C3CM is the integrated use of jamming, military deception, physical destruction, and
operations security (OPSEC), supported by intelligence, to deny C3 information to an enemy. It also
attempts to influence, degrade, or destroy enemy C3 capabilities and to protect friendly C3 against such
The components of C3CM are not new. The emphasis is placed on achieving the proper
asset mix to best support the commanders concept of operation. This is very important in the joint
environment where air, land, sea, and space assets must effectively integrate to do the mission
C3CM objectives. These are divided into the closely related categories of Counter-C3 and C3
Counter-C3 consists of measures to deny an enemy the ability to command and control its
The goal is to destroy, disrupt, or degrade an enemy's C3 in support of friendly
objectives. The counter-C3 process involves:
Identifying enemy C3 nodes.
Analyzing nodes for criticality and vulnerability.
Prioritizing the nodes.
Determining the desired effect and how the four C3CM components aid
the overall effort.
Assigning assets to each of the nodes to be attacked.
Determining the operation's effectiveness.
Counter-C3 must concentrate on degrading critical enemy C3 functions, instead of
simply defeating specific targets. To achieve this, planners must identify specific enemy C3 targets that
relate to enemy C3 capabilities. High pay-off targets include enemy C3, maneuver element, weapons
control, and sustainment facilities. A coordinated attack of an enemy's C3 facilities should:
Slow the enemy's tempo.
Disrupt the enemy's plans and operations.
Disrupt the enemy ability to generate combat power.