FM 101-4 JTF-IM Multiservice Procedures for Joint Task Force-Information Management (April 1999)

 

  Главная      Manuals 

 

Search            copyright infringement  

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

FM 101-4 JTF-IM Multiservice Procedures for Joint Task Force-Information Management (April 1999)

 

 

-------------------------------------------------------------------------------------------------------------------------------------------------------------

FM 101-4
MCRP 6-23A
NWP 3-13.1.16
AFTTP(I) 3-2.22
FM 101-4
US Army Training and Doctrine Command
Fort Monroe, Virginia
MCRP 6-23A
Marine Corps Combat Development Command
Quantico, Virginia
NWP 3-13.1.16
Navy Warfare Development Command
Newport, Rhode Island
AFTTP(I) 3-2.22
Headquarters Air Force Doctrine Center
Maxwell Air Force Base, Alabama
8 April 1999
JTF-IM
Multiservice Procedures for
Joint Task Force-Information Management
TABLE OF CONTENTS
Page
EXECUTIVE SUMMARY
vi
CHAPTER I OVERVIEW FOR INFORMATION MANAGEMENT
Background
I-1
IM and Decisionmaking
I-1
Information Management Plan (IMP)
I-2
Information Quality Characteristics
I-2
Cognitive Hierarchy
I-2
Information Flow
I-4
CHAPTER II DUTIES AND RESPONSIBILITIES
Background
II-1
JTF HQ's Responsibilities
II-3
Information Management Board (IMB)
II-4
JTF Common Tactical Picture Board (CTPB)
II-5
Distribution Restriction: Approved for public release. Distribution is unlimited
iii

-------------------------------------------------------------------------------------------------------------------------------------------------------------

JTF IMO
II-5
Staff Section IMO
II-5
JTF Component and Supporting Agencies
II-5
JTF Information and Information System User Responsibilities
II-6
JTF Network Management Responsibilities
II-6
JTF Information and Information System Protection
Responsibilities
II-6
CHAPTER III
INFORMATION MANAGEMENT SYSTEMS
Background
III-1
Global Command and Control System (GCCS)
III-1
Network Application Management
III-3
LAN
III-11
AUTODIN Message Communications
III-11
VTC
III-11
Global Broadcasting System (GBS)
III-12
Priority of Communication Means
III-13
CHAPTER IV
INFORMATION MANAGEMENT REQUIREMENTS,
PROCESSES, AND PROCEDURES
Background
IV-1
CCIR
IV-1
RFI
IV-1
CTP Management
IV-4
Collaborative (Integrated) Planning System (CPS)
IV-4
Joint Operations Center/Joint Intelligence Support Element
Assessment Cell (JAC)
IV-5
JTF Daily Operations Cycle (Battle Rhythm)
IV-6
Reports Development
IV-7
Orders
IV-10
Briefings and Meetings
IV-11
Internal Policies and Procedures
IV-12
Multinational Procedures
IV-13
CHAPTER V
INFORMATION AND INFORMATION SYSTEM PROTECTION
Background
V-1
Threats to IM
V-1
Defensive Information Operations
V-2
Information Destruction
V-4
REFERENCES
References-1
GLOSSARY
Glossary-1
INDEX
Index-1
FIGURES
I-1
Information Quality Criteria
I-3
I-2
Cognitive Hierarchy
I-3
II-1
Generic JTF Structure
II-2
iv

-------------------------------------------------------------------------------------------------------------------------------------------------------------

II-2
JTF Staff Organization
II-2
II-3
Information Exchange Systems
II-3
III-1
COP Flow Chart
III-2
III-2
Sample JTF Home Page
III-4
III-3
Sample JTF Command Group Home Page
III-4
III-4
Sample JTF Component Home Page
III-5
III-5
Sample Major Unit Home Page
III-5
IV-1
Request for Information Flow Chart
IV-2
TABLES
III-1
Common Information Capabilities
III-1
III-2
Example JTF Newsgroup Home Page
III-6
III-3
JTF Newsgroups
III-7
III-3
JTF Newsgroups (Continued)
III-8
III-4
JTF Common Relevant Information
III-9
III-5A
JTF Shared Message Folders
III-10
III-5B
JTF Shared Message Folders
III-10
IV-1
RFI Tracking Log
IV-4
IV-2
Sample JTF HQ Daily Operations Cycle
IV-7
IV-3
JTF Reports Matrix (1 of 3)
IV-8
IV-3
JTF Reports Matrix (2 of 3)
IV-9
IV-3
JTF Reports Maxtris (3 of 3)
IV-10
IV-4
Sample JOC Message Log
IV-14
IV-5
Sample Master Suspense Action Log
IV-14
IV-6
Sample JTF Significant Events Log
IV-15
IV-7
Sample JTF Phone and E-Mail Directory
IV-15
v

-------------------------------------------------------------------------------------------------------------------------------------------------------------

EXECUTIVE SUMMARY
JTF-IM
Multiservice Procedures for
Joint Task Force-Information Management
This publication—
• Defines and outlines IM terms and processes to include filtering, fusing,
and prioritizing.
• Outlines IM responsibilities for handling, managing, preserving, and protecting
information.
• Provides an overview of systems available for supporting information
management.
• Provides techniques on how to manage the vast amounts of information
generated by different processes and systems (that is, electronic mail
[e-mail], newsgroups, home pages, the Global Command and Control System
[GCCS], official message traffic, and intelligence feeds).
• Provides tactics, techniques, and procedures to manage the
information flow between the joint operations center (JOC) and the joint
intelligence support element (JISE).
• Provides guidelines on managing the information pertaining to commander’s
critical information requirements (CCIR), requests for information (RFI)
procedures, reports, briefings, and operations orders.
Overview For Information Management
Chapter I introduces the definition and purpose of IM. It describes how IM relates to
the JTF commander’s decisionmaking process. It explains the relationship between this
publication and a specific JTF information management plan. The chapter describes the
general characteristics of information and information use supporting the commander’s
decisionmaking process. It concludes with a discussion on information flow in the JTF
and defines the terms filtering, fusing, and prioritizing in the context of IM.
Duties and Responsibilities
Chapter II provides a delineation of positions/cells/sections and their IM responsibilities.
It identifies the principal managers of the IM system while providing some definition of
their broad responsibilities and their relationship to the JTF staff.
vi

-------------------------------------------------------------------------------------------------------------------------------------------------------------

Information Management Systems
Chapter III discusses some IM systems available to the JTF staff and backup processes
or systems for emergencies. It discusses managing information through GCCS, newsgroups,
e-mail, and shared network drives to ensure it is available upon demand without crippling
the information flow.
Information Management Requirements, Processes, and Procedures
Chapter IV provides guidelines on how to best manage the information generated by
e-mail, GCCS, message traffic, etc. It also provides procedures for CCIR, RFI, and provides
techniques on the management of reports, briefings, and operation orders.
Information and Information System Protection
Chapter V describes information assurance considerations such as the vulnerability to
viruses, the levels of protection and defense, and the mechanisms that must be in place to
prevent the user from short cutting or by-passing levels of protection. Information
assurance also addresses safeguarding information.
vii

-------------------------------------------------------------------------------------------------------------------------------------------------------------

PROGRAM PARTICIPANTS
The following commands and agencies participated in the development of this publication:
Joint
Joint Warfighting Center Fenwick Rd Bldg 96, Fort Monroe, VA 23651-5000
JTF-Bravo, APO AA 34042
Joint Special Operations Forces Institute, PO Box 71929, Fort Bragg, NC 28307-1929
Joint Staff, J-7, JDD 7000 Joint Staff, Pentagon Room 2B865, Washington, DC 20318-7000
Joint Staff, J-6, 6000 Joint Staff, Pentagon Room 2B865, Washington, DC 2038-6000
USACOM, (J2 and J353) 1562 Mitscher Avenue, Suite 200, Norfolk, VA 23551-2488
USACOM, JTASC (J646, J724, J75), 116 Lakeview Parkway, Ste 100, Suffolk,
VA 23435-2697
USCENTCOM (CCJ5-O), 7115 S. Boundary Blvd, MacDill AFB, FL 33621-5101
USEUCOM (EJ5-D), Unit 30400, Box 1000, APO, AE 09128
USPACCOM (J383), Box 64013, Camp HM Smith, HI 96861-4013
USSOUTHCOM (SCJ5-PS), 3511 NW 91st Ave, Miami, FL 33172-1271
USSPACECOM (SPJ5X), 250 S. Peterson Blvd Suite 116, Peterson AFB, CO 80914-3130
USSTRATCOM (J512), 901 SAC Blvd, Suite 2E18, Offutt AFB, NE 68113-6500
USTRANSCOM, 508 Scott Dr, Scott AFB, IL 62225-5357
HQ USSOCOM (AOJ6-PS), 7701 Tampa Point Bvld, MacDill AFB, FL 33621-5323
Army
HQ TRADOC (ATDO-A), Ingalls Rd, Bldg 133 Room 7, Fort Monroe, VA 23651-5000
HQDA, ODCSOPS(DAMO-SSP), 400 Army Pentagon, Washington, DC 20310-0400
HQ XVIII ABN Corps, Fort Bragg, NC 28307-5000
Marine Corps
Marine Corps Combat Development Command, Joint Doctrine Branch (C427), 3300 Russell Rd,
3rd Floor Suite 318A, Quantico, VA 22134-5021
HQ US Marine Corps Stategy and Plans Division, Room 5D 616, Washington,
DC 20380-1775
MARFORLANT Standing Joint Task Force (SJTF), Camp Lejune, NC 28542
MCCDC, MAGTF Staff Training Program, (MSTP) (C54), Quantico, VA 22554
Navy
Navy Warfare Development Command, Det Norfolk, 1540 Gilbert Street, Norfolk, VA 23511-
2785
CINCLANTFLT, 1562 Mitscher Ave, Ste 250, Norfolk, VA 23511-2487
Chief of Naval Operations (N512), Department of the Navy, Washington, DC 20350-2000
2nd Fleet, FPO AE 09506-6000
2nd Fleet, DECOMUSNAVCENT, 2707 Zemkeave, MacDill AFB FL 35621-5105
viii

-------------------------------------------------------------------------------------------------------------------------------------------------------------

Air Force
HQ Air Force Doctrine Center (AFDC), 155 N. Twining Street, Maxwell AFB, AL 36112
AFDC Detachment 1, 216 Sweeny Bvld, Ste 109, Langley AFB, VA 23665
HQ AFCENT, 460 Box 539, APO AE 09703
HQ USAFE/SCE, APO AE 09094
HQ ACC/DOI/INOU/SSSD/ASC2A, Langley AFB, VA 23665
HQ 3AF/CCEA, PSC 37 Box 1, APO AE 09459
HQ 8 AF /SC/AS, Barksdale AFB, LA 71110-2279
HQ 9 AF, 524 Shaw Drive, Shaw AFB, SC 29152-5029
HQ 12 AF, Davis-Monthan AFB, AZ 85707-4100
608 Air Opns Group, 245 E. Davis Blvd, Room 246, Barksdale AFB, LA 71110
Other
HQ US Coast Guard (G-OPD), 2100 2nd Street SW, Room 3121, Washington,
DC 20593-0001
ix

-------------------------------------------------------------------------------------------------------------------------------------------------------------

Chapter I
OVERVIEW FOR INFORMATION MANAGEMENT
assess operations. This graphic depiction
The Joint Campaign should fully exploit
of the battlespace enhanced with text files
the information differential, that is, the
(messages, reports, etc.) provided the
superior access to and ability to effectively
commander a common tactical picture
employ information on the strategic,
(CTP). Often graphic and text information
operational, and tactical situation which
combined with the commander’s experience
advanced U.S. technologies provide our forces.
(intuitive reasoning) enabled the
commander to make sound and timely
Joint Pub 1
decisions.
1.
Background
b. Technology. Technology is changing
and automating the age-old method of
Information management
(IM)
achieving a CTP. Simultaneous distribution
refers to the processes a joint task force
of planning cell information to multiple
(JTF) uses to obtain, manipulate, direct,
units is a reality. Today JTFs display in a
and control information. IM includes all
more automated dynamic manner friendly
processes involved in the creation,
and threat air, ground, surface, and
collection and control, dissemination,
subsurface unit locations and status. An
storage and retrieval, protection, and
automated display helps the JTF maintain
destruction of information. The goal of IM
a more timely and accurate CTP and allows
is providing a timely flow of quality
the commander to develop enhanced
information enabling the commander, joint
situational awareness of the operating
task force
(CJTF) to anticipate and
environment.
understand the consequences of changing
conditions. This publication provides the
c. Automated Systems. Today, com-
JTF headquarters
(HQ) a variety of
manders and staffs rely on a variety of
techniques to manage information
automated systems to meet information
efficiently.
requirements. The advances in communi-
cations and computing equipment place
2. IM and Decisionmaking
enormous amounts of information virtually
at the commander’s fingertips. The success
a. Skillful decisionmaking is central to
of these systems is also the downfall of the
the art of command.
Judgement,
systems’ approach. More information is
experience, and vision are some of the
available than most humans have the
factors facilitating skillful decisionmaking.
capacity to assimilate, collate, and evaluate.
Perhaps the paramount factor is situational
Commanders are becoming victims to
awareness. Awareness and understanding
system success by losing control of the
of the operational environment allows the
information needed to support their
CJTF to anticipate future conditions,
decisionmaking processes.
formulate concepts of operations, analyze
courses of action, and accurately assess
d. Situational Awareness. Information
risks. For years, commanders made
systems continue to play an important role
decisions based on where they understood
in building situational awareness. Two
the threat to be relative to their forces. The
principal considerations help to improve
staff depicted on map boards and overlays
the utility of these systems in supporting
information necessary to plan, execute, and
the decisionmaking process. First,
I-1

-------------------------------------------------------------------------------------------------------------------------------------------------------------

information users at all levels need to
CTP, collaborative (integrated) planning
change the way they think about
systems, request for information (RFI)
information. Instead of thinking of
management procedures, and network
information in terms of systems, think of
applications used to post JTF information.
information as a commodity. Consider
This guidance may include using news-
information as an input to the decision-
groups, web pages, or other applications.
making process. This assists the staff in
c. The development and execution of
focusing on what the commander needs,
an effective JTF HQ IMP requires the
when it is needed, and presenting it in a
participation and interaction of the CJTF,
usable format to complete the decision-
chief of staff, all staff sections, and the JTF’s
making process. Second, the JTF must
components. The HQ should develop
develop a plan for managing information.
processes, procedures, pathways, and
This ensures that the required information
systems supporting each staff section once
is available in each process leading to
they identify their “information require-
required decisions.
ments.”
3. Information Management Plan (IMP)
4. Information Quality Characteristics
The introduction of ambiguous or
Quality information adds value to JTF
incorrect information devalues the JTF HQ
staff processes. Information is susceptible
IM processes. This may be the result of
to distortion and deception. When
incorrectly posting draft documents as
developing the IMP, the information
approved documents or posting information
management officer (IMO) must consider
in the wrong location, causing uncertainty
the information quality characteristics
and a loss of accurate situational
outlined in Figure I-1.
awareness. Information managers reduce
the risk of introducing uncertainty and
5. Cognitive Hierarchy
ambiguity by developing a comprehensive
IMP employing effective records
Never forget that all technology can
management processes.
ultimately do is give your staff more time to
think. It can’t think for them. Data is not
a. IM requirements vary, and this
information. Information is not judgement.
publication can not cover all of the
Judgement is not wisdom. Numbers aren’t
policy. Quantitative approaches can’t solve
possibilities. Therefore, a JTF must
qualitative problems.
develop an IMP tailored to manage
information within the context of their
Joshua Shapiro, Technology Consultant
mission and capabilities. An effective IMP
provides guidance ensuring the availability
of
“quality information” throughout the
a. Reducing uncertainty and increas-
ing the CJTF’s situational awareness are
JTF HQ. The CJTF can then correctly
the focus of IM processes. IM processes use
assess changing conditions, establish
data and information that have been
priorities, and facilitate the decisiomaking
processed or displayed in a form that is
process.
understandable to the personnel using
b. The JTF IMP should cover JTF
them to enhance situational awareness. We
unique IM needs. These include the duties,
use the term information generically to
responsibilities, and skill requirements; IM
refer to everything from data on the one
systems and requirements; IM processes
hand to knowledge and understanding on
and procedures; and IM system protection.
the other. It is important to recognize there
The JTF IMP should include specific
are four classes of information (see Figure
guidance for the management of the JTF
I-2).
I-2

-------------------------------------------------------------------------------------------------------------------------------------------------------------

ACCURACY
Information that conveys the true situation.
RELEVANCE
Information that applies to the mission, task, or situation at hand.
TIMELINESS
Information that is available in time to make decisions.
USABILITY
Information that is in common, easily understood format and displays.
COMPLETENESS
Necessary information required by the decisionmaker.
BREVITY
Information that has only the level of detail required.
SECURITY
Information that has been afforded adequate protection where required.
Figure I-1. Information Quality Criteria
Decision
Understanding
Judgment
Knowledge
Cognition
Information
Processing
Data
Figure I-2. Cognitive Hierarchy
I-3

-------------------------------------------------------------------------------------------------------------------------------------------------------------

