Index JOINT STRATEGIC CAPABILITIES PLAN
PRAIRIE WARRIOR 2000 - FOR INSTRUCTIONAL USE ONLY


SUPPLEMENTAL INSTRUCTION 3110.09

COMMAND AND CONTROL WARFARE (C2W)

1. PURPOSE. This C2W supplemental instruction provides guidance to combatant commanders for fully implementing C2W capabilities in the accomplishment of their missions. It also assigns responsibilities in the integration of C2W assets into operational plans and concept summaries.

2. GENERAL.

a. Joint policy for C2W is contained in enclosure E, reference a.

b. Joint doctrine for C2W is contained in enclosure E, reference b.

3. PLANNING GUIDANCE.

a. C2W is the integrated use of operations security (OPSEC), military deception, psychological operations (PSYOP), electronic warfare (EW), and physical destruction, mutually supported by intelligence to deny information to, influence, degrade, or destroy adversary command and control (C2) capabilities while protecting friendly C2 capabilities against such actions. C2W applies across the range of military operations and all levels of conflict. C2W is both offensive and defensive. C2W is a warfighting application of Information Warfare (IW) in military operations and is a subset of IW. Its objective is to decapitate the enemy's command structure from its body of combat forces. Commanders will integrate C2W strategy as an integral component of their overall warfighting concept.

b. C2W will be considered in the development of all operation plans and orders in accordance with enclosure E, references a, c, and d.

c. C2W planning must include a variety of strategies capable of responding to a broad range of contingencies.

d. C2W planning will be integrated into the first stages of military planning to ensure C2W operations fully support force-on-force objectives.

4. RESPONSIBILITY. Combatant commands must incorporate guidance in all deliberate planning documents. See enclosure E, reference a.

ENCLOSURES:

A--Electronic Warfare

B--Operations Security

C--Military Deception

D--Psychological Operations

E--References

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

INTENTIONALLY LEFT BLANK

 

ENCLOSURE A TO SUPPLEMENTAL INSTRUCTION 3110.09 TO AFSC-JSCP

ELECTRONIC WARFARE

1. PURPOSE. To provide guidance for the planning and conduct of Electronic Warfare (EW) in support of regional planning tasks.

2. APPLICABILITY. This enclosure applies to the combatant commanders, Services, Defense agencies, and the Joint Staff.

3. GENERAL GUIDANCE.

a. Joint policy for EW is contained in enclosure E, reference i.

b. Joint doctrine for EW is contained in enclosure E, reference e.

4. PLANNING GUIDANCE.

a. Increasing dependence of combat forces on use of the electromagnetic spectrum for command and control (C2), sensors, and weapon systems constitutes a vulnerability for the United States, allies, and adversaries. Exploiting an adversary's electromagnetic vulnerability while minimizing our own is the basis of EW.

b. EW will be considered in the development of all operation plans and orders in accordance with enclosure E, references c, d and i.

c. Ensure EW use of electromagnetic spectrum:

(1) Is integrated into all aspects of the overall C2W plan.

(2) Deconflicts Electronic Attack (EA), Electronic Protect (EP), Electronic Support (ES), SIGINT, and theater/national reconnaissance operations.

(3) Is coordinated by electronic frequency spectrum management in the generation of the operations frequency allocation list and the Joint Restricted Frequency List.

d. Plan for the deployment and integration of C2W personnel from the Joint Command and Control Warfare Center (JC2WC), Joint Spectrum Center (JSC), and Service C2W/IW centers and/or agencies during exercises and operations.

e. Plan for US and, where applicable, combined use of friendly EA and EP.

f. Anticipate and plan for hostile EA and EP.

g. Plan to conduct reprogramming activities when necessary.

h. Plan for intelligence support to EW.

5. RESPONSIBILITIES. See enclosure E, reference i.

6. ADDITIONAL GUIDANCE. Issues pertaining to EW, its incorporation into operational planning, or assistance in EW application should be addressed to J-38, IW-Special Technical Operations Division (STOD), C2W Branch.

