concert with irregular warfare. The hybrid threat concept is not simply making do with what is available, but deliberately taking advantage of all tools at hand to create a complex operational environment. 1-68. Hybrid threats employ a wide variety of military, paramilitary, insurgent, criminal, and information warfare capabilities in concert with a robust antiaccess and area denial strategy and long-range precision fires to support their strategic and tactical objectives. Each component of the hybrid threat brings additional capabilities to bear. Commanders should not underestimate the synergy of these capabilities. Operational environments are inherently complex due to the operational variables. The hybrid threat seeks to introduce additional complexity using an ever-shifting array of forces, technologies, and techniques. The hybrid threat may conduct a conventional military attack while simultaneously creating economic instability, fostering lack of trust in existing governance, attacking information networks, and conducting a propaganda campaign, perhaps while causing a humanitarian crisis. 1-69. Commanders facing a hybrid threat will have difficulty identifying and responding to specific challenges. If they faced them individually, U.S. forces could readily isolate and defeat each aspect of the hybrid threat. However, because hybrid threat actors integrate these capabilities across the operational area, they can continue to shift effort and emphasis to make all U.S. choices seem poor ones. Enemies can learn and adapt quickly, often unrestricted by rules or bureaucracy. The hybrid threat’s continually shifting efforts may cause haphazard and incomplete change, but such rapid adaptation is difficult to counter. Ultimately, success goes to those who can act, react, and adapt their tactics quickly and creatively. INFORMATION WARFARE 1-70. Information warfare refers to a threat’s use of information activities, such as cyberspace attack and EW, to gain an advantage in the information environment. The threat construct of information warfare merges the disciplines of EW, deception, lethal fires, information protection, perception management, and cyberspace operations into a mutually supporting, integrated capability. Threat information warfare consists of— * EW. Measures conducted to control or deny an enemy’s use of the electromagnetic spectrum, while ensuring its use by the hybrid threat. * Deception. Measures designed to mislead an enemy by manipulation, distortion, or falsification of information to induce the enemy to act in a manner prejudicial to their interests. * Physical destruction. Measures to destroy critical components of communications infrastructure.
6-02
23
Overview of Signal Support * Protection and security measures. Measures to protect the hybrid threat’s information infrastructure and to deny protected information to other actors. * Perception management. Information, misinformation, disinformation, and propaganda. * Information attack. Attacks against the information resident on or transiting communications and information systems, rather than the systems themselves. Information attacks focus exclusively on the manipulation or degradation of the information to affect the information environment. * Computer warfare. Measures ranging from unauthorized access (hacking) of information systems for intelligence collection purposes to the insertion of destructive viruses and deceptive information into enemy computer systems. 1-71. Because these elements share some of the same functions, means, and targets, the enemy or adversary can formulate and execute a single, integrated information warfare plan. Despite the name information warfare, adversaries continuously conduct these activities at every level of warfare across the competition continuum to set favorable conditions, protect their self-interests, and influence public opinion in an operational area. 1-72. Some threat information warfare capabilities, such as cyberspace attack and perception management, can reach far beyond the immediate operational area. An enemy or adversary may perform strategic information warfare activities to create effects globally, including attacks on critical U.S. infrastructure, military deception, and perception management campaigns to influence public support. Refer to FM 3-53 for more information about military deception and perception management. 1-73. An enemy or adversary may also undertake tactical actions to achieve information warfare objectives, rather than purely military ones. To some extent, managing, controlling, and disseminating information have always been critical to tactical success. This is especially true given the advances in information technology and U.S. reliance on network capabilities. 1-74. Adversaries recognize the advantages information warfare activities can provide their tactical commanders. Therefore, they strive to integrate information warfare planning and activities in all tactical missions and battles. Information warfare activities may degrade or deny U.S. communications and blur or manipulate the common operational picture. Information warfare may also help an enemy dictate the tempo of combat. By combining perception management, military deception, and EW, the enemy may be able to effectively slow or control the pace of battle. Traditional EW activities, such as jamming, also contribute to the tactical application of information warfare by challenging U.S. attempts to establish information advantage. Information advantage is the superior position or condition derived from the ability to securely access, share, and collaborate via trusted information while exploiting or denying an adversary’s ability to do the same. 1-75. Threat information warfare also supports tactical counterreconnaissance. Threat actors constantly seek to attack, degrade, or manipulate U.S. intelligence, surveillance, and reconnaissance capabilities. Each U.S. and allied target acquisition system and sensor is a potential target. 1-76. Because threat actors integrate their information warfare capabilities, a coordinated and synchronized response is essential. The countermeasures to defend against these capabilities are a combination of signal, cyberspace operations, electronic protection, space, and other information-related capabilities, along with intelligence and operations security support. Close collaboration between these elements ensures a more effective response. Refer to TC 7-100 for more information about hybrid threat and information warfare. THREAT ACTIVITIES IN CYBERSPACE 1-77. Threat actors can exploit system vulnerabilities and cause a loss of confidentiality, integrity, or availability of communications networks. Protecting the information on the Army network from internal and external threats is essential to maintaining freedom of action in cyberspace. 1-78. Threat actors include adversaries and enemies. The difference between them is that an adversary is potentially hostile, while an enemy is demonstrably hostile. This distinction is clear in the physical domains, but less so in cyberspace. An adversary may well take hostile actions against U.S. interests in cyberspace
6-02
24
Chapter 1 without becoming an enemy that U.S. forces might engage in the physical domains. For this discussion, threat actors encompass both adversaries and enemies. 1-79. DOD networks and information systems face continuous risk from a variety of threat actors. Every day, DOD networks come under attack by threat actors including— * Insider threats. * Foreign intelligence entities. * Military or political opponents. * Terrorist groups. * Non-state actors (criminal and activist organizations). 1-80. These threat actors use many methods to disrupt, degrade, destroy, exploit, alter, or otherwise adversely affect the Army’s use of cyberspace. Elements of the network reside across the physical domains, with different methods of communicating and varying levels of interconnectivity and isolation. Threat actors may seek to exploit any network node, communications link, or the data residing in or traversing the nodes and links. Connecting critical infrastructure to the network exposes it to the risk of cyberspace attack. 1-81. Cyberspace allows threat actors to operate anonymously or to obscure their identity and location. This allows threat actors to pose as friendly actors and deceive individuals into divulging sensitive information or circumventing security measures—likely without realizing they have done so—through social engineering or phishing. Threat actors can attack Army systems, networks, and information assets by manipulating unsecured systems. 1-82. The same gateways that facilitate information exchange and allow legitimate outside users to access the network present attack vectors threat actors attempt to exploit. Threat actors often use the same commercial networks as noncombatant civilian populations, complicating cyberspace attack attribution and response. Note. Social engineering uses techniques that rely on weakness in human nature rather than software. The goal is to deceive people into revealing passwords and other information that compromise the security of automated information systems and networks. 1-83. The broad range of threat actors in cyberspace increases the complexity in securing the Army network. The enduring nature of threat activities in cyberspace causes U.S. forces to expend considerable resources and effort securing DOD networks. Network-enabled operations are a force multiplier and a traditional strength of U.S. forces. However, network-enabled operations also create significant vulnerabilities. The extent to which U.S. forces rely on networked capabilities presents broad cyberspace and electromagnetic spectrum attack surfaces. 1-84. Failing to protect even one system can create a foothold into the network and place sensitive data, U.S. operations, and lives at risk. Even when cyberspace defenders discover and stop an attack, they might not be able to attribute it to a particular source. Following cybersecurity best practices, defending the network, and adhering to operations security guidelines help protect DOD networks and data. 1-85. Threat actors may undertake intelligence gathering within the Department of Defense information network (DODIN), either to support their operations or to counter U.S. operations. Exploitation reveals information resident on, or transiting through, a system. Threat intelligence activities can compromise sensitive operational information. 1-86. Trusted insiders with legitimate access to systems pose one of the most difficult threats to counter. Insiders are the most dangerous threat to operations security because they can readily access sensitive information. 1-87. A peer threat will systematically and continuously combine all available means to attack U.S. and allied network capabilities to create effects in the information environment. Peer threats will use deceptive tactics such as phishing attacks to gain access to Army networks for follow-on cyberspace operations.
6-02
25
Overview of Signal Support 1-88. Commanders must recognize the proliferation of threat cyberspace capabilities and their impact on operations. Threat activities in cyberspace can disrupt friendly information systems and degrade joint command and control. Threat operations in cyberspace are often less encumbered by treaty, law, and policy restrictions than those imposed on U.S. forces. This may allow enemies and adversaries an initial advantage in cyberspace. Signal support elements and staffs must maintain an effective cybersecurity program to secure the network against threat activities in cyberspace. INSIDER THREAT 1-89. Insider threats present a significant risk to military operations. An insider threat is a person with placement and access who intentionally causes loss or degradation of resources or capabilities or compromises the ability of an organization to accomplish its mission through espionage, providing support to international terrorism, or the unauthorized release or disclosure of information about the plans and intentions of U.S. military forces (AR 381-12). Insider threats are hostile actors who intentionally compromise national security through deliberate actions. Insider threat should not be confused with operations security or cybersecurity risks, where sensitive operational information may be accidentally compromised and place U.S. operations or personnel at risk. 1-90. An insider threat does not necessarily need to be a military member or government employee. Third party vendors, contractors, and partners could pose a threat as well. The insider threat is especially dangerous because insider activity is generally the hardest to identify. Downloading or printing files to remove from secure areas may appear to be ordinary day-to-day activities. Similar to enemy cyberspace attacks, a trusted insider can steal sensitive data to undermine partner relationships or manipulate public opinion. 1-91. Past cases of insider threats have demonstrated that coworkers, associates, friends, and supervisors of those engaging in espionage or terrorist activity commonly overlook potential threat indicators. If these indicators had been reported and investigated, they might have minimized the damage to national security or saved the lives of U.S. personnel. The knowledge, awareness, and participation of all Department of the Army personnel in threat awareness and reporting is essential to the success of the Army’s warfighting mission and in protecting the lives of Soldiers (AR 381-12). SECTION II – FUNDAMENTAL PRINCIPLES OF SIGNAL SUPPORT 1-92. The network connects geographically separated forces for network-enabled operations. Because the Army conducts operations as part of a joint force, signal support requires joint interoperability in systems engineering, planning, deployment, and operation. Joint forces must be networked, linked, and synchronized in time and purpose so dispersed forces can communicate, maneuver, share information, collaborate, and share a common operational picture. 1-93. By integrating information from across the operational area, Army forces can maintain timely and relevant situational understanding. The integrated common operational picture allows commanders to manage operational risk and employ the right capabilities at the right place and time to achieve mission objectives. Making this possible requires signal Soldiers and leaders to apply the fundamental principles of— * Operational focus. * Interoperability. * Agility. * Trusted systems. * Shared networks. * Situational awareness. OPERATIONAL FOCUS 1-94. Communications support should never be the limiting factor to the commander’s ability to execute a mission. Signal staffs need to understand the commander’s scheme of maneuver and intent and be able to articulate the capabilities and limitations of their communications systems to their commanders. This way, commanders can employ their signal capabilities to best support the operation.
6-02
26
Chapter 1 1-95. Signal staffs must participate early in and throughout the operations process. Integration of the scheme of signal support into operations plans is essential to mission success. This integration requires signal planners at every echelon to participate as full partners in the military decision-making process. Signal planners participate throughout the planning process, so they can better understand the maneuver plan and anticipate changes in operational requirements. During course of action comparison, signal planners advise the commander and staff of capability shortfalls that will adversely affect a proposed course of action. INTEROPERABILITY 1-96. Interoperability among unified action partners enables information advantage in joint and multinational operations. Sharing common technical standards and policies among joint mission partners allows a wide range of networking and information systems to interoperate as a joint network. Interoperability among systems and mission partners facilitates information exchange and speeds up decision making and implementation. Interoperability requires compatibility and standardization among communications and automated information systems. Planners must consider joint interoperability when formulating signal support plans. COMPATIBILITY 1-97. Compatibility is the capability of two or more different items or components of equipment to function in the same system or environment without mutual interference. Electromagnetic compatibility, including frequency supportability, is a design consideration at the earliest conceptual stage and throughout the planning, design, development, testing, evaluation, and operational life cycle of all systems. STANDARDIZATION 1-98. The need for standardization applies across the DOD, including the joint, Army, and other Services’ networks. Operating all of these networks and enclaves under the same technical standards ensures interoperability among mission partners. Standardization enables collaboration with unified action partners and reduces duplication in research and development efforts. AGILITY 1-99. Agile communications enable decentralized execution according to the commander’s intent. Communications and networking capabilities must meet the commander’s communications requirements and support decision-making processes. An agile network adapts to meets user needs in a continually changing operational environment. Agile networks have the capacity, flexibility, mobility, redundancy, reliability, scalability, and timeliness to meet commanders’ requirements across the range of military operations. To support agile forces and operational concepts, the communications architecture should adapt to a wide range of missions without needing extensive reconfiguration. CAPACITY 1-100. Signal staffs must plan communications and network capabilities to support all anticipated requirements in the operational area. High-level plans for the theater network must consider satellite bandwidth and spectrum availability to support growth as the theater network expands to meet increasing operational requirements. FLEXIBILITY 1-101. Flexibility allows rapid integration at all levels of joint and Army automated information systems support. Flexibility allows signal elements to adapt to changing situations and dynamic operations with minimal disruption or delay. Flexibility is particularly important during contingency operations.
6-02
27
Overview of Signal Support MOBILITY 1-102. Commanders at all levels must have network systems that are as mobile as the forces, elements, or organizations they support, without degraded information quality or flow. The network should provide an operational advantage and not a burden while enhancing the speed and agility of warfighting formations. REDUNDANCY 1-103. Redundancy provides multiple transmission paths, backups, self-healing strategies, and data replication. Redundancy enables quick recovery if portions of the network or the data that it transports are destroyed, rendered inoperative, or degraded. Signal elements implement redundancy through— * Communications in depth—using alternative communications means for connectivity in a degraded environment. * PACE plans. RELIABILITY 1-104. Reliability ensures networks are available when needed and perform as intended. Use of systems and networks with low failure rates, error correction techniques, and self-healing network architecture enhances the reliability of communications support. SCALABILITY 1-105. Signal forces must provide a network that is tailorable to adapt, based on phases of an operation, to enable command and control at home station, en route, and in deployed environments. Deployed environments include training, exercises, theater security cooperation, initial entry, and maneuver. Deployed environments may involve minimal to robust force packages. Signal elements must be able to adjust the network to provide the right services at the point of need, under all conditions as the size of the supported deployed forces increases or decreases. TIMELINESS 1-106. Timeliness ensures that the processing and transmission time for warning, critical intelligence, and operation order execution information is as short as practicable. As weapon systems technology shortens the time between warning and attack, information management processes must reduce the lag between information collection and dissemination. 1-107. Signal elements perform information management in support of the unit’s knowledge management plan to ensure commanders and their staffs receive the information they need, when they need it, to support planning and decision making. As the network expands or network nodes displace to meet mission requirements, signal elements ensure timely network support through— * Priorities of work. * Priorities of service. * Quality of service management. TRUSTED SYSTEMS 1-108. Commanders and system users need to be able to trust the confidentiality, integrity, and availability of automated information systems. Trusted networks must be transparent to users, protect the information and services on the network, and provide users with confidence in the validity of the information the network delivers. Trusted networks must be protected, survivable, and sustainable. PROTECTION 1-109. Protected communications systems and networks enable joint command and control in a contested environment. As such, they present high-value targets to the enemy. Cybersecurity and communications security (COMSEC) secure DOD networks and the information they carry. Cybersecurity establishes the
6-02
28
Chapter 1 baseline security of the network. COMSEC secures network transport media and classified terminal devices. Signal elements protect the network through— * Cybersecurity. * COMSEC. * Electronic counter-countermeasures (anti-jamming techniques). SURVIVABILITY 1-110. Survivable networks result from techniques such as dispersal of key facilities, redundant communications nodes, or a combination of techniques necessary for the physical and electrical protection of networks and critical infrastructure. While it is not practical or economically feasible to make all networks or elements of a system equally survivable, the networks and systems that enable command and control need protection commensurate with the survivability requirements of the associated command post. Since the Army network is a key command and control enabler, enemies consider it a key target for lethal and nonlethal fires. SUSTAINABILITY 1-111. Sustainable networks provide support during any type of operation, regardless of its duration. This requires the economical design and employment of networks without sacrificing operational capability or survivability. Examples that might improve system sustainability include— * Consolidating functionality of similar facilities. * Adherence to joint-approved architectures. * Integrating special purpose and dedicated networks, when possible, into the joint portion of the DOD network. * Maximum use of DOD-wide common user services. * Judicious use of commercial services to augment military capabilities. SHARED NETWORKS 1-112. Shared networks and services allow the mutual use of information services and communications capabilities among unified action partners at all echelons. Shared networks enable collaboration, rapid dissemination of intelligence and information, and the ability to project decisions based on common situational understanding. Signal elements provide shared networking capabilities by implementing— * DOD-wide common standards—common cybersecurity policies and system configurations to enhance interoperability. * Cybersecurity reciprocity—sharing security authorization packages and agreeing to accept other Services’ test and assessment results and authorization. * Mission partner environment—secure networking environment for multinational collaboration. NETWORK SITUATIONAL AWARENESS 1-113. Comprehensive network situational awareness allows commanders and their staffs to receive, correlate, and display an accurate representation of systems and networks. A clear visual representation of the network allows near real-time assessment of operational impacts and helps staffs identify key terrain in cyberspace. 1-114. Observation of the intensity of network activity, traffic load, and data throughput yields network situational understanding to enable dynamic rerouting of priority traffic and services and may provide indications of cyberspace or electronic attack. Situational awareness allows commanders and signal elements to— * Monitor, protect, and prioritize their network assets. * Assess the operational impact of network disruptions. * Respond to network outages or attacks.
6-02
29
Overview of Signal Support * Dynamically reallocate network traffic. OBJECTIVES OF SIGNAL SUPPORT 1-115. Signal elements and capabilities exist to meet commanders’ information requirements and enable control of forces. The Army network extends from the lowest tactical echelons to the highest levels of command. As a warfighting platform, the network enables commanders to integrate combined arms and all elements of combat power. Signal capabilities support command and control and enable strategic responsiveness, ultimately leading to a marked information advantage in the operational area. SUPPORT TO COMMAND AND CONTROL 1-116. The fundamental principle of operational focus supports the commander’s exercise of command and control. Signal elements can adapt the network based on the operational phase or tactical situation to meet the commander’s information requirements at the home station, en route, or while deployed. The fundamental principle of scalability enables signal leaders to tailor signal support to the purpose and scope of the deployment. Supporting signal elements adjust the network to provide appropriate services at the point of need, under all conditions STRATEGIC RESPONSIVENESS 1-117. Strategic responsiveness requires Army forces to react quickly to changes in the operational environment. The fundamental principles of operational focus, interoperability, agility, and shared networks allow signal support to rapidly adapt and scale the network to support any mission or situation. Joint and Army networks provide worldwide strategic voice and data capabilities and prepositioned connection points to extend services to expeditionary forces. Expeditionary signal capabilities provide the same types of services used at the home station, whenever and wherever rapidly-deployable forces are needed. 1-118. Signal network capabilities enable leaders to receive, process, and disseminate information globally. Strategic responsiveness allows leaders to see and understand the significance of situations around the world and then make and disseminate decisions, resulting in action. These network capabilities support coordinated planning, preparation, execution, and synchronization with unified action partners. INFORMATION ADVANTAGE 1-119. Signal elements who successfully apply all of the fundamental principles of signal support provide their commander an information advantage. The Army network allows commanders and staffs to access timely, protected information when and where they need it to meet their critical information requirements. Access to information results in an information advantage and enables decision making, leadership, and combat power. Information advantage is a key to gaining and retaining the initiative and consolidating gains in the operational environment. Signal support enables information advantage by providing communications and information technology systems, information management processes, and operational procedures that give commanders the ability to— * Focus on building an accurate, current, common operational picture. * Enhance and share knowledge, understanding, and visualization of the operational environment. * Improve and sustain the quality and speed of collaboration and decision making. CORE COMPETENCIES OF THE SIGNAL CORPS 1-120. Signal Soldiers and units apply the fundamental principles of signal support by executing the core competencies and essential capability of the Signal Corps. The core competencies are— * DODIN operations. * Network transport and information services. * Spectrum management operations. * Visual information and combat camera.
