FM
stringclasses 43
values | page
int64 1
477
| text
stringlengths 6
8.45k
|
---|---|---|
3-57 | 98 | Chapter 4
4-124. When tasked to form a one-star combined joint integrated CMO task force, the CACOM may also
provide command and control over the following assigned or attached military capabilities across the
competition continuum:
* Joint or multinational engineer.
* Military police.
* Medical.
* Maneuver.
4-125. The CACOM may also provide command and control to other stability-related, civilian and military
capabilities during periods of competition, armed conflict, and return to competition.
CIVIL AFFAIRS TASK FORCE
4-126. A CA task force is a scalable unit in charge of the stabilization elements and organized around the
nucleus of CA and support elements. CA task forces are temporarily task-organized formations sourced from
Army units and assigned to a theater Army, corps, division, or BCT. When operating during consolidation
of gains, CA units establish the core of a CA task force with the commander and staff and their respective
subordinate units. A CA task force may be augmented with any of the following elements:
* Public affairs.
* Maneuver elements.
* Engineers.
* Medical units.
* Military police.
* Logistics and transportation elements.
* Other units as necessary for stabilization operations.
4-127. The primary mission of the CA task force is to focus the stabilization efforts in an AO under one
command line, thereby increasing the speed and efficiency of stabilization operations tasks. The speed with
which transition occurs from U.S. forces to local authorities is dependent on the ability to plan and control
elements aimed at increasing governance at the tactical and operational levels. CA task forces provide the
important linkage between interagency, interorganizational, and NGOs which are important to the success of
stabilization operations. During large-scale combat operations and consolidation of gains, a CA task force
can—
* Be a stand-alone task force or subordinate unit to a higher task force.
* Assist unit commanders when their organic ability cannot meet the civil needs of their AO.
* Plan and direct CAO in a supported AO.
* Provide CNA and direction for development and mobilization within an AO.
* Provide linkage between the supported command and nonmilitary agencies operating in the AO
through a CMOC.
* Advise the supported commander on policy; funding; multinational, foreign, or host-nation
sensitivities; and the effects of these components on theater strategy and/or campaign and
operational missions.
* Provide command and control, or direction, of military host-nation advisory, assessment,
planning, and other assistance activities by U.S. forces.
* Assist in establishing military-to-civilian links to facilitate cooperative assistance arrangements.
* Perform essential coordination or liaison with host-nation agencies; country teams; United Nations
agencies; and deployed U.S., multinational, and host-nation military forces and supporting logistic
organizations.
* Assist in the planning and conduct of civil information programs to publicize positive results and
objectives of military assistance projects in order to—
Build civil acceptance and support of U.S. operations.
Promote local capabilities contributing to recovery and economic-social development.
|
3-57 | 99 | Operations Structure
* Advise and assist in strengthening or stabilizing civil infrastructures and services.
* Facilitate transition to peacekeeping or consolidation operations and associated hand-off to other
government agencies, international organizations, or host-nation responsibility.
4-128. The CA task force, during competition, enables interactions between military and interagency
groups, and interorganizational partners to—
* Respond to humanitarian needs.
* Provide disaster relief.
* Build partner nation capacity and partner nation governance.
4-129. The majority of efforts of the CA task force during competition are completed under 22 USC
authority or in support of the civil-military engagement (CME) mission of USSOCOM.
4-130. CA elements, from company through CACOM, retain the ability to form the backbone of CA task
forces in order to enhance a supported commander’s mission of stabilization. TG, CNDE, CKI, and CMI are
essential to effective stabilization efforts. As such, a CA task force empowers the commander with proactive
and responsive CAO leading to consolidated gains and preservation of combat power for the supported
commander to use in offensive or defensive operations elsewhere in the AO.
4-131. CA task forces are capable of command and control over CA forces and partner elements needed
to—
* Increase governance capacity.
* Increase civil security.
* Increase civil control.
* Restore essential services.
* Respond to humanitarian needs.
4-132. When working in joint environments, CA elements also maintain the ability to form the backbone
of a JCMOTF. As a supporting commander, the CA task force commander ascertains and fulfills the needs
of the supported commander within the imposed parameters. The CA task force commander determines the
type of force, employment, and procedures to accomplish the support.
JOINT CIVIL-MILITARY OPERATIONS TASK FORCE
4-133. The JCMOTF is a special-purpose task force made up of units from two or more Services. JFCs may
establish a JCMOTF when the scope of CMO requirements and activities are beyond the organic capability
of the JFC. The JCMOTF is flexible in size and composition.
4-134. CA commands and brigades can be task organized to form the core of a JCMOTF, and although it
is not strictly a CA organization, a CA officer may command the JCMOTF. The JCMOTF will also most
likely have CA units as subordinate elements. The JCMOTF plans, prepares, executes, and continually
assesses CMO in a theater of operations or joint operations area. The expertise of CA personnel in dealing
with government organizations, international organizations, NGOs, and IPI, greatly enhances the opportunity
for success. A JCMOTF may have both conventional forces and SOF assigned or attached to support the
conduct of specific missions. If the JFC properly charters and establishes the JCMOTF, it must meet the
criteria established in JP 3-33. |
3-57 | 100 | Chapter 4
Transfer in Afghanistan
The fall of Kandahar and Kabul in November of 2001 marked the collapse of the
Taliban government and disintegration of its fighting forces. While the organization of
the Afghan Interim Authority was taking place, JSOTF-North consolidated the
stabilization effort by assigning UW to the three 5th SFG battalion commanders.
The Special Operations Command and Control Elements (SOCCEs) were formed to
better control operations by various Alliance warlords and to reduce bypassed pockets
of Taliban and al-Qaeda resistance around Tora Bora in eastern Afghanistan.
A second Ranger parachute assault (Objective Bastogne) seized a remote airfield to
support ARSOF attack helicopter operations. Destroying al-Qaeda leaders became a
secondary mission for JSOTF-North under the new functional alignment directed by
SOCCENT. That was to be the primary mission of the new JSOTF-South. The ADVON
of that headquarters relocated to Kandahar Air Base when Marine Corps forces at
Objective Rhino moved there. The 10th Mountain Division left K2 for Bagram Air base,
south of Kabul. Just days after Hamid Karzai became interim prime minister, the Joint
Civil Military Operations Task Force was established in Kabul to direct and coordinate
civil and humanitarian affairs in rebuilding Afghanistan. In mid-January 2002, TF
Rakkasan from the 101st Airborne Division deployed to Kandahar Airport to replace
the Marines…
…3rd SFG at Fort Bragg had been alerted to replace 5th SFG in the combat zone, and
19th and 20th SFG (ARNG) battalion staffs and ODAs were arriving in theater.
Mobilized USAR CA and PSYOP units had been “earmarked” to replace Active Army
forces in theater…
Weapon of Choice: ARSOF in Afghanistan
CMH Pub 70-100-1
4-135. The JFC may establish a JCMOTF to accomplish a specific contingency mission with a civil-military
nature (such as FHA, PRC or transitional military authority) and/or to provide CMO support to U.S. or
coalition military forces conducting military operations. Service component and other task force commanders
are still responsible for accomplishing the CMO—that is within their ability—in their AOs. When their need
exceeds their capability, a JCMOTF assists in meeting the shortfall. A JCMOTF can—
* Be a stand-alone JTF or a subordinate unit in a JTF.
* Assist JTF unit commanders when their organic ability cannot meet the CMO needs of their joint
operations area.
* Provide linkage between the JTF and nonmilitary agencies operating in the joint operations area
through a CMOC.
* Advise the JTF commander on policy; funding; multinational, foreign, or host-nation sensitivities;
and their effect on theater strategy and/or campaign and operational missions.
* Provide command and control or direction of military host-nation advisory, assessment, planning,
and other assistance activities by joint U.S. forces.
* Assist in establishing U.S. or multinational and military-to-civilian links for greater efficiency of
cooperative assistance arrangements.
* Perform essential coordination or liaison with host-nation agencies; country teams; United Nations
agencies; and deployed U.S. multinational, host-nation military forces, and their supporting
logistic organizations.
* Assist in the planning and conduct of civil information programs to—
Publicize positive results and objectives of military assistance projects.
Build civil acceptance and support of U.S. operations.
Promote local capabilities contributing to recovery and economic-social development.
* Plan and conduct joint and combined CMO training exercises.
* Advise and assist in strengthening or stabilizing civil infrastructures and services. |
3-57 | 101 | Operations Structure
* Assess or identify host-nation support, or relief capabilities and funding requirements to the—
Commander.
JTF for transmission to supporting commanders.
Services.
Other responsible USG departments or agencies.
* Facilitate transition to peacekeeping or consolidation operations and associated hand-off to other
government agencies, international organizations, or host-nation responsibility.
4-136. A JCMOTF should not—
* Be the CMO staff augmentation for a JTF.
* Have the primary responsible force for accomplishing all CMO in the joint operations area when
subordinate to a JTF.
* Eliminate the need for all units to train for CMO.
* Eliminate the need for all commanders in the joint operations area to plan and conduct CMO.
Note: JP 3-57 and JP 3-33 provide additional information on the establishment of a JCMOTF and
its capabilities. |
3-57 | 103 | Chapter 5
Unified Action
Commitment to interorganizational cooperation can facilitate cooperation in areas of
common interest, promote a common operational picture, and enable sharing of critical
information and resources.
JP 3-08, Interorganizational Cooperation
Unified action is the synchronization, coordination, and/or integration of the activities of
governmental and nongovernmental entities with military operations to achieve unity of
effort (JP 1). Unity of effort is coordination and cooperation toward common objectives,
even if the participants are not necessarily part of the same command or organization,
which is the product of successful unified action (JP 1). Unified action partners are those
military forces, governmental organizations and NGOs, and elements of the private
sector with which Army forces plan, coordinate, synchronize, and integrate during the
conduct of operations. Military forces play a key role in unified action before, during,
and after operations.
OVERVIEW
5-1. CA plays an integral role in the coordination of military actions with unified action partners. CA forces
can provide for better local governance (thereby, relieving commanders of the burden of civil security and civil
control), develop networks, share information with interagency and interorganizational partners, and integrate
civilian and military actions. CA forces contribute to unified actions through integration, coordination, and
synchronization with interorganizational partners, joint forces, and interagency partners.
INTERORGANIZATIONAL COOPERATION
5-2. Interorganizational cooperation refers to the interaction that occurs among elements of the Department
of Defense; participating United States Government departments and agencies; state, territorial, local, and
tribal agencies; foreign military forces and government agencies; international organizations;
nongovernmental organizations; and the private sector (JP 3-08). The proper execution of interorganizational
cooperation leads to unity of effort through identifying common objectives and building a common
understanding. CA forces are integral to this effort through their mandate to interact with civilian populations,
organizations, and agencies. Inter-organizational cooperation refers to the interactions between DOD,
participating USG departments and agencies, and:
* Domestic governments such as—
State.
Territorial.
Local.
Tribal.
* Multinational Elements, including—
Foreign military forces.
Foreign government agencies.
* International organizations. |
3-57 | 104 | Chapter 5
* NGOs.
* The private sector, including—
Multinational corporations.
Academia.
Operational contract support.
5-3. CA forces form a critical point in the interaction between U.S. forces and interorganizational partners.
This is due to the training that CA forces receive in governance and governmental sector expertise, regional
expertise, cultural understanding, and language capabilities. CA forces utilize this interaction to help create
a common understanding of the OE. Interorganizational partners can provide local information which may
be available through military channels. This information highlights—
* Historical perspectives and insight.
* Local cultural practices.
* Local political structure, political aims of various parties, and the roles of key leaders, which are used
to corroborate information provided by Service intelligence and non-intelligence organizations.
* Security situation.
* Role and capabilities of the host-nation government.
5-4. Through development of local civil networks, CA elements are able to increase the capabilities of local
governance and add to the common understanding that is essential to unified action. Through CKI and CMI,
CA forces collect civil information, produce civil knowledge products, and integrate and share those products
in order to increase shared understanding and integrate, coordinate, and synchronize all elements to achieve
unity of effort. Through TG, CA elements are able to build local governance capacity in order to enable
strengthened local efforts leading to more capable and reliable interorganizational partners.
5-5. One of the most important elements for interorganizational cooperation is a CMOC. The CMOC is the
meeting place of stakeholders. It may be physical, virtual, or conducted collaboratively through online
networks, or by intermediates (as NGOs may be reluctant to conduct coordination meetings in settings
managed by the military). At the joint level the CMOC is formed to:
* Execute the CMO guidance of the JFC.
* Provide liaison with departments, agencies, and organizations.
* Provide a forum for organizations that want to discuss CMO issues and raise concerns, yet
maintain their neutrality. Many of these organizations consider the CMOC as a venue for
stakeholder discussions but not a stakeholder decision-making forum.
* Receive, validate, and action requests for support from NGOs, international organizations, and the
private sector. The CMOC then forwards these requests to the joint force for action.
Note: JP 3-08 provides more information on interorganizational partners.
Note: CA forces interact with multinational partners in support of interorganizational cooperation,
and these partners are not always able to receive classified information. CA forces should make
every effort available to reduce classification of civil knowledge products that are needed for
interorganizational cooperation. Proper foreign disclosure practices must be executed by CA
organizations (beginning at the lowest level possible) to ensure timely dissemination of civil
knowledge products to interorganizational partners. |
3-57 | 105 | Unified Action
Operation DESERT STORM – Kuwait
Strategic planners of Operation DESERT STORM initially focused exclusively on the
requirements for combat operations, intending to plan the post-conflict phase when
combat operations were over. The timeline for post-conflict planning was sped up when,
two months after the Iraqi invasion and occupation of Kuwait on 2 August 1990, the
Kuwaiti government-in-exile requested assistance from the U.S. Department of State
(DoS) to establish a reconstruction planning structure. Following a briefing on U.S. Army
Civil Affairs capabilities by a member of the Joint Staff at the Pentagon, the Kuwaiti
contingent petitioned President Bush for CA support to help restore their country. By
December 1, 1990, members of the 352d CA Command and the 354th CA Brigade—
units mission-focused on the CENTCOM area of operations—mobilized at the U.S. Army
Reserve Center in Riverdale Park, MD, to execute this mission. The Kuwait Task Force
(KTF), as it was called, was comprised of 57 specially selected officers representing 20
distinct roles of governance organized under the areas of government, economics and
commerce, public facilities, and special functions. Among these veterans of the 1989
Panama restoration effort were highly qualified CA Soldiers whose professional skills
matched perceived shortfalls, including the Director of USAID’s Office of Foreign
Disaster Assistance (OFDA) and a senior official of the Justice Department.
Working with representatives of 27 different U.S. government agencies and their Kuwaiti
counterparts, the KTF developed plans for executing due process of law regarding
suspected Iraqi sympathizers, addressing possible sabotage done by the Iraqis,
rebuilding electrical grids, dealing with potential oil fires, furnishing needed food and
medicine, and other issues that were codified in Annex G, Civilian Action Plan, which
was designed to become part of the USCENTCOM operational plan. The KTF also
identified reliable contractors, developed workable procedures, and focused on the
sequencing of post-conflict actions for Kuwaiti reconstruction. Upon its arrival in Saudi
Arabia in early February 1991, the KTF was assigned to the Combined Civil Affairs Task
Force (CCATF) under its parent unit, the 352d CA Command, which, in turn, was
assigned to Task Force Freedom, a composite service support unit commanded by the
Deputy Commanding General of Army Central (ARCENT). Within the mission structure
of Task Force Freedom, the KTF was instrumental in restoring 50 percent of the
telecommunications and transportation systems in Kuwait and repairing 30 percent of
the devastated electrical grid within one month after the end of combat operations. Not
one Kuwaiti died from thirst, starvation, or lack of medical attention after the liberation
and there were virtually no acts of retribution or vigilantism directed against suspected
collaborators. By the time the KTF departed, the Kuwaiti medical system was operating
at 98 percent of its pre-war capacity, the international airport was re-opened, and the
police force was fully operational. All major roads and one port were opened while two
other ports were being swept of mines. Although the government of Kuwait requested
that the KTF remain until December 1991, it was redeployed with is parent unit, the
352d CA Command, on May 10th of that year
The Kuwait Task Force: Postconflict Planning and Interagency Coordination,
Center for Complex Operations, 2010
JOINT OPERATIONS
5-6. Joint operations are military actions conducted by joint forces and those Service forces employed in
specified command relationships with each other, which of themselves, do not establish joint forces (JP 3-0).
A joint force is a force composed of elements, assigned or attached, of two or more Military Departments
operating under a single joint force commander (JP 3-0). Almost all military actions interact with the civilian
population or affect the civilian population, and it is important to ensure proper civil-military interactions
for all operations. U.S. Army CA constitutes the largest proportion of CA forces among the separate |
3-57 | 106 | Chapter 5
branches of the U.S. military. As such, U.S. Army CA often take on a significant portion of joint CA
missions and must plan accordingly.
5-7. When the Army supports the joint force in competition, its role is to shape the OE and prevent conflict
by supporting the theater campaign plan of the JFC. The Army does this by supporting security cooperation.
The primary purpose of supporting security cooperation is to build relationships and gain access. The
secondary purpose is to promote regional stability. Security cooperation is a primary stability operations task.
Security cooperation initiated with partner nations promotes regional stability by deterring potential threats.
Note: FM 3-22 and ADP 3-07 provide more information on Army support to security cooperation
and stability operations respectively.
CIVIL-MILITARY OPERATIONS DIRECTORATE OF A JOINT
STAFF
5-8. The J-9 is the principal staff organization in a joint force command responsible for CMO planning.
The J-9 in normally attached or assigned to the supported command to enable the commander and staff in the
conduct of CMO. The J-9, in conjunction with other CA forces, execute CMI to synchronize, coordinate, and
integrate all military forces and civil entities within a given AO to achieve unity of effort. The J-9—
* Establishes civil-military relationships with—
The interagency.
International organizations.
NGOs.
IPI.
* Performs civil-military knowledge management.
* Plans support for civil-military enabling operations.
* Integrates military and civilian organizations that influence operations or campaigns and seeks to
promote stability and achieve unified action.
* Provides a conduit for—
Sharing civil-military information.
Coordinating support requests and activities.
Compiling and analyzing relevant information.
Performing analysis and evaluation that supports the commander’s assessment.
* Plans the actions of various Service capabilities that enable the joint force to achieve CMO
objectives.
5-9. Responsibilities of the J-9 include:
* Serving as staff lead for the organization, employment, and integration of Service CA, military
police, medical, engineer, and any other Service capabilities to conduct CMO.
* Establishing liaison, as needed, with interagency partners, international organizations, NGOs, and
IPI.
* Providing staff oversight to the CMOC, humanitarian assistance coordination center, joint
interagency task force, or joint interagency coordination group—if established by the joint force
command.
* Developing Annex G (Civil-Military Operations) and assisting in the development of Annex V to
joint operations plans, concept plans, and operation orders.
* Providing civil considerations input and coordinating with the country team, J-3, staff judge
advocate, Service component commands, HN, and IPI in the development of transitional public
security.
* Coordinating with the comptroller and staff judge advocate to obtain advice on proposed
expenditures of allocated funds dedicated to CMO. |
3-57 | 107 | Unified Action
* Facilitating the movement, security, and control of funds to subordinate units and coordinating with
the funds controlling authority and financial manager to meet the objectives of the commander.
* Planning and supporting transitions (such as terminated, transferred to follow-on forces, or
transitioned to USG departments and agencies, IPI, or international organizations), as required.
* Providing expertise and support to the joint interagency coordination group or joint interagency
task force, if either is part of the joint staff.
* Managing collection and integration of civil knowledge in the operational area of the supported
commander.
* Coordinating with the J-2 for the integration of civil knowledge into the joint intelligence
preparation of the OE.
* Coordinating with the comptroller for the disposition of funding for CMO and foreign assistance.
* Coordinating with the J-4 and IPI for host-nation support.
* Coordinating with the J-2 and J-5 to support center of gravity analysis.
* Coordinating with the political advisor of the joint force commander to develop policy for the
implementation of transitional military authority.
* Coordinating with the staff, country team, CMOC, joint interagency coordination group, joint
interagency task force, humanitarian assistance coordination center, humanitarian operations
center, and IPI to ensure planning and execution of FHA.
* Coordinating with the staff, country team, CMOC, joint interagency coordination group, joint
interagency task force, and IPI to ensure planning and execution of foreign assistance.
* Coordinating with the staff, country team, CMOC, joint interagency coordination group, joint
interagency task force, and IPI to ensure planning and execution of PRC.
* Coordinating with the staff, country team, special operations component command, CMOC, joint
interagency coordination group, joint interagency task force, and IPI to ensure planning and
execution of CME.
* Coordinating with the country team, J-3, J-4, staff judge advocate, Service component commands,
partner nation, and IPI for various permissions and agreements, to include—
Access.
Status of forces.
Overflight.
Frequency usage.
Land use.
* Participating in the targeting process.
5-10. The J-9 is responsible for Annex G to operation plans, concept plans, and operation orders. Annex G
promulgates CMO requirements in a formal plan or operation order. CMO require coordination among CA,
maneuver, health support, military police, engineer, transportation, and SOF. CMO also involve interaction
between staff sections and subordinate units. Annex G identifies, consolidates, and deconflicts the activities
of the various sections and units. Planning and coordination at lower echelons require significantly more
details than discussed in Annex G.
Note: CJCS GDE 3130 and JP 3-57 provide additional information on Annex G.
THEATER CIVIL AFFAIRS PLANNING TEAM
5-11. At geographic combatant commands that have an established J-9, the theater CAPT is a complementary
capability and serves to strengthen the directorate’s efforts. The J-9 and theater CAPT develop, integrate,
synchronize, and coordinate CMO plans, policies, programs, and operations in coordination with theater-
aligned CA forces and interagency entities. These are integrated with, and enhance the strategic plans,
campaigns or operations, and theater security cooperation initiatives of the geographic combatant command. |
3-57 | 108 | Chapter 5
JOINT TASK FORCE
5-12. Just as in the military decision-making process, CA Soldiers on the J-9 staff provide the commander with
an analysis of the civil components that shape the OE during the joint planning process. While not all geographic
combatant commands have this staff section organic to their joint manning document, CA has the capability to
provide persistent or episodic planning elements to assist any level JFC with integrating CMO into plans.
5-13. Civil considerations are evaluated for those aspects of the OE that directly affect a mission. The CMO
staff provides the commander with detailed civil considerations analysis focused on the civil component of the
AO. CMO planners further develop and implement their plans in conjunction with civilian officials from other
USG agencies and other nonmilitary organizations in order to synchronize U.S. and multinational efforts. The
J-9 responsibilities include, but are not limited to—
* Determining if there is a requirement for a CMOC to maintain liaison with unified action partners,
IPI, interagency, NGOs, and international organizations in the AO.
* Advising the JFC and staff on legal and moral considerations as they pertain to the civil
component.
* Participating in the targeting process.
* Ensuring CMO is synchronized with IO.
* Analyzing the effects of civilian populations on military operations.
* Analyzing the effects of military operations on the civil component.
* Assessing the host-nation resources to support military operations.
* Identifying nongovernmental and other independent organizations operating in the AO.
* Recommending CA force requirements.
* Participating in required boards, cells, and working groups, as required.
* Maintaining the CMO staff estimate.
* Developing Annex G.
* Assisting the J-3 with development of Annex V.
Note: JP 5-0 provides the doctrinal discussion, process, and formats for joint planning.
CIVIL-MILITARY OPERATIONS PLANNING CONSIDERATIONS
5-14. In order to plan successful CMO, CA planners must consider all aspects of the civil component, the
national security policy and objectives, and national and theater military objectives. Although the following
list is not intended to be all-inclusive, CA planners must consider—
* Host-nation and regional legal institutions, customs, social relationships, economic organizations,
and concepts of human and fundamental rights.
* Input to the development of transitional public security planning and execution.
* Public education.
* Cultural and religious leaders.
* Public health and sanitation.
* Labor, procurement, and contracting leaders.
* DC care and control, civilian supply, public safety, transportation, and humanitarian relief.
* International laws, customs, and practices governing the sovereign territory of each nation.
* The use of water, air, and land as it relates to the IPI.
* The ability to communicate with IPI.
* Criminal activities and the informal economy impacting the economic environment.
* Competing requirements and agendas of multiple stakeholders.
* Administrative, logistic, and communications support requirements of CMO forces.
* The need for early deployment and employment of CMO forces. |
3-57 | 109 | Unified Action
* The coordination of CMO requirements with other appropriate staff functions, the interagency,
international organizations, NGOs, HN, and private sector.
* Additional lead time normally necessary for the availability of reserve component forces.
* CMO input to the targeting process will help reduce destruction of essential civilian capabilities
needed during stabilization.
* The tactical, operational, and strategic objectives achievable via CMO.
* Recommendation of the formation of a JCMOTF, as required.
* Crop cycles of the HN.
* Historical events and local holidays of the HN.
CIVIL-MILITARY OPERATIONS WORKING GROUP
5-15. Commanders establish CMO working groups to bring all the stakeholders in CMO together to focus
and synchronize their efforts in achieving the CMO priorities of the commander. In addition to the CMO
working group, the CAO or CMO planners ensure that they are actively involved in the IO working group;
the intelligence fusion working group; the targeting board; and other boards, cells, and working groups
relevant to the current operation.
5-16. The composition of the CMO working group changes based on level of command but the lead CMO
planner (J-9, G-9, or S-9) should chair the group. Other members of this working group may include the
following:
* Director of the CMOC.
* Subordinate CA unit representative.
* PSYOP staff.
* IO representative.
* Medical representative.
* Engineer representative.
* Provost marshal or representative.
* Staff judge advocate representative with expertise in CMO, preferably the unit’s senior rule of law
officer.
* Chaplain or religious affairs noncommissioned officer.
* Interagency representative, if applicable.
* Political advisor, if applicable.
* Public affairs officer.
* J-2, G-2, or S-2 targeting officer representative.
* J-3, G-3, or S-3 current operations representative.
* J-4, G-4, or S-4 representative.
* Resource management representative.
* Subordinate liaison officer. |
3-57 | 110 | Chapter 5
Civil-Military Operations Working Groups in Operation ENDURING FREEDOM
During Operation ENDURING FREEDOM (May 2004 through March 2006), the
Combined Joint Special Operations Task Force-Afghanistan recognized the need to
secure the Shur Ghar Pass in southern Afghanistan. Close collaboration between CA,
coalition forces, IPI, NGOs, international organizations, USAID, DOS, the
U.S. Department of Agriculture, the UN, and others produced an excellent example of
a civil-military operations working group.
The Shur Ghar Pass is in central Zabul Province in southern Afghanistan. The pass
sits in a mountain range that splits the province. The surrounding mountains make
approaches to the pass unobservable. In addition, the rock-strewn sand road makes it
an ideal location for improvised explosive devices and ambushes. Several coalition
soldiers lost their lives in the pass due to these threats.
Through numerous civil-military operations working groups at Kandahar Air Base and
Zabul Province, CA Soldiers from the 96th CA Battalion (A) and coalition forces
prepared a concept to secure the Shur Ghar Pass. The concept included placing
Afghan police in the pass, building a hardened police barracks compound, and
instituting numerous police checkpoints. Personnel secured Commander’s Emergency
Response Program (CERP) funding to build the police barracks and checkpoints in the
pass. CA Soldiers supporting the task force coordinated with the commander of joint
task force 76 to use CERP funding provided by the provincial reconstruction team
(PRT) in Qalat, the capital of Zabul Province. CA forces eventually transferred the plan
to the commander of Joint Task Force 76, specifically 3d BCT, 25th Infantry Division,
and the Qalat PRT. The DOS contractors from DynCorp ran a police training program
in Zabul, in conjunction with the 3d BCT, 25th Infantry Division that produced trained
police to staff the pass.
