(b)
Prevent unauthorized access to equipment, facilities, material, and
documents.
(c)
Safeguard against espionage, sabotage, damage, or theft.
(5)
Counterreconnaissance. This consists of measures taken to prevent an enemy
from observing a force, area, or place.
Intelligence support for C3CM. IEW support is a major ingredient in the C3CM strategy.
4.
Intelligence support to the C3CM process begins upon receiving the mission. The C3CM
a.
process includes target detection, location, and identification. The support staff collects and analyzes
data from a variety of sources. These include signals intelligence, human observers, and imagery. The
staff then identifies potential Counter-C3 targets
b.
Next, the staff does a criticality and vulnerability assessment of the targets' relative worth
to the enemy order of battle. The intelligence staff recommends C3 target selection and priority to the J3
or joint force commander (JFC). Targets are nominated by priority.
The C3CM process next shifts to an operational focus. Mission planning and execution
c.
are the primary considerations. After the C3CM efforts results are collected, the intelligence staff
evaluates the input to determine the impact on enemy operations.
d.
Intelligence personnel collect, filter, correlate, and act on extensive information. Leaders
must effectively manage competing requirements. That requires intelligence and operations staffs to
wargame different options to determine recommended approaches, and then allot time to prioritize
collection.
Intelligence for the C3CM effort must support the overall concept of operation. For the
e.
J2 to select viable C3 targets, intelligence data must focus on the commander's intent and concept of the
operation. Through sensors and the staffs battlefield estimate, intelligence preparation of the battlefield
(IPB) supports intelligence estimates. The commander uses the estimates to plan friendly operations.
Planners anticipate enemy responses so that C3CM operations are timely and effective. Planning and
coordination actions for detecting and attacking specific targets must be done early. Doing so allows
The intelligence staff provides information for decision making throughout the C3CM
f.
process. The intelligence system supports analysis of friendly C3 vulnerabilities, threat collection, and
lethal attack systems. The support must accurately target specific enemy C3 functions which aid both
the counter and protect components of C3CM.
SS0136
2-6