6-02
30
Chapter 1 1-121. COMSEC, while not a core competency, is an essential capability of signal support to implement trusted systems. Together, the core competencies and essential capability enable commanders’ exercise of command and control and integration of the other warfighting functions. Chapter 2 contains a more detailed discussion of the core competencies and essential capability of the Signal Corps. SECTION III – SIGNAL IN ARMY OPERATIONS SUPPORT TO JOINT OPERATIONS 1-122. The Army is interdependent with the joint force and serves as the foundation on which the joint force conducts land operations. The Army conducts operations to gain, sustain, and exploit control over land to deny its use to an enemy. It does this with combined arms formations with the mobility, firepower, and protection to defeat an enemy and establish control over land, resources, and populations. Army capabilities enable joint force success across multiple domains, and in the information environment. The Army provides key enabling capabilities to the joint force, including communications, intelligence, protection, and sustainment support. 1-123. A secure, robust, and reliable communications system gives the joint force commander the means to assimilate information and to exercise authority and direct forces over large geographic areas and a wide range of conditions. A communications system that provides connectivity throughout the operational area from the strategic to tactical levels is vital to plan, conduct, sustain operations, and enable information superiority (JP 6-0). Joint commanders use the network to exercise command and control and integrate the joint force components. 1-124. Army contributions to joint command and control include establishing, maintaining, and defending the communications and network architecture to support Army and joint forces in the theater. The network provides connectivity between Army forces and unified action partners in the joint operations area. 1-125. Army communications planners must include joint interoperability in their plans. Differences in policies, technologies, levels of capabilities, and resources when integrating communications support between joint and multinational forces create challenges that cannot be mitigated without in-depth planning at all levels. As an example, when integrating with joint mission partners, Army network planners must align their information sharing, COMSEC, technical engineering, and interconnection policies and procedures with those established by the communications system directorate of a joint staff (J-6). Considering interoperability requirements as early as possible in the planning process mitigates the added complexity of joint communications planning. 1-126. The DODIN-A can adapt, and the network main effort shifts, as the theater matures and forces transition between phases of an operation. DODIN operations control authorities and responsibilities shift as an operation matures and units arrive in the affected theater. Refer to ATP 6-02.71 for details on the transfer of DODIN operations authorities across the operational phases. ARMY STRATEGIC ROLES 1-127. The Army accomplishes its mission by supporting the joint force in four strategic roles: shape operational environments, prevent conflict, conduct large-scale ground combat, and consolidate gains (FM 3-0). Strategic roles are not tasks assigned to subordinate units, but broad goals of an Army force. The Army conducts tactical tasks to accomplish each of its strategic roles to varying extents across each phase of an operation. Refer to FM 3-0 for more information about the Army’s strategic roles. SHAPE OPERATIONAL ENVIRONMENTS 1-128. Army operations to shape help dissuade adversary activities designed to achieve regional goals short of military conflict. As part of operations to shape, the Army provides trained and ready forces to geographic combatant commanders in support of their theater campaign plan. The theater army and subordinate Army forces assist the geographic combatant commander in building partner capacity and capability and promoting
6-02
31
Overview of Signal Support stability across the area of responsibility (FM 3-0). Army operations to shape take place continuously before, during, and after a joint operation within a specific operational area. 1-129. Signal forces may contribute to shaping by conducting security cooperation activities to help build partner nation capacity, capabilities, and interoperability. Forward deployed strategic signal units provide peacetime and contingency access to the DODIN-A in theater. See chapter 3 for more information about signal support to operations to shape. PREVENT CONFLICT 1-130. Army operations to prevent include all activities to deter an adversary’s undesirable actions. These operations are an extension of operations to shape designed to prevent adversary opportunities to further exploit positions of relative advantage by raising the potential costs to adversaries of continuing activities that threaten U.S. interests. Prevent activities are generally weighted toward actions to protect friendly forces, assets, and partners, and to indicate U.S. intent to execute subsequent phases of a planned operation (FM 3-0). 1-131. Signal activities during operations to prevent include—predeployment activities, initial entry, and development of theater infrastructure. Theater army planners develop contingency communications plans to support the geographic combatant commander’s concept of operations. See chapter 3 for more information about signal support to operations to prevent. CONDUCT LARGE-SCALE GROUND COMBAT 1-132. During large-scale combat operations, Army forces focus on the defeat and destruction of enemy ground forces as part of the joint team. Army forces close with and destroy enemy forces in any terrain, exploit success, and break their opponent’s will to resist. Army forces attack, defend, conduct stability tasks, and consolidate gains to attain national objectives (FM 3-0) 1-133. During large-scale ground combat, organic signal elements at corps and below support command post operations for planning and support. Maneuver elements rely mainly on single-channel radios and friendly force tracking capabilities. See chapter 4 for more information about signal support to large-scale combat operations. CONSOLIDATE GAINS 1-134. Consolidation of gains is an integral and continuous part of armed conflict, and it is necessary for achieving success across the range of military operations (FM 3-0). Consolidation of gains is deliberate and takes place during all phases of an operation. Consolidation of gains becomes the primary focus of Army forces at the conclusion of large-scale combat operations. Signal activities to consolidate gains may include transitioning to commercial communications infrastructure. See chapter 5 for more information about signal support to the consolidation of gains. THE ARMY OPERATIONAL CONCEPT 1-135. Army forces contribute to the joint mission through the conduct of unified land operations as part of a joint and multinational force. Unified land operations is the simultaneous execution of offense, defense, stability, and defense support of civil authorities across multiple domains to shape operational environments, prevent conflict, prevail in large-scale ground combat, and consolidate gains as part of unified action (ADP 3-0). 1-136. Commanders conducting network-enabled operations need secure communications and automated information systems that operate reliably and adapt to changing requirements, transparent to users. These systems support U.S. and multinational forces at every level of command. The DOD network that supports network-enabled operations is the DODIN. The Department of Defense information network is the set of information capabilities, and associated processes for collecting, processing, storing, disseminating, and managing information on-demand to warfighters, policy makers, and support personnel, whether interconnected or stand-alone, including owned and leased communications and computing systems and
6-02
32
Chapter 1 services, software (including applications), data, security services, other associated services, and national security systems (JP 6-0). Signal Soldiers and formations support Army operations with secure network connectivity and information services at all echelons. SUPPORT TO COMMAND AND CONTROL 1-137. Combined arms maneuver is impossible unless commanders have the expertise and communications to synchronize Army and joint combat power. The science of control—regulating, monitoring, and directing unit actions—requires sophisticated and rugged information systems, along with a well-trained staff to employ them. Even knowledgeable and charismatic commanders cannot control everything beyond their immediate surroundings without the supporting personnel, networks, information systems, processes and procedures, and facilities and equipment (ADP 1). 1-138. The command and control system enhances the commander’s ability to conduct operations. Commanders arrange the four components of the command and control system (see introductory figure-2) to— * Support decision making. * Collect, create, and maintain relevant information and prepare knowledge products to support situational understanding and visualization. * Prepare and communicate directives. * Establish the means to communicate, collaborate, and facilitate the functioning of teams. 1-139. Signal Soldiers and units provide the network and automated information systems to support the commander’s exercise of command and control. Networks enable successful operations. Commanders determine their information requirements and focus their staffs and organizations on using networks to meet these requirements. These capabilities relieve staffs from handling routine data, and enable extensive information sharing, collaborative planning, execution, and assessment that promote shared understanding (ADP 6-0). Networks also assist commanders in projecting their decisions across the force. The Army’s network is the DODIN-A. The DODIN-A enables the warfighting functions of command and control, fires, intelligence, movement and maneuver, protection, and sustainment, and provides the commander and staff the information they need to support sound decision making. 1-140. Signal support enables the commander to exercise command and control and to integrate the other warfighting functions (see introductory figure-1 on page viii). The DODIN-A and automated information systems enhance the ability to plan and coordinate operations across staff sections, cells, command posts, and echelons. Signal Soldiers— * Install, operate, maintain, and secure the DODIN-A (DODIN operations and COMSEC). * Formulate signal support plans as part of the military decision-making process. * Conduct information management. 1-141. As a warfighting platform, the DODIN-A enables commanders to integrate joint combined arms and all elements of combat power. Command post personnel, information systems, and equipment must be able to support continuous operations while in communication with their higher echelon, subordinate, supporting, supported, and adjacent units (FM 3-0). The DODIN-A connects command posts, weapon platforms, dismounted Soldiers, and sensors, enabling the command and control system to— * Support leaders’ ability to understand, visualize, and describe the operational environment, problems, and approaches to solving them (situational understanding). * Support commanders’ ability to make decisions and direct action toward a desired end state. * Assess understanding of—  The problem.  Adequacy of the operational approach and subsequent plans.  Level of progress. 1-142. Adversaries and enemies will target command and control systems. Units must adapt their command and control systems to the realities of fighting peer threats. Conditions in large-scale combat operations require the smallest possible physical footprint and electronic signature and the highest possible level of
6-02
33
Overview of Signal Support agility. Close coordination between the G-6 (S-6) and the EW section can help identify and minimize the command posts’ electronic signature. 1-143. The DODIN-A supports global, distributed command and control and enables the Army to fight and win in a congested and contested operational environment. The DODIN-A integrates information services and capabilities at all strategic, operational, and tactical echelons and enables all warfighting functions. 1-144. Signal elements can adapt the network based on the operational phase or tactical situation to provide command and control capabilities in support of training and exercise, theater security cooperation, forcible entry, large-scale combat operations, and stability activities. The purpose and scope of the deployment determine the size and capability of the forces required. Supporting signal elements adjust the network to provide appropriate services at the point of need, under all conditions. 1-145. Home station mission command centers enable units to conduct split-based operations. Controlling an operation from the home station and deploying a smaller, forward-deployed command post reduces the deployed footprint and operational risk. Utilizing the home station mission command center, the division can deploy a smaller, tailored command post for initial entry operations, conduct major planning at the home station, and use reachback to the home station. SUPPORT TO OTHER WARFIGHTING FUNCTIONS 1-146. Signal Soldiers and units support all warfighting functions by installing, operating, and securing the DODIN-A to provide connectivity to critical Defense Information Systems Network (DISN) services. These services include the Defense Switched Network, Defense Red Switched Network, Organizational Messaging Service, video teleconferencing, telemedicine services, SECRET Internet Protocol Router Network (SIPRNET), Non-Classified Internet Protocol Router Network (NIPRNET), Joint Worldwide Intelligence Communications System, and mission partner environment. 1-147. Reliable, secure communications and information services enable commanders to exercise command and control and to integrate the other warfighting functions. The warfighting functions are mutually supportive. The DODIN-A connects people to enable resource and information sharing and collaboration. As information passes between elements, the network enables coordination to support the commander’s intent. Integration of the warfighting functions relies on the network for information sharing. 1-148. Information and communications requirements change with the operational and mission variables. Signal elements can adapt the network to continue supporting, and enabling the integration of, all warfighting functions. The network can expand or contract to meet the commander’s changing information requirements. As forces enter or leave an operational area, signal elements scale the theater network to meet mission requirements. 1-149. Network changes take deliberate planning and sometimes require additional resources. Considering network requirements early in the planning process ensures the network can fully support the unit’s communications requirements. Identifying communications gaps during early planning allows commanders to request augmentation, as necessary. MULTINATIONAL INTEROPERABILITY 1-150. Army forces integrate, both operationally and organizationally, with joint, interorganizational, and multinational mission partners. The traditional model of multinational operations, where each mission partner operated in a separate area of operations and maintained a separate national classified network interferes with information sharing and unity of effort. A tailored mission network in which unified action partners share classified information and operate as equals enhances interoperability and facilitates multinational cooperation. 1-151. The Defense Information Systems Agency maintains configuration standards and joining instructions for mission partner environment. By adopting common standards and configurations, unified action partners can share classified information freely without compromising the security of the information. Mission partner environment increases battlefield effectiveness by enabling unity of effort among diverse mission partners.
6-02
34
Chapter 1 STRATEGIC AND OPERATIONAL REACH 1-152. Strategic and operational reach enable Army forces to deploy rapidly, fight on arrival, and conduct extended campaigns as part of a joint and multinational force. Doing so requires proficiency at force projection, protection, and sustainment. Soldiers require an expeditionary mindset to prepare them for short notice deployments into uncertain, often austere, and lethal environments. 1-153. Strategic reach provides the capability to operate against threats operating anywhere in the world. The distance across which the United States can project decisive military power is its strategic reach (FM 3-0). 1-154. Operational reach is the distance and duration across which a force can successfully employ military capabilities (JP 3-0). Extending operational reach is a major concern for commanders throughout an operation. The limit of a unit’s operational reach is its culminating point. Signal support using beyond line of sight satellite communications capabilities extends operational reach by increasing the geographic area a commander can effectively control. OPERATIONAL MOVEMENT AND MANEUVER 1-155. Operational movement and maneuver combines global force projection with maneuver against an operationally significant objective. Successful operational movement and maneuver allows a unit to— * Secure and defend a lodgment. * Develop support infrastructure and base camps. * Receive, stage, and build up forces. 1-156. Signal support to operational movement and maneuver combines operational science and art to ensure the right capabilities are available to support Army commanders, staffs, and units at the right time and place. The science of signal support is the technical aspects of communications and the ability to properly employ the Army’s wide variety of communications capabilities. The G-6 (S-6) must understand the operation plan and articulate the capabilities and limitations of the unit’s communications assets. The scheme of signal support effectively distributes capabilities across the organization and employs the network in a manner that ensures the commander’s ability to exercise command and control at any time and place on the battlefield. EXPEDITIONARY CAPABILITY 1-157. The Army requires expeditionary forces with the endurance to prevail in protracted conflict against determined enemies. Expeditionary capability requires deploying the right mix of Army forces to the right place at the right time to achieve the desired mission objectives. 1-158. Expeditionary signal systems and formations enable commanders’ exercise of command and control in a constrained environment, whether they are restricted to single-channel radios or are operating with full DODIN-A capabilities. The tactical portion of the DODIN-A can scale up or down to meet changing operational needs. The signal staff determines the smallest, least complex system available, and the minimum staffing necessary to meet the expeditionary mission requirement. Signal staffs determine whether to deploy servers forward, utilize reachback to the home station, or rely on strategic enterprise services to support an expeditionary mission. FORCE PROJECTION 1-159. Force projection is the military component of power projection. Seizing the initiative generally requires force projection. Force projection is a race between friendly and enemy forces. The side that most rapidly builds combat power can seize the initiative. During force projection, the ability to scale communications packages up or down to meet mission requirements gives commanders flexibility when tailoring force projection packages.
6-02
35
Overview of Signal Support ENTRY OPERATIONS 1-160. The entry of Army and joint forces into a joint operations area or theater of operations may be unopposed or opposed (FM 3-0). Being part of an expeditionary force means units deploy on short notice to austere locations. Maintaining communications en route to the operational area allows units to refine their plans while in transit and arrive in the area of operations with current intelligence estimates ready to immediately conduct combat operations. 1-161. Attaining operational reach often requires gaining and maintaining operational access in the face of enemy antiaccess and area denial capabilities and actions. Commanders conduct forcible entry operations to seize and hold a military lodgment in the face of armed opposition. Early and Initial Entry 1-162. During the initial phases of an operation, units may not be able to deploy heavy wideband satellite communications trailers and nodal systems. Signal leaders need to deploy their communications capabilities in phases and build network capacity over time. Initial entry operations may be supported solely with single- channel, push-to-talk radios. Commercial cellular networks and devices may augment single-channel radios until adequate signal support becomes available in the operational area, but commanders’ risk decisions must account for peer threat capabilities to exploit cellular networks for location information and intelligence collection. Expeditionary units must be prepared to operate with limited communications capabilities in austere locations. Signal planners must effectively deploy the solutions that maximize capabilities within the limitations of the situation or environment. Forcible Entry 1-163. Forcible entry is seizing and holding of a military lodgment in the face of armed opposition or forcing access into a denied area to allow movement and maneuver to accomplish the mission (JP 3-18). Army forces, as part of a joint force, must be capable of deploying and fighting to gain access to geographic areas controlled by forces hostile to U.S. national interests to be credible both as a deterrent and as a viable military option for policy enforcement (FM 3-0). 1-164. Forcible entry operations are inherently complex and always joint. Often only hours separate the alert from the deployment. The demands of simultaneous deployment and employment create a distinct set of dynamics. Operations are carefully planned and rehearsed in training areas and marshalling areas. Personnel and equipment are configured for employment upon arrival without reception, staging, onward movement, and integration (FM 3-0). 1-165. Joint interoperability of signal systems enables units to conduct forcible entry operations with joint and multinational partners. Interoperable communications allow mission partners to synchronize their efforts and share situational awareness to prevent friendly fire. 1-166. Because communications systems must be built-up at the objective area, some aspects of communications support are unique in forcible entry operations. Communications requirements for joint forcible entry operations vary with the mission, size, composition, and geographic location of the joint force and its senior headquarters. Significant requirements to consider for forcible entry operations are the use of intermediate staging bases, en route mission planning, and intelligence sharing. 1-167. Ground commanders in airlift aircraft may communicate with the chain of command over the Army secure en route communications package. Normally, the airlift mission commander and the airborne task force commander are in the same aircraft. The senior ground commander can advise embarked ground commanders of changes in the ground tactical situation or to the air movement plan (JP 3-18). 1-168. Forces initially deploy with limited communications capabilities—primarily single-channel radios and narrowband (single-channel) satellite communications. As additional units enter the operational area, the deployed network becomes more robust to support greater troop strength and associated command posts. Refer to JP 3-18 for more information about forcible entry operations.
6-02
37
Chapter 2 Signal Support by Army Echelon, Core Competencies, Training, and the Army Network This chapter discusses Army signal capabilities by echelon, the core competencies of the Signal Corps, signal collective training in units, and the Department of Defense information network-Army. SECTION I – SIGNAL SUPPORT BY ECHELON 2-1. Deployable signal elements support the Army’s operational needs, whether they are pooled assets or organic to a maneuver or support unit. Unique signal units provide strategic communications infrastructure or perform specialized missions and functions. CORPS AND BELOW ORGANIZATIONS WITH ORGANIC SIGNAL ASSETS 2-2. Combat and combined arms units at echelons corps and below have organic signal capabilities to conduct their standard missions without requiring outside signal support. However, augmentation of communications capabilities is required for most enabler units, and if the unit’s operational reach expands beyond the capabilities of their organic systems. 2-3. A brigade combat team may have company- or platoon-sized elements operating beyond the reach of single-channel radios, or that require more robust network connectivity and services than those provided by the brigade’s organic signal capabilities. This becomes a downward-reinforcing mission of the theater tactical signal brigade and expeditionary signal battalion. Refer to ATP 6-02.60 for more information about the organic network communications capabilities of corps and below units. CORPS 2-4. The corps is the principal headquarters for applying landpower as a component of a campaign (FM 3-94). The corps integrates landpower into campaigns and serves as the link between the operational and tactical levels of war. 2-5. The organic signal capabilities of the corps support its main and tactical command posts. When the corps serves as a joint task force headquarters, as a joint or multinational land component command, or as a tactical headquarters commanding multiple divisions, it may require augmentation from other Services or pooled signal assets from the theater tactical signal brigade. Corps G-6 2-6. The G-6 is the principal staff officer who advises the commander on all matters related to communications in the corps. The G-6 advises the corps commander, staff, and subordinate commanders on technical and training issues related to network and information service integration. During split-based operations, the G-6 usually aligns with the tactical command post, while the deputy G-6 remains with the main command post. The corps G-6 coordinates with G-3 to direct the actions and movements of signal elements to support operations through the orders process.
6-02
38
Chapter 2 2-7. The G-6 coordinates with higher, adjacent, and subordinate echelons to ensure adequate network support. See appendix B for more information about collaboration with higher, adjacent, and subordinate signal elements. 2-8. The G-6 controls DODIN operations in the corps area of operations through the network operations and security center. The corps network operations and security center establishes the corps portion of the DODIN-A. The network operations and security center provides operational and technical support to subordinate signal elements through technical channels. Technical channels are the chain of authority for ensuring the execution of clearly delineated technical tasks, functions, and capabilities to meet the dynamic requirements of Department of Defense information network operations (ATP 6-02.71). The network operations and security center monitors the health of the network and directs fault, configuration, accounting, performance, and security management. When operating as part of a joint task force headquarters, the corps network operations and security center forms the core of the joint network operations control center, with augmentation. Note. Signal personnel often incorrectly refer to a ‘network operations chain of command.’ The correct term to describe the chain of authority for the conduct of DODIN operations is technical channels. 2-9. DODIN operations technical channels align with the operational chain of command to maintain unity of command and unity of effort. This allows commanders to manage the network as a warfighting platform and align available communications and network support capabilities to their highest mission priorities during each phase of an operation. Battalions configure their systems to report status information to the brigade network operations and security center. Each subsequent network operations and security center reports status to the next higher level of command. The regional cyber center monitors status of the theater network through the regional hub node on behalf of the theater army. Figure 2-1 depicts the DODIN operations technical channels at corps and below. Refer to ATP 6-02.71 for more information about DODIN operations monitoring and reporting.