When the 3d BCT, 25th Infantry Division redeployed, the plan to secure the Shur Ghar
Pass was transferred to the 173d (A) BCT. The 173d (A) BCT dedicated virtually all its
engineer assets to complete the initial road cut and base course. With approval from
the commander of Joint Task Force 76, the Qalat PRT funded road construction
equipment and a rock crusher and was able to provide training for Afghans to operate
them. USAID agreed to fund an asphalt-finish topcoat using a private contractor to
pave the road.
This collaborative effort took over a year from conception to completion. It involved
civil-military operations working groups at the strategic, operational, and tactical levels
and was composed of elements from SOF and conventional forces, USAID, the DOS,
the government of Afghanistan, and others to make it successful. The net result
produced secure access to southern Afghanistan for coalition and Afghan security
forces. It stimulated the economy in Zabul Province and southern Afghanistan, and
legitimized the local governments, the provincial government, and the government of
Afghanistan.
JOINT INTERAGENCY COORDINATION GROUP
5-17. The joint interagency coordination group is a staff group that establishes regular, timely, and
collaborative working relationships between civilian and military operational planners (JP 3-08).
Note: JP 3-08 provides additional information on the joint interagency coordination group.
5-18. A CACOM has the capabilities to provide theater-level analysis of civil considerations in coordination
with the joint interagency coordination group (or equivalent organization) and to develop strategic-level civil
input to the supported JFC. A J-9 staff section plans, coordinates, and provides staff oversight of CMO and
civilian component issues through direct coordination with the J-3 of the supported unit. Throughout the |
3-57 | 111 | Unified Action
process, the plans officer of the CACOM staff continuously ensures the fusion of the civil inputs received
from subordinate CA elements, maneuver elements, USG agencies, NGOs, international organizations, and
host-nation sources to the common operational picture of the JFC. The integration of CMO into the staff or
working group is imperative. The capabilities of the private sector partnership, when orchestrating
interagency coordination, is extremely valuable.
CIVIL-MILITARY ENGAGEMENT
5-19. CME is part of the DOD’s strategy, to building partner nation capacity in a preventive, population
centric, and indirect approach to enhance the capability, capacity, and legitimacy of partnered indigenous
governments. It is persistent engagement conducted by, with, and through unified action partners to shape
and influence the IPI within the OE in support of the campaign plans of the commander and the campaign
support plan of the theater special operations command (TSOC). CME is also and executed in conjunction
with U.S. embassy strategies. The conduct of CME—
* Increases the capability of USG-supported IPI.
* Reduces the influence of malign actors within targeted countries and regions.
* Leverages civil vulnerabilities and resiliencies within the OE.
5-20. CME identifies and addresses critical civil strengths and vulnerabilities in under-governed and
ungoverned areas or high-threat environments where host-nation authorities, the country team, or USAID
cannot operate. These objectives are accomplished through the conduct of CAO during the execution of the
following CME program key tasks:
* CR. CME elements conduct CR to observe and evaluate specific aspects of the civil environment
to fulfill information requirements. CME practitioners must understand the overall preparation of
the environment plan during the conduct of CR. By planning and executing targeted CAO that
influences unified action partners and IPI relationships and resources, CA elements help shape the
OE, thereby contributing to preparation of the environment efforts.
* Network Analysis. Regional and theater civil-military support elements (CMSEs) conduct
network analysis and evaluation to identify critical and relevant nodes. This is done by using
CNDE and CKI to partner with friendly networks and engage neutral networks in order to counter
threat networks. Network analysis is executed with the purpose of determining, analyzing, and
evaluating links between these nodes as a means of gaining an understanding of a group, place,
physical object, or system.
* Network Engagement. Regional CMSEs and CMSEs conduct network engagement to engage
critical nodes within friendly and neutral networks in order to counter threat networks. All the data
and information gathered through CR and CE are used during the CKI process. Network
engagement is conducted continuously and simultaneously at all levels of warfare to help achieve
the commander’s objectives within the OE.
* Interorganizational Cooperation. Inter-organizational cooperation enables unity of effort,
common objectives, and a common understanding by synchronizing actions. It facilitates
cooperation in areas of mutual interest, promotes a common operational picture, and enables the
sharing of critical information and resources that contribute to economy of force in accomplishing
TSOC objectives.
* Capacity Building. Capacity building develops the capability and capacity—within friendly and
neutral networks—to counter malign actor influence and activities. Capacity building increases
host-nation government and military capacity to reduce the causes of instability, thereby denying
malign actor influence. |
3-57 | 112 | Chapter 5
5-21. The CME program consists of four distinct capabilities-based, task-organized units of action.
These units of action include:
* CMSE. A civil-military support element is a task-organized Civil Affairs force established to
plan, facilitate, and execute Civil Affairs operations in support of civil-military engagement
in a specified country, region, or theater. The CMSE is primarily sourced by a special operations
CAT. Through CAO, the CMSE conducts planned and targeted CR and CE, engaging networks
to affect the behavior and will of relevant actors, audiences, and adversaries in the OE in support
of combatant command campaign plans, the TSOC campaign support plan, and in conjunction
with U.S. embassy strategies.
* Regional CMSE. The regional CMSE conducts network engagement and analysis within a
subordinate command architecture to the TSOC, and is primarily sourced by a special operations
CA company. It conducts tactical to operational level human network analysis to comprehensively
study and understand the relationships of networks to support preparation of the environment.
The regional CMSE is a task-organized unit of action based upon mission specific requirements
with the ability to conduct command and control of the CME elements in their assigned region to
achieve desired effects.
* Theater CMSE. The theater CMSE is primarily sourced by elements from a special operations
CA battalion headquarters and is filled based upon specific mission requirements. It conducts and
integrates network analysis into the joint planning process, joint intelligence preparation of the
OE, and the joint targeting cycle. The theater CMSE is collocated with a theater-level special
operations command and control node. It also has the ability to conduct command and control of
the CME elements in their theater to achieve desired affects.
* Trans-Regional CME Element. The trans-regional CME element is sourced from special
operations CA personnel assigned to USSOCOM who carry out their duties at interorganizational
partners in USSOCOM-identified priority locations. This unit of action is tasked with developing
and maintaining long-term relationships through an enduring presence across the unified action
partner network to enhance trans-regional synchronization and improve inter-organizational
cooperation.
5-22. Trans-regionally and persistently engaged CME elements conduct targeted CAO to increase the
capability of USG-supported IPI and to reduce the influence of malign actors within targeted countries and
regions. These elements leverage civil vulnerabilities and resiliencies within the OE in support of the
campaign plans of the CCDR and the TSOC campaign support plan, and in conjunction with U.S. embassy
strategies.
INTERAGENCY COORDINATION
5-23. Interagency coordination is the cooperation and communication that occurs between agencies of the
USG, including the DOD, to accomplish an objective. The accomplishment of strategic objectives identified
in U.S. national security policy requires a whole-of-government approach that achieves unity of effort.
The Tsunami Relief Disaster in the Indian Ocean
The Indian Ocean tsunami disaster-relief effort at the end of 2004 is a good example
of interagency cooperation, collaboration, and communication. As both DOD and
OFDA rapidly responded to the disaster areas, both realized the need for close
cooperation and coordination. OFDA dispatched liaison officers at the tactical level to
CMOCs operating in Sri Lanka, Indonesia, and Thailand, as well as at USPACOM.
The DOD similarly embedded liaison officers at OFDA’s response management team
in Washington, DC. These steps greatly simplified the request for assistance process
from international organizations and NGOs and increased the ability of both
organizations to respond effectively and quickly to those affected by the disaster.
FM 3-05.401, Civil Affairs Tactics, Techniques, and Procedures |
3-57 | 113 | Unified Action
Note: FM 3-05.401 is an obsolete publication, which provides historical reference and is listed in
the Obsolete Publications section of the references for this FM.
5-24. CA forces enable interagency coordination through organizational structures at the strategic,
operational, and tactical levels including—
* J-9.
* Theater CAPT.
* G-9.
* CAPT.
* S-9.
* CMOCs.
* Civil-military advisory group.
* Theater CMSE.
* Regional CMSE.
* Civil liaison teams (CLTs).
* CMSE.
* CATs.
Note: JP 3-08 provides additional information regarding interagency coordination.
5-25. The DOS is the lead entity when coordinating between interagency partners of any given country.
The DOS is also the lead in establishing an international agreement. The DOD and its components are
governed by international agreements under DODI 5530.3 (figure 5-1, page 5-12), and that authority is
limited under Title 22, Code of Federal Regulations, Part 181.
5-26. When not engaged in a forcible entry, invasion, or occupation, military forces are not permitted in
foreign countries in their official capacity without authority being advanced through an international
agreement or country clearance of some type. Access granted by the permissions manager is designated as
part of joint deployment and redeployment operations. Therefore, they must be addressed in a bilateral or
multilateral agreement, which is consummated by the U.S.
5-27. Contingency basing (agreement to stay in a country) must be negotiated with a foreign country unless
basing is being established through forcible entry and establishing a lodgment. Such basing can be authorized
through a bilateral agreement also called a defense cooperation agreement. It can also be negotiated through
a status-of-forces agreement or a “diplomatic note”. These international agreements are sometimes referred
to as host-nation agreements or host-nation support agreements or diplomatic agreements in common usage.
In such agreements use of existing HN, host country, or partner nation bases can be utilized. If new
construction is occurring or land is set aside for U.S. forces, it usually requires a separate land use agreement.
Note: See JP 3-0, JP 3-34 and JP 3-35 for more information about deployment and redeployment,
joint engineer operations, and joint operations. |
3-57 | 114 | Chapter 5
International Agreements (DODI 5530.3)
An international agreement is any agreement concluded with one or more foreign governments
(including their agencies, instrumentalities, or political subdivisions) or with an international
organization, that—
Is signed or agreed to by personnel of any DOD component, or by representatives of the
DOS or any other Department or Agency of the U.S. Government.
Signifies the intention of its parties to be bound in international law.
Is denominated as an international agreement or as a memorandum of understanding,
memorandum of agreement, memorandum of arrangements, exchange of notes,
exchange of letters, technical arrangement, protocol, note verbal, aide memoire, agreed
minute, contract, arrangement, statement of intent, letter of intent, statement of
understanding or any other name connoting a similar legal consequence.
Any oral agreement that meets the criteria set forth in DODI 5530.3 is an international agreement.
The DOD representative who enters into the agreement will cause such agreement to be reduced
to writing.
During a state of war, the Law of War (codified in the Geneva-Hague Conventions), permits local
“special” agreements in some cases, that are necessitated by interaction at the tactical and
operational level.
The following are not considered to constitute international agreements for the purposes of this
Directive:
Contracts made under the Federal Acquisition Regulations.
Foreign Military Sales Credit Agreements.
Foreign Military Sales Letters of Offer and Acceptance and Letters of Intent.
Standardization agreements, quadripartite standardization agreements, Army Service
component command air standards, and naval standardization agreements in accordance
with DODI 5530.3.
Leases under Title 10, United States Code, Sections 2667 and 2675 (reference [f]), and
Title 22, United States Code, Section 2796 (reference [l]).
Agreements solely to establish administrative procedures.
Acquisitions or orders pursuant to cross-servicing agreements made under the authority of
the North Atlantic Treaty Organization Mutual Support Act (Title 10, United States Code,
Section 2321 et seq. (reference [f]) and DODD 2010.9 (reference [m]). (Umbrella
agreements, implementing arrangements, and cross-servicing agreements under the North
Atlantic Treaty Organization Mutual Support Act are international agreements.)
Figure 5-1. International agreements according to Department of Defense Issuance 5530.3
5-28. DODI 5530.3 governs the DOD responsibilities regarding such agreements. In essence, the DOD
defers to the DOS in the negotiation of international agreements and it binds the DOD to adhere to such
agreements.
5-29. CA forces, in conjunction with the judge advocate general, must understand these agreements in order
to advise commanders on what their forces can and cannot do in keeping with the U.S. obligations to an HN,
or partner nation. This advice would also include the interaction of U.S. forces with IPI or other foreign
nationals. CA forces also play a significant role in achieving unified action and integrating, coordinating, and
synchronizing with civilian entities in keeping with the international agreements.
5-30. International agreements can be bilateral (between the U.S. and a partner nation) or multilateral (such
as the North Atlantic Treaty Organization). Bilateral agreements can be negotiated on any number of
international matters—to include economic, trade, or defense cooperation. Bilateral defense cooperation
agreements are referred to as defense cooperation agreements or less formal agreements can be negotiated as
simply diplomatic notes exchanged between foreign ministers. |
3-57 | 115 | Unified Action
Note: U.S. DOS Foreign Affairs Manual, Correspondence Handbook, describes the use of
diplomatic notes (5 FAH-1).
5-31. Commanders have limited authority to negotiate or interact at a tactical or operational level. Such
interaction is limited to special agreements as addressed under the law of war. Such agreements are typically
verbal and must not have an adverse effect on protected persons (such as prisoners of war or civilians).
Special agreements are binding between those governments or military commanders that made the
agreements. When engaging the civil component, CA Soldiers often negotiate and make agreements with
segments of the populations, HN, or partner nation institutions.
THE ROLE OF UNITED STATES EMBASSIES
5-32. An embassy is the headquarters for USG representatives serving in a foreign country. It is normally
led by an ambassador, who is the representative of the U.S. President to the host country. An embassy is
normally located in the capital city. It may have branches, known as consulates, in other cities.
5-33. U.S. embassies and consulates abroad, and foreign embassies and consulates in the United States, each
have special status. While the host government is responsible for the security of U.S. diplomats and the area
around an embassy, the embassy belongs to the country it represents. Representatives of the host country
cannot enter an embassy without permission—even to put out a fire—and an attack on an embassy is
considered an attack on the country it represents.
5-34. The ambassador, also known as the chief of mission, is the highest-ranking diplomat to the host country
and is the personal representative of the President. This person is comparable to a CEO of a corporation and
has to be a strong leader and a good manager. The ambassador is supported by a deputy, known as the deputy
chief of mission, and a team of U.S. foreign service officers and specialists from the DOS. The ambassador
may also be supported by representatives from other U.S. agencies, such as the USAID DOD, Department
of Commerce, Department of Justice, Department of Homeland Security, and so on. No matter their agency,
all employees work under the direction of the ambassador.
5-35. The primary purpose of an embassy is to assist American citizens who travel to or live in the host
country. U.S. Foreign Service Officers also interview citizens of the host country who wish to travel to the
U.S. for business, education, or tourism purposes. Embassy staff interact with representatives of the host
government, local businesses, nongovernmental organizations, the media and educational institutions, and
private citizens to increase understanding of the U.S. and its policies and to collaborate on shared interests.
5-36. Embassy staff analyze the political and economic situation in the host country and report back to the
DOS on issues that affect the United States. They help U.S. businesses find partners and customers, and may
train the police and military of the host government to support better security in the country. They also
sponsor educational, professional, and cultural exchanges to introduce emerging and established leaders to
the U.S., and to promote ties between U.S. and foreign students, academics, scientists, entrepreneurs,
political, religious, and civil society figures.
5-37. While Americans work at embassies and consulates, most of the staff comes from the host country.
These employees are essential to the success of any embassy because they know the local culture, have
essential skills, or are well-connected to government and civil society leaders.
5-38. A large embassy may have annexes. The main embassy building is called the chancery. As the public
face of the U.S., it is often an architectural work of art. In some countries, American staff may live on the
embassy compound, but they frequently live in apartments or houses in the host city. The residence of the
ambassador is often used for official functions, and its public areas are often decorated with American art on
loan from museums. |
3-57 | 116 | Chapter 5
5-39. While each U.S. embassy is different, CA Soldiers may interact with embassy stakeholders, such as
defense attachés, political and economic officers, and USAID mission personnel. While the missions CA
Soldiers support will most likely fall under the authority of geographic CCDRs (not under the authority of
Chiefs of Mission), it is still critical for CA Soldiers to—
* Understand the U.S. foreign policy objectives in the host country.
* Understand the status of the bilateral relationship.
* Ensure that all activities conducted in country are mutually supportive of the U.S.-host nation
objectives.
DEFENSE SUPPORT TO STABILIZATION
5-40. The DOD provides support to stabilization as directed in DODD 3000.05. Stabilization is an inherently
political endeavor that requires aligning USG efforts—diplomatic engagement, foreign assistance, and
defense—to create conditions in which locally legitimate authorities and systems can peaceably manage
conflict and prevent violence. The DOS is the overall lead federal agency for U.S. stabilization efforts in
accordance with NSPD-44. The USAID is the lead implementing agency for non-security U.S. stabilization
assistance. The DOD is a supporting element, which performs several functions—including providing
requisite security and reinforcing civilian efforts where appropriate and consistent with available statutory
authorities.
5-41. The DOD is required to establish a defense support to stabilization process to—
* Identify defense stabilization objectives in concert with other USG departments and agencies.
* Convey the defense stabilization objectives through strategic documents.
* Organize to achieve the defense stabilization objectives.
* Prioritize requisite defense resources.
5-42. The DOD is also required to ensure Annex G and Annex V are fully developed and integrated in global
campaign plans, concept plans, and operation plans, in accordance with JP 5-0.
STABILIZATION AND SECURITY COOPERATION
5-43. As part of SCA, CA forces conduct stabilization and security cooperation activities in an effort to
strengthen local governance and build partner capacity. Security cooperation is all Department of Defense
interactions with foreign security establishments to build security relationships that promote specific United
States security interests, develop allied and partner nation military and security capabilities for self-defense
and multinational operations, and provide United States forces with peacetime and contingency access to
allied and partner nations (JP 3-20). Stabilization and security cooperation are mainly, though not solely,
accomplished through foreign assistance, FHA, FID, support to counterinsurgency, and the CME program of
USSOCOM.
FOREIGN ASSISTANCE
5-44. Foreign assistance is civil or military assistance rendered to a foreign nation through development
assistance, humanitarian and civic assistance, and SA. The U.S. provides foreign assistance through security
cooperation in conjunction with the theater security cooperation plan of a geographic CCDR. Foreign
assistance can also be provided when the U.S. is sponsoring a FID program or FHA in conjunction with other
security cooperation efforts. Foreign assistance operations support an HN by promoting sustainable
development and growth of responsive institutions. The goal is to promote long-term regional stability. |
3-57 | 117 | Unified Action
5-45. Figure 5-2 highlights the components of foreign assistance, which can be divided into three broad
categories:
* SA. This fosters stability and security abroad by strengthening the military and law enforcement
forces in our partner countries through capacity building and training and helps countries purchase
defense equipment and services produced in the U.S.
* Economic and Development Assistance. This advances our national security by helping countries
meet near-term political, economic, and development needs.
* HA. This supports disaster and emergency relief efforts, including programs that save lives,
alleviate suffering, and maintain human dignity.
Figure 5-2. Components of foreign assistance
5-46. CAO focus on the civil component during foreign assistance to provide the commander with viable
courses of action to assist in the stabilization of the populace and resources in an AO. This focus assists the
commander in synchronizing efforts and capabilities in the most efficient manner possible. Ultimately, CA
will reduce the redundancy of resources, maximize the usage of the current infrastructure, and assist in the
coordination of unified action partners, IPI, and interagency groups supporting foreign assistance operations.
5-47. CA forces possess the capabilities to evaluate the civil component through the planning and execution
of TG, CNDE, CKI, and CMI, in support of foreign assistance. The focus of foreign assistance programs is
to legitimize and enhance the stability of the political, military, economic, social, informational, and
infrastructure systems of an HN. CA forces provide a sociocultural understanding of the OE that enhances
the ability of the U.S. to achieve the desired end state. Support to foreign assistance can include technical
expertise, advice, and assistance that can exponentially influence the success of other ongoing programs and
initiatives. This assistance forms a better foundation on which a nation can build programs to meet the needs
of the populace and promote its own sustainable development or growth. CA forces assist in the development
of these programs and provide assessments to the commander on their effectiveness and sustainability. |
3-57 | 118 | Chapter 5
Note: ATP 3-57.30 provides additional information regarding SA, FID, and 10 USC authorities
that oversee these missions.
DEVELOPMENT ASSISTANCE PROGRAMS
5-48. A principal objective of the foreign policy of the U.S. is the encouragement and sustained support to
people of developing countries for improving the quality of their lives. Development assistance programs are
programs executed by the DOS directly or indirectly, through USAID, which finances numerous
development assistance programs to address the following needs:
* Agriculture and nutrition.
* Population control.
* Health.
* Education.
* Energy.
* Environment improvement.
* Humanitarian and civic assistance programs.
* Economic programs.
5-49. CA forces support these named needs with the full range of SCA.
5-50. Humanitarian and civic assistance programs are governed by 22 USC and 10 USC 401. This assistance
can only be provided in conjunction with military operations and exercises, and it must fulfill unit training
requirements that incidentally create humanitarian benefit to the local populace. In contrast to emergency
relief conducted under FHA operations, humanitarian and civic assistance programs generally encompass
planned activities in the following categories:
* Medical, surgical, dental, and veterinary care (and their associated education, training, and
technical assistance) provided by professionals in each practice in rural or underserved areas of a
country.
* Construction and repair of basic surface transportation systems.
* Well drilling and construction of basic sanitation facilities.
* Rudimentary construction and repair of public facilities.
5-51. CA units and personnel supporting humanitarian and civic assistance provide capabilities of CNDE
and CMI with an understanding of the cultures within the HN.
SECURITY ASSISTANCE PROGRAMS
5-52. SA programs are governed by 22 USC. SA is a group of programs authorized by the Foreign Assistance
Act of 1961 (as amended) and the Arms Export Control Act of 1976 (as amended). SA is also authorized by
other related statutes through which the U.S. provides defense articles, military training, and other defense-
related services, by grant, loan, credit, or cash sales in furtherance of national policies and objectives.
5-53. According to JP 3-22, SA is an element of security cooperation funded and authorized by the DOS, to
be administered by the DOD or Defense Security Cooperation Agency. Through these programs, the U.S.
provides defense articles, military training, and other defense-related services to foreign nations. These
programs are implemented by the DOD in accordance with policies established by the DOS. The principal
components of these programs include foreign military sales, foreign military financing, international
military education and training, peace operations, and excess defense articles.
5-54. CA personnel in support of these SA programs can—
* Identify host-nation requirements.
* Develop or review the nomination list of programs or projects to support the mission objectives.
* Provide input to the feasibility of each program.
* Provide input to the prioritization of each program to meet the desired end states and goals. |
3-57 | 119 | Unified Action
FOREIGN HUMANITARIAN ASSISTANCE
5-55. Foreign humanitarian assistance is Department of Defense activities conducted outside the United
States and its territories to directly relieve or reduce human suffering, disease, hunger, or privation (JP 3-29).
Most USG agencies, as well as USC and DOD directives, utilize the terms humanitarian assistance and
foreign disaster relief.
5-56. FHA operations are different from foreign assistance primarily because they have a direct humanitarian
need. The DOD uses appropriated funds specifically for FHA in the form of overseas humanitarian disaster
and civic aid. Foreign assistance is not funded by overseas humanitarian disaster and civic aid, and it is
intended as deliberate assistance to promote long-term stability. FHA activities conducted by U.S. armed
forces fall into two broad categories:
* Steady-state FHA. Steady-state FHA are activities normally planned and conducted as part of the
theater campaign plan of the geographic CCDR. The intent of steady-state FHA activities is to
assess and increase the affected nation’s capacity and capability to respond to disaster. Steady-
state FHA is a security cooperation tool that can improve visibility, access and influence. It can
also promote regional stability with foreign military and civilian counterparts and increase
interoperability between that nation and U.S. forces in the event that U.S. forces have to respond
in support of foreign disaster relief.
* Foreign Disaster Relief. Foreign disaster relief is a limited duration contingency operation.
The goal of foreign disaster relief is to alleviate the suffering of foreign disaster victims—
including victims of natural disasters and conflicts, internally displaced persons, refugees, stateless
persons, and vulnerable migrants. Normally, foreign disaster relief includes:
Provision of basic services and commodities, such as food, water, sanitation, health care,
nonfood items (clothing, bedding, and so on), and emergency shelter.
Establishment of distribution points and collection points.
Support to critical infrastructure and logistics necessary for the delivery of those essential
services and commodities.
Medical equipment, medical and technical personnel, and making repairs to essential services.
5-57. DODD 5100.46 directs that DOD components will provide disaster assistance in support of U.S.
foreign disaster relief efforts only in any of the three following instances:
* At the direction of the President.
* When the SecDef or a designee approves (with the concurrence of the Secretary of State) a request
for assistance from another federal department or agency.
* In emergency situations in order to save human lives where there is not sufficient time to seek the
prior concurrence of the Secretary of State, in which case the SecDef will advise and seek the
concurrence of the Secretary of State as soon as practicable thereafter.
5-58. Nothing in DODD 5100.46 will be construed as preventing a military commander with assigned forces
at or near the immediate scene of a foreign disaster from taking prompt action to save human lives. In cases
in which this authority is invoked, the commander should obtain the concurrence of the HN and U.S. Chief
of Mission of the affected country before committing forces. Also, the CCDR will follow up as soon as
possible (but no later than 72 hours after the start of relief operations) to secure SecDef or Deputy SecDef
approval for continuing assistance. CCDRs must also obtain SecDef or Deputy SecDef approval in order to
obtain reimbursement with Overseas Humanitarian, Disaster, and Civic Aid funds. Such assistance during
the first 72 hours does not include the authority to provide military assistance that does not contribute to
urgent life-saving efforts.
5-59. Although U.S. military forces are primarily designed and structured to defend and protect U.S. national
interests, they may be readily adapted to FHA requirements. Military organization, structure, and readiness
enable commanders to rapidly and effectively respond when time is of the essence. In addition to—or
sometimes in lieu of—host-nation humanitarian assistance efforts, hundreds of NGOs from around the world
respond to disasters to provide humanitarian assistance in various forms and for varied durations.
However, U.S. military forces are not the primary USG means of providing FHA. They normally supplement
the activities of U.S. and foreign government authorities, NGOs, and international organizations. The USAID |
3-57 | 120 | Chapter 5
is the principal agency for U.S. bilateral development and humanitarian assistance to foreign countries.
The USAID will normally serve as the lead federal agent for the U.S.
5-60. FHA missions conducted by U.S. military forces span the full competition continuum. This could be
from crisis response and limited contingency operations to activities in various steady-state programs as part
of the security cooperation program of the geographic CCDR, or to achieve specific theater campaign plan
objectives.
5-61. DODD 5105.65 assigns the Defense Security Cooperation Agency the responsibility to direct,
administer, and provide DOD-wide guidance for the execution of DOD SA and security cooperation. It
further directs the Defense Security Cooperation Agency to provide oversight and exercise overall program
management responsibility for DOD humanitarian assistance and demining activities funded by the Overseas
Humanitarian Disaster and Civic Aid appropriation, in coordination with the Assistant Secretary of Defense
for Special Operations and Low Intensity Conflict. The directive directs the Defense Security Cooperation
Agency to produce Defense Security Cooperation Agency manual 5105.38-M. This manual provides policy
and direction for humanitarian assistance.
5-62. The CA role in FHA is to assist the commander in planning; advising on the activities; and coordinating
with unified action partners, IPI, and interagency to synchronize efforts. CA forces also play a key role in
conducting assessments. FHA operations are inherently complex and require a significant amount of
interagency coordination. FHA is normally directed from the strategic level, planned and managed at the
operational level, and conducted at the tactical level. On all levels, in support of FHA activities, CA forces—
* Participate in interagency assessment, planning and synchronization of FHA activities.
* Identify, validate, or evaluate host-nation and international resources available for FHA activities.
* Mobilize vetted and developed civil networks to aid in FHA activities.
* Advise, assist, and plan displaced civilian movement and control.
* Participate in the execution of selected FHA activities as directed.
* Provide liaison with IPI.
* Assist in the coordination of local labor.
* Coordinate with judge advocates to assist the commander to meet legal and moral obligations.