(1) Data. Data is the facts and
can employ JTF combat power
individual data that are the building blocks
appropriately.
of information.
6. Information Flow
(2) Information. Information is the
a. JTF HQ IM procedures must provide
result of organizing, collating, comparing,
processing, analyzing, and filtering data.
for the rapid flow, vertical and horizontal,
of information. Most JTF HQ's staff
(3) Knowledge. Knowledge is the
processes require a cross-functional and
result of correlating and fusing information
cross-directorate exchange of information.
and assessing its meaning through the
Traditional staff arrangements help
application of cognition. You begin to build
determine where information should flow
an accurate picture of the situation through
within the organization, but these
integrating and interpreting various pieces
arrangements should not form firewalls to
of processed data. At this level, you are
the information exchange. Effective flow
starting to get a product that can be useful
of information within the various JTF
for decisionmaking.
processes requires the information to be—
(4) Understanding. Understanding
(1) Positioned Properly. The JTF’s
is highest class of information. Obtain
need for specific types of information are
"understanding" when you synthesize a
often predictable. Positioning the required
body of knowledge and apply judgement to
information at its anticipated points of need
fill in the gaps to arrive at a complete image
speeds the flow and reduces demands on
of the situation. An "understanding" of the
communications systems (for example,
situation provides situational awareness to
using public folders to post required
anticipate future events and to make sound
information).
timely decisions.
(2) Mobile. The reliable and secure
b. The graduations between the
flow of information must be commensurate
different classes of information are not
with the JTF’s mobility and tempo of
always clear. Little meaning or value is
operations.
Information flow must
possible until data is integrated,
immediately adjust to support the vertical
interpreted, and placed in proper context.
and lateral flow of information between
Knowledge is gained once information
adjacent forces (for example, collaborative
determining reliability, relevance, and
[integrated] planning system).
importance is evaluated. The following
example illustrates how you process data
(3) Accessible. All levels of com-
through the cognitive hierarchy resulting
mand must be able to pull the information
in high value understanding. At the data
needed to support concurrent or parallel
level, the JTF Manpower and Personnel
planning and mission execution. If possible,
Directorate (J-1) determines that JTF
channel information to the required user
strength is 21,863 personnel. Analysis of
via automated means reducing the need for
this data derives the information that the
manual exchange (for example, graphic
JTF components are at combat strength.
depiction of forces in a CTP).
Fused with information regarding enemy
capabilities, the CJTF makes a
(4) Fused. We receive information
knowledgeable determination that the JTF
from many sources, in many mediums, and
has the personnel capability to execute a
in different formats. Fusion is the logical
specific course of action. By applying
blending of information from multiple
judgement, the CJTF and staff can
sources into an accurate, concise, and
anticipate likely courses of action, gain
complete summary. The goal of IM is
situational awareness (understanding), and
reducing information to the minimum
I-4

-------------------------------------------------------------------------------------------------------------------------------------------------------------

essentials and in an easily understood and
(2) Fusion assesses information
acted on format (for example, threat
from multiple sources and develops a
assessment disseminated in graphic form
concise and complete summary.
on an automated CTP system).
(3) Prioritization focuses the efforts
b. The JTF’s command, control,
of the JTF HQ on developing information
communications, computer, and infor-
supporting the CJTF’s decisionmaking
mation (C4I) systems provide the means for
process.
information dissemination. Users of the
information are ultimately responsible for
d. Information flow within the JTF is
its management. Principal, special, and
a complex yet vital function for reducing
supporting staff directors or chiefs must
uncertainty and ambiguity while
clearly identify their information
facilitating a clear understanding of the
requirements and work closely with the
battlespace for the commander. Optimum
JTF IMO, ensuring processes are
information flow within the JTF requires
automated in the most effective way
both speed and clarity of transfer without
possible.
creating fragmented or useless information.
The IMP should assign responsibilities and
c. The IMP should include procedures
provide instructions on managing
to filter, fuse, and prioritize required
information for the JTF. This is a vital step
information. This publication discusses
ensuring decisionmakers have the required
these concepts.
information, when they need it, and in an
understandable format.
(1) Filtering is a process of
organizing information based on specified
criteria.
Information Management was the number one problem facing the JTF.
JULLS Long Report 21340-59252
I-5

-------------------------------------------------------------------------------------------------------------------------------------------------------------

Chapter II
DUTIES AND RESPONSIBILITIES
of a generic JTF and its components.
Information management is now viewed
Figure II-2 depicts a JTF staff organization.
as a strategic enabler for achieving an
organization’s mission and economic health.
c. What is the most efficient and
National Academy of Public
effective way to transfer the information?
Administration for DOD
Many times the initial reaction to receipt
of seemingly important information is
sending an electronic mail (e-mail) to “all
JTF staff.” Newsgroups, web sites, and
1. Background
public folders are increasingly popular
This chapter identifies the principal
methods for transferring important
managers of JTF IM and outlines some of
information. However, posting information
their responsibilities. An organized and
to a newsgroup, homepage, or public folder
disciplined effort is necessary by all
is no guarantee of receipt by the intended
personnel to ensure an uninterrupted flow
audience. Understanding the “process”
of information. Every user has inherent
(information flow) that satisfies each
responsibilities to acquire, assess, reason,
essential JTF requirement enables all
question, correlate, and disseminate quality
personnel to determine the most efficient
information to other users. All JTF
and effective means to transfer information.
personnel, as information users, are also
A few moments of consideration assists in
information managers. As information
determining what is the best, most timely,
users, each member of the JTF must
efficient, and effective method of notifying
continuously ask the following three
the appropriate JTF staff members.
questions:
Consideration must be given to whether
using newsgroups, web sites, or public
a. Does the information already exist?
folders are timely for critical actions such
Time is wasted developing information
as transmitting fragmentary orders
(point papers, briefings, etc.) if the
(FRAGOs) or warning orders. Occasionally,
information already exists. Responding to
direct contact is a more appropriate means.
multiple requests for the same information
Figure II-3 depicts the matching of some
is wasted effort. One solution is developing
information exchange systems to their
a collaborative
(integrated) planning
intended audience.
system that supports information
requirements necessary to support
A host of other computer-based systems
planning, decisionmaking, execution, and
and equipment may be used to exchange
assessment.
information including radio, telephone,
b. Who else needs the information?
e-mail, push technology, Automatic Digital
Sharing information is essential to
Network (AUTODIN), Defense Message
maintain unity of effort and synchro-
System
(DMS), on-line chat, video
nization of operations. Users must consider
teleconferencing (VTC), etc. The depend-
who (higher, lower, and laterally) requires
ency of the JTF on automated systems
the information to assist in developing
increases the exploitation value of these
solutions. Figure II-1 depicts the structure
systems by the enemy.
II-1

-------------------------------------------------------------------------------------------------------------------------------------------------------------

JOINT TASK FORCE
COMMANDER
ARMY
AIR FORCE
MARINE CORPS
NAVY
COMPONENT
COMPONENT
COMPONENT
COMPONENT
(ARFOR)
(AFFOR)
(MARFOR)
(NAVFOR)
MARINE CORPS
ARMY FORCES
AIR FORCE FORCES
NAVY FORCES
FORCES
JOINT FORCE SPECIAL
JOINT FORCE LAND
JOINT FORCE AIR
JOINT FORCE MARITIME
OPS COMPONENT
COMPONENT
COMPONENT
COMPONENT
FORCES/CAPABILITY
FORCES/CAPABILITY
FORCES/CAPABILITY
FORCES/CAPABILITY
MADE AVAILABLE
MADE AVAILABLE
MADE AVAILABLE
MADE AVAILABLE
NOTES:
(1) A joint force contains Service components (because of logistic and training
responsibilities), even when operations are conducted through functional
OPERATIONAL CONTROL
components.
(OPCON)
(2) All Service and functional components are depicted, any mix of components
COMMAND RELATIONSHIP(S)
can constitute a joint force.
DETERMINED BYJFC
(3) There may also be a Coast Guard component in a joint force.
Figure II-1. Generic JTF Structure
Joint Staff Organization
Commander
Deputy Commander
Personal
Staff
Aide
Political
Public
Legal
Inspector
Command
Office of the
Adviser
Affairs
Advisor
General
Representative
Chaplain
Chief of Staff
Principal
Staff Officer
Deputy Chief of Staff
Secretary, Joint Staff
Special
Comptroller
Engineer
Medical/
Transportation
Staff
Cmd Surgeon
J-1
J-2
J-3
J-4
Personnel
Intelligence
Operations
Logistics
Directorate
Directorate
Directorate
Directorate
J-5
J-6
Joint Staff
Plans & Policy
Command, Control,
Directorate
Communications, &
Computer Systems
Directorate
Figure II-2. JTF Staff Organization
II-2

-------------------------------------------------------------------------------------------------------------------------------------------------------------

GLOBAL
INTERNET
JTF
INTRANET
JTF HQ
LAN
DIRECTORATE
WORK
STATION
Figure II-3. Information Exchange Systems
2. JTF HQ’s Responsibilities
(4) Appoints a JTF web adminis-
trator and a JTF web grandmaster, if web
a. CJTF. The CJTF—
technology is used.
(1) Establishes the priorities for
(5) Approves format and structure of
information gathering and reporting by
information posted and distributed from
establishing the commander’s critical
the JTF (that is, briefings, reports, etc.).
information requirements (CCIR) outlined
in Chapter IV.
c. Principal JTF Staff Sections. The
principal JTF staff sections—
(2) Approves the JTF HQ IMP.
(1) Establish internal staff section
(3) Approves the JTF commun-
procedures for newsgroups, home pages,
ications plan that supports the IMP.
message handling, e-mail, RFI, and
suspense control procedures.
b. JTF Chief of Staff. The JTF chief of
staff—
(2) Appoint a staff section IMO as a
point of contact for IM matters.
(1) Approves the JTF HQ daily
operations cycle/battle rhythm, outlined in
(3) If web technology is used,
Chapter IV.
appoint a webmaster for their section.
(2) Implements the JTF HQ IMP.
(4) Ensure training on basic IM and
security procedures for all directorate
(3) Appoints the JTF IMO.
personnel.
II-3

-------------------------------------------------------------------------------------------------------------------------------------------------------------

(5) Assess IM to ensure quality and
(4) Responsible for the CJTF’s daily
flow. Establish benchmarks or subjective
briefings and FRAGO production.
analysis to evaluate efficiency and
effectiveness of IM.
(5) Works closely with the joint
intelligence support element (JISE) to
d. JTF Command, Control, Commun-
assess, update, and integrate information
ications,
and Computer Systems
requirements.
Directorate. The JTF J-6—
(6) Reviews and records incoming
(1) Works closely with the JTF IMO
message traffic, outlined in Chapter IV.
to develop the JTF communications plan.
f. JISE. The JISE—
(2) Establishes a technical help desk
for network and systems administration
(1) Reviews, assesses, and dissem-
issues for information systems
(for
inates required threat information in text
example, collaborative
[integrated]
and/or graphic products to support the JTF
planning system).
CTP.
(3) Establishes e-mail accounts.
(2) Monitors the efficiency, effective-
ness, and accuracy of the threat assessment
(4) Consolidates a list of commun-
displayed by the JTF CTP.
ication’s and system’s requirements.
(5) Produces the JTF telephone and
(3) Works closely with the JOC to
e-mail directories, outlined in Chapter IV.
assess, update, and integrate information
requirements.
(6) Establishes a central location and
procedure for conducting virus scanning of
3. Information Management Board (IMB)
incoming diskettes and laptops, outlined in
Chapter V.
The IMB—
(7) Acts as office of primary
a. Acts as the focal point for
responsibility
(OPR) for managing
coordinating IM within the JTF.
networks and network services (number of
newsgroups, access, etc.).
b. Convenes during the development of
the JTF HQ IMP and as required thereafter.
(8) Ensures system training and
familiarization for JTF staff and
c. Is headed by the JTF IMO.
augmentees.
d. Operates under the supervision of the
e. Joint Operations Center (JOC). The
chief of staff, or appropriate staff
JOC—
directorate, as best meets the JTF’s mission
needs.
(1) Assesses the information flow to
support JTF operations and monitors the
e. Is composed of the senior IMO from
efficiency, effectiveness, and accuracy of the
each staff section, component, and
JTF’s CTP, outlined in Chapter IV.
supporting agency. If the JTF uses web
technology, the IMB should also include the
(2) Maintains a master suspense
JTF web administrator, web grandmaster,
action log, outlined in Chapter IV.
and selected webmasters from each staff
section, component, and supporting agency.
(3) Maintains a chronological record
of JTF significant events, outlined in
f. Is actively involved in resolving cross-
Chapter IV.
functional and contentious IM issues.
II-4

-------------------------------------------------------------------------------------------------------------------------------------------------------------

g. If web technology is used, works
4. JTF Common Tactical Picture
closely with the JTF web administrator,
Board (CTPB)
ensuring establishment of the JTF web site
infrastructure facilitating the necessary
The CTPB—
information exchange throughout the JTF.
a. Acts as the focal point for
h. May be a commissioned or non-
coordinating the CTP within the JTF.
commissioned officer regardless of rank,
specialty, or Service, as best meets the
b. Is headed by the JTF common
requirements of the JTF. However,
tactical picture manager (CTPM), who is
selection should reflect the best use of
responsible for developing CTP procedures
trained personnel and existing expertise.
to maintain situational awareness of
friendly and threat units.
6. Staff Section IMO
The staff section IMO—
c. Operates closely with the JTF IMO,
the JOC and JISE watch officers, and
a. Oversees the internal and external
appropriate staff directorates.
information flow of their staff section.
d. Is composed of the friendly air, land,
b. Provides the JTF IMO with staff
sea, and threat force track managers.
section information requirements for
incorporation into the JTF IMP.
e. Convenes as required.
c. Provides the JTF J-6 a list of their
f. Is actively involved in resolving all
requirements for network support.
cross-functional CTP issues.
d. Ensures compliance with the IMP for
5. JTF IMO
the establishment of newsgroups and/or
web sites, message handling, e-mail, RFI,
The JTF IMO—
and suspense control procedures.
e. Coordinates/conducts internal IM
a. Develops and publishes the JTF HQ
training for staff section members.
IMP, described in Chapter I.
f. May be commissioned or non-
b. Publishes the JTF HQ daily
commissioned officers regardless of rank,
operations cycle/battle rhythm, outlined in
specialty, or Service. However, selection
Chapter IV.
should reflect the best use of trained
personnel and existing expertise.
c. Publishes the JTF reports matrix,
outlined in Chapter IV.
7. JTF Component and Supporting
Agencies
d. Coordinates additional training
requirements by staff and component
If the JTF chooses to use a web site,
elements to support IM.
each component and supporting agency
should appoint a webmaster as a primary
e. Heads the IMB.
point of contact for web site technical
matters. Each component and supporting
f. Works closely with the CTPM to
agency should also appoint an IMO as a
develop effective, efficient track/location
primary point of contact for IM matters.
management procedures.
Component and supporting agency IMOs—
II-5

-------------------------------------------------------------------------------------------------------------------------------------------------------------

a. Review the JTF HQ’s daily
infrastructure facilitating the necessary
operations cycle/battle rhythm and IMP,
information exchange throughout the JTF.
outlined in Chapter IV.
The web administrator is not a technical
role, although an understanding of web
b. Conduct liaison with the JTF IMO.
technology is required. The web
administrator ensures maintenance of the
c. Coordinate and conduct IM training
posted information in accordance with the
for members of the component or agency.
IMP. The JTF IMO may also be designated
the web administrator.
d. May be commissioned or non-
commissioned officers regardless of rank,
b. JTF Web Grandmaster. The grand-
specialty, or Service. However, selection
master must work very closely with the JTF
should reflect the best use of trained
administrator and the JTF IMO for the
personnel and existing expertise.
technical development of the JTF web site.
The grandmaster coordinates the activities
8. JTF Information and Information
of the webmasters throughout the JTF.
System User Responsibilities
c. Webmaster. By contrast, the web-
The JTF information and information
master is responsible for the technical
system user responsibilities are to—
infrastructure of the JTF web site to
include templates and forms. The
a. Ensure accuracy of JTF information.
webmaster’s primary responsibility is
installing new network management
b. Properly control, classify, protect,
technologies, management, and help their
and archive all JTF information and
respective organization or staff section use
information systems for which they are
them. The webmaster provides the tools
responsible.
enabling JTF users to publish, access, and
customize information themselves rather
c. Validate the authority to destroy JTF
than doing it all for them. The webmaster
information before destruction.
should assist in converting documents to
appropriate HyperText Markup Language
d. Read and comply with the infor-
(HTML) format and ensure that HyperText
mation requirements published in the JTF
Transfer Protocols (HTTP) remain current.
IMP.
d. Information Producers. Each com-
9. JTF Network Management
ponent, supporting agency, and JTF staff
Responsibilities
section, as producers of information,
determines what information they create
If the JTF chooses to use web
and maintain on the JTF web site. The
technology, four distinct roles to support
information producer is responsible for
this network technology must be identified
keeping their portion of the JTF web site
and their responsibilities established: JTF
at their level and below current and
web administrator, JTF web grandmaster,
accurate.
webmasters, and information producers.
10. JTF Information and Information
a. JTF Web Administrator. The web
System Protection Responsibilities
administrator is responsible for the overall
management of information on the JTF web
a. Information Security Manager. The
site. The web administrator must
information security manager is
coordinate with the various staff sections,
responsible for the proper accountability,
components, and supporting agencies
control, personnel access, and physical
ensuring establishment of the web site
security/storage of noncompartmented
II-6

-------------------------------------------------------------------------------------------------------------------------------------------------------------