6-02
39
Signal Support by Army Echelon, Core Competencies, Training, and the Army Network Figure 2-1. Department of Defense information network operations technical channels at corps and below 2-10. The corps G-6 integrates the corps network and automated information systems. The G-6 prepares the communications plan and exercises technical control over the signal portion of the corps signal, intelligence, and sustainment company in executing the plan. After initializing the local area networks, the G-6 establishes a 24-hour service desk to help with user issues and local area network connectivity in the command posts. The roles and responsibilities of the G-6 include— * Developing the scheme of signal support to operation orders through the military decision-making process, including PACE plans for each phase of the operation. * Assist the commander and G-3 in identifying user requirements by number and service type. * DODIN operations planning. * Satellite communications planning. * Line of sight network planning. * Tactical radio network planning. * Spectrum management. * COMSEC account management. * Integrating mission command information systems in the corps network.
6-02
40
Chapter 2 * Coordinating, planning, and directing integration of unified action partner networks (mission partner environment). * Local area network management for the corps command posts. * Service desk management. * Helping collect and disseminate relevant input to the common operational picture. * Supporting the cyberspace electromagnetic activities (CEMA) section, as required. * Information dissemination management to ensure awareness of relevant, accurate information, automated access to newly discovered or recurring information, and timely information delivery to support decision making. * Signal maintenance and logistical readiness oversight for communications-electronics equipment. 2-11. When the corps headquarters serves as a joint task force headquarters, the G-6 usually serves as the joint task force J-6. This mission requires augmentation from other Services or pooled Army tactical signal assets. Corps Signal, Intelligence, and Sustainment Company 2-12. The signal portion of the corps signal, intelligence, and sustainment company operates under the technical control of the corps G-6. The company includes staffing for the G-6 section and elements to install, operate, maintain, and secure the corps headquarters’ network transport, automated information systems, and networks. Refer to relevant intelligence and sustainment doctrine publications for more information on the company’s intelligence and sustainment functions. 2-13. The corps signal, intelligence, and sustainment company provides communications and network support for the corps main and tactical command posts and the various companies in the corps headquarters and headquarters battalion. The signal portion of the company also provides— * Wideband and protected satellite communications transport to connect with the DODIN-A. * High-throughput line of sight transport to communicate between command posts. * DISN services—SIPRNET, NIPRNET, Joint Worldwide Intelligence Communications System, voice, and video. * Wire, cable, and fiber optic systems to support the corps command posts. * Single-channel radio and narrowband (single-channel) tactical satellite retransmission for the corps and support elements. * Global Broadcast Service capability to receive high bandwidth imagery, logistics data, and digital map information to support command and control. Note. Employing a retransmission team remotely from established command posts or other units requires additional planning and resources for site defense, logistics, and emergency evacuation. Refer to ATP 6-02.53 for more information about retransmission planning. DIVISION 2-14. The division is the Army’s primary tactical warfighting headquarters. Its primary role is as a tactical headquarters commanding brigades in decisive action (FM 3-94). The division’s organic signal capabilities support operations from traditional main and tactical command posts, as well as command and control on- the-move. The division’s home station mission command center supports split-based operations. Although the division has organic signal capabilities, most enablers and other attached units require augmentation. As the division’s operational reach expands, smaller units without organic signal capabilities require augmentation. This is a downward reinforcing mission of the theater tactical signal brigade. Division G-6 2-15. The G-6 is the principal staff officer who advises the commander on all matters related to communications in the division. The G-6 advises the division commander, staff, and subordinate
6-02
41
Signal Support by Army Echelon, Core Competencies, Training, and the Army Network commanders on technical and training issues related to network and information service integration. During split-based operations, the G-6 usually aligns with the tactical command post, while the deputy G-6 remains with the main command post. The division G-6 coordinates with the G-3 to direct the actions and movements of signal elements to support operations through the orders process. 2-16. The G-6 coordinates with higher, adjacent, and subordinate echelons to ensure adequate network support. The G-6 recommends network changes as needed to support the commander’s intent. See appendix B for more information about signal planning and collaboration with higher, adjacent, and subordinate signal elements. 2-17. The division G-6 conducts DODIN operations in their area of operations through the division network operations and security center. The division network operations and security center establishes the division’s portion of the DODIN-A. The network operations and security center provides guidance to subordinate signal elements through technical channels. The network operations and security center monitors the health of the network and directs fault, configuration, accounting, performance, and security management. When the division acts as a joint task force headquarters, the division network operations and security center forms the core of the joint network operations control center, with augmentation. 2-18. The division G-6 integrates the division’s network and information systems. The G-6 prepares the communications plan and exercises technical control over the division signal company in executing the plan. After initializing the local area networks, the G-6 establishes a 24-hour service desk to help with user issues and local area network connectivity in the command posts. The roles and responsibilities of the G-6 include— * Developing the scheme of signal support to operation orders through the military decision-making process, including PACE plans for each phase of the operation. * Assist the commander and G-3 in identifying user requirements by number and service type. * DODIN operations planning. * Satellite communications planning. * Managing satellite communications networks for the division and subordinate brigade combat teams. * Line of sight network planning. * Managing line of sight networks for the division and subordinate brigade combat teams. * Tactical radio network planning. * Spectrum management. * COMSEC account management. * Integrating mission command information systems in the division network. * Coordinating, planning, and directing integration of unified action partner networks (mission partner environment). * Local area network management for the division command posts. * Service desk management. * Helping collect and disseminate relevant input to the common operational picture. * Supporting the CEMA section, as required. * Information dissemination management to ensure awareness of relevant, accurate information, automated access to newly discovered or recurring information, and timely information delivery to support decision making. * Signal maintenance and logistical readiness oversight for communications-electronics equipment. 2-19. When the division headquarters serves as a joint task force headquarters, the G-6 usually serves as the joint task force J-6. This mission requires augmentation from other Services or pooled signal assets. Division Signal, Intelligence, and Sustainment Company 2-20. The signal portion of the division signal, intelligence, and sustainment company operates under the technical control of the division G-6. The company installs, operates, maintains, and secures the division’s network transport, automated information systems, and networks and provides the G-6 staff. The division’s organic signal capabilities support operations at-the-halt from the main and tactical command posts, and
6-02
42
Chapter 2 command and control on-the-move. Refer to relevant intelligence and sustainment doctrine publications for more information on the company’s intelligence and sustainment functions. 2-21. The signal portion of the division signal, intelligence, and sustainment company supports the division command posts and the various companies in the division headquarters and headquarters battalion. The company also provides— * Wideband and protected satellite communications transport to connect with the DODIN-A. * Gateway access to the DODIN-A through the tactical hub node, if regional hub node service is not available. * High-throughput line of sight transport to communicate between fixed command posts. * Line of sight and wideband satellite communications transport to support command and control on-the-move. * DISN services—SIPRNET, NIPRNET, Joint Worldwide Intelligence Communications System, voice, and video. * Single-channel radio and narrowband (single-channel) tactical satellite retransmission for the brigade and support elements. * Wire, cable, and fiber optic systems to support the division command posts. * Global Broadcast Service capability to receive high bandwidth imagery, logistics data, and digital map information to support command and control. BRIGADE COMBAT TEAM 2-22. The brigade combat team provides the division, land component command, or joint task force with close combat capabilities. The brigade combat team’s organic signal capabilities support operations at-the- halt from the main and tactical command posts. Active component infantry and Stryker brigade combat teams’ signal capabilities also support command and control on-the-move. Brigade Combat Team S-6 2-23. The S-6 is the principal staff officer who advises the commander on all matters related to communications in the brigade. The S-6 advises the brigade combat team commander, staff, and subordinate commanders on technical and training issues related to network and information service integration. The S-6 directs planning and coordination for DODIN operations, network transport and information services, and spectrum management operations for the brigade headquarters and subordinate units through the military decision-making process (see appendix B). 2-24. The S-6 collaborates with the higher headquarters J-6 or G-6, assigned or attached battalion S-6 staffs, and adjacent units to ensure effective communications throughout the brigade area of operations. The S-6 recommends network changes as needed to support the commander’s intent. The brigade S-6 coordinates with the S-3 to direct the actions and movements of signal company elements to support operations through the orders process. 2-25. The S-6 conducts DODIN operations for the brigade and subordinate battalions through the brigade network operations and security center. The network operations and security center establishes the brigade’s portion of the DODIN-A. The network operations and security center provides guidance to subordinate signal elements through technical channels. The network operations and security center monitors the health of the network and directs fault, configuration, accounting, performance, and security management. 2-26. The S-6 integrates the brigade’s network and automated information systems. The S-6 prepares the communications plan and exercises technical control over the brigade signal company in executing the plan. After initializing the local area networks, the S-6 establishes a 24-hour service desk to help with user issues and local area network connectivity in the command posts. Roles and responsibilities of the S-6 include— * Developing the scheme of signal support to operation orders through the military decision-making process, including PACE plans for each phase of the operation. * Assist the commander and S-3 in identifying user requirements by number and service type. * DODIN operations planning for the brigade and subordinate battalions.
6-02
43
Signal Support by Army Echelon, Core Competencies, Training, and the Army Network * Identifying user requirements by number and service type. * Spectrum management for the brigade and subordinate battalions. * Satellite communications planning for the brigade and subordinate battalions. * Line of sight network planning. * Tactical radio network planning. * Tactical radio networks management. * COMSEC account management. * Integrating mission command information systems in the brigade network. * Coordinating, planning, and directing integration of unified action partner networks (mission partner environment). * Local area network management for the brigade command posts. * Installing, operating, and maintaining automated information systems and telephone equipment in the brigade command posts. * Installing, operating, and maintaining Battle Command Common Server. * Service desk management. * Helping collect and disseminate relevant input to the common operational picture. * Supporting the CEMA section, as required. * Information dissemination management to ensure awareness of relevant, accurate information, automated access to newly discovered or recurring information, and timely information delivery to support decision making. * Signal maintenance and logistical readiness oversight for communications-electronics equipment. Brigade Combat Team Signal Company 2-27. The brigade signal company is assigned to the brigade engineer battalion. The company operates under the technical control of the brigade S-6. The company installs, operates, maintains, and secures the brigade’s organic network transport, automated information systems, and networks to support command post operations at-the-halt and command and control on-the-move. The signal company employs its platoons and teams throughout the brigade area of operations. The signal company has signal and COMSEC systems maintenance augmentation, spares management, and maintenance accountability from the organic communications-electronics maintenance element of the brigade support battalion’s field maintenance company. Field maintenance is on-system maintenance, repair and return to the user including maintenance actions performed by operators (FM 4-30). 2-28. The brigade signal company extends information services to the brigade command posts and command vehicles. The brigade signal company also provides— * Wideband and protected satellite communications transport to connect with the division portion of the DODIN-A. * High-throughput line of sight transport to communicate between fixed command posts. * Line of sight and wideband satellite communications transport to support command and control on-the-move. * Wire, cable, and fiber optic systems to support the brigade and battalion command posts. * DISN services—SIPRNET, NIPRNET, Joint Worldwide Intelligence Communications System, voice, and video. * Single-channel radio and narrowband (single-channel) tactical satellite retransmission for the brigade and support elements. * Global Broadcast Service capability to receive high bandwidth imagery, logistics data, and digital map information to support command and control. Maneuver Battalion S-6 2-29. The S-6 advises the commander on all matters related to communications in the battalion. The battalion S-6 integrates automated information systems, manages their local area network, implements cybersecurity,
6-02
44
Chapter 2 and coordinates spectrum management. Signal planners in the S-6 section are active participants throughout the military decision-making process. The S-6 evaluates the supportability and feasibility of the signal plan supporting each proposed course of action during the military decision-making process. The S-6 maintains the running estimate of communications capabilities and provides signal support plans to design and configure the battalion’s communications assets, including PACE plans for each phase of the operation. 2-30. The S-6 interacts closely with the executive officer, S-3, and other staff sections to define communications and network requirements through the military decision-making process. They consult with higher, lower, and adjacent headquarters to ensure effective communications throughout their area of operations. The S-6 should maintain a close working relationship with the commander and battalion S-3 to ensure the communications plan supports the commander’s intent. Roles and responsibilities of the S-6 include— * Developing the scheme of signal support to operation orders through the military decision-making process. * Assist the commander and S-3 in identifying user requirements by number and service type. * Identifying user requirements by number and service type. * Coordinating spectrum management for the battalion’s communications systems with the brigade spectrum manager. * Managing the COMSEC local hand receipt. * Integrating mission command information systems in the battalion network. * Local area network management for the battalion command post. * Installing, integrating, and maintaining automated information systems and telephone equipment in the battalion command post. * Implements cybersecurity measures to maintain compliant systems. * Managing tactical radio networks. Maneuver Battalion Signal Capabilities 2-31. The battalion S-6 section configures, secures, and operates the battalion’s organic communications capabilities. Each maneuver battalion has organic tactical radios, local area network, and wide-area network capabilities. The battalion’s organic assets support the battalion command post at-the-halt and provide the commander the common operational picture and a command and control on-the-move capability. The battalion S-6 section also provides— * Beyond line of sight satellite communications access to the division portion of the DODIN-A. * Line of sight and satellite communications on-the-move to the company, battalion, brigade, and division network. * DISN services—SIPRNET, NIPRNET, voice, and video. * Single-channel radio and narrowband (single-channel) tactical satellite communications retransmission for the battalion and support elements. * Global Broadcast Service capability to receive high bandwidth imagery, logistics data, and digital map information to support command and control. Maneuver Company Signal Capabilities 2-32. Maneuver companies have limited organic signal capabilities. Companies have single-channel secure radios down to squad level. The company commander has beyond line of sight satellite communications access to the division information network to support the common operational picture, limited DISN services, and command and control on-the-move. The company’s communications systems are mostly general- purpose, user-operated equipment not staffed by signal Soldiers. Refer to FM 3-96 for more information about brigade combat team operations.
6-02
45
Signal Support by Army Echelon, Core Competencies, Training, and the Army Network MULTIFUNCTIONAL SUPPORT BRIGADE 2-33. Combat aviation, field artillery, maneuver enhancement, and sustainment brigades have organic tactical signal assets. Their signal capabilities support the brigade and subordinate battalion command posts operating at-the-halt. Brigade S-6 2-34. The S-6 advises the commander on all matters related to communications in the brigade. The S-6 advises the commander, staff, and subordinate commanders on technical and training issues related to network and information service integration. The S-6 plans and coordinates signal support to the brigade’s main and tactical command posts through the military decision-making process (see appendix B). The brigade S-6 coordinates with the S-3 to direct the actions and movements of signal company elements to support operations through the orders process. 2-35. The S-6 directs planning and coordination for DODIN operations, network transport and information services, and spectrum management for the brigade headquarters and subordinate units. The S-6 collaborates with higher, subordinate, and adjacent units to ensure adequate network support. The S-6 recommends network changes as needed to support the commander’s intent. 2-36. The S-6 integrates the brigade’s network and information systems. The S-6 prepares the communications plan and exercises technical control over the brigade signal company in executing the plan. After initializing the local area networks, the S-6 section establishes a 24-hour service desk to help with user issues and local area network connectivity in the command posts. Roles and responsibilities of the S-6 include— * Developing the scheme of signal support to operation orders through the military decision-making process, including PACE plans for each phase of the operation. * Assist the commander and S-3 in identifying user requirements by number and service type. * DODIN operations planning for the brigade and subordinate battalions. * Satellite communications planning for the brigade and subordinate battalions. * Line of sight network planning. * Tactical radio network planning. * Spectrum management for the brigade and subordinate battalions. * COMSEC account management. * Integrating mission command information systems in the brigade network. * Coordinating, planning, and directing integration of unified action partner networks (mission partner environment). * Local area network management for the brigade command posts. * Service desk management. * Helping collect and disseminate relevant input to the common operational picture. * Supporting the CEMA section, as required. * Information dissemination management to ensure awareness of relevant, accurate information, automated access to newly discovered or recurring information, and timely information delivery to support decision making. * Signal maintenance and logistical readiness oversight for communications-electronics equipment. Brigade Signal Company 2-37. The brigade signal company operates under the technical control of the brigade S-6. The company installs, operates, maintains, and secures the brigade’s network transport, automated information systems, and networks. The brigade’s organic signal capabilities support command post operations at-the-halt. The brigade signal company has signal maintenance augmentation, spares management, and maintenance accountability from the brigade’s organic communications-electronics maintenance element. Either the organic maintenance element or the support maintenance company provides remaining maintenance support
6-02
46
Chapter 2 for communications-electronics, COMSEC, automotive, power generation, and environmental control equipment. 2-38. The brigade signal company supports the brigade and subordinate battalion command posts. The brigade signal company also provides— * Wideband and protected satellite communications transport to connect with the division portion of the DODIN-A. * High-throughput line of sight transport to communicate between command posts. * Line of sight and wideband satellite communications transport to support command and control on-the-move. * DISN services—SIPRNET, NIPRNET, Joint Worldwide Intelligence Communications System, voice, and video. * Single-channel radio and narrowband (single-channel) tactical satellite retransmission for the brigade and support elements. * Global Broadcast Service capability to receive high bandwidth imagery, logistics data, and digital map information to support command and control. * Wire, cable, and fiber optic systems to support the brigade and battalion command posts. Battalion S-6 2-39. The battalion S-6 integrates automated information systems, manages the battalion local area network, implements cybersecurity, and coordinates spectrum management. Signal planners in the S-6 section are active in the operations process. The S-6 ensures the commander can communicate to exercise command and control. The S-6 evaluates the supportability and feasibility of the signal plan supporting each proposed course of action during the military decision-making process. The S-6 maintains the running estimate of communications capabilities and provides signal support plans to build and configure the battalion’s communications capabilities. 2-40. The S-6 interacts closely with the executive officer, S-3, and other staff sections to define communications and network requirements through the military decision-making process. They collaborate with higher, lower, and adjacent headquarters to ensure effective communications throughout their area of operations. The S-6 should maintain a close working relationship with the commander and battalion S-3 to ensure the communications plan supports the commander’s intent. Roles and responsibilities of the S-6 include— * Developing the scheme of signal support to operation orders through the military decision-making process, including PACE plans for each phase of the operation. * Assist the commander and S-3 in identifying user requirements by number and service type. * Coordinating spectrum management for the battalion’s communications systems with the brigade spectrum manager. * Managing the battalion COMSEC hand receipt. * Managing tactical radio networks. * Integrating mission command information systems in the battalion network. * Local area network management for the battalion command post. * Installing, integrating, and maintaining automated information systems and telephone equipment in the battalion command post. * Implementing cybersecurity measures to maintain compliant systems. 2-41. The S-6 section performs local area network setup, administration, and user support. Attached brigade signal company elements provide only the connection to DISN services. Refer to ATP 6-02.60 for more information about brigade through corps communications.
6-02
47
Signal Support by Army Echelon, Core Competencies, Training, and the Army Network SECURITY FORCE ASSISTANCE BRIGADE 2-42. Each security force assistance brigade, both armored and infantry variants, has two maneuver battalions, a cavalry squadron, a field artillery battalion, an engineer battalion, a military intelligence company, a signal company, a support battalion, and a headquarters and headquarters company (ATP 3-96.1). Brigade S-6 2-43. The S-6 advises the commander on all matters related to communications in the brigade. The S-6 advises the commander, staff, and subordinate commanders on technical and training issues related to network and information service integration. The S-6 plans and coordinates signal support to the brigade’s main and tactical command posts through the military decision-making process (see appendix B). The S-6 collaborates with subordinate battalion S-6s and supported unit to ensure adequate network support. See appendix B for more information about collaboration with higher and subordinate signal elements. Brigade Signal Company 2-44. The signal company provides voice and data retransmission capability for its tactical radio network. The retransmission team provides line of sight extension of the brigade’s tactical radio network within the brigade area of operations. During deployment, the signal company uses augmented assets from the expeditionary signal battalion to provide worldwide digital voice and data communications to enable command and control across the brigade’s area of operations. Battalion S-6 2-45. The battalion S-6 coordinates with the brigade S-6 to define communications and network support requirements, based on the situation and mission. The operational chain of command validates requests for signal support they cannot source internally and forwards them to United States Army Forces Command for approval and resourcing. The supporting signal unit provides a communications package tailored to validated communications and information exchange requirements. UNITS WITHOUT ORGANIC SIGNAL ASSETS 2-46. Theater tactical signal brigades and their assigned expeditionary signal battalions, are manned, trained, and equipped to provide communications support to expeditionary units with no organic signal assets. See paragraph 2-57 for more information about the theater tactical signal brigade. THEATER ARMY 2-47. The theater army is the Army Service component command to a geographic combatant command. The theater army headquarters— * Exercises administrative control of all Army forces in the geographic combatant command area of responsibility. * Integrates Army forces into theater engagement plans. * Provides Army support to joint, interorganizational, and multinational forces, as directed by the geographic combatant commander. 2-48. The theater army main command post conducts routine day-to-day operations and crisis action planning. With augmentation, the contingency command post can deploy to conduct small-scale operations, commanding up to two brigade combat teams or equivalent for up to 30 days. 2-49. The theater army is designated as the DOD executive agent for setting and supporting the theater communications and network architecture. The theater army executes these executive agent responsibilities primarily through a signal command (theater) [SC(T)] assigned to support the area of responsibility (ATP 3-93). Each Service component in a joint task force maintains its own networked communications infrastructure, compatible with the other unified action partners. The J-6 exercises staff oversight over the Service component systems in the joint force. The Service components may need to provide staffing or equipment augmentation for the joint task force J-6 section.