* Monitor and evaluate FHA.
* Assess requirements and support for the operation of a CMOC.
* Conduct and maintain an assessment of humanitarian issues in designated nations or regions.
* Identify shortfalls in host-nation humanitarian assistance programs and resources.
5-63. Although FHA operations may be executed simultaneously with other types of operations, each type
has unique characteristics. For example, FHA operations may be simultaneously conducted with peace
operations, but each has its own strategic end state. Military commanders must be cautious not to commit
their forces to projects and tasks that go beyond the FHA mission. Military commanders conducting FHA
simultaneously with other operations must develop end state, transition, and termination objectives, as well
as measures of effectiveness and measures of performance complementary to simultaneous military
operations. Civil networks developed and integrated into operations through the CNDE process aid in
execution of FHA tasks, thereby relieving commands of resource demands that might take away from
completion of other operations.
5-64. One example of FHA is humanitarian mine action, which includes activities related to the furnishing
of education, training, and technical assistance with respect to detection, clearance, physical security, and
stockpile management of land mines and other explosive remnants of war. Explosive remnants of war include
landmines, unexploded ordnance (mortar rounds, artillery shells, bomblets, rockets, sub-munitions, rocket
motors and fuel, grenades, small arms ammunition, and so on), and abandoned ammunition storage and cache
sites. The CA role in humanitarian mine action is normally to assist with the request and approval process
and to assist the HN in establishing a national demining office. |
3-57 | 121 | Unified Action
5-65. There are many operations that are related to FHA. These operations are diverse and CA forces will
support these related operations as necessary. The related operations consist of—
* Stability operations.
* Foreign assistance, to include—
Humanitarian and civic assistance.
SA.
Development assistance.
* Peace operations.
* Noncombatant evacuation operations.
* Mass atrocity response operations.
* International chemical, biological, radiological, and nuclear response.
FOREIGN INTERNAL DEFENSE
5-66. Foreign internal defense is the participation by civilian and military agencies of a government in any
of the action programs taken by another government or other designated organization to free and protect its
society from subversion, lawlessness, insurgency, terrorism, and other threats to its security (JP 3-22).
The focus of U.S. FID efforts is to support the internal defense and development of the HN. Internal defense
and development can be described as the full range of measures taken by a nation to promote its growth, and
protect itself from security threats. Figure 5-3 depicts the interrelationship of security cooperation, SA, and
FID.
5-67. In FID, CAO facilitate the integration of U.S. military support into the overall internal defense and
development programs of the supported nation. Within the FID framework and functional areas associated
with joint strategic capabilities planning, CA forces—
* Perform specific planning tasks in support of the Services and combatant commands.
* Identify civil considerations.
* Execute assessments.
* Coordinate internally and with the HN.
Figure 5-3. Security assistance and foreign internal defense |
3-57 | 122 | Chapter 5
5-68. CAO are vital to theater FID operations in areas from planning to execution. It is a valuable resource in—
* Planning and facilitating the conduct of various indirect, direct support (not involving combat
operations), and combat operations in support of the overall FID effort.
* Supporting the reconstitution of viable and competent civil infrastructure in the operational areas
that were previously ungoverned, under-governed, or in the direct control of threat forces or
shadow governments.
5-69. Through CAO, CA forces also assist the government by executing SCA.
5-70. The CA forces supporting FID range from staffs to CATs. Essential tasks performed may include—
* Incorporating CAO in all activities related to FID (from planning to execution).
* Reviewing and supporting host-nation internal defense and development goals.
* Ensuring host-nation public support, from local to national levels.
* Establishing and maintaining contact with nonmilitary agencies and local authorities.
* Ensuring the relevant parties always maintain host-nation sovereignty.
* Advocating for host-nation self-sufficiency.
Note: JP 3-05, JP 3-22, JP 3-57, FM 3-18, and ATP 3-05.2 provide more information on FID.
COUNTERINSURGENCY
5-71. Insurgencies exist apart from, before, during, or after a conventional conflict. Elements of a population
often grow dissatisfied with the status quo. When a population or groups in a population are willing to fight
to change the conditions to their favor, using both violent and nonviolent means to affect a change in the
prevailing authority, they often initiate an insurgency. Ideally, the host country is the primary actor in
defeating an insurgency. Even in an insurgency that occurs in a country with a nonfunctioning central
government, or after a major conflict, the host country must eventually provide a solution that is culturally
acceptable to its society and meets U.S. policy goals.
5-72. The U.S. uses a range of methods to aid a partner nation in defeating an insurgency.
Effective counterinsurgency operations require—
* Understanding of the military profession, civil factors, capabilities, and vulnerabilities.
* Execution of and challenges to governance.
* Societal understanding.
* Cultural knowledge.
5-73. The tasks that counterinsurgents perform in countering an insurgency are not unique. It is the organization
of these tasks in time and space that is unique. Although all tasks executed to establish the conditions to reach
a desired end state are significant, stability operations may be critical in a counterinsurgency.
5-74. By definition, counterinsurgencies occur in the civil component. As such, a civil component solution is the
most effective deterrent to counterinsurgencies. Insurgencies are most readily defeated locally by local actors. Civil
networks provide the commander a partner in the civil component to identify and defeat insurgent threats with
minimal use of U.S. military resources while also utilizing a local partner. SCA missions allow CA forces to
reinforce the stability, security, and effective governance needed to choke out insurgent support. Effective
governance meets the needs of the population and provides security.
5-75. Entities best qualified to accomplish nonmilitary tasks may not always be available. In such cases,
military forces may need to perform those tasks until civilian-led capabilities become available. Within the
Army, CA is the branch ideally organized, trained, and equipped to assist in these functions. CA forces are
also ideally suited to interact with the population to determine the root causes of instability and improving
the relationship between the populace and the HN. CAO, in counterinsurgency, should focus on the following
tasks:
* Planning and conducting CR, CE, and CND to determine causes of instability.
* Providing SCA, as required, to bolster host-nation government capability or capacity.
* Building and/or mobilizing civil networks to support stable governance. |
3-57 | 123 | Unified Action
* Conducting transitional military authority until the host-nation government has the capacity to
conduct required governance activities.
* Improving host-nation legitimacy through activities such as military civil action.
* Developing, planning, and executing projects that address the humanitarian needs of the populace.
* Providing CAO and CMO training to host-nation and partner security forces and civilian agencies.
* Providing coordination and liaison between the IPI, interagency, and civil component to support
unified action.
* Conducting activities with host-nation authorities, interagency, international organizations, NGO,
private sector, or international military partners to deny support to the insurgents.
Note: JP 3-24 provides additional information on counterinsurgency. |
3-57 | 125 | Appendix A
History of Civil Affairs
The history of U.S. Army CA—known as Military Government prior to 1959—can best
be described as one of continuous evolution. From its ad hoc origins in the immediate
aftermath of World War I, the Army professionalized CA as a reserve branch (1955) and
a regular Army branch (2006). This brief history provides a short overview of U.S. Army
CA. While it highlights critical events, it is not comprehensive.
A-1. Since its creation in the early Republic, the U.S. Army conducted roles and functions similar to CA
(Military Government). Examples include the Lewis and Clark Expedition (1804 to 1806), Major General
Winfield Scott’s occupation of Mexico City (1847 to 1848), post-Civil War Reconstruction in the American
South (1865 to 1877), and the Philippine-American War (1899 to 1913).
A-2. During the Civil War, the Army implemented General Orders No. 100 (1863), otherwise known as the
Lieber Code. It provided the U.S. Army with guidelines that regulated the just treatment of civilians and
property in the occupied South. Post-war, General Orders No. 100 served as the foundation for the
development of laws dictating how the U.S. Army operated in occupied territory. The U.S. Army codified
these laws in the Rules of Land Warfare (1914), later revised as FM 27-10, then FM 6-27. As important as
the Lieber Code was, it was just another step toward developing formal CA (Military Government) structure,
doctrine, and training.
Note: FM 27-10 is an obsolete publication, which provides historical reference and is listed in the
Obsolete Publications section of the references for this FM.
A-3. The true beginning of modern U.S. Army CA was the post-World War I occupation of the German
Rhineland by the Third U.S. Army from December 1918 until 11 July 1923. The lessons from this experience
led the Army to develop CA doctrine, provide professional education, and eventually create specialized CA
(Military Government) units. In the words of Major Truman Smith, the main author of the final report on the
occupation, the Army’s post-World War I actions “lacked both training and organization to guide the
destinies of nearly 1,000,000 civilians whom the fortunes of war had placed under its temporary sovereignty.”
While it lasted, the U.S. Army occupation performed civil administration tasks and ensured that Germany
would not resume hostilities. A new experience for the modern Army, it left such an impact that it led to the
creation of a formal CA capability.
A-4. For CA, the most important development was the subsequent publication of American Military
Government of Occupied Germany, 1918–1920: Report of the Officer in Charge of Civil Affairs, Third Army
and American Forces in Germany. Known as the Hunt Report after its director, Colonel Irvin L. Hunt, it
provided analyses of the Army’s experience, highlighting the lack of formal CA training. This groundbreaking
official study, which published the experiences of American Soldiers who occupied Germany, drove change.
A-5. The Hunt Report and similar, but less widely distributed, studies of Army involvement in the
Philippines pointed to requirements for a standing CA staff section for incorporating CA in war planning.
This led to the publication of an updated Rules of Land Warfare in 1934 that contained a section on military
government and established the need for a CA (Military Government) capability. Based on these sources, in
1940, the Army published its first doctrine that focused on these special skills, FM 27-5, which guided U.S.
Army CA (Military Government) efforts throughout World War II. Further study of the Hunt Report and the
new doctrinal publications led to the creation of the first formal U.S. Army CA training program—the School
of Military Government—at the University of Virginia in May 1942.
Note: FM 27-5 is an obsolete publication, which provides historical reference and is listed in the
Obsolete Publications section of the references for this FM. |
3-57 | 126 | Appendix A
A-6. The school instructed officers in staff-level military government functions. However, because the
School of Military Government could not meet the growing demand for trained CA personnel, the Army
exported the program to other civilian universities throughout the U.S. By 1945, the Army taught CA courses
at Fort Custer, Michigan; the CA Staging Area at Fort Ord/Presidio of Monterey, California; or in overseas
schools.
A-7. To manage its CA (Military Government) efforts, the U.S. Army created the Military Government
Division, established in July 1942 under the Office of the Provost Marshal General. Its small size and lack
of influence, compounded by the sheer number of CA matters experienced by Lieutenant General Dwight D.
Eisenhower after the invasion of North Africa on 8 November 1942, prompted the formation of the
CA Division under the War Department in March 1943. Led by Major General John H. Hilldring, the
CA Division formulated policy for CA (Military Government) units. These units ranged in size from the
European CA Division, with more than 8,200 personnel, to nine-person CA Detachments spread throughout
combat units.
A-8. These elements worked closely, near, or with combat forces, helping to address the concerns of civilian
populations and stabilizing rear areas so that combat commanders could remain focused on the enemy.
CA (Military Government) elements had expanded roles in the final year of World War II and particularly in
stabilizing post-war Germany, Austria, Italy, Japan, and Korea. However, the number of CA personnel
declined considerably as the Army reduced force structure in the postwar drawdown. A standing CA
capability appeared to be on its way out of the Army until another conflict guaranteed its survival as a
permanent U.S. Army capability.
A-9. The Korean War not only resurrected U.S. Army CA, but also served as a turning point for the
employment of CA and led to a permanent establishment of the capability in the U.S. Army. With the brief
exception of conducting military government in North Korea in late 1950, U.S. CA personnel worked in
South Korea, a sovereign allied country with a functioning government. There, CA Soldiers, organized first
under the United Nations Public Health and Welfare Detachment (1950), then the United Nations Civil
Assistance Command (1951 to 1953), and later, under the Korean Civil Assistance Command (1953 to 1955).
CA Soldiers provided refugee assistance and medical care for the civilian population, while helping to rebuild
destroyed public infrastructure. The large-scale effort provided the rationale for the U.S. Army to establish
the CA (Military Government) Branch in the USAR on 17 August 1955. On 2 October 1959, the Army
eliminated the term Military Government and renamed it the CA Branch. This name change reflected recent
operations and changes in doctrine describing how the U.S. Army would employ CA in future conflicts.
A-10. Similar to the Korean War, the U.S. Army CA effort in South Vietnam (1965 to 1971) was based on
operating within a sovereign allied country. However, this time, as guided by FM 41-10, CA became associated
with unconventional warfare (UW). The three active duty CA companies—the 41st, 2d, and 29th—assigned to
South Vietnam helped integrate rural and war refugee populations into the national economic and political
systems. The CA companies provided medical care and assisted with agricultural, educational, and
infrastructure improvements, while giving credit to the government of South Vietnam for their efforts. That
mission would be later reincarnated as village stability operations in Afghanistan in 2010 to 2014.
Note: FM 41-10 is an obsolete publication, which provides historical reference and is listed in the
Obsolete Publications section of the references for this FM.
A-11. The experience in Vietnam brought lasting changes to CA. On 15 September 1971, the CA School,
then administered under the Provost Marshal General’s Office and based at Fort Gordon, Georgia, moved to
Fort Bragg, North Carolina. There, it came under the direction of the U.S. Army Institute for Military
Assistance, now the United States Army John F. Kennedy Special Warfare Center and School
(USAJFKSWCS). Active duty CA units soon relocated to Fort Bragg and were placed under the 95th CA
Group. However, in the post-Vietnam drawdown, the Army disbanded most active duty CA units. Only the
96th CA Battalion at Fort Bragg remained on active duty. Then, as now, the preponderance of CA units
resided in the USAR.
A-12. During the next two decades, CA made incremental steps toward becoming a core element of U.S.
Army Special Operations. On 1 October 1982, the Army established 1st Special Operations Command
(SOCOM) at Fort Bragg in which the 96th CA Battalion was a subordinate element. After the U.S. Army |
3-57 | 127 | History of Civil Affairs
created the United States Army Special Operations Command (USASOC) at Fort Bragg on 1 December
1989, the 96th CA Battalion remained under 1st SOCOM. All reserve CA units based in the contiguous U.S.
were assigned to the United States Army Reserve Special Operations Command (USARSOC), which became
the U.S. Army Civil Affairs and Psychological Operations Command (USACAPOC) on 27 November 1990.
Subordinated under USASOC, this placed the command and control of all contiguous U.S.-based active duty
(96th CA Battalion) and the USAR CA and PSYOP units under a single headquarters. On 3 March 1993,
Secretary of Defense Leslie ‘Les’ Aspin formally designated active and reserve CA units in the contiguous
U.S. as Army Special Operations Forces (ARSOF). The reserve formation based outside the contiguous U.S.,
the 322d CA Brigade in Hawaii, was not designated as ARSOF.
A-13. These organizational changes coincided with the Army’s increased use of CA units following the
breakup of the Soviet Union in 1991 and subsequent global instability. USASOC routinely deployed CA
forces to assist in all phases of operations—including supporting peacekeeping, disaster relief,
counterinsurgency, combat, and stability efforts. Reserve CA units, namely the 352d CA Command,
spearheaded the Kuwaiti Task Force and its efforts to stabilize Kuwait following the expulsion of the Iraqi
invaders in February 1991. Other USAR CA units and the 96th CA Battalion provided CA support in Iraq
for Operation DESERT SHIELD/STORM and for Operation PROVIDE COMFORT, the post-war
humanitarian mission to assist the Kurds. Other notable deployments for CA units include peacekeeping and
disaster relief efforts in Operation RESTORE HOPE in Somalia, Operation UPHOLD DEMOCRACY in
Haiti, and Operation JOINT ENDEAVOR in the Balkans. However, the 11 September 2001 terrorist attack
on the United States ushered CA into a new era.
A-14. Significant changes for CA took place during the Global War on Terror. To meet the growing needs
of the conventional force, on 1 October 2006, the Army reassigned USACAPOC from USASOC to USAR.
USASOC retained the single Active Duty special operations CA unit, the 96th CA Battalion. Two weeks
later, on 16 October 2006, the Army established CA as a branch in the regular Army. Prior to that, it had
been a functional area. Constant rotations to Afghanistan and Iraq accelerated the operating tempo of CA
units and promoted growth in the active force. USASOC used 96th CA Battalion personnel as cadre to create
four additional active special operations CA Battalions (91st, 92d, 97th, and 98th) under the newly organized
95th CA Brigade (2007). Currently, the 95th CA Brigade (Special Operations) (Airborne) is assigned to the
1st Special Forces Command supporting ARSOF and USSOCOM commitments.
A-15. The demand to support continued Global War on Terror operations also resulted in the creation of the
conventional 85th CA Brigade on 16 September 2011, with five subordinate battalions (80th, 81st, 82d, 83d,
and 84th). Based at Fort Hood, Texas, this regular Army unit was subordinated to United States Army Forces
Command (FORSCOM) and provided CA support to conventional forces. However, following troop level
drawdowns, the Army deactivated the 80th and 84th CA battalions on 15 September 2016. The 85th CA
Brigade, along with its 81st and 82d battalions were inactivated on 15 March 2018, leaving the 83d CA
Battalion as the sole active CA unit supporting the conventional force.
A-16. Army CA has evolved considerably since its origins in the post-World War I occupation of Germany.
The Army has recognized the continuing need for formal CA instruction and planning and the requirement
for a standing CA force. CA engages across the range of military operations—from the prevention of
hostilities to assisting people in returning to daily life after hostilities or humanitarian crises end. The demand
for CA is strong because it is a force multiplier and has a history of proven utility. |
3-57 | 129 | Appendix B
Civil Affairs Government Function Expertise
This appendix describes the role of CA Soldiers as government technical sector experts,
known as government function specialists. This expertise is essential to CA fulfillment
of its role of engaging and leveraging the civil component of the OE while enhancing,
enabling, or providing governance.
PROVIDING GOVERNMENT EXPERTISE - FUNCTIONAL
SPECIALTY AREAS
B-1. The CA military government function expertise capability is organized around five functional specialty
areas based on the five USG stability sectors. These functional specialty areas are:
* Civil Security. The CA civil security functional specialty area is concerned with civil security and
public order that generates the foundational conditions for stability within the OE. This relates to
the development and administration of policies, planning mechanisms, and training of partner
nation public officials to respond to threats and hazards (human-made, natural, internal and
external) across all levels of government. When required, the capabilities within this functional
specialty area assist in the establishment and maintenance of a transitional military authority.
* Civil Control. The CA civil control functional specialty area is concerned with the administration
of legal systems and institutions for the application of civil and criminal laws within the civil
component of the OE. When required, the capabilities within this functional specialty area assist
in the establishment and maintenance of a transitional military authority.
* Essential Services. The essential services functional specialty area is concerned with activities
designed for the provision of basic needs and services (water, food, shelter, sanitation, and health
services), as well as those that facilitate the restoration of a social fabric and community life, the
systems and institutions for the provision of primary and secondary education, and the return or
voluntary resettlement of those displaced. When required, the capabilities within this functional
specialty area assist in the establishment and maintenance of a transitional military authority.
* Governance Support. The governance and participation functional specialty area is concerned
with public administration, cultural relations, public information, and environmental management.
Collectively, these programs, policies, systems and institutions enable a state’s ability to serve the
citizenry, articulate interests, manage resources, and exercise bestowed power in a society. These
same programs, policies, systems, and institutions confer participation and the individual and
collective citizenry’s ability to share, access, or compete for power through nonviolent political
processes, and to enjoy the collective benefits and services of the nation.
When required, the capabilities within this functional specialty area assist in the establishment and
maintenance of a transitional military authority.
* Economic Stabilization and Infrastructure. The economic stabilization and infrastructure
functional area is concerned with foundational commerce, monetary, fiscal labor issues;
agriculture, utilities, and public works; communications systems; and transportation fields.
Collectively, these programs, policies, systems, and institutions constitute an economic system.
The economic system is the intersection of government institutions and activities, corporate and
private enterprises, and populations, and the mobilization of resources for the production and
distribution of goods and services, which are integral to the stability of a region or society.
When required, the capabilities within this functional specialty area assist in the establishment and
maintenance of a transitional military authority. |
3-57 | 130 | Appendix B
FUNCTIONAL SPECIALTY FOCUS AREAS
B-2. Each functional specialty area has one or more focus areas nested within it, as shown and discussed in
Chapter 2 of this FM. Not all focus areas are provided solely by the CA government function specialists (that
is, public administration expertise resides with CA officers and noncommissioned officers, while corrections
could be provided by military police).The 16 CA functional specialty focus areas are described below.
LAW AND BORDER ENFORCEMENT
B-3. The law and border enforcement functional specialty places emphasis on indigenous ministerial and
sub-ministerial responses required to enforce laws and secure national borders. Application of the technical
expertise of this functional specialty team delivers assessments, analysis, and evaluation, which allow for the
provision of advice, guidance, and access to additional resources. This augmentation to those institutions
enhances capability of those institutions to implement and conduct assessments and oversight, provide and
regulate policies and programs, and operate institutional systems and agencies from national to local levels.
B-4. This enhanced capability provides for the structuring, resourcing, organizing, rehabilitation, and
implementation of the curriculum, facilities, technology, processes, and personnel development required to
implement and sustain the activities for the maintenance of public order. These activities ensure the enforcement
of the rule of law through authenticity, safe-guarding, preserving documentation, cataloging and accounting,
accessibility, and transparency of the actions and interactions required of public law and border enforcement
agents. Law and border enforcement efforts have inherent crosscutting effects upon, and requirements of, the
other functional areas. This functional specialty team is prepared to assume administrative and supervisory roles
of the national and subnational institutions, as required by conditions of the OE.
RULE OF LAW
B-5. The rule of law functional specialty places emphasis on the judiciary systems of the national and
subnational governments that incorporate customary indigenous methods with internationally acceptable
standards. Application of the technical expertise of this functional specialty team delivers assessments,
analysis, and evaluation, which allow for the provision of advice, guidance, and access to additional
resources. This augmentation to indigenous institutions enhances the capability of those institutions to
implement and conduct assessments and oversight, provide policies and programs, and operate institutional
systems and agencies from national to local levels.
B-6. This enhanced capability provides development for the structuring, resourcing, organizing,
rehabilitation, and implementation of the requisite curriculum, facilities, processes, and personnel
development required to implement and sustain the rule of law. This functional specialty team is prepared to
assume administrative and supervisory roles of the national and subnational institutions, as required by
conditions of the OE. Additional advice and expertise is also resident with this team to support war crime
courts and tribunals, and the establishment and administration of truth commissions.
CORRECTIONS
B-7. The corrections functional specialty places emphasis on the role of the national and subnational
governments in fulfilling the punitive phase of the rule of law through a transparent correctional system that
conveys safe and humane detention, incarceration, rehabilitation, and reintegration of qualified prisoners.
Application of the technical expertise of this functional specialty team delivers assessments, analysis, and
evaluation, which allows for the provision of advice, guidance, and access to additional resources.
This augmentation to indigenous institutions enhances the capability of those institutions to conduct
assessments, implement oversight, provide policies and programs, and operate institutional systems and
agencies at national to local levels.
B-8. This enhanced capability provides for the structuring, resourcing, organizing, rehabilitation, and
implementation of the curriculum, facilities, processes, and personnel development required to implement
and sustain a correctional system. This functional specialty team is prepared to assume administrative and
supervisory roles of the national and subnational institutions, as required by conditions of the OE. |
3-57 | 131 | Civil Affairs Government Function Expertise
PUBLIC SAFETY
B-9. The public safety functional specialty advises and assists in (or reestablishes) the evaluation,
assessment, planning, and implementation of systems and programs that establish civil security sector
assistance, or emergency management administration, and planning assistance. They promote community
resilience through application of the prevention and resolution framework, and planning for the mitigation of
effects of human-made or natural disasters for the maintenance of public order. This section consists of teams
educated and experienced in emergency management, policing, and community relations.
PUBLIC EDUCATION
B-10. The public education functional specialty team is concerned with the structure and conduct of the
formal education system of indigenous institutions, any competing system, and their collective impacts upon
stability across the OE. Application of the technical expertise of this functional specialty team delivers
assessments, analysis, and evaluation that permits this team to provide advice and guidance access to
additional resources. This augmentation to indigenous institutions enhances the capability of those
institutions to conduct assessments, implement oversight, provide policies and programs, and operate
institutional systems and agencies at national to local levels.
B-11. This enhanced capability provides for the structuring, resourcing, organizing, rehabilitation, and
implementation of the curriculum, facilities, processes, and personnel development required to implement
and sustain inclusive public education. With consideration toward equitable accessibility by individuals,
institutions, and the private sector, these activities position communities for reestablishment of stability.
These efforts have inherent crosscutting effects upon, and requirements of, the other functional areas.
This functional specialty team is prepared to assume the administrative and supervisory roles of the national
and subnational institutions, as required by conditions of the OE.
PUBLIC HEALTH
B-12. The public health functional specialty advises and assists commanders, interagency, and host-nation
representatives in matters pertaining to the vulnerabilities and strengths of indigenous health care institutions
through the data collection, analysis, evaluation, legislation, regulation, and/or policy guidance. If necessary,
the public health functional specialty also reestablishes the administration of health care institutions and
programs at the national, regional, and provincial levels. With consideration toward equitable accessibility
by individuals, institutions, and the private sector, these activities position communities for reestablishment
of stability. These efforts have inherent crosscutting effects upon, and requirements of, the other functional
areas. This functional specialty team is prepared to assume the administrative and supervisory roles of the
national and subnational institutions, as required by conditions of the OE.
CIVILIAN SUPPLY
B-13. The civilian supply functional specialty is concerned with the response mechanism of indigenous
institutions in reaction to a crisis through surveying, assessing, and conducting a resources analysis and
evaluation of the local area. Results are used to determine the status of the essential needs of the indigenous
population. This helps determine the type and amount of resources available, and the location and application
of solution sets. Civilian needs that cannot be met with reallocated indigenous resources are then assessed
and requested to integrate the donor-sourced resources of NGOs or international organizations, or U.S.
military resources—including Class X supplies. An additional competency of this team is development of
civil authorities available to collect and distribute supplies or provide statistical analysis and operational
oversight as a response to refugees and displaced persons. This functional specialty team is prepared to
assume the administrative and supervisory roles of the national and subnational institutions, as required by
conditions of the OE. In doing so, the team identifies supplies and resources that can be diverted for U.S.
military use and identifies any associated negative impacts upon the civil component of the OE.
PUBLIC ADMINISTRATION
B-14. The public administration functional specialty places emphasis on the structure and conduct of the
indigenous government from national to local levels. Through assessments, analysis, and evaluation, this |
3-57 | 132 | Appendix B
functional specialty team provides advice and guidance access to additional resources to augment the nationwide
network of indigenous civil authorities to promote oversight and assessing, advising, improving, or establishing
legislative and executive institutions from national to local levels; and the processes of these institutions in the
administration of governance. Considerations for the public administration functional specialty include political
parties, eligibility for franchise, elections, tenure, civil servant service, policy and programming, and all other
aspects of the development and operation of the apparatus of government. These activities enable the
interconnectivity of individuals, civil society, and institutions to produce coordinated, integrated, and
synchronized efforts toward stability. These efforts have inherent crosscutting effects upon, and requirements
of, the other functional areas. This functional specialty team is prepared to assume the administrative and
supervisory roles of the national and subnational institutions, as required by conditions of the OE.
PUBLIC INFORMATION
B-15. The public information functional specialty places emphasis on the ability of the indigenous government
to be transparent, accountable, informative, and effective in communicating to the citizenry. Application of the
technical expertise of this functional specialty team delivers assessments, analysis, and evaluation that permits
this team to provide advice and guidance access to additional resources. This augmentation to indigenous
institutions enhances the capability of those institutions to conduct assessments, implement oversight, provide
policies and programs, and operate public information systems and agencies from national to local levels.
