|
|
|
Electronic Warfare and the Operations Process
Electronic Attack Considerations
4-62. Electronic attack includes both offensive and defensive activities (see paragraphs 1-20 through 1-28
for a list of electronic attack activities). These activities differ in their purpose. Defensive electronic attack
protects friendly personnel and equipment or platforms. Offensive electronic attack denies, disrupts, or
destroys enemy capability. In either case, certain considerations are involved in planning for employing
electronic attack, such as—
z
Friendly communications.
z
Intelligence collection.
z
Other effects.
z
Electromagnetic spectrum use by local, nonhostile parties.
z
Hostile intelligence collection.
z
Persistency of effect.
4-63. The EWO, the G-2 or S-2, the G-3 or S-3, the G-6 or S-6, the spectrum manager, and the G-7 or S-7
coordinate closely to avoid friendly communications interference that can occur when using EW systems
on the battlefield. Coordination ensures that electronic attack system frequencies are properly deconflicted
with friendly communications and intelligence systems.
4-64. The number of information systems, EW systems, and sensors operating simultaneously on the
battlefield makes deconfliction with communications systems a challenge. The EWO, the G-2 or S-2, the
G-6 or S-6, and the spectrum manager plan and rehearse deconfliction procedures to ensure they can adjust
their use of EW or communications systems quickly.
4-65. Electronic attack operations depend on electronic warfare support and signals intelligence to provide
targeting information and battle damage assessment. However, EWOs must keep in mind that not all
intelligence collection focuses on supporting EW. If not properly coordinated with the G-2 or S-2 staff,
electronic attack operations could inadvertently interrupt intelligence collection by jamming or interfering
with a frequency used to collect data on the threat or by jamming an enemy frequency or system that
friendly forces are using as a means of collecting data. These conflicts must be avoided, as either type of
interruption could significantly deter intelligence collection efforts and their ability to answer critical
information requirements. Coordination between the EWO, the fire support coordinator, and the G-2 or S-2
prevents this interference. The EW working group brings known conflicts between intelligence collection
and electronic attack efforts to the G-3 or S-3 for resolution.
4-66. Planners consider other efforts that rely on electromagnetic spectrum when planning for electronic
attack. For example, military information support operations (formerly known as psychological operations
or PSYOP) may include plans to use certain frequencies to broadcast messages, or a military deception plan
may include the broadcast of friendly force communications. In both examples, the use of electronic attack
could unintentionally interfere or disrupt such broadcasts if not properly coordinated. To ensure electronic
attack does not negatively affect planned operations, the EWO coordinates between fires, network
operations, and other functional or integrating cells as required.
4-67. Like any other form of electromagnetic radiation, electronic attack can adversely affect local media
and communications systems and infrastructure. EW planners consider unintended consequences of EW
operations and deconflict these operations with the various functional or integrating cells. For example,
friendly jamming could potentially deny the functioning of essential services such as ambulance or
firefighters to a local population. EWOs routinely synchronize electronic attack with the other functional or
integrating cells responsible for information-related capabilities. In this way, they ensure that electronic
attack efforts do not cause fratricide or unacceptable collateral damage to their intended effects.
4-68. The potential for hostile intelligence collection also affects electronic attack. A well-equipped enemy
can detect friendly EW activities and thus gain intelligence on friendly force intentions. For example, the
frequencies Army forces jam could indicate where they believe the enemy’s capabilities lie. The EWO and
the G-2 or S-2 develop an understanding of the enemy’s collection capability. Along with the red team (if
available), they determine what the enemy might gain from friendly force use of electronic attack. (A red
team is an organizational element comprised of trained and educated members that provide an independent
9 November 2012
FM 3-36
4-15
Chapter 4
capability to fully explore alternatives in plans and operations in the context of the operational environment
and from the perspective of adversaries and others [JP 2-0].)
4-69. The effects of jamming only persist as long as the jammer itself is emitting and is in range to affect
the target. Normally these effects last a matter of seconds or minutes, which makes the timing of such
missions critical. This is particularly true when units use jamming in direct support of aviation platforms.
For example, in a mission that supports suppression of enemy air defense, the time on target and duration
of the jamming must account for the speed of attack of the aviation platform. They must also account for
the potential reaction time of enemy air defensive countermeasures. Aside from antiradiation missiles, the
effects of jamming are less persistent than effects achieved by other means. The development of
directed-energy weapons may change this dynamic in the future.
Electronic Protection Considerations
4-70. Electronic protection is achieved through physical security, communications security measures,
system technical capabilities
(such as frequency hopping and shielding of electronics), spectrum
management, and emission control procedures. (See paragraphs 1-33 through 1-39 for a list of electronic
attack activities.) The EWO and EW working group consider the following functions when planning for
electronic protection operations:
z
Vulnerability analysis and assessment.
z
Monitoring and feedback.
z
Electronic protection measures and their effects on friendly capabilities.
Vulnerability Analysis and Assessment
4-71. Vulnerability analysis and assessment forms the basis for formulating electronic protection plans.
The Defense Information Systems Agency provides a variety of information assurance services, including
vulnerability analysis and assessment, that focus on automated information systems and can be useful in
this effort.
Monitoring and Feedback
4-72. The National Security Agency/Central Security Service monitors communications security. Its
programs focus on telecommunications systems using wire and electronic communications. The programs
can support and remediate a command’s communications security procedures when required.
Electronic Protection Measures and Their Effects on Friendly Capabilities
4-73. Electronic protection measures include any measure taken to protect the force from hostile electronic
attack actions. However, these measures can also limit friendly capabilities or operations. For example,
denying a given frequency to counter radio-controlled improvised explosive device EW systems in order to
preserve it for a critical friendly information system could leave friendly forces vulnerable to
radio-controlled improvised explosive devices. The EWO and the G-6 or S-6 carefully consider these
second-order effects when advising the G-3 or S-3 regarding electronic protection measures.
Electronic Warfare Support Considerations
4-74. The distinction between a signals intelligence and an electronic warfare support mission is
determined by who tasks and controls the assets, what they are tasked to provide, and the purpose for which
they are tasked. Operational commanders task assets to conduct electronic warfare support for immediate
threat recognition, targeting, planning future operations, and other tactical actions such as threat avoidance
and homing. (See paragraphs 1-29 through 1-32 for a list of electronic warfare support activities.) The
EWO coordinates with the G-2 or S-2 to ensure identification of all electronic warfare support needed for
planned EW operations and to submit electronic warfare support requests to the G-3 or S-3 for approval by
the commander. This ensures that the required collection assets are tasked to provide the electronic warfare
support. In cases where planned electronic attack actions may conflict with the G-2 or S-2 intelligence
collection efforts, the G-3, S-3, or commander decides which has priority. The EWO and the G-2 or S-2
4-16
FM 3-36
9 November 2012
Electronic Warfare and the Operations Process
develop a structured process within each echelon for conducting this intelligence gain-loss calculus during
mission rehearsal exercises and predeployment planning.
Electronic Warfare Reprogramming Considerations
4-75. Electronic warfare reprogramming refers to modifying friendly EW or target sensing systems in
response to validated changes in enemy equipment and tactics or the electromagnetic environment (see
paragraph 1-41 for the complete definition of electronic warfare reprogramming). Reprogramming of EW
and target sensing system equipment falls under the responsibility of each Service or organization through
its respective electronic warfare reprogramming support programs. Electronic warfare reprogramming
includes changes to self-defense systems, offensive weapons systems, and intelligence collection systems.
During joint operations, swift identification and reprogramming efforts are critical in a rapidly evolving
hostile situation. The key consideration for electronic warfare reprogramming is joint coordination. Joint
coordination of Service reprogramming efforts ensures all friendly forces consistently identify, process, and
implement reprogramming requirements. During joint operations, electronic warfare reprogramming
coordination and monitoring is the responsibility of the joint force commander’s EW staff. (For more
information on electronic warfare reprogramming, see ATTP 3-13.10).
ELECTRONIC WARFARE PREPARATION
4-76. Preparation consists of activities that units perform to improve their ability to execute an operation.
Preparation includes, but is not limited to, plan refinement, rehearsals, information collection, coordination,
inspections, and movement. Preparation creates conditions that improve friendly forces’ opportunities for
success. It facilitates and sustains transitions, including those to branches and sequels.
4-77. During preparation, the EWO and EW working group focus their actions on—
z
Revising and refining the EW estimate, EW tasks, and EW in support of the overall plan.
z
Rehearsing the synchronization of EW in support of the plan (including integration into the
targeting process, procedures for requesting joint assets, procedures for deconfliction, and asset
determination and refinement).
z
Synchronizing the collection plan and intelligence synchronization matrix with the attack
guidance matrix and EW input to the operation plan or order annexes and appendixes.
z
Assessing the planned task organization developed to support EW operations, including liaison
officers and organic and nonorganic capabilities required by echelon.
z
Coordinating procedures with information collection operational elements
(such as signals
intelligence staff elements).
z
Training the supporting staff of the EW working group during rehearsals.
z
Completing precombat checks and inspections of EW assets.
z
Completing sustainment preparations for EW assets.
z
Coordinating with the G-4 or S-4 to develop EW equipment report formats.
z
Completing backbriefs by subordinate EW working groups on planned EW operations.
z
Refining content and format for the EWO’s portion of the operation update assessment and
briefing.
ELECTRONIC WARFARE EXECUTION
4-78. Execution puts a plan into action by applying combat power to accomplish the mission and using
situational understanding to assess progress and make execution and adjustment decisions. Commanders
focus their subordinates on executing the concept of operations by issuing their commander’s intent and
mission orders.
4-79. During execution, the EWO and EW working group—
z
Serve as the EW experts for the commander.
z
Maintain the running estimate for EW operations.
z
Monitor EW operations and recommend adjustments during execution.
9 November 2012
FM 3-36
4-17
Chapter 4
z
Recommend adjustments to the commander’s critical information requirements based on the
situation.
z
Recommend adjustments to control measures and procedures related to EW.
z
Maintain direct liaison with the fires and network operations cells to ensure integration and
deconfliction of EW operations.
z
Coordinate and manage EW taskings to subordinate units or assets.
z
Coordinate requests for nonorganic EW.
z
Continue to assist the targeting working group in target development and to recommend targets
for attack by electronic attack assets.
z
Receive, process, and coordinate subordinate requests for EW assets during operations.
z
Receive and process immediate support requests for suppression of enemy air defense or EW
from joint or multinational forces, and coordinate requests through the fire support officer and
fire support coordinator with the battlefield coordination detachment and joint or multinational
liaisons.
z
Coordinate with the airspace control section on all suppression of enemy air defense or EW
missions.
z
Provide input to the overall assessment regarding effectiveness of electronic attack missions.
z
Maintain, update, and distribute the status of EW assets.
z
Validate and disseminate cease-jamming requests.
z
Coordinate and expedite electromagnetic interference reports with the analysis and control
element for targeting and the spectrum manager for potential deconfliction.
z
Perform the jamming control authority function (see paragraph 5-11) for ground-based EW
within the area of operations (when designated by the jamming control authority).
