FM 3-36 ELECTRONIC WARFARE (NOVEMBER 2012) - page 1

 

  Главная      Manuals     FM 3-36 ELECTRONIC WARFARE (NOVEMBER 2012)

 

Search            copyright infringement  

 

 

 

 

 

 

 

 

 

 

 

Content      ..      1       2         ..

 

 

 

FM 3-36 ELECTRONIC WARFARE (NOVEMBER 2012) - page 1

 

 

*FM 3-36
Field Manual
Headquarters
Department of the Army
No. 3-36
Washington, DC, 9 November 2012
Electronic Warfare
Contents
Page
PREFACE
iv
Chapter 1
ELECTRONIC WARFARE OVERVIEW
1-1
Operational Environments and Electronic Warfare
1-1
Electronic Warfare and Its Divisions
1-3
Activities and Terminology
1-6
Summary
1-11
Chapter 2
ELECTRONIC WARFARE IN UNIFIED LAND OPERATIONS
2-1
The Role of Electronic Warfare
2-1
Support of the Warfighting Functions
2-1
Summary
2-3
Chapter 3
ELECTRONIC WARFARE ORGANIZATION
3-1
Organizational Design for Electronic Warfare Activities
3-1
Key Personnel for Planning and Coordinating Electronic Warfare Activities
3-5
Summary
3-7
Chapter 4
ELECTRONIC WARFARE AND THE OPERATIONS PROCESS
4-1
The Operations Process
4-1
Electronic Warfare Planning
4-1
Electronic Warfare Preparation
4-17
Electronic Warfare Execution
4-17
Electronic Warfare Assessment
4-18
Summary
4-19
Chapter 5
ELECTRONIC WARFARE COORDINATION, DECONFLICTION, AND
SYNCHRONIZATION
5-1
Coordination and Deconfliction
5-1
Synchronization
5-5
Summary
5-5
Distribution Restriction: Approved for public release; distribution is unlimited.
*This publication supersedes FM 3-36, dated 25 February 2009.
i
Contents
Chapter 6
ELECTRONIC WARFARE IN JOINT AND MULTINATIONAL OPERATIONS 6-1
Joint Electronic Warfare Operations
6-1
Multinational Electronic Warfare Operations
6-4
Summary
6-6
Chapter 7
ELECTRONIC WARFARE AGENCIES AND CENTERS
7-1
Integration With Service Electronic Warfare Capabilities
7-1
External Support Agencies and Centers
7-1
United States Cyber Command
7-3
Summary
7-3
Appendix A ELECTRONIC WARFARE INPUT TO OPERATION PLANS AND ORDERS . A-1
Appendix B ELECTRONIC WARFARE RUNNING ESTIMATE
B-1
Appendix C REPORTS AND MESSAGES RELATED TO ELECTRONIC WARFARE
C-1
Appendix D TOOLS AND RESOURCES RELATED TO ELECTRONIC WARFARE
D-1
Appendix E CYBER ELECTROMAGNETIC ACTIVITIES SUPPORT TO ELECTRONIC
WARFARE
E-1
GLOSSARY
Glossary-1
REFERENCES
References-1
INDEX
Index-1
Figures
Figure 1-1. The electromagnetic spectrum
1-2
Figure 1-2. Examples of systems and targets dependent on the electromagnetic
spectrum
1-3
Figure 1-3. The three divisions of electronic warfare
1-4
Figure 3-1. Electronic warfare coordination organizational framework
3-2
Figure 4-1. The operations process
4-1
Figure 4-2. Course of action development
4-4
Figure 4-3. Course of action comparison
4-6
Figure 4-4. Integrating processes and continuing activities
4-8
Figure 4-5. Electronic warfare in support of intelligence preparation of the battlefield
4-9
Figure 4-6. Electronic warfare in the targeting process
4-11
Figure 5-1. Spectrum deconfliction procedures
5-3
Figure 6-1. Joint frequency management coordination
6-3
Figure 6-2. Electronic warfare request coordination
6-4
Figure A-1. Sample operation plan for Annex D
A-1
Figure A-2. Sample operation plan for Annex H
A-3
Figure B-1. Sample of electronic warfare running estimate
B-2
ii
FM 3-36
9 November 2012
Contents
Tables
Table 3-1. Functions of electronic warfare working groups
3-4
Table E-1. Cyber electromagnetic activities
E-2
9 November 2012
FM 3-36
iii
Preface
Field Manual (FM) 3-36 provides Army doctrine for electronic warfare (EW) planning, preparation,
execution, and assessment in support of unified land operations. Users of FM 3-36 must be familiar with
unified land operations doctrine established in Army Doctrine Publication (ADP) 3-0 (2011), the operations
process established in ADP 5-0 (2012), and EW doctrine described in Joint Publication (JP) 3-13.1 (2012).
This manual is not intended to be a major departure from the 2009 version. It aligns Army EW doctrine
with ADP 3-0 and addresses numerous administrative and organizational changes since 2009.
The principle audience for FM 3-36 is Army commanders and staffs at all echelons. This FM serves as an
authoritative reference for personnel who—
z
Develop doctrine (fundamental principles and tactics, techniques, and procedures), materiel, and
force structure.
z
Develop institutional and unit training.
z
Develop standard operating procedures for unit operations.
z
Plan, prepare, execute, and assess EW.
Commanders, staffs, and subordinates ensure their decisions and actions comply with applicable U.S.,
international, and, in some cases, host-nation laws and regulations. Commanders at all levels ensure their
Soldiers operate in accordance with the law of war and the rules of engagement (see FM 27-10).
FM 3-36 uses joint terms where applicable. Selected joint and Army terms appear in both the glossary and
the text. For definitions shown in the text, the term is italicized and the number of the proponent
publication follows the definition. This publication is not the proponent for any Army terms.
This publication applies to the Active Army, Army National Guard (ARNG)/Army National Guard of the
United States (ARNGUS), and United States Army Reserve (USAR) unless otherwise stated.
The proponent for this publication is the United States Army Combined Arms Center. The preparing
agency is the United States Army Electronic Warfare Proponent. Send written comments and
recommendations on a DA Form 2028 (Recommended Changes to Publications and Blank Forms) to
Commander, U.S. Army Combined Arms Center and Fort Leavenworth, ATTN: ATZL-MCC-E (FM 3-36),
950 Bluntville Lane, Building
391, Fort Leavenworth, KS
66027-2337; by e-mail to
EWPO@conus.army.mil; or submit an electronic DA Form 2028.
iv
FM 3-36
9 November 2012
Chapter 1
Electronic Warfare Overview
This chapter provides an overview of electronic warfare and the conceptual
foundation that leaders require to understand the electromagnetic environment and its
impact on Army operations. It first discusses operational environments. Then it
discusses the three divisions of electronic warfare. The chapter concludes with a
discussion of the electronic warfare activities and terms.
OPERATIONAL ENVIRONMENTS AND ELECTRONIC WARFARE
1-1. Electronic warfare is military action involving the use of electromagnetic and directed energy to
control the electromagnetic spectrum or to attack the enemy (JP 3-13.1). Electronic warfare (EW) consists
of three divisions: electronic attack, electronic protection, and electronic warfare support. EW capabilities
are emerging as an increasingly important means by which commanders can shape operational
environments to their advantage.
1-2. An operational environment is a composite of the conditions, circumstances, and influences that
affect the employment of capabilities and bear on the decisions of the commander (JP 3-0). An operational
environment encompasses physical areas and factors (of the air, land, maritime, and space domains) and the
information environment, which includes cyberspace. Commanders employ and integrate their unit’s
capabilities and actions within an operational environment to achieve a desired end state. Through
analyzing their operational environments, to include the electromagnetic spectrum and cyberspace,
commanders seek to understand how the results of friendly, adversary, and neutral actions may affect that
desired end state.
1-3. The electromagnetic spectrum is the range of frequencies of electromagnetic radiation from zero to
infinity. It is divided into 26 alphabetically designated bands (JP 3-13.1). These bands include the radio
spectrum, infrared, visible light and ultraviolet bands
(see figure
1-1, page 1-2). The spectrum is a
continuum of all electromagnetic waves arranged according to frequency and wavelength. The
electromagnetic spectrum extends from below the frequencies used for modern radio
(at the
long-wavelength end) through gamma radiation (at the short-wavelength end). It covers wavelengths from
thousands of kilometers to a fraction of the size of an atom. The rapid development and distribution of
wireless technologies throughout commercial, societal, and military activities make the electromagnetic
spectrum an increasingly important factor within an operational environment. Wireless systems work as
powerful enablers to modern telecommunications, computer networks, and weapons systems. Additionally,
new technologies expand beyond the traditional radio frequency spectrum and include high-power
microwave, directed-energy, and electro-optical devices.
9 November 2012
FM 3-36
1-1
Chapter 1
Figure 1-1. The electromagnetic spectrum
1-2
FM 3-36
9 November 2012
Electronic Warfare Overview
1-4. The increased use of wireless systems—including commercial off-the-shelf items—makes the
available electromagnetic spectrum a high-demand, low-density resource. The resulting electromagnetic
environments in which forces operate tend to be highly contested and congested, making unencumbered
access to the electromagnetic spectrum problematic. This challenge is most acute for, but not unique to,
U.S. forces that depend on new technologies. However, a plethora of current and potential adversaries
increasingly relies on the electromagnetic spectrum, enabling both friendly and enemy forces of exploiting
the advantages while being vulnerable to the disadvantages these systems provide (see figure 1-2). Reliance
on the electromagnetic spectrum enables commanders to control or, at least, gain and maintain an
advantage in unified land operations. EW provides commanders a valuable tool to help achieve the
objective.
Figure 1-2. Examples of systems and targets dependent on the electromagnetic spectrum
ELECTRONIC WARFARE AND ITS DIVISIONS
1-5. EW is one of the two lines of effort within cyber electromagnetic activities (see appendix E for more
information about cyber electromagnetic activities). EW consists of three divisions: electronic attack,
electronic protection, and electronic warfare support. (See figure 1-3, page 1-4.)
9 November 2012
FM 3-36
1-3
Chapter 1
Figure 1-3. The three divisions of electronic warfare
ELECTRONIC ATTACK
1-6. Electronic attack is a division of electronic warfare involving the use of electromagnetic energy,
directed energy, or antiradiation weapons to attack personnel, facilities, or equipment with the intent of
degrading, neutralizing, or destroying enemy combat capability and is considered a form of fires
(JP 3-13.1). Electronic attack includes—
z
Actions taken to prevent or reduce an enemy’s effective use of the electromagnetic spectrum.
z
Employment of weapons that use either electromagnetic or directed energy as their primary
destructive mechanism.
z
Offensive and defensive activities, including countermeasures.
1-4
FM 3-36
9 November 2012
Electronic Warfare Overview
1-7. Actions that prevent or reduce an enemy’s effective use of the electromagnetic spectrum include
spot, barrage, and sweep electromagnetic jamming (defined in paragraph 1-26). Electronic attack actions
also include various electromagnetic deception techniques such as false target or duplicate target
generation.
(See paragraphs
1-21 through
1-28 for a more detailed discussion of electronic attack
activities.)
1-8. Electronic attack includes using weapons that primarily use electromagnetic or directed energy for
destruction. These can include lasers, radio frequency weapons, and particle beams. Directed energy is an
umbrella term covering technologies that relate to the production of a beam of concentrated
electromagnetic energy or atomic or subatomic particles
(JP
3-13.1). In EW, most directed-energy
applications fit into the category of electronic attack. A directed-energy weapon uses directed energy
primarily as a direct means to damage or destroy an enemy’s equipment, facilities, and personnel. In
addition to destructive effects, directed-energy weapons systems support area denial and crowd control.
1-9. Unified land operations use offensive and defensive tasks for electronic attack. Examples of
offensive electronic attack include—
z
Jamming enemy radar or electronic command and control systems.
z
Using antiradiation missiles to suppress enemy air defenses (antiradiation weapons use radiated
energy emitted from a target for guidance onto the target).
z
Using electromagnetic deception to confuse enemy intelligence, surveillance, and
reconnaissance systems.
z
Using directed-energy weapons to disable an enemy’s equipment or capability.
