PART I--ABBREVIATIONS AND ACRONYMS
AF Air Force ARDF aerial radio direction findingC2 command and control C2W command and control warfare C3 command, control, and communications CJCS Chairman of the Joint Chiefs of Staff CJCSI CJCS instruction COA course of action COMINT communications intelligence COMSEC communications security CONPLAN operation plan in concept format CPX command post exercise
DF direction finding DOD Department of Defense
EA electronic attack EEI essential elements of information EEFI essential elements of friendly information ELINT electronics intelligence EP electronic protection ES electronic support EW electronic warfare
FISINT foreign instrumentation signals intelligence
HF high frequency H&I harassing and interdicting HQ headquarters HUMINT human intelligence
IMINT imagery intelligence
JOPES Joint Operation Planning and Execution System JULLS Joint Universal Lessons Learned System
LRRP long-range reconnaissance patrol
MASINT measurement and signature intelligence MOP memorandum of policy
NCS net control station
OPLAN operation plan in complete format OPORD operation order OPSEC operations security
POL petroleum, oil, and lubrication PSYOP psychological operations
SHF superhigh frequency SIGINT signals intelligence SIGSEC signals security SOI signal operation instructions S2 battalion or brigade intelligence officer SOP standard operating procedure SSI standing signal instruction
TF task force
UHF ultrahigh frequency
command and control warfare. The integrated use of operations security, military deception, psychological operations, electronic warfare, and physical destruction, mutually supported by intelligence, to deny information to, influence, degrade, or destroy adversary command and control capabilities while protecting friendly command and control against such actions. Command and control warfare applies across the operational continuum and all levels of conflict. Also called C2W. Command and control warfare is both offensive and defensive:
(2) command and control protection. To maintain effective command and control of own forces by turning to friendly advantage or negating adversary efforts to deny information to, influence, degrade or destroy the friendly command and control system. (Joint Pub 1-02)
essential elements of friendly information. Key questions likely to be asked by adversary officials and intelligence systems about specific friendly intentions, capabilities, and activities, so they can obtain answers critical to their operational effectiveness. (Joint Pub 1-02)
operations security. A process of identifying critical information and subsequently analyzing friendly actions attendant to operations and other activities to:
b. Determine indicators hostile intelligence systems might obtain that could be interpreted or pieced together to derive critical information in time to be useful to adversaries.
c. Select and execute measures that eliminate or reduce to an acceptable level the vulnerabilities of friendly actions to adversary exploitation. Also called OPSEC. (Joint Pub 1-02)
operations security measures. Methods and means to gain and maintain essential secrecy about critical information. The following categories apply:
b. countermeasures. The objective is to disrupt effective adversary information gathering or prevent their recognition of indicators when collected materials are processed. Use diversions, camouflage, concealment, jamming, threats, police powers, and force against adversary information gathering and processing capabilities.
c. counteranalysis. The objective is to prevent accurate interpretations of indicators during adversary analysis of collected materials. This is done by confusing the adversary analyst through deception techniques such as covers. (Joint Pub 1-02)