ELECTRONIC WARFARE ASSESSMENT
4-80. Assessment is continuously monitoring and evaluating the current situation and the progress of an
operation. Commanders, assisted by their staffs, continuously assess the current situation and progress of
the operation and compare it with the concept of operations, mission, and commander’s intent. Based on
their assessment, commanders direct adjustments, ensuring that the operation remains focused on the
mission and higher commander’s intent.
4-81. Assessment occurs throughout every operations process activity and includes three major tasks:
z
Continuously assessing the enemy’s reactions and vulnerabilities.
z
Continuously monitoring the situation and progress of the operation towards the commander’s
desired end state.
z
Evaluating the operation against measures of effectiveness and measures of performance.
4-82. The EWO and supporting members of the EW working group make assessments throughout the
operations process. During planning and preparation, assessments of EW are made during the MDMP, IPB,
targeting, information collection synchronization, and risk management integration.
4-83. The EWO, in conjunction with the G-5 or S-5, helps develop the measures of performance and
measures of effectiveness for evaluating EW operations during execution. A measure of performance is a
criterion used to assess friendly actions that is tied to measuring task accomplishment (JP 3-0). A measure
of effectiveness is a criterion used to assess changes in system behavior, capability, or operational
environment that is tied to measuring the attainment of an end state, achievement of an objective, or
creation of an effect (JP 3-0). In the context of EW, an example of a measure of performance is the
percentage of known enemy command and control nodes targeted and attacked by electronic attack means
(action) versus the number of enemy command and control nodes that were actually destroyed or rendered
inoperable for the desired duration (task accomplishment). Measures of effectiveness are used to determine
the degree to which an EW action achieved the desired result. This is normally measured through analysis
of data collected by active and passive means. For example, effectiveness is measured by using radar or
visual systems to detect changes in enemy weapons flight and trajectory profiles.
4-18
FM 3-36
9 November 2012
Electronic Warfare and the Operations Process
4-84. During execution, the EWO and EW working group participate in combat assessments within the
targeting process to determine the effectiveness of electronic attack employment in support of operations.
Combat assessment consists of three elements: munitions effects assessment, battle damage assessment,
and reattack recommendations. (Paragraphs 4-46 to 4-48 discuss combat assessment.)
SUMMARY
4-85. The EWO and staff supporting the EW working group ensure the successful integration of EW
capabilities into operations. The EWO leads the EW integration effort throughout the operations process.
The effective EWO understands and participates in the applicable integrating processes discussed within
this chapter.
9 November 2012
FM 3-36
4-19
Chapter 5
Electronic Warfare Coordination, Deconfliction, and
Synchronization
This chapter begins by discussing electronic warfare coordination and deconfliction.
It concludes with a discussion of synchronization.
COORDINATION AND DECONFLICTION
5-1. Once the commander approves an operation plan or order and preparations are complete, the
electronic warfare officer
(EWO) and supporting staff turn to coordinating, deconflicting, and
synchronizing the electronic warfare efforts. They ensure forces carry out electronic warfare (EW) actions
as planned or modify them in response to current operations. A certain amount of EW coordination is part
of planning. However, once a plan is approved and an operation begins, the EW staff effort shifts to
coordination and deconfliction so units can carry out planned EW actions or modify them to adapt to the
dynamics of the operation.
5-2. The EWO and EW working group continuously monitor coordination. This includes general EW
coordination across organizations (higher, lower, and adjacent units), coordination of requests for EW
activities in support of operations, electromagnetic spectrum management, jamming control authority (see
paragraph 5-11), EW asset management, other coordinating actions, and EW deconfliction. Normally, EW
personnel on watch in the operations center monitor the coordination. They alert the EWO or other EW
personnel to address any required actions.
COORDINATION ACROSS ORGANIZATIONS
5-3. At the joint level, the information operations division of the J-3 performs EW coordination. The EW
section of the information operations staff engages in all EW functions. This section performs peacetime
contingency planning, completes day-to-day planning and monitoring of routine theater of operations EW
activities, and completes crisis action planning for contingencies as part of emergent joint operations. The
EW section coordinates closely with other appropriate staff sections and larger joint planning groups as
required. (JP 3-13.1 discusses joint EW coordination.)
5-4. In the early stages of contingencies, the joint force commander’s EW staff assesses the staffing
requirements for planning and execution. This staff also coordinates EW planning and course of action
development with the joint force commander’s components. Services begin component EW planning and
activate their EW working groups per combatant command or Service guidelines. When the scope of a
contingency becomes clearer, the command EWO may request that the joint force commander establish a
joint electronic warfare cell (EWC). If a joint EWC is formed, it normally requires additional augmentation
from the Service or functional components. Depending on the size of the force, EW personnel from the
division, corps, or theater army are expected to augment the joint EWC to form a representative EW
organization. The senior Army organization’s staff EWO anticipates this requirement and prepares to
support the augmentation if requested.
5-5. Coordination occurs through EW working groups from theater army level to battalion level. Within
Army organizations, the coordination of EW activities occurs horizontally and vertically. At every level,
the EW staff officer ensures the necessary coordination. Normally, coordination of EW activities between
the Army and joint force air component command flows through the battlefield coordination detachment at
the joint air operations center. EW staffs at higher echelons monitor EW activities and resolve conflicts
when necessary.
9 November 2012
FM 3-36
5-1
Chapter 5
5-6. Normally the senior Army headquarters (the ARFOR) G-3 or S-3 coordinates with external EW
organizations, unless direct liaison is authorized at lower echelons. Other components requesting Army EW
coordinate their requirements with the EWO located at the ARFOR headquarters or tactical operations
center. Often, a liaison from the requesting organization completes these requests. If other Service or
functional components have an immediate need for Army EW, they send the request to the operational fires
directorate or mission command cell and the senior headquarters EW working group (sometimes referred to
as an EW coordination cell) via the Global Command and Control System or Global Command and Control
System-Army. In support of external EW coordination, the EW staff officer within the J-3, G-3, or S-3—
z
Provides an assessment of EW capabilities to other component operation centers.
z
Coordinates preplanned EW operations with other Service components
(within prescribed
timelines).
z
Updates preplanned EW operations in coordination with other components as required.
COORDINATING REQUESTS FOR ELECTRONIC WARFARE ACTIVITIES
5-7. Units requesting electronic attack forward requests to the appropriate EW working group. (See
appendix C for the electronic attack request format.) Each EW working group prioritizes the requests and
forwards them to the higher headquarters through G-2 or S-2 channels. The commander responsible for the
EW assets approves the requests. The EW working group integrates new EW requests into the intelligence
synchronization process. If the EW working group approves the new requests, they appear in the
requirements tool and the unit information collection plan. The technical data required to support electronic
warfare support requests pass via signals intelligence channels within the G-2 or S-2 by classified means.
ELECTROMAGNETIC SPECTRUM MANAGEMENT
5-8. The electromagnetic spectrum is a finite resource. Military forces must manage the limited spectrum
allocated to them effectively. Electromagnetic spectrum management (defined in paragraph 1-37) enables
electronic systems to perform their functions in the area of operations without causing or experiencing
unacceptable interference. Electromagnetic spectrum management deconflicts electronic systems in the
area of operations, including electronic protection systems, communications systems, sensors, and weapons
systems. Deconfliction efforts must account for electronic systems belonging to unified action partners.
5-9. Electromagnetic spectrum management involves planning, coordinating, and managing use of the
electromagnetic spectrum through operational, engineering, and administrative procedures. Primarily, it
involves determining specific activities that will occur in each part of the available spectrum. For example,
some frequencies are assigned to the counter radio-controlled improvised explosive device EW systems
operating in the area of operations. These frequencies then are deconflicted with ground tactical
communications. The spectrum manager ensures all necessary functions that require use of the
electromagnetic spectrum have sufficient allocation of that spectrum to accomplish their purpose. Where a
conflict (two or more functions require the same portion of the spectrum) exists, the spectrum manager
resolves the conflict through direct coordination. (Figure 5-1, page 5-3, shows the basic procedures the
spectrum manager follows to deconflict spectrum use.)
5-2
FM 3-36
9 November 2012
Electronic Warfare Coordination, Deconfliction, and Synchronization
Figure 5-1. Spectrum deconfliction procedures
5-10. The spectrum manager is a member of two groups. First, the manager belongs to the G-6 or S-6
section that has staff responsibility for spectrum management in the unit. The manager also belongs to the
unit’s EW working group. When conflicts arise regarding spectrum use and allocation that the spectrum
manager cannot resolve through direct coordination, the spectrum manager refers them to the G-3 or S-3
for resolution.
JAMMING CONTROL AUTHORITY
5-11. Depending on the situation, an Army headquarters may be designated as the jamming control
authority. This authority serves as the senior jamming control authority in the area of operations. It
establishes guidance for jamming on behalf of the joint force commander. If designated as the jamming
control authority, the senior EW staff officer normally is tasked with the following responsibilities:
z
Participating in development of and ensuring compliance with the joint restricted frequency list
(see paragraphs C-9 to C-10).
z
Validating and approving or denying cease-jamming requests.
z
Maintaining situational awareness of all jamming-capable systems in the area of operations.
z
Acting as the joint force commander’s executive agent for developing intelligence gain-or-loss
recommendations when electronic attack or electronic warfare support conflicts occur.
z
Coordinating jamming requirements with joint force components.
z
Investigating unauthorized jamming events and implementing corrective measures.
(See JP 3-13.1 for further information on jamming control authority.)
ELECTRONIC WARFARE ASSET MANAGEMENT
5-12. Regardless of echelon, the EWO monitors and tracks the organization’s EW assets and their status.
The EWO makes recommendations to the G-3 or S-3 concerning EW asset allocation and reallocation
when required. The EWO monitors and tracks EW asset status within the EW working group and reports
this information to higher echelons.
9 November 2012
FM 3-36
5-3
Chapter 5
OTHER COORDINATING ACTIONS
5-13. Several coordinating actions must also take place between the EW working groups (at all echelons)
and the other planning and execution cells within the headquarters. These actions include—
z
Detailed coordination between the EW activities and the intelligence activities supporting an
operation.
z
Coordination of electronic warfare reprogramming.
z
Coordination among EW, cyber electromagnetic activities (CEMA), and inform and influence
activities.