1-10. Defensive electronic attack uses the electromagnetic spectrum to protect personnel, facilities,
capabilities, and equipment. Examples include self-protection and other protection measures such as the use
of expendables
(flares and active decoys), jammers, towed decoys, directed-energy infrared
countermeasures, and counter radio-controlled improvised explosive device EW systems.
ELECTRONIC PROTECTION
1-11. Electronic protection is a division of electronic warfare involving actions taken to protect personnel,
facilities, and equipment from any effects of friendly or enemy use of the electromagnetic spectrum that
degrade, neutralize, or destroy friendly combat capability (JP 3-13.1). For example, electronic protection
includes actions taken to ensure friendly use of the electromagnetic spectrum, such as frequency agility in a
radio or variable pulse repetition frequency in radar. Commanders avoid confusing electronic protection
with self-protection. Both defensive electronic attack and electronic protection protect personnel, facilities,
capabilities, and equipment. However, electronic protection protects from the effects of electronic attack
(friendly and enemy), while defensive electronic attack primarily protects against lethal attacks by denying
enemy use of the electromagnetic spectrum to guide or trigger weapons.
1-12. During operations, electronic protection includes, but is not limited to, the application of training and
procedures for countering enemy electronic attack. Army commanders and forces understand the threat and
vulnerability of friendly electronic equipment to enemy electronic attack and take appropriate actions to
safeguard friendly combat capability from exploitation and attack. Electronic protection measures minimize
the enemy’s ability to conduct activities of electronic warfare support (defined in paragraph 1-15) and
electronic attack operations successfully against friendly forces. To protect friendly combat capabilities,
units—
z
Regularly brief force personnel on the EW threat.
z
Ensure that they safeguard electronic system capabilities during exercises, workups, and
predeployment training.
z
Coordinate and deconflict electromagnetic spectrum usage.
z
Provide training during routine home station planning and training activities on appropriate
electronic protection active and passive measures.
z
Take appropriate actions to minimize the vulnerability of friendly receivers to enemy jamming
(such as reduced power, brevity of transmissions, and directional antennas).
9 November 2012
FM 3-36
1-5
Chapter 1
1-13. Electronic protection also includes electromagnetic spectrum management (see paragraph 1-37). The
spectrum manager works for the G-6 or S-6 and plays a key role in the coordination and deconfliction of
spectrum resources allocated to the force. Spectrum managers or their direct representatives participate in
the planning for EW operations.
1-14. The development and acquisition of communications and electronic systems includes electronic
protection requirements to clarify performance parameters. Army forces design their equipment to limit
inherent vulnerabilities. If electronic attack vulnerabilities are detected, then units must review these
programs. (See DODI 4650.01 for information on the spectrum certification process and electromagnetic
compatibility.)
ELECTRONIC WARFARE SUPPORT
1-15. Electronic warfare support is a division of electronic warfare involving actions tasked by, or under
direct control of, an operational commander to search for, intercept, identify, and locate or localize sources
of intentional and unintentional radiated electromagnetic energy for the purpose of immediate threat
recognition, targeting, planning, and conduct of future operations (JP 3-13.1). Electronic warfare support
enables U.S. forces to identify the electromagnetic vulnerability of an adversary’s electronic equipment and
systems. Friendly forces take advantage of these vulnerabilities through EW operations.
1-16. Electronic warfare support systems are a source of information for immediate decisions involving
electronic attack, electronic protection, avoidance, targeting, and other tactical employment of forces.
Directed energy may also support EW, such as a laser-warning receiver designed solely to detect and
analyze a laser signal. Electronic warfare support systems collect data and produce information or
intelligence to—
z
Corroborate other sources of information or intelligence.
z
Conduct or direct electronic attack operations.
z
Initiate self-protection measures.
z
Task weapons systems.
z
Support electronic protection efforts.
z
Create or update EW databases.
z
Support cyber electromagnetic activities.
1-17. Electronic warfare support and signals intelligence missions use the same resources. The two differ
in the person who tasks and controls the assets, the purpose for the task, the detected information’s intended
use, the degree of analytical effort expended, the detail of information provided, and the timelines required.
Like tactical signals intelligence, electronic warfare support missions respond to the immediate
requirements of a tactical commander. Signals intelligence above the tactical level is under the operational
control of the National Security Agency/Central Security Service and directly supports the overarching
national security mission. Resources that collect tactical-level electronic warfare support data can
simultaneously collect national-level signals intelligence.
ACTIVITIES AND TERMINOLOGY
1-18. Although new equipment and tactics, techniques, and procedures continue to be developed, the
physics of electromagnetic energy remain constant. Hence, effective EW activities remain the same despite
changes in hardware and tactics.
PRINCIPAL ACTIVITIES
1-19. This section
(paragraphs 1-19 through 1-41) introduces principal EW activities. Principal EW
activities support unified land operations by exploiting the opportunities and vulnerabilities inherent in the
use of the electromagnetic spectrum. The numerous principal EW activities are categorized by the three
EW divisions: electronic attack, electronic warfare support, and electronic protection. (See JP 3-13.1 for a
more information about these principal activities.)
1-6
FM 3-36
9 November 2012
Electronic Warfare Overview
Electronic Attack Activities
1-20. Activities related to electronic attack are either offensive or defensive and include—
z
Countermeasures.
z
Electromagnetic deception.
z
Electromagnetic intrusion.
z
Electromagnetic jamming.
z
Electromagnetic pulse.
z
Electronic probing.
Countermeasures
1-21. Countermeasures are that form of military science that, by the employment of devices and/or
techniques, has as its objective the impairment of the operational effectiveness of enemy activity
(JP 3-13.1). They can be deployed preemptively or reactively. Devices and techniques used for EW
countermeasures include electro-optical-infrared countermeasures and radio frequency countermeasures.
1-22. An electro-optical-infrared countermeasure is a device or technique employing
electro-optical-infrared materials or technology that is intended to impair the effectiveness of enemy
activity, particularly with respect to precision guided weapons and sensor systems
(JP
3-13.1).
Electro-optical-infrared is the part of the electromagnetic spectrum between the high end of the far infrared
and the low end of ultraviolet. Electro-optical-infrared countermeasures may use laser and broadband
jammers, smokes or aerosols, signature suppressants, decoys, pyrotechnics or pyrophorics, high-energy
lasers, or directed infrared energy countermeasures.
1-23. Radio frequency countermeasures consist of any device or technique employing radio frequency
materials or technology that is intended to impair the effectiveness of enemy activity, particularly with
respect to precision guided weapons and sensor systems (JP 3-13.1).
Electromagnetic Deception
1-24. Electromagnetic deception refers to the deliberate radiation, reradiation, alteration, suppression,
absorption, denial, enhancement, or reflection of electromagnetic energy in a manner intended to convey
misleading information to an enemy or to enemy electromagnetic-dependent weapons, thereby degrading or
neutralizing the enemy’s combat capability. Types of electromagnetic deception include manipulative,
simulative, and imitative. Manipulative electromagnetic deception involves actions to eliminate revealing,
or convey misleading, electromagnetic telltale indicators that may be used by hostile forces. Simulative
electromagnetic deception involves actions to simulate friendly, notional, or actual capabilities to mislead
hostile forces. Imitative electromagnetic deception introduces electromagnetic energy into enemy systems
that imitates enemy emissions.
Electromagnetic Intrusion
1-25. Electromagnetic intrusion is the intentional insertion of electromagnetic energy into transmission
paths in any manner, with the objective of deceiving operators or of causing confusion (JP 3-13.1).
Electromagnetic Jamming
1-26. Electromagnetic jamming is the deliberate radiation, reradiation, or reflection of electromagnetic
energy for the purpose of preventing or reducing an enemy’s effective use of the electromagnetic spectrum,
and with the intent of degrading or neutralizing the enemy’s combat capability (JP 3-13.1).
Electromagnetic Pulse
1-27. Electromagnetic pulse is the electromagnetic radiation from a strong electronic pulse, most
commonly caused by a nuclear explosion that may couple with electrical or electronic systems to produce
damaging current and voltage surges (JP 3-13.1).
9 November 2012
FM 3-36
1-7
Chapter 1
Electronic Probing
1-28. Electronic probing is intentional radiation designed to be introduced into the devices or systems of
potential enemies for the purpose of learning the functions and operational capabilities of the devices or
systems (JP 3-13.1). This activity is coordinated through joint or interagency channels and supported by
Army forces.
Electronic Warfare Support Activities
1-29. Activities related to electronic warfare support include—
z
Electronic reconnaissance.
z
Electronic intelligence.
z
Electronics security.
Electronic Reconnaissance
1-30. Electronic reconnaissance is the detection, location, identification, and evaluation of foreign
electromagnetic radiations (JP 3-13.1).
Electronic Intelligence
1-31. Electronic intelligence is technical and geolocation intelligence derived from foreign
noncommunications electromagnetic radiations emanating from other than nuclear detonations or
radioactive sources (JP 3-13.1).
Electronics Security
1-32. Electronics security is the protection resulting from all measures designed to deny unauthorized
persons information of value that might be derived from their interception and study of noncommunications
electromagnetic radiations, e.g., radar (JP 3-13.1).
Electronic Protection Activities
1-33. Activities related to electronic protection include—
z
Electromagnetic hardening.
z
Electronic masking.
z
Emission control.
z
Electromagnetic spectrum management.
z
Wartime reserve modes.
z
Electromagnetic compatibility.
Electromagnetic Hardening
1-34. Electromagnetic hardening is action taken to protect personnel, facilities, and/or equipment by
blanking, filtering, attenuating, grounding, bonding, and/or shielding against undesirable effects of
electromagnetic energy (JP 3-13.1).
Electronic Masking
1-35. Electronic masking is the controlled radiation of electromagnetic energy on friendly frequencies in a
manner to protect the emissions of friendly communications and electronic systems against enemy
electronic warfare support measures/signals intelligence without significantly degrading the operation of
friendly systems (JP 3-13.1).
1-8
FM 3-36
9 November 2012
Electronic Warfare Overview
Emission Control
1-36. Emission control is the selective and controlled use of electromagnetic, acoustic, or other emitters to
optimize command and control capabilities while minimizing for operations security: a. detection by enemy
sensors; b. mutual interference among friendly systems; and/or c. enemy interference with the ability to
execute a military deception plan (JP 3-13.1).
Electromagnetic Spectrum Management
1-37. Electromagnetic spectrum management [also referred to as spectrum management] is planning,
coordinating, and managing joint use of the electromagnetic spectrum through operational, engineering,
