Page:United States Army Field Manual 3-13 Information Operations.djvu/38

From Wikisource
Jump to navigation Jump to search
This page needs to be proofread.

FM 3-13 detailed information on adversary INFOSYS. Intiirmmion pmdueud by ES operations supports ISR opera _. {_ V. ·_ _; V. ;;_ · uons. it gathers tecl.uiica1in£1rm.a— _; ’EI¤c¢r0nlc‘W@l`l°¥¤ in Peace tion that supports use development L _,,__. V $2 O;iaratl¤i·is· li ~ ‘— and maintenance of the electronic . =l- —¥“¥ — Om. .,i not database used in ~y$.,‘§*’$2'iZ’§s`?§étt?§;§;‘.?i‘i$'§ i IM and mlier ES operntmns. and Sensi)! $ysmn$;—`ln.r{9g7` Us 227. Electronic ixttsek. one T i*· ’§9=?t*l@’ ¥¤$¤¤ i¤¤tml¤9' tranic attack is out smart;. ot i:_.¤¤·1~¤¤·¤*m·l·*¤¤1[¤¤F¤¤¤..¤<¥ Slovene ·» elem-smc warfare involving the —` *%'*l?·NAT9~¤*9¤¤9¤”¤€ P¤mW*9¥*· '— use of sisrttsmignsttc energy, 1 is"! ¤¤¤n»¤*r;S¤*l>,-*¤l¤v¤S¤¤- Few , dismal energy, or snursonntm _;—,?”~""*~F"!"’°“at‘?F$°" "’°'°}!$?" ` weapons to ana twist, sn. rm Mdv. w¤*····»s·. ¤' meltw · toes, or equipment was me intent ,;. —?°‘l¥"¥ bt l‘¥"?9""F"€ °?V‘*“"F"°'>T t of degrading nmnsitnns or ae. —r 9'°"l"~`“sF°‘$ im". *“l‘""°"?·' ~ . ' ’ . . .. rand detenmne their resolve to use V stmying; enemy combat eapalnhty ,jrr”Gmaw_ {cme} As;-V me suu¤N¤n_;:— nénd is considered a ltorm of ltircs. , rsmbmzedl EW —,_.$pq$“°n$`;Fm“§d ·` lectmme attack includes. (1) . iu; m°"“¤m.‘g_._§¤digemus_ pqaw actions taken to prevent or reduce 1 mgmaiy gg 'Sygggms (og em ' 'p|_;.j' an encmy’s eftmtive use ot' the édhgwith tha mmg§ry.ml°v;Si°“S as elccttvmngnctic sptxbtrum, such as ms gaymn rtpggcg '¤bg°i·¤S_ `yn . jamming and electromagnetic :~.gqdm¤;y_~guN§;|g¤nm'·8Ss¤ts wgyé t_ metals, and iz; employment or asso its mailer reavaiisn " weapons that use either electro ..V;§a;;.;m;|9gs;yt;n¤vsmsqi;_ Q`:-; magnetic or directed energy as ` ~ ` ‘ ” ” * `’`‘ ` ‘ ' `’`‘ ` M their primary destructive mechanism (lasers, radio frequency weapons, particle beams) (JP 3-51). EA dcceives adversaries, denies them information, and disrupts their C2 systems. Them are ti·atie~offs when jamming enemy C2 systems. Jamming may cause thc loss of a collection source tor a time. The source may change frequencies, necessitating a new seaich it. When syn ehmnizcd and integrated with lethal tires, EA becomes a wrnhat multiplier, EA can be used against wmputors, but it is not CNA. CNA relies nn the data stream to execute the attack while EA relies on the electromagnetic spec truin. Here are examples of each operation: Sending a code or instruction to a central prucessing unit that causes a computer to short out the power supply is CNA. Using an electromagnetic pulse to destroy a computers electronics and causing the same result is EA. United States Army Intelligence and Security Command UNSCOM) is the Army’s EA Eorce provider (capabilities and units) and executor tbr Army and joint warfighters. Requests for EA should he torwardcd through higher headquarters to United States Army Space Command (ARSPACE), where the EA coordination and planning process begins Both are involved in Army EA planning and operations. Staff Coordination 228. Staff responsibility for EW nesides with the electronic wartaie ot`.Ecer (EWO). Duties of the EWG as a special stat? efiicer are listed in appendix F. The Gil exeicises coordinating start responsibility over the EWO. 229. 'lhe EWO mordinates with the G~6 to deconflict EA targets with frequencies and the joint restricted frequency list. Together with the G—2 2-B