1.
General.
C3CM is the integrated use of jamming, military deception, physical destruction, and
a.
operations security (OPSEC), supported by intelligence, to deny C3 information to an enemy. It also
attempts to influence, degrade, or destroy enemy C3 capabilities and to protect friendly C3 against such
actions.
The components of C3CM are not new. The emphasis is placed on achieving the proper
b.
asset mix to best support the commanders concept of operation. This is very important in the joint
environment where air, land, sea, and space assets must effectively integrate to do the mission
successfully.
C3CM objectives. These are divided into the closely related categories of Counter-C3 and C3
2.
Protect.
Counter-C3 consists of measures to deny an enemy the ability to command and control its
a.
forces effectively.
The goal is to destroy, disrupt, or degrade an enemy's C3 in support of friendly
(1)
objectives. The counter-C3 process involves:
Identifying enemy C3 nodes.
(a)
(b)
Analyzing nodes for criticality and vulnerability.
(c)
Prioritizing the nodes.
Determining the desired effect and how the four C3CM components aid
(d)
the overall effort.
(e)
Assigning assets to each of the nodes to be attacked.
(f)
Determining the operation's effectiveness.
Counter-C3 must concentrate on degrading critical enemy C3 functions, instead of
(2)
simply defeating specific targets. To achieve this, planners must identify specific enemy C3 targets that
relate to enemy C3 capabilities. High pay-off targets include enemy C3, maneuver element, weapons
control, and sustainment facilities. A coordinated attack of an enemy's C3 facilities should:
(a)
Slow the enemy's tempo.
(b)
Disrupt the enemy's plans and operations.
(c)
Disrupt the enemy ability to generate combat power.
SS0136
2-2