Coordination Between Electronic Warfare Activities and Intelligence Activities
5-14. Most of the intelligence effort, before and during an operation, relies on collection activities targeted
against various parts of the electromagnetic spectrum. Electronic warfare support depends on the timely
collection, processing, and reporting of intelligence and combat information to alert EW operators and
other military activities about intelligence collected in the electromagnetic spectrum. The EWO and G-2 or
S-2 integrate EW collection priorities and electronic warfare support collection assets into a complete
intelligence collection plan. This plan ensures that units maximize the use of scarce intelligence and
collection assets to support the commander’s objectives.
Coordination of Electronic Warfare Reprogramming
5-15. The EWO and G-2, at division and corps levels, track and coordinate electronic warfare
reprogramming input submitted by lower echelons. These officers forward this input to the Army Service
component command headquarters for submission to the Army Reprogramming Analysis Team. EWOs
promptly submit the input to ensure the command staff completes urgent reprogramming actions for
assigned systems. (See ATTP 3-13.10 for detailed procedures for reprogramming EW and target sensing
systems.)
Coordination Among Electronic Warfare, Cyber Electromagnetic Activities, and Inform and
Influence Activities
5-16. EW working groups coordinate their supporting actions with the elements responsible for inform and
influence activities and CEMA. Although EW is one of two lines of effort under CEMA, it also coordinates
with inform and influence activities. For example, enemy radio and television broadcasts can be disrupted
or replaced with friendly radio and television messages as part of larger military information support
operations. Electromagnetic deception capabilities can support and enhance an overall military deception
operation.
ELECTRONIC WARFARE DECONFLICTION
5-17. Friendly forces depend on electromagnetic energy and the electromagnetic spectrum to sense,
process, store, measure, analyze, and communicate information. This dependency creates the potential for
significant interference between various friendly systems. Without proper deconfliction, interference could
damage friendly capabilities or lead to operational failure. This is especially true with regard to EW
systems. EW deconfliction includes—
z
Friendly electromagnetic spectrum use for communications and other purposes
(such as
navigation systems and sensors) with electronic attack activities
(such as counter
radio-controlled improvised explosive device EW systems).
z
Electronic attack activities with electronic warfare support activities (potential electromagnetic
interference of collection assets).
z
Electronic attack and electronic warfare support activities with inform and influence activities
involving electromagnetic emissions (such as counter radio-controlled improvised explosive
device EW systems interfering with a military information support operations radio broadcast).
z
Electronic attack activities with host-nation electromagnetic spectrum users (such as commercial
broadcasters, local first responders, and law enforcement).
5-4
FM 3-36
9 November 2012
Electronic Warfare Coordination, Deconfliction, and Synchronization
5-18. The forum for deconfliction is the unit’s EW working group. As such, the specific composition of the
working group may expand to include more than the standard staff representation described in chapter 3.
Regardless of echelon, to perform its critical deconfliction function, the EW working group retains
knowledgeable representation from and ready access to decisionmakers. The EW working group also
retains knowledge of and access to higher headquarters assistance and reachback capabilities available.
SYNCHRONIZATION
5-19. EW, particularly in electronic attack, can produce both intended and unintended effects. Therefore,
units thoroughly synchronize its use with other forms of fires and with friendly systems using the
electromagnetic spectrum to avoid negative effects such as communications fratricide by jammers. The
EWO ensures all EW activities are integrated into the appropriate sections of plans and orders. This officer
also synchronizes EW activities for maximum contribution to the commander’s desired effects while
preventing EW from inhibiting friendly force capabilities. The primary forum for this synchronization is
the unit’s EW working group. The EWO attends the regular targeting meetings and may also participate
(perhaps as a standing member) in other functional or integrating cells and working groups. These may
include fires, inform and influence activities, network operations, or future operations. The EWO’s
participation in these other cells and working groups helps to synchronize EW operations.
SUMMARY
5-20. EW capabilities yield many advantages for the commander. The EW working group’s sole purpose is
to facilitate the integration, coordination, deconfliction, and synchronization of EW operations to ensure
advantages are achieved. This effort requires constant coordination with the unit’s other functional cells
and working groups. As conflicts are identified during the planning and execution of operations, the EWO
and supporting staff coordinate solutions to those conflicts within the EW working group.
9 November 2012
FM 3-36
5-5
Chapter 6
Electronic Warfare in Joint and Multinational Operations
This chapter describes the joint and multinational organizational frameworks and
guidelines for integrating Army electronic warfare.
JOINT ELECTRONIC WARFARE OPERATIONS
6-1. During joint operations, Services work together to accomplish a mission. In multinational operations,
forces of two or more nations work together to accomplish a mission. During both joint and multinational
operations, forces operate under established organizational frameworks and coordination guidelines.
6-2. One strength of operating as a joint force is the ability to maximize combat capabilities through
unified action. However, the ability to maximize the capabilities of a joint force requires guidelines and an
organizational framework that can be used to integrate them effectively. To facilitate integration of Army
electronic warfare (EW) operations with joint EW operations, this chapter briefly introduces the guidelines
and organizational framework for joint EW operations established in JP 3-13.1.
6-3. Joint task forces are task-organized. Therefore, their composition varies based on the mission.
Normally the EW organization within a joint force centers on the—
z
Component commands.
z
Supporting joint centers.
z
Joint force staff.
z
Joint force commander’s EW staff, joint electronic warfare cell
(EWC), or information
operations cell.
The supporting centers for EW operations may include the joint operations center, joint intelligence center,
joint frequency management office, and joint targeting coordination board.
JOINT FORCE PRINCIPAL STAFF FOR ELECTRONIC WARFARE
6-4. In EW, the principal staff consists of the J-2, J-3, and J-6. The J-2 collects, processes, tailors, and
disseminates all-source intelligence for EW. The J-3 has primary staff responsibility for EW activity. This
director also plans, coordinates, and integrates joint EW operations with other combat disciplines in the
joint task force. Normally, the joint force commander’s EW staff or a joint EWC and an information
operations cell assist the J-3. The joint force staff network operations director (in the J-6) coordinates
electromagnetic spectrum use for information systems with electromagnetic-dependent weapons systems
used by the joint force. The information operations officer is the principal information operations advisor to
the J-3. This officer is the lead planner for integrating, coordinating, and executing information operations.
The command electronic warfare officer (EWO) is the principal EW planner on the J-3 staff. This officer
coordinates with the information operations cell to integrate EW operations fully with other information
operations core, supporting, and related capabilities (see JP 3-13.1 for further information).
JOINT FORCE COMMANDER’S ELECTRONIC WARFARE STAFF
6-5. A joint force commander’s EW staff supports the joint force commander in planning, coordinating,
synchronizing, and integrating joint force EW operations. The joint force commander’s EW staff ensures
that joint EW capabilities support the joint force commander’s objectives. The joint force commander’s
EW staff is an element within the J-3. It consists of representatives from each component of the joint force.
An EWO appointed by the J-3 leads this element. The joint force commander’s EW staff includes
representatives from the J-2 and J-6 to facilitate intelligence support and EW frequency deconfliction.
9 November 2012
FM 3-36
6-1
Chapter 6
6-6. On many joint staffs, the intra-staff coordination previously accomplished through a joint force
commander’s EW staff is performed by an information operations cell or similar organization. An
information operations cell, if established, coordinates EW activities with other information operations
activities to maximize effectiveness and prevent mutual interference. If both a joint force commander’s EW
staff and an information operations cell exist, a joint force commander’s EW staff representative may be
assigned to the information operations cell to facilitate coordination. (For more information about the
organization and procedures of the joint information operations cell, see JP 3-13.)
JOINT ELECTRONIC WARFARE CELL
6-7. The decision to form a joint EWC depends on the anticipated role of EW in an operation. When EW
is expected to play a significant role in the joint force commander’s mission, a Service component
command’s EW coordination organization may be designated as the joint EWC to handle the EW aspects
of the operation. The joint EWC may be part of the joint force commander’s staff, be assigned to the J-3
directorate, or remain within the designated Service component commander’s structure. The joint EWC
plans operational-level EW for the joint force commander. (JP 3-13.1 discusses the joint EWC in more
detail.)
JOINT TASK FORCE COMPONENT COMMANDS
6-8. Joint task force component commanders exercise operational control of their EW assets. Each
component is organized and equipped to perform EW tasks in support of its basic mission and to provide
support to the joint force commander’s overall objectives. If a component command (Service or functional)
is designated to stand up a joint EWC, it executes the responsibilities and functions outlined in JP 3-13.1.
6-9. A major consideration for standing up a joint EWC at the component command level is access to a
special compartmented information facility to accomplish the cell’s required coordination functions. A joint
EWC should have special technical operations personnel cleared to coordinate and deconflict special
technical operations issues. Special technical operations are associated with the planning and coordination
of advanced special programs and the integration of new capabilities into operational units.
6-10. Under current force structure, the special technical operations requirement limits the activation of a
joint EWC to organizations at corps and above levels. Organizations below corps level require significant
joint augmentation to meet the special technical operations requirement.
JOINT FREQUENCY MANAGEMENT OFFICE
6-11. Joint policy tasks each geographic combatant commander to establish a structure to manage
electromagnetic spectrum use and establish procedures that support ongoing operations. This structure must
include a joint frequency management office. The joint frequency management office may be assigned
from the supported combatant commander’s J-6 staff, from a component’s staff, or from an external
command such as the Joint Spectrum Center (see paragraph 7-8). The joint frequency management office
coordinates the information systems use of the electromagnetic spectrum, frequency management, and
frequency deconfliction. The joint frequency management office develops the frequency management plan
and makes recommendations to alleviate mutual interference.
6-12. The G-6 or S-6 coordinates the Army’s use of the electromagnetic spectrum, frequency management,
and frequency deconfliction with the joint frequency management office through the network operations
cell. If established, coordination with the joint spectrum management element is required. (See figure 6-1,
page 6-3.)
6-2
FM 3-36
9 November 2012
Electronic Warfare in Joint and Multinational Operations
Figure 6-1. Joint frequency management coordination
JOINT INTELLIGENCE CENTER
6-13. The joint intelligence center is the focal point for the intelligence structure supporting the J-2.
Directed by the J-2, the joint intelligence center communicates directly with component intelligence
agencies and monitors intelligence support to EW operations. This center can adjust intelligence gathering
to support EW missions. Within the G-2, EW requests for support are coordinated through the requirement
cell and then forwarded to the requirements division within the joint intelligence center. (See figure 6-2,
page 6-4.)
9 November 2012
FM 3-36
6-3
Chapter 6
Figure 6-2. Electronic warfare request coordination
6-14. The composition and focus of each joint intelligence center varies by theater of operations. However,
each can perform indications and warnings as well as collect, manage, and disseminate current intelligence.
Through the joint intelligence center, the Army Service component headquarters (the ARFOR) coordinates
support from the Marine Corps, Navy, and Air Force and national, interagency, and multinational sources.
In addition to its other functions, the joint intelligence center coordinates the acquisition of national
intelligence for the joint task force and the combatant command’s staff.