and administrative procedures. The objective of spectrum management is to enable electronic systems to
perform their functions in the intended environment without causing or suffering unacceptable interference
(JP 6-0). (See paragraphs 5-8 through 5-10 for more information about coordination and deconfliction of
the electromagnetic spectrum.)
Wartime Reserve Modes
1-38. Wartime reserve modes are characteristics and operating procedures of sensor, communications,
navigation aids, threat recognition, weapons, and countermeasures systems that will contribute to military
effectiveness if unknown to or misunderstood by opposing commanders before they are used, but could be
exploited or neutralized if known in advance (JP 3-13.1). Wartime reserve modes are deliberately held in
reserve for wartime or emergency use and seldom, if ever, applied or intercepted prior to such use.
Electromagnetic Compatibility
1-39. Electromagnetic compatibility is the ability of systems, equipment, and devices that use the
electromagnetic spectrum to operate in their intended environments without causing or suffering
unacceptable or unintentional degradation because of electromagnetic radiation or response (JP 3-13.1). It
involves the application of sound electromagnetic spectrum management; system, equipment, and device
design configuration that ensures interference-free operation; and clear concepts and doctrines that
maximize operational effectiveness.
ELECTROMAGNETIC INTERFERENCE
1-40. Electromagnetic interference is any electromagnetic disturbance, induced intentionally or
unintentionally, that interrupts, obstructs, or otherwise degrades or limits the effective performance of
electronics and electrical equipment (JP 3-13.1). Unintentional electromagnetic interference is often the
result of spurious emissions, intermodulation products and responses, and inadequate electromagnetic
spectrum management.
ELECTRONIC WARFARE REPROGRAMMING
1-41. Electronic warfare reprogramming is the deliberate alteration or modification of electronic warfare
or target sensing systems, or the tactics and procedures that employ them, in response to validated changes
in equipment, tactics, or the electromagnetic environment (JP 3-13.1). These changes may result from
deliberate actions by friendly, adversary or third parties, or they may come from electromagnetic
interference or other inadvertent phenomena. The purpose of electronic warfare reprogramming is to
maintain or enhance the effectiveness of EW and target sensing system equipment. Electronic warfare
reprogramming includes changes to self-defense systems, offensive weapons systems, and intelligence
collection systems.
ADDITIONAL TERMINOLOGY USED IN THE CONTEXT OF ELECTRONIC WARFARE
1-42. This section, (paragraphs 1-42 through 1-50) discusses terms as they apply to the three divisions of
EW—electronic attack, electronic protection, and electronic warfare support. In the context of EW
application, units use several specific terms: control, detection, denial, deception, disruption, degradation,
protection, and destruction.
9 November 2012
FM 3-36
1-9
Chapter 1
1-43. EW capabilities are applied from the air, land, sea, space, and cyberspace by manned, unmanned,
attended, or unattended systems. Units employ these capabilities to achieve the desired lethal or nonlethal
effect on a given target. Units maintain freedom of action in the electromagnetic spectrum while controlling
the use of it by the enemy. Regardless of the application, units employing EW capabilities must use
appropriate levels of control and protection of the electromagnetic spectrum. In this way, they avoid
adversely affecting friendly forces. Improper EW actions must be avoided because they may cause
fratricide or inadvertently eliminate high-value intelligence targets.
Control
1-44. EW aims to enable commanders to gain and maintain freedom of action across the physical domains
and the information environment (which includes cyberspace) through electromagnetic spectrum control.
Commanders achieve control of the electromagnetic spectrum by effectively managing and coordinating
friendly electromagnetic spectrum-dependent systems—such as communications, EW, and computer
networks—while countering and exploiting adversary systems. Commanders ensure deconfliction and
maximum integration among EW, communications, information collection, cyberspace operations, and
other capabilities.
Detection
1-45. In the context of EW, detection is the active and passive monitoring of an operational environment
for radio frequency, electro-optical, laser, infrared, and ultraviolet electromagnetic threats. Detection is the
first step in EW for exploitation, targeting, and defensive planning. Friendly forces maintain the capability
to detect and characterize interference as hostile jamming or unintentional electromagnetic interference.
Denial
1-46. In the context of EW, denial is controlling the information an enemy receives via the electromagnetic
spectrum and preventing the acquisition of accurate information about friendly forces. Denial uses
traditional jamming techniques, expendable countermeasures, destructive measures, or network
applications. These range from limited effects up to complete denial of usage.
Deception
1-47. In the context of EW, deception is confusing or misleading an enemy by using some combination of
human-produced, mechanical, or electronic means. Through use of the electromagnetic spectrum, EW
deception manipulates the enemy’s decision loop, hindering the enemy’s ability to establish accurate
situational awareness.
Disruption
1-48. Disruption aims to confuse or delay enemy action. Forces achieve disruption with electromagnetic
jamming, electromagnetic deception, and electromagnetic intrusion. Disruption techniques interfere with
the adversary’s use of the electromagnetic spectrum to limit adversary combat capabilities. Disruption
resembles denial but is not as comprehensive in execution or impact on the enemy. A trained enemy
operator can thwart disruption through electronic protection measures, such as procedures to counter
communications jamming. Disruption enhances attacks on hostile forces and acts as a force multiplier by
increasing adversary uncertainty while reducing uncertainty for friendly forces. Advanced electronic attack
activities (discussed in paragraphs 1-20 through 1-28) offer the opportunity to nondestructively disrupt or
degrade adversary infrastructure.
1-10
FM 3-36
9 November 2012
Electronic Warfare Overview
Degradation
1-49. Degradation refers to making an enemy incapable of performing the designated mission. It resembles
disruption but is not as comprehensive in execution or impact on the enemy. Degradation may confuse or
delay the actions of an untrained enemy, but a trained operator can work around the effects. Like
disruption, forces achieve degradation with electromagnetic jamming, electromagnetic deception, and
electromagnetic intrusion. Degradation may be the best choice to stimulate the enemy to determine their
response or for electronic attack conditioning.
Protection
1-50. In the context of EW, protection is the use of physical properties; operational tactics, techniques, and
procedures; and planning and employment processes to ensure friendly use of the electromagnetic
spectrum. Protection includes ensuring that offensive EW activities do not electronically destroy or degrade
friendly intelligence sensors or communications systems. Forces achieve protection by component
hardening, emission control, and frequency management and deconfliction. Frequency management and
deconfliction include the capability to detect, characterize, geolocate, and mitigate electromagnetic
interference that affects operations. Protection includes other means to counterattack and defeat enemy
attempts to control the electromagnetic spectrum. Additionally, organizations—such as a joint force
commander’s EW staff or a joint EW coordination cell—enhance electronic protection by deconflicting
EW efforts.
Destruction
1-51. Destruction, in the context of EW, is the elimination of targeted enemy systems. Sensors and
command and control nodes are lucrative targets because their destruction strongly influences the enemy’s
perceptions and abilities to coordinate actions. Various weapons and techniques—ranging from
conventional munitions and directed-energy weapons to network attacks—can destroy enemy systems that
use the electromagnetic spectrum. Electronic warfare support provides target location and related
information. While destroying enemy equipment can effectively deny the enemy use of the electromagnetic
spectrum, the duration of denial depends on the enemy’s ability to reconstitute. (See JP 3-13.1.)
MEANS VERSUS EFFECTS
1-52. Forces apply EW means against targets to create a full range of lethal and nonlethal effects.
Choosing a specific EW capability depends on the desired effect on the target and other considerations,
such as time available or risk of collateral damage. EW capabilities provide commanders with additional
options for achieving their objectives. During major combat operations, there may be circumstances where
commanders want to limit the physical damage on a given target. Under such circumstances, the EW staff
clearly articulates to the commander the lethal and nonlethal effects EW capabilities can achieve. For
example, a target might be enemy radar mounted on a fixed tower. Two possible EW options to defeat the
radar would be to jam the radar or destroy it with antiradiation missiles. If commanders wanted to limit
damage to the tower, they could use an electronic attack jamming platform. In circumstances where
commanders could not sufficiently limit undesired effects such as collateral damage, they would be
constrained from applying physical force. In any case, the EW staff articulates succinctly how EW
capabilities can help achieve desired effects by providing lethal and nonlethal options for commanders.
SUMMARY
1-53. As the modern battlefield becomes more technologically sophisticated, forces continue to execute
military operations in an increasingly complex electromagnetic environment. Therefore, commanders and
staffs need to thoroughly understand and articulate how the electromagnetic environment affects their
operations and how they can use friendly EW operations to gain an advantage. Commanders and staffs use
the terminology presented in this chapter to describe the application of EW. This ensures a common
understanding and consistency within plans, orders, standard operating procedures, and directives.
9 November 2012
FM 3-36
1-11
This page intentionally left blank.
Chapter 2
Electronic Warfare in Unified Land Operations
This chapter describes how commanders apply electronic warfare to support unified
land operations. It discusses the role of electronic warfare. It then discusses how
electronic warfare enables each of the warfighting functions.
THE ROLE OF ELECTRONIC WARFARE
2-1. The ability to control the electromagnetic spectrum is central to unified land operations. As
information technology becomes universally available, more adversaries rely on communications and
computer networks to make and implement decisions. Radios remain the backbone of tactical military
mission command architectures. Most communications relayed over radio networks are becoming digital as
more computers link networks through transmitted frequencies, making computer networks and
communications more dependent on the electromagnetic spectrum.
2-2. Army electronic warfare (EW) operations seek to enable the land force commander to support
unified land operations through decisive action. Decisive action consists of the simultaneous combination
of offense, defense, and stability or defense support of civil authorities appropriate to the mission and
environment. The central idea of unified land operations is to seize, retain, and exploit the initiative to gain
and maintain a position of relative advantage in sustained land operations in order to create the conditions
for favorable conflict resolution. (See ADP 3-0 for more information about unified land operations.)
2-3. The foundation of unified land operations is built on initiative, decisive action, and mission
command—linked and nested through purposeful and simultaneous execution of both combined arms
maneuver and wide area security—to achieve the commander’s intent and desired end state. Appropriately
applied, EW enables successful unified land operations. Commanders and staffs determine which resident