ENCLOSURE B TO SUPPLEMENTAL INSTRUCTION 3110.09

OPERATIONS SECURITY

1. PURPOSE. To provide guidance for Operations Security (OPSEC) as an element of C2W.

2. GENERAL GUIDANCE.

a. Joint policy guidance for OPSEC is contained in enclosure E, reference f.

b. Joint doctrine for OPSEC is contained in enclosure E, reference g.

c. Combatant commanders will incorporate the OPSEC process into C2W planning and execution.

d. An integral element of C2W, the OPSEC process must be incorporated into operational planning at the earliest stages. When complete, the OPSEC process forms the basis for identifying critical information and selecting and executing OPSEC countermeasures t hat address vulnerabilities to operational plans. The luxury to consider OPSEC an administrative requirement no longer exists; OPSEC is now addressed as one of the fundamental elements of C2W. To defend our capability and freedom to conduct operations, the OPSEC process must be accomplished simultaneously with other operational planning to reveal vulnerabilities and apply countermeasures before the vulnerabilities can be exploited by an adversary.

e. Organizationally, members of the combatant command staff charged with OPSEC planning and execution should reside in the C2W organization, normally within the J3 staff. Only when collocated with the complete C2W cell will OPSEC receive the attention to detail that will provide adequate analysis and countermeasure application.

3. RESPONSIBILITIES. See enclosure E, reference f.

4. COORDINATION. Issues pertaining to the OPSEC process, its incorporation into operational planning, or assistance in OPSEC application should be addressed to J-38, IW-STOD/TSB.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

INTENTIONALLY LEFT BLANK

 

 

 

ENCLOSURE C TO SUPPLEMENTAL INSTRUCTION 3110.09

MILITARY DECEPTION

1. PURPOSE. To provide guidance for the planning and conduct of military deception in support of regional planning tasks.

2. APPLICABILITY. This enclosure applies to the combatant commanders.

3. DEFINITIONS.

a. MILITARY DECEPTION. Actions executed to mislead foreign decision makers, causing them to derive and accept appreciation of military capabilities, intentions, operations, or other activities in ways that contribute to the originator's objectives, are military deception.

b. MILITARY OBJECTIVES. Foreign intentions, military capabilities, and military activities advantageous to friendly interests or objectives that can be induced by deception planning are military objectives.

4. GENERAL GUIDANCE.

a. Joint policy for military deception is contained in enclosure E, reference j.

b. Joint doctrine for military deception is contained in enclosure E, reference h.

5. PLANNING GUIDANCE. Where appropriate, USPACOM will plan military deception operations as a fundamental element of the integrated C2W plan.

6. DISTRIBUTION. Due to the highly sensitive nature of deception, plans require restricted distribution. This distribution means keeping numbers of people privy to the deception at the minimum number possible, consistent with need to know criteria and proper clearance.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

INTENTIONALLY LEFT BLANK

 

ENCLOSURE D TO SUPPLEMENTAL INSTRUCTION 3110.09

PSYCHOLOGICAL OPERATIONS

1. PURPOSE. To provide guidance for using PSYOP to support operational mission accomplishment, and for preparing the PSYOP Tab for joint C2W plans and orders. For more detail refer to enclosure E, reference k.

2. APPLICABILITY. This enclosure applies to the combatant commanders.

3. GENERAL GUIDANCE.

a. Joint policy for PSYOP is contained in enclosure E, reference 1.

b. Joint doctrine for PSYOP is contained in enclosure E, reference m.

4. PLANNING GUIDANCE.

a. GENERAL.

(1) PSYOP are planned to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately, behavior of foreign governments, organizations, groups, and individuals. PSYOP are a vital part of the broad range of US political, military, economic, and informational activities that convey the US Government's complex policy messages to foreign governments and international audiences. Enclosure E, references l and m contain more detailed information on the nature of PSYOP.

(2) PSYOP are an integral part of military operations, and as such, are an inherent responsibility of all military commanders. PSYOP have been used throughout history to influence foreign groups and leaders. Modern PSYOP is enhanced by the expansion of mass communication capabilities and a renewed effort to maintain credibility. PSYOP support across the range of military operations from humanitarian assistance to general war to post-war consolidation.

b. OBJECTIVES.

(1) Military PSYOP are planned and conducted to support peacetime conditioning and support to diplomatic activities. In addition to the Overt Peacetime PSYOP Programs (OP3) of the Geographic Combatant Commanders, PSYOP support humanitarian assistance and disaster relief operations as a part of the USG's strategic and regional information strategy. As such, PSYOP are an integral part of deterrence operations and transition to hostilities when deterrence fails.