Department of Defense (DOD) classified
(4) Approves system security
data, in both hard and soft copy forms. This
policies.
includes the TOP SECRET Control
Officer’s (TSCO's) responsibility for the JTF
e. ISSM. Normally a JTF J-6 function,
TOP SECRET registry’s accountability,
the ISSM is the focal point and principal
control, and access. The JTF appoints at
advisor for INFOSEC matters on behalf of
least one TSCO, in either the JTF
the DAA. The ISSM has the following
Manpower and Personnel Directorate
responsibilities:
(J-1) or Plans Directorate (J-5), and each
JTF staff directorate normally appoints a
(1) Develops, implements, and
security manager. See DOD 5200.1-R, DOD
maintains the JTF staff INFOSEC plan for
Information Security Program, 7 Jun 82, and
all systems operated in the command.
applicable Service regulations for
additional details.
(2) Ensures information systems
security officer
(ISSO) and other infor-
b. Special Security Officer (SSO). The
mation system (IS) security staff are
SSO is responsible for sensitive compart-
properly trained and appointed in writing.
mented information (SCI) management,
controls, and access. This publication is
(3) Assists ISSOs with preparing
normally a JTF Intelligence Directorate
accreditation support documentation
(J-2) function.
including risk assessment documentation,
c. Operations Security
(OPSEC)
security test and evaluation
(ST&E)
Officer. The OPSEC officer is responsible
documentation, and contingency plans.
for oversight and implementation of the
(4) Ensures that configuration
JTF’s OPSEC program. This position is
management of staff hardware and software
normally a JTF Operations Directorate
complies with the INFOSEC plan.
(J-3) function.
d. Designated Approving Authority
f. ISSO. The ISSO is normally a JTF
(DAA). The DAA ensures, implements, and
J-6 responsibility. The ISSO is responsible
monitors a reliable information security
for implementing and maintaining security
(INFOSEC) program. The function of the
on behalf of the ISSM. The ISSO reports to
DAA for all JTF information systems, with
the JTF ISSM for INFOSEC matters and
the exception of those systems processing
implements the overall INFOSEC program
SCI, is normally a responsibility of the JTF
approved by the DAA. Each staff
J-6. DAA for SCI information systems is
directorate in the JTF organization
handled via the SSO. The DAA has the
appoints in writing an ISSO. Larger
following responsibilities:
directorates may appoint multiple ISSOs.
They forward ISSO appointment letters to
(1) Accredits all automated infor-
the ISSM. The ISSO is the point of contact
mation systems
(AISs) under their
for IS matters within their selected area of
jurisdiction before placing them into
appointment, with the following responsi-
operation.
bilities:
(2) Allocates resources (funding and
(1) Develops a system security policy
manpower) to achieve and maintain an
for AIS and networks that process or
acceptable level-of-protection and to
protect sensitive unclassified and classified
remedy security deficiencies.
information.
(3) Makes sure certifying officials,
functional OPRs, and information systems
(2) Makes sure that audit trails are
security officers (ISSM) are identified for
reviewed periodically (for example, daily,
weekly, etc.).
all AIS under their jurisdiction.
II-7

-------------------------------------------------------------------------------------------------------------------------------------------------------------

(3) Performs an initial evaluation of
of the ISSM. The J-6 appoints the NSO,
each vulnerability or incident, begins
who has the following responsibilities:
corrective or protective measures, and
reports according to established network
(1) Ensures incorporation of
incidents reporting procedures.
countermeasures and safeguards in the
network design and daily performance of
(4) Notifies the DAA when AIS are
the network.
involved.
(2) Informs the ISSM of external
(5) Evaluates known vulnerabilities
network connection requirements so the
to ascertain if additional safeguards are
ISSM can request memorandums of
needed.
agreement (MOAs).
(6) Coordinates with the ISSM on
(3) Develops and promulgates the
matters concerning INFOSEC.
standard INFOSEC procedures governing
network operations.
(7) Ensures IS security procedures
are implemented within their assigned
(4) Ensures security measures and
area.
procedures used at the network nodes fully
support the security integrity of the
(8) Ensures users within assigned
network.
areas are operating, maintaining, and
disposing of systems per INFOSEC policies
h. Terminal Area Security Officers
and procedures.
(TASO). When needed, the officer-in-charge
for each remote site, with a terminal
(9) Trains the IM users within the
connection to a network, designates a TASO
assigned area on INFOSEC responsibilities.
in writing. The TASO is the representative
of the ISSM or ISSO in matters pertaining
(10) Ensures personnel and physical
to the security of each terminal. Each JTF
security requirements are followed.
HQ's staff directorate operating both a
classified and unclassified network
g. Network Security Officer (NSO).
terminal normally appoints TASOs. The
The NSO is normally a JTF J-6 function.
TASO enforces all applicable security
The NSO is responsible for implementing
requirements implemented by the
and maintaining network security on behalf
INFOSEC program and the ISSM.
II-8

-------------------------------------------------------------------------------------------------------------------------------------------------------------

Chapter III
INFORMATION MANAGEMENT SYSTEMS
2. Global Command and Control
We owe the men and women who may be
in harm’s way every edge technology can
System (GCCS)
provide. Technology will never be a
GCCS is one of the IM systems used by
substitute for courage and human
toughness in conflict, but it can increase
a JTF. GCCS is a comprehensive, world-
the likelihood that the tough and the
wide system providing information pro-
courageous will be successful.
cessing and dissemination capabilities
necessary to conduct command and control
Admiral William A. Owens,
(C2) of joint forces. This system improves
Vice Chairman, Joint Chiefs of Staff
visibility of the operational environment
and with commonly understood “pro-
1. Background
cedures” enhances situational awareness.
There are four primary software modules
The goal of information systems and IM
within GCCS providing critical information
procedures is producing an accurate picture
flow to enhance situational awareness. The
of the battlespace and supporting decision-
Joint Operations Planning and Execution
making. Information systems must provide
System (JOPES), Joint Deployable Intelli-
effective and secure information exchange
gence Support System (JDISS), common
throughout the JTF. Table III-1 provides a
operational picture (COP) segment (chart)/
brief summary of some information systems
common tactical picture (CTP), and a
currently available. Users need to develop
software package with a browser
an understanding of the information sys-
application program with e-mail and
tems available and develop IM procedures
newsgroup capabilities. Basic descriptions
to match their information requirements.
of each module follows:
Table III-1. Common Information Capabilities
GCCS
Web Pages/Newsgroups
E-mail
Local Area Network
Visibility
Sender and
Broadcast within the
Sender and receiver(s)
Local area network
receiver(s) in the
SIPRNET community
users at JTF HQ
GCCS
community
•Official for
•Information for record
•Informal and formal
•Staff coordination
Uses
record e-mail
•COA
dialog
•Working documents
•Updating the
•OPLAN
•Resolving and
•Local SOP,
COP
•RFI
negotiating differences
schedules, etc.
•Formal traffic
•Other final products,
•Private or group
•Internal file transfer
•Conducting
official positions, and
recipients
dialog and
decisions
•External file transfer
coordinating
actions
Similar
•Telephone or
•Publishing an article in the
•Telephone or
•Circulating a written
To
conference call
newspaper
conference call
draft for review and
•Coordinating
•Establishing an official
•Informal memorandum
coordination
official actions
position
•Local issues
•AUTODIN
•Bulletin board
•Staff input
Purpose
One-to-one or
One-to-many or one-to-all
One-to-one or one-to-
One-to-few or many-
one-to-many
communications
many communications
to-many
communications
communications
III-1

-------------------------------------------------------------------------------------------------------------------------------------------------------------

a. JOPES. JOPES supports military
b. JDISS. JDISS is a transportable
planning, deployment, execution, redeploy-
workstation and communications system
ment, and operations monitoring. JOPES
electronically extending a theater Joint
incorporates
policies,
procedures,
Intelligence Center (JIC) to a JTF or other
personnel, and facilities by interfacing with
tactical users. JDISS requires a common
automatic data processing (ADP) systems
SECRET Internet Protocol Router
and reporting systems providing support
Network (SIPRNET) network or Joint
to senior level decisionmakers and their
Worldwide Intelligence Communications
staffs with the capability to plan and
System (JWICS) network, depending on
conduct joint military operations.
(Submit
classification. SIPRNET supports SECRET
movement requirements to United States
information requirements; JWICS supports
Transportation Command [USTRANSCOM]
SCI information requirements. JDISS is the
using JOPES procedures and ADP
primary source for intelligence reporting,
systems.) Information regarding crisis
database access, access to the intelligence
action planning is contained in Chairman
RFI system, the Community On-line
of the Joint Chief of Staff Manual (CJCSM)
Intelligence System for End-Users and
3122.01, JOPES Volume I, Planning Policies
Managers (COLISEUM). JDISS provides
and Procedures, Chapter V. Specific
automation to pull information from other
guidance for the format and content of
theater and national intelligence databases.
operations plans/orders (OPLANs/OPRDs)
are provided in CJCSM 3122.03, JOPES
c. COP. Figure III-1 depicts a skeleton
Volume II, Planning Formats and Guidance,
outline of the COP process. The develop-
Chapter III. The model in Chapter III
ment and maintenance of the COP requires
illustrates the format of an OPLAN/
the JTF and all components adherence with
OPORD and outlines the information and
established COP procedures and the
instructions included in each plan element.
procedures explained in Chapter IV. The
CINC
COMMON OPERATIONAL PICTURE (COP)
FILTERED---FUSED
JTF
COMMON TACTICAL PICTURE (CTP)
CTP BOARD
CTP MANAGER
TRACK MANAGERS
TRACKS
Multinational
Intel/Threats
Air
JSOTF
Maritime
Special Operations
ARFOR
Space
Special Interest
AFFOR
MARFOR
Figure III-1. COP Flow Chart
III-2

-------------------------------------------------------------------------------------------------------------------------------------------------------------

JTF’s CTP feeds the commander in chief
JTF IMP should identify how the JTF
(CINC) COP. Component reporting sys-
shares information. The JTF IMO must
tems provide friendly and threat air,
establish procedures enabling each staff
maritime, and ground locations/tracks. The
section to access, post, and update
COP provides commanders with a near-
information. Each staff section ensures the
real-time force tracking mechanism.
information posted is accurate, current, and
relevant.
d. Software Package. Currently GCCS
uses a browser application program to
a. Web Sites and Web Pages.
provide e-mail and newsgroup capabilities.
(1) A well-organized web site
3. Network Application Management
assembles vital information, organizes it in
a logical sequence, and delivers it
Networking technologies are expanding
efficiently. The JTF HQ, staff directorates,
the options available for managing the flow
components, and supporting agencies
of information. We can achieve a collabo-
should develop and maintain their own web
rative environment for sharing information
pages for the site. Information on these web
using web sites and web pages; news-
pages should include, but not restricted to,
groups; e-mail; shared folders; and other
important updates, status reports, common
types of information management
staff products, and current activities.
automation. For example, networks provide
the JTF access to unsecure and secure
(2) The JTF should organize the web
information, allowing individuals to send
site around a master “JTF home page.” The
and receive unclassified and classified
JTF home page or “front door” sits at the
information worldwide. The Nonsecure
top of the JTF web site acting as a point of
Internet Protocol Router Network
entry into the site. In a complex JTF web
(NIPRNET) provides assess to the internet.
site, it is impractical to populate the JTF
SIPRNET and JWICS provide access to
home page with dozens of links.
classified information.
Complicated pages are long and will not
load in a timely manner. Therefore, each
The intranet network infrastructure for
major element or unit of the JTF should
a JTF HQ may differ from one JTF to
have a mini-home page (major submenu)
another, but the concepts are generally the
with direct links back to the JTF home
same. A JTF intranet is a communications
page. JTF mini-home pages are then
network where access to published
alternate home pages oriented to specific
information is restricted. The commun-
subgroups of users. Figures III-2 through
ication standards of the internet and the
III-5 depict a hierarchical organizational
content standards of the worldwide web
JTF web site with this type of structure.
(WWW) are normally the basis for a JTF
intranet. Therefore, the tools used to
(3) Users directly access JTF site
create an intranet are normally identical
pages via a WWW universal reference
to those used for internet and web
locator (URL) address. Therefore, the JTF
applications. Using local area networks
must design the web site so users (at every
(LANs) protected by firewalls is normally
workstation with a web browser) can
the method for establishing a JTF intranet
quickly navigate regardless of where they
structure.
enter the site. Ease of navigation, via links
from any point on the site is important. All
The JTF IMO must work closely with
JTF web pages should include a basic set
the JTF web administrator and the
of links logically connecting them to other
component IMOs to develop and establish
web pages on the site.
procedures for network management. The
III-3

-------------------------------------------------------------------------------------------------------------------------------------------------------------

Joint Task Force 180
READ THIS PRIVACY AND SECURITY NOTICE
New_Postings
Welcome to the JTF 180 official home page
and web site about US military activities in
CCIRs
Operation JOINT LANCE the US peace
RFIs
enforcement mission in Miniver.
ROE
Significant_Events
Battle_Rhythm
[Search Site] [Site Map]
Briefings
Messages
[CINC] [JTF Command Group] [Personnel (J-1)]
Orders
[Intelligence (J-2)] [Operations (J-3)] [Logistics (J-4)]
Plans
[Plans (J-5)] [C4 (J-6)] [ARFOR] [MARFOR] [NAVFOR]
Rehearsals
[AFFOR] [JFLCC] [JFACC] [JSOTF] [JCMOTF] [Host Nation]
Reports
Acronyms
[News] [Photos] [Maps] [Fact Sheets] [Leaders] [Related Sites]
Comm_Status
E-mail_Addresses
Send comments to: jtf180.webmaster@miniver.mil
IM Plan
This US government system is subject to monitoring
Phone_Directory
SOP
Revised: 24 June 1998
Figure III-2. Sample JTF Home Page
JTF Command Group
READ THIS PRIVACY AND SECURITY NOTICE
New_Postings
Welcome to the JTF Command Group web
page part of the [Joint Task Force 180]
CCIRs
official web site about US military activities
RFIs
in Operation JOINT LANCE the US peace
ROE
enforcement mission in Miniver.
Significant_Events
Battle_Rhythm
[Search Site] [Site Map]
Briefings
[Back] [Parent Page] [Next]
Messages
Orders
[CJTF] [Dep CJTF] [PAO] [PM] [SJA] [CHAPLAIN]
Plans
[SURGEON]
Rehearsals
Reports
[News] [Photos] [Maps] [Fact Sheets] [Leaders] [Related Sites]
Acronyms
Comm_Status
Send comments to: jtfcg.webmaster@miniver.mil
E-mail_Addresses
This US government system is subject to monitoring
IM Plan
Phone_Directory
Revised: 24 June 1998
SOP
Figure III-3. Sample JTF Command Group Home Page
III-4

-------------------------------------------------------------------------------------------------------------------------------------------------------------

ARFOR
READ THIS PRIVACY AND SECURITY NOTICE
New_Postings
Welcome to the ARFOR web page part of
the [Joint Task Force 180] official web site
CCIRs
about US military activities in Operation
RFIs
JOINT LANCE the US peace enforcement
ROE
mission in Miniver.
Significant_Events
Battle_Rhythm
[Search Site] [Site Map]
Briefings
[Back] [Parent Page] [Next]
Messages
Orders
[ARFOR COMMAND GROUP] [Personnel (G-1)]
Plans
[Intelligence (G-2)] [Operations (G-3)] [Logistics (G-4)]
Rehearsals
[CMO (G-5)] [C4 (G-6)] [1st ABN CORPS]
Reports
[XV CORPS] [15th ACR] [XXI CORPS]
Acronyms
Comm_Status
[News] [Photos] [Maps] [Fact Sheets] [Leaders] [Related Sites]
E-mail_Addresses
IM Plan
Send comments to: arfor.webmaster@miniver.mil
Phone_Directory
This US government system is subject to monitoring
SOP
Revised: 24 June 1998
Figure III-4. Sample JTF Component Home Page
1st ABN CORPS
READ THIS PRIVACY AND SECURITY NOTICE
New_Postings
Welcome to the 1st ABN Corps web page
part of the [Joint Task Force 180] official
CCIRs
web site about US military activities in
RFIs
Operation JOINT LANCE the US peace
ROE
enforcement mission in Miniver.
Significant_Events
Battle_Rhythm
[Search Site] [Site Map]
Briefings
[Back] [Parent Page] [Next]
Messages
Orders
[Personnel (G-1)] [Intelligence (G-2)] [Operations (G-3)]
Plans
[Logistics (G-4)] [CMO (G-5)] [C4 (G-6)] [31st ABN DIV]
Rehearsals
[127th ABN DIV (AASLT)] [56th AR DIV]
Reports
[15th INF DIV (MECH)]
Acronyms
Comm_Status
[News] [Photos] [Maps] [Fact Sheets] [Leaders] [Related Sites]
E-mail_Addresses
IM Plan
Send comments to: 1stabn.webmaster@miniver.mil
Phone_Directory
This US government system is subject to monitoring
SOP
Revised: 24 June 1998
Figure III-5. Sample Major Unit Home Page
III-5

-------------------------------------------------------------------------------------------------------------------------------------------------------------

b. Newsgroups.
some cases, establish these links to take the
user directly to a desired document.
(1) Newsgroups function like
Information available in newsgroups may
electronic bulletin boards and are a means
be orders, rules of engagement (ROE),
of disseminating information throughout
CCIR, telephone directories, and/or report
the JTF. Design newsgroups as a network
links. For example, if the user selects J-3
of client servers to obtain the latest news-
from the JTF newsgroup home page, a new
related information. Running newsgroups
page of links is displayed and contains, but
from a web browser application allows you
is not limited to, the following:
to create, post, read, and transfer
information. Not all browsers may view
(a) Staff Instructions. Link to
newsgroups. You can select a newsgroup,
newsgroup containing staff estimates,
a specific article, follow a given “thread,”
briefings, reports, guidance, and
and transfer files in text format. The
instructions.
information consists of text based files (not
binary) transferred via a bulletin board
(b) Joint Planning Group (JPG).
style broadcasting service. Post the files,
Link to newsgroup containing mission
called
“articles,” to newsgroups for
analysis, courses of action, branch plans,
automatic distribution to sites throughout
commander’s intent, commander’s planning
the intranet.
guidance, commander’s estimate, and
decision brief.
(2) The design of the JTF newsgroup
structure should permit user access to
(c) JOC. Link to newsgroup
information without burdening them with
containing JTF HQ's significant events log,
unneeded information. Newsgroups may
message board, and master suspense action
be browsed directly or using a hypertext
log.
link structure from a newsgroup home
page. The hypertext links have the
(4) The JTF J-6 has the overall
advantage of leading users directly to the
responsibility of building, maintaining, and
information, without having to browse the
modifying newsgroups at the JTF HQ. The
newsgroups. Table III-2 depicts an example
component senior communicator is
of a JTF newsgroup home page. The
responsible for building newsgroups at
newsgroup home page should contain
component level. Each functional area
hyperlinks to major category newsgroups.
determines their newsgroup requirements
and sends them to their appropriate
(3) By selecting hypertext links, the
communicator. Base newsgroup require-
user narrows the information search. In
ments on the type and flow of information
Table III-2. Example JTF Newsgroup Home Page
JTG 176
NEWSGROUP HOME PAGE
JTF 176
Command
Phone/E-Mail
Message
Commander
Group
Orders
CCIR
Reports
Directory
Board
J-1
J-2
J-3
J-4
J-5
J-6
JPG
AFFOR
ARFOR
MARFOR
NAVFOR
JFACC
JSOTF
JPOTF
JCATF
RFI
ROE
WX
Briefs
INFO MGT
Select “INFO MGT” for instructions on how to use newsgroups and to view the JTF 176
Information Management Plan.
III-6