6-02
48
Chapter 2 Theater Army G-6 2-50. The theater army G-6 plans, prioritizes, and coordinates communications and automated information systems requirements to support Army units in a theater of operations. The G-6 integrates information systems support to geographic combatant commander-designated joint, interorganizational, and multinational partners. The G-6 assesses the network’s ability to meet the commander’s requirements and develops relevant parts of operation orders, operation plans, and concept plans. The theater army G-6 validates communications and information systems requirements and urgent operational needs statements for Army units in theater, and makes recommendations for resourcing. * Headquarters section. Supervises planning, requirements development, and information management policy for information systems support for the theater army headquarters and Army forces in theater. * Operations section. G-6 operations coordinates with military and civil communications authorities of the host nation and integrates information systems support to geographic combatant commander-designated joint, interorganizational, and multinational partners. The operations section validates information system requirements and service requests to support Army forces in theater. The section develops information system requirements to support Army and joint exercises, and plans, implements, and analyzes information system requirements for the headquarters.  COMSEC account manager. The COMSEC account manager maintains the theater army headquarters COMSEC account, establishes COMSEC operations policies, and enforces policies in the theater army area of operations. The COMSEC account manager also provides user-level training on COMSEC material management and accountability.  Spectrum element. The spectrum element coordinates with other spectrum managers to integrate Army and joint systems with the headquarters network. The element coordinates, manages, and apportions frequency assignments for land forces in theater. The spectrum manager coordinates with host-nation spectrum authorities to deconflict military use of the electromagnetic spectrum. * Programs, policy, and projects headquarters section. The programs, policy, and projects headquarters section of the main command post plans and controls the headquarters’ information management architecture and long-range modernization plans. The section tracks the status of the headquarters’ automated information systems and local area network. The section develops and justifies long-range financial plans, and conducts research and analysis to evaluate technology available to support user requirements.  Projects branch. The projects branch manages network initiatives and projects for the theater army headquarters. The branch manages intra-theater information system projects, programs, and initiatives and integrates commercial off-the-shelf communications and information systems into the theater network. The branch coordinates with national- and strategic-level information systems engineering activities to implement information technology initiatives in support of theater army operations and plans.  Cybersecurity branch. The cybersecurity branch establishes, manages, and assesses the headquarters’ cybersecurity program. The branch provides user-level cybersecurity awareness training to help secure the network infrastructure and oversees, assesses, and supports information technology systems accreditation according to the DOD risk management framework. Refer to DODI 8510.01 for detailed information about the DOD risk management framework.  Programs and policy branch. The programs and policy branch plans and controls theater army headquarters basing initiatives, information management architecture, and long-range modernization plans. The branch develops and justifies long-range financial plans that support users’ information system requirements.  Enterprise architecture branch. The enterprise architecture branch ensures compliance and interoperability of the Army information technology architecture within the theater, in support of the regional cyber center. The branch manages the theater portion of the Army information management program to support network-enabled, knowledge-based operations. The
6-02
49
Signal Support by Army Echelon, Core Competencies, Training, and the Army Network enterprise architecture branch also develops theater enterprise architecture and standards to ensure equipment, systems, and networks meet DOD, joint, Department of the Army and other applicable operational and doctrinal requirements. * Headquarters support section. The headquarters support section installs, operates, maintains, and secures video teleconferencing services and local area networks to support headquarters users, and protects headquarters information systems from cyberspace attack. The section defines requirements for communications, automated information systems, and services and manages the headquarters information systems automation life cycle replacement plan. * Joint and coalition network section. The joint and coalition network section plans, and coordinates the management of, joint functional computer systems—both hardware and software. The section integrates joint information systems with command post and sustainment information systems. The section develops the information management plan and maintains Global Command and Control System (Army and joint) servers to provide the common operational picture for the theater army area of operations. The section represents the theater army on Army, joint, and multinational information management boards. The section also develops and maintains the concept of operations for multinational network information exchange, develops network architecture and support requirements for joint and multinational exercises, and plans implementation for new technologies. Signal Support 2-51. The theater army has no organic signal capabilities. The theater army headquarters receives its network and information services support from the local network enterprise center. If the theater army deploys a contingency command post, the command post receives signal support from theater-committed or rotational signal units. The theater Army G-6 identifies requirements, and the G-3 requests support through the geographic combatant commander to United States Army Forces Command. The pooled resources of a theater tactical signal brigade normally fulfill these communications requirements. See appendix E for more information about requests for signal support. FUNCTIONAL SUPPORT BRIGADES 2-52. A functional support brigade is a brigade or group that provides a single function or capability. These brigades can provide support for a theater, corps, or division, depending upon how each is tailored (FM 3-94). Functional support brigades receive their signal support either from the organic assets of the supported unit or from pooled assets, such as an expeditionary signal battalion or forward operating base infrastructure, as defined in the operation order. The supported unit assumes DODIN operations responsibility for the support brigade. Managing the network may require augmentation. 2-53. The support brigade S-6 coordinates with the supported unit’s G-6 (S-6) to define communications and network support requirements, based on the situation and mission. The operational chain of command validates requests for signal support they cannot source internally and forwards them to United States Army Forces Command for approval and resourcing. The signal support unit provides a communications package tailored to satisfy validated communications and information exchange requirements. JOINT TASK FORCES 2-54. Combatant commanders tailor task forces based on the commander’s vision, the concept of operations, the situation, and the mission. As an ad hoc headquarters, a joint task force has no organic capabilities. The commander, joint task force can task any force component to provide communications and network support for the headquarters. The commander, joint task force controls joint task force communications systems and networks through a joint network operations control center. Refer to JP 6-0 for more information about the joint network operations control center. 2-55. The Army component of the joint task force provides its own communications support using organic or pooled signal capabilities. The Army component of the joint task force is directly subordinate to the commander, joint task force or joint force land component commander, but under the administrative control of the theater army. The Army component headquarters has a dual DODIN operations reporting
6-02
50
Chapter 2 relationship—to the joint task force (through the joint network operations control center) and the theater army (through the regional cyber center). 2-56. The commander, joint task force exercises overall authority and responsibility for DODIN operations within the joint operations area. The theater army also provides guidance to Army forces through technical channels to ensure compliance with Army policies for DODIN operations. Refer to JP 3-33 for more information about joint task force operations. SIGNAL COMMAND (THEATER) 2-57. The SC(T) headquarters at its home station receives communications and information services support from its local network enterprise center. Forward deployed SC(T) staff elements receive network and information services support through an overseas installation’s network enterprise center or forward operating base infrastructure, or request communications support from theater-committed or rotational signal units through the geographic combatant commander to United States Army Forces Command. Note. In a theater with no assigned SC(T), the strategic signal brigade commander and staff or the tactical actions center assume the staff functions normally associated with the SC(T). TYPES OF SIGNAL UNITS LEVERAGED FOR SUPPORT 2-58. The Army’s global force pool includes echelons above core expeditionary signal units to support those units with no organic signal assets. Expeditionary signal units can also augment corps and below units when organic capabilities are not sufficient for an assigned mission. THEATER TACTICAL SIGNAL BRIGADE 2-59. The theater tactical signal brigade headquarters supervises building, configuration, operation, and maintenance of communications nodes, and secures these nodes, in the deployed portion of the network, excluding the division and corps systems. It also integrates interorganizational and multinational partners into the DODIN. The theater tactical signal brigade— * Allocates, controls, and positions tactical networking resources. * Oversees connection to the network for Army and designated joint, interorganizational, and multinational elements. * Provides physical security for, and actively defends, network resources. * Performs long-range planning for tactical network expansion and upgrade. * Enforces global (enterprise) and theater-level technical standards and policies for assigned tactical networking resources. * Conducts enterprise systems management and network management. * Conducts spectrum management operations for tactical signal forces in theater. * Exercises communications-electronics maintenance and logistical readiness oversight over subordinate elements. * Oversees contractor support operations and personnel. Expeditionary Signal Battalion 2-60. The expeditionary signal battalion is a fundamental building block of the Army’s global force pool. Most expeditionary signal battalions are theater available forces that can deploy for contingency or enduring missions. An expeditionary signal battalion consists of a headquarters company, two expeditionary signal companies, and a joint/area signal company. The battalion headquarters provides administrative and logistical support for the signal battalion. The battalion S-3 oversees designing, building, configuring, securing, operating, maintaining, and sustaining nodal and extension communications.
6-02
51
Signal Support by Army Echelon, Core Competencies, Training, and the Army Network 2-61. The expeditionary signal battalion supports Army units up to theater army, joint force land component commanders, or joint task force headquarters. It also manages tactical communications assets in the battalion through its suite of DODIN operations tools. The battalion headquarters provides these capabilities— * Staff planning and supervision of the battalion and any attached units. * Field maintenance support for the battalion headquarters. * COMSEC account management for the battalion. * Field maintenance of organic COMSEC equipment. Note. COMSEC repair authorities cannot be delegated. Typically, field maintenance of COMSEC is limited to preventive maintenance checks and services, inspection, detection, and correction of minor faults. Expeditionary Signal Company 2-62. The expeditionary signal company headquarters provides staff planning and supervision of its signal platoons and any augmenting elements, personnel, or material assets. The expeditionary signal company provides communications support in theater primarily for echelons above corps Army units. The expeditionary signal company may also support other units without organic signal capabilities or augment a unit’s organic capabilities. The expeditionary signal company also provides— * Wideband and protected satellite communications transport. * Beyond line of sight troposcatter network transport. * High-throughput line of sight transmission. * Telephone switching services. * DODIN operations tools to support network management within the company. * Cable, wire, and fiber optic installation and maintenance. * Access to DISN voice, data, and video services. * Field maintenance support for organic communications-electronics, COMSEC, automotive, power generation, and environmental control equipment. Joint/Area Signal Company 2-63. The joint/area signal company installs, operates, maintains, and secures large or medium command nodes to extend DISN services supporting Army and joint missions in a theater of operations. The company can also provide limited DISN services to support smaller command posts. This support includes line of sight and beyond line of sight network transport, network management, and cable and wire installation to provide garrison-quality data services to deployed users. The joint/area signal company primarily supports large headquarters command posts, such as a geographic combatant command, theater army, joint task force, or joint force land component command. The company can also support a limited number of battalion-sized command posts. This joint/area signal company provides— * Large command post support—DISN services. * High-throughput line of sight transmission. * Small command post support—limited DISN services. * DODIN operations tools to support network management within the company. * Troposcatter network transport to link large command posts, major headquarters, and signal nodes. * Wideband satellite communications transport. * Protected satellite communications connectivity between selected large and small node centers and remote command posts. * Cable and multiplexer assets to interconnect signal equipment. * Field maintenance and limited sustainment maintenance of organic communications-electronics and COMSEC equipment.
6-02
52
Chapter 2 SPECIAL-PURPOSE SIGNAL UNITS 2-64. The Army’s global force pool contains single-purpose signal units designed to concentrate low-density specialties. Units can request the specialized support these signal companies provide through their operational chain of command to United States Army Forces Command. Combat Camera Company 2-65. The combat camera (COMCAM) company provides visual documentation covering the Military Services in war, natural disasters, and training activities. The company provides still and motion imagery and video documentation to support intelligence and decision making. The COMCAM company provides— * Liaison to supported units, joint COMCAM teams, and other Service COMCAM elements. * Planning, coordination, and supervision of COMCAM documentation support missions. * COMCAM support for airborne operations (airborne COMCAM company only). * COMCAM support for ground, air assault, and amphibious operations. * Still photo (film and digital) and video editing, including rough editing for on-site customers. * Tailored still and motion media, graphics products, narration support, video reports, presentations, and visual imagery to support operational headquarters in the theater army, corps, and division areas of operation. * COMCAM equipment maintenance by on-site repair, replacement, or evacuation to civilian contractors. * Field maintenance of vehicles, power generators, environmental control units, and signal support systems. Tactical Installation and Networking Company-Enhanced 2-66. The tactical installation and networking company-enhanced provides network installation, troubleshooting, quality assurance testing, and handoff coordination to enable the transition from tactical to semi-permanent automation support. The company provides these capabilities to support theater army, geographic combatant command, SC(T), and joint task force or coalition headquarters: * Installation, maintenance, troubleshooting, testing, and repair of cable, wire, and fiber optic transmission systems. * Antenna and tower construction and repair. * Installation of automated information systems and services, including—  Local area networks.  Wide-area networks.  Network security hardware.  SIPRNET.  NIPRNET.  Video teleconferencing. 2-67. The tactical installation and networking company-enhanced headquarters performs these functions to support the unit’s mission: * Advice to supported commanders on all aspects of network installation, including inside and outside plant, local area networks, and wide-area networks. * Technical expertise to interpret and execute engineering implementation plans for communications systems. * Direction and technical expertise to cable and wire sections and teams to restore supported facilities. * Planning, coordination, configuration, and integration of network installation efforts.
6-02
53
Signal Support by Army Echelon, Core Competencies, Training, and the Army Network REQUESTING SIGNAL SUPPORT 2-68. A requesting unit’s G-6 (S-6) defines signal support requirements based on the mission, size of the operation, the number of personnel and systems, and services needed. Signal requirements are not static; they may change with the operational and mission variables. When defining requirements, the requesting unit describes— * The unit needing service and the number of connections needed for each requested service. * The services needed—NIPRNET, SIPRNET, voice, special circuits, and COMSEC key support. * The date-time group for required services. * The location for required services. * The supported unit battle rhythm for communications services. 2-69. Requests for signal support route through the operational chain of command to United States Army Forces Command for validation and resourcing. When supporting a division, the requesting unit’s S-6 and S-3 coordinate through the division G-6 to the theater army G-6 to identify and validate support requirements. Any unit not tasked to a division coordinates directly with the theater army G-6 to request signal support. 2-70. When the operation order identifies the supporting signal unit, the requesting G-6 (S-6) contacts that unit for coordination. The supporting signal unit provides the connection to DISN services, but does not provide computers, telephones, or local area network support. 2-71. Supporting signal assets may fall under the operational or tactical control of the supported unit. The supported unit may assume responsibility to provide logistics, personnel services, and health service support, based on the command relationship established in the deployment order. See appendix E for details about requests for signal support. SUPPORT TO OTHER ARMY OPERATIONS 2-72. Certain types of Army units have organic signal capabilities to support their unique missions. Some types of Army operations have specific communications requirements. Expeditionary signal units support these operations. SUPPORT TO ELECTRONIC WARFARE 2-73. Electronic warfare is military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or to attack the enemy (JP 3-13.1). The DODIN-A supports planning and coordination of EW activities. The unit’s DODIN operations personnel, spectrum manager, and G-6 (S- 6) staff perform key roles in EW planning. 2-74. The unit’s network and automated information systems support EW planning. Signal Soldiers provide the network for EW planners to— * Prepare electronic protection policy on behalf of the commander. * Prepare EW plans and orders. * Aggregate EW sensor data to detect enemy electronic attacks. * Report enemy electronic attack activity on friendly networks. * Help resolve issues with EW systems maintenance or interference with friendly communications. 2-75. The spectrum manager in the G-6 (S-6) coordinates electromagnetic spectrum use for communications and other electronic resources. Some units have spectrum managers in both the signal staff and the EW section. The spectrum managers support EW by— * Coordinating spectrum resources for the unit or task force. * Coordinating spectrum use with higher echelon G-6 (S-6), host-nation spectrum authorities, and international agencies, as necessary. * Preparing the restricted frequency list. * Issuing emissions control guidance.
6-02
54
Chapter 2 * Coordinating with the cyber electronic warfare officer for electromagnetic deception plans in which assigned communications elements participate. * Coordinating measures to reduce electromagnetic interference. * Coordinating with higher echelon spectrum managers to mitigate electromagnetic interference that cannot be resolved internally. * Helping the cyber electronic warfare officer issue guidance to deconflict and resolve interference between EW systems and friendly communications. * Participating in CEMA to deconflict friendly electromagnetic spectrum requirements with planned EW operations and information collection. SUPPORT TO INTELLIGENCE OPERATIONS 2-76. The deployed portion of the DODIN-A provides network transport for intelligence-unique automated information systems. These systems gather intelligence spanning all echelons and warfighting domains and enable operational visualization and situational awareness for current and future operations. These intelligence systems give commanders the ability to view joint intelligence, surveillance, and reconnaissance products in one place and integrates that information into tools that can support intelligence development. 2-77. With transport convergence (see paragraph 2-267), the deployed network also provides network transport for the top secret/sensitive compartmented information network to the brigade level. While the network transport takes place through the tactical signal systems, the G-2 (S-2) section continues performing DODIN operations for the top secret network. SUPPORT TO SPACE OPERATIONS 2-78. The Army relies on space-based capabilities and systems, such as global positioning, communication, weather satellites, and intelligence collection platforms. These systems are critical enablers used by the corps to plan, communicate, navigate, maneuver, maintain situational awareness, engage the enemy, provide missile warning, protect, and sustain forces (FM 3-14). One of the Army’s key space capabilities is satellite communications. Specially-trained signal Soldiers plan, manage, monitor, and control access to the Defense Satellite Communications System and Wideband Global Satellite Communications constellations (see paragraph 2-161). Refer to FM 3-14 for more information about Army space operations. Refer to ATP 6- 02.54 for more information about satellite communications. SUPPORT TO SPECIAL OPERATIONS 2-79. Army special operations forces require a secure and robust communications system to ensure the commander can exercise authority and direct forces over large geographic areas. Special forces and Rangers’ organic signal capabilities provide communications and network services tailored to their unique requirements. 2-80. Special operations communications networks include redundant transmission paths to prevent site isolation. Global communications support ensures Army special operations forces can communicate anywhere and at any time using strategic capabilities to the maximum extent possible, as well as commercial, tactical, and host-nation assets (ATP 3-05.60). Special Forces 2-81. The Army special operations forces location, mission, and structure drive specific information requirements and flow, processing requirements and the specific configuration of the communications system. Connectivity throughout the operational area is vital to planning, conducting, and sustaining operations. The communications system must be tactically agile and globally deployable with consideration made for communications that are en route, within the area of responsibility, and between the areas of responsibility (ATP 3-05.60). 2-82. The special operations communications system meets these unique requirements with a blend of standard Army communications capabilities, commercial off-the-shelf systems, and special operations forces-specific capabilities.
6-02
55
Signal Support by Army Echelon, Core Competencies, Training, and the Army Network Special Forces Group 2-83. Each special forces group has an S-6 with a supporting section located in the group headquarters and headquarters company, and a group signal detachment located within the group special troops battalion. Each special forces battalion has an S-6, with a supporting section located in the battalion headquarters and a battalion signal detachment located in the battalion support company (ATP 3-05.60). 2-84. The group S-6 prepares signal plans; conducts information management, spectrum management operations, and COMSEC management; and supports EW operations focusing on electronic protection. The special forces group’s organic signal capabilities include— * Wideband satellite communications. * Special operations forces-unique switching systems. * Tactical local area network—connected to either the DISN or the closed special operations forces network. * Mission command information systems. * Global Broadcast Service. * Narrowband (single-channel) satellite communications. * Single-channel radios. * Line of sight radios. * Satellite telephones. * International maritime satellite Broadband Global Area Network. 2-85. The battalion S-6 advises the commander on signal support, automation management, DODIN operations, and information security. The duties of the battalion S-6 are similar to the group S-6. Special forces battalion capabilities include— * Wideband satellite communications. * Special operations forces-unique switching systems. * Tactical local area network—connected to either the DISN or the closed special operations forces network. * Mission command information systems. * Narrowband (single-channel) satellite communications. * Single-channel radios. * International maritime satellite Broadband Global Area Network. 2-86. Special forces operational detachments A and B have organic narrowband satellite communications, single-channel radio, international maritime satellite Broadband Global Area Network, satellite telephone, and friendly force tracking capabilities. Special Operations Signal Battalion 2-87. The special operations signal battalion provides operational- and tactical-level communications to support joint and Army special operations forces. The battalion network operations and security center manages the Army special operations forces tactical network. 2-88. The special operations signal battalion provides these capabilities: * DODIN operations for the Army special operations forces network. * Planning, installing, operating, and maintaining the theater-level special operations forces wide- area network. * Classified and unclassified voice, video, and data communications to support early or forcible entry and sustained command post operations for United States Army Special Operations Command. The battalion can also perform this function to support a joint task force or joint special operations task force. * Reachback to special operations forces headquarters to support split-based operations. * Configuration management to maintain interoperability with the rest of the DODIN. * COMSEC account management and maintenance.