and joint force EW capabilities to use in support of each element of decisive action. As they apply the
appropriate level of EW effort to support these elements, commanders can seize, retain, and exploit the
initiative within the electromagnetic environment.
SUPPORT OF THE WARFIGHTING FUNCTIONS
2-4. Once a commander can seize, retain, and exploit the initiative within the electromagnetic
environment, then control becomes possible. Commanders plan, prepare, execute, and assess EW
operations to control the electromagnetic spectrum.
2-5. To exercise electromagnetic spectrum control (see paragraph 1-44), commanders effectively apply
and integrate EW operations across the warfighting functions: mission command, movement and
maneuver, intelligence, fires, sustainment, and protection.
MISSION COMMAND
2-6. The mission command warfighting function develops and integrates those activities enabling a
commander to balance the art of command and science of control. EW supports the mission command
warfighting function by—
z
Protecting the mission command system from the effects of friendly and adversary EW
operations.
z
Controlling friendly EW systems through—
„ Frequency deconfliction.
„ Asset tracking.
9 November 2012
FM 3-36
2-1
Chapter 2
„ Controlling EW effects during execution.
„ Reprogramming of EW systems.
„ Registration of all electromagnetic spectrum emitting devices with the spectrum manager
(prior to deployment and when new systems or devices are added to the deployed force).
z
Developing EW mission command tools to enhance required coordination between Army and
joint EW operations.
z
Integrating, coordinating, deconflicting, and synchronizing EW operations through the EW
working group (see chapter 3).
z
Improving input to the common operational picture, related to the electromagnetic spectrum and
EW, which enhances the commander’s situational understanding.
z
Monitoring and assessing EW operations.
MOVEMENT AND MANEUVER
2-7. The movement and maneuver warfighting function is the related tasks and systems that move and
employ forces to achieve a position of relative advantage over the enemy and other threats. Direct fire and
close combat is inherent in maneuver. EW enables the movement and maneuver of Army forces by—
z
Suppressing and destroying enemy integrated air defenses.
z
Denying enemy information systems and information collection sensors.
z
Designating target and range finding.
z
Protecting friendly forces from effects of friendly and enemy EW.
z
Providing lethal and nonlethal effects against enemy combat capability (personnel, facilities, and
equipment).
z
Providing threat warning and direction finding.
z
Using the electromagnetic spectrum to counter improvised explosive devices.
z
Providing electromagnetic spectrum obscuration, low observability, and multispectral stealth.
INTELLIGENCE
2-8. The intelligence warfighting function is the related tasks and systems that facilitate understanding the
enemy, terrain, and civil considerations. It includes the synchronization of collection requirements with the
execution of tactical tasks such as reconnaissance, surveillance, and related intelligence operations. EW
enables the intelligence warfighting function by—
z
Increasing access for intelligence collection assets
(systems and personnel) by reducing
antiaccess, antipersonnel, and antisystems threats.
z
Increasing friendly forces’ abilities to search for, intercept, identify, and locate sources of
radiated electromagnetic energy in support of targeting and future operations.
z
Increasing friendly forces’ abilities in providing threat recognition and threat warning to the
force.
z
Providing indications and warning of threat emitters and radar.
z
Denying and destroying threat information collection systems.
FIRES
2-9. The fires warfighting function is the related tasks and systems that provide collective and coordinated
use of Army indirect fires, air and missile defense, and joint fires through the targeting process. The
integration and synchronization of cyber electromagnetic activities is a task of this warfighting function.
EW supports the fires warfighting function by—
z
Detecting and locating surface targets.
z
Providing electro-optical-infrared and radio frequency countermeasures.
z
Providing electromagnetic deception.
z
Providing electromagnetic intrusion.
2-2
FM 3-36
9 November 2012
Electronic Warfare in Unified Land Operations
z
Providing electromagnetic jamming.
z
Disrupting enemy sensors and command and control nodes.
z
Disrupting and degrading enemy infrastructure.
z
Destroying targeted enemy systems.
SUSTAINMENT
2-10. The sustainment warfighting function is the related tasks and systems that provide support and
services to ensure freedom of action, extend operational reach, and prolong endurance. EW supports the
sustainment warfighting function by—
z
Protecting sustainment forces from friendly and adversary use of EW in static or mobile
environments.
z
Enhancing electromagnetic environment situational awareness through the interception,
detection, identification, and location of adversary electromagnetic emissions used to provide
indications and warnings. (This information can assist in convoy planning, asset tracking, and
targeting of potential threats to sustainment operations.)
z
Countering improvised explosive devices to support ground lines of communications (using
counter radio-controlled improvised explosive device systems and other means to counter threats
triggered through the electromagnetic spectrum, such as lasers).
z
Providing spectrum deconfliction and emissions control procedures in support of sustainment
control.
z
Providing electromagnetic spectrum obscuration, low-observability, and multispectral stealth
(for protection during sustainment operations).
PROTECTION
2-11. The protection warfighting function is the related tasks and systems that preserve the force so the
commander can apply maximum combat power to accomplish the mission. EW enables the protection
warfighting function by—
z
Enhancing electromagnetic spectrum situational awareness through the interception, detection,
identification, and location of adversary electromagnetic emissions used to provide indications
and warnings of threat emitters and radars.
z
Denying, disrupting, or destroying electromagnetic-spectrum-triggered improvised explosive
devices and enemy air defense systems.
z
Deceiving enemy forces.
z
Providing electromagnetic spectrum obscuration, low-observability, and multispectral stealth.
z
Providing EW countermeasures for platform survivability (air and ground).
z
Enabling area denial (lethal and nonlethal) against personnel, vehicles, and aircraft.
z
Protecting friendly personnel, equipment, and facilities from friendly and enemy electronic
attack, including friendly information systems and information. (This includes the coordination
and use of airborne and ground-based electronic attack with higher and adjacent units.)
SUMMARY
2-12. EW supports unified land operations by detecting, denying, deceiving, disrupting, or degrading and
destroying enemy combat capabilities and by controlling and protecting friendly use of the electromagnetic
spectrum. EW applied across the warfighting functions enables commanders to address a broad set of
electromagnetic-spectrum-related targets to gain and maintain an advantage within the electromagnetic
spectrum.
9 November 2012
FM 3-36
2-3
Chapter 3
Electronic Warfare Organization
This chapter discusses an adaptable organizational design for electronic warfare
activities that ensures coordination, synchronization, and integration of electronic
warfare into unified land operations. It includes a discussion of key personnel for
planning and coordination electronic warfare activities.
ORGANIZATIONAL DESIGN FOR ELECTRONIC WARFARE
ACTIVITIES
3-1. Operational challenges across the electromagnetic spectrum are expanding rapidly. As Army
electronic warfare (EW) capabilities expand to meet these challenges, the organizational design required to
coordinate, synchronize, integrate, and deconflict EW capabilities is centered around the EW element and
the EW working group. (Figure 3-1, page 3-2, illustrates the EW coordination organizational framework.)
A flexible organizational framework and capable, proficient electronic warfare personnel enable the
commander’s electronic warfare capability on the battlefield.
THE ELECTRONIC WARFARE ELEMENT AND ELECTRONIC WARFARE WORKING GROUP
3-2. An EW element is an organic organization in brigade, division, corps, and Army Service component
command (ASCC) staffs. The EW element is responsible to the G-3 or S-3 and is located within the
mission command cell.
3-3. Primarily, the EW element develops EW plans and monitors EW operations and activities. The EW
element plays an important role in requesting and integrating joint air and ground EW assets and manages
the organic EW “fight” within the mission command cell. The EW element ensures electromagnetic
spectrum management within its specified area of operations and assists the ground commander in
coordinating shaping operations. The EW element, usually through the EW working group, leads and
facilitates the integration of cyber electromagnetic activities (CEMA).
3-4. A working group is a grouping of predetermined staff representatives who meet to provide analysis,
coordinate, and provide recommendations for a particular purpose or function (ATTP 5-0.1). The EW
working group, when established, is responsible to the G-3 or S-3 through the mission command cell. An
EW working group usually includes representation from across the staff.
(Joint doctrine calls this
organization the electronic warfare cell [EWC].) The EW working groups depicted in figure 3-1 facilitate
the internal (Army) and external (joint) integration, synchronization, and deconfliction of EW actions with
mission command, movement and maneuver, intelligence, fires, sustainment, and protection warfighting
functions. Normally, EW working groups do not add additional structure to an existing organization. As
depicted in figure 3-1, working groups vary in size and composition based on echelon. The EW working
group integrates EW actions as part of larger CEMA. (See appendix G for more information on CEMA.)
3-5. Normally, in brigade through ASCC organizations, the senior electronic warfare officer (EWO)
heads the EW working group and is accountable to the G-3 or S-3 for integrating EW requirements.
Working within the mission command cell, the EWO coordinates directly with the fire support coordinator
to integrate EW into the targeting process. This coordination ensures EW is fully integrated with all other
effects. Additional staff representation within EW working groups may include a fire support coordinator, a
spectrum manager, a space operations officer, and liaison officers as required. Depending on the echelon,
liaisons could include joint, interagency, and multinational representatives. When an Army headquarters
serves as the headquarters of a joint task force or joint force land component command, the Army
headquarters’ working group becomes the joint force EWC.
9 November 2012
FM 3-36
3-1
Chapter 3
Figure 3-1. Electronic warfare coordination organizational framework
3-2
FM 3-36
9 November 2012
Electronic Warfare Organization
3-6. When Army forces are employed as part of a joint or multinational force, they normally have EW
representatives supporting higher headquarters’ EW coordination organizations. These organizations may
include the joint force commander’s EW staff or the information operations cell within a joint task force.
Sometimes a component EW organization may be designated as the joint EWC. (Chapter 6 discusses joint
EW operations in more detail.) The overall structure of the combatant force and the level of EW to be
conducted determine the structure of the joint EWC. The organization to accomplish the required EW
coordination and functions varies by echelon.
3-7. Regardless of the organizational framework employed, EW working groups perform specific tasks.
Table 3-1, page 3-4, details the functions of the EW working groups by echelon, from battalion to ASCC.
There is no formal organizational framework for EW at the company level (see paragraph 3-9).
BATTALION-LEVEL STAFFING
3-8. Battalion-level organizations have an EW noncommissioned officer who leads the EW working
group and is accountable to the S-3 for integrating EW requirements. This is in contrast to organizations at