-------------------------------------------------------------------------------------------------------------------------------------------------------------

within the JTF. The newsgroup structure
(a) Newsgroup. This is the major
depicted in Table III-3 is one example of
newsgroup category and is the first
newsgroup organization. Each staff section
hypertext link in the home page newsgroup
monitors their newsgroup ensuring the
table.
posting of only appropriate information.
The JTF IMO ensures the required topics
(b) Subgroup. Refers to minor
and procedures are reflected in the JTF
categories within the newsgroup. These
IMP. The following protocols apply to
hypertext links lead the user to the desired
newsgroup structure for Table III-3:
information in the newsgroup.
Table III-3. JTF Newsgroups
Newsgroup
Subgroup
POC
Purpose
COMMAND GROUP
SJA
SJA
Staff estimates, SJA guidance, briefings,
reports
Surgeon
Surgeon
Staff estimates, surgeon guidance, briefings,
reports
Chaplain
Chaplain
Staff estimates, chaplain guidance, briefings,
reports, service schedule
JIB
PAO
Staff estimates, public affairs guidance,
briefings, reports
Safety
J-1
Safety guidance, instructions
Security
Security Manager
Security guidance, instructions
VTC Schedule
Chief of Staff
JTF HQ VTC schedule
CJTF Schedule
Chief of Staff
CJTF schedule
DCJTF Schedule
Chief of Staff
DCJTF schedule
JTF HQ Battle Rhythm
Chief of Staff
JTF HQ schedule
J-1
Staff Instructions
J-1
Staff estimates, briefings, reports, guidance,
instructions
J-2
Staff Instructions
J-2
Staff estimates, briefings, reports, guidance,
instructions
INTSUMs
J-2
Intelligence summaries
J-3
Staff Instructions
J-3
Staff estimates, briefings, reports, guidance,
instructions
Operational RFIs
J-3 RFI Manager
All nonintelligence specific
JOC
JOC
Incoming message board, HQ significant event
log, journal, master suspense action log,
AUTODIN message board
J-4
Staff Instructions
J-4
Staff estimates, briefings, reports, guidance,
instructions, concept of logistics
J-5
Staff Instructions
J-5
Staff estimates, briefing, reports, guidance,
instructions, sequel plans, long range plans
J-6
Staff Instructions
J-6
Staff estimates, briefing, reports, guidance,
instructions, communications architecture
JPG
J-35/J-5
Mission analysis, courses of action, branch
plans, Commander's intent, commander's
planning guidance, Commander's estimate,
decision briefing
ROE
J-3
Approved rules of engagement
RFI
J-3 RFI
J-3
All nonintelligence related RFIs
J-2 RFI
J-2
Intelligence related RFIs
CCIR
Chief of Staff
Current commander's critical information
requirements
Reports
Reports
Responsible
JTF SITREPs, other recurring reports
Director
Orders
Higher HQ Orders
JOC
Orders originating above the JTF
JTF Orders
JOC
Operations plan, operations order, warning
orders, frag orders
III-7

-------------------------------------------------------------------------------------------------------------------------------------------------------------

Table III-3 JTF Newsgroups
(Continued)
Newsgroup
Subgroup
POC
Purpose
ARFOR
Reports
ARFOR
Post JTF required reports
Supporting Plans
Post JTF required supporting plans
MARFOR
Reports
MARFOR
Post JTF required reports
Supporting Plans
Post JTF required supporting plans
AFFOR
Reports
AFFOR
Post JTF required reports
Supporting Plans
Post JTF required supporting plans
NAVFOR
Reports
NAVFOR
Post JTF required reports
Supporting Plans
Post JTF required supporting plans
JFMCC
Reports
JFMCC
Post JTF required reports
Supporting Plans
Post JTF required supporting plans
JFACC
Reports
JFACC
Post JTF required reports
Supporting Plans
Post JTF required supporting plans
JFLCC
Reports
JFLCC
Post JTF required reports
Supporting Plans
Post JTF required supporting plans
JSOTF
Reports
JSOTF
Post JTF required reports
Supporting Plans
Post JTF required supporting plans
JPOTF
Reports
JPOTF
Post JTF required reports
Supporting Plans
Post JTF required supporting plans
(c) Point of Contact
(POC).
eliminating “telephone tag.” It permits a
Refers to the proponent directorate or
single user to communicate with one or
agency responsible for maintaining the
several users simultaneously. However to
newsgroup.
reduce e-mail overloads, consider
establishing functional versus individual
(d) Purpose. A general descrip-
accounts to avoid unnecessary system
tion of the type of information that may be
stress. This helps prevent a message
posted in the newsgroup.
backlog for personnel not on shift.
(5) The information transmitted,
Additionally, development of a precedence
stored, and posted in a newsgroup directory
system within e-mail identifies messages
is the responsibility of the staff element
requiring timely handling and review.
with the newsgroup requirement. The staff
(2) E-mail can overload the network
element should post and delete information
if used improperly. Unnecessary infor-
within their newsgroup. Components
mation and large message attachments
should use a structure similar to the JTF
stress the system. Use web sites, news-
tailored to their needs. JTF components
groups, or public access drives on the LAN
should coordinate with the JTF J-6 for
to disseminate information. Remove
newsgroup server support.
graphics, imagery, and text documents that
do not add information content. Develop
(6) The JTF should post common
graphics/briefing slides relying on a
information, by topic, to a newsgroup and/
minimum of colors since not all users have
or web site. Table III-4 is a sample list of
access to color printers.
the types of information to include in
newsgroups and/or a web site.
(3) At times, it is necessary to notify
a large audience that a particular piece of
c. E-Mail.
information is available (for example,
(1) E-mail is a highly effective means
warning orders). Users should use some
to communicate information, providing
discretion in selecting e-mail addressees.
rapid dissemination of time critical
In most situations it is preferable to place
information within the JTF. E-mail permits
the information in the appropriate
rapid and asynchronous communications,
newsgroup then notify intended recipients
III-8

-------------------------------------------------------------------------------------------------------------------------------------------------------------

Table III-4. JTF Common Relevant Information
CCIRS
Reference Material
Frag Orders
Commander’s Intent
DISUM/SITREP
OPLAN
Commander’s Additional Guidance
Targeting Plan
Baseline List of Functional Tasks
Casualty Reports Format
Log Requirements
Collection Plan
Phone/e-mail Directory
Commander’s Update Briefing
Network/Comm Architecture
BDA
Public Affairs Info
Schedule of Reports
Enemy Organizational Structure
PIR/RFIs
Planning Calendar
Staff Estimates
Commander’s Planning Guidance
Weather and Terrain
Mission Analysis
Updated Decision Support Template
ATO
Joint Integrated Prioritized Target
SOP
High Payoff/High Value
List
where it may be retrieved, vice attaching
e. Other types of information manage-
the item to multiple e-mail messages. This
ment automation.
procedure reduces the bandwidth used
(1) Automated Message Handling
when sending multiple copies of e-mails
Systems (AMHSs). This gives the JTF a
with attachments. Users should period-
central location for all types of messages,
ically review their e-mail group addresses
incoming and outgoing. When you require
for accuracy and ensuring topic related
information on a particular topic,
group members remain interested in the
automation is used to sort, filter, and
topic. Remember, undeliverable mail may
distribute messages. Develop a web front-
double the system burden (once to attempt
end to link the web to a particular AMHS.
delivery and again to notify the sender of
For example, through the use of a
the delivery failure). Users should take
commercial e-mail program and the
prompt action to resolve the cause of
Defense Message Distribution System
undeliverable e-mail.
(DMDS), messages can be automatically
(4) Some e-mail supports infor-
passed to designed shared/public folders.
mation dissemination by providing a
notification capability. As the posting
(2) Collaborative Planning Tools.
authority or sender posts items to
These tools allow input to the process from
newsgroups, they notify users by e-mail.
multiple sources.
d. Shared folders are another means to
(a) Network Meeting Software.
allow access to information. Tables III-5A
White boarding consists of an application
and III-5B provide examples of shared
allowing two or more computers to link in
folders and the information contained in
a way that promotes “real-time” interactive
them.
information exchange on-screen between
participants.
CAUTION
Never assume your intended audience
(b) Internet Relay Chat (IRC).
received your article simply because it
IRC is an interactive conferencing tool on
was posted to a web page or newsgroup.
Effective use of web technologies requires
GCCS, allowing users to open
“chat
establishing a structure allowing for
channels” similar to conference calling via
varying degrees of computer literacy,
on-screen exchange. Chat channels permit
not consuming unnecessary bandwidth,
one-to-one or one-to-many communications.
and guiding users directly to the
Intended topics of discussion generally
information they seek. Discipline in the
define communications channels. Typical
posting process and maintenance of the
IRC channels may be established for time-
sites is a necessity. Once information has
phased force and deployment data
served its useful life cycle, remove it from
(TPFDD) developers and validators,
the web page and/or newsgroup.
information managers, etc.
III-9

-------------------------------------------------------------------------------------------------------------------------------------------------------------

Table III-5A. JTF Shared Message Folders
J-1
J-2
J-3
J-4
J-5
J-6
Admin
Action Items
Air Ops
Briefings
Briefs and Slides
Admin
Completed
Admin
Airlift
General Info
Force Protection
Directories/Rosters
Taskers
Daily News
JULLS
Fighters
RFI
J-1
Organization
Briefs
Structure
Incoming
MSG-Air
Army Aviation
Play-Info
J-2
Briefing Slides
Messages
Need
MSG-BDA
Army Ground
Reports
J-3
Incoming Messages
Information
-COMSTAT
Requests
-SITREP
Outgoing
MSG-Force
CMOC
Admin
J-4
Outgoing
Messages
Protection
-COMSTAT
Personnel
MSG-Ground
Everybody Read
Civil Engineers
J-5 Staff
MSEL
-Incoming
-Responses
SITREPS
MSG-IIR
EWO
Comptroller
Media
JULLS
J-1 Reports
MSG-INSUM
General Info
Contracting
Taskers
Admin
Personnel
MSG-Naval
Info Ops
Director
RFI
Computer System
Status Request
Support
Receipts
MSG-Political
JOC
Fuels
Current Ops
(Verification)
Policy
MSG-Refugees/Med
JULLS
LNO
FRAG Management
Guidance
Postal
MSG-SITREPS
LNOs (J-1, J-2,
Medical
Future Ops
J-3, J-4, J-5,
J-6)
Incoming
MSG-Targets
MSEL Events
Plans
Future Plans
Outgoing
MSG-Terrorist
Navy Ops
Services
J-6
Activity
Suspenses
MSG-
Ops/Plans
Supply
JCCC
Warning/Execute
Order
WMD/NBC/SCUDs
Ops-Analysis
Suspenses
Joint Key
Management
FRAGOS
Transportation
JULLS
Warning Orders
Weapons
LNO (DISA)
PSYOP
JULLS Inputs
Networks
RECCE
Maintenance
Policy Guidance
SITREP Inputs
Refugee Evacuation
Procedures
SOF
SITREP Inputs
Special Staff
JOPES
Space
Taskers
TMD
Weather
Table III-5B. JTF Shared Message Folders
JTF Message Center Folders
Chief of Staff Admin Public Folders
Incoming e-mails
Alert roster
Incoming messages
Continuity
Incoming RFIs
Chief of staff organization (chain of command/responsibilities)
Chief of staff policy directives
Outgoing e-mails
Outgoing messages
Note: Paper read files are produced.
Outgoing RFIs
Message center policies
Temporary e-mails
III-10

-------------------------------------------------------------------------------------------------------------------------------------------------------------

4. LAN
(1) Verbal and visual commun-
ications on the same medium.
The JTF LAN can be set up with shared
and/or private hard drive space. Private
(2) Communications medium to
drive space is intended to limit access to
readily identify who is speaking.
stored data. Access is generally limited to
(3) Visual communications signals
specific functional areas, as defined by user
(body language, etc.) missing with other
login names (that is, specific joint-code staff
forms of electronic communications.
sections). The shared or “public” drives are
accessible by anyone given access by the
(4) An alternate means of commun-
LAN administrator. The public drives
ications when other means are not available.
organized with appropriate subdirectories,
(5) Interactive information ex-
increase staff visibility of files and provide
change between two or more elements.
the opportunity for a larger staff audience
(at one location) to coordinate, review, and
b. Types of JTF VTCs.
approve staff issues. The LAN adminis-
(1) General Service
(message)
trator establishes the shared drives. Staff
[GENSER]. This is the primary means of
sections are responsible for the currency,
accuracy, and maintenance of their shared
VTC between components and the JTF HQ
drive information.
for UNCLASSIFIED and up to TOP
SECRET (TS) Collateral.
5. AUTODIN Message Communications
(2) JWICS. JWICS VTC is the
AUTODIN messages are the approved
primary means of VTC involving SCI
means for record traffic. The JTF J-6 should
requirements.
publish an associated plain language
c. VTC Concept. The GENSER and
address (PLA) directory for the JTF staff,
JWICS VTCs should be available for
components, and supporting organizations.
scheduling 24 hours a day except for
The message center, operating on a 24-
required maintenance. The JTF battle
hour schedule, transmits outgoing
rhythm dictates the schedule of the VTCs,
messages. Each directorate, to prevent
and the JTF HQ is network control for the
unauthorized transmission or reception of
VTC. The JWICS VTC is the backup for
record traffic, should establish formal
the GENSER VTC. The JWICS VTC is
message release and receipt authority.
always located within a permanent
sensitive compartmented information
6. VTC
facility (SCIF) or a tactical SCIF (T-SCIF).
a. Improvements in digital video
d. VTC Procedures.
compression and readily available high-
capacity transmission systems make it
(1) GENSER VTC. Scheduling of the
possible for secure, interactive color video
GENSER VTC is the responsibility of the
worldwide. The primary purpose of the JTF
JTF chief of staff. The VTC scheduling
VTC capability is support of the JTF
officer works closely with the JTF IMO in
commander. The secondary purpose of the
developing the VTC schedule. The JTF
JTF VTC capability is to facilitate the
commander is the primary and priority
transfer of information between
user of this system. Components, staff
subordinate commanders and staffs. While
directorates, and supporting agencies
VTC is quickly becoming the system of
desiring to schedule a GENSER VTC
choice, the JTF commander could use
submit their requests to the VTC
alternate methods of communication such
scheduling officer. Prior coordination with
as conference calls if a VTC system is not
the controlling SSO is mandatory for access
available. VTC provides—
to the JWICS VTS suite, especially for
III-11

-------------------------------------------------------------------------------------------------------------------------------------------------------------

JWICS VTC participation by persons not
(5) Mark the classification of visual
indoctrinated for SCI. Coordination should
aids appropriately.
include clearance and access verification
(6) Attempt to display no more than
for all participants who do not have routine
7 lines of text per slide.
access to the SCIF. The VTC scheduling
officer should post the schedule at the
(7) Date each brief following
location determined by the IMO and
presentation.
contained in the IMP. Prioritization for
usage of the GENSER VTC shall be in the
f. Security. Because of the range of
following order, except as designated by the
security classifications potentially passed
JTF chief of staff:
during the VTCs, each location must ensure
that personnel with appropriate clearance
(a) CJTF-directed VTCs.
and access attend the VTCs.
(b) Scheduled JTF VTCs.
7. Global Broadcasting System (GBS)
(c) CJTF and component
GBS provides receive-only high-speed
commander requested VTCs
(for example,
flow of high volume data to units in
commander to LNOs or other component
garrison, deployed, or moving. It supports
commander).
existing CINC requirements by providing
the capability to distribute large
(d) JTF HQ staff requested
information products to deployed user
VTCs.
platforms.
Develop and distribute
(e) Other requested VTCs.
information products using a “Smart Push
and/or User Pull” philosophy to avert
(2) JWICS VTC. Scheduling is the
saturating deployed forces with
responsibility of the JTF HQ, JISE director.
information overload. The major opera-
JWICS VTC use is coordinated through the
tional elements of GBS are pertinent to IM:
JISE Director. Prioritization should be the
same as for the GENSER VTC. The JTF
a. Users. Users are deployed war-
fighters in the CINC’s area of responsibility
chief of staff adjudicates scheduling
(AOR). GBS is to be transparent as possible
disputes.
while servicing the needs of the users with
e. Visual Aids. Visual aids are
required information products.
encouraged for VTCs. However, they must
b. Information Producers. Information
be concise and readable to the viewer. Make
producers can be just about anything that
every effort to provide advance copies of
produces a product the warfighter wants.
visual aids to all commands participating
in the VTC before the VTC. Guidelines for
c. Information Dissemination Manage-
visual aids on GENSER and JWICS VTC
ment (IDM). IDM provides the right
follow:
information to the right place at the right
time in accordance with commander’s
(1) Use sentence case (upper and
policies and optimizing the use of
lower case) for text on slides.
information infrastructure resources. It
involves the safeguarding, compilation,
(2) Use no smaller than 28-point
cataloguing, storage, distribution, and
courier font text for text on slides.
retrieval of data; manages the information
flow to users; and enables the execution of
(3) Use pure black and white, when
the commander’s information policy.
possible, for contrast and ease of reading.
d. Theater Information Management
(4) Keep graphics simple.
(TIM). The role of TIM is establishing the
III-12

-------------------------------------------------------------------------------------------------------------------------------------------------------------