JOINT TARGETING COORDINATION BOARD
6-15. The joint targeting coordination board focuses on developing broad targeting priorities and other
targeting guidance in accordance with the joint force commander’s objectives as they relate operationally.
The joint targeting coordination board remains flexible enough to address targeting issues without
becoming overly involved in tactical-level decisionmaking. Briefings conducted at the joint targeting
coordination board focus on ensuring that intelligence, operations (by all components and applicable staff
elements), fires, and maneuver are on track, coordinated, and synchronized. (For further information on the
joint targeting coordination board, see JP 3-60.)
MULTINATIONAL ELECTRONIC WARFARE OPERATIONS
6-16. EW is an integral part of multinational operations. U.S. planners integrate U.S. and multinational EW
capabilities into a single, integrated EW plan. U.S. planners provide multinational forces with information
concerning U.S. EW capabilities and provide them EW planning and operational support. However, the
planning of multinational force EW is difficult due to security issues, differences in levels of training,
language barriers, and terminology and procedural issues. U.S. and North Atlantic Treaty Organization
(NATO) EW doctrine provide commonality and a framework for using EW in NATO operations.
MULTINATIONAL FORCE COMMANDER
6-17. The multinational force commander provides guidance for planning and executing EW operations
with support from the joint EWC. The joint EWC is located at multinational force headquarters. An
6-4
FM 3-36
9 November 2012
Electronic Warfare in Joint and Multinational Operations
information operations cell may also be established to coordinate all information operations activities,
including related EW activities.
JOINT OPERATIONS STAFF SECTION
6-18. Within the multinational staff, the joint operations section has primary responsibility for planning
and integrating EW activities. A staff EWO is designated with specific responsibilities. These include
integrating multinational augmentees, interpreting or translating EW plans and procedures, coordinating
appropriate communications connectivity, and integrating multinational force communications into a joint
restricted frequency list (see paragraphs C-9 to C-10).
MULTINATIONAL ELECTRONIC WARFARE CELL
6-19. In multinational operations, the multinational force commander uses joint EWC as the mechanism
for coordinating EW resources within the area of operations. This cell is an integral part of the
multinational joint force headquarters J-3 staff, at whatever level is appropriate. It provides an effective
means of coordinating all EW activities by the multinational force. The multinational force joint EWC
plans and coordinates all theater of operations EW activities in close liaison with the J-2, J-5, and J-6.
ELECTRONIC WARFARE MUTUAL SUPPORT
6-20. EW mutual support refers to the timely exchange of EW information to make the best use of the
available resources. For NATO operations, it is facilitated by the use of a common reference database
called the “NATO Emitter Database.” Close coordination is required when working with non-NATO
partners who do not have access to common databases. EW mutual support procedures developed during
EW planning include—
z
A review of friendly and enemy information data elements that may be exchanged.
z
Mechanisms leading to the exchange of data during peace, crisis, and war.
z
Development of peacetime exercises to practice the exchange of data.
z
Establishment of EW points of contact with adjacent formations and higher and subordinate
headquarters for planning purposes, regardless of whether EW resources exist or not.
z
Initial acquisition and maintenance of multinational force EW capabilities.
z
Exchange of EW liaison teams equipped with appropriate communications.
z
Establishment and rehearsal of contingency plans for the exchange of information on friendly
and enemy forces.
z
Development of communications protocols in accordance with the appropriate NATO
standardization agreements (STANAGs).
z
Provision of secure, dedicated, and survivable communications.
OTHER CONSIDERATIONS FOR COORDINATION DURING MULTINATIONAL OPERATIONS
6-21. EW in multinational operations addresses other considerations. Soldiers must consider—
z
Exchange of EW information.
z
Exchange of signals intelligence information.
z
Exchange of the electronic order of battle.
z
Electronic warfare reprogramming.
6-22. Army forces participating in multinational EW operations exchange EW information with other
forces. Effective Army forces help develop joint information exchange protocols and use those protocols
for conducting operations.
6-23. Exchanging signals intelligence information requires care to avoid violating signals intelligence
security rules. The policy and relationship between EW and signals intelligence within NATO are set out in
a NATO Military Committee document (refer to chapter 5 of JP 3-13.1).
9 November 2012
FM 3-36
6-5
Chapter 6
6-24. In peacetime, before forming a multinational force, the exchange of electronic order of battle
information is normally achieved under bilateral agreement. During multinational operations, a
representative of the joint EWC, through the theater of operations joint analysis center or the joint
intelligence center, ensures the maintenance of an up-to-date electronic order of battle. The inclusion of
multinational forces is based on security and information exchange guidelines agreed upon by the
participating nations.
6-25. Electronic warfare reprogramming is a national responsibility. However, the joint EWC remains
aware of reprogramming efforts being conducted within the multinational force. (ATTP 3-13.10 guides the
Army’s reprogramming effort.)
SUMMARY
6-26. Every joint or multinational operation is uniquely organized to accomplish the mission. Army EWOs
integrate EW forces and capabilities with the organizations outlined in this chapter. To coordinate Army
EW operations with joint and multinational forces, Army EWOs fully understand the organizational
frameworks, policies, and guidelines established for joint and multinational EW operations.
6-6
FM 3-36
9 November 2012
Chapter 7
Electronic Warfare Agencies and Centers
This chapter discusses the agencies and centers of electronic warfare. It first
describes integration with other Service electronic warfare capabilities. It then
discusses external support agencies and centers. The chapter concludes with a
discussion of the United States Cyber Command.
INTEGRATION WITH SERVICE ELECTRONIC WARFARE
CAPABILITIES
7-1. Each Service specializes and maintains in certain electronic warfare (EW) capabilities to support
operational requirements. Hence, the conduct of EW operations requires joint interdependence. This
complex interdependence extends beyond the traditional Service capabilities. It includes national
agencies—such as the Central Intelligence Agency, National Security Agency/Central Security Service,
and Defense Intelligence Agency—that constantly seek to identify, catalog, and update the electronic order
of battle of enemies and adversaries. To support the joint force commander, the subject matter expertise
and unique capabilities provided by each Service, agency, and branch or proponent are integrated with all
available EW capabilities.
7-2. During operations, the Army depends on organic and nonorganic EW capabilities from higher
echelons, joint forces, and national agencies. Army EW planners leverage all available EW capabilities to
support Army operations.
EXTERNAL SUPPORT AGENCIES AND CENTERS
7-3. Army EW planners routinely use and receive support from external organizations to assist in
planning and integrating EW operations. Support from these organizations may include personnel
augmentation, functional area expertise, technical support, and planning support.
DEFENSE INFORMATION SYSTEMS AGENCY
7-4. The Defense Information Systems Agency is a combat support agency. It plans, develops, fields,
operates, and supports command, control, communications, and information systems. These systems serve
the President, the Secretary of Defense, the Joint Chiefs of Staff, the combatant commanders, and other
Department of Defense (DOD) components.
JOINT COMMUNICATIONS SECURITY MONITOR ACTIVITY
7-5. The joint communications security monitor activity was created in 1993 by a memorandum of
agreement between the Services’ operations deputies, directors of the joint staff, and the National Security
Agency/Central Security Service. The joint communications security monitor activity monitors (collects,
analyzes, and reports) communications security of DOD telecommunications and automated information
systems as well as related noncommunications signals. It aims to identify potentially exploitable
vulnerabilities and to recommend countermeasures and corrective actions. The joint communications
security monitor activity supports real world operations, joint exercises, and DOD systems monitoring.
9 November 2012
FM 3-36
7-1
Chapter 7
JOINT INFORMATION OPERATIONS WARFARE CENTER
7-6. The Joint Information Operations Warfare Center (JIOWC) is subordinate to United States Strategic
Command (USSTRATCOM). The JIOWC consists of several directorates including the EW directorate.
The JIOWC integrates joint information operations, including EW, into military plans, exercises, and
operations. It is a valuable resource for commanders during the planning and execution of joint information
operations. It deploys information operations planning teams when the commander of USSTRATCOM
approves a request for support. The JIOWC delivers tailored, highly skilled support and sophisticated
models and simulations to joint commanders and provides information operations expertise in joint
exercises and contingency operations.
7-7. The EW directorate provides specialized expertise in EW. It is an innovation center for existing and
emerging EW capabilities and tactics, techniques, and procedures via a network of units, laboratories, test
ranges, and academia. The EW directorate manages, as the joint staff’s executive agent and technical
advisor, U.S. participation in the “NATO Emitter Database” described in paragraph 6-19. The JIOWC also
has electronic warfare reprogramming oversight responsibilities for the joint staff. This oversight includes
organizing, managing, and exercising joint aspects of electronic warfare reprogramming and facilitating the
exchange of joint electronic warfare reprogramming data. The actual reprogramming of equipment,
however, is a Service responsibility.
JOINT SPECTRUM CENTER
7-8. The Joint Spectrum Center is a field office within the Defense Spectrum Organization under the
Defense Information Systems Agency. Personnel in this center are experts in electromagnetic spectrum
planning, electromagnetic compatibility and vulnerability, electromagnetic environmental effects,
information systems, modeling and simulation, operations support, and system acquisition. The Joint
Spectrum Center provides all services for the electromagnetic spectrum to combatant commands, Services,
and other government agencies. It deploys teams in support of the combatant commanders and serves as the
DOD focal point for supporting spectrum supremacy aspects of information operations. It assists Soldiers
in developing and managing the joint restricted frequency list and helps resolve operational interference
and jamming incidents (see paragraphs C-9 through C-10).
JOINT WARFARE ANALYSIS CENTER
7-9. The Joint Warfare Analysis Center is a Navy-sponsored joint command under the J-3. This center
assists the Chairman of the Joint Chiefs of Staff and combatant commanders in preparing and analyzing
joint operation plans. It provides analysis of engineering and scientific data and integrates operational
analysis with intelligence.
MARINE CORPS INFORMATION TECHNOLOGY AND NETWORK OPERATIONS CENTER
7-10. The Marine Corps Information Technology and Network Operations Center is the Marine Corps’
enterprise network operations center. The Marine Corps Information Technology and Network Operations
Center is the nerve center for the central operational direction and configuration management of the Marine
Corps enterprise network. It is co-located with the Marine Corps forces computer network defense, the
component to the joint task force for computer network operations, and the Marine Corps computer
incident response team. These relationships provide a strong framework for integrated network
management and defense.
7-2
FM 3-36
9 November 2012
Electronic Warfare Agencies and Centers
NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE
7-11. The National Security Agency/Central Security Service is America’s cryptologic organization. This
organization protects U.S. government information systems and produces foreign signals intelligence
information. Executive Order
(EO)
12333 describes the responsibility of the National Security
Agency/Central Security Service in more detail. The resources of National Security Agency/Central
Security Service are organized for two national missions:
z
The information assurance mission is to protect U.S. vital national security information and
systems from theft or damage by others.
z
The signals intelligence mission is to gather information that adversaries of the United States
wish to keep secret.
