(d)
Degrade the enemy's decision cycle for executing mission orders and
movement instructions.
(e)
Degrade the flow of combat information and intelligence to enemy forces.
C3 Protect is designed to protect friendly critical assets from enemy attack or deception.
b.
The objective of C3 Protect is to deny, negate, or turn to friendly advantage an
(1)
enemy's efforts to destroy, disrupt, deceive, or deny information about friendly C3.
(2)
OPSEC, deception, and destructive or disruptive means may be used to protect
friendly critical resources. C3 Protect involves continuous planning, data collection and analysis,
reporting, and executing orders and instructions. The protect process is cyclic. Depending on the nature
of the threat and friendly vulnerabilities, it should include:
Identifying friendly, critical C3 nodes.
(a)
(b)
(c)
Identifying friendly force profiles.
(d)
Identifying recommended essential elements of friendly information
(EEFI) on C3 facilities and vulnerabilities.
(e)
Analyzing risk and selecting critical EEFI.
(f)
Recommending countermeasures.
(g)
Selecting OPSEC and deception techniques to conceal EEFI from the
enemy.
(h)
Applying selected countermeasures to attack, destroy, or disrupt enemy
reconnaissance, surveillance, target acquisition, and intelligence systems.
(i)
(j)
(k)
Recommending adjustments to the countermeasures.
Selecting critical survival tasks to decrease friendly C3 vulnerabilities.
(l)
2-3
SS0136