CINC’s policies and procedures for
systems. The following is a prioritized
information flow. TIM accomplishes six
listing of communication means normally
functions:
found within the JTF:
(1) Directs GBS operation.
a. Voice Communications—Defense
Switched Network (DSN).
(2) Coordinates broadcast schedule.
(1) Commercial secure telephone
(3) Manages apportioned resources.
unit III (STU-III) phones.
(2) KY68 tactical lines.
(4) Identifies new products.
b.
Radio Communications Network.
(5) Reviews and validates user
profile databases.
(1) JTF command net.
(6) Audits user pull.
(2) Intelligence net.
e. Satellite Broadcast Management.
(3) Air coordination net.
Satellite broadcast management executes
the GBS broadcast by fulfilling eight basic
(4) Theater missile defense net.
functions:
c.
Data Transfer.
(1) Builds a schedule and program
guide.
(1) SIPRNET/NIPRNET.
(2) Coordinates information pro-
(a) Home page.
ducts.
(b) E-mail.
(3) Conducts traffic analysis.
(c) Newsgroups.
(4) Constructs and transmits the
broadcast stream.
(2) AUTODIN.
(5) Provides for protection of data.
(3) Facsimile.
(6) Controls the GBS broadcast
(4) STU-III file transfer.
technically.
d.
Functional Specific Communi-
(7) Controls remote enabling/
cations.
disabling of receive suites.
(1) SCI intelligence collection-
(8) Establishes and maintains the
JWICS.
user profile database.
(2) STU III dial-in.
8. Priority of Communication Means
The JTF J-6 establishes specific
responsibilities
for
establishing
The joint force must have information to
connectivity between the JTF HQ and
operate. This information should be
components. Normally, the higher HQ is
relevant, essential, timely, and in a form
that warriors understand and can use to
responsible for establishing all connections
act
to lower HQ. The JTF should possess
Joint Publication 6-0
redundant means of voice communications,
data transfer, and functional specific data
III-13

-------------------------------------------------------------------------------------------------------------------------------------------------------------

Chapter IV
INFORMATION MANAGEMENT REQUIREMENTS,
PROCESSES, AND PROCEDURES
(2) During the conduct of operations,
…not just more information faster but
review the CCIR continuously for
better and more useful information…
relevancy. Review, modify, or archive the
CCIR during the CJTF daily update
JFQ Winter 1996-97
briefing. The JTF staff should submit
recommended changes to CCIR to the J-3.
The J-3 reviews and compiles the
1. Background
recommended changes for presentation to
the CJTF for approval.
All leaders depend upon information to
plan and execute missions. This chapter
(3) All members of the JTF are
focuses on the processes for obtaining and
disseminating information within the JTF.
responsible for reporting information that
may satisfy CCIR. However, each staff
director should ensure processes within
2. CCIR
their directorate are in place to filter and
a. The CJTF has specific information
fuse raw data before submission. CCIR
requirements, directly affecting decisions
tracking/monitoring is the primary task of
and successful execution of operations.
the JOC. When a CCIR is met or there are
Using CCIR focus the staff on the
indicators that one is about to be met, the
information the commander requires and
JOC makes an immediate “voice” report to
feels is critical. This enhances the staff’s
the CJTF, deputy commander, joint task
ability to integrate (filter) information and
force (DCJTF), principal staff directors, and
remain focused on the information of the
component operations centers. Voice
highest value. CCIR may change as events
reports are followed by Flash messages
unfold. Therefore, CCIR require contin-
via GCCS and e-mail to all staff directors
uous assessment for relevance to current
and component commanders. When CCIR
and future situations.
are obtained, the JOC/JISE analyses
the implications on current and future
b. The following are some techniques
plans, then briefs the CJTF. This analysis
for CCIR development and management:
should include any recommendations
for modifications to CCIR or additional
(1) Review CCIR for each operation,
CCIR.
branch, and sequel plan. During the
planning process, staff directors may
3. RFI
propose CCIR to the JPG. The JPG chief
consolidates the proposed CCIR for CJTF
a. The JTF HQ establishes RFI
consideration and approval.
After
procedures to provide a systematic method
approval, the JOC posts the CCIR in an
for requestors to obtain information. Joint
electronic medium
(for
example,
Publication 1-02 defines the term “RFI” as—
newsgroup-CCIR, home page, etc.). In some
Any specific time-sensitive ad hoc
instances, the CJTF’s guidance on CCIR
requirement for intelligence information or
could lead to operation, branch, or sequel
products to support an ongoing crisis or
plans.
operation not necessarily related to standing
IV-1

-------------------------------------------------------------------------------------------------------------------------------------------------------------

requirements or scheduled intelligence
c. Send RFIs to higher, subordinate,
production. A request for information can
adjacent HQ or to other agencies requesting
be initiated to respond to operational
the information necessary to support the
requirements and will be validated in
planning and decisionmaking process (see
accordance with the theater command’s
Figure IV-1). Effective RFI procedures
procedures.
provide the JTF an “information pull”
mechanism providing requestors access to
a variety of vital information. RFI
b. The J-2 processes intelligence
procedures do not replace normal staff
related RFIs and the J-3 all other RFIs. The
coordination or substitute for researching
J-2 and J-3 assign an RFI manager to receive
information using other means
(for
and prioritize RFIs. A tracking system
example, intelligence link via the SIPRNET
known as the COLISEUM is established to
and NIPRNET) available to JTF members.
register, validate, track, and manage crises
Instead, the RFI process provides a
and noncrises intelligence information
mechanism for a formal request to higher
requirements. COLISEUM functions as an
echelons when the issue or question is
application on the JDISS workstation
beyond the resources of the staff. In
providing connectivity and interoperability
addition, the process provides visibility of
with other intelligence systems supporting
those requests forwarded, their status, and
operational users.
responses to these requests.
JTF
Components
JTF Staff
ARFOR
MARFOR
Higher
JTF RFI
HQ
NAVFOR
Manager
AFFOR
JSOTF
JTF RFI Manager
1. Assigns tracking number
and updates status of RFI.
2. Enters RFI in tracking log
Components submit RFI to
and post RFI to newsgroup,
JTF HQ (RFI Manager), if
JTF web page, or other
information requirements are
approved means.
beyond organization’s
3. Forwards RFI to JTF
resources and staffing
directorates or higher HQ
capabilities.
for action.
4. Ensures RFI originator is
notified of response.
Figure IV-1. Request for Information Flow Chart
IV-2

-------------------------------------------------------------------------------------------------------------------------------------------------------------

d. Components submit RFIs to the JTF
(5) Submit intelligence RFIs
HQ that are beyond their capability and
through the intelligence RFI system
staff resources to answer. Components
(COLISEUM).
submit intelligence related RFIs to the JTF
J-2 RFI manager via COLISEUM,
(6) Spell out acronyms the first time
SIPRNET, e-mail/web pages, or other
they are used.
approved means in accordance with
established procedures. The JTF J-2 RFI
(7) Pass staff action RFIs to
manager assigns an internal RFI tracking
appropriate staff section.
number only if not using COLISEUM for
J-2 RFI management. Components submit
(8) Obtain approval from the chief of
operational related RFIs to the JTF
staff for the specific format for RFIs.
operations RFI manager (J-3/J-5), via
SIPRNET e-mail/web pages or other
(9) Include the following informa-
approved means. The JTF operations RFI
tion in RFI request:
manager assigns an internal RFI tracking
number, forwards it to the appropriate JTF
(a) Classification.
staff directorate for action, then posts RFI
responses to newsgroups, JTF web pages,
(b) Priority. (Routine, Priority,
or other approved means. If the JTF staff
Immediate, or Flash).
is unable to provide an answer, the JTF
operations RFI manager forwards the RFI
(c) Time/Date.
to higher HQ for resolution.
(d) Required not later than
e. The JTF staff directorate RFI
(NLT).
manager submits RFIs to the JTF RFI
manager by posting it to a newsgroup, JTF
(e) Requestor.
web page, or other approved means. The
JTF RFI manager processes the request
(f) To (who should answer).
and forwards it to the appropriate agency
for resolution.
Each directorate is
(g) Subject.
responsible for monitoring their RFIs and
closing the request.
(h) Amplifying Data (question).
f. RFI Guidelines.
(i) Recommended method of
transmission.
(1) Limit RFI to one question per
request.
(Multiple questions increase
(10)
Intelligence related RFI
response time.)
requests include—
(2) State RFI as a specific question
(a) Narrative description.
and provide sufficient detail so the request
is completely understood.
(b) Justification.
(3) Resubmit the RFI with
(c) Sources consulted.
additional comments or clarification, if a
RFI is not completely answered.
(d) Date desired.
(4) Submit a new RFI if additional
(e) Latest time information of
information is required.
value (LTIOV).
IV-3

-------------------------------------------------------------------------------------------------------------------------------------------------------------

(f) Classification of response
the display of outdated or unwanted
(desired class and accepted class).
surface, air, or subsurface locations/tracks
in a particular map view.
(g) Remarks
(any additional
information not included in the narrative).
b. The JTF CTPM coordinates the
actions
required to synchronize
(h) POCs (include both the JTF
management between the JTF components
RFI manager as well as the requestor).
and the JTF HQ. The CTPM should ensure
that the procedures identified in CJCSM
g. The RFI tracking log (Table IV-1) is
6120.01A are followed for track/location
a simple tool for use in newsgroups, web
management on tactical data links between
pages, or other electronic medium. The
Service/functional components and
purpose of this log is providing JTF-wide
subordinate echelons. The CTP requires
visibility of the submitted RFIs and the
the following inputs:
status of responses. The status column of
the request log is color-coded as follows:
(1) Blue air, maritime, and ground
force tracks/locations.
(1) Red indicates a pending request.
(2) Red air, maritime, and ground
(2) Amber indicates a response
tracks/locations.
awaiting requestor’s review. The requestor
of an RFI closes all “amber” coded RFIs if
(3) White/neutral/unknown air,
the response answers the RFI completely
ground, and maritime tracks/locations.
by changing the status indicator to green.
(4) Operational overlays.
(3) Green indicates that the RFI has
(5) Intelligence overlays.
been answered and that action is complete.
(6) National Imagery and Mapping
4. CTP Management
Agency (NIMA) products.
a. The JTF CTP feeds the CINC’s COP
5. Collaborative (Integrated) Planning
as identified in the Chairman of the Joint
System (CPS)
Chiefs of Staff Instruction (CJCSI) 3151.1,
Global Command and Control System
The CPS is a compilation of systems;
Common Operational Picture Reporting
software applications; and tools designed
Requirement. This instruction identifies
to support JTF planning, decisionmaking,
specific reporting, training requirements,
execution, and assessment. The JTF CPS
and responsibilities for the COP/CTP
should allow input by multiple personnel
management. A JTF CTP requires effective
both at the JTF and at remote locations.
and efficient management procedures.
Products derived and utilized by the
Some of the data feeds into the CTP are
distributed CPS should be compatible and
automatic, while some are manual.
interoperable with those used by the CINC.
Effective management of the CTP prevents
The JTF CPS should—
Table IV-1. RFI Tracking Log
TIME/DATE
TRACK
SUBMITTED
PRIORITY
REQUIRED NLT
SUBJECT
REQUESTOR
STATUS
#
1
2
3
IV-4

-------------------------------------------------------------------------------------------------------------------------------------------------------------

a. Include an interactive visual
without having to build the messages from
projection capability so members of the
scratch.
JTF can see the collaborative effort both on
their workstation screen and on a large
6. Joint Operations Center/Joint
“movie screen” display.
Intelligence Support Element
Assessment Cell (JAC)
b. Support the JTF planning process in
During operations, massive amounts of
a series of logical steps and provide an
data flow into the JOC from a myriad of
explanation or “how to” section.
sources. The personnel assigned to the
c. Provide products in the correct
JOC/JISE must filter, sort, and turn data
format so that a CJTF’s briefing is
into information. That information must
be fused, analyzed, and converted into
presented right off the working screens.
knowledge. The information is then
submitted up the chain of command so the
d. Be capable of scanning documents
into required databases so all JTF
staff can make appropriate recommenda-
components can view higher, adjacent, and
tions concerning JTF operations. The
CJTF ultimately uses these recommenda-
supporting command orders and messages.
tions to make informed decisions. It is
essential this assessment process be
e. Include databases that can be
accessed to include access to force lists and
thorough, accurate, complete, and
availability, intelligence feed, TPFDD data,
conducted by individuals qualified and
experienced enough to achieve that end
worldwide map system, unit capabilities,
state. One optional technique is forming a
equipment, organization for each Service
JAC to conduct this analysis.
(US), and other country forces as required.
a. Purpose. The JAC fuses enemy/
f. Include an analysis capability to
friendly intelligence and operational
wargame various courses of action, branch
information. After thorough analysis, the
plans, and/or sequels. Possess the ability
JAC provides results of the assessment
to alert and recognize information tethered
with recommendations to the J-3. The JAC
to CCIR. Contain a COA selection tool to
tracks and analyzes all approved CCIR.
assist planners in performing the analysis
After review, the JAC recommends the
involved in COA selection.
addition of new or archiving of existing
CCIR to the J-3 and coordinates the
g. Possess the capability to print
accurate posting of all current, approved
information and overlays contained in the
CCIR in the JOC.
system. Possess the ability to print
laminated overlays to the scale of the maps
b. Reporting and Coordination. The
utilized.
JAC reports directly to the J-3 and J-2. If
the staff principals are not available, it
h. Possess the capability to portray
reports to the deputy JOC chief. The JAC
maps with operational graphics
(for
coordinates with the JISE chief as required.
example, boundaries, fire support
The JAC receives primary information from
coordinating measures, friendly and threat
the current operations/current intelligence
units, decision support templates,
cells.
collection plans, fire support plans, and
barrier plans, etc.).
c. Function. The JAC’s function is
maintaining operational awareness of the
i. Have the capability to transfer
battle space by the constant fusion and
information from working/briefing formats
assessment of all friendly and enemy
to a message format to generate messages
information.
(The JAC has no tasking
IV-5

-------------------------------------------------------------------------------------------------------------------------------------------------------------

authority over the watchstanders in the
reports enemy information to the JAC.
JOC. It is incumbent on the J-3 to ensure
Both cells continuously report confirmed,
that the JAC receives all required
accurate, filtered, processed, and
information to accomplish its mission.) The
categorized information to the JAC.
JAC must keep the J-3 informed; it must
Subsequent
“subanalysis” fuses this
answer the questions of “what is our
information with friendly information for
situation—what is the enemy’s situation—
each appropriate warfare area. Reanalyze
what does it mean to our operations?” The
these warfare area
“subanalyses” in
JAC’s mission is critical to the success of
aggregate—only then is a complete,
the JTF mission. Accordingly, the J-3 must
thorough assessment derived and accurate
ensure the JAC’s role is isolated to its
situational awareness achieved.
mission and function only.
7. JTF Daily Operations Cycle (Battle
d. Organization. The following organi-
zation is one recommended solution for
Rhythm)
staffing the JAC. Each JTF must evaluate
its mission, then establish the manning
JTF information requirements are often
level and required personnel specialties for
predictable. The JTF HQ staff can position
the JAC. Each shift of the JAC should be
information at its anticipated points of need
comprised of 6 individuals, each with a
to speed information flow and reduce
specific warfare specialty. JAC personnel
demands on communications systems. One
must have service experience, qualification,
method is establishing a daily operations
and subject matter expertise. They should
cycle for briefings, meetings, report
have a broad enough background to grasp
requirements, etc. (Table IV-2 depicts an
the concepts required to fuse and analyze
example).
joint operations. Joint warfighting or joint
staff experience is a plus. The senior officer
The
“daily operations cycle” is
assigned in the JAC is designated the JAC
synonymous with “battle rhythm.” To
chief. The billets within the JAC are as
ensure information is available when and
follows:
where required, the JTF daily operations
cycle is essential. All JTF staff, components,
(1) Ground combat officer (0-5).
and supporting agencies should participate
in the development of the daily operations
(2) Naval officer (0-5).
cycle. The JTF chief of staff should be the
approval authority for changes. When
(3) Tactical aircrew Air Force officer
establishing the daily operations cycle, the
(0-5).
JTF HQ should—
(4) Intelligence officer (0-5).
a. Monitor the daily operations
requirements of higher HQ.
(5) Special operations officer (0-5).
b. Ensure all subordinate daily
(6) Administrative/technical sup-
operations cycles meet the needs of the
port (E-5 to E-7).
JTF.
e. Intelligence/Operations Fusion.
c. Monitor for conflicting JTF
Review both the enemy and friendly
requirements
(particularly for key
situations to conduct a complete and
personnel).
thorough assessment. The current
operations cell reports friendly information
to the JAC. The current intelligence cell
d. Keep changes to a minimum.
IV-6

-------------------------------------------------------------------------------------------------------------------------------------------------------------

Table IV-2. Sample JTF HQ Daily Operations Cycle
Local
ZULU
Event
0900
1400
Shift change
CJTF VTC with components
1000
1500
JFACC VTC
1100
1600
JOC/JISE update
1200
1700
Plans synchronization meeting
1300
1800
J-2 VTC with components
press conference
1400
1900
Future plans update to CJTF
1500
2000
J-3 staff meeting
1600
2100
JPG plans synchronization meeting
1700
2200
Component SITREP due JTF J-3
1800
2300
J-1 VTC with components
1900
0000
JOC shift change and update brief
2000
0100
SITREP transmitted
2100
0200
Shift change brief
JFACC VTC
2200
0300
JTF SITREP due to CINC
CJTF JAC update
2300
0400
Chief of staff update
0000
0500
Public affairs update
0100
0600
Plans synchronization meeting
0200
0700
J-2 VTC with components
0300
0800
ROE/force protection meeting
0400
0900
J-3 VTC
0500
1000
CJTF staff brief
0600
1100
CJTF call with CINC
0700
1200
JTCB meeting
0800
1300
J-4 VTC with components
c. As of Time.
Close out
time for
8.
Reports Development
recurring reports, not applicable (N/A) for
Table IV-3 contains
some sample
nonrecurring reports.
reports, requests, and orders for which the
JTF and components may be responsible.
d. Posted NLT. Time to post the report
for JTF review.
Refer to Joint Publication 1-03, Joint
Reporting Structure
(JRS) General
Instructions, Chapter V, for a summary of
e. Where Posted. The newsgroup or
each report. The table provides a brief
web page location to post the report.
description of the report, sender, receiver,
f. Notify. Whom to notify after posting
when and how to transmit, and whether it
the report. Normally not required for
is in US Message Text Format (USMTF).
This matrix organizes reports according to
recurring reports.
the responsible directorate. The matrix
reflects the following information:
g. Notification. Preferred method of
notifying JTF following posting.
a. Report Type. Report title or type of
information provided.
h. Precedence. The precedence to use
when notifying the JTF the report is
b. Submitted By. The component or
available
(not applicable to some
agency normally responsible for submitting
notification methods).
the report to the JTF.
IV-7