(2) When hostilities are imminent and preparation of the battlefield is directed, PSYOP will also support the C2W strategy. During conflict the overarching PSYOP effort is sustained while the focus of PYSOP activities are vigorously pursued to support the C2W strategy. For a detailed account of PSYOP applications, refer to enclosure E, references k through m.

c. MILITARY PSYOP PLANNING PROCESS.

(1) During diplomatic efforts against an adversary, the USG interagency develops an International Information Campaign with support from military PSYOP. This strategic level campaign determines USG information policy and parameters for the Geographic Combatant Commander's subsequent operational level PSYOP plan. The Joint Force Commander's PSYOP plan, prepared by the JPOTF Commander, will be the source document used for extracting and developing the PSYOP support plan for the C2W plan.

(2) PSYOP should be considered for use in any situation where organic regional, cultural, and linguistic expertise and dedicated dissemination assets can assist the commander in influencing a variety of foreign audiences, to include the effectiveness of the adversary's forces and to undermine the adversary's public support.

(3) PSYOP in support of C2W are a focused program employed against a foreign adversary to influence the human factor of high-value C2 nodes. PSYOP reinforces, magnifies, and multiplies the effects of military actions, especially in support of deception and destruction activities. Close integration, coordination, deconfliction and synchronization are required between PSYOP and the other C2W disciplines.

(4) Psychological assessments are an integral part of the PSYOP planning process. Basic PSYOP Studies (BPS), Special PSYOP Studies (SPS) and Special PSYOP Assessments (SPA) will be requested in accordance with the information delineated in the Joint Strategic Capabilities Plan.

(5) Enclosure E, reference m establishes the overall process for military PSYOP planning conducted of joint operations.

5. PSYOP PLANNING AND THE JOPES PLANNING PROCESSES. Enclosure E, reference m describes how the PSYOP planning process relates to the JOPES deliberate, crisis, and campaign processes. All peacetime PSYOP activities require USG interagency coordination and approval in accordance with Enclosure E, reference l. Overt Peacetime PSYOP activities are reviewed by OASD (SO-LIC). Additionally, US PSYOP forces cannot be placed under foreign control.

6. SECURITY. As general policy, only PSYOP that support sensitive Public Diplomacy, covert activities of non-DOD agencies, Command and Control Warfare, and Information Warfare are accorded special handling.

7. ADDITIONAL GUIDANCE. Address questions concerning military deception to, J-38, Special Operations Division.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

INTENTIONALLY LEFT BLANK

ENCLOSURE E TO SUPPLEMENTAL INSTRUCTION 3110.09

REFERENCES

a. CJCS MOP 30, (lst Revision), "Command and Control Warfare", 8 March 1993

b. Joint Pub 3-13.1, "Joint Doctrine For Command and Control Warfare (C2W)", 7 February 1996

c CJCSM 3122.03, "Joint Operation Planning, and Execution System (JOPES), Volume II (OPLAN Formats and Guidance)", 1 June 1996

d. Joint Pub 5-03.21, "Joint Operation, Planning and Execution System (JOPES), Volume II (Supplementary Planning Guidance)", 10 March 1992

e. Joint Pub 3-51, (2nd Final Draft), "Electronic Warfare in Joint Military Operations", 1 September 1994

f. CJCS 3213.01, "Joint Operations Security", 28 May 1993

g. Joint Pub 3-54, "Joint Doctrine for Operations Security", 15 April 1994

h. Joint Pub 3-58, "Joint Doctrine for Military Deception", 6 June 1994

i. CJCS MOP 6, "Electronic Warfare", 3 March 1993 (Rev 1)

j. CJCSI 3211.01A, "Joint Military Deception." , 15 June 1994

k. CJCSI 3119.05, (Final Draft), "Psychological Operations Supplemental Instruction to the JSCP", 1 September 1995

l. DOD Directive S-3321.1, Final Draft,"Overt Psychological Operations Conducted in Peacetime and Military Operations Other Than War by DOD", 1994

m. Joint Pub 3-53, "Joint Psychological Operations Doctrine", 30 July 1993

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

INTENTIONALLY LEFT BLANK