6-02
56
Chapter 2 * Field- and sustainment-level maintenance for organic signal equipment and automation systems. * Limited maintenance of special operations forces-unique signal equipment. * Communications support for airborne and airdrop operations. Rangers 2-89. The Ranger Regiment’s organic signal company deploys worldwide to install, operate, maintain, and secure the regiment’s communications and automated information systems. The Ranger Regiment signal company establishes secure networks to support the regiment’s operations and integrate with the Army force component of a joint force. The signal company provides local area network support for the company, the Ranger battalions, the Ranger Special Troops Battalion, and the Ranger Regiment. 2-90. The Ranger Regiment signal company provides— * Automated information systems support for maneuver, support, and command elements. * Tactical radio relay, retransmission, and beyond line of sight high frequency and single-channel satellite communications to extend networks. * Global Broadcast Service capability to receive high bandwidth imagery, logistics data, and digital map information to support command and control. * Field- and sustainment-level communications-electronics and COMSEC maintenance for the special troops battalion and supporting organizations. SUPPORT TO CYBERSPACE OPERATIONS 2-91. Cyberspace operations are the employment of cyberspace capabilities where the primary purpose is to achieve objectives in or through cyberspace (JP 3-0). The core cyberspace operations missions are— * DODIN operations. * Defensive cyberspace operations. * Offensive cyberspace operations. 2-92. Cyberspace actions support DODIN operations, defensive cyberspace operations, offensive cyberspace operations, or any combination thereof. Executing cyberspace actions at any echelon is dependent on authority, capability, and coordination. The cyberspace actions are interrelated. A cyberspace mission may require more than one action to achieve mission success. The cyberspace actions are— * Cyberspace defense. * Cyberspace intelligence, surveillance, and reconnaissance. * Cyberspace operational preparation of the environment. * Cyberspace attack. * Cyberspace security. 2-93. Signal support to cyberspace operations includes the tasks to establish the baseline security posture and operate the DODIN-A. Signal Soldiers perform DODIN operations to support both the joint and Army portions of cyberspace and take part in CEMA. 2-94. Cyberspace security actions are those taken within a protected network. Cyberspace security actions prevent unauthorized access to, an exploitation of, or damage to computers, electronic communications systems, and other information technology, including platform information technology. Cyberspace security actions help ensure the availability, integrity, authentication, confidentiality, and nonrepudiation of classified and other sensitive information. Cyberspace security is not specific to an enemy or adversary. Cyberspace security actions protect the networks and systems through all phases of network planning and implementation. Cyberspace security activities include vulnerability assessment and analysis, vulnerability management, incident handling, continuous monitoring, and detection and restoration capabilities to shield and preserve information and information systems (FM 3-12). Refer to FM 3-12 for more information about the other cyberspace actions.
6-02
57
Signal Support by Army Echelon, Core Competencies, Training, and the Army Network Department of Defense Information Network Operations 2-95. The cyberspace operations mission of DODIN operations is primarily a signal support function. Department of Defense information network operations are operations to secure, configure, operate, extend, maintain, and sustain Department of Defense cyberspace to create and preserve the confidentiality, availability, and integrity of the Department of Defense information network. (JP 3-12). DODIN operations functions include routine activities to operate the network and establish the baseline cybersecurity framework. Support to Defensive Cyberspace Operations 2-96. Defensive cyberspace operations are missions to preserve the ability to utilize blue cyberspace capabilities and protect data, networks, cyberspace-enabled devices, and other designated systems by defeating on-going or imminent malicious cyberspace activity (JP 3-12). Most defensive cyberspace operations tasks at corps and below focus on enabling friendly command and control and fires while protecting the DODIN. Adversaries and enemies continuously seek to gain an advantage by penetrating friendly networks to disrupt operations. Army units conduct defensive cyberspace operations to prevent, detect, identify, and respond to anomalous or unauthorized activity, intrusions, or attacks against the DODIN and other networks when authorized. Defensive Cyberspace Operations-Internal Defensive Measures 2-97. Defensive cyberspace operations-internal defensive measures are operations in which authorized defense actions occur within the defended portion of cyberspace (JP 3-12). Most defensive cyberspace operations missions are defensive cyberspace operations-internal defensive measures, which include pro- active and aggressive internal threat hunting for advanced and/or persistent threats, as well as the active internal countermeasures and responses used to eliminate these threats and mitigate their effects (JP 3-12). Defensive cyberspace operations-internal defensive measures are responses to unauthorized activity, alerts, or threat information within the defended network. Defensive cyberspace operations-internal defensive measures leverage intelligence, counterintelligence, law enforcement, and other military capabilities, as required. 2-98. For compromised DODIN elements, specific tactics include rerouting, reconstitution, restoration, or isolation. To defend cyberspace, signal personnel work to detect, analyze, and respond to unauthorized activities not mitigated by cybersecurity measures. United States Army Cyber Command (ARCYBER) is the Army lead for defensive cyberspace operations-internal defensive measures. Cyberspace defenders and DODIN operations personnel apply mitigation measures recommended by cyber protection teams. Defensive Cyberspace Operations-Response Actions 2-99. Defensive cyberspace operations-response actions are operations that are part of a defensive cyberspace operations mission that are taken external to the defended network or portion of cyberspace without the permission of the owner of the affected system (JP 3-12). Because the actions occur outside the DOD network, defensive cyberspace operations-response actions are subject to legal constraints and restraints. Defensive cyberspace operations-response actions require authorization according to standing and supplemental rules of engagement. To support response actions, signal personnel help identify key terrain in cyberspace during CEMA. Security logs collected as part of DODIN operations help identify threat actions and feed planning for defensive cyberspace operations-response actions. Signal Soldiers and units provide the network (the DODIN-A) used for defensive cyberspace operations-response actions planning and targeting requests. Support to Offensive Cyberspace Operations 2-100. Offensive cyberspace operations are cyberspace operations intended to project power by the application of force in or through cyberspace (JP 3-12). Army units plan, synchronize and integrate offensive cyberspace operations to create effects supporting commanders’ objectives. Signal Soldiers and units provide the network (the DODIN-A) used for offensive cyberspace operations targeting requests.
6-02
58
Chapter 2 Synchronizing Department of Defense Information Network Operations and Defensive Cyberspace Operations 2-101. Defensive cyberspace operations and DODIN operations share a common objective of a secure network. DODIN operations tasks are network-focused. Cybersecurity sets the baseline security posture of the network to protect against known exploits and vulnerabilities, rather than a particular threat actor or capability. The cybersecurity workforce attempts to mitigate all vulnerabilities of their assigned network or systems. Cybersecurity uses available intelligence about specific threats to improve the network’s security posture. 2-102. By contrast, defensive cyberspace operations are mission-focused and threat-specific. Defensive cyberspace operations missions involve deliberate measures to counter a specific threat attack, exploitation, or malware that has breached security measures. Defensive cyberspace operations leverage information from intelligence, counterintelligence, law enforcement, and other sources, as required. Cyberspace Electromagnetic Activities 2-103. Commanders and staffs face the challenge of enabling joint, interorganizational, and multinational collaboration and assuring access to critical data and information networks in increasingly congested and contested cyberspace and electromagnetic spectrum environments, while simultaneously denying the same to the enemy. Operating in the congested and contested information environment requires commanders and their staffs to synchronize signal, cyberspace, and EW capabilities through CEMA. Cyberspace electromagnetic activities is the process of planning, integrating, and synchronizing cyberspace and electronic warfare operations in support of unified land operations (ADP 3-0). 2-104. CEMA integrates— * Cyberspace operations.  DODIN operations.  Defensive cyberspace operations.  Offensive cyberspace operations. * EW.  Electronic attack.  Electronic protection.  Electronic warfare support. * Spectrum management operations. 2-105. Because the hybrid threat integrates information warfare capabilities in these areas, U.S. forces must similarly coordinate their defenses. Attempting to conduct signal, cyberspace, and EW activities in isolation makes them more vulnerable. Synchronizing these activities through CEMA ensures coordinated defense and counter-offense against threat information warfare activities. 2-106. To support CEMA at the theater army level and below, the G-6 (S-6) staff and spectrum manager integrate DODIN operations and spectrum management actions. They also coordinate to synchronize these actions with mutually supporting capabilities residing in the G-2 (S-2) and G-3 (S-3) sections. 2-107. Signal, cyberspace, and EW missions share certain areas of potential overlap. Each has its own set of threat and performance indicators. Synchronizing signal, cyberspace, and EW missions and tasks strengthens all of them beyond their inherent capabilities. 2-108. Shared awareness between signal, cyberspace operations, EW, and intelligence elements improves situational understanding and identifies opportunities for mutual support between the capabilities. The CEMA section coordinates to deconflict spectrum use between signal and EW elements. Deconfliction ensures EW capabilities do not create unintended electromagnetic interference (frequency fratricide) with friendly communications, unmanned aircraft systems, weapon systems, or positioning, navigation, and timing. Failing to share situational understanding could cause planners or operations personnel to miss indicators of a cyberspace or electronic attack. The EW section can plan and execute electronic attack and electronic protection actions to support signal capabilities.
6-02
59
Signal Support by Army Echelon, Core Competencies, Training, and the Army Network 2-109. Synchronizing signal, cyberspace, EW, and intelligence capabilities is especially important when planning for, or operating against, a peer threat. Refer to FM 3-12 for more information about cyberspace operations and CEMA. Refer to ATP 3-12.3 for more information about EW techniques. Cyberspace Workforce Management 2-110. DOD policy unifies the cyberspace workforce to align, manage, and standardize roles, qualifications, and training requirements for— * Cyberspace effects elements. * Cybersecurity elements. * Cyberspace information technology elements. * Intelligence workforce (cyberspace). 2-111. Personnel in the cyberspace workforce must meet minimum qualifications based on their respective cyberspace roles. While the policy standardizes the workforce requirements, the Joint Staff, combatant commands, and Services base their operational employment decisions on mission requirements. Refer to DODD 8140.01 for more information about cyberspace workforce management. ENABLING INFORMATION AND KNOWLEDGE MANAGEMENT 2-112. It is essential that the joint communications system complement human capabilities and reduce or eliminate anticipated or known limitations to mission accomplishment (JP 6-0). Improved technology in mobility, weapons, sensors, and communications generates large amounts of data with which to establish situational understanding. However, the volume of data can overwhelm planners and decision makers, leading to poor decisions. For the data to be useful, staffs need to process and analyze it into relevant information and knowledge so the commander and staff can achieve understanding. 2-113. Information, as an element of combat power, includes both the combat information necessary to gain understanding and make decisions and the use of information to dominate the information environment. Information enables commanders at all levels to make informed decisions on how best to apply combat power. Well-managed information and knowledge lead to a distinct information advantage. Through information and knowledge management, the right information gets to the right people to support better decision making. Information Management 2-114. Information management is the science of using procedures and information systems to collect, process, store, display, disseminate, and protect data, information, and knowledge products (ADP 6-0). Information management helps commanders make and disseminate effective decisions faster than the enemy can. Signal personnel conduct information management. They perform these information management tasks to enable knowledge management: * Application and database administration. * Data backup and migration. * Website interface maintenance. * Troubleshooting. * Security. * Configuration. * Providing network architecture and technological tools to support content management and content sharing. * Providing DODIN operations and information management support through the G-6 (S-6) section. Knowledge Management 2-115. Well-managed information enables knowledge management. Knowledge management is the process of enabling knowledge flow to enhance shared understanding, learning, and decision making (ADP 6-0). Knowledge management enables commanders to make informed, timely decisions despite the uncertainty of
6-02
60
Chapter 2 operations. Knowledge management aligns an organization’s people, processes, and tools to distribute knowledge and promote shared situational understanding. 2-116. Signal Soldiers assigned to the knowledge management section ensure the information technology network supports knowledge creation and uses automated knowledge management tools. Some signal Soldiers serve in the knowledge management section. Their responsibilities include providing software developer capability support. Refer to ATP 6-01.1 for more information about knowledge management. SUPPORT TO INFORMATION OPERATIONS 2-117. Information operations are the integrated employment, during military operations, of information- related capabilities in concert with other lines of operation to influence, disrupt, corrupt, or usurp the decision- making of adversaries and potential adversaries while protecting our own (JP 3-13). Some information- related capabilities (COMCAM, satellite communications, and DODIN operations) are Signal Corps functions. 2-118. The DODIN-A provides a platform to plan information operations and synchronize information- related capabilities globally across all echelons and organizations in near real-time. Security and defense of the DODIN-A through cybersecurity and defensive cyberspace operations provide a layer of defense against threat information warfare capabilities. SUPPORT TO AVIATION OPERATIONS 2-119. Combat aviation brigades have organic signal Soldiers and capabilities to support deployed forces (see paragraph 2-31). These organic capabilities connect the brigade and battalion command posts to the DODIN-A. 2-120. The DODIN-A also provides network transport for aviation-specific automated information systems. These systems integrate air and ground operations, facilitate civil and interagency airspace coordination, and provide joint interoperability with the joint force air component commander. Interoperable single-channel radio systems enable coordination with ground troops for close air support and medical evacuation. SUPPORT TO PORT OPERATIONS 2-121. The theater army G-6 coordinates with the geographic combatant commander to support communications for the harbormaster detachment. The harbormaster detachment coordinates and synchronizes vessel operations. When the detachment arrives, it establishes the satellite communications transport, automated information systems, weather data sensors, and the radio communications necessary to control port operations. Refer to ATP 4-15, for more information about port operations. BASE CAMP COMMUNICATIONS 2-122. The communications and network support a unit receives in a base camp are similar to the services the network enterprise center provides at their home station. Signal planners determine a base camp’s communications requirements based on its size, level of capabilities, and purpose. Tenant and transient units determine their signal requirements based on their operational needs. 2-123. When a G-6 (S-6) or signal unit supports a base camp, the G-6 (S-6) coordinates with the base camp commander to identify communications requirements, including local area network and wide-area network support, DISN services, communications-electronics maintenance, and communications augmentation, as necessary. Refer to ATP 3-37.10 for more information about base camp support. DEFENSE SUPPORT OF CIVIL AUTHORITIES AND HOMELAND DEFENSE 2-124. The unique capabilities of Army signal systems enable expeditionary signal units to rapidly deploy to support various other contingency or crisis mission requirements. Military communications systems include joint interoperability as a design consideration. However, most communications systems developed for combat are incompatible with civilian systems, unless the military provides specialized connections.
6-02
61
Signal Support by Army Echelon, Core Competencies, Training, and the Army Network 2-125. Signal elements may need to interconnect with various military and commercial communications systems. Compatibility issues may limit the availability of secure communications. The use of disparate communications systems among mission partners introduces additional planning requirements for defense support of civil authorities and homeland defense missions. 2-126. Differing systems, use of allocated civilian and military bandwidth, and limited interoperability complicate collaborative incident management. Signal elements supporting defense support of civil authorities and homeland defense missions collaborate and interoperate with joint and interorganizational partners. These partners include other Military Services and Departments, state and Federal Government agencies, local authorities, and non-governmental organizations. Defense Support of Civil Authorities 2-127. Army support of civil authorities is a vital aspect of the Army’s service to the Nation and a way it maintains trust with citizens (ADP 3-28). The skills that allow Soldiers to accomplish their missions on battlefields can support local, state, tribal, and federal civil authorities, especially when domestic emergencies overwhelm the ability of local government agencies to respond adequately. During defense support of civil authorities, the DOD serves in a supporting role to the Federal Emergency Management Agency and other federal agencies. 2-128. Because not all mission partners can access the DODIN, signal elements tasked for these missions need to interoperate with commercial communications systems. The DODIN-A and DOD gateway can provide connections to the commercial Internet and commercial telephone service for collaboration with non- DOD mission partners. 2-129. Army National Guard units activated under state control (state active duty or Title 32) operate under a separate chain of command from active duty task forces and National Guard troops under federal control (Title 10). Communications interoperability between these forces enables better coordination between the separate chains of command. 2-130. Local communications infrastructure may be inoperable or unreliable after a natural or man-made disaster. The lack of land-based and wireless communications hampers emergency management and first responder operations. Signal units routinely deploy to provide communications and DISN services in austere environments. The same expeditionary capabilities are ideally suited to establishing emergency communications in areas with damaged infrastructure. Because these units have organic power generation equipment, they can establish communications before the commercial power grid is restored, though they need fuel and other logistical support. Expeditionary signal units can provide— * Emergency restoral of first responder communications. * Command post communications—voice, data, and video teleconferencing. * Network connectivity to disseminate the common operational picture. * Communications to coordinate logistical support. * Connection to civilian communications infrastructure to interoperate with emergency responders and nongovernmental organizations. * Communications to areas outside the disaster zone. Homeland Defense 2-131. The DOD is the primary federal agency for homeland defense. The strategy for homeland defense protects U.S. territory against attack by state and non-state actors through an active, layered defense. This strategy aims to deter and defeat aggression abroad while protecting the homeland. The Army supports this strategy with capabilities in the forward regions of the world, in the geographic approaches to U.S. territory, and within the U.S. homeland. Army signal elements may provide communications to support missions protecting U.S. sovereignty, territory, domestic population, and critical defense infrastructure against external aggression or other threats, as directed by the President. 2-132. Strategic signal capabilities contribute to the United States’ day-to-day defensive posture by supporting attack warning and assessment, enabling situational understanding, and helping secure the
6-02
62
Chapter 2 cyberspace domain. Both fixed station and expeditionary signal capabilities enable homeland defense operations in the land, air, maritime, space, and cyberspace domains. 2-133. During a homeland defense operation, civil authorities continue to operate and perform many of their routine functions. While homeland security activities of some interagency partners sometimes overlap with homeland defense activities, major military activities are the responsibility of the DOD. Interagency mission partners cannot perform these activities, but their support is essential for mission success. 2-134. Unity of effort among all homeland defense participants is fundamental and essential (JP 3-27). For this reason, homeland defense operations in the United States often require connections to the civilian communications infrastructure to interoperate with various state and federal agencies and nongovernmental organizations. Planners consider joint and interorganizational interoperability as early as possible in the planning process. Note. The Department of Homeland Security is the lead federal agency for security and defense of civilian U.S. Government cyberspace within the United States. SIGNAL-ENABLING COMMANDS AND STAFFS 2-135. Signal-enabling commands and staffs support the DODIN-A as a global enterprise network. These entities develop signal capabilities, establish policy and guidance, perform DODIN operations, provide strategic infrastructure, and secure the DODIN-A. These commands, staffs, and agencies support the strategic support area, extend the network to tactical units, and preserve the Army’s ability to operate in cyberspace. CHIEF INFORMATION OFFICER/G-6 2-136. The Chief Information Officer (CIO)/G-6 is the principal staff assistant and advisor to the Secretary of the Army for information management, information technology, and their effects on warfighting capabilities. The CIO/G-6 is also the force modernization proponent for information management (AR 5-22). 2-137. The CIO/G-6 establishes policy for Army use of information technology systems and networks. This responsibility includes evaluating existing Army information management and information technology policies and overseeing their implementation. The CIO/G-6 sets the strategic direction for, and supervises the execution of, Army information management programs and policy. These programs and policies include network architecture, information sharing policy, cybersecurity policy, the Army cybersecurity program, resource management, process modernization, and synchronization of the Army’s network activities. The CIO/G-6 exercises Headquarters, Department of the Army oversight to ensure compliance with federal statutes for information technology reform (The Clinger-Cohen Act). UNITED STATES ARMY CYBER COMMAND 2-138. ARCYBER is the Army Service component command to United States Cyber Command. ARCYBER is the primary Army headquarters responsible for cyberspace operations to support joint requirements. ARCYBER is the single point of contact for reporting and assessing cyberspace incidents, events, and operations in Army networks and for synchronizing and integrating Army responses. When directed, ARCYBER conducts offensive and defensive cyberspace operations to support other Army operations, ensure U.S. and allied freedom of action in cyberspace, and deny the same to adversaries and enemies. ARCYBER provides appropriate-level interactions both as a supported and as a supporting commander to Army commands, other Army Service component commands (including theater armies), direct reporting units, and joint, interorganizational, and multinational elements. Army Cyber Operations and Integration Center 2-139. The Army Cyber Operations and Integration Center is an operational element of the ARCYBER headquarters. It is the top-level control center for Army cyberspace activities. The Army Cyber Operations and Integration Center provides situational understanding for Army networks and situational awareness of the wider DODIN. The Army Cyber Operations and Integration Center also provides worldwide operational
6-02
63
Signal Support by Army Echelon, Core Competencies, Training, and the Army Network and technical support across the strategic, operational, and tactical levels, in coordination with the theater armies. The Army Cyber Operations and Integration Center directs the regional cyber centers through operational channels. The Army Cyber Operations and Integration Center interfaces with the functional network operations and security centers, and coordinates with other Service and agency DODIN operations centers, through technical channels. 2-140. The Army Cyber Operations and Integration Center analyzes threat information and directs network security actions through the regional cyber centers, in coordination with the theater armies. The Army Cyber Operations and Integration Center develops technical solutions to secure Army networks and helps Army units and regional cyber centers implement cybersecurity policy. Refer to ATP 6-02.71 for more information about the Army Cyber Operations and Integration Center. United States Army Network Enterprise Technology Command 2-141. United States Army Network Enterprise Technology Command (NETCOM) is the Army’s global enterprise network service provider. NETCOM is subordinate to ARCYBER, provides global DODIN operations oversight, and performs inter-theater DODIN operations functions to ensure interoperability across the DODIN-A. NETCOM enforces Army-wide standards established by the CIO/G-6 to preserve joint, interorganizational, and multinational interoperability. 2-142. NETCOM integrates Army information technology to achieve a single, virtual enterprise network. NETCOM enforces service delivery activities, cybersecurity policies, processes, procedures, and protocols for operation of Army networks. To ensure unity of effort in DODIN operations, NETCOM has direct liaison authority to the CIO/G-6, with notification to ARCYBER. 2-143. NETCOM manages the DODIN-A, including enforcing technical standards, and configuration management. NETCOM is the single entry point to submit validated, approved telecommunications requirements for coordination and implementation by the Defense Information Systems Agency. 2-144. NETCOM manages the administration of amateur radio operations and the Army Military Auxiliary Radio System program pursuant to AR 25-6 and provides COMCAM support for theater army and joint military operations. NETCOM manages and services spectrum-related requirements for Army installations in accordance with U.S., DOD, Army, host-nation, and international spectrum regulations, policies, and technical standards. Signal Command (Theater) 2-145. The SC(T) is a subordinate command of NETCOM which provides oversight, leadership, and technical direction over the theater network. The SC(T) provides DODIN operations and spectrum management support across the theater. The SC(T) provides these capabilities— * Centralized management of Army data, voice, and video networks, including interfaces with joint, interorganizational, and multinational systems in the theater. * Enforcement of global cybersecurity policies to support the geographic combatant commander and theater army commander. * Oversight of units building, configuring, securing, operating, and maintaining signal support systems and network interfaces to joint and multinational partner systems in theater. * Establishment of mission priorities to ensure DODIN-A capabilities are available to meet commanders’ information requirements. Regional Cyber Center 2-146. The regional cyber center is the single point of contact for Army network services, operational status, service provisioning, service interruption resolution, and service restoral in its operational area. The regional cyber center is responsible for intra-theater communications, with a focus on tactical communications support. The regional cyber center supports the strategic network by providing DODIN operations oversight for up to eight network enterprise centers. The regional cyber center provides network status information to the Defense Information Systems Agency’s enterprise operations center and the Army Cyber Operations and Integration Center. The regional cyber center may also provide network status to other Service component
6-02
64
Chapter 2 DODIN operations centers to enable shared situational understanding. The regional cyber centers perform the same functions in all theaters. 2-147. The regional cyber centers’ operational areas and core missions align with the theater and field army commanders’ operational areas: * United States Army Regional Cyber Center-CONUS (continental United States and South). * United States Army Regional Cyber Center-Europe (Europe and Africa). * United States Army Regional Cyber Center-Korea. * United States Army Regional Cyber Center-Pacific. * United States Army Regional Cyber Center-Southwest Asia. 2-148. The regional cyber center performs or coordinates DODIN operations tasks that span the theater or multiple theaters. Centralizing high-level tasks provides consistent service among regions by performing the operational function at the only location with visibility or awareness of multiple regions. 2-149. The regional cyber center is under operational control of the Army Cyber Operations and Integration Center directs for DODIN operations, defensive cyberspace operations-internal defensive measures, network vulnerability assessment, and incident management within the theater. The regional cyber center collaborates with the Army Cyber Operations and Integration Center to— * Coordinate threat assessments and support to multi-agency vulnerability assessments with the supporting counterintelligence element. * Develop countermeasures and defensive cyberspace operations strategies. * Conduct attack signature sensing and warning analysis. * Develop mitigation strategies to support network defense and prevent data loss, including spillage. Spillage is a security incident that results in the transfer of classified information onto an information system not authorized to store or process that information (CNSSI 4009). An example of spillage is SECRET data on NIPRNET. * Conduct the computer defense assistance program to support commanders in theater. The computer defense assistance program includes penetration testing, network assistance visits, and network damage assessments. Tactical Actions Center 2-150. The NETCOM tactical actions center provides enterprise network engineering, planning, operations, and cybersecurity support within a theater of operations that has no assigned SC(T). The tactical actions center provides strategic and tactical planning, operations, and cybersecurity support to meet inter-theater communications requirements. The tactical actions center is the in-theater lead for planning, engineering, and executing NETCOM projects and operations. Strategic Signal Brigade 2-151. Strategic signal brigades provide operational and strategic support area signal support to serve warfighters in a theater of operations. This support includes long-haul transport, communications infrastructure, automation, and network management. The strategic signal brigade provides— * Operational direction through technical channels to the network enterprise center in provisioning services. * Access to the DODIN-A for fixed station Army assets within its theater. * Gateway access to the DODIN-A for expeditionary Army units. * Advice to commanders, staff, and users on the capabilities, limitations, and employment of communications, network, and automated information system assets. * Advice to supported commanders and staff on information management, automation policy, technical matters, and system performance. * Input to all-source intelligence assessments and estimates concerning the DODIN-A at the operational and strategic levels.