-------------------------------------------------------------------------------------------------------------------------------------------------------------

Table IV-3. JTF Reports Matrix (1 of 3)
Transmission
Report Title
Submitted By
Submit As Of
Arrive NLT
Type
Precedence
Addressee
Info To
Personnel Status
Components
1500
2100
E-mail home
Routine
JTF J-1
Report
page
Casualty Spot Report
Components
As required
As required
E-mail
Routine
JTF J-1
EPW/Cl/DET Report
Components
1800
2400
E-mail
Routine
PM
JTF J-2
Intel Requests for
Components
As required
As required
COLISEUM
Priority
JTF J-2
Information (RFI)
Captured Materiel
Components
As required
As required
E-mail
Priority
JTF J-2
Report
Component INTSUM
Components
0400/1600
1800/0600
JDISS
Routine
JTF J-2
Components
Spot Reports
Components
As required
As required
E-mail
Routine
JTF J-2
JTF Recon 2
JTF 2
As required
As required
AUTODIN
Priority
CINC
Components
JDISS
Component Recon 3
Components
As required
As required
AUTODIN
Priority
JTF J-2
CINC
JDISS
Component Recon 4
Components
As required
As required
AUTODIN
Priority
JTF J-2
CINC
JDISS
JTF DISUM
JTF J-2
2200
AUTODIN
Routine
CINC
Components
Home page
JTF Graphic
JTF J-2
1006/2200
Home page
Routine
CINC
Components
Supplement
Component INTSUM
Component
0800/2000
Home page
Routine
JTF J-2
w/ Graphic
J-2
JDISS
Supplement
Collection Emphasis
Component
Last 24 hrs
AUTODIN
Routine
JTF J-2
Message
J-2
Home page
JTF Collection
JTF J-2
Last 24 hrs
AUTODIN
Routine
CINC
Components
Emphasis Message
Home page
SITREP (CDRs
Components
2400
0200
AUTODIN
Priority
CJTF, J-3
Components
Situation Report)
Home page
JTF CDR SITREP
JTF J-3
1006/2000
1006/2000
AUTODIN
Priority
CINC
Components
Home page
Orders (FRAGO,
JTF J-3
As required
As required
AUTODIN
Priority
All
Components
WARNORD,
Home page
OPORD)
RFIs (except intel)
Components
As required
As required
E-mail
Priority
JTF RFI
manager
RFIs (except intel)
JTF RFI
As required
As required
Home page
Priority
CINC
manager
Engagement Status
Components
As required
As required
E-mail
Priority
JTF J-3 ADA
Components
IV-8

-------------------------------------------------------------------------------------------------------------------------------------------------------------

Table IV-3. JTF Reports Matrix (2 of 3)
Transmission
Report Title
Submitted By
Submit As Of
Arrive NLT
Type
Precedence
Addressee
Info To
SAM Report
Components
As required
As required
E-mail
Priority
JTF J-3 ADA
Components
Significant Event
Components
As required
As required
E-mail
Priority
JTF J-3 ADA
Components
Spot Report
Daily Targeting
JTF J-3
1200
1300
Home page
Priority
Components
JTF Staff
Guidance MSG
LNOs
Target Report
Components
Continuous
Continuous
E-mail
Priority
JFACC JIC
JTF J-3
Target Bulletin
J-3
Continuous
Continuous
E-mail
Priority
Components
CINC
Daily PSYOP
Components
2400
0200
E-mail
Priority
JPOTF/J-3
Components
Report
PSYOP Spot Report
Components
As required
As required
E-mail
Priority
JPOTF/J-3
Components
NBC 1
Components
As required
As required
Voice,
Flash
JTF NBC
Components
E-mail
NBC 2
Components
NLT 2 hours
As required
GCCS
Immediate
JTF NBC
Components
after "as of time"
E-mail
NBC 3
Components
As required
As required
GCCS
Immediate
JTF NBC
Components
E-mail
NBC 4
Components
As required
As required
GCCS
Immediate
JTF NBC
Components
E-mail
NBC 5
Components
After survey
As required
GCCS
Immediate
JTF NBC
Components
completed
E-mail
NBC 6
Components
When requested
When
GCCS
Immediate
JTF NBC
Components
requested
E-mail
LOGSITREP
Components
0600-0600
1000
Home page
Routine
JTF J-4
LOGSITREP
JTF J-4
0600-0600
1800
Home page
Routine
CINC
Components
Munitions Report
Components
0600-0600
1000
Home page
Routine
JTF J-4
Bulk Petroleum
Components
0600-0600
1000
Home page
Routine
JTF J-4
Contingency
Munitions Report
JTF J-4
0600-0600
1800
Home page
Routine
CINC
Components
Bulk Petroleum
JTF J-4
0600-0600
1800
Home page
Routine
CINC
Components
Contingency
Environmental
ARFOR
Weekly
Home page
Routine
J-4
Status
Engineer SITREP
Components
2400/0800
0200
Home page
Routine
J-4
Engineer
Components
As required
As required
Home page
Routine
J-4
Compatible Report
Civil Affairs Daily
Components
2400
0600
E-mail
Routine
JCMOTF
Components
Report
Civil Affairs Spot
Components
As required
As required
E-mail
Priority
JCMOTF
Components
Report
IV-9

-------------------------------------------------------------------------------------------------------------------------------------------------------------

Table IV-3. JTF Reports Matrix (3 of 3)
Transmission
Report Title
Submitted By
Submit As Of
Arrive NLT
Type
Precedence
Addressee
Info To
CA Resource
Components
2400
0600
E-mail
Routine
JCMOTF
Components
Report
Civil Affairs Report
Components
2400
0800
E-mail
Routine
JCMOTF
Components
Dislocated Civilian
Components
2400
0600
AUTODIN
Routine
JCMOTF
Components
Report
Home page
Legal Report
Components
2400
0400
AUTODIN
Routine
JTF SJA
Components
Public Affairs Report
Components
1800
2000
AUTODIN
Routine
JIB JTF
Home page
PAO
Religious Ministry
Components
1200
1800
E-mail
Routine
JTF
Spot Report
chaplain
Medical Spot Report
Components
As required
As required
GCCS
Priority
JTF
E-mail
surgeon
Medical Status
Ech III med fac
2359
0400
GCCS
Routine
JTF
JTF J-4
Report
E-mail
surgeon
Medical Survey
Ech III med fac
Weekly
GCCS
Routine
JTF
JTF J-4
E-mail
surgeon
Blood Report
Blood unit
2359
0600
GCCS
Routine
JTF
JTF J-4
E-mail
surgeon
Medical Supply
SIMLM
2359
0600
GCCS
Routine
JTF
JTF J-4
Status
E-mail
surgeon
Medical Regulation
Ech III med fac
As required
As required
GCCS
Priority
JMRO
JTF J-4
E-mail
Air Evac Request
Air evac
As required
As required
HF secure
Priority
AECC
request
Air Evac Response
Air evac
As required
As required
HF secure
Priority
AELT
response
Air Evac
Air evac
As required
As required
HF secure
Priority
AECC
Confirmation
confirmation
MlJl
Components
As required
As required
E-mail
Immediate
JTF J-6,
Components
J-3, J-2
Frequency
Components
As required
As required
E-mail
Immediate
JTF J-6
Components
Interference Report
Comm Spot
Components
As required
As required
E-mail
Priority
JTF J-6
Components
Comm Status
Components
2400
0200
E-mail
Routine
JTF J-6
Summary Report
Comm Status
JTF J-6
2400
0600
E-mail
Routine
CINC
Components
Summary Report
Bead Window
Components
As required
As required
E-mail
Immediate
JTF J-6
Components
Report
9. Orders
The JTF JOC is the focal point for
disseminating orders.
a. The CJTF issues guidance and
direction in the form of warning orders
b. Orders handoff from the planner to
(WARNORD), FRAGO, execute orders
the JOC for execution is a critical element
(EXORD), OPORD, and other directives.
of IM. It is essential that the personnel
IV-10

-------------------------------------------------------------------------------------------------------------------------------------------------------------

responsible for executing the plan have a
(2) Recommended CJTF briefing
thorough understanding of the plan. To
slides (others added as required):
achieve this level of understanding, a
representative from the planning element
presents the plan, with supporting
Slide Title
Responsibility
synchronization and decision support
matrix, to the J-3 current operations and
Current C/D-Day
J-3
JOC personnel before execution.
Current Operational
J-3
Phase
10. Briefings and Meetings
Current Operations
J-2/J-3
a. CJTF Daily Update Brief. The CJTF
Situational Assessment
daily update brief is normally conducted
once daily to update the commander on
Significant Activities
J-2/J-3
current operations, future, and long range
plans; however, the update briefing is
ATOs (Current, Next
JFACC
conducted as required. The update
24 Hours, Next 72 Hours)
briefing’s purpose is providing the CJTF
with analyzed information essential for
Future Operations in
J-3/J-5
decisionmaking and synchronizing the
Planning
efforts of the JTF. A secondary purpose is
efficient cross-leveling information within
Sequels/Transition
J-5
the staff. Brevity, clarity, and a cross-
Plans in Planning
functional analysis of the battlespace are
the goals of the CJTF brief.
(3) Recommended Briefing Slide
(1) Suggested briefing sequence
Preparation:
(other personnel added as required):
(a) Use black letters on a white
background. When building slides, you
Briefing
Responsibility
should not have your “SLIDE MASTER”
Introduction
J-3
built with your unique slide requirements
for your joint directorate.
Fused Current
J-2/J-3
Operations Update
(b) Submit slides to the J-3
Targeting/ATO
J-3 Air
current operations briefing officer no later
Update
than 1 hour before the scheduled brief.
Future Operations
J-3/J-5
(c) Provide a copy of the
Plans
commander’s daily brief to the JOC
operations chief to post to the JTF home
Long Range Plans/
J-5
page.
Political-Military
As Required
Special Staff
b. Chief of Staff Brief. Conduct this
briefing once daily or as directed. The
Issues
Component LNO
briefing’s purpose is ensuring that staff
Issues
Chief of Staff
directorate efforts are coordinated.
Principal staff directors, special staff
Conclusion
J-3
officers, liaison officers, and others as
directed attend the briefing.
IV-11

-------------------------------------------------------------------------------------------------------------------------------------------------------------

(1) The following is a recommended
Track messages by the date-time-group
briefing order:
(DTG), originator, subject, or key words
describing message content. Using an
approved joint message handling system or
Briefing
Responsibility
other spreadsheet/AMHS/web page similar
to the example in Table IV-4, users can use
Introduction
J-3
a “FIND” command to locate messages
related to a subject or key word reference.
Intelligence
J-2
(2) Messages are available to and
Public Affairs
PAO
manageable by anyone with an e-mail
account. Each directorate establishes
Operations
J-3
internal message handling procedures to
manage incoming and outgoing messages on
Future Operations
J-3
the appropriate web page and/or
newsgroup.
Plans
J-5
(3) The IMP should address
Logistics
J-4
AUTODIN message procedures to include
release authority, hard copy and soft copy
Communications
J-6
requirements, and DTG assignments.
Personnel
J-1
(4) Staff directorate duties include
Issues
Special Staff Officers
message review, reading files, suspense
assignment, and coordinating activities.
Issues
LNOs
Suspense control procedures consist of
assigning, copies for distribution, and
Closing Remarks
Chief of Staff
reviewing status. Maintain a message log
for both incoming and outgoing messages.
(2) Plans Synchronization Meeting.
(5) Each directorate is responsible
Recommend the Future Operations
for maintaining copies of outgoing/incoming
Planning Chief chair a daily plans
correspondence and suspense items.
synchronization meeting. The purpose is
Submit messages through the appropriate
ensuring future and long-range planning
staff director or the JTF chief of staff, then
efforts synchronize with the current
forward to the communications center for
operational situation and prioritizing
release. Provide the drafter a comeback
supporting branch plans in accordance with
copy of all approved and released outgoing
the current situation. Representatives
messages. The chief of staff reviews the
from J-3 current operations, J-5 plans, and
outgoing messages requiring CJTF and JTF
staff directorates should attend the
review.
meeting.
b. Master Suspense Action Log. The
11. Internal Policies and Procedures
JOC maintains a suspense log (Table IV-5).
Based on JOC chief assignment of OPR and
a. AUTODIN Messages.
office(s) of collateral responsibility (OCR),
the JOC forwards messages to the OPR/
(1) The JOC monitors incoming
OCR for action. The Master Suspense
message traffic and posts messages to an
Action Log contains the following entries:
incoming message newsgroup, web site, etc.
tasking agency, OPR, OCR, suspense time,
IV-12

-------------------------------------------------------------------------------------------------------------------------------------------------------------

close-out time, and a brief summary of the
(1) Time. Time the JOC notes or
tasking. The following instructions apply
receives a report of the event.
to the sample Master Suspense Action Log:
(2) Notified. Key personnel the JOC
(1) Action Item. The message (MSG)
chief notified.
or newsgroup article establishing a JTF
task or requirement.
(3) Event Description. A brief
description of the event. If a follow-on
(2) Received. DTG the JOC receives
report, refer to DTG of original report.
the tasking.
(3) Tasked By: Originator of the
d. JTF Phone and E-Mail Directory.
tasking. Unless otherwise directed, submit
The JTF and components J-6 or equivalent
responses to the originator.
should publish a phone and e-mail directory
(preferably on the JTF’s web site on the
(4) OPR. The JTF directorate or
SIPRNET). The directory contains a brief
staff agent responsible for completing the
description of available communications
tasking.
means, instructions on use, and a listing of
staff functions with telephone numbers and
(5) OCR: The JTF directorate or
e-mail addresses. Publish the directory on
staff agency assigned to assist the OPR in
an appropriate electronic medium (that is,
completing the assigned tasking.
LAN, web page, etc.). Table IV-7 contains a
sample directory listing.
(6) Suspense. DTG to complete the
tasking and post the results to the
originator.
12. Multinational Procedures
(7) Close Out. Actual completion
The JTF establishes procedures for
DTG of the tasking.
data transfer between the JTF,
multinational components, and other
(8) Task Description. Brief descrip-
agencies. The JTF establishes a multilevel
tion of the tasking.
security (MLS) concept of operation for the
specific “how-to” for data transfer. Develop
c. JTF Significant Event Log. Table
information sharing/disclosure policies in
IV-6 is an example of an official
accordance with DOD and/or approved
chronological account of the activities of a
multinational policy or procedures. Handle
JTF. The Significant Events Log, is a
multinational procedures for transferring
running account of JTF significant events.
data dealing with sensitive compart-
The JOC maintains the log. Instructions
mented information through SSO channels.
for completing the sample log follows:
IV-13

-------------------------------------------------------------------------------------------------------------------------------------------------------------