brigade through ASCC level, which have an EWO and staff organizations to lead planning and
coordination. Additional staff representation within EW working groups at the battalion level may include
the S-2, S-6, fire support officer, and a joint terminal attack controller, when assigned. The battalion EW
working group coordinates battalion EW operations with the brigade combat team EW working group. (See
table 3-1, page 3-4 for an outline of the functions of the battalion EW working group.)
COMPANY- LEVEL STAFFING
3-9. At the company level, trained EW personnel holding an additional skill identifier of 1K (CREW
Master Gunner Course) or 1J (operational EW operations) perform several tasks. They advise the
commander on using EW equipment, track EW equipment status, assist operators in the use and
maintenance of EW equipment, and coordinate with higher headquarters EW working groups.
9 November 2012
FM 3-36
3-3
Chapter 3
Table 3-1. Functions of electronic warfare working groups
EW Working Group
Functions
Division and Above
Conduct EW planning in support of theater of operations or combatant
command requirements.
ALO
Develop and integrate EW actions into operation plans and operational
EWO
concepts.
EW Targeting
Coordinate joint EW training and exercises.
G-2
Develop information to support planning (joint restricted frequency list,
G-3
spectrum management, and deconfliction).
G-5
Serve as the joint force land component or JTF EW working group.
G-6
When directed, serve as the jamming control authority.
G-7
Develop and promulgate EW policies and support higher-level policies.
G-9
Identify and coordinate intelligence support requirements for EW.
FSCOORD
Plan, coordinate, and assess offensive and defensive EW requirements.
LNOs
Plan, coordinate, synchronize, deconflict, and assess EW operations.
Spectrum manager
Maintain current assessment of EW resources available to the commander.
Space support officer
Prioritize EW effects and targets.
Predict effects of friendly and enemy EW.
Coordinate spectrum management and radio frequency deconfliction with
G-6 and J-6.
Plan, assess, and implement friendly electronic security measures.
Plan, coordinate, integrate, and deconflict EW effects within the operations
process.
Brigade
Develop and integrate EW actions into operation plans and exercises.
ALO
Support EW policies.
EWO
Plan, prepare, execute, and assess EW operations.
EW targeting
Integrate EW intelligence preparation of the battlefield into the operations
process.
Fires
Identify and coordinate intelligence support requirements for BCT and
S-2
subordinate units’ EW operations.
S-3
Assess offensive and defensive EW requirements.
S-6
Maintain current assessment of EW resources available to the unit.
S-7
Prioritize BCT and subordinate units’ EW targets.
S-9
Plan, coordinate, and assess friendly EW operations.
LNOs
Implement friendly electronic security measures (for example,
Spectrum manager
electromagnetic spectrum mitigation and network protection).
When directed, serve as the jamming control authority.
Battalion
Support BCT EW requirements to operations and exercises.
EW NCO
Evaluate EW offensive, defensive, and support requirements.
Fires
Coordinate EW operations with higher headquarters.
S-2
Identify and coordinate intelligence support requirements with higher
S-3
headquarters.
S-6
Execute EW in support of current operations.
S-9
Assess EW operations.
JTAC
ALO air liaison officer
G-9
assistant chief of staff, civil affairs operations
ASCC Army Service component command
J-6 communications system directorate of a joint staff
BCT brigade combat team
JTAC joint terminal attack controller
EW electronic warfare
JTF
joint task force
EWO electronic warfare officer
LNO
liaison officer
FSCOORD fire support coordinator
NCO
noncommissioned officer
G-2
assistant chief of staff, intelligence
S-2
intelligence staff officer
G-3
assistant chief of staff, operations
S-3
operations staff officer
G-5
assistant chief of staff, plans
S-6
signal staff officer
G-6
assistant chief of staff, signal
S-7
inform and influence activities staff officer
G-7
assistant chief of staff, inform and influence activities
S-9
civil affairs staff officer
3-4
FM 3-36
9 November 2012
Electronic Warfare Organization
KEY PERSONNEL FOR PLANNING AND COORDINATING
ELECTRONIC WARFARE ACTIVITIES
3-10. Key personnel involved in the planning and coordination of EW activities are—
z
G-3 or S-3 staff.
z
EWO.
z
Fire support coordinator.
z
G-2 or S-2 staff.
z
G-6 or S-6 staff.
z
G-7 or S-7 staff.
z
Electromagnetic spectrum manager.
z
Liaisons.
G-3 OR S-3 STAFF
3-11. The G-3 or S-3 staff is responsible for the overall planning, coordination, and supervision of EW
activities, except for intelligence. The EWO is part of the G-3 or S-3 staff. The G-3 or S-3 staff—
z
Plans for and incorporates EW into operation plans and orders, in particular within the fire
support plan and the information operations plan (in joint operations).
z
Tasks EW actions to assigned and attached units.
z
Exercises control over electronic attack, including integration of electromagnetic deception
plans.
z
Directs electronic protection measures the unit will take based on recommendations from the
G-6 or S-6, the EWO, and the EW working group.
z
Coordinates and synchronizes EW training with other unit training requirements.
z
Issues EW support tasks within the unit information collection plan. These tasks are according to
the collection plan and the requirements tools developed by the G-2 or S-2 and the requirement
manager.
z
Coordinates with the EW working group to ensure planned EW operations support the overall
tactical plan.
z
Integrates electronic attack within the targeting process.
ELECTRONIC WARFARE OFFICER
3-12. As a member of the G-3 or S-3 staff, the EWO plans, coordinates, and supports the execution of EW
and other CEMA (see appendix E). The EWO—
z
Leads the EW working group.
z
Plans, coordinates, and assesses EW offensive, defensive, and support requirements.
z
Supports the G-2 or S-2 during intelligence preparation of the battlefield.
z
Supports the fire support coordinator to ensure electronic attack fires are integrated with all other
effects.
z
Plans, assesses, and implements friendly electronics security measures.
z
Prioritizes EW effects and targets with the fire support coordinator.
z
Plans and coordinates EW operations across functional and integrating cells.
z
Deconflicts EW operations with the spectrum manager.
z
Maintains a current assessment of available EW resources.
z
Participates in other cells and working groups (as required) to ensure EW integration.
z
Serves as EW subject matter expert on existing EW rules of engagement.
z
When designated, serves as the jamming control authority (see paragraph 5-11).
z
Prepares, submits for approval, and supervises the issuing and implementation of fragmentary
orders for EW operations.
9 November 2012
FM 3-36
3-5
Chapter 3
G-2 OR S-2 STAFF
3-13. The G-2 or S-2 staff advises the commander and staff on the intelligence aspects of EW. The G-2 or
S-2 staff—
z
Provides threat data to support programming of unit EW systems and deconfliction of their use
by the EW working group.
z
Ensures that electronic order of battle requirements is included in the intelligence collection
plan.
z
Determines enemy EW organizations, disposition, capabilities, and intentions via collection and
analysis.
z
Determines enemy EW vulnerabilities and high-value targets.
z
Assesses effects of friendly EW operations on the enemy.
z
Helps prepare the intelligence-related portion of the EW running estimate.
z
Provides input to the restricted frequency list (see paragraphs C-9 to C-10) by recommending
guarded frequencies.
z
Provides updates on the rapid electronic order of battle.
z
Maintains appropriate threat EW databases.
z
Works with the EW working group to synchronize intelligence collection with EW requirements
and deconflict with planned EW actions.
z
Ensures deconfliction of EW threat data with friendly electromagnetic spectrum needs.
NETWORK OPERATIONS OFFICER
3-14. The network operations officer (in the G-6 or S-6 staff) coordinates the communications network for
the following actions:
z
Preparing the electronic protection policy on behalf of the commander.
z
Assisting in preparing EW plans and orders.
z
Reporting all enemy electronic attack activity detected by friendly communications and
electronics elements to the EW working group for counteraction.
z
Assisting the unit EWO with resolving EW systems maintenance and communications fratricide
problems.
SPECTRUM MANAGER
3-15. The spectrum manager coordinates electromagnetic spectrum use for a wide variety of
communications and electronic resources. The spectrum manager—
z
Issues the signal operating instructions.
z
Provides all spectrum resources to the task force.
z
Coordinates for spectrum usage with higher echelon G-6 or S-6, and applicable host-nation and
international agencies as necessary.
z
Coordinates the preparation of the restricted frequency list and issuance of emissions control
guidance.
z
Coordinates frequency allotment, assignment, and use.
z
Coordinates electromagnetic deception plans and operations in which assigned communications
resources participate.
z
Coordinates measures to reduce electromagnetic interference.
z
Coordinates with higher echelon spectrum managers for electromagnetic interference resolution
that cannot be resolved internally.
3-6
FM 3-36
9 November 2012
Electronic Warfare Organization
z
Assists the EWO in issuing guidance in the unit (including subordinate elements) regarding
deconfliction and resolution of interference problems between EW systems and other friendly
systems.
z
Participates in the EW working group to deconflict friendly electromagnetic spectrum
requirements with planned EW operations and intelligence collection.
G-7 OR S-7 STAFF
3-16. The G-7 or S-7 is responsible to the commander for all inform and influence activities. CEMA
enable inform and influence activities by undertaking deliberate actions designed to gain and maintain
informational advantages in the information environment. Typically, but not solely, these actions occur
through cyberspace operations and EW. The G-7 or S-7—
z
Ensures that EW is effectively integrated with other inform and influence activities and
deconflicts EW actions as required.
z
Considers second- and third-order effects of EW on inform and influence activities and
proactively plans to enhance intended effects and their consequences.
SUMMARY
3-17. The organizational framework for EW coordination and functions varies by echelon. The necessity to
form an EW working group is largely based on the overall structure of the force and the level at which EW
is conducted. During the conduct of unified action, other Service EWOs, signals intelligence officers, and
EW representatives coordinate with Army EW working groups in the planning, preparation, execution, and
assessment of EW operations. Flexible organizational designs ensure adaptable and effective EW support
to operations regardless of the force structure.
9 November 2012
FM 3-36
3-7
Chapter 4
Electronic Warfare and the Operations Process
This chapter first introduces the operations process. Then it discusses electronic
warfare planning. Next, it discusses electronic warfare preparation. Then it discusses
electronic warfare execution. It concludes with a discussion of electronic warfare
assessment.
THE OPERATIONS PROCESS
4-1. The operations process is commander-centric, informed by the mission command approach to the
activities of planning, preparing, executing, and assessing military operations. These activities may occur
sequentially or continuously throughout an operation, overlapping and recurring as required
(see
figure 4-1). The electronic warfare officer (EWO) is actively involved in the operations process. Electronic
warfare
(EW) planning, preparation, execution, and assessment require collective expertise from
operations, intelligence, signal, and mission command staffs. The EWO integrates efforts across the
warfighting functions to ensure that EW operations support the commander’s objectives.
Figure 4-1. The operations process
ELECTRONIC WARFARE PLANNING
4-2. EW planning is based on three main considerations. The first consideration is applying the military
decisionmaking process
(MDMP). EW planners understand and follow its seven steps. In a
time-constrained environment they still follow all seven steps, abbreviating the MDMP appropriately. The