6-02
65
Signal Support by Army Echelon, Core Competencies, Training, and the Army Network 2-152. Outside the continental United States, the strategic signal brigade provides communications planning and command and control for an assigned expeditionary signal battalion. This allows the strategic signal brigade to meet contingency and emerging tactical communications support requirements in theater without going through the lengthy request for forces process. Strategic Signal Battalion 2-153. Strategic signal battalions are regionally based signal elements. They manage communications infrastructure in their geographical areas and configure, secure, operate, and maintain network facilities to support strategic signal brigade, SC(T), and NETCOM missions. The battalion headquarters supports the unit’s mission through— * Staff planning and operational supervision of assigned companies and teams. * Supervision of signal support, communications, automation, and visual information. * Planning, engineering, and technical control of strategic communications systems. 2-154. The strategic signal battalions’ equipment and personnel authorizations support unique mission sets, based on the battalion’s location and function. Most of their subordinate elements operate and maintain equipment at fixed locations. The capabilities a strategic signal battalion may provide include— * Long-haul, inter-theater satellite communications transport. * Regional hub node to extend DISN services to deployed expeditionary units. * Fixed station microwave transport. * Technical control facilities. * Geographic combatant commander communications support. * Data centers. * Installation-level DODIN operations (network enterprise center). * Connectivity to DISN services, including NIPRNET, SIPRNET, Defense Red Switched Network, Defense Switched Network, Organizational Messaging Service, video teleconferencing, and local telephone exchange services (network enterprise center). * COMSEC material issue and management. * COMSEC equipment maintenance. * Installation and maintenance of copper and fiber optic cable systems and related equipment. Expeditionary Signal Battalion (Theater-Committed) 2-155. Some strategic signal brigades outside the continental United States also have an expeditionary signal battalion assigned so they can support the entire range of military operations. These battalions and their companies are theater-committed, not part of the global rotational force pool. A theater-committed expeditionary signal battalion has the same capabilities and functions as a rotational unit, but it usually supports only its assigned theater. See paragraph 2-58 for detailed capabilities of an expeditionary signal battalion. Network Enterprise Center 2-156. The network enterprise center provides overall DODIN operations, and is responsible for information management, information technology management, and telecommunications services on its post, camp, or station, or within its designated service area. Network enterprise centers coordinate, plan, program, and execute electromagnetic spectrum management on their installation (ATP 6-02.70). Network enterprise centers collaborate with external organizations to ensure proper operation of the installation-level components of DOD or Army networks and information systems. The network enterprise center’s DODIN operations responsibilities include—
6-02
66
Chapter 2 * Managing support functions for customer access to the installation network and information systems infrastructure. * Coordinating support and problem resolution for physical networks and information technology equipment on the installation, or within the network enterprise center’s designated service area. * Representing supported units in recommending changes to the DODIN, based on lessons and best practices. * Implementing DOD and industry best practices, according to DOD, Army, and SC(T) guidance. * Establishing local policies and procedures for networks and information systems within its service area. * Establishing individualized service level support agreements between tenant units and the SC(T). * Coordinating with the strategic signal battalion to manage inter-installation networks affecting supported organizations. * Managing the installation cybersecurity program. * Managing the activities, functions, and capabilities of the network and information systems resources within its service area, according to direction from the SC(T) and regional cyber center. * Assessing the mission impact of outages, DODIN operations incidents, and other network issues and reporting to the regional cyber center. UNITED STATES ARMY COMMUNICATIONS-ELECTRONICS COMMAND 2-157. United States Army Communications-Electronics Command provides worldwide life cycle sustainment and equipment readiness support. The command also provides training support and on-site logistics assistance to units at their home stations inside and outside the continental United States and deployed units. Sustainment Maintenance Support 2-158. United States Army Communications-Electronics Command provides sustainment maintenance for communications-electronics systems. Sustainment maintenance consists of depot maintenance and below depot maintenance. See appendix C for more information about depot and below depot sustainment maintenance. Communications Security Support 2-159. The Communications Security Logistics Activity is the Army commodity manager for COMSEC materiel. The Communications Security Logistics Activity acquires, distributes, and provides logistical support for COMSEC equipment, cryptographic keying material, and other encryption products for Army users. UNITED STATES ARMY SPACE AND MISSILE DEFENSE COMMAND/ARMY FORCES STRATEGIC COMMAND 2-160. United States Army Space and Missile Defense Command/Army Forces Strategic Command engineers, operates, and provides technical expertise for its assigned satellite systems, including Wideband Global Satellite Communications. The United States Army Space and Missile Defense Command/Army Forces Strategic Command G-6 is the designated DOD satellite communications systems expert for— * Wideband satellite communications. * Narrowband satellite communications. * Wideband Global Satellite Communications. * Defense Satellite Communications System. * Global Broadcast Service. * Mobile User Objective System.
6-02
67
Signal Support by Army Echelon, Core Competencies, Training, and the Army Network Regional Satellite Communications Support Center 2-161. United States Army Space and Missile Defense Command/Army Forces Strategic Command operates the regional satellite communications support centers. The regional satellite communications support centers are geographically distributed, multi-Service organizations. The regional satellite communications support centers provide planning, engineering, and satellite payload management for all military satellite communications systems. The regional satellite communications support centers’ staffing includes personnel from the Army, Navy, Air Force, and the Defense Information Systems Agency. 2-162. The regional satellite communications support centers provide 24-hour satellite communications resources, systems engineering, and modeling support. The regional satellite communications support centers analyze requirements and develop solutions to support users in day-to-day management of satellite communications resources allocated for the combatant command. They also process satellite access requests to authorize the use of space and ground terminal resources via satellite access authorizations. Signal Battalion (Satellite Control) 2-163. The signal battalion (satellite control) manages satellite communications networks and controls communications payloads on the Defense Satellite Communications System and Wideband Global Satellite Communications constellations. Signal Soldiers with specialized satellite network control training perform these missions. These centers enable satellite communications support for the President, Secretary of Defense, Chairman of the Joint Chiefs of Staff, Military Services, the Department of State, intelligence activities, combatant commanders, and selected allied forces during unified action. 2-164. The wideband satellite communications operations centers support Army operations by— * Monitoring and controlling use of Defense Satellite Communications System and Wideband Global Satellite Communications satellites networks.  Satellite link establishment.  Satellite link quality monitoring and maintenance.  Satellite link power management.  Satellite communications earth terminal monitoring.  Terminal positive control and subnetwork control. * Transmission and communications payload control of assigned Defense Satellite Communications System and Wideband Global Satellite Communications satellites.  Payload command and telemetry.  Electromagnetic interference detection and geolocation. 2-165. Refer to FM 3-14 for more information about Army space operations. Refer to ATP 6-02.54 for more information about the satellite control battalion and regional satellite communications support centers. SECTION II – CORE COMPETENCIES AND ESSENTIAL CAPABILITY OF THE SIGNAL CORPS DEPARTMENT OF DEFENSE INFORMATION NETWORK OPERATIONS 2-166. In the past, the Army and DOD have treated network operations as a task performed to manage the network. DODIN operations are not an individual or crew task, but multifaceted military operations that take place at all echelons. DODIN operations are arguably the most important and most complex operation the Army performs from day-to-day, since the network is the foundation for all other functions and capabilities, including command and control; joint intelligence, surveillance, and reconnaissance; precision fires; logistics; and telemedicine. 2-167. DODIN operations support both the generating and operational forces. DODIN operations ensure system and network availability, information protection, and information delivery to maintain freedom of
6-02
68
Chapter 2 action in cyberspace. Because they are so complex and have such wide-ranging impact on the information environment, DODIN operations require deliberate planning through the military decision-making process and coordinated execution through the operations process. 2-168. Effective DODIN operations make network-enabled operations possible. DODIN operations are a commander-focused activity. Signal staffs prepare DODIN operations plans and courses of action and commanders make the decisions. DODIN operations technical channels parallel the operational chain of command to maintain unity of command and unity of effort. This allows commanders to align available communications and network support to their highest mission priorities. DEPARTMENT OF DEFENSE INFORMATION NETWORK OPERATIONS TASKS 2-169. Achieving information superiority requires unity of effort in command, control, and management of the DODIN. As a practical matter, unity of effort is necessary due to the vast number of information technology resources required to support worldwide DODIN operations (JP 6-0). DODIN operations functions ensure availability and security of information technology resources and services and the information they provide. 2-170. Each of the Military Services performs DODIN operations to DOD-wide standards to ensure joint interoperability. Signal Soldiers control, secure, and manage the flow of information over DOD networks through DODIN operations. DODIN operations tasks are active measures implemented across the entire DODIN. Joint DODIN operations involve the employment of these essential joint tasks: * DODIN enterprise management is the technology, processes, and policies necessary to engineer, install, operate, maintain, and sustain DOD communications networks, information systems, and applications. Enterprise management merges information technology services with the DODIN operations capabilities. * Cybersecurity is prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation (DODI 8500.01). Cybersecurity policies are not specific to a threat actor. They establish the baseline security posture of the network and mitigate risks associated with known exploits and vulnerabilities to DOD information systems and computer networks. Cybersecurity provides the ability to monitor for, detect, and analyze unauthorized activity within DOD information systems and computer networks. * DODIN content management allows DODIN operations centers to optimize the flow and location of information over the DODIN by positioning and repositioning data and information services to optimum locations on the network relative to the information producers, information consumers, and mission requirements. 2-171. Shared network status across the DODIN is critical to situational understanding and decision making. Shared situational awareness and coordination between stakeholders on network events helps commanders and non-information technology staff understand the impact of DODIN operations on the information environment and the operational mission. Network situational awareness identifies cybersecurity policy violations and aids in network troubleshooting and restoral. Unusual network activity might provide the first indication of a cyberspace attack. Comprehensive network situational understanding, combined with current intelligence estimates, allows the CEMA section to synchronize signal capabilities with cyberspace and EW operations. 2-172. DODIN operations require centralized coordination because they have the potential to impact the integrity and operational readiness of the DODIN; however, execution is generally decentralized (JP 6-0). The Army conducts DODIN operations within the DODIN-A and in other DOD networks, as required. For this manual, the term DODIN operations refers to these activities on any DOD network. DEPARTMENT OF DEFENSE INFORMATION NETWORK OPERATIONS IN ARMY NETWORKS 2-173. DODIN operations provide integrated network visibility and end-to-end management of networks, applications, and services across the DODIN-A. Network visibility enables commanders to control and exercise command authority over their networks as they would other warfighting platforms.
6-02
69
Signal Support by Army Echelon, Core Competencies, Training, and the Army Network 2-174. DODIN operations personnel operate and secure the network to achieve information advantage supporting Army and joint missions. Unlike many missions considered successful at a defined completion date, DODIN operations are ongoing. The mission requires continuous support to achieve success. 2-175. DODIN operations allow commanders to employ network-enabled capabilities to shape and influence their areas of operations. For the Army, DODIN operations consists of three essential tasks: * Network management and enterprise systems management—install, operate, and maintain Army communications and computer networks, systems, and applications to achieve information advantage. Network management provides networked services with the desired quality and availability. Enterprise systems management provides day-to-day management of information systems, elements of systems, and services, including operating systems, databases, and end-user systems. Network management and enterprise systems management correspond to, and nest within, the joint task of DODIN enterprise management. * Cybersecurity—provides end-to-end protection to ensure data confidentiality, integrity, and availability, as well as protection against unauthorized access. The cybersecurity functions are— identify, protect, detect, respond, and recover. Organizations manage cybersecurity risk by organizing information, implementing the risk management framework, addressing vulnerabilities, and improving security by learning from past activities. Cybersecurity in the DODIN-A is the same as cybersecurity across the wider DODIN. * Information dissemination management and content staging—emplace, manage, provide, and restore information services to enable information and knowledge management. Information dissemination management supports effective knowledge management so the right information reaches the right users at the right time, in a usable format. Content staging compiles, catalogs, and caches information. The Army task of information dissemination management and content staging corresponds to, and nests within, the joint task of DODIN content management. Information dissemination management and content staging consist of the technologies, techniques, processes, policies, and procedures to provide warfighters—  Awareness of relevant, accurate information.  Automated access to newly revealed or recurring information.  Timely, efficient, delivery of information in a usable format.  The DODIN operations essential tasks take place at the strategic, operational, and tactical levels and support all warfighting and business functions. DODIN operations enable network and system availability, information protection, and timely information delivery across strategic, operational, and tactical boundaries.  Network and information system availability. Ensuring availability of system and network resources. This includes providing for continued operation in a degraded environment, self- healing, and eliminating critical failure points.  Information delivery. Providing required information to users, planners, and decision makers. DODIN operations personnel continuously monitor the network to ensure information transfer is timely and network throughput and performance meet user requirements. 2-176. Figure 2-2 on page 2-34 shows the DODIN operations critical tasks with their individual and combined effects. Network management and enterprise systems management (DODIN enterprise management) consist of steps to configure, allocate, process, connect, route, flow, account for, and maintain network capabilities. Information dissemination management and content staging (DODIN content management) allow users to retrieve, cache, compile, catalog, and distribute information to support planning and decision making. Cybersecurity provides the means to resist and recognize intrusions and to recover and reconstitute network capabilities. The net effect of integrating the three tasks is information advantage. Users get timely, protected information to meet their critical information requirements. Refer to ATP 6-02.71 for more information about DODIN operations in Army networks.
6-02
70
Chapter 2 Figure 2-2. Department of Defense information network operations components, effects, and objectives NETWORK TRANSPORT AND INFORMATION SERVICES 2-177. Network transport and information services encompass the combined physical assets and activities to ensure data reliably transverses the network. Network transport is the processes, equipment, and transmission media that provide connectivity and move data between networking devices and facilities. Information services enable planning, controlling, and manipulating information throughout its life cycle.