Table IV-4. Sample JOC Message Log
DTG
ORIGINATOR
SUBJECT
KEYWORDS
141752Z JUN 98
CINCUSACOM/J3
WARNING ORDER
171420Z JUN 98
CINCUSACOM/J3
WARNING ORDER TWO
TASKINGS
CCIR
181839Z JUN 98
CINCUSACOM/J3
WARNING ORDER THREE
JTF 780
INTENT
190900Z JUN 98
CINCUSACOM/J3
PLANNING ORDER (PART ONE)
PLANNING GUID
TASKINGS
FORCES
191910Z JUN 98
CINCUSACOM/J3
PLANNING ORDER (PART TWO)
LIFT ALLOCATION
CCIR
LOGISTICS
191530Z JUN 98
CJTF 780
WARNING ORDER NUMBER ONE
COMPONENTS
COMPONENTS
MISSION
192042Z JUN 98
CJTF 788
EXTEND BOUNDARIES OF JOA
JOA
JSOTF
201345Z JUN 98
CJTF 788
CONTROL OF PSYOP/CA
PSYOPS
CIVIL AFFAIRS
C2
201610Z JUN 98
CTF 785
KEY PERSONNEL LISTING
C2
PHONE
201810Z JUN 98
CTF 785
JOA MODIFICATION
JOA
202200Z JUN 98
CJTF 780
WARNORD TWO
TENTATIVE COAS
PLANNING
DEPLOYED
GUIDE
HQ
211524Z JUN 98
CTF 785
CARRIER AIR WING
AIR WING
MODIFICATION
211830Z JUN 98
CTF 785
REQ FOR ADT'L MIGRANT
MIGRANTS
VESSELS
212320Z JUN 98
CTF 785
CHOP COGARD FORCES
COGARD
MIGRANTS
231700Z JUN 98
CJTF 788
COURSE OF ACTION (CONOPS)
PHASES
JSOTF
CONOPS
231720Z JUN 98
CJTF 788
PATROL CRAFT TACON SHIFT
COGARD
JSOTF
232035Z JUN 98
CJTF 788
MESSAGE CORRECTION
231700Z JUN 96
JSOTF
CONOPS
241226Z JUN 98
CTF 785
ASSGNM'T OF COGARD & USN
JTF 780
COGARD
USN
241426Z JUN 98
CJTF 780
FRAG ORDER TWO
MIGRANT CAMP
CVBG
MEU/ARG
280257Z JUN 98
CJTF 780
PLANNING INFORMATION
ROCK DRILL
280335Z JUN 98
CJTF 780
FORCE DEPLOYMENT
DEPLOYMENT
EXERCISE
281910Z JUN 98
CTF 789
JFACC/AFFOR BBS
JFACC
AFFOR
ACP
282157Z JUN 98
CJTF 780
INTENT FOR IW IN PHASE III
IW
PHASES
300115Z JUN 98
CTF 783
REQUEST FOR GUIDANCE
FOB
SAR
MEU
011844Z JUL 98
CJTF 780
SOTA REQUEST CHANGE ONE
SIGINT
011600Z JUL 98
CTF 785
OPERATIONS TASK
JFMCC
SUBMISSION
Table IV-5. Sample Master Suspense Action Log
CLOSE
ACTION ITEM
RECEIVED
TASKED BY
OPR
OCR
SUSPENSE
OUT
TASK DESCRIPTION
MSG 190337Z
192330Z
CINCUSAREUR
J-3
J-4
221200Z FEB
IDENTIFY FORCE REQUIREMENTS
FEB 97
FEB 97
J-3
97
FOR RAMP UP TO 56,000
MIGRANTS
NG 02/19/97
191536Z
CINCUSAREUR
J-4
192400Z FEB
192259Z
STATE EXPECTED CONSUMPTION
1536
FEB 97
J-4
97
FEB 97
RATE OF CLASS I
MSG 201128Z
201430Z
CINCUSAREUR
J-3
211200Z FEB
211132Z
DEVELOP COAS FOR SEVERE
FEB 97
FEB 97
J-3
97
FEB 97
WEATHER EVACUATION
181320Z
CINCARLANT
J-2
19 1200Z FEB
191200Z
REQUEST CONSIDER
FEB 97
J-2
97
FEB 97
ALTERNATIVES FOR MIGRANT
TREATMENT BY DOD AND NON-
DOD PERSONNEL
NG 02/19/97
190338Z
CINCARLANT
J-4
201200Z FEB
201002Z
REQUEST FOR LAYOUT OF
0334
FEB 97
J-4
97
FEB 97
MIGRANT AND JTF CAMP,
REQUEST COA FOR
DESTRUCTIVE WEATHER
RELOCATION
NG 02/19/97
191832Z
CINCARLANT
J-4
ASSESS FACILITIES AVAILABLE
1826Z
FEB 97
CAT
ON NAVBASE FOR HURRICANE
(CAT I) PROTECTION
IV-14

-------------------------------------------------------------------------------------------------------------------------------------------------------------

Table IV-6. Sample JTF Significant Events Log
TIME
NOTIFIED
EVENT DESCRIPTION
121300Z FEB 97
CJTF,
JCS WARNING ORDER DIRECTING CINCSOUTH TO BEGIN
Chief of Staff
MIGRANT OPS PLANNING
180300Z FEB 97
CJTF, J-3
CINCSOUTH ACTIVATES JTF 160 AND DIRECTS COMMENCEMENT
OF MIGRANT OPS
181240Z FEB 97
J-3, J-4
M/V ELVA II STRUCK PILINGS ON CALLAN RR BRIDGE.
HARBOR CLOSED TO ALL TRAFFIC UNTIL FURTHER NOTICE
181348Z FEB 97
CJTF, J-4
PRESTAGED RATIONS AND WATER SUPPLIES HAVE BEEN
CONTAMINATED. CURRENT SUPPLY LEVELS ESTIMATED AT 10
DAYS.
191210Z FEB 97
CJTF
ATTEMPTED MURDER AND RAPE IN CAMP ALPHA
191624Z FEB 97
J-4
COMNAVSTA IMPLEMENTS WATER RATIONING PROCEDURES
200405Z FEB 97
CJTF
FIRE IN MIGRANT VILLAGE CAMP ALPHA, 3 MIGRANTS SEVERELY
BURNED FIGHTING FIRE. FIRE EXTINGUISHED BY CAMP FIRE
TEAM AND NAVSTA FIRE DEPARTMENT AT 0630Z
Table IV-7. Sample JTF Phone and E-Mail Directory
SECURE
BILLET/USER
DEVICE
YES/NO
DSN
COMMERCIAL
TACTICAL
E-MAIL
REMARKS
JTF 780
Home Page http://JTF780
CJTF
STU-III
Yes
836-6545
(757) 322-6545
J00
FAX
Yes
836-6332
(757) 322-6332
DSVT
No
201-4201-850
DCJTF
J01
CHIEF OF STAFF
J00COSf
J-1
J-2
J-3
J-4
J-5
J-6
COMMANDER
STU-III
Yes
FAX
Yes
DSVT
No
201-4201-241
DNVT
No
201-4201-242
ARFOR
Home Page http://ARFOR
MARFOR
Home Page http://MARFOR
AFFOR
Home Page http://AFFOR
NAVFOR
Home Page http://NAVOR
IV-15

-------------------------------------------------------------------------------------------------------------------------------------------------------------

Chapter V
INFORMATION AND INFORMATION SYSTEM PROTECTION
We have evidence that a large number
2. Threats to IM
of countries around the world are
developing the doctrine, strategies, and
a. The IM plan must anticipate
tools to conduct information attacks on
internal and external threats including—
military-related computers.
(1) Hackers (inside or outside the
John M. Deutch, Director, CIA
JTF) with limited support and motives to
Washington Post, 26 June 1996
organized and financially backed countries
or groups.
1. Background
(2) Disgruntled system users.
a. Networks and information systems
are high-value targets to the enemy and
(3) Poor communications security
must be adequately protected and defended
(COMSEC), computer security (COMPUSEC),
to maintain the integrity of the joint force
and OPSEC practices.
C2 infrastructure. Increasing reliance on
automated information systems for IM is a
(4) Viruses (malicious code).
JTF’s “Achilles Heel” if taken advantage of
by an adversary. Mission accomplishment
(5) U n a u t h o r i z e d / u n i n t e n t i o n a l
depends on protecting and defending
disclosure of data. This threat increases
information and information systems from
proportionally to the JTF’s use of
destruction, disruption, corruption, and
automation.
safeguarding from intrusion and
exploitation. Everyone should assume their
(6) Corruption of data. An insidious
information and information system is a
method of deception, if undetected, leads
target.
Therefore, all users share
to faulty guidance, coordination,
responsibility for adequately protecting and
decisionmaking, and execution.
defending friendly information and
information systems.
(7) Physical disruption or denial of
communications. Threats that may be
b. Protection
and defense of
generated internally or externally.
information and information systems are
accomplished
through aggressive
(8) Terrorist(s) groups.
application of information assurance
measures. The predominant means to
(9) State sponsored information
apply information assurance is through
warfare (IW) attacks.
INFOSEC, which includes intrusion
detection, effect isolation, and incident
b. Even easily identified and detected
reaction to restore information and system
threat techniques are difficult to counter.
security. Maintain vigilance when using
Others may not be detectable or in place
any
information
medium
or
but not activated. Examples of threat
communications system. The dynamic
techniques are—
nature of the information environment
requires well-developed information
(1) Masquerading or attempting to
assurance programs to ensure effective IM.
gain access by posing as an authorized user.
V-1

-------------------------------------------------------------------------------------------------------------------------------------------------------------

Password selection, use, and protection are
procedures, operations, personnel, and
vital to counter these intrusions.
technology to protect and defend
information and information systems.
(2) Spoofing or inserting data
Defensive information operations actions
causing a system to inadvertently disclose
include—
information or data.
a. Determining what data adversary
intelligence systems might obtain that
(3) Employing electronic warfare by
could be interpreted or pieced together to
using electromagnetic energy, causing
derive critical information.
denial of service and corruption of data.
Electromagnetic pulses can corrupt and
b. Selecting and execute measures to
destroy data stored on magnetic media and
eliminate or reduce the vulnerabilities of
damage software and hardware.
friendly actions to adversary exploitation.
(4) Providing signals intelligence
(SIGINT) information supporting other
c. Identifying critical information
threats. This provides insight into
resources, then taking all possible
communications infrastructure and
measures to deny unauthorized persons
information transfer techniques.
information of value that might be derived
from intercept and analysis of
(5) Disrupting planning and
compromising emanations from crypto
operations by substitution and modification.
equipment and telecommunications
This is the process of modifying or
systems.
substituting false data or information, with
the objective of influencing plans or
d. Installing and properly using
operations causing users to question the
cryptosystems.
integrity of their information.
e. Using physical measures necessary
(6) Physically attacking facilities
to safeguard classified equipment,
resulting in the loss of information
material, and documents from access or
connectivity.
observation thereof by unauthorized
persons.
(7) Gaining unauthorized access to
information processing and transfer
f. Protecting transmissions from
systems providing access to friendly
interception and exploitation by means
information. Typically, knowledge of an
other than cryptoanalysis.
organization’s systems, procedures, and
security barriers is required.
g. Protecting capabilities against
intrusion, damage, and exploitation.
3. Defensive Information Operations
h. Using warning banners.
Defensive information operations (a
subset of information operations) are
i. Using password protected screen
actions to protect and defend one’s own
savers.
information and information systems. JTF
personnel form an essential line of defense
j.
Safeguarding passwords. All pass-
in the way they use office automation and
words will—
networks. Bring unusual occurrences to
the attention of the individuals responsible
(1) Be alphanumeric and a minimum
for defense of information and information
of 8 characters.
systems. Defensive information operations
integrate and coordinate policies and
(2) Be changed regularly.
V-2

-------------------------------------------------------------------------------------------------------------------------------------------------------------

k. Using configuration controls. J-6
(5) Reuse disks or tapes at the same
personnel, according to security directives
classification level or higher. If the disk or
and configuration management controls,
tape must be used at a lower classification
are the only personnel authorized to direct
level, approved methods for clearing,
changes to the system. This includes
overwriting, or purging data from storage
making any hardware or software changes.
media must be used.
l. Using information storage pro-
m. Checking for viruses. Introduction
cedures.
of viruses (malicious code) can be from
outside or within the organization.
(1) Store classified data on floppy
Current server-based antivirus software
disks or tapes and secure when not in use
does not intercept viruses in attachments.
or on secure network drives. Do not store
Only after an attachment is “saved as”
classified data on the fixed hard drive
(decrypted) does virus scanning occur.
unless the workstation is located in a
Individuals should check for viruses on
certified and approved area.
their workstation by running antivirus
software at each shift change. Establish
(2) Label removable data storage
procedures directing users to scan all
media with the appropriate classification.
attachments after saving. The procedures
Examples are the SF
710
(1-87)
should also outline what the individual does
UNCLASSIFIED Sticker (Green) and the
if they discover a virus. Viruses reside in
SF 707 (1-87) SECRET Sticker (Red).
three tiers: server, networked work-
Classify removable data media at the
stations, and diskettes. All members of the
highest level authorized for that computer
JTF should use available antivirus software
system and mark appropriately.
and comply with the following procedures:
(a) Label floppy diskettes with
(1) The first tier is the server level.
appropriate security label.
Conduct automatic virus scanning of the
networked or shared drive. The network
(b) Mark all magnetic media,
system administrator handles the server
even with deleted or erased files with the
level and is transparent to the user. The
highest level of classification.
JTF server runs the antivirus software
periodically to catch any infected files
(c) Follow the same security
placed on the shared drive. The JTF J-6 is
rules for floppy disks as used for working
responsible for server protection.
‘paper’ copies. If the paper working copy
requires an accounting and control number,
(2) The second tier is the networked
then the diskette will also. See J-6
workstation. At this level, the user
INFOSEC staff for information on
accomplishes virus detection and
accounting and control of your diskettes.
elimination by initiating virus detection
Be sure to perform routine inventories on
software or setting the virus scanning
all disks, tapes, and compact disks read
software to accomplish automatic system
only memory (CD-ROMs).
scans at timed intervals.
(3) Use proper classified mailing
(3) The third tier is diskettes.
and/or courier handling procedures for
Diskettes act as hosts for the virus to travel
transferring classified magnetic media and
from machine to machine. Unless you know
CD-ROMs.
otherwise, assume diskettes are infected.
Always scan diskettes before use. The JTF
(4) Develop procedures for the
J-6 will establish a site for conducting virus
proper method of releasing classified
scanning of incoming diskettes. Never
information.
permit JTF personnel to use diskettes
V-3

-------------------------------------------------------------------------------------------------------------------------------------------------------------

before virus checking. The J-6 will install
b. Accomplish destruction by means
antivirus software on the LAN in order for
that eliminate the risk of reconstruction of
users to check files downloaded from
the classified information.
newsgroups or e-mail. Liaison officers may
bring their own laptop computers. The J-6
(1) Burn Bags. Place burn bags
should develop procedures for scanning
throughout all workspaces, particularly in
laptop computers before their use in the
areas with printers and copiers. Never
JTF.
locate classified burn bags in close
proximity to unclassified waste containers.
n. Observe the following guidelines for
Users must be aware of the potential to
unclassified (NIPRNET) internet use;
piece together the JTF’s operations from
minor or seemingly insignificant bits of
(1) Do not process or exchange
information. If in doubt, dispose of
classified information via the internet.
unneeded materials in a burn bag. Control
(2) Grant internet access for users
burn bags in a manner minimizing the
with a valid mission need and for official
possibility of unauthorized removal of the
use only.
bag or the contents before destruction.
When filled, seal burn bags in a manner
(3) Scan all software downloaded
facilitating the detection of tampering with
from the internet with updated virus
the bag. Mark sealed bags with an office
detection software.
symbol and the highest classification of the
information contained. Keep records of
(4) Do not post WWW pages on JTF
destruction if required.
systems without approval of J-6 INFOSEC
and public affairs staffs. Information
(2) Magnetic Media Destruction.
exchanged via the internet or WWW is
Special security handling procedures for
generally unprotected and subject to
clearing and/or purging, destroying, and
compromise.
removing of external markings from
magnetic media and CD-ROMs are needed
4. Information Destruction
to prevent the unintentional disclosure of
information. This includes data remnants
a. Treat electronic records the same as
or traces of information remaining on
paper records. Records no longer required
storage media even after the use of purging
shall be disposed of in accordance with the
procedures. Classified storage media
provisions of the Federal Records Act (44
should be destroyed when no longer usable.
USC 21 and 33). Continue appropriate
Contact the JTF help desk for procedures
protection for materials identified for
for destroying data storage media.
destruction until destroyed.
V-4

-------------------------------------------------------------------------------------------------------------------------------------------------------------

REFERENCES
Joint
Department of Defense (DOD) Directive 8000.1, Defense Information Management (IM)
Program, 27 Oct 92.
DOD Directive 8910.1, Management and Control of Information Requirements, 11 Jun 93
DOD Directive 5015.2-STD, Design Criteria Standard for Electronic Records Management
Software Applications, 24 Nov 97
Corporate Information Management for the 21st Century, A DOD Strategic Plan, June 1994
Report by a Panel of the National Academy of Public Administration for the U.S. DOD,
Information Management Performance Measures, January 1996
Joint Publication 1-03, Joint Reporting Structure (JRS) General Instructions, 10 Jan 94
Joint Publication 3-13, Joint Doctrine for Information Warfare, 9 Oct 98
Joint Publication 3-56, Command and Control Doctrine for Joint Operations, 2nd Draft,
30 Apr 97
Joint Publication 5-00.2, Joint Task Force Planning Guidance and Procedures, 13 Jan 99
Joint Publication 6-0, Doctrine for Command, Control, Communications, and Computer (C4)
Systems Support to Joint Operations, 30 May 95
Joint Publication 6-02, Joint Doctrine for Employment of Operational/Tactical Command,
Control, Communications, and Computer Systems, 1 Oct 96
CJCSI 3122.01, JOPES Volume I, Planning Policies and Procedures, Chapter V.
CJCSI 3151.01, Chairman of the Joint Chiefs of Staff Instruction, Global Command and
Control System Common Operational Picture Reporting Requirements, 10 Jun 97
CJCSI 6510.01B, Chairman of the Joint Chiefs of Staff Instruction, Defensive Information
Operations Implementation, 22 Aug 97
CJCSM 6120.01A, Joint Multi-tactical Digital Information Link Operating Procedures,
October 1997
Joint Task Force Architecture Specification (JTFAS), 13 Apr 94
Information Management Plan, Unified Endeavor 97-1, Executive Summary, 18 Nov 96
Information Management Plan, Unified Endeavor 98-1, Coordinated Draft, 12 Sep 97
Framework for Information Management (IDM) Services, 5 Sep 97
Joint Force Quarterly, Rethinking the Joint Doctrine Hierarchy, Winter 1996-97
Battlefield Awareness and Data Dissemination (BADD) Advanced Concept Technology
Demonstration (BADD ACTD) Management Plan, 30 Apr 97
JULLS Long Report, Number 22836-71516 (00010), 8 Mar 96
JULLS Long Report, Number 12748-78965 (00013), 19 Feb 97
References-1

-------------------------------------------------------------------------------------------------------------------------------------------------------------

Multiservice
Air Land Sea Application (ALSA), Information Warfare/Information Operations Study,
15 Dec 95
Army
Army Digitization Master Plan ’96, Chapter 4, Architecture
AR 25-1, Information Management, 25 Mar 97
FM 100-5, Operations, 14 Jun 93
FM 100-6, Information Operations, August 1996
FM 100-7, Decisive Force: The Army in Theater Operations, 31 May 95
FM 101-5, Staff Organization and Operations, 31 May 97
TRADOC Pam 525-5, Force XXI Operations, A Concept for the Evolution of Full-Dimensional
Operations for the Strategic Army of the Early Twenty-First Century, 1 Aug 94
TRADOC Pam 525-69, Concept for Information Operations, 1 Oct 95
XVIII Airborne Corps, Joint Task Force Headquarters Standing Operating Procedures, 1 Dec
96
Marine Corps
MCDP 6, Command and Control, 4 Oct 96
Navy
Naval Doctrine Publication 6, Naval Command and Control, 19 May 95.
Air Force
Air Force Doctrine Document 1, Basic Doctrine, September 1997
Air Force Doctrine Document 2, Global Engagement, Air and Space Power Organization and
Employment, 28 Sep 98
Air Force Doctrine Document 2-5, Information Operations, 5 Aug 98
Air Force Doctrine Document 2-8, Command and Control (Draft)
Air Force Manual 37-104, Information Management, 1 Jun 95
Air Force Policy Directive 31-4, Information Security, 1 Aug 97
Air Force Policy Directive 33-2, Information Protection, 1 Dec 96
Air Force Policy Directive 37-1, Information Management, 19 Nov 93
References-2