7-12. The Director, National Security Agency/Central Security Service is the principal signals intelligence
and information security advisor to the Secretary of Defense, the Director of National Intelligence, and the
Chairman of the Joint Chiefs of Staff. The Director, National Security Agency/Central Security Service
provides signals intelligence support to combatant commanders and others in accordance with their
expressed requirements.
UNITED STATES CYBER COMMAND
7-13. United States Cyber Command fuses cyberspace operations and plans for Department of Defense
(DOD). It coordinates, integrates, synchronizes, and conducts activities to lead day-to-day defense and
protection of DOD information networks. It coordinates DOD support to military missions and directs the
operations and defense of specified DOD information networks. It conducts military cyberspace operations,
when directed.
7-14. United States Cyber Command centralizes command of cyberspace operations, strengthens DOD
cyberspace capabilities, and integrates and bolsters DOD’s cyber expertise. It helps DOD provide reliable
information and communications networks, counter cyberspace threats, and ensure access to cyberspace. It
also supports U.S. forces by protecting information systems and the cyberspace infrastructure supporting
weapons systems platforms from disruptions, intrusions, and attacks.
SUMMARY
7-15. This chapter provides a sampling of available joint and Service EW capabilities, activities, and
agencies that support ground force commanders in unified land operations. To leverage these capabilities
for EW support, Army EW officers acquire a working knowledge of the capabilities available and the
procedures for requesting support. Appendix D provides additional information on available tools and
resources related to EW.
9 November 2012
FM 3-36
7-3
Appendix A
Electronic Warfare Input to Operation Plans and Orders
This appendix discusses electronic warfare input to Army and joint plans and orders.
ARMY OPERATION PLANS AND ORDERS
A-1. Electronic warfare (EW) information is required for Army operation plans and orders. (ATTP 5-0.1
provides doctrine on plans and orders.) Under the current operation order format, EW information is
provided in Annex D (Fires), Appendix 7 (Cyber electromagnetic activities) base order or plan (see figure
A-1, pages A-1 through A-3):
z
Sub-subparagraph e (Scheme of Fires) to paragraph 3 (Execution).
z
Annex D (Fires):
Sub-subparagraph (4) (Electronic Warfare Operations) to subparagraph c (Scheme of Air
Support) to paragraph 3 (Execution).
Subparagraph e (Scheme of cyber electromagnetic activities) to paragraph 3 (Execution).
Appendix 7 (Cyber electromagnetic activities).
[CLASSIFICATION]
Copy ## of ## copies
Issuing headquarters
Place of issue
Date-time group of signature
Message reference number
ANNEX D
(FIRES) TO OPERATION PLAN/ORDER
[number]
[(code name)]—[issuing
headquarters] [(classification of title)]
(U) References: Add any specific references to electronic warfare, if needed.
(U) Time Zone Used Throughout the Plan/Order: Nothing specific to electronic warfare is needed.
1. (U) Situation. Include information affecting fires that paragraph 1 of the OPLAN or OPORD does not
cover or that needs expansion.
a. (U) Area of Interest. Nothing specific to electronic warfare is needed.
b. (U) Area of Operations. Nothing specific to electronic warfare is needed.
c. (U) Enemy Forces. Identify the vulnerabilities of enemy information systems and electronic warfare
systems. Identify the enemy capability to interfere with accomplishment of the electronic warfare mission.
d. (U) Friendly Forces. Identify friendly electronic warfare assets and resources that affect electronic
warfare planning by subordinate commanders. Identify friendly forces with which subordinate commanders
may operate. Identify potential conflicts within the friendly electronic warfare, especially if conducting joint
or multinational operations. Identify and deconflict methods and priority of spectrum distribution.
e.
(U) Interagency, Intergovernmental, and Nongovernmental Organizations. Nothing specific to
electronic warfare is needed.
[page number]
[CLASSIFICATION]
Figure A-1. Sample operation plan for Annex D
9 November 2012
FM 3-36
A-1
Appendix A
[CLASSIFICATION]
ANNEX D
(FIRES) TO OPERATION PLAN/ORDER
[number]
[(code name)]—[issuing
headquarters] [(classification of title)]
f. (U) Civil Considerations. Nothing specific to electronic warfare is needed.
g. (U) Attachments and Detachments. List the electronic warfare assets that are attached or detached.
List the electronic warfare resources available from higher headquarters.
h. (U) Assumptions. Nothing specific to electronic warfare is needed.
2. (U) Mission. State how electronic warfare will support the commander’s objectives.
3. (U) Execution.
a. (U) Scheme of Fires. Nothing specific to electronic warfare is needed.
b. (U) Scheme of Field Artillery Support. Nothing specific to electronic warfare is needed.
c. (U) Scheme of Air Support. Briefly describe the maneuver commander’s guidance for the use of air
power. Refer to Appendix 5 (Air Support) to Annex D (Fires) as required.
(1) (U) Organization for Combat. Nothing specific to electronic warfare is needed.
(2) (U) Air Interdiction Operations. Nothing specific to electronic warfare is needed.
(3) (U) Close Air Support Operations. Nothing specific to electronic warfare is needed.
(4) (U) Electronic Warfare Operations. Provide the concept for use of electronic warfare aircraft
and if the joint force air component commander can provide the resources. State the electronic warfare
tasks.
(5) (U) Air Reconnaissance Operations. Nothing specific to electronic warfare is needed.
d. (U) Scheme of Naval Fire Support. Nothing specific to electronic warfare is needed.
e. (U) Scheme of Cyber Electromagnetic Activities. Describe the concept for use of electronic warfare
(electronic attack). Include specific tasks to supporting units. Refer to the Appendix
7
(Cyber
Electromagnetic Activities) to Annex D (Fires) as required.
f. (U) Battlefield Obscuration Support. Nothing specific to electronic warfare is needed.
g. (U) Target Acquisition. Nothing specific to electronic warfare is needed.
h. (U) Tasks to Subordinate Units. Identify the electronic warfare tasks for each unit.
i.
(U) Coordinating Instructions. Identify electronic warfare instructions applicable to two or more
units. Identify the requirements for the coordination of electronic warfare actions between units. Identify the
emission control guidance.
4. (U) Sustainment. Identify sustainment priorities for electronic warfare operations.
5. (U) Command and Signal.
a. (U) Command. Nothing specific to electronic warfare is needed.
b. (U) Control. Nothing specific to electronic warfare is needed.
[CLASSIFICATION]
Figure A-1. Sample operation plan for Annex D (continued)
A-2
FM 3-36
9 November 2012
Electronic Warfare Input to Operation Plans and Orders
[CLASSIFICATION]
ANNEX D
(FIRES) TO OPERATION PLAN/ORDER
[number]
[(code name)]—[issuing
headquarters] [(classification of title)]
c. (U) Signal. Identify, if any, the special or unusual communications equipment related to electronic
warfare operations.
[Commander’s last name]
[Commander’s rank]
[page number]
ACKNOWLEDGE: Nothing specific to electronic warfare is needed.
OFFICIAL:
[Authenticator’s name]
[Authenticator’s position]
ATTACHMENTS: Add any specific references to electronic warfare operations, if needed.
Appendix 1 - Fire Support Overlay
Appendix 2 - Fire Support Execution Matrix
Appendix 3 - Targeting
Appendix 4 - Field Artillery Support
Appendix 5 - Air Support
Appendix 6 - Naval Fire Support
Appendix 7 - Cyber Electromagnetic Activities
DISTRIBUTION: Show only if distributed separately from the base order or higher-level attachments.
[page number]
[CLASSIFICATION]
Figure A-1. Sample operation plan for Annex D (continued)
A-2. Under the current operation order format, electromagnetic spectrum operations information
is
provided in Annex H (Signal) (see figure A-2, pages A-3 through A-5):
z
Sub-subparagraph 5 (Electromagnetic Spectrum Operations) to subparagraph a (Scheme of
Signal Operations) to paragraph 3 (Execution).
z
Appendix 5 (Electromagnetic Spectrum Operations).
[CLASSIFICATION]
Copy ## of ## copies
Issuing headquarters
Place of issue
Date-time group of signature
Message reference number
ANNEX H (SIGNAL) TO OPERATION PLAN/ORDER [number]
[(code name)]—[issuing
headquarters] [(classification of title)]
(U) References: Add any specific references to electromagnetic spectrum operations, if needed.
(U) Time Zone Used Throughout the Order: Nothing specific to electromagnetic spectrum operations is
needed.
[page number]
[CLASSIFICATION]
Figure A-2. Sample operation plan for Annex H
9 November 2012
FM 3-36
A-3
Appendix A
[CLASSIFICATION]
ANNEX H (SIGNAL) TO OPERATION PLAN/ORDER [number]
[(code name)]—[issuing
headquarters] [(classification of title)]
1.
(U) Situation. Include information affecting signal operations that paragraph 1 of the OPLAN or
OPORD does not cover or that needs expansion.
a. (U) Area of Interest. Nothing specific to electromagnetic spectrum operations is needed.
b. (U) Area of Operations. Nothing specific to electromagnetic spectrum operations is needed.
c. (U) Enemy Forces. Identify the vulnerabilities of enemy information systems and electromagnetic
spectrum systems. Identify the enemy capability to interfere with accomplishment of the electromagnetic
spectrum mission.
d. (U) Friendly Forces. Identify friendly electromagnetic spectrum assets and resources that affect
electromagnetic spectrum planning by subordinate commanders. Identify friendly forces with which
subordinate commanders may operate. Identify potential conflicts within the friendly electromagnetic
spectrum, especially if conducting joint or multinational operations. Identify and deconflict methods and
priority of spectrum distribution.
e.
(U) Interagency, Intergovernmental, and Nongovernmental Organizations. Nothing specific to
electromagnetic spectrum operations is needed.
f. (U) Civil Considerations. Nothing specific to electromagnetic spectrum operations is needed.
g. (U) Attachments and Detachments. List the electromagnetic spectrum assets that are attached or
detached. List the electromagnetic spectrum resources available from higher headquarters.
h. (U) Assumptions. Nothing specific to electromagnetic spectrum operations is needed.
2. (U) Mission. State how electromagnetic spectrum operations will support the commander’s objectives.
3. (U) Execution.
a. (U) Scheme of Signal Operations. Nothing specific to electromagnetic spectrum operations is needed.
(1) (U) Scheme of Information Assurance. Nothing specific to electromagnetic spectrum operations
is needed.
(2)
(U) Scheme of Voice and Data Network Diagrams. Nothing specific to electromagnetic
spectrum operations is needed.