6-02
71
Signal Support by Army Echelon, Core Competencies, Training, and the Army Network 2-178. Network transport and information services connect users, automated information systems, and applications throughout the Army enterprise. Network transport connects networking hardware and carries data over distance to integrate local area networks and wide-area networks into the DODIN-A. Information services provide computing and networking capabilities to facilitate human interaction, staff integration, and interoperability with mission partners. When combined, network transport and information services enable the flow of data and information among applications, systems, and users. 2-179. The network connects geographically separated forces for network-enabled operations. By integrating information from across the operational area, Army forces can maintain more complete, relevant situational understanding. The integrated common operational picture allows commanders to employ the right capabilities, in the right place, at the right time to meet critical information requirements. NETWORK TRANSPORT 2-180. Network transport moves data between networking facilities. Globally prepositioned network transport capabilities extend access to DISN services worldwide to support Army operations. 2-181. The long-haul transport is the fixed backbone network provided by the Defense Information Systems Agency as part of the DISN interface. The fixed backbone network provides communications infrastructure for permanent installations and DOD Gateways as prepositioned connection points to connect deployed units to the DODIN. Network transport includes all data transmission capabilities that extend DISN access across the strategic, operational, and tactical levels. Key network transport capabilities are— * Satellite communications. * Line of sight and troposcatter systems. * Tactical radios and radio retransmission. * Copper wire and cable. * Fiber optics. 2-182. Network transport connects elements across all echelons, so the DODIN-A can operate as an integrated network. The network transport resources to connect the clients can belong to U.S. or non-U.S. forces, host nations, or commercial entities. Adequate network transport throughput capacity is critical to reliable cloud services, reachback, and the shift from locally-provided to enterprise services. Refer to ATP 6-02.54 for more information about satellite communications transport. Refer to ATP 6-02.53 for more information about tactical radios and radio retransmission. INFORMATION SERVICES 2-183. Information services allow access, storage, and sharing of information among mission partners, as well as dynamically tailoring and prioritizing information to support the mission and affect the operational environment. Information services allow commanders and Soldiers to collect, process, store, transmit, display, and disseminate information. Information services consist of— * Messaging services enable warfighters to exchange information among users. Messaging services include e-mail, Organizational Messaging Service, instant messaging, and alerts. * Discovery services enable warfighters to discover information content or services stored in directories, registries, and catalogs. An example of a discovery service is a search engine. * Mediation services enable system interoperability by processing data to translate, aggregate, fuse, or integrate it with other data. * Collaboration services provide the ability for warfighters to work together and share capabilities. Examples of collaboration services are chat, online meetings, and workgroup applications. * Storage services provide physical and virtual data hosting. Storage services include archiving, continuity of operations, and content staging. Standard operating procedures or operation orders should define information storage locations. * User assistance services provide centralized service desk assistance and automated access to lessons and best practices, which may improve processes or reduce the effort required to perform tasks.
6-02
72
Chapter 2 * Identity and access management (Enterprise Directory Service) provides authoritative enterprise identity and contact attributes for combatant commands, Services, and agencies. Enterprise Directory Service includes— * DOD Enterprise White Pages—authoritative identity and contact information for all DOD common access card holders. * Global Directory Service—a distribution point for personal public key certificates, certificate revocation lists, and certificate authority certificates. * Identity Synchronization Service—populates directories and global address lists with enterprise identity and contact attributes. 2-184. These services also support joint, interorganizational, and multinational collaboration. Information sharing allows the mutual use of information services or capabilities across functional or organizational boundaries. 2-185. Identity and access management services facilitate and control information sharing. Identity and access management assigns users common, portable identity credentials, such as a common access card or SIPRNET token. Users with the proper credentials can access and view operational, business support, or intelligence-related information, services, and applications related to their mission and communities of interest. Refer to ATP 6-02.71 for more information about information services. SPECTRUM MANAGEMENT OPERATIONS 2-186. Since a significant part of any communications system relies upon wireless transmissions, communications planners must consider access to the electromagnetic spectrum. Signal Soldiers support assured access through spectrum management operations. Spectrum management operations are the interrelated functions of spectrum management, frequency assignment, host nation coordination, and policy that together enable the planning, management, and execution of operations within the electromagnetic operational environment during all phases of military operations. Spectrum management operations enable access to the frequency spectrum to support Army operations. 2-187. Spectrum management includes operational, engineering, and administrative procedures to plan, coordinate, and manage use of the electromagnetic spectrum. Spectrum managers prioritize and deconflict operation of spectrum-dependent systems to prevent unacceptable interference. They may coordinate spectrum use with U.S. or host-nation military and civil authorities. Spectrum management includes enforcing frequency assignments while identifying and eliminating unauthorized use of the frequency spectrum. 2-188. Frequency assignment involves requesting and issuing authorization to use frequencies for specific equipment. This includes assigning frequencies for combat net radio networks, unmanned aircraft systems, and line of sight networks. Spectrum managers perform frequency assignment for all spectrum-dependent military equipment. 2-189. Host nation coordination is negotiation for authorization to operate radio frequency-emitting equipment within a sovereign nation. This coordination is necessary to conform to international and national laws, and to avoid interfering with host-nation communications and emergency services. Coordination prevents diplomatic friction with the host nation. Commanders or operators who do not operate within host- nation laws may incur criminal or civil liability and have their equipment confiscated. Host nation coordination does not apply to forcible entry operations or operations in a hostile nation. 2-190. Spectrum management operations depend on policy adherence to ensure access to the spectrum. This includes complying with national (strategic) through tactical-level policies and defining local policies for spectrum management, frequency assignment, and host nation coordination. Refer to JP 6-01 and ATP 6-02.70 for more information about spectrum management. VISUAL INFORMATION AND COMBAT CAMERA 2-191. Visual information and COMCAM capture still and motion imagery to support a variety of missions. Visual information products may support command and control, training, education, logistics, human
6-02
73
Signal Support by Army Echelon, Core Competencies, Training, and the Army Network resources, special operations, information operations, public affairs, or intelligence requirements. Visual information and COMCAM provide decision makers and supported agencies current and accurate information. VISUAL INFORMATION 2-192. Visual information is various visual media with or without sound that generally includes still and motion photography, audio video recording, graphic arts, and visual presentations (JP 3-61). Visual information also includes the activities to produce and edit these products. 2-193. Unlike news stories, press releases, or press conferences, Army visual information records events as they occur. It documents military operations, exercises, and activities to convey an unfiltered view to key audiences. Visual information products are subject to the same security classification and operations security considerations as other operational information. 2-194. Visual information products created for other uses can also support public affairs objectives. Multi- use examples of visual information include— * Documenting domestic disasters to aid emergency management decision making. * Documenting evidence of war crimes. * Preserving evidence about damage claims against the U.S. Government. * Providing training aids that simulate battlefield conditions. * Providing battle damage assessment images. * Documenting forensic evidence of incidents, such as improvised explosive device detonations. * Documenting the environmental impact of military operations. 2-195. Visual information support is limited to official events or activities. Commanders consider the mission, cost-effectiveness, and the quality and quantity of products and services available when establishing priorities for visual information support. 2-196. The Defense Imagery Management Operations Center receives, manages, and distributes strategic, operational, tactical, and joint-interest imagery as a shared asset. See appendix C for more information about requests for visual information resources. 2-197. Regardless of the mission and conditions under which visual information is created, it becomes an official DOD record and may be releasable under the Freedom of Information Act, requests for evidence in litigation, or other sources of legal authority (JP 3-61). The release of visual information products is subject to security classification and operations security review. Refer to ATP 6-02.40 for more information about visual information operations. Note. Certain visual information-type imagery is exempt from mandatory disclosure and sharing. Visual media collected exclusively to support intelligence, law enforcement, medical, or research, development, test, and engineering activities, and imagery from weapon systems, helmet cameras, or unmanned aerial vehicles fall under separate regulatory guidance. Refer to DODI 5040.02 for more information on these exclusions. COMBAT CAMERA 2-198. Combat camera is specially-trained expeditionary forces from Service-designated units capable of providing high-quality directed visual information during military operations (JP 3-61). COMCAM units and teams produce still and motion imagery to support combat, information operations, humanitarian relief, special operations, intelligence, reconnaissance, engineering, legal, public affairs, and other operations involving the Military Services. COMCAM is an essential battlefield information resource that supports strategic, operational, and tactical mission objectives. 2-199. Commanders employ COMCAM capabilities to document the entire scope of U.S. military activities during wartime operations, crises, contingencies, joint exercises, and other events of significant national interest involving the DOD Components. The COMCAM mission may support, but is separate from,
6-02
74
Chapter 2 specialized imagery operations and systems for specific mission requirements, such as intelligence, surveillance, and reconnaissance or operational test and evaluation. 2-200. COMCAM supports Army units across the range of military operations. COMCAM elements share documentation, as required, to support operational and planning requirements from tactical through national level. COMCAM documentation supports sound decision making. COMCAM capabilities include— * Tactical digital media. * Imagery editing. * Video editing. * Transmission of visual information products. * High definition still and video imagery. * Graphic design. * Parachute-qualified COMCAM equipped Soldiers (airborne COMCAM company only). 2-201. COMCAM requirements are different from public affairs and press pool media requirements. While COMCAM imagery may support public affairs, it is primarily a decision-making tool. Because COMCAM Soldiers can access information and areas media personnel cannot, the imagery they produce is often operationally sensitive. COMCAM imagery requires security classification and operations security review before release for public affairs use. See appendix C for COMCAM request procedures. Refer to ATP 6- 02.40 for more information about COMCAM. COMMUNICATIONS SECURITY A strong case can be made that, seen broadly, a major purpose of COMSEC—perhaps its overriding purpose—is to help achieve surprise by denying adversaries and enemies foreknowledge of our capabilities and intentions.” David G. Boak 2-202. Communication is more than the simple transmission of information. It is a means to exercise control over forces. Communication links information to decisions and decisions to action. Communication among the parts of a command supports their coordinated action (ADP 6-0). Operations security concerns dictate that U.S. forces deny adversaries and enemies the content of sensitive communications. 2-203. Communications security is the protection resulting from all measures designed to deny unauthorized persons information of value that might be derived from the possession and study of telecommunications, or to mislead unauthorized persons in their interpretation of the results of such possession and study (JP 6-0). While COMSEC does not rise to the level of a core competency, it is still an essential capability to protect sensitive information. 2-204. Cryptographic systems and devices protect sensitive classified and unclassified operational information in the DODIN-A. To decrypt the data, every member of the cryptonet needs an identical key. COMSEC account managers distribute and control keying material and manage routine updates so all authorized users—and only authorized users—have the correct key to communicate. Including COMSEC key management in operations planning is essential to enabling secure communications. 2-205. If cryptographic equipment or keying materials become lost or captured, the communications they secure risk compromise. This is especially true of a keyed device, such as a combat net radio, since a lost or captured radio compromises the entire network. Promptly reporting a lost key facilitates risk assessment and mitigation. Refer to ATP 5-19 for more information on risk management. 2-206. Normally, when a cryptographic key is lost, the controlling authority initiates emergency key supersession to protect the integrity of the cryptographic network. Any member of the cryptonet who does not have the new key, will lose communications over the network until they obtain and update their key. If mission requirements prevent immediate supersession, the key update should take place as soon as the mission allows. The commander’s risk decision must consider the likelihood the keying material has fallen into enemy hands.
6-02
75
Signal Support by Army Echelon, Core Competencies, Training, and the Army Network 2-207. COMSEC account managers maintain centralized accountability of cryptographic material and equipment. For tactical flexibility, operators and COMSEC local elements hold keying material and devices at the lowest echelon that can maintain appropriate physical security. This allows COMSEC managers and operators to react to contingencies, such as emergency key supersession, equipment failure, or operator error with minimal downtime. 2-208. COMSEC compliance is a command responsibility. Users are responsible for protecting and accounting for all COMSEC material and equipment in their possession or control. TB 380-40 provides further guidance on COMSEC responsibilities. Refer to ATP 6-02.75 for more information about COMSEC operations. SECTION III – SIGNAL TRAINING INDIVIDUAL SIGNAL TRAINING 2-209. The United States Army Signal School conducts training, leader development, and continuing education. The Signal School conducts both resident training at the Cyber Center of Excellence, and sustainment training at the cyber learning centers. RESIDENT TRAINING 2-210. The Signal school trains officers, warrant officers, and enlisted Soldiers in signal branch designations, functional areas, and military occupational specialties. This responsibility includes— * Signal branch officer basic and career courses. * Functional area 26A and 26B transition courses. * Warrant officer courses. * Advanced individual training. * Enlisted military occupational specialty reclassification. * Noncommissioned officer education system courses. * Functional courses, such as signal digital master gunner and COMSEC account manager. 2-211. Signal Soldiers receive training to— * Plan and direct signal support. * Provide network transport and information services, including automated information systems integration. * Operate telecommunications systems and networks. * Secure the confidentiality, integrity, and availability of telecommunications networks, automated information systems, and data (cybersecurity). * Conduct spectrum management. * Manage COMSEC. * Conduct visual information and COMCAM operations. SUSTAINMENT TRAINING 2-212. The regional signal training sites—formerly United States Army Communications-Electronics Command signal and sustainment universities—serve Active Component units at many installations. The cyber learning centers are a key training capability for emerging technology, communications, information technology applications, and commercial certifications. The individual training and certifications available from the cyber learning center support units’ training readiness and can be a valuable tool in the unit’s overall training plan. For more information about course offerings, contact the installation’s cyber learning center.
6-02
76
Chapter 2 COLLECTIVE SIGNAL TRAINING IN UNITS 2-213. The Army prepares itself for large-scale combat operations continuously. There is no time to build readiness necessary to win once hostilities commence in the current operational environment. Army forces must demonstrate a credible level of readiness against regional peer threats to effectively deter adversaries and assure partners (FM 3-0). 2-214. Commanders understand a key to mission success is training their Soldiers in the tasks and battle drills required to execute the unit’s primary mission. Experience at home station exercises, the combat training centers, warfighter exercises, and deployments shows the importance of allowing enough time in the training schedule for operator and crew training on critical signal support systems. The individual and team tasks to operate and maintain these systems are complex, and the skills are perishable. Without regular training, Soldiers’ proficiency quickly degrades. This is especially true for general-purpose user systems not operated by signal Soldiers. Because typical operators are less familiar with signal equipment and concepts, they need regular refresher training with these systems. 2-215. Collective tasks are clearly defined, observable, and measurable activities or actions that require organized team or unit performance, leading to the accomplishment of a mission or function. Based on the accomplishment of task proficiencies at the individual level, units conduct collective training. This is done at home station, at maneuver combat training centers, at mobilization training centers, during joint training exercises, and while deployed (ADP 7-0). MISSION ESSENTIAL TASKS 2-216. Commanders rarely have enough time or resources to train all tasks. The commander evaluates the unit’s task proficiency to determine which essential collective tasks the unit must train to attain the required proficiency and on which tasks they can accept risk. The organic signal company’s combined arms training strategy includes a mission essential task list. Each mission-essential task aligns with supporting collective and individual tasks. COLLECTIVE TRAINING TECHNIQUES 2-217. Collective training follows an integrated approach of live, virtual, and constructive training at home station, combat training center rotations, and during deployments to build confident, cohesive units able to adapt to their environment and defeat the enemy. Demanding and repetitive training builds Soldiers’ confidence in their weapons and equipment, their ability to fight and overcome challenges, their leaders, and their teams. Realistic Training Environment 2-218. The training environment should duplicate as closely as possible the expected operational environment. Teams train under conditions that emphasize change, uncertainty, degraded friendly capabilities, capable enemies, and austere conditions. Realistic training prepares Soldiers to perform under combat conditions by including unexpected tasks and battle drills. 2-219. Commanders should incorporate a realistic threat environment into training exercises, so teams learn to recognize indications of cyberspace attacks and jamming. Understanding network vulnerabilities is critical. The training environment should include likely adversary tactics, techniques, and procedures. Units must train to identify key terrain in cyberspace relative to their commander’s priorities to enable a focused defense. Establishing a properly configured, monitored, and secured network during training events prepares operators to detect malicious and unauthorized activity and enables command and control and the other warfighting functions. 2-220. Integrating training with a realistic threat able to attack networks into unit training at home station and combat training centers prepares units for real-world missions. It also prepares units to understand the threat and indicators of a contested environment. Realistic training also demonstrates the consequences of not following security procedures.
6-02
77
Signal Support by Army Echelon, Core Competencies, Training, and the Army Network 2-221. A realistic training environment provides operators practice securing the DODIN-A against active threat and allows units to integrate actions and effects in support of maneuver commanders. Training signal forces to secure the network against an active threat is critical to mission success. Realistic and combat- focused training requires specialized technical training, instrumentation, and ranges at home station and combat training centers. Digital Battle Drills 2-222. Digital battle drills provide signal equipment operators and teams structured, pre-planned responses to network, COMSEC, cybersecurity, or server-related events or power outages. Established standards are easy to enforce and help manage expectations inside the command. Realistic training and repetition ensure operators can reflexively apply conditioned responses under combat conditions. All echelons should formulate and actively rehearse battle drills for a variety of anticipated events to ensure timely and appropriate responses. Combined Arms Training Strategy 2-223. The signal company’s training calendar should include events from the combined arms training strategy. These training events progressively build from team level through multi-echelon exercises supporting the parent unit. The combined arms training strategy begins with team tasks to develop crew proficiency installing and operating their assigned systems. As training progresses, teams combine for platoon- and company-level training exercises to ensure the teams can integrate the unit’s network systems into the DODIN-A. Training signal teams to proficiency through the combined arms training strategy ensures Soldiers are not only proficient in their individual military occupational specialty skills, but can integrate the network to support operations. SIGNAL DIGITAL MASTER GUNNER COURSE 2-224. The Signal Digital Master Gunner Course is a functional course that trains signal noncommissioned officers to install, operate, maintain, and secure local area networks and integrate them with mission command information systems and the unit’s portion of the DODIN-A. The course teaches Soldiers to integrate commercial server applications with tactical communications systems. Signal digital master gunner is a resident course taught at the Signal School. SECTION IV – THE ARMY NETWORK 2-225. Army forces depend on the DODIN-A for network-enabled operations throughout all operational phases and environments. This section discusses the joint (DODIN) and Army (DODIN-A) networks, the network transport and information services capabilities that enable command and control, and DODIN operations. DEPARTMENT OF DEFENSE INFORMATION NETWORK 2-226. The joint force depends upon the DODIN to connect strategic, operational, and tactical commanders across the globe. The DODIN enables the right users to access the right information at the right time to enable situational understanding and timely decision making, with the right protection to prevent disclosure to enemies and adversaries. 2-227. As the DOD portion of cyberspace, the DODIN interacts with and provides connections to national and global cyberspace. The DODIN consists of joint capabilities provided by the Defense Information Systems Agency combined with Service-specific enclaves provided by the Army (DODIN-A), Navy, Air Force, and Marine Corps. An enclave is a set of system resources that operate in the same security domain and that share the protection of a single, common, continuous security perimeter (CNSSI 4009). 2-228. The DODIN can store user data or make data stores available through commercial cloud service providers. The Defense Information Systems Agency manages DISN applications and services through core data centers in each geographic combatant commander’s area of responsibility. The servers at the core data
6-02
78
Chapter 2 center provide always-on, secure data storage. This data storage capability enables deploying Soldiers and units to take their home-station information with them whenever and wherever they deploy by transferring the data from their home station data center to the data center serving their deployment area of operations. Core data centers support the DODIN worldwide so users can access Army, joint, and multinational data, applications, and information services from anywhere, at any time, in any operational environment COMMAND AND CONTROL 2-229. United States Cyber Command has the Unified Command Plan mission to operate, secure, and defend the DODIN. For unity of command and unity of effort, Joint Force Headquarters-DODIN exercises delegated directive authority over all DOD Services and agencies for DODIN operations and defensive cyberspace operations-internal defensive measures. Within the Army, ARCYBER plans and directs cyberspace operations, including DODIN operations. Note. The Director of the Defense Information Systems Agency is designated as the Commander, Joint Force Headquarters-DODIN. ARCHITECTURE 2-230. The DODIN architecture identifies priority areas, principles, rules, and activities to implement a manageable set of enterprise-wide capabilities. The architecture provides a common vocabulary for describing the capabilities, activities, and services to achieve an integrated joint network. Cloud Computing 2-231. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources—networks, servers, storage, applications, and services—that can be rapidly provisioned and released with minimal management effort or service provider interaction. Users can access cloud services without geographic limitations, as long as they have a connection to the DODIN. 2-232. Cloud services may reside at a DOD core data center or be leased from a commercial cloud service provider. Units and commands can lease virtual servers or services to fulfill temporary requirements without going through the lengthy acquisition cycle and terminate the lease when they no longer need the services. Cloud-based solutions reduce the Army’s ownership, operation, and sustainment costs for information technology hardware and software. Army units acquire cloud services through the DOD core data center, or acquire commercial cloud services according to the guidelines in Memorandum, DOD CIO, 15 December 2014, subject: Updated Guidance on the Acquisition and Use of Commercial Cloud Computing Services. Defense Information Systems Network 2-233. The DISN is the DOD enterprise network for data, video, and voice services. DISN services include SIPRNET, NIPRNET, Joint Worldwide Intelligence Communications System, video teleconferencing, Defense Switched Network, Defense Red Switched Network, Defense Research Engineering Network, and mission partner environment. 2-234. The three segments of the DISN are the sustaining base, long-haul transport, and deployed. The long-haul segment provides network transport between the sustaining base and deployed network elements. Satellite Transport 2-235. Satellite transport includes all DOD data and voice satellite communications. Satellite communications is a key method of network transport. Satellite communications capabilities, such as Wideband Global Satellite Communications, extend the DODIN worldwide to users without copper or fiber optic cable connections. Army satellite communications systems operate over military and commercial communications satellites. The extended range of satellite communications allows Signal forces to quickly establish connectivity within or between theaters. Using satellite communications transport allows Army
6-02
79
Signal Support by Army Echelon, Core Competencies, Training, and the Army Network forces to extend access to the DODIN-A into remote or austere operational environments where there is no existing DODIN infrastructure. Global Backbone (Fixed Station) 2-236. Strategic backbone transport connects theaters outside the continental United States to the DODIN. The backbone network transport establishes the DOD communications infrastructure and provides semi- permanent access to DISN services in garrison and training environments worldwide. Gateway Access (Expeditionary) 2-237. DOD Gateways at select fixed satellite communications facilities provide deployed forces pre- positioned access points for reachback to the strategic support area. Because satellite communications allows beyond line of sight communications at great distances, it can extend immediate access to full DISN services in remote, austere operational environments without infrastructure limitations. Tactical satellite communications systems support command and control on-the-move as well as operations from traditional command posts. Refer to ATP 6-02.54 for more information about satellite communications transport. Unified Capabilities 2-238. Unified capabilities integrate voice, video, and data services across a secure Internet protocol network. The services are independent of technology, so they do not require stand-alone systems to deliver capabilities. Using unified capabilities provides joint interoperability and reduces redundant efforts among the Military Services. 2-239. The Defense Information Systems Agency’s unified capabilities approved products list is the single, consolidated list of products certified for interoperability and cybersecurity compliance. The approved products list includes network infrastructure capabilities as well as voice, video, and data services. Note. The current list of approved unified capabilities is available at the Approved Products List Integrated Tracking System Website. PERSONALLY IDENTIFIABLE INFORMATION 2-240. Personally identifiable information is any information that can be used to distinguish or trace an individual’s identity. This information can be in hard copy or electronic format, stored on personal computers, laptops, and personal electronic devices, or found within databases. Protected personally identifiable information includes— * Name. * Social Security number. * Date and place of birth. * Mother’s maiden name. * Biometric records. * Education records. * Records of financial transactions. * Medical files. * Criminal records. * Employment history. 2-241. In the digital age, leaked personally identifiable information can cause a great deal of damage. Many individuals have fallen victim to identity theft from leaked information. Data breaches can also compromise operations security or allow enemies or adversaries to target individual Soldiers or their family members. 2-242. Many DODIN users require access to some personally identifiable information in the regular course of their duties. Handling this information carries a special commitment to protect individuals’ private
6-02
80
Chapter 2 information. All Army military, civilian, and contractor employees whose duties require collecting, using, or storing personally identifiable information are responsible to— * Be able to recognize and safeguard personal information. * Collect personal information only when authorized and needed to perform their duties. * Collect only the information necessary. * Tell the individual the reason for collecting their personal information, who may see it, and what happens if the individual does not provide the requested information. * Keep the information accurate, relevant, timely, and complete. * Protect the information with encrypted storage. * Transmit the information only with encryption and digital signature. * Keep personally identifiable information confidential and protect it from misuse, loss, or data breach. JOINT INFORMATION ENVIRONMENT 2-243. The joint information environment is a secure environment to share information technology infrastructure, enterprise services, and a single security architecture across the DODIN. The joint information environment implements enforceable standards and specifications, and common tactics, techniques, and procedures among the Services. 2-244. Security and interoperability of networked computers are configuration-dependent. A single incorrect setting on a workstation, router, or switch may leave it vulnerable to a cyberspace attack or unable to connect with the DODIN. Security affects every aspect of military operations. Likewise, interoperability is vital to mission success. Connecting to the DODIN facilitates collaboration with joint mission partners. 2-245. Each Service, installation, and organization has traditionally maintained separate security infrastructure and processes. This creates too many opportunities for failure and hinders information sharing among joint mission partners. Standardized, centralized security allows administrators to apply patches and improvements faster and with greater certainty. 2-246. The joint information environment improves operational effectiveness, standardizes training and equipment requirements across combatant commands and geographic regions, enhances security, and allows Services and agencies to allocate and align their information technology resources to their mission requirements. The joint information environment— * Consolidates data centers. * Standardizes and converges services, such as identity and access management and e-mail. * Reduces the cyberspace attack surface. * Provides DODIN-wide situational awareness. Global Enterprise Operations Center 2-247. The Global Enterprise Operations Center is the Defense Information Systems Agency’s top-level DODIN operations facility. The global enterprise operations center has complete visibility of the DODIN and oversees global DODIN operations to support combatant commanders. The global enterprise operations center— * Directs global DODIN operations and defensive cyberspace operations-internal defensive measures. * Prioritizes global cyberspace missions. * Acts as the global focal point for integrating unified action partners into mission partner environment. * Maintains global, joint situational awareness.