-------------------------------------------------------------------------------------------------------------------------------------------------------------

GLOSSARY
PART I—ABBREVIATIONS AND ACRONYMS
A
aaslt
air assault
ABN
airborne
ACO
airspace control order
ACP
airspace control plan
ACR
armored cavalry regiment
ADA
air defense artillery
ADP
automatic data processing
ADSI
Air Defense System Integrator
adt’l
additional
admin
administration
AECC
aeromedical evacuation control center
AELT
aeromedical evacuation liaison team
AFDC
Air Force Doctrine Center
AFFOR
Air Force forces
AFI
Air Force Instructions
AFTTP(I)
Air Force Tactics, Techniques, and Procedures (Interservice)
AIS
automated information system
ALSA
Air Land Sea Application Center
AMHS
Automated Message Handling System
AOR
area of responsibility
AR
armor
ARFOR
Army forces
ARG
amphibious ready group
ASAS
All Source Analysis System
ASCII
American Standard Code for Information Interchange
assgnm’t
assignment
ATO
air tasking order
AUTODIN
Automatic Digital Network
B
BBS
bulletin board system
BDA
bomb or battle damage assessment
C
C-Day
unnamed day on which a deployment operation commences
or is to commence
C2
command and control
C2W
command and control warfare
C3
command, control, and communications
C4
command, control, communications, and computers
C4I
command, control, communications, computers, and intelligence
CA
civil affairs; combat assessment
CAP
crisis action planning
Glossary-1

-------------------------------------------------------------------------------------------------------------------------------------------------------------

CAT
crisis action team
CCIR
commander’s critical information requirements
C-Day
unnamed day on which a deployment operations begins
CDR
commander
CD-ROM
compact disk read only memory
CI
counterintelligence
CIA
Central Intelligence Agency
CINC
commander of a combatant command, commander in chief
CINCARLANT
Commander in Chief, Army Forces Atlantic
CINCSOUTH
Commander in Chief, United States Southern Command
CINCUSACOM
Commander in Chief, United States Atlantic Command
CINCUSAREUR
Commander in Chief, United States Army, Europe
CJCSI
Chairman of the Joint Chiefs of Staff Instruction
CJCSM
Chairman of the Joint Chiefs of Staff Manual
CJTF
commander, joint task force
Cmd
command
CMO
civil-military operations
CMOC
civil-military operations center
COA
course of action
COE
common operating environment
COGARD
Coast Guard
COLISEUM
Community On-line Intelligence System for End-Users and
Managers
COMM
communications
COMNAVSTA
commander naval station
COMPUSEC
computer security
COMSEC
communications security
COMSTAT
communications status
CONOPS
concept of operations
COP
common operational picture
COPM
common operational picture manager
CPS
collaborative (integrated) planning system
CTAPS
contingency theater automated planning system
CTD
common tactical dataset
CTF
combined task force
CTP
common tactical picture
CTPB
common tactical picture board
CTPM
common tactical picture manager
CVBG
carrier battle group
D
DAA
designated approving authority
DA
Department of the Army
D-Day
unnamed day on which operations commence or scheduled to
commence
DCJTF
deputy commander, joint task force
DDN
Defense Data Network
Dep
deputy
dept
department
det
detachment
DII
defense information infrastructure
Glossary-2

-------------------------------------------------------------------------------------------------------------------------------------------------------------

DISA
Defense Information Systems Agency
DISN
Defense Information Systems Network
DISUM
daily intelligence summary
div
division
DMDS
Defense Message Distribution System
DMS
Defense Message System
DNVT
digital nonsecure voice terminal
DOD
Department of Defense
DOS
Department of State; disk operating system
DRSN
Defense Red Switch Network
DSN
Defense Switched Network
DSVT
digital subscriber voice terminal
DTG
date-time group
E
E-5
enlisted pay grade level 5
E-7
enlisted pay grade level 7
ech
echelon
EEFI
essential elements of friendly information
EEI
essential elements of information
ELINT
electronic intelligence
e-mail
electronic mail
EPW
enemy prisoner of war
evac
evacuation
EWO
electronic warfare officer
EXORD
execute orders
F
fac
facility
FAX
facsimile
FDESC
force description
FFIR
friendly force information requirements
FM
Field Manual
FOB
forward operations base
FP
force protection
frag
fragmentary
FRAGO
fragmentary order
G
G-1
Army or Marine Corps component manpower or personnel staff
officer (Army division or higher staff, Marine Corps brigade or
higher staff)
G-2
Army or Marine Corps component intelligence staff officer
(Army division or higher staff, Marine Corps brigade or
higher staff)
G-3
Army or Marine Corps component operations staff officer
(Army division or higher staff, Marine Corps brigade or
higher staff)
Glossary-3

-------------------------------------------------------------------------------------------------------------------------------------------------------------

G-4
Army or Marine Corps component logistics staff officer (Army
division or higher staff, Marine Corps brigade or higher staff)
G-5
Army component civil-military operations staff officer
G-6
Army or Marine Corps component signal operations staff officer
(Army division or higher staff, Marine Corps brigade or igher
staff)
GBS
Global Broadcasting System
GCCS
Global Command and Control System
GENSER
general service (message)
GSA
General Services Administration
GSORTS
global command and control system status of resources and
training system
H
HF
high frequency
HQ
headquarters
hrs
hours
HTML
HyperText Markup Language
HTTP
HyperText Transfer Protocols
I
I/W
indications and warnings
IATO
interim authority to operate
IC
internet chat
IDM
information dissemination management
IER
information exchange requirements
IIR
intelligence information report
IM
information management
IMB
information management board
IMO
information management officer
IMP
information management plan
INF
infantry
Info
information
INFOSEC
information security
INFOSYS
information system
intel
intelligence
INTSUM
intelligence summary
IO
information operations
IRC
Internet relay chat
IS
information systems
ISB
intermediate staging base
ISSM
information systems security manager
ISSO
information systems security officer
IW
information warfare
J
J-1
Manpower and Personnel Directorate of a joint staff
J-2
Intelligence Directorate of a joint staff
J-3
Operations Directorate of a joint staff
Glossary-4

-------------------------------------------------------------------------------------------------------------------------------------------------------------

J-4
Logistics Directorate of a joint staff
J-5
Plans Directorate of a joint staff
J-6
Command, Control, Communications, and Computer Systems
Directorate of a joint staff
JAC
joint operations center/joint intelligence support element
assessment cell
JASC
Joint Actions Steering Committee
JCATF
joint crisis action team function
JCCC
joint
communications control center
JCMOTF
Joint Civil-Military Operations Task Force
JCS
Joint Chiefs of Staff
JDISS
Joint Deployable Intelligence Support System
JFACC
joint
force air component commander
JFC
joint
force commander
JFLCC
joint
force land component commander
JFMCC
joint
force maritime component commander
JIB
Joint Information Bureau
JIC
Joint Intelligence Center
JISE
joint
intelligence support element
JMCIS
Joint Maritime Command Information System
JMRO
Joint Medical Regulating Office
JOA
joint
operations area
JOC
Joint Operations Center
JOCC
Joint Operations Center Chief
JOPES
Joint Operation Planning and Execution System
JP
joint
publication
JPG
joint
planning group
JPOTF
joint
psychological operations task force
JRS
joint
reporting structure
JSOTF
joint
special operations task force
JSRC
joint search and rescue center
JTA
joint
terminal architecture
JTCB
Joint Targeting Coordination Board
JTF
joint
task force
JULLS
Joint Universal Lessons Learned System
JWG
joint
working group
JWICS
Joint Worldwide Intelligence Communications System
L
L
local
LAN
local area network
LNO
liaison officer
LOGSITREP
logistic situation report
LTIOV
latest time information of value
M
M/V
motorized vessel
MACOM
major Army command
MAJCOM
major command (USAF)
MARFOR
US Marine Corps forces
Glossary-5

-------------------------------------------------------------------------------------------------------------------------------------------------------------

MCCDC
Marine Corps Combat Development Command
MCDP
Marine Corps Doctrinal Publication
MCPDS
Marine Corps Publication Distribution System
MCRP
Marine Corps Reference Publication
MCS/P
Maneuver Control System Phoenix
Mech
mechanized
med
medical
METOC
meteorological and oceanographic
MEU
Marine expeditionary unit
MEU/ARG
Marine expeditionary unit/amphibious ready group
mgt
management
MIJI
meaconing, interference, jamming, intrusion
MILSTIP
military standard requisitioning and issue procedures
MLS
multilevel security
MOA
memorandum of agreement
MOTRE/TRAP
mobile tactical receive equipment/tactical related applications
MSC
major subordinate command
MSEL
master scenario events list
MSG
message
MTF
message text formats
MTTP
multiservice tactics, techniques, and procedures
N
N/A
not applicable
NATO
North Atlantic Treaty Organization
NAVSOP
Naval Standard Operating Procedures
NAVFOR
US Navy forces
NAVSTA
naval station
NBC
nuclear, biological, and chemical
NEO
noncombatant evacuation operation
NFA
no-fire area
NG
newsgroup
NGO
nongovernmental organization
NIMA
National Imagery and Mapping Agency
NIPRNET
Nonsecure Internet Protocol Router
NLT
not later than
NSA
National Security Agency
NSO
network security officer
NWDC
Navy Warfare Development Command
NWP
Naval Warfare Publication
O
O-5
officer pay grade level 5 (lieutenant colonel)
OCR
office of collateral responsibility
OPCON
operational control
OPFOR
opposing force
OPLAN
operation plan
OPNOTE
operations note
OPORD
operation order
OPR
office of primary responsibility
Glossary-6

-------------------------------------------------------------------------------------------------------------------------------------------------------------

OPS
operations
OPSEC
operations security
OTH
over the horizon
P
PAO
Public Affairs Office; public affairs officer
PIR
priority intelligence requirements
PLA
plain language address
PM
provost marshal
POC
point of contact
POL
petroleum, oils, and lubricants
PSYOP
psychological operations
PVO
private voluntary organization
R
RDA
research, development, and acquisition
RECCE
reconnaissance
RECON
reconnaissance
req
requirement
RFA
restricted fire area
RFI
request for information
ROE
rules of engagement
rpt
report
RR
railroad
S
SAM
surface-to-air missile
SAR
search and rescue
SCI
sensitive compartmented information
SCIF
sensitive compartmented information facility
SCUD
surface-to-surface missile system
SIGINT
signals intelligence
SIMLM
single integrated medical logistics management
SIPRNET
Secret Internet Protocol Router Network
SITREP
situation report
SJA
Staff Judge Advocate
SMG
special mail guard
SOF
special operations forces
SOP
standing operating procedures
SOTA
signals intelligence operational tasking authority
SSO
special security officer
ST&E
security test and evaluation
STO
special technical operations
STU-III
secure telephone unit III
T
TACON
tactical control
TARGET
Theater Analysis and Replanning Graphical Execution Toolkit
Glossary-7

-------------------------------------------------------------------------------------------------------------------------------------------------------------

TASO
terminal area security officer
TDBM
technical data base management
TIM
theater information management
TMD
theater missile defense
TPFDD
time-phased force and deployment data
TRADOC
United States Army Training and Doctrine Command
TRAP
tactical receive equipment and related applications
TS
top secret
T-SCIF
tactical sensitive compartmented information facility
TSCO
top secret control officer
TTP
tactics, techniques, and procedures
U
UE
Unified Endeavor
URL
universal reference locator
US
United States
USC
United States Code
USMTF
United States message text format
USN
United States Navy
USTRANSCOM
United States Transportation Command
V
VTC
video teleconferencing
W
w
with
WARNORD
warning order
WHNS
wartime host-nation support
WMD
weapons of mass destruction
WWW
world wide web
WX
weather
Z
Z
ZULU
ZULU
time zone indicator for Universal Time
Glossary-8

-------------------------------------------------------------------------------------------------------------------------------------------------------------

PART II - TERMS AND DEFINITIONS
battle rhythm. See daily operations cycle.
commander’s critical information requirements (CCIR). Information required by
the commander that directly affects his decisions and dictates the successful execution
of operational or tactical operations. CCIR normally result in the generation of three
types of information requirements: priority intelligence requirements, essential
elements of friendly information, and friendly force information requirements.
(FM
101-5-1, MCRP 5-2A)
common operational picture (COP). The COP is the integrated capability to receive,
correlate, and display a common tactical picture (CTP), including planning applications
and theater-generated overlays/projections (i.e., Meteorological and Oceanographic
(METOC), battleplans, force position projections). Overlays and projections may
include location of friendly, hostile, and neutral units, assets, and reference points. The
COP may include information relevant to the tactical and strategic level of command.
This includes, but is not limited to, any geographically oriented data, planning data
from JOPES, readiness data from SORTS, intelligence (including imagery overlays),
reconnaissance data from the Global Reconnaissance Information System (GRIS),
weather from METOC, predictions of nuclear, biological, and chemical (NBC) fallout,
and air tasking order (ATO) data.
(CJCSI 3151.01)
common tactical dataset (CTD). The CTD is a repository of data that contains all the
information available to the JTF that will be used to build the COP and CTP. The CTD
is not fused, correlated, or processed data in the sense that the information has been
scrutinized by the COP manager (CCM) or track managers for time value, redundancy,
or conflicts. However, the CTD may contain processed intelligence data. The CTD is a
major subcomponent of the COP and refers to: the CINC designated repository for
current battlespace information including disposition of hostile, neutral, and friendly
forces as they pertain to US and multinational operations ranging from peacetime
through crisis and war for the entire area of responsibility (AOR). Upon discretion of
the CINC, the CTD may be a logical database vice physical if there are several JTFs or
activities that will necessitate COP reporting. In these cases there may be more than
one location of database storage.
(CJCSI 3151.01)
common tactical picture (CTP). The CTP is derived from the CTD and other sources
and refers to the current depiction of the battlespace for a single operation within a
CINC’s AOR including current, anticipated or projected, and planned disposition of
hostile, neutral, and friendly forces as they pertain to US and multinational operations
ranging from peacetime through crisis and war. The CTP includes force location, real
time and non-real-time sensor information, and amplifying information such as METOC,
SORTS, and JOPES. (CJCSI 3151.01)
COP correlation site (CCS). The CCS is the CINC-designated location where all data
in the COP is received, correlated, managed, and disseminated by the CCM.
(CJCSI
3151.01)
daily operations cycle. The schedule of significant recurring events of the JTF HQ
staff. The JTF chief of staff normally establishes this to deconflict the JTF staff
schedule. This schedule allows JTF staff members to anticipate when information is
required and backward plan to ensure inputs are available when needed.
Glossary-9

-------------------------------------------------------------------------------------------------------------------------------------------------------------

defense information. The shared or interconnected system of computers.
(FM 100-6).
Global Information Environment. All individuals, organizations, or systems, most of
which are outside the control of the military or National Command Authorities, that
collect, process, and disseminate information to national and international audiences.
(FM 100-6)
IM board (IMB). The focal point for coordinating information management within a
JTF HQ. Chaired by the JTF IMO, this board operates under the supervision of the JTF
chief of staff, or other appropriate staff directorate, as best meets the JTF
requirements. This board should be composed of the senior IMO from each staff section,
component, and supporting agency. The board actively resolves all cross-functional
information management issues, convening on an as required basis.
information filter. Accessing the value of information and culling out that which is not
pertinent or important.
information flow. Term used to describe movement of information.
information fusion. The logical blending and integration of information from multiple
sources into an accurate, concise, and complete summary.
information management (IM). The processes by which information is obtained,
manipulated, directed, and controlled. IM includes all processes involved in the
creation, collection and control, dissemination, storage and retrieval, protection, and
destruction of information.
information operations (IO). Actions taken to affect adversary information and
information systems while defending one’s own information and information systems.
(Joint Pub 3-13)
information security (INFOSEC). The protection of information and information
systems against unauthorized access to or modification of information, whether in
storage, processing, or transit, and against denial of service to authorized users.
Information security includes those measures necessary to detect, document, and
counter such threats. Information security is composed of computer security and
communications security.
(Joint Pub 3-13)
JOC/JISE Assessment Cell (JAC). An optional cell to maintain operational
awareness of the battlespace through continuous fusion and assessment of all-important
friendly and enemy information.
Military Information Environment. The environment contained within the global
information environment, consisting of information systems and organizations—friendly
and adversary, military and nonmilitary—that support, enable, or significantly influence
a specific military operation.
(FM 100-6)
query. As applied to JOPES permissions, “query” is one of the ten functional
permissions granted users. The permission is limited to retrieving and viewing
information on the terminal display screen. The other primary functions allow users to
update, perform database management and scheduling functions, and print charts and
reports.
(Adapted from JOPES User’s Manual)
Glossary-10

-------------------------------------------------------------------------------------------------------------------------------------------------------------

request for information (RFI).
1. Any specific time-sensitive ad hoc requirement
for intelligence information or products to support an ongoing crisis or operation not
necessarily related to standing requirements or scheduled intelligence production. A
request for information can be initiated to respond to operational requirements and
will be validated in accordance with the theater command’s procedures.
2. The
National Security Agency/Central Security Service uses this term to state ad hoc
signals intelligence requirements.
(Joint Pub 1-02).
Glossary-11

 

 

 

 

 

 

 

 

 

 

 

///////////////////////////////////////