second consideration is that EW planners apply integrating processes. They understand how EW actions
contribute to operations as a whole. They integrate and synchronize EW actions starting with planning and
continuing throughout operations. Finally, EW planners apply specific EW employment considerations.
9 November 2012
FM 3-36
4-1
Chapter 4
THE MILITARY DECISIONMAKING PROCESS
4-3. EW planning minimizes fratricide and optimizes operational effectiveness during execution.
Therefore, EW planning occurs concurrently with other operational planning during the MDMP. The
MDMP synchronizes several processes, including intelligence preparation of the battlefield (IPB), the
targeting process (see FM 3-60), and risk management (see FM 5-19). These processes occur continuously
during operations.
4-4. Depending on the organizational echelon, the EW staff officer leads EW planning through the EW
working group. (The EW working group at echelons above brigade is sometimes referred to as an EW
coordination cell.) An EW working group normally has representatives from the G-2 or S-2, G 3 or S-3,
G-6 or S-6, and other staff as required. Other staff can include the fire support coordinator or fire support
officer, spectrum manager, air liaison officer, space officer, and liaison officers. The next sections
(paragraphs 4-5 through 4-30) outline key EW contributions to the processes and planning actions that
occur during the seven steps of the MDMP. (ATTP 5-0.1 discusses the MDMP in detail.)
Receipt of Mission
4-5. Commanders begin the MDMP upon receiving or anticipating a new mission. During this first step,
commanders issue their initial guidance and initial information requirements or commander’s critical
information requirements.
4-6. Upon receipt of a mission, the EW staff officer alerts the staff supporting the EW working group.
The EWO and supporting staff begin to gather the resources required for mission analysis. Resources might
include a higher headquarters operation order or plan, maps of the area of operations, electronic databases,
required field manuals and standard operating procedures, current running estimates, and reachback
resources (see appendix D). The EWO also provides input to the staff’s initial assessment and updates the
EW running estimate. As part of this update, the EWO identifies all friendly EW assets and resources and
their statuses throughout the operations process. Lastly, the EWO monitors, tracks, and seeks information
relating to EW operations to assist the commander and staff.
Mission Analysis
4-7. Planning includes a thorough mission analysis. Both the process and products of mission analysis
help commanders refine their situational understanding and determine their restated mission. The EWO and
supporting staff of the EW working group contribute to the overall mission analysis by participating in IPB
and through the planning actions given in paragraphs 4-8 through 4-13. (Paragraphs 4-34 through 4-39
discuss EW input to IPB during operations.)
4-8. The EWO and working group—
z
Determine known facts, status, or conditions of forces capable of EW operations as defined in
the commander’s planning documents, such as a warning order or operation order.
z
Identify EW planning support requirements and develop support requests as needed.
z
Determine facts and develop necessary assumptions relevant to EW such as the status of EW
capability at probable execution and time available.
z
Conduct an initial EW risk assessment and review the risk assessment done by the entire
working group.
z
Provide an EW perspective when developing the commander’s restated mission.
z
Help develop the mission analysis briefing for the commander.
4-9. The EWO and working group support the G-2 and S-2 in IPB by—
z
Determining the threat’s dependence on the electromagnetic spectrum.
z
Determining the threat’s EW capability.
z
Determining the threat’s intelligence system collection capability.
z
Determining which threat vulnerabilities relate to the electromagnetic spectrum.
4-2
FM 3-36
9 November 2012
Electronic Warfare and the Operations Process
z
Determining how an operational environment affects EW operations, using the operational
variables and mission variables for analysis as appropriate.
z
Initiating, refining, and validating information requirements and requests for information.
4-10. The EWO and EW working group determine enemy and friendly decisive points and list their critical
capabilities, requirements, and vulnerabilities from an EW perspective. They determine how EW
capabilities can best attack an enemy’s command and control system. The EWO and EW working group
list the critical requirements associated with command and control capability (or command and control
nodes) and then identify the critical vulnerabilities associated with the critical requirements. Through this
process, the EWO and EW working group help determine which enemy vulnerabilities can be engaged by
EW capabilities to produce a decisive outcome.
4-11. The EWO and EW working group identify and list—
z
High-value targets that can be engaged by EW capabilities.
z
Tasks that EW forces perform according to EW division—electronic attack, electronic warfare
support, and electronic protection—in support of the warfighting functions. These include—
„ Specified EW tasks.
„ Implied EW tasks.
z
Constraints relevant to EW:
„ Actions EW operations must perform.
„ Actions EW operations cannot perform.
„ Other constraints.
4-12. The EWO and EW working group analyze—
z
The commander’s intent and mission from an EW perspective.
z
Mission variables (mission, enemy, terrain and weather, troops and support available, time
available, and civil considerations) from an EW perspective.
z
The initial EW force structure to determine if forces have sufficient assets to perform the
identified EW tasks. (If organic assets are insufficient, they draft requests for support and
augmentation.)
4-13. By the conclusion of mission analysis, the EWO and EW working group generate or gather the
following products and information:
z
The initial information requirements for EW operations.
z
A rudimentary command and control nodal analysis of the enemy.
z
The list of EW tasks required to support the mission.
z
A list of assumptions and constraints related to EW operations.
z
The planning guidance for EW operations.
z
EW personnel augmentation or support requirements.
z
An update of the EW running estimate.
z
EW portion or input to the commander’s restated mission.
Course of Action Development
4-14. After receiving the restated mission, commander’s intent, and commander’s planning guidance, the
staff develops courses of action (COAs) for the commander’s approval. This section (paragraphs 4-15
through 4-29) discusses specific actions the EWO and EW working group perform to support COA
development. Figure 4-2, page 4-4, depicts the required input to COA development and identifies the key
contributions made by the EWO and EW working group during the process and output stages (center and
right of figure 4-2).
9 November 2012
FM 3-36
4-3
Chapter 4
Figure 4-2. Course of action development
4-15. The EWO and EW working group contribute to COA development through the following planning
actions:
z
Determining which friendly EW capabilities are available to support the operation, including
organic and nonorganic capabilities for planning.
z
Determining possible friendly and enemy EW operations, including identifying friendly and
enemy vulnerabilities.
4-16. Additionally, the EWO and EW working group help develop initial COA options by—
z
Identifying COA options that may be feasible based on their functional expertise
(while
brainstorming of COAs).
z
Providing options to modify a COA to accomplish EW tasks more effectively.
z
Identifying information (relating to EW options) that may affect other functional areas and
sharing that information immediately.
z
Identifying the EW tasks required to support the COA options.
4-17. The EWO and EW working group determine the forces required for mission accomplishment by—
z
Determining the EW tasks that support each COA and how to perform those tasks based on
available forces and capabilities.
(They consider available special technical operations
capabilities in this analysis.)
z
Providing input and support to proposed deception options.
z
Ensuring the EW options provided in support of all possible COAs meet the established
screening criteria.
4-18. The EWO and EW working group identify EW supporting tasks and their purposes in support of
decisive, shaping, and sustaining operations as each COA is developed. These EW tasks include those—
z
Focused on defeating the enemy.
z
Required to protect friendly force operations.
4-4
FM 3-36
9 November 2012
Electronic Warfare and the Operations Process
4-19. The EWO and EW working group assist in developing the COA briefing as required. By the
conclusion of COA development, the EWO and EW working group generate or gather the following
products and information:
z
A list of EW objectives and desired effects related to the EW tasks.
z
A list of EW capabilities required to perform the stated EW tasks for each COA.
z
The information and intelligence requirements for performing the EW tasks in support of each
COA.
z
An update to the EW running estimate.
Course of Action Analysis (War-Gaming)
4-20. The COA analysis allows the staff to synchronize the elements of combat power for each COA and
to identify the COA that best accomplishes the mission. It helps the commander and staff to—
z
Determine how to maximize the effects of combat power while protecting friendly forces and
minimizing collateral damage.
z
Further develop a visualization of the battle.
z
Anticipate battlefield events.
z
Determine conditions and resources required for success.
z
Determine when and where to apply force capabilities.
z
Focus IPB on enemy strengths and weaknesses as well as the desired end state.
z
Identify coordination needed to produce synchronized results.
z
Determine the most flexible COA.
Paragraphs 4-21 and 4-22 discuss specific actions the EWO and EW working group perform to support
COA analysis. (See ATTP 5-0.1 for more information on war-gaming and preparing a synchronization
matrix.)
4-21. During COA analysis, the EWO and EW working group synchronize EW actions and assist the staff
in integrating EW capabilities into each COA. The EWO and EW working group address how each EW
capability supports each COA. They apply these capabilities to associated timelines, critical events, and
decision points in the synchronization matrix. During this planning phase, the EWO and EW working
group aim to—
z
Analyze each COA from an EW functional perspective.
z
Recommend any EW task-organization adjustments.
z
Identify key EW decision points.
z
Provide EW data for the synchronization matrix.
z
Recommend EW priority intelligence requirements.
z
Identify EW supporting tasks to any branches and sequels.
z
Identify potential EW high-value targets.
z
Assess EW risks created by telegraphing intentions, allowing time for enemy to mitigate effects,
unintended effects of electronic attack, and the impact of asset or capability shortfalls.
4-22. By the conclusion of COA analysis (war-gaming), the EWO and EW working group generate or
gather the following products and information:
z
The EW data for the synchronization matrix.
z
The EW portion of the branches and sequels.
z
A list of high-value targets related to EW.
z
A list of commander’s critical information requirements related to EW.
z
The risk assessment for EW operations in support of each COA.
z
An update to the EW running estimate.
9 November 2012
FM 3-36
4-5
Chapter 4
Course of Action Comparison
4-23. COA comparison starts with all staff analyzing and evaluating the advantages and disadvantages of
each COA from their perspectives. The staff presents their findings for the others’ consideration. Using the
evaluation criteria developed during COA analysis, the staff outlines each COA, highlighting its advantages
and disadvantages. Comparing the strengths and weaknesses of the COAs identifies their advantages and
disadvantages with respect to each other. (See ATTP 5-0.1 for a further discussion of COA comparison).
4-24. During COA comparison, the EWO and EW working group compare COAs based on the EW-related
advantages and disadvantages (see figure 4-3). Typically, planners use a matrix to assist in the COA