(3)
(U) Scheme of Satellite Communications. Nothing specific to electromagnetic spectrum
operations is needed.
(4)
(U) Scheme of Foreign Data Exchanges. Nothing specific to electromagnetic spectrum
operations is needed.
(5) (U) Electromagnetic Spectrum Operations. Describe how electromagnetic spectrum operations
supports the commander’s intent and concept of operations described in the base plan or order. Outline the
effects the commander wants to achieve while prioritizing tasks for electromagnetic spectrum operations.
List objectives and the primary tasks to achieve those objectives. Refer to Appendix 5 (Electromagnetic
Spectrum Operations) to Annex H (Signal) as required.
(6) (U) Network Diagram. Nothing specific to electromagnetic spectrum operations is needed.
b. (U) Tasks to Subordinate Units. Identify the electromagnetic spectrum tasks for each unit.
[page number]
[CLASSIFICATION]
Figure A-2. Sample operation plan for Annex H (continued)
A-4
FM 3-36
9 November 2012
Electronic Warfare Input to Operation Plans and Orders
[CLASSIFICATION]
ANNEX H (SIGNAL) TO OPERATION PLAN/ORDER [number]
[(code name)]—[issuing
headquarters] [(classification of title)]
c. (U) Coordinating Instructions. Identify electromagnetic spectrum instructions applicable to two or
more units. Identify the requirements for the coordination of electromagnetic spectrum actions between
units. Identify the emission control guidance.
4. (U) Sustainment. Nothing specific to electromagnetic spectrum operations is needed.
5. (U) Command and Signal.
a. (U) Command. Nothing specific to electromagnetic spectrum operations is needed.
b. (U) Control. Nothing specific to electromagnetic spectrum operations is needed.
c.
(U) Signal. Identify, if any, the special or unusual communications equipment related
to
electromagnetic spectrum operations.
ACKNOWLEDGE: Nothing specific to electromagnetic spectrum operations is needed.
[Commander’s last name]
[Commander’s rank]
OFFICIAL:
[Authenticator’s name]
[Authenticator’s position]
ATTACHMENTS: Nothing specific to electromagnetic spectrum operations is needed.
Appendix 1 - Information Assurance
Appendix 2 - Voice and Data Network Diagrams
Appendix 3 - Satellite Communications
Appendix 4 - Foreign Data Exchanges
Appendix 5 - Electromagnetic Spectrum Operations
DISTRIBUTION: Show only if distributed separately from the base order or higher-level attachments.
[page number]
[CLASSIFICATION]
Figure A-2. Sample operation plan for Annex H (continued)
JOINT OPERATION PLANS AND ORDERS
A-3. If required to provide electronic warfare input to portions of a joint order, the primary areas for input
are the following:
z
Paragraph 3 (Execution) to appendix 3 (Information Operations) to Annex C (Operations).
z
Tab B (Electronic Warfare) to appendix 3 (Information Operations) to Annex C (Operations).
9 November 2012
FM 3-36
A-5
Appendix B
Electronic Warfare Running Estimate
This appendix discusses the electronic warfare running estimate. It first describes a
running estimate. Then it illustrates a sample running estimate for electronic warfare.
DESCRIPTION OF RUNNING ESTIMATE
B-1. A running estimate is the continuous assessment of the current situation used to determine if the
current operation is proceeding according to the commander’s intent and if planned future operations are
supportable. (ATTP 5-0.1 discusses running estimates in detail.) The electronic warfare (EW) running
estimate is used to support the military decisionmaking process (MDMP) throughout the conduct of
operations. During planning, the EW running estimate provides an assessment of the supportability of each
proposed course of action from an EW perspective.
B-2. The format of the EW running estimate closely parallels the steps of the MDMP. It serves as the
primary tool for recording the electronic warfare officer’s
(EWO’s) assessments, analyses, and
recommendations for EW operations. The EWO and staff in the EW working group are responsible for
conducting the analysis and providing recommendations based on the EW running estimate.
SAMPLE OF RUNNING ESTIMATE
B-3. A complete EW running estimate should contain the information necessary to answer any question
the commander may pose. If there are gaps in the EW running estimate, the staff identifies the gaps as
information requirements and submits them to the intelligence cell. The EW running estimate can form the
basis for EW input required in other applicable appendixes and annexes within operation plans and orders.
Figure B-1, page B-2, provides a sample EW running estimate for use during planning.
B-4. Once the commander approves the order, the EW running estimate is used to inform current and
future operations. During execution, the EW running estimate is used to help determine if current EW
operations are proceeding according to plan and if future EW operations are supportable. The EWO and
supporting staff members within the EW working group produce and update the running estimate. The staff
frequently updates the running estimate so that the information remains current and relevant.
9 November 2012
FM 3-36
B-1
Appendix B
1.
SITUATION AND CONSIDERATIONS.
a. Area of Interest. Identify and describe those factors of the area of interest that affect
functional area considerations.
b. Characteristics of the Area of Operations.
(1) Terrain. State how terrain may impact electronic warfare operations.
(2) Weather. State how weather may impact electronic warfare operations.
(3) Enemy Forces. Describe enemy disposition, composition, strength, and systems
as well as enemy capabilities and possible courses of action (COAs) with respect to
their effects on electronic warfare operations.
(4) Friendly Forces. List current status of the forces’ electronic warfare resources.
List the current status of additional electronic warfare resources. Provide a
comparison of electronic warfare requirements with available capabilities and
recommend solutions for any discrepancies. Identify friendly force’s electronic warfare
vulnerabilities and recommend solutions.
(5) Civilian Considerations. State how rules of engagement and incident
management requirements may impact electronic warfare operations.
c. Assumptions. List any assumptions used that may affect the employment of
electronic warfare capabilities.
2.
MISSION. Show the restated mission resulting from mission analysis.
3.
COURSES OF ACTION.
a. List friendly COAs that were war-gamed.
b. List enemy actions or COAs that were templated that affect the functional area.
c. List the evaluation criteria identified during COA analysis. All staffs use the same
criteria.
4.
ANALYSIS. Analyze each COA using the evaluation criteria from COA analysis.
5.
COMPARISON. Compare COAs. Rank order COAs for each electronic warfare key
consideration identified.
6.
RECOMMENDATIONS AND CONCLUSIONS. This paragraph translates the best COA
(as determined in paragraph 5) into a complete recommendation. It should outline who,
what, where, when, how, and why from the electronic warfare point of view. It states
which COA can best be supported by friendly electronic warfare, and is less vulnerable to
enemy electronic warfare force capabilities.
a. Recommend the most supportable COAs from an electronic warfare perspective.
b. Prioritize and list and electronic warfare issues, deficiencies, and risks and make
recommendations on how to mitigate them.
Figure B-1. Sample of electronic warfare running estimate
B-2
FM 3-36
9 November 2012
Appendix C
Reports and Messages Related to Electronic Warfare
This appendix provides information and references for electronic warfare and related
reports and message formats, including counter-improvised explosive device
activities.
MESSAGES AND SUMMARIES
C-1. The following messages and summaries are associated with the planning, synchronization,
deconfliction, and assessment of electronic warfare (EW) operations.
ELECTRONIC ATTACK DATA MESSAGE
C-2. An electronic attack data message reports an electronic attack strobe from an affected or detecting
unit’s position to an aircraft emitting an electronic attack. It is used to report the location of a hostile or
unknown aircraft emitting an electronic attack. The detecting unit reports its detection to all units using a
given network when the data link is degraded or not operational. Upon receipt of several messages, the
source of enemy electronic attack can be determined by comparing lines of bearing from the different
origins by triangulation. (See FM 6-99.2 for the message format for the EA (Electronic Attack) Data
Message [EADAT], report number E001.)
ELECTRONIC ATTACK REQUEST FORMAT
C-3. Electronic fires fall within three categories: preplanned, preplanned on-call, and immediate.
Requesting airborne electronic attack support for ground operations is similar to requesting close air
support. Requests for an electronic attack are sent via the normal joint air request process. Requesters use a
DD Form 1972 (Joint Tactical Air Strike Request). They should reference JP 3-09.3 for instructions on
completing this form. A theater-specific electronic attack request format may complement a DD Form
1972. When submitting a DD Form 1972, requesters, at a minimum, require the following information:
z
Target location.
z
Prioritized target description and jam frequencies.
z
Time on target (window).
z
Joint terminal attack controller.
z
Jamming control authority call sign and frequency.
z
Friendly force disposition (for example, troop movement route).
z
Friendly frequency restrictions.
z
Other remarks to clarify the requested electronic attack.
ELECTRONIC WARFARE FREQUENCY DECONFLICTION MESSAGE
C-4. An EW frequency deconfliction message promulgates a list of protected, guarded, and taboo
frequencies. This list helps friendly forces to use frequencies in the electromagnetic spectrum without
adverse impact from friendly electronic attack. (See FM 6-99.2 for the format for Electronic Warfare
Frequency Deconfliction Message [EWDECONFLICT], report number E005.)
ELECTRONIC WARFARE MISSION SUMMARY
C-5. The EW mission summary summarizes significant EW missions and reports the status of offensive
EW assets. EW and electronic-attack-capable surface and air units use it to provide information on EW
9 November 2012
FM 3-36
C-1
Appendix C
operations. Service components use it to report significant events for subsequent analysis. (See FM 6-99.2
for the format for the Electronic Warfare Mission Summary [EWMSNSUM], report number E010.)
ELECTRONIC WARFARE REQUESTING TASKING MESSAGE
C-6. Joint task force commanders use the EW requesting tasking message to task component commanders
to perform EW operations in support of the joint EW plan and to support component EW operations.
Component commanders use this message to request EW support from sources outside their command.
(See FM 6-99.2 for the format for the Electronic Warfare Requesting/Tasking Message [EWRTM], report
number E015.)
JOINT TACTICAL AIR STRIKE REQUEST
C-7. The DD Form 1972 (Joint Tactical Air Strike Request) is used to request electronic attack (see
paragraph C-3.) (See also JP 3-09.3 and FM 3-09.32 for more information.)
JOINT SPECTRUM INTERFERENCE RESOLUTION
C-8. The joint spectrum interference resolution (JSIR) program replaced the Department of Defense
meaconing, intrusion, jamming, and interference program. (CJCSI 3320.02E provides JSIR policy and
reporting guidance.)
JOINT RESTRICTED FREQUENCY LIST
C-9. Operational, intelligence, and support elements use the joint restricted frequency list to identify the
level of protection desired for various networks and frequencies. The list should be limited to the minimum
number of frequencies necessary for friendly forces to accomplish objectives.
C-10. The joint restricted frequency list format (shown in Annex A to appendix B to JP 3-13.1) is used by
the joint automated communications-electronics operations instruction system. The format is unclassified
but should show the proper classification of each paragraph when filled in. (See CJCSI 3320.01C and JP
3-13.1 for additional information.)
