Example: air traffic controller

FM 3-12 Cyberspace and Electromagnetic Warfare

FM 3-12. Cyberspace OPERATIONS AND. Electromagnetic Warfare . AUGUST 2021. DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. This publication supersedes FM 3-12, dated 11 April 2017. HEADQUARTERS, DEPARTMENT OF THE ARMY. This publication is available at the Army Publishing Directorate site ( ), and the Central Army Registry site ( ). Foreword Over the past two decades of persistent conflict, the Army has deployed its most capable communications systems ever. During this time, forces have continued to dominate Cyberspace and the Electromagnetic spectrum while conducting counterinsurgency operations in Afghanistan and Iraq against enemies and adversaries who lack the ability to challenge our technological superiority.

electromagnetic spectrum in support of unified landoperations. FM 3-12 defines and provides an understanding of Army cyberspace operations, electromagnetic warfare, statutory and title authorities, roles,

Tags:

  Spectrum, Electromagnetic, Electromagnetic spectrum

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of FM 3-12 Cyberspace and Electromagnetic Warfare

1 FM 3-12. Cyberspace OPERATIONS AND. Electromagnetic Warfare . AUGUST 2021. DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. This publication supersedes FM 3-12, dated 11 April 2017. HEADQUARTERS, DEPARTMENT OF THE ARMY. This publication is available at the Army Publishing Directorate site ( ), and the Central Army Registry site ( ). Foreword Over the past two decades of persistent conflict, the Army has deployed its most capable communications systems ever. During this time, forces have continued to dominate Cyberspace and the Electromagnetic spectrum while conducting counterinsurgency operations in Afghanistan and Iraq against enemies and adversaries who lack the ability to challenge our technological superiority.

2 However, in recent years, regional peers have demonstrated formidable capabilities in hybrid operational environments. These capabilities threaten the Army's dominance in both Cyberspace and the Electromagnetic spectrum . The Department of Defense information network-Army is an essential warfighting platform that is a critical element of the command and control system and foundational to success in Army operations. Effectively operating, securing, and defending the network to maintain trust in its confidentiality, integrity, and availability is essential to commanders' success at all echelons.

3 A commander who cannot access or trust communications and information systems or the data they carry risks the loss of lives, loss of critical resources, or mission failure. At the same time, our adversaries and enemies are also increasingly reliant on networks and networked weapons systems. The Army, as part of the joint force, must be prepared to exploit or deny our adversaries and enemies the operational advantages that these networks and systems provide. As the Army shifts its focus to large-scale combat operations against regional peers, we must anticipate that these threat actors will persistently attempt to infiltrate, exploit, and degrade access to our networks and data.

4 In the future, as adversary and enemy capabilities grow, our continued dominance of Cyberspace and the Electromagnetic spectrum will become less certain, while at the same time our ability to access Cyberspace and spectrum - dependent capabilities will become both more challenging and more critical to fight and win in multiple domains. Leveraging Cyberspace and Electromagnetic Warfare effects throughout the competition continuum is key to achieving relative advantages through Cyberspace and the Electromagnetic spectrum while denying the same to our enemies and adversaries. To achieve these positions of relative advantage, commanders must integrate and synchronize Cyberspace operations and Electromagnetic Warfare with all other available military capabilities using a combined arms approach.

5 Moreover, intelligence, signal, information advantage activities, space, and fires capabilities are all critical to successful planning, synchronization, and execution of Cyberspace operations and Electromagnetic Warfare . Commanders and staffs integrate and synchronize all of these capabilities across multiple domains and warfighting functions to maximize complementary effects in and through Cyberspace and the Electromagnetic spectrum . FM 3-12 defines and describes the principles and tactics to address challenges in the operational environment while providing an overview of Cyberspace operations, Electromagnetic Warfare , and their planning, integration, and synchronization through the operations process.

6 It describes the units that conduct these operations and how they enable accomplishment of commanders' objectives in Army operations. Due to the rapid evolution of friendly and threat capabilities, tactics, techniques, and procedures in Cyberspace and the Electromagnetic spectrum , the Cyber Center of Excellence will review and update FM 3-12 and supporting publications frequently in order to keep pace with the continuously evolving operational environment. NEIL S. HERSEY. Major General, Army Commanding This page intentionally left blank. *FM 3-12. Field Manual Headquarters No. 3-12 Department of the Army Washington, , 24 August 2021.

7 Cyberspace Operations and Electromagnetic Warfare Contents Page v INTRODUCTION .. vii Chapter 1 OPERATIONAL ENVIRONMENT OVERVIEW .. 1-1. Overview of the Operational 1-1. Cyberspace and the Electromagnetic spectrum .. 1-1. Section I Core Competencies and Fundamental Principles .. 1-3. Core Competencies .. 1-3. Fundamental Principles .. 1-4. Section II Operational Environment .. 1-4. Cyberspace Domain .. 1-5. Electromagnetic spectrum .. 1-7. Trends and 1-8. Conflict and Competition .. 1-11. Section III Contributions to the Warfighting 1-12. Command and Control .. 1-12. Movement and Maneuver.

8 1-13. Intelligence .. 1-14. Fires .. 1-15. Sustainment .. 1-15. 1-15. Chapter 2 Cyberspace OPERATIONS AND Electromagnetic Warfare . FUNDAMENTALS .. 2-1. Section I Cyberspace Operations .. 2-1. Joint Force and Army .. 2-3. Department of Defense Information Network Operations .. 2-4. Defensive Cyberspace Operations .. 2-4. Offensive Cyberspace Operations .. 2-5. Cyberspace Actions .. 2-5. Section II Electromagnetic Warfare .. 2-8. Electromagnetic Attack .. 2-8. Electromagnetic 2-11. Electromagnetic Support .. 2-14. DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.

9 *This publication supersedes FM 3-12, dated 11 April 2017. FM 3-12 i Contents Electromagnetic Warfare 2-15. Section III Interrelationship with other Operations .. 2-16. Intelligence Operations .. 2-16. Space Operations .. 2-16. Information Operations .. 2-18. Chapter 3 ARMY ORGANIZATIONS AND COMMAND AND CONTROL .. 3-1. Section I Army Cyberspace Operations Organizational Structure .. 3-1. United States Army Cyber Command .. 3-1. Army Information Warfare Operations Center .. 3-2. Section II Electromagnetic Warfare Organizations .. 3-3. Electromagnetic Warfare Platoon (Brigade Combat Team).

10 3-3. Intelligence, Information, Cyber, Electromagnetic Warfare , and Space Detachment .. 3-4. Section III Cyberspace Electromagnetic Activities at Corps and 3-4. Commander's Role .. 3-4. Cyberspace Electromagnetic Activities Section .. 3-5. Cyberspace Electromagnetic Activities Working Group .. 3-8. Staff and Support at Corps and 3-8. Chapter 4 INTEGRATION THROUGH THE OPERATIONS PROCESS .. 4-1. Section I The Operations 4-1. Planning .. 4-2. Preparation .. 4-3. Execution .. 4-3. 4-4. Section II Integrating Processes .. 4-4. Intelligence Preparation of the Battlefield .. 4-5. Information Collection.


Related search queries