comparisons. The EWO may develop an EW functional matrix to compare the COAs or to use the decision
matrix developed by the staff. Regardless of the matrix used, the evaluation criteria developed before
war-gaming are used to compare the COAs. Normally, the chief of staff or executive officer weights each
criterion used for the evaluation based on its relative importance and the commander’s guidance. (See
ATTP 5-0.1 for more information on COA comparison and a sample decision matrix.)
Figure 4-3. Course of action comparison
4-25. By the conclusion of COA comparison, the EWO and EW working group generate or gather the
following products and information:
z
A list of the pros and cons for each COA, relative to EW.
z
A prioritized list of the COAs from an EW perspective.
z
An update to the EW running estimate if required.
Course of Action Approval
4-26. The COA approval process has three components. First, the staff recommends a COA, usually in a
decision briefing. Second, the commander decides which COA to approve. Lastly, the commander issues
the final planning guidance.
4-27. During COA approval, the EWO supports the development of the COA decision briefing and the
development of the warning order as required. If possible, the EWO attends the COA decision briefing to
receive the commander’s final planning guidance. If unable to attend the briefing, the EWO receives the
final planning guidance from the G-3 or S-3. The final planning guidance is critical in that it normally
provides—
z
A refined commander’s intent.
z
New commander’s critical information requirements to support the execution of the chosen
COAs.
z
Risk acceptance.
z
Guidance on priorities for the elements of combat power, orders preparation, rehearsal, and
preparation.
4-6
FM 3-36
9 November 2012
Electronic Warfare and the Operations Process
4-28. After the COA decision has been made, the EWO and EW working group generate or gather the
following products and information:
z
An updated command and control nodal analysis of the enemy relevant to the selected COA.
z
Required requests for information to refine understanding of the enemy command and control
nodal architecture.
z
Latest electronic order of battle tailored to the selected COA.
z
Any new direction provided in the refined commander’s intent.
z
A list of any new commander’s critical information requirements related to EW.
z
The warning order, to assist developing EW operations in support of the operation order or plan.
z
Refined input to the initial information collection plan, including—
„ Any additional specific EW information requirements.
„ Updated potential collection assets for the unit’s information collection plan.
Orders Production
4-29. Orders production consists of the staff preparing the operation order or plan by converting the
selected COA into a clear, concise concept of operations. The staff also provides supporting information
that enables subordinates to execute and implement risk controls. They do this by coordinating and
integrating risk controls into the appropriate paragraphs and graphics of the order.
4-30. During orders production, the EWO provides the EW operations input for several sections of the
operation order or plan. (See appendix A for the primary areas for EW operations input within an Army
order or plan. The primary areas for EW input in a joint order, if required, also are shown in appendix A.)
DECISIONMAKING IN A TIME-CONSTRAINED ENVIRONMENT
4-31. In a time-constrained environment, commanders may alter the steps of the MDMP. In time-
constrained conditions, commanders assess the situation, update the commander’s visualization, and direct
the staff to perform the MDMP activities that support the required decisions. Commanders may direct staffs
to shorten the process, and staffs must remain flexible and find ways to save time.
4-32. The EWO and core members of the EW working group meet as a regular part of the unit battle
rhythm. However, the EWO calls unscheduled meetings if situations arise that require time-sensitive
planning. Regardless of how much they abbreviate the planning process, the EWO and supporting members
of the EW working group always—
z
Update the EW running estimate in terms of assets and capabilities available.
z
Update essential EW tasks with the requirements of the commander’s intent.
z
Coordinate support requests and intelligence requirements with appropriate staff elements and
outside agencies.
z
Provide EW input to fragmentary orders through the G-3 or S-3 as necessary to drive timely and
effective EW operations.
z
Deconflict planned EW actions with other uses of the spectrum, such as communications.
z
Synchronize electronic attack and electronic warfare support actions.
z
Synchronize other intelligence collection in support of EW requirements.
z
Deconflict EW actions specifically with aviation operations.
z
Help synchronize and integrate relevant cyber electromagnetic activities through the appropriate
staff.
THE INTEGRATING PROCESSES AND CONTINUING ACTIVITIES
4-33. Commanders use several integrating processes and continuing activities to synchronize operations
throughout the operations process (see figure 4-4, page 4-8). The EWO ensures EW operations are fully
synchronized and integrated within these processes. Other staff supporting the EW working group assist the
9 November 2012
FM 3-36
4-7
Chapter 4
EWO. The next sections (paragraphs 4-34 through 4-50) outline some key integrating processes. These
processes require EWO involvement throughout the operations process.
Plan
Prepare
Execute
Assess
Integrating Processes
• Intelligence preparation of the battlefield
• Targeting
• Risk management
Continuing Activities
• Liaison
• Information collection
• Security operations
• Protection
• Terrain management
• Airspace control
Figure 4-4. Integrating processes and continuing activities
Intelligence Preparation of the Battlefield
4-34. IPB involves systematically and continuously analyzing the threat and certain mission variables
(terrain, weather, and civil considerations) in the geographical area of a specific mission. Commanders and
staffs use IPB to gain information that supports understanding. The G-2 or S-2 leads IPB planning with
participation by the entire staff. This planning activity supports understanding an operational environment,
including the options it presents to friendly and adversary forces. Only one IPB planning activity exists
within each headquarters; all affected staff cells participate. Paragraphs 4-35 through 4-39 discuss how
the EWO and EW working group support IPB during operations.
4-35. In addition to the input provided to the initial IPB (during step 2 of mission analysis), the EWO
supports IPB throughout the operations process by providing input related to EW operations.
(See
figure 4-5, page 4-9.) This input includes, but is not limited to, the following:
z
Evaluating an operational environment from an EW perspective.
z
Describing how the effects of an operational environment may affect EW operations.
z
Evaluating from an EW perspective the threat’s capabilities, doctrinal principles, and tactics,
techniques, and procedures.
z
Determining threat COAs.
4-36. When evaluating an operational environment from an EW perspective, the EWO—
z
Determines the electromagnetic environment within the defined physical environment:
„ Area of operations.
„ Area of influence.
„ Area of interest.
z
Uses electronic databases to identify gaps.
z
Identifies adversary-fixed EW sites, such as electronic warfare support and electronic attack
sites.
z
Identifies airfields and installations that support, operate, or house adversary EW capabilities.
z
In coordination with the G-2 or S-2 and G-6 or S-6, helps identify enemy electromagnetic
spectrum usage and requirements within the area of operations and area of interest.
4-8
FM 3-36
9 November 2012
Electronic Warfare and the Operations Process
Figure 4-5. Electronic warfare in support of intelligence preparation of the battlefield
4-37. When describing how the variables of an operational environment may impact EW operations, the
EWO—
z
Focuses on characteristics of both the land and air domains using the factors of observation and
fields of fire, avenues of approach, key and decisive terrain, obstacles, and cover and
concealment.
z
Identifies key terrain that may provide protection for communications and target acquisition
systems from exploitation or disruption.
z
Identifies how terrain affects line of sight, including effects on both communications and
non-communications emitters.
z
Evaluates how vegetation affects radio wave absorption and antenna height requirements.
z
Locates power lines and their potential to interfere with radio waves.
z
Assesses the likely avenues of approach (air and ground), their dangers, and how EW operations
could provide support for them.
z
If operating within urban terrain, considers how the infrastructure—power plants, power grids,
structural heights, and communications and media nodes—may restrict or limit EW capabilities.
z
Determines how weather—visibility, cloud cover, rain, and wind—may affect ground-based and
airborne EW operations and capabilities (for example, when poor weather conditions prevent
airborne EW launch and recovery).
z
Assists the G-2 or S-2 with the development of a modified combined obstacle overlay.
z
Considers all other relevant aspects of the operational environment that affect EW operations,
using the operational variables (PMESII-PT—political, military, economic, social, information,
infrastructure, physical environment, and time) and mission variables (METT-TC—mission,
enemy, terrain and weather, troops and support available, time available, and civil
considerations).
9 November 2012
FM 3-36
4-9
Chapter 4
4-38. When evaluating enemy capabilities, the EWO and supporting staff examine doctrinal principles;
tactics, techniques, and procedures; and observed patterns of operation from an EW perspective. The
EWO—
z
Uses the operational and mission variables to help determine the adversary’s critical nodes.
z
Collects the required data—operational net assessments, electronic order of battle, and electronic
databases—to template the command and control critical nodes and the systems required to
support and maintain them.
z
Assists the G-2 in determining the adversary’s EW-related threat characteristics (order of battle)
by identifying—
„ Types of communications equipment available.
„ Types of noncommunications emitters.
„ Surveillance and target acquisition assets.
„ Technological sophistication of the threat.
„ Communications network structure.
„
Frequency allocation techniques.
„ Operation schedules.
„ Station identification methods.
„ Measurable characteristics of communications and noncommunications equipment.
„ Command, control, and communications structure of the threat.
„ Tactics, from a communication perspective (such as how the enemy deploys command,
control, and communications assets; whether or not communications systems are remote; and the
level of discipline in procedures, communications security, and operations security).
„ Electromagnetic deception capabilities.
„ Reliance on active or passive surveillance systems.
„ Electromagnetic profiles of each node.
„ Unique electromagnetic spectrum signatures.
z
Assists the G-2 or S-2 in analyzing the center of gravity (identifying its critical system nodes and
determining what aspects to engage, exploit, or attack to modify the system’s behavior or
achieve a desired effect).
z
Identifies organic and nonorganic EW capabilities available to achieve desired effects on
identified high-value targets.
z
Submits initial requests for information describing the intelligence support required for EW
operations.
z
Obtains the high-value target list, threat templates, and initial priority intelligence requirements
list to assist in follow-on EW planning.
4-39. When determining adversary COAs, the EWO—
z
Assists the G-2 or S-2 in development of adversary COAs.
z
Provides EW input to the situation templates.
z
Ensures event templates include EW named areas of interests.
z
Assists in providing EW options for target areas of interest.
z
Assists in providing EW options to support decision points.
z
Provides EW input to the event template and event matrix.
4-10
FM 3-36
9 November 2012
Electronic Warfare and the Operations Process
Targeting
4-40. Targeting is the process of selecting and prioritizing targets and matching the appropriate response to