COUNTER IMPROVISED EXPLOSIVE-DEVICE ACTIVITIES
C-11. Certain reports and references are associated with counter improvised explosive device activities.
Most of these reports include information for counter radio-controlled improvised explosive device EW
(sometimes referred to as CREW) activities. EW working groups have the responsibility to monitor these
reports to assess planned counter radio-controlled improvised explosive device EW activities and to support
future operations. These reports typically use formats established in FM 6-99.2 modified to include
improvised explosive device considerations and current operations.
C-2
FM 3-36
9 November 2012
Appendix D
Tools and Resources Related to Electronic Warfare
This appendix discusses tools and reachback resources related to electronic warfare.
Successful electronic warfare officers, noncommissioned officers, and supporting
staff know these tools and resources and understand how to use them to support
electronic warfare. Some tools and resources require an approved user account for
access.
ARMY REPROGRAMMING ANALYSIS TEAM
D-1. The Army Reprogramming Analysis Team (ARAT) supports tactical commanders. It provides timely
reprogramming of any Army-supported software used for target acquisition, target engagement,
measurement and signature intelligence, and vehicle and aircraft survivability (including software operated
by other Services). The team provides software changes not readily possible by operator input to respond to
rapid deployments or changes in an operational environment. The ARAT Web site,
D-2. The ARAT provides reprogramming support for counter radio-controlled improvised explosive
device electronic warfare (EW) activities and other electronic systems.
D-3. The team is accessible via the ARAT’s Warfighter Survivability Software Support Portal. A
SECRET Internet Protocol Router Network (SIPRNET) account is required to access the portal.
NATIONAL GROUND INTELLIGENCE CENTER
D-4. The National Ground Intelligence Center provides all-source analysis of the threat posed by
improvised explosive devices produced and used by foreign terrorist and insurgent groups. The center
supports U.S. forces during training, operational planning, deployment, and redeployment.
D-5. The center maintains a counter improvised explosive device targeting program (often called CITP)
portal on its SIPRNET site. This portal provides information concerning improvised explosive device
activities, incidents, and assessments.
ELECTRONIC ORDER OF BATTLE
D-6. An electronic order of battle details all known combinations of emitters and platforms in a particular
area of operations. It consists of several reachback resources:
z
National Security Agency-Electronic Intelligence Parameter Query.
z
U.S. electromagnetic systems database.
z
National Ground Intelligence System parametric information relational intelligence tool
database.
z
Military equipment parametrics and engineering database.
JOINT INFORMATION OPERATIONS WARFARE CENTER
D-7. The Joint Information Operations Warfare Center (known as JIOWC) is the only joint EW center of
expertise for the Department of Defense. It provides EW subject matter expertise from a range of
backgrounds, including people with current multi-service operational experience. The center has a limited
capability to perform modeling and simulation studies and EW red team support. It can deploy in a support
role if approved by United States Strategic Command. (See paragraphs 7-6 through 7-7.)
9 November 2012
FM 3-36
D-1
Appendix D
JOINT IMPROVISED EXPLOSIVE DEVICE DEFEAT
ORGANIZATION
D-8. The Joint Improvised Explosive Device Defeat Organization (known as JIEDDO) leads Department
of Defense (DOD) actions to rapidly provide counter-improvised explosive device (sometimes called
C-IED) capabilities in support of the combatant commanders and to enable the defeat of the improvised
explosive device as a weapon of strategic influence.
JOINT SPECTRUM CENTER
D-9. The Joint Spectrum Center ensures DOD effectively uses the electromagnetic spectrum in support of
national security and military objectives. The center serves as DOD’s center of excellence for
electromagnetic spectrum management matters in planning, acquisition, training, and operations. It
provides information on a quick-reaction basis in various formats and media to support EW planners and
electromagnetic spectrum managers.
D-10. The center maintains databases and provides data about friendly force command and control systems
for locational and technical characteristics. This information is used to plan electronic protection measures.
These databases provide EW planners with information covering communication, radar, navigation,
broadcast, identification, and EW systems operated by the DOD, other government agencies, and private
businesses and organizations. (See also paragraph 7-8.)
KNOWLEDGE AND INFORMATION FUSION EXCHANGE
D-11. The Knowledge and Information Fusion Exchange (sometimes called KnIFE) is a program sponsored
by United States Joint Forces Command. It provides Soldiers with observations, insights, and lessons from
operations around the world.
D-2
FM 3-36
9 November 2012
Appendix E
Cyber Electromagnetic Activities Support to Electronic
Warfare
This appendix introduces cyber electromagnetic activities in the context of the
mission command warfighting function staff tasks. It lists integration tasks performed
by an electronic warfare working group and required expertise for an electronic
warfare staff element and working group.
MISSION COMMAND WARFIGHTING FUNCTION STAFF TASKS
E-1. Staffs support the commander in the exercise of mission command by performing the four staff tasks:
z
Conduct the operations process.
z
Conduct knowledge management and information management.
z
Conduct inform and influence activities.
z
Conduct cyber electromagnetic activities.
Through these tasks, the staff supports the commander in understanding situations, making effective
decisions, and implementing those decisions throughout the conduct of operations. The application of cyber
electromagnetic activities (CEMA) as an information-related capability directly supports mission command
to ensure freedom of movement within the information environment.
CYBER ELECTROMAGNETIC ACTIVITIES
E-2. CEMA consist of two lines of effort: cyberspace operations and electronic warfare (EW), supported
by electromagnetic spectrum operations. (See table E-1, page E-2.) The electromagnetic spectrum is
essential for communications, lethality, sensors, and self-protection. The cyberspace line of effort aims to
achieve objectives in and through cyberspace. The EW line of effort aims to control the electromagnetic
spectrum or to attack the enemy. These lines of effort may rely on the same information-related capabilities
to accomplish these effects, so planners must synchronize and integrate them closely to ensure unity of
effort in words, images, and actions. Components of the cyberspace line of effort include cyber situational
awareness, network operations, and cyber warfare. These components integrate with the divisions of the
EW line of effort—electronic attack, electronic protection, and electronic warfare support. Components of
both lines of effort integrate with electromagnetic spectrum operations.
E-3. The EW working group integrates and synchronizes information related to CEMA to achieve desired
conditions in cyberspace and the electromagnetic spectrum. The EW working group seeks to unify the
offensive and defensive aspects of CEMA (including cyber warfare, network operations, electronic attack,
electronic protection, and electronic warfare support). The working group focuses on the commander’s
stated conditions to gain and maintain advantages for cyberspace and the electromagnetic spectrum. To this
end, the working group supports situational awareness related to cyberspace and the electromagnetic
spectrum and continually assesses progress toward desired conditions. The working group coordinates
vertically and horizontally across echelons to achieve the best results from assigned and supporting
information-related capabilities. The working group integrates all appropriate capabilities
(cyber
electromagnetic and physical) to achieve these desired conditions. The working group also leverages both
cyberspace and the electromagnetic spectrum to maximize support of the unit’s overall mission. This
support could include setting conditions in cyberspace and the electromagnetic spectrum to facilitate a
unit’s main effort or perhaps providing the means for successful inform and influence activities. The EW
element is a primary supporting member of the inform and influence activities working group for this
purpose.
9 November 2012
FM 3-36
E-1
Appendix E
Table E-1. Cyber electromagnetic activities
Task: Conduct cyber electromagnetic activities as part of combined arms operations.
Purpose: To seize, retain, and exploit an advantage over adversaries and enemies in both
cyberspace and across the electromagnetic spectrum, denying and degrading adversary and
enemy use of the same and protecting friendly mission command systems.
Cyberspace Operations Line of Effort
Electronic Warfare Line of Effort
Task: Employ cyber capabilities.
Task: Use electromagnetic and directed energy.
Purpose: To achieve objectives in and
Purpose: To control the electromagnetic spectrum
through cyberspace.
or to attack the enemy.
Cyber situational awareness: The
Electronic attack: Use of electromagnetic energy,
knowledge of relevant information regarding
directed energy, or antiradiation weapons to attack
activities in and through cyberspace and the
personnel, facilities, or equipment.
electromagnetic spectrum.
Network operations: Activities conducted
Electronic protection: Actions taken to protect
to operate and defend the Global
personnel, facilities, and equipment from any
Information Grid.
effects of friendly or enemy use of the
electromagnetic spectrum.
Cyber warfare: Warfare that extends cyber
Electronic warfare support: Actions to search for,
power beyond the defensive boundaries of
intercept, identify, and locate or localize sources of
the Global information Grid to deny,
intentional and unintentional radiated
degrade, disrupt, destroy, and exploit
electromagnetic energy for the purpose of
enemies.
immediate threat recognition, targeting, planning,
and conduct of future operations.
Electromagnetic spectrum operations: Planning, coordinating, and managing joint use of the
electromagnetic spectrum through operational, engineering, and administrative procedures.
E-4. CEMA tasks are coordinated across the integrating cells: current operations integration, future
operations, and plans integrating cells. The working group coordinates, both vertically and horizontally, the
critical components of CEMA across all the warfighting functions and staff elements (the G-2 or S-2, G-3
or S-3, G-6 or S-6, and G-6 or S-7). This includes integration with external staffs, organizations, and
unified action partners.
INTEGRATION TASKS PERFORMED BY ELECTRONIC WARFARE
WORKING GROUP
E-5. The EW working group may perform the following CEMA integration tasks:
z
Plan, integrate, coordinate, and assess the holistic employment of the full range of CEMA
capabilities in unit operations.
z
Plan and request offensive and defensive CEMA capabilities and actions to support the scheme
of maneuver, including degraded operations.
z
Synchronize and integrate offensive and defensive CEMA capabilities and actions into the
scheme of maneuver.
z
Facilitate and conduct CEMA vertical and horizontal integration and synchronization of
operations across the warfighting functions.
z
Synchronize operations with CEMA capabilities in other domains such as aerial, high altitude
and space.
z
Plan, assess, and direct friendly electronics security measures.
z
Prioritize CEMA effects and targets.
z
Deconflict CEMA with operations, including intelligence.
z
Determine, adjudicate, and forward spectrum user requirements.
E-2
FM 3-36
9 November 2012
Cyber Electromagnetic Activities Support to Electronic Warfare
z
Conduct frequency deconfliction and interference resolution for electronic attack.
z
Integrate CEMA into the operations process.
z
Identify and coordinate intelligence support requirements for unit CEMA operations.
z
Assess offensive and defensive CEMA requirements.
z
Maintain current assessment of CEMA resources available to the unit.
z
Recommend and assess friendly protection measures related to CEMA.