6-02
81
Signal Support by Army Echelon, Core Competencies, Training, and the Army Network Enterprise Operations Center 2-248. The Defense Information Systems Agency’s regionally-aligned enterprise operations centers maintain visibility of their respective portions of the enterprise network. The enterprise operations center conducts regional cyberspace missions to support geographic combatant commander priorities and those global missions directed by the global enterprise operations center. The enterprise operations center— * Directs DODIN operations and defensive cyberspace operations-internal defensive measures in its assigned theater. * Acts as the regional focal point for integrating unified action partners into mission partner environment. * Maintains regional, joint situational awareness. * Performs cybersecurity and defensive cyberspace operations-internal defensive measures functions, as directed by the global enterprise operations center. Local Infrastructure (Base, Post, Camp, Station, or Joint Base) 2-249. The Services continue to maintain their local infrastructure and their ability to support tactical units and Service-unique missions. In the local infrastructure— * The host Service maintains infrastructure. * The host Service provides hands-on labor. * The host Service provides defensive cyberspace operations incident response. * The local installation provides mission- or unit-specific support. * The Services maintain support for their tactical units. Regional Top Level Architecture (Joint Regional Security Stack) 2-250. Top level architectures are access points to the DODIN. Their firewalls, intrusion detection, and intrusion prevention sensors represent the border security between the DODIN and the public Internet. In the legacy DODIN architecture, the Services typically hosted a top level architecture at each installation. Joint information environment replaces over 1,000 installation-based top level architectures with regional top level architectures (joint regional security stacks). 2-251. The joint regional security stacks consolidate the regional security architecture. This reduces the cyberspace attack surface by limiting the number of direct interfaces with outside networks. It also reduces the size of the specialized cybersecurity workforce needed to secure the network perimeter. Note. Refer to Enabling the Joint Information Environment: Shaping the Enterprise for the Conflicts of Tomorrow for more information about the joint information environment. JOINT THEATER DEPARTMENT OF DEFENSE INFORMATION NETWORK OPERATIONS AUTHORITIES 2-252. The highest-level joint DODIN operations authority in a theater is the Defense Information Systems Agency’s enterprise operations center (see paragraph 2-248). The geographic combatant command and joint task forces also have joint DODIN operations facilities to control their respective portions of the theater network. Joint Cyberspace Center 2-253. A joint cyberspace center is the operational element of the combatant command that plans and oversees DODIN operations, defensive cyberspace operations, and offensive cyberspace operations in the theater. In conjunction with the theater network operations control center, the joint cyberspace center provides comprehensive network situational awareness, so commanders can make informed decisions to align network assets and capabilities to mission priorities and defend the network. Refer to JP 3-12 for more information about the joint cyberspace center’s defensive and offensive cyberspace operations roles.
6-02
82
Chapter 2 Geographic Combatant Command J-6 2-254. The geographic combatant command J-6 establishes policy and guidance for all communications assets supporting the joint force commander and develops communications system architectures and plans to support the geographic combatant commander’s mission. The J-6 also advises the geographic combatant commander of the network’s ability to support operations. Theater Network Operations Control Center 2-255. The theater network operations control center is the geographic combatant command-level DODIN operations center. The theater network operations control center controls all theater systems and networks operated by forces assigned to or supporting the geographic combatant commander through technical channels. Joint Network Operations Control Center 2-256. The commander, joint task force controls joint force systems and networks through a joint network operations control center. The joint network operations control center directs operations and defense of the joint task force portion of the theater network. The joint network operations control center collects network status from supporting units in the joint operations area for consolidated network situational awareness. The joint network operations control center provides the network status information to the joint cyberspace center for the theater-wide situational awareness view. DEPARTMENT OF DEFENSE INFORMATION NETWORK-ARMY 2-257. The Army’s portion of the DODIN is the DODIN-A. Adhering to common joint standards ensures interoperability and cybersecurity compliance across the entire Army enterprise and the wider DODIN. The DODIN-A uses redundant transport systems to link sensors, warfighting and business applications, and services. The network provides access to timely, accurate information in any environment and enables mission partner collaboration. 2-258. The DODIN-A connects geographically dispersed fixed station and deployed expeditionary forces to the global network through long-haul network transport, and supports— * Installation campus area networks for known, verified users. Campus networks connect installation-based users to DISN services through a network enterprise center. * Regional hub nodes that provide network transport and DISN services to support the deployed and training environments. The regional hub node includes a satellite transport component that connects deployed forces to the DODIN-A, and a gateway that provides access to DISN services and the wider DODIN. * Upper tier tactical internet to connect deployed users to a data center and DISN services, regardless of their location. The deployed enclave connects to the DODIN-A and DISN services through the regional hub node or tactical hub node. * Lower tier tactical internet infrastructure to support tactical formations down to the team leader. 2-259. Commanders and their staffs leverage the DODIN-A as a warfighting platform and the foundation for all other Army warfighting functions and capabilities. Commanders exercise command authority over their portions of the network. Signal units and Soldiers install, operate, and maintain their respective portions of the DODIN-A so commanders and staffs can communicate with higher, subordinate, adjacent, and supporting elements for mission success. The DODIN-A enables leaders to exercise command and control, integrate warfighting functions, and synchronize their efforts. The DODIN-A also allows synchronization with higher, subordinate, and adjacent units using the common operational picture and commander’s intent, without needing direct control from higher headquarters.
6-02
83
Signal Support by Army Echelon, Core Competencies, Training, and the Army Network ARCHITECTURE 2-260. The architecture of the DODIN-A provides access to protected services at the point of need. The architecture converges communications, computing, and enterprise services into a single platform that supports and enables all other missions and functions. 2-261. The core competencies and essential capability of the Signal Corps enable the DODIN-A’s seamless cloud environment: * Network transport and information services provide, and extend access to, the network and its applications and services. * DODIN operations and the essential capability of COMSEC operate and secure the network and provide access to cloud-based services. * Spectrum management operations enable those DODIN-A systems that rely on wireless connectivity, without causing or suffering unacceptable frequency interference. Defense-in-Depth 2-262. Information systems security and network security are critical, because a single compromised workstation or networking device places the entire network at risk. DODIN operations personnel secure the network and its services through defense-in-depth. Defense-in-depth is an information security strategy integrating people, technology, and operations capabilities to establish variable barriers across multiple layers and missions of the organization (CNSSI 4009). Defense-in-depth includes perimeter security, enclave security, host security, physical security, personnel security, and cybersecurity policies and standards. Layered security protects every level of the network, down to individual workstations and users. By enhancing protection and survivability, defense-in-depth helps achieve the fundamental principle of trusted systems. 2-263. DODIN operations planners devise and implement comprehensive network plans using a full range of security measures. The plan includes both external and internal perimeter protection. External perimeter protection consists of COMSEC procedures, router filtering, access control lists, security guards, and, where necessary, physical isolation serving as a barrier to outside networks, such as the public Internet. Internal perimeter protection consists of firewalls and router filtering. These serve as barriers between echelons of interconnected networks and information systems. Internal COMSEC barriers provide another layer of security for network enclaves. Local workstation protection consists of individual access controls, configuration audit capability, protection and intrusion detection tools, and security procedures. 2-264. The joint regional security stack secures the logical boundary between the DODIN-A and the rest of the DODIN. The hardened outer perimeter of the joint regional security stack controls access to applications and data within the DODIN-A. Communications in Depth 2-265. Network-enabled operations require a robust, survivable network. Maintaining network-enabled capabilities in a degraded information environment mandates a communications in depth architecture for the tactical portion of the network. Deployed signal elements implement redundant network transport using line of sight transport, satellite communications, wire, and cable. Automatic network establishment and restoral eliminate single points of failure so critical communications still get through. Refer to ATP 6-02.60 for more information about tactical network systems. Colorless Core 2-266. Colorless core is a Defense Information Systems Agency-compliant cybersecurity architecture that offers more efficient Internet protocol network encryption and transport. The key benefits of colorless core are data protection and more efficient bandwidth use. The colorless core architecture encrypts all data, whether classified or unclassified, from end-to-end. This is different from legacy systems that only encrypted classified information. Since all the encrypted data looks the same, an enemy or adversary cannot distinguish between classified and unclassified data. This makes unclassified information just as hard to recover as classified information. It also makes it harder for adversaries to target classified networks for cryptanalysis.
6-02
84
Chapter 2 Link layer encryption isolates the network backbone (the wide-area network) from external networks. Refer to ATP 6-02.60 for more information about colorless core architecture. Transport Convergence 2-267. The Army has long maintained separate tactical transport networks to support the communications requirements of different functional areas—command and control, intelligence, logistics, and medical. A unit with all of these networks has used four separate satellite communications terminals and four sets of networking hardware with all the associated manning, physical security, configuration and patching, and logistics support requirements; four separate DODIN operations chains of authority; and up to four separate commercial satellite leases. Converging the transport for these networks onto a common network transport medium makes better use of resources and assets, leverages existing infrastructure, increases network security, and simplifies network management, while reducing reliance on leased commercial satellite resources. 2-268. The Army is migrating the network transport for the tactical portions of these networks onto a single transport medium using the colorless core architecture. The first phase of transport convergence integrates the top secret/sensitive compartmented information intelligence network into the colorless core architecture to brigade level in the deployed portion of the network. The sensitive compartmented information data is encrypted end-to-end from the TROJAN Network Control Center to the G-2 (S-2) section. The signal systems provide only network transport. The G-2 (S-2) section continues to perform DODIN operations functions for top secret networks. 2-269. The extra demand for data throughput over the converged transport requires DODIN operations personnel to manage bandwidth apportionment and quality of service rules for the different classes of data, based on mission requirements. Bandwidth apportionment ensures the converged transport provides the same quality services as the legacy capabilities. OPERATING ENVIRONMENTS 2-270. Work, deployed, and home or mobile represent the DODIN-A operating environments. Sharing configurations and security standards allows these environments to operate as a single, integrated network. Work Environment 2-271. Generating forces occupy posts, camps, and stations worldwide supporting the geographic combatant commanders. The work environment represents the Army in-garrison, using the DODIN-A as a strategic capability to support the generating force and shaping operations. Forward-deployed posts, camps, and stations rely on Defense Information Systems Agency long-haul transport for connection to enterprise services. Network Enterprise Center 2-272. The network enterprise center is the facility that provides and acquires telecommunications and information management services on Army installations (ATP 6-02.71). The network enterprise center manages the installation campus area network and ensures service quality for supported units at their home station. The campus area network connects installation-based users to the DISN, secure data stores, and baseline common services on a non-reimbursable basis. The network enterprise center provides information technology services other than those on the baseline services list on a fee-for-service basis (refer to AR 25-1). Strategic signal battalions operate the network enterprise centers. The network enterprise center delivers these baseline services to units in garrison: * Communications systems and system support services. * Telephone and data infrastructure services. * Emergency communications telephone services. * Wireless infrastructure services. * Video teleconferencing services. * Range and field telephone services.
6-02
85
Signal Support by Army Echelon, Core Competencies, Training, and the Army Network * Telecommunications continuity of operations plan and operation plan support services. * Fire, safety, security, and other circuit services. * Non-tactical radios and non-tactical/tactical radio spectrum management services. * Cybersecurity services. * Defense-in-depth. * COMSEC services. * Risk management, accreditation, and certification policy services. * Network security services. * Automation services. * Mail, messaging, and collaboration (Defense Enterprise E-mail and Organizational Messaging Service) and storage services. * Desktop, software, and peripheral support services. * Web support services. * Automation and network service support services. Note. Refer to the Command, Control, Communications, Computers, and Information Management Services List for information about baseline common services. Installation as a Docking Station 2-273. Securing tactical networks is complex and requires Soldiers proficient in specialized technical skills. These skills are perishable and degrade quickly if not exercised regularly. Installation as a docking station provides a standardized, simplified connection between mission command information systems and the installation network. This allows units to train and work with the same systems they use when deployed without relying on costly commercial satellite bandwidth or limited military satellite bandwidth and regional hub node availability. Units can use the same systems and software they use on the battlefield as a routine element of daily operations at their home station. 2-274. Installation as a docking station reduces the time needed to establish cybersecurity-compliant tactical networking components through an always-on concept. The local network enterprise center distributes patches directly to the unit, so system administrators can apply them immediately. This keeps user accounts current and systems patched to mitigate security vulnerabilities. Because the system patching stays up to date, the systems can rapidly transition to and from an operational theater. Units only need to pack their equipment and begin movement. 2-275. Commanders and staffs can access the forward-deployed network and mission partner environment through installation as a docking station. Theater and mission-specific information stores are available at the home station to support the operations process. Installation as a docking station enables planning, preparing, and assessing operations on the same mission network used in the operational theater. Home Station Mission Command 2-276. Advances in communications and information technologies, such as teleconferencing and other remote collaboration capabilities, allow units to conduct split-based operations, where the tactical command post deploys to an operational theater and the main command post continues to operate from home station. Each Army division has a home station mission command center that allows its main command post to control operations of deployed, deploying, and non-deployed subordinate units from its home station. A tailored portion of the headquarters can deploy to an area of operations and establish either an early entry command post or a forward-deployed command post. The remainder of the headquarters can operate from home station to perform dedicated analysis, planning, and coordination supporting forward operations. 2-277. Home station mission command reduces the time and strategic lift resources required to deploy a division command post. It also reduces the forward logistics footprint required to sustain the command post as compared with supporting an entire division headquarters.
6-02
86
Chapter 2 2-278. The size of the early entry or forward-deployed command post can increase or decrease as necessary in response to changes in the operational or mission variables. Large-scale combat operations and campaigns or unacceptable network defense challenges may require the division headquarters to deploy most of its command and control capabilities. In these cases, the entire headquarters can deploy and establish traditional main and tactical command posts in the operational theater. 2-279. Home station mission command increases data throughput requirements between deployed elements and the home station headquarters. Signal planners should consider the network architecture and data requirements for reliable connectivity between the separate headquarters. Locally hosting services at each end so users can access critical information without relying on reachback mitigates the data throughput requirements. Deployed Environment 2-280. The strategic infrastructure supports units’ requirements at their home station, but tactical units still need communications and information services when deployed in an operational theater. The deployed portion of the DODIN-A provides the needed services and supports tactical mobility requirements. 2-281. The regional cyber center manages the theater network through technical channels. Deployed tactical forces connect to the DODIN-A using satellite transport through a DOD Gateway site, regional hub node, or tactical hub node. The tactical portion of the DODIN-A extends DISN voice, data, imagery, and video capabilities to deployed forces. Home or Mobile Environment 2-282. Many authorized users operate from outside the boundaries of the Army network. These users access the DODIN-A from home or a temporary duty location. These users usually connect with the network through the public Internet or a virtual private network connection. Users within the home and mobile environments access the DODIN through commercial telecommunications to a joint, Army, or other Service network entry point. 2-283. The security of an enterprise network is only as strong as its weakest point. Secure data, applications, and services depend on cybersecurity compliance. Users must maintain current antivirus software and follow good security practices. The DODIN-A operational view (Figure 2-3 on page 2-51) shows a high-level overview of the DODIN and DODIN-A.
6-02
87
Signal Support by Army Echelon, Core Competencies, Training, and the Army Network Figure 2-3. Department of Defense information network-Army operational view
6-02
89
Chapter 3 Signal Support to Operations to Shape and Prevent This chapter provides an overview of signal support to Army operations to shape and prevent. Section I discusses signal support in Army operations to shape. Section II discusses signal support in Army operations to prevent. SECTION I – OPERATIONS TO SHAPE 3-1. Operations to shape consist of various long-term military engagements, security cooperation, and deterrence missions, tasks, and actions intended to assure friends, build partner capacity and capability, and promote regional stability (FM 3-0). OVERVIEW OF ARMY OPERATIONS TO SHAPE 3-2. Operations to shape support the geographic combatant commander’s theater campaign plan or the theater security cooperation plan. Operations to shape serve four primary purposes: * Promoting and protecting U.S. national interests and influence. * Building partner capacity and partnerships. * Recognizing and countering adversary attempts to gain positions of relative advantage. * Setting conditions to win future conflicts. 3-3. Shaping activities include unit home station activities such as maintaining operational readiness, training, contingency planning, combined exercises and training, military exchange programs, security cooperation, and military-to-military engagements. Figure 3-1 on page 3-2 depicts activities to shape operational environments and prevent conflict in an environment of cooperation and competition. Army forces conduct shaping activities as part of a joint team and a larger whole-of-government effort to assure friends, build partners, and to prevent, deter, or turn back adversary escalation.