them, considering operational requirements and capabilities (JP 3-0). A decide, detect, deliver, and assess
methodology is used to direct friendly forces to attack the right target with the right asset at the right time.
(See figure 4-6.) Targeting provides an effective method to match the friendly force capabilities against
targets. Commander’s intent plays a critical role in the targeting process. The targeting working group
strives to understand the commander’s intent and ensure the commander’s intended effects on targets are
achieved.
Figure 4-6. Electronic warfare in the targeting process
4-41. An important part of targeting is identifying potential fratricide situations and performing the
coordination measures to manage and control the targeting effort positively. The targeting working group
and staff incorporate these measures into the coordinating instructions and appropriate annexes of the
operation plans and orders. (See ATTP 5-0.1 for detailed information on operation plans and orders. See
FM 3-60 for more information on targeting.)
4-42. The EWO thoroughly integrates electronic attack in the targeting process and integrates electronic
attack fires into all appropriate portions of the operation plan, operation order, and other planning products.
In support of EW targeting, the EWO—
z
Helps the targeting working group determine electronic attack requirements against specific
high-payoff targets and high-value targets.
z
Ensures electronic attack can meet the desired effect (in terms of the targeting objective).
z
Coordinates with the signals intelligence staff element through the collection manager to satisfy
electronic warfare support and electronic attack information requirements.
z
Provides electronic attack mission management through the tactical operations center or joint
operations center and the tactical air control party (for airborne electronic attack).
9 November 2012
FM 3-36
4-11
Chapter 4
z
Provides electronic attack mission management as the jamming control authority
(see
paragraph 5-11) for ground or airborne electronic attack when designated.
z
Determines and requests theater army electronic attack support.
z
Recommends to the G-3 or S-3 and the fire support coordinator or fire support officer whether to
engage a target with electronic attack.
z
Expedites electromagnetic interference reports to the targeting working group.
Decide
4-43. Decide is the first step in the targeting process. This step provides the overall focus for fires, a
targeting plan, and some of the priorities for intelligence collection. As part of the staff in the mission
command cell, the EWO assists the targeting working group in planning the target priorities for each phase
and critical events of the operation. Initially, the targeting working group does not develop electronic attack
targets using any special technique or separately from targets for physical destruction. However, as the
process continues, these targets are passed through intelligence organizations and further planned using
intelligence collection procedures. The planned use of electronic attack is integrated into the standard
targeting products (graphic or text-based). Products that involve electronic attack planning may include—
z
High-payoff target list.
z
Attack guidance matrix.
z
Annex D (Fires) of the operation order.
Detect
4-44. Based on what the targeting working group identified as high-payoff targets during the decide step,
collection assets are then deployed to detect them. The intelligence enterprise pairs assets to targets based
on the collection plan and the current threat situation. When conducting electronic attack tasks, information
collection units perform electronic warfare support tasks linked to and working closely with the electronic
attack missions. Electronic warfare support units (with support from the target assessment and signals
intelligence staff elements) provide the data—location, signal strength, and frequency of the target—to
focus electronic attack assets on the intended target. These assets also identify the enemy’s command and
control system vulnerabilities open to attack by electronic attack assets.
Deliver
4-45. Once friendly force capabilities identify, locate, and track the high-payoff targets, the next step in the
process is to deliver fires against those targets. Electronic attack assets must satisfy the attack guidance
developed during the decide step. Close coordination between those conducting electronic warfare support
and electronic attack is critical during the engagement. The EWO facilitates this coordination and ensures
electronic attack fires are fully synchronized and deconflicted with other fires. This officer remains aware
of the potential for unintended effects between adjacent units when conducting electronic attack. The EWO
continually coordinates with adjacent unit EWOs to mitigate and deconflict these effects during
cross-boundary operations. Normally, the G-3, S-3, or fire support coordinator provides requirements and
guidance for this coordination and synchronization in the attack guidance matrix, intelligence
synchronization matrix, spectrum management plan, and the EW input to the operation plan or operation
order annexes and appendixes.
Assess
4-46. Once the target as been engaged, the next step is to assess the engagement’s effectiveness. This
combat assessment involves determining the effectiveness of force employment during military operations.
It consists of three elements:
z
Munitions effects assessment.
z
Battle damage assessment.
z
Re-attack recommendations.
4-12
FM 3-36
9 November 2012
Electronic Warfare and the Operations Process
4-47. The first two elements, munitions effects assessment and battle damage assessment, inform the
commander on the effects achieved against targets and target sets. From this information, the G-2 or S-2
continues to analyze the threat’s ability to further conduct and sustain combat operations (sometimes
articulated in terms of the effects achieved against the threat’s centers of gravity). The last element involves
the assessment and recommendation whether or not to re-attack the targets.
4-48. The assessment of a jamming mission used against an enemy’s command and control system is
unlike fires that friendly forces can visually observe. The signals intelligence staff element and units
executing the electronic attack mission coordinate continuously to assess mission effectiveness. Close
coordination between sensor and shooter allows instant feedback on the success or failure of the intended
jamming effects. It also can quickly provide the necessary adjustments to produce desired effects.
Risk Management
4-49. Risk management is a process for identifying hazards and controlling risks. Throughout the
operations process the EWO uses risk management to mitigate risks associated with all hazards that have
the potential impact mission effectiveness. Like targeting, risk management begins in planning and
continues through preparation and execution. Risk management consists of the following steps:
z
Identify hazards.
z
Assess hazards to determine risks.
z
Develop controls and make risk decisions.
z
Implement controls.
z
Supervise and evaluate.
Continuing Activities
4-50. While executing tasks throughout the operations process, commanders and staffs plan for and
coordinate continuing activities. The EWO coordinates with the staff to participate in these continuing
activities as necessary. The continuing activities address specific EW tasks as needed.
4-51. The EWO ensures that certain planning requirements are completed. Planning requirements include
the following:
z
Analyzes information requirements and intelligence gaps.
z
Evaluates available assets internal and external to the organization and determines gaps in the
use of those assets.
z
Recommends information collection assets controlled by the organization to collect on the
commander’s critical information requirements.
z
Submits requests for information for adjacent and higher collection support.
The EWO considers all assets—both internal and external to the organization—when determining planning
requirements. Effective requirements identify information gaps and the most appropriate assets for
collecting information to fill them.
4-52. Planning for information collection begin during mission analysis. Although the G-3 or S-3 lead
tasking and information collection, the entire staff, subordinate units, and other unified action partners
support it. The staff thoroughly understands, integrates, and synchronizes the information collection plan
across all echelons.
4-53. The EWO ensures the information collection plan supports the information requirements related to
EW and determined during the planning process. The EWO coordinates these requirements with the signals
intelligence staff element through the G-2 or S-2.
9 November 2012
FM 3-36
4-13
Chapter 4
ELECTRONIC WARFARE EMPLOYMENT CONSIDERATIONS
4-54. EW employment is based on specific ground-based, airborne, and functional (electronic attack,
electronic warfare support, or electronic protection) considerations. The EWO properly articulates EW
employment considerations early in the operations process. Each consideration has certain advantages and
disadvantages. The staff plans for all of these before executing EW operations.
Ground-Based Electronic Warfare Considerations
4-55. Ground-based EW capabilities support the commander’s scheme of maneuver. Soldiers can use
ground-based EW equipment when dismounted or on highly mobile platforms. Due to the short-range
nature of tactical signals direction finding, electronic attack assets are normally located in the forward areas
of the battlefield, with or near forward units.
4-56. Ground-based EW capabilities have certain advantages. They provide direct support to maneuver
units (for example, through counter radio-controlled improvised explosive device EW and communications
or sensor jamming). Soldiers use ground-based EW capabilities to support continuous operations and to
respond quickly to EW requirements of the ground commander. However, to maximize the effectiveness of
ground-based EW capabilities, maneuver units must protect EW assets from enemy ground and aviation
threats. EW equipment should be as survivable and mobile as the force it supports. Maneuver units must
logistically support the EW assets, and supported commanders must clearly identify EW requirements.
4-57. Ground-based EW capabilities have certain limitations. They are vulnerable to enemy attack and can
be masked by terrain. They are vulnerable to enemy electromagnetic deceptive measures and electronic
protection activities (see paragraphs 1-33 through 1-39). In addition, they have distance or propagation
limitations against enemy electronic systems.
Airborne Electronic Warfare Considerations
4-58. While ground-based and airborne EW planning and execution are similar, they significantly differ in
their EW employment time. Airborne EW operations are conducted at much higher speeds and generally
have a shorter duration than ground-based operations. Therefore, the timing of support from airborne EW
assets requires detailed planning.
4-59. Airborne EW requires the following:
z
A clear understanding of the supported commander’s EW objectives.
z
Ground support facilities.
z
Liaisons between the aircrews of the aircraft providing the EW effects and the aircrews or
ground forces being supported.
z
Protection from enemy aircraft and air defense systems.
4-60. Airborne EW capabilities have certain advantages. They can provide direct support to other tactical
aviation missions such as suppression of enemy air defenses, destruction of enemy air defenses, and
employment of high-speed antiradiation missiles. They can provide extended range over ground-based
assets. Airborne EW capabilities can provide greater mobility and flexibility than ground-based assets. In
addition, they can support ground-based units in beyond line-of-sight operations.
4-61. Limitations associated with airborne EW capabilities include limited time on station, vulnerability to
enemy electronic protection actions, electromagnetic deception techniques, and limited assets (support from
nonorganic EW platforms need to be requested). The issue of limited assets is also the result of fixed-wing
aircraft being the primary platforms for EW.
4-14
FM 3-36
9 November 2012

 

 

 

 

 

 

 

 

Content      ..      1       2         ..

 

 

///////////////////////////////////////