ELECTRONIC WARFARE STAFF ELEMENT AND WORKING
GROUP EXPERTISE
E-6. A few of the core capabilities that must reside within the EW element or EW working group to
coordinate CEMA effectively consist of the following:
z
Knowledge of network operations.
z
Ability to access intelligence.
z
Electronic warfare.
z
Electromagnetic spectrum management (also referred to as spectrum management).
z
Employment of offensive CEMA and dynamic defense capabilities
(such as cryptologic
capabilities).
z
Ability to access support activities (for example, higher-level CEMA capabilities, forensics, and
vulnerability assessment).
z
Synchronization and integration.
9 November 2012
FM 3-36
E-3
Glossary
The glossary lists terms and acronyms with Army or joint definitions. The proponent
publication for terms is listed in parentheses after the definition.
SECTION I - ACRONYMS AND ABBREVIATIONS
ADP
Army doctrine publication
ARAT
Army Reprogramming Analysis Team
ASCC
Army Service component command
ATTP
Army tactics, techniques, and procedures
CEMA
cyber electromagnetic activities
CJCSI
Chairman of the Joint Chiefs of Staff instruction
COA
course of action
DA
Department of the Army
DD
Department of Defense (for forms)
DOD
Department of Defense
DODI
Department of Defense instruction
EW
electronic warfare
EWC
electronic warfare cell
EWO
electronic warfare officer
FM
field manual
G-2
assistant chief of staff, intelligence
G-3
assistant chief of staff, operations
G-4
assistant chief of staff, logistics
G-6
assistant chief of staff, signal
G-7
assistant chief of staff, inform and influence activities
IPB
intelligence preparation of the battlefield
J-2
intelligence directorate of a joint staff
J-3
operations directorate of a joint staff
J-6
communications system directorate of a joint staff
JIOWC
Joint Information Operations Warfare Center
JP
joint publication
MDMP
military decisionmaking process
NATO
North Atlantic Treaty Organization
S-2
intelligence staff officer
S-3
operations staff officer
S-4
logistics staff officer
S-6
signal staff officer
S-7
inform and influence activities staff officer
U.S.
United States
9 November 2012
FM 3-36
Glossary-1
Glossary
SECTION II - TERMS
countermeasures
That form of military science that, by the employment of devices and/or techniques, has as its objective
the impairment of the operational effectiveness of enemy activity. (JP 3-13.1)
directed energy
An umbrella term covering technologies that relate to the production of a beam of concentrated
electromagnetic energy or atomic or subatomic particles. (JP 3-13.1)
electromagnetic compatibility
The ability of systems, equipment, and devices that use the electromagnetic spectrum to operate in
their intended environments without causing or suffering unacceptable or unintentional degradation
because of electromagnetic radiation or response. (JP 3-13.1)
electromagnetic hardening
Action taken to protect personnel, facilities, and/or equipment by blanking, filtering, attenuating,
grounding, bonding, and/or shielding against undesirable effects of electromagnetic energy. (JP 3-13.1)
electromagnetic interference
Any electromagnetic disturbance, induced intentionally or unintentionally, that interrupts, obstructs, or
otherwise degrades or limits the effective performance of electronics and electrical equipment.
(JP 3-13.1)
electromagnetic intrusion
The intentional insertion of electromagnetic energy into transmission paths in any manner, with the
objective of deceiving operators or of causing confusion. (JP 3-13.1)
electromagnetic jamming
The deliberate radiation, reradiation, or reflection of electromagnetic energy for the purpose of
preventing or reducing an enemy’s effective use of the electromagnetic spectrum, and with the intent
of degrading or neutralizing the enemy’s combat capability. (JP 3-13.1)
electromagnetic pulse
The electromagnetic radiation from a strong electronic pulse, most commonly caused by a nuclear
explosion that may couple with electrical or electronic systems to produce damaging current and
voltage surges. (JP 3-13.1)
electromagnetic spectrum
The range of frequencies of electromagnetic radiation from zero to infinity. It is divided into 26
alphabetically designated bands. (JP 3-13.1)
electromagnetic spectrum management
Planning, coordinating, and managing joint use of the electromagnetic spectrum through operational,
engineering, and administrative procedures. The objective of spectrum management is to enable
electronic systems to perform their functions in the intended environment without causing or suffering
unacceptable interference. (JP 6-0)
electronic attack
A division of electronic warfare involving the use of electromagnetic energy, directed energy, or
antiradiation weapons to attack personnel, facilities, or equipment with the intent of degrading,
neutralizing, or destroying enemy combat capability and is considered a form of fires. (JP 3-13.1)
electronic intelligence
Technical and geolocation intelligence derived from foreign noncommunications electromagnetic
radiations emanating from other than nuclear detonations or radioactive sources. (JP 3-13.1)
Glossary-2
FM 3-36
9 November 2012
Glossary
electronic masking
The controlled radiation of electromagnetic energy on friendly frequencies in a manner to protect the
emissions of friendly communications and electronic systems against enemy electronic warfare support
measures/signals intelligence without significantly degrading the operation of friendly systems.
(JP 3-13.1)
electronic probing
Intentional radiation designed to be introduced into the devices or systems of potential enemies for the
purpose of learning the functions and operational capabilities of the devices or systems. (JP 3-13.1)
electronic protection
A division of electronic warfare involving actions taken to protect personnel, facilities, and equipment
from any effects of friendly or enemy use of the electromagnetic spectrum that degrade, neutralize, or
destroy friendly combat capability. (JP 3-13.1)
electronic reconnaissance
The detection, location, identification, and evaluation of foreign electromagnetic radiations. (JP 3-13.1)
electronic warfare
Military action involving the use of electromagnetic and directed energy to control the electromagnetic
spectrum or to attack the enemy. (JP 3-13.1)
electronic warfare reprogramming
The deliberate alteration or modification of electronic warfare or target sensing systems, or the tactics
and procedures that employ them, in response to validated changes in equipment, tactics, or the
electromagnetic environment. (JP 3-13.1)
electronic warfare support
A division of electronic warfare involving actions tasked by, or under direct control of, an operational
commander to search for, intercept, identify, and locate or localize sources of intentional and
unintentional radiated electromagnetic energy for the purpose of immediate threat recognition,
targeting, planning, and conduct of future operations. (JP 3-13.1)
electronics security
The protection resulting from all measures designed to deny unauthorized persons information of value
that might be derived from their interception and study of noncommunications electromagnetic
radiations, for example, radar. (JP 3-13.1)
electro-optical-infrared countermeasure
A device or technique employing electro-optical-infrared materials or technology that is intended to
impair the effectiveness of enemy activity, particularly with respect to precision guided weapons and
sensor systems. (JP 3-13.1)
emission control
The selective and controlled use of electromagnetic, acoustic, or other emitters to optimize command
and control capabilities while minimizing for operations security: a. detection by enemy sensors; b.
mutual interference among friendly systems; and/or c. enemy interference with the ability to execute a
military deception plan. (JP 3-13.1)
measure of effectiveness
A criterion used to assess changes in system behavior, capability, or operational environment that is
tied to measuring the attainment of an end state, achievement of an objective, or creation of an effect.
(JP 3-0)
measure of performance
A criterion used to assess friendly actions that is tied to measuring task accomplishment. (JP 3-0)
operational environment
A composite of the conditions, circumstances, and influences that affect the employment of capabilities
and bear on the decisions of the commander. (JP 3-0)
9 November 2012
FM 3-36
Glossary-3
Glossary
radio frequency countermeasures
Any device or technique employing radio frequency materials or technology that is intended to impair
the effectiveness of enemy activity, particularly with respect to precision guided weapons and sensor
systems. (JP 3-13.1)
red team
An organizational element comprised of trained and educated members that provide an independent
capability to fully explore alternatives in plans and operations in the context of the operational
environment and from the perspective of adversaries and others. (JP 2-0)
targeting
The process of selecting and prioritizing targets and matching the appropriate response to them,
considering operational requirements and capabilities. (JP 3-0)
wartime reserve modes
Characteristics and operating procedures of sensor, communications, navigation aids, threat
recognition, weapons, and countermeasures systems that will contribute to military effectiveness if
unknown to or misunderstood by opposing commanders before they are used, but could be exploited or
neutralized if known in advance. (JP 3-13.1)
working group
A grouping of predetermined staff representatives who meet to provide analysis, coordinate, and
provide recommendations for a particular purpose or function. (ATTP 5-0.1)
Glossary-4
FM 3-36
9 November 2012
References
Field manuals and selected joint publications are listed by new number followed by
old number.
REQUIRED PUBLICATIONS
These documents must be available to intended users of this publication.
ADRP 1-02. Operational Terms and Military Symbols. 31 August 2012.
JP 1-02. Department of Defense Dictionary of Military and Associated Terms. 8 November 2010.
RELATED PUBLICATIONS
These documents contain relevant supplemental information.
ARMY PUBLICATIONS
ADP 3-0. Unified Land Operations. 10 October 2011.
ADP 5-0. The Operations Process. 17 May 2012.
ATTP 3-13.10. Multi-Service Tactics, Techniques, and Procedures for Reprogramming Electronic
Warfare (EW) Systems. 1 February 2011.
ATTP 5-0.1. Commander and Staff Officer Guide. 14 September 2011.
FM 3-09.32. Multi-Service Tactics, Techniques, and Procedures for the Joint Application of
Firepower. 20 December 2007.
FM 3-60. The Targeting Process. 26 November 2010.
FM 5-19. Composite Risk Management. 21 August 2006.
FM 6-99.2 (FM 101-5-2). U.S. Army Report and Message Formats. 30 April 2007.
FM 27-10. The Law of Land Warfare. 18 July 1956.
JOINT PUBLICATIONS
Most joint publications are available online: <http://www.dtic.mil/doctrine/doctrine/doctrine.htm.>
CJCSI 3320.01C. Electromagnetic Spectrum Use in Joint Military Operations. 22 February 2011.
CJCSI 3320.02E. Joint Spectrum Interference Resolution (JSIR). 15 October 2010.
DODI 4650.01. Policy and Procedures for Management and Use of the Electromagnetic Spectrum.
9 January 2009.
JP 2-0. Joint Intelligence. 22 June 2007.
JP 3-0. Joint Operations. 11 August 2011.
JP 3-09. Joint Fire Support. 30 June 2010.
JP 3-09.3. Close Air Support. 8 July 2009.
JP 3-13. Information Operations. 13 February 2006.
JP 3-13.1. Electronic Warfare. 8 February 2012.
JP 3-60. Joint Targeting. 13 April 2007.
JP 6-0. Joint Communications System. 10 June 2010.
9 November 2012
FM 3-36
References-1
References
OTHER PUBLICATIONS
EO 12333. United States Intelligence Activities. 4 December 1981. Available at
WEB SITES
REFERENCED FORMS
DA Form 2028. Recommended Changes to Publications and Blank Forms.
DD Form 1972. Joint Tactical Air Strike Request.
References-2
FM 3-36
9 November 2012
|