as possible.
Terrain features and man-made obstacles should be used to
conceal equipment, without degrading communications. Concealment provisions
must be included in OPLANs and OPORDs.
3.
Electronic Warfare Vulnerabilities Analysis.
The signal systems
analysis and EW vulnerability process are part of the overall counter-
This four-phase process provides
the commander with knowledge of the enemy capabilities to assess them
against his OPLANs.
The phases are threat assessment, vulnerability
assessment,
countermeasures
options
development,
and
countermeasures
evaluation.
a. Threat assessment is the key in planning C-SIGINT operations. Enemy
technical and operational capabilities and intentions are examined to
determine their impact on friendly C3 equipment.
b. The vulnerability assessment is conducted to determine where enemy
forces can inflict the most damage.
The identified weaknesses are ranked
according to their potential impact on friendly operations.
identified for controlling, eliminating, or exploiting the weaknesses
identified during vulnerability assessment.
Countermeasures are needed to
effectively counter enemy exploitation of friendly C3 systems.
d. The effectiveness of the applied countermeasures is evaluated during
needs to decide if they should be used in other operations.
4.
Summary.
a. Staff Functions and Responsibilities.
(1) The G2/S2 and the G3/S3 have the main staff responsibility for
(2) The G2/S2 provides the G3/S3 with information concerning enemy
forces for ECCM planning and operations.
He is also responsible for
monitoring the unit's signals security posture.
(3) The G3/S3 has primary staff responsibility for ECCM. He is also
responsible for including ECCM training in the unit training program.
(4) The signal officer develops and plans ECM integration into the
overall operational plan. He does this in coordination with the G3/S3.
4-5
SS0135