B-16. This enhanced capability provides for the structuring, resourcing, organizing, rehabilitation, and
implementation of the curriculum, facilities, processes, and personnel required to develop and execute public
relations and information dissemination activities. These activities include support to the political and
electoral processes, emergency management actions, societal participation in issues, respect of dissenting
views, independence of private and international media, communication of policy and development
objectives, and the provision of equitable accessibility by individuals, institutions and the private sector.
Public information efforts have inherent crosscutting effects upon, and requirements of, the other functional
areas. This functional specialty team is prepared to assume the administrative and supervisory roles of the
national and subnational institutions, as required by conditions of the OE.
CULTURAL RELATIONS
B-17. The cultural relations functional specialty places emphasis on the stewardship of the social and cultural
resources, official public records, and archives of the state. This functional specialty also places emphasis on
the educated expertise, and the focused understanding of traditional culture, customs, and arts of an area of a
nation, or region. Application of the technical expertise of this functional specialty team delivers assessments
and analysis, which allow for the provision of advice, guidance, and access to additional resources. This
augmentation to indigenous institutions enhances the capability of those institutions to conduct assessments,
implement oversight, provide and regulate policies and programs, and operate institutional systems and
agencies at national to local levels.
B-18. This enhanced capability provides for the structuring, resourcing, organizing, rehabilitation, and
implementation of the curriculum, facilities, processes, and personnel development required to implement and
sustain the activities for the administration of public records, archives, and cultural assets. These activities
ensure the authenticity, safe-guarding, preservation and restoration, cataloging and accounting, accessibility,
and transparency of public documents, heritage, and properties. With consideration toward equitable
accessibility by individuals, institutions, and the private sector, these activities position communities for
reestablishment of stability. These efforts have inherent crosscutting effects upon, and requirements of, the other
functional areas. This functional specialty team is prepared to assume administrative and supervisory roles of
the national and subnational institutions, as required by conditions of the OE.
ENVIRONMENTAL MANAGEMENT
B-19. The environmental management functional specialty places emphasis on the principles of protection and
conservation of the natural resources and mitigation of hazards or pollution as it concerns the state, while
fostering supportable access, development, and utilization. Through the application of technical skills,
functional specialists advise and assist in rehabilitating, establishing, delivering, and maintaining government
environmental management agencies and systems and their associated requisite plans, policies, and procedures |
3-57 | 133 | Civil Affairs Government Function Expertise
while supporting the integration of the efforts of individuals, civil society organizations, NGOs, international
organizations, and other U.S. assistance and resources. With consideration toward equitable accessibility by
individuals, institutions, and the private sector, these activities position communities for reestablishment or
preservation of stability. These efforts have inherent crosscutting effects upon, and requirements of, the other
functional areas. This functional specialty team is prepared to assume the administrative and supervisory roles
of the national and subnational institutions, as required by conditions of the OE.
ECONOMIC DEVELOPMENT
B-20. The economic development functional specialty places emphasis on the existing national to localized
economic network, any competing system, and their collective impacts upon stability within the OE.
Through assessments, analysis, and evaluation, this functional specialty team provides advice and guidance
access to additional resources to augment the national network to develop, implement, regulate, and enforce
interstate and international policies and programs focused upon macroeconomics, market(s) development,
and microeconomics. These activities enable the interconnectivity of individuals, civil society, and
institutions to produce coordinated, integrated, and synchronized efforts. These efforts have inherent
crosscutting affects upon, and requirements of, the other functional areas. This functional specialty team is
prepared to assume the administrative and supervisory roles of the national and subnational institutions, as
required by conditions of the OE.
FOOD AND AGRICULTURE
B-21. The food and agriculture functional specialty places emphasis on the indigenous, national through local
agriculture systems, agencies, services, personnel, methods, resources, institutions, and facilities.
These include any competing systems and their collective impacts upon conditions of the OE and effects on
stability. Application of the technical expertise of this functional specialty team delivers assessments,
analysis, and evaluation, which allow for the provision of advice, guidance, and access to additional
resources. This augmentation to the indigenous institutions enhances the capability of those institutions to
conduct assessments and implement oversight, provide and regulate policies and programs, and operate
systems and agencies at the national to local levels.
B-22. This enhanced capability provides for the structuring, resourcing, organizing, rehabilitation, and
implementation of the curriculum and education, facilities, technology, processes, and personnel
development required to implement and sustain food and agriculture activities. These activities include the
production, processing, storage, product safety, marketing, and distribution of foodstuffs, food by-products,
and fiber and wood products. With consideration toward equitable access by individuals, institutions, and the
private sector, these activities position communities for the continuation, or establishment, of stability.
These efforts have inherent crosscutting effects upon, and requirements of, the other functional specialties.
This functional specialty team is prepared to assume the administrative and supervisory roles of the national
and subnational institutions, as required by conditions of the OE.
PUBLIC WORKS AND UTILITIES
B-23. The public works and utilities functional specialty places emphasis on the national to localized public
facilities and utilities network as it exists within the OE. Through assessments, analysis, and evaluation, this
functional specialty team provides advice and guidance access to additional resources aimed to enhance these
networks. This includes the ability and capabilities to develop, implement, regulate, and enforce policies and
programming for essential services. With consideration toward equitable accessibility by individuals,
institutions, and the private sector, these activities position communities for continuation, or establishment,
of stability. These efforts have inherent crosscutting effects upon, and requirements of, the other functional
areas. This functional specialty team is prepared to assume the administrative and supervisory roles of the
national and subnational institutions, as required by conditions of the OE.
PUBLIC COMMUNICATIONS
B-24. The public communications functional specialty places emphasis on the national communications
network as it exists within the OE. Through assessments, analysis, and evaluation, this functional specialty team |
3-57 | 134 | Appendix B
provides advice and guidance access to additional resources aimed to enhance the national network to develop,
implement, regulate, and enforce interstate and international policies for communications by radio, television,
wire, wireless, satellite, cable, and postal means. These activities enable the interconnectivity of individuals,
civil society, and institutions to produce coordinated, integrated, and synchronized efforts. These efforts have
inherent crosscutting effects upon, and requirements of, the other functional specialty areas. This functional
specialty team is prepared to assume the administrative and supervisory roles of the national and subnational
institutions, as required by conditions of the OE.
PUBLIC TRANSPORTATION
B-25. The public transportation functional specialty places emphasis on the national transportation network
as it exists within the OE. Through assessments, analysis, and evaluation, this functional specialty team
provides advice and guidance access to additional resources aimed to enhance the national network to
develop, implement, regulate, and enforce interstate and international policies for the physical movement of
commerce and people across ground, water, and through air conveyances. These activities enable the
interconnectivity of individuals; civil society; and associated organizations, institutions, and the private
sector. These efforts have inherent crosscutting effects upon, and requirements of, the other functional
specialties. This functional specialty team is prepared to assume the administrative and supervisory roles of
the national and subnational institutions, as required by conditions of the OE. |
3-57 | 135 | Appendix C
Civil Affairs in Special Operations
This appendix describes the contribution of CA forces to special operations. CA forces
can support all special operations, such as UW, direct action, special reconnaissance,
counterterrorism, and countering weapons of mass destruction. This appendix also
describes the USSOCOM CME program.
OVERVIEW
C-1. CAO are conducted within conventional and special operations missions. The difference between the two
is that CA special operations are generally conducted in hostile, denied, or politically sensitive environments
utilizing specialized tactics, techniques, and procedures. CA special operations are conducted alongside other
SOF from across the DOD, and in support of DOS priorities in embassies around the world.
C-2. Given the environments in which special operations are conducted, CA forces conducting those
missions are at a greater risk for isolation than conventional forces. This greater risk necessitates extended
training on small unit tactics, tactical movement, survival, evasion, resistance, escape, and other techniques
that are unique to special operations.
UNCONVENTIONAL WARFARE
C-3. The DOD defines unconventional warfare as activities conducted to enable a resistance movement or
insurgency to coerce, disrupt, or overthrow a government or occupying power by operating through or with
an underground, auxiliary, and guerrilla force in a denied area (JP 3-05). UW is a core activity of ARSOF,
and has strategic utility to alter the balance of power between sovereign states.
C-4. CA forces support UW through the execution of CAO, which is critical to the planning and execution
of UW campaigns. When integrated throughout all phases of UW planning and execution, CA forces provide
the capability to analyze the strengths, capabilities, and vulnerabilities of the civil component, as applicable,
to both the existing regime and the resistance movement. CAO also provide a comprehensive approach
toward assisting the resistance in legitimacy and TG, from the initial resistance movement, through transition,
to an emergent stable government. CA forces also are able to assist in developing broader governance efforts
in support of the resistance.
C-5. CA forces are typically sought for their unique capabilities with regards to identifying and mitigating
the underlying causes of instability in order to create a stable environment. This same analysis, however, can
be utilized by the resistance to identify and degrade those identified strengths and bonds of the existing regime
into vulnerabilities, resulting in its continued delegitimization. This creates legitimacy opportunities for the
movement.
C-6. Separately, within their sphere of control and influence, the resistance can consolidate gains in public
support and initial governance capacity by utilizing CA assessments, strengthening civil vulnerabilities, and
cementing a bond with the greater population. Methods to realign the legitimacy of power should consider
the timeliness required to restore essential services and strengthen the bonds between the population and the
resistance movement (or new government) upon the collapse of the old regime.
C-7. Through CNDE and SCA, CA forces can support an underground, auxiliary, or government-in-exile
to plan for and administer civil government in the areas of rule of law, economic stability, infrastructure,
governance, public health and welfare, and public education and information. SCA is the systematic
application of specialized skills for assessing and advising on the development of stability and governance.
When conducting CR and CE to develop civil consideration data, ARSOF CA forces collaborate with CA |
3-57 | 136 | Appendix C
military government specialists within USAR CA formations to formulate governance and stability lines of
effort for the resistance.
C-8. The resistance gains legitimacy through TG via support to its alternate administration. This is
accomplished by addressing grievances and providing essential services to create a civil strength or bond
with the population. As the regime becomes severely degraded or collapses, CA will assist with addressing
the remaining civil vulnerabilities to create stability for the emergent government, and inclusively, across the
indigenous population.
C-9. It is critical to note that CAO support to UW, is not intended to represent a linear process. As depicted
in figure C-1, it represents the relationship between civil strengths and civil vulnerabilities as they pertain to
civil instability for the current regime, civil opportunities for the resistance, and stability for a new
government. The left side depicts CAO and corresponding resistance actions that increase the de-
legitimization of the current regime, through degradation of civil strengths with the population, and attacking
civil vulnerabilities to provide legitimacy opportunities for the resistance.
Note: DODD 3000.07, JP 3-05, FM 3-05, FM 3-18, ATP 3-05.1, and ATP 3-18.1 provide more
information on UW.
Figure C-1. Civil Affairs operations in unconventional warfare
DIRECT ACTION
C-10. Direct action is a core activity of ARSOF consisting of short-duration strikes and other small-scale
offensive actions conducted by select ARSOF elements as a special operation in hostile, denied, or |
3-57 | 137 | Civil Affairs in Special Operations
diplomatically sensitive environments, which employs specialized military capabilities to seize, destroy,
capture, exploit, recover, or damage designated targets. Direct action differs from conventional offensive
actions in the level of physical and political risk, operational techniques, and the degree of discriminate and
precise use of force to achieve specific objectives.
C-11. CA forces do not conduct direct action missions; however, CA forces conduct CR and CE to gain shared
understanding of the civil component to address possible adverse effects of direct action and to mitigate those
effects through civil network engagement and civil considerations analysis. CAO planning support to direct
action may include—
* Gaining civil information to develop the civil component of the common operational picture of
the commander.
* Providing civil component analysis to planning processes.
* Providing civil component analysis toward the identification of—
Critical links and nodes.
Decisive points.
Centers of gravity.
* Advising on the presence and potential of culturally, economically, and politically significant
assets and resources within the objective area.
* Participating in the targeting process by nominating restrictive-fire areas and no-fire areas to
minimize unnecessary damage to the civil infrastructure and culturally sensitive sites.
* Evaluating damage to infrastructure and other combat-related effects to the civil component.
* Providing post-strike employment options for CA capabilities.
Note: JP 3-05 and ATP 3-18.3 provide additional information on direct action.
SPECIAL RECONNAISSANCE
C-12. Special reconnaissance is a core activity of ARSOF consisting of reconnaissance and surveillance actions
conducted by select ARSOF elements as a special operation in hostile, denied, or diplomatically and/or
politically sensitive environments to collect or verify information of strategic or operational significance, which
employs military capabilities not normally found in conventional forces. CA forces do not conduct special
reconnaissance missions. However, CA forces conduct CND, CR, and CE to gain shared understanding of the
civil component to inform the planning effort for special reconnaissance missions. CAO planning support to
special reconnaissance may include—
* Engaging civil networks that have access to denied or sensitive areas.
* Gaining civil information to develop the civil component of the common operational picture of
the supported commander.
* Providing civil component analysis to planning processes.
* Advising on the presence of culturally, economically, and politically significant assets and
resources within the objective area.
Note: FM 3-05 and ATP 3-18.4 provide additional information on special reconnaissance.
COUNTERTERRORISM
C-13. Counterterrorism consists of activities and operations taken to neutralize terrorists and their
organizations and networks in order to render them incapable of using violence to instill fear and coerce
governments or societies to achieve their goals (JP 3-26). Counterterrorism actions include strikes and raids
against terrorist organizations and facilities outside the U.S. and its territories. |
3-57 | 138 | Appendix C
C-14. CA forces combat terrorism efforts indirectly through activities to defeat the ideologies or motivations
that spawn terrorism. Counterterrorism is usually attributed to direct action specifically against terrorists or
violent extremist organizations. CAO planning support to counterterrorism action may include—
* Identifying TSOC objectives and developing nonlethal activities that support them.
* Identifying CCDR objectives and developing nonlethal activities that support them.
* Identifying the ambassador or country team objectives and developing nonlethal activities that
support them.
* Gaining civil information through CR, CE, and CND to develop the civil component of the
common operational picture of the supported commander.
* Providing civil component analysis toward the identification of—
Centers of gravity.
Decisive points.
Critical links and nodes.
* Denying the enemy civil component resources.
* Recommending post-strike employment options for CA capabilities.
* Participating in the targeting process to minimize unnecessary damage to the civil infrastructure
and culturally sensitive sites.
* Providing civil component analysis to planning processes to protect—
The populace.
Critical assets.
Infrastructure.
* Advising on the presence of culturally, economically, and politically significant assets and
resources within the objective area.
Note: JP 3-26 and ADP 3-05 provide more information on counterterrorism.
COUNTERING WEAPONS OF MASS DESTRUCTION
C-15. SOF support USG efforts to curtail the development, possession, proliferation, use, and effects of
weapons of mass destruction, related expertise, materials, technologies, and means of delivery by state and
non-state actors. USSOCOM supports CCDRs through technical expertise, materiel, and special teams to
complement other combatant command teams that locate, tag, and track weapons of mass destruction.
C-16. The CA contribution to countering weapons of mass destruction is CAO. CAO support the USG
strategic approach and lines of effort to prevent acquisition, contain or reduce threats, and provide
information to understand weapons of mass destruction pathways. CAO also support the USG by identifying
partner nation capabilities to respond to weapons of mass destruction events. These efforts—
* Promote weapons of mass destruction and chemical, biological, radiological, and nuclear threat
awareness.
* Improve military interoperability.
* Enhance military and civilian preparedness and deterrence.
* In some cases facilitate security of dual-use and chemical, biological, radiological, and nuclear
materials.
Note: JP 3-40, JP 3-05, and ADP 3-05 provide additional information on countering weapons of
mass destruction.
CIVIL-MILITARY ENGAGEMENT
C-17. CME is USSOCOM’s contribution, and part of the DOD’s strategy, to building partner nation capacity
in a preventive, population-centric, and indirect approach to enhance the capability, capacity, and legitimacy
of partnered indigenous governments. CME is persistent engagement conducted by, with, and through unified |
3-57 | 139 | Civil Affairs in Special Operations
action partners to shape and influence the IPI within the OE in support of the campaign plan of CCDR and
the campaign support plan of the TSOC, in conjunction with U.S. embassy strategies. The CME program—
* Increases the capability of USG-supported IPI.
* Reduces the influence of malign actors within targeted countries and regions.
* Leverages civil vulnerabilities and resiliencies within the OE.
* Engages with civil networks to provide access, information, and effects across the competition
continuum.
Note: The CME program is described in Chapter 5. |
3-57 | 141 | Appendix D
Civil Affairs Graphic Control Measures
This appendix shows a variety of symbols and graphic control measures related to CA and
CA tactical mission tasks. The appendix does not attempt to produce all conceivable
combinations for CA symbols or control measures, but it shows several examples of each
type as a starting point.
OVERVIEW
D-1. A military symbol is a graphic representation of a unit, equipment, installation, activity, control measure, or
tactical task relevant to military operations that is used for planning or to represent the common operational picture
on a map or overlay. Military symbols are governed by the rules in MIL-STD-2525D. FM 1-02.2 also provides an
extensive number of icons and modifiers for building a variety of framed symbols.
MODIFIERS FOR FRAMED SYMBOLS
D-2. A modifier provides an abstract pictorial or alphanumeric representation displayed inside the framed symbol
in conjunction with a main icon. It provides information about the icon (unit, equipment, installation, or activity)
being displayed. Sector 1 modifiers (or modifiers placed above the main icon) show a specific function that the
unit is organized and equipped to perform. Sector 2 modifiers (or modifiers placed below the main icon) reflect
the mobility, size, range, or altitude of unit equipment, or an additional capability of the unit.
AMPLIFIERS FOR FRAMED SYMBOLS
D-3. An amplifier provides additional information about the symbol being shown and is displayed outside the
frame. To avoid cluttering the display, only essential amplifier fields should be used. The amplifier location in the
figure E-1 have changed from previous editions of FM 1-02.2. The locations also vary from MIL-STD-2525D.
Figure D-1 and table D-1, pages D-2 through D-3, standardize the field locations of additional information.
Figure D-1. Main and modifier icon and amplifier placement locations |
3-57 | 142 | Appendix D
Table D-1. Description of main icon and amplifier fields for unit frames
Field Field Title Description
The innermost part of a symbol that represents the main function (main
A Main and modifier icons
icon) and its capabilities (modifiers 1 and 2).
B Echelon A graphic amplifier in a unit symbol that identifies command level.
C Quantity A text amplifier that identifies a specific number and type of items.
D Task force indicator A graphic amplifier that identifies a unit or activities symbol as a task force.
A text amplifier in a unit symbol that displays (+) for reinforced, (-) for
Attached and detached
F reduced, (+) reinforced and reduced.
(reinforced or reduced)
Note: A maximum of 3 characters are allowed in this field.
A text amplifier for units, equipment, and installations; content is
G Staff comments implementation specific.
Note: A maximum of 20 characters are allowed in this field.
A unique alphanumeric designation that identifies the unit being displayed.
H Additional information
Note: A maximum of 20 characters are allowed in this field.
A text amplifier for units, equipment, and installations that consists of a
single-letter reliability rating and single-digit credibility rating.
Reliability Ratings:
A–completely reliable.
B–usually reliable.
C–fairly reliable.
D–not usually reliable.
E–unreliable.
J Evaluation rating F–reliability cannot be judged.
Credibility Ratings:
1–confirmed by other sources.
2–probably true.
3–possibly true.
4–doubtfully true.
5–improbable.
6–truth cannot be judged.
Note: A maximum of 2 characters are allowed in this field.
A text amplifier for units and installations that indicates effectiveness.
The entries are—
Fully operational (FO).
Substantially operational (SO).
K Combat effectiveness
Marginally operational (MO).
Not operational (NO).
Unknown (UNK).
Note: A maximum of 5 characters are allowed in this field.
A text amplifier for units that indicates number or title of higher echelon
M Higher echelon formation command (corps are designated by Roman numerals).
Note: A maximum of 5 characters are allowed in this field.
Identification, friend or A text amplifier displaying one or more identification, friend or foe, or
foe selective identification feature, identification modes and codes. Display
P
Selective identification priority is mode 5, mode 4, mode 3, and mode 2.
feature Note: A maximum of 15 characters allowed in this field. |
3-57 | 143 | Civil Affairs Graphic Control Measures
Table D-1. Description of main icon and amplifier fields for unit frames (continued)
Field Field Title Description
Direction of movement A graphic amplifier for units and equipment that identifies the direction of
Q
indicator movement or intended movement of an object.
S S2 Offset location indicator A graphic amplifier used to indicate the offset or precise location.
1. An amplifier field reserved for command and control systems that
uniquely identifies a particular symbol with a track number.
Prefix = TN #####
T Unique identifier
Example: TN: 13579
2. May also be used for unit designation.
Note: A maximum of 30 characters are allowed in this field.
An alphanumeric designator for displaying a date-time group
(DDHHMMSSZMONYYYY), or O/O for on order. The date-time group is
composed of a group of six numeric digits with a time zone suffix, and the
standardized three-letter abbreviation for the month, followed by four digits
W Date-time group representing the year. The first pair of digits represents the day; the second
pair, the hour; the third pair, the minutes; and the fourth pair, the seconds.
For automated systems, two digits may be added before the time zone suffix
and after the minutes to designate seconds.
Note: A maximum of 16 characters are allowed in this field.
A text amplifier that displays either altitude, flight level, depth for submerged
objects, or height of equipment or structures on the ground. Measurement
units will be displayed within the string.
X Altitude or depth
Example 1: Example 2:
1500 MSL FL150
Note: A maximum of 14 characters are allowed in this field.
A text amplifier that displays a symbol’s location in degrees, minutes, and
decimal minutes (or in military grid reference system, global area
Y Location
reference system, or other applicable display formats).
Note: A maximum of 14 characters are allowed in this field.
A text amplifier for units and equipment that displays velocity.
Z Speed
Note: A maximum of 8 characters are allowed in this field.
A text modifier for units. The indicator is contained inside he frame. A
named command such as, Supreme Headquarters Allied Powers, Europe;
United States Southern Command; United States Central Command; and
AA Offset location indicator
joint, multinational, or coalition commands such as, combined joint task
forces or joint task forces.
Note: A maximum of 9 characters are allowed in this field.
A graphic amplifier, placed immediately atop the symbol, which may denote—
Local or remote status.
Engagement status.
Weapon type.
AO Engagement bar
The engagement amplifier is arranged as A:BBB-CC
A (1 character) denotes a local, versus remote, engagement.
BBB (up to 3 characters) denotes engagement state.
CC (up to 2 characters) denotes weapon deployment or asset control.
A three-letter code that indicates the country of origin of the organization.
AS Country In stability activities, this field can be used for factions or groups.
Note: A maximum of 3 characters are allowed in this field. |
3-57 | 144 | Appendix D
CIVIL AFFAIRS UNIT OR ELEMENT SYMBOLS
D-4. The symbols in the tables that follow portray the different types of CA units and elements. These tables
also depict how to use modifiers and amplifiers, which affords the opportunity to show additional information
about the main icon.
CIVIL AFFAIRS COMMANDS
D-5. Table D-2 shows the framed symbol for a CACOM. The symbol is comprised of the main icon, CA,
inside the frame, reflecting the main function of the symbol. In addition to the main icon, there is the echelon
amplifier for command above the frame and the unique alphanumeric unit designation amplifier for the unit
on the right side of the frame.
Table D-2. Civil Affairs command framed symbols
Symbol Title Description
350th Civil Affairs Command
351st Civil Affairs Command
Basic framed symbol for a Civil Affairs
command with the echelon amplifier
for command and the unique
alphanumeric unit designation
amplifier outside the frame.
352d Civil Affairs Command
353d Civil Affairs Command |
3-57 | 145 | Civil Affairs Graphic Control Measures
CIVIL AFFAIRS BRIGADES
D-6. Table D-3 shows the framed symbol for CA brigades. The basic CA brigade symbol is comprised of the
main icon for CA inside the framed symbol. Each symbol also has the brigade echelon amplifier centered above
and outside the frame and unique alphanumeric unit designation amplifiers outside the right edge of the frame.
Table D-3. Civil Affairs brigade framed symbols
Symbol Title Description
361st Civil Affairs Brigade
Basic framed symbol for a Civil Affairs
brigade with the echelon amplifier for
322d Civil Affairs Brigade brigade and the unique alphanumeric
unit designation amplifier outside the
frame.
308th Civil Affairs Brigade
The same symbol for a Civil Affairs
95th Civil Affairs Brigade brigade, with the addition of the
(Special Operations) special operations forces modifier in
(Airborne) the sector 1 location, and airborne
modifier in the sector 2 location. |
3-57 | 146 | Appendix D
CIVIL AFFAIRS BATTALIONS
D-7. Table D-4 shows the framed symbol for CA battalions. The basic CA battalion symbol is comprised
of the main icon for CA inside the framed symbol. Each symbol also has the echelon for brigade centered
above and outside the frame and the unique alphanumeric unit designation amplifiers outside the right edge
of the frame.
Table D-4. Civil Affairs battalion framed symbols
Symbol Title Description
422d Civil Affairs Battalion
Basic framed symbol for a Civil Affairs
battalion with the echelon amplifier for
battalion and the unique alphanumeric
unit designation amplifier outside the
frame.
83d Civil Affairs Battalion
The same symbol for a Civil Affairs
92d Civil Affairs Battalion battalion, with the addition of the
(Special Operations) special operations forces modifier in
(Airborne) the sector 1 location, and airborne
modifier in the sector 2 location.
The same symbol for a Civil Affairs
426th Civil Affairs Battalion battalion, with the addition of the
(Airborne) airborne modifier in the sector 2
location.
CIVIL AFFAIRS COMPANY
D-8. Table D-5 shows the framed symbol for CA companies. The symbol is comprised of the main icon for
CA inside the framed symbol. Each symbol has the echelon amplifier for company centered above and
outside the frame and the unique alphanumeric unit designation amplifiers outside the right edge of the frame. |
3-57 | 147 | Civil Affairs Graphic Control Measures
Table D-5. Civil Affairs company framed symbols
Symbol Title Description
B Company,
83d Civil Affairs Battalion
Basic framed symbol for a Civil Affairs
company with the echelon amplifier for
company and the unique alphanumeric
unit designation amplifier outside the
frame.
A Company,
402d Civil Affairs Battalion
The same symbol for a Civil Affairs
D Company,
company, with the addition of the
96th Civil Affairs Battalion
special operations forces modifier in
(Special Operations)
the sector 1 location, and the airborne
(Airborne)
modifier in the sector 2 location.
The same symbol for a Civil Affairs
A Company,
company, with the addition of the
478th Civil Affairs Battalion
airborne modifier in the sector 2
(Airborne)
location.
CIVIL AFFAIRS COMMAND, BRIGADE, BATTALION, AND COMPANY HEADQUARTERS
D-9. Every echelon, from CACOM through CA company, has a headquarters or headquarters element.
In Table D-6, a horizontal line across the sector 1 modifier field, inside the framed symbol, depicts the
headquarters or headquarters element. The rest of the symbol is the same as in the preceding tables.
Table D-6. Civil Affairs headquarters elements framed symbols
Symbol Title Description
Basic framed symbol for a Civil Affairs
Headquarters, command, with the addition of the
350th Civil Affairs Command headquarters element modifier in the
sector 1 location.
Basic framed symbol for a Civil Affairs
Headquarters, brigade, with the addition of the
354th Civil Affairs Battalion headquarters element modifier in the
sector 1 location. |
3-57 | 148 | Appendix D
Table D-6. Civil Affairs headquarters elements framed symbols (continued)
Symbol Title Description
Basic framed symbol for a Civil Affairs
Headquarters, battalion, with the addition of the
422d Civil Affairs Battalion headquarters element modifier in the
sector 1 location.
Basic framed symbol for a Civil Affairs
Headquarters, A Company company, with the addition of the
478th Civil Affairs Battalion headquarters element modifier in the
(Airborne) sector 1 location and the airborne
modifier in the sector 2 location.
CIVIL AFFAIRS TEAMS
D-10. Table D-7 shows the framed symbol for CATs. The basic CAT symbol is comprised of the main icon
for CA inside the framed symbol. Each CAT symbol has the echelon amplifier for team centered above and
outside the frame and the unique alphanumeric unit designation amplifiers outside the right edge of the frame.
Active Component special operations CATs use 3-digit identifiers, and active component conventional CATs
use 4 digit identifiers. Reserve component conventional CATs do not have a standardized team numbering
convention.
Table D-7. Civil Affairs team framed symbols
Symbol Title Description
Basic framed symbol for a Civil Affairs
team, with the echelon amplifier for
team and the unique alphanumeric
unit designation amplifier. The first two
Civil Affairs Team 8324, numbers in the Civil Affairs team
B Company, naming convention are for the
83d Civil Affairs Battalion battalion; in this example this is 83 for
the 83d. The next number is for the
company (example: A Co-1, B Co-2,
C Co-3, and so on). The final number
is the team within the company.
Basic framed symbol for a Civil Affairs
team, with the echelon amplifier for
Civil Affairs Team ----, team and the unique alphanumeric
B Company, unit designation amplifier. A team
414th Civil Affairs Battalion naming convention for United States
Army Civil Affairs and Psychological
Operations Command does not exist. |
3-57 | 149 | Civil Affairs Graphic Control Measures
Table D-7. Civil Affairs team framed symbols (continued)
Symbol Title Description
Basic framed symbol for a Civil Affairs
team, with the echelon amplifier for
team and the unique alphanumeric
unit designation amplifier. The first two
numbers in the Civil Affairs team
Civil Affairs Team 642, naming convention are for the
D Company, battalion; in this example this is 96 for
96th Civil Affairs Battalion the 96th. The next number is for the
(Special Operations) company (example: A Co-1, B Co-2,
(Airborne) C Co-3, and so on). The final number
is the team within the company. In
addition, the special operations forces
modifier is included in the sector 1
location, and the airborne modifier is
included in the sector 2 location.
Basic framed symbol for a Civil Affairs
team, with the echelon amplifier for
team and the unique alphanumeric
Civil Affairs Team ----,
unit designation amplifier. A team
C Company,
naming convention for the
416th Civil Affairs Battalion
United States Army Civil Affairs and
(Airborne)
Psychological Operations Command
does not exist. In addition, the airborne
modifier is included in sector 2.
CIVIL AFFAIRS ELEMENTS
D-11. Table D-8 demonstrates the building of symbols for all levels of CAPTs, CMOCs, and CLTs. The
symbol is comprised of the main icon for CA inside the framed symbol. The echelon of each element is shown
as an amplifier centered above on the outside of the framed symbol. The level of where these elements are
from can only be depicted with the unique alphanumeric unit designation amplifiers on the right edge outside
the frame.
Table D-8. Civil Affairs elements
Symbol Title Description
Framed symbol for a Civil Affairs
planning team is comprised of the
main icon for CA, with the echelon
351st Civil Affairs Command, amplifier for team, and the unique
Civil Affairs Planning Team alphanumeric unit designation
amplifier. (This is the only way to show
the level of the Civil Affairs planning
team.)
The framed symbol for a Civil Affairs
planning team is comprised of the
main icon for Civil Affairs echelon
308th Civil Affairs Brigade, amplifier for team and the unique
Civil Affairs Planning Team alphanumeric unit designation
amplifier. (This is the only way to show
the level of the Civil Affairs planning
team.) |
3-57 | 150 | Appendix D
Table D-8. Civil Affairs elements (continued)
Symbol Title Description
Framed symbol for a Civil Affairs
planning team is comprised of the
main icon for Civil Affairs, with the
echelon amplifier for team, and the
92d Civil Affairs Battalion
unique alphanumeric unit designation
(Special Operations)
amplifier. (This is the only way to show
(Airborne)
the level of the Civil Affairs planning
Civil Affairs Planning Team
team.) In addition, the modifier for
special operations forces is included in
the sector 1 location and the airborne
modifier is in the sector 2 location.
Framed symbol for a Civil Affairs
planning team is comprised of the
main icon for Civil Affairs, with the
echelon amplifier for team, and the
97th Civil Affairs Battalion
unique alphanumeric unit designation
(Special Operations)
amplifier. (This is the only way to show
(Airborne)
the level of the Civil Affairs planning
Civil Affairs Planning Team
team.) In addition, the modifier for
forward is included in the sector 1
location and the airborne modifier is in
the sector 2 location.
Framed symbol for a theater Civil
Affairs planning team is comprised of
United States Army, Europe
the main icon for Civil Affairs, with the
Theater Civil Affairs
echelon amplifier for team and the
Planning Team
unique alphanumeric unit designation
amplifier for the unit.
Framed symbol for a civil-military
operations center is comprised of the
main icon for Civil Affairs, with the
353d Civil Affairs Command
echelon amplifier for section, and the
Civil-Military Operations
unique alphanumeric unit designation
Center
amplifier. (This is the only way to show
the level of the civil-military operations
center.)
Framed symbol for a civil-military
operations center is comprised of the
main icon for Civil Affairs, with the
308th Civil Affairs Brigade
echelon amplifier for section, and the
Civil-Military Operations
unique alphanumeric unit designation
Center
amplifier. (This is the only way to show
the level of the civil-military operations
center.)
Framed symbol for a civil-military
operations center is comprised of the
main icon for Civil Affairs, with the
415th Civil Affairs Battalion
echelon amplifier for section, and the
Civil-Military Operations
unique alphanumeric unit designation
Center
amplifier. (This is the only way to show
the level of the civil-military operations
center.) |
3-57 | 151 | Civil Affairs Graphic Control Measures
Table D-8. Civil Affairs elements (continued)
Symbol Title Description
Framed symbol for a civil-military
operations center is comprised of the
B Company main icon for Civil Affairs, with echelon
83d Civil Affairs Battalion amplifier for section, and the unique
Civil-Military Operations alphanumeric unit designation
Center amplifier. (This is the only way to show
the level of the civil-military operations
center.)
Framed symbol for a civil-military
support element is comprised of the
Civil-Military Support Element, main icon for Civil Affairs, with the
C Company echelon amplifier for section and the
92d Civil Affairs Battalion unique alphanumeric unit designation
(Special Operations) amplifier. In addition, the modifier for
(Airborne) special operations forces is in the
sector 1 location and the airborne
modifier is in the sector 2 location.
Framed symbol for a civil liaison team
is comprised of the main icon for Civil
Affairs, with the echelon amplifier for
350th Civil Affairs Command
team, and the unique alphanumeric
Civil Liaison Team
unit designation amplifier. (This is the
only way to show the level of the civil
liaison team.)
Framed symbol for a civil liaison team
is comprised of the main icon for Civil
Affairs, with the echelon amplifier for
95th Civil Affairs Brigade team, and the unique alphanumeric
(Special Operations) unit designation amplifier. (This is the
(Airborne) only way to show the level of the civil
Civil Liaison Team liaison team.) In addition, the modifier
for special operations forces is in the
sector 1 location and the airborne
modifier is in the sector 2 location.
Framed symbol for a civil liaison team
is comprised of the main icon for Civil
Affairs, with the echelon amplifier for
492d Civil Affairs Battalion
team, and the unique alphanumeric
Civil Liaison Team
unit designation amplifier. (This is the
only way to show the level of the civil
liaison team.)
Framed symbol for a civil-military
advisory group is comprised of the
main icon for Civil Affairs, with the
echelon amplifier for section, and the
95th Civil Affairs Brigade
unique alphanumeric designation
(Airborne)
amplifier for the 95th. In addition, the
Civil-Military Advisory Group
modifier for special operations forces
is in the sector 1 location and the
airborne modifier is in the sector 2
location |
3-57 | 152 | Appendix D
MAIN ICONS FOR ORGANIZATIONS AND INDIVIDUALS
D-12. The military has a much larger role beyond fighting wars. The symbols in table D-9 are a recognition
that military forces are often engaged in stability activities and support to civil authorities across the world.
Table D-9 shows individual and organization symbols that represent civilians; however, these symbols do
not have prescribed structures. The organization symbols can reflect civic, ethnic, religious, social, or other
groups. The framed symbols below are in the friendly standard identity frame, which is rectangular in shape.
For a more comprehensive list of symbols for units, individuals, and organizations, refer to FM 1-02.2, or
MIL-STD 2525D.
Table D-9. Organizations and individuals
Main Icon Name Description
Framed symbol for a governmental
Governmental organization organization comprised of the main
icon for a governmental organization.
Framed symbol for a nongovernmental
Nongovernmental organization comprised of the main
organization icon for a nongovernmental
organization
Framed symbol comprised of the
Unspecified individual
symbol for unspecified individual.
Framed symbol comprised of the
Unspecified organization
symbol for unspecified organization.
Framed symbol comprised of the
Criminal activities victim symbol for unspecified individual with
the modifier for victim.
Framed symbol comprised of the
Criminal activities victims symbol for unspecified organization
with the modifier for victim.
Framed symbol comprised of the
Attempted criminal activities
symbol for unspecified individual with
victim
a modifier for attempted crime.
Framed symbol comprises of the
Attempted criminal activities
symbol for unspecified organization
victims
with a modifier for attempted crime. |
3-57 | 153 | Civil Affairs Graphic Control Measures
MODIFIERS FOR CIVILIAN INDIVIDUAL AND ORGANIZATIONS
D-13. Table D-10 shows modifiers that reflect the function of civilian individuals or organizations. Some
modifiers are framed in the friendly standard identity frame (rectangular shape), others are framed in the
hostile standard identity frame (diamond shape).
Table D-10. Modifiers for individuals and organizations
Modifier Name Description
Leader
Displaced persons, refugees,
and evacuees
Assassination victim(s)
Modifiers in these sections are used to
add more detail to the main icons,
giving the user a way to provide
additional information. (These are not
complete symbols, but mere
representations of the location of the
Execution victim(s)
modifiers in the symbols.)
Targeted person, group, or
organization
Terrorist person, group, or
organization
CIVILIAN INSTALLATIONS
D-14. Installations are sites that vary from permanent to temporary structures. Icons in the main sector
represent the main function of the symbol and sector 1 modifiers reflect specific capabilities of the
installation. The framed symbols below are in the friendly standard identity frame (rectangular shape).
Table D-11, pages D-14 and D-15, shows common examples of civil installations. |
3-57 | 154 | Appendix D
Table D-11. Civilian installations
Symbol Name Description
Framed symbol for a school or
educational facility comprised of the
School or main icon for school, along with the
educational institution filled in rectangle in the echelon
amplifier location representing an
installation.
Framed symbol for a school or
educational facility comprised of the
main icon for school, along with the
filled in rectangle in the echelon
College or university
amplifier location representing an
installation. The symbol also has a
sector 1 modifier for college or
university.
Framed symbol for an economic
installation (bank, tax office, and so
on) comprises of the main icon for
Economic installation
economic, along with the filled in
rectangle in the echelon amplifier
location representing an installation.
Framed symbol for a displaced
persons, refugees, and evacuees
camp comprised of the main icon for
Displaced persons, refugees, tented camp, along with the filled in
and evacuees rectangle in the echelon amplifier
tented camp location representing an installation.
The symbol has a sector 1 modifier for
displaced persons, refugees, and
evacuees.
Framed symbol for an electric power
plant comprised of the main icon for
Electric power plant electricity, along with the filled in
rectangle in the echelon amplifier
location representing an installation.
Framed symbol for a water treatment
facility comprised of the main icon for
water, along with the filled in rectangle
Water treatment
in the echelon amplifier location
(purification)
representing an installation. The
symbol also has a sector 1 modifier for
purification.
Framed symbol for a food distribution
center comprised of the main icon for
Food food, along with the filled in rectangle
in the echelon amplifier location
representing an installation. |
3-57 | 155 | Civil Affairs Graphic Control Measures
D-11. Civilian installations (continued)
Symbol Name Description
Framed symbol for a medical
treatment facility comprised of the
main icon for medical, along with the
Medical treatment facility filled in rectangle in the echelon
amplifier location representing an
installation. The symbol also has
modifiers for medical treatment facility.
Framed symbol for a safe house
comprises of the main icon for a safe
house, along with the filled in rectangle
Safe house in the echelon amplifier location
representing an installation.
CIVILIAN ACTIVITIES
D-15. Activity symbols are applicable across the competition continuum, but they normally focus on stability
activities and DSCA activities. These activities may affect military operations. Table D-12 shows common
examples of civilian activities. Icons in the main sector reflect the main function of the symbol. Some of are
framed in the friendly standard identity frame (rectangular shape), others are framed in the hostile standard
identity frame (diamond shape). FM 1-02.2 provides a more extensive list of icons and modifiers for
activities.
Table D-12. Civilian activities
Symbol Name Description
Election, voting, or
polling place
Demonstration
Symbol used to designate a specific
activity on both overlays or in civil
information management products.
Meeting
Black market |
3-57 | 156 | Appendix D
Table D-12. Civilian activities (continued)
Symbol Name Description
Type of killing (murder)
Type of killing (assassination)
Symbol used to designate a specific
activity on both overlays or in civil
information management products.
Type of killing (execution)
Riot
CIVIL AFFAIRS GRAPHICS CONTROL MEASURES
D-16. A graphic control measure is a graphic used on a map or overlay to regulate forces and warfighting
functions. Control measure symbols generally fall into one of three categories: points, lines, and areas. These
symbols can be combined with other military symbols, icons, and amplifiers to display operational
information. The only modifiers that are used for graphic control measures are chemical, biological,
radiological, and nuclear events and contaminated areas. Figures D-2 and D-3, and table D-13, page D-18,
show the description of control measure symbol amplifier fields and the standardized placements. |
3-57 | 157 | Civil Affairs Graphic Control Measures
Figure D-2. Standard template point
Figure D-3. Standard area template |
3-57 | 158 | Appendix D
Table D-13. Amplifier descriptions for control measure symbols
Field Field Title Description
The part of the symbol that represents the unit symbol, or object function
A Symbol icon
(modifier).
B Echelon This is a unit symbol that identifies command level.
C Quantity This identifies the number of items present.
H Additional information This content is implementation specific.
N Hostile (enemy) The letters ENY denote hostile control measure symbols.
Direction of movement Identifies the direction of movement (or intended movement) of an object.
Q
indicator
For points and chemical, biological, radiological, and nuclear events,
S Offset location indicator
used for placing an object away from its actual location.
T is used to differentiate points by numbering, lettering, or a combination
of both. T1 may be used to include the unit designation.
Notes:
1. In some cases, this tactical symbol may require multiple instance of a T
T, T1 Unique designation
amplifier to fully create or represent an object.
2. T1 may be used if the field used is displayed more than once in a
tactical symbol.
3. The unnumbered fields should be filled before the numbered fields.
V Type Indicates type of equipment or nuclear weapon type.
W identifies the start date-time group, and it can be displayed alone or
in conjunction with W2 to identify the projected date-time group end
date. The W represents an alphanumeric designator for displaying a
date-time group (DDHHMMSSZMONYYYY), or O/O, for on order.
When W and W2 are used in conjunction, this identifies the time
control measure is in effect.
W,
Date-time group The date-time group is composed of a group of six numeric digits with a
W2
time zone suffix, and the standardized three-letter abbreviation for the
month, followed by four digits representing the year. The first pair of digits
represents the day; the second pair, the hour; and the third pair, the
minutes. The last four digits, after the month, represent the year. For
automated systems, two digits may be added before the time zone suffix
and after the minutes to designate seconds.
Displays the minimum, maximum, or specific altitude (in feet or meters)
X Altitude or depth in relation to a reference datum and the flight level or depth for
submerged objects (in feet below sea level).
Y Location Displays the location of a symbol in degrees, minutes, and decimal minutes.
An alphanumeric amplifier that displays a minimum, maximum, or specific
AM Distance
distance (including range, radius, width, or length) in meters.
A numeric amplifier that displays an angle measured from true north to any
AN Azimuth
other line—in degrees.
A six-character text modifier used in fire support operations to uniquely
designation targets where characters 1 and 2 are alphabetic, and characters
AP Target number
3 through 6 are numeric.
Example: AANNNN (where A is alphabetic, and N is numeric) |
3-57 | 159 | Civil Affairs Graphic Control Measures
CIVIL AFFAIRS TACTICAL MISSION TASKS
D-17. A tactical mission task is a specific activity performed by a unit while executing a tactical operation.
Tactical task symbols are used in course-of-action sketches, synchronization matrices, and maneuver
sketches. The following tables show examples of how CND, CR, and CE can be displayed using standard
framed symbols in conjunction with control measure symbols.
Note: FM 1-02.2 provides further information on symbols for tactical mission tasks.
CIVIL NETWORK DEVELOPMENT
D-18. Table D-14 portrays examples of how CND can be displayed on a maneuver or course of action sketch.
The control measure symbols use the standard point and area symbols combined with the CA main icon,
unique unit designation, echelon, and free text amplifiers.
Table D-14. Civil network development symbols
Symbol Example Description
The point civil network development
Civil Affairs Team 123 symbol is comprised of the symbol for
conducts civil network standard point. The main icon for Civil
development at a point of Affairs and the unique alphanumeric
interest (grid coordinate or designation amplifier for the unit are
specific location) to meet with included inside the symbol. In addition,
the mayor to identify sources of the mission task acronym and the
instability in the town. purpose verb for the mission task are
in the number 5 amplifier position.
The area civil network development
control measure symbol is comprised
Civil Affairs Team 8334, of the symbol for an area. A framed
C Company, symbol is included inside the area
83d Civil Affairs Battalion symbol with the main icon for Civil
conducts civil network Affairs and the echelon and unique
development in a designated alphanumeric designation amplifiers
area to identify sources of for the unit. In addition, the mission
instability. task acronym and the purpose verb for
the mission task are in the number 5
amplifier position. |
3-57 | 160 | Appendix D
CIVIL RECONNAISSANCE
D-19. Table D-15 portrays examples of how CR can be displayed on a maneuver or course of action sketch.
The control measure symbols use the standard point and area symbols combined with the CA main icon,
unique unit designation, echelon, and free text amplifiers.
Table D-15. Civil reconnaissance symbols
Symbol Example Description
The point civil reconnaissance symbol is
comprised of the symbol for standard
Civil Affairs Team 123
point. The main icon for Civil Affairs and
conducts civil reconnaissance
the unique alphanumeric designation
at a specific point (grid
amplifier for the unit are included inside
coordinate or specific location)
the symbol. In addition, the mission task
to assess for a specified
acronym and the purpose verb for the
reason.
mission task are in the number 5
amplifier position.
The area civil reconnaissance control
measure symbol is comprised of the
Civil Affairs Team 8334,
symbol for an area. A framed symbol is
C Company,
included inside the area symbol with the
83d Civil Affairs Battalion is
main icon for Civil Affairs and the
ordered to conduct civil
echelon and unique alphanumeric
reconnaissance in a specified
designation amplifiers for the unit. In
area to assess for a specified
addition, the mission task acronym and
reason.
the purpose verb for the mission task are
in the number 5 amplifier position.
The area civil reconnaissance control
measure symbol is comprised of the
B Company, symbol for an area. A framed symbol
425th Civil Affairs Battalion is is included inside the area symbol with
ordered to conduct civil the main icon for Civil Affairs, and the
reconnaissance in a specified echelon and unique alphanumeric
area to assess for a specified designation amplifiers for the unit. In
reason. addition, the mission task acronym and
the purpose verb for the mission task are
in the number 5 amplifier position.
The linear civil reconnaissance symbol
is comprised of the symbol for a
designated linear area for civil
reconnaissance. The linear area would
A civil-military support element
be between the points of the two
from B Company,
arrows. A framed symbol is included
92d Civil Affairs Battalion is
with the main icon for Civil Affairs, the
ordered to conduct civil
special operations forces modifier in
reconnaissance between
sector 1 location, the airborne modifier
designated locations to
in sector 2 location, and the echelon
validate certain information.
and unique alphanumeric designation
amplifiers for the unit. In addition, the
purpose verb for the mission task is in
the number 5 amplifier position. |
3-57 | 161 | Civil Affairs Graphic Control Measures
CIVIL ENGAGEMENT
D-20. Table D-16 portrays examples of how CE can be displayed on a maneuver or course of action sketch.
The control measure symbols use the standard point, area, and point of interest symbols combined with the
CA main icon, unique unit designation, echelon, and free text amplifiers.
Table D-16. Civil engagement symbols
Symbol Example Description
The point civil engagement symbol is
Civil Affairs Team 123 comprised of the symbol for standard
conducts civil engagement at point. The main icon for Civil Affairs
a point of interest (grid and the unique alphanumeric
coordinate or specific location) designation amplifier for the unit are
to meet with the mayor to included inside the symbol. In addition,
identify sources of instability in the mission task acronym and the
the town. purpose verb for the mission task is in
the number 5 amplifier position.
The area civil engagement control
measure symbol is comprised of the
symbol for an area. A framed symbol
Civil Affairs Team 8334,
is included inside the area symbol with
C Company,
the main icon for Civil Affairs and the
83d Civil Affairs Battalion
echelon and unique alphanumeric
conducts civil engagement in
designation amplifiers for the unit.
a designated area to identify
In addition, the mission task acronym
sources of instability.
and the purpose verb for the mission
task are in the number 5 amplifier
position.
The area civil engagement control
measure symbol is comprised of the
symbol for an area. A framed symbol
B Company, is included inside the area symbol with
425th Civil Affairs Battalion the main icon for Civil Affairs and the
conducts civil engagement in echelon and unique alphanumeric
a designated area to identify designation amplifiers for the unit.
sources of instability In addition, the mission task acronym
and the purpose verb for the mission
task are in the number 5 amplifier
position. |
3-57 | 163 | Glossary
SECTION I – ACRONYMS AND ABBREVIATIONS
ADP Army doctrine publication
AO area of operations
ARCENT United States Army Central Command
ARNG Army National Guard
ARSOF Army special operations forces
ASCOPE areas, structures, capabilities, organizations, people, events
ATP Army techniques publication
BCT brigade combat team
CA Civil Affairs
CACOM Civil Affairs command
CAO Civil Affairs operations
CAPT Civil Affairs planning team
CAT Civil Affairs team
CCDR combatant commander
CCIR commander’s critical information requirement
CE civil engagement
CIE civil information evaluation
CJCS GDE Chairman of the Joint Chiefs of Staff guide
CKI civil knowledge integration
CME civil-military engagement
CMI civil-military integration
CMO civil-military operations
CMOC civil-military operations center
CMSE civil-military support element
CNA civil network analysis
CND civil network development
CNDE civil network development and engagement
CONOPS concept of operations
CPB civil preparation of the battlefield
CR civil reconnaissance
DA Department of the Army
DC dislocated civilian
DOD Department of Defense
DODD Department of Defense directive
DODI Department of Defense instruction
DOS Department of State
DSCA defense support of civil authorities
FHA foreign humanitarian assistance
FID foreign internal defence
G-2 assistant chief of staff, intelligence
G-3 assistant chief of staff, operations
G-4 assistant chief of staff, logistics
G-5 assistant chief of staff, plans
G-9 assistant chief of staff, civil affairs operations |
3-57 | 164 | Glossary
FM field manual
FORSCOM United States Army Forces Command
HN host nation
IO information operations
IPB information preparation of the battlefield
IPI indigenous populations and institutions
J-2 intelligence directorate of a joint staff
J-3 operations directorate of a joint staff
J-4 logistics directorate of a joint staff
J-5 plans directorate of a joint staff
J-9 civil-military operations/interagency cooperation directorate of a joint staff
JCMOTF joint civil-military operations task force
JFC joint force commander
JP joint publication
JSOTF joint special operations task force
JTF joint task force
MDMP military decisionmaking process
METT-TC mission, enemy, terrain and weather, troops and support available-time
available and civil considerations
NGO nongovernmental organization
OE operational environment
PMESII-PT political, military, economic, social, information, infrastructure, physical
environment, time
PRC populace and resources contol
PSYOP Psychological Operations
RM risk management
S-2 battalion or brigade intelligence staff officer
S-3 battalion or brigade operations staff officer
S-4 battalion or brigade logistics staff officer
S-5 battalion or brigade plans staff officer
S-9 battalion or brigade civil affairs operations staff officer
SA security assistance
SCA support to civil administration
SOF special operations forces
TG transitional governance
TSOC theater special operations command
USACAPOC United States Army Civil Affairs and Psychological Operations Command
USAID United States Agency for International Development
USAJFKSWCS United States Army John F. Kennedy Special Warfare Center and School
USAR United States Army Reserve
USARSOC United States Army Reserve Special Operations Command
USASOC United States Army Special Operations Command
USC United States Code
USCENTCOM United States Central Command
USG United States government
USSOCOM United States Special Operations Command
UW unconventional warfare |
3-57 | 165 | Glossary
SECTION II – TERMS
Civil Affairs operations
Actions planned, coordinated, executed, and assessed to enhance awareness of, and manage the
interaction with, the civil component of the operational environment; identify and reduce underlying
causes of instability within civil society; and/or involve the application of functional specialty skills
normally the responsibility of civil government. Also called CAO. (JP 3-57)
*civil engagement
a targeted, planned, and coordinated meeting with known or potential contacts in a civil network that is
designed to develop or maintain relationships and to share or collect information. Also called CE.
(FM 3-57, proposed for inclusion in FM 1-02.1)
*civil information evaluation
The evaluation of civil information for operational relevance and feasible courses of action. Also
called CIE. (FM 3-57, proposed for inclusion in FM 1-02.1)
*civil knowledge integration
The actions taken to analyze, evaluate, and organize collected civil information for operational
relevance and informing the warfighting function Also called CKI. (FM 3-57, proposed for inclusion
in FM 1-02.1)
*civil military integration
The actions taken to establish, maintain, influence, or leverage relations between military forces and
indigenous populations and institutions to synchronize, coordinate, and enable interorganizational
cooperation and to achieve unified action. Also called CMI. (FM 3-57, proposed for inclusion in
FM 1-02.1)
*civil-military support element
A task-organized Civil Affairs force established to plan, facilitate, and execute Civil Affairs operations
in support of civil-military engagement in a specified country, region, or theater. Also called CMSE.
(FM 3-57)
*civil network
A collection of formal and informal groups, associations, military engagements, and organizations
within an operational environment that interact with each other with varying degrees of frequency,
trust, and collaboration. (FM 3-57, proposed for inclusion in FM 1-02.1)
*civil network analysis
A process that identifies and analyzes the relative importance and influence of nodes within a civil
network through network visualizations and qualitative and quantitative analytical methods. Also
called CNA. (FM 3-57, proposed for inclusion in FM 1-02.1)
*civil network development
The planned and targeted action in which Civil Affairs forces develop networks within the civil
component of the operational environment to influence populations and manage local resources in
order to extend the operational reach, consolidate gains, and achieve military objectives. Also called
CND. (FM 3-57, proposed for inclusion in FM 1-02.1)
*civil network development and engagement
The activity by which the civil network capabilities and resources are engaged, evaluated, developed, and
integrated into operations. Also called CNDE. (FM 3-57, proposed for inclusion in FM 1-02.1) |
3-57 | 166 | Glossary
*civil preparation of the battlefield
The systematic process of analyzing civil considerations in an area of interest to determine their effects
on friendly, neutral, and enemy operations. Also called CPB. (FM 3-57, proposed for inclusion in
FM 1-02.1)
*civil preparation of the environment
The continuous development of civil knowledge within an area of operations to help commanders
identify capabilities within civil society that can be integrated with operations for stability and security
activities. (FM 3-57, proposed for inclusion in FM 1-02.1)
command and control
The exercise of authority and direction by a properly designated commander over assigned and
attached forces in the accomplishment of mission. Also called C2. (JP 1)
counterterrorism
Activities and operations taken to neutralize terrorists and their organizations and networks in order to
render them incapable of using violence to instill fear and coerce governments or societies to achieve
their goals. Also called CT. (JP 3-26)
cyberspace
A global domain within the information environment consisting of interdependent networks of
information technology infrastructures and resident data, including the Internet, telecommunications
networks, computer systems, and embedded processors and controllers. (JP 3-12).
defensive operation
An operation to defeat an enemy attack, gain time, economize forces, and develop conditions favorable
for offensive or stability operations. (ADP 3-0)
fires warfighting function
The related tasks and systems that create and converge effects in all domains against the adversary or
enemy to enable operations across the range of military operations. (ADP 3-0)
foreign humanitarian assistance
Department of Defense activities conducted outside the United States and its territories to directly
relieve or reduce human suffering, disease, hunger, or privation. Also called FHA. (JP 3-29)
foreign internal defense
The participation by civilian and military agencies of a government in any of the action programs taken
by another government or other designated organization to free and protect its society from subversion,
lawlessness, insurgency, terrorism, and other threats to its security. Also known as FID. (JP 3-22)
governance
The state’s ability to serve the citizens through the rules, processes, and behavior by which interests are
articulated, resources are managed, and power is exercised in a society (JP 3-24).
homeland defense
The protection of United States sovereignty, territory, domestic population, and critical infrastructure
against external threats and aggression or other threats as directed by the President. (JP 3-27)
host-nation support
Civil and/or military assistance rendered by a nation to foreign forces within its territory during
peacetime, crises or emergencies, or war based on agreements mutually concluded between nations.
Also called HNS. (JP 4-0)
information collection
An activity that synchronizes and integrates the planning and employment of sensors and assets as well
as the processing, exploitation, and dissemination of systems in direct support of current and future
operations. (FM 3-55) |
3-57 | 167 | Glossary
information requirements
In intelligence usage, those items of information regarding the adversary and other relevant aspects of
the operational environment that need to be collected and processed in order to meet the intelligence
requirements of a commander. Also called IR. (JP 2-0)
intelligence preparation of the battlefield
The systematic process of analyzing the mission variables of enemy, terrain, weather, and civil
considerations in an area of interest to determine their effect on operations. Also called IPB.
(ATP 2-01.3).
intelligence warfighting function
The related tasks and systems that facilitate understanding the enemy, terrain, weather, civil
considerations, and other significant aspects of the operational environment. (ADP 3-0)
interorganizational cooperation
The interaction that occurs among elements of the Department of Defense; participating United States
Government departments and agencies; state, territorial, local, and tribal agencies; foreign military
forces and government agencies; international organizations; nongovernmental organizations; and the
private sector. (JP 3-08).
joint force
A force composed of elements, assigned or attached, of two or more Military Departments operating
under a single joint force commander. (JP 3-0).
joint interagency coordination group
A staff group that establishes regular, timely, and collaborative working relationships between civilian
and military operational planners. Also called JIACG. (JP 3-08).
joint operations
Military actions conducted by joint forces and those Service forces employed in specified command
relationships with each other, which of themselves, do not establish joint forces. (JP 3-0).
movement and maneuver warfighting function
The related tasks and systems that move and employ forces to achieve a position of relative advantage
over the enemy and other threats. (ADP 3-0)
offensive operation
An operation to defeat and destroy enemy forces and gain control of terrain, resources, and population
centers. (ADP 3-0)
protection warfighting function
The related tasks and systems that preserve the force so the commander can apply maximum combat
power to accomplish the mission. (ADP 3-0)
security cooperation
All Department of Defense interactions with foreign security establishments to build security
relationships that promote specific United States security interests, develop allied and partner nation
military and security capabilities for self-defense and multinational operations, and provide United States
forces with peacetime and contingency access to allied and partner nations. Also called SC. (JP 3-20)
stability operation
An operation conducted outside the United States in coordination with other instruments of national
power to establish or maintain a secure environment and provide essential governmental services,
emergency infrastructure reconstruction, and humanitarian relief. (ADP 3-0)
support to civil administration
Assistance given by United States armed forces to stabilize or enhance the operations of the governing
body of a foreign country by assisting an established or interim government. Also called SCA.
(FM 3-57, proposed for inclusion in FM 1-02.1) |
3-57 | 168 | Glossary
sustainment warfighting function
The related tasks and systems that provide support and services to ensure freedom of action, extended
operational reach, and prolong endurance. (ADP 3-0)
*transitional governance
The actions taken to assure appropriate control and continuity of government functions throughout the
range of military operations. Also called TG. (FM 3-57, proposed for inclusion in FM 1-02.1)
transitional military authority
A temporary military government exercising the functions of civil administration in the absence of a
legitimate civil authority (FM 3-07)
unconventional warfare
Activities conducted to enable a resistance movement or insurgency to coerce, disrupt, or overthrow a
government or occupying power by operating through or with an underground, auxiliary, and guerrilla
force in a denied area. (JP 3-05)
unified action
The synchronization, coordination, and/or integration of the activities of governmental and
nongovernmental entities with military operations to achieve unity of effort (JP 1).
unity of effort
Coordination and cooperation toward common objectives, even if the participants are not necessarily
part of the same command or organization, which is the product of successful unified action (JP 1). |
3-57 | 169 | References
All URLs accessed on 19 June 2021.
REQUIRED PUBLICATIONS
These documents must be available to intended users of this publication.
DOD Dictionary of Military and Associated Terms, as of January 2021.
FM 1-02.1. Operational Terms. 9 March 2021.
FM 1-02.2. Military Symbols. 10 November 2020.
RELATED PUBLICATIONS
These documents contain relevant supplemental information.
DEPARTMENT OF DEFENSE PUBLICATIONS
Most DOD issuances are available online: https://www.esd.whs.mil/DD/
DODD 2000.13. Civil Affairs. 11 March 2014.
DODD 2010.9. Acquisition and Cross-Servicing Agreements. 28 April 2003.
DODD 2060.02. DoD Countering Weapons of Mass Destruction (WMD) Policy. 27 January 2017.
DODD 3000.05. Stabilization. 13 December 2018.
DODD 3000.07. Irregular Warfare (IW). 28 August 2014.
DODD 3025.18. Defense Support of Civil Authorities (DSCA). 29 December 2010.
DODD 5100.01. Functions of the Department of Defense and its Major Components. 21 December 2010.
DODD 5100.46. Foreign Disaster Relief (FDR). 6 July 2012.
DODD 5105.65. Defense Security Cooperation Agency (DSCA). 26 October 2012.
DODD 5200.27. Acquisition of Information Concerning Persons and Organizations Not Affiliated With
The Department of Defense. 7 January 1980.
DODI 3025.21. Defense Support of Civilian Law Enforcement Agencies. 27 February 2013.
DODI 5400.11. DoD Privacy and Civil Liberties Programs. 29 January 2019.
DODI 5530.3. International Agreements. 4 December 2019.
DSCA 5105.38-M. Security Assistance Management Manual (SAMM). 30 April 2012. Available at
https://www.dsca.mil/resources/publications.
JOINT PUBLICATIONS
Most joint publications are available online at: https://www.jcs.mil/Doctrine.
CJCS GDE 3130. Adaptive Planning and Execution Overview and Policy Framework. 5 March 2019.
JP 1. Doctrine for the Armed Forces of the United States. 25 March 2013.
JP 2-0. Joint Intelligence. 22 October 2013.
JP 3-0. Joint Operations. 17 January 2017.
JP 3-05. Joint Doctrine for Special Operations. 22 September 2020.
JP 3-07. Stability. 3 August 2016.
JP 3-08. Interorganizational Cooperation. 12 October 2016.
JP 3-12. Cyberspace Operations. 8 June 2018.
JP 3-20. Security Cooperation. 23 May 2017.
JP 3-22. Foreign Internal Defense. 17 August 2018.
JP 3-24. Counterinsurgency. 25 April 2018.
JP 3-26. Joint Combating Terrorism. 30 July 2020. |
3-57 | 170 | References
JP 3-27. Homeland Defense. 10 April 2018.
JP 3-28. Defense Support of Civil Authorities. 29 October 2018.
JP 3-29. Foreign Humanitarian Assistance. 14 May 2019.
JP 3-33. Joint Task Force Headquarters. 31 January 2018.
JP 3-34. Joint Engineer Operations. 6 January 2016.
JP 3-35. Deployment and Redeployment Operations. 10 January 2018.
JP 3-40. Joint Countering Weapons of Mass Destruction. 27 November 2019.
JP 3-57. Civil-Military Operations. 9 July 2018.
JP 4-0. Joint Logistics. 4 February 2019.
JP 5-0. Joint Planning. 1 December 2020.
DEPARTMENT OF THE ARMY PUBLICATIONS
Most Army doctrinal publications are available online at: https://armypubs.army.mil.
ADP 3-0. Operations. 31 July 2019.
ADP 3-05. Army Special Operations. 31 July 2019.
ADP 3-07. Stability. 31 July 2019.
ADP 3-28. Defense Support of Civil Authorities. 31 July 2019.
ADP 3-90. Offense and Defense. 31 July 2019.
ADP 5-0. The Operations Process. 31 July 2019.
ATP 2-01.3. Intelligence Preparation of the Battlefield. 1 March 2019.
ATP 3-05.1. Unconventional Warfare at the Combined Joint Special Operations Task Force Level.
9 April 2021.
ATP 3-05.2. Foreign Internal Defense. 19 August 2015.
ATP 3-18.1. Special Forces Unconventional Warfare. 21 March 2019.
ATP 3-18.3. (U) Special Forces Direct Action Operations (C). 23 December 2015.
ATP 3-18.4. Special Forces Special Reconnaissance. 18 August 2015.
ATP 3-39.30. Security and Mobility Support. 21 May 2020.
ATP 3-57.10. Civil Affairs Support to Populace and Resources Control. 6 August 2013.
ATP 3-57.30. Civil Affairs Support to Nation Assistance. 1 May 2014.
FM 3-0. Operations. 6 October 2017.
FM 3-05. Army Special Operations. 9 January 2014.
FM 3-07. Stability. 2 June 2014.
FM 3-13. Information Operations. 6 December 2016.
FM 3-18. Special Forces Operations. 28 May 2014.
FM 3-22. Army Support to Security Cooperation. 22 January 2013.
FM 3-24. Insurgencies and Countering Insurgencies. 13 May 2014.
FM 3-39. Military Police Operations. 9 April 2019.
FM 3-55. Information Collection. 3 May 2013.
FM 6-0. Commander and Staff Organization and Operations. 5 May 2014.
FM 6-27/MCTP 11-10C. The Commander’s Handbook on the Law of Land Warfare. 7 August 2019. |
3-57 | 171 | References
OBSOLETE PUBLICATIONS
This section contains references to obsolete historical doctrine. The Archival and Special Collections in the
Combined Arms Research Library on Fort Leavenworth, in Kansas, contains copies. These publications are
obsolete doctrine publications referenced for citations only.
FM 3-05.401/MCRP 3-33.1A. Civil Affairs Tactics, Techniques, and Procedures. 5 July 2007.
FM 27-5/OPNAV 50E-3. United States Army and Navy Manual of Military Government and
Civil Affairs. 22 December 1943.
FM 27-10. The Law of Land Warfare. 18 July 1956.
FM 41-10. Civil Affairs Operations. 14 February 2000.
UNITED STATES LAW
Unless otherwise noted, most acts and public laws are available online at: https://uscode.house.gov.
10 USC. Armed Forces.
10 USC 401. Humanitarian and civic assistance provided in conjunction with military operations.
10 USC 2321. Validation of proprietary data restrictions.
10 USC 2667. Leases: non-excess properties of military departments and Defense Agencies.
10 USC 2675. Leases: foreign countries.
22 USC. Foreign Relations and Intercourse.
22 USC 2151. Congressional findings and declaration of policy.
22 USC 2292. General provisions. (International Disaster Assistance)
22 USC 2292b. Disaster assistance coordination through a Special Coordinator for International
Disaster Assistance; Presidential appointment and duties.
22 USC 2796. Leasing authority. (Arms Export Control)
32 USC. National Guard.
Arms Export Control Act of 1976. (22 USC 2751 et seq.)
Foreign Assistance Act of 1961, as amended. (22 USC 2151 et seq.)
OTHER PUBLICATIONS
5 FAH-1 H-600. Correspondence Handbook, Diplomatic Notes. 7 February 2019.
https://fam.state.gov/Default.aspx.
1899 Convention for the Pacific Settlement of International Disputes. https://www.loc.gov.
1954 Hague Convention for the Protection of Cultural Property in the Event of Armed Conflict.
www.unesco.org.
American Military Government of Occupied Germany, 1918–1920: Report of the Officer in Charge of
Civil Affairs, Third Army and American Forces in Germany,
https://history.army.mil/html/bookshelves/resmat/interwar_years/american_military_governm
ent_of_occupied_germany_1918-1920.pdf.
Center for Complex Operations. The Kuwait Task Force: Postconflict Planning and Interagency
Coordination. Complex Operations Case Studies Series. Naval Postgraduate School. 2010.
https://cco.ndu.edu/Portals/96/Documents/case-studies/4-kuwait_task_force-teacher.pdf.
CMH Pub 70-100-1. Weapon of Choice: ARSOF in Afghanistan. 2003.
https://history.army.mil/catalog/index.html
Convention for the Protection of Cultural Property in the Event of Armed Conflict with Regulations for
the Execution of the Convention 1954. 14 May 1954. http://www.unesco.org/.
Law and Customs of War on Land (Hague, II), https://www.loc.gov/.
Lincoln, Abraham. General Orders No. 100. 24 April 1863.
https://avalon.law.yale.edu/19th_century/lieber.asp.
MIL-STD-2525D. Joint Military Symbology. 10 June 2014. https://assist.dla.mil. |
3-57 | 172 | References
NSPD-44. Management of Interagency Efforts Concerning Reconstruction and Stabilization.
7 December 2005. https://www.dhs.gov/presidential-directives.
Part 181, Title 22 Code of Federal Regulations. Coordination, Reporting and Publication of
International Agreements. https://ecfr.federalregister.gov/.
Rules of Land Warfare 1914. https://www.loc.gov/.
Rules of Land Warfare 1934. https://www.loc.gov/.
The Geneva Conventions of 1949 and Hague Convention No. IV of 1907. https://www.loc.gov/.
Yates, Lawrence A. The US Military’s Experience in Stability Operations, 1789-2005: Global War on
Terrorism Occasional Paper 15.
PRESCRIBED FORMS
This section contains no entries.
REFERENCED FORMS
Unless otherwise indicated, DA forms are available online at: https://armypubs.army.mil.
DA Form 2028. Recommended Changes to Publications and Blank Forms. |
3-57 | 173 | Index
Entries are listed by paragraph number.
A Civil Affairs planning team 2-91, 2-96, 2-98, 2-99, 3-7,
(CAPT), 2-39, 4-24, 3-23, 3-25, 3-31, 3-62, 3-70,
Annex G, 5-9, 5-10, 5-13, 5-42 4-27, 4-28, 5-11, 5-24, D-11 4-16, 4-22, 4-44, 4-45, 4-74,
Annex K, 4-23, 4-25, 4-58, 4-59 4-79, 4-85, 4-108, 4-10,
civil engagement (CE), 1-23,
4-14, 5-20, 5-21, 5-75, C-7,
Annex P, 4-58, 4-60 1-26, 1-27, 1-30, 1-46, 2-14,
C-11, C-12, C-14, D-17,
Annex V, 4-58, 4-62 through 2-58, 2-62, 2-63, 2-65, 2-66,
D-19
4-64, 5-9, 5-13, 5-42 2-68, 2-67, 2-69, 2-71, 2-86,
2-88, 2-91, 2-96, 2-98, 2-99, civil-military integration (CMI),
area study, 2-58, 4-17, 4-46,
3-23, 3-25, 3-31, 3-61, 3-62, 1-14, 1-16, 1-21, 1-29, 1-32,
4-47, 4-50
3-70, 4-16, 4-22, 4-44, 4-45, 1-33, 2-22, 2-32, 2-50, 2-106
Army Special Operations 4-74, 4-79, 4-85, 4-108, through 2-108, 2-111, 2-115,
Forces (ARSOF), A-12, 4-110, 4-114, 5-20, 5-21, 2-122, 3-6 through 3-8, 3-11,
A-14, C-3, C-7, C-10, C-12 5-75, C-7, C-11, C-12, C-14, 3-12, 3-15, 3-29, 3-31, 3-65,
assessments, 1-24, 2-27, 2-34, D-17, D-20 4-23, 4-24, 4-26, 4-62, 4-66,
2-51, 2-56, 2-63, 2-66, 2-91, 4-67, 4-70, 4-86, 4-94, 4-95,
civil knowledge integration
2-121, 2-122, 4-10, 4-16, 4-100, 4-110, 4-111, 4-114,
(CKI), 1-14, 1-16, 1-19, 1-20,
4-22, 4-43, 4-48, 4-50 4-130, 5-4, 5-8, 5-47, 5-51
2-32, 2-73, 2-87, 2-88, 2-91,
through 4-52, 4-74, 4-79, 2-92, 2-94, 2-97, 2-122, 3-6, civil-military operations (CMO),
5-47, 5-62, 5-57, B-3, B-5, 3-8, 3-11, 3-12, 3-15, 3-25, 1-19, 1-33, 2-115, 4-28,
B-7, B-10, B-14, B-15, B-17, 3-62, 3-65, 4-5 through 4-7, 4-30, 4-62, 4-120, 4-124,
B-20, B-21, B-23 through 4-19, 4-22 through 4-24, 4-133 through 4-136, 5-5,
B-25, C-6 4-40, 4-42, 4-45, 4-54, 4-67, 5-8 through 5-16, 5-18, 5-75
B 4-70, 4-72, 4-75, 4-79, civil-military operations center
4-130, 5-4, 5-20, 5-47 (CMOC), 1-21, 1-31 through
branch characteristics, 1-38
civil network analysis (CNA), 1-33, 2-107, 2-114, 2-115,
branch principles, 1-39 2-72, 4-44, 4-72, 4-127 2-118, 2-122, 2-123, 3-62,
4-24, 4-25, 4-30, 4-61, 4-64,
C civil network development
4-113, 4-114, 4-117, 4-127,
(CND), 1-23, 1-28 through
Civil Affairs operations (CAO), 4-135, 5-5, 5-9, 5-13, 5-16,
1-30, 2-58, 2-69, 2-71, 2-78,
1-1 through 1-5, 1-8, 1-16, 5-62
2-88, 2-91, 2-96, 2-98, 2-92,
1-17, 1-19, 1-22, 1-33, 1-37,
3-23, 3-70, 4-44, 4-45, 4-79, consolidate gains, 1-1, 1-28, 2-
1-38, 1-40, 1-43, 1-46, 2-1,
4-85, 4-111, 5-75, C-12, 2, 2-16, 2-48, 2-49, 2-52, 2-
2-2, 2-5, 2-16, 2-18, 2-27,
C-14, D-17, D-18 76, 2-100, 2-120, 3-5, 3-13,
2-32, 2-39, 2-52, 2-60, 2-71,
3-14, 3-53, 3-68, 4-43, C-6
2-73, 2-87, 2-88, 2-97, civil network development and
2-106, 2-107, 2-114, 2-115, engagement (CNDE), 1-14, core competencies, 1-1, 1-14
2-117, 3-4, 3-8, 3-12, 3-15, 1-16, 1-18, 1-20, 1-26, 1-29, through 1-16, 1-22, 1-24,
3-17, 3-21, 3-23, 3-25, 3-27 1-32, 2-10, 2-32, 2-51, 2-52, 1-27, 1-30, 1-40, 1-47, 2-15,
through 3-29, 3-31, 3-35, 2-54, 2-55, 2-61, 2-122, 3-3, 2-16, 2-32, 3-4, 3-6, 3-23,
3-61, 3-72 through 3-74, 3-6 through 3-8, 3-11, 3-12, 3-25, 3-29, 3-31
3-76, 3-82, 3-83, 4-2, 4-4, 3-15, 3-23, 3-25, 3-29, 3-31, counterinsurgency, 5-43
4-5, 4-10 through 4-12, 4-17, 3-39, 3-47, 3-53, 3-55, 3-62, cyberspace, 3-16, 3-20, 3-21,
4-21 through 4-29, 4-32, 3-65, 4-5, 4-6, 4-10, 4-23, 4-27, 5-72, 5-73, 5-75, A-13
4-33-4-36, 4-38, 4-45, 4-47, 4-24, 4-66, 4-67, 4-70, 4-71,
4-50 through 4-52, 4-54 4-86, 4-94, 4-95, 4-98, D
through 4-59, 4-67, 4-72 4-100, 4-120, 4-130, 5-20, decisive action, 3-6, 3-8, 3-12,
through 4-75, 4-78, 4-85, 5-47, 5-51, 5-63, C-7 3-15, 3-21
4-99, 4-102, 4-1018, 4-111 civil preparation of the defense support of civil
through 4-113, 4-115, 4-116, battlefield (CPB), 2-88, 3-30, authorities (DSCA), 1-40,
4-118, 4-120, 4-127, 4-130, 4-9, 4-10, 4-32 3-21, 3-33 through 3-36,
5-15, 5-20 through 5-22,
civil reconnaissance (CR), 3-61, 4-3, D-15
5-46, 5-67 through 5-70,
5-75, C-1, C-4, C-9, C-11, 1-23 through 1-25, 1-30, direct action, C-10, C-11, C-14
2-14, 2-58, 2-62 through
C-12, C-14, C-16
2-66, 2-69, 2-71, 2-86, 2-88, |
3-57 | 174 | Index
F operational variables, 2-89, 2-33, 2-38, 2-42, 2-51, 2-81,
4-10, 4-12, 4-27, 4-28, 4-34, 2-115, 2-119, 2-122, 3-6
foreign humanitarian
4-39, 4-40, 4-82 through 3-8, 3-11, 3-12,
assistance (FHA), 1-8, 2-35,
3-15, 3-18, 3-29, 3-53, 3-65,
2-48, 2-122, 3-50, 4-32, P
3-66, 4-24, 4-70, 4-130, 5-4,
4-135, 5-9, 5-55, 5-43, 5-44,
populace and resources control 5-47, C-4, C-8
5-50, 5-56, 5-59, 5-60, 5-62
(PRC), 2-35, 2-83, 2-118,
through 5-65 transitional military authority,
2-122, 3-15, 3-23, 3-25,
1-23, 1-35 through 1-37,
foreign internal defense (FID), 3-31, 3-37 through 3-40,
2-20, 2-22, 2-38, through
2-47, 5-43, 5-44, 5-47, 5-66 3-60, 4-80, 4-81, 4-85, 4-98
2-44, 2-50, 2-115, 3-15,
through 5-68, 5-70 through 4-100, 4-135, 5-9
3-31, 3-60, 4-71, 4-135, 5-9,
functional specialty areas, Psychological Operations 5-75, B-1
2-51, B-1, B-24 (PSYOP), 3-72, 3-75, 3-76,
U
4-74, 5-16, A-12
I
unconventional warfare (UW),
indigenous populations and R
A-10, C-3, C-4, C-9
institutions (IPI), 1-10, 1-21, rules of allocation, 4-103, 4-105
unified action, 1-13, 1-15, 1-19,
1-30, 1-31, 1-38, 1-39, 1-43,
running estimate, 4-54, 4-56, 1-21, 1-26, 1-31, 1-32, 1-38,
1-45, 2-4, 2-15, 2-51, 2-83,
4-57 1-39, 1-43, 1-47, 2-15, 2-25,
2-99, 2-114, 2-118 through
2-50, 2-57, 2-68, 2-70, 2-75,
2-120, 3-7, 3-17, 3-21, 3-31, S
2-78, 2-87, 2-88, 2-92, 2-94,
3-37, 3-48, 3-70, 3-75, 4-26,
shape, 1-18, 1-20, 1-43, 2-61, 2-106, 2-107, 2-114, 2-115,
4-32, 4-33, 4-61, 4-113,
3-5, 3-8, 3-77, 4-26, 4-38, 3-7, 3-8, 3-12, 3-27, 3-31,
4-134, 5-8, 5-9, 5-13, 5-14,
5-7, 5-12, 5-19, 5-20, C-17, 3-70, 3-71, 3-75, 4-8, 4-16,
5-19, 5-20, 5-22, 5-29, 5-46,
D-12 through D-15 4-24, 4-26, 4-32, 4-40, 4-67,
5-62, 5-75, C-17
support to civil administration 4-84, 4-97, 4-121, 5-1, 5-4,
information collection, 1-20,
(SCA), 1-23, 1-34, 2-15, 5-8, 5-13, 5-19, 5-20, 5-21,
1-30, 2-14, 2-58, 2-63, 2-69,
2-20, 2-22, 2-33 through 5-29, 5-46, 5-52, 5-75, C-17
2-92, 2-94, 2-96, 2-97, 2-98,
2-35, 2-41, 2-42, 2-46, unified land operations, 1-6,
3-7, 3-11, 3-70, 4-7, 4-15,
through 2-51, 2-77, 2-115, 2-115, 2-116, 2-122, 3-5,
4-17, 4-26, 4-43 through
2-122, 3-8, 3-15, 3-31, 3-45, 3-6, 3-21, 4-1, 4-55, 4-65
4-45, 4-50, 4-59, 4-67, 4-82
3-62, 4-71, 4-98, 4-108,
unity of effort, 1-16, 1-21, 1-38,
M 5-43, 5-49, 5-69, 5-74, 5-75, 1-47, 2-67, 2-70, 2-106,
C-7
mission variables, 2-89, 3-23, 2-110, 3-7, 3-42, 3-71, 3-72,
3-25, 3-31, 4-11, 4-12, 4-26, T 4-5, 4-26, 4-62, 4-66, 4-67,
4-34, 4-38 4-70, 5-2, 5-4, 5-8, 5-20,
transitional governance (TG),
5-23
O 1-14, 1-16, 1-17, 1-29, 1-33,
2-15, 2-20 through 2-22,
offense, 1-40, 2-116, 3-12,
2-26, 2-27, 2-30 through
3-21, through 3-23, 4-81 |
3-57 | 175 | FM 3-57
28 July 2021
By Order of the Secretary of the Army:
JAMES C. MCCONVILLE
General, United States Army
Chief of Staff
Official:
KATHLEEN S. MILLER
Administrative Assistant
to the Secretary of the Army
2120401
DISTRIBUTION:
Active Army, Army National Guard, and United States Army Reserve: Distributed in |
3-12 | 1 | FM 3-12
CYBERSPACE OPERATIONS AND
ELECTROMAGNETIC WARFARE
AUGUST 2021
DISTRIBUTION RESTRICTION:
Approved for public release; distribution is unlimited.
This publication supersedes FM 3-12, dated 11 April 2017. |
3-12 | 2 | This publication is available at the Army Publishing Directorate site
(https://armypubs.army.mil), and the Central Army Registry site |
3-12 | 3 | Foreword
Over the past two decades of persistent conflict, the Army has deployed its most capable communications systems
ever. During this time, U.S. forces have continued to dominate cyberspace and the electromagnetic spectrum
while conducting counterinsurgency operations in Afghanistan and Iraq against enemies and adversaries who lack
the ability to challenge our technological superiority. However, in recent years, regional peers have demonstrated
formidable capabilities in hybrid operational environments. These capabilities threaten the Army’s dominance in
both cyberspace and the electromagnetic spectrum.
The Department of Defense information network-Army is an essential warfighting platform that is a critical
element of the command and control system and foundational to success in Army operations. Effectively
operating, securing, and defending the network to maintain trust in its confidentiality, integrity, and availability
is essential to commanders’ success at all echelons. A commander who cannot access or trust communications
and information systems or the data they carry risks the loss of lives, loss of critical resources, or mission failure.
At the same time, our adversaries and enemies are also increasingly reliant on networks and networked weapons
systems. The Army, as part of the joint force, must be prepared to exploit or deny our adversaries and enemies
the operational advantages that these networks and systems provide.
As the Army shifts its focus to large-scale combat operations against regional peers, we must anticipate that these
threat actors will persistently attempt to infiltrate, exploit, and degrade access to our networks and data. In the
future, as adversary and enemy capabilities grow, our continued dominance of cyberspace and the electromagnetic
spectrum will become less certain, while at the same time our ability to access cyberspace and spectrum-
dependent capabilities will become both more challenging and more critical to fight and win in multiple domains.
Leveraging cyberspace and electromagnetic warfare effects throughout the competition continuum is key to
achieving relative advantages through cyberspace and the electromagnetic spectrum while denying the same to
our enemies and adversaries. To achieve these positions of relative advantage, commanders must integrate and
synchronize cyberspace operations and electromagnetic warfare with all other available military capabilities using
a combined arms approach. Moreover, intelligence, signal, information advantage activities, space, and fires
capabilities are all critical to successful planning, synchronization, and execution of cyberspace operations and
electromagnetic warfare. Commanders and staffs integrate and synchronize all of these capabilities across
multiple domains and warfighting functions to maximize complementary effects in and through cyberspace and
the electromagnetic spectrum.
FM 3-12 defines and describes the principles and tactics to address challenges in the operational environment
while providing an overview of cyberspace operations, electromagnetic warfare, and their planning, integration,
and synchronization through the operations process. It describes the units that conduct these operations and how
they enable accomplishment of commanders’ objectives in Army operations.
Due to the rapid evolution of friendly and threat capabilities, tactics, techniques, and procedures in cyberspace
and the electromagnetic spectrum, the Cyber Center of Excellence will review and update FM 3-12 and supporting
publications frequently in order to keep pace with the continuously evolving operational environment.
NEIL S. HERSEY
Major General, U.S. Army |
3-12 | 5 | *FM 3-12
Field Manual Headquarters
No. 3-12 Department of the Army
Washington, D.C., 24 August 2021
Cyberspace Operations and Electromagnetic
Warfare
Contents
Page
PREFACE..................................................................................................................... v
INTRODUCTION ........................................................................................................ vii
Chapter 1 OPERATIONAL ENVIRONMENT OVERVIEW ........................................................ 1-1
Overview of the Operational Environment ................................................................. 1-1
Cyberspace and the Electromagnetic Spectrum ....................................................... 1-1
Section I – Core Competencies and Fundamental Principles ............................ 1-3
Core Competencies ................................................................................................... 1-3
Fundamental Principles ............................................................................................. 1-4
Section II – Operational Environment ................................................................... 1-4
Cyberspace Domain .................................................................................................. 1-5
Electromagnetic Spectrum ........................................................................................ 1-7
Trends and Characteristics........................................................................................ 1-8
Conflict and Competition ......................................................................................... 1-11
Section III – Contributions to the Warfighting Functions .................................. 1-12
Command and Control ............................................................................................ 1-12
Movement and Maneuver ........................................................................................ 1-13
Intelligence .............................................................................................................. 1-14
Fires ......................................................................................................................... 1-15
Sustainment ............................................................................................................. 1-15
Protection................................................................................................................. 1-15
Chapter 2 CYBERSPACE OPERATIONS AND ELECTROMAGNETIC WARFARE
FUNDAMENTALS ..................................................................................................... 2-1
Section I – Cyberspace Operations ....................................................................... 2-1
Joint Force and Army ................................................................................................ 2-3
Department of Defense Information Network Operations ......................................... 2-4
Defensive Cyberspace Operations ............................................................................ 2-4
Offensive Cyberspace Operations ............................................................................ 2-5
Cyberspace Actions ................................................................................................... 2-5
Section II – Electromagnetic Warfare .................................................................... 2-8
Electromagnetic Attack .............................................................................................. 2-8
Electromagnetic Protection...................................................................................... 2-11
Electromagnetic Support ......................................................................................... 2-14
DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.
*This publication supersedes FM 3-12, dated 11 April 2017. |
3-12 | 6 | Contents
Electromagnetic Warfare Reprogramming.............................................................. 2-15
Section III – Interrelationship with other Operations ........................................ 2-16
Intelligence Operations ........................................................................................... 2-16
Space Operations ................................................................................................... 2-16
Information Operations ........................................................................................... 2-18
Chapter 3 ARMY ORGANIZATIONS AND COMMAND AND CONTROL ............................... 3-1
Section I – Army Cyberspace Operations Organizational Structure ................. 3-1
United States Army Cyber Command ....................................................................... 3-1
Army Information Warfare Operations Center .......................................................... 3-2
Section II – Electromagnetic Warfare Organizations .......................................... 3-3
Electromagnetic Warfare Platoon (Brigade Combat Team) ..................................... 3-3
Intelligence, Information, Cyber, Electromagnetic Warfare, and Space
Detachment ........................................................................................................ 3-4
Section III – Cyberspace Electromagnetic Activities at Corps and Below........ 3-4
Commander’s Role ................................................................................................... 3-4
Cyberspace Electromagnetic Activities Section ........................................................ 3-5
Cyberspace Electromagnetic Activities Working Group ........................................... 3-8
Staff and Support at Corps and Below...................................................................... 3-8
Chapter 4 INTEGRATION THROUGH THE OPERATIONS PROCESS .................................. 4-1
Section I – The Operations Process...................................................................... 4-1
Planning .................................................................................................................... 4-2
Preparation ................................................................................................................ 4-3
Execution .................................................................................................................. 4-3
Assessment ............................................................................................................... 4-4
Section II –Integrating Processes ......................................................................... 4-4
Intelligence Preparation of the Battlefield ................................................................. 4-5
Information Collection ............................................................................................... 4-8
Targeting ................................................................................................................. 4-11
Risk Management ................................................................................................... 4-18
Knowledge Management ........................................................................................ 4-20
Appendix A ARMY METHODOLOGIES USED FOR PLANNING ACTIVITIES .......................... A-1
Appendix B RULES OF ENGAGEMENT AND UNITED STATES CODE ................................... B-1
Appendix C INTEGRATION WITH UNIFIED ACTION PARTNERS ............................................ C-1
Appendix D NATIONAL, DEPARTMENT OF DEFENSE, ARMY RESERVE AND JOINT
CYBERSPACE AND ELECTROMAGNETIC WARFARE ORGANIZATIONS ........ D-1
Appendix E REQUEST FOR SUPPORT ...................................................................................... E-1
Appendix F ELECTROMAGNETIC WARFARE REPROGRAMMING ........................................ F-1
Appendix G TRAINING ................................................................................................................. G-1
GLOSSARY ................................................................................................ Glossary-1
REFERENCES ........................................................................................ References-1
INDEX ............................................................................................................... Index-1
Figures
Figure 1-1. Cyberspace operations and electromagnetic warfare logic chart ............................... 1-2
Figure 1-2. Relationship between the cyberspace network layers ................................................ 1-6 |
3-12 | 7 | Contents
Figure 1-3. The electromagnetic spectrum .................................................................................... 1-8
Figure 1-4. Congestion in cyberspace and the electromagnetic spectrum .................................... 1-9
Figure 1-5. Cyberspace and the electromagnetic spectrum in a contested environment ............ 1-10
Figure 2-1. Cyberspace operations taxonomy ............................................................................... 2-3
Figure 2-2. Cyberspace operations missions and actions ............................................................. 2-6
Figure 2-3. Electromagnetic warfare taxonomy ............................................................................. 2-8
Figure 4-1. The operations process and integrating processes ..................................................... 4-5
Figure A-1. Annex C, Appendix 12 ...............................................................................................A-16
Figure D-1. Cyber mission force team allocations ........................................................................ D-6
Figure D-2. National electromagnetic spectrum operations organizational structure. .................. D-9
Figure E-1. Routing process when requesting offensive cyberspace operations support .............E-3
Figure E-2. Routing process when requesting defensive cyberspace operations-internal defensive
measures support .......................................................................................................E-5
Figure E-3. Routing process for defensive cyberspace operations-internal defensive measures
(non-Department of Defense information network) and defensive cyberspace
operations-response actions support..........................................................................E-6
Figure E-4. Joint tactical airstrike request form. ...........................................................................E-11
Figure E-5. Electromagnetic attack request. ................................................................................E-13
Tables
Table 4-1. Targeting crosswalk .................................................................................................... 4-13
Table A-1. Step 1: Receipt of mission ............................................................................................A-3
Table A-2. Step 2: Mission analysis ...............................................................................................A-6
Table A-3. Step 3: Course of action development .........................................................................A-9
Table A-4. Step 4: Course of action analysis and war-gaming ....................................................A-11
Table A-5. Step 5: Course of action comparison .........................................................................A-12
Table A-6. Step 6: Course of action approval ..............................................................................A-13
Table A-7. Step 7: Orders production, dissemination, and transition ...........................................A-14
Table B-1. United States Code with specific cyberspace roles ......................................................B-4
Table B-2. Federal cyberspace security laws and policies protecting United States citizens .......B-5
Table D-1. Elements of the cyber mission force and their associated teams ............................... D-5
Table E-1. Airborne cyberspace attack, electromagnetic attack, or electromagnetic support
request tool ...............................................................................................................E-10 |
3-12 | 9 | Preface
FM 3-12 provides tactics and procedures for coordinating, integrating, and synchronizing Army cyberspace
operations and electromagnetic warfare to support unified land operations and joint operations. FM 3-12
explains Army cyberspace operations and electromagnetic warfare fundamentals, terms, and definitions. This
publication describes how commanders and staffs can integrate cyberspace operations and electromagnetic
warfare into unified land operations. This publication provides overarching guidance to commanders and
staffs on Army cyberspace operations and electromagnetic warfare at all echelons. This publication
supersedes FM 3-12, dated 11 April 2017.
The principal audience for FM 3-12 is all members of the profession of arms. Commanders and staffs of
Army headquarters serving as a joint task force or multinational headquarters should also apply joint or
multinational doctrine concerning the range of military operations and joint or multinational forces. Trainers
and educators throughout the Army will also use this publication.
Commanders, staffs, and subordinates ensure their decisions and actions comply with applicable United
States, international, and in some cases, host-nation laws and regulations. Commanders at all levels ensure
their Soldiers operate according to the law of war and the rules of engagement (See FM 6-27). They also
adhere to the Army Ethic as described in ADP 1.
FM 3-12 uses joint terms where applicable. Selected joint and Army terms and definitions appear in both the
glossary and the text. This publication is not the proponent for any Army terms. Terms and definitions for
which FM 3-12 is the source publication are boldfaced in the text. For other definitions shown in the text, the
term is italicized and the number of the proponent publication follows the definition.
FM 3-12 applies to the Active Army, Army National Guard or Army National Guard of the United States,
and United States Army Reserve, unless otherwise stated.
The proponent of FM 3-12 is the United States Army Cyber Center of Excellence. The preparing agency is
the Doctrine Division, United States Army Cyber Center of Excellence. Send comments and
recommendations on a DA Form 2028 (Recommended Changes to Publications and Blank Forms) to
Commander, United States. Army Cyber Center of Excellence and Fort Gordon, ATTN: ATZH-OP-D (FM
3-12), 506 Chamberlain Avenue, Fort Gordon, GA, 30905-5735; by e-mail to usarmy.gordon.cyber-
[email protected]. |
3-12 | 11 | Introduction
FM 3-12 provides Army doctrine on using cyberspace electromagnetic activities to integrate and synchronize
cyberspace operations and electromagnetic warfare into operations while managing assigned portions of the
electromagnetic spectrum in support of unified land operations. FM 3-12 defines and provides an
understanding of Army cyberspace operations, electromagnetic warfare, statutory and title authorities, roles,
relationships, responsibilities, and capabilities to support Army and joint operations. It expands upon the
methods by which Army forces conduct offensive and defensive cyberspace operations and addresses how
commanders and staff integrate tailored cyberspace and electromagnetic warfare capabilities across the range
of military operations.
FM 3-12 nests with and supports joint cyberspace operations and electromagnetic warfare doctrine and ADP
3-0, Operations, and provides the doctrinal context to address the relationship among the Army’s operations
process and cyberspace operations and electromagnetic warfare. To understand the fundamentals of
integrating and synchronizing cyberspace operations and electromagnetic warfare, readers should be familiar
with ADP 2-0, ADP 3-0, ADP 3-19, ADP 3-37, ADP 3-90, ADP 5-0, ADP 6-0, FM 3-09, FM 3-13,
FM 3-55, FM 6-0, ATP 2-01.3, JP 3-12, and JP 3-85.
FM 3-12 describes how personnel conducting cyberspace electromagnetic activities integrate and
synchronize cyberspace operations and electromagnetic warfare functions and capabilities across warfighting
functions, defend the network, and provide commanders critical capabilities at all levels during unified land
operations.
FM 3-12 contains four chapters and seven appendixes:
Chapter 1 outlines how cyberspace operations and electromagnetic warfare support the Army forces during
the conduct of unified land operations. It provides an overview of the aspects of an operational environment
in which units perform cyberspace operations and electromagnetic warfare. This chapter also details how
cyberspace operations and electromagnetic warfare support the Army warfighting functions.
Chapter 2 details the types of cyberspace operations and electromagnetic warfare and their associated tasks
and common effects. It also discusses the interrelationship between cyberspace operations and
electromagnetic warfare with other types of Army operations.
Chapter 3 provides an overview of the joint and Army organizations that conduct cyberspace operations and
electromagnetic warfare. It also describes the cyberspace electromagnetic activities section roles and
responsibilities at echelon. This chapter discusses the interactions between the cyberspace electromagnetic
activities section and other staff sections and explains the role of the cyberspace electromagnetic activities
working group.
Chapter 4 describes how commanders and staffs integrate and synchronize cyberspace operations and
electromagnetic warfare through the operations process. This chapter further details key inputs and outputs
related to intelligence preparation of the battlefield, information collection, targeting, risk management, and
knowledge management.
Appendix A describes the two most common Army decision-making methodologies (the Army design
methodology and the military decision-making process) and procedures for these methodologies to plan,
integrate, and synchronize cyberspace operations and electromagnetic warfare with the operations process
and integrating processes.
Appendix B describes the rules of engagement and applicable sections of the United States Code associated
with cyberspace operations and electromagnetic warfare. It includes a table with all cyberspace operations
and electromagnetic warfare related to the United States Code (title authorities). Appendix B also consists of
a table with a list of federal laws protecting United States civilians’ information and privacy rights. |
3-12 | 12 | Introduction
Appendix C discusses considerations when conducting cyberspace operations and electromagnetic warfare
as part of a joint force or with unified action partners.
Appendix D discusses the national, Department of Defense, and Army Reserve components that support
cyberspace operations. This appendix also provides an overview of the United States Cyber Command and
its subordinate joint organizations that deliver cyberspace operations and electromagnetic warfare support to
Army commanders using cyberspace mission forces.
Appendix E discusses how Army units request cyberspace operations and electromagnetic warfare support
when operating in a joint environment. Graphic depictions display the request for support processes for both
offensive and defensive cyberspace operations.
Appendix F provides general procedures for conducting electromagnetic warfare reprogramming. It
describes the four phases of electromagnetic warfare reprogramming and its three major categories and
actions.
Appendix G provides an overview of Soldier training and expands on training for those seeking a career in
cyberspace and electromagnetic warfare. |
3-12 | 13 | Chapter 1
Operational Environment Overview
This chapter describes the aspects of the operational environment in which the Army
conducts cyberspace operations and electromagnetic warfare. It describes cyberspace
and electromagnetic warfare forces’ core competencies and lays out the fundamental
principles of cyberspace operations and electromagnetic warfare. This chapter
discusses interrelationships and interdependencies between cyberspace operations,
electromagnetic warfare, and the warfighting functions.
OVERVIEW OF THE OPERATIONAL ENVIRONMENT
1-1. Cyberspace operations and electromagnetic warfare (EW) play an essential role in the Army’s conduct
of unified land operations as part of a joint force and in coordination with unified action partners. Cyberspace
operations are the employment of cyberspace capabilities where the primary purpose is to achieve objectives
in or through cyberspace (JP 3-0). Electromagnetic warfare is a military action involving the use of
electromagnetic and directed energy to control the electromagnetic spectrum or to attack the enemy (JP 3-85).
1-2. Cyberspace is one of the five domains of warfare and uses a portion of the electromagnetic spectrum
(EMS) for operations, for example, Bluetooth, Wi-Fi, and satellite transport. Therefore, cyberspace operations
and EW require frequency assignment, management, and coordination performed by spectrum management
operations. Spectrum management operations consist of four key functions—spectrum management, frequency
assignment, host-nation coordination, and policy adherence. Spectrum management operations include
preventing and mitigating frequency conflicts and electromagnetic interference (EMI) between friendly forces
and host nations during Army operations (refer to ATP 6-02.70).
CYBERSPACE AND THE ELECTROMAGNETIC SPECTRUM
1-3. Cyberspace and the EMS are critical for success in today’s operational environment (OE). U.S. and
adversary forces alike rely heavily on cyberspace and EMS-dependent technologies for command and control,
information collection, situational understanding, and targeting. Achieving relative superiority in cyberspace
and the EMS gives commanders an advantage over adversaries and enemies. By conducting cyberspace
operations and EW, commanders can limit adversaries’ available courses of action, diminish their ability to
gain momentum, degrade their command and control, and degrade their ability to operate effectively in the
other domains.
1-4. Commanders must leverage cyberspace and EW capabilities using a combined arms approach to seize,
retain, and exploit the operational initiative. Effective use of cyberspace operations and EW require
commanders and staffs to conduct cyberspace electromagnetic activities (CEMA). Cyberspace electromagnetic
activities is the process of planning, integrating, and synchronizing cyberspace operations and electromagnetic
warfare in support of unified land operations (ADP 3-0). By integrating and synchronizing cyberspace
operations and EW, friendly forces gain an information advantage across multiple domains and lines of
operations. Figure 1-1 on page 1-2 illustrates how cyberspace operations and EW contribute to Army
operations. |
3-12 | 14 | Chapter 1
Figure 1-1. Cyberspace operations and electromagnetic warfare logic chart |
3-12 | 15 | Operational Environment Overview
SECTION I – CORE COMPETENCIES AND FUNDAMENTAL PRINCIPLES
1-5. The Army’s reliance on networked systems and weapons necessitates highly trained forces to protect
warfighting systems and networks dependent upon access to cyberspace and the EMS. Cyberspace and the
EMS are heavily congested due to the high volume of friendly, neutral, and adversary use, and contested due
to adversary actions.
1-6. Adversaries continue to develop sophisticated weapons and networked systems that project power
through or depend on cyberspace and the EMS. The Army employs cyberspace and EW capabilities as part of
a joint and combined arms approach to defeat threat activities in cyberspace and the EMS, protect friendly
forces, and enable friendly freedom of action across the conflict continuum. Army cyberspace and EW forces
apply the following core competencies and underlying fundamental principles to ensure friendly forces gain
and maintain positions of relative advantage.
CORE COMPETENCIES
1-7. Cyberspace forces and EW professionals are organized, trained, and equipped to provide the following
core competencies that deliver essential and enduring capabilities to the Army—
* Enable situational understanding.
* Protect friendly personnel and capabilities.
* Deliver effects.
CREATE UNDERSTANDING
1-8. Cyberspace forces execute cyberspace intelligence, surveillance, and reconnaissance in and through
the information environment to identify and understand adversary networks, systems, and processes. This
information enables commanders to understand adversary capabilities and vulnerabilities, thereby enhancing
the commanders’ ability to prioritize and deliver effects.
1-9. EW professionals surveil the EMS to collect combat information used to characterize adversary use of
the EMS and understand the integration of adversary emitter systems arrays at echelon. This information
enables understanding friendly vulnerabilities and threat capabilities while allowing commanders to prioritize
and deliver effects.
PROTECT FRIENDLY PERSONNEL AND CAPABILITIES
1-10. Cyberspace forces defend networks, warfighting platforms, capabilities, and data from ongoing or
imminent malicious cyberspace activity. By protecting critical networks and systems, cyberspace forces help
maintain the Army’s ability to conduct operations and project power across all domains.
1-11. EW forces, in coordination with the G-6 or S-6 and in support of the commander’s directive, implement
and enhance measures to protect friendly personnel, facilities, warfighting platforms, capabilities, and
equipment from adverse effects in the EMS. EW forces recommend measures to mask or control friendly
emissions from enemy detection and deny adversaries the ability to locate and target friendly formations. EW
forces detect and mitigate enemy attacks in or through the EMS to maintain the Army’s ability to conduct
operations and project power across all domains.
DELIVER EFFECTS
1-12. Cyberspace forces deliver cyberspace effects against adversary networks, systems, and weapons.
These effects enhance the Army’s ability to conduct operations, reduce adversary combat power, and project
power across all domains.
1-13. EW professionals deliver effects in the EMS against adversary networks, systems, and weapons. These
actions reduce adversary combat power, protect friendly forces, and enhance friendly forces and weapons’
lethality. |
3-12 | 16 | Chapter 1
FUNDAMENTAL PRINCIPLES
1-14. Fundamental principles are basic rules or assumptions of central importance that guide how cyberspace
and EW professionals’ approach and conduct cyberspace operations and EW. These fundamental principles
are—
* Operational focus.
* Adaptability and versatility.
* Global reach.
OPERATIONAL FOCUS
1-15. Cyberspace and EW forces execute missions in support of a commander’s overarching operational
design. When properly integrated and synchronized as part of a combined arms approach, cyberspace and EW
capabilities can produce layered dilemmas for the adversary in multiple domains and enhance relative combat
power. To accomplish this, cyberspace and EW staff must collaborate across all warfighting functions.
ADAPTABILITY AND VERSATILITY
1-16. Cyberspace and EW forces conduct operations using capabilities that are adaptable to a variety of
mission requirements. Cyberspace and EW capabilities vary in both the size of the force employed and the
magnitude or scope of effects created. Depending on mission requirements, cyberspace and EW capabilities
may be used as primary or supporting efforts for decisive, shaping or sustaining operations.
GLOBAL REACH
1-17. The nature of the cyberspace domain increases the operational reach of cyberspace and EW forces.
Combat mission force(s) and EW professionals deliver strategic, operational, or tactical effects worldwide from
remote, co-located, or forward operating positions.
SECTION II – OPERATIONAL ENVIRONMENT
1-18. An operational environment is a composite of the conditions, circumstances, and influences that affect
the employment of capabilities and bear on the decisions of the commander (JP 3-0). Conditions in cyberspace
and the EMS often change rapidly and can positively or negatively impact a commander’s ability to achieve
mission objectives. Friendly, neutral, adversary, and enemy actions in cyberspace and the EMS can create near-
instantaneous effects on the battlefield or in garrison. Given the global nature of cyberspace and the EMS, these
actions can impact a commander’s OE even though the actions may originate or terminate beyond that OE.
Cyberspace and EW effects also cross through and impact multiple domains simultaneously. For these reasons,
commanders must gain and maintain an in-depth understanding of the OE that extends beyond the land domain
to the multi-domain extended battlefield to seize, exploit, and retain operational initiative.
1-19. Operational initiative is the setting of tempo and terms of action throughout an operation (ADP 3-0).
By gaining and maintaining positions of relative advantage, including information advantage in and through
cyberspace and the EMS, commanders can seize and retain the operational initiative. To gain and maintain
information advantage, commanders must account for the temporal nature of information and the temporary
nature of many cyberspace and EW effects. On average, the relative operational advantage that a commander
can gain from a piece of information or from a cyberspace or EW effect degrades over time. This means that a
commander who takes action first, on average, will obtain a greater information advantage from a similar piece
of information or effect than a commander who acts later. In this way, the commander who can sense,
understand, decide, act, and assess faster than an opponent will generally obtain the greatest information
advantage.
1-20. Commanders can use cyberspace and EW capabilities to gain enhanced situational awareness and
understanding of the enemy through reconnaissance and sensing activities. These reconnaissance and sensing
activities can augment and enhance the understanding a commander gains from information collection and
intelligence processes. Commanders can also use cyberspace and EW capabilities to decide and act faster than
an adversary or enemy. By protecting friendly information systems and signals from disruption or exploitation |
3-12 | 17 | Operational Environment Overview
by an adversary or enemy, a commander can ensure command and control and maintain tactical and operational
surprise. Conversely, a commander might use cyberspace and EW capabilities to slow or degrade an enemy’s
decision-making processes by disrupting enemy sensors, communications, or data processing. To make
effective use of cyberspace and EW capabilities to achieve an information advantage, a commander must plan
early to integrate cyberspace operations and EW actions fully into the overall scheme of maneuver.
CYBERSPACE DOMAIN
1-21. Cyberspace is a global domain within the information environment consisting of the interdependent
networks of information technology infrastructures and resident data, including the Internet,
telecommunications networks, computer systems, and embedded processors and controllers (JP 3-12).
Cyberspace operations require the use of links and nodes located in other physical domains to perform logical
functions that create effects in cyberspace that then permeate throughout the physical domains using both wired
networks and the EMS.
1-22. The use of cyberspace is essential to operations. The Army conducts cyberspace operations and
supporting activities as part of both Army and joint operations. Because cyberspace is a global communications
and data-sharing medium, it is inherently joint, inter-organizational, multinational, and often a shared resource,
with signal and intelligence maintaining significant equities. Friendly, enemy, adversary, and host-nation
networks, communications systems, computers, cellular phone systems, social media websites, and technical
infrastructures are all part of cyberspace.
1-23. To aid the planning and execution of cyberspace operations, cyberspace is sometimes visualized in
three layers. These layers are interdependent, but each layer has unique attributes that affect operations.
Cyberspace operations generally traverse all three layers of cyberspace but may target effects at one or more
specific layers. Planners must consider the challenges and opportunities presented by each layer of cyberspace
as well as the interactions amongst the layers. Figure 1-2 on page 1-6 depicts the relationship between the three
cyberspace layers. The three cyberspace layers are—
* The physical network layer.
* The logical network layer.
* The cyber-persona layer. |
3-12 | 18 | Chapter 1
Figure 1-2. Relationship between the cyberspace network layers
PHYSICAL NETWORK LAYER
1-24. The physical network layer consists of the information technology devices and infrastructure in the
physical domains that provide storage, transport, and processing of information within cyberspace, to include
data repositories and the connections that transfer data between network components (JP 3-12). Physical
network components include the hardware and infrastructure such as computing devices, storage devices,
network devices, and wired and wireless links. Components of the physical network layer require physical |
3-12 | 19 | Operational Environment Overview
security measures to protect them from damage or unauthorized access, which, if left vulnerable, could allow
a threat to gain access to both systems and critical data.
1-25. Every physical component of cyberspace is owned by a public or private entity. The physical layer
often crosses geo-political boundaries and is one of the reasons that cyberspace operations require multiple
levels of joint and unified action partner coordination. Cyberspace planners use knowledge of the physical
location of friendly, neutral, and adversary information technology systems and infrastructures to understand
appropriate legal frameworks for cyberspace operations and to estimate impacts of those operations. Joint
doctrine refers to portions of cyberspace, based on who owns or controls that space, as either blue, gray, or red
cyberspace (refer to JP 3-12). This publication refers to these areas as friendly, neutral, or enemy cyberspace
respectively.
LOGICAL NETWORK LAYER
1-26. The logical network layer consists of those elements of the network related to one another in a way
that is abstracted from the physical network, based on the logic programming (code) that drives network
components (i.e., the relationships are not necessarily tied to a specific physical link or node, but to their ability
to be addressed logically and exchange or process data) (JP 3-12). Nodes in the physical layer may logically
relate to one another to form entities in cyberspace not tied to a specific node, path, or individual. Web sites
hosted on servers in multiple physical locations where content can be accessed through a single uniform
resource locator or web address provide an example. This may also include the logical programming to look
for the best communications route, instead of the shortest physical route, to provide the information requested.
CYBER-PERSONA LAYER
1-27. The cyber-persona layer is a view of cyberspace created by abstracting data from the logical network
layer using the rules that apply in the logical network layer to develop descriptions of digital representations of
an actor or entity identity in cyberspace, known as a cyber-persona (JP 3-12). Cyber-personas are not confined
to a single physical or logical location and may link to multiple physical and logical network layers. When
planning and executing cyberspace operations, staffs should understand that one actor or entity (user) may have
multiple cyber-personas, using multiple identifiers in cyberspace. These various identifiers can include different
work and personal emails and different identities on different Web forums, chatrooms, and social network sites.
1-28. For example, an individual’s account on a social media website, consisting of the username and digital
information associated with that username, may be just one of that individual’s cyber-personas. Conversely,
multiple different users may share a single cyber-persona or set of cyber-personas. Planners must understand
that enemy use of cyber-personas can make attributing responsibility for cyberspace actions difficult.
ELECTROMAGNETIC SPECTRUM
1-29. The electromagnetic spectrum (EMS) - is a maneuver space essential for facilitating control within the
operational environment (OE) and impacts all portions of the OE and military operations. Based on specific
physical characteristics, the EMS is organized by frequency bands, including radio waves, microwaves, infrared
radiation, visible light, ultraviolet radiation, x-rays, and gamma rays. Figure 1-3 on page 1-8 illustrates the
range of standard frequencies in the EMS and some of the common devices operating in those frequencies. |
3-12 | 20 | Chapter 1
Figure 1-3. The electromagnetic spectrum
TRENDS AND CHARACTERISTICS
1-30. The rapid proliferation of cyberspace and EMS capabilities has further congested an already
challenging OE. In addition to competing with threat actors in cyberspace and the EMS, U.S. forces also
encounter challenges resulting from neutral actors. Such neutral systems as commercial aircraft and airports,
Worldwide Interoperability for Microwave Access, and commercial cellular infrastructures contribute to
continuing congestion in cyberspace and the EMS. Figure 1-4 on page 1-9, depicts cyberspace and the EMS in
a congested OE.
1-31. Several key trends and characteristics impact a commander’s ability to use cyberspace and the EMS.
Such trends and characteristics include—
* Congested environments.
* Contested environments.
* Threats.
* Hazards.
* Terrain.
CONGESTED ENVIRONMENTS
1-32. Both cyberspace and the EMS are increasingly congested environments that friendly, neutral, and
threat actors use to transmit and process large amounts of information. Since 2000, the Army’s use of networked
information systems in almost every aspect of operations has increased tenfold. Neutral and threat actors have
similarly expanded their use of cyberspace and the EMS for a wide range of military and non-military purposes. |
3-12 | 21 | Operational Environment Overview
Figure 1-4. Congestion in cyberspace and the electromagnetic spectrum
CONTESTED ENVIRONMENTS
1-33. As cyberspace and the EMS continue to become more congested, the capabilities of state and non-state
actors to contest U.S. advantages in both areas have also expanded. State and non-state threats use a wide range
of advanced technologies that may represent relatively inexpensive ways for a small or materially
disadvantaged adversary to pose a significant threat to the United States. The application of low-cost cyberspace
capabilities can provide an advantage against a technology-dependent nation or organization and an asymmetric
advantage to those who could not otherwise effectively oppose U.S. military forces. Figure 1-5 on page 1-10,
depicts an operational view of cyberspace and the EMS in a contested OE. |
3-12 | 22 | Chapter 1
Figure 1-5. Cyberspace and the electromagnetic spectrum in a contested environment
THREATS
1-34. For every operation, threats are a fundamental part of an OE. A threat is any combination of actors,
entities, or forces that have the capability and intent to harm United States forces, United States national
interests, or the homeland (ADP 3-0). Threat is an umbrella term that includes any actor with the potential to
harm the United States or its interests. Threats include—
* Enemies.
* Adversaries.
* Peer threats.
* Hybrid threats.
* Insider threats.
1-35. An enemy is a party identified as hostile against which the use of force is authorized (ADP 3-0). An
enemy is also called a combatant and treated as such under the laws of war. Enemies will employ various
advanced technologies to attack Army forces in cyberspace and EMS to disrupt or destroy the ability to conduct
operations or collect information that will give friendly forces a strategic, operational, or tactical advantage.
1-36. An adversary is a party acknowledged as potentially hostile to a friendly party and against which the
use of force may be envisaged (JP 3-0). Though an adversary is not treated as a combatant, the goal is still to
prevent and deter conflict by keeping their activities within a desired state of cooperation and competition.
1-37. A peer threat is an adversary or enemy able to effectively oppose U.S. forces world-wide while
enjoying a position of relative advantage in a specific region (ADP 3-0), including cyberspace and the EMS.
Peer threats often have cyberspace and EW capabilities that are comparable to U.S. capabilities. Peer threats |
3-12 | 23 | Operational Environment Overview
may employ these capabilities across the competition continuum to collect intelligence, delay the deployment
of U.S. forces, degrade U.S. capabilities, and disrupt U.S. operations. Peer threats have electromagnetic attack
(EA) capabilities such as telecommunications and EMS jamming equivalent to or better than U.S. forces. Peer
threats can conduct advanced cyberspace attacks, including denial-of-service, various forms of phishing,
eavesdropping, and malware.
1-38. A hybrid threat is the diverse and dynamic combination of regular forces, irregular forces, or criminal
elements unified to achieve mutually benefitting effects (ADP 3-0). Commanders and staffs must understand
that the diversity of a hybrid threat complicates operations since hostility is coming from multiple actors
operating from various geographical territories. A hybrid threat complicates the United States' efforts to
identify, characterize, attribute, and respond to threats in cyberspace and the EMS.
1-39. Organized crime or other non-state, illegitimate organizations often make sophisticated malware
available for purchase or free, allowing even unsophisticated threat actors to acquire advanced capabilities at
little to no cost. Because of the low barriers to entry and the potentially high payoff, the United States can
expect an increasing number of adversaries to use cyberspace capabilities to attempt to negate U.S. advantages
in military capability.
1-40. An insider threat is a person with placement and access who intentionally causes loss or degradation
of resources or capabilities or compromises the ability of an organization to accomplish its mission through
espionage, providing support to international terrorism, or the unauthorized release or disclosure of information
about the plans and intentions of United States military forces (AR 381-12). Insider threats may include spies
within or working with U.S. forces, as well as personnel who may be unaware of their actions either through
deception or third party manipulation. Insider threats present unique challenges because they are trusted
individuals with authorized access to Army capabilities and sensitive operational information. Insider threats
may include spies within or working with U.S. forces.
Note. Law enforcement and counterintelligence capabilities also operate in cyberspace during
their efforts to neutralize criminal activities. Countering insider threats falls primarily within the
purview of these organizations and outside the authorized activities of the cyberspace forces.
However, information discovered in the course of authorized cyberspace operations may aid these
other organizations.
HAZARDS
1-41. A hazard is a condition with the potential to cause injury, illness, or death of personnel, damage to or
loss of equipment or property, or mission degradation (JP 3-33). Disruption to cyberspace’s physical
infrastructure often occurs due to operator errors, industrial accidents, and natural disasters. These
unpredictable events may have just as significant impact on operations as the actions of enemies. Recovery
from accidents and hazardous incidents may require significant coordination external to the DOD or the
temporary reliance on backup systems with which operators may be less familiar.
1-42. Electromagnetic energy can also impact the operational capability of military forces, equipment,
systems, and platforms. Various hazards from electromagnetic energy include electromagnetic environmental
effects, electromagnetic compatibility issues, EMI, electromagnetic pulse, and electromagnetic radiation
hazards.
1-43. Electromagnetic radiation hazards include hazards of electromagnetic radiation to personnel; hazards
of electromagnetic radiation to ordnance; hazards of electromagnetic radiation to fuels; and natural phenomena
effects such as space weather, lightning, and precipitation static.
CONFLICT AND COMPETITION
1-44. Army forces face continuous competition and conflict in cyberspace and the EMS from threats
intending to diminish friendly capabilities. Commanders must seek and exploit opportunities for success in
cyberspace and the EMS wherever and whenever authorized. |
3-12 | 24 | Chapter 1
COMPETITION CONTINUUM
1-45. Cyberspace operations, EW, and spectrum management operations take place across the competition
continuum. The competition continuum describes a world of enduring competition conducted through a mixture
of cooperation, competition below armed conflict, and armed conflict Superiority in cyberspace and the EMS
enables U.S. forces to conduct operations to achieve the goals and accomplish the objectives assigned to them
by the President and Secretary of Defense. Though U.S. forces may conduct cyberspace operations and EW
during competition below the level of armed conflict, they are critical enablers to combat power when
conducting large-scale combat operations during armed conflict. Competition below armed conflict consists of
situations in which joint forces take actions outside of armed conflict against a strategic actor in pursuit of
policy objectives.
1-46. Spectrum management operations fulfill a crucial within the CEMA construct. Spectrum management
operations take place across the entire competition continuum and ensure proper coordination of EMS activities
spanning the entirety of military operations.
MULTI-DOMAIN EXTENDED BATTLEFIELD
1-47. The enemy seeks to employ capabilities to create effects in multiple domains to counter U.S. interests
and impede friendly operations. Threat actors will conduct activities in the information environment, space,
and cyberspace to influence U.S. decision makers and disrupt the deployment of friendly forces. Land-based
threats will attempt to impede joint force freedom of action across the air, land, maritime, space, and cyberspace
domains. They will disrupt the EMS, sow confusion, and challenge the legitimacy of U.S. actions.
Understanding how threats can present multiple dilemmas to Army forces in all domains helps Army
commanders identify (or create), seize, and exploit their opportunities. Implementing operations security
(OPSEC) is critical to protecting essential friendly information technology infrastructures, command and
control, and targeting systems. Operations security is a capability that identifies and controls critical
information, indicators of friendly force actions attendant to military operations and incorporates
countermeasures to reduce the risk of an adversary exploiting vulnerabilities (JP 3-13.3).
POSITIONS OF RELATIVE ADVANTAGE IN CYBERSPACE AND THE ELECTROMAGNETIC
SPECTRUM
1-48. The Army conducts cyberspace operations and EW to attain positions of relative advantage in
cyberspace and the EMS, to establish information superiority. A position of relative advantage is a location or
the establishment of a favorable condition within the area of operations that provides the commander with
temporary freedom of action to enhance combat power over an enemy or influence the enemy to accept risk
and move to a position of disadvantage (ADP 3-0).
SECTION III – CONTRIBUTIONS TO THE WARFIGHTING FUNCTIONS
1-49. This section describes how cyberspace operations and EW support the warfighting functions. It
specifies the types of cyberspace operations and EW missions and actions that contribute to the various tasks
related to each warfighting function.
COMMAND AND CONTROL
1-50. Commanders rely heavily on cyberspace and the EMS for command and control. At corps and below,
the network in the command-and-control system is the Department of Defense information network-Army
(DODIN-A). The Department of Defense information network-Army is an Army-operated enclave of the
DODIN that encompasses all Army information capabilities that collect, process, store, display, disseminate,
and protect information worldwide (ATP 6-02.71). Signal forces establish, manage, secure, and defend the
DODIN-A by conducting Department of Defense information network operations and maintaining
cybersecurity compliance to prevent intrusions into the DODIN-A. For more information on DODIN
operations, refer to FM 6-02 and ATP 6-02.71. The networks and systems that comprise the DODIN-A enable
commanders to control units, have a shared understanding of the OE, and interact with subordinate units in near
real-time. |
3-12 | 25 | Operational Environment Overview
1-51. EW supports command and control through electromagnetic protection (EP) to eliminate or mitigate
the negative impact of friendly, neutral, enemy, or naturally occurring EMI on command-and-control systems.
The frequency assignment and deconfliction tasks of spectrum management operations support EP (See ATP
6-02.70). Such EP tasks include—emission control, mitigating electromagnetic environmental effects,
electromagnetic compatibility, electromagnetic masking, preemptive countermeasures, and electromagnetic
warfare reprogramming. These tasks require integration with spectrum management operation for frequency
management and deconfliction. Chapter 2 of this publication and ATP 3-12.3 details information on EP.
MOVEMENT AND MANEUVER
1-52. Cyberspace operations and EW enhance friendly forces commanders’ movement and maneuver by
disrupting adversary command and control, reducing adversary and increasing friendly situational awareness,
and negatively affect the adversary’s ability to make sound decisions. Due to the range and reach of cyberspace
capabilities, cyberspace forces are often able to support friendly maneuver in close areas while simultaneously
supporting deep area operations. For information on close and deep area operations, refer to FM 3-0. For
techniques on deep operations, refer to ATP 3-94.2.
1-53. DODIN operations support movement and maneuver by establishing secure tactical networks that
allow communications with friendly forces conducting operations laterally in close and deep areas, in addition
to communications with higher headquarters in the rear area. Units use the DODIN-A as the primary means of
communication during movement and maneuver. Satellite communications, combat net radios, and wired
networks are elements of the DODIN-A used to synchronize operations, collaborate, understand the
environment, and coordinate fires. The network enables near real-time updates to the common operational
picture. The upper and lower tiers of the DODIN-A connect headquarters to subordinate, adjacent, and higher
headquarters and unified action partners.
1-54. Offensive cyberspace operations (OCO) in coordination with other forms of fires also support
movement and maneuver by opening avenues necessary to disperse and displace enemy forces. Synchronizing
OCO with other fires sets conditions that enable maneuver to gain or exploit positions of relative advantage.
OCO will be discussed in detail in Chapter 2.
1-55. EW assets support movement and maneuver by conducting operations to degrade, neutralize, or
destroy enemy combat capabilities in the EMS. Defensive EA protects friendly forces from enemy attacks
during movement and maneuver by denying the enemy the use of the EMS. Using friendly EA to counter radio-
controlled devices, such as improvised explosive devices, drones, robots, or radio-guided munitions is an
example of defensive EA. During defensive EA, EW assets conduct operations to degrade, neutralize, or destroy
enemy combat capabilities in the EMS. EW assets conduct defensive EA by employing EA capabilities such
as counter radio-controlled improvised explosive device electronic warfare and devices used for aircraft
survivability. Offensive EA supports movement and maneuver by projecting power within the time and tempo
of the scheme of maneuver. Electromagnetic jamming, electromagnetic intrusion, and electromagnetic probing
are examples of offensive EA. Electromagnetic support (ES) supports movement and maneuver by providing
combat information for a situational understanding of the OE.
1-56. A variety of EP tasks also support movement and maneuver. Spectrum managers and EW personnel
deconflict friendly frequencies to prevent or mitigate frequency interference from friendly forces. Frequency
deconfliction includes preventive and mitigating measures to ensure friendly radio devices used during
movement and maneuver tasks do not cause frequency interference to the radios used by other friendly forces.
Electromagnetic masking supports movement and maneuver by concealing electromagnetic signatures radiated
by friendly forces’ spectrum dependent systems during operations. Conducting emission control during
movement and maneuver reduces electromagnetic signatures of friendly forces’ spectrum dependent
communications and navigational systems during movement and maneuver. EW forces also employ sensors
before a movement as preemptive countermeasures. Electromagnetic security supports movement and
maneuver by denying an enemy the ability to decipher information derived from electromagnetic energy that
they intercept. These tasks are discussed in further detail in Chapter 2 of this publication and in ATP 3-12.3. |
3-12 | 26 | Chapter 1
INTELLIGENCE
1-57. Cyberspace operations, EW, and intelligence mutually identify the cyberspace and EMS aspects of the
OE to provide recommendations for friendly courses of action during the military decision-making process.
Cyberspace and EW forces support information collection that may be used by intelligence professionals.
Conversely, intelligence operations provide products that enhance understanding of the OE, enable targeting,
and support defense in cyberspace and the EMS. It is critical that information acquired through cyberspace
operations and EW is standardized and reported to the intelligence community.
1-58. Intelligence supports cyberspace operations through the intelligence process, intelligence preparation
of the battlefield (IPB), and information collection. Intelligence at all echelons supports cyberspace operations
and EW planning, and helps measure performance and effectiveness through battle damage assessment.
Cyberspace planners leverage intelligence analysis, reporting, and production capabilities to understand the
OE, develop plans and targets, and support operations throughout the operations process. In the context of
cyberspace and the EMS, the OE includes network topology overlays that graphically depict how information
flows and resides within the operational area and how the network transports data in and out of the area of
interest.
INTELLIGENCE PREPARATION OF THE BATTLEFIELD
1-59. During IPB, the staff considers how the adversary or enemy utilizes cyberspace and the EMS to achieve
their objectives. Intelligence and CEMA staff also consider state and non-state actors with capability, access,
and intent to affect friendly operations as they define and analyze the area of interest.
1-60. Intelligence analysts, with support from other staff elements, evaluate enemy and adversary use of
cyberspace and the EMS. This includes evaluating aspects such as—
* Adversary or enemy use of cyberspace and the EMS.
* Reliance on networked capabilities.
* Sophistication of cyberspace attack capabilities.
* Adversary cyberspace defense capabilities.
* Adversary EW capabilities.
* Network vulnerabilities (both adversary and friendly).
* Ability to synchronize cyberspace operations with other operations.
* Adversary use of social media for social engineering.
1-61. When assessing the enemy or adversary courses of action, the intelligence staff considers how the
enemy or adversary will include cyberspace and the EMS in its operations. The commander and staff should
consider threat courses of action in cyberspace and the EMS when planning friendly operations. (See ATP 2-
01.3 for more information about IPB).
1-62. Weather (terrestrial and space) also affects operations in cyberspace and the EMS. In assessing weather
effects, the staff considers key terrain in cyberspace and the EMS in relation to other aspects of the area of
interest and the area of operations.
ELECTROMAGNETIC SUPPORT AND SIGNALS INTELLIGENCE
1-63. ES and signals intelligence (SIGINT) are similar in function, but SIGINT requires separate authorities.
EW personnel conduct ES to acquire information in support of a commander’s maneuver plan. No requirement
or restriction exists for EW personnel to have SIGINT authorities to conduct these activities.
1-64. EW and SIGINT personnel both identify emitters in the EMS and may cue each other for targeting,
but have distinct mission responsibilities. EW personnel characterize and identify emitters by analyzing
external signals for immediate threat recognition and warning, force protection, and targeting. ES provides
combat information that has a limited time value to support operations. ES information may be passed to
intelligence units or staff for further SIGINT analysis depending on situation and authorities. SIGINT personnel
analyze internal signal parameters to produce and disseminate intelligence, which requires SIGINT authorities. |
3-12 | 27 | Operational Environment Overview
FIRES
1-65. OCO and EA tasks are part of the fires warfighting function. Cyberspace forces employ cyberspace
attacks to deny, degrade, disrupt, and destroy or otherwise affect enemies’ cyberspace or information-dependent
capabilities. EW personnel employ EA to degrade, and neutralize the enemies’ ability to use the EMS.
Cyberspace and EW effects transcends beyond cyberspace and the EMS and may result in second-and-third-
order effects that could impact the other physical domains.
1-66. Army cyberspace and EW effects applied against enemy capabilities and weapon systems deny their
ability to communicate, track, or target. EW also supports fires by enabling lethal fires through the employment
of ES to search for, identify, and locate or localize sources of radiated electromagnetic energy used by the
enemy for targeting. Defensive EA can support fires through the deployment of decoys or noise to mask friendly
fires networks.
SUSTAINMENT
1-67. Cyberspace operations support sustainment through DODIN operations and defensive cyberspace
operations (DCO). Sustainment organizations, functions, systems, and sustainment locations that are highly
dependent on DODIN operations include—
* The global supply chain.
* Army logistics networks and information systems.
* Mobilization and power projection platforms.
* Aerial ports of debarkation.
* Seaports of debarkation.
1-68. DODIN operations establish the necessary communications to conduct sustainment functions.
Cyberspace forces defend sustainment systems when adversaries breach cybersecurity measures of networks
and systems from threat cyberspace attacks. EW supports sustainment through EP and ES, ensuring freedom
of action for DODIN operations in and through the EMS for continued sustainment support. Management,
coordination, and deconfliction of frequencies in the EMS are functions of spectrum management operations.
Refer to Chapter 2 for more information on defensive cyberspace operations-internal defensive measures
(DCO-IDM).
PROTECTION
1-69. DCO-IDM and EP tasks, in addition to the cyberspace security tasks of DODIN operations, are part of
the protection warfighting function. DODIN operations, DCO-IDM, EP, and defensive EA support protection
by securing and defending the DODIN-A. Cyberspace forces conduct DCO-IDM to detect, characterize,
counter, and mitigate ongoing or imminent threats to the DODIN-A. DODIN operations and DCO-IDM also
enable other protection tasks by providing secured communications for—
* Area security.
* Police operations.
* Personnel recovery.
* Air and missile defense.
* Detention operations.
1-70. EP involves actions to protect personnel, facilities, and equipment from friendly, neutral, or enemy use
of the EMS. EP includes measures to protect friendly personnel and equipment in a contested and congested
electromagnetic operational environment (EMOE). The EMOE is a composite of the actual and potential
electromagnetic energy radiation, conditions, circumstances, and influences that affect the employment of
capabilities and the decisions of the commander. The CEMA spectrum manager work closely with the S-6 or
G-6 spectrum manager to deconflict frequencies used by friendly forces. Friendly forces can employ proactive
measures such as emission control to reduce their electromagnetic signature, thus increasing OPSEC. Defensive
EA protects friendly forces by denying enemy use of the EMS, disrupting their ability to target, guide, or fire
weapons. Refer to Chapters 2 and 4 of this publication for more information on emission control. |
3-12 | 29 | Chapter 2
Cyberspace Operations and Electromagnetic Warfare
Fundamentals
This chapter describes the types of cyberspace operations and electromagnetic warfare
and associated tasks. It details common effects that commanders can achieve through
cyberspace operations and electromagnetic warfare, and discusses the interrelationship
between cyberspace operations and electromagnetic warfare and other Army
operations. This chapter also discusses training used to prepare Soldiers to execute
cyberspace operations and electromagnetic warfare missions.
SECTION I – CYBERSPACE OPERATIONS
2-1. Cyberspace operations and EW can benefit from synchronization with other Army capabilities using a
combined arms approach to achieve objectives against enemy forces. Cyberspace operations and EW can
provide commanders with positions of relative advantage in the multi-domain fight. Effects that bleed over
from the cyberspace domain into the physical domain can be generated and leveraged against the adversary.
A cyberspace capability is a device or computer program, including any combination of software, firmware,
or hardware, designed to create an effect in or through cyberspace (JP 3-12).
Note. Law enforcement and counterintelligence capabilities may create effects in cyberspace
during their efforts to disrupt, destroy, deny, or degrade an enemy or adversary’s activities in
cyberspace.
2-2. Electromagnetic spectrum superiority is the degree of control in the electromagnetic spectrum that
permits the conduct of operations at a given time and place without prohibitive interference, while affecting
the threat’s ability to do the same (JP 3-85). EW creates effects in the EMS and enables commanders to gain
EMS superiority while conducting Army operations. EW capabilities consist of the systems and weapons
used to conduct EW missions to create lethal and non-lethal effects in and through the EMS. |
3-12 | 30 | Chapter 2
Russia’s Application of Cyberspace Operations and Electronic
Warfare during the Russo-Ukrainian War
In 2013, Ukraine’s pro-Russian leadership opted for closer ties to the pro-Russian
Eurasian Economic Union rather than sign with the European Union. In response,
violent protests erupted throughout Ukraine. In constant competition with the United
States and China to increase the flow of trade, Russia has always sought access in
expanding commerce throughout the region. As Ukraine descended into chaos,
Vladimir Putin and the Russian Federation recognized conditions were optimal for
seizure of Ukraine’s Black Sea warm water ports in the Crimea. Seizure of these ports
not only provided lucrative access to Mediterranean trade and commerce, but also
challenged the United States’ military power on the Black Sea. Russian actions also
included strategic efforts to stop NATO expansion and to reduce the buffer zone
between the west and Russian economic expansion.
Ukraine’s use of Russian command, control, communications, computer, surveillance,
and reconnaissance (C4ISR) made them vulnerable to Russian exploitation and
attacks. Formulating their campaign plans around thematic denial and deception
operations, Russian military planners went to work on a hybrid campaign that was a
multifaceted mix of regular and irregular actions. Russian planners identified Ukraine’s
center of gravity as their C4ISR. Russia infiltrated Ukrainian telecommunication
systems, while Ukrainian’s use of communication devices likely aided Russia’s
targeting efforts. In order to inject strategic, operational, and tactical chaos within
Ukraine’s decision-making cycle, Russia conducted targeted cyberspace operations
and electromagnetic warfare (denial of service, manipulation of social media, etc.) on
critical C4ISR nodes. At the tactical level, the Russian Army’s utilization of targeted
cyberspace and electromagnetic warfare actions were lethal.
The Ukrainian Army moved several mechanized brigades near the Russian border in
order to interdict illegal cross border shipments of equipment heading to rebels in
Eastern Ukraine. On the morning of 11 July 2014, Ukrainian soldiers spotted a drone
orbiting above them. Shortly after the drone disappeared, one of the Ukrainian
brigades was struck with a devastating barrage from a 9A52-4 Tornado multiple rocket
system.
Rockets containing a mixture of high explosive, cluster, and thermobaric munitions
rained down on the unit’s positions over the course of four minutes. Following this initial
rocket salvo, the Russians followed with high explosive artillery rounds and the
cumulative effects were devastating. In a post mortem of the action, the Ukrainian Army
suffered 37 killed and 100 wounded. One Ukrainian battalion was virtually destroyed,
and others were rendered combat ineffective due to heavy losses in personnel and
equipment. It was later assessed that the Russian Army’s ability to collect intelligence
and geo-locate, coupled with their ability to target Ukrainian communication nodes,
played a significant role in enabling the Russians to find, fix, and destroy an entire
Ukrainian combat arms brigade. The Russians’ targeted application of electromagnetic
warfare and cyber attacks created chaos within Ukraine’s civil and military leadership
and left them confused, a second-order effect. Western leaders found themselves
limited in their ability to respond to Russian actions in the region. Russia’s use of
cyberspace and electromagnetic warfare capabilities to Ukraine’s command and
control enabled them the seize Crimea and achieve their strategic goal of obtaining
commercial and military ports on the Black Sea. |
3-12 | 31 | Cyberspace Operations and Electromagnetic Warfare Fundamentals
JOINT FORCE AND ARMY
2-3. The joint force and the Army divide cyberspace operations into three categories based on the portion
of cyberspace in which the operations take place and the type of cyberspace forces that conduct those
operations. Each of type of cyberspace operation has varying associated authorities, approval levels, and
coordination considerations. An Army taxonomy of cyberspace operations is depicted in figure 2-1, below.
The three types of cyberspace operations are—
* DODIN operations (refer to ATP 6-02.71).
* DCO.
* OCO.
2-4. The Army conducts DODIN operations on internal Army and DOD networks and systems using
primarily signal forces. The Army employs cyberspace forces to conduct DCO which includes two further
sub-divisions—DCO-IDM and defensive cyberspace operations-response actions (DCO-RA). Cyberspace
forces conduct DCO-IDM within the DODIN boundary, or on other friendly networks when authorized, in
order to defend those networks from imminent or ongoing attacks. At times cyberspace forces may also take
action against threat cyberspace actors in neutral or adversary networks in defense of the DODIN or friendly
networks. These types of actions, called DCO-RA, require additional authorities and coordination measures.
Lastly, cyberspace forces deliberately target threat capabilities in neutral, adversary, and enemy-held portions
of cyberspace by conducting OCO. Cyberspace forces may include joint forces from the DOD cyber mission
forces or Army-retained cyberspace forces. See Chapter 3 of this publication for more details on cyberspace
forces.
Figure 2-1. Cyberspace